Skip to content

Commit d912890

Browse files
committed
(d|r)/aws_s3_account_public_access_block: Migrate to AWS SDK for Go v2.
1 parent 6da9a69 commit d912890

File tree

3 files changed

+34
-33
lines changed

3 files changed

+34
-33
lines changed

internal/service/s3control/account_public_access_block.go

+31-31
Original file line numberDiff line numberDiff line change
@@ -9,13 +9,14 @@ import (
99
"reflect"
1010
"strconv"
1111

12-
"github.com/aws/aws-sdk-go/aws"
13-
"github.com/aws/aws-sdk-go/service/s3control"
14-
"github.com/hashicorp/aws-sdk-go-base/v2/awsv1shim/v2/tfawserr"
12+
"github.com/aws/aws-sdk-go-v2/aws"
13+
"github.com/aws/aws-sdk-go-v2/service/s3control"
14+
"github.com/aws/aws-sdk-go-v2/service/s3control/types"
1515
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
1616
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/retry"
1717
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
1818
"github.com/hashicorp/terraform-provider-aws/internal/conns"
19+
"github.com/hashicorp/terraform-provider-aws/internal/errs"
1920
"github.com/hashicorp/terraform-provider-aws/internal/tfresource"
2021
"github.com/hashicorp/terraform-provider-aws/internal/verify"
2122
)
@@ -65,24 +66,23 @@ func resourceAccountPublicAccessBlock() *schema.Resource {
6566
}
6667

6768
func resourceAccountPublicAccessBlockCreate(ctx context.Context, d *schema.ResourceData, meta interface{}) diag.Diagnostics {
68-
conn := meta.(*conns.AWSClient).S3ControlConn(ctx)
69+
conn := meta.(*conns.AWSClient).S3ControlClient(ctx)
6970

7071
accountID := meta.(*conns.AWSClient).AccountID
7172
if v, ok := d.GetOk("account_id"); ok {
7273
accountID = v.(string)
7374
}
74-
7575
input := &s3control.PutPublicAccessBlockInput{
7676
AccountId: aws.String(accountID),
77-
PublicAccessBlockConfiguration: &s3control.PublicAccessBlockConfiguration{
78-
BlockPublicAcls: aws.Bool(d.Get("block_public_acls").(bool)),
79-
BlockPublicPolicy: aws.Bool(d.Get("block_public_policy").(bool)),
80-
IgnorePublicAcls: aws.Bool(d.Get("ignore_public_acls").(bool)),
81-
RestrictPublicBuckets: aws.Bool(d.Get("restrict_public_buckets").(bool)),
77+
PublicAccessBlockConfiguration: &types.PublicAccessBlockConfiguration{
78+
BlockPublicAcls: d.Get("block_public_acls").(bool),
79+
BlockPublicPolicy: d.Get("block_public_policy").(bool),
80+
IgnorePublicAcls: d.Get("ignore_public_acls").(bool),
81+
RestrictPublicBuckets: d.Get("restrict_public_buckets").(bool),
8282
},
8383
}
8484

85-
_, err := conn.PutPublicAccessBlockWithContext(ctx, input)
85+
_, err := conn.PutPublicAccessBlock(ctx, input)
8686

8787
if err != nil {
8888
return diag.Errorf("creating S3 Account Public Access Block (%s): %s", accountID, err)
@@ -91,7 +91,7 @@ func resourceAccountPublicAccessBlockCreate(ctx context.Context, d *schema.Resou
9191
d.SetId(accountID)
9292

9393
_, err = tfresource.RetryWhenNotFound(ctx, propagationTimeout, func() (interface{}, error) {
94-
return FindPublicAccessBlockByAccountID(ctx, conn, d.Id())
94+
return findPublicAccessBlockByAccountID(ctx, conn, d.Id())
9595
})
9696

9797
if err != nil {
@@ -102,9 +102,9 @@ func resourceAccountPublicAccessBlockCreate(ctx context.Context, d *schema.Resou
102102
}
103103

104104
func resourceAccountPublicAccessBlockRead(ctx context.Context, d *schema.ResourceData, meta interface{}) diag.Diagnostics {
105-
conn := meta.(*conns.AWSClient).S3ControlConn(ctx)
105+
conn := meta.(*conns.AWSClient).S3ControlClient(ctx)
106106

