@@ -18,7 +18,6 @@ import (
1818
1919var serviceCredentialsSecretName = "terraform-test-sc-secret"
2020var modifiedServiceCredentialsSecretName = "modified-terraform-test-sc-secret"
21- var serviceCredentialsParameters = `{"HMAC":"true"}`
2221var serviceCredentialsParametersWithServiceId = `{"serviceid_crn": ibm_iam_service_id.ibm_iam_service_id_instance.crn}`
2322var serviceCredentialsTtl = "172800"
2423var modifiedServiceCredentialsTtl = "6048000"
@@ -95,39 +94,6 @@ func TestAccIbmSmServiceCredentialsSecretAllArgs(t *testing.T) {
9594 })
9695}
9796
98- func TestAccIbmSmServiceCredentialsSecretAllArgsWithExistingServiceId (t * testing.T ) {
99- resourceName := "ibm_sm_service_credentials_secret.sm_service_credentials_secret_service_id"
100-
101- resource .Test (t , resource.TestCase {
102- PreCheck : func () { acc .TestAccPreCheck (t ) },
103- Providers : acc .TestAccProviders ,
104- CheckDestroy : testAccCheckIbmSmServiceCredentialsSecretDestroy ,
105- Steps : []resource.TestStep {
106- resource.TestStep {
107- Config : serviceCredentialsSecretConfigAllArgsWithExistingServiceId (),
108- Check : resource .ComposeAggregateTestCheckFunc (
109- testAccCheckIbmSmServiceCredentialsSecretCreated (resourceName ),
110- resource .TestCheckResourceAttrSet (resourceName , "secret_id" ),
111- resource .TestCheckResourceAttrSet (resourceName , "created_by" ),
112- resource .TestCheckResourceAttrSet (resourceName , "created_at" ),
113- resource .TestCheckResourceAttrSet (resourceName , "updated_at" ),
114- resource .TestCheckResourceAttrSet (resourceName , "crn" ),
115- resource .TestCheckResourceAttrSet (resourceName , "downloaded" ),
116- resource .TestCheckResourceAttrSet (resourceName , "next_rotation_date" ),
117- resource .TestCheckResourceAttr (resourceName , "state" , "1" ),
118- resource .TestCheckResourceAttr (resourceName , "versions_total" , "1" ),
119- ),
120- },
121- resource.TestStep {
122- ResourceName : resourceName ,
123- ImportState : true ,
124- ImportStateVerify : true ,
125- ImportStateVerifyIgnore : []string {"ttl" },
126- },
127- },
128- })
129- }
130-
13197var serviceCredentialsSecretBasicConfigFormat = `
13298 resource "ibm_sm_service_credentials_secret" "sm_service_credentials_secret_basic" {
13399 instance_id = "%s"
@@ -166,28 +132,6 @@ var serviceCredentialsSecretFullConfigFormat = `
166132 rotation %s
167133 }`
168134
169- var serviceCredentialsSecretFullConfigFormatWithExistingServiceId = `
170- resource "ibm_sm_service_credentials_secret" "sm_service_credentials_secret_service_id" {
171- instance_id = "%s"
172- region = "%s"
173- name = "%s"
174- description = "%s"
175- labels = ["%s"]
176- source_service {
177- instance {
178- crn = "%s"
179- }
180- parameters = %s
181- role {
182- crn = "%s"
183- }
184- }
185- ttl = "%s"
186- custom_metadata = %s
187- secret_group_id = "default"
188- rotation %s
189- }`
190-
191135func iamServiceIdConfig () string {
192136 return fmt .Sprintf (`
193137 resource "ibm_iam_service_id" "ibm_iam_service_id_instance" {
@@ -197,22 +141,17 @@ func iamServiceIdConfig() string {
197141
198142func serviceCredentialsSecretConfigBasic () string {
199143 return fmt .Sprintf (serviceCredentialsSecretBasicConfigFormat , acc .SecretsManagerInstanceID , acc .SecretsManagerInstanceRegion ,
