Skip to content

Commit a4a44ef

Browse files
committed
Fix build
1 parent b6db3ea commit a4a44ef

File tree

1 file changed

+20
-20
lines changed

1 file changed

+20
-20
lines changed

examples/test/custom_iam_policy.tf

Lines changed: 20 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,24 @@
11
ecs_task_execution_role_custom_policies = [
2-
jsonencode(
3-
{
4-
"Version": "2012-10-17",
5-
"Statement": [
6-
{
7-
"Effect": "Allow",
8-
"Action": [
9-
"secretsmanager:GetSecretValue"
10-
],
11-
"Resource": [
12-
"arn:aws:secretsmanager:AWS_REGION:AWS_ACC:secret:SECRET_NAME"
13-
]
14-
}
15-
]
16-
}
17-
)
18-
]
2+
jsonencode(
3+
{
4+
"Version" : "2012-10-17",
5+
"Statement" : [
6+
{
7+
"Effect" : "Allow",
8+
"Action" : [
9+
"secretsmanager:GetSecretValue"
10+
],
11+
"Resource" : [
12+
"arn:aws:secretsmanager:AWS_REGION:AWS_ACC:secret:SECRET_NAME"
13+
]
14+
}
15+
]
16+
}
17+
)
18+
]
1919

2020
#This also works
2121

22-
ecs_task_execution_role_custom_policies = [
23-
"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":[\"secretsmanager:GetSecretValue\"],\"Resource\":[\"arn:aws:secretsmanager:AWS_REGION:AWS_ACC:secret:SECRET_NAME\"]}]}"
24-
]
22+
# ecs_task_execution_role_custom_policies = [
23+
# "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":[\"secretsmanager:GetSecretValue\"],\"Resource\":[\"arn:aws:secretsmanager:AWS_REGION:AWS_ACC:secret:SECRET_NAME\"]}]}"
24+
# ]

0 commit comments

Comments
 (0)