|
34 | 34 | "AWS::IAM::AssumeRolePolicyDocument"
|
35 | 35 | }
|
36 | 36 |
|
| 37 | +ASSUME_ROLE_POLICY_TYPE = "AWS::IAM::AssumeRolePolicyDocument" |
| 38 | + |
37 | 39 | def get_identity_resource_name(resource):
|
38 | 40 | if isinstance(resource, PermissionSet):
|
39 | 41 | return resource.Name
|
@@ -365,12 +367,12 @@ def check_resources(self, resources, roles):
|
365 | 367 | raise ApplicationError(f'Unable to find trust policy for {role.RoleName}')
|
366 | 368 | else:
|
367 | 369 | policy_str = json.dumps(role.TrustPolicy)
|
368 |
| - if (policy_str, resource.ResourceType) not in self.resource_policy_cache: |
| 370 | + if (policy_str, ASSUME_ROLE_POLICY_TYPE) not in self.resource_policy_cache: |
369 | 371 | LOGGER.info(f'Check trust policy for role {role.RoleName}')
|
370 |
| - response = self._call_api(role.TrustPolicy, RESOURCE_POLICY_TYPE, "AWS::IAM::AssumeRolePolicyDocument") |
| 372 | + response = self._call_api(role.TrustPolicy, RESOURCE_POLICY_TYPE, ASSUME_ROLE_POLICY_TYPE) |
371 | 373 | LOGGER.info(f'{self.operation_name} response {response}')
|
372 |
| - self.resource_policy_cache[(policy_str, resource.ResourceType)] = response |
| 374 | + self.resource_policy_cache[(policy_str, ASSUME_ROLE_POLICY_TYPE)] = response |
373 | 375 | else:
|
374 | 376 | LOGGER.info(f'Trust policy for role {role.RoleName} already checked. Skipped.')
|
375 |
| - response = self.resource_policy_cache.get((policy_str, resource.ResourceType)) |
| 377 | + response = self.resource_policy_cache.get((policy_str, ASSUME_ROLE_POLICY_TYPE)) |
376 | 378 | self._handle_response(response, role.RoleName, 'TrustPolicy', self.operation_name)
|
0 commit comments