Skip to content

Commit 0d2e232

Browse files
authored
Merge pull request #7330 from vishnuswmech/tf_format
Formatting Terraform code. No code changes.(Minor)
2 parents 32039bb + 2242ca8 commit 0d2e232

File tree

21 files changed

+71
-71
lines changed

21 files changed

+71
-71
lines changed

infra/aws/terraform/modules/registry-k8s-io-s3-bucket/main.tf

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -26,11 +26,11 @@ locals {
2626
data "aws_iam_policy_document" "public_bucket_policy" {
2727
statement {
2828
actions = [
29-
"s3:ListBucket"
29+
"s3:ListBucket"
3030
]
3131
effect = "Allow"
3232
resources = [
33-
module.s3_bucket.s3_bucket_arn
33+
module.s3_bucket.s3_bucket_arn
3434
]
3535
principals {
3636
type = "AWS"
@@ -39,15 +39,15 @@ data "aws_iam_policy_document" "public_bucket_policy" {
3939
}
4040
statement {
4141
actions = [
42-
"s3:GetObject"
42+
"s3:GetObject"
4343
]
4444
effect = "Allow"
4545
principals {
4646
type = "AWS"
4747
identifiers = ["*"]
4848
}
4949
resources = [
50-
"${module.s3_bucket.s3_bucket_arn}/*"
50+
"${module.s3_bucket.s3_bucket_arn}/*"
5151
]
5252
}
5353
}
@@ -59,21 +59,21 @@ module "s3_bucket" {
5959
bucket = replace(lower(base64sha256(local.bucket_name)), "/[^a-zA-Z0-9-_]/", "")
6060

6161
attach_deny_insecure_transport_policy = true
62-
block_public_acls = false
63-
block_public_policy = false
64-
ignore_public_acls = false
65-
restrict_public_buckets = false
62+
block_public_acls = false
63+
block_public_policy = false
64+
ignore_public_acls = false
65+
restrict_public_buckets = false
6666

6767
control_object_ownership = true
6868
object_ownership = "BucketOwnerEnforced"
6969
expected_bucket_owner = data.aws_caller_identity.current.account_id
7070

7171
attach_policy = true
72-
policy = data.aws_iam_policy_document.public_bucket_policy.json
72+
policy = data.aws_iam_policy_document.public_bucket_policy.json
7373

7474
cors_rule = [{
7575

76-
allowed_methods = ["GET","HEAD"]
76+
allowed_methods = ["GET", "HEAD"]
7777
allowed_origins = ["*"]
7878
allowed_headers = ["*"]
7979

infra/aws/terraform/modules/registry-k8s-io-s3-bucket/provider.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ limitations under the License.
1717
terraform {
1818
required_providers {
1919
aws = {
20-
source = "hashicorp/aws"
20+
source = "hashicorp/aws"
2121
version = "5.33.0"
2222
}
2323
}

infra/aws/terraform/prow-build-cluster/terraform.canary.tfvars

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,8 +30,8 @@ eks_cluster_admins = [
3030
"xmudrii"
3131
]
3232

33-
cluster_name = "prow-canary-cluster"
34-
cluster_version = "1.29"
33+
cluster_name = "prow-canary-cluster"
34+
cluster_version = "1.29"
3535

3636
node_group_version_stable = "1.29"
3737
node_instance_types_stable = ["r5ad.xlarge"]

infra/aws/terraform/prow-build-cluster/terraform.prod.tfvars

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,8 +32,8 @@ eks_cluster_viewers = [
3232
"xmudrii"
3333
]
3434

35-
cluster_name = "prow-build-cluster"
36-
cluster_version = "1.30"
35+
cluster_name = "prow-build-cluster"
36+
cluster_version = "1.30"
3737

3838
node_group_version_stable = "1.30"
3939
node_instance_types_stable = ["r5ad.2xlarge"]

infra/azure/terraform/capz/container-registry/main.tf

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -23,10 +23,10 @@ variable "location" {
2323
}
2424

2525
resource "azurerm_container_registry" "capzci_registry" {
26-
name = "capzcicommunity"
27-
location = var.location
28-
resource_group_name = var.resource_group_name
29-
sku = "Premium"
26+
name = "capzcicommunity"
27+
location = var.location
28+
resource_group_name = var.resource_group_name
29+
sku = "Premium"
3030
anonymous_pull_enabled = true
3131

3232
retention_policy {
@@ -57,7 +57,7 @@ resource "azurerm_container_registry_task" "registry_task" {
5757
type = "Runtime"
5858
update_trigger_payload_type = "Default"
5959
}
60-
encoded_step {
60+
encoded_step {
6161
task_content = base64encode(<<EOF
6262
version: v1.1.0
6363
steps:

infra/azure/terraform/capz/key-vault/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,8 +28,8 @@ variable "tenant_id" {
2828

