summaryrefslogtreecommitdiff
path: root/test/integration/targets/win_audit_rule
diff options
context:
space:
mode:
Diffstat (limited to 'test/integration/targets/win_audit_rule')
-rw-r--r--test/integration/targets/win_audit_rule/aliases1
-rw-r--r--test/integration/targets/win_audit_rule/defaults/main.yml7
-rw-r--r--test/integration/targets/win_audit_rule/library/test_get_audit_rule.ps198
-rw-r--r--test/integration/targets/win_audit_rule/tasks/add.yml172
-rw-r--r--test/integration/targets/win_audit_rule/tasks/main.yml33
-rw-r--r--test/integration/targets/win_audit_rule/tasks/modify.yml172
-rw-r--r--test/integration/targets/win_audit_rule/tasks/remove.yml151
7 files changed, 0 insertions, 634 deletions
diff --git a/test/integration/targets/win_audit_rule/aliases b/test/integration/targets/win_audit_rule/aliases
deleted file mode 100644
index 3cf5b97e80..0000000000
--- a/test/integration/targets/win_audit_rule/aliases
+++ /dev/null
@@ -1 +0,0 @@
-shippable/windows/group3
diff --git a/test/integration/targets/win_audit_rule/defaults/main.yml b/test/integration/targets/win_audit_rule/defaults/main.yml
deleted file mode 100644
index f0faa9a56c..0000000000
--- a/test/integration/targets/win_audit_rule/defaults/main.yml
+++ /dev/null
@@ -1,7 +0,0 @@
-test_audit_rule_folder: c:\windows\temp\{{ 'ansible test win_audit_policy' | to_uuid }}
-test_audit_rule_file: c:\windows\temp\{{ 'ansible test win_audit_policy' | to_uuid }}.txt
-test_audit_rule_registry: HKCU:\{{ 'ansible test win_audit_policy' | to_uuid }}
-test_audit_rule_rights: 'delete'
-test_audit_rule_new_rights: 'delete,changepermissions'
-test_audit_rule_user: 'everyone'
-test_audit_rule_audit_flags: success
diff --git a/test/integration/targets/win_audit_rule/library/test_get_audit_rule.ps1 b/test/integration/targets/win_audit_rule/library/test_get_audit_rule.ps1
deleted file mode 100644
index a2a5105f89..0000000000
--- a/test/integration/targets/win_audit_rule/library/test_get_audit_rule.ps1
+++ /dev/null
@@ -1,98 +0,0 @@
-#!powershell
-
-# Copyright (c) 2017 Ansible Project
-# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-#Requires -Module Ansible.ModuleUtils.Legacy
-#Requires -Module Ansible.ModuleUtils.SID
-
-$params = Parse-Args -arguments $args -supports_check_mode $true
-
-# these are your module parameters
-$path = Get-AnsibleParam -obj $params -name "path" -type "path" -failifempty $true -aliases "destination","dest"
-$user = Get-AnsibleParam -obj $params -name "user" -type "str" -failifempty $true
-$rights = Get-AnsibleParam -obj $params -name "rights" -type "list"
-$inheritance_flags = Get-AnsibleParam -obj $params -name "inheritance_flags" -type "list" -default 'ContainerInherit','ObjectInherit' # -validateset 'None','ContainerInherit','ObjectInherit'
-$propagation_flags = Get-AnsibleParam -obj $params -name "propagation_flags" -type "str" -default "none" -ValidateSet 'InheritOnly','None','NoPropagateInherit'
-$audit_flags = Get-AnsibleParam -obj $params -name "audit_flags" -type "list" -default "success" #-ValidateSet 'Success','Failure'
-#$state = Get-AnsibleParam -obj $params -name "state" -type "str" -default "present" -validateset 'present','absent'
-
-
-If (! (Test-Path $path) )
-{
- Fail-Json $result "Path not found ($path)"
-}
-
-Function Get-CurrentAuditRules ($path) {
- $ACL = Get-Acl -Path $path -Audit
-
- $HT = Foreach ($Obj in $ACL.Audit)
- {
- @{
- user = $Obj.IdentityReference.ToString()
- rights = ($Obj | Select-Object -expand "*rights").ToString()
- audit_flags = $Obj.AuditFlags.ToString()
- is_inherited = $Obj.InheritanceFlags.ToString()
- inheritance_flags = $Obj.IsInherited.ToString()
- propagation_flags = $Obj.PropagationFlags.ToString()
- }
- }
-
- If (-Not $HT)
- {
- "No audit rules defined on $path"
- }
- Else {$HT}
-}
-
-
-$result = @{
- changed = $false
