s/TestAccGoogle/TestAcc/ (#1121)

* s/TestAccGoogle/TestAcc/

* add back import

* reorder imports
This commit is contained in:
Dana Hoffman 2018-02-23 15:14:24 -08:00 committed by GitHub
parent 640e25931e
commit 6d0b87ec1e
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
48 changed files with 428 additions and 418 deletions

View File

@ -10,7 +10,7 @@ import (
"github.com/hashicorp/terraform/terraform" "github.com/hashicorp/terraform/terraform"
) )
func TestAccGoogleComputeZones_basic(t *testing.T) { func TestAccComputeZones_basic(t *testing.T) {
t.Parallel() t.Parallel()
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{

View File

@ -9,7 +9,7 @@ import (
"github.com/hashicorp/terraform/terraform" "github.com/hashicorp/terraform/terraform"
) )
func TestAccGoogleContainerClusterDatasource_basic(t *testing.T) { func TestAccContainerClusterDatasource_basic(t *testing.T) {
t.Parallel() t.Parallel()
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{

View File

@ -10,7 +10,7 @@ import (
"github.com/hashicorp/terraform/terraform" "github.com/hashicorp/terraform/terraform"
) )
func TestAccGoogleContainerEngineVersions_basic(t *testing.T) { func TestAccContainerEngineVersions_basic(t *testing.T) {
t.Parallel() t.Parallel()
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{

View File

@ -3,16 +3,16 @@ package google
import ( import (
"encoding/base64" "encoding/base64"
"fmt" "fmt"
"log"
"testing" "testing"
"github.com/hashicorp/terraform/helper/acctest" "github.com/hashicorp/terraform/helper/acctest"
"github.com/hashicorp/terraform/helper/resource" "github.com/hashicorp/terraform/helper/resource"
"github.com/hashicorp/terraform/terraform" "github.com/hashicorp/terraform/terraform"
"google.golang.org/api/cloudkms/v1" "google.golang.org/api/cloudkms/v1"
"log"
) )
func TestAccGoogleKmsSecret_basic(t *testing.T) { func TestAccKmsSecret_basic(t *testing.T) {
t.Parallel() t.Parallel()
projectOrg := getTestOrgFromEnv(t) projectOrg := getTestOrgFromEnv(t)

View File

@ -109,7 +109,7 @@ func TestAccStorageSignedUrl_basic(t *testing.T) {
resource.TestStep{ resource.TestStep{
Config: testGoogleSignedUrlConfig, Config: testGoogleSignedUrlConfig,
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccGoogleSignedUrlExists("data.google_storage_object_signed_url.blerg"), testAccSignedUrlExists("data.google_storage_object_signed_url.blerg"),
), ),
}, },
}, },
@ -133,17 +133,17 @@ func TestAccStorageSignedUrl_accTest(t *testing.T) {
resource.TestStep{ resource.TestStep{
Config: testAccTestGoogleStorageObjectSignedURL(bucketName), Config: testAccTestGoogleStorageObjectSignedURL(bucketName),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccGoogleSignedUrlRetrieval("data.google_storage_object_signed_url.story_url", nil), testAccSignedUrlRetrieval("data.google_storage_object_signed_url.story_url", nil),
testAccGoogleSignedUrlRetrieval("data.google_storage_object_signed_url.story_url_w_headers", headers), testAccSignedUrlRetrieval("data.google_storage_object_signed_url.story_url_w_headers", headers),
testAccGoogleSignedUrlRetrieval("data.google_storage_object_signed_url.story_url_w_content_type", nil), testAccSignedUrlRetrieval("data.google_storage_object_signed_url.story_url_w_content_type", nil),
testAccGoogleSignedUrlRetrieval("data.google_storage_object_signed_url.story_url_w_md5", nil), testAccSignedUrlRetrieval("data.google_storage_object_signed_url.story_url_w_md5", nil),
), ),
}, },
}, },
}) })
} }
func testAccGoogleSignedUrlExists(n string) resource.TestCheckFunc { func testAccSignedUrlExists(n string) resource.TestCheckFunc {
return func(s *terraform.State) error { return func(s *terraform.State) error {
r := s.RootModule().Resources[n] r := s.RootModule().Resources[n]
@ -157,7 +157,7 @@ func testAccGoogleSignedUrlExists(n string) resource.TestCheckFunc {
} }
} }
func testAccGoogleSignedUrlRetrieval(n string, headers map[string]string) resource.TestCheckFunc { func testAccSignedUrlRetrieval(n string, headers map[string]string) resource.TestCheckFunc {
return func(s *terraform.State) error { return func(s *terraform.State) error {
r := s.RootModule().Resources[n] r := s.RootModule().Resources[n]
if r == nil { if r == nil {

View File

@ -8,7 +8,7 @@ import (
"github.com/hashicorp/terraform/helper/resource" "github.com/hashicorp/terraform/helper/resource"
) )
func TestAccGoogleContainerNodePool_import(t *testing.T) { func TestAccContainerNodePool_import(t *testing.T) {
t.Parallel() t.Parallel()
resourceName := "google_container_node_pool.np" resourceName := "google_container_node_pool.np"

View File

@ -29,7 +29,7 @@ func TestAccKmsCryptoKeyIamMember_importBasic(t *testing.T) {
Providers: testAccProviders, Providers: testAccProviders,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testAccGoogleKmsCryptoKeyIamMember_basic(projectId, orgId, billingAccount, account, keyRingName, cryptoKeyName, roleId), Config: testAccKmsCryptoKeyIamMember_basic(projectId, orgId, billingAccount, account, keyRingName, cryptoKeyName, roleId),
}, },
resource.TestStep{ resource.TestStep{
@ -62,7 +62,7 @@ func TestAccKmsCryptoKeyIamBinding_importBasic(t *testing.T) {
Providers: testAccProviders, Providers: testAccProviders,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testAccGoogleKmsCryptoKeyIamBinding_basic(projectId, orgId, billingAccount, account, keyRingName, cryptoKeyName, roleId), Config: testAccKmsCryptoKeyIamBinding_basic(projectId, orgId, billingAccount, account, keyRingName, cryptoKeyName, roleId),
}, },
resource.TestStep{ resource.TestStep{

View File

@ -28,7 +28,7 @@ func TestAccKmsKeyRingIamMember_importBasic(t *testing.T) {
Providers: testAccProviders, Providers: testAccProviders,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testAccGoogleKmsKeyRingIamMember_basic(projectId, orgId, billingAccount, account, keyRingName, roleId), Config: testAccKmsKeyRingIamMember_basic(projectId, orgId, billingAccount, account, keyRingName, roleId),
}, },
resource.TestStep{ resource.TestStep{
@ -60,7 +60,7 @@ func TestAccKmsKeyRingIamPolicy_importBasic(t *testing.T) {
Providers: testAccProviders, Providers: testAccProviders,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testAccGoogleKmsKeyRingIamPolicy_basic(projectId, orgId, billingAccount, account, keyRingName, roleId), Config: testAccKmsKeyRingIamPolicy_basic(projectId, orgId, billingAccount, account, keyRingName, roleId),
}, },
resource.TestStep{ resource.TestStep{
@ -91,7 +91,7 @@ func TestAccKmsKeyRingIamBinding_importBasic(t *testing.T) {
Providers: testAccProviders, Providers: testAccProviders,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testAccGoogleKmsKeyRingIamBinding_basic(projectId, orgId, billingAccount, account, keyRingName, roleId), Config: testAccKmsKeyRingIamBinding_basic(projectId, orgId, billingAccount, account, keyRingName, roleId),
}, },
resource.TestStep{ resource.TestStep{

View File

@ -8,7 +8,7 @@ import (
"github.com/hashicorp/terraform/helper/resource" "github.com/hashicorp/terraform/helper/resource"
) )
func TestAccGoogleOrganizationIamMember_importBasic(t *testing.T) { func TestAccOrganizationIamMember_importBasic(t *testing.T) {
t.Parallel() t.Parallel()
orgId := getTestOrgFromEnv(t) orgId := getTestOrgFromEnv(t)
@ -20,7 +20,7 @@ func TestAccGoogleOrganizationIamMember_importBasic(t *testing.T) {
Providers: testAccProviders, Providers: testAccProviders,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testAccGoogleOrganizationIamMember_basic(account, orgId), Config: testAccOrganizationIamMember_basic(account, orgId),
}, },
resource.TestStep{ resource.TestStep{
@ -32,7 +32,7 @@ func TestAccGoogleOrganizationIamMember_importBasic(t *testing.T) {
}) })
} }
func TestAccGoogleOrganizationIamBinding_importBasic(t *testing.T) { func TestAccOrganizationIamBinding_importBasic(t *testing.T) {
t.Parallel() t.Parallel()
orgId := getTestOrgFromEnv(t) orgId := getTestOrgFromEnv(t)
@ -44,7 +44,7 @@ func TestAccGoogleOrganizationIamBinding_importBasic(t *testing.T) {
Providers: testAccProviders, Providers: testAccProviders,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testAccGoogleOrganizationIamBinding_basic(account, roleId, orgId), Config: testAccOrganizationIamBinding_basic(account, roleId, orgId),
}, },
resource.TestStep{ resource.TestStep{

View File

@ -1,12 +1,13 @@
package google package google
import ( import (
"testing"
"github.com/hashicorp/terraform/helper/acctest" "github.com/hashicorp/terraform/helper/acctest"
"github.com/hashicorp/terraform/helper/resource" "github.com/hashicorp/terraform/helper/resource"
"testing"
) )
func TestAccGoogleProjectIamCustomRole_import(t *testing.T) { func TestAccProjectIamCustomRole_import(t *testing.T) {
t.Parallel() t.Parallel()
roleId := "tfIamRole" + acctest.RandString(10) roleId := "tfIamRole" + acctest.RandString(10)

View File

@ -8,7 +8,7 @@ import (
"github.com/hashicorp/terraform/helper/resource" "github.com/hashicorp/terraform/helper/resource"
) )
func TestAccGoogleProjectIamMember_importBasic(t *testing.T) { func TestAccProjectIamMember_importBasic(t *testing.T) {
t.Parallel() t.Parallel()
resourceName := "google_project_iam_member.acceptance" resourceName := "google_project_iam_member.acceptance"
@ -20,7 +20,7 @@ func TestAccGoogleProjectIamMember_importBasic(t *testing.T) {
Providers: testAccProviders, Providers: testAccProviders,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testAccGoogleProjectAssociateMemberBasic(pid, "Acceptance", org), Config: testAccProjectAssociateMemberBasic(pid, "Acceptance", org),
}, },
resource.TestStep{ resource.TestStep{
@ -32,7 +32,7 @@ func TestAccGoogleProjectIamMember_importBasic(t *testing.T) {
}) })
} }
func TestAccGoogleProjectIamBinding_importBasic(t *testing.T) { func TestAccProjectIamBinding_importBasic(t *testing.T) {
t.Parallel() t.Parallel()
resourceName := "google_project_iam_binding.acceptance" resourceName := "google_project_iam_binding.acceptance"
@ -44,7 +44,7 @@ func TestAccGoogleProjectIamBinding_importBasic(t *testing.T) {
Providers: testAccProviders, Providers: testAccProviders,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testAccGoogleProjectAssociateBindingBasic(pid, "Acceptance", org), Config: testAccProjectAssociateBindingBasic(pid, "Acceptance", org),
}, },
resource.TestStep{ resource.TestStep{

View File

@ -7,7 +7,7 @@ import (
"github.com/hashicorp/terraform/helper/resource" "github.com/hashicorp/terraform/helper/resource"
) )
func TestAccGoogleProjectServices_importBasic(t *testing.T) { func TestAccProjectServices_importBasic(t *testing.T) {
t.Parallel() t.Parallel()
org := getTestOrgFromEnv(t) org := getTestOrgFromEnv(t)
@ -15,7 +15,7 @@ func TestAccGoogleProjectServices_importBasic(t *testing.T) {
projectId := "terraform-" + acctest.RandString(10) projectId := "terraform-" + acctest.RandString(10)
services := []string{"iam.googleapis.com", "cloudresourcemanager.googleapis.com", "servicemanagement.googleapis.com"} services := []string{"iam.googleapis.com", "cloudresourcemanager.googleapis.com", "servicemanagement.googleapis.com"}
conf := testAccGoogleProjectAssociateServicesBasic(services, projectId, pname, org) conf := testAccProjectAssociateServicesBasic(services, projectId, pname, org)
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },

View File

@ -8,7 +8,7 @@ import (
"github.com/hashicorp/terraform/helper/resource" "github.com/hashicorp/terraform/helper/resource"
) )
func TestAccGoogleServiceAccount_importBasic(t *testing.T) { func TestAccServiceAccount_importBasic(t *testing.T) {
t.Parallel() t.Parallel()
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
@ -16,7 +16,7 @@ func TestAccGoogleServiceAccount_importBasic(t *testing.T) {
Providers: testAccProviders, Providers: testAccProviders,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testAccGoogleServiceAccount_import("terraform-" + acctest.RandString(10)), Config: testAccServiceAccount_import("terraform-" + acctest.RandString(10)),
}, },
resource.TestStep{ resource.TestStep{
@ -28,7 +28,7 @@ func TestAccGoogleServiceAccount_importBasic(t *testing.T) {
}) })
} }
func testAccGoogleServiceAccount_import(saName string) string { func testAccServiceAccount_import(saName string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_service_account" "acceptance" { resource "google_service_account" "acceptance" {
account_id = "%s" account_id = "%s"
@ -36,7 +36,7 @@ resource "google_service_account" "acceptance" {
}`, saName, saName) }`, saName, saName)
} }
func TestAccGoogleServiceAccount_importWithProject(t *testing.T) { func TestAccServiceAccount_importWithProject(t *testing.T) {
t.Parallel() t.Parallel()
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
@ -44,7 +44,7 @@ func TestAccGoogleServiceAccount_importWithProject(t *testing.T) {
Providers: testAccProviders, Providers: testAccProviders,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testAccGoogleServiceAccount_importWithProject(getTestProjectFromEnv(), "terraform-"+acctest.RandString(10)), Config: testAccServiceAccount_importWithProject(getTestProjectFromEnv(), "terraform-"+acctest.RandString(10)),
}, },
resource.TestStep{ resource.TestStep{
@ -56,7 +56,7 @@ func TestAccGoogleServiceAccount_importWithProject(t *testing.T) {
}) })
} }
func testAccGoogleServiceAccount_importWithProject(project, saName string) string { func testAccServiceAccount_importWithProject(project, saName string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_service_account" "acceptance" { resource "google_service_account" "acceptance" {
project = "%s" project = "%s"

View File

@ -1,14 +1,14 @@
package google package google
import ( import (
"fmt"
"testing" "testing"
"fmt"
"github.com/hashicorp/terraform/helper/acctest" "github.com/hashicorp/terraform/helper/acctest"
"github.com/hashicorp/terraform/helper/resource" "github.com/hashicorp/terraform/helper/resource"
) )
func TestAccGoogleKmsCryptoKey_importBasic(t *testing.T) { func TestAccKmsCryptoKey_importBasic(t *testing.T) {
t.Parallel() t.Parallel()
resourceName := "google_kms_crypto_key.crypto_key" resourceName := "google_kms_crypto_key.crypto_key"

View File

@ -1,14 +1,14 @@
package google package google
import ( import (
"fmt"
"testing" "testing"
"fmt"
"github.com/hashicorp/terraform/helper/acctest" "github.com/hashicorp/terraform/helper/acctest"
"github.com/hashicorp/terraform/helper/resource" "github.com/hashicorp/terraform/helper/resource"
) )
func TestAccGoogleKmsKeyRing_importBasic(t *testing.T) { func TestAccKmsKeyRing_importBasic(t *testing.T) {
resourceName := "google_kms_key_ring.key_ring" resourceName := "google_kms_key_ring.key_ring"
projectId := "terraform-" + acctest.RandString(10) projectId := "terraform-" + acctest.RandString(10)

View File

@ -9,7 +9,7 @@ import (
) )
// Test importing a first generation database // Test importing a first generation database
func TestAccGoogleSqlDatabaseInstance_importBasic(t *testing.T) { func TestAccSqlDatabaseInstance_importBasic(t *testing.T) {
t.Parallel() t.Parallel()
resourceName := "google_sql_database_instance.instance" resourceName := "google_sql_database_instance.instance"
@ -18,7 +18,7 @@ func TestAccGoogleSqlDatabaseInstance_importBasic(t *testing.T) {
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testAccGoogleSqlDatabaseInstanceDestroy, CheckDestroy: testAccSqlDatabaseInstanceDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: fmt.Sprintf( Config: fmt.Sprintf(
@ -35,7 +35,7 @@ func TestAccGoogleSqlDatabaseInstance_importBasic(t *testing.T) {
} }
// Test importing a second generation database // Test importing a second generation database
func TestAccGoogleSqlDatabaseInstance_importBasic3(t *testing.T) { func TestAccSqlDatabaseInstance_importBasic3(t *testing.T) {
t.Parallel() t.Parallel()
resourceName := "google_sql_database_instance.instance" resourceName := "google_sql_database_instance.instance"
@ -44,7 +44,7 @@ func TestAccGoogleSqlDatabaseInstance_importBasic3(t *testing.T) {
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testAccGoogleSqlDatabaseInstanceDestroy, CheckDestroy: testAccSqlDatabaseInstanceDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: fmt.Sprintf( Config: fmt.Sprintf(

View File

@ -8,7 +8,7 @@ import (
"github.com/hashicorp/terraform/helper/resource" "github.com/hashicorp/terraform/helper/resource"
) )
func TestAccGoogleSqlDatabase_importBasic(t *testing.T) { func TestAccSqlDatabase_importBasic(t *testing.T) {
t.Parallel() t.Parallel()
resourceName := "google_sql_database.database" resourceName := "google_sql_database.database"
@ -16,7 +16,7 @@ func TestAccGoogleSqlDatabase_importBasic(t *testing.T) {
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testAccGoogleSqlDatabaseInstanceDestroy, CheckDestroy: testAccSqlDatabaseInstanceDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: fmt.Sprintf( Config: fmt.Sprintf(

