@@ -10,62 +10,58 @@ import (
1010 "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource"
1111 "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
1212
13+ "github.com/draios/terraform-provider-sysdig/buildinfo"
1314 "github.com/draios/terraform-provider-sysdig/sysdig"
1415)
1516
1617func TestAccPolicy (t * testing.T ) {
1718 rText := func () string { return acctest .RandStringFromCharSet (10 , acctest .CharSetAlphaNum ) }
1819
20+ steps := []resource.TestStep {
21+ {
22+ Config : policyWithName (rText ()),
23+ },
24+ {
25+ ResourceName : "sysdig_secure_policy.sample" ,
26+ ImportState : true ,
27+ ImportStateVerify : true ,
28+ },
29+ {
30+ Config : policyWithoutActions (rText ()),
31+ },
32+ {
33+ Config : policyWithoutNotificationChannels (rText ()),
34+ },
35+ {
36+ Config : policyWithMinimumConfiguration (rText ()),
37+ },
38+ {
39+ Config : policiesWithDifferentSeverities (rText ()),
40+ },
41+ {
42+ Config : policiesWithKillAction (rText ()),
43+ },
44+ }
45+
46+ if ! buildinfo .OnpremSecure {
47+ steps = append (steps ,
48+ resource.TestStep {Config : policiesForAWSCloudtrail (rText ())},
49+ resource.TestStep {Config : policiesForGCPAuditLog (rText ())},
50+ resource.TestStep {Config : policiesForAzurePlatformlogs (rText ())},
51+ resource.TestStep {Config : policiesForFalcoCloudAWSCloudtrail (rText ())},
52+ resource.TestStep {Config : policiesForOkta (rText ())},
53+ resource.TestStep {Config : policiesForGithub (rText ())},
54+ )
55+ }
56+
1957 resource .ParallelTest (t , resource.TestCase {
2058 PreCheck : preCheckAnyEnv (t , SysdigSecureApiTokenEnv ),
2159 ProviderFactories : map [string ]func () (* schema.Provider , error ){
2260 "sysdig" : func () (* schema.Provider , error ) {
2361 return sysdig .Provider (), nil
2462 },
2563 },
26- Steps : []resource.TestStep {
27- {
28- Config : policyWithName (rText ()),
29- },
30- {
31- ResourceName : "sysdig_secure_policy.sample" ,
32- ImportState : true ,
33- ImportStateVerify : true ,
34- },
35- {
36- Config : policyWithoutActions (rText ()),
37- },
38- {
39- Config : policyWithoutNotificationChannels (rText ()),
40- },
41- {
42- Config : policyWithMinimumConfiguration (rText ()),
43- },
44- {
45- Config : policiesWithDifferentSeverities (rText ()),
46- },
47- {
48- Config : policiesWithKillAction (rText ()),
49- },
50- {
51- Config : policiesForAWSCloudtrail (rText ()),
52- },
53- {
54- Config : policiesForGCPAuditLog (rText ()),
55- },
56- {
57- Config : policiesForAzurePlatformlogs (rText ()),
58- },
59- {
60- Config : policiesForFalcoCloudAWSCloudtrail (rText ()),
61- },
62- {
63- Config : policiesForOkta (rText ()),
64- },
65- {
66- Config : policiesForGithub (rText ()),
67- },
68- },
64+ Steps : steps ,
6965 })
7066}
7167
0 commit comments