Skip to content

Commit

Permalink
Fix docs formatting
Browse files Browse the repository at this point in the history
  • Loading branch information
alexott committed May 4, 2022
1 parent bb242ed commit 0552812
Show file tree
Hide file tree
Showing 6 changed files with 16 additions and 16 deletions.
4 changes: 2 additions & 2 deletions docs/data-sources/tables.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,12 +14,12 @@ Granting `SELECT` and `MODIFY` to `sensitive` group on all tables a _things_ [da
```hcl
data "databricks_tables" "things" {
catalog_name = "sandbox"
schema_name = "things"
schema_name = "things"
}
resource "databricks_grants" "things" {
for_each = data.databricks_tables.things.ids
table = each.value
grant {
Expand Down
4 changes: 2 additions & 2 deletions docs/data-sources/views.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,12 +14,12 @@ Granting `SELECT` and `MODIFY` to `sensitive` group on all views in a _things_ [
```hcl
data "databricks_views" "things" {
catalog_name = "sandbox"
schema_name = "things"
schema_name = "things"
}
resource "databricks_grants" "things" {
for_each = data.databricks_views.things.ids
view = each.value
grant {
Expand Down
4 changes: 2 additions & 2 deletions docs/guides/aws-workspace.md
Original file line number Diff line number Diff line change
Expand Up @@ -217,10 +217,10 @@ resource "aws_s3_bucket_server_side_encryption_configuration" "root_storage_buck
rule {
apply_server_side_encryption_by_default {
sse_algorithm = "AES256"
sse_algorithm = "AES256"
}
}
}
}
resource "aws_s3_bucket_public_access_block" "root_storage_bucket" {
bucket = aws_s3_bucket.root_storage_bucket.id
Expand Down
2 changes: 1 addition & 1 deletion docs/guides/unity-catalog-azure.md
Original file line number Diff line number Diff line change
Expand Up @@ -140,7 +140,7 @@ resource "databricks_metastore" "this" {
name = "primary"
storage_root = format("abfss://%s@%s.dfs.core.windows.net/",
azurerm_storage_container.unity_catalog.name,
azurerm_storage_account.unity_catalog.name)
azurerm_storage_account.unity_catalog.name)
force_destroy = true
}
Expand Down
8 changes: 4 additions & 4 deletions docs/resources/grants.md
Original file line number Diff line number Diff line change
Expand Up @@ -95,12 +95,12 @@ You can also apply grants dynamically with [databricks_tables](../data-sources/t
```hcl
data "databricks_tables" "things" {
catalog_name = "sandbox"
schema_name = "things"
schema_name = "things"
}
resource "databricks_grants" "things" {
for_each = data.databricks_tables.things.ids
table = each.value
grant {
Expand Down Expand Up @@ -129,12 +129,12 @@ You can also apply grants dynamically with [databricks_views](../data-sources/vi
```hcl
data "databricks_views" "customers" {
catalog_name = "main"
schema_name = "customers"
schema_name = "customers"
}
resource "databricks_grants" "customers" {
for_each = data.databricks_views.customers.ids
view = each.value
grant {
Expand Down
10 changes: 5 additions & 5 deletions docs/resources/mws_workspaces.md
Original file line number Diff line number Diff line change
Expand Up @@ -146,10 +146,10 @@ resource "aws_s3_bucket_server_side_encryption_configuration" "root_storage_buck
rule {
apply_server_side_encryption_by_default {
sse_algorithm = "AES256"
sse_algorithm = "AES256"
}
}
}
}
resource "aws_s3_bucket_public_access_block" "root_storage_bucket" {
bucket = aws_s3_bucket.root_storage_bucket.id
Expand All @@ -165,9 +165,9 @@ data "databricks_aws_bucket_policy" "this" {
}
resource "aws_s3_bucket_policy" "root_bucket_policy" {
bucket = aws_s3_bucket.root_storage_bucket.id
policy = data.databricks_aws_bucket_policy.this.json
depends_on = [aws_s3_bucket_public_access_block.root_storage_bucket]
bucket = aws_s3_bucket.root_storage_bucket.id
policy = data.databricks_aws_bucket_policy.this.json
depends_on = [aws_s3_bucket_public_access_block.root_storage_bucket]
}
resource "databricks_mws_storage_configurations" "this" {
Expand Down

0 comments on commit 0552812

Please sign in to comment.