- matching_rule_found = $false
- current_audit_rules = Get-CurrentAuditRules $path
-}
-
-$ACL = Get-ACL $Path -Audit
-$SID = Convert-ToSid $user
-
-$ItemType = (Get-Item $path).GetType()
-switch ($ItemType)
-{
- ([Microsoft.Win32.RegistryKey]) {
- $rights = [System.Security.AccessControl.RegistryRights]$rights
- $result.path_type = 'registry'
- }
- ([System.IO.FileInfo]) {
- $rights = [System.Security.AccessControl.FileSystemRights]$rights
- $result.path_type = 'file'
- }
- ([System.IO.DirectoryInfo]) {
- $rights = [System.Security.AccessControl.FileSystemRights]$rights
- $result.path_type = 'directory'
- }
-}
-
-$flags = [System.Security.AccessControl.AuditFlags]$audit_flags
-$inherit = [System.Security.AccessControl.InheritanceFlags]$inheritance_flags
-$prop = [System.Security.AccessControl.PropagationFlags]$propagation_flags
-
-Foreach ($group in $ACL.Audit)
-{
- #exit here if any existing rule matches defined rule, otherwise exit below
- #with no matches
- If (
- ($group | Select-Object -expand "*Rights") -eq $rights -and
- $group.AuditFlags -eq $flags -and
- $group.IdentityReference.Translate([System.Security.Principal.SecurityIdentifier]) -eq $SID -and
- $group.InheritanceFlags -eq $inherit -and
- $group.PropagationFlags -eq $prop
- )
- {
- $result.matching_rule_found = $true
- $result.current_audit_rules = Get-CurrentAuditRules $path
- Exit-Json $result
- }
-}
-
-$result.current_audit_rules = Get-CurrentAuditRules $path
-Exit-Json $result
diff --git a/test/integration/targets/win_audit_rule/tasks/add.yml b/test/integration/targets/win_audit_rule/tasks/add.yml
deleted file mode 100644
index 2a059a88c9..0000000000
--- a/test/integration/targets/win_audit_rule/tasks/add.yml
+++ /dev/null
@@ -1,172 +0,0 @@
-######################
-### check mode add ###
-######################
-- name: check mode ADD audit policy directory
- win_audit_rule:
- path: "{{ test_audit_rule_folder }}"
- user: "{{ test_audit_rule_user }}"
- rights: "{{ test_audit_rule_rights }}"
- state: present
- audit_flags: "{{ test_audit_rule_audit_flags }}"
- register: directory
- check_mode: yes
-
-- name: check mode ADD audit policy file
- win_audit_rule:
- path: "{{ test_audit_rule_file }}"
- user: "{{ test_audit_rule_user }}"
- rights: "{{ test_audit_rule_rights }}"
- state: present
- audit_flags: "{{ test_audit_rule_audit_flags }}"
- inheritance_flags: none
- register: file
- check_mode: yes
-
-- name: check mode ADD audit policy registry
- win_audit_rule:
- path: "{{ test_audit_rule_registry }}"
- user: "{{ test_audit_rule_user }}"
- rights: "{{ test_audit_rule_rights }}"
- state: present
- audit_flags: "{{ test_audit_rule_audit_flags }}"
- register: registry
- check_mode: yes
-
-- name: check mode ADD get directory results
- test_get_audit_rule:
- path: "{{ test_audit_rule_folder }}"
- user: "{{ test_audit_rule_user }}"
- rights: "{{ test_audit_rule_rights }}"
- audit_flags: "{{ test_audit_rule_audit_flags }}"
- register: directory_results
-
-- name: check mode ADD get file results
- test_get_audit_rule:
- path: "{{ test_audit_rule_file }}"
- user: "{{ test_audit_rule_user }}"
- rights: "{{ test_audit_rule_rights }}"
- audit_flags: "{{ test_audit_rule_audit_flags }}"
- inheritance_flags: none
- register: file_results
-
-- name: check mode ADD get REGISTRY results
- test_get_audit_rule:
- path: "{{ test_audit_rule_registry }}"
- user: "{{ test_audit_rule_user }}"
- rights: "{{ test_audit_rule_rights }}"
- audit_flags: "{{ test_audit_rule_audit_flags }}"
- register: registry_results
-
-- name: check mode ADD assert that a change is needed, but no change occurred to the audit rules
- assert:
- that:
- - directory is changed
- - file is changed
- - registry is changed
- - not directory_results.matching_rule_found and directory_results.path_type == 'directory'
