Skip to content

Commit ed805b8

Browse files
Removed stale TODO assignments (#14631) (#23713)
[upstream:5a5a4ef93b9e393c9a1a6f8e6e394f8ee07e69f0] Signed-off-by: Modular Magician <[email protected]>
1 parent 2c6d49c commit ed805b8

File tree

37 files changed

+50
-50
lines changed

37 files changed

+50
-50
lines changed

google/acctest/bootstrap_test_utils.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -401,7 +401,7 @@ func BootstrapKMSKeyWithPurposeInLocationAndName(t *testing.T, purpose, location
401401
t.Fatalf("Unable to bootstrap KMS key. CryptoKey is nil!")
402402
}
403403

404-
// TODO(b/372305432): Use the pagination properly.
404+
// TODO: b/372305432 Use the pagination properly.
405405
ckvResp, err := kmsClient.Projects.Locations.KeyRings.CryptoKeys.CryptoKeyVersions.List(keyName).Do()
406406
if err != nil {
407407
t.Fatalf("Unable to list cryptoKeyVersions: %v", err)

google/fwresource/framework_location.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ func (ld *LocationDescription) GetLocation() (types.String, error) {
8686
}
8787

8888
func (ld *LocationDescription) GetRegion() (types.String, error) {
89-
// TODO(SarahFrench): Make empty strings not ignored, see https://github.com/hashicorp/terraform-provider-google/issues/14447
89+
// TODO: Make empty strings not ignored, see https://github.com/hashicorp/terraform-provider-google/issues/14447
9090
// For all checks in this function body
9191

9292
// Region from resource config
@@ -120,7 +120,7 @@ func (ld *LocationDescription) GetRegion() (types.String, error) {
120120
}
121121

122122
func (ld *LocationDescription) GetZone() (types.String, error) {
123-
// TODO(SarahFrench): Make empty strings not ignored, see https://github.com/hashicorp/terraform-provider-google/issues/14447
123+
// TODO: Make empty strings not ignored, see https://github.com/hashicorp/terraform-provider-google/issues/14447
124124
// For all checks in this function body
125125

126126
if !ld.ResourceZone.IsNull() && !ld.ResourceZone.IsUnknown() && !ld.ResourceZone.Equal(types.StringValue("")) {

google/services/beyondcorp/iam_beyondcorp_application_generated_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -314,7 +314,7 @@ func TestAccBeyondcorpApplicationIamPolicyGenerated_withCondition(t *testing.T)
314314
{
315315
Config: testAccBeyondcorpApplicationIamPolicy_withConditionGenerated(context),
316316
Check: resource.ComposeAggregateTestCheckFunc(
317-
// TODO(SarahFrench) - uncomment once https://github.com/GoogleCloudPlatform/magic-modules/pull/6466 merged
317+
// TODO - uncomment once https://github.com/GoogleCloudPlatform/magic-modules/pull/6466 merged
318318
// resource.TestCheckResourceAttr("data.google_iam_policy.foo", "policy_data", expectedPolicyData),
319319
resource.TestCheckResourceAttr("google_beyondcorp_application_iam_policy.foo", "policy_data", expectedPolicyData),
320320
resource.TestCheckResourceAttrWith("data.google_iam_policy.foo", "policy_data", tpgresource.CheckGoogleIamPolicy),

google/services/beyondcorp/iam_beyondcorp_security_gateway_application_generated_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -314,7 +314,7 @@ func TestAccBeyondcorpSecurityGatewayApplicationIamPolicyGenerated_withCondition
314314
{
315315
Config: testAccBeyondcorpSecurityGatewayApplicationIamPolicy_withConditionGenerated(context),
316316
Check: resource.ComposeAggregateTestCheckFunc(
317-
// TODO(SarahFrench) - uncomment once https://github.com/GoogleCloudPlatform/magic-modules/pull/6466 merged
317+
// TODO - uncomment once https://github.com/GoogleCloudPlatform/magic-modules/pull/6466 merged
318318
// resource.TestCheckResourceAttr("data.google_iam_policy.foo", "policy_data", expectedPolicyData),
319319
resource.TestCheckResourceAttr("google_beyondcorp_security_gateway_application_iam_policy.foo", "policy_data", expectedPolicyData),
320320
resource.TestCheckResourceAttrWith("data.google_iam_policy.foo", "policy_data", tpgresource.CheckGoogleIamPolicy),

google/services/beyondcorp/iam_beyondcorp_security_gateway_generated_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -314,7 +314,7 @@ func TestAccBeyondcorpSecurityGatewayIamPolicyGenerated_withCondition(t *testing
314314
{
315315
Config: testAccBeyondcorpSecurityGatewayIamPolicy_withConditionGenerated(context),
316316
Check: resource.ComposeAggregateTestCheckFunc(
317-
// TODO(SarahFrench) - uncomment once https://github.com/GoogleCloudPlatform/magic-modules/pull/6466 merged
317+
// TODO - uncomment once https://github.com/GoogleCloudPlatform/magic-modules/pull/6466 merged
318318
// resource.TestCheckResourceAttr("data.google_iam_policy.foo", "policy_data", expectedPolicyData),
319319
resource.TestCheckResourceAttr("google_beyondcorp_security_gateway_iam_policy.foo", "policy_data", expectedPolicyData),
320320
resource.TestCheckResourceAttrWith("data.google_iam_policy.foo", "policy_data", tpgresource.CheckGoogleIamPolicy),

