Skip to content

Commit

Permalink
terrafmt
Browse files Browse the repository at this point in the history
  • Loading branch information
Kyriakos Oikonomakos committed Dec 17, 2021
1 parent 0810372 commit 574a91f
Show file tree
Hide file tree
Showing 2 changed files with 55 additions and 57 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -89,75 +89,73 @@ func (MsSqlServerTransparentDataEncryptionResource) Exists(ctx context.Context,
}

func (r MsSqlServerTransparentDataEncryptionResource) keyVault(data acceptance.TestData) string {
return fmt.Sprintf(
`
return fmt.Sprintf(`
%s
resource "azurerm_key_vault" "test" {
name = "acctestsqlserver%[2]s"
location = azurerm_resource_group.test.location
resource_group_name = azurerm_resource_group.test.name
enabled_for_disk_encryption = true
tenant_id = data.azurerm_client_config.current.tenant_id
soft_delete_retention_days = 7
purge_protection_enabled = false
sku_name = "standard"
access_policy {
tenant_id = data.azurerm_client_config.current.tenant_id
object_id = data.azurerm_client_config.current.object_id
key_permissions = [
"Get", "List", "Create", "Delete", "Update", "Purge",
]
}
access_policy {
tenant_id = azurerm_mssql_server.test.identity[0].tenant_id
object_id = azurerm_mssql_server.test.identity[0].principal_id
key_permissions = [
"Get", "WrapKey", "UnwrapKey", "List", "Create",
]
}
name = "acctestsqlserver%[2]s"
location = azurerm_resource_group.test.location
resource_group_name = azurerm_resource_group.test.name
enabled_for_disk_encryption = true
tenant_id = data.azurerm_client_config.current.tenant_id
soft_delete_retention_days = 7
purge_protection_enabled = false
sku_name = "standard"
access_policy {
tenant_id = data.azurerm_client_config.current.tenant_id
object_id = data.azurerm_client_config.current.object_id
key_permissions = [
"Get", "List", "Create", "Delete", "Update", "Purge",
]
}
resource "azurerm_key_vault_key" "generated" {
name = "keyVault"
key_vault_id = azurerm_key_vault.test.id
key_type = "RSA"
key_size = 2048
key_opts = [
"decrypt",
"encrypt",
"sign",
"unwrapKey",
"verify",
"wrapKey",
]
depends_on = [
azurerm_key_vault.test,
]
}
access_policy {
tenant_id = azurerm_mssql_server.test.identity[0].tenant_id
object_id = azurerm_mssql_server.test.identity[0].principal_id
resource "azurerm_mssql_server_transparent_data_encryption" "test" {
server_id = azurerm_mssql_server.test.id
key_vault_key_id = azurerm_key_vault_key.generated.id
key_permissions = [
"Get", "WrapKey", "UnwrapKey", "List", "Create",
]
}
}
resource "azurerm_key_vault_key" "generated" {
name = "keyVault"
key_vault_id = azurerm_key_vault.test.id
key_type = "RSA"
key_size = 2048
key_opts = [
"decrypt",
"encrypt",
"sign",
"unwrapKey",
"verify",
"wrapKey",
]
depends_on = [
azurerm_key_vault.test,
]
}
resource "azurerm_mssql_server_transparent_data_encryption" "test" {
server_id = azurerm_mssql_server.test.id
key_vault_key_id = azurerm_key_vault_key.generated.id
}
`, r.server(data), data.RandomStringOfLength(5))
}

func (r MsSqlServerTransparentDataEncryptionResource) systemManaged(data acceptance.TestData) string {
return fmt.Sprintf(
`
return fmt.Sprintf(`
%s
resource "azurerm_mssql_server_transparent_data_encryption" "test" {
server_id = azurerm_mssql_server.test.id
}
resource "azurerm_mssql_server_transparent_data_encryption" "test" {
server_id = azurerm_mssql_server.test.id
}
`, r.server(data))
}

Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/bot_service_azure_bot.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -99,4 +99,4 @@ Azure Bot Services can be imported using the `resource id`, e.g.

```shell
terraform import azurerm_bot_service_azure_bot.example /subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/resGroup1/providers/Microsoft.BotService/botServices/botService1
```
```

0 comments on commit 574a91f

Please sign in to comment.