@@ -805,8 +805,8 @@ resource "aws_iam_policy" "cloudwatch_management" {
805805data "aws_iam_policy_document" "regression_test_permissions" {
806806 statement {
807807 sid = " S3Access"
808- Effect = " Allow" ,
809- Action = [
808+ effect = " Allow" ,
809+ action = [
810810 " s3:ListBucket" ,
811811 " s3:GetObject" ,
812812 " s3:PutObject" ,
@@ -816,7 +816,7 @@ data "aws_iam_policy_document" "regression_test_permissions" {
816816 " s3:PutObjectTagging" ,
817817 " s3:GetObjectVersion" ,
818818 ],
819- Resource = [
819+ resource = [
820820 " arn:aws:s3:::*eligibility-signposting-api-${ var . environment } -eli-rules" ,
821821 " arn:aws:s3:::*eligibility-signposting-api-${ var . environment } -eli-rules/*" ,
822822 " arn:aws:s3:::*eligibility-signposting-api-${ var . environment } -consumer-map" ,
@@ -826,8 +826,8 @@ data "aws_iam_policy_document" "regression_test_permissions" {
826826
827827 statement {
828828 sid = " DynamoAccess"
829- Effect = " Allow"
830- Action = [
829+ effect = " Allow"
830+ action = [
831831 " dynamodb:GetItem" ,
832832 " dynamodb:PutItem" ,
833833 " dynamodb:Query" ,
@@ -849,8 +849,8 @@ data "aws_iam_policy_document" "regression_test_permissions" {
849849
850850 statement {
851851 sid = " SecretsManagerAccess"
852- Effect = " Allow"
853- Action = [
852+ effect = " Allow"
853+ action = [
854854 " secretsmanager:GetSecretValue" ,
855855 " secretsmanager:PutSecretValue" ,
856856 " secretsmanager:DescribeSecret" ,
@@ -860,8 +860,8 @@ data "aws_iam_policy_document" "regression_test_permissions" {
860860
861861 statement {
862862 sid = " CloudWatchLogsRead"
863- Effect = " Allow"
864- Action = [
863+ effect = " Allow"
864+ action = [
865865 " logs:DescribeLogGroups" ,
866866 " logs:DescribeLogStreams" ,
867867 " logs:GetLogEvents" ,
@@ -875,8 +875,8 @@ data "aws_iam_policy_document" "regression_test_permissions" {
875875
876876 statement {
877877 sid = " XRayRead"
878- Effect = " Allow"
879- Action = [
878+ effect = " Allow"
879+ action = [
880880 " xray:GetTraceSummaries" ,
881881 " xray:BatchGetTraces" ,
882882 " xray:GetServiceGraph" ,
@@ -892,8 +892,8 @@ data "aws_iam_policy_document" "regression_test_permissions" {
892892
893893 statement {
894894 sid = " SSMRead"
895- Effect = " Allow"
896- Action = [
895+ effect = " Allow"
896+ action = [
897897 " ssm:GetParameter" ,
898898 " ssm:GetParameters" ,
899899 " ssm:GetParametersByPath"
0 commit comments