Skip to content

Commit 6964085

Browse files
Merge pull request hashicorp#14170 from hashicorp/f/linting
datalakestore: fixing linting issues
2 parents 6ed425d + 431afb5 commit 6964085

File tree

3 files changed

+33
-10
lines changed

3 files changed

+33
-10
lines changed

internal/acceptance/testcase.go

+6-5
Original file line numberDiff line numberDiff line change
@@ -13,21 +13,23 @@ import (
1313
"github.com/hashicorp/terraform-provider-azurerm/internal/provider"
1414
)
1515

16-
// lintignore:AT001
1716
func (td TestData) DataSourceTest(t *testing.T, steps []TestStep) {
1817
// DataSources don't need a check destroy - however since this is a wrapper function
1918
// and not matching the ignore pattern `XXX_data_source_test.go`, this needs to be explicitly opted out
19+
20+
// lintignore:AT001
2021
testCase := resource.TestCase{
2122
PreCheck: func() { PreCheck(t) },
2223
Steps: steps,
2324
}
2425
td.runAcceptanceTest(t, testCase)
2526
}
2627

27-
// lintignore:AT001
2828
func (td TestData) DataSourceTestInSequence(t *testing.T, steps []TestStep) {
2929
// DataSources don't need a check destroy - however since this is a wrapper function
3030
// and not matching the ignore pattern `XXX_data_source_test.go`, this needs to be explicitly opted out
31+
32+
// lintignore:AT001
3133
testCase := resource.TestCase{
3234
PreCheck: func() { PreCheck(t) },
3335
Steps: steps,
@@ -36,7 +38,6 @@ func (td TestData) DataSourceTestInSequence(t *testing.T, steps []TestStep) {
3638
td.runAcceptanceSequentialTest(t, testCase)
3739
}
3840

39-
// lintignore:AT001
4041
func (td TestData) ResourceTest(t *testing.T, testResource types.TestResource, steps []TestStep) {
4142
testCase := resource.TestCase{
4243
PreCheck: func() { PreCheck(t) },
@@ -54,17 +55,17 @@ func (td TestData) ResourceTest(t *testing.T, testResource types.TestResource, s
5455

5556
// ResourceTestIgnoreCheckDestroyed skips the check to confirm the resource test has been destroyed.
5657
// This is done because certain resources can't actually be deleted.
57-
// lintignore:AT001
5858
func (td TestData) ResourceTestSkipCheckDestroyed(t *testing.T, steps []TestStep) {
59+
// lintignore:AT001
5960
testCase := resource.TestCase{
6061
PreCheck: func() { PreCheck(t) },
6162
Steps: steps,
6263
}
6364
td.runAcceptanceTest(t, testCase)
6465
}
6566

66-
// lintignore:AT001
6767
func (td TestData) ResourceSequentialTestSkipCheckDestroyed(t *testing.T, steps []TestStep) {
68+
// lintignore:AT001
6869
testCase := resource.TestCase{
6970
PreCheck: func() { PreCheck(t) },
7071
Steps: steps,

internal/services/datalake/data_lake_analytics_account_resource.go

+5-1
Original file line numberDiff line numberDiff line change
@@ -191,7 +191,11 @@ func resourceArmDateLakeAnalyticsAccountRead(d *pluginsdk.ResourceData, meta int
191191
}
192192

193193
if properties := model.Properties; properties != nil {
194-
d.Set("tier", properties.CurrentTier)
194+
tier := ""
195+
if properties.CurrentTier != nil {
196+
tier = string(*properties.CurrentTier)
197+
}
198+
d.Set("tier", tier)
195199
d.Set("default_store_account_name", properties.DefaultDataLakeStoreAccount)
196200
}
197201

internal/services/datalake/data_lake_store_data_source.go

+22-4
Original file line numberDiff line numberDiff line change
@@ -88,11 +88,29 @@ func dataSourceArmDateLakeStoreAccountRead(d *pluginsdk.ResourceData, meta inter
8888
}
8989

9090
if properties := model.Properties; properties != nil {
91-
d.Set("tier", properties.CurrentTier)
91+
tier := ""
92+
if properties.CurrentTier != nil {
93+
tier = string(*properties.CurrentTier)
94+
}
95+
d.Set("tier", tier)
96+
97+
encryptionState := ""
98+
if properties.EncryptionState != nil {
99+
encryptionState = string(*properties.EncryptionState)
100+
}
101+
d.Set("encryption_state", encryptionState)
92102

93-
d.Set("encryption_state", properties.EncryptionState)
94-
d.Set("firewall_allow_azure_ips", properties.FirewallAllowAzureIps)
95-
d.Set("firewall_state", properties.FirewallState)
103+
firewallState := ""
104+
if properties.FirewallState != nil {
105+
firewallState = string(*properties.FirewallState)
106+
}
107+
d.Set("firewall_state", firewallState)
108+
109+
firewallAllowAzureIps := ""
110+
if properties.FirewallAllowAzureIps != nil {
111+
firewallAllowAzureIps = string(*properties.FirewallAllowAzureIps)
112+
}
113+
d.Set("firewall_allow_azure_ips", firewallAllowAzureIps)
96114

97115
if config := properties.EncryptionConfig; config != nil {
98116
d.Set("encryption_type", string(config.Type))

0 commit comments

Comments
 (0)