Skip to content

Commit d90248d

Browse files
Updated typos (#12278)
[upstream:632a9bc21a7530620df372383a1ca829dcfd633b] Signed-off-by: Modular Magician <[email protected]>
1 parent 7c0d9b5 commit d90248d

File tree

51 files changed

+111
-108
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

51 files changed

+111
-108
lines changed

.changelog/12278.txt

+3
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
```release-note:bug
2+
gkehub: fixed allowable value `INSTALLATION_UNSPECIFIED` in `template_library.installation`
3+
```

google-beta/acctest/bootstrap_test_utils.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -501,7 +501,7 @@ func NewServiceNetworkSettings(options ...func(*ServiceNetworkSettings)) *Servic
501501
// BootstrapSharedServiceNetworkingConnection returns a persistent compute network name
502502
// for a test or set of tests.
503503
//
504-
// To delete a service networking conneciton, all of the service instances that use that connection
504+
// To delete a service networking connection, all of the service instances that use that connection
505505
// must be deleted first. After the service instances are deleted, some service producers delay the deletion
506506
// utnil a waiting period has passed. For example, after four days that you delete a SQL instance,
507507
// the service networking connection can be deleted.

google-beta/functions/zone_from_id.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ func (f ZoneFromIdFunction) Definition(ctx context.Context, req function.Definit
3232
Parameters: []function.Parameter{
3333
function.StringParameter{
3434
Name: "id",
35-
Description: "An id of a resouce, or a self link. For example, both \"projects/my-project/zones/us-central1-c/instances/my-instance\" and \"https://www.googleapis.com/compute/v1/projects/my-project/zones/us-central1-c/instances/my-instance\" are valid inputs",
35+
Description: "An id of a resource, or a self link. For example, both \"projects/my-project/zones/us-central1-c/instances/my-instance\" and \"https://www.googleapis.com/compute/v1/projects/my-project/zones/us-central1-c/instances/my-instance\" are valid inputs",
3636
},
3737
},
3838
Return: function.StringReturn{},

google-beta/provider/provider_internal_test.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ func TestProvider_ValidateCredentials(t *testing.T) {
2626
return transport_tpg.TestFakeCredentialsPath // Path to a test fixture
2727
},
2828
},
29-
"configuring credentials as a path to a non-existant file is NOT valid": {
29+
"configuring credentials as a path to a non-existent file is NOT valid": {
3030
ConfigValue: func(t *testing.T) interface{} {
3131
return "./this/path/doesnt/exist.json" // Doesn't exist
3232
},

google-beta/services/accesscontextmanager/resource_access_context_manager_service_perimeter.go

+7-7
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ import (
3434
"github.com/hashicorp/terraform-provider-google-beta/google-beta/verify"
3535
)
3636

37-
func AccessContextManagerServicePerimeterEgressToResourcesDiffSupressFunc(_, _, _ string, d *schema.ResourceData) bool {
37+
func AccessContextManagerServicePerimeterEgressToResourcesDiffSuppressFunc(_, _, _ string, d *schema.ResourceData) bool {
3838
old, new := d.GetChange("egress_to.0.resources")
3939

4040
oldResources, err := tpgresource.InterfaceSliceToStringSlice(old)
@@ -55,7 +55,7 @@ func AccessContextManagerServicePerimeterEgressToResourcesDiffSupressFunc(_, _,
5555
return slices.Equal(oldResources, newResources)
5656
}
5757

58-
func AccessContextManagerServicePerimeterIngressToResourcesDiffSupressFunc(_, _, _ string, d *schema.ResourceData) bool {
58+
func AccessContextManagerServicePerimeterIngressToResourcesDiffSuppressFunc(_, _, _ string, d *schema.ResourceData) bool {
5959
old, new := d.GetChange("ingress_to.0.resources")
6060

6161
oldResources, err := tpgresource.InterfaceSliceToStringSlice(old)
@@ -76,7 +76,7 @@ func AccessContextManagerServicePerimeterIngressToResourcesDiffSupressFunc(_, _,
7676
return slices.Equal(oldResources, newResources)
7777
}
7878

