[Emulation Tuning] Adjusts Add Admin Roles to User(s)
emulation
#72
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Overview
This pull request adjusts the emulation
Add Admin Roles to User(s)
. Previously, this emulation served as ahello world
for examples of running emulations. This emulation is now fully operational.Emulation workflow
Additional Information
base_emulation.py
to setself.domain
from theetc/config.yaml
value. This is important when dealing with the admin SDK API regarding users, groups, role's etc. If the user has not set this domain, emulations will not run as assumptions are made in emulations when dealing with users.admin_add_admin_roles_to_users.yaml
which includes all the information for the user being addedcleanup
is optional but included['admin.directory.user', 'admin.directory.rolemanagement', 'admin.directory.user.security']
roles to operate therefore thedefault
session referenced needs to accept this. These scopes were added to theconfig.yaml
for SWAT to be globally set within the application since this is an OOTB emulation