107-
output, err := FindPublicAccessBlockByAccountID(ctx, conn, d.Id())
107+
output, err := findPublicAccessBlockByAccountID(ctx, conn, d.Id())
108108

109109
if !d.IsNewResource() && tfresource.NotFound(err) {
110110
log.Printf("[WARN] S3 Account Public Access Block (%s) not found, removing from state", d.Id())
@@ -126,20 +126,20 @@ func resourceAccountPublicAccessBlockRead(ctx context.Context, d *schema.Resourc
126126
}
127127

128128
func resourceAccountPublicAccessBlockUpdate(ctx context.Context, d *schema.ResourceData, meta interface{}) diag.Diagnostics {
129-
conn := meta.(*conns.AWSClient).S3ControlConn(ctx)
129+
conn := meta.(*conns.AWSClient).S3ControlClient(ctx)
130130

131-
publicAccessBlockConfiguration := &s3control.PublicAccessBlockConfiguration{
132-
BlockPublicAcls: aws.Bool(d.Get("block_public_acls").(bool)),
133-
BlockPublicPolicy: aws.Bool(d.Get("block_public_policy").(bool)),
134-
IgnorePublicAcls: aws.Bool(d.Get("ignore_public_acls").(bool)),
135-
RestrictPublicBuckets: aws.Bool(d.Get("restrict_public_buckets").(bool)),
131+
publicAccessBlockConfiguration := &types.PublicAccessBlockConfiguration{
132+
BlockPublicAcls: d.Get("block_public_acls").(bool),
133+
BlockPublicPolicy: d.Get("block_public_policy").(bool),
134+
IgnorePublicAcls: d.Get("ignore_public_acls").(bool),
135+
RestrictPublicBuckets: d.Get("restrict_public_buckets").(bool),
136136
}
137137
input := &s3control.PutPublicAccessBlockInput{
138138
AccountId: aws.String(d.Id()),
139139
PublicAccessBlockConfiguration: publicAccessBlockConfiguration,
140140
}
141141

142-
_, err := conn.PutPublicAccessBlockWithContext(ctx, input)
142+
_, err := conn.PutPublicAccessBlock(ctx, input)
143143

144144
if err != nil {
145145
return diag.Errorf("updating S3 Account Public Access Block (%s): %s", d.Id(), err)
@@ -153,14 +153,14 @@ func resourceAccountPublicAccessBlockUpdate(ctx context.Context, d *schema.Resou
153153
}
154154

155155
func resourceAccountPublicAccessBlockDelete(ctx context.Context, d *schema.ResourceData, meta interface{}) diag.Diagnostics {
156-
conn := meta.(*conns.AWSClient).S3ControlConn(ctx)
156+
conn := meta.(*conns.AWSClient).S3ControlClient(ctx)
157157

158158
log.Printf("[DEBUG] Deleting S3 Account Public Access Block: %s", d.Id())
159-
_, err := conn.DeletePublicAccessBlockWithContext(ctx, &s3control.DeletePublicAccessBlockInput{
159+
_, err := conn.DeletePublicAccessBlock(ctx, &s3control.DeletePublicAccessBlockInput{
160160
AccountId: aws.String(d.Id()),
161161
})
162162

163-
if tfawserr.ErrCodeEquals(err, s3control.ErrCodeNoSuchPublicAccessBlockConfiguration) {
163+
if errs.IsA[*types.NoSuchPublicAccessBlockConfiguration](err) {
164164
return nil
165165
}
166166

@@ -171,14 +171,14 @@ func resourceAccountPublicAccessBlockDelete(ctx context.Context, d *schema.Resou
171171
return nil
172172
}
173173

174-
func FindPublicAccessBlockByAccountID(ctx context.Context, conn *s3control.S3Control, accountID string) (*s3control.PublicAccessBlockConfiguration, error) {
174+
func findPublicAccessBlockByAccountID(ctx context.Context, conn *s3control.Client, accountID string) (*types.PublicAccessBlockConfiguration, error) {
175175
input := &s3control.GetPublicAccessBlockInput{
176176
AccountId: aws.String(accountID),
177177
}
178178

