Skip to content

Commit

Permalink
Merge pull request #38911 from DanielRieske/f/cleanup-sdkv2-migrations
Browse files Browse the repository at this point in the history
Cleanup leftover `v1` references in merged `aws-sdk-go-v2` migrations
  • Loading branch information
ewbankkit authored Aug 19, 2024
2 parents fadaf66 + c5f451d commit f8093f1
Show file tree
Hide file tree
Showing 94 changed files with 343 additions and 400 deletions.
33 changes: 16 additions & 17 deletions internal/provider/provider_acc_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -11,10 +11,9 @@ import (
"strings"
"testing"

"github.com/aws/aws-sdk-go-v2/aws"
awsmiddleware "github.com/aws/aws-sdk-go-v2/aws/middleware"
sts_sdkv2 "github.com/aws/aws-sdk-go-v2/service/sts"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/aws/endpoints"
"github.com/aws/smithy-go/middleware"
"github.com/hashicorp/terraform-plugin-go/tfprotov5"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
Expand Down Expand Up @@ -518,10 +517,10 @@ func TestAccProvider_Region_c2s(t *testing.T) {
CheckDestroy: nil,
Steps: []resource.TestStep{
{
Config: testAccProviderConfig_region(endpoints.UsIsoEast1RegionID),
Config: testAccProviderConfig_region(names.USISOEast1RegionID),
Check: resource.ComposeTestCheckFunc(
testAccCheckDNSSuffix(ctx, t, &provider, "c2s.ic.gov"),
testAccCheckPartition(ctx, t, &provider, endpoints.AwsIsoPartitionID),
testAccCheckPartition(ctx, t, &provider, names.ISOPartitionID),
testAccCheckReverseDNSPrefix(ctx, t, &provider, "gov.ic.c2s"),
),
PlanOnly: true,
Expand All @@ -541,10 +540,10 @@ func TestAccProvider_Region_china(t *testing.T) {
CheckDestroy: nil,
Steps: []resource.TestStep{
{
Config: testAccProviderConfig_region(endpoints.CnNorthwest1RegionID),
Config: testAccProviderConfig_region(names.CNNorthwest1RegionID),
Check: resource.ComposeTestCheckFunc(
testAccCheckDNSSuffix(ctx, t, &provider, "amazonaws.com.cn"),
testAccCheckPartition(ctx, t, &provider, endpoints.AwsCnPartitionID),
testAccCheckPartition(ctx, t, &provider, names.ChinaPartitionID),
testAccCheckReverseDNSPrefix(ctx, t, &provider, "cn.com.amazonaws"),
),
PlanOnly: true,
Expand All @@ -564,10 +563,10 @@ func TestAccProvider_Region_commercial(t *testing.T) {
CheckDestroy: nil,
Steps: []resource.TestStep{
{
Config: testAccProviderConfig_region(endpoints.UsWest2RegionID),
Config: testAccProviderConfig_region(names.USWest2RegionID),
Check: resource.ComposeTestCheckFunc(
testAccCheckDNSSuffix(ctx, t, &provider, "amazonaws.com"),
testAccCheckPartition(ctx, t, &provider, endpoints.AwsPartitionID),
testAccCheckPartition(ctx, t, &provider, names.StandardPartitionID),
testAccCheckReverseDNSPrefix(ctx, t, &provider, "com.amazonaws"),
),
PlanOnly: true,
Expand All @@ -587,10 +586,10 @@ func TestAccProvider_Region_govCloud(t *testing.T) {
CheckDestroy: nil,
Steps: []resource.TestStep{
{
Config: testAccProviderConfig_region(endpoints.UsGovWest1RegionID),
Config: testAccProviderConfig_region(names.USGovWest1RegionID),
Check: resource.ComposeTestCheckFunc(
testAccCheckDNSSuffix(ctx, t, &provider, "amazonaws.com"),
testAccCheckPartition(ctx, t, &provider, endpoints.AwsUsGovPartitionID),
testAccCheckPartition(ctx, t, &provider, names.USGovCloudPartitionID),
testAccCheckReverseDNSPrefix(ctx, t, &provider, "com.amazonaws"),
),
PlanOnly: true,
Expand All @@ -610,10 +609,10 @@ func TestAccProvider_Region_sc2s(t *testing.T) {
CheckDestroy: nil,
Steps: []resource.TestStep{
{
Config: testAccProviderConfig_region(endpoints.UsIsobEast1RegionID),
Config: testAccProviderConfig_region(names.USISOBEast1RegionID),
Check: resource.ComposeTestCheckFunc(
testAccCheckDNSSuffix(ctx, t, &provider, "sc2s.sgov.gov"),
testAccCheckPartition(ctx, t, &provider, endpoints.AwsIsoBPartitionID),
testAccCheckPartition(ctx, t, &provider, names.ISOBPartitionID),
testAccCheckReverseDNSPrefix(ctx, t, &provider, "gov.sgov.sc2s"),
),
PlanOnly: true,
Expand All @@ -633,10 +632,10 @@ func TestAccProvider_Region_stsRegion(t *testing.T) {
CheckDestroy: nil,
Steps: []resource.TestStep{
{
Config: testAccProviderConfig_stsRegion(endpoints.UsEast1RegionID, endpoints.UsWest2RegionID),
Config: testAccProviderConfig_stsRegion(names.USEast1RegionID, names.USWest2RegionID),
Check: resource.ComposeTestCheckFunc(
testAccCheckRegion(ctx, t, &provider, endpoints.UsEast1RegionID),
testAccCheckSTSRegion(ctx, t, &provider, endpoints.UsWest2RegionID),
testAccCheckRegion(ctx, t, &provider, names.USEast1RegionID),
testAccCheckSTSRegion(ctx, t, &provider, names.USWest2RegionID),
),
PlanOnly: true,
},
Expand Down Expand Up @@ -951,7 +950,7 @@ func testAccCheckProviderDefaultTags_Tags(ctx context.Context, t *testing.T, p *
var found bool

