Skip to content

Commit daeaf7e

Browse files
committed
r/aws_iam_role: Use 'inttypes.IsZero'.
1 parent f96ffc5 commit daeaf7e

File tree

1 file changed

+37
-37
lines changed

1 file changed

+37
-37
lines changed

internal/service/iam/role.go

Lines changed: 37 additions & 37 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,6 @@ import (
1010
"iter"
1111
"log"
1212
"net/url"
13-
"reflect"
1413
"strings"
1514
"time"
1615

@@ -43,7 +42,7 @@ import (
4342
"github.com/hashicorp/terraform-provider-aws/internal/retry"
4443
tftags "github.com/hashicorp/terraform-provider-aws/internal/tags"
4544
"github.com/hashicorp/terraform-provider-aws/internal/tfresource"
46-
itypes "github.com/hashicorp/terraform-provider-aws/internal/types"
45+
inttypes "github.com/hashicorp/terraform-provider-aws/internal/types"
4746
"github.com/hashicorp/terraform-provider-aws/internal/verify"
4847
"github.com/hashicorp/terraform-provider-aws/names"
4948
)
@@ -214,7 +213,7 @@ func resourceRole() *schema.Resource {
214213
}
215214

216215
// @SDKListResource("aws_iam_role")
217-
func instanceResourceAsListResource() itypes.ListResourceForSDK {
216+
func instanceResourceAsListResource() inttypes.ListResourceForSDK {
218217
l := roleListResource{}
219218
l.SetResourceSchema(resourceRole())
220219

@@ -231,7 +230,7 @@ func resourceRoleCreate(ctx context.Context, d *schema.ResourceData, meta any) d
231230
}
232231

233232
name := create.Name(d.Get(names.AttrName).(string), d.Get(names.AttrNamePrefix).(string))
234-
input := &iam.CreateRoleInput{
233+
input := iam.CreateRoleInput{
235234
AssumeRolePolicyDocument: aws.String(assumeRolePolicy),
236235
Path: aws.String(d.Get(names.AttrPath).(string)),
237236
RoleName: aws.String(name),
@@ -250,14 +249,14 @@ func resourceRoleCreate(ctx context.Context, d *schema.ResourceData, meta any) d
250249
input.PermissionsBoundary = aws.String(v.(string))
251250
}
252251

253-
output, err := retryCreateRole(ctx, conn, input)
252+
output, err := retryCreateRole(ctx, conn, &input)
254253

255254
// Some partitions (e.g. ISO) may not support tag-on-create.
256255
partition := meta.(*conns.AWSClient).Partition(ctx)
257256
if input.Tags != nil && errs.IsUnsupportedOperationInPartitionError(partition, err) {
258257
input.Tags = nil
259258

260-
output, err = retryCreateRole(ctx, conn, input)
259+
output, err = retryCreateRole(ctx, conn, &input)
261260
}
262261

263262
if err != nil {
@@ -369,14 +368,14 @@ func resourceRoleUpdate(ctx context.Context, d *schema.ResourceData, meta any) d
369368
return sdkdiag.AppendErrorf(diags, "assume_role_policy (%s) is invalid JSON: %s", assumeRolePolicy, err)
370369
}
371370

372-
input := &iam.UpdateAssumeRolePolicyInput{
371+
input := iam.UpdateAssumeRolePolicyInput{
373372
RoleName: aws.String(d.Id()),
374373
PolicyDocument: aws.String(assumeRolePolicy),
375374
}
376375

377376
_, err = tfresource.RetryWhen(ctx, propagationTimeout,
378377
func(ctx context.Context) (any, error) {
379-
return conn.UpdateAssumeRolePolicy(ctx, input)
378+
return conn.UpdateAssumeRolePolicy(ctx, &input)
380379
},
381380
func(err error) (bool, error) {
382381
if errs.IsAErrorMessageContains[*awstypes.MalformedPolicyDocumentException](err, "Invalid principal in policy") {
@@ -393,25 +392,25 @@ func resourceRoleUpdate(ctx context.Context, d *schema.ResourceData, meta any) d
393392
}
394393

395394
if d.HasChange(names.AttrDescription) {
396-
input := &iam.UpdateRoleDescriptionInput{
397-
RoleName: aws.String(d.Id()),
395+
input := iam.UpdateRoleDescriptionInput{
398396
Description: aws.String(d.Get(names.AttrDescription).(string)),
397+
RoleName: aws.String(d.Id()),
399398
}
400399