google/services/bigtable/resource_bigtable_instance_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -212,7 +212,7 @@ func TestAccBigtableInstance_kms(t *testing.T) {
212212
ImportStateVerify: true,
213213
ImportStateVerifyIgnore: []string{"deletion_protection", "instance_type"}, // we don't read instance type back
214214
},
215-
// TODO(kevinsi4508): Verify that the instance can be recreated due to `kms_key_name` change.
215+
// TODO: Verify that the instance can be recreated due to `kms_key_name` change.
216216
{
217217
Config: testAccBigtableInstance_kms(pid, instanceName, kms2.CryptoKey.Name, 3),
218218
PlanOnly: true,

google/services/bigtable/resource_bigtable_table.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -698,7 +698,7 @@ func FlattenColumnFamily(families []bigtable.FamilyInfo) ([]map[string]interface
698698
return result, nil
699699
}
700700

701-
// TODO(rileykarson): Fix the stored import format after rebasing 3.0.0
701+
// TODO: Fix the stored import format after rebasing 3.0.0
702702
func resourceBigtableTableImport(d *schema.ResourceData, meta interface{}) ([]*schema.ResourceData, error) {
703703
config := meta.(*transport_tpg.Config)
704704
if err := tpgresource.ParseImportId([]string{

google/services/composer/resource_composer_environment_test.go

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -132,7 +132,7 @@ func TestAccComposerEnvironment_withEncryptionConfigComposer2(t *testing.T) {
132132
},
133133
// This is a terrible clean-up step in order to get destroy to succeed,
134134
// due to dangling firewall rules left by the Composer Environment blocking network deletion.
135-
// TODO(dzarmola): Remove this check if firewall rules bug gets fixed by Composer.
135+
// TODO: Remove this check if firewall rules bug gets fixed by Composer.
136136
{
137137
PlanOnly: true,
138138
ExpectNonEmptyPlan: false,
@@ -166,7 +166,7 @@ func TestAccComposerEnvironment_withMaintenanceWindow(t *testing.T) {
166166
},
167167
// This is a terrible clean-up step in order to get destroy to succeed,
168168
// due to dangling firewall rules left by the Composer Environment blocking network deletion.
169-
// TODO(dzarmola): Remove this check if firewall rules bug gets fixed by Composer.
169+
// TODO: Remove this check if firewall rules bug gets fixed by Composer.
170170
{
171171
PlanOnly: true,
172172
ExpectNonEmptyPlan: false,
@@ -237,7 +237,7 @@ func TestAccComposerEnvironment_ComposerV2(t *testing.T) {
237237
},
238238
// This is a terrible clean-up step in order to get destroy to succeed,
239239
// due to dangling firewall rules left by the Composer Environment blocking network deletion.
240-
// TODO(dzarmola): Remove this check if firewall rules bug gets fixed by Composer.
240+
// TODO: Remove this check if firewall rules bug gets fixed by Composer.
241241
{
242242
PlanOnly: true,
243243
ExpectNonEmptyPlan: false,
@@ -274,7 +274,7 @@ func TestAccComposerEnvironment_UpdateComposerV2ImageVersion(t *testing.T) {
274274
},
275275
// This is a terrible clean-up step in order to get destroy to succeed,
276276
// due to dangling firewall rules left by the Composer Environment blocking network deletion.
277-
// TODO(dzarmola): Remove this check if firewall rules bug gets fixed by Composer.
277+
// TODO: Remove this check if firewall rules bug gets fixed by Composer.
278278
{
279279
PlanOnly: true,
280280
ExpectNonEmptyPlan: false,
@@ -311,7 +311,7 @@ func TestAccComposerEnvironment_UpdateComposerV2ResilienceMode(t *testing.T) {
311311
},
312312
// This is a terrible clean-up step in order to get destroy to succeed,
313313
// due to dangling firewall rules left by the Composer Environment blocking network deletion.
314-
// TODO(dzarmola): Remove this check if firewall rules bug gets fixed by Composer.
314+
// TODO: Remove this check if firewall rules bug gets fixed by Composer.
315315
{
316316
PlanOnly: true,
317317
ExpectNonEmptyPlan: false,
@@ -345,7 +345,7 @@ func TestAccComposerEnvironment_ComposerV2HighResilience(t *testing.T) {
345345
},
346346
// This is a terrible clean-up step in order to get destroy to succeed,
347347
// due to dangling firewall rules left by the Composer Environment blocking network deletion.
348-
// TODO(dzarmola): Remove this check if firewall rules bug gets fixed by Composer.
348+
// TODO: Remove this check if firewall rules bug gets fixed by Composer.
349349
{
350350
PlanOnly: true,
351351
ExpectNonEmptyPlan: false,
@@ -382,7 +382,7 @@ func TestAccComposerEnvironment_UpdateComposerV2WithTriggerer(t *testing.T) {
382382
},
383383
// This is a terrible clean-up step in order to get destroy to succeed,
384384
// due to dangling firewall rules left by the Composer Environment blocking network deletion.
385-
// TODO(dzarmola): Remove this check if firewall rules bug gets fixed by Composer.
385+
// TODO: Remove this check if firewall rules bug gets fixed by Composer.
386386
{
387387
PlanOnly: true,
388388
ExpectNonEmptyPlan: false,
@@ -419,7 +419,7 @@ func TestAccComposerEnvironment_UpdateComposerV2(t *testing.T) {
419419
},
420420
// This is a terrible clean-up step in order to get destroy to succeed,
421421
// due to dangling firewall rules left by the Composer Environment blocking network deletion.
422-
// TODO(dzarmola): Remove this check if firewall rules bug gets fixed by Composer.
422+
// TODO: Remove this check if firewall rules bug gets fixed by Composer.
423423
{
424424
PlanOnly: true,
425425
ExpectNonEmptyPlan: false,
@@ -453,7 +453,7 @@ func TestAccComposerEnvironment_composerV2PrivateServiceConnect(t *testing.T) {
453453
},
454454
// This is a terrible clean-up step in order to get destroy to succeed,
455455
// due to dangling firewall rules left by the Composer Environment blocking network deletion.
456-
// TODO(dzarmola): Remove this check if firewall rules bug gets fixed by Composer.
456+
// TODO: Remove this check if firewall rules bug gets fixed by Composer.
457457
{
458458
PlanOnly: true,
459459
ExpectNonEmptyPlan: false,
@@ -487,7 +487,7 @@ func TestAccComposerEnvironment_composerV2MasterAuthNetworks(t *testing.T) {
487487
},
488488
// This is a terrible clean-up step in order to get destroy to succeed,
489489
// due to dangling firewall rules left by the Composer Environment blocking network deletion.
490-
// TODO(dzarmola): Remove this check if firewall rules bug gets fixed by Composer.
490+
// TODO: Remove this check if firewall rules bug gets fixed by Composer.
491491
{
492492
PlanOnly: true,
493493
ExpectNonEmptyPlan: false,
@@ -524,7 +524,7 @@ func TestAccComposerEnvironment_composerV2MasterAuthNetworksUpdate(t *testing.T)
524524
},
525525
// This is a terrible clean-up step in order to get destroy to succeed,
526526
// due to dangling firewall rules left by the Composer Environment blocking network deletion.
527-
// TODO(dzarmola): Remove this check if firewall rules bug gets fixed by Composer.
527+
// TODO: Remove this check if firewall rules bug gets fixed by Composer.
528528
{
529529
PlanOnly: true,
530530
ExpectNonEmptyPlan: false,

