diff --git a/.github/workflows/update_assets.yml b/.github/workflows/update_assets.yml
index b4543dc..c2fa616 100644
--- a/.github/workflows/update_assets.yml
+++ b/.github/workflows/update_assets.yml
@@ -28,6 +28,9 @@ jobs:
config-file: ${{ github.workspace }}/.terraform-docs.yml
output-method: inject
+ - name: Reset .git owner
+ run: "sudo chown -R $USER: .git"
+
- name: Update dependabot.yml
run: |
cp .github/dependabot-base.yml .github/dependabot.yml
diff --git a/modules/aws/route53/README.md b/modules/aws/route53/README.md
index 30a676c..59e1298 100644
--- a/modules/aws/route53/README.md
+++ b/modules/aws/route53/README.md
@@ -41,16 +41,16 @@ The module also simplifies a few boilerplate records at the apex for security pu
| Name | Description | Type | Default | Required |
|------|-------------|------|---------|:--------:|
| [alias\_mx](#input\_alias\_mx) | List of alias domains that should have the same MX records as the canonical domain. | `list(string)` | `[]` | no |
-| [alias\_records](#input\_alias\_records) | List of DNS records for alias domains. The top-level keys should match entries in the `aliases`
list. The second-level map should match the same structure as `records`. |
map(map(object({
name = optional(string)
ttl = optional(string)
type = string
records = list(string)
}))) | `{}` | no |
+| [alias\_records](#input\_alias\_records) | List of DNS records for alias domains. The top-level keys should match entries in the `aliases`map(map(object({
name = optional(string)
ttl = optional(string)
type = string
records = list(string)
}))) | `{}` | no |
| [alias\_redirect\_protocol](#input\_alias\_redirect\_protocol) | Protocol to use when redirecting to the canonical domain. Valid values: `http`, `https`. | `string` | `"https"` | no |
| [aliases](#input\_aliases) | List of alias domains that should redirect to the canonical domain. | `list(string)` | `[]` | no |
| [apex\_txt](#input\_apex\_txt) | List of TXT records to be added at the apex. | `list(string)` | `[]` | no |
-| [caa\_issuers](#input\_caa\_issuers) | List of CAs that can issue certificates. | `list(string)` | [| no | +| [caa\_issuers](#input\_caa\_issuers) | List of CAs that can issue certificates. | `list(string)` |
"amazon.com"
]
[| no | | [canonical\_mx\_record](#input\_canonical\_mx\_record) | The name of the MX record on the canonical domain. | `string` | `"apex_mx"` | no | | [comment](#input\_comment) | A comment for the hosted zone. Defaults to 'Managed by Terraform'. | `string` | `null` | no | | [default\_ttl](#input\_default\_ttl) | Default TTL for DNS records. | `number` | `86400` | no | | [domain](#input\_domain) | The top-level domain name to hold the records. | `string` | n/a | yes | -| [records](#input\_records) | List of DNS records for the domain.
"amazon.com"
]
map(object({
name = optional(string)
ttl = optional(string)
type = string
records = list(string)
})) | n/a | yes |
+| [records](#input\_records) | List of DNS records for the domain.map(object({
name = optional(string)
ttl = optional(string)
type = string
records = list(string)
})) | n/a | yes |
| [security\_contact](#input\_security\_contact) | Security contact for the domain. Defaults to 'security@DOMAIN', where `DOMAIN` is the top-level domain name. | `string` | `null` | no |
| [spf](#input\_spf) | List of SPF directives for the domain. | `list(string)` | `[]` | no |
| [tags](#input\_tags) | Tags for the hosted zone. | `map(any)` | `{}` | no |
diff --git a/modules/aws/sso_account_assignment/README.md b/modules/aws/sso_account_assignment/README.md
index 655737c..5711cdb 100644
--- a/modules/aws/sso_account_assignment/README.md
+++ b/modules/aws/sso_account_assignment/README.md
@@ -33,9 +33,9 @@ to be used with AWS IAM Identity Center.
| Name | Description | Type | Default | Required |
|------|-------------|------|---------|:--------:|
-| [assignments](#input\_assignments) | List of assignments between group, account and Permission Set. The key of each object is the groupmap(list(object({
account_ids = list(string)
permission_sets = list(string)
}))) | n/a | yes |
+| [assignments](#input\_assignments) | List of assignments between group, account and Permission Set. The key of each object is the groupmap(list(object({
account_ids = list(string)
permission_sets = list(string)
}))) | n/a | yes |
| [create\_groups](#input\_create\_groups) | Whether the module should also create the groups. | `bool` | `false` | no |
-| [permission\_sets](#input\_permission\_sets) | List of Permission Sets for the organization. Each Permission Set must include AWS managedmap(object({
name = optional(string)
description = optional(string)
managed_policies = optional(list(string), [])
inline_policy = optional(string, "")
})) | n/a | yes |
+| [permission\_sets](#input\_permission\_sets) | List of Permission Sets for the organization. Each Permission Set must include AWS managedmap(object({
name = optional(string)
description = optional(string)
managed_policies = optional(list(string), [])
inline_policy = optional(string, "")
})) | n/a | yes |
# Example Usage