@@ -15,12 +15,279 @@ import (
15
15
"github.com/draios/terraform-provider-sysdig/sysdig"
16
16
)
17
17
18
- func TestAccRuleFalco (t * testing.T ) {
19
- rText := func () string { return acctest .RandStringFromCharSet (10 , acctest .CharSetAlphaNum ) }
18
+ //func TestAccRuleFalco(t *testing.T) {
19
+ // rText := func() string { return acctest.RandStringFromCharSet(10, acctest.CharSetAlphaNum) }
20
+ //
21
+ // ruleRandomImmutableText := rText()
22
+ //
23
+ // randomText := rText()
24
+ // resource.Test(t, resource.TestCase{
25
+ // PreCheck: func() {
26
+ // if v := os.Getenv("SYSDIG_SECURE_API_TOKEN"); v == "" {
27
+ // t.Fatal("SYSDIG_SECURE_API_TOKEN must be set for acceptance tests")
28
+ // }
29
+ // },
30
+ // ProviderFactories: map[string]func() (*schema.Provider, error){
31
+ // "sysdig": func() (*schema.Provider, error) {
32
+ // return sysdig.Provider(), nil
33
+ // },
34
+ // },
35
+ // Steps: []resource.TestStep{
36
+ // //{
37
+ // Config: ruleFalcoTerminalShell(ruleRandomImmutableText),
38
+ //},
39
+ //{
40
+ // Config: ruleFalcoUpdatedTerminalShell(ruleRandomImmutableText),
41
+ //},
42
+ //{
43
+ // Config: ruleFalcoTerminalShellWithMinimumEngineVersion(rText()),
44
+ //},
45
+ //{
46
+ // ResourceName: "sysdig_secure_rule_falco.terminal_shell",
47
+ // ImportState: true,
48
+ // ImportStateVerify: true,
49
+ //},
50
+ //{
51
+ // Config: ruleFalcoTerminalShellWithAppend(),
52
+ //},
53
+ //{
54
+ // ResourceName: "sysdig_secure_rule_falco.terminal_shell_append",
55
+ // ImportState: true,
56
+ // ImportStateVerify: true,
57
+ //},
58
+ //{
59
+ // Config: ruleFalcoGcpAuditlog(rText()),
60
+ //},
61
+ //{
62
+ // Config: ruleFalcoAzureAuditlog(rText()),
63
+ //},
64
+ //{
65
+ // Config: ruleFalcoKubeAudit(rText()),
66
+ //},
67
+ //{
68
+ // ResourceName: "sysdig_secure_rule_falco.kube_audit",
69
+ // ImportState: true,
70
+ // ImportStateVerify: true,
71
+ //},
72
+ // Incorrect configurations
73
+ //{
74
+ // Config: ruleFalcoTerminalShellWithMissingOuput(rText()),
75
+ // ExpectError: regexp.MustCompile("output must be set when append = false"),
76
+ //},
77
+ //{
78
+ // Config: ruleFalcoTerminalShellWithMissingSource(rText()),
79
+ // ExpectError: regexp.MustCompile("source must be set when append = false"),
80
+ //},
81
+ //{
82
+ // Config: ruleFalcoWithExceptions(randomText),
83
+ //},
84
+ //{
85
+ // ResourceName: "sysdig_secure_rule_falco.falco_rule_with_exceptions",
86
+ // ImportState: true,
87
+ // ImportStateVerify: true,
88
+ //},
89
+ //{
90
+ // Config: existingFalcoRuleWithExceptions(randomText),
91
+ //},
92
+ //{
93
+ // ResourceName: "sysdig_secure_rule_falco.attach_to_cluster_admin_role_exceptions",
94
+ // ImportState: true,
95
+ // ImportStateVerify: true,
96
+ //},
97
+ //{
98
+ // Config: ruleFalcoCloudAWSCloudtrail(randomText),
99
+ //},
100
+ //{
101
+ // Config: ruleFalcoCloudAWSCloudtrailWithAppend(),
102
+ //},
103
+ //{
104
+ // Config: ruleOkta(randomText),
105
+ //},
106
+ //{
107
+ // Config: ruleOktaWithAppend(),
108
+ //},
109
+ //{
110
+ // Config: ruleGithub(randomText),
111
+ //},
112
+ //{
113
+ // Config: ruleGithubWithAppend(),
114
+ //},
115
+ // },
116
+ // })
117
+ //}
118
+
119
+ func TestAccRuleFalcoTerminalShell (t * testing.T ) {
120
+ ruleRandomImmutableText := randomString ()
121
+ steps := []resource.TestStep {
122
+ {
123
+ Config : ruleFalcoTerminalShell (ruleRandomImmutableText ),
124
+ },
125
+ {
126
+ Config : ruleFalcoUpdatedTerminalShell (ruleRandomImmutableText ),