401-
_, err := conn.UpdateRoleDescription(ctx, input)
400+
_, err := conn.UpdateRoleDescription(ctx, &input)
402401

403402
if err != nil {
404403
return sdkdiag.AppendErrorf(diags, "updating IAM Role (%s) description: %s", d.Id(), err)
405404
}
406405
}
407406

408407
if d.HasChange("max_session_duration") {
409-
input := &iam.UpdateRoleInput{
410-
RoleName: aws.String(d.Id()),
408+
input := iam.UpdateRoleInput{
411409
MaxSessionDuration: aws.Int32(int32(d.Get("max_session_duration").(int))),
410+
RoleName: aws.String(d.Id()),
412411
}
413412

414-
_, err := conn.UpdateRole(ctx, input)
413+
_, err := conn.UpdateRole(ctx, &input)
415414

416415
if err != nil {
417416
return sdkdiag.AppendErrorf(diags, "updating IAM Role (%s) MaxSessionDuration: %s", d.Id(), err)
@@ -421,22 +420,22 @@ func resourceRoleUpdate(ctx context.Context, d *schema.ResourceData, meta any) d
421420
if d.HasChange("permissions_boundary") {
422421
permissionsBoundary := d.Get("permissions_boundary").(string)
423422
if permissionsBoundary != "" {
424-
input := &iam.PutRolePermissionsBoundaryInput{
423+
input := iam.PutRolePermissionsBoundaryInput{
425424
PermissionsBoundary: aws.String(permissionsBoundary),
426425
RoleName: aws.String(d.Id()),
427426
}
428427

429-
_, err := conn.PutRolePermissionsBoundary(ctx, input)
428+
_, err := conn.PutRolePermissionsBoundary(ctx, &input)
430429

431430
if err != nil {
432431
return sdkdiag.AppendErrorf(diags, "updating IAM Role (%s) permissions boundary: %s", d.Id(), err)
433432
}
434433
} else {
435-
input := &iam.DeleteRolePermissionsBoundaryInput{
434+
input := iam.DeleteRolePermissionsBoundaryInput{
436435
RoleName: aws.String(d.Id()),
437436
}
438437

439-
_, err := conn.DeleteRolePermissionsBoundary(ctx, input)
438+
_, err := conn.DeleteRolePermissionsBoundary(ctx, &input)
440439

441440
if err != nil {
442441
return sdkdiag.AppendErrorf(diags, "deleting IAM Role (%s) permissions boundary: %s", d.Id(), err)
@@ -558,12 +557,12 @@ func deleteRole(ctx context.Context, conn *iam.Client, roleName string, forceDet
558557
}
559558
}
560559

561-
input := &iam.DeleteRoleInput{
560+
input := iam.DeleteRoleInput{
562561
RoleName: aws.String(roleName),
563562
}
564563

565564
_, err := tfresource.RetryWhenIsA[any, *awstypes.DeleteConflictException](ctx, propagationTimeout, func(ctx context.Context) (any, error) {
566-
return conn.DeleteRole(ctx, input)
565+
return conn.DeleteRole(ctx, &input)
567566
})
568567

569568
if errs.IsA[*awstypes.NoSuchEntityException](err) {
@@ -588,12 +587,12 @@ func deleteRoleInstanceProfiles(ctx context.Context, conn *iam.Client, roleName
588587

589588
for _, instanceProfile := range instanceProfiles {
590589
instanceProfileName := aws.ToString(instanceProfile.InstanceProfileName)
591-
input := &iam.RemoveRoleFromInstanceProfileInput{
590+
input := iam.RemoveRoleFromInstanceProfileInput{
592591
InstanceProfileName: aws.String(instanceProfileName),
593592
RoleName: aws.String(roleName),
594593
}
595594

596-
_, err := conn.RemoveRoleFromInstanceProfile(ctx, input)
595+
_, err := conn.RemoveRoleFromInstanceProfile(ctx, &input)
597596

598597
if errs.IsA[*awstypes.NoSuchEntityException](err) {
599598
continue
@@ -637,11 +636,11 @@ func retryCreateRole(ctx context.Context, conn *iam.Client, input *iam.CreateRol
637636
}
638637

639638
func findRoleByName(ctx context.Context, conn *iam.Client, name string) (*awstypes.Role, error) {
640-
input := &iam.GetRoleInput{
639+
input := iam.GetRoleInput{
641640
RoleName: aws.String(name),
642641
}
643642

644-
return findRole(ctx, conn, input)
643+
return findRole(ctx, conn, &input)
645644
}
646645

