From d88d22a95a60f83db7dc9c53ac9dad84adb83610 Mon Sep 17 00:00:00 2001 From: Radek Simko Date: Tue, 25 Jul 2017 17:57:43 +0100 Subject: [PATCH] r/ecr_repository: Randomize names in tests --- aws/import_aws_ecr_repository_test.go | 4 ++- ...resource_aws_ecr_repository_policy_test.go | 27 ++++++++++++------- aws/resource_aws_ecr_repository_test.go | 13 ++++++--- 3 files changed, 30 insertions(+), 14 deletions(-) diff --git a/aws/import_aws_ecr_repository_test.go b/aws/import_aws_ecr_repository_test.go index cd7b14439fed..0c0d99ae90d2 100644 --- a/aws/import_aws_ecr_repository_test.go +++ b/aws/import_aws_ecr_repository_test.go @@ -3,11 +3,13 @@ package aws import ( "testing" + "github.com/hashicorp/terraform/helper/acctest" "github.com/hashicorp/terraform/helper/resource" ) func TestAccAWSEcrRepository_importBasic(t *testing.T) { resourceName := "aws_ecr_repository.default" + randString := acctest.RandString(10) resource.Test(t, resource.TestCase{ PreCheck: func() { testAccPreCheck(t) }, @@ -15,7 +17,7 @@ func TestAccAWSEcrRepository_importBasic(t *testing.T) { CheckDestroy: testAccCheckAWSEcrRepositoryDestroy, Steps: []resource.TestStep{ resource.TestStep{ - Config: testAccAWSEcrRepository, + Config: testAccAWSEcrRepository(randString), }, resource.TestStep{ diff --git a/aws/resource_aws_ecr_repository_policy_test.go b/aws/resource_aws_ecr_repository_policy_test.go index 84bee1c20999..260a8ba13e1c 100644 --- a/aws/resource_aws_ecr_repository_policy_test.go +++ b/aws/resource_aws_ecr_repository_policy_test.go @@ -7,18 +7,21 @@ import ( "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/service/ecr" + "github.com/hashicorp/terraform/helper/acctest" "github.com/hashicorp/terraform/helper/resource" "github.com/hashicorp/terraform/terraform" ) func TestAccAWSEcrRepositoryPolicy_basic(t *testing.T) { + randString := acctest.RandString(10) + resource.Test(t, resource.TestCase{ PreCheck: func() { testAccPreCheck(t) }, Providers: testAccProviders, CheckDestroy: testAccCheckAWSEcrRepositoryPolicyDestroy, Steps: []resource.TestStep{ resource.TestStep{ - Config: testAccAWSEcrRepositoryPolicy, + Config: testAccAWSEcrRepositoryPolicy(randString), Check: resource.ComposeTestCheckFunc( testAccCheckAWSEcrRepositoryPolicyExists("aws_ecr_repository_policy.default"), ), @@ -28,13 +31,15 @@ func TestAccAWSEcrRepositoryPolicy_basic(t *testing.T) { } func TestAccAWSEcrRepositoryPolicy_iam(t *testing.T) { + randString := acctest.RandString(10) + resource.Test(t, resource.TestCase{ PreCheck: func() { testAccPreCheck(t) }, Providers: testAccProviders, CheckDestroy: testAccCheckAWSEcrRepositoryPolicyDestroy, Steps: []resource.TestStep{ resource.TestStep{ - Config: testAccAWSEcrRepositoryPolicyWithIAMRole, + Config: testAccAWSEcrRepositoryPolicyWithIAMRole(randString), Check: resource.ComposeTestCheckFunc( testAccCheckAWSEcrRepositoryPolicyExists("aws_ecr_repository_policy.default"), ), @@ -77,14 +82,15 @@ func testAccCheckAWSEcrRepositoryPolicyExists(name string) resource.TestCheckFun } } -var testAccAWSEcrRepositoryPolicy = ` +func testAccAWSEcrRepositoryPolicy(randString string) string { + return fmt.Sprintf(` # ECR initially only available in us-east-1 # https://aws.amazon.com/blogs/aws/ec2-container-registry-now-generally-available/ provider "aws" { region = "us-east-1" } resource "aws_ecr_repository" "foo" { - name = "bar" + name = "tf-acc-test-ecr-%s" } resource "aws_ecr_repository_policy" "default" { @@ -105,23 +111,25 @@ resource "aws_ecr_repository_policy" "default" { } EOF } -` +`, randString) +} // testAccAWSEcrRepositoryPolicyWithIAMRole creates a new IAM Role and tries // to use it's ARN in an ECR Repository Policy. IAM changes need some time to // be propagated to other services - like ECR. So the following code should // exercise our retry logic, since we try to use the new resource instantly. -var testAccAWSEcrRepositoryPolicyWithIAMRole = ` +func testAccAWSEcrRepositoryPolicyWithIAMRole(randString string) string { + return fmt.Sprintf(` provider "aws" { region = "us-east-1" } resource "aws_ecr_repository" "foo" { - name = "bar" + name = "tf-acc-test-ecr-%s" } resource "aws_iam_role" "foo" { - name = "bar" + name = "tf-acc-test-ecr-%s" assume_role_policy = <