Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Remove trailing whitespace from a variety of files #540

Open
wants to merge 1 commit into
base: master
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
8 changes: 4 additions & 4 deletions cloudformation/development-secret-policy.yml
Original file line number Diff line number Diff line change
Expand Up @@ -3,12 +3,12 @@ Description: Create a managed policy to bind to roles that allows secret access
Resources:
SecretAccess:
Type: AWS::IAM::ManagedPolicy
Properties:
Properties:
Description: Allows retrieval of secrets in the cis_development namespace.
Path: '/'
PolicyDocument:
PolicyDocument:
Version: "2012-10-17"
Statement:
Statement:
- Effect: Allow
Action:
- "ssm:GetParameterHistory"
Expand All @@ -22,4 +22,4 @@ Resources:
- "kms:Decrypt"
Resource:
- arn:aws:kms:us-west-2:320464205386:key/ef00015d-739b-456d-a92f-482712af4f32
ManagedPolicyName: 'cis-development-secret-retrieval'
ManagedPolicyName: 'cis-development-secret-retrieval'
2 changes: 1 addition & 1 deletion python-modules/cis_identity_vault/Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ venv:
echo "source venv/bin/activate"

.install-test:
pip install .[test]
pip install .[test]
npm install kinesalite
touch $@

Expand Down
2 changes: 1 addition & 1 deletion serverless-functions/postgres_access_layer/serverless.yml
Original file line number Diff line number Diff line change
Expand Up @@ -126,7 +126,7 @@ functions:
- sg-015971fe39add456e
handler: handler.handle
events:
- stream:
- stream:
arn: ${self:custom.postgresqlAccessLayerEnvironment.CIS_DYNAMODB_STREAM_ARN.${self:custom.postgresqlAccessLayerStage}}
batchSize: 1000
startingPosition: LATEST
Expand Down
2 changes: 1 addition & 1 deletion serverless-functions/postgresql_replicator/serverless.yml
Original file line number Diff line number Diff line change
Expand Up @@ -126,7 +126,7 @@ functions:
- sg-015971fe39add456e
handler: handler.handle
events:
- stream:
- stream:
arn: ${self:custom.postgresqlReplicatorEnvironment.CIS_DYNAMODB_STREAM_ARN.${self:custom.postgresqlReplicatorStage}}
batchSize: 1000
startingPosition: LATEST
Expand Down
4 changes: 2 additions & 2 deletions serverless-functions/webhook_notifier/serverless.yml
Original file line number Diff line number Diff line change
Expand Up @@ -51,7 +51,7 @@ provider:
CIS_API_IDENTIFIER: ${self:custom.webhookEnvironment.IDENTIFIER.${self:custom.webhookStage}}
CIS_AUTHZERO_TENANT: ${self:custom.webhookEnvironment.WEBHOOK_NOTIFICATION_AUTH0_DOMAIN.${self:custom.webhookStage}}
CIS_RP_URLS: ${self:custom.webhookEnvironment.CIS_RP_URLS.${self:custom.webhookStage}}
WEBHOOK_NOTIFICATIONS_AUTH0_DOMAIN: ${self:custom.webhookEnvironment.WEBHOOK_NOTIFICATION_AUTH0_DOMAIN.${self:custom.webhookStage}}
WEBHOOK_NOTIFICATIONS_AUTH0_DOMAIN: ${self:custom.webhookEnvironment.WEBHOOK_NOTIFICATION_AUTH0_DOMAIN.${self:custom.webhookStage}}
CIS_SECRET_MANAGER_SSM_PATH: ${self:custom.webhookEnvironment.CIS_SECRET_MANAGER_SSM_PATH.${self:custom.webhookStage}}
iamRoleStatements:
- Effect: "Allow" # xray permissions (required)
Expand Down Expand Up @@ -99,7 +99,7 @@ functions:
memorySize: 512
timeout: 120
events:
- stream:
- stream:
arn: ${self:custom.webhookEnvironment.CIS_DYNAMODB_STREAM_ARN.${self:custom.webhookStage}}
batchSize: 100
startingPosition: LATEST
Expand Down