for _, actualElement := range actualTags {
if aws.StringValue(actualElement.Value) == expectedElement {
if aws.ToString(actualElement.Value) == expectedElement {
found = true
break
}
Expand All @@ -966,7 +965,7 @@ func testAccCheckProviderDefaultTags_Tags(ctx context.Context, t *testing.T, p *
var found bool

for _, expectedElement := range expectedTags {
if aws.StringValue(actualElement.Value) == expectedElement {
if aws.ToString(actualElement.Value) == expectedElement {
found = true
break
}
Expand Down
48 changes: 23 additions & 25 deletions internal/service/acmpca/certificate_authority_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -9,9 +9,7 @@ import (
"testing"

"github.com/YakDriver/regexache"
"github.com/aws/aws-sdk-go-v2/service/acmpca/types"
"github.com/aws/aws-sdk-go/aws/endpoints"
"github.com/aws/aws-sdk-go/service/acmpca"
awstypes "github.com/aws/aws-sdk-go-v2/service/acmpca/types"
sdkacctest "github.com/hashicorp/terraform-plugin-testing/helper/acctest"
"github.com/hashicorp/terraform-plugin-testing/helper/resource"
"github.com/hashicorp/terraform-plugin-testing/terraform"
Expand All @@ -26,7 +24,7 @@ var testAccCheckCertificateAuthorityExists = acctest.CheckACMPCACertificateAutho

func TestAccACMPCACertificateAuthority_basic(t *testing.T) {
ctx := acctest.Context(t)
var certificateAuthority types.CertificateAuthority
var certificateAuthority awstypes.CertificateAuthority
resourceName := "aws_acmpca_certificate_authority.test"
commonName := acctest.RandomDomainName()

Expand Down Expand Up @@ -74,7 +72,7 @@ func TestAccACMPCACertificateAuthority_basic(t *testing.T) {

func TestAccACMPCACertificateAuthority_disappears(t *testing.T) {
ctx := acctest.Context(t)
var certificateAuthority types.CertificateAuthority
var certificateAuthority awstypes.CertificateAuthority
resourceName := "aws_acmpca_certificate_authority.test"
commonName := acctest.RandomDomainName()

Expand All @@ -98,7 +96,7 @@ func TestAccACMPCACertificateAuthority_disappears(t *testing.T) {

func TestAccACMPCACertificateAuthority_enabledDeprecated(t *testing.T) {
ctx := acctest.Context(t)
var certificateAuthority types.CertificateAuthority
var certificateAuthority awstypes.CertificateAuthority
resourceName := "aws_acmpca_certificate_authority.test"
commonName := acctest.RandomDomainName()