- - not file_results.matching_rule_found and file_results.path_type == 'file'
- - not registry_results.matching_rule_found and registry_results.path_type == 'registry'
-
-##################
-### add a rule ###
-##################
-- name: ADD audit policy directory
- win_audit_rule:
- path: "{{ test_audit_rule_folder }}"
- user: "{{ test_audit_rule_user }}"
- rights: "{{ test_audit_rule_rights }}"
- state: present
- audit_flags: "{{ test_audit_rule_audit_flags }}"
- register: directory
-
-- name: ADD audit policy file
- win_audit_rule:
- path: "{{ test_audit_rule_file }}"
- user: "{{ test_audit_rule_user }}"
- rights: "{{ test_audit_rule_rights }}"
- state: present
- audit_flags: "{{ test_audit_rule_audit_flags }}"
- inheritance_flags: none
- register: file
-
-- name: ADD audit policy registry
- win_audit_rule:
- path: "{{ test_audit_rule_registry }}"
- user: "{{ test_audit_rule_user }}"
- rights: "{{ test_audit_rule_rights }}"
- state: present
- audit_flags: "{{ test_audit_rule_audit_flags }}"
- register: registry
-
-- name: ADD get directory results
- test_get_audit_rule:
- path: "{{ test_audit_rule_folder }}"
- user: "{{ test_audit_rule_user }}"
- rights: "{{ test_audit_rule_rights }}"
- audit_flags: "{{ test_audit_rule_audit_flags }}"
- register: directory_results
-
-- name: ADD get file results
- test_get_audit_rule:
- path: "{{ test_audit_rule_file }}"
- user: "{{ test_audit_rule_user }}"
- rights: "{{ test_audit_rule_rights }}"
- audit_flags: "{{ test_audit_rule_audit_flags }}"
- inheritance_flags: none
- register: file_results
-
-- name: ADD get REGISTRY results
- test_get_audit_rule:
- path: "{{ test_audit_rule_registry }}"
- user: "{{ test_audit_rule_user }}"
- rights: "{{ test_audit_rule_rights }}"
- audit_flags: "{{ test_audit_rule_audit_flags }}"
- register: registry_results
-
-- name: ADD assert that the rules were added and a change is detected
- assert:
- that:
- - directory is changed
- - file is changed
- - registry is changed
- - directory_results.matching_rule_found and directory_results.path_type == 'directory'
- - file_results.matching_rule_found and file_results.path_type == 'file'
- - registry_results.matching_rule_found and registry_results.path_type == 'registry'
-
-#############################
-### idempotent add a rule ###
-#############################
-- name: idempotent ADD audit policy directory
- win_audit_rule:
- path: "{{ test_audit_rule_folder }}"
- user: "{{ test_audit_rule_user }}"
- rights: "{{ test_audit_rule_rights }}"
- state: present
- audit_flags: "{{ test_audit_rule_audit_flags }}"
- register: directory
-
-- name: idempotent ADD audit policy file
- win_audit_rule:
- path: "{{ test_audit_rule_file }}"
- user: "{{ test_audit_rule_user }}"
- rights: "{{ test_audit_rule_rights }}"
- state: present
- audit_flags: "{{ test_audit_rule_audit_flags }}"
- inheritance_flags: none
- register: file
-
-- name: idempotent ADD audit policy registry idempotent
- win_audit_rule:
- path: "{{ test_audit_rule_registry }}"
- user: "{{ test_audit_rule_user }}"
- rights: "{{ test_audit_rule_rights }}"
- state: present
- audit_flags: "{{ test_audit_rule_audit_flags }}"
- register: registry
-
-- name: idempotent ADD assert that a change did not occur
- assert:
- that:
- - directory is not changed and directory.path_type == 'directory'
- - file is not changed and file.path_type == 'file'
- - registry is not changed and registry.path_type == 'registry'
diff --git a/test/integration/targets/win_audit_rule/tasks/main.yml b/test/integration/targets/win_audit_rule/tasks/main.yml
deleted file mode 100644
index 68fbca768a..0000000000
--- a/test/integration/targets/win_audit_rule/tasks/main.yml
+++ /dev/null
@@ -1,33 +0,0 @@
-- name: create temporary folder to test with
- win_file:
- path: "{{ test_audit_rule_folder }}"
- state: directory
-
-- name: create temporary file to test with
