Skip to content

Commit

Permalink
Merge pull request #18222 from hashicorp/t-kms-errorcheck
Browse files Browse the repository at this point in the history
tests/kms: Add ErrorCheck
  • Loading branch information
YakDriver authored Mar 19, 2021
2 parents ce0fc3c + d30c3e1 commit 7bca8ae
Show file tree
Hide file tree
Showing 9 changed files with 61 additions and 16 deletions.
11 changes: 7 additions & 4 deletions aws/data_source_aws_kms_alias_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,7 @@ import (
"regexp"
"testing"

"github.com/aws/aws-sdk-go/service/kms"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource"
"github.com/hashicorp/terraform-plugin-sdk/v2/terraform"
Expand All @@ -15,8 +16,9 @@ func TestAccDataSourceAwsKmsAlias_AwsService(t *testing.T) {
resourceName := "data.aws_kms_alias.test"

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders,
PreCheck: func() { testAccPreCheck(t) },
ErrorCheck: testAccErrorCheck(t, kms.EndpointsID),
Providers: testAccProviders,
Steps: []resource.TestStep{
{
Config: testAccDataSourceAwsKmsAlias_name(name),
Expand All @@ -38,8 +40,9 @@ func TestAccDataSourceAwsKmsAlias_CMK(t *testing.T) {
datasourceAliasResourceName := "data.aws_kms_alias.test"

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders,
PreCheck: func() { testAccPreCheck(t) },
ErrorCheck: testAccErrorCheck(t, kms.EndpointsID),
Providers: testAccProviders,
Steps: []resource.TestStep{
{
Config: testAccDataSourceAwsKmsAlias_CMK(rInt),
Expand Down
16 changes: 10 additions & 6 deletions aws/data_source_aws_kms_ciphertext_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -3,13 +3,15 @@ package aws
import (
"testing"

"github.com/aws/aws-sdk-go/service/kms"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource"
)

func TestAccDataSourceAwsKmsCiphertext_basic(t *testing.T) {
resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders,
PreCheck: func() { testAccPreCheck(t) },
ErrorCheck: testAccErrorCheck(t, kms.EndpointsID),
Providers: testAccProviders,
Steps: []resource.TestStep{
{
Config: testAccDataSourceAwsKmsCiphertextConfig_basic,
Expand All @@ -24,8 +26,9 @@ func TestAccDataSourceAwsKmsCiphertext_basic(t *testing.T) {

func TestAccDataSourceAwsKmsCiphertext_validate(t *testing.T) {
resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders,
PreCheck: func() { testAccPreCheck(t) },
ErrorCheck: testAccErrorCheck(t, kms.EndpointsID),
Providers: testAccProviders,
Steps: []resource.TestStep{
{
Config: testAccDataSourceAwsKmsCiphertextConfig_validate,
Expand All @@ -40,8 +43,9 @@ func TestAccDataSourceAwsKmsCiphertext_validate(t *testing.T) {

func TestAccDataSourceAwsKmsCiphertext_validate_withContext(t *testing.T) {
resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders,
PreCheck: func() { testAccPreCheck(t) },
ErrorCheck: testAccErrorCheck(t, kms.EndpointsID),
Providers: testAccProviders,
Steps: []resource.TestStep{
{
Config: testAccDataSourceAwsKmsCiphertextConfig_validate_withContext,
Expand Down
6 changes: 4 additions & 2 deletions aws/data_source_aws_kms_key_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,7 @@ import (
"fmt"
"testing"

"github.com/aws/aws-sdk-go/service/kms"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource"
"github.com/hashicorp/terraform-plugin-sdk/v2/terraform"
Expand All @@ -15,8 +16,9 @@ func TestAccDataSourceAwsKmsKey_basic(t *testing.T) {
rName := fmt.Sprintf("tf-testacc-kms-key-%s", acctest.RandString(13))

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders,
PreCheck: func() { testAccPreCheck(t) },
ErrorCheck: testAccErrorCheck(t, kms.EndpointsID),
Providers: testAccProviders,
Steps: []resource.TestStep{
{
Config: testAccDataSourceAwsKmsKeyConfig(rName),
Expand Down
10 changes: 6 additions & 4 deletions aws/data_source_aws_kms_secrets_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -20,8 +20,9 @@ func TestAccAWSKmsSecretsDataSource_basic(t *testing.T) {