200- serviceCredentialsSecretName , acc .SecretsManagerServiceCredentialsCosCrn , serviceCredentialsRoleCrn , serviceCredentialsTtl )
144+ serviceCredentialsSecretName , acc .SecretsManagerENInstanceCrn , serviceCredentialsRoleCrn , serviceCredentialsTtl )
201145}
202146
203147func serviceCredentialsSecretConfigAllArgs () string {
204- return fmt .Sprintf (serviceCredentialsSecretFullConfigFormat , acc .SecretsManagerInstanceID , acc .SecretsManagerInstanceRegion ,
205- serviceCredentialsSecretName , description , label , acc .SecretsManagerServiceCredentialsCosCrn , serviceCredentialsParameters , serviceCredentialsRoleCrn , serviceCredentialsTtl , customMetadata , rotationPolicy )
206- }
207-
208- func serviceCredentialsSecretConfigAllArgsWithExistingServiceId () string {
209- return iamServiceIdConfig () + fmt .Sprintf (serviceCredentialsSecretFullConfigFormatWithExistingServiceId , acc .SecretsManagerInstanceID , acc .SecretsManagerInstanceRegion ,
210- serviceCredentialsSecretName , description , label , acc .SecretsManagerServiceCredentialsCosCrn , serviceCredentialsParametersWithServiceId , serviceCredentialsRoleCrn , serviceCredentialsTtl , customMetadata , rotationPolicy )
148+ return iamServiceIdConfig () + fmt .Sprintf (serviceCredentialsSecretFullConfigFormat , acc .SecretsManagerInstanceID , acc .SecretsManagerInstanceRegion ,
149+ serviceCredentialsSecretName , description , label , acc .SecretsManagerENInstanceCrn , serviceCredentialsParametersWithServiceId , serviceCredentialsRoleCrn , serviceCredentialsTtl , customMetadata , rotationPolicy )
211150}
212151
213152func serviceCredentialsSecretConfigUpdated () string {
214- return fmt .Sprintf (serviceCredentialsSecretFullConfigFormat , acc .SecretsManagerInstanceID , acc .SecretsManagerInstanceRegion ,
215- modifiedServiceCredentialsSecretName , modifiedDescription , modifiedLabel , acc .SecretsManagerServiceCredentialsCosCrn , serviceCredentialsParameters , serviceCredentialsRoleCrn ,
153+ return iamServiceIdConfig () + fmt .Sprintf (serviceCredentialsSecretFullConfigFormat , acc .SecretsManagerInstanceID , acc .SecretsManagerInstanceRegion ,
154+ modifiedServiceCredentialsSecretName , modifiedDescription , modifiedLabel , acc .SecretsManagerENInstanceCrn , serviceCredentialsParametersWithServiceId , serviceCredentialsRoleCrn ,
216155 modifiedServiceCredentialsTtl , modifiedCustomMetadata , modifiedRotationPolicy )
217156}
218157
@@ -251,7 +190,7 @@ func testAccCheckIbmSmServiceCredentialsSecretCreated(n string) resource.TestChe
251190 if err := verifyAttr (* secret .TTL , serviceCredentialsTtl , "ttl" ); err != nil {
252191 return err
253192 }
254- if err := verifyAttr (* secret .SourceService .Instance .Crn , acc .SecretsManagerServiceCredentialsCosCrn , "source_service.Instance.Crn" ); err != nil {
193+ if err := verifyAttr (* secret .SourceService .Instance .Crn , acc .SecretsManagerENInstanceCrn , "source_service.Instance.Crn" ); err != nil {
255194 return err
256195 }
257196 if err := verifyAttr (* secret .SourceService .Role .Crn , serviceCredentialsRoleCrn , "source_service.Role.Crn" ); err != nil {
0 commit comments