Skip to content

Commit 7ac55ed

Browse files
committed
Fix Lint.
1 parent 801bb03 commit 7ac55ed

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

internal/provider/protocols_cifs_share_resource.go

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -432,7 +432,7 @@ func (r *ProtocolsCIFSShareResource) Create(ctx context.Context, req resource.Cr
432432
body.SVM.Name = data.SVMName.ValueString()
433433
body.Path = data.Path.ValueString()
434434

435-
configHasDefaultAcl := false
435+
configHasDefaultACL := false
436436
if !data.Acls.IsUnknown() {
437437
aclsList := []interfaces.Acls{}
438438
elements := make([]types.Object, 0, len(data.Acls.Elements()))
@@ -453,7 +453,7 @@ func (r *ProtocolsCIFSShareResource) Create(ctx context.Context, req resource.Cr
453453
interfacesAcls.Type = acls.Type
454454
interfacesAcls.UserOrGroup = acls.UserOrGroup
455455
if acls.UserOrGroup == "Everyone" && acls.Permission == "full_control" {
456-
configHasDefaultAcl = true
456+
configHasDefaultACL = true
457457
}
458458
aclsList = append(aclsList, interfacesAcls)
459459
}
@@ -557,7 +557,7 @@ func (r *ProtocolsCIFSShareResource) Create(ctx context.Context, req resource.Cr
557557
} else {
558558
for _, acls := range restInfo.Acls {
559559
//If the config file does not have acl set user_or_group as "Everyone / Full Control", the API will create one by default. Need to delete it if user does not want one.
560-
if acls.UserOrGroup == "Everyone" && acls.Permission == "full_control" && !configHasDefaultAcl {
560+
if acls.UserOrGroup == "Everyone" && acls.Permission == "full_control" && !configHasDefaultACL {
561561
svm, err := interfaces.GetSvmByName(errorHandler, *client, data.SVMName.ValueString())
562562
if err != nil {
563563
return
@@ -744,21 +744,21 @@ func (r *ProtocolsCIFSShareResource) Update(ctx context.Context, req resource.Up
744744
return
745745
}
746746
for index, planACL := range planeAcls {
747-
var planAclElement ProtocolsCIFSShareResourceAcls
748-
diags := planACL.As(ctx, &planAclElement, basetypes.ObjectAsOptions{})
747+
var planACLElement ProtocolsCIFSShareResourceAcls
748+
diags := planACL.As(ctx, &planACLElement, basetypes.ObjectAsOptions{})
749749
if diags.HasError() {
750750
resp.Diagnostics.Append(diags...)
751751
return
752752
}
753753
// if 'userOrGroup' and 'type' matches, then we know it's not a create action. If permission is same, then break the loop because nothing to update.
754-
if stateACLElement.UserOrGroup == planAclElement.UserOrGroup && stateACLElement.Type == planAclElement.Type {
755-
if stateACLElement.Permission == planAclElement.Permission {
754+
if stateACLElement.UserOrGroup == planACLElement.UserOrGroup && stateACLElement.Type == planACLElement.Type {
755+
if stateACLElement.Permission == planACLElement.Permission {
756756
break
757757
} else {
758758
// update the acls since permission is different
759759
interfacesAcls := interfaces.ProtocolsCIFSShareACLResourceBodyDataModelONTAP{}
760-
interfacesAcls.Permission = planAclElement.Permission
761-
err = interfaces.UpdateProtocolsCIFSShareACL(errorHandler, *client, interfacesAcls, svm.UUID, plan.Name.ValueString(), planAclElement.UserOrGroup, planAclElement.Type)
760+
interfacesAcls.Permission = planACLElement.Permission
761+
err = interfaces.UpdateProtocolsCIFSShareACL(errorHandler, *client, interfacesAcls, svm.UUID, plan.Name.ValueString(), planACLElement.UserOrGroup, planACLElement.Type)
762762
if err != nil {
763763
return
764764
}

0 commit comments

Comments
 (0)