@@ -15,27 +15,22 @@ func testAccAccessContextManagerIngressPolicy_basicTest(t *testing.T) {
1515 // Multiple fine-grained resources
1616 SkipIfVcr (t )
1717 org := GetTestOrgFromEnv (t )
18- projects := BootstrapServicePerimeterProjects (t , 2 )
18+ projects := BootstrapServicePerimeterProjects (t , 1 )
1919 policyTitle := RandString (t , 10 )
20- perimeterTitle := RandString ( t , 10 )
20+ perimeterTitle := "perimeter"
2121
2222 VcrTest (t , resource.TestCase {
2323 PreCheck : func () { AccTestPreCheck (t ) },
2424 ProtoV5ProviderFactories : ProtoV5ProviderFactories (t ),
2525 Steps : []resource.TestStep {
2626 {
27- Config : testAccAccessContextManagerIngressPolicy_basic (org , policyTitle , perimeterTitle , projects [0 ].ProjectNumber , projects [ 1 ]. ProjectNumber ),
27+ Config : testAccAccessContextManagerIngressPolicy_basic (org , policyTitle , perimeterTitle , projects [0 ].ProjectNumber ),
2828 },
2929 {
3030 ResourceName : "google_access_context_manager_ingress_policy.test-access1" ,
3131 ImportState : true ,
3232 ImportStateVerify : true ,
3333 },
34- {
35- ResourceName : "google_access_context_manager_ingress_policy.test-access2" ,
36- ImportState : true ,
37- ImportStateVerify : true ,
38- },
3934 {
4035 Config : testAccAccessContextManagerIngressPolicy_destroy (org , policyTitle , perimeterTitle ),
4136 Check : testAccCheckAccessContextManagerIngressPolicyDestroyProducer (t ),
@@ -86,7 +81,7 @@ func testAccCheckAccessContextManagerIngressPolicyDestroyProducer(t *testing.T)
8681 }
8782}
8883
89- func testAccAccessContextManagerIngressPolicy_basic (org , policyTitle , perimeterTitleName string , projectNumber1 , projectNumber2 int64 ) string {
84+ func testAccAccessContextManagerIngressPolicy_basic (org , policyTitle , perimeterTitleName string , projectNumber1 int64 ) string {
9085 return fmt .Sprintf (`
9186%s
9287
@@ -95,12 +90,7 @@ resource "google_access_context_manager_ingress_policy" "test-access1" {
9590 resource = "projects/%d"
9691}
9792
98- resource "google_access_context_manager_ingress_policy" "test-access2" {
99- ingress_policy_name = google_access_context_manager_service_perimeter.test-access.name
100- resource = "projects/%d"
101- }
102-
103- ` , testAccAccessContextManagerIngressPolicy_destroy (org , policyTitle , perimeterTitleName ), projectNumber1 , projectNumber2 )
93+ ` , testAccAccessContextManagerIngressPolicy_destroy (org , policyTitle , perimeterTitleName ), projectNumber1 )
10494}
10595
10696func testAccAccessContextManagerIngressPolicy_destroy (org , policyTitle , perimeterTitleName string ) string {
0 commit comments