Skip to content

Commit

Permalink
linting
Browse files Browse the repository at this point in the history
  • Loading branch information
Julien committed Dec 12, 2024
1 parent df4c104 commit 2fa535f
Show file tree
Hide file tree
Showing 2 changed files with 6 additions and 5 deletions.
8 changes: 4 additions & 4 deletions bastion/data_source_authdomain_ad_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -13,11 +13,11 @@ func TestAccDataSourceAuthDomainAD_basic(t *testing.T) {
PreventPostDestroyRefresh: true,
Steps: []resource.TestStep{
{
// Create the resource to be fetched by the datasource
// Create the resource to be fetched by the datasource.
Config: testAccDataSourceAuthDomainADConfigCreate(),
},
{
// Validate that the datasource correctly retrieves the resource
// Validate that the datasource correctly retrieves the resource.
Config: testAccDataSourceAuthDomainADConfigData(),
Check: resource.ComposeTestCheckFunc(
resource.TestCheckResourceAttr("data.wallix-bastion_authdomain.testacc_dataDomain",
Expand All @@ -34,7 +34,7 @@ func TestAccDataSourceAuthDomainAD_basic(t *testing.T) {
})
}

// Resource creation configuration
// Resource creation configuration.
func testAccDataSourceAuthDomainADConfigCreate() string {
return `
resource "wallix-bastion_authdomain_ad" "testacc_dataAuthDomain" {
Expand All @@ -47,7 +47,7 @@ resource "wallix-bastion_authdomain_ad" "testacc_dataAuthDomain" {
`
}

// Datasource configuration to retrieve the created resource
// Datasource configuration to retrieve the created resource.
func testAccDataSourceAuthDomainADConfigData() string {
return `
resource "wallix-bastion_authdomain_ad" "testacc_dataAuthDomain" {
Expand Down
3 changes: 2 additions & 1 deletion bastion/resource_encryption.go
Original file line number Diff line number Diff line change
Expand Up @@ -156,11 +156,12 @@ func updateEncryption(
if code != http.StatusOK && code != http.StatusNoContent {
return fmt.Errorf("API didn't return OK or NoContent: %d with body:\n%s", code, body)
}

return nil
}

func resourceEncryptionDelete(
_ context.Context, d *schema.ResourceData, m interface{},
_ context.Context, d *schema.ResourceData,
) diag.Diagnostics {
// Since the API does not support deletion, we simply remove the resource from the Terraform state
d.SetId("")
Expand Down

0 comments on commit 2fa535f

Please sign in to comment.