google/services/compute/iam_compute_image_generated_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -314,7 +314,7 @@ func TestAccComputeImageIamPolicyGenerated_withCondition(t *testing.T) {
314314
{
315315
Config: testAccComputeImageIamPolicy_withConditionGenerated(context),
316316
Check: resource.ComposeAggregateTestCheckFunc(
317-
// TODO(SarahFrench) - uncomment once https://github.com/GoogleCloudPlatform/magic-modules/pull/6466 merged
317+
// TODO - uncomment once https://github.com/GoogleCloudPlatform/magic-modules/pull/6466 merged
318318
// resource.TestCheckResourceAttr("data.google_iam_policy.foo", "policy_data", expectedPolicyData),
319319
resource.TestCheckResourceAttr("google_compute_image_iam_policy.foo", "policy_data", expectedPolicyData),
320320
resource.TestCheckResourceAttrWith("data.google_iam_policy.foo", "policy_data", tpgresource.CheckGoogleIamPolicy),

google/services/compute/iam_compute_instance_generated_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -314,7 +314,7 @@ func TestAccComputeInstanceIamPolicyGenerated_withCondition(t *testing.T) {
314314
{
315315
Config: testAccComputeInstanceIamPolicy_withConditionGenerated(context),
316316
Check: resource.ComposeAggregateTestCheckFunc(
317-
// TODO(SarahFrench) - uncomment once https://github.com/GoogleCloudPlatform/magic-modules/pull/6466 merged
317+
// TODO - uncomment once https://github.com/GoogleCloudPlatform/magic-modules/pull/6466 merged
318318
// resource.TestCheckResourceAttr("data.google_iam_policy.foo", "policy_data", expectedPolicyData),
319319
resource.TestCheckResourceAttr("google_compute_instance_iam_policy.foo", "policy_data", expectedPolicyData),
320320
resource.TestCheckResourceAttrWith("data.google_iam_policy.foo", "policy_data", tpgresource.CheckGoogleIamPolicy),

0 commit comments

Comments
 (0)