8
8
9
9
# database name
10
10
db_name = "DB#{ SecureRandom . hex ( 4 ) } " . upcase
11
- LOGIN1 = "Login1_#{ SecureRandom . hex ( 2 ) } "
12
- LOGIN2 = "Login2_#{ SecureRandom . hex ( 2 ) } "
13
- LOGIN3 = "Login3_#{ SecureRandom . hex ( 2 ) } "
14
- USER1 = "User1_#{ SecureRandom . hex ( 2 ) } "
11
+ LOGIN1 = "Login1_#{ SecureRandom . hex ( 2 ) } " . freeze
12
+ LOGIN2 = "Login2_#{ SecureRandom . hex ( 2 ) } " . freeze
13
+ LOGIN3 = "Login3_#{ SecureRandom . hex ( 2 ) } " . freeze
14
+ USER1 = "User1_#{ SecureRandom . hex ( 2 ) } " . freeze
15
15
16
16
describe 'Test sqlserver::role' do
17
17
def ensure_sqlserver_logins_users ( db_name )
@@ -108,7 +108,7 @@ def ensure_sqlserver_logins_users(db_name)
108
108
ON spe.grantee_principal_id = spr.principal_id
109
109
WHERE spr.name = '#{ @role } ';"
110
110
111
- run_sql_query ( query : query , server : hostname , expected_row_count : 2 )
111
+ run_sql_query ( query :, server : hostname , expected_row_count : 2 )
112
112
113
113
# validate that the database-specific role '#{@role}' has correct authorization #{LOGIN1}
114
114
query = "USE #{ db_name } ;
@@ -118,7 +118,7 @@ def ensure_sqlserver_logins_users(db_name)
118
118
ON spr.owning_principal_id = sl.principal_id
119
119
WHERE sl.name = '#{ LOGIN1 } ';"
120
120
121
- run_sql_query ( query : query , server : hostname , expected_row_count : 1 )
121
+ run_sql_query ( query :, server : hostname , expected_row_count : 1 )
122
122
end
123
123
124
124
it "Create database-specific role #{ @role } " do
@@ -146,7 +146,7 @@ def ensure_sqlserver_logins_users(db_name)
146
146
ON pe.grantee_principal_id = pr.principal_id
147
147
WHERE pr.name = '#{ @role } ';"
148
148
149
- run_sql_query ( query : query , server : hostname , expected_row_count : 6 )
149
+ run_sql_query ( query :, server : hostname , expected_row_count : 6 )
150
150
end
151
151
152
152
it 'Create a database-specific role with the same name on two databases' do
@@ -184,7 +184,7 @@ def ensure_sqlserver_logins_users(db_name)
184
184
on pr.name = dbpr.name
185
185
WHERE pr.name = '#{ @role } ';"
186
186
187
- run_sql_query ( query : query , server : hostname , expected_row_count : 6 )
187
+ run_sql_query ( query :, server : hostname , expected_row_count : 6 )
188
188
end
189
189
190
190
it "Create server role #{ @role } with optional members and optional members-purge" do
@@ -213,7 +213,7 @@ def ensure_sqlserver_logins_users(db_name)
213
213
ON spe.grantee_principal_id = spr.principal_id
214
214
WHERE spr.name = '#{ @role } ';"
215
215
216
- run_sql_query ( query : query , server : hostname , expected_row_count : 2 )
216
+ run_sql_query ( query :, server : hostname , expected_row_count : 2 )
217
217
218
218
# validate that the t server role '#{@role}' has correct members (Login1, 2, 3)
219
219
query = "USE #{ db_name } ;
@@ -226,7 +226,7 @@ def ensure_sqlserver_logins_users(db_name)
226
226
OR spr.name = '#{ LOGIN3 } '
227
227
OR spr.name = 'LOGIN4';"
228
228
229
- run_sql_query ( query : query , server : hostname , expected_row_count : 3 )
229
+ run_sql_query ( query :, server : hostname , expected_row_count : 3 )
230
230
231
231
puts "Create server role #{ @role } with optional members_purge:"
232
232
pp = <<-MANIFEST
@@ -256,7 +256,7 @@ def ensure_sqlserver_logins_users(db_name)
256
256
OR spr.name = '#{ LOGIN2 } '
257
257
OR spr.name = '#{ LOGIN3 } ';"
258
258
259
- run_sql_query ( query : query , server : hostname , expected_row_count : 1 )
259
+ run_sql_query ( query :, server : hostname , expected_row_count : 1 )
260
260
end
261
261
end
262
262
end
0 commit comments