From e21650c0687ef4980440379409ae9188a5052077 Mon Sep 17 00:00:00 2001 From: chinthalapalli Date: Thu, 28 Dec 2023 14:03:31 +0530 Subject: [PATCH] adding formatting changes --- bigip/datasource_bigip_ltm_datagroup.go | 4 ++-- bigip/provider.go | 2 +- bigip/resource_bigip_as3.go | 2 +- bigip/resource_bigip_ltm_profile_ssl_client.go | 3 +-- bigip/resource_bigip_ltm_profile_ssl_client_test.go | 1 + 5 files changed, 6 insertions(+), 6 deletions(-) diff --git a/bigip/datasource_bigip_ltm_datagroup.go b/bigip/datasource_bigip_ltm_datagroup.go index b9b41120c..36ee38781 100644 --- a/bigip/datasource_bigip_ltm_datagroup.go +++ b/bigip/datasource_bigip_ltm_datagroup.go @@ -64,7 +64,7 @@ func dataSourceBigipLtmDataGroupRead(ctx context.Context, d *schema.ResourceData log.Printf("[INFO] Retrieving Data Group List %s", name) dataGroup, err := client.GetInternalDataGroup(name) if err != nil { - return diag.FromErr(fmt.Errorf("Error retrieving Data Group List %s: %v ", name, err)) + return diag.FromErr(fmt.Errorf("error retrieving Data Group List %s: %v ", name, err)) } if dataGroup == nil { log.Printf("[DEBUG] Data Group List %s not found, removing from state", name) @@ -82,7 +82,7 @@ func dataSourceBigipLtmDataGroupRead(ctx context.Context, d *schema.ResourceData records = append(records, dgRecord) } if err := d.Set("record", records); err != nil { - return diag.FromErr(fmt.Errorf("Error updating records in state for Data Group List %s: %v ", name, err)) + return diag.FromErr(fmt.Errorf("error updating records in state for Data Group List %s: %v ", name, err)) } d.SetId(dataGroup.FullPath) return nil diff --git a/bigip/provider.go b/bigip/provider.go index d51237111..4ec553a13 100644 --- a/bigip/provider.go +++ b/bigip/provider.go @@ -198,7 +198,7 @@ func providerConfigure(d *schema.ResourceData, terraformVersion string) (interfa } if !d.Get("validate_certs_disable").(bool) { if d.Get("trusted_cert_path").(string) == "" { - return nil, diag.FromErr(fmt.Errorf("Valid Trust Certificate path not provided using :%+v ", "trusted_cert_path")) + return nil, diag.FromErr(fmt.Errorf("valid Trust Certificate path not provided using :%+v ", "trusted_cert_path")) } config.TrustedCertificate = d.Get("trusted_cert_path").(string) } diff --git a/bigip/resource_bigip_as3.go b/bigip/resource_bigip_as3.go index 15c180589..fc76382a4 100644 --- a/bigip/resource_bigip_as3.go +++ b/bigip/resource_bigip_as3.go @@ -321,7 +321,7 @@ func resourceBigipAs3Update(ctx context.Context, d *schema.ResourceData, meta in log.Printf("[DEBUG] successfulTenants :%+v", successfulTenants) if err != nil { if successfulTenants == "" { - return diag.FromErr(fmt.Errorf("Error updating json %s: %v", tenantList, err)) + return diag.FromErr(fmt.Errorf("error updating json %s: %v", tenantList, err)) } _ = d.Set("tenant_list", successfulTenants) if len(successfulTenants) != len(tenantList) { diff --git a/bigip/resource_bigip_ltm_profile_ssl_client.go b/bigip/resource_bigip_ltm_profile_ssl_client.go index 0e26042dd..828215e4c 100644 --- a/bigip/resource_bigip_ltm_profile_ssl_client.go +++ b/bigip/resource_bigip_ltm_profile_ssl_client.go @@ -267,8 +267,7 @@ func resourceBigipLtmProfileClientSsl() *schema.Resource { "cipher_group": { Type: schema.TypeString, Optional: true, - Computed: true, - // Default: "none", + Computed: true, Description: "Cipher group for the ssl client profile", ConflictsWith: []string{"ciphers"}, }, diff --git a/bigip/resource_bigip_ltm_profile_ssl_client_test.go b/bigip/resource_bigip_ltm_profile_ssl_client_test.go index ae94041ba..e1a91637d 100644 --- a/bigip/resource_bigip_ltm_profile_ssl_client_test.go +++ b/bigip/resource_bigip_ltm_profile_ssl_client_test.go @@ -8,6 +8,7 @@ package bigip import ( "fmt" "testing" + bigip "github.com/f5devcentral/go-bigip" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform"