From c0c282785cac7873b74ed4675d2c61e765c9c0ab Mon Sep 17 00:00:00 2001 From: Kavan Bansal Date: Wed, 7 Jun 2023 01:39:36 -0400 Subject: [PATCH] Formatting changes for kx user --- internal/service/finspace/kx_user_test.go | 68 +++++++++---------- website/docs/r/finspace_kx_user.html.markdown | 18 ++--- 2 files changed, 43 insertions(+), 43 deletions(-) diff --git a/internal/service/finspace/kx_user_test.go b/internal/service/finspace/kx_user_test.go index e65a32bb346..1782d5cea34 100644 --- a/internal/service/finspace/kx_user_test.go +++ b/internal/service/finspace/kx_user_test.go @@ -232,19 +232,19 @@ resource "aws_kms_key" "test" { resource "aws_finspace_kx_environment" "test" { name = %[1]q - kms_key_id =aws_kms_key.test.arn + kms_key_id = aws_kms_key.test.arn } resource "aws_iam_role" "test" { - name = %[1]q + name = %[1]q assume_role_policy = jsonencode({ - Version = "2012-10-17" + Version = "2012-10-17" Statement = [ { - Action = "sts:AssumeRole" - Effect = "Allow" - Sid = "" + Action = "sts:AssumeRole" + Effect = "Allow" + Sid = "" Principal = { Service = "ec2.amazonaws.com" } @@ -255,8 +255,8 @@ resource "aws_iam_role" "test" { resource "aws_finspace_kx_user" "test" { name = %[2]q - environment_id =aws_finspace_kx_environment.test.id - iam_role =aws_iam_role.test.arn + environment_id = aws_finspace_kx_environment.test.id + iam_role = aws_iam_role.test.arn } `, rName, userName) } @@ -270,19 +270,19 @@ resource "aws_kms_key" "test" { resource "aws_finspace_kx_environment" "test" { name = %[1]q - kms_key_id =aws_kms_key.test.arn + kms_key_id = aws_kms_key.test.arn } resource "aws_iam_role" "test" { - name = %[1]q + name = %[1]q assume_role_policy = jsonencode({ - Version = "2012-10-17" + Version = "2012-10-17" Statement = [ { - Action = "sts:AssumeRole" - Effect = "Allow" - Sid = "" + Action = "sts:AssumeRole" + Effect = "Allow" + Sid = "" Principal = { Service = "ec2.amazonaws.com" } @@ -295,12 +295,12 @@ resource "aws_iam_role" "updated" { name = %[2]q assume_role_policy = jsonencode({ - Version = "2012-10-17" + Version = "2012-10-17" Statement = [ { - Action = "sts:AssumeRole" - Effect = "Allow" - Sid = "" + Action = "sts:AssumeRole" + Effect = "Allow" + Sid = "" Principal = { Service = "ec2.amazonaws.com" } @@ -311,8 +311,8 @@ resource "aws_iam_role" "updated" { resource "aws_finspace_kx_user" "test" { name = %[3]q - environment_id =aws_finspace_kx_environment.test.id - iam_role =aws_iam_role.updated.arn + environment_id = aws_finspace_kx_environment.test.id + iam_role = aws_iam_role.updated.arn } `, rName, rName2, userName) } @@ -326,19 +326,19 @@ resource "aws_kms_key" "test" { resource "aws_finspace_kx_environment" "test" { name = %[1]q - kms_key_id =aws_kms_key.test.arn + kms_key_id = aws_kms_key.test.arn } resource "aws_iam_role" "test" { name = %[1]q assume_role_policy = jsonencode({ - Version = "2012-10-17" + Version = "2012-10-17" Statement = [ { - Action = "sts:AssumeRole" - Effect = "Allow" - Sid = "" + Action = "sts:AssumeRole" + Effect = "Allow" + Sid = "" Principal = { Service = "ec2.amazonaws.com" } @@ -349,8 +349,8 @@ resource "aws_iam_role" "test" { resource "aws_finspace_kx_user" "test" { name = %[2]q - environment_id =aws_finspace_kx_environment.test.id - iam_role =aws_iam_role.test.arn + environment_id = aws_finspace_kx_environment.test.id + iam_role = aws_iam_role.test.arn tags = { %[3]q = %[4]q } @@ -368,19 +368,19 @@ resource "aws_kms_key" "test" { resource "aws_finspace_kx_environment" "test" { name = %[1]q - kms_key_id =aws_kms_key.test.arn + kms_key_id = aws_kms_key.test.arn } resource "aws_iam_role" "test" { name = %[1]q assume_role_policy = jsonencode({ - Version = "2012-10-17" + Version = "2012-10-17" Statement = [ { - Action = "sts:AssumeRole" - Effect = "Allow" - Sid = "" + Action = "sts:AssumeRole" + Effect = "Allow" + Sid = "" Principal = { Service = "ec2.amazonaws.com" } @@ -391,8 +391,8 @@ resource "aws_iam_role" "test" { resource "aws_finspace_kx_user" "test" { name = %[2]q - environment_id =aws_finspace_kx_environment.test.id - iam_role =aws_iam_role.test.arn + environment_id = aws_finspace_kx_environment.test.id + iam_role = aws_iam_role.test.arn tags = { %[3]q = %[4]q %[5]q = %[6]q diff --git a/website/docs/r/finspace_kx_user.html.markdown b/website/docs/r/finspace_kx_user.html.markdown index 45f83de931c..ed94650cf94 100644 --- a/website/docs/r/finspace_kx_user.html.markdown +++ b/website/docs/r/finspace_kx_user.html.markdown @@ -21,22 +21,22 @@ resource "aws_kms_key" "example" { } resource "aws_finspace_kx_environment" "example" { - name = "my-tf-kx-environment" - kms_key_id =aws_kms_key.example.arn + name = "my-tf-kx-environment" + kms_key_id = aws_kms_key.example.arn } resource "aws_iam_role" "example" { name = "example-role" assume_role_policy = jsonencode({ -Version = "2012-10-17" +Version = "2012-10-17" Statement = [ { -Action = "sts:AssumeRole" -Effect = "Allow" -Sid = "" +Action = "sts:AssumeRole" +Effect = "Allow" +Sid = "" Principal = { -Service = "ec2.amazonaws.com" + Service = "ec2.amazonaws.com" } }, ] @@ -45,8 +45,8 @@ Service = "ec2.amazonaws.com" resource "aws_finspace_kx_user" "example" { name = "my-tf-kx-user" -environment_id =aws_finspace_kx_environment.example.id -iam_role =aws_iam_role.example.arn +environment_id = aws_finspace_kx_environment.example.id +iam_role = aws_iam_role.example.arn } ```