summaryrefslogtreecommitdiffstats
path: root/ansible_collections/cyberark/pas/tests
diff options
context:
space:
mode:
Diffstat (limited to 'ansible_collections/cyberark/pas/tests')
-rw-r--r--ansible_collections/cyberark/pas/tests/change_test.yml37
-rw-r--r--ansible_collections/cyberark/pas/tests/changepolicy.yml41
-rw-r--r--ansible_collections/cyberark/pas/tests/deprovision_account.yml42
-rw-r--r--ansible_collections/cyberark/pas/tests/deprovision_user.yml39
-rw-r--r--ansible_collections/cyberark/pas/tests/disable_user.yml31
-rw-r--r--ansible_collections/cyberark/pas/tests/enable_user.yml32
-rw-r--r--ansible_collections/cyberark/pas/tests/provision_account.yml41
-rw-r--r--ansible_collections/cyberark/pas/tests/provision_user.yml37
-rw-r--r--ansible_collections/cyberark/pas/tests/reset_user_password.yml33
-rw-r--r--ansible_collections/cyberark/pas/tests/test.yml65
10 files changed, 398 insertions, 0 deletions
diff --git a/ansible_collections/cyberark/pas/tests/change_test.yml b/ansible_collections/cyberark/pas/tests/change_test.yml
new file mode 100644
index 000000000..8fc9e4abf
--- /dev/null
+++ b/ansible_collections/cyberark/pas/tests/change_test.yml
@@ -0,0 +1,37 @@
+---
+- hosts: localhost
+
+ collections:
+ - cyberark.pas
+
+ tasks:
+
+ - name: Logon to CyberArk Vault using PAS Web Services SDK
+ cyberark_authentication:
+ api_base_url: "http://components.cyberark.local"
+ validate_certs: false
+ username: "bizdev"
+ password: "Cyberark1"
+
+ - name: Rotate credential via reconcile and providing the password to be changed to
+ cyberark_account:
+ identified_by: "address,username"
+ safe: "Test"
+ address: "prod.cyberark.local"
+ username: "admin"
+ platform_id: WinDomain
+ platform_account_properties:
+ ReconcileAccount: "Operating System-WinServerLocal-cyberark.local-administrator-x"
+ LogonDomain: "PROD"
+ secret_management:
+# new_secret: "Ama123ah12@#!Xaamdjbdkl@#112"
+# management_action: "reconcile"
+ automatic_management_enabled: true
+ state: present
+ cyberark_session: "{{ cyberark_session }}"
+ register: reconcileaccount
+
+ - name: Logoff from CyberArk Vault
+ cyberark_authentication:
+ state: absent
+ cyberark_session: "{{ cyberark_session }}" \ No newline at end of file
diff --git a/ansible_collections/cyberark/pas/tests/changepolicy.yml b/ansible_collections/cyberark/pas/tests/changepolicy.yml
new file mode 100644
index 000000000..7ec9045f4
--- /dev/null
+++ b/ansible_collections/cyberark/pas/tests/changepolicy.yml
@@ -0,0 +1,41 @@
+---
+- hosts: localhost
+
+ collections:
+ - cyberark.pas
+
+ tasks:
+
+ - name: Logon to CyberArk Vault using PAS Web Services SDK
+ cyberark_authentication:
+ api_base_url: "http://components.cyberark.local"
+ validate_certs: false
+ username: "bizdev"
+ password: "Cyberark1"
+
+
+ - name: Debug message
+ debug:
+ var: cyberark_session
+
+ - name: Account
+ cyberark_account:
+ identified_by: "address,username"
+ safe: "Test"
+ address: "cyberark.local"
+ username: "cyberark-administrator"
+ platform_id: WinDomain-Level2
+ cyberark_session: "{{ cyberark_session }}"
+ register: cyberarkaction
+
+ - name: Debug message
+ debug:
+ var: cyberarkaction
+
+ - name: Logoff from CyberArk Vault
+ cyberark_authentication:
+ state: absent
+ cyberark_session: "{{ cyberark_session }}"
+
+ - name: Debug message
+ debug: var=cyberark_session
diff --git a/ansible_collections/cyberark/pas/tests/deprovision_account.yml b/ansible_collections/cyberark/pas/tests/deprovision_account.yml
new file mode 100644
index 000000000..6e5bb50d3
--- /dev/null
+++ b/ansible_collections/cyberark/pas/tests/deprovision_account.yml
@@ -0,0 +1,42 @@
+---
+- hosts: localhost
+
+ collections:
+ - cyberark.pas
+
+ tasks:
+
+ - name: Logon to CyberArk Vault using PAS Web Services SDK
+ cyberark_authentication:
+ api_base_url: "http://components.cyberark.local"
+ validate_certs: false
+ username: "bizdev"
+ password: "Cyberark1"
+
+
+ - name: Debug message
+ debug:
+ var: cyberark_session
+
+ - name: Account
+ cyberark_account:
+ logging_level: DEBUG
+ identified_by: "address,username"
+ safe: "Test"
+ address: "cyberark.local"
+ username: "cyberark-administrator"
+ state: absent