// Run a resource test to setup our KMS key
resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders,
PreCheck: func() { testAccPreCheck(t) },
ErrorCheck: testAccErrorCheck(t, kms.EndpointsID),
Providers: testAccProviders,
Steps: []resource.TestStep{
{
Config: testAccCheckAwsKmsSecretsDataSourceKey,
Expand Down Expand Up @@ -64,8 +65,9 @@ func testAccDataSourceAwsKmsSecretsDecrypt(t *testing.T, plaintext string, encry
dataSourceName := "data.aws_kms_secrets.test"

resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders,
PreCheck: func() { testAccPreCheck(t) },
ErrorCheck: testAccErrorCheck(t, kms.EndpointsID),
Providers: testAccProviders,
Steps: []resource.TestStep{
{
Config: testAccCheckAwsKmsSecretsDataSourceSecret(*encryptedPayload),
Expand Down
6 changes: 6 additions & 0 deletions aws/resource_aws_kms_alias_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,7 @@ import (
"testing"
"time"

"github.com/aws/aws-sdk-go/service/kms"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource"
"github.com/hashicorp/terraform-plugin-sdk/v2/terraform"
Expand All @@ -17,6 +18,7 @@ func TestAccAWSKmsAlias_basic(t *testing.T) {

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
ErrorCheck: testAccErrorCheck(t, kms.EndpointsID),
Providers: testAccProviders,
CheckDestroy: testAccCheckAWSKmsAliasDestroy,
Steps: []resource.TestStep{
Expand Down Expand Up @@ -49,6 +51,7 @@ func TestAccAWSKmsAlias_name_prefix(t *testing.T) {

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
ErrorCheck: testAccErrorCheck(t, kms.EndpointsID),
Providers: testAccProviders,
CheckDestroy: testAccCheckAWSKmsAliasDestroy,
Steps: []resource.TestStep{
Expand All @@ -75,6 +78,7 @@ func TestAccAWSKmsAlias_no_name(t *testing.T) {

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
ErrorCheck: testAccErrorCheck(t, kms.EndpointsID),
Providers: testAccProviders,
CheckDestroy: testAccCheckAWSKmsAliasDestroy,
Steps: []resource.TestStep{
Expand All @@ -101,6 +105,7 @@ func TestAccAWSKmsAlias_multiple(t *testing.T) {

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
ErrorCheck: testAccErrorCheck(t, kms.EndpointsID),
Providers: testAccProviders,
CheckDestroy: testAccCheckAWSKmsAliasDestroy,
Steps: []resource.TestStep{
Expand Down Expand Up @@ -129,6 +134,7 @@ func TestAccAWSKmsAlias_ArnDiffSuppress(t *testing.T) {

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
ErrorCheck: testAccErrorCheck(t, kms.EndpointsID),
Providers: testAccProviders,
CheckDestroy: testAccCheckAWSKmsAliasDestroy,
Steps: []resource.TestStep{
Expand Down
4 changes: 4 additions & 0 deletions aws/resource_aws_kms_ciphertext_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -3,12 +3,14 @@ package aws
import (
"testing"

"github.com/aws/aws-sdk-go/service/kms"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource"
)

func TestAccResourceAwsKmsCiphertext_basic(t *testing.T) {
resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
ErrorCheck: testAccErrorCheck(t, kms.EndpointsID),
Providers: testAccProviders,
CheckDestroy: nil,
Steps: []resource.TestStep{
Expand All @@ -29,6 +31,7 @@ func TestAccResourceAwsKmsCiphertext_validate(t *testing.T) {

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
ErrorCheck: testAccErrorCheck(t, kms.EndpointsID),
Providers: testAccProviders,
CheckDestroy: nil,
Steps: []resource.TestStep{
Expand All @@ -49,6 +52,7 @@ func TestAccResourceAwsKmsCiphertext_validate_withContext(t *testing.T) {

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
ErrorCheck: testAccErrorCheck(t, kms.EndpointsID),
Providers: testAccProviders,
CheckDestroy: nil,
Steps: []resource.TestStep{
Expand Down
9 changes: 9 additions & 0 deletions aws/resource_aws_kms_external_key_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,7 @@ func TestAccAWSKmsExternalKey_basic(t *testing.T) {

