@@ -669,7 +669,7 @@ resource "aws_iam_policy" "github_actions_extended" {
669669 ]
670670 Effect = " Allow"
671671 Resource = " *"
672- Sid = " VisualEditor0 "
672+ Sid = " config_policy_1 "
673673 },
674674
675675
@@ -685,7 +685,7 @@ resource "aws_iam_policy" "github_actions_extended" {
685685 ]
686686 Effect = " Allow"
687687 Resource = " arn:aws:ecr:eu-west-2:*:repository/*"
688- Sid = " VisualEditor0 "
688+ Sid = " ecr_github_access_policy_1 "
689689 },
690690
691691
@@ -697,13 +697,13 @@ resource "aws_iam_policy" "github_actions_extended" {
697697 ]
698698 Effect = " Allow"
699699 Resource = " *"
700- Sid = " VisualEditor0 "
700+ Sid = " github_mtls_gateway_1 "
701701 },
702702 {
703703 Action = " apigateway:AddCertificateToDomain"
704704 Effect = " Allow"
705705 Resource = " arn:aws:apigateway:eu-west-2::/domainnames"
706- Sid = " VisualEditor1 "
706+ Sid = " github_mtls_gateway_2 "
707707 },
708708 {
709709 Action = [
@@ -724,7 +724,7 @@ resource "aws_iam_policy" "github_actions_extended" {
724724 " arn:aws:route53:::hostedzone/*" ,
725725 " arn:aws:acm:eu-west-2:${ data . aws_caller_identity . current . account_id } :certificate/*" ,
726726 ]
727- Sid = " VisualEditor2 "
727+ Sid = " github_mtls_gateway_3 "
728728 },
729729 {
730730 Action = [
@@ -736,13 +736,13 @@ resource "aws_iam_policy" "github_actions_extended" {
736736 " arn:aws:apigateway:eu-west-2::/domainnames/*" ,
737737 " arn:aws:apigateway:eu-west-2::/domainnames" ,
738738 ]
739- Sid = " VisualEditor3 "
739+ Sid = " github_mtls_gateway_4 "
740740 },
741741 {
742742 Action = " apigateway:AddCertificateToDomain"
743743 Effect = " Allow"
744744 Resource = " arn:aws:apigateway:eu-west-2::/domainnames"
745- Sid = " VisualEditor4 "
745+ Sid = " github_mtls_gateway_5 "
746746 },
747747
748748
@@ -769,13 +769,13 @@ resource "aws_iam_policy" "github_actions_extended" {
769769 " arn:aws:kms:*:${ data . aws_caller_identity . current . account_id } :key/*" ,
770770 " arn:aws:lambda:eu-west-2:*:function:*" ,
771771 ]
772- Sid = " VisualEditor0 "
772+ Sid = " lambda_github_access_policy_1 "
773773 },
774774 {
775775 Action = " iam:ListRoles"
776776 Effect = " Allow"
777777 Resource = " arn:aws:lambda:eu-west-2:*:function:*"
778- Sid = " VisualEditor1 "
778+ Sid = " lambda_github_access_policy_2 "
779779 },
780780
781781
@@ -823,7 +823,7 @@ resource "aws_iam_policy" "github_actions_extended" {
823823 ]
824824 Effect = " Allow"
825825 Resource = " *"
826- Sid = " VisualEditor0 "
826+ Sid = " repo_app_config_1 "
827827 },
828828
829829
@@ -837,13 +837,15 @@ resource "aws_iam_policy" "github_actions_extended" {
837837 ]
838838 Effect = " Allow"
839839 Resource = " arn:aws:dynamodb:*:*:table/ndr-terraform-locks"
840+ Sid = " terraform_github_dynamodb_access_policy_1"
840841 },
841842
842843
843844 {
844845 Action = " s3:ListBucket"
845846 Effect = " Allow"
846847 Resource = " arn:aws:s3:::ndr-dev-terraform-state-${ data . aws_caller_identity . current . account_id } "
848+ Sid = " terraform_github_s3_access_policy_1"
847849 },
848850 {
849851 Action = [
@@ -855,6 +857,7 @@ resource "aws_iam_policy" "github_actions_extended" {
855857 ]
856858 Effect = " Allow"
857859 Resource = " arn:aws:s3:::ndr-dev-terraform-state-${ data . aws_caller_identity . current . account_id } /ndr/terraform.tfstate"
860+ Sid = " terraform_github_s3_access_policy_2"
858861 },
859862
860863
0 commit comments