127
+ },
128
+ {
129
+ ResourceName : "sysdig_secure_rule_falco.terminal_shell" ,
130
+ ImportState : true ,
131
+ ImportStateVerify : true ,
132
+ },
133
+ }
134
+ runTest (steps , t )
135
+ }
136
+
137
+ func TestAccRuleFalcoTerminalShellWithMinimumEngineVersion (t * testing.T ) {
138
+ steps := []resource.TestStep {
139
+ {Config : ruleFalcoTerminalShellWithMinimumEngineVersion (randomString ())},
140
+ }
141
+ runTest (steps , t )
142
+ }
143
+
144
+ func TestRuleFalcoTerminalShellWithAppend (t * testing.T ) {
145
+ steps := []resource.TestStep {
146
+ {
147
+ Config : ruleFalcoTerminalShellWithAppend (),
148
+ },
149
+ {
150
+ ResourceName : "sysdig_secure_rule_falco.terminal_shell_append" ,
151
+ ImportState : true ,
152
+ ImportStateVerify : true ,
153
+ },
154
+ }
155
+ runTest (steps , t )
156
+ }
157
+
158
+ func TestRuleFalcoGcpAuditlog (t * testing.T ) {
159
+ steps := []resource.TestStep {
160
+ {
161
+ Config : ruleFalcoGcpAuditlog (randomString ()),
162
+ },
163
+ }
164
+ runTest (steps , t )
165
+ }
166
+
167
+ func TestRuleFalcoAzureAuditlog (t * testing.T ) {
168
+ steps := []resource.TestStep {
169
+ {
170
+ Config : ruleFalcoAzureAuditlog (randomString ()),
171
+ },
172
+ }
173
+ runTest (steps , t )
174
+ }
175
+
176
+ func TestRuleFalcoKubeAudit (t * testing.T ) {
177
+
178
+ steps := []resource.TestStep {
179
+ {
180
+ Config : ruleFalcoKubeAudit (randomString ()),
181
+ },
182
+ {
183
+ ResourceName : "sysdig_secure_rule_falco.kube_audit" ,
184
+ ImportState : true ,
185
+ ImportStateVerify : true ,
186
+ },
187
+ }
188
+ runTest (steps , t )
189
+ }
190
+
191
+ func TestIncorrectErrors (t * testing.T ) {
192
+ steps := []resource.TestStep {
193
+ // Incorrect configurations
194
+ {
195
+ Config : ruleFalcoTerminalShellWithMissingOuput (randomString ()),
196
+ ExpectError : regexp .MustCompile ("output must be set when append = false" ),
197
+ },
198
+ {
199
+ Config : ruleFalcoTerminalShellWithMissingSource (randomString ()),
200
+ ExpectError : regexp .MustCompile ("source must be set when append = false" ),
201
+ },
202
+ }
203
+ runTest (steps , t )
204
+ }
205
+
206
+ func TestRuleFalcoWithExceptions (t * testing.T ) {
207
+ steps := []resource.TestStep {
208
+ {
209
+ Config : ruleFalcoWithExceptions (randomString ()),
210
+ },
211
+ {
212
+ ResourceName : "sysdig_secure_rule_falco.falco_rule_with_exceptions" ,
213
+ ImportState : true ,
214
+ ImportStateVerify : true ,
215
+ },
216
+ }
217
+ runTest (steps , t )
218
+ }
20
219
21
- ruleRandomImmutableText := rText ()
220
+ func TestExistingFalcoRuleWithExceptions (t * testing.T ) {
221
+ steps := []resource.TestStep {
222
+ {
223
+ Config : existingFalcoRuleWithExceptions (randomString ()),
224
+ },
225
+ {
226
+ ResourceName : "sysdig_secure_rule_falco.attach_to_cluster_admin_role_exceptions" ,
227
+ ImportState : true ,
228
+ ImportStateVerify : true ,
229
+ },
230
+ }
231
+ runTest (steps , t )
232
+ }
233
+
234
+ func TestRuleFalcoCloudAWSCloudtrail (t * testing.T ) {
235
+ steps := []resource.TestStep {
236
+ {
237
+ Config : ruleFalcoCloudAWSCloudtrail (randomString ()),
238
+ },
239
+ }
240
+ runTest (steps , t )
241
+ }
242
+
243
+ func TestRuleFalcoCloudAWSCloudtrailAppend (t * testing.T ) {
244
+ steps := []resource.TestStep {
245
+ {
246
+ Config : ruleFalcoCloudAWSCloudtrailWithAppend (),
247
+ },
248
+ }
249
+ runTest (steps , t )
250
+ }
22
251
23
- randomText := rText ()
252
