@@ -10,62 +10,58 @@ import (
10
10
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource"
11
11
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
12
12
13
+ "github.com/draios/terraform-provider-sysdig/buildinfo"
13
14
"github.com/draios/terraform-provider-sysdig/sysdig"
14
15
)
15
16
16
17
func TestAccPolicy (t * testing.T ) {
17
18
rText := func () string { return acctest .RandStringFromCharSet (10 , acctest .CharSetAlphaNum ) }
18
19
20
+ steps := []resource.TestStep {
21
+ {
22
+ Config : policyWithName (rText ()),
23
+ },
24
+ {
25
+ ResourceName : "sysdig_secure_policy.sample" ,
26
+ ImportState : true ,
27
+ ImportStateVerify : true ,
28
+ },
29
+ {
30
+ Config : policyWithoutActions (rText ()),
31
+ },
32
+ {
33
+ Config : policyWithoutNotificationChannels (rText ()),
34
+ },
35
+ {
36
+ Config : policyWithMinimumConfiguration (rText ()),
37
+ },
38
+ {
39
+ Config : policiesWithDifferentSeverities (rText ()),
40
+ },
41
+ {
42
+ Config : policiesWithKillAction (rText ()),
43
+ },
44
+ }
45
+
46
+ if ! buildinfo .OnpremSecure {
47
+ steps = append (steps ,
48
+ resource.TestStep {Config : policiesForAWSCloudtrail (rText ())},
49
+ resource.TestStep {Config : policiesForGCPAuditLog (rText ())},
50
+ resource.TestStep {Config : policiesForAzurePlatformlogs (rText ())},
51
+ resource.TestStep {Config : policiesForFalcoCloudAWSCloudtrail (rText ())},
52
+ resource.TestStep {Config : policiesForOkta (rText ())},
53
+ resource.TestStep {Config : policiesForGithub (rText ())},
54
+ )
55
+ }
56
+
19
57
resource .ParallelTest (t , resource.TestCase {
20
58
PreCheck : preCheckAnyEnv (t , SysdigSecureApiTokenEnv ),
21
59
ProviderFactories : map [string ]func () (* schema.Provider , error ){
22
60
"sysdig" : func () (* schema.Provider , error ) {
23
61
return sysdig .Provider (), nil
24
62
},
25
63
},
26
- Steps : []resource.TestStep {
27
- {
28
- Config : policyWithName (rText ()),
29
- },
30
- {
31
- ResourceName : "sysdig_secure_policy.sample" ,
32
- ImportState : true ,
33
- ImportStateVerify : true ,
34
- },
35
- {
36
- Config : policyWithoutActions (rText ()),
37
- },
38
- {
39
- Config : policyWithoutNotificationChannels (rText ()),
40
- },
41
- {
42
- Config : policyWithMinimumConfiguration (rText ()),
43
- },
44
- {
45
- Config : policiesWithDifferentSeverities (rText ()),
46
- },
47
- {
48
- Config : policiesWithKillAction (rText ()),
49
- },
50
- {
51
- Config : policiesForAWSCloudtrail (rText ()),
52
- },
53
- {
54
- Config : policiesForGCPAuditLog (rText ()),
55
- },
56
- {
57
- Config : policiesForAzurePlatformlogs (rText ()),
58
- },
59
- {
60
- Config : policiesForFalcoCloudAWSCloudtrail (rText ()),
61
- },
62
- {
63
- Config : policiesForOkta (rText ()),
64
- },
65
- {
66
- Config : policiesForGithub (rText ()),
67
- },
68
- },
64
+ Steps : steps ,
69
65
})
70
66
}
71
67
0 commit comments