Expand All @@ -109,24 +107,24 @@ func TestAccACMPCACertificateAuthority_enabledDeprecated(t *testing.T) {
CheckDestroy: testAccCheckCertificateAuthorityDestroy(ctx),
Steps: []resource.TestStep{
{
Config: testAccCertificateAuthorityConfig_enabled(commonName, acmpca.CertificateAuthorityTypeRoot, true),
Config: testAccCertificateAuthorityConfig_enabled(commonName, string(awstypes.CertificateAuthorityTypeRoot), true),
Check: resource.ComposeTestCheckFunc(
testAccCheckCertificateAuthorityExists(ctx, resourceName, &certificateAuthority),
resource.TestCheckResourceAttr(resourceName, names.AttrType, acmpca.CertificateAuthorityTypeRoot),
resource.TestCheckResourceAttr(resourceName, names.AttrType, string(awstypes.CertificateAuthorityTypeRoot)),
resource.TestCheckResourceAttr(resourceName, names.AttrEnabled, acctest.CtTrue),
acctest.CheckACMPCACertificateAuthorityActivateRootCA(ctx, &certificateAuthority),
),
},
{
Config: testAccCertificateAuthorityConfig_enabled(commonName, acmpca.CertificateAuthorityTypeRoot, true),
Config: testAccCertificateAuthorityConfig_enabled(commonName, string(awstypes.CertificateAuthorityTypeRoot), true),
Check: resource.ComposeTestCheckFunc(
testAccCheckCertificateAuthorityExists(ctx, resourceName, &certificateAuthority),
resource.TestCheckResourceAttr(resourceName, names.AttrType, acmpca.CertificateAuthorityTypeRoot),
resource.TestCheckResourceAttr(resourceName, names.AttrType, string(awstypes.CertificateAuthorityTypeRoot)),
resource.TestCheckResourceAttr(resourceName, names.AttrEnabled, acctest.CtTrue),
),
},
{
Config: testAccCertificateAuthorityConfig_enabled(commonName, acmpca.CertificateAuthorityTypeRoot, false),
Config: testAccCertificateAuthorityConfig_enabled(commonName, string(awstypes.CertificateAuthorityTypeRoot), false),
Check: resource.ComposeTestCheckFunc(
testAccCheckCertificateAuthorityExists(ctx, resourceName, &certificateAuthority),
resource.TestCheckResourceAttr(resourceName, names.AttrEnabled, acctest.CtFalse),
Expand All @@ -146,7 +144,7 @@ func TestAccACMPCACertificateAuthority_enabledDeprecated(t *testing.T) {

func TestAccACMPCACertificateAuthority_usageMode(t *testing.T) {
ctx := acctest.Context(t)
var certificateAuthority types.CertificateAuthority
var certificateAuthority awstypes.CertificateAuthority
resourceName := "aws_acmpca_certificate_authority.test"
commonName := acctest.RandomDomainName()

Expand All @@ -157,7 +155,7 @@ func TestAccACMPCACertificateAuthority_usageMode(t *testing.T) {
CheckDestroy: testAccCheckCertificateAuthorityDestroy(ctx),
Steps: []resource.TestStep{
{
Config: testAccCertificateAuthorityConfig_usageMode(commonName, acmpca.CertificateAuthorityTypeRoot, "SHORT_LIVED_CERTIFICATE"),
Config: testAccCertificateAuthorityConfig_usageMode(commonName, string(awstypes.CertificateAuthorityTypeRoot), "SHORT_LIVED_CERTIFICATE"),
Check: resource.ComposeTestCheckFunc(
testAccCheckCertificateAuthorityExists(ctx, resourceName, &certificateAuthority),
resource.TestCheckResourceAttr(resourceName, "usage_mode", "SHORT_LIVED_CERTIFICATE"),
Expand All @@ -177,22 +175,22 @@ func TestAccACMPCACertificateAuthority_usageMode(t *testing.T) {

func TestAccACMPCACertificateAuthority_keyStorageSecurityStandard(t *testing.T) {
ctx := acctest.Context(t)
var certificateAuthority types.CertificateAuthority
var certificateAuthority awstypes.CertificateAuthority
resourceName := "aws_acmpca_certificate_authority.test"
commonName := acctest.RandomDomainName()