79-
func AccessContextManagerServicePerimeterIdentityTypeDiffSupressFunc(_, old, new string, _ *schema.ResourceData) bool {
79+
func AccessContextManagerServicePerimeterIdentityTypeDiffSuppressFunc(_, old, new string, _ *schema.ResourceData) bool {
8080
if old == "" && new == "IDENTITY_TYPE_UNSPECIFIED" {
8181
return true
8282
}
@@ -211,7 +211,7 @@ represent individual user or service account only.`,
211211
Type: schema.TypeString,
212212
Optional: true,
213213
ValidateFunc: verify.ValidateEnum([]string{"IDENTITY_TYPE_UNSPECIFIED", "ANY_IDENTITY", "ANY_USER_ACCOUNT", "ANY_SERVICE_ACCOUNT", ""}),
214-
DiffSuppressFunc: AccessContextManagerServicePerimeterIdentityTypeDiffSupressFunc,
214+
DiffSuppressFunc: AccessContextManagerServicePerimeterIdentityTypeDiffSuppressFunc,
215215
Description: `Specifies the type of identities that are allowed access to outside the
216216
perimeter. If left unspecified, then members of 'identities' field will
217217
be allowed access. Possible values: ["IDENTITY_TYPE_UNSPECIFIED", "ANY_IDENTITY", "ANY_USER_ACCOUNT", "ANY_SERVICE_ACCOUNT"]`,
@@ -351,7 +351,7 @@ individual user or service account only.`,
351351
Type: schema.TypeString,
352352
Optional: true,
353353
ValidateFunc: verify.ValidateEnum([]string{"IDENTITY_TYPE_UNSPECIFIED", "ANY_IDENTITY", "ANY_USER_ACCOUNT", "ANY_SERVICE_ACCOUNT", ""}),
354-
DiffSuppressFunc: AccessContextManagerServicePerimeterIdentityTypeDiffSupressFunc,
354+
DiffSuppressFunc: AccessContextManagerServicePerimeterIdentityTypeDiffSuppressFunc,
355355
Description: `Specifies the type of identities that are allowed access from outside the
356356
perimeter. If left unspecified, then members of 'identities' field will be
357357
allowed access. Possible values: ["IDENTITY_TYPE_UNSPECIFIED", "ANY_IDENTITY", "ANY_USER_ACCOUNT", "ANY_SERVICE_ACCOUNT"]`,
@@ -579,7 +579,7 @@ https://cloud.google.com/iam/docs/principal-identifiers#v1 are supported.`,
579579
Type: schema.TypeString,
580580
Optional: true,
581581
ValidateFunc: verify.ValidateEnum([]string{"IDENTITY_TYPE_UNSPECIFIED", "ANY_IDENTITY", "ANY_USER_ACCOUNT", "ANY_SERVICE_ACCOUNT", ""}),
582-
DiffSuppressFunc: AccessContextManagerServicePerimeterIdentityTypeDiffSupressFunc,
582+
DiffSuppressFunc: AccessContextManagerServicePerimeterIdentityTypeDiffSuppressFunc,
583583
Description: `Specifies the type of identities that are allowed access to outside the
584584
perimeter. If left unspecified, then members of 'identities' field will
585585
be allowed access. Possible values: ["IDENTITY_TYPE_UNSPECIFIED", "ANY_IDENTITY", "ANY_USER_ACCOUNT", "ANY_SERVICE_ACCOUNT"]`,
@@ -721,7 +721,7 @@ https://cloud.google.com/iam/docs/principal-identifiers#v1 are supported.`,
721721
Type: schema.TypeString,
722722
Optional: true,
723723
ValidateFunc: verify.ValidateEnum([]string{"IDENTITY_TYPE_UNSPECIFIED", "ANY_IDENTITY", "ANY_USER_ACCOUNT", "ANY_SERVICE_ACCOUNT", ""}),
724-
DiffSuppressFunc: AccessContextManagerServicePerimeterIdentityTypeDiffSupressFunc,
724+
DiffSuppressFunc: AccessContextManagerServicePerimeterIdentityTypeDiffSuppressFunc,
725725
Description: `Specifies the type of identities that are allowed access from outside the
726726
perimeter. If left unspecified, then members of 'identities' field will be
727727
allowed access. Possible values: ["IDENTITY_TYPE_UNSPECIFIED", "ANY_IDENTITY", "ANY_USER_ACCOUNT", "ANY_SERVICE_ACCOUNT"]`,

google-beta/services/accesscontextmanager/resource_access_context_manager_service_perimeter_dry_run_egress_policy.go

