diff --git a/internal/services/security/resource_privilege_application.go b/internal/services/security/resource_privilege_application.go index 751e9ee6..68a68a3c 100644 --- a/internal/services/security/resource_privilege_application.go +++ b/internal/services/security/resource_privilege_application.go @@ -45,7 +45,7 @@ func ResourceSecurityPrivilegeApplication() *schema.Resource { Required: true, Elem: &schema.Schema{ Type: schema.TypeString, - ValidateFunc: validation.StringInSlice([]string{"ADD", "READ", "EDIT", "DELETE"}, false), + ValidateFunc: validation.StringInSlice([]string{"ADD", "READ", "EDIT", "DELETE", "STOP", "DISASSOCIATE", "ASSOCIATE", "START", "ALL"}, false), }, }, }, diff --git a/internal/services/security/resource_privilege_application_test.go b/internal/services/security/resource_privilege_application_test.go index 35b0f425..9b42a70f 100644 --- a/internal/services/security/resource_privilege_application_test.go +++ b/internal/services/security/resource_privilege_application_test.go @@ -17,7 +17,7 @@ func TestAccResourceSecurityPrivilegeApplication(t *testing.T) { privilege := security.PrivilegeApplication{ Name: acctest.RandString(20), Description: acctest.RandString(20), - Actions: []security.SecurityPrivilegeApplicationActions{"ADD", "READ", "EDIT", "DELETE"}, + Actions: []security.SecurityPrivilegeApplicationActions{"ADD", "READ", "EDIT", "DELETE", "STOP", "DISASSOCIATE", "ASSOCIATE", "START", "ALL"}, Domain: acctest.RandString(20), } @@ -35,6 +35,11 @@ func TestAccResourceSecurityPrivilegeApplication(t *testing.T) { resource.TestCheckResourceAttr(resName, "actions.1", string(privilege.Actions[1])), resource.TestCheckResourceAttr(resName, "actions.2", string(privilege.Actions[2])), resource.TestCheckResourceAttr(resName, "actions.3", string(privilege.Actions[3])), + resource.TestCheckResourceAttr(resName, "actions.4", string(privilege.Actions[4])), + resource.TestCheckResourceAttr(resName, "actions.5", string(privilege.Actions[5])), + resource.TestCheckResourceAttr(resName, "actions.6", string(privilege.Actions[6])), + resource.TestCheckResourceAttr(resName, "actions.7", string(privilege.Actions[7])), + resource.TestCheckResourceAttr(resName, "actions.8", string(privilege.Actions[8])), ), }, }, diff --git a/internal/services/security/resource_privilege_repository_admin.go b/internal/services/security/resource_privilege_repository_admin.go index 6367bc68..de8d23aa 100644 --- a/internal/services/security/resource_privilege_repository_admin.go +++ b/internal/services/security/resource_privilege_repository_admin.go @@ -50,7 +50,7 @@ func ResourceSecurityPrivilegeRepositoryAdmin() *schema.Resource { Required: true, Elem: &schema.Schema{ Type: schema.TypeString, - ValidateFunc: validation.StringInSlice([]string{"ADD", "READ", "DELETE", "BROWSE", "EDIT"}, false), + ValidateFunc: validation.StringInSlice([]string{"ADD", "READ", "DELETE", "BROWSE", "EDIT", "ALL"}, false), }, }, }, diff --git a/internal/services/security/resource_privilege_repository_admin_test.go b/internal/services/security/resource_privilege_repository_admin_test.go index 855b70a8..8e497f6c 100644 --- a/internal/services/security/resource_privilege_repository_admin_test.go +++ b/internal/services/security/resource_privilege_repository_admin_test.go @@ -17,7 +17,7 @@ func TestAccResourceSecurityPrivilegeRepositoryAdmin(t *testing.T) { privilege := security.PrivilegeRepositoryAdmin{ Name: acctest.RandString(20), Description: acctest.RandString(20), - Actions: []security.SecurityPrivilegeRepositoryAdminActions{"ADD", "READ", "DELETE", "BROWSE", "EDIT"}, + Actions: []security.SecurityPrivilegeRepositoryAdminActions{"ADD", "READ", "DELETE", "BROWSE", "EDIT", "ALL"}, Repository: acctest.RandString(20), Format: "helm", } @@ -37,6 +37,7 @@ func TestAccResourceSecurityPrivilegeRepositoryAdmin(t *testing.T) { resource.TestCheckResourceAttr(resName, "actions.2", string(privilege.Actions[2])), resource.TestCheckResourceAttr(resName, "actions.3", string(privilege.Actions[3])), resource.TestCheckResourceAttr(resName, "actions.4", string(privilege.Actions[4])), + resource.TestCheckResourceAttr(resName, "actions.5", string(privilege.Actions[5])), ), }, }, diff --git a/internal/services/security/resource_privilege_repository_content_selector.go b/internal/services/security/resource_privilege_repository_content_selector.go index ce737aa4..7dacff80 100644 --- a/internal/services/security/resource_privilege_repository_content_selector.go +++ b/internal/services/security/resource_privilege_repository_content_selector.go @@ -55,7 +55,7 @@ func ResourceSecurityPrivilegeRepositoryContentSelector() *schema.Resource { Required: true, Elem: &schema.Schema{ Type: schema.TypeString, - ValidateFunc: validation.StringInSlice([]string{"ADD", "READ", "DELETE", "BROWSE", "EDIT"}, false), + ValidateFunc: validation.StringInSlice([]string{"ADD", "READ", "DELETE", "BROWSE", "EDIT", "ALL"}, false), }, }, }, diff --git a/internal/services/security/resource_privilege_repository_content_selector_test.go