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() {
acctest.PreCheck(ctx, t)
// See https://docs.aws.amazon.com/privateca/latest/userguide/data-protection.html#private-keys.
acctest.PreCheckRegion(t, endpoints.ApSouth2RegionID, endpoints.ApSoutheast3RegionID, endpoints.ApSoutheast4RegionID, endpoints.EuCentral2RegionID, endpoints.EuSouth2RegionID, endpoints.MeCentral1RegionID)
acctest.PreCheckRegion(t, names.APSouth2RegionID, names.APSoutheast3RegionID, names.APSoutheast4RegionID, names.EUCentral2RegionID, names.EUSouth2RegionID, names.MECentral1RegionID)
},
ErrorCheck: acctest.ErrorCheck(t, names.ACMPCAServiceID),
ProtoV5ProviderFactories: acctest.ProtoV5ProviderFactories,
CheckDestroy: testAccCheckCertificateAuthorityDestroy(ctx),
Steps: []resource.TestStep{
{
Config: testAccCertificateAuthorityConfig_keyStorageSecurityStandard(commonName, acmpca.CertificateAuthorityTypeRoot, "FIPS_140_2_LEVEL_2_OR_HIGHER"),
Config: testAccCertificateAuthorityConfig_keyStorageSecurityStandard(commonName, string(awstypes.CertificateAuthorityTypeRoot), "FIPS_140_2_LEVEL_2_OR_HIGHER"),
Check: resource.ComposeTestCheckFunc(
testAccCheckCertificateAuthorityExists(ctx, resourceName, &certificateAuthority),
resource.TestCheckResourceAttr(resourceName, "key_storage_security_standard", "FIPS_140_2_LEVEL_2_OR_HIGHER"),
Expand All @@ -212,7 +210,7 @@ func TestAccACMPCACertificateAuthority_keyStorageSecurityStandard(t *testing.T)

func TestAccACMPCACertificateAuthority_deleteFromActiveState(t *testing.T) {
ctx := acctest.Context(t)
var certificateAuthority types.CertificateAuthority
var certificateAuthority awstypes.CertificateAuthority
resourceName := "aws_acmpca_certificate_authority.test"
commonName := acctest.RandomDomainName()

Expand All @@ -226,7 +224,7 @@ func TestAccACMPCACertificateAuthority_deleteFromActiveState(t *testing.T) {
Config: testAccCertificateAuthorityConfig_root(commonName),
Check: resource.ComposeAggregateTestCheckFunc(
testAccCheckCertificateAuthorityExists(ctx, resourceName, &certificateAuthority),
resource.TestCheckResourceAttr(resourceName, names.AttrType, acmpca.CertificateAuthorityTypeRoot),
resource.TestCheckResourceAttr(resourceName, names.AttrType, string(awstypes.CertificateAuthorityTypeRoot)),
resource.TestCheckResourceAttr(resourceName, names.AttrEnabled, acctest.CtTrue),
),
},
Expand All @@ -236,7 +234,7 @@ func TestAccACMPCACertificateAuthority_deleteFromActiveState(t *testing.T) {

func TestAccACMPCACertificateAuthority_RevocationConfiguration_empty(t *testing.T) {
ctx := acctest.Context(t)
var certificateAuthority types.CertificateAuthority
var certificateAuthority awstypes.CertificateAuthority
resourceName := "aws_acmpca_certificate_authority.test"
commonName := acctest.RandomDomainName()

Expand Down Expand Up @@ -284,7 +282,7 @@ func TestAccACMPCACertificateAuthority_RevocationConfiguration_empty(t *testing.

func TestAccACMPCACertificateAuthority_RevocationCrl_customCNAME(t *testing.T) {
ctx := acctest.Context(t)
var certificateAuthority types.CertificateAuthority
var certificateAuthority awstypes.CertificateAuthority
rName := sdkacctest.RandomWithPrefix(acctest.ResourcePrefix)
resourceName := "aws_acmpca_certificate_authority.test"
domain := acctest.RandomDomain()
Expand Down Expand Up @@ -375,7 +373,7 @@ func TestAccACMPCACertificateAuthority_RevocationCrl_customCNAME(t *testing.T) {

