diff --git a/internal/service/opensearchserverless/security_policy.go b/internal/service/opensearchserverless/security_policy.go index 1ea5e64526be..8ad924a2eeb9 100644 --- a/internal/service/opensearchserverless/security_policy.go +++ b/internal/service/opensearchserverless/security_policy.go @@ -104,7 +104,7 @@ func (r *resourceSecurityPolicy) Create(ctx context.Context, req resource.Create return } - conn := r.Meta().OpenSearchServerlessClient() + conn := r.Meta().OpenSearchServerlessClient(ctx) in := &opensearchserverless.CreateSecurityPolicyInput{ ClientToken: aws.String(id.UniqueId()), @@ -132,7 +132,7 @@ func (r *resourceSecurityPolicy) Create(ctx context.Context, req resource.Create } func (r *resourceSecurityPolicy) Read(ctx context.Context, req resource.ReadRequest, resp *resource.ReadResponse) { - conn := r.Meta().OpenSearchServerlessClient() + conn := r.Meta().OpenSearchServerlessClient(ctx) var state resourceSecurityPolicyData resp.Diagnostics.Append(req.State.Get(ctx, &state)...) @@ -152,7 +152,7 @@ func (r *resourceSecurityPolicy) Read(ctx context.Context, req resource.ReadRequ } func (r *resourceSecurityPolicy) Update(ctx context.Context, req resource.UpdateRequest, resp *resource.UpdateResponse) { - conn := r.Meta().OpenSearchServerlessClient() + conn := r.Meta().OpenSearchServerlessClient(ctx) var plan, state resourceSecurityPolicyData resp.Diagnostics.Append(req.State.Get(ctx, &state)...) @@ -191,7 +191,7 @@ func (r *resourceSecurityPolicy) Update(ctx context.Context, req resource.Update } func (r *resourceSecurityPolicy) Delete(ctx context.Context, req resource.DeleteRequest, resp *resource.DeleteResponse) { - conn := r.Meta().OpenSearchServerlessClient() + conn := r.Meta().OpenSearchServerlessClient(ctx) var state resourceSecurityPolicyData resp.Diagnostics.Append(req.State.Get(ctx, &state)...) diff --git a/internal/service/opensearchserverless/security_policy_test.go b/internal/service/opensearchserverless/security_policy_test.go index ac1f5039031e..8c0db5830599 100644 --- a/internal/service/opensearchserverless/security_policy_test.go +++ b/internal/service/opensearchserverless/security_policy_test.go @@ -120,7 +120,7 @@ func TestAccOpenSearchServerlessSecurityPolicy_disappears(t *testing.T) { func testAccCheckSecurityPolicyDestroy(ctx context.Context) resource.TestCheckFunc { return func(s *terraform.State) error { - conn := acctest.Provider.Meta().(*conns.AWSClient).OpenSearchServerlessClient() + conn := acctest.Provider.Meta().(*conns.AWSClient).OpenSearchServerlessClient(ctx) for _, rs := range s.RootModule().Resources { if rs.Type != "aws_opensearchserverless_security_policy" { @@ -155,7 +155,7 @@ func testAccCheckSecurityPolicyExists(ctx context.Context, name string, security return create.Error(names.OpenSearchServerless, create.ErrActionCheckingExistence, tfopensearchserverless.ResNameSecurityPolicy, name, errors.New("not set")) } - conn := acctest.Provider.Meta().(*conns.AWSClient).OpenSearchServerlessClient() + conn := acctest.Provider.Meta().(*conns.AWSClient).OpenSearchServerlessClient(ctx) resp, err := tfopensearchserverless.FindSecurityPolicyByNameAndType(ctx, conn, rs.Primary.ID, rs.Primary.Attributes["type"]) if err != nil { @@ -180,7 +180,7 @@ func testAccSecurityPolicyImportStateIdFunc(resourceName string) resource.Import } func testAccPreCheck(ctx context.Context, t *testing.T) { - conn := acctest.Provider.Meta().(*conns.AWSClient).OpenSearchServerlessClient() + conn := acctest.Provider.Meta().(*conns.AWSClient).OpenSearchServerlessClient(ctx) input := &opensearchserverless.ListSecurityPoliciesInput{ Type: types.SecurityPolicyTypeEncryption,