From fb9ef58472add1f672586bb5134a7e7af49c637f Mon Sep 17 00:00:00 2001 From: Sasi Date: Thu, 8 Aug 2024 11:50:58 -0400 Subject: [PATCH] fixed terraform format issues --- internal/service/bedrock/guardrail_test.go | 15 +++++---------- website/docs/r/bedrock_guardrail.html.markdown | 2 +- 2 files changed, 6 insertions(+), 11 deletions(-) diff --git a/internal/service/bedrock/guardrail_test.go b/internal/service/bedrock/guardrail_test.go index 79f5a68ca991..a946c1ca0ff3 100644 --- a/internal/service/bedrock/guardrail_test.go +++ b/internal/service/bedrock/guardrail_test.go @@ -372,8 +372,8 @@ resource "aws_bedrock_guardrail" "test" { } contextual_grounding_policy_config { filters_config { - threshold = 0.4 - type = "GROUNDING" + threshold = 0.4 + type = "GROUNDING" } } sensitive_information_policy_config { @@ -432,7 +432,7 @@ resource "aws_bedrock_guardrail" "test" { blocked_input_messaging = "test" blocked_outputs_messaging = "test" description = "test" - kms_key_arn = aws_kms_key.test.arn + kms_key_arn = aws_kms_key.test.arn content_policy_config { filters_config { input_strength = "MEDIUM" @@ -472,7 +472,7 @@ resource "aws_bedrock_guardrail" "test" { blocked_input_messaging = "test" blocked_outputs_messaging = "test" description = "test" - kms_key_arn = aws_kms_key.test.arn + kms_key_arn = aws_kms_key.test.arn content_policy_config { filters_config { input_strength = "MEDIUM" @@ -495,7 +495,7 @@ resource "aws_bedrock_guardrail" "test" { } tags = { %[2]q = %[3]q - %[4]q = %[5]q + %[4]q = %[5]q } } `, rName, tagKey1, tagValue1, tagKey2, tagValue2)) @@ -554,17 +554,12 @@ resource "aws_bedrock_guardrail" "test" { func testAccGuardrailConfig_wordConfig_only(rName string) string { return acctest.ConfigCompose(testAccCustomModelConfig_base(rName), fmt.Sprintf(` -resource "aws_kms_key" "test" { - description = %[1]q - deletion_window_in_days = 7 -} resource "aws_bedrock_guardrail" "test" { name = %[1]q blocked_input_messaging = "test" blocked_outputs_messaging = "test" description = "test" - kms_key_arn = aws_kms_key.test.arn word_policy_config { managed_word_lists_config { type = "PROFANITY" diff --git a/website/docs/r/bedrock_guardrail.html.markdown b/website/docs/r/bedrock_guardrail.html.markdown index 33006f09bce9..ab2c27a23327 100644 --- a/website/docs/r/bedrock_guardrail.html.markdown +++ b/website/docs/r/bedrock_guardrail.html.markdown @@ -85,7 +85,7 @@ The following arguments are optional: * `kms_key_arn` (Optional) The KMS key with which the guardrail was encrypted at rest * `sensitive_information_policy_config` (Optional) Sensitive information policy config for a guardrail. See [Sensitive Information Policy Config](#sensitive-information-policy-config) for more information. * `tags` (Optional) Key-value map of resource tags. If configured with a provider [`default_tags` configuration block](https://registry.terraform.io/providers/hashicorp/aws/latest/docs#default_tags-configuration-block) present, tags with matching keys will overwrite those defined at the provider-level. -* `topic_policy_config` (Optional) Topic policy config for a guardrail. See [Topic Policy Config](#topic-policyconfig) for more information. +* `topic_policy_config` (Optional) Topic policy config for a guardrail. See [Topic Policy Config](#topic-policy-config) for more information. * `word_policy_config` (Optional) Word policy config for a guardrail. See [Word Policy Config](#word-policy-config) for more information. ### Content Policy Config