Skip to content

Latest commit

 

History

History
125 lines (85 loc) · 4.67 KB

azurerm_event_hub_authorization_rule.md

File metadata and controls

125 lines (85 loc) · 4.67 KB
title platform
About the azurerm_event_hub_authorization_rule Resource
azure

WARNING This resource will be deprecated in InSpec Azure Resource Pack version 2. Please start using fully backward compatible azure_event_hub_authorization_rule InSpec audit resource.

azurerm_event_hub_authorization_rule

Use the azurerm_event_hub_authorization_rule InSpec audit resource to test properties and configuration of an Azure Event Hub Authorization Rule within a Resource Group.

Azure REST API version

This resource interacts with version 2017-04-01 of the Azure Management API. For more information see the Official Azure Documentation.

At the moment, there doesn't appear to be a way to select the version of the Azure API docs. If you notice a newer version being referenced in the official documentation please open an issue or submit a pull request using the updated version.

Availability

Installation

This resource is available in the inspec-azure resource pack. To use it, add the following to your inspec.yml in your top-level profile:

depends:
  inspec-azure:
    git: https://github.com/inspec/inspec-azure.git

You'll also need to setup your Azure credentials; see the resource pack README.

Version

This resource first became available in 1.11.0 of the inspec-azure resource pack.

Syntax

The resource_group, namespace_name, event_hub_endpoint and authorization_rule must be given as a parameter.

describe azurerm_event_hub_authorization_rule(resource_group: 'my-rg', namespace_name: 'my-event-hub-ns', event_hub_endpoint: 'myeventhub', authorization_rule: 'my-auth-rule') do
  it { should exist }
end

Examples

If an Event Hub Authorization Rule is referenced with a valid Resource Group, Namespace Name, Event Hub Name and Authorization Rule Name

describe azurerm_event_hub_authorization_rule(resource_group: 'my-rg', namespace_name: 'my-event-hub-ns', event_hub_endpoint: 'myeventhub', authorization_rule: 'my-auth-rule') do
  it { should exist }
end

If a Event Hub Authorization Rule is referenced with an invalid Resource Group, Namespace Name, Event Hub Name or Authorization Rule Name

describe azurerm_event_hub_namespace(resource_group: 'invalid-rg', namespace_name: 'i-dont-exist', event_hub_endpoint: 'fakeendpoint', authorization_rule: 'fake-auth-rule') do
  it { should_not exist }
end

Parameters

  • resource_group - The resource Group to which the Event Hub Namespace belongs.
  • namespace_name - The unique name of the Event Hub Namespace.
  • event_hub_name - The unique name of the Event Hub Name.
  • authorization_rule_name - The unique name of the Event Hub Authorization Rule.

Attributes

  • id
  • name
  • properties.rights
  • type

id

Azure resource ID.

name

Event Hub Authorization Rule name, e.g. my-auth-rule.

properties

A collection of additional configuration properties related to the Event Hub Authorization Rule, eg. rights

type

The type of Resource, typically Microsoft.EventHub/Namespaces/EventHubs/AuthorizationRules.

Other Attributes

There are additional attributes that may be accessed that we have not documented. Please take a look at the Azure documentation. Any attribute in the response may be accessed with the key names separated by dots (.).

The API may not always return keys that do not have any associated data. There may be cases where the deeply nested property may not have the desired attribute along your call chain. If you find yourself writing tests against properties that may be nil, fork this resource pack and add an accessor to the resource. Within that accessor you'll be able to guard against nil keys. Pull requests are always welcome.

Matchers

This InSpec audit resource has the following special matchers. For a full list of available matchers, please visit our Universal Matchers page.

exists

describe azurerm_event_hub_authorization_rule(resource_group: 'my-rg', namespace_name 'my-event-hub-ns', event_hub_name: 'myeventhub', authorization_rule_name: 'my-auth-rule') do
  it { should exist }
end

Azure Permissions

Your Service Principal must be setup with a contributor role on the subscription you wish to test.