View File

@ -12,7 +12,7 @@ import (
) )
// Test that an IAM binding can be applied to a folder // Test that an IAM binding can be applied to a folder
func TestAccGoogleFolderIamBinding_basic(t *testing.T) { func TestAccFolderIamBinding_basic(t *testing.T) {
t.Parallel() t.Parallel()
org := getTestOrgFromEnv(t) org := getTestOrgFromEnv(t)
@ -23,14 +23,14 @@ func TestAccGoogleFolderIamBinding_basic(t *testing.T) {
Steps: []resource.TestStep{ Steps: []resource.TestStep{
// Create a new folder // Create a new folder
{ {
Config: testAccGoogleFolderIamBasic(org, fname), Config: testAccFolderIamBasic(org, fname),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccGoogleFolderExistingPolicy(org, fname), testAccFolderExistingPolicy(org, fname),
), ),
}, },
// Apply an IAM binding // Apply an IAM binding
{ {
Config: testAccGoogleFolderAssociateBindingBasic(org, fname), Config: testAccFolderAssociateBindingBasic(org, fname),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleFolderIamBindingExists("google_folder_iam_binding.acceptance", &cloudresourcemanager.Binding{ testAccCheckGoogleFolderIamBindingExists("google_folder_iam_binding.acceptance", &cloudresourcemanager.Binding{
Role: "roles/compute.instanceAdmin", Role: "roles/compute.instanceAdmin",
@ -43,7 +43,7 @@ func TestAccGoogleFolderIamBinding_basic(t *testing.T) {
} }
// Test that multiple IAM bindings can be applied to a folder, one at a time // Test that multiple IAM bindings can be applied to a folder, one at a time
func TestAccGoogleFolderIamBinding_multiple(t *testing.T) { func TestAccFolderIamBinding_multiple(t *testing.T) {
t.Parallel() t.Parallel()
org := getTestOrgFromEnv(t) org := getTestOrgFromEnv(t)
@ -54,14 +54,14 @@ func TestAccGoogleFolderIamBinding_multiple(t *testing.T) {
Steps: []resource.TestStep{ Steps: []resource.TestStep{
// Create a new folder // Create a new folder
{ {
Config: testAccGoogleFolderIamBasic(org, fname), Config: testAccFolderIamBasic(org, fname),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccGoogleFolderExistingPolicy(org, fname), testAccFolderExistingPolicy(org, fname),
), ),
}, },
// Apply an IAM binding // Apply an IAM binding
{ {
Config: testAccGoogleFolderAssociateBindingBasic(org, fname), Config: testAccFolderAssociateBindingBasic(org, fname),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleFolderIamBindingExists("google_folder_iam_binding.acceptance", &cloudresourcemanager.Binding{ testAccCheckGoogleFolderIamBindingExists("google_folder_iam_binding.acceptance", &cloudresourcemanager.Binding{
Role: "roles/compute.instanceAdmin", Role: "roles/compute.instanceAdmin",
@ -71,7 +71,7 @@ func TestAccGoogleFolderIamBinding_multiple(t *testing.T) {
}, },
// Apply another IAM binding // Apply another IAM binding
{ {
Config: testAccGoogleFolderAssociateBindingMultiple(org, fname), Config: testAccFolderAssociateBindingMultiple(org, fname),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleFolderIamBindingExists("google_folder_iam_binding.multiple", &cloudresourcemanager.Binding{ testAccCheckGoogleFolderIamBindingExists("google_folder_iam_binding.multiple", &cloudresourcemanager.Binding{
Role: "roles/viewer", Role: "roles/viewer",
@ -88,7 +88,7 @@ func TestAccGoogleFolderIamBinding_multiple(t *testing.T) {
} }
// Test that multiple IAM bindings can be applied to a folder all at once // Test that multiple IAM bindings can be applied to a folder all at once
func TestAccGoogleFolderIamBinding_multipleAtOnce(t *testing.T) { func TestAccFolderIamBinding_multipleAtOnce(t *testing.T) {
t.Parallel() t.Parallel()
org := getTestOrgFromEnv(t) org := getTestOrgFromEnv(t)
@ -99,14 +99,14 @@ func TestAccGoogleFolderIamBinding_multipleAtOnce(t *testing.T) {
Steps: []resource.TestStep{ Steps: []resource.TestStep{
// Create a new folder // Create a new folder
{ {
Config: testAccGoogleFolderIamBasic(org, fname), Config: testAccFolderIamBasic(org, fname),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccGoogleFolderExistingPolicy(org, fname), testAccFolderExistingPolicy(org, fname),
), ),
}, },
// Apply an IAM binding // Apply an IAM binding
{ {
Config: testAccGoogleFolderAssociateBindingMultiple(org, fname), Config: testAccFolderAssociateBindingMultiple(org, fname),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleFolderIamBindingExists("google_folder_iam_binding.acceptance", &cloudresourcemanager.Binding{ testAccCheckGoogleFolderIamBindingExists("google_folder_iam_binding.acceptance", &cloudresourcemanager.Binding{
Role: "roles/compute.instanceAdmin", Role: "roles/compute.instanceAdmin",
@ -123,7 +123,7 @@ func TestAccGoogleFolderIamBinding_multipleAtOnce(t *testing.T) {
} }
// Test that an IAM binding can be updated once applied to a folder // Test that an IAM binding can be updated once applied to a folder
func TestAccGoogleFolderIamBinding_update(t *testing.T) { func TestAccFolderIamBinding_update(t *testing.T) {
t.Parallel() t.Parallel()
org := getTestOrgFromEnv(t) org := getTestOrgFromEnv(t)
@ -134,14 +134,14 @@ func TestAccGoogleFolderIamBinding_update(t *testing.T) {
Steps: []resource.TestStep{ Steps: []resource.TestStep{
// Create a new folder // Create a new folder
{ {
Config: testAccGoogleFolderIamBasic(org, fname), Config: testAccFolderIamBasic(org, fname),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccGoogleFolderExistingPolicy(org, fname), testAccFolderExistingPolicy(org, fname),
), ),
}, },
// Apply an IAM binding // Apply an IAM binding
{ {
Config: testAccGoogleFolderAssociateBindingBasic(org, fname), Config: testAccFolderAssociateBindingBasic(org, fname),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleFolderIamBindingExists("google_folder_iam_binding.acceptance", &cloudresourcemanager.Binding{ testAccCheckGoogleFolderIamBindingExists("google_folder_iam_binding.acceptance", &cloudresourcemanager.Binding{
Role: "roles/compute.instanceAdmin", Role: "roles/compute.instanceAdmin",
@ -151,7 +151,7 @@ func TestAccGoogleFolderIamBinding_update(t *testing.T) {
}, },
// Apply an updated IAM binding // Apply an updated IAM binding
{ {
Config: testAccGoogleFolderAssociateBindingUpdated(org, fname), Config: testAccFolderAssociateBindingUpdated(org, fname),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleFolderIamBindingExists("google_folder_iam_binding.updated", &cloudresourcemanager.Binding{ testAccCheckGoogleFolderIamBindingExists("google_folder_iam_binding.updated", &cloudresourcemanager.Binding{
Role: "roles/compute.instanceAdmin", Role: "roles/compute.instanceAdmin",
@ -161,7 +161,7 @@ func TestAccGoogleFolderIamBinding_update(t *testing.T) {
}, },
// Drop the original member // Drop the original member
{ {
Config: testAccGoogleFolderAssociateBindingDropMemberFromBasic(org, fname), Config: testAccFolderAssociateBindingDropMemberFromBasic(org, fname),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleFolderIamBindingExists("google_folder_iam_binding.dropped", &cloudresourcemanager.Binding{ testAccCheckGoogleFolderIamBindingExists("google_folder_iam_binding.dropped", &cloudresourcemanager.Binding{
Role: "roles/compute.instanceAdmin", Role: "roles/compute.instanceAdmin",
@ -174,7 +174,7 @@ func TestAccGoogleFolderIamBinding_update(t *testing.T) {
} }
// Test that an IAM binding can be removed from a folder // Test that an IAM binding can be removed from a folder
func TestAccGoogleFolderIamBinding_remove(t *testing.T) { func TestAccFolderIamBinding_remove(t *testing.T) {
t.Parallel() t.Parallel()
org := getTestOrgFromEnv(t) org := getTestOrgFromEnv(t)
@ -185,14 +185,14 @@ func TestAccGoogleFolderIamBinding_remove(t *testing.T) {
Steps: []resource.TestStep{ Steps: []resource.TestStep{
// Create a new folder // Create a new folder
{ {
Config: testAccGoogleFolderIamBasic(org, fname), Config: testAccFolderIamBasic(org, fname),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccGoogleFolderExistingPolicy(org, fname), testAccFolderExistingPolicy(org, fname),
), ),
}, },
// Apply multiple IAM bindings // Apply multiple IAM bindings
{ {
Config: testAccGoogleFolderAssociateBindingMultiple(org, fname), Config: testAccFolderAssociateBindingMultiple(org, fname),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleFolderIamBindingExists("google_folder_iam_binding.multiple", &cloudresourcemanager.Binding{ testAccCheckGoogleFolderIamBindingExists("google_folder_iam_binding.multiple", &cloudresourcemanager.Binding{
Role: "roles/viewer", Role: "roles/viewer",
@ -206,9 +206,9 @@ func TestAccGoogleFolderIamBinding_remove(t *testing.T) {
}, },
// Remove the bindings // Remove the bindings
{ {
Config: testAccGoogleFolderIamBasic(org, fname), Config: testAccFolderIamBasic(org, fname),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccGoogleFolderExistingPolicy(org, fname), testAccFolderExistingPolicy(org, fname),
), ),
}, },
}, },
@ -247,7 +247,7 @@ func testAccCheckGoogleFolderIamBindingExists(key string, expected *cloudresourc
} }
} }
func testAccGoogleFolderIamBasic(org, fname string) string { func testAccFolderIamBasic(org, fname string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_folder" "acceptance" { resource "google_folder" "acceptance" {
parent = "organizations/%s" parent = "organizations/%s"
@ -256,7 +256,7 @@ resource "google_folder" "acceptance" {
`, org, fname) `, org, fname)
} }
func testAccGoogleFolderAssociateBindingBasic(org, fname string) string { func testAccFolderAssociateBindingBasic(org, fname string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_folder" "acceptance" { resource "google_folder" "acceptance" {
parent = "organizations/%s" parent = "organizations/%s"
@ -271,7 +271,7 @@ resource "google_folder_iam_binding" "acceptance" {
`, org, fname) `, org, fname)
} }
func testAccGoogleFolderAssociateBindingMultiple(org, fname string) string { func testAccFolderAssociateBindingMultiple(org, fname string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_folder" "acceptance" { resource "google_folder" "acceptance" {
parent = "organizations/%s" parent = "organizations/%s"
@ -292,7 +292,7 @@ resource "google_folder_iam_binding" "multiple" {
`, org, fname) `, org, fname)
} }
func testAccGoogleFolderAssociateBindingUpdated(org, fname string) string { func testAccFolderAssociateBindingUpdated(org, fname string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_folder" "acceptance" { resource "google_folder" "acceptance" {
parent = "organizations/%s" parent = "organizations/%s"
@ -307,7 +307,7 @@ resource "google_folder_iam_binding" "acceptance" {
`, org, fname) `, org, fname)
} }
func testAccGoogleFolderAssociateBindingDropMemberFromBasic(org, fname string) string { func testAccFolderAssociateBindingDropMemberFromBasic(org, fname string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_folder" "acceptance" { resource "google_folder" "acceptance" {
parent = "organizations/%s" parent = "organizations/%s"

View File

@ -10,7 +10,7 @@ import (
) )
// Test that an IAM binding can be applied to a folder // Test that an IAM binding can be applied to a folder
func TestAccGoogleFolderIamMember_basic(t *testing.T) { func TestAccFolderIamMember_basic(t *testing.T) {
t.Parallel() t.Parallel()
org := getTestOrgFromEnv(t) org := getTestOrgFromEnv(t)
@ -21,14 +21,14 @@ func TestAccGoogleFolderIamMember_basic(t *testing.T) {
Steps: []resource.TestStep{ Steps: []resource.TestStep{
// Create a new folder // Create a new folder
{ {
Config: testAccGoogleFolderIamBasic(org, fname), Config: testAccFolderIamBasic(org, fname),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccGoogleFolderExistingPolicy(org, fname), testAccFolderExistingPolicy(org, fname),
), ),
}, },
// Apply an IAM binding // Apply an IAM binding
{ {
Config: testAccGoogleFolderAssociateMemberBasic(org, fname), Config: testAccFolderAssociateMemberBasic(org, fname),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleFolderIamBindingExists("google_folder_iam_member.acceptance", &cloudresourcemanager.Binding{ testAccCheckGoogleFolderIamBindingExists("google_folder_iam_member.acceptance", &cloudresourcemanager.Binding{
Role: "roles/compute.instanceAdmin", Role: "roles/compute.instanceAdmin",
@ -41,7 +41,7 @@ func TestAccGoogleFolderIamMember_basic(t *testing.T) {
} }
// Test that multiple IAM bindings can be applied to a folder // Test that multiple IAM bindings can be applied to a folder
func TestAccGoogleFolderIamMember_multiple(t *testing.T) { func TestAccFolderIamMember_multiple(t *testing.T) {
t.Parallel() t.Parallel()
org := getTestOrgFromEnv(t) org := getTestOrgFromEnv(t)
@ -52,14 +52,14 @@ func TestAccGoogleFolderIamMember_multiple(t *testing.T) {
Steps: []resource.TestStep{ Steps: []resource.TestStep{
// Create a new folder // Create a new folder
{ {
Config: testAccGoogleFolderIamBasic(org, fname), Config: testAccFolderIamBasic(org, fname),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccGoogleFolderExistingPolicy(org, fname), testAccFolderExistingPolicy(org, fname),
), ),
}, },
// Apply an IAM binding // Apply an IAM binding
{ {
Config: testAccGoogleFolderAssociateMemberBasic(org, fname), Config: testAccFolderAssociateMemberBasic(org, fname),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleFolderIamBindingExists("google_folder_iam_member.acceptance", &cloudresourcemanager.Binding{ testAccCheckGoogleFolderIamBindingExists("google_folder_iam_member.acceptance", &cloudresourcemanager.Binding{
Role: "roles/compute.instanceAdmin", Role: "roles/compute.instanceAdmin",
@ -69,7 +69,7 @@ func TestAccGoogleFolderIamMember_multiple(t *testing.T) {
}, },
// Apply another IAM binding // Apply another IAM binding
{ {
Config: testAccGoogleFolderAssociateMemberMultiple(org, fname), Config: testAccFolderAssociateMemberMultiple(org, fname),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleFolderIamBindingExists("google_folder_iam_member.multiple", &cloudresourcemanager.Binding{ testAccCheckGoogleFolderIamBindingExists("google_folder_iam_member.multiple", &cloudresourcemanager.Binding{
Role: "roles/compute.instanceAdmin", Role: "roles/compute.instanceAdmin",
@ -82,7 +82,7 @@ func TestAccGoogleFolderIamMember_multiple(t *testing.T) {
} }
// Test that an IAM binding can be removed from a folder // Test that an IAM binding can be removed from a folder
func TestAccGoogleFolderIamMember_remove(t *testing.T) { func TestAccFolderIamMember_remove(t *testing.T) {
t.Parallel() t.Parallel()
org := getTestOrgFromEnv(t) org := getTestOrgFromEnv(t)
@ -93,14 +93,14 @@ func TestAccGoogleFolderIamMember_remove(t *testing.T) {
Steps: []resource.TestStep{ Steps: []resource.TestStep{
// Create a new folder // Create a new folder
{ {
Config: testAccGoogleFolderIamBasic(org, fname), Config: testAccFolderIamBasic(org, fname),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccGoogleFolderExistingPolicy(org, fname), testAccFolderExistingPolicy(org, fname),
), ),
}, },
// Apply multiple IAM bindings // Apply multiple IAM bindings
{ {
Config: testAccGoogleFolderAssociateMemberMultiple(org, fname), Config: testAccFolderAssociateMemberMultiple(org, fname),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleFolderIamBindingExists("google_folder_iam_member.acceptance", &cloudresourcemanager.Binding{ testAccCheckGoogleFolderIamBindingExists("google_folder_iam_member.acceptance", &cloudresourcemanager.Binding{
Role: "roles/compute.instanceAdmin", Role: "roles/compute.instanceAdmin",
@ -110,16 +110,16 @@ func TestAccGoogleFolderIamMember_remove(t *testing.T) {
}, },
// Remove the bindings // Remove the bindings
{ {
Config: testAccGoogleFolderIamBasic(org, fname), Config: testAccFolderIamBasic(org, fname),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccGoogleFolderExistingPolicy(org, fname), testAccFolderExistingPolicy(org, fname),
), ),
}, },
}, },
}) })
} }
func testAccGoogleFolderAssociateMemberBasic(org, fname string) string { func testAccFolderAssociateMemberBasic(org, fname string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_folder" "acceptance" { resource "google_folder" "acceptance" {
parent = "organizations/%s" parent = "organizations/%s"
@ -134,7 +134,7 @@ resource "google_folder_iam_member" "acceptance" {
`, org, fname) `, org, fname)
} }
func testAccGoogleFolderAssociateMemberMultiple(org, fname string) string { func testAccFolderAssociateMemberMultiple(org, fname string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_folder" "acceptance" { resource "google_folder" "acceptance" {
parent = "organizations/%s" parent = "organizations/%s"

View File

@ -12,7 +12,7 @@ import (
resourceManagerV2Beta1 "google.golang.org/api/cloudresourcemanager/v2beta1" resourceManagerV2Beta1 "google.golang.org/api/cloudresourcemanager/v2beta1"
) )
func TestAccGoogleFolderIamPolicy_basic(t *testing.T) { func TestAccFolderIamPolicy_basic(t *testing.T) {
t.Parallel() t.Parallel()
folderDisplayName := "tf-test-" + acctest.RandString(10) folderDisplayName := "tf-test-" + acctest.RandString(10)
@ -36,14 +36,14 @@ func TestAccGoogleFolderIamPolicy_basic(t *testing.T) {
CheckDestroy: testAccCheckGoogleFolderIamPolicyDestroy, CheckDestroy: testAccCheckGoogleFolderIamPolicyDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testAccGoogleFolderIamPolicy_basic(folderDisplayName, parent, policy), Config: testAccFolderIamPolicy_basic(folderDisplayName, parent, policy),
Check: testAccCheckGoogleFolderIamPolicy("google_folder_iam_policy.test", policy), Check: testAccCheckGoogleFolderIamPolicy("google_folder_iam_policy.test", policy),
}, },
}, },
}) })
} }
func TestAccGoogleFolderIamPolicy_update(t *testing.T) { func TestAccFolderIamPolicy_update(t *testing.T) {
t.Parallel() t.Parallel()
folderDisplayName := "tf-test-" + acctest.RandString(10) folderDisplayName := "tf-test-" + acctest.RandString(10)
@ -83,11 +83,11 @@ func TestAccGoogleFolderIamPolicy_update(t *testing.T) {
CheckDestroy: testAccCheckGoogleFolderIamPolicyDestroy, CheckDestroy: testAccCheckGoogleFolderIamPolicyDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testAccGoogleFolderIamPolicy_basic(folderDisplayName, parent, policy1), Config: testAccFolderIamPolicy_basic(folderDisplayName, parent, policy1),
Check: testAccCheckGoogleFolderIamPolicy("google_folder_iam_policy.test", policy1), Check: testAccCheckGoogleFolderIamPolicy("google_folder_iam_policy.test", policy1),
}, },
resource.TestStep{ resource.TestStep{
Config: testAccGoogleFolderIamPolicy_basic(folderDisplayName, parent, policy2), Config: testAccFolderIamPolicy_basic(folderDisplayName, parent, policy2),
Check: testAccCheckGoogleFolderIamPolicy("google_folder_iam_policy.test", policy2), Check: testAccCheckGoogleFolderIamPolicy("google_folder_iam_policy.test", policy2),
}, },
}, },
@ -147,7 +147,7 @@ func testAccCheckGoogleFolderIamPolicy(n string, policy *resourceManagerV2Beta1.
} }
// Confirm that a folder has an IAM policy with at least 1 binding // Confirm that a folder has an IAM policy with at least 1 binding
func testAccGoogleFolderExistingPolicy(org, fname string) resource.TestCheckFunc { func testAccFolderExistingPolicy(org, fname string) resource.TestCheckFunc {
return func(s *terraform.State) error { return func(s *terraform.State) error {
c := testAccProvider.Meta().(*Config) c := testAccProvider.Meta().(*Config)
var err error var err error
@ -162,7 +162,7 @@ func testAccGoogleFolderExistingPolicy(org, fname string) resource.TestCheckFunc
} }
} }
func testAccGoogleFolderIamPolicy_basic(folder, parent string, policy *resourceManagerV2Beta1.Policy) string { func testAccFolderIamPolicy_basic(folder, parent string, policy *resourceManagerV2Beta1.Policy) string {
var bindingBuffer bytes.Buffer var bindingBuffer bytes.Buffer
for _, binding := range policy.Bindings { for _, binding := range policy.Bindings {

View File

@ -12,7 +12,7 @@ import (
"google.golang.org/api/cloudresourcemanager/v1" "google.golang.org/api/cloudresourcemanager/v1"
) )
func TestAccGoogleFolderOrganizationPolicy_boolean(t *testing.T) { func TestAccFolderOrganizationPolicy_boolean(t *testing.T) {
t.Parallel() t.Parallel()
folder := acctest.RandomWithPrefix("tf-test") folder := acctest.RandomWithPrefix("tf-test")
@ -25,12 +25,12 @@ func TestAccGoogleFolderOrganizationPolicy_boolean(t *testing.T) {
Steps: []resource.TestStep{ Steps: []resource.TestStep{
{ {
// Test creation of an enforced boolean policy // Test creation of an enforced boolean policy
Config: testAccGoogleFolderOrganizationPolicy_boolean(org, folder, true), Config: testAccFolderOrganizationPolicy_boolean(org, folder, true),
Check: testAccCheckGoogleFolderOrganizationBooleanPolicy("bool", true), Check: testAccCheckGoogleFolderOrganizationBooleanPolicy("bool", true),
}, },
{ {
// Test update from enforced to not // Test update from enforced to not
Config: testAccGoogleFolderOrganizationPolicy_boolean(org, folder, false), Config: testAccFolderOrganizationPolicy_boolean(org, folder, false),
Check: testAccCheckGoogleFolderOrganizationBooleanPolicy("bool", false), Check: testAccCheckGoogleFolderOrganizationBooleanPolicy("bool", false),
}, },
{ {
@ -39,19 +39,19 @@ func TestAccGoogleFolderOrganizationPolicy_boolean(t *testing.T) {
}, },
{ {
// Test creation of a not enforced boolean policy // Test creation of a not enforced boolean policy
Config: testAccGoogleFolderOrganizationPolicy_boolean(org, folder, false), Config: testAccFolderOrganizationPolicy_boolean(org, folder, false),
Check: testAccCheckGoogleFolderOrganizationBooleanPolicy("bool", false), Check: testAccCheckGoogleFolderOrganizationBooleanPolicy("bool", false),
}, },
{ {
// Test update from not enforced to enforced // Test update from not enforced to enforced
Config: testAccGoogleFolderOrganizationPolicy_boolean(org, folder, true), Config: testAccFolderOrganizationPolicy_boolean(org, folder, true),
Check: testAccCheckGoogleFolderOrganizationBooleanPolicy("bool", true), Check: testAccCheckGoogleFolderOrganizationBooleanPolicy("bool", true),
}, },
}, },
}) })
} }
func TestAccGoogleFolderOrganizationPolicy_list_allowAll(t *testing.T) { func TestAccFolderOrganizationPolicy_list_allowAll(t *testing.T) {
t.Parallel() t.Parallel()
folder := acctest.RandomWithPrefix("tf-test") folder := acctest.RandomWithPrefix("tf-test")
@ -63,14 +63,14 @@ func TestAccGoogleFolderOrganizationPolicy_list_allowAll(t *testing.T) {
CheckDestroy: testAccCheckGoogleFolderOrganizationPolicyDestroy, CheckDestroy: testAccCheckGoogleFolderOrganizationPolicyDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
{ {
Config: testAccGoogleFolderOrganizationPolicy_list_allowAll(org, folder), Config: testAccFolderOrganizationPolicy_list_allowAll(org, folder),
Check: testAccCheckGoogleFolderOrganizationListPolicyAll("list", "ALLOW"), Check: testAccCheckGoogleFolderOrganizationListPolicyAll("list", "ALLOW"),
}, },
}, },
}) })
} }
func TestAccGoogleFolderOrganizationPolicy_list_allowSome(t *testing.T) { func TestAccFolderOrganizationPolicy_list_allowSome(t *testing.T) {
t.Parallel() t.Parallel()
folder := acctest.RandomWithPrefix("tf-test") folder := acctest.RandomWithPrefix("tf-test")
@ -82,14 +82,14 @@ func TestAccGoogleFolderOrganizationPolicy_list_allowSome(t *testing.T) {
CheckDestroy: testAccCheckGoogleFolderOrganizationPolicyDestroy, CheckDestroy: testAccCheckGoogleFolderOrganizationPolicyDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
{ {
Config: testAccGoogleFolderOrganizationPolicy_list_allowSome(org, folder, project), Config: testAccFolderOrganizationPolicy_list_allowSome(org, folder, project),
Check: testAccCheckGoogleFolderOrganizationListPolicyAllowedValues("list", []string{project}), Check: testAccCheckGoogleFolderOrganizationListPolicyAllowedValues("list", []string{project}),
}, },
}, },
}) })
} }
func TestAccGoogleFolderOrganizationPolicy_list_denySome(t *testing.T) { func TestAccFolderOrganizationPolicy_list_denySome(t *testing.T) {
t.Parallel() t.Parallel()
folder := acctest.RandomWithPrefix("tf-test") folder := acctest.RandomWithPrefix("tf-test")
@ -100,14 +100,14 @@ func TestAccGoogleFolderOrganizationPolicy_list_denySome(t *testing.T) {
CheckDestroy: testAccCheckGoogleFolderOrganizationPolicyDestroy, CheckDestroy: testAccCheckGoogleFolderOrganizationPolicyDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
{ {
Config: testAccGoogleFolderOrganizationPolicy_list_denySome(org, folder), Config: testAccFolderOrganizationPolicy_list_denySome(org, folder),
Check: testAccCheckGoogleFolderOrganizationListPolicyDeniedValues("list", DENIED_ORG_POLICIES), Check: testAccCheckGoogleFolderOrganizationListPolicyDeniedValues("list", DENIED_ORG_POLICIES),
}, },
}, },
}) })
} }
func TestAccGoogleFolderOrganizationPolicy_list_update(t *testing.T) { func TestAccFolderOrganizationPolicy_list_update(t *testing.T) {
t.Parallel() t.Parallel()
folder := acctest.RandomWithPrefix("tf-test") folder := acctest.RandomWithPrefix("tf-test")
@ -118,11 +118,11 @@ func TestAccGoogleFolderOrganizationPolicy_list_update(t *testing.T) {
CheckDestroy: testAccCheckGoogleFolderOrganizationPolicyDestroy, CheckDestroy: testAccCheckGoogleFolderOrganizationPolicyDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
{ {
Config: testAccGoogleFolderOrganizationPolicy_list_allowAll(org, folder), Config: testAccFolderOrganizationPolicy_list_allowAll(org, folder),
Check: testAccCheckGoogleFolderOrganizationListPolicyAll("list", "ALLOW"), Check: testAccCheckGoogleFolderOrganizationListPolicyAll("list", "ALLOW"),
}, },
{ {
Config: testAccGoogleFolderOrganizationPolicy_list_denySome(org, folder), Config: testAccFolderOrganizationPolicy_list_denySome(org, folder),
Check: testAccCheckGoogleFolderOrganizationListPolicyDeniedValues("list", DENIED_ORG_POLICIES), Check: testAccCheckGoogleFolderOrganizationListPolicyDeniedValues("list", DENIED_ORG_POLICIES),
}, },
}, },
@ -241,7 +241,7 @@ func getGoogleFolderOrganizationPolicyTestResource(s *terraform.State, n string)
}).Do() }).Do()
} }
func testAccGoogleFolderOrganizationPolicy_boolean(org, folder string, enforced bool) string { func testAccFolderOrganizationPolicy_boolean(org, folder string, enforced bool) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_folder" "orgpolicy" { resource "google_folder" "orgpolicy" {
display_name = "%s" display_name = "%s"
@ -260,7 +260,7 @@ resource "google_folder_organization_policy" "bool" {
`, folder, "organizations/"+org, enforced) `, folder, "organizations/"+org, enforced)
} }
func testAccGoogleFolderOrganizationPolicy_list_allowAll(org, folder string) string { func testAccFolderOrganizationPolicy_list_allowAll(org, folder string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_folder" "orgpolicy" { resource "google_folder" "orgpolicy" {
display_name = "%s" display_name = "%s"
@ -280,7 +280,7 @@ resource "google_folder_organization_policy" "list" {
`, folder, "organizations/"+org) `, folder, "organizations/"+org)
} }
func testAccGoogleFolderOrganizationPolicy_list_allowSome(org, folder, project string) string { func testAccFolderOrganizationPolicy_list_allowSome(org, folder, project string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_folder" "orgpolicy" { resource "google_folder" "orgpolicy" {
display_name = "%s" display_name = "%s"
@ -300,7 +300,7 @@ resource "google_folder_organization_policy" "list" {
`, folder, "organizations/"+org, project) `, folder, "organizations/"+org, project)
} }
func testAccGoogleFolderOrganizationPolicy_list_denySome(org, folder string) string { func testAccFolderOrganizationPolicy_list_denySome(org, folder string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_folder" "orgpolicy" { resource "google_folder" "orgpolicy" {
display_name = "%s" display_name = "%s"