b/internal/services/security/resource_privilege_repository_content_selector_test.go index ce8a7b8a..e317b807 100644 --- a/internal/services/security/resource_privilege_repository_content_selector_test.go +++ b/internal/services/security/resource_privilege_repository_content_selector_test.go @@ -17,7 +17,7 @@ func TestAccResourceSecurityPrivilegeRepositoryContentSelector(t *testing.T) { privilege := security.PrivilegeRepositoryContentSelector{ Name: acctest.RandString(20), Description: acctest.RandString(20), - Actions: []security.SecurityPrivilegeRepositoryContentSelectorActions{"ADD", "READ", "DELETE", "BROWSE", "EDIT"}, + Actions: []security.SecurityPrivilegeRepositoryContentSelectorActions{"ADD", "READ", "DELETE", "BROWSE", "EDIT", "ALL"}, Repository: acctest.RandString(20), Format: "helm", ContentSelector: acctest.RandString(20), @@ -39,6 +39,7 @@ func TestAccResourceSecurityPrivilegeRepositoryContentSelector(t *testing.T) { resource.TestCheckResourceAttr(resName, "actions.2", string(privilege.Actions[2])), resource.TestCheckResourceAttr(resName, "actions.3", string(privilege.Actions[3])), resource.TestCheckResourceAttr(resName, "actions.4", string(privilege.Actions[4])), + resource.TestCheckResourceAttr(resName, "actions.5", string(privilege.Actions[5])), ), }, }, diff --git a/internal/services/security/resource_privilege_repository_view.go b/internal/services/security/resource_privilege_repository_view.go index 335f9146..6853fc3a 100644 --- a/internal/services/security/resource_privilege_repository_view.go +++ b/internal/services/security/resource_privilege_repository_view.go @@ -50,7 +50,7 @@ func ResourceSecurityPrivilegeRepositoryView() *schema.Resource { Required: true, Elem: &schema.Schema{ Type: schema.TypeString, - ValidateFunc: validation.StringInSlice([]string{"ADD", "READ", "DELETE", "BROWSE", "EDIT"}, false), + ValidateFunc: validation.StringInSlice([]string{"ADD", "READ", "DELETE", "BROWSE", "EDIT", "ALL"}, false), }, }, }, diff --git a/internal/services/security/resource_privilege_repository_view_test.go b/internal/services/security/resource_privilege_repository_view_test.go index 5ec80634..f0b9b142 100644 --- a/internal/services/security/resource_privilege_repository_view_test.go +++ b/internal/services/security/resource_privilege_repository_view_test.go @@ -17,7 +17,7 @@ func TestAccResourceSecurityPrivilegeRepositoryView(t *testing.T) { privilege := security.PrivilegeRepositoryView{ Name: acctest.RandString(20), Description: acctest.RandString(20), - Actions: []security.SecurityPrivilegeRepositoryViewActions{"ADD", "READ", "DELETE", "BROWSE", "EDIT"}, + Actions: []security.SecurityPrivilegeRepositoryViewActions{"ADD", "READ", "DELETE", "BROWSE", "EDIT", "ALL"}, Repository: acctest.RandString(20), Format: "helm", } @@ -37,6 +37,7 @@ func TestAccResourceSecurityPrivilegeRepositoryView(t *testing.T) { resource.TestCheckResourceAttr(resName, "actions.2", string(privilege.Actions[2])), resource.TestCheckResourceAttr(resName, "actions.3", string(privilege.Actions[3])), resource.TestCheckResourceAttr(resName, "actions.4", string(privilege.Actions[4])), + resource.TestCheckResourceAttr(resName, "actions.5", string(privilege.Actions[5])), ), }, }, diff --git a/internal/services/security/resource_privilege_script.go b/internal/services/security/resource_privilege_script.go index 65b38211..3d0bcbfa 100644 --- a/internal/services/security/resource_privilege_script.go +++ b/internal/services/security/resource_privilege_script.go @@ -45,7 +45,7 @@ func ResourceSecurityPrivilegeScript() *schema.Resource { Required: true, Elem: &schema.Schema{ Type: schema.TypeString, - ValidateFunc: validation.StringInSlice([]string{"ADD", "READ", "DELETE", "RUN", "BROWSE", "EDIT"}, false), + ValidateFunc: validation.StringInSlice([]string{"ADD", "READ", "DELETE", "RUN", "BROWSE", "EDIT", "ALL"}, false), }, }, }, diff --git a/internal/services/security/resource_privilege_script_test.go b/internal/services/security/resource_privilege_script_test.go index 2bb9beb7..da0362fb 100644 --- a/internal/services/security/resource_privilege_script_test.go +++ b/internal/services/security/resource_privilege_script_test.go @@ -17,7 +17,7 @@ func TestAccResourceSecurityPrivilegeScript(t *testing.T) { privilege := security.PrivilegeScript{ Name: acctest.RandString(20), Description: acctest.RandString(20), - Actions: []security.SecurityPrivilegeScriptActions{"ADD", "READ", "DELETE", "RUN", "BROWSE", "EDIT"}, + Actions: []security.SecurityPrivilegeScriptActions{"ADD", "READ", "DELETE", "RUN", "BROWSE", "EDIT", "ALL"}, ScriptName: acctest.RandString(20), } resource.Test(t, resource.TestCase{ @@ -36,6 +36,7 @@ func TestAccResourceSecurityPrivilegeScript(t *testing.T) { resource.TestCheckResourceAttr(resName, "actions.3", string(privilege.Actions[3])), resource.TestCheckResourceAttr(resName, "actions.4", string(privilege.Actions[4])), resource.TestCheckResourceAttr(resName, "actions.5", string(privilege.Actions[5])), + resource.TestCheckResourceAttr(resName, "actions.6", string(privilege.Actions[6])), ), }, },