+5-5
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ import (
3333
"github.com/hashicorp/terraform-provider-google-beta/google-beta/verify"
3434
)
3535

36-
func AccessContextManagerServicePerimeterDryRunEgressPolicyEgressToResourcesDiffSupressFunc(_, _, _ string, d *schema.ResourceData) bool {
36+
func AccessContextManagerServicePerimeterDryRunEgressPolicyEgressToResourcesDiffSuppressFunc(_, _, _ string, d *schema.ResourceData) bool {
3737
old, new := d.GetChange("egress_to.0.resources")
3838

3939
oldResources, err := tpgresource.InterfaceSliceToStringSlice(old)
@@ -54,7 +54,7 @@ func AccessContextManagerServicePerimeterDryRunEgressPolicyEgressToResourcesDiff
5454
return slices.Equal(oldResources, newResources)
5555
}
5656

57-
func AccessContextManagerServicePerimeterDryRunEgressPolicyIngressToResourcesDiffSupressFunc(_, _, _ string, d *schema.ResourceData) bool {
57+
func AccessContextManagerServicePerimeterDryRunEgressPolicyIngressToResourcesDiffSuppressFunc(_, _, _ string, d *schema.ResourceData) bool {
5858
old, new := d.GetChange("ingress_to.0.resources")
5959

6060
oldResources, err := tpgresource.InterfaceSliceToStringSlice(old)
@@ -75,7 +75,7 @@ func AccessContextManagerServicePerimeterDryRunEgressPolicyIngressToResourcesDif
7575
return slices.Equal(oldResources, newResources)
7676
}
7777

78-
func AccessContextManagerServicePerimeterDryRunEgressPolicyIdentityTypeDiffSupressFunc(_, old, new string, _ *schema.ResourceData) bool {
78+
func AccessContextManagerServicePerimeterDryRunEgressPolicyIdentityTypeDiffSuppressFunc(_, old, new string, _ *schema.ResourceData) bool {
7979
if old == "" && new == "IDENTITY_TYPE_UNSPECIFIED" {
8080
return true
8181
}
@@ -128,7 +128,7 @@ https://cloud.google.com/iam/docs/principal-identifiers#v1 are supported.`,
128128
Optional: true,
129129
ForceNew: true,
130130
ValidateFunc: verify.ValidateEnum([]string{"ANY_IDENTITY", "ANY_USER_ACCOUNT", "ANY_SERVICE_ACCOUNT", ""}),
131-
DiffSuppressFunc: AccessContextManagerServicePerimeterIdentityTypeDiffSupressFunc,
131+
DiffSuppressFunc: AccessContextManagerServicePerimeterIdentityTypeDiffSuppressFunc,
132132
Description: `Specifies the type of identities that are allowed access to outside the
133133
perimeter. If left unspecified, then members of 'identities' field will
134134
be allowed access. Possible values: ["ANY_IDENTITY", "ANY_USER_ACCOUNT", "ANY_SERVICE_ACCOUNT"]`,
@@ -230,7 +230,7 @@ field set to '*' will allow all methods AND permissions for all services.`,
230230
Type: schema.TypeList,
231231
Optional: true,
232232
ForceNew: true,
233-
DiffSuppressFunc: AccessContextManagerServicePerimeterDryRunEgressPolicyEgressToResourcesDiffSupressFunc,
233+
DiffSuppressFunc: AccessContextManagerServicePerimeterDryRunEgressPolicyEgressToResourcesDiffSuppressFunc,
234234
Description: `A list of resources, currently only projects in the form
235235
'projects/<projectnumber>', that match this to stanza. A request matches
236236
if it contains a resource in this list. If * is specified for resources,

google-beta/services/accesscontextmanager/resource_access_context_manager_service_perimeter_dry_run_ingress_policy.go

+5-5
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ import (
3333
"github.com/hashicorp/terraform-provider-google-beta/google-beta/verify"
3434
)
3535

36-
func AccessContextManagerServicePerimeterDryRunIngressPolicyEgressToResourcesDiffSupressFunc(_, _, _ string, d *schema.ResourceData) bool {
36+
func AccessContextManagerServicePerimeterDryRunIngressPolicyEgressToResourcesDiffSuppressFunc(_, _, _ string, d *schema.ResourceData) bool {
3737
old, new := d.GetChange("egress_to.0.resources")
3838

