From 574a91f2e5563c607311f5727d1bf02afe51d434 Mon Sep 17 00:00:00 2001 From: Kyriakos Oikonomakos Date: Fri, 17 Dec 2021 15:11:11 +0000 Subject: [PATCH] terrafmt --- ...ansparent_data_encryption_resource_test.go | 110 +++++++++--------- .../r/bot_service_azure_bot.html.markdown | 2 +- 2 files changed, 55 insertions(+), 57 deletions(-) diff --git a/internal/services/mssql/mssql_server_transparent_data_encryption_resource_test.go b/internal/services/mssql/mssql_server_transparent_data_encryption_resource_test.go index 136a3e20a8d5..5dee327ac9d0 100644 --- a/internal/services/mssql/mssql_server_transparent_data_encryption_resource_test.go +++ b/internal/services/mssql/mssql_server_transparent_data_encryption_resource_test.go @@ -89,75 +89,73 @@ func (MsSqlServerTransparentDataEncryptionResource) Exists(ctx context.Context, } func (r MsSqlServerTransparentDataEncryptionResource) keyVault(data acceptance.TestData) string { - return fmt.Sprintf( - ` + return fmt.Sprintf(` %s resource "azurerm_key_vault" "test" { - name = "acctestsqlserver%[2]s" - location = azurerm_resource_group.test.location - resource_group_name = azurerm_resource_group.test.name - enabled_for_disk_encryption = true - tenant_id = data.azurerm_client_config.current.tenant_id - soft_delete_retention_days = 7 - purge_protection_enabled = false - - sku_name = "standard" - - access_policy { - tenant_id = data.azurerm_client_config.current.tenant_id - object_id = data.azurerm_client_config.current.object_id - - key_permissions = [ - "Get", "List", "Create", "Delete", "Update", "Purge", - ] - } - - access_policy { - tenant_id = azurerm_mssql_server.test.identity[0].tenant_id - object_id = azurerm_mssql_server.test.identity[0].principal_id - - key_permissions = [ - "Get", "WrapKey", "UnwrapKey", "List", "Create", - ] - } + name = "acctestsqlserver%[2]s" + location = azurerm_resource_group.test.location + resource_group_name = azurerm_resource_group.test.name + enabled_for_disk_encryption = true + tenant_id = data.azurerm_client_config.current.tenant_id + soft_delete_retention_days = 7 + purge_protection_enabled = false + + sku_name = "standard" + + access_policy { + tenant_id = data.azurerm_client_config.current.tenant_id + object_id = data.azurerm_client_config.current.object_id + + key_permissions = [ + "Get", "List", "Create", "Delete", "Update", "Purge", + ] } - resource "azurerm_key_vault_key" "generated" { - name = "keyVault" - key_vault_id = azurerm_key_vault.test.id - key_type = "RSA" - key_size = 2048 - - key_opts = [ - "decrypt", - "encrypt", - "sign", - "unwrapKey", - "verify", - "wrapKey", - ] - - depends_on = [ - azurerm_key_vault.test, - ] - } + access_policy { + tenant_id = azurerm_mssql_server.test.identity[0].tenant_id + object_id = azurerm_mssql_server.test.identity[0].principal_id - resource "azurerm_mssql_server_transparent_data_encryption" "test" { - server_id = azurerm_mssql_server.test.id - key_vault_key_id = azurerm_key_vault_key.generated.id + key_permissions = [ + "Get", "WrapKey", "UnwrapKey", "List", "Create", + ] } +} + +resource "azurerm_key_vault_key" "generated" { + name = "keyVault" + key_vault_id = azurerm_key_vault.test.id + key_type = "RSA" + key_size = 2048 + + key_opts = [ + "decrypt", + "encrypt", + "sign", + "unwrapKey", + "verify", + "wrapKey", + ] + + depends_on = [ + azurerm_key_vault.test, + ] +} + +resource "azurerm_mssql_server_transparent_data_encryption" "test" { + server_id = azurerm_mssql_server.test.id + key_vault_key_id = azurerm_key_vault_key.generated.id +} `, r.server(data), data.RandomStringOfLength(5)) } func (r MsSqlServerTransparentDataEncryptionResource) systemManaged(data acceptance.TestData) string { - return fmt.Sprintf( - ` + return fmt.Sprintf(` %s - resource "azurerm_mssql_server_transparent_data_encryption" "test" { - server_id = azurerm_mssql_server.test.id - } +resource "azurerm_mssql_server_transparent_data_encryption" "test" { + server_id = azurerm_mssql_server.test.id +} `, r.server(data)) } diff --git a/website/docs/r/bot_service_azure_bot.html.markdown b/website/docs/r/bot_service_azure_bot.html.markdown index c0418c747043..a6965c6ec352 100644 --- a/website/docs/r/bot_service_azure_bot.html.markdown +++ b/website/docs/r/bot_service_azure_bot.html.markdown @@ -99,4 +99,4 @@ Azure Bot Services can be imported using the `resource id`, e.g. ```shell terraform import azurerm_bot_service_azure_bot.example /subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/resGroup1/providers/Microsoft.BotService/botServices/botService1 -``` \ No newline at end of file +```