-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add initial module passing all tests #3
base: main
Are you sure you want to change the base?
Conversation
Signed-off-by: Melody Sofia Eroshevich <[email protected]>
Signed-off-by: Melody Sofia Eroshevich <[email protected]>
Signed-off-by: Melody Sofia Eroshevich <[email protected]>
Signed-off-by: Melody Sofia Eroshevich <[email protected]>
Signed-off-by: Melody Sofia Eroshevich <[email protected]>
…ration Signed-off-by: Melody Sofia Eroshevich <[email protected]>
Signed-off-by: Melody Sofia Eroshevich <[email protected]>
Signed-off-by: Roman Schwarz <[email protected]>
Signed-off-by: Melody Sofia Eroshevich <[email protected]>
Signed-off-by: Melody Sofia Eroshevich <[email protected]>
…m-mssql-vm Signed-off-by: Roman Schwarz <[email protected]>
Signed-off-by: Roman Schwarz <[email protected]>
Signed-off-by: Roman Schwarz <[email protected]>
Signed-off-by: Roman Schwarz <[email protected]>
Signed-off-by: Roman Schwarz <[email protected]>
Signed-off-by: Roman Schwarz <[email protected]>
Signed-off-by: Roman Schwarz <[email protected]>
Otherwise trusted launch is not possible Signed-off-by: Roman Schwarz <[email protected]>
Signed-off-by: Roman Schwarz <[email protected]>
Signed-off-by: Roman Schwarz <[email protected]>
Signed-off-by: Roman Schwarz <[email protected]>
Signed-off-by: Roman Schwarz <[email protected]>
Signed-off-by: Roman Schwarz <[email protected]>
Signed-off-by: Roman Schwarz <[email protected]>
Signed-off-by: Roman Schwarz <[email protected]>
Signed-off-by: Roman Schwarz <[email protected]>
3b13b8d
to
559ef5d
Compare
Signed-off-by: Roman Schwarz <[email protected]>
559ef5d
to
cde6cfb
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
file name is wrong
run "should_fail_on_wrong_file_path" { | ||
command = plan | ||
|
||
variables { | ||
storage_configuration = { | ||
disk_type = "NEW" | ||
storage_workload_type = "OLTP" | ||
system_db_on_data_disk_enabled = false | ||
|
||
data_settings = { | ||
luns = [0] | ||
disk_size_gb = 64 | ||
default_file_path = "D:\\data" | ||
} | ||
log_settings = { | ||
luns = [] | ||
disk_size_gb = 64 | ||
default_file_path = "G:\\log" | ||
} | ||
temp_db_settings = { | ||
luns = [] | ||
default_file_path = "H:\\tempDb" | ||
} | ||
} | ||
} | ||
|
||
expect_failures = [var.storage_configuration] | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I do not understand the testcase. The Paths seems to be valid from test parameter point of view. If the Test ist valid, please add a description to the method or the parameter what should lead to the failure.
run "should_fail_" { | ||
command = plan | ||
|
||
variables { | ||
storage_configuration = { | ||
disk_type = "NEW" | ||
storage_workload_type = "OLTP" | ||
system_db_on_data_disk_enabled = false | ||
|
||
data_settings = { | ||
luns = [] | ||
disk_size_gb = 64 | ||
default_file_path = "D:\\data" | ||
} | ||
log_settings = { | ||
luns = [1] | ||
disk_size_gb = 64 | ||
default_file_path = "G:\\log" | ||
} | ||
temp_db_settings = { | ||
luns = [] | ||
default_file_path = "H:\\tempDb" | ||
} | ||
} | ||
} | ||
|
||
expect_failures = [var.storage_configuration] | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
"should_fail_" may be a oversight. Please choose a name to describe what is tested here.
# validation { | ||
# condition = (var.enable_backup_protected_vm && var.backup_policy_id != null) || !var.enable_backup_protected_vm | ||
# error_message = "A backup policy ID is required when backup_protected_vm.enabled is true." | ||
# } |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Comments in examples are OK, when referenced in the Readme. Otherwise remove commented code.
# validation { | ||
# condition = var.computer_name == null ? length(var.name) <= 15 : true | ||
# error_message = "Windows computer name can be at most 15 characters. Variable \"computer_name\" is not set, falling back to \"name\" which is ${length(var.name)} chatacters long. Set \"computer_name\" explicitly." | ||
# } |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Comments in examples are OK, when referenced in the Readme. Otherwise remove commented code.
# validation { | ||
# condition = var.key_vault_id == null ? ( | ||
# (var.authentication_type == "Password" && var.admin_password != null) || (var.authentication_type == "SSH" && var.admin_ssh_public_key != null) | ||
# ) : ( | ||
# (var.authentication_type == "Password" && var.admin_password == null) || (var.authentication_type == "SSH" && var.admin_ssh_public_key == null) | ||
# ) | ||
# error_message = "Invalid combination of key_vault_id, admin_password, and admin_ssh_public_key. If key_vault_id is null, admin_password or admin_ssh_public_key must be non-null. If key_vault_id is not null, admin_password and admin_ssh_public_key must be null." | ||
# } |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Comments in examples are OK, when referenced in the Readme. Otherwise remove commented code.
# dynamic "key_vault_credential" { | ||
# for_each = var.enable_key_vault_credential ? [true] : [] | ||
# content { | ||
# key_vault_url = var.key_vault_credential_key_vault_url | ||
# name = var.key_vault_credential_name | ||
# service_principal_name = var.key_vault_credential_service_principal_name | ||
# service_principal_secret = var.key_vault_credential_service_principal_secret | ||
# } | ||
# } |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Comments in examples are OK, when referenced in the Readme. Otherwise remove commented code.
This PR adds a basic first module for Azure MSSQL on Virtual Machine. The aim is not to have a production-ready module, but a first v0 release.