3939
oldResources, err := tpgresource.InterfaceSliceToStringSlice(old)
@@ -54,7 +54,7 @@ func AccessContextManagerServicePerimeterDryRunIngressPolicyEgressToResourcesDif
5454
return slices.Equal(oldResources, newResources)
5555
}
5656

57-
func AccessContextManagerServicePerimeterDryRunIngressPolicyIngressToResourcesDiffSupressFunc(_, _, _ string, d *schema.ResourceData) bool {
57+
func AccessContextManagerServicePerimeterDryRunIngressPolicyIngressToResourcesDiffSuppressFunc(_, _, _ string, d *schema.ResourceData) bool {
5858
old, new := d.GetChange("ingress_to.0.resources")
5959

6060
oldResources, err := tpgresource.InterfaceSliceToStringSlice(old)
@@ -75,7 +75,7 @@ func AccessContextManagerServicePerimeterDryRunIngressPolicyIngressToResourcesDi
7575
return slices.Equal(oldResources, newResources)
7676
}
7777

78-
func AccessContextManagerServicePerimeterDryRunIngressPolicyIdentityTypeDiffSupressFunc(_, old, new string, _ *schema.ResourceData) bool {
78+
func AccessContextManagerServicePerimeterDryRunIngressPolicyIdentityTypeDiffSuppressFunc(_, old, new string, _ *schema.ResourceData) bool {
7979
if old == "" && new == "IDENTITY_TYPE_UNSPECIFIED" {
8080
return true
8181
}
@@ -129,7 +129,7 @@ https://cloud.google.com/iam/docs/principal-identifiers#v1 are supported.`,
129129
Optional: true,
130130
ForceNew: true,
131131
ValidateFunc: verify.ValidateEnum([]string{"ANY_IDENTITY", "ANY_USER_ACCOUNT", "ANY_SERVICE_ACCOUNT", ""}),
132-
DiffSuppressFunc: AccessContextManagerServicePerimeterIdentityTypeDiffSupressFunc,
132+
DiffSuppressFunc: AccessContextManagerServicePerimeterIdentityTypeDiffSuppressFunc,
133133
Description: `Specifies the type of identities that are allowed access from outside the
134134
perimeter. If left unspecified, then members of 'identities' field will be
135135
allowed access. Possible values: ["ANY_IDENTITY", "ANY_USER_ACCOUNT", "ANY_SERVICE_ACCOUNT"]`,
@@ -231,7 +231,7 @@ field set to '*' will allow all methods AND permissions for all services.`,
231231
Type: schema.TypeList,
232232
Optional: true,
233233
ForceNew: true,
234-
DiffSuppressFunc: AccessContextManagerServicePerimeterDryRunIngressPolicyIngressToResourcesDiffSupressFunc,
234+
DiffSuppressFunc: AccessContextManagerServicePerimeterDryRunIngressPolicyIngressToResourcesDiffSuppressFunc,
235235
Description: `A list of resources, currently only projects in the form
236236
'projects/<projectnumber>', protected by this 'ServicePerimeter'
237237
that are allowed to be accessed by sources defined in the

google-beta/services/accesscontextmanager/resource_access_context_manager_service_perimeter_egress_policy.go

+5-5
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ import (
3333
"github.com/hashicorp/terraform-provider-google-beta/google-beta/verify"
3434
)
3535

36-
func AccessContextManagerServicePerimeterEgressPolicyEgressToResourcesDiffSupressFunc(_, _, _ string, d *schema.ResourceData) bool {
36+
func AccessContextManagerServicePerimeterEgressPolicyEgressToResourcesDiffSuppressFunc(_, _, _ string, d *schema.ResourceData) bool {
3737
old, new := d.GetChange("egress_to.0.resources")
3838

3939
oldResources, err := tpgresource.InterfaceSliceToStringSlice(old)
@@ -54,7 +54,7 @@ func AccessContextManagerServicePerimeterEgressPolicyEgressToResourcesDiffSupres
5454
return slices.Equal(oldResources, newResources)
5555
}
5656

