Add randomness to aws ses tests

This commit is contained in:
= 2017-03-27 14:02:20 -06:00
parent 7db042a2a6
commit dfb34c85b9
2 changed files with 14 additions and 10 deletions

View File

@ -5,6 +5,7 @@ import (
"testing" "testing"
"github.com/aws/aws-sdk-go/service/ses" "github.com/aws/aws-sdk-go/service/ses"
"github.com/hashicorp/terraform/helper/acctest"
"github.com/hashicorp/terraform/helper/resource" "github.com/hashicorp/terraform/helper/resource"
"github.com/hashicorp/terraform/terraform" "github.com/hashicorp/terraform/terraform"
) )
@ -42,7 +43,7 @@ func testAccCheckSESConfigurationSetDestroy(s *terraform.State) error {
found := false found := false
for _, element := range response.ConfigurationSets { for _, element := range response.ConfigurationSets {
if *element.Name == "some-configuration-set" { if *element.Name == fmt.Sprintf("some-configuration-set-%d", escRandomInteger) {
found = true found = true
} }
} }
@ -77,7 +78,7 @@ func testAccCheckAwsSESConfigurationSetExists(n string) resource.TestCheckFunc {
found := false found := false
for _, element := range response.ConfigurationSets { for _, element := range response.ConfigurationSets {
if *element.Name == "some-configuration-set" { if *element.Name == fmt.Sprintf("some-configuration-set-%d", escRandomInteger) {
found = true found = true
} }
} }
@ -90,8 +91,9 @@ func testAccCheckAwsSESConfigurationSetExists(n string) resource.TestCheckFunc {
} }
} }
const testAccAWSSESConfigurationSetConfig = ` var escRandomInteger = acctest.RandInt()
var testAccAWSSESConfigurationSetConfig = fmt.Sprintf(`
resource "aws_ses_configuration_set" "test" { resource "aws_ses_configuration_set" "test" {
name = "some-configuration-set" name = "some-configuration-set-%d"
} }
` `, escRandomInteger)

View File

@ -5,6 +5,7 @@ import (
"testing" "testing"
"github.com/aws/aws-sdk-go/service/ses" "github.com/aws/aws-sdk-go/service/ses"
"github.com/hashicorp/terraform/helper/acctest"
"github.com/hashicorp/terraform/helper/resource" "github.com/hashicorp/terraform/helper/resource"
"github.com/hashicorp/terraform/terraform" "github.com/hashicorp/terraform/terraform"
) )
@ -46,7 +47,7 @@ func testAccCheckSESEventDestinationDestroy(s *terraform.State) error {
found := false found := false
for _, element := range response.ConfigurationSets { for _, element := range response.ConfigurationSets {
if *element.Name == "some-configuration-set" { if *element.Name == fmt.Sprintf("some-configuration-set-%d", edRandomInteger) {
found = true found = true
} }
} }
@ -81,7 +82,7 @@ func testAccCheckAwsSESEventDestinationExists(n string) resource.TestCheckFunc {
found := false found := false
for _, element := range response.ConfigurationSets { for _, element := range response.ConfigurationSets {
if *element.Name == "some-configuration-set" { if *element.Name == fmt.Sprintf("some-configuration-set-%d", edRandomInteger) {
found = true found = true
} }
} }
@ -94,7 +95,8 @@ func testAccCheckAwsSESEventDestinationExists(n string) resource.TestCheckFunc {
} }
} }
const testAccAWSSESEventDestinationConfig = ` var edRandomInteger = acctest.RandInt()
var testAccAWSSESEventDestinationConfig = fmt.Sprintf(`
resource "aws_s3_bucket" "bucket" { resource "aws_s3_bucket" "bucket" {
bucket = "tf-test-bucket-format" bucket = "tf-test-bucket-format"
acl = "private" acl = "private"
@ -155,7 +157,7 @@ data "aws_iam_policy_document" "fh_felivery_document" {
} }
resource "aws_ses_configuration_set" "test" { resource "aws_ses_configuration_set" "test" {
name = "some-configuration-set" name = "some-configuration-set-%d"
} }
resource "aws_ses_event_destination" "kinesis" { resource "aws_ses_event_destination" "kinesis" {
@ -182,4 +184,4 @@ resource "aws_ses_event_destination" "cloudwatch" {
value_source = "emailHeader" value_source = "emailHeader"
} }
} }
` `, edRandomInteger)