func TestAccACMPCACertificateAuthority_RevocationCrl_enabled(t *testing.T) {
ctx := acctest.Context(t)
var certificateAuthority types.CertificateAuthority
var certificateAuthority awstypes.CertificateAuthority
rName := sdkacctest.RandomWithPrefix(acctest.ResourcePrefix)
resourceName := "aws_acmpca_certificate_authority.test"
commonName := acctest.RandomDomainName()
Expand Down Expand Up @@ -447,7 +445,7 @@ func TestAccACMPCACertificateAuthority_RevocationCrl_enabled(t *testing.T) {

func TestAccACMPCACertificateAuthority_RevocationCrl_expirationInDays(t *testing.T) {
ctx := acctest.Context(t)
var certificateAuthority types.CertificateAuthority
var certificateAuthority awstypes.CertificateAuthority
rName := sdkacctest.RandomWithPrefix(acctest.ResourcePrefix)
resourceName := "aws_acmpca_certificate_authority.test"
commonName := acctest.RandomDomainName()
Expand Down Expand Up @@ -509,7 +507,7 @@ func TestAccACMPCACertificateAuthority_RevocationCrl_expirationInDays(t *testing

func TestAccACMPCACertificateAuthority_RevocationCrl_s3ObjectACL(t *testing.T) {
ctx := acctest.Context(t)
var certificateAuthority types.CertificateAuthority
var certificateAuthority awstypes.CertificateAuthority
rName := sdkacctest.RandomWithPrefix(acctest.ResourcePrefix)
resourceName := "aws_acmpca_certificate_authority.test"
commonName := acctest.RandomDomainName()
Expand Down Expand Up @@ -561,7 +559,7 @@ func TestAccACMPCACertificateAuthority_RevocationCrl_s3ObjectACL(t *testing.T) {

func TestAccACMPCACertificateAuthority_RevocationOcsp_enabled(t *testing.T) {
ctx := acctest.Context(t)
var certificateAuthority types.CertificateAuthority
var certificateAuthority awstypes.CertificateAuthority
resourceName := "aws_acmpca_certificate_authority.test"
commonName := acctest.RandomDomainName()

Expand Down Expand Up @@ -628,7 +626,7 @@ func TestAccACMPCACertificateAuthority_RevocationOcsp_enabled(t *testing.T) {

func TestAccACMPCACertificateAuthority_RevocationOcsp_customCNAME(t *testing.T) {
ctx := acctest.Context(t)
var certificateAuthority types.CertificateAuthority
var certificateAuthority awstypes.CertificateAuthority
resourceName := "aws_acmpca_certificate_authority.test"
domain := acctest.RandomDomain()
commonName := domain.String()
Expand Down
2 changes: 1 addition & 1 deletion internal/service/appflow/flow.go
Original file line number Diff line number Diff line change
Expand Up @@ -12,9 +12,9 @@ import (

"github.com/YakDriver/regexache"
"github.com/aws/aws-sdk-go-v2/aws"
"github.com/aws/aws-sdk-go-v2/aws/arn"
"github.com/aws/aws-sdk-go-v2/service/appflow"
"github.com/aws/aws-sdk-go-v2/service/appflow/types"
"github.com/aws/aws-sdk-go/aws/arn"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/retry"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
Expand Down
2 changes: 1 addition & 1 deletion internal/service/applicationinsights/application.go
Original file line number Diff line number Diff line change
Expand Up @@ -9,9 +9,9 @@ import (
"time"

"github.com/aws/aws-sdk-go-v2/aws"
"github.com/aws/aws-sdk-go-v2/aws/arn"
"github.com/aws/aws-sdk-go-v2/service/applicationinsights"
awstypes "github.com/aws/aws-sdk-go-v2/service/applicationinsights/types"
"github.com/aws/aws-sdk-go/aws/arn"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/retry"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
Expand Down
23 changes: 11 additions & 12 deletions internal/service/apprunner/hosted_zone_id_data_source.go
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,6 @@ import (
"context"
"fmt"

