Skip to content

Commit c060995

Browse files
committed
chore: website linter fixes
1 parent 8ef1d4d commit c060995

17 files changed

+22
-13
lines changed

website/docs/r/cloudfrontkeyvaluestore_key.html.markdown

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ import {
5353
to = aws_cloudfrontkeyvaluestore_key.example
5454
identity = {
5555
key_value_store_arn = "arn:aws:cloudfront::111111111111:key-value-store/8562g61f-caba-2845-9d99-b97diwae5d3c"
56-
key = "someKey"
56+
key = "someKey"
5757
}
5858
}
5959

website/docs/r/cloudwatch_event_rule.html.markdown

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ In Terraform v1.12.0 and later, the [`import` block](https://developer.hashicorp
9191
import {
9292
to = aws_cloudwatch_event_rule.example
9393
identity = {
94-
name = "capture-console-sign-in"
94+
name = "capture-console-sign-in"
9595
event_bus_name = "example-event-bus"
9696
}
9797
}
@@ -110,6 +110,7 @@ resource "aws_cloudwatch_event_rule" "example" {
110110
#### Optional
111111

112112
* `event_bus_name` (String) Name of the event bus. If omitted, `default` is used.
113+
113114
- `account_id` (String) AWS Account where this resource is managed.
114115
- `region` (String) Region where this resource is managed.
115116

website/docs/r/cloudwatch_event_target.html.markdown

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -697,8 +697,8 @@ import {
697697
to = aws_cloudwatch_event_target.example
698698
identity = {
699699
event_bus_name = "default"
700-
rule = "rule-name"
701-
target_id = "target-id"
700+
rule = "rule-name"
701+
target_id = "target-id"
702702
}
703703
}
704704

website/docs/r/iam_role_policy_attachment.html.markdown

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ In Terraform v1.12.0 and later, the [`import` block](https://developer.hashicorp
7474
import {
7575
to = aws_iam_role_policy_attachment.example
7676
identity = {
77-
role = "test-role"
77+
role = "test-role"
7878
policy_arn = "arn:aws:iam::xxxxxxxxxxxx:policy/test-policy"
7979
}
8080
}

website/docs/r/lambda_permission.html.markdown

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -243,7 +243,7 @@ import {
243243
to = aws_lambda_permission.example
244244
identity = {
245245
function_name = "my_test_lambda_function"
246-
statement_id = "AllowExecutionFromCloudWatch"
246+
statement_id = "AllowExecutionFromCloudWatch"
247247
}
248248
}
249249
@@ -262,6 +262,7 @@ resource "aws_lambda_permission" "example" {
262262
#### Optional
263263

264264
* `qualifier` (String) Qualifier for the function version or alias.
265+
265266
- `account_id` (String) AWS Account where this resource is managed.
266267
- `region` (String) Region where this resource is managed.
267268

website/docs/r/organizations_delegated_administrator.html.markdown

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ In Terraform v1.12.0 and later, the [`import` block](https://developer.hashicorp
4747
import {
4848
to = aws_organizations_delegated_administrator.example
4949
identity = {
50-
service_principal = "config.amazonaws.com"
50+
service_principal = "config.amazonaws.com"
5151
delegated_account_id = "123456789012"
5252
}
5353
}

website/docs/r/route53_record.html.markdown

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -256,8 +256,8 @@ import {
256256
to = aws_route53_record.example
257257
identity = {
258258
zone_id = "Z4KAPRWWNC7JR"
259-
name = "dev.example.com"
260-
type = "NS"
259+
name = "dev.example.com"
260+
type = "NS"
261261
}
262262
}
263263
@@ -277,6 +277,7 @@ resource "aws_route53_record" "example" {
277277
#### Optional
278278

279279
* `set_identifier` (String) Set identifier for the record.
280+
280281
- `account_id` (String) AWS Account where this resource is managed.
281282

282283
In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to import Route53 Records using the ID of the record, record name, record type, and set identifier. For example:

website/docs/r/s3_bucket_acl.html.markdown

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -192,6 +192,7 @@ resource "aws_s3_bucket_acl" "example" {
192192

193193
* `expected_bucket_owner` (String) Account ID of the expected bucket owner.
194194
* `acl` (String) Canned ACL to apply to the bucket.
195+
195196
- `account_id` (String) AWS Account where this resource is managed.
196197
- `region` (String) Region where this resource is managed.
197198

website/docs/r/s3_bucket_cors_configuration.html.markdown

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -91,6 +91,7 @@ resource "aws_s3_bucket_cors_configuration" "example" {
9191
#### Optional
9292

9393
* `expected_bucket_owner` (String) Account ID of the expected bucket owner.
94+
9495
- `account_id` (String) AWS Account where this resource is managed.
9596
- `region` (String) Region where this resource is managed.
9697

website/docs/r/s3_bucket_logging.html.markdown

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -169,6 +169,7 @@ resource "aws_s3_bucket_logging" "example" {
169169
#### Optional
170170

171171
* `expected_bucket_owner` (String) Account ID of the expected bucket owner.
172+
172173
- `account_id` (String) AWS Account where this resource is managed.
173174
- `region` (String) Region where this resource is managed.
174175

0 commit comments

Comments
 (0)