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
ErrorCheck: testAccErrorCheck(t, kms.EndpointsID),
Providers: testAccProviders,
CheckDestroy: testAccCheckAWSKmsExternalKeyDestroy,
Steps: []resource.TestStep{
Expand Down Expand Up @@ -58,6 +59,7 @@ func TestAccAWSKmsExternalKey_disappears(t *testing.T) {

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
ErrorCheck: testAccErrorCheck(t, kms.EndpointsID),
Providers: testAccProviders,
CheckDestroy: testAccCheckAWSKmsExternalKeyDestroy,
Steps: []resource.TestStep{
Expand All @@ -79,6 +81,7 @@ func TestAccAWSKmsExternalKey_DeletionWindowInDays(t *testing.T) {

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
ErrorCheck: testAccErrorCheck(t, kms.EndpointsID),
Providers: testAccProviders,
CheckDestroy: testAccCheckAWSKmsExternalKeyDestroy,
Steps: []resource.TestStep{
Expand Down Expand Up @@ -116,6 +119,7 @@ func TestAccAWSKmsExternalKey_Description(t *testing.T) {

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
ErrorCheck: testAccErrorCheck(t, kms.EndpointsID),
Providers: testAccProviders,
CheckDestroy: testAccCheckAWSKmsExternalKeyDestroy,
Steps: []resource.TestStep{
Expand Down Expand Up @@ -153,6 +157,7 @@ func TestAccAWSKmsExternalKey_Enabled(t *testing.T) {

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
ErrorCheck: testAccErrorCheck(t, kms.EndpointsID),
Providers: testAccProviders,
CheckDestroy: testAccCheckAWSKmsExternalKeyDestroy,
Steps: []resource.TestStep{
Expand Down Expand Up @@ -198,6 +203,7 @@ func TestAccAWSKmsExternalKey_KeyMaterialBase64(t *testing.T) {

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
ErrorCheck: testAccErrorCheck(t, kms.EndpointsID),
Providers: testAccProviders,
CheckDestroy: testAccCheckAWSKmsExternalKeyDestroy,
Steps: []resource.TestStep{
Expand Down Expand Up @@ -239,6 +245,7 @@ func TestAccAWSKmsExternalKey_Policy(t *testing.T) {

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
ErrorCheck: testAccErrorCheck(t, kms.EndpointsID),
Providers: testAccProviders,
CheckDestroy: testAccCheckAWSKmsExternalKeyDestroy,
Steps: []resource.TestStep{
Expand Down Expand Up @@ -276,6 +283,7 @@ func TestAccAWSKmsExternalKey_Tags(t *testing.T) {

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
ErrorCheck: testAccErrorCheck(t, kms.EndpointsID),
Providers: testAccProviders,
CheckDestroy: testAccCheckAWSKmsExternalKeyDestroy,
Steps: []resource.TestStep{
Expand Down Expand Up @@ -327,6 +335,7 @@ func TestAccAWSKmsExternalKey_ValidTo(t *testing.T) {

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
ErrorCheck: testAccErrorCheck(t, kms.EndpointsID),
Providers: testAccProviders,
CheckDestroy: testAccCheckAWSKmsExternalKeyDestroy,
Steps: []resource.TestStep{
Expand Down
7 changes: 7 additions & 0 deletions aws/resource_aws_kms_grant_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -17,6 +17,7 @@ func TestAccAWSKmsGrant_basic(t *testing.T) {

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
ErrorCheck: testAccErrorCheck(t, kms.EndpointsID),
Providers: testAccProviders,
CheckDestroy: testAccCheckAWSKmsGrantDestroy,
Steps: []resource.TestStep{
Expand Down Expand Up @@ -48,6 +49,7 @@ func TestAccAWSKmsGrant_withConstraints(t *testing.T) {

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
ErrorCheck: testAccErrorCheck(t, kms.EndpointsID),
Providers: testAccProviders,
CheckDestroy: testAccCheckAWSKmsGrantDestroy,
Steps: []resource.TestStep{
Expand Down Expand Up @@ -95,6 +97,7 @@ func TestAccAWSKmsGrant_withRetiringPrincipal(t *testing.T) {

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
ErrorCheck: testAccErrorCheck(t, kms.EndpointsID),
Providers: testAccProviders,
CheckDestroy: testAccCheckAWSKmsGrantDestroy,
Steps: []resource.TestStep{
Expand All @@ -121,6 +124,7 @@ func TestAccAWSKmsGrant_bare(t *testing.T) {