57-
func AccessContextManagerServicePerimeterEgressPolicyIngressToResourcesDiffSupressFunc(_, _, _ string, d *schema.ResourceData) bool {
57+
func AccessContextManagerServicePerimeterEgressPolicyIngressToResourcesDiffSuppressFunc(_, _, _ string, d *schema.ResourceData) bool {
5858
old, new := d.GetChange("ingress_to.0.resources")
5959

6060
oldResources, err := tpgresource.InterfaceSliceToStringSlice(old)
@@ -75,7 +75,7 @@ func AccessContextManagerServicePerimeterEgressPolicyIngressToResourcesDiffSupre
7575
return slices.Equal(oldResources, newResources)
7676
}
7777

78-
func AccessContextManagerServicePerimeterEgressPolicyIdentityTypeDiffSupressFunc(_, old, new string, _ *schema.ResourceData) bool {
78+
func AccessContextManagerServicePerimeterEgressPolicyIdentityTypeDiffSuppressFunc(_, old, new string, _ *schema.ResourceData) bool {
7979
if old == "" && new == "IDENTITY_TYPE_UNSPECIFIED" {
8080
return true
8181
}
@@ -128,7 +128,7 @@ https://cloud.google.com/iam/docs/principal-identifiers#v1 are supported.`,
128128
Optional: true,
129129
ForceNew: true,
130130
ValidateFunc: verify.ValidateEnum([]string{"ANY_IDENTITY", "ANY_USER_ACCOUNT", "ANY_SERVICE_ACCOUNT", ""}),
131-
DiffSuppressFunc: AccessContextManagerServicePerimeterIdentityTypeDiffSupressFunc,
131+
DiffSuppressFunc: AccessContextManagerServicePerimeterIdentityTypeDiffSuppressFunc,
132132
Description: `Specifies the type of identities that are allowed access to outside the
133133
perimeter. If left unspecified, then members of 'identities' field will
134134
be allowed access. Possible values: ["ANY_IDENTITY", "ANY_USER_ACCOUNT", "ANY_SERVICE_ACCOUNT"]`,
@@ -230,7 +230,7 @@ field set to '*' will allow all methods AND permissions for all services.`,
230230
Type: schema.TypeList,
231231
Optional: true,
232232
ForceNew: true,
233-
DiffSuppressFunc: AccessContextManagerServicePerimeterEgressPolicyEgressToResourcesDiffSupressFunc,
233+
DiffSuppressFunc: AccessContextManagerServicePerimeterEgressPolicyEgressToResourcesDiffSuppressFunc,
234234
Description: `A list of resources, currently only projects in the form
235235
'projects/<projectnumber>', that match this to stanza. A request matches
236236
if it contains a resource in this list. If * is specified for resources,

google-beta/services/accesscontextmanager/resource_access_context_manager_service_perimeter_ingress_policy.go

+5-5
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ import (
3333
"github.com/hashicorp/terraform-provider-google-beta/google-beta/verify"
3434
)
3535

36-
func AccessContextManagerServicePerimeterIngressPolicyEgressToResourcesDiffSupressFunc(_, _, _ string, d *schema.ResourceData) bool {
36+
func AccessContextManagerServicePerimeterIngressPolicyEgressToResourcesDiffSuppressFunc(_, _, _ string, d *schema.ResourceData) bool {
3737
old, new := d.GetChange("egress_to.0.resources")
3838

3939
oldResources, err := tpgresource.InterfaceSliceToStringSlice(old)
@@ -54,7 +54,7 @@ func AccessContextManagerServicePerimeterIngressPolicyEgressToResourcesDiffSupre
5454
return slices.Equal(oldResources, newResources)
5555
}
5656

57-
func AccessContextManagerServicePerimeterIngressPolicyIngressToResourcesDiffSupressFunc(_, _, _ string, d *schema.ResourceData) bool {
57+
func AccessContextManagerServicePerimeterIngressPolicyIngressToResourcesDiffSuppressFunc(_, _, _ string, d *schema.ResourceData) bool {
5858
old, new := d.GetChange("ingress_to.0.resources")
5959

6060
oldResources, err := tpgresource.InterfaceSliceToStringSlice(old)
@@ -75,7 +75,7 @@ func AccessContextManagerServicePerimeterIngressPolicyIngressToResourcesDiffSupr
7575
return slices.Equal(oldResources, newResources)
7676
}
7777

