Skip to content

Commit f2e85f0

Browse files
committed
Add ability to import policies to state
1 parent fd2f0b7 commit f2e85f0

File tree

3 files changed

+37
-1
lines changed

3 files changed

+37
-1
lines changed

sumologic/resource_sumologic_policies.go

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,9 @@ func resourceSumologicPolicies() *schema.Resource {
1919
Read: resourceSumologicPoliciesRead,
2020
Update: resourceSumologicPoliciesUpdate,
2121
Delete: resourceSumologicPoliciesDelete,
22+
Importer: &schema.ResourceImporter{
23+
State: schema.ImportStatePassthrough,
24+
},
2225

2326
Schema: map[string]*schema.Schema{
2427
"audit": {
@@ -88,7 +91,7 @@ func resourceSumologicPoliciesCreate(d *schema.ResourceData, meta interface{}) e
8891
return err
8992
}
9093

91-
d.SetId("policies")
94+
d.SetId("org-policies")
9295
return nil
9396
}
9497

sumologic/resource_sumologic_policies_test.go

Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,33 @@ import (
99
"github.com/hashicorp/terraform-plugin-sdk/terraform"
1010
)
1111

12+
func TestAccPolicies_basic(t *testing.T) {
13+
policies := Policies{
14+
Audit: AuditPolicy{Enabled: true},
15+
DataAccessLevel: DataAccessLevelPolicy{Enabled: true},
16+
MaxUserSessionTimeout: MaxUserSessionTimeoutPolicy{MaxUserSessionTimeout: "1h"},
17+
SearchAudit: SearchAuditPolicy{Enabled: true},
18+
ShareDashboardsOutsideOrganization: ShareDashboardsOutsideOrganizationPolicy{Enabled: true},
19+
UserConcurrentSessionsLimit: UserConcurrentSessionsLimitPolicy{Enabled: true, MaxConcurrentSessions: 70},
20+
}
21+
22+
resource.Test(t, resource.TestCase{
23+
PreCheck: func() { testAccPreCheck(t) },
24+
Providers: testAccProviders,
25+
CheckDestroy: testAccCheckPoliciesDestroy(),
26+
Steps: []resource.TestStep{
27+
{
28+
Config: newPoliciesConfig("tf_policies_import_test", &policies),
29+
},
30+
{
31+
ResourceName: "sumologic_policies.tf_policies_import_test",
32+
ImportState: true,
33+
ImportStateVerify: true,
34+
},
35+
},
36+
})
37+
}
38+
1239
func TestAccPolicies_create(t *testing.T) {
1340
policies := Policies{
1441
Audit: AuditPolicy{Enabled: true},

website/docs/r/policies.html.markdown

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -47,6 +47,12 @@ The following arguments are supported:
4747
- `enabled` - (Optional) Whether the [User Concurrent Sessions Limit Policy][6] is enabled. Defaults to `false`.
4848
- `max_concurrent_sessions` - (Optional) Maximum number of concurrent sessions a user may have. Defaults to `100`.
4949

50+
## Import
51+
Policies can be imported using the id `org-policies`, e.g.:
52+
```hcl
53+
terraform import sumologic_policies.example_policies org-policies
54+
```
55+
5056
[1]: https://help.sumologic.com/Manage/Security/Audit-Index
5157
[2]: https://help.sumologic.com/Manage/Security/Data_Access_Level_for_Shared_Dashboards
5258
[3]: https://help.sumologic.com/Manage/Security/Set_a_Maximum_Web_Session_Timeout

0 commit comments

Comments
 (0)