View File

@ -2,15 +2,16 @@ package google
import ( import (
"fmt" "fmt"
"testing"
"github.com/hashicorp/terraform/helper/acctest" "github.com/hashicorp/terraform/helper/acctest"
"github.com/hashicorp/terraform/helper/resource" "github.com/hashicorp/terraform/helper/resource"
"github.com/hashicorp/terraform/terraform" "github.com/hashicorp/terraform/terraform"
"testing"
resourceManagerV2Beta1 "google.golang.org/api/cloudresourcemanager/v2beta1" resourceManagerV2Beta1 "google.golang.org/api/cloudresourcemanager/v2beta1"
) )
func TestAccGoogleFolder_rename(t *testing.T) { func TestAccFolder_rename(t *testing.T) {
t.Parallel() t.Parallel()
folderDisplayName := "tf-test-" + acctest.RandString(10) folderDisplayName := "tf-test-" + acctest.RandString(10)
@ -25,7 +26,7 @@ func TestAccGoogleFolder_rename(t *testing.T) {
CheckDestroy: testAccCheckGoogleFolderDestroy, CheckDestroy: testAccCheckGoogleFolderDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testAccGoogleFolder_basic(folderDisplayName, parent), Config: testAccFolder_basic(folderDisplayName, parent),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleFolderExists("google_folder.folder1", &folder), testAccCheckGoogleFolderExists("google_folder.folder1", &folder),
testAccCheckGoogleFolderParent(&folder, parent), testAccCheckGoogleFolderParent(&folder, parent),
@ -33,7 +34,7 @@ func TestAccGoogleFolder_rename(t *testing.T) {
), ),
}, },
resource.TestStep{ resource.TestStep{
Config: testAccGoogleFolder_basic(newFolderDisplayName, parent), Config: testAccFolder_basic(newFolderDisplayName, parent),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleFolderExists("google_folder.folder1", &folder), testAccCheckGoogleFolderExists("google_folder.folder1", &folder),
testAccCheckGoogleFolderParent(&folder, parent), testAccCheckGoogleFolderParent(&folder, parent),
@ -48,7 +49,7 @@ func TestAccGoogleFolder_rename(t *testing.T) {
}) })
} }
func TestAccGoogleFolder_moveParent(t *testing.T) { func TestAccFolder_moveParent(t *testing.T) {
t.Parallel() t.Parallel()
folder1DisplayName := "tf-test-" + acctest.RandString(10) folder1DisplayName := "tf-test-" + acctest.RandString(10)
@ -64,7 +65,7 @@ func TestAccGoogleFolder_moveParent(t *testing.T) {
CheckDestroy: testAccCheckGoogleFolderDestroy, CheckDestroy: testAccCheckGoogleFolderDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testAccGoogleFolder_basic(folder1DisplayName, parent), Config: testAccFolder_basic(folder1DisplayName, parent),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleFolderExists("google_folder.folder1", &folder1), testAccCheckGoogleFolderExists("google_folder.folder1", &folder1),
testAccCheckGoogleFolderParent(&folder1, parent), testAccCheckGoogleFolderParent(&folder1, parent),
@ -72,7 +73,7 @@ func TestAccGoogleFolder_moveParent(t *testing.T) {
), ),
}, },
resource.TestStep{ resource.TestStep{
Config: testAccGoogleFolder_move(folder1DisplayName, folder2DisplayName, parent), Config: testAccFolder_move(folder1DisplayName, folder2DisplayName, parent),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleFolderExists("google_folder.folder1", &folder1), testAccCheckGoogleFolderExists("google_folder.folder1", &folder1),
testAccCheckGoogleFolderDisplayName(&folder1, folder1DisplayName), testAccCheckGoogleFolderDisplayName(&folder1, folder1DisplayName),
@ -144,7 +145,7 @@ func testAccCheckGoogleFolderParent(folder *resourceManagerV2Beta1.Folder, paren
} }
} }
func testAccGoogleFolder_basic(folder, parent string) string { func testAccFolder_basic(folder, parent string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_folder" "folder1" { resource "google_folder" "folder1" {
display_name = "%s" display_name = "%s"
@ -153,7 +154,7 @@ resource "google_folder" "folder1" {
`, folder, parent) `, folder, parent)
} }
func testAccGoogleFolder_move(folder1, folder2, parent string) string { func testAccFolder_move(folder1, folder2, parent string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_folder" "folder1" { resource "google_folder" "folder1" {
display_name = "%s" display_name = "%s"

View File

@ -2,15 +2,16 @@ package google
import ( import (
"fmt" "fmt"
"github.com/hashicorp/terraform/helper/acctest"
"github.com/hashicorp/terraform/helper/resource"
"github.com/hashicorp/terraform/terraform"
"reflect" "reflect"
"sort" "sort"
"testing" "testing"
"github.com/hashicorp/terraform/helper/acctest"
"github.com/hashicorp/terraform/helper/resource"
"github.com/hashicorp/terraform/terraform"
) )
func TestAccGoogleOrganizationIamCustomRole_basic(t *testing.T) { func TestAccOrganizationIamCustomRole_basic(t *testing.T) {
t.Parallel() t.Parallel()
org := getTestOrgFromEnv(t) org := getTestOrgFromEnv(t)
@ -48,7 +49,7 @@ func TestAccGoogleOrganizationIamCustomRole_basic(t *testing.T) {
}) })
} }
func TestAccGoogleOrganizationIamCustomRole_undelete(t *testing.T) { func TestAccOrganizationIamCustomRole_undelete(t *testing.T) {
t.Parallel() t.Parallel()
org := getTestOrgFromEnv(t) org := getTestOrgFromEnv(t)

View File

@ -2,13 +2,14 @@ package google
import ( import (
"fmt" "fmt"
"reflect"
"sort"
"testing"
"github.com/hashicorp/terraform/helper/acctest" "github.com/hashicorp/terraform/helper/acctest"
"github.com/hashicorp/terraform/helper/resource" "github.com/hashicorp/terraform/helper/resource"
"github.com/hashicorp/terraform/terraform" "github.com/hashicorp/terraform/terraform"
"google.golang.org/api/cloudresourcemanager/v1" "google.golang.org/api/cloudresourcemanager/v1"
"reflect"
"sort"
"testing"
) )
// Bindings and members are tested serially to avoid concurrent updates of the org's IAM policy. // Bindings and members are tested serially to avoid concurrent updates of the org's IAM policy.
@ -16,7 +17,7 @@ import (
// them to see the new diff instead of blindly overriding the policy stored in GCP. This desired // them to see the new diff instead of blindly overriding the policy stored in GCP. This desired
// behavior however induces flakiness in our acceptance tests, hence the need for running them // behavior however induces flakiness in our acceptance tests, hence the need for running them
// serially. // serially.
func TestAccGoogleOrganizationIam(t *testing.T) { func TestAccOrganizationIam(t *testing.T) {
t.Parallel() t.Parallel()
org := getTestOrgFromEnv(t) org := getTestOrgFromEnv(t)
@ -28,14 +29,14 @@ func TestAccGoogleOrganizationIam(t *testing.T) {
Steps: []resource.TestStep{ Steps: []resource.TestStep{
{ {
// Test Iam Binding creation // Test Iam Binding creation
Config: testAccGoogleOrganizationIamBinding_basic(account, roleId, org), Config: testAccOrganizationIamBinding_basic(account, roleId, org),
Check: testAccCheckGoogleOrganizationIamBindingExists("foo", "test-role", []string{ Check: testAccCheckGoogleOrganizationIamBindingExists("foo", "test-role", []string{
fmt.Sprintf("serviceAccount:%s@%s.iam.gserviceaccount.com", account, getTestProjectFromEnv()), fmt.Sprintf("serviceAccount:%s@%s.iam.gserviceaccount.com", account, getTestProjectFromEnv()),
}), }),
}, },
{ {
// Test Iam Binding update // Test Iam Binding update
Config: testAccGoogleOrganizationIamBinding_update(account, roleId, org), Config: testAccOrganizationIamBinding_update(account, roleId, org),
Check: testAccCheckGoogleOrganizationIamBindingExists("foo", "test-role", []string{ Check: testAccCheckGoogleOrganizationIamBindingExists("foo", "test-role", []string{
fmt.Sprintf("serviceAccount:%s@%s.iam.gserviceaccount.com", account, getTestProjectFromEnv()), fmt.Sprintf("serviceAccount:%s@%s.iam.gserviceaccount.com", account, getTestProjectFromEnv()),
fmt.Sprintf("serviceAccount:%s-2@%s.iam.gserviceaccount.com", account, getTestProjectFromEnv()), fmt.Sprintf("serviceAccount:%s-2@%s.iam.gserviceaccount.com", account, getTestProjectFromEnv()),
@ -43,7 +44,7 @@ func TestAccGoogleOrganizationIam(t *testing.T) {
}, },
{ {
// Test Iam Member creation (no update for member, no need to test) // Test Iam Member creation (no update for member, no need to test)
Config: testAccGoogleOrganizationIamMember_basic(account, org), Config: testAccOrganizationIamMember_basic(account, org),
Check: testAccCheckGoogleOrganizationIamMemberExists("foo", "roles/browser", Check: testAccCheckGoogleOrganizationIamMemberExists("foo", "roles/browser",
fmt.Sprintf("serviceAccount:%s@%s.iam.gserviceaccount.com", account, getTestProjectFromEnv()), fmt.Sprintf("serviceAccount:%s@%s.iam.gserviceaccount.com", account, getTestProjectFromEnv()),
), ),
@ -118,7 +119,7 @@ func testAccCheckGoogleOrganizationIamMemberExists(n, role, member string) resou
// We are using a custom role since iam_binding is authoritative on the member list and // We are using a custom role since iam_binding is authoritative on the member list and
// we want to avoid removing members from an existing role to prevent unwanted side effects. // we want to avoid removing members from an existing role to prevent unwanted side effects.
func testAccGoogleOrganizationIamBinding_basic(account, role, org string) string { func testAccOrganizationIamBinding_basic(account, role, org string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_service_account" "test-account" { resource "google_service_account" "test-account" {
account_id = "%s" account_id = "%s"
@ -140,7 +141,7 @@ resource "google_organization_iam_binding" "foo" {
`, account, role, org, org) `, account, role, org, org)
} }
func testAccGoogleOrganizationIamBinding_update(account, role, org string) string { func testAccOrganizationIamBinding_update(account, role, org string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_service_account" "test-account" { resource "google_service_account" "test-account" {
account_id = "%s" account_id = "%s"
@ -170,7 +171,7 @@ resource "google_organization_iam_binding" "foo" {
`, account, role, org, account, org) `, account, role, org, account, org)
} }
func testAccGoogleOrganizationIamMember_basic(account, org string) string { func testAccOrganizationIamMember_basic(account, org string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_service_account" "test-account" { resource "google_service_account" "test-account" {
account_id = "%s" account_id = "%s"

View File

@ -19,7 +19,7 @@ var DENIED_ORG_POLICIES = []string{
// Since each test here is acting on the same organization, run the tests serially to // Since each test here is acting on the same organization, run the tests serially to
// avoid race conditions and aborted operations. // avoid race conditions and aborted operations.
func TestAccGoogleOrganizationPolicy_boolean(t *testing.T) { func TestAccOrganizationPolicy_boolean(t *testing.T) {
org := getTestOrgFromEnv(t) org := getTestOrgFromEnv(t)
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
@ -28,12 +28,12 @@ func TestAccGoogleOrganizationPolicy_boolean(t *testing.T) {
Steps: []resource.TestStep{ Steps: []resource.TestStep{
{ {
// Test creation of an enforced boolean policy // Test creation of an enforced boolean policy
Config: testAccGoogleOrganizationPolicy_boolean(org, true), Config: testAccOrganizationPolicy_boolean(org, true),
Check: testAccCheckGoogleOrganizationBooleanPolicy("bool", true), Check: testAccCheckGoogleOrganizationBooleanPolicy("bool", true),
}, },
{ {
// Test update from enforced to not // Test update from enforced to not
Config: testAccGoogleOrganizationPolicy_boolean(org, false), Config: testAccOrganizationPolicy_boolean(org, false),
Check: testAccCheckGoogleOrganizationBooleanPolicy("bool", false), Check: testAccCheckGoogleOrganizationBooleanPolicy("bool", false),
}, },
{ {
@ -42,12 +42,12 @@ func TestAccGoogleOrganizationPolicy_boolean(t *testing.T) {
}, },
{ {
// Test creation of a not enforced boolean policy // Test creation of a not enforced boolean policy
Config: testAccGoogleOrganizationPolicy_boolean(org, false), Config: testAccOrganizationPolicy_boolean(org, false),
Check: testAccCheckGoogleOrganizationBooleanPolicy("bool", false), Check: testAccCheckGoogleOrganizationBooleanPolicy("bool", false),
}, },
{ {
// Test update from not enforced to enforced // Test update from not enforced to enforced
Config: testAccGoogleOrganizationPolicy_boolean(org, true), Config: testAccOrganizationPolicy_boolean(org, true),
Check: testAccCheckGoogleOrganizationBooleanPolicy("bool", true), Check: testAccCheckGoogleOrganizationBooleanPolicy("bool", true),
}, },
{ {
@ -60,7 +60,7 @@ func TestAccGoogleOrganizationPolicy_boolean(t *testing.T) {
} }
func TestAccGoogleOrganizationPolicy_list_allowAll(t *testing.T) { func TestAccOrganizationPolicy_list_allowAll(t *testing.T) {
org := getTestOrgFromEnv(t) org := getTestOrgFromEnv(t)
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
@ -68,7 +68,7 @@ func TestAccGoogleOrganizationPolicy_list_allowAll(t *testing.T) {
CheckDestroy: testAccCheckGoogleOrganizationPolicyDestroy, CheckDestroy: testAccCheckGoogleOrganizationPolicyDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
{ {
Config: testAccGoogleOrganizationPolicy_list_allowAll(org), Config: testAccOrganizationPolicy_list_allowAll(org),
Check: testAccCheckGoogleOrganizationListPolicyAll("list", "ALLOW"), Check: testAccCheckGoogleOrganizationListPolicyAll("list", "ALLOW"),
}, },
{ {
@ -80,7 +80,7 @@ func TestAccGoogleOrganizationPolicy_list_allowAll(t *testing.T) {
}) })
} }
func TestAccGoogleOrganizationPolicy_list_allowSome(t *testing.T) { func TestAccOrganizationPolicy_list_allowSome(t *testing.T) {
org := getTestOrgFromEnv(t) org := getTestOrgFromEnv(t)
project := getTestProjectFromEnv() project := getTestProjectFromEnv()
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
@ -89,7 +89,7 @@ func TestAccGoogleOrganizationPolicy_list_allowSome(t *testing.T) {
CheckDestroy: testAccCheckGoogleOrganizationPolicyDestroy, CheckDestroy: testAccCheckGoogleOrganizationPolicyDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
{ {
Config: testAccGoogleOrganizationPolicy_list_allowSome(org, project), Config: testAccOrganizationPolicy_list_allowSome(org, project),
Check: testAccCheckGoogleOrganizationListPolicyAllowedValues("list", []string{project}), Check: testAccCheckGoogleOrganizationListPolicyAllowedValues("list", []string{project}),
}, },
{ {
@ -101,7 +101,7 @@ func TestAccGoogleOrganizationPolicy_list_allowSome(t *testing.T) {
}) })
} }
func TestAccGoogleOrganizationPolicy_list_denySome(t *testing.T) { func TestAccOrganizationPolicy_list_denySome(t *testing.T) {
org := getTestOrgFromEnv(t) org := getTestOrgFromEnv(t)
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
@ -109,7 +109,7 @@ func TestAccGoogleOrganizationPolicy_list_denySome(t *testing.T) {
CheckDestroy: testAccCheckGoogleOrganizationPolicyDestroy, CheckDestroy: testAccCheckGoogleOrganizationPolicyDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
{ {
Config: testAccGoogleOrganizationPolicy_list_denySome(org), Config: testAccOrganizationPolicy_list_denySome(org),
Check: testAccCheckGoogleOrganizationListPolicyDeniedValues("list", DENIED_ORG_POLICIES), Check: testAccCheckGoogleOrganizationListPolicyDeniedValues("list", DENIED_ORG_POLICIES),
}, },
{ {
@ -121,7 +121,7 @@ func TestAccGoogleOrganizationPolicy_list_denySome(t *testing.T) {
}) })
} }
func TestAccGoogleOrganizationPolicy_list_update(t *testing.T) { func TestAccOrganizationPolicy_list_update(t *testing.T) {
org := getTestOrgFromEnv(t) org := getTestOrgFromEnv(t)
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
@ -129,11 +129,11 @@ func TestAccGoogleOrganizationPolicy_list_update(t *testing.T) {
CheckDestroy: testAccCheckGoogleOrganizationPolicyDestroy, CheckDestroy: testAccCheckGoogleOrganizationPolicyDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
{ {
Config: testAccGoogleOrganizationPolicy_list_allowAll(org), Config: testAccOrganizationPolicy_list_allowAll(org),
Check: testAccCheckGoogleOrganizationListPolicyAll("list", "ALLOW"), Check: testAccCheckGoogleOrganizationListPolicyAll("list", "ALLOW"),
}, },
{ {
Config: testAccGoogleOrganizationPolicy_list_denySome(org), Config: testAccOrganizationPolicy_list_denySome(org),
Check: testAccCheckGoogleOrganizationListPolicyDeniedValues("list", DENIED_ORG_POLICIES), Check: testAccCheckGoogleOrganizationListPolicyDeniedValues("list", DENIED_ORG_POLICIES),
}, },
{ {
@ -256,7 +256,7 @@ func getGoogleOrganizationPolicyTestResource(s *terraform.State, n string) (*clo
}).Do() }).Do()
} }
func testAccGoogleOrganizationPolicy_boolean(org string, enforced bool) string { func testAccOrganizationPolicy_boolean(org string, enforced bool) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_organization_policy" "bool" { resource "google_organization_policy" "bool" {
org_id = "%s" org_id = "%s"
@ -269,7 +269,7 @@ resource "google_organization_policy" "bool" {
`, org, enforced) `, org, enforced)
} }
func testAccGoogleOrganizationPolicy_list_allowAll(org string) string { func testAccOrganizationPolicy_list_allowAll(org string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_organization_policy" "list" { resource "google_organization_policy" "list" {
org_id = "%s" org_id = "%s"
@ -284,7 +284,7 @@ resource "google_organization_policy" "list" {
`, org) `, org)
} }
func testAccGoogleOrganizationPolicy_list_allowSome(org, project string) string { func testAccOrganizationPolicy_list_allowSome(org, project string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_organization_policy" "list" { resource "google_organization_policy" "list" {
org_id = "%s" org_id = "%s"
@ -301,7 +301,7 @@ resource "google_organization_policy" "list" {
`, org, project) `, org, project)
} }
func testAccGoogleOrganizationPolicy_list_denySome(org string) string { func testAccOrganizationPolicy_list_denySome(org string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_organization_policy" "list" { resource "google_organization_policy" "list" {
org_id = "%s" org_id = "%s"