2929
variable "identities" {
3030
type = object({
31-
domain_vm_identity_id = string
32-
gmsa_user_identity_id = string
31+
domain_vm_identity_id = string
32+
gmsa_user_identity_id = string
3333
})
3434
}
3535

infra/azure/terraform/capz/main.tf

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ provider "azurerm" {
1818
features {}
1919
}
2020

21-
terraform{
21+
terraform {
2222
backend "azurerm" {
2323
resource_group_name = "terraform-states-azure"
2424
storage_account_name = "terraformstatescomm"
@@ -80,23 +80,23 @@ resource "azurerm_storage_account" "k8sprowstorage" {
8080
min_tls_version = "TLS1_0"
8181
account_replication_type = "RAGRS"
8282
cross_tenant_replication_enabled = true
83-
depends_on = [azurerm_resource_group.capz_ci]
83+
depends_on = [azurerm_resource_group.capz_ci]
8484
}
8585

8686
# Import identities module
8787
module "identities" {
8888
source = "./identities"
8989
resource_group_name = var.resource_group_name
9090
location = var.location
91-
depends_on = [azurerm_resource_group.capz_ci]
91+
depends_on = [azurerm_resource_group.capz_ci]
9292
}
9393

9494
# Import key vault module
9595
module "key_vault" {
9696
source = "./key-vault"
9797
resource_group_name = var.resource_group_name
9898
location = var.location
99-
tenant_id = data.azurerm_client_config.current.tenant_id
99+
tenant_id = data.azurerm_client_config.current.tenant_id
100100
identities = {
101101
cloud_provider_user_identity_id = module.identities.cloud_provider_user_identity_id
102102
domain_vm_identity_id = module.identities.domain_vm_identity_id
@@ -110,15 +110,15 @@ module "container_registry" {
110110
source = "./container-registry"
111111
resource_group_name = var.resource_group_name
112112
location = var.location
113-
depends_on = [azurerm_resource_group.capz_ci]
113+
depends_on = [azurerm_resource_group.capz_ci]
114114
}
115115

116116
# Import role assignments module
117117
module "role_assignments" {
118118
source = "./role-assignments"
119119
resource_group_name = var.resource_group_name
120120
container_registry_scope = module.container_registry.container_registry_id
121-
subscription_id = data.azurerm_client_config.current.subscription_id
121+
subscription_id = data.azurerm_client_config.current.subscription_id
122122
depends_on = [
123123
azurerm_resource_group.capz_ci,
124124
azurerm_storage_account.k8sprowstorage,

infra/azure/terraform/capz/role-assignments/main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -49,11 +49,11 @@ resource "azurerm_role_assignment" "acr_pull" {
4949
}
5050

5151
resource "azurerm_role_definition" "custom_role" {
52-
name = "WriteAccessOnly"
53-
scope = "/subscriptions/${var.subscription_id}"
52+
name = "WriteAccessOnly"
53+
scope = "/subscriptions/${var.subscription_id}"
5454

5555
permissions {
56-
actions = [
56+
actions = [
5757
"Microsoft.Authorization/roleAssignments/write"
5858
]
5959
not_actions = []

infra/gcp/terraform/k8s-infra-kubernetes-io/main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -56,8 +56,8 @@ data "google_project" "kubernetes_public" {
5656
}
5757

5858
resource "google_resource_manager_lien" "kubernetes_public" {
59-
parent = "projects/${data.google_project.kubernetes_public.number}"
59+
parent = "projects/${data.google_project.kubernetes_public.number}"
6060
restrictions = ["resourcemanager.projects.delete"]
61-
origin = "do-not-delete-kubernetes-public"
62-
reason = "kubernetes-public hosts public-facing kubernetes project infrastructure"
61+
origin = "do-not-delete-kubernetes-public"
62+
reason = "kubernetes-public hosts public-facing kubernetes project infrastructure"
6363
}

infra/gcp/terraform/k8s-infra-porche-sandbox/porche-sandbox.tf

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -100,13 +100,13 @@ resource "google_service_account_iam_member" "cloudbuild_deploy_porche" {
100100
}
101101

102102
resource "google_cloud_run_service_iam_member" "gcb_builder_sa" {
103-
project = google_project.project.project_id
103+
project = google_project.project.project_id
104104
for_each = google_cloud_run_service.regions
105105

106106
service = google_cloud_run_service.regions[each.key].name
107107
location = google_cloud_run_service.regions[each.key].location
108-
role = "roles/run.developer"
109-
member = "serviceAccount:${data.google_project.k8s_infra_staging_tools.number}@cloudbuild.gserviceaccount.com"
108+
role = "roles/run.developer"
109+
member = "serviceAccount:${data.google_project.k8s_infra_staging_tools.number}@cloudbuild.gserviceaccount.com"
110110
}
111111

112112

@@ -127,7 +127,7 @@ resource "google_cloud_run_service" "regions" {
127127
service_account_name = google_service_account.porche.email
128128
containers {
129129
image = local.image
130-
args = [ "-v=3" ]
130+
args = ["-v=3"]
131131

132132
dynamic "env" {
133133
for_each = each.value.environment_variables

0 commit comments

Comments
 (0)