Skip to content

Commit fe70fd0

Browse files
authored
Merge pull request #20 from infraspecdev/feat/sso_user_groups_assignment
feat: SSO user groups assignment
2 parents df31f78 + 5100db9 commit fe70fd0

File tree

2 files changed

+8
-62
lines changed

2 files changed

+8
-62
lines changed

tests/permission_sets_unit-tests.tftest.hcl

Lines changed: 0 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -98,29 +98,3 @@ run "validate_permission_set_description" {
9898
error_message = "Permission set description doesn't match"
9999
}
100100
}
101-
102-
run "check_permission_set_creation" {
103-
104-
command = apply
105-
106-
variables {
107-
permission_sets = {
108-
"dummy_ps" = {
109-
name = "dummy_ps"
110-
description = "This is only used for testing purpose"
111-
inline_policy = ""
112-
managed_policies = []
113-
customer_managed_policies = []
114-
},
115-
}
116-
}
117-
118-
module {
119-
source = "./modules/permission_sets"
120-
}
121-
122-
assert {
123-
condition = can(aws_ssoadmin_permission_set.this["dummy_ps"])
124-
error_message = "Permission set was not created"
125-
}
126-
}
Lines changed: 8 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -1,57 +1,29 @@
11

22
#Argument validation for user-group-assignment module
3-
run "check_for_invalid_user" {
4-
command = plan
5-
6-
variables {
7-
user_groups_mapping = {
8-
"dummyUser@gmail.com" = [
9-
"Group1"
10-
]
3+
variables {
4+
sso_groups = {
5+
"Dummy_Group" = {
6+
group_name = "Dummy_Group"
7+
group_description = "A Dummy Group"
118
}
129
}
13-
14-
module {
15-
source = "./modules/sso_groups"
16-
}
17-
18-
expect_failures = [
19-
var.user_groups_mapping
20-
]
2110
}
2211

2312
run "check_for_valid_user_with_no_groups" {
2413
command = plan
2514

2615
variables {
27-
user_groups_mapping = {
16+
user_groups_map = {
2817
"dummyUser@gmail.com" = []
2918
}
19+
sso_groups = var.sso_groups
3020
}
3121

3222
module {
3323
source = "./modules/sso_groups"
3424
}
3525

3626
expect_failures = [
37-
var.user_groups_mapping
38-
]
39-
}
40-
41-
run "check_for_invalid_group" {
42-
command = plan
43-
44-
variables {
45-
user_groups_mapping = {
46-
"dummyUser@gmail.com" = [""]
47-
}
48-
}
49-
50-
module {
51-
source = "./modules/sso_groups"
52-
}
53-
54-
expect_failures = [
55-
var.user_groups_mapping
27+
var.user_groups_map
5628
]
5729
}

0 commit comments

Comments
 (0)