View File

@ -12,7 +12,7 @@ import (
) )
// Test that an IAM binding can be applied to a project // Test that an IAM binding can be applied to a project
func TestAccGoogleProjectIamBinding_basic(t *testing.T) { func TestAccProjectIamBinding_basic(t *testing.T) {
t.Parallel() t.Parallel()
org := getTestOrgFromEnv(t) org := getTestOrgFromEnv(t)
@ -23,14 +23,14 @@ func TestAccGoogleProjectIamBinding_basic(t *testing.T) {
Steps: []resource.TestStep{ Steps: []resource.TestStep{
// Create a new project // Create a new project
{ {
Config: testAccGoogleProject_create(pid, pname, org), Config: testAccProject_create(pid, pname, org),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccGoogleProjectExistingPolicy(pid), testAccProjectExistingPolicy(pid),
), ),
}, },
// Apply an IAM binding // Apply an IAM binding
{ {
Config: testAccGoogleProjectAssociateBindingBasic(pid, pname, org), Config: testAccProjectAssociateBindingBasic(pid, pname, org),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleProjectIamBindingExists("google_project_iam_binding.acceptance", &cloudresourcemanager.Binding{ testAccCheckGoogleProjectIamBindingExists("google_project_iam_binding.acceptance", &cloudresourcemanager.Binding{
Role: "roles/compute.instanceAdmin", Role: "roles/compute.instanceAdmin",
@ -43,7 +43,7 @@ func TestAccGoogleProjectIamBinding_basic(t *testing.T) {
} }
// Test that multiple IAM bindings can be applied to a project, one at a time // Test that multiple IAM bindings can be applied to a project, one at a time
func TestAccGoogleProjectIamBinding_multiple(t *testing.T) { func TestAccProjectIamBinding_multiple(t *testing.T) {
t.Parallel() t.Parallel()
org := getTestOrgFromEnv(t) org := getTestOrgFromEnv(t)
@ -54,14 +54,14 @@ func TestAccGoogleProjectIamBinding_multiple(t *testing.T) {
Steps: []resource.TestStep{ Steps: []resource.TestStep{
// Create a new project // Create a new project
{ {
Config: testAccGoogleProject_create(pid, pname, org), Config: testAccProject_create(pid, pname, org),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccGoogleProjectExistingPolicy(pid), testAccProjectExistingPolicy(pid),
), ),
}, },
// Apply an IAM binding // Apply an IAM binding
{ {
Config: testAccGoogleProjectAssociateBindingBasic(pid, pname, org), Config: testAccProjectAssociateBindingBasic(pid, pname, org),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleProjectIamBindingExists("google_project_iam_binding.acceptance", &cloudresourcemanager.Binding{ testAccCheckGoogleProjectIamBindingExists("google_project_iam_binding.acceptance", &cloudresourcemanager.Binding{
Role: "roles/compute.instanceAdmin", Role: "roles/compute.instanceAdmin",
@ -71,7 +71,7 @@ func TestAccGoogleProjectIamBinding_multiple(t *testing.T) {
}, },
// Apply another IAM binding // Apply another IAM binding
{ {
Config: testAccGoogleProjectAssociateBindingMultiple(pid, pname, org), Config: testAccProjectAssociateBindingMultiple(pid, pname, org),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleProjectIamBindingExists("google_project_iam_binding.multiple", &cloudresourcemanager.Binding{ testAccCheckGoogleProjectIamBindingExists("google_project_iam_binding.multiple", &cloudresourcemanager.Binding{
Role: "roles/viewer", Role: "roles/viewer",
@ -88,7 +88,7 @@ func TestAccGoogleProjectIamBinding_multiple(t *testing.T) {
} }
// Test that multiple IAM bindings can be applied to a project all at once // Test that multiple IAM bindings can be applied to a project all at once
func TestAccGoogleProjectIamBinding_multipleAtOnce(t *testing.T) { func TestAccProjectIamBinding_multipleAtOnce(t *testing.T) {
t.Parallel() t.Parallel()
org := getTestOrgFromEnv(t) org := getTestOrgFromEnv(t)
@ -99,14 +99,14 @@ func TestAccGoogleProjectIamBinding_multipleAtOnce(t *testing.T) {
Steps: []resource.TestStep{ Steps: []resource.TestStep{
// Create a new project // Create a new project
{ {
Config: testAccGoogleProject_create(pid, pname, org), Config: testAccProject_create(pid, pname, org),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccGoogleProjectExistingPolicy(pid), testAccProjectExistingPolicy(pid),
), ),
}, },
// Apply an IAM binding // Apply an IAM binding
{ {
Config: testAccGoogleProjectAssociateBindingMultiple(pid, pname, org), Config: testAccProjectAssociateBindingMultiple(pid, pname, org),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleProjectIamBindingExists("google_project_iam_binding.acceptance", &cloudresourcemanager.Binding{ testAccCheckGoogleProjectIamBindingExists("google_project_iam_binding.acceptance", &cloudresourcemanager.Binding{
Role: "roles/compute.instanceAdmin", Role: "roles/compute.instanceAdmin",
@ -123,7 +123,7 @@ func TestAccGoogleProjectIamBinding_multipleAtOnce(t *testing.T) {
} }
// Test that an IAM binding can be updated once applied to a project // Test that an IAM binding can be updated once applied to a project
func TestAccGoogleProjectIamBinding_update(t *testing.T) { func TestAccProjectIamBinding_update(t *testing.T) {
t.Parallel() t.Parallel()
org := getTestOrgFromEnv(t) org := getTestOrgFromEnv(t)
@ -134,14 +134,14 @@ func TestAccGoogleProjectIamBinding_update(t *testing.T) {
Steps: []resource.TestStep{ Steps: []resource.TestStep{
// Create a new project // Create a new project
{ {
Config: testAccGoogleProject_create(pid, pname, org), Config: testAccProject_create(pid, pname, org),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccGoogleProjectExistingPolicy(pid), testAccProjectExistingPolicy(pid),
), ),
}, },
// Apply an IAM binding // Apply an IAM binding
{ {
Config: testAccGoogleProjectAssociateBindingBasic(pid, pname, org), Config: testAccProjectAssociateBindingBasic(pid, pname, org),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleProjectIamBindingExists("google_project_iam_binding.acceptance", &cloudresourcemanager.Binding{ testAccCheckGoogleProjectIamBindingExists("google_project_iam_binding.acceptance", &cloudresourcemanager.Binding{
Role: "roles/compute.instanceAdmin", Role: "roles/compute.instanceAdmin",
@ -151,7 +151,7 @@ func TestAccGoogleProjectIamBinding_update(t *testing.T) {
}, },
// Apply an updated IAM binding // Apply an updated IAM binding
{ {
Config: testAccGoogleProjectAssociateBindingUpdated(pid, pname, org), Config: testAccProjectAssociateBindingUpdated(pid, pname, org),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleProjectIamBindingExists("google_project_iam_binding.updated", &cloudresourcemanager.Binding{ testAccCheckGoogleProjectIamBindingExists("google_project_iam_binding.updated", &cloudresourcemanager.Binding{
Role: "roles/compute.instanceAdmin", Role: "roles/compute.instanceAdmin",
@ -161,7 +161,7 @@ func TestAccGoogleProjectIamBinding_update(t *testing.T) {
}, },
// Drop the original member // Drop the original member
{ {
Config: testAccGoogleProjectAssociateBindingDropMemberFromBasic(pid, pname, org), Config: testAccProjectAssociateBindingDropMemberFromBasic(pid, pname, org),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleProjectIamBindingExists("google_project_iam_binding.dropped", &cloudresourcemanager.Binding{ testAccCheckGoogleProjectIamBindingExists("google_project_iam_binding.dropped", &cloudresourcemanager.Binding{
Role: "roles/compute.instanceAdmin", Role: "roles/compute.instanceAdmin",
@ -174,7 +174,7 @@ func TestAccGoogleProjectIamBinding_update(t *testing.T) {
} }
// Test that an IAM binding can be removed from a project // Test that an IAM binding can be removed from a project
func TestAccGoogleProjectIamBinding_remove(t *testing.T) { func TestAccProjectIamBinding_remove(t *testing.T) {
t.Parallel() t.Parallel()
org := getTestOrgFromEnv(t) org := getTestOrgFromEnv(t)
@ -185,14 +185,14 @@ func TestAccGoogleProjectIamBinding_remove(t *testing.T) {
Steps: []resource.TestStep{ Steps: []resource.TestStep{
// Create a new project // Create a new project
{ {
Config: testAccGoogleProject_create(pid, pname, org), Config: testAccProject_create(pid, pname, org),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccGoogleProjectExistingPolicy(pid), testAccProjectExistingPolicy(pid),
), ),
}, },
// Apply multiple IAM bindings // Apply multiple IAM bindings
{ {
Config: testAccGoogleProjectAssociateBindingMultiple(pid, pname, org), Config: testAccProjectAssociateBindingMultiple(pid, pname, org),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleProjectIamBindingExists("google_project_iam_binding.multiple", &cloudresourcemanager.Binding{ testAccCheckGoogleProjectIamBindingExists("google_project_iam_binding.multiple", &cloudresourcemanager.Binding{
Role: "roles/viewer", Role: "roles/viewer",
@ -206,9 +206,9 @@ func TestAccGoogleProjectIamBinding_remove(t *testing.T) {
}, },
// Remove the bindings // Remove the bindings
{ {
Config: testAccGoogleProject_create(pid, pname, org), Config: testAccProject_create(pid, pname, org),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccGoogleProjectExistingPolicy(pid), testAccProjectExistingPolicy(pid),
), ),
}, },
}, },
@ -247,7 +247,7 @@ func testAccCheckGoogleProjectIamBindingExists(key string, expected *cloudresour
} }
} }
func testAccGoogleProjectAssociateBindingBasic(pid, name, org string) string { func testAccProjectAssociateBindingBasic(pid, name, org string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_project" "acceptance" { resource "google_project" "acceptance" {
project_id = "%s" project_id = "%s"
@ -263,7 +263,7 @@ resource "google_project_iam_binding" "acceptance" {
`, pid, name, org) `, pid, name, org)
} }
func testAccGoogleProjectAssociateBindingMultiple(pid, name, org string) string { func testAccProjectAssociateBindingMultiple(pid, name, org string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_project" "acceptance" { resource "google_project" "acceptance" {
project_id = "%s" project_id = "%s"
@ -285,7 +285,7 @@ resource "google_project_iam_binding" "multiple" {
`, pid, name, org) `, pid, name, org)
} }
func testAccGoogleProjectAssociateBindingUpdated(pid, name, org string) string { func testAccProjectAssociateBindingUpdated(pid, name, org string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_project" "acceptance" { resource "google_project" "acceptance" {
project_id = "%s" project_id = "%s"
@ -301,7 +301,7 @@ resource "google_project_iam_binding" "acceptance" {
`, pid, name, org) `, pid, name, org)
} }
func testAccGoogleProjectAssociateBindingDropMemberFromBasic(pid, name, org string) string { func testAccProjectAssociateBindingDropMemberFromBasic(pid, name, org string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_project" "acceptance" { resource "google_project" "acceptance" {
project_id = "%s" project_id = "%s"

View File

@ -2,15 +2,16 @@ package google
import ( import (
"fmt" "fmt"
"github.com/hashicorp/terraform/helper/acctest"
"github.com/hashicorp/terraform/helper/resource"
"github.com/hashicorp/terraform/terraform"
"reflect" "reflect"
"sort" "sort"
"testing" "testing"
"github.com/hashicorp/terraform/helper/acctest"
"github.com/hashicorp/terraform/helper/resource"
"github.com/hashicorp/terraform/terraform"
) )
func TestAccGoogleProjectIamCustomRole_basic(t *testing.T) { func TestAccProjectIamCustomRole_basic(t *testing.T) {
t.Parallel() t.Parallel()
roleId := "tfIamCustomRole" + acctest.RandString(10) roleId := "tfIamCustomRole" + acctest.RandString(10)
@ -42,7 +43,7 @@ func TestAccGoogleProjectIamCustomRole_basic(t *testing.T) {
}) })
} }
func TestAccGoogleProjectIamCustomRole_undelete(t *testing.T) { func TestAccProjectIamCustomRole_undelete(t *testing.T) {
t.Parallel() t.Parallel()
roleId := "tfIamCustomRole" + acctest.RandString(10) roleId := "tfIamCustomRole" + acctest.RandString(10)

View File

@ -10,7 +10,7 @@ import (
) )
// Test that an IAM binding can be applied to a project // Test that an IAM binding can be applied to a project
func TestAccGoogleProjectIamMember_basic(t *testing.T) { func TestAccProjectIamMember_basic(t *testing.T) {
t.Parallel() t.Parallel()
org := getTestOrgFromEnv(t) org := getTestOrgFromEnv(t)
@ -21,14 +21,14 @@ func TestAccGoogleProjectIamMember_basic(t *testing.T) {
Steps: []resource.TestStep{ Steps: []resource.TestStep{
// Create a new project // Create a new project
{ {
Config: testAccGoogleProject_create(pid, pname, org), Config: testAccProject_create(pid, pname, org),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccGoogleProjectExistingPolicy(pid), testAccProjectExistingPolicy(pid),
), ),
}, },
// Apply an IAM binding // Apply an IAM binding
{ {
Config: testAccGoogleProjectAssociateMemberBasic(pid, pname, org), Config: testAccProjectAssociateMemberBasic(pid, pname, org),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleProjectIamBindingExists("google_project_iam_member.acceptance", &cloudresourcemanager.Binding{ testAccCheckGoogleProjectIamBindingExists("google_project_iam_member.acceptance", &cloudresourcemanager.Binding{
Role: "roles/compute.instanceAdmin", Role: "roles/compute.instanceAdmin",
@ -41,7 +41,7 @@ func TestAccGoogleProjectIamMember_basic(t *testing.T) {
} }
// Test that multiple IAM bindings can be applied to a project // Test that multiple IAM bindings can be applied to a project
func TestAccGoogleProjectIamMember_multiple(t *testing.T) { func TestAccProjectIamMember_multiple(t *testing.T) {
t.Parallel() t.Parallel()
org := getTestOrgFromEnv(t) org := getTestOrgFromEnv(t)
@ -54,14 +54,14 @@ func TestAccGoogleProjectIamMember_multiple(t *testing.T) {
Steps: []resource.TestStep{ Steps: []resource.TestStep{
// Create a new project // Create a new project
{ {
Config: testAccGoogleProject_create(pid, pname, org), Config: testAccProject_create(pid, pname, org),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccGoogleProjectExistingPolicy(pid), testAccProjectExistingPolicy(pid),
), ),
}, },
// Apply an IAM binding // Apply an IAM binding
{ {
Config: testAccGoogleProjectAssociateMemberBasic(pid, pname, org), Config: testAccProjectAssociateMemberBasic(pid, pname, org),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleProjectIamBindingExists("google_project_iam_member.acceptance", &cloudresourcemanager.Binding{ testAccCheckGoogleProjectIamBindingExists("google_project_iam_member.acceptance", &cloudresourcemanager.Binding{
Role: "roles/compute.instanceAdmin", Role: "roles/compute.instanceAdmin",
@ -71,7 +71,7 @@ func TestAccGoogleProjectIamMember_multiple(t *testing.T) {
}, },
// Apply another IAM binding // Apply another IAM binding
{ {
Config: testAccGoogleProjectAssociateMemberMultiple(pid, pname, org), Config: testAccProjectAssociateMemberMultiple(pid, pname, org),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleProjectIamBindingExists("google_project_iam_member.multiple", &cloudresourcemanager.Binding{ testAccCheckGoogleProjectIamBindingExists("google_project_iam_member.multiple", &cloudresourcemanager.Binding{
Role: "roles/compute.instanceAdmin", Role: "roles/compute.instanceAdmin",
@ -84,7 +84,7 @@ func TestAccGoogleProjectIamMember_multiple(t *testing.T) {
} }
// Test that an IAM binding can be removed from a project // Test that an IAM binding can be removed from a project
func TestAccGoogleProjectIamMember_remove(t *testing.T) { func TestAccProjectIamMember_remove(t *testing.T) {
t.Parallel() t.Parallel()
org := getTestOrgFromEnv(t) org := getTestOrgFromEnv(t)
@ -97,14 +97,14 @@ func TestAccGoogleProjectIamMember_remove(t *testing.T) {
Steps: []resource.TestStep{ Steps: []resource.TestStep{
// Create a new project // Create a new project
{ {
Config: testAccGoogleProject_create(pid, pname, org), Config: testAccProject_create(pid, pname, org),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccGoogleProjectExistingPolicy(pid), testAccProjectExistingPolicy(pid),
), ),
}, },
// Apply multiple IAM bindings // Apply multiple IAM bindings
{ {
Config: testAccGoogleProjectAssociateMemberMultiple(pid, pname, org), Config: testAccProjectAssociateMemberMultiple(pid, pname, org),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleProjectIamBindingExists("google_project_iam_member.acceptance", &cloudresourcemanager.Binding{ testAccCheckGoogleProjectIamBindingExists("google_project_iam_member.acceptance", &cloudresourcemanager.Binding{
Role: "roles/compute.instanceAdmin", Role: "roles/compute.instanceAdmin",
@ -114,16 +114,16 @@ func TestAccGoogleProjectIamMember_remove(t *testing.T) {
}, },
// Remove the bindings // Remove the bindings
{ {
Config: testAccGoogleProject_create(pid, pname, org), Config: testAccProject_create(pid, pname, org),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccGoogleProjectExistingPolicy(pid), testAccProjectExistingPolicy(pid),
), ),
}, },
}, },
}) })
} }
func testAccGoogleProjectAssociateMemberBasic(pid, name, org string) string { func testAccProjectAssociateMemberBasic(pid, name, org string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_project" "acceptance" { resource "google_project" "acceptance" {
project_id = "%s" project_id = "%s"
@ -139,7 +139,7 @@ resource "google_project_iam_member" "acceptance" {
`, pid, name, org) `, pid, name, org)
} }
func testAccGoogleProjectAssociateMemberMultiple(pid, name, org string) string { func testAccProjectAssociateMemberMultiple(pid, name, org string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_project" "acceptance" { resource "google_project" "acceptance" {
project_id = "%s" project_id = "%s"

