Skip to content

Commit

Permalink
Add profile attribute to device admin authorization rule resource
Browse files Browse the repository at this point in the history
  • Loading branch information
danischm committed Dec 1, 2023
1 parent 68d38d0 commit 21a8ec6
Show file tree
Hide file tree
Showing 9 changed files with 34 additions and 0 deletions.
1 change: 1 addition & 0 deletions docs/data-sources/device_admin_authorization_rule.md
Original file line number Diff line number Diff line change
Expand Up @@ -44,6 +44,7 @@ data "ise_device_admin_authorization_rule" "example" {
- `condition_operator` (String) Equality operator
- `condition_type` (String) Indicates whether the record is the condition itself or a logical aggregation. Logical aggreation indicates that additional conditions are present under the children attribute.
- `default` (Boolean) Indicates if this rule is the default one
- `profile` (String) Device admin profiles control the initial login session of the device administrator
- `rank` (Number) The rank (priority) in relation to other rules. Lower rank is higher priority.
- `state` (String) The state that the rule is in. A disabled rule cannot be matched.

Expand Down
2 changes: 2 additions & 0 deletions docs/resources/device_admin_authorization_rule.md
Original file line number Diff line number Diff line change
Expand Up @@ -26,6 +26,7 @@ resource "ise_device_admin_authorization_rule" "example" {
condition_dictionary_name = "DEVICE"
condition_operator = "equals"
command_sets = ["DenyAllCommands"]
profile = "Default Shell Profile"
}
```

Expand All @@ -52,6 +53,7 @@ resource "ise_device_admin_authorization_rule" "example" {
- `condition_type` (String) Indicates whether the record is the condition itself or a logical aggregation. Logical aggreation indicates that additional conditions are present under the children attribute.
- Choices: `ConditionAndBlock`, `ConditionAttributes`, `ConditionOrBlock`, `ConditionReference`
- `default` (Boolean) Indicates if this rule is the default one
- `profile` (String) Device admin profiles control the initial login session of the device administrator
- `rank` (Number) The rank (priority) in relation to other rules. Lower rank is higher priority.
- `state` (String) The state that the rule is in. A disabled rule cannot be matched.
- Choices: `disabled`, `enabled`, `monitor`
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -11,4 +11,5 @@ resource "ise_device_admin_authorization_rule" "example" {
condition_dictionary_name = "DEVICE"
condition_operator = "equals"
command_sets = ["DenyAllCommands"]
profile = "Default Shell Profile"
}
4 changes: 4 additions & 0 deletions gen/definitions/device_admin_authorization_rule.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -253,6 +253,10 @@ attributes:
description: Command sets enforce the specified list of commands that can be executed by a device administrator
example: DenyAllCommands
minimum_test_value: '["DenyAllCommands"]'
- model_name: profile
type: String
description: Device admin profiles control the initial login session of the device administrator
example: Default Shell Profile

test_prerequisites: |
resource "ise_device_admin_policy_set" "test" {
Expand Down

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

14 changes: 14 additions & 0 deletions internal/provider/model_ise_device_admin_authorization_rule.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

0 comments on commit 21a8ec6

Please sign in to comment.