- win_file:
- path: "{{ test_audit_rule_file }}"
- state: touch
-
-- name: create temporary registry key to test with
- win_regedit:
- path: "{{ test_audit_rule_registry }}"
-
-- block:
- - include_tasks: add.yml
- - include_tasks: modify.yml
- - include_tasks: remove.yml
- always:
- - name: remove testing folder
- win_file:
- path: "{{ test_audit_rule_folder }}"
- state: absent
-
- - name: remove testing file
- win_file:
- path: "{{ test_audit_rule_file }}"
- state: absent
-
- - name: remove registry key
- win_regedit:
- path: "{{ test_audit_rule_registry }}"
- state: absent
diff --git a/test/integration/targets/win_audit_rule/tasks/modify.yml b/test/integration/targets/win_audit_rule/tasks/modify.yml
deleted file mode 100644
index 1db07e2b4a..0000000000
--- a/test/integration/targets/win_audit_rule/tasks/modify.yml
+++ /dev/null
@@ -1,172 +0,0 @@
-#########################
-### modify check mode ###
-#########################
-- name: check mode modify audit policy directory
- win_audit_rule:
- path: "{{ test_audit_rule_folder }}"
- user: "{{ test_audit_rule_user }}"
- rights: "{{ test_audit_rule_new_rights }}"
- state: present
- audit_flags: "{{ test_audit_rule_audit_flags }}"
- register: directory
- check_mode: yes
-
-- name: check mode modify audit policy file
- win_audit_rule:
- path: "{{ test_audit_rule_file }}"
- user: "{{ test_audit_rule_user }}"
- rights: "{{ test_audit_rule_new_rights }}"
- state: present
- audit_flags: "{{ test_audit_rule_audit_flags }}"
- inheritance_flags: none
- register: file
- check_mode: yes
-
-- name: check mode modify audit policy registry
- win_audit_rule:
- path: "{{ test_audit_rule_registry }}"
- user: "{{ test_audit_rule_user }}"
- rights: "{{ test_audit_rule_new_rights }}"
- state: present
- audit_flags: "{{ test_audit_rule_audit_flags }}"
- register: registry
- check_mode: yes
-
-- name: check mode modify get directory rule results
- test_get_audit_rule:
- path: "{{ test_audit_rule_folder }}"
- user: "{{ test_audit_rule_user }}"
- rights: "{{ test_audit_rule_new_rights }}"
- audit_flags: "{{ test_audit_rule_audit_flags }}"
- register: directory_results
-
-- name: check mode modify get file rule results
- test_get_audit_rule:
- path: "{{ test_audit_rule_file }}"
- user: "{{ test_audit_rule_user }}"
- rights: "{{ test_audit_rule_new_rights }}"
- audit_flags: "{{ test_audit_rule_audit_flags }}"
- inheritance_flags: none
- register: file_results
-
-- name: check mode modify get REGISTRY rule results
- test_get_audit_rule:
- path: "{{ test_audit_rule_registry }}"
- user: "{{ test_audit_rule_user }}"
- rights: "{{ test_audit_rule_new_rights }}"
- audit_flags: "{{ test_audit_rule_audit_flags }}"
- register: registry_results
-
-- name: check mode modify assert that change is needed but rights still equal the original rights and not test_audit_rule_new_rights
- assert:
- that:
- - directory is changed
- - file is changed
- - registry is changed
- - not directory_results.matching_rule_found and directory_results.path_type == 'directory'
- - not file_results.matching_rule_found and file_results.path_type == 'file'
- - not registry_results.matching_rule_found and registry_results.path_type == 'registry'
-
-##############
-### modify ###
-##############
-- name: modify audit policy directory
- win_audit_rule:
- path: "{{ test_audit_rule_folder }}"
- user: "{{ test_audit_rule_user }}"
- rights: "{{ test_audit_rule_new_rights }}"
- state: present
- audit_flags: "{{ test_audit_rule_audit_flags }}"
- register: directory
-
-- name: modify audit policy file
- win_audit_rule:
- path: "{{ test_audit_rule_file }}"
- user: "{{ test_audit_rule_user }}"
- rights: "{{ test_audit_rule_new_rights }}"
- state: present
- audit_flags: "{{ test_audit_rule_audit_flags }}"
- inheritance_flags: none
- register: file
-
