44 "testing"
55
66 "github.com/elastic/terraform-provider-elasticstack/internal/acctest"
7- "github.com/elastic/terraform-provider-elasticstack/internal/utils "
7+ "github.com/elastic/terraform-provider-elasticstack/internal/acctest/checks "
88 "github.com/elastic/terraform-provider-elasticstack/internal/versionutils"
99 "github.com/hashicorp/go-version"
1010 "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource"
@@ -21,11 +21,11 @@ func TestAccDataSourceSecurityRole(t *testing.T) {
2121 Check : resource .ComposeTestCheckFunc (
2222 resource .TestCheckResourceAttr ("data.elasticstack_elasticsearch_security_role.test" , "name" , "data_source_test" ),
2323 resource .TestCheckTypeSetElemAttr ("data.elasticstack_elasticsearch_security_role.test" , "cluster.*" , "all" ),
24- utils .TestCheckResourceListAttr ("data.elasticstack_elasticsearch_security_role.test" , "indices.0.names" , []string {"index1" , "index2" }),
24+ checks .TestCheckResourceListAttr ("data.elasticstack_elasticsearch_security_role.test" , "indices.0.names" , []string {"index1" , "index2" }),
2525 resource .TestCheckTypeSetElemAttr ("data.elasticstack_elasticsearch_security_role.test" , "indices.0.privileges.*" , "all" ),
2626 resource .TestCheckResourceAttr ("data.elasticstack_elasticsearch_security_role.test" , "indices.0.allow_restricted_indices" , "true" ),
2727 resource .TestCheckResourceAttr ("data.elasticstack_elasticsearch_security_role.test" , "applications.0.application" , "myapp" ),
28- utils .TestCheckResourceListAttr ("data.elasticstack_elasticsearch_security_role.test" , "applications.0.privileges" , []string {"admin" , "read" }),
28+ checks .TestCheckResourceListAttr ("data.elasticstack_elasticsearch_security_role.test" , "applications.0.privileges" , []string {"admin" , "read" }),
2929 resource .TestCheckTypeSetElemAttr ("data.elasticstack_elasticsearch_security_role.test" , "applications.0.resources.*" , "*" ),
3030 resource .TestCheckTypeSetElemAttr ("data.elasticstack_elasticsearch_security_role.test" , "run_as.*" , "other_user" ),
3131 resource .TestCheckResourceAttr ("data.elasticstack_elasticsearch_security_role.test" , "metadata" , `{"version":1}` ),
@@ -37,11 +37,11 @@ func TestAccDataSourceSecurityRole(t *testing.T) {
3737 Check : resource .ComposeTestCheckFunc (
3838 resource .TestCheckResourceAttr ("data.elasticstack_elasticsearch_security_role.test" , "name" , "data_source_test" ),
3939 resource .TestCheckTypeSetElemAttr ("data.elasticstack_elasticsearch_security_role.test" , "cluster.*" , "all" ),
40- utils .TestCheckResourceListAttr ("data.elasticstack_elasticsearch_security_role.test" , "indices.0.names" , []string {"index1" , "index2" }),
40+ checks .TestCheckResourceListAttr ("data.elasticstack_elasticsearch_security_role.test" , "indices.0.names" , []string {"index1" , "index2" }),
4141 resource .TestCheckTypeSetElemAttr ("data.elasticstack_elasticsearch_security_role.test" , "indices.0.privileges.*" , "all" ),
4242 resource .TestCheckResourceAttr ("data.elasticstack_elasticsearch_security_role.test" , "indices.0.allow_restricted_indices" , "true" ),
4343 resource .TestCheckResourceAttr ("data.elasticstack_elasticsearch_security_role.test" , "applications.0.application" , "myapp" ),
44- utils .TestCheckResourceListAttr ("data.elasticstack_elasticsearch_security_role.test" , "applications.0.privileges" , []string {"admin" , "read" }),
44+ checks .TestCheckResourceListAttr ("data.elasticstack_elasticsearch_security_role.test" , "applications.0.privileges" , []string {"admin" , "read" }),
4545 resource .TestCheckTypeSetElemAttr ("data.elasticstack_elasticsearch_security_role.test" , "applications.0.resources.*" , "*" ),
4646 resource .TestCheckTypeSetElemAttr ("data.elasticstack_elasticsearch_security_role.test" , "run_as.*" , "other_user" ),
4747 resource .TestCheckResourceAttr ("data.elasticstack_elasticsearch_security_role.test" , "metadata" , `{"version":1}` ),
@@ -55,11 +55,11 @@ func TestAccDataSourceSecurityRole(t *testing.T) {
5555 Check : resource .ComposeTestCheckFunc (
5656 resource .TestCheckResourceAttr ("data.elasticstack_elasticsearch_security_role.test" , "name" , "data_source_test" ),
5757 resource .TestCheckTypeSetElemAttr ("data.elasticstack_elasticsearch_security_role.test" , "cluster.*" , "all" ),
58- utils .TestCheckResourceListAttr ("data.elasticstack_elasticsearch_security_role.test" , "indices.0.names" , []string {"index1" , "index2" }),
58+ checks .TestCheckResourceListAttr ("data.elasticstack_elasticsearch_security_role.test" , "indices.0.names" , []string {"index1" , "index2" }),
5959 resource .TestCheckTypeSetElemAttr ("data.elasticstack_elasticsearch_security_role.test" , "indices.0.privileges.*" , "all" ),
6060 resource .TestCheckResourceAttr ("data.elasticstack_elasticsearch_security_role.test" , "indices.0.allow_restricted_indices" , "true" ),
6161 resource .TestCheckResourceAttr ("data.elasticstack_elasticsearch_security_role.test" , "applications.0.application" , "myapp" ),
62- utils .TestCheckResourceListAttr ("data.elasticstack_elasticsearch_security_role.test" , "applications.0.privileges" , []string {"admin" , "read" }),
62+ checks .TestCheckResourceListAttr ("data.elasticstack_elasticsearch_security_role.test" , "applications.0.privileges" , []string {"admin" , "read" }),
6363 resource .TestCheckTypeSetElemAttr ("data.elasticstack_elasticsearch_security_role.test" , "applications.0.resources.*" , "*" ),
6464 resource .TestCheckTypeSetElemAttr ("data.elasticstack_elasticsearch_security_role.test" , "run_as.*" , "other_user" ),
6565 resource .TestCheckResourceAttr ("data.elasticstack_elasticsearch_security_role.test" , "metadata" , `{"version":1}` ),
0 commit comments