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
ErrorCheck: testAccErrorCheck(t, kms.EndpointsID),
Providers: testAccProviders,
CheckDestroy: testAccCheckAWSKmsGrantDestroy,
Steps: []resource.TestStep{
Expand Down Expand Up @@ -149,6 +153,7 @@ func TestAccAWSKmsGrant_ARN(t *testing.T) {

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
ErrorCheck: testAccErrorCheck(t, kms.EndpointsID),
Providers: testAccProviders,
CheckDestroy: testAccCheckAWSKmsGrantDestroy,
Steps: []resource.TestStep{
Expand Down Expand Up @@ -180,6 +185,7 @@ func TestAccAWSKmsGrant_AsymmetricKey(t *testing.T) {

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
ErrorCheck: testAccErrorCheck(t, kms.EndpointsID),
Providers: testAccProviders,
CheckDestroy: testAccCheckAWSKmsGrantDestroy,
Steps: []resource.TestStep{
Expand All @@ -205,6 +211,7 @@ func TestAccAWSKmsGrant_disappears(t *testing.T) {

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
ErrorCheck: testAccErrorCheck(t, kms.EndpointsID),
Providers: testAccProviders,
CheckDestroy: testAccCheckAWSKmsGrantDestroy,
Steps: []resource.TestStep{
Expand Down
8 changes: 8 additions & 0 deletions aws/resource_aws_kms_key_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -74,6 +74,7 @@ func TestAccAWSKmsKey_basic(t *testing.T) {

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
ErrorCheck: testAccErrorCheck(t, kms.EndpointsID),
Providers: testAccProviders,
CheckDestroy: testAccCheckAWSKmsKeyDestroy,
Steps: []resource.TestStep{
Expand Down Expand Up @@ -102,6 +103,7 @@ func TestAccAWSKmsKey_asymmetricKey(t *testing.T) {

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
ErrorCheck: testAccErrorCheck(t, kms.EndpointsID),
Providers: testAccProviders,
CheckDestroy: testAccCheckAWSKmsKeyDestroy,
Steps: []resource.TestStep{
Expand All @@ -124,6 +126,7 @@ func TestAccAWSKmsKey_disappears(t *testing.T) {

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
ErrorCheck: testAccErrorCheck(t, kms.EndpointsID),
Providers: testAccProviders,
CheckDestroy: testAccCheckAWSKmsKeyDestroy,
Steps: []resource.TestStep{
Expand All @@ -147,6 +150,7 @@ func TestAccAWSKmsKey_policy(t *testing.T) {

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
ErrorCheck: testAccErrorCheck(t, kms.EndpointsID),
Providers: testAccProviders,
CheckDestroy: testAccCheckAWSKmsKeyDestroy,
Steps: []resource.TestStep{
Expand Down Expand Up @@ -180,6 +184,7 @@ func TestAccAWSKmsKey_Policy_IamRole(t *testing.T) {

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
ErrorCheck: testAccErrorCheck(t, kms.EndpointsID),
Providers: testAccProviders,
CheckDestroy: testAccCheckAWSKmsKeyDestroy,
Steps: []resource.TestStep{
Expand Down Expand Up @@ -207,6 +212,7 @@ func TestAccAWSKmsKey_Policy_IamServiceLinkedRole(t *testing.T) {

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
ErrorCheck: testAccErrorCheck(t, kms.EndpointsID),
Providers: testAccProviders,
CheckDestroy: testAccCheckAWSKmsKeyDestroy,
Steps: []resource.TestStep{
Expand All @@ -233,6 +239,7 @@ func TestAccAWSKmsKey_isEnabled(t *testing.T) {

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
ErrorCheck: testAccErrorCheck(t, kms.EndpointsID),
Providers: testAccProviders,
CheckDestroy: testAccCheckAWSKmsKeyDestroy,
Steps: []resource.TestStep{
Expand Down Expand Up @@ -280,6 +287,7 @@ func TestAccAWSKmsKey_tags(t *testing.T) {

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
ErrorCheck: testAccErrorCheck(t, kms.EndpointsID),
Providers: testAccProviders,
CheckDestroy: testAccCheckAWSKmsKeyDestroy,
Steps: []resource.TestStep{
Expand Down

0 comments on commit 7bca8ae

Please sign in to comment.