78-
func AccessContextManagerServicePerimeterIngressPolicyIdentityTypeDiffSupressFunc(_, old, new string, _ *schema.ResourceData) bool {
78+
func AccessContextManagerServicePerimeterIngressPolicyIdentityTypeDiffSuppressFunc(_, old, new string, _ *schema.ResourceData) bool {
7979
if old == "" && new == "IDENTITY_TYPE_UNSPECIFIED" {
8080
return true
8181
}
@@ -129,7 +129,7 @@ https://cloud.google.com/iam/docs/principal-identifiers#v1 are supported.`,
129129
Optional: true,
130130
ForceNew: true,
131131
ValidateFunc: verify.ValidateEnum([]string{"ANY_IDENTITY", "ANY_USER_ACCOUNT", "ANY_SERVICE_ACCOUNT", ""}),
132-
DiffSuppressFunc: AccessContextManagerServicePerimeterIdentityTypeDiffSupressFunc,
132+
DiffSuppressFunc: AccessContextManagerServicePerimeterIdentityTypeDiffSuppressFunc,
133133
Description: `Specifies the type of identities that are allowed access from outside the
134134
perimeter. If left unspecified, then members of 'identities' field will be
135135
allowed access. Possible values: ["ANY_IDENTITY", "ANY_USER_ACCOUNT", "ANY_SERVICE_ACCOUNT"]`,
@@ -234,7 +234,7 @@ field set to '*' will allow all methods AND permissions for all services.`,
234234
Type: schema.TypeList,
235235
Optional: true,
236236
ForceNew: true,
237-
DiffSuppressFunc: AccessContextManagerServicePerimeterIngressPolicyIngressToResourcesDiffSupressFunc,
237+
DiffSuppressFunc: AccessContextManagerServicePerimeterIngressPolicyIngressToResourcesDiffSuppressFunc,
238238
Description: `A list of resources, currently only projects in the form
239239
'projects/<projectnumber>', protected by this 'ServicePerimeter'
240240
that are allowed to be accessed by sources defined in the

google-beta/services/accesscontextmanager/resource_access_context_manager_service_perimeter_test.go

+4-4
Original file line numberDiff line numberDiff line change
@@ -414,14 +414,14 @@ resource "google_access_context_manager_service_perimeter" "test-access" {
414414
`, org, policyTitle, levelTitleName, levelTitleName, perimeterTitleName, perimeterTitleName)
415415
}
416416

417-
type IdentityTypeDiffSupressFuncDiffSuppressTestCase struct {
417+
type IdentityTypeDiffSuppressFuncDiffSuppressTestCase struct {
418418
Name string
419419
AreEqual bool
420420
Before string
421421
After string
422422
}
423423

424-
var identityTypeDiffSuppressTestCases = []IdentityTypeDiffSupressFuncDiffSuppressTestCase{
424+
var identityTypeDiffSuppressTestCases = []IdentityTypeDiffSuppressFuncDiffSuppressTestCase{
425425
{
426426
AreEqual: false,
427427
Before: "A",
@@ -460,8 +460,8 @@ func TestUnitAccessContextManagerServicePerimeter_identityTypeDiff(t *testing.T)
460460
}
461461
}
462462

463-
func (tc *IdentityTypeDiffSupressFuncDiffSuppressTestCase) Test(t *testing.T) {
464-
actual := accesscontextmanager.AccessContextManagerServicePerimeterIdentityTypeDiffSupressFunc("", tc.Before, tc.After, nil)
463+
func (tc *IdentityTypeDiffSuppressFuncDiffSuppressTestCase) Test(t *testing.T) {
464+
actual := accesscontextmanager.AccessContextManagerServicePerimeterIdentityTypeDiffSuppressFunc("", tc.Before, tc.After, nil)
465465
if actual != tc.AreEqual {
466466
t.Errorf(
467467
"Unexpected difference found. Before: \"%s\", after: \"%s\", actual: %t, expected: %t",

google-beta/services/apigee/resource_apigee_app_group.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ in the format 'organizations/{{org_name}}'.`,
8585
"channel_id": {
8686
Type: schema.TypeString,
8787
Optional: true,
88-
Description: `Channel identifier identifies the owner maintaing this grouping.`,
88+
Description: `Channel identifier identifies the owner maintaining this grouping.`,
8989
},
9090
"channel_uri": {
9191
Type: schema.TypeString,

0 commit comments

Comments
 (0)