-- name: modify audit policy registry
- win_audit_rule:
- path: "{{ test_audit_rule_registry }}"
- user: "{{ test_audit_rule_user }}"
- rights: "{{ test_audit_rule_new_rights }}"
- state: present
- audit_flags: "{{ test_audit_rule_audit_flags }}"
- register: registry
-
-- name: modify get directory rule results
- test_get_audit_rule:
- path: "{{ test_audit_rule_folder }}"
- user: "{{ test_audit_rule_user }}"
- rights: "{{ test_audit_rule_new_rights }}"
- audit_flags: "{{ test_audit_rule_audit_flags }}"
- register: directory_results
-
-- name: modify get file rule results
- test_get_audit_rule:
- path: "{{ test_audit_rule_file }}"
- user: "{{ test_audit_rule_user }}"
- rights: "{{ test_audit_rule_new_rights }}"
- audit_flags: "{{ test_audit_rule_audit_flags }}"
- inheritance_flags: none
- register: file_results
-
-- name: modify get REGISTRY rule results
- test_get_audit_rule:
- path: "{{ test_audit_rule_registry }}"
- user: "{{ test_audit_rule_user }}"
- rights: "{{ test_audit_rule_new_rights }}"
- audit_flags: "{{ test_audit_rule_audit_flags }}"
- register: registry_results
-
-- name: modify assert that the rules were modified and a change is detected
- assert:
- that:
- - directory is changed
- - file is changed
- - registry is changed
- - directory_results.matching_rule_found and directory_results.path_type == 'directory'
- - file_results.matching_rule_found and file_results.path_type == 'file'
- - registry_results.matching_rule_found and registry_results.path_type == 'registry'
-
-#####################################
-### idempotent test modify a rule ###
-#####################################
-- name: idempotent modify audit policy directory
- win_audit_rule:
- path: "{{ test_audit_rule_folder }}"
- user: "{{ test_audit_rule_user }}"
- rights: "{{ test_audit_rule_new_rights }}"
- state: present
- audit_flags: "{{ test_audit_rule_audit_flags }}"
- register: directory
-
-- name: idempotent modify audit policy file
- win_audit_rule:
- path: "{{ test_audit_rule_file }}"
- user: "{{ test_audit_rule_user }}"
- rights: "{{ test_audit_rule_new_rights }}"
- state: present
- audit_flags: "{{ test_audit_rule_audit_flags }}"
- inheritance_flags: none
- register: file
-
-- name: idempotent modify audit policy registry
- win_audit_rule:
- path: "{{ test_audit_rule_registry }}"
- user: "{{ test_audit_rule_user }}"
- rights: "{{ test_audit_rule_new_rights }}"
- state: present
- audit_flags: "{{ test_audit_rule_audit_flags }}"
- register: registry
-
-- name: idempotent modify assert that and a change is not detected
- assert:
- that:
- - directory is not changed and directory.path_type == 'directory'
- - file is not changed and file.path_type == 'file'
- - registry is not changed and registry.path_type == 'registry'
diff --git a/test/integration/targets/win_audit_rule/tasks/remove.yml b/test/integration/targets/win_audit_rule/tasks/remove.yml
deleted file mode 100644
index 3102bc7487..0000000000
--- a/test/integration/targets/win_audit_rule/tasks/remove.yml
+++ /dev/null
@@ -1,151 +0,0 @@
-################################
-### check mode remove a rule ###
-################################
-- name: check mode remove directory rule
- win_audit_rule:
- path: "{{ test_audit_rule_folder }}"
- user: "{{ test_audit_rule_user }}"
- state: absent
- register: directory
- check_mode: yes
-
-- name: check mode remove file rule
- win_audit_rule:
- path: "{{ test_audit_rule_file }}"
- user: "{{ test_audit_rule_user }}"
- state: absent
- register: file
- check_mode: yes
-
-- name: check mode remove registry rule
- win_audit_rule:
- path: "{{ test_audit_rule_registry }}"
- user: "{{ test_audit_rule_user }}"
- state: absent
- register: registry
- check_mode: yes
-
-- name: check mode remove get directory rule results
- test_get_audit_rule:
- path: "{{ test_audit_rule_folder }}"
