// include the latest version of the regex crate in your Cargo.toml
extern crate regex;
use regex::Regex;
fn main() {
let regex = Regex::new(r#"(?m)^\w++\W++((?<=\")[\w-]+(?="))\W+((?<=\")[\w-]+(?="))[\S\s]+?(count\W+=.*)[\S\s]+?^}$"#).unwrap();
let string = "resource \"aws_iam_role\" \"my_test_payer_specific_role\" {
count = \"${(var.payer_account == \"380834257621\")?1:0}\"
name = \"my_test_payer_specific_role\"
max_session_duration = \"7200\"
assume_role_policy = \"${data.aws_iam_policy_document.my_test_payer_specific_role-policy.json}\"
tags = \"${var.resources_tags}\"
lifecycle {
ignore_changes = [
\"permissions_boundary\"
]
}
}
resource \"aws_iam_role_policy_attachment\" \"my_test_payer_specific_role-policy-attachment\" {
role = \"${aws_iam_role.my_test_payer_specific_role.name}\"
count = \"${(var.payer_account == \"380834257621\")?1:0}\"
policy_arn = \"arn:${var.partition}:iam::aws:policy/AdministratorAccess\"
}
data \"aws_iam_policy_document\" \"my_test_payer_specific_role-policy\" {
count = \"${(var.payer_account == \"380834257621\")?1:0}\"
statement {
actions = [\"sts:AssumeRole\"]
principals {
type = \"AWS\"
identifiers = [\"arn:${var.partition}:iam::${var.payer_account}:root\", \"arn:${var.partition}:iam::380834257621:root\"]
}
}
}";
// result will be an iterator over tuples containing the start and end indices for each match in the string
let result = regex.captures_iter(string);
for mat in result {
println!("{:?}", mat);
}
}
Please keep in mind that these code samples are automatically generated and are not guaranteed to work. If you find any syntax errors, feel free to submit a bug report. For a full regex reference for Rust, please visit: https://docs.rs/regex/latest/regex/