+ func TestRuleOkta (t * testing.T ) {
253
+ steps := []resource.TestStep {
254
+ {
255
+ Config : ruleOkta (randomString ()),
256
+ },
257
+ }
258
+ runTest (steps , t )
259
+ }
260
+
261
+ func TestRuleOktaAppends (t * testing.T ) {
262
+ steps := []resource.TestStep {
263
+ {
264
+ Config : ruleOktaWithAppend (),
265
+ },
266
+ }
267
+ runTest (steps , t )
268
+ }
269
+
270
+ func TestRuleGithub (t * testing.T ) {
271
+ steps := []resource.TestStep {
272
+ {
273
+ Config : ruleGithub (randomString ()),
274
+ },
275
+ }
276
+ runTest (steps , t )
277
+ }
278
+
279
+ func TestRuleGithubAppends (t * testing.T ) {
280
+ steps := []resource.TestStep {
281
+ {
282
+ Config : ruleGithubWithAppend (),
283
+ },
284
+ }
285
+ runTest (steps , t )
286
+ }
287
+
288
+ func randomString () string { return acctest .RandStringFromCharSet (10 , acctest .CharSetAlphaNum ) }
289
+
290
+ func runTest (steps []resource.TestStep , t * testing.T ) {
24
291
resource .Test (t , resource.TestCase {
25
292
PreCheck : func () {
26
293
if v := os .Getenv ("SYSDIG_SECURE_API_TOKEN" ); v == "" {
@@ -32,88 +299,9 @@ func TestAccRuleFalco(t *testing.T) {
32
299
return sysdig .Provider (), nil
33
300
},
34
301
},
35
- Steps : []resource.TestStep {
36
- {
37
- Config : ruleFalcoTerminalShell (ruleRandomImmutableText ),
38
- },
39
- {
40
- Config : ruleFalcoUpdatedTerminalShell (ruleRandomImmutableText ),
41
- },
42
- {
43
- Config : ruleFalcoTerminalShellWithMinimumEngineVersion (rText ()),
44
- },
45
- {
46
- ResourceName : "sysdig_secure_rule_falco.terminal_shell" ,
47
- ImportState : true ,
48
- ImportStateVerify : true ,
49
- },
50
- {
51
- Config : ruleFalcoTerminalShellWithAppend (),
52
- },
53
- {
54
- ResourceName : "sysdig_secure_rule_falco.terminal_shell_append" ,
55
- ImportState : true ,
56
- ImportStateVerify : true ,
57
- },
58
- {
59
- Config : ruleFalcoGcpAuditlog (rText ()),
60
- },
61
- {
62
- Config : ruleFalcoAzureAuditlog (rText ()),
63
- },
64
- {
65
- Config : ruleFalcoKubeAudit (rText ()),
66
- },
67
- {
68
- ResourceName : "sysdig_secure_rule_falco.kube_audit" ,
69
- ImportState : true ,
70
- ImportStateVerify : true ,
71
- },
72
- // Incorrect configurations
73
- {
74
- Config : ruleFalcoTerminalShellWithMissingOuput (rText ()),
75
- ExpectError : regexp .MustCompile ("output must be set when append = false" ),
76
- },
77
- {
78
- Config : ruleFalcoTerminalShellWithMissingSource (rText ()),
79
- ExpectError : regexp .MustCompile ("source must be set when append = false" ),
80
- },
81
- {
82
- Config : ruleFalcoWithExceptions (randomText ),
83
- },
84
- {
85
- ResourceName : "sysdig_secure_rule_falco.falco_rule_with_exceptions" ,
86
- ImportState : true ,
87
- ImportStateVerify : true ,
88
- },
89
- {
90
- Config : existingFalcoRuleWithExceptions (randomText ),
91
- },
92
- {
93
- ResourceName : "sysdig_secure_rule_falco.attach_to_cluster_admin_role_exceptions" ,
94
- ImportState : true ,
95
- ImportStateVerify : true ,
96
- },
97
- {
98
- Config : ruleFalcoCloudAWSCloudtrail (randomText ),
99
- },
100
- {
101
- Config : ruleFalcoCloudAWSCloudtrailWithAppend (),
102
- },
103
- {
104
- Config : ruleOkta (randomText ),
105
- },
106
- {
107
- Config : ruleOktaWithAppend (),
108
- },
109
- {
110
- Config : ruleGithub (randomText ),
111
- },
112
- {
113
- Config : ruleGithubWithAppend (),
114
- },
115
- },
302
+ Steps : steps ,
116
303
})
304
+
117
305
}
118
306
119
307
func ruleFalcoTerminalShell (name string ) string {
0 commit comments