- user: "{{ test_audit_rule_user }}"
- rights: "{{ test_audit_rule_new_rights }}"
- audit_flags: "{{ test_audit_rule_audit_flags }}"
- register: directory_results
-
-- name: check mode remove get file rule results
- test_get_audit_rule:
- path: "{{ test_audit_rule_file }}"
- user: "{{ test_audit_rule_user }}"
- rights: "{{ test_audit_rule_new_rights }}"
- audit_flags: "{{ test_audit_rule_audit_flags }}"
- inheritance_flags: none
- register: file_results
-
-- name: check mode remove get REGISTRY rule results
- test_get_audit_rule:
- path: "{{ test_audit_rule_registry }}"
- user: "{{ test_audit_rule_user }}"
- rights: "{{ test_audit_rule_new_rights }}"
- audit_flags: "{{ test_audit_rule_audit_flags }}"
- register: registry_results
-
-- name: check mode remove assert that change detected, but rule is still present
- assert:
- that:
- - directory is changed
- - file is changed
- - registry is changed
- - directory_results.matching_rule_found and directory_results.path_type == 'directory'
- - file_results.matching_rule_found and file_results.path_type == 'file'
- - registry_results.matching_rule_found and registry_results.path_type == 'registry'
-
-#####################
-### remove a rule ###
-#####################
-- name: remove directory rule
- win_audit_rule:
- path: "{{ test_audit_rule_folder }}"
- user: "{{ test_audit_rule_user }}"
- state: absent
- register: directory
-
-- name: remove file rule
- win_audit_rule:
- path: "{{ test_audit_rule_file }}"
- user: "{{ test_audit_rule_user }}"
- state: absent
- register: file
-
-- name: remove registry rule
- win_audit_rule:
- path: "{{ test_audit_rule_registry }}"
- user: "{{ test_audit_rule_user }}"
- state: absent
- register: registry
-
-- name: remove get directory rule results
- test_get_audit_rule:
- path: "{{ test_audit_rule_folder }}"
- user: "{{ test_audit_rule_user }}"
- rights: "{{ test_audit_rule_new_rights }}"
- audit_flags: "{{ test_audit_rule_audit_flags }}"
- register: directory_results
-
-- name: remove get file rule results
- test_get_audit_rule:
- path: "{{ test_audit_rule_file }}"
- user: "{{ test_audit_rule_user }}"
- rights: "{{ test_audit_rule_new_rights }}"
- audit_flags: "{{ test_audit_rule_audit_flags }}"
- inheritance_flags: none
- register: file_results
-
-- name: remove get REGISTRY rule results
- test_get_audit_rule:
- path: "{{ test_audit_rule_registry }}"
- user: "{{ test_audit_rule_user }}"
- rights: "{{ test_audit_rule_new_rights }}"
- audit_flags: "{{ test_audit_rule_audit_flags }}"
- register: registry_results
-
-- name: remove assert that change detected and rule is gone
- assert:
- that:
- - directory is changed
- - file is changed
- - registry is changed
- - not directory_results.matching_rule_found and directory_results.path_type == 'directory'
- - not file_results.matching_rule_found and file_results.path_type == 'file'
- - not registry_results.matching_rule_found and registry_results.path_type == 'registry'
-
-################################
-### idempotent remove a rule ###
-################################
-- name: idempotent remove directory rule
- win_audit_rule:
- path: "{{ test_audit_rule_folder }}"
- user: "{{ test_audit_rule_user }}"
- state: absent
- register: directory
-
-- name: idempotent remove file rule
- win_audit_rule:
- path: "{{ test_audit_rule_file }}"
- user: "{{ test_audit_rule_user }}"
- state: absent
- register: file
-
-- name: idempotent remove registry rule
- win_audit_rule:
- path: "{{ test_audit_rule_registry }}"
- user: "{{ test_audit_rule_user }}"
- state: absent
- register: registry
-
-- name: idempotent remove assert that no change detected
- assert:
- that:
- - directory is not changed and directory.path_type == 'directory'
- - file is not changed and file.path_type == 'file'
- - registry is not changed and registry.path_type == 'registry'