"github.com/aws/aws-sdk-go/aws/endpoints"
"github.com/hashicorp/terraform-plugin-framework/datasource"
"github.com/hashicorp/terraform-plugin-framework/datasource/schema"
"github.com/hashicorp/terraform-plugin-framework/types"
Expand All @@ -18,17 +17,17 @@ import (
// See https://docs.aws.amazon.com/general/latest/gr/apprunner.html

var hostedZoneIDPerRegionMap = map[string]string{
endpoints.UsEast2RegionID: "Z0224347AD7KVHMLOX31",
endpoints.UsEast1RegionID: "Z01915732ZBZKC8D32TPT",
endpoints.UsWest2RegionID: "Z02243383FTQ64HJ5772Q",
endpoints.ApSouth1RegionID: "Z00855883LBHKTIC4ODF2",
endpoints.ApSoutheast1RegionID: "Z09819469CZ3KQ8PWMCL",
endpoints.ApSoutheast2RegionID: "Z03657752RA8799S0TI5I",
endpoints.ApNortheast1RegionID: "Z08491812XW6IPYLR6CCA",
endpoints.EuCentral1RegionID: "Z0334911C2FDI2Q9M4FZ",
endpoints.EuWest1RegionID: "Z087551914Z2PCAU0QHMW",
endpoints.EuWest2RegionID: "Z098228427VC6B3IX76ON",
endpoints.EuWest3RegionID: "Z087117439MBKHYM69QS6",
names.USEast2RegionID: "Z0224347AD7KVHMLOX31",
names.USEast1RegionID: "Z01915732ZBZKC8D32TPT",
names.USWest2RegionID: "Z02243383FTQ64HJ5772Q",
names.APSouth1RegionID: "Z00855883LBHKTIC4ODF2",
names.APSoutheast1RegionID: "Z09819469CZ3KQ8PWMCL",
names.APSoutheast2RegionID: "Z03657752RA8799S0TI5I",
names.APNortheast1RegionID: "Z08491812XW6IPYLR6CCA",
names.EUCentral1RegionID: "Z0334911C2FDI2Q9M4FZ",
names.EUWest1RegionID: "Z087551914Z2PCAU0QHMW",
names.EUWest2RegionID: "Z098228427VC6B3IX76ON",
names.EUWest3RegionID: "Z087117439MBKHYM69QS6",
}

// @FrameworkDataSource("aws_apprunner_hosted_zone_id", name="Hosted Zone ID")
Expand Down
3 changes: 1 addition & 2 deletions internal/service/backup/region_settings_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,6 @@ import (
"testing"

"github.com/aws/aws-sdk-go-v2/service/backup"
"github.com/aws/aws-sdk-go/service/fsx"
"github.com/hashicorp/terraform-plugin-testing/helper/resource"
"github.com/hashicorp/terraform-plugin-testing/terraform"
"github.com/hashicorp/terraform-provider-aws/internal/acctest"
Expand All @@ -24,7 +23,7 @@ func TestAccBackupRegionSettings_basic(t *testing.T) {
resource.ParallelTest(t, resource.TestCase{
PreCheck: func() {
acctest.PreCheck(ctx, t)
acctest.PreCheckPartitionHasService(t, fsx.EndpointsID)
acctest.PreCheckPartitionHasService(t, names.FSxEndpointID)
testAccPreCheck(ctx, t)
},
ErrorCheck: acctest.ErrorCheck(t, names.BackupServiceID),
Expand Down
2 changes: 1 addition & 1 deletion internal/service/backup/vault_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -10,8 +10,8 @@ import (
"time"

"github.com/aws/aws-sdk-go-v2/aws"
"github.com/aws/aws-sdk-go-v2/aws/arn"
"github.com/aws/aws-sdk-go-v2/service/backup"
"github.com/aws/aws-sdk-go/aws/arn"
sdkacctest "github.com/hashicorp/terraform-plugin-testing/helper/acctest"
"github.com/hashicorp/terraform-plugin-testing/helper/resource"
"github.com/hashicorp/terraform-plugin-testing/terraform"
Expand Down
2 changes: 1 addition & 1 deletion internal/service/chatbot/slack_channel_configuration.go
Original file line number Diff line number Diff line change
Expand Up @@ -8,9 +8,9 @@ import (
"time"

"github.com/aws/aws-sdk-go-v2/aws"
"github.com/aws/aws-sdk-go-v2/aws/arn"
"github.com/aws/aws-sdk-go-v2/service/chatbot"
awstypes "github.com/aws/aws-sdk-go-v2/service/chatbot/types"
"github.com/aws/aws-sdk-go/aws/arn"
"github.com/hashicorp/terraform-plugin-framework-timeouts/resource/timeouts"
"github.com/hashicorp/terraform-plugin-framework/path"
"github.com/hashicorp/terraform-plugin-framework/resource"
Expand Down
Loading

0 comments on commit f8093f1

Please sign in to comment.