Skip to content

Commit 759363a

Browse files
authored
range int (#2900)
1 parent 61eda15 commit 759363a

File tree

10 files changed

+12
-12
lines changed

10 files changed

+12
-12
lines changed

internal/common/conversion/model_generation.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ func CopyModel[T any](src any) (*T, error) {
2020
}
2121
typeSrc := valSrc.Type()
2222
typeDest := valDest.Type()
23-
for i := 0; i < typeDest.NumField(); i++ {
23+
for i := range typeDest.NumField() {
2424
fieldDest := typeDest.Field(i)
2525
name := fieldDest.Name
2626
{

internal/service/advancedcluster/model_advanced_cluster.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -417,7 +417,7 @@ func flattenTags(tags *[]admin.ResourceTag) []map[string]string {
417417
func CheckRegionConfigsPriorityOrder(regionConfigs []admin.ReplicationSpec20240805) error {
418418
for _, spec := range regionConfigs {
419419
configs := spec.GetRegionConfigs()
420-
for i := 0; i < len(configs)-1; i++ {
420+
for i := range len(configs) - 1 {
421421
if configs[i].GetPriority() < configs[i+1].GetPriority() {
422422
return errors.New("priority values in region_configs must be in descending order")
423423
}
@@ -430,7 +430,7 @@ func CheckRegionConfigsPriorityOrder(regionConfigs []admin.ReplicationSpec202408
430430
func CheckRegionConfigsPriorityOrderOld(regionConfigs []admin20240530.ReplicationSpec) error {
431431
for _, spec := range regionConfigs {
432432
configs := spec.GetRegionConfigs()
433-
for i := 0; i < len(configs)-1; i++ {
433+
for i := range len(configs) - 1 {
434434
if configs[i].GetPriority() < configs[i+1].GetPriority() {
435435
return errors.New("priority values in region_configs must be in descending order")
436436
}
@@ -603,7 +603,7 @@ func flattenAdvancedReplicationSpecsLogic[T ReplicationSpecSDKModel](
603603
tfList := make([]map[string]any, len(apiObjects))
604604
wasAPIObjectUsed := make([]bool, len(apiObjects))
605605

606-
for i := 0; i < len(tfList); i++ {
606+
for i := range len(tfList) {
607607
var tfMapObject map[string]any
608608

609609
if len(tfMapObjects) > i {

internal/service/alertconfiguration/data_source_alert_configuration.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -335,7 +335,7 @@ func outputAlertConfigurationResourceHcl(label string, alert *admin.GroupAlertsC
335335
}
336336

337337
notifications := alert.GetNotifications()
338-
for i := 0; i < len(notifications); i++ {
338+
for i := range len(notifications) {
339339
appendBlockWithCtyValues(resource, "notification", []string{}, convertNotificationToCtyValues(&notifications[i]))
340340
}
341341

internal/service/alertconfiguration/model_alert_configuration.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -311,7 +311,7 @@ func NewTFAlertConfigurationDSModelList(alerts []admin.GroupAlertsConfig, projec
311311

312312
results := make([]TFAlertConfigurationDSModel, len(alerts))
313313

314-
for i := 0; i < len(alerts); i++ {
314+
for i := range len(alerts) {
315315
alert := alerts[i]
316316
label := fmt.Sprintf("%s_%d", *alert.EventTypeName, i)
317317
resultAlertConfigModel := NewTfAlertConfigurationDSModel(&alerts[i], projectID)

internal/service/cloudprovideraccess/resource_cloud_provider_access_authorization.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -284,7 +284,7 @@ func authorizeRole(ctx context.Context, client *admin.APIClient, d *schema.Resou
284284
var role *admin.CloudProviderAccessRole
285285
var err error
286286

287-
for i := 0; i < 3; i++ {
287+
for range 3 {
288288
role, _, err = client.CloudProviderAccessApi.AuthorizeCloudProviderAccessRole(ctx, projectID, roleID, req).Execute()
289289
if err != nil && strings.Contains(err.Error(), "CANNOT_ASSUME_ROLE") { // aws takes time to update , in case of single path
290290
log.Printf("warning issue performing authorize: %s \n", err.Error())

internal/service/customdbrole/resource_custom_db_role_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -382,7 +382,7 @@ func TestAccConfigRSCustomDBRoles_MultipleResources(t *testing.T) {
382382
orgID = os.Getenv("MONGODB_ATLAS_ORG_ID")
383383
)
384384

385-
for i := 0; i < 5; i++ {
385+
for i := range 5 {
386386
roleName := fmt.Sprintf("test-acc-custom_role-%d", i)
387387
projectName := acc.RandomProjectName()
388388
t.Run(roleName, func(t *testing.T) {

internal/service/projectipaccesslist/resource_project_ip_access_list_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -117,7 +117,7 @@ func TestAccProjectIPAccessList_settingMultiple(t *testing.T) {
117117
checks = []resource.TestCheckFunc{}
118118
)
119119

120-
for i := 0; i < ipWhiteListCount; i++ {
120+
for i := range ipWhiteListCount {
121121
entry := make(map[string]string)
122122
entryName := ""
123123
ipAddr := ""

internal/service/resourcepolicy/resource_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -163,7 +163,7 @@ func checksResourcePolicy(orgID, name string, policyCount int) resource.TestChec
163163
}
164164
checks := []resource.TestCheckFunc{checkExists()}
165165
checks = acc.AddAttrChecks(dataSourcePluralID, checks, pluralMap)
166-
for i := 0; i < policyCount; i++ {
166+
for i := range policyCount {
167167
checks = acc.AddAttrSetChecks(resourceID, checks, fmt.Sprintf("policies.%d.body", i), fmt.Sprintf("policies.%d.id", i))
168168
checks = acc.AddAttrSetChecks(dataSourceID, checks, fmt.Sprintf("policies.%d.body", i), fmt.Sprintf("policies.%d.id", i))
169169
checks = acc.AddAttrSetChecks(dataSourcePluralID, checks, fmt.Sprintf("results.0.policies.%d.body", i), fmt.Sprintf("results.0.policies.%d.id", i))

internal/service/team/update_user.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ func GetChangesForTeamUsers(currentUsers, newUsers []admin.CloudAppUser) (toAdd,
7777

7878
func InitUserSet(users []admin.CloudAppUser) map[string]bool {
7979
usersSet := make(map[string]bool, len(users))
80-
for i := 0; i < len(users); i++ {
80+
for i := range len(users) {
8181
usersSet[users[i].GetId()] = true
8282
}
8383
return usersSet

internal/testutil/unit/http_mocker_round_tripper.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -138,7 +138,7 @@ func (r *MockRoundTripper) CheckStepRequests(_ *terraform.State) error {
138138
missingRequestsCount := len(req.Responses) - r.usedResponses[req.id()]
139139
if missingRequestsCount > 0 {
140140
missingIndexes := []string{}
141-
for i := 0; i < missingRequestsCount; i++ {
141+
for i := range missingRequestsCount {
142142
missingResponse := (len(req.Responses) - missingRequestsCount) + i
143143
missingIndexes = append(missingIndexes, fmt.Sprintf("%d", req.Responses[missingResponse].ResponseIndex))
144144
}

0 commit comments

Comments
 (0)