+ cyberark_session: "{{ cyberark_session }}"
+ register: cyberarkaction
+
+ - name: Debug message
+ debug:
+ var: cyberarkaction
+
+ - name: Logoff from CyberArk Vault
+ cyberark_authentication:
+ state: absent
+ cyberark_session: "{{ cyberark_session }}"
+
+ - name: Debug message
+ debug: var=cyberark_session
diff --git a/ansible_collections/cyberark/pas/tests/deprovision_user.yml b/ansible_collections/cyberark/pas/tests/deprovision_user.yml
new file mode 100644
index 000000000..76e76cba4
--- /dev/null
+++ b/ansible_collections/cyberark/pas/tests/deprovision_user.yml
@@ -0,0 +1,39 @@
+---
+- hosts: localhost
+
+ collections:
+ - cyberark.pas
+
+ tasks:
+
+ - name: Logon to CyberArk Vault using PAS Web Services SDK
+ cyberark_authentication:
+ api_base_url: "http://components.cyberark.local"
+ validate_certs: false
+ username: "bizdev"
+ password: "Cyberark1"
+
+
+ - name: Debug message
+ debug:
+ var: cyberark_session
+
+ - name: Removing a CyberArk User
+ cyberark_user:
+ username: "ansibleuser"
+ state: absent
+ cyberark_session: "{{ cyberark_session }}"
+ register: cyberarkaction
+
+ - name: Debug message
+ debug:
+ var: cyberarkaction
+
+
+ - name: Logoff from CyberArk Vault
+ cyberark_authentication:
+ state: absent
+ cyberark_session: "{{ cyberark_session }}"
+
+ - name: Debug message
+ debug: var=cyberark_session
diff --git a/ansible_collections/cyberark/pas/tests/disable_user.yml b/ansible_collections/cyberark/pas/tests/disable_user.yml
new file mode 100644
index 000000000..cad8d3018
--- /dev/null
+++ b/ansible_collections/cyberark/pas/tests/disable_user.yml
@@ -0,0 +1,31 @@
+---
+- hosts: localhost
+
+ collections:
+ - cyberark.pas
+
+ tasks:
+
+ - name: Logon to CyberArk Vault using PAS Web Services SDK
+ cyberark_authentication:
+ api_base_url: "http://components.cyberark.local"
+ validate_certs: false
+ username: "bizdev"
+ password: "Cyberark1"
+
+ - name: Disabling a CyberArk User
+ cyberark_user:
+ username: "ansibleuser"
+ disabled: true
+ cyberark_session: "{{ cyberark_session }}"
+ register: cyberarkaction
+
+ - name: Debug message
+ debug:
+ var: cyberarkaction
+
+
+ - name: Logoff from CyberArk Vault
+ cyberark_authentication:
+ state: absent
+ cyberark_session: "{{ cyberark_session }}"
diff --git a/ansible_collections/cyberark/pas/tests/enable_user.yml b/ansible_collections/cyberark/pas/tests/enable_user.yml
new file mode 100644
index 000000000..5b6c5a273
--- /dev/null
+++ b/ansible_collections/cyberark/pas/tests/enable_user.yml
@@ -0,0 +1,32 @@
+---
+- hosts: localhost
+
+ collections:
+ - cyberark.pas
+
+ tasks:
+
+ - name: Logon to CyberArk Vault using PAS Web Services SDK
+ cyberark_authentication:
+ api_base_url: "http://components.cyberark.local"
+ validate_certs: false
+ username: "bizdev"
+ password: "Cyberark1"
+
+ - name: Enabling a CyberArk User and forcing a password change at next logon
+ cyberark_user:
+ username: "ansibleuser"
+ disabled: false
+ state: present
+ change_password_on_the_next_logon: true
+ cyberark_session: "{{ cyberark_session }}"
+ register: cyberarkaction
+
+ - name: Debug message
+ debug:
+ var: cyberarkaction
+
+ - name: Logoff from CyberArk Vault
+ cyberark_authentication:
+ state: absent
+ cyberark_session: "{{ cyberark_session }}"
diff --git a/ansible_collections/cyberark/pas/tests/provision_account.yml b/ansible_collections/cyberark/pas/tests/provision_account.yml
new file mode 100644
index 000000000..753ae228b
--- /dev/null
+++ b/ansible_collections/cyberark/pas/tests/provision_account.yml
@@ -0,0 +1,41 @@
+---
+- hosts: localhost
+
+ collections:
+ - cyberark.pas
+
+ tasks:
+
+ - name: Logon to CyberArk Vault using PAS Web Services SDK
+ cyberark_authentication:
+ api_base_url: "http://components.cyberark.local"
+ validate_certs: false
+ username: "bizdev"
+ password: "Cyberark1"
+
+ - name: Account
+ cyberark_account:
+ identified_by: "address,username"
+ safe: "Test"
+ address: "cyberark.local"
+ username: "cyberark-administrator"
+ platform_id: WinDomain-Level2
+ secret: "CyberarkFirst"
+ platform_account_properties:
+ LogonDomain: "RedHatAnsible"
+ OwnerName: "James Stutes"
+ Port: 8080
+ secret_management:
+ automatic_management_enabled: true
+ state: present
+ cyberark_session: "{{ cyberark_session }}"
+ register: cyberarkaction
+
+ - name: Debug message
+ debug:
+ var: cyberarkaction
+
+ - name: Logoff from CyberArk Vault
+ cyberark_authentication:
+ state: absent
+ cyberark_session: "{{ cyberark_session }}"
diff --git a/ansible_collections/cyberark/pas/tests/provision_user.yml b/ansible_collections/cyberark/pas/tests/provision_user.yml
new file mode 100644
index 000000000..e7bbbb790
--- /dev/null
+++ b/ansible_collections/cyberark/pas/tests/provision_user.yml
@@ -0,0 +1,37 @@
+---
+- hosts: localhost
+
+ collections:
+ - cyberark.pas
+
+ tasks:
+
+ - name: Logon to CyberArk Vault using PAS Web Services SDK
+ cyberark_authentication:
+ api_base_url: "http://components.cyberark.local"
+ validate_certs: false
+ username: "bizdev"
+ password: "Cyberark1"
+
+ - name: Creating a CyberArk User, setting a simple password but forcing a password change at next logon
+ cyberark_user:
+ username: "ansibleuser"
+ first_name: "Ansible"
+ last_name: "User"
+ email: "ansibleuser@demo.com"
+ initial_password: "Cyberark1"
+ user_type_name: "EPVUser"
+ group_name: "AnsibleAdmins"
+ disabled: false
+ state: present
+ cyberark_session: "{{ cyberark_session }}"
+ register: cyberarkaction
+
+ - name: Debug message
+ debug:
+ var: cyberarkaction
+
+ - name: Logoff from CyberArk Vault
+ cyberark_authentication:
+ state: absent
+ cyberark_session: "{{ cyberark_session }}"
diff --git a/ansible_collections/cyberark/pas/tests/reset_user_password.yml b/ansible_collections/cyberark/pas/tests/reset_user_password.yml
new file mode 100644
index 000000000..d25a04cdc
--- /dev/null
+++ b/ansible_collections/cyberark/pas/tests/reset_user_password.yml
@@ -0,0 +1,33 @@
+---
+- hosts: localhost
+
+ collections:
+ - cyberark.pas
+
+ tasks:
+
+ - name: Logon to CyberArk Vault using PAS Web Services SDK
+ cyberark_authentication:
+ api_base_url: "http://components.cyberark.local"
+ validate_certs: false
+ username: "bizdev"
+ password: "Cyberark1"
+
+ - name: Enabling a CyberArk User and forcing a password change at next logon
+ cyberark_user:
+ username: "ansibleuser"
+ disabled: false
+ new_password: Cyberark1
+ state: present
+ change_password_on_the_next_logon: true
+ cyberark_session: "{{ cyberark_session }}"
+ register: cyberarkaction
+
+ - name: Debug message
+ debug:
+ var: cyberarkaction
+
+ - name: Logoff from CyberArk Vault
+ cyberark_authentication:
+ state: absent
+ cyberark_session: "{{ cyberark_session }}"
diff --git a/ansible_collections/cyberark/pas/tests/test.yml b/ansible_collections/cyberark/pas/tests/test.yml
new file mode 100644
index 000000000..7c0834434
--- /dev/null
+++ b/ansible_collections/cyberark/pas/tests/test.yml
@@ -0,0 +1,65 @@
+---
+- hosts: localhost
+
+ collections:
+ - cyberark.pas
+
+ tasks:
+
+ - name: Logon to CyberArk Vault using PAS Web Services SDK
+ cyberark_authentication:
+ api_base_url: "http://components.cyberark.local"
+ validate_certs: false
+ username: "bizdev"
+ password: "Cyberark1"
+
+
+ - name: Debug message
+ debug:
+ var: cyberark_session
+
+ - name: User
+ cyberark_user:
+ username: "testuser"
+ initial_password: "Cyberark1"
+ user_type_name: "EPVUser"
+ change_password_on_the_next_logon: false
+ group_name: "Auditors"
+ disabled: false
+ state: present
+ cyberark_session: "{{ cyberark_session }}"
+ register: cyberarkaction
+
+ - name: Debug message
+ debug:
+ var: cyberarkaction
+
+ - name: Account
+ cyberark_account:
+# logging_level: DEBUG
+ identified_by: "address,username"
+ name: "EDWARD_ACCOUNT"
+ safe: "Test"
+ address: "10.0.1.20"
+ username: "james_test"
+ platform_id: WinServerLocal
+ platform_account_properties:
+ LogonDomain: "10.0.1.20"
+ secret_management:
+ automatic_management_enabled: false
+ manual_management_reason: "No Reason"
+ state: present
+ cyberark_session: "{{ cyberark_session }}"
+ register: cyberarkaction
+
+ - name: Debug message
+ debug:
+ var: cyberarkaction
+
+ - name: Logoff from CyberArk Vault
+ cyberark_authentication:
+ state: absent
+ cyberark_session: "{{ cyberark_session }}"
+
+ - name: Debug message
+ debug: var=cyberark_session