@@ -805,18 +805,18 @@ resource "aws_iam_policy" "cloudwatch_management" {
805805data "aws_iam_policy_document" "regression_test_permissions" {
806806 statement {
807807 sid = " S3Access"
808- effect = " Allow" ,
809- action = [
808+ effect = " Allow"
809+ actions = [
810810 " s3:ListBucket" ,
811811 " s3:GetObject" ,
812812 " s3:PutObject" ,
813813 " s3:DeleteObject" ,
814814 " s3:GetBucketTagging" ,
815815 " s3:GetObjectTagging" ,
816816 " s3:PutObjectTagging" ,
817- " s3:GetObjectVersion" ,
817+ " s3:GetObjectVersion"
818818 ],
819- resource = [
819+ resources = [
820820 " arn:aws:s3:::*eligibility-signposting-api-${ var . environment } -eli-rules" ,
821821 " arn:aws:s3:::*eligibility-signposting-api-${ var . environment } -eli-rules/*" ,
822822 " arn:aws:s3:::*eligibility-signposting-api-${ var . environment } -consumer-map" ,
@@ -827,7 +827,7 @@ data "aws_iam_policy_document" "regression_test_permissions" {
827827 statement {
828828 sid = " DynamoAccess"
829829 effect = " Allow"
830- action = [
830+ actions = [
831831 " dynamodb:GetItem" ,
832832 " dynamodb:PutItem" ,
833833 " dynamodb:Query" ,
@@ -850,7 +850,7 @@ data "aws_iam_policy_document" "regression_test_permissions" {
850850 statement {
851851 sid = " SecretsManagerAccess"
852852 effect = " Allow"
853- action = [
853+ actions = [
854854 " secretsmanager:GetSecretValue" ,
855855 " secretsmanager:PutSecretValue" ,
856856 " secretsmanager:DescribeSecret" ,
@@ -862,7 +862,7 @@ data "aws_iam_policy_document" "regression_test_permissions" {
862862 statement {
863863 sid = " CloudWatchLogsRead"
864864 effect = " Allow"
865- action = [
865+ actions = [
866866 " logs:DescribeLogGroups" ,
867867 " logs:DescribeLogStreams" ,
868868 " logs:GetLogEvents" ,
@@ -877,7 +877,7 @@ data "aws_iam_policy_document" "regression_test_permissions" {
877877 statement {
878878 sid = " XRayRead"
879879 effect = " Allow"
880- action = [
880+ actions = [
881881 " xray:GetTraceSummaries" ,
882882 " xray:BatchGetTraces" ,
883883 " xray:GetServiceGraph" ,
@@ -894,7 +894,7 @@ data "aws_iam_policy_document" "regression_test_permissions" {
894894 statement {
895895 sid = " SSMRead"
896896 effect = " Allow"
897- action = [
897+ actions = [
898898 " ssm:GetParameter" ,
899899 " ssm:GetParameters" ,
900900 " ssm:GetParametersByPath"
0 commit comments