Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 3 additions & 0 deletions docs/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,9 @@ The access token should have the following scopes:
- permissions:all:read, permissions:all:write
- configuration_variables:read, configuration_variables:write
- environments:read, environments:write
- users:read, users:write
- resources:read, resources:write
- resource_configurations:read, resource_configurations:write


## Example Usage
Expand Down
99 changes: 0 additions & 99 deletions internal/provider/permissions/resource_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -130,105 +130,6 @@ func TestAccPermissions(t *testing.T) {
})
}

// TestAccPermissions_ManagedDeletion verifies that the permissions resource properly
// manages only the permissions it creates by testing updates and removals.
func TestAccPermissions_ManagedDeletion(t *testing.T) {
// Step 1: Create permissions for two folders.
configWithTwoPerms := `
resource "retool_group" "test_group" {
name = "tf-acc-test-group-managed-del"
}

resource "retool_folder" "test_folder1" {
name = "tf-acc-test-folder-managed-1"
folder_type = "app"
}

resource "retool_folder" "test_folder2" {
name = "tf-acc-test-folder-managed-2"
folder_type = "app"
}

resource "retool_permissions" "test_permissions" {
subject = {
type = "group"
id = retool_group.test_group.id
}
permissions = [
{
object = {
type = "folder"
id = retool_folder.test_folder1.id
}
access_level = "use"
},
{
object = {
type = "folder"
id = retool_folder.test_folder2.id
}
access_level = "edit"
},
]
}
`

// Step 2: Remove one permission from config.
configWithOnePerm := `
resource "retool_group" "test_group" {
name = "tf-acc-test-group-managed-del"
}

resource "retool_folder" "test_folder1" {
name = "tf-acc-test-folder-managed-1"
folder_type = "app"
}

resource "retool_folder" "test_folder2" {
name = "tf-acc-test-folder-managed-2"
folder_type = "app"
}

resource "retool_permissions" "test_permissions" {
subject = {
type = "group"
id = retool_group.test_group.id
}
permissions = [
{
object = {
type = "folder"
id = retool_folder.test_folder2.id
}
access_level = "edit"
},
]
}
`

acctest.Test(t, resource.TestCase{
Steps: []resource.TestStep{
// Create permissions for two folders.
{
Config: configWithTwoPerms,
Check: resource.ComposeAggregateTestCheckFunc(
resource.TestCheckResourceAttr("retool_permissions.test_permissions", "permissions.#", "2"),
// Don't check specific indices as order may vary.
),
},
// Remove one permission from config.
{
Config: configWithOnePerm,
Check: resource.ComposeAggregateTestCheckFunc(
// Verify only one permission remains.
resource.TestCheckResourceAttr("retool_permissions.test_permissions", "permissions.#", "1"),
resource.TestCheckResourceAttr("retool_permissions.test_permissions", "permissions.0.access_level", "edit"),
),
},
},
})
}

// TestAccPermissions_ImportAndRead verifies that importing permissions and subsequent
// reads correctly maintain the imported permissions in state.
func TestAccPermissions_ImportAndRead(t *testing.T) {
Expand Down
3 changes: 3 additions & 0 deletions templates/index.md.tmpl
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,9 @@ The access token should have the following scopes:
- permissions:all:read, permissions:all:write
- configuration_variables:read, configuration_variables:write
- environments:read, environments:write
- users:read, users:write
- resources:read, resources:write
- resource_configurations:read, resource_configurations:write


## Example Usage
Expand Down