From 76bf3db876a55e34276c9537a79c37c121887614 Mon Sep 17 00:00:00 2001 From: hc-github-team-tf-azure <> Date: Thu, 18 Jan 2024 17:28:12 +0000 Subject: [PATCH] Updating based on 4d4acfc68 --- ...d_access_role_binding_resource_gen_test.go | 61 ------------------- 1 file changed, 61 deletions(-) diff --git a/internal/services/containers/kubernetes_cluster_trusted_access_role_binding_resource_gen_test.go b/internal/services/containers/kubernetes_cluster_trusted_access_role_binding_resource_gen_test.go index 005583b9a8ad..eb7596630a6c 100644 --- a/internal/services/containers/kubernetes_cluster_trusted_access_role_binding_resource_gen_test.go +++ b/internal/services/containers/kubernetes_cluster_trusted_access_role_binding_resource_gen_test.go @@ -47,50 +47,6 @@ func TestAccKubernetesClusterTrustedAccessRoleBinding_requiresImport(t *testing. data.RequiresImportErrorStep(r.requiresImport), }) } - -func TestAccKubernetesClusterTrustedAccessRoleBinding_complete(t *testing.T) { - data := acceptance.BuildTestData(t, "azurerm_kubernetes_cluster_trusted_access_role_binding", "test") - r := KubernetesClusterTrustedAccessRoleBindingTestResource{} - - data.ResourceTest(t, r, []acceptance.TestStep{ - { - Config: r.complete(data), - Check: acceptance.ComposeTestCheckFunc( - check.That(data.ResourceName).ExistsInAzure(r), - ), - }, - data.ImportStep(), - }) -} - -func TestAccKubernetesClusterTrustedAccessRoleBinding_update(t *testing.T) { - data := acceptance.BuildTestData(t, "azurerm_kubernetes_cluster_trusted_access_role_binding", "test") - r := KubernetesClusterTrustedAccessRoleBindingTestResource{} - - data.ResourceTest(t, r, []acceptance.TestStep{ - { - Config: r.basic(data), - Check: acceptance.ComposeTestCheckFunc( - check.That(data.ResourceName).ExistsInAzure(r), - ), - }, - data.ImportStep(), - { - Config: r.complete(data), - Check: acceptance.ComposeTestCheckFunc( - check.That(data.ResourceName).ExistsInAzure(r), - ), - }, - data.ImportStep(), - { - Config: r.basic(data), - Check: acceptance.ComposeTestCheckFunc( - check.That(data.ResourceName).ExistsInAzure(r), - ), - }, - data.ImportStep(), - }) -} func (r KubernetesClusterTrustedAccessRoleBindingTestResource) Exists(ctx context.Context, clients *clients.Client, state *pluginsdk.InstanceState) (*bool, error) { id, err := trustedaccess.ParseTrustedAccessRoleBindingID(state.ID) if err != nil { @@ -134,23 +90,6 @@ resource "azurerm_kubernetes_cluster_trusted_access_role_binding" "import" { `, r.basic(data)) } -func (r KubernetesClusterTrustedAccessRoleBindingTestResource) complete(data acceptance.TestData) string { - return fmt.Sprintf(` -%s - -provider "azurerm" { - features {} -} - -resource "azurerm_kubernetes_cluster_trusted_access_role_binding" "test" { - kubernetes_cluster_id = azurerm_kubernetes_cluster.test.id - name = "acctestkctarb-${var.random_string}" - roles = ["Microsoft.MachineLearningServices/workspaces/mlworkload", "Microsoft.MachineLearningServices/workspaces/inference-v1"] - source_resource_id = azurerm_machine_learning_workspace.test.id -} -`, r.template(data)) -} - func (r KubernetesClusterTrustedAccessRoleBindingTestResource) template(data acceptance.TestData) string { return fmt.Sprintf(` variable "primary_location" {