Merge branch 'main' into fix_goldenfile_update

main
Elie 2021-07-13 13:39:42 +02:00 committed by GitHub
commit 2a8dbab029
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
16 changed files with 16 additions and 16 deletions

View File

@ -5,7 +5,7 @@ provider "aws" {
terraform {
required_providers {
aws = {
version = "~> 3.19.0"
version = "3.19.0"
}
}

View File

@ -5,7 +5,7 @@ provider "aws" {
terraform {
required_providers {
aws = {
version = "~> 3.19.0"
version = "3.19.0"
}
}

View File

@ -5,7 +5,7 @@ provider "aws" {
terraform {
required_providers {
aws = {
version = "~> 3.19.0"
version = "3.19.0"
}
}

View File

@ -5,7 +5,7 @@ provider "aws" {
terraform {
required_providers {
aws = {
version = "~> 3.19.0"
version = "3.19.0"
}
}

View File

@ -11,7 +11,7 @@ func TestAcc_Aws_EipAssociation(t *testing.T) {
acceptance.Run(t, acceptance.AccTestCase{
TerraformVersion: "0.14.9",
Paths: []string{"./testdata/acc/aws_eip_association"},
Args: []string{"scan", "--filter", "Type=='aws_eip' || Type=='aws_eip_association'"},
Args: []string{"scan", "--filter", "Type=='aws_eip' || Type=='aws_eip_association'", "--tf-provider-version", "3.44.0"},
Checks: []acceptance.AccCheck{
{
Env: map[string]string{

View File

@ -11,7 +11,7 @@ func TestAcc_Aws_Eip(t *testing.T) {
acceptance.Run(t, acceptance.AccTestCase{
TerraformVersion: "0.14.9",
Paths: []string{"./testdata/acc/aws_eip"},
Args: []string{"scan", "--filter", "Type=='aws_eip' || Type=='aws_eip_association'"},
Args: []string{"scan", "--filter", "Type=='aws_eip' || Type=='aws_eip_association'", "--tf-provider-version", "3.44.0"},
Checks: []acceptance.AccCheck{
{
Env: map[string]string{

View File

@ -11,7 +11,7 @@ func TestAcc_Aws_IamRole(t *testing.T) {
acceptance.Run(t, acceptance.AccTestCase{
TerraformVersion: "0.14.9",
Paths: []string{"./testdata/acc/aws_iam_role"},
Args: []string{"scan", "--filter", "Type=='aws_iam_role'"},
Args: []string{"scan", "--filter", "Type=='aws_iam_role'", "--tf-provider-version", "3.45.0"},
Checks: []acceptance.AccCheck{
{
Env: map[string]string{

View File

@ -11,7 +11,7 @@ func TestAcc_AwsRoute(t *testing.T) {
acceptance.Run(t, acceptance.AccTestCase{
TerraformVersion: "0.14.9",
Paths: []string{"./testdata/acc/aws_route"},
Args: []string{"scan", "--filter", "Type=='aws_route'"},
Args: []string{"scan", "--filter", "Type=='aws_route'", "--tf-provider-version", "3.44.0"},
Checks: []acceptance.AccCheck{
{
Env: map[string]string{

View File

@ -4,7 +4,7 @@ provider "aws" {
terraform {
required_providers {
aws = {
version = "~> 3.44.0"
version = "3.44.0"
}
}
}

View File

@ -4,7 +4,7 @@ provider "aws" {
terraform {
required_providers {
aws = {
version = "~> 3.44.0"
version = "3.44.0"
}
}
}

View File

@ -4,7 +4,7 @@ provider "aws" {
terraform {
required_providers {
aws = {
version = "~> 3.19.0"
version = "3.19.0"
}
}
}

View File

@ -4,7 +4,7 @@ provider "aws" {
terraform {
required_providers {
aws = {
version = "~> 3.19.0"
version = "3.19.0"
}
}
}

View File

@ -4,7 +4,7 @@ provider "aws" {
terraform {
required_providers {
aws = {
version = "~> 3.19.0"
version = "3.19.0"
}
}
}

View File

@ -4,7 +4,7 @@ provider "aws" {
terraform {
required_providers {
aws = {
version = "~> 3.19.0"
version = "3.19.0"
}
}
}

View File

@ -4,7 +4,7 @@ provider "aws" {
terraform {
required_providers {
aws = {
version = "~> 3.19.0"
version = "3.19.0"
}
}
}

View File

@ -4,7 +4,7 @@ provider "aws" {
terraform {
required_providers {
aws = {
version = "~> 3.19.0"
version = "3.19.0"
}
}
}