View File

@ -221,7 +221,7 @@ func TestSubtractIamPolicy(t *testing.T) {
} }
// Test that an IAM policy can be applied to a project // Test that an IAM policy can be applied to a project
func TestAccGoogleProjectIamPolicy_basic(t *testing.T) { func TestAccProjectIamPolicy_basic(t *testing.T) {
t.Parallel() t.Parallel()
org := getTestOrgFromEnv(t) org := getTestOrgFromEnv(t)
@ -232,15 +232,15 @@ func TestAccGoogleProjectIamPolicy_basic(t *testing.T) {
Steps: []resource.TestStep{ Steps: []resource.TestStep{
// Create a new project // Create a new project
resource.TestStep{ resource.TestStep{
Config: testAccGoogleProject_create(pid, pname, org), Config: testAccProject_create(pid, pname, org),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccGoogleProjectExistingPolicy(pid), testAccProjectExistingPolicy(pid),
), ),
}, },
// Apply an IAM policy from a data source. The application // Apply an IAM policy from a data source. The application
// merges policies, so we validate the expected state. // merges policies, so we validate the expected state.
resource.TestStep{ resource.TestStep{
Config: testAccGoogleProjectAssociatePolicyBasic(pid, pname, org), Config: testAccProjectAssociatePolicyBasic(pid, pname, org),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleProjectIamPolicyIsMerged("google_project_iam_policy.acceptance", "data.google_iam_policy.admin", pid), testAccCheckGoogleProjectIamPolicyIsMerged("google_project_iam_policy.acceptance", "data.google_iam_policy.admin", pid),
), ),
@ -248,9 +248,9 @@ func TestAccGoogleProjectIamPolicy_basic(t *testing.T) {
// Finally, remove the custom IAM policy from config and apply, then // Finally, remove the custom IAM policy from config and apply, then
// confirm that the project is in its original state. // confirm that the project is in its original state.
resource.TestStep{ resource.TestStep{
Config: testAccGoogleProject_create(pid, pname, org), Config: testAccProject_create(pid, pname, org),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccGoogleProjectExistingPolicy(pid), testAccProjectExistingPolicy(pid),
), ),
}, },
}, },
@ -258,7 +258,7 @@ func TestAccGoogleProjectIamPolicy_basic(t *testing.T) {
} }
// Test that an IAM policy can be applied to a project when no project is set in the resource // Test that an IAM policy can be applied to a project when no project is set in the resource
func TestAccGoogleProjectIamPolicy_defaultProject(t *testing.T) { func TestAccProjectIamPolicy_defaultProject(t *testing.T) {
t.Parallel() t.Parallel()
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
@ -267,15 +267,15 @@ func TestAccGoogleProjectIamPolicy_defaultProject(t *testing.T) {
Steps: []resource.TestStep{ Steps: []resource.TestStep{
// Create a new project // Create a new project
resource.TestStep{ resource.TestStep{
Config: testAccGoogleProjectDefaultAssociatePolicyBasic(), Config: testAccProjectDefaultAssociatePolicyBasic(),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccGoogleProjectExistingPolicy(getTestProjectFromEnv()), testAccProjectExistingPolicy(getTestProjectFromEnv()),
), ),
}, },
// Apply an IAM policy from a data source. The application // Apply an IAM policy from a data source. The application
// merges policies, so we validate the expected state. // merges policies, so we validate the expected state.
resource.TestStep{ resource.TestStep{
Config: testAccGoogleProjectDefaultAssociatePolicyBasic(), Config: testAccProjectDefaultAssociatePolicyBasic(),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleProjectIamPolicyIsMerged("google_project_iam_policy.acceptance", "data.google_iam_policy.admin", getTestProjectFromEnv()), testAccCheckGoogleProjectIamPolicyIsMerged("google_project_iam_policy.acceptance", "data.google_iam_policy.admin", getTestProjectFromEnv()),
), ),
@ -285,7 +285,7 @@ func TestAccGoogleProjectIamPolicy_defaultProject(t *testing.T) {
} }
// Test that a non-collapsed IAM policy doesn't perpetually diff // Test that a non-collapsed IAM policy doesn't perpetually diff
func TestAccGoogleProjectIamPolicy_expanded(t *testing.T) { func TestAccProjectIamPolicy_expanded(t *testing.T) {
t.Parallel() t.Parallel()
org := getTestOrgFromEnv(t) org := getTestOrgFromEnv(t)
@ -295,7 +295,7 @@ func TestAccGoogleProjectIamPolicy_expanded(t *testing.T) {
Providers: testAccProviders, Providers: testAccProviders,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testAccGoogleProjectAssociatePolicyExpanded(pid, pname, org), Config: testAccProjectAssociatePolicyExpanded(pid, pname, org),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleProjectIamPolicyExists("google_project_iam_policy.acceptance", "data.google_iam_policy.expanded", pid), testAccCheckGoogleProjectIamPolicyExists("google_project_iam_policy.acceptance", "data.google_iam_policy.expanded", pid),
), ),
@ -647,7 +647,7 @@ func derefBindings(b []*cloudresourcemanager.Binding) []cloudresourcemanager.Bin
} }
// Confirm that a project has an IAM policy with at least 1 binding // Confirm that a project has an IAM policy with at least 1 binding
func testAccGoogleProjectExistingPolicy(pid string) resource.TestCheckFunc { func testAccProjectExistingPolicy(pid string) resource.TestCheckFunc {
return func(s *terraform.State) error { return func(s *terraform.State) error {
c := testAccProvider.Meta().(*Config) c := testAccProvider.Meta().(*Config)
var err error var err error
@ -662,7 +662,7 @@ func testAccGoogleProjectExistingPolicy(pid string) resource.TestCheckFunc {
} }
} }
func testAccGoogleProjectDefaultAssociatePolicyBasic() string { func testAccProjectDefaultAssociatePolicyBasic() string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_project_iam_policy" "acceptance" { resource "google_project_iam_policy" "acceptance" {
policy_data = "${data.google_iam_policy.admin.policy_data}" policy_data = "${data.google_iam_policy.admin.policy_data}"
@ -685,7 +685,7 @@ data "google_iam_policy" "admin" {
`) `)
} }
func testAccGoogleProjectAssociatePolicyBasic(pid, name, org string) string { func testAccProjectAssociatePolicyBasic(pid, name, org string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_project" "acceptance" { resource "google_project" "acceptance" {
project_id = "%s" project_id = "%s"
@ -714,7 +714,7 @@ data "google_iam_policy" "admin" {
`, pid, name, org) `, pid, name, org)
} }
func testAccGoogleProject_createWithoutOrg(pid, name string) string { func testAccProject_createWithoutOrg(pid, name string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_project" "acceptance" { resource "google_project" "acceptance" {
project_id = "%s" project_id = "%s"
@ -722,7 +722,7 @@ resource "google_project" "acceptance" {
}`, pid, name) }`, pid, name)
} }
func testAccGoogleProject_create(pid, name, org string) string { func testAccProject_create(pid, name, org string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_project" "acceptance" { resource "google_project" "acceptance" {
project_id = "%s" project_id = "%s"
@ -731,7 +731,7 @@ resource "google_project" "acceptance" {
}`, pid, name, org) }`, pid, name, org)
} }
func testAccGoogleProject_createBilling(pid, name, org, billing string) string { func testAccProject_createBilling(pid, name, org, billing string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_project" "acceptance" { resource "google_project" "acceptance" {
project_id = "%s" project_id = "%s"
@ -741,7 +741,7 @@ resource "google_project" "acceptance" {
}`, pid, name, org, billing) }`, pid, name, org, billing)
} }
func testAccGoogleProjectAssociatePolicyExpanded(pid, name, org string) string { func testAccProjectAssociatePolicyExpanded(pid, name, org string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_project" "acceptance" { resource "google_project" "acceptance" {
project_id = "%s" project_id = "%s"

View File

@ -10,7 +10,7 @@ import (
) )
// Test that services can be enabled and disabled on a project // Test that services can be enabled and disabled on a project
func TestAccGoogleProjectService_basic(t *testing.T) { func TestAccProjectService_basic(t *testing.T) {
t.Parallel() t.Parallel()
org := getTestOrgFromEnv(t) org := getTestOrgFromEnv(t)
@ -21,28 +21,28 @@ func TestAccGoogleProjectService_basic(t *testing.T) {
Providers: testAccProviders, Providers: testAccProviders,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testAccGoogleProjectService_basic(services, pid, pname, org), Config: testAccProjectService_basic(services, pid, pname, org),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckProjectService(services, pid, true), testAccCheckProjectService(services, pid, true),
), ),
}, },
// Use a separate TestStep rather than a CheckDestroy because we need the project to still exist. // Use a separate TestStep rather than a CheckDestroy because we need the project to still exist.
resource.TestStep{ resource.TestStep{
Config: testAccGoogleProject_create(pid, pname, org), Config: testAccProject_create(pid, pname, org),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckProjectService(services, pid, false), testAccCheckProjectService(services, pid, false),
), ),
}, },
// Create services with disabling turned off. // Create services with disabling turned off.
resource.TestStep{ resource.TestStep{
Config: testAccGoogleProjectService_noDisable(services, pid, pname, org), Config: testAccProjectService_noDisable(services, pid, pname, org),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckProjectService(services, pid, true), testAccCheckProjectService(services, pid, true),
), ),
}, },
// Check that services are still enabled even after the resources are deleted. // Check that services are still enabled even after the resources are deleted.
resource.TestStep{ resource.TestStep{
Config: testAccGoogleProject_create(pid, pname, org), Config: testAccProject_create(pid, pname, org),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckProjectService(services, pid, true), testAccCheckProjectService(services, pid, true),
), ),
@ -79,7 +79,7 @@ func testAccCheckProjectService(services []string, pid string, expectEnabled boo
} }
} }
func testAccGoogleProjectService_basic(services []string, pid, name, org string) string { func testAccProjectService_basic(services []string, pid, name, org string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_project" "acceptance" { resource "google_project" "acceptance" {
project_id = "%s" project_id = "%s"
@ -99,7 +99,7 @@ resource "google_project_service" "test2" {
`, pid, name, org, services[0], services[1]) `, pid, name, org, services[0], services[1])
} }
func testAccGoogleProjectService_noDisable(services []string, pid, name, org string) string { func testAccProjectService_noDisable(services []string, pid, name, org string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_project" "acceptance" { resource "google_project" "acceptance" {
project_id = "%s" project_id = "%s"

View File

@ -14,7 +14,7 @@ import (
) )
// Test that services can be enabled and disabled on a project // Test that services can be enabled and disabled on a project
func TestAccGoogleProjectServices_basic(t *testing.T) { func TestAccProjectServices_basic(t *testing.T) {
t.Parallel() t.Parallel()
org := getTestOrgFromEnv(t) org := getTestOrgFromEnv(t)
@ -28,14 +28,14 @@ func TestAccGoogleProjectServices_basic(t *testing.T) {
Steps: []resource.TestStep{ Steps: []resource.TestStep{
// Create a new project with some services // Create a new project with some services
resource.TestStep{ resource.TestStep{
Config: testAccGoogleProjectAssociateServicesBasic(services1, pid, pname, org), Config: testAccProjectAssociateServicesBasic(services1, pid, pname, org),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testProjectServicesMatch(services1, pid), testProjectServicesMatch(services1, pid),
), ),
}, },
// Update services to remove one // Update services to remove one
resource.TestStep{ resource.TestStep{
Config: testAccGoogleProjectAssociateServicesBasic(services2, pid, pname, org), Config: testAccProjectAssociateServicesBasic(services2, pid, pname, org),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testProjectServicesMatch(services2, pid), testProjectServicesMatch(services2, pid),
), ),
@ -46,7 +46,7 @@ func TestAccGoogleProjectServices_basic(t *testing.T) {
config := testAccProvider.Meta().(*Config) config := testAccProvider.Meta().(*Config)
enableService(oobService, pid, config) enableService(oobService, pid, config)
}, },
Config: testAccGoogleProjectAssociateServicesBasic(services2, pid, pname, org), Config: testAccProjectAssociateServicesBasic(services2, pid, pname, org),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testProjectServicesMatch(services2, pid), testProjectServicesMatch(services2, pid),
), ),
@ -57,7 +57,7 @@ func TestAccGoogleProjectServices_basic(t *testing.T) {
// Test that services are authoritative when a project has existing // Test that services are authoritative when a project has existing
// sevices not represented in config // sevices not represented in config
func TestAccGoogleProjectServices_authoritative(t *testing.T) { func TestAccProjectServices_authoritative(t *testing.T) {
t.Parallel() t.Parallel()
org := getTestOrgFromEnv(t) org := getTestOrgFromEnv(t)
@ -70,7 +70,7 @@ func TestAccGoogleProjectServices_authoritative(t *testing.T) {
Steps: []resource.TestStep{ Steps: []resource.TestStep{
// Create a new project with no services // Create a new project with no services
resource.TestStep{ resource.TestStep{
Config: testAccGoogleProject_create(pid, pname, org), Config: testAccProject_create(pid, pname, org),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleProjectExists("google_project.acceptance", pid), testAccCheckGoogleProjectExists("google_project.acceptance", pid),
), ),
@ -82,7 +82,7 @@ func TestAccGoogleProjectServices_authoritative(t *testing.T) {
config := testAccProvider.Meta().(*Config) config := testAccProvider.Meta().(*Config)
enableService(oobService, pid, config) enableService(oobService, pid, config)
}, },
Config: testAccGoogleProjectAssociateServicesBasic(services, pid, pname, org), Config: testAccProjectAssociateServicesBasic(services, pid, pname, org),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testProjectServicesMatch(services, pid), testProjectServicesMatch(services, pid),
), ),
@ -94,7 +94,7 @@ func TestAccGoogleProjectServices_authoritative(t *testing.T) {
// Test that services are authoritative when a project has existing // Test that services are authoritative when a project has existing
// sevices, some which are represented in the config and others // sevices, some which are represented in the config and others
// that are not // that are not
func TestAccGoogleProjectServices_authoritative2(t *testing.T) { func TestAccProjectServices_authoritative2(t *testing.T) {
t.Parallel() t.Parallel()
org := getTestOrgFromEnv(t) org := getTestOrgFromEnv(t)
@ -108,7 +108,7 @@ func TestAccGoogleProjectServices_authoritative2(t *testing.T) {
Steps: []resource.TestStep{ Steps: []resource.TestStep{
// Create a new project with no services // Create a new project with no services
resource.TestStep{ resource.TestStep{
Config: testAccGoogleProject_create(pid, pname, org), Config: testAccProject_create(pid, pname, org),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleProjectExists("google_project.acceptance", pid), testAccCheckGoogleProjectExists("google_project.acceptance", pid),
), ),
@ -122,7 +122,7 @@ func TestAccGoogleProjectServices_authoritative2(t *testing.T) {
enableService(s, pid, config) enableService(s, pid, config)
} }
}, },
Config: testAccGoogleProjectAssociateServicesBasic(services, pid, pname, org), Config: testAccProjectAssociateServicesBasic(services, pid, pname, org),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testProjectServicesMatch(services, pid), testProjectServicesMatch(services, pid),
), ),
@ -134,7 +134,7 @@ func TestAccGoogleProjectServices_authoritative2(t *testing.T) {
// Test that services that can't be enabled on their own (such as dataproc-control.googleapis.com) // Test that services that can't be enabled on their own (such as dataproc-control.googleapis.com)
// don't end up causing diffs when they are enabled as a side-effect of a different service's // don't end up causing diffs when they are enabled as a side-effect of a different service's
// enablement. // enablement.
func TestAccGoogleProjectServices_ignoreUnenablableServices(t *testing.T) { func TestAccProjectServices_ignoreUnenablableServices(t *testing.T) {
t.Parallel() t.Parallel()
org := getTestOrgFromEnv(t) org := getTestOrgFromEnv(t)
@ -160,7 +160,7 @@ func TestAccGoogleProjectServices_ignoreUnenablableServices(t *testing.T) {
Providers: testAccProviders, Providers: testAccProviders,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testAccGoogleProjectAssociateServicesBasic_withBilling(services, pid, pname, org, billingId), Config: testAccProjectAssociateServicesBasic_withBilling(services, pid, pname, org, billingId),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testProjectServicesMatch(services, pid), testProjectServicesMatch(services, pid),
), ),
@ -169,7 +169,7 @@ func TestAccGoogleProjectServices_ignoreUnenablableServices(t *testing.T) {
}) })
} }
func TestAccGoogleProjectServices_manyServices(t *testing.T) { func TestAccProjectServices_manyServices(t *testing.T) {
t.Parallel() t.Parallel()
org := getTestOrgFromEnv(t) org := getTestOrgFromEnv(t)
@ -211,7 +211,7 @@ func TestAccGoogleProjectServices_manyServices(t *testing.T) {
Providers: testAccProviders, Providers: testAccProviders,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testAccGoogleProjectAssociateServicesBasic_withBilling(services, pid, pname, org, billingId), Config: testAccProjectAssociateServicesBasic_withBilling(services, pid, pname, org, billingId),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testProjectServicesMatch(services, pid), testProjectServicesMatch(services, pid),
), ),
@ -220,7 +220,7 @@ func TestAccGoogleProjectServices_manyServices(t *testing.T) {
}) })
} }
func testAccGoogleProjectAssociateServicesBasic(services []string, pid, name, org string) string { func testAccProjectAssociateServicesBasic(services []string, pid, name, org string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_project" "acceptance" { resource "google_project" "acceptance" {
project_id = "%s" project_id = "%s"
@ -234,7 +234,7 @@ resource "google_project_services" "acceptance" {
`, pid, name, org, testStringsToString(services)) `, pid, name, org, testStringsToString(services))
} }
func testAccGoogleProjectAssociateServicesBasic_withBilling(services []string, pid, name, org, billing string) string { func testAccProjectAssociateServicesBasic_withBilling(services []string, pid, name, org, billing string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_project" "acceptance" { resource "google_project" "acceptance" {
project_id = "%s" project_id = "%s"

View File

@ -21,7 +21,7 @@ var (
) )
// Test that a Project resource can be created without an organization // Test that a Project resource can be created without an organization
func TestAccGoogleProject_createWithoutOrg(t *testing.T) { func TestAccProject_createWithoutOrg(t *testing.T) {
t.Parallel() t.Parallel()
creds := multiEnvSearch(credsEnvVars) creds := multiEnvSearch(credsEnvVars)
@ -36,7 +36,7 @@ func TestAccGoogleProject_createWithoutOrg(t *testing.T) {
Steps: []resource.TestStep{ Steps: []resource.TestStep{
// This step creates a new project // This step creates a new project
resource.TestStep{ resource.TestStep{
Config: testAccGoogleProject_createWithoutOrg(pid, pname), Config: testAccProject_createWithoutOrg(pid, pname),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleProjectExists("google_project.acceptance", pid), testAccCheckGoogleProjectExists("google_project.acceptance", pid),
), ),
@ -47,7 +47,7 @@ func TestAccGoogleProject_createWithoutOrg(t *testing.T) {
// Test that a Project resource can be created and an IAM policy // Test that a Project resource can be created and an IAM policy
// associated // associated
func TestAccGoogleProject_create(t *testing.T) { func TestAccProject_create(t *testing.T) {
t.Parallel() t.Parallel()
org := getTestOrgFromEnv(t) org := getTestOrgFromEnv(t)
@ -58,7 +58,7 @@ func TestAccGoogleProject_create(t *testing.T) {
Steps: []resource.TestStep{ Steps: []resource.TestStep{
// This step creates a new project // This step creates a new project
resource.TestStep{ resource.TestStep{
Config: testAccGoogleProject_create(pid, pname, org), Config: testAccProject_create(pid, pname, org),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleProjectExists("google_project.acceptance", pid), testAccCheckGoogleProjectExists("google_project.acceptance", pid),
), ),
@ -69,7 +69,7 @@ func TestAccGoogleProject_create(t *testing.T) {
// Test that a Project resource can be created with an associated // Test that a Project resource can be created with an associated
// billing account // billing account
func TestAccGoogleProject_billing(t *testing.T) { func TestAccProject_billing(t *testing.T) {
t.Parallel() t.Parallel()
org := getTestOrgFromEnv(t) org := getTestOrgFromEnv(t)
skipIfEnvNotSet(t, "GOOGLE_BILLING_ACCOUNT_2") skipIfEnvNotSet(t, "GOOGLE_BILLING_ACCOUNT_2")
@ -82,7 +82,7 @@ func TestAccGoogleProject_billing(t *testing.T) {
Steps: []resource.TestStep{ Steps: []resource.TestStep{
// This step creates a new project with a billing account // This step creates a new project with a billing account
resource.TestStep{ resource.TestStep{
Config: testAccGoogleProject_createBilling(pid, pname, org, billingId), Config: testAccProject_createBilling(pid, pname, org, billingId),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleProjectHasBillingAccount("google_project.acceptance", pid, billingId), testAccCheckGoogleProjectHasBillingAccount("google_project.acceptance", pid, billingId),
), ),
@ -95,14 +95,14 @@ func TestAccGoogleProject_billing(t *testing.T) {
}, },
// Update to a different billing account // Update to a different billing account
resource.TestStep{ resource.TestStep{
Config: testAccGoogleProject_createBilling(pid, pname, org, billingId2), Config: testAccProject_createBilling(pid, pname, org, billingId2),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleProjectHasBillingAccount("google_project.acceptance", pid, billingId2), testAccCheckGoogleProjectHasBillingAccount("google_project.acceptance", pid, billingId2),
), ),
}, },
// Unlink the billing account // Unlink the billing account
resource.TestStep{ resource.TestStep{
Config: testAccGoogleProject_create(pid, pname, org), Config: testAccProject_create(pid, pname, org),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleProjectHasBillingAccount("google_project.acceptance", pid, ""), testAccCheckGoogleProjectHasBillingAccount("google_project.acceptance", pid, ""),
), ),
@ -112,7 +112,7 @@ func TestAccGoogleProject_billing(t *testing.T) {
} }
// Test that a Project resource can be created with labels // Test that a Project resource can be created with labels
func TestAccGoogleProject_labels(t *testing.T) { func TestAccProject_labels(t *testing.T) {
t.Parallel() t.Parallel()
org := getTestOrgFromEnv(t) org := getTestOrgFromEnv(t)
@ -122,7 +122,7 @@ func TestAccGoogleProject_labels(t *testing.T) {
Providers: testAccProviders, Providers: testAccProviders,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
{ {
Config: testAccGoogleProject_labels(pid, pname, org, map[string]string{"test": "that"}), Config: testAccProject_labels(pid, pname, org, map[string]string{"test": "that"}),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleProjectHasLabels("google_project.acceptance", pid, map[string]string{"test": "that"}), testAccCheckGoogleProjectHasLabels("google_project.acceptance", pid, map[string]string{"test": "that"}),
), ),
@ -135,7 +135,7 @@ func TestAccGoogleProject_labels(t *testing.T) {
}, },
// update project with labels // update project with labels
{ {
Config: testAccGoogleProject_labels(pid, pname, org, map[string]string{"label": "label-value"}), Config: testAccProject_labels(pid, pname, org, map[string]string{"label": "label-value"}),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleProjectExists("google_project.acceptance", pid), testAccCheckGoogleProjectExists("google_project.acceptance", pid),
testAccCheckGoogleProjectHasLabels("google_project.acceptance", pid, map[string]string{"label": "label-value"}), testAccCheckGoogleProjectHasLabels("google_project.acceptance", pid, map[string]string{"label": "label-value"}),
@ -143,7 +143,7 @@ func TestAccGoogleProject_labels(t *testing.T) {
}, },
// update project delete labels // update project delete labels
{ {
Config: testAccGoogleProject_create(pid, pname, org), Config: testAccProject_create(pid, pname, org),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleProjectExists("google_project.acceptance", pid), testAccCheckGoogleProjectExists("google_project.acceptance", pid),
testAccCheckGoogleProjectHasNoLabels("google_project.acceptance", pid), testAccCheckGoogleProjectHasNoLabels("google_project.acceptance", pid),
@ -269,7 +269,7 @@ func testAccCheckGoogleProjectHasNoLabels(r, pid string) resource.TestCheckFunc
} }
} }
func testAccGoogleProject_labels(pid, name, org string, labels map[string]string) string { func testAccProject_labels(pid, name, org string, labels map[string]string) string {
r := fmt.Sprintf(` r := fmt.Sprintf(`
resource "google_project" "acceptance" { resource "google_project" "acceptance" {
project_id = "%s" project_id = "%s"

