@@ -57,6 +57,12 @@ func TestTerraformAWSElastiCacheModule(t *testing.T) {
5757 EnvVars : map [string ]string {
5858 "AWS_DEFAULT_REGION" : awsRegion ,
5959 },
60+
61+ // Variables to pass to our Terraform code using -var options
62+ Vars : map [string ]interface {}{
63+ "prefix" : "example" ,
64+ "environment" : "example" ,
65+ },
6066 })
6167
6268 // At the end of the test, run `terraform destroy` to clean up any resources that were created
@@ -182,6 +188,7 @@ func testElasticacheClustersCreated(t *testing.T, terraformOptions *terraform.Op
182188 assert .Equal (t , "valkey" , * rg .Engine , "Engine should be valkey" )
183189 assert .True (t , * rg .AtRestEncryptionEnabled , "At-rest encryption should be enabled" )
184190 assert .True (t , * rg .TransitEncryptionEnabled , "Transit encryption should be enabled" )
191+ // assert.Equal(t, "enabled", string(rg.MultiAZ), "Multi-AZ should be enabled for Valkey cluster")
185192 }
186193}
187194
@@ -239,7 +246,7 @@ func testAlarmsCreated(t *testing.T, terraformOptions *terraform.Options, region
239246 // Test alarms for Redis traditional cluster
240247 if redisReplicationGroupId != "" {
241248 input := & cloudwatch.DescribeAlarmsInput {
242- AlarmNamePrefix : aws .String (fmt . Sprintf ( "example-example-redis-test-redis_high_CPU" ) ),
249+ AlarmNamePrefix : aws .String ("example-example-redis-test-redis_high_CPU" ),
243250 }
244251
245252 result , err := client .DescribeAlarms (context .TODO (), input )
@@ -261,7 +268,7 @@ func testAlarmsCreated(t *testing.T, terraformOptions *terraform.Options, region
261268 // Test alarms for Valkey traditional cluster
262269 if valkeyReplicationGroupId != "" {
263270 input := & cloudwatch.DescribeAlarmsInput {
264- AlarmNamePrefix : aws .String (fmt . Sprintf ( "example-example-valkey-test-redis_high_CPU" ) ),
271+ AlarmNamePrefix : aws .String ("example-example-valkey-test-redis_high_CPU" ),
265272 }
266273
267274 result , err := client .DescribeAlarms (context .TODO (), input )
0 commit comments