647646
func findRole(ctx context.Context, conn *iam.Client, input *iam.GetRoleInput) (*awstypes.Role, error) {
@@ -767,12 +766,12 @@ func resourceRoleFlatten(ctx context.Context, role *awstypes.Role, d *schema.Res
767766
}
768767

769768
func findRoleAttachedPolicies(ctx context.Context, conn *iam.Client, roleName string) ([]string, error) {
770-
input := &iam.ListAttachedRolePoliciesInput{
769+
input := iam.ListAttachedRolePoliciesInput{
771770
RoleName: aws.String(roleName),
772771
}
773772
var output []string
774773

775-
pages := iam.NewListAttachedRolePoliciesPaginator(conn, input)
774+
pages := iam.NewListAttachedRolePoliciesPaginator(conn, &input)
776775
for pages.HasMorePages() {
777776
page, err := pages.NextPage(ctx)
778777

@@ -787,7 +786,7 @@ func findRoleAttachedPolicies(ctx context.Context, conn *iam.Client, roleName st
787786
}
788787

789788
for _, v := range page.AttachedPolicies {
790-
if !reflect.ValueOf(v).IsZero() {
789+
if p := &v; !inttypes.IsZero(p) {
791790
output = append(output, aws.ToString(v.PolicyArn))
792791
}
793792
}
@@ -797,12 +796,12 @@ func findRoleAttachedPolicies(ctx context.Context, conn *iam.Client, roleName st
797796
}
798797

799798
func findRolePolicyNames(ctx context.Context, conn *iam.Client, roleName string) ([]string, error) {
800-
input := &iam.ListRolePoliciesInput{
799+
input := iam.ListRolePoliciesInput{
801800
RoleName: aws.String(roleName),
802801
}
803802
var output []string
804803

805-
pages := iam.NewListRolePoliciesPaginator(conn, input)
804+
pages := iam.NewListRolePoliciesPaginator(conn, &input)
806805
for pages.HasMorePages() {
807806
page, err := pages.NextPage(ctx)
808807

@@ -830,12 +829,12 @@ func deleteRolePolicyAttachments(ctx context.Context, conn *iam.Client, roleName
830829
var errsList []error
831830

832831
for _, policyARN := range policyARNs {
833-
input := &iam.DetachRolePolicyInput{
832+
input := iam.DetachRolePolicyInput{
834833
PolicyArn: aws.String(policyARN),
835834
RoleName: aws.String(roleName),
836835
}
837836

838-
_, err := conn.DetachRolePolicy(ctx, input)
837+
_, err := conn.DetachRolePolicy(ctx, &input)
839838

840839
if errs.IsA[*awstypes.NoSuchEntityException](err) {
841840
continue
@@ -857,12 +856,12 @@ func deleteRoleInlinePolicies(ctx context.Context, conn *iam.Client, roleName st
857856
continue
858857
}
859858

860-
input := &iam.DeleteRolePolicyInput{
859+
input := iam.DeleteRolePolicyInput{
861860
PolicyName: aws.String(policyName),
862861
RoleName: aws.String(roleName),
863862
}
864863

865-
_, err := conn.DeleteRolePolicy(ctx, input)
864+
_, err := conn.DeleteRolePolicy(ctx, &input)
866865

867866
if errs.IsA[*awstypes.NoSuchEntityException](err) {
868867
continue
@@ -997,10 +996,11 @@ func readRoleInlinePolicies(ctx context.Context, conn *iam.Client, roleName stri
997996
var apiObjects []*iam.PutRolePolicyInput
998997

999998
for _, policyName := range policyNames {
1000-
output, err := conn.GetRolePolicy(ctx, &iam.GetRolePolicyInput{
1001-
RoleName: aws.String(roleName),
999+
input := iam.GetRolePolicyInput{
10021000
PolicyName: aws.String(policyName),
1003-
})
1001+
RoleName: aws.String(roleName),
1002+
}
1003+
output, err := conn.GetRolePolicy(ctx, &input)
10041004

10051005
if err != nil {
10061006
return nil, err
@@ -1017,9 +1017,9 @@ func readRoleInlinePolicies(ctx context.Context, conn *iam.Client, roleName stri
10171017
}
10181018

10191019
apiObject := &iam.PutRolePolicyInput{
1020-
RoleName: aws.String(roleName),
10211020
PolicyDocument: aws.String(p),
10221021
PolicyName: aws.String(policyName),
1022+
RoleName: aws.String(roleName),
10231023
}
10241024

10251025
apiObjects = append(apiObjects, apiObject)

0 commit comments

Comments
 (0)