View File

@ -2,15 +2,16 @@ package google
import ( import (
"fmt" "fmt"
"github.com/hashicorp/terraform/helper/acctest"
"github.com/hashicorp/terraform/helper/resource"
"github.com/hashicorp/terraform/terraform"
"reflect" "reflect"
"sort" "sort"
"testing" "testing"
"github.com/hashicorp/terraform/helper/acctest"
"github.com/hashicorp/terraform/helper/resource"
"github.com/hashicorp/terraform/terraform"
) )
func TestAccGoogleServiceAccountIamBinding(t *testing.T) { func TestAccServiceAccountIamBinding(t *testing.T) {
t.Parallel() t.Parallel()
account := acctest.RandomWithPrefix("tf-test") account := acctest.RandomWithPrefix("tf-test")
@ -20,7 +21,7 @@ func TestAccGoogleServiceAccountIamBinding(t *testing.T) {
Providers: testAccProviders, Providers: testAccProviders,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
{ {
Config: testAccGoogleServiceAccountIamBinding_basic(account), Config: testAccServiceAccountIamBinding_basic(account),
Check: testAccCheckGoogleServiceAccountIam(account, "roles/viewer", []string{ Check: testAccCheckGoogleServiceAccountIam(account, "roles/viewer", []string{
fmt.Sprintf("serviceAccount:%s@%s.iam.gserviceaccount.com", account, getTestProjectFromEnv()), fmt.Sprintf("serviceAccount:%s@%s.iam.gserviceaccount.com", account, getTestProjectFromEnv()),
}), }),
@ -34,7 +35,7 @@ func TestAccGoogleServiceAccountIamBinding(t *testing.T) {
}) })
} }
func TestAccGoogleServiceAccountIamMember(t *testing.T) { func TestAccServiceAccountIamMember(t *testing.T) {
t.Parallel() t.Parallel()
account := acctest.RandomWithPrefix("tf-test") account := acctest.RandomWithPrefix("tf-test")
@ -45,7 +46,7 @@ func TestAccGoogleServiceAccountIamMember(t *testing.T) {
Providers: testAccProviders, Providers: testAccProviders,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
{ {
Config: testAccGoogleServiceAccountIamMember_basic(account), Config: testAccServiceAccountIamMember_basic(account),
Check: testAccCheckGoogleServiceAccountIam(account, "roles/editor", []string{identity}), Check: testAccCheckGoogleServiceAccountIam(account, "roles/editor", []string{identity}),
}, },
{ {
@ -57,7 +58,7 @@ func TestAccGoogleServiceAccountIamMember(t *testing.T) {
}) })
} }
func TestAccGoogleServiceAccountIamPolicy(t *testing.T) { func TestAccServiceAccountIamPolicy(t *testing.T) {
t.Parallel() t.Parallel()
account := acctest.RandomWithPrefix("tf-test") account := acctest.RandomWithPrefix("tf-test")
@ -67,7 +68,7 @@ func TestAccGoogleServiceAccountIamPolicy(t *testing.T) {
Providers: testAccProviders, Providers: testAccProviders,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
{ {
Config: testAccGoogleServiceAccountIamPolicy_basic(account), Config: testAccServiceAccountIamPolicy_basic(account),
Check: testAccCheckGoogleServiceAccountIam(account, "roles/owner", []string{ Check: testAccCheckGoogleServiceAccountIam(account, "roles/owner", []string{
fmt.Sprintf("serviceAccount:%s@%s.iam.gserviceaccount.com", account, getTestProjectFromEnv()), fmt.Sprintf("serviceAccount:%s@%s.iam.gserviceaccount.com", account, getTestProjectFromEnv()),
}), }),
@ -110,7 +111,7 @@ func getServiceAccountCanonicalId(account string) string {
return fmt.Sprintf("projects/%s/serviceAccounts/%s@%s.iam.gserviceaccount.com", getTestProjectFromEnv(), account, getTestProjectFromEnv()) return fmt.Sprintf("projects/%s/serviceAccounts/%s@%s.iam.gserviceaccount.com", getTestProjectFromEnv(), account, getTestProjectFromEnv())
} }
func testAccGoogleServiceAccountIamBinding_basic(account string) string { func testAccServiceAccountIamBinding_basic(account string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_service_account" "test_account" { resource "google_service_account" "test_account" {
account_id = "%s" account_id = "%s"
@ -125,7 +126,7 @@ resource "google_service_account_iam_binding" "foo" {
`, account) `, account)
} }
func testAccGoogleServiceAccountIamMember_basic(account string) string { func testAccServiceAccountIamMember_basic(account string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_service_account" "test_account" { resource "google_service_account" "test_account" {
account_id = "%s" account_id = "%s"
@ -140,7 +141,7 @@ resource "google_service_account_iam_member" "foo" {
`, account) `, account)
} }
func testAccGoogleServiceAccountIamPolicy_basic(account string) string { func testAccServiceAccountIamPolicy_basic(account string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_service_account" "test_account" { resource "google_service_account" "test_account" {
account_id = "%s" account_id = "%s"

View File

@ -10,7 +10,7 @@ import (
) )
// Test that a service account key can be created and destroyed // Test that a service account key can be created and destroyed
func TestAccGoogleServiceAccountKey_basic(t *testing.T) { func TestAccServiceAccountKey_basic(t *testing.T) {
t.Parallel() t.Parallel()
resourceName := "google_service_account_key.acceptance" resourceName := "google_service_account_key.acceptance"
@ -21,7 +21,7 @@ func TestAccGoogleServiceAccountKey_basic(t *testing.T) {
Providers: testAccProviders, Providers: testAccProviders,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testAccGoogleServiceAccountKey(accountID, displayName), Config: testAccServiceAccountKey(accountID, displayName),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleServiceAccountKeyExists(resourceName), testAccCheckGoogleServiceAccountKeyExists(resourceName),
resource.TestCheckResourceAttrSet(resourceName, "public_key"), resource.TestCheckResourceAttrSet(resourceName, "public_key"),
@ -34,7 +34,7 @@ func TestAccGoogleServiceAccountKey_basic(t *testing.T) {
}) })
} }
func TestAccGoogleServiceAccountKey_pgp(t *testing.T) { func TestAccServiceAccountKey_pgp(t *testing.T) {
t.Parallel() t.Parallel()
resourceName := "google_service_account_key.acceptance" resourceName := "google_service_account_key.acceptance"
accountID := "a" + acctest.RandString(10) accountID := "a" + acctest.RandString(10)
@ -44,7 +44,7 @@ func TestAccGoogleServiceAccountKey_pgp(t *testing.T) {
Providers: testAccProviders, Providers: testAccProviders,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testAccGoogleServiceAccountKey_pgp(accountID, displayName, testKeyPairPubKey1), Config: testAccServiceAccountKey_pgp(accountID, displayName, testKeyPairPubKey1),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleServiceAccountKeyExists(resourceName), testAccCheckGoogleServiceAccountKeyExists(resourceName),
resource.TestCheckResourceAttrSet(resourceName, "public_key"), resource.TestCheckResourceAttrSet(resourceName, "public_key"),
@ -78,7 +78,7 @@ func testAccCheckGoogleServiceAccountKeyExists(r string) resource.TestCheckFunc
} }
} }
func testAccGoogleServiceAccountKey(account, name string) string { func testAccServiceAccountKey(account, name string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_service_account" "acceptance" { resource "google_service_account" "acceptance" {
account_id = "%s" account_id = "%s"
@ -92,7 +92,7 @@ resource "google_service_account_key" "acceptance" {
`, account, name) `, account, name)
} }
func testAccGoogleServiceAccountKey_pgp(account, name string, key string) string { func testAccServiceAccountKey_pgp(account, name string, key string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_service_account" "acceptance" { resource "google_service_account" "acceptance" {
account_id = "%s" account_id = "%s"

View File

@ -10,7 +10,7 @@ import (
) )
// Test that a service account resource can be created, updated, and destroyed // Test that a service account resource can be created, updated, and destroyed
func TestAccGoogleServiceAccount_basic(t *testing.T) { func TestAccServiceAccount_basic(t *testing.T) {
t.Parallel() t.Parallel()
accountId := "a" + acctest.RandString(10) accountId := "a" + acctest.RandString(10)
@ -24,7 +24,7 @@ func TestAccGoogleServiceAccount_basic(t *testing.T) {
Steps: []resource.TestStep{ Steps: []resource.TestStep{
// The first step creates a basic service account // The first step creates a basic service account
resource.TestStep{ resource.TestStep{
Config: testAccGoogleServiceAccountBasic(accountId, displayName), Config: testAccServiceAccountBasic(accountId, displayName),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleServiceAccountExists("google_service_account.acceptance"), testAccCheckGoogleServiceAccountExists("google_service_account.acceptance"),
resource.TestCheckResourceAttr( resource.TestCheckResourceAttr(
@ -33,7 +33,7 @@ func TestAccGoogleServiceAccount_basic(t *testing.T) {
}, },
// The second step updates the service account // The second step updates the service account
resource.TestStep{ resource.TestStep{
Config: testAccGoogleServiceAccountBasic(accountId, displayName2), Config: testAccServiceAccountBasic(accountId, displayName2),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleServiceAccountNameModified("google_service_account.acceptance", displayName2), testAccCheckGoogleServiceAccountNameModified("google_service_account.acceptance", displayName2),
resource.TestCheckResourceAttr( resource.TestCheckResourceAttr(
@ -44,7 +44,7 @@ func TestAccGoogleServiceAccount_basic(t *testing.T) {
// The third step explicitely adds the same default project to the service account configuration // The third step explicitely adds the same default project to the service account configuration
// and ensure the service account is not recreated by comparing the value of its unique_id with the one from the previous step // and ensure the service account is not recreated by comparing the value of its unique_id with the one from the previous step
resource.TestStep{ resource.TestStep{
Config: testAccGoogleServiceAccountWithProject(project, accountId, displayName2), Config: testAccServiceAccountWithProject(project, accountId, displayName2),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleServiceAccountNameModified("google_service_account.acceptance", displayName2), testAccCheckGoogleServiceAccountNameModified("google_service_account.acceptance", displayName2),
resource.TestCheckResourceAttr( resource.TestCheckResourceAttr(
@ -59,7 +59,7 @@ func TestAccGoogleServiceAccount_basic(t *testing.T) {
// Test that a service account resource can be created with a policy, updated, // Test that a service account resource can be created with a policy, updated,
// and destroyed. // and destroyed.
func TestAccGoogleServiceAccount_createPolicy(t *testing.T) { func TestAccServiceAccount_createPolicy(t *testing.T) {
t.Parallel() t.Parallel()
accountId := "a" + acctest.RandString(10) accountId := "a" + acctest.RandString(10)
@ -70,21 +70,21 @@ func TestAccGoogleServiceAccount_createPolicy(t *testing.T) {
Steps: []resource.TestStep{ Steps: []resource.TestStep{
// The first step creates a basic service account with an IAM policy // The first step creates a basic service account with an IAM policy
resource.TestStep{ resource.TestStep{
Config: testAccGoogleServiceAccountPolicy(accountId, getTestProjectFromEnv()), Config: testAccServiceAccountPolicy(accountId, getTestProjectFromEnv()),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleServiceAccountPolicyCount("google_service_account.acceptance", 1), testAccCheckGoogleServiceAccountPolicyCount("google_service_account.acceptance", 1),
), ),
}, },
// The second step updates the service account with no IAM policy // The second step updates the service account with no IAM policy
resource.TestStep{ resource.TestStep{
Config: testAccGoogleServiceAccountBasic(accountId, displayName), Config: testAccServiceAccountBasic(accountId, displayName),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleServiceAccountPolicyCount("google_service_account.acceptance", 0), testAccCheckGoogleServiceAccountPolicyCount("google_service_account.acceptance", 0),
), ),
}, },
// The final step re-applies the IAM policy // The final step re-applies the IAM policy
resource.TestStep{ resource.TestStep{
Config: testAccGoogleServiceAccountPolicy(accountId, getTestProjectFromEnv()), Config: testAccServiceAccountPolicy(accountId, getTestProjectFromEnv()),
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckGoogleServiceAccountPolicyCount("google_service_account.acceptance", 1), testAccCheckGoogleServiceAccountPolicyCount("google_service_account.acceptance", 1),
), ),
@ -144,7 +144,7 @@ func testAccCheckGoogleServiceAccountNameModified(r, n string) resource.TestChec
} }
} }
func testAccGoogleServiceAccountBasic(account, name string) string { func testAccServiceAccountBasic(account, name string) string {
t := `resource "google_service_account" "acceptance" { t := `resource "google_service_account" "acceptance" {
account_id = "%v" account_id = "%v"
display_name = "%v" display_name = "%v"
@ -152,7 +152,7 @@ func testAccGoogleServiceAccountBasic(account, name string) string {
return fmt.Sprintf(t, account, name) return fmt.Sprintf(t, account, name)
} }
func testAccGoogleServiceAccountWithProject(project, account, name string) string { func testAccServiceAccountWithProject(project, account, name string) string {
t := `resource "google_service_account" "acceptance" { t := `resource "google_service_account" "acceptance" {
project = "%v" project = "%v"
account_id = "%v" account_id = "%v"
@ -161,7 +161,7 @@ func testAccGoogleServiceAccountWithProject(project, account, name string) strin
return fmt.Sprintf(t, project, account, name) return fmt.Sprintf(t, project, account, name)
} }
func testAccGoogleServiceAccountPolicy(account, project string) string { func testAccServiceAccountPolicy(account, project string) string {
t := `resource "google_service_account" "acceptance" { t := `resource "google_service_account" "acceptance" {
account_id = "%v" account_id = "%v"

View File

@ -2,15 +2,16 @@ package google
import ( import (
"fmt" "fmt"
"github.com/hashicorp/terraform/helper/acctest"
"github.com/hashicorp/terraform/helper/resource"
"github.com/hashicorp/terraform/terraform"
"reflect" "reflect"
"sort" "sort"
"testing" "testing"
"github.com/hashicorp/terraform/helper/acctest"
"github.com/hashicorp/terraform/helper/resource"
"github.com/hashicorp/terraform/terraform"
) )
func TestAccGoogleKmsCryptoKeyIamBinding(t *testing.T) { func TestAccKmsCryptoKeyIamBinding(t *testing.T) {
t.Parallel() t.Parallel()
orgId := getTestOrgFromEnv(t) orgId := getTestOrgFromEnv(t)
@ -27,14 +28,14 @@ func TestAccGoogleKmsCryptoKeyIamBinding(t *testing.T) {
Steps: []resource.TestStep{ Steps: []resource.TestStep{
{ {
// Test Iam Binding creation // Test Iam Binding creation
Config: testAccGoogleKmsCryptoKeyIamBinding_basic(projectId, orgId, billingAccount, account, keyRingName, cryptoKeyName, roleId), Config: testAccKmsCryptoKeyIamBinding_basic(projectId, orgId, billingAccount, account, keyRingName, cryptoKeyName, roleId),
Check: testAccCheckGoogleKmsCryptoKeyIamBindingExists("foo", roleId, []string{ Check: testAccCheckGoogleKmsCryptoKeyIamBindingExists("foo", roleId, []string{
fmt.Sprintf("serviceAccount:%s@%s.iam.gserviceaccount.com", account, projectId), fmt.Sprintf("serviceAccount:%s@%s.iam.gserviceaccount.com", account, projectId),
}), }),
}, },
{ {
// Test Iam Binding update // Test Iam Binding update
Config: testAccGoogleKmsCryptoKeyIamBinding_update(projectId, orgId, billingAccount, account, keyRingName, cryptoKeyName, roleId), Config: testAccKmsCryptoKeyIamBinding_update(projectId, orgId, billingAccount, account, keyRingName, cryptoKeyName, roleId),
Check: testAccCheckGoogleKmsCryptoKeyIamBindingExists("foo", roleId, []string{ Check: testAccCheckGoogleKmsCryptoKeyIamBindingExists("foo", roleId, []string{
fmt.Sprintf("serviceAccount:%s@%s.iam.gserviceaccount.com", account, projectId), fmt.Sprintf("serviceAccount:%s@%s.iam.gserviceaccount.com", account, projectId),
fmt.Sprintf("serviceAccount:%s-2@%s.iam.gserviceaccount.com", account, projectId), fmt.Sprintf("serviceAccount:%s-2@%s.iam.gserviceaccount.com", account, projectId),
@ -44,7 +45,7 @@ func TestAccGoogleKmsCryptoKeyIamBinding(t *testing.T) {
}) })
} }
func TestAccGoogleKmsCryptoKeyIamMember(t *testing.T) { func TestAccKmsCryptoKeyIamMember(t *testing.T) {
t.Parallel() t.Parallel()
orgId := getTestOrgFromEnv(t) orgId := getTestOrgFromEnv(t)
@ -61,7 +62,7 @@ func TestAccGoogleKmsCryptoKeyIamMember(t *testing.T) {
Steps: []resource.TestStep{ Steps: []resource.TestStep{
{ {
// Test Iam Member creation (no update for member, no need to test) // Test Iam Member creation (no update for member, no need to test)
Config: testAccGoogleKmsCryptoKeyIamMember_basic(projectId, orgId, billingAccount, account, keyRingName, cryptoKeyName, roleId), Config: testAccKmsCryptoKeyIamMember_basic(projectId, orgId, billingAccount, account, keyRingName, cryptoKeyName, roleId),
Check: testAccCheckGoogleKmsCryptoKeyIamMemberExists("foo", roleId, Check: testAccCheckGoogleKmsCryptoKeyIamMemberExists("foo", roleId,
fmt.Sprintf("serviceAccount:%s@%s.iam.gserviceaccount.com", account, projectId), fmt.Sprintf("serviceAccount:%s@%s.iam.gserviceaccount.com", account, projectId),
), ),
@ -143,7 +144,7 @@ func testAccCheckGoogleKmsCryptoKeyIamMemberExists(n, role, member string) resou
// We are using a custom role since iam_binding is authoritative on the member list and // We are using a custom role since iam_binding is authoritative on the member list and
// we want to avoid removing members from an existing role to prevent unwanted side effects. // we want to avoid removing members from an existing role to prevent unwanted side effects.
func testAccGoogleKmsCryptoKeyIamBinding_basic(projectId, orgId, billingAccount, account, keyRingName, cryptoKeyName, roleId string) string { func testAccKmsCryptoKeyIamBinding_basic(projectId, orgId, billingAccount, account, keyRingName, cryptoKeyName, roleId string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_project" "test_project" { resource "google_project" "test_project" {
name = "Test project" name = "Test project"
@ -186,7 +187,7 @@ resource "google_kms_crypto_key_iam_binding" "foo" {
`, projectId, orgId, billingAccount, account, keyRingName, cryptoKeyName, roleId) `, projectId, orgId, billingAccount, account, keyRingName, cryptoKeyName, roleId)
} }
func testAccGoogleKmsCryptoKeyIamBinding_update(projectId, orgId, billingAccount, account, keyRingName, cryptoKeyName, roleId string) string { func testAccKmsCryptoKeyIamBinding_update(projectId, orgId, billingAccount, account, keyRingName, cryptoKeyName, roleId string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_project" "test_project" { resource "google_project" "test_project" {
name = "Test project" name = "Test project"
@ -238,7 +239,7 @@ resource "google_kms_crypto_key_iam_binding" "foo" {
`, projectId, orgId, billingAccount, account, account, keyRingName, cryptoKeyName, roleId) `, projectId, orgId, billingAccount, account, account, keyRingName, cryptoKeyName, roleId)
} }
func testAccGoogleKmsCryptoKeyIamMember_basic(projectId, orgId, billingAccount, account, keyRingName, cryptoKeyName, roleId string) string { func testAccKmsCryptoKeyIamMember_basic(projectId, orgId, billingAccount, account, keyRingName, cryptoKeyName, roleId string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_project" "test_project" { resource "google_project" "test_project" {
name = "Test project" name = "Test project"

View File

@ -104,7 +104,7 @@ func TestCryptoKeyNextRotationCalculation_validation(t *testing.T) {
} }
} }
func TestAccGoogleKmsCryptoKey_basic(t *testing.T) { func TestAccKmsCryptoKey_basic(t *testing.T) {
t.Parallel() t.Parallel()
projectId := "terraform-" + acctest.RandString(10) projectId := "terraform-" + acctest.RandString(10)
@ -136,7 +136,7 @@ func TestAccGoogleKmsCryptoKey_basic(t *testing.T) {
}) })
} }
func TestAccGoogleKmsCryptoKey_rotation(t *testing.T) { func TestAccKmsCryptoKey_rotation(t *testing.T) {
t.Parallel() t.Parallel()
projectId := "terraform-" + acctest.RandString(10) projectId := "terraform-" + acctest.RandString(10)

