title | platform |
---|---|
About the azure_role_definitions Resource |
azure |
Use the azure_role_definitions
InSpec audit resource to test properties and configuration of multiple Azure role definitions.
This resource interacts with api versions supported by the resource provider.
The api_version
can be defined as a resource parameter.
If not provided, the latest version will be used.
For more information, refer to azure_generic_resource
.
Unless defined, azure_cloud
global endpoint, and default values for the http client will be used.
For more information, refer to the resource pack README.
This resource is available in the InSpec Azure resource pack.
For an example inspec.yml
file and how to set up your Azure credentials, refer to resource pack README.
An azure_role_definitions
resource block returns all role definitions within a subscription.
describe azure_role_definitions do
it { should exist }
end
- This resource does not require any parameters.
Property | Description | Filter Criteria* |
---|---|---|
ids | A list of the unique resource ids. | id |
names | A list of names of all the resources being interrogated. | name |
role_names | A list of role names of all the role definitions being interrogated. | role_name |
types | A list of role type of all the role definitions being interrogated. | type |
properties | A list of properties for all the resources being interrogated. | properties |
* For information on how to use filter criteria on plural resources refer to FilterTable usage.
describe azure_role_definitions do
its('names') { should include 'my-role' }
end
describe azure_role_definitions.where{ name.include?('my-role') } do
it { should exist }
end
describe azure_role_definitions.where{ type == "BuiltInRole" } do
it { should exist }
its('count') { should be 15 }
end
describe azure_role_definitions.where{ role_name.include?('Kubernetes') } do
it { should exist }
its('count') { should be 15 }
end
This InSpec audit resource has the following special matchers. For a full list of available matchers, please visit our Universal Matchers page.
The control will pass if the filter returns at least one result. Use should_not
if you expect zero matches.
describe azure_role_definitions do
it { should exist }
end
Your Service Principal must be setup with a contributor
role on the subscription you wish to test.