Skip to content

Commit aae0605

Browse files
committed
Clean up
1 parent 450c085 commit aae0605

File tree

2 files changed

+6
-20
lines changed

2 files changed

+6
-20
lines changed

internal/service/secretsmanager/exports_test.go

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,8 @@ var (
1010
ResourceSecretRotation = resourceSecretRotation
1111
ResourceSecretVersion = resourceSecretVersion
1212

13-
FindSecretByID = findSecretByID
14-
FindSecretPolicyByID = findSecretPolicyByID
15-
FindSecretVersionByTwoPartKey = findSecretVersionByTwoPartKey
16-
FindSecretVersionEntryByTwoPartKey = findSecretVersionEntryByTwoPartKey
13+
FindSecretByID = findSecretByID
14+
FindSecretPolicyByID = findSecretPolicyByID
15+
FindSecretVersionByTwoPartKey = findSecretVersionByTwoPartKey
16+
FindSecretVersionEntryByTwoPartKey = findSecretVersionEntryByTwoPartKey
1717
)

internal/service/secretsmanager/secret_version_test.go

Lines changed: 2 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,6 @@ package secretsmanager_test
66
import (
77
"context"
88
"fmt"
9-
"os"
109
"reflect"
1110
"testing"
1211

@@ -19,7 +18,6 @@ import (
1918
"github.com/hashicorp/terraform-plugin-testing/tfversion"
2019
"github.com/hashicorp/terraform-provider-aws/internal/acctest"
2120
"github.com/hashicorp/terraform-provider-aws/internal/conns"
22-
"github.com/hashicorp/terraform-provider-aws/internal/envvar"
2321
tfsecretsmanager "github.com/hashicorp/terraform-provider-aws/internal/service/secretsmanager"
2422
"github.com/hashicorp/terraform-provider-aws/internal/tfresource"
2523
inttypes "github.com/hashicorp/terraform-provider-aws/internal/types"
@@ -345,7 +343,7 @@ func TestAccSecretsManagerSecretVersion_stringWriteOnlyLimitedPermissions(t *tes
345343
Check: resource.ComposeTestCheckFunc(
346344
testAccCheckSecretVersionExists(ctx, resourceName, &version),
347345
testAccCheckSecretVersionWriteOnlyValueEqual(t, &version, "test-secret"),
348-
resource.TestCheckResourceAttr(resourceName, "has_secret_string_wo", "true"),
346+
resource.TestCheckResourceAttr(resourceName, "has_secret_string_wo", acctest.CtTrue),
349347
resource.TestCheckResourceAttrPair(resourceName, names.AttrARN, secretResourceName, names.AttrARN),
350348
),
351349
},
@@ -585,25 +583,13 @@ func testAccSecretVersionConfig_stringWriteOnlyLimitedPermissions(rName, secret
585583
}`
586584

587585
return acctest.ConfigCompose(
588-
fmt.Sprintf(`
589-
provider "aws" {
590-
alias = "limited"
591-
592-
assume_role {
593-
role_arn = %[1]q
594-
policy = <<POLICY
595-
%[2]s
596-
POLICY
597-
}
598-
}
599-
`, os.Getenv(envvar.AccAssumeRoleARN), policy),
586+
acctest.ConfigAssumeRolePolicy(policy),
600587
fmt.Sprintf(`
601588
resource "aws_secretsmanager_secret" "test" {
602589
name = %[1]q
603590
}
604591
605592
resource "aws_secretsmanager_secret_version" "test" {
606-
provider = aws.limited
607593
secret_id = aws_secretsmanager_secret.test.id
608594
secret_string_wo = %[2]q
609595
secret_string_wo_version = %[3]d

0 commit comments

Comments
 (0)