View File

@ -2,17 +2,18 @@ package google
import ( import (
"fmt" "fmt"
"github.com/hashicorp/terraform/helper/acctest"
"github.com/hashicorp/terraform/helper/resource"
"github.com/hashicorp/terraform/terraform"
"reflect" "reflect"
"sort" "sort"
"testing" "testing"
"github.com/hashicorp/terraform/helper/acctest"
"github.com/hashicorp/terraform/helper/resource"
"github.com/hashicorp/terraform/terraform"
) )
const DEFAULT_KMS_TEST_LOCATION = "us-central1" const DEFAULT_KMS_TEST_LOCATION = "us-central1"
func TestAccGoogleKmsKeyRingIamBinding(t *testing.T) { func TestAccKmsKeyRingIamBinding(t *testing.T) {
t.Parallel() t.Parallel()
orgId := getTestOrgFromEnv(t) orgId := getTestOrgFromEnv(t)
@ -34,14 +35,14 @@ func TestAccGoogleKmsKeyRingIamBinding(t *testing.T) {
Steps: []resource.TestStep{ Steps: []resource.TestStep{
{ {
// Test Iam Binding creation // Test Iam Binding creation
Config: testAccGoogleKmsKeyRingIamBinding_basic(projectId, orgId, billingAccount, account, keyRingName, roleId), Config: testAccKmsKeyRingIamBinding_basic(projectId, orgId, billingAccount, account, keyRingName, roleId),
Check: testAccCheckGoogleKmsKeyRingIam(keyRingId.keyRingId(), roleId, []string{ Check: testAccCheckGoogleKmsKeyRingIam(keyRingId.keyRingId(), roleId, []string{
fmt.Sprintf("serviceAccount:%s@%s.iam.gserviceaccount.com", account, projectId), fmt.Sprintf("serviceAccount:%s@%s.iam.gserviceaccount.com", account, projectId),
}), }),
}, },
{ {
// Test Iam Binding update // Test Iam Binding update
Config: testAccGoogleKmsKeyRingIamBinding_update(projectId, orgId, billingAccount, account, keyRingName, roleId), Config: testAccKmsKeyRingIamBinding_update(projectId, orgId, billingAccount, account, keyRingName, roleId),
Check: testAccCheckGoogleKmsKeyRingIam(keyRingId.keyRingId(), roleId, []string{ Check: testAccCheckGoogleKmsKeyRingIam(keyRingId.keyRingId(), roleId, []string{
fmt.Sprintf("serviceAccount:%s@%s.iam.gserviceaccount.com", account, projectId), fmt.Sprintf("serviceAccount:%s@%s.iam.gserviceaccount.com", account, projectId),
fmt.Sprintf("serviceAccount:%s-2@%s.iam.gserviceaccount.com", account, projectId), fmt.Sprintf("serviceAccount:%s-2@%s.iam.gserviceaccount.com", account, projectId),
@ -51,7 +52,7 @@ func TestAccGoogleKmsKeyRingIamBinding(t *testing.T) {
}) })
} }
func TestAccGoogleKmsKeyRingIamMember(t *testing.T) { func TestAccKmsKeyRingIamMember(t *testing.T) {
t.Parallel() t.Parallel()
orgId := getTestOrgFromEnv(t) orgId := getTestOrgFromEnv(t)
@ -73,7 +74,7 @@ func TestAccGoogleKmsKeyRingIamMember(t *testing.T) {
Steps: []resource.TestStep{ Steps: []resource.TestStep{
{ {
// Test Iam Member creation (no update for member, no need to test) // Test Iam Member creation (no update for member, no need to test)
Config: testAccGoogleKmsKeyRingIamMember_basic(projectId, orgId, billingAccount, account, keyRingName, roleId), Config: testAccKmsKeyRingIamMember_basic(projectId, orgId, billingAccount, account, keyRingName, roleId),
Check: testAccCheckGoogleKmsKeyRingIam(keyRingId.keyRingId(), roleId, []string{ Check: testAccCheckGoogleKmsKeyRingIam(keyRingId.keyRingId(), roleId, []string{
fmt.Sprintf("serviceAccount:%s@%s.iam.gserviceaccount.com", account, projectId), fmt.Sprintf("serviceAccount:%s@%s.iam.gserviceaccount.com", account, projectId),
}), }),
@ -82,7 +83,7 @@ func TestAccGoogleKmsKeyRingIamMember(t *testing.T) {
}) })
} }
func TestAccGoogleKmsKeyRingIamPolicy(t *testing.T) { func TestAccKmsKeyRingIamPolicy(t *testing.T) {
t.Parallel() t.Parallel()
orgId := getTestOrgFromEnv(t) orgId := getTestOrgFromEnv(t)
@ -103,7 +104,7 @@ func TestAccGoogleKmsKeyRingIamPolicy(t *testing.T) {
Providers: testAccProviders, Providers: testAccProviders,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
{ {
Config: testAccGoogleKmsKeyRingIamPolicy_basic(projectId, orgId, billingAccount, account, keyRingName, roleId), Config: testAccKmsKeyRingIamPolicy_basic(projectId, orgId, billingAccount, account, keyRingName, roleId),
Check: testAccCheckGoogleKmsKeyRingIam(keyRingId.keyRingId(), roleId, []string{ Check: testAccCheckGoogleKmsKeyRingIam(keyRingId.keyRingId(), roleId, []string{
fmt.Sprintf("serviceAccount:%s@%s.iam.gserviceaccount.com", account, projectId), fmt.Sprintf("serviceAccount:%s@%s.iam.gserviceaccount.com", account, projectId),
}), }),
@ -139,7 +140,7 @@ func testAccCheckGoogleKmsKeyRingIam(keyRingId, role string, members []string) r
// We are using a custom role since iam_binding is authoritative on the member list and // We are using a custom role since iam_binding is authoritative on the member list and
// we want to avoid removing members from an existing role to prevent unwanted side effects. // we want to avoid removing members from an existing role to prevent unwanted side effects.
func testAccGoogleKmsKeyRingIamBinding_basic(projectId, orgId, billingAccount, account, keyRingName, roleId string) string { func testAccKmsKeyRingIamBinding_basic(projectId, orgId, billingAccount, account, keyRingName, roleId string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_project" "test_project" { resource "google_project" "test_project" {
name = "Test project" name = "Test project"
@ -177,7 +178,7 @@ resource "google_kms_key_ring_iam_binding" "foo" {
`, projectId, orgId, billingAccount, account, keyRingName, roleId) `, projectId, orgId, billingAccount, account, keyRingName, roleId)
} }
func testAccGoogleKmsKeyRingIamBinding_update(projectId, orgId, billingAccount, account, keyRingName, roleId string) string { func testAccKmsKeyRingIamBinding_update(projectId, orgId, billingAccount, account, keyRingName, roleId string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_project" "test_project" { resource "google_project" "test_project" {
name = "Test project" name = "Test project"
@ -224,7 +225,7 @@ resource "google_kms_key_ring_iam_binding" "foo" {
`, projectId, orgId, billingAccount, account, account, DEFAULT_KMS_TEST_LOCATION, keyRingName, roleId) `, projectId, orgId, billingAccount, account, account, DEFAULT_KMS_TEST_LOCATION, keyRingName, roleId)
} }
func testAccGoogleKmsKeyRingIamMember_basic(projectId, orgId, billingAccount, account, keyRingName, roleId string) string { func testAccKmsKeyRingIamMember_basic(projectId, orgId, billingAccount, account, keyRingName, roleId string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_project" "test_project" { resource "google_project" "test_project" {
name = "Test project" name = "Test project"
@ -262,7 +263,7 @@ resource "google_kms_key_ring_iam_member" "foo" {
`, projectId, orgId, billingAccount, account, DEFAULT_KMS_TEST_LOCATION, keyRingName, roleId) `, projectId, orgId, billingAccount, account, DEFAULT_KMS_TEST_LOCATION, keyRingName, roleId)
} }
func testAccGoogleKmsKeyRingIamPolicy_basic(projectId, orgId, billingAccount, account, keyRingName, roleId string) string { func testAccKmsKeyRingIamPolicy_basic(projectId, orgId, billingAccount, account, keyRingName, roleId string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_project" "test_project" { resource "google_project" "test_project" {
name = "Test project" name = "Test project"

View File

@ -2,12 +2,12 @@ package google
import ( import (
"fmt" "fmt"
"log"
"testing" "testing"
"github.com/hashicorp/terraform/helper/acctest" "github.com/hashicorp/terraform/helper/acctest"
"github.com/hashicorp/terraform/helper/resource" "github.com/hashicorp/terraform/helper/resource"
"github.com/hashicorp/terraform/terraform" "github.com/hashicorp/terraform/terraform"
"log"
) )
func TestKeyRingIdParsing(t *testing.T) { func TestKeyRingIdParsing(t *testing.T) {
@ -66,7 +66,7 @@ func TestKeyRingIdParsing(t *testing.T) {
} }
} }
func TestAccGoogleKmsKeyRing_basic(t *testing.T) { func TestAccKmsKeyRing_basic(t *testing.T) {
projectId := "terraform-" + acctest.RandString(10) projectId := "terraform-" + acctest.RandString(10)
projectOrg := getTestOrgFromEnv(t) projectOrg := getTestOrgFromEnv(t)
projectBillingAccount := getTestBillingAccountFromEnv(t) projectBillingAccount := getTestBillingAccountFromEnv(t)

View File

@ -139,7 +139,7 @@ func testSweepDatabases(region string) error {
return nil return nil
} }
func TestAccGoogleSqlDatabaseInstance_basic(t *testing.T) { func TestAccSqlDatabaseInstance_basic(t *testing.T) {
t.Parallel() t.Parallel()
var instance sqladmin.DatabaseInstance var instance sqladmin.DatabaseInstance
@ -148,7 +148,7 @@ func TestAccGoogleSqlDatabaseInstance_basic(t *testing.T) {
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testAccGoogleSqlDatabaseInstanceDestroy, CheckDestroy: testAccSqlDatabaseInstanceDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: fmt.Sprintf( Config: fmt.Sprintf(
@ -164,7 +164,7 @@ func TestAccGoogleSqlDatabaseInstance_basic(t *testing.T) {
}) })
} }
func TestAccGoogleSqlDatabaseInstance_basic2(t *testing.T) { func TestAccSqlDatabaseInstance_basic2(t *testing.T) {
t.Parallel() t.Parallel()
var instance sqladmin.DatabaseInstance var instance sqladmin.DatabaseInstance
@ -172,7 +172,7 @@ func TestAccGoogleSqlDatabaseInstance_basic2(t *testing.T) {
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testAccGoogleSqlDatabaseInstanceDestroy, CheckDestroy: testAccSqlDatabaseInstanceDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testGoogleSqlDatabaseInstance_basic2, Config: testGoogleSqlDatabaseInstance_basic2,
@ -187,7 +187,7 @@ func TestAccGoogleSqlDatabaseInstance_basic2(t *testing.T) {
}) })
} }
func TestAccGoogleSqlDatabaseInstance_basic3(t *testing.T) { func TestAccSqlDatabaseInstance_basic3(t *testing.T) {
t.Parallel() t.Parallel()
var instance sqladmin.DatabaseInstance var instance sqladmin.DatabaseInstance
@ -196,7 +196,7 @@ func TestAccGoogleSqlDatabaseInstance_basic3(t *testing.T) {
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testAccGoogleSqlDatabaseInstanceDestroy, CheckDestroy: testAccSqlDatabaseInstanceDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: fmt.Sprintf( Config: fmt.Sprintf(
@ -214,7 +214,7 @@ func TestAccGoogleSqlDatabaseInstance_basic3(t *testing.T) {
}) })
} }
func TestAccGoogleSqlDatabaseInstance_dontDeleteDefaultUserOnReplica(t *testing.T) { func TestAccSqlDatabaseInstance_dontDeleteDefaultUserOnReplica(t *testing.T) {
t.Parallel() t.Parallel()
var instance sqladmin.DatabaseInstance var instance sqladmin.DatabaseInstance
@ -227,7 +227,7 @@ func TestAccGoogleSqlDatabaseInstance_dontDeleteDefaultUserOnReplica(t *testing.
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testAccGoogleSqlDatabaseInstanceDestroy, CheckDestroy: testAccSqlDatabaseInstanceDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testGoogleSqlDatabaseInstanceConfig_withoutReplica(databaseName), Config: testGoogleSqlDatabaseInstanceConfig_withoutReplica(databaseName),
@ -263,7 +263,7 @@ func TestAccGoogleSqlDatabaseInstance_dontDeleteDefaultUserOnReplica(t *testing.
}) })
} }
func TestAccGoogleSqlDatabaseInstance_settings_basic(t *testing.T) { func TestAccSqlDatabaseInstance_settings_basic(t *testing.T) {
t.Parallel() t.Parallel()
var instance sqladmin.DatabaseInstance var instance sqladmin.DatabaseInstance
@ -272,7 +272,7 @@ func TestAccGoogleSqlDatabaseInstance_settings_basic(t *testing.T) {
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testAccGoogleSqlDatabaseInstanceDestroy, CheckDestroy: testAccSqlDatabaseInstanceDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: fmt.Sprintf( Config: fmt.Sprintf(
@ -288,7 +288,7 @@ func TestAccGoogleSqlDatabaseInstance_settings_basic(t *testing.T) {
}) })
} }
func TestAccGoogleSqlDatabaseInstance_slave(t *testing.T) { func TestAccSqlDatabaseInstance_slave(t *testing.T) {
t.Parallel() t.Parallel()
var instance sqladmin.DatabaseInstance var instance sqladmin.DatabaseInstance
@ -298,7 +298,7 @@ func TestAccGoogleSqlDatabaseInstance_slave(t *testing.T) {
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testAccGoogleSqlDatabaseInstanceDestroy, CheckDestroy: testAccSqlDatabaseInstanceDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: fmt.Sprintf( Config: fmt.Sprintf(
@ -318,7 +318,7 @@ func TestAccGoogleSqlDatabaseInstance_slave(t *testing.T) {
}) })
} }
func TestAccGoogleSqlDatabaseInstance_highAvailability(t *testing.T) { func TestAccSqlDatabaseInstance_highAvailability(t *testing.T) {
t.Parallel() t.Parallel()
var instance sqladmin.DatabaseInstance var instance sqladmin.DatabaseInstance
@ -327,7 +327,7 @@ func TestAccGoogleSqlDatabaseInstance_highAvailability(t *testing.T) {
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testAccGoogleSqlDatabaseInstanceDestroy, CheckDestroy: testAccSqlDatabaseInstanceDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: fmt.Sprintf( Config: fmt.Sprintf(
@ -352,7 +352,7 @@ func TestAccGoogleSqlDatabaseInstance_highAvailability(t *testing.T) {
}) })
} }
func TestAccGoogleSqlDatabaseInstance_diskspecs(t *testing.T) { func TestAccSqlDatabaseInstance_diskspecs(t *testing.T) {
t.Parallel() t.Parallel()
var instance sqladmin.DatabaseInstance var instance sqladmin.DatabaseInstance
@ -361,7 +361,7 @@ func TestAccGoogleSqlDatabaseInstance_diskspecs(t *testing.T) {
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testAccGoogleSqlDatabaseInstanceDestroy, CheckDestroy: testAccSqlDatabaseInstanceDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: fmt.Sprintf( Config: fmt.Sprintf(
@ -377,7 +377,7 @@ func TestAccGoogleSqlDatabaseInstance_diskspecs(t *testing.T) {
}) })
} }
func TestAccGoogleSqlDatabaseInstance_maintenance(t *testing.T) { func TestAccSqlDatabaseInstance_maintenance(t *testing.T) {
t.Parallel() t.Parallel()
var instance sqladmin.DatabaseInstance var instance sqladmin.DatabaseInstance
@ -386,7 +386,7 @@ func TestAccGoogleSqlDatabaseInstance_maintenance(t *testing.T) {
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testAccGoogleSqlDatabaseInstanceDestroy, CheckDestroy: testAccSqlDatabaseInstanceDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: fmt.Sprintf( Config: fmt.Sprintf(
@ -402,7 +402,7 @@ func TestAccGoogleSqlDatabaseInstance_maintenance(t *testing.T) {
}) })
} }
func TestAccGoogleSqlDatabaseInstance_settings_upgrade(t *testing.T) { func TestAccSqlDatabaseInstance_settings_upgrade(t *testing.T) {
t.Parallel() t.Parallel()
var instance sqladmin.DatabaseInstance var instance sqladmin.DatabaseInstance
@ -411,7 +411,7 @@ func TestAccGoogleSqlDatabaseInstance_settings_upgrade(t *testing.T) {
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testAccGoogleSqlDatabaseInstanceDestroy, CheckDestroy: testAccSqlDatabaseInstanceDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: fmt.Sprintf( Config: fmt.Sprintf(
@ -437,7 +437,7 @@ func TestAccGoogleSqlDatabaseInstance_settings_upgrade(t *testing.T) {
}) })
} }
func TestAccGoogleSqlDatabaseInstance_settingsDowngrade(t *testing.T) { func TestAccSqlDatabaseInstance_settingsDowngrade(t *testing.T) {
t.Parallel() t.Parallel()
var instance sqladmin.DatabaseInstance var instance sqladmin.DatabaseInstance
@ -446,7 +446,7 @@ func TestAccGoogleSqlDatabaseInstance_settingsDowngrade(t *testing.T) {
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testAccGoogleSqlDatabaseInstanceDestroy, CheckDestroy: testAccSqlDatabaseInstanceDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: fmt.Sprintf( Config: fmt.Sprintf(
@ -473,7 +473,7 @@ func TestAccGoogleSqlDatabaseInstance_settingsDowngrade(t *testing.T) {
} }
// GH-4222 // GH-4222
func TestAccGoogleSqlDatabaseInstance_authNets(t *testing.T) { func TestAccSqlDatabaseInstance_authNets(t *testing.T) {
t.Parallel( t.Parallel(
// var instance sqladmin.DatabaseInstance // var instance sqladmin.DatabaseInstance
) )
@ -483,7 +483,7 @@ func TestAccGoogleSqlDatabaseInstance_authNets(t *testing.T) {
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testAccGoogleSqlDatabaseInstanceDestroy, CheckDestroy: testAccSqlDatabaseInstanceDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: fmt.Sprintf( Config: fmt.Sprintf(
@ -503,7 +503,7 @@ func TestAccGoogleSqlDatabaseInstance_authNets(t *testing.T) {
// Tests that a SQL instance can be referenced from more than one other resource without // Tests that a SQL instance can be referenced from more than one other resource without
// throwing an error during provisioning, see #9018. // throwing an error during provisioning, see #9018.
func TestAccGoogleSqlDatabaseInstance_multipleOperations(t *testing.T) { func TestAccSqlDatabaseInstance_multipleOperations(t *testing.T) {
t.Parallel() t.Parallel()
databaseID, instanceID, userID := acctest.RandString(8), acctest.RandString(8), acctest.RandString(8) databaseID, instanceID, userID := acctest.RandString(8), acctest.RandString(8), acctest.RandString(8)
@ -511,7 +511,7 @@ func TestAccGoogleSqlDatabaseInstance_multipleOperations(t *testing.T) {
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testAccGoogleSqlDatabaseInstanceDestroy, CheckDestroy: testAccSqlDatabaseInstanceDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: fmt.Sprintf( Config: fmt.Sprintf(
@ -725,7 +725,7 @@ func testAccCheckGoogleSqlDatabaseInstanceExists(n string,
} }
} }
func testAccGoogleSqlDatabaseInstanceDestroy(s *terraform.State) error { func testAccSqlDatabaseInstanceDestroy(s *terraform.State) error {
for _, rs := range s.RootModule().Resources { for _, rs := range s.RootModule().Resources {
config := testAccProvider.Meta().(*Config) config := testAccProvider.Meta().(*Config)
if rs.Type != "google_sql_database_instance" { if rs.Type != "google_sql_database_instance" {

View File

@ -11,7 +11,7 @@ import (
"google.golang.org/api/sqladmin/v1beta4" "google.golang.org/api/sqladmin/v1beta4"
) )
func TestAccGoogleSqlDatabase_basic(t *testing.T) { func TestAccSqlDatabase_basic(t *testing.T) {
t.Parallel() t.Parallel()
var database sqladmin.Database var database sqladmin.Database
@ -19,7 +19,7 @@ func TestAccGoogleSqlDatabase_basic(t *testing.T) {
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testAccGoogleSqlDatabaseDestroy, CheckDestroy: testAccSqlDatabaseDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: fmt.Sprintf( Config: fmt.Sprintf(
@ -35,7 +35,7 @@ func TestAccGoogleSqlDatabase_basic(t *testing.T) {
}) })
} }
func TestAccGoogleSqlDatabase_update(t *testing.T) { func TestAccSqlDatabase_update(t *testing.T) {
t.Parallel() t.Parallel()
var database sqladmin.Database var database sqladmin.Database
@ -46,7 +46,7 @@ func TestAccGoogleSqlDatabase_update(t *testing.T) {
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testAccGoogleSqlDatabaseDestroy, CheckDestroy: testAccSqlDatabaseDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: fmt.Sprintf( Config: fmt.Sprintf(
@ -129,7 +129,7 @@ func testAccCheckGoogleSqlDatabaseExists(n string,
} }
} }
func testAccGoogleSqlDatabaseDestroy(s *terraform.State) error { func testAccSqlDatabaseDestroy(s *terraform.State) error {
for _, rs := range s.RootModule().Resources { for _, rs := range s.RootModule().Resources {
config := testAccProvider.Meta().(*Config) config := testAccProvider.Meta().(*Config)
if rs.Type != "google_sql_database" { if rs.Type != "google_sql_database" {

View File

@ -9,14 +9,14 @@ import (
"github.com/hashicorp/terraform/terraform" "github.com/hashicorp/terraform/terraform"
) )
func TestAccGoogleSqlUser_firstGen(t *testing.T) { func TestAccSqlUser_firstGen(t *testing.T) {
t.Parallel() t.Parallel()
instance := acctest.RandomWithPrefix("i") instance := acctest.RandomWithPrefix("i")
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testAccGoogleSqlUserDestroy, CheckDestroy: testAccSqlUserDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testGoogleSqlUser_firstGen(instance, "password"), Config: testGoogleSqlUser_firstGen(instance, "password"),
@ -44,14 +44,14 @@ func TestAccGoogleSqlUser_firstGen(t *testing.T) {
}) })
} }
func TestAccGoogleSqlUser_secondGen(t *testing.T) { func TestAccSqlUser_secondGen(t *testing.T) {
t.Parallel() t.Parallel()
instance := acctest.RandomWithPrefix("i") instance := acctest.RandomWithPrefix("i")
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testAccGoogleSqlUserDestroy, CheckDestroy: testAccSqlUserDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testGoogleSqlUser_secondGen(instance, "password"), Config: testGoogleSqlUser_secondGen(instance, "password"),
@ -100,7 +100,7 @@ func testAccCheckGoogleSqlUserExists(n string) resource.TestCheckFunc {
} }
} }
func testAccGoogleSqlUserDestroy(s *terraform.State) error { func testAccSqlUserDestroy(s *terraform.State) error {
for _, rs := range s.RootModule().Resources { for _, rs := range s.RootModule().Resources {
config := testAccProvider.Meta().(*Config) config := testAccProvider.Meta().(*Config)
if rs.Type != "google_sql_database" { if rs.Type != "google_sql_database" {

