forked from rework-space-com/terraform-provider-freeipa
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathresource_sudo_rule_allowcmd_membership_test.go
106 lines (95 loc) · 3.31 KB
/
resource_sudo_rule_allowcmd_membership_test.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
package main
import (
"fmt"
"os"
"testing"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource"
)
func TestAccFreeIPASudoRuleAllowCommand(t *testing.T) {
testSudoRuleAllowCommand := map[string]string{
"name": "sudo-rule-test",
"allowcmd1": "/bin/bash",
"allowcmd2": "/bin/fish",
"allowcmdgrp": "terminals",
}
resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders,
Steps: []resource.TestStep{
{
Config: testAccFreeIPASudoRuleAllowCommandResource_basic(testSudoRuleAllowCommand),
Check: resource.ComposeTestCheckFunc(
resource.TestCheckResourceAttr("freeipa_sudo_rule_allowcmd_membership.test_rule_allowcmd", "name", testSudoRuleAllowCommand["name"]),
resource.TestCheckResourceAttr("freeipa_sudo_rule_allowcmd_membership.test_rule_allowcmd", "sudocmd", testSudoRuleAllowCommand["allowcmd1"]),
),
},
{
Config: testAccFreeIPASudoRuleAllowCommandResource_full(testSudoRuleAllowCommand),
Check: resource.ComposeTestCheckFunc(
resource.TestCheckResourceAttr("freeipa_sudo_rule_allowcmd_membership.test_rule_allowcmdgrp", "name", testSudoRuleAllowCommand["name"]),
resource.TestCheckResourceAttr("freeipa_sudo_rule_allowcmd_membership.test_rule_allowcmdgrp", "sudocmd_group", testSudoRuleAllowCommand["allowcmdgrp"]),
),
},
},
})
}
func testAccFreeIPASudoRuleAllowCommandResource_basic(dataset map[string]string) string {
provider_host := os.Getenv("FREEIPA_HOST")
provider_user := os.Getenv("FREEIPA_USERNAME")
provider_pass := os.Getenv("FREEIPA_PASSWORD")
return fmt.Sprintf(`
provider "freeipa" {
host = "%s"
username = "%s"
password = "%s"
insecure = true
}
resource "freeipa_sudo_cmd" "cmd1" {
name = "%s"
}
resource "freeipa_sudo_rule" "test_rule" {
name = "%s"
}
resource "freeipa_sudo_rule_allowcmd_membership" "test_rule_allowcmd" {
name = freeipa_sudo_rule.test_rule.name
sudocmd = freeipa_sudo_cmd.cmd1.name
}
`, provider_host, provider_user, provider_pass, dataset["allowcmd1"], dataset["name"])
}
func testAccFreeIPASudoRuleAllowCommandResource_full(dataset map[string]string) string {
provider_host := os.Getenv("FREEIPA_HOST")
provider_user := os.Getenv("FREEIPA_USERNAME")
provider_pass := os.Getenv("FREEIPA_PASSWORD")
return fmt.Sprintf(`
provider "freeipa" {
host = "%s"
username = "%s"
password = "%s"
insecure = true
}
resource "freeipa_sudo_cmd" "cmd1" {
name = "%s"
}
resource "freeipa_sudo_cmd" "cmd2" {
name = "%s"
}
resource "freeipa_sudo_cmdgroup" "cmdgroup" {
name = "%s"
}
resource "freeipa_sudo_cmdgroup_membership" "cmdgroup_member1" {
name = freeipa_sudo_cmdgroup.cmdgroup.name
sudocmd = freeipa_sudo_cmd.cmd1.name
}
resource "freeipa_sudo_cmdgroup_membership" "cmdgroup_member2" {
name = freeipa_sudo_cmdgroup.cmdgroup.name
sudocmd = freeipa_sudo_cmd.cmd2.name
}
resource "freeipa_sudo_rule" "test_rule" {
name = "%s"
}
resource "freeipa_sudo_rule_allowcmd_membership" "test_rule_allowcmdgrp" {
name = freeipa_sudo_rule.test_rule.name
sudocmd_group = freeipa_sudo_cmdgroup.cmdgroup.name
}
`, provider_host, provider_user, provider_pass, dataset["allowcmd1"], dataset["allowcmd2"], dataset["allowcmdgrp"], dataset["name"])
}