Skip to content

Commit

Permalink
add context.Context to api getters
Browse files Browse the repository at this point in the history
  • Loading branch information
johnsonaj committed Jun 12, 2023
1 parent 9036fd7 commit 66ff923
Show file tree
Hide file tree
Showing 2 changed files with 7 additions and 7 deletions.
8 changes: 4 additions & 4 deletions internal/service/opensearchserverless/security_policy.go
Original file line number Diff line number Diff line change
Expand Up @@ -104,7 +104,7 @@ func (r *resourceSecurityPolicy) Create(ctx context.Context, req resource.Create
return
}

conn := r.Meta().OpenSearchServerlessClient()
conn := r.Meta().OpenSearchServerlessClient(ctx)

in := &opensearchserverless.CreateSecurityPolicyInput{
ClientToken: aws.String(id.UniqueId()),
Expand Down Expand Up @@ -132,7 +132,7 @@ func (r *resourceSecurityPolicy) Create(ctx context.Context, req resource.Create
}

func (r *resourceSecurityPolicy) Read(ctx context.Context, req resource.ReadRequest, resp *resource.ReadResponse) {
conn := r.Meta().OpenSearchServerlessClient()
conn := r.Meta().OpenSearchServerlessClient(ctx)

var state resourceSecurityPolicyData
resp.Diagnostics.Append(req.State.Get(ctx, &state)...)
Expand All @@ -152,7 +152,7 @@ func (r *resourceSecurityPolicy) Read(ctx context.Context, req resource.ReadRequ
}

func (r *resourceSecurityPolicy) Update(ctx context.Context, req resource.UpdateRequest, resp *resource.UpdateResponse) {
conn := r.Meta().OpenSearchServerlessClient()
conn := r.Meta().OpenSearchServerlessClient(ctx)

var plan, state resourceSecurityPolicyData
resp.Diagnostics.Append(req.State.Get(ctx, &state)...)
Expand Down Expand Up @@ -191,7 +191,7 @@ func (r *resourceSecurityPolicy) Update(ctx context.Context, req resource.Update
}

func (r *resourceSecurityPolicy) Delete(ctx context.Context, req resource.DeleteRequest, resp *resource.DeleteResponse) {
conn := r.Meta().OpenSearchServerlessClient()
conn := r.Meta().OpenSearchServerlessClient(ctx)

var state resourceSecurityPolicyData
resp.Diagnostics.Append(req.State.Get(ctx, &state)...)
Expand Down
6 changes: 3 additions & 3 deletions internal/service/opensearchserverless/security_policy_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -120,7 +120,7 @@ func TestAccOpenSearchServerlessSecurityPolicy_disappears(t *testing.T) {

func testAccCheckSecurityPolicyDestroy(ctx context.Context) resource.TestCheckFunc {
return func(s *terraform.State) error {
conn := acctest.Provider.Meta().(*conns.AWSClient).OpenSearchServerlessClient()
conn := acctest.Provider.Meta().(*conns.AWSClient).OpenSearchServerlessClient(ctx)

for _, rs := range s.RootModule().Resources {
if rs.Type != "aws_opensearchserverless_security_policy" {
Expand Down Expand Up @@ -155,7 +155,7 @@ func testAccCheckSecurityPolicyExists(ctx context.Context, name string, security
return create.Error(names.OpenSearchServerless, create.ErrActionCheckingExistence, tfopensearchserverless.ResNameSecurityPolicy, name, errors.New("not set"))
}

conn := acctest.Provider.Meta().(*conns.AWSClient).OpenSearchServerlessClient()
conn := acctest.Provider.Meta().(*conns.AWSClient).OpenSearchServerlessClient(ctx)
resp, err := tfopensearchserverless.FindSecurityPolicyByNameAndType(ctx, conn, rs.Primary.ID, rs.Primary.Attributes["type"])

if err != nil {
Expand All @@ -180,7 +180,7 @@ func testAccSecurityPolicyImportStateIdFunc(resourceName string) resource.Import
}

func testAccPreCheck(ctx context.Context, t *testing.T) {
conn := acctest.Provider.Meta().(*conns.AWSClient).OpenSearchServerlessClient()
conn := acctest.Provider.Meta().(*conns.AWSClient).OpenSearchServerlessClient(ctx)

input := &opensearchserverless.ListSecurityPoliciesInput{
Type: types.SecurityPolicyTypeEncryption,
Expand Down

0 comments on commit 66ff923

Please sign in to comment.