View File

@ -25,7 +25,7 @@ func testBucketName() string {
return fmt.Sprintf("%s-%d", "tf-test-acl-bucket", acctest.RandInt()) return fmt.Sprintf("%s-%d", "tf-test-acl-bucket", acctest.RandInt())
} }
func TestAccGoogleStorageBucketAcl_basic(t *testing.T) { func TestAccStorageBucketAcl_basic(t *testing.T) {
t.Parallel() t.Parallel()
bucketName := testBucketName() bucketName := testBucketName()
@ -33,7 +33,7 @@ func TestAccGoogleStorageBucketAcl_basic(t *testing.T) {
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testAccGoogleStorageBucketAclDestroy, CheckDestroy: testAccStorageBucketAclDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testGoogleStorageBucketsAclBasic1(bucketName), Config: testGoogleStorageBucketsAclBasic1(bucketName),
@ -46,7 +46,7 @@ func TestAccGoogleStorageBucketAcl_basic(t *testing.T) {
}) })
} }
func TestAccGoogleStorageBucketAcl_upgrade(t *testing.T) { func TestAccStorageBucketAcl_upgrade(t *testing.T) {
t.Parallel() t.Parallel()
bucketName := testBucketName() bucketName := testBucketName()
@ -54,7 +54,7 @@ func TestAccGoogleStorageBucketAcl_upgrade(t *testing.T) {
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testAccGoogleStorageBucketAclDestroy, CheckDestroy: testAccStorageBucketAclDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testGoogleStorageBucketsAclBasic1(bucketName), Config: testGoogleStorageBucketsAclBasic1(bucketName),
@ -84,7 +84,7 @@ func TestAccGoogleStorageBucketAcl_upgrade(t *testing.T) {
}) })
} }
func TestAccGoogleStorageBucketAcl_downgrade(t *testing.T) { func TestAccStorageBucketAcl_downgrade(t *testing.T) {
t.Parallel() t.Parallel()
bucketName := testBucketName() bucketName := testBucketName()
@ -92,7 +92,7 @@ func TestAccGoogleStorageBucketAcl_downgrade(t *testing.T) {
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testAccGoogleStorageBucketAclDestroy, CheckDestroy: testAccStorageBucketAclDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testGoogleStorageBucketsAclBasic2(bucketName), Config: testGoogleStorageBucketsAclBasic2(bucketName),
@ -122,14 +122,14 @@ func TestAccGoogleStorageBucketAcl_downgrade(t *testing.T) {
}) })
} }
func TestAccGoogleStorageBucketAcl_predefined(t *testing.T) { func TestAccStorageBucketAcl_predefined(t *testing.T) {
t.Parallel() t.Parallel()
bucketName := testBucketName() bucketName := testBucketName()
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testAccGoogleStorageBucketAclDestroy, CheckDestroy: testAccStorageBucketAclDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testGoogleStorageBucketsAclPredefined(bucketName), Config: testGoogleStorageBucketsAclPredefined(bucketName),
@ -172,7 +172,7 @@ func testAccCheckGoogleStorageBucketAcl(bucket, roleEntityS string) resource.Tes
} }
} }
func testAccGoogleStorageBucketAclDestroy(s *terraform.State) error { func testAccStorageBucketAclDestroy(s *terraform.State) error {
config := testAccProvider.Meta().(*Config) config := testAccProvider.Meta().(*Config)
for _, rs := range s.RootModule().Resources { for _, rs := range s.RootModule().Resources {

View File

@ -2,15 +2,16 @@ package google
import ( import (
"fmt" "fmt"
"github.com/hashicorp/terraform/helper/acctest"
"github.com/hashicorp/terraform/helper/resource"
"github.com/hashicorp/terraform/terraform"
"reflect" "reflect"
"sort" "sort"
"testing" "testing"
"github.com/hashicorp/terraform/helper/acctest"
"github.com/hashicorp/terraform/helper/resource"
"github.com/hashicorp/terraform/terraform"
) )
func TestAccGoogleStorageBucketIamBinding(t *testing.T) { func TestAccStorageBucketIamBinding(t *testing.T) {
t.Parallel() t.Parallel()
bucket := acctest.RandomWithPrefix("tf-test") bucket := acctest.RandomWithPrefix("tf-test")
@ -22,14 +23,14 @@ func TestAccGoogleStorageBucketIamBinding(t *testing.T) {
Steps: []resource.TestStep{ Steps: []resource.TestStep{
{ {
// Test IAM Binding creation // Test IAM Binding creation
Config: testAccGoogleStorageBucketIamBinding_basic(bucket, account), Config: testAccStorageBucketIamBinding_basic(bucket, account),
Check: testAccCheckGoogleStorageBucketIam(bucket, "roles/storage.objectViewer", []string{ Check: testAccCheckGoogleStorageBucketIam(bucket, "roles/storage.objectViewer", []string{
fmt.Sprintf("serviceAccount:%s-1@%s.iam.gserviceaccount.com", account, getTestProjectFromEnv()), fmt.Sprintf("serviceAccount:%s-1@%s.iam.gserviceaccount.com", account, getTestProjectFromEnv()),
}), }),
}, },
{ {
// Test IAM Binding update // Test IAM Binding update
Config: testAccGoogleStorageBucketIamBinding_update(bucket, account), Config: testAccStorageBucketIamBinding_update(bucket, account),
Check: testAccCheckGoogleStorageBucketIam(bucket, "roles/storage.objectViewer", []string{ Check: testAccCheckGoogleStorageBucketIam(bucket, "roles/storage.objectViewer", []string{
fmt.Sprintf("serviceAccount:%s-1@%s.iam.gserviceaccount.com", account, getTestProjectFromEnv()), fmt.Sprintf("serviceAccount:%s-1@%s.iam.gserviceaccount.com", account, getTestProjectFromEnv()),
fmt.Sprintf("serviceAccount:%s-2@%s.iam.gserviceaccount.com", account, getTestProjectFromEnv()), fmt.Sprintf("serviceAccount:%s-2@%s.iam.gserviceaccount.com", account, getTestProjectFromEnv()),
@ -39,7 +40,7 @@ func TestAccGoogleStorageBucketIamBinding(t *testing.T) {
}) })
} }
func TestAccGoogleStorageBucketIamMember(t *testing.T) { func TestAccStorageBucketIamMember(t *testing.T) {
t.Parallel() t.Parallel()
bucket := acctest.RandomWithPrefix("tf-test") bucket := acctest.RandomWithPrefix("tf-test")
@ -51,7 +52,7 @@ func TestAccGoogleStorageBucketIamMember(t *testing.T) {
Steps: []resource.TestStep{ Steps: []resource.TestStep{
{ {
// Test Iam Member creation (no update for member, no need to test) // Test Iam Member creation (no update for member, no need to test)
Config: testAccGoogleStorageBucketIamMember_basic(bucket, account), Config: testAccStorageBucketIamMember_basic(bucket, account),
Check: testAccCheckGoogleStorageBucketIam(bucket, "roles/storage.admin", []string{ Check: testAccCheckGoogleStorageBucketIam(bucket, "roles/storage.admin", []string{
fmt.Sprintf("serviceAccount:%s-1@%s.iam.gserviceaccount.com", account, getTestProjectFromEnv()), fmt.Sprintf("serviceAccount:%s-1@%s.iam.gserviceaccount.com", account, getTestProjectFromEnv()),
}), }),
@ -85,7 +86,7 @@ func testAccCheckGoogleStorageBucketIam(bucket, role string, members []string) r
} }
} }
func testAccGoogleStorageBucketIamBinding_basic(bucket, account string) string { func testAccStorageBucketIamBinding_basic(bucket, account string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_storage_bucket" "bucket" { resource "google_storage_bucket" "bucket" {
name = "%s" name = "%s"
@ -106,7 +107,7 @@ resource "google_storage_bucket_iam_binding" "foo" {
`, bucket, account) `, bucket, account)
} }
func testAccGoogleStorageBucketIamBinding_update(bucket, account string) string { func testAccStorageBucketIamBinding_update(bucket, account string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_storage_bucket" "bucket" { resource "google_storage_bucket" "bucket" {
name = "%s" name = "%s"
@ -133,7 +134,7 @@ resource "google_storage_bucket_iam_binding" "foo" {
`, bucket, account, account) `, bucket, account, account)
} }
func testAccGoogleStorageBucketIamMember_basic(bucket, account string) string { func testAccStorageBucketIamMember_basic(bucket, account string) string {
return fmt.Sprintf(` return fmt.Sprintf(`
resource "google_storage_bucket" "bucket" { resource "google_storage_bucket" "bucket" {
name = "%s" name = "%s"

View File

@ -10,8 +10,9 @@ import (
"github.com/hashicorp/terraform/helper/resource" "github.com/hashicorp/terraform/helper/resource"
"github.com/hashicorp/terraform/terraform" "github.com/hashicorp/terraform/terraform"
"google.golang.org/api/storage/v1"
"os" "os"
"google.golang.org/api/storage/v1"
) )
const ( const (
@ -19,7 +20,7 @@ const (
content = "now this is content!" content = "now this is content!"
) )
func TestAccGoogleStorageObject_basic(t *testing.T) { func TestAccStorageObject_basic(t *testing.T) {
t.Parallel() t.Parallel()
bucketName := testBucketName() bucketName := testBucketName()
@ -33,7 +34,7 @@ func TestAccGoogleStorageObject_basic(t *testing.T) {
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testAccGoogleStorageObjectDestroy, CheckDestroy: testAccStorageObjectDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testGoogleStorageBucketsObjectBasic(bucketName, testFile.Name()), Config: testGoogleStorageBucketsObjectBasic(bucketName, testFile.Name()),
@ -43,7 +44,7 @@ func TestAccGoogleStorageObject_basic(t *testing.T) {
}) })
} }
func TestAccGoogleStorageObject_recreate(t *testing.T) { func TestAccStorageObject_recreate(t *testing.T) {
t.Parallel() t.Parallel()
bucketName := testBucketName() bucketName := testBucketName()
@ -64,7 +65,7 @@ func TestAccGoogleStorageObject_recreate(t *testing.T) {
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testAccGoogleStorageObjectDestroy, CheckDestroy: testAccStorageObjectDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testGoogleStorageBucketsObjectBasic(bucketName, testFile.Name()), Config: testGoogleStorageBucketsObjectBasic(bucketName, testFile.Name()),
@ -84,7 +85,7 @@ func TestAccGoogleStorageObject_recreate(t *testing.T) {
}) })
} }
func TestAccGoogleStorageObject_content(t *testing.T) { func TestAccStorageObject_content(t *testing.T) {
t.Parallel() t.Parallel()
bucketName := testBucketName() bucketName := testBucketName()
@ -98,7 +99,7 @@ func TestAccGoogleStorageObject_content(t *testing.T) {
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testAccGoogleStorageObjectDestroy, CheckDestroy: testAccStorageObjectDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testGoogleStorageBucketsObjectContent(bucketName), Config: testGoogleStorageBucketsObjectContent(bucketName),
@ -114,7 +115,7 @@ func TestAccGoogleStorageObject_content(t *testing.T) {
}) })
} }
func TestAccGoogleStorageObject_withContentCharacteristics(t *testing.T) { func TestAccStorageObject_withContentCharacteristics(t *testing.T) {
t.Parallel() t.Parallel()
bucketName := testBucketName() bucketName := testBucketName()
@ -129,7 +130,7 @@ func TestAccGoogleStorageObject_withContentCharacteristics(t *testing.T) {
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testAccGoogleStorageObjectDestroy, CheckDestroy: testAccStorageObjectDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testGoogleStorageBucketsObject_optionalContentFields( Config: testGoogleStorageBucketsObject_optionalContentFields(
@ -150,13 +151,13 @@ func TestAccGoogleStorageObject_withContentCharacteristics(t *testing.T) {
}) })
} }
func TestAccGoogleStorageObject_dynamicContent(t *testing.T) { func TestAccStorageObject_dynamicContent(t *testing.T) {
t.Parallel() t.Parallel()
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testAccGoogleStorageObjectDestroy, CheckDestroy: testAccStorageObjectDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testGoogleStorageBucketsObjectDynamicContent(testBucketName()), Config: testGoogleStorageBucketsObjectDynamicContent(testBucketName()),
@ -171,7 +172,7 @@ func TestAccGoogleStorageObject_dynamicContent(t *testing.T) {
}) })
} }
func TestAccGoogleStorageObject_cacheControl(t *testing.T) { func TestAccStorageObject_cacheControl(t *testing.T) {
t.Parallel() t.Parallel()
bucketName := testBucketName() bucketName := testBucketName()
@ -186,7 +187,7 @@ func TestAccGoogleStorageObject_cacheControl(t *testing.T) {
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testAccGoogleStorageObjectDestroy, CheckDestroy: testAccStorageObjectDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testGoogleStorageBucketsObject_cacheControl(bucketName, testFile.Name(), cacheControl), Config: testGoogleStorageBucketsObject_cacheControl(bucketName, testFile.Name(), cacheControl),
@ -200,7 +201,7 @@ func TestAccGoogleStorageObject_cacheControl(t *testing.T) {
}) })
} }
func TestAccGoogleStorageObject_storageClass(t *testing.T) { func TestAccStorageObject_storageClass(t *testing.T) {
t.Parallel() t.Parallel()
bucketName := testBucketName() bucketName := testBucketName()
@ -215,7 +216,7 @@ func TestAccGoogleStorageObject_storageClass(t *testing.T) {
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testAccGoogleStorageObjectDestroy, CheckDestroy: testAccStorageObjectDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testGoogleStorageBucketsObject_storageClass(bucketName, storageClass), Config: testGoogleStorageBucketsObject_storageClass(bucketName, storageClass),
@ -250,7 +251,7 @@ func testAccCheckGoogleStorageObject(bucket, object, md5 string) resource.TestCh
} }
} }
func testAccGoogleStorageObjectDestroy(s *terraform.State) error { func testAccStorageObjectDestroy(s *terraform.State) error {
config := testAccProvider.Meta().(*Config) config := testAccProvider.Meta().(*Config)
for _, rs := range s.RootModule().Resources { for _, rs := range s.RootModule().Resources {

View File

@ -8,7 +8,7 @@ import (
"github.com/hashicorp/terraform/terraform" "github.com/hashicorp/terraform/terraform"
) )
func TestAccGoogleStorageDefaultObjectAcl_basic(t *testing.T) { func TestAccStorageDefaultObjectAcl_basic(t *testing.T) {
t.Parallel() t.Parallel()
bucketName := testBucketName() bucketName := testBucketName()
@ -16,7 +16,7 @@ func TestAccGoogleStorageDefaultObjectAcl_basic(t *testing.T) {
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testAccGoogleStorageDefaultObjectAclDestroy, CheckDestroy: testAccStorageDefaultObjectAclDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testGoogleStorageDefaultObjectsAclBasic(bucketName, roleEntityBasic1, roleEntityBasic2), Config: testGoogleStorageDefaultObjectsAclBasic(bucketName, roleEntityBasic1, roleEntityBasic2),
@ -29,7 +29,7 @@ func TestAccGoogleStorageDefaultObjectAcl_basic(t *testing.T) {
}) })
} }
func TestAccGoogleStorageDefaultObjectAcl_upgrade(t *testing.T) { func TestAccStorageDefaultObjectAcl_upgrade(t *testing.T) {
t.Parallel() t.Parallel()
bucketName := testBucketName() bucketName := testBucketName()
@ -37,7 +37,7 @@ func TestAccGoogleStorageDefaultObjectAcl_upgrade(t *testing.T) {
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testAccGoogleStorageDefaultObjectAclDestroy, CheckDestroy: testAccStorageDefaultObjectAclDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testGoogleStorageDefaultObjectsAclBasic(bucketName, roleEntityBasic1, roleEntityBasic2), Config: testGoogleStorageDefaultObjectsAclBasic(bucketName, roleEntityBasic1, roleEntityBasic2),
@ -67,7 +67,7 @@ func TestAccGoogleStorageDefaultObjectAcl_upgrade(t *testing.T) {
}) })
} }
func TestAccGoogleStorageDefaultObjectAcl_downgrade(t *testing.T) { func TestAccStorageDefaultObjectAcl_downgrade(t *testing.T) {
t.Parallel() t.Parallel()
bucketName := testBucketName() bucketName := testBucketName()
@ -75,7 +75,7 @@ func TestAccGoogleStorageDefaultObjectAcl_downgrade(t *testing.T) {
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testAccGoogleStorageDefaultObjectAclDestroy, CheckDestroy: testAccStorageDefaultObjectAclDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testGoogleStorageDefaultObjectsAclBasic(bucketName, roleEntityBasic2, roleEntityBasic3_owner), Config: testGoogleStorageDefaultObjectsAclBasic(bucketName, roleEntityBasic2, roleEntityBasic3_owner),
@ -125,7 +125,7 @@ func testAccCheckGoogleStorageDefaultObjectAcl(bucket, roleEntityS string) resou
} }
} }
func testAccGoogleStorageDefaultObjectAclDestroy(s *terraform.State) error { func testAccStorageDefaultObjectAclDestroy(s *terraform.State) error {
config := testAccProvider.Meta().(*Config) config := testAccProvider.Meta().(*Config)
for _, rs := range s.RootModule().Resources { for _, rs := range s.RootModule().Resources {

View File

@ -17,7 +17,7 @@ var (
payload = "JSON_API_V1" payload = "JSON_API_V1"
) )
func TestAccGoogleStorageNotification_basic(t *testing.T) { func TestAccStorageNotification_basic(t *testing.T) {
t.Parallel() t.Parallel()
skipIfEnvNotSet(t, "GOOGLE_PROJECT") skipIfEnvNotSet(t, "GOOGLE_PROJECT")
@ -30,7 +30,7 @@ func TestAccGoogleStorageNotification_basic(t *testing.T) {
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testAccGoogleStorageNotificationDestroy, CheckDestroy: testAccStorageNotificationDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testGoogleStorageNotificationBasic(bucketName, topicName, topic), Config: testGoogleStorageNotificationBasic(bucketName, topicName, topic),
@ -61,7 +61,7 @@ func TestAccGoogleStorageNotification_basic(t *testing.T) {
}) })
} }
func TestAccGoogleStorageNotification_withEventsAndAttributes(t *testing.T) { func TestAccStorageNotification_withEventsAndAttributes(t *testing.T) {
t.Parallel() t.Parallel()
skipIfEnvNotSet(t, "GOOGLE_PROJECT") skipIfEnvNotSet(t, "GOOGLE_PROJECT")
@ -76,7 +76,7 @@ func TestAccGoogleStorageNotification_withEventsAndAttributes(t *testing.T) {
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testAccGoogleStorageNotificationDestroy, CheckDestroy: testAccStorageNotificationDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testGoogleStorageNotificationOptionalEventsAttributes(bucketName, topicName, topic, eventType1, eventType2), Config: testGoogleStorageNotificationOptionalEventsAttributes(bucketName, topicName, topic, eventType1, eventType2),
@ -104,7 +104,7 @@ func TestAccGoogleStorageNotification_withEventsAndAttributes(t *testing.T) {
}) })
} }
func testAccGoogleStorageNotificationDestroy(s *terraform.State) error { func testAccStorageNotificationDestroy(s *terraform.State) error {
config := testAccProvider.Meta().(*Config) config := testAccProvider.Meta().(*Config)
for _, rs := range s.RootModule().Resources { for _, rs := range s.RootModule().Resources {

View File

@ -19,7 +19,7 @@ func testAclObjectName() string {
rand.New(rand.NewSource(time.Now().UnixNano())).Int()) rand.New(rand.NewSource(time.Now().UnixNano())).Int())
} }
func TestAccGoogleStorageObjectAcl_basic(t *testing.T) { func TestAccStorageObjectAcl_basic(t *testing.T) {
t.Parallel() t.Parallel()
bucketName := testBucketName() bucketName := testBucketName()
@ -34,7 +34,7 @@ func TestAccGoogleStorageObjectAcl_basic(t *testing.T) {
testAccPreCheck(t) testAccPreCheck(t)
}, },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testAccGoogleStorageObjectAclDestroy, CheckDestroy: testAccStorageObjectAclDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testGoogleStorageObjectsAclBasic1(bucketName, objectName), Config: testGoogleStorageObjectsAclBasic1(bucketName, objectName),
@ -49,7 +49,7 @@ func TestAccGoogleStorageObjectAcl_basic(t *testing.T) {
}) })
} }
func TestAccGoogleStorageObjectAcl_upgrade(t *testing.T) { func TestAccStorageObjectAcl_upgrade(t *testing.T) {
t.Parallel() t.Parallel()
bucketName := testBucketName() bucketName := testBucketName()
@ -64,7 +64,7 @@ func TestAccGoogleStorageObjectAcl_upgrade(t *testing.T) {
testAccPreCheck(t) testAccPreCheck(t)
}, },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testAccGoogleStorageObjectAclDestroy, CheckDestroy: testAccStorageObjectAclDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testGoogleStorageObjectsAclBasic1(bucketName, objectName), Config: testGoogleStorageObjectsAclBasic1(bucketName, objectName),
@ -101,7 +101,7 @@ func TestAccGoogleStorageObjectAcl_upgrade(t *testing.T) {
}) })
} }
func TestAccGoogleStorageObjectAcl_downgrade(t *testing.T) { func TestAccStorageObjectAcl_downgrade(t *testing.T) {
t.Parallel() t.Parallel()
bucketName := testBucketName() bucketName := testBucketName()
@ -116,7 +116,7 @@ func TestAccGoogleStorageObjectAcl_downgrade(t *testing.T) {
testAccPreCheck(t) testAccPreCheck(t)
}, },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testAccGoogleStorageObjectAclDestroy, CheckDestroy: testAccStorageObjectAclDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testGoogleStorageObjectsAclBasic2(bucketName, objectName), Config: testGoogleStorageObjectsAclBasic2(bucketName, objectName),
@ -153,7 +153,7 @@ func TestAccGoogleStorageObjectAcl_downgrade(t *testing.T) {
}) })
} }
func TestAccGoogleStorageObjectAcl_predefined(t *testing.T) { func TestAccStorageObjectAcl_predefined(t *testing.T) {
t.Parallel() t.Parallel()
bucketName := testBucketName() bucketName := testBucketName()
@ -168,7 +168,7 @@ func TestAccGoogleStorageObjectAcl_predefined(t *testing.T) {
testAccPreCheck(t) testAccPreCheck(t)
}, },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testAccGoogleStorageObjectAclDestroy, CheckDestroy: testAccStorageObjectAclDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testGoogleStorageObjectsAclPredefined(bucketName, objectName), Config: testGoogleStorageObjectsAclPredefined(bucketName, objectName),
@ -213,7 +213,7 @@ func testAccCheckGoogleStorageObjectAclDelete(bucket, object, roleEntityS string
} }
} }
func testAccGoogleStorageObjectAclDestroy(s *terraform.State) error { func testAccStorageObjectAclDestroy(s *terraform.State) error {
config := testAccProvider.Meta().(*Config) config := testAccProvider.Meta().(*Config)
for _, rs := range s.RootModule().Resources { for _, rs := range s.RootModule().Resources {