From 79966e73179768981af2919ecd3bca2f21553542 Mon Sep 17 00:00:00 2001 From: Kit Ewbank Date: Fri, 22 Jul 2022 16:26:06 -0400 Subject: [PATCH] Add 'ci.' to rules names in 'nosemgrep's. --- internal/service/ec2/vpc_security_group_rule.go | 4 ++-- internal/service/ec2/vpc_security_group_test.go | 8 ++++---- 2 files changed, 6 insertions(+), 6 deletions(-) diff --git a/internal/service/ec2/vpc_security_group_rule.go b/internal/service/ec2/vpc_security_group_rule.go index 1ac65e8871d..1cc79805672 100644 --- a/internal/service/ec2/vpc_security_group_rule.go +++ b/internal/service/ec2/vpc_security_group_rule.go @@ -685,7 +685,7 @@ func SecurityGroupRuleCreateID(securityGroupID, ruleType string, ip *ec2.IpPermi return fmt.Sprintf("sgrule-%d", create.StringHashcode(buf.String())) } -func expandIpPermission(d *schema.ResourceData, sg *ec2.SecurityGroup) *ec2.IpPermission { // nosemgrep:caps5-in-func-name +func expandIpPermission(d *schema.ResourceData, sg *ec2.SecurityGroup) *ec2.IpPermission { // nosemgrep:ci.caps5-in-func-name apiObject := &ec2.IpPermission{ IpProtocol: aws.String(ProtocolForValue(d.Get("protocol").(string))), } @@ -782,7 +782,7 @@ func expandIpPermission(d *schema.ResourceData, sg *ec2.SecurityGroup) *ec2.IpPe return apiObject } -func flattenIpPermission(d *schema.ResourceData, apiObject *ec2.IpPermission, isVPC bool) { // nosemgrep:caps5-in-func-name +func flattenIpPermission(d *schema.ResourceData, apiObject *ec2.IpPermission, isVPC bool) { // nosemgrep:ci.caps5-in-func-name if apiObject == nil { return } diff --git a/internal/service/ec2/vpc_security_group_test.go b/internal/service/ec2/vpc_security_group_test.go index 774a5c22fee..c0f71d3f331 100644 --- a/internal/service/ec2/vpc_security_group_test.go +++ b/internal/service/ec2/vpc_security_group_test.go @@ -2409,7 +2409,7 @@ func testAccCheckSecurityGroupDestroy(s *terraform.State) error { return nil } -func testAccCheckSecurityGroupEC2ClassicDestroy(s *terraform.State) error { // nosemgrep:ec2-in-func-name +func testAccCheckSecurityGroupEC2ClassicDestroy(s *terraform.State) error { // nosemgrep:ci.ec2-in-func-name conn := acctest.ProviderEC2Classic.Meta().(*conns.AWSClient).EC2Conn for _, rs := range s.RootModule().Resources { @@ -2458,7 +2458,7 @@ func testAccCheckSecurityGroupExists(n string, v *ec2.SecurityGroup) resource.Te } } -func testAccCheckSecurityGroupEC2ClassicExists(n string, v *ec2.SecurityGroup) resource.TestCheckFunc { // nosemgrep:ec2-in-func-name +func testAccCheckSecurityGroupEC2ClassicExists(n string, v *ec2.SecurityGroup) resource.TestCheckFunc { // nosemgrep:ci.ec2-in-func-name return func(s *terraform.State) error { rs, ok := s.RootModule().Resources[n] if !ok { @@ -2551,7 +2551,7 @@ resource "aws_security_group" "test" { `, rName) } -func testAccVPCSecurityGroupConfig_ec2Classic(rName string) string { // nosemgrep:ec2-in-func-name +func testAccVPCSecurityGroupConfig_ec2Classic(rName string) string { // nosemgrep:ci.ec2-in-func-name return acctest.ConfigCompose(acctest.ConfigEC2ClassicRegionProvider(), fmt.Sprintf(` resource "aws_security_group" "test" { name = %[1]q @@ -3482,7 +3482,7 @@ resource "aws_security_group" "test1" { `, rName) } -func testAccVPCSecurityGroupConfig_ingressWithCIDRAndSGsEC2Classic(rName string) string { // nosemgrep:ec2-in-func-name +func testAccVPCSecurityGroupConfig_ingressWithCIDRAndSGsEC2Classic(rName string) string { // nosemgrep:ci.ec2-in-func-name return acctest.ConfigCompose(acctest.ConfigEC2ClassicRegionProvider(), fmt.Sprintf(` resource "aws_security_group" "test2" { name = "%[1]s-2"