Skip to content

Commit

Permalink
Formatting changes for kx user
Browse files Browse the repository at this point in the history
  • Loading branch information
kavan-aws committed Jun 7, 2023
1 parent f1e1e8f commit c0c2827
Show file tree
Hide file tree
Showing 2 changed files with 43 additions and 43 deletions.
68 changes: 34 additions & 34 deletions internal/service/finspace/kx_user_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -232,19 +232,19 @@ resource "aws_kms_key" "test" {
resource "aws_finspace_kx_environment" "test" {
name = %[1]q
kms_key_id =aws_kms_key.test.arn
kms_key_id = aws_kms_key.test.arn
}
resource "aws_iam_role" "test" {
name = %[1]q
name = %[1]q
assume_role_policy = jsonencode({
Version = "2012-10-17"
Version = "2012-10-17"
Statement = [
{
Action = "sts:AssumeRole"
Effect = "Allow"
Sid = ""
Action = "sts:AssumeRole"
Effect = "Allow"
Sid = ""
Principal = {
Service = "ec2.amazonaws.com"
}
Expand All @@ -255,8 +255,8 @@ resource "aws_iam_role" "test" {
resource "aws_finspace_kx_user" "test" {
name = %[2]q
environment_id =aws_finspace_kx_environment.test.id
iam_role =aws_iam_role.test.arn
environment_id = aws_finspace_kx_environment.test.id
iam_role = aws_iam_role.test.arn
}
`, rName, userName)
}
Expand All @@ -270,19 +270,19 @@ resource "aws_kms_key" "test" {
resource "aws_finspace_kx_environment" "test" {
name = %[1]q
kms_key_id =aws_kms_key.test.arn
kms_key_id = aws_kms_key.test.arn
}
resource "aws_iam_role" "test" {
name = %[1]q
name = %[1]q
assume_role_policy = jsonencode({
Version = "2012-10-17"
Version = "2012-10-17"
Statement = [
{
Action = "sts:AssumeRole"
Effect = "Allow"
Sid = ""
Action = "sts:AssumeRole"
Effect = "Allow"
Sid = ""
Principal = {
Service = "ec2.amazonaws.com"
}
Expand All @@ -295,12 +295,12 @@ resource "aws_iam_role" "updated" {
name = %[2]q
assume_role_policy = jsonencode({
Version = "2012-10-17"
Version = "2012-10-17"
Statement = [
{
Action = "sts:AssumeRole"
Effect = "Allow"
Sid = ""
Action = "sts:AssumeRole"
Effect = "Allow"
Sid = ""
Principal = {
Service = "ec2.amazonaws.com"
}
Expand All @@ -311,8 +311,8 @@ resource "aws_iam_role" "updated" {
resource "aws_finspace_kx_user" "test" {
name = %[3]q
environment_id =aws_finspace_kx_environment.test.id
iam_role =aws_iam_role.updated.arn
environment_id = aws_finspace_kx_environment.test.id
iam_role = aws_iam_role.updated.arn
}
`, rName, rName2, userName)
}
Expand All @@ -326,19 +326,19 @@ resource "aws_kms_key" "test" {
resource "aws_finspace_kx_environment" "test" {
name = %[1]q
kms_key_id =aws_kms_key.test.arn
kms_key_id = aws_kms_key.test.arn
}
resource "aws_iam_role" "test" {
name = %[1]q
assume_role_policy = jsonencode({
Version = "2012-10-17"
Version = "2012-10-17"
Statement = [
{
Action = "sts:AssumeRole"
Effect = "Allow"
Sid = ""
Action = "sts:AssumeRole"
Effect = "Allow"
Sid = ""
Principal = {
Service = "ec2.amazonaws.com"
}
Expand All @@ -349,8 +349,8 @@ resource "aws_iam_role" "test" {
resource "aws_finspace_kx_user" "test" {
name = %[2]q
environment_id =aws_finspace_kx_environment.test.id
iam_role =aws_iam_role.test.arn
environment_id = aws_finspace_kx_environment.test.id
iam_role = aws_iam_role.test.arn
tags = {
%[3]q = %[4]q
}
Expand All @@ -368,19 +368,19 @@ resource "aws_kms_key" "test" {
resource "aws_finspace_kx_environment" "test" {
name = %[1]q
kms_key_id =aws_kms_key.test.arn
kms_key_id = aws_kms_key.test.arn
}
resource "aws_iam_role" "test" {
name = %[1]q
assume_role_policy = jsonencode({
Version = "2012-10-17"
Version = "2012-10-17"
Statement = [
{
Action = "sts:AssumeRole"
Effect = "Allow"
Sid = ""
Action = "sts:AssumeRole"
Effect = "Allow"
Sid = ""
Principal = {
Service = "ec2.amazonaws.com"
}
Expand All @@ -391,8 +391,8 @@ resource "aws_iam_role" "test" {
resource "aws_finspace_kx_user" "test" {
name = %[2]q
environment_id =aws_finspace_kx_environment.test.id
iam_role =aws_iam_role.test.arn
environment_id = aws_finspace_kx_environment.test.id
iam_role = aws_iam_role.test.arn
tags = {
%[3]q = %[4]q
%[5]q = %[6]q
Expand Down
18 changes: 9 additions & 9 deletions website/docs/r/finspace_kx_user.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -21,22 +21,22 @@ resource "aws_kms_key" "example" {
}
resource "aws_finspace_kx_environment" "example" {
name = "my-tf-kx-environment"
kms_key_id =aws_kms_key.example.arn
name = "my-tf-kx-environment"
kms_key_id = aws_kms_key.example.arn
}
resource "aws_iam_role" "example" {
name = "example-role"
assume_role_policy = jsonencode({
Version = "2012-10-17"
Version = "2012-10-17"
Statement = [
{
Action = "sts:AssumeRole"
Effect = "Allow"
Sid = ""
Action = "sts:AssumeRole"
Effect = "Allow"
Sid = ""
Principal = {
Service = "ec2.amazonaws.com"
Service = "ec2.amazonaws.com"
}
},
]
Expand All @@ -45,8 +45,8 @@ Service = "ec2.amazonaws.com"
resource "aws_finspace_kx_user" "example" {
name = "my-tf-kx-user"
environment_id =aws_finspace_kx_environment.example.id
iam_role =aws_iam_role.example.arn
environment_id = aws_finspace_kx_environment.example.id
iam_role = aws_iam_role.example.arn
}
```

Expand Down

0 comments on commit c0c2827

Please sign in to comment.