Skip to content

Commit ef3e094

Browse files
authored
Fix docs formatting (#1296)
1 parent bb242ed commit ef3e094

File tree

6 files changed

+16
-16
lines changed

6 files changed

+16
-16
lines changed

docs/data-sources/tables.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,12 +14,12 @@ Granting `SELECT` and `MODIFY` to `sensitive` group on all tables a _things_ [da
1414
```hcl
1515
data "databricks_tables" "things" {
1616
catalog_name = "sandbox"
17-
schema_name = "things"
17+
schema_name = "things"
1818
}
1919
2020
resource "databricks_grants" "things" {
2121
for_each = data.databricks_tables.things.ids
22-
22+
2323
table = each.value
2424
2525
grant {

docs/data-sources/views.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,12 +14,12 @@ Granting `SELECT` and `MODIFY` to `sensitive` group on all views in a _things_ [
1414
```hcl
1515
data "databricks_views" "things" {
1616
catalog_name = "sandbox"
17-
schema_name = "things"
17+
schema_name = "things"
1818
}
1919
2020
resource "databricks_grants" "things" {
2121
for_each = data.databricks_views.things.ids
22-
22+
2323
view = each.value
2424
2525
grant {

docs/guides/aws-workspace.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -217,10 +217,10 @@ resource "aws_s3_bucket_server_side_encryption_configuration" "root_storage_buck
217217
218218
rule {
219219
apply_server_side_encryption_by_default {
220-
sse_algorithm = "AES256"
220+
sse_algorithm = "AES256"
221221
}
222222
}
223-
}
223+
}
224224
225225
resource "aws_s3_bucket_public_access_block" "root_storage_bucket" {
226226
bucket = aws_s3_bucket.root_storage_bucket.id

docs/guides/unity-catalog-azure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -140,7 +140,7 @@ resource "databricks_metastore" "this" {
140140
name = "primary"
141141
storage_root = format("abfss://%s@%s.dfs.core.windows.net/",
142142
azurerm_storage_container.unity_catalog.name,
143-
azurerm_storage_account.unity_catalog.name)
143+
azurerm_storage_account.unity_catalog.name)
144144
force_destroy = true
145145
}
146146

docs/resources/grants.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -95,12 +95,12 @@ You can also apply grants dynamically with [databricks_tables](../data-sources/t
9595
```hcl
9696
data "databricks_tables" "things" {
9797
catalog_name = "sandbox"
98-
schema_name = "things"
98+
schema_name = "things"
9999
}
100100
101101
resource "databricks_grants" "things" {
102102
for_each = data.databricks_tables.things.ids
103-
103+
104104
table = each.value
105105
106106
grant {
@@ -129,12 +129,12 @@ You can also apply grants dynamically with [databricks_views](../data-sources/vi
129129
```hcl
130130
data "databricks_views" "customers" {
131131
catalog_name = "main"
132-
schema_name = "customers"
132+
schema_name = "customers"
133133
}
134134
135135
resource "databricks_grants" "customers" {
136136
for_each = data.databricks_views.customers.ids
137-
137+
138138
view = each.value
139139
140140
grant {

docs/resources/mws_workspaces.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -146,10 +146,10 @@ resource "aws_s3_bucket_server_side_encryption_configuration" "root_storage_buck
146146
147147
rule {
148148
apply_server_side_encryption_by_default {
149-
sse_algorithm = "AES256"
149+
sse_algorithm = "AES256"
150150
}
151151
}
152-
}
152+
}
153153
154154
resource "aws_s3_bucket_public_access_block" "root_storage_bucket" {
155155
bucket = aws_s3_bucket.root_storage_bucket.id
@@ -165,9 +165,9 @@ data "databricks_aws_bucket_policy" "this" {
165165
}
166166
167167
resource "aws_s3_bucket_policy" "root_bucket_policy" {
168-
bucket = aws_s3_bucket.root_storage_bucket.id
169-
policy = data.databricks_aws_bucket_policy.this.json
170-
depends_on = [aws_s3_bucket_public_access_block.root_storage_bucket]
168+
bucket = aws_s3_bucket.root_storage_bucket.id
169+
policy = data.databricks_aws_bucket_policy.this.json
170+
depends_on = [aws_s3_bucket_public_access_block.root_storage_bucket]
171171
}
172172
173173
resource "databricks_mws_storage_configurations" "this" {

0 commit comments

Comments
 (0)