179-
output, err := conn.GetPublicAccessBlockWithContext(ctx, input)
179+
output, err := conn.GetPublicAccessBlock(ctx, input)
180180

181-
if tfawserr.ErrCodeEquals(err, s3control.ErrCodeNoSuchPublicAccessBlockConfiguration) {
181+
if errs.IsA[*types.NoSuchPublicAccessBlockConfiguration](err) {
182182
return nil, &retry.NotFoundError{
183183
LastError: err,
184184
LastRequest: input,
@@ -196,9 +196,9 @@ func FindPublicAccessBlockByAccountID(ctx context.Context, conn *s3control.S3Con
196196
return output.PublicAccessBlockConfiguration, nil
197197
}
198198

199-
func statusPublicAccessBlockEqual(ctx context.Context, conn *s3control.S3Control, accountID string, target *s3control.PublicAccessBlockConfiguration) retry.StateRefreshFunc {
199+
func statusPublicAccessBlockEqual(ctx context.Context, conn *s3control.Client, accountID string, target *types.PublicAccessBlockConfiguration) retry.StateRefreshFunc {
200200
return func() (interface{}, string, error) {
201-
output, err := FindPublicAccessBlockByAccountID(ctx, conn, accountID)
201+
output, err := findPublicAccessBlockByAccountID(ctx, conn, accountID)
202202

203203
if tfresource.NotFound(err) {
204204
return nil, "", nil
@@ -212,7 +212,7 @@ func statusPublicAccessBlockEqual(ctx context.Context, conn *s3control.S3Control
212212
}
213213
}
214214

215-
func waitPublicAccessBlockEqual(ctx context.Context, conn *s3control.S3Control, accountID string, target *s3control.PublicAccessBlockConfiguration) (*s3control.PublicAccessBlockConfiguration, error) {
215+
func waitPublicAccessBlockEqual(ctx context.Context, conn *s3control.Client, accountID string, target *types.PublicAccessBlockConfiguration) (*types.PublicAccessBlockConfiguration, error) {
216216
stateConf := &retry.StateChangeConf{
217217
Pending: []string{strconv.FormatBool(false)},
218218
Target: []string{strconv.FormatBool(true)},
@@ -224,7 +224,7 @@ func waitPublicAccessBlockEqual(ctx context.Context, conn *s3control.S3Control,
224224

225225
outputRaw, err := stateConf.WaitForStateContext(ctx)
226226

227-
if output, ok := outputRaw.(*s3control.PublicAccessBlockConfiguration); ok {
227+
if output, ok := outputRaw.(*types.PublicAccessBlockConfiguration); ok {
228228
return output, err
229229
}
230230

internal/service/s3control/account_public_access_block_data_source.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -44,14 +44,14 @@ func dataSourceAccountPublicAccessBlock() *schema.Resource {
4444
}
4545

4646
func dataSourceAccountPublicAccessBlockRead(ctx context.Context, d *schema.ResourceData, meta interface{}) diag.Diagnostics {
47-
conn := meta.(*conns.AWSClient).S3ControlConn(ctx)
47+
conn := meta.(*conns.AWSClient).S3ControlClient(ctx)
4848

4949
accountID := meta.(*conns.AWSClient).AccountID
5050
if v, ok := d.GetOk("account_id"); ok {
5151
accountID = v.(string)
5252
}
5353

54-
output, err := FindPublicAccessBlockByAccountID(ctx, conn, accountID)
54+
output, err := findPublicAccessBlockByAccountID(ctx, conn, accountID)
5555

5656
if err != nil {
5757
return diag.Errorf("reading S3 Account Public Access Block (%s): %s", accountID, err)

internal/service/s3control/exports_test.go

+1
Original file line numberDiff line numberDiff line change
@@ -19,4 +19,5 @@ var (
1919

2020
FindAccessPointByTwoPartKey = findAccessPointByTwoPartKey
2121
FindAccessPointPolicyAndStatusByTwoPartKey = findAccessPointPolicyAndStatusByTwoPartKey
22+
FindPublicAccessBlockByAccountID = findPublicAccessBlockByAccountID
2223
)

0 commit comments

Comments
 (0)