mirror of
https://github.com/ysoftdevs/terraform-provider-bitbucketserver.git
synced 2026-03-31 14:33:12 +02:00
Added resource bitbucketserver_project_hook and cleaned up delete handling of permission resources
This commit is contained in:
@@ -52,6 +52,7 @@ func Provider() terraform.ResourceProvider {
|
||||
"bitbucketserver_mail_server": resourceMailServer(),
|
||||
"bitbucketserver_plugin": resourcePlugin(),
|
||||
"bitbucketserver_project": resourceProject(),
|
||||
"bitbucketserver_project_hook": resourceProjectHook(),
|
||||
"bitbucketserver_project_permissions_group": resourceProjectPermissionsGroup(),
|
||||
"bitbucketserver_project_permissions_user": resourceProjectPermissionsUser(),
|
||||
"bitbucketserver_repository": resourceRepository(),
|
||||
|
||||
@@ -85,9 +85,5 @@ func resourceGlobalPermissionsGroupDelete(d *schema.ResourceData, m interface{})
|
||||
url.QueryEscape(d.Get("group").(string)),
|
||||
))
|
||||
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return resourceGlobalPermissionsGroupRead(d, m)
|
||||
return err
|
||||
}
|
||||
|
||||
@@ -85,9 +85,5 @@ func resourceGlobalPermissionsUserDelete(d *schema.ResourceData, m interface{})
|
||||
url.QueryEscape(d.Get("user").(string)),
|
||||
))
|
||||
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return resourceGlobalPermissionsUserRead(d, m)
|
||||
return err
|
||||
}
|
||||
|
||||
118
bitbucket/resource_project_hook.go
Normal file
118
bitbucket/resource_project_hook.go
Normal file
@@ -0,0 +1,118 @@
|
||||
package bitbucket
|
||||
|
||||
import (
|
||||
"bytes"
|
||||
"encoding/json"
|
||||
"fmt"
|
||||
"github.com/hashicorp/terraform/helper/schema"
|
||||
"strings"
|
||||
)
|
||||
|
||||
func resourceProjectHook() *schema.Resource {
|
||||
return &schema.Resource{
|
||||
Create: resourceProjectHookCreate,
|
||||
Update: resourceProjectHookUpdate,
|
||||
Read: resourceProjectHookRead,
|
||||
Delete: resourceProjectHookDelete,
|
||||
Importer: &schema.ResourceImporter{
|
||||
State: schema.ImportStatePassthrough,
|
||||
},
|
||||
|
||||
Schema: map[string]*schema.Schema{
|
||||
"project": {
|
||||
Type: schema.TypeString,
|
||||
Required: true,
|
||||
ForceNew: true,
|
||||
},
|
||||
"hook": {
|
||||
Type: schema.TypeString,
|
||||
Required: true,
|
||||
ForceNew: true,
|
||||
},
|
||||
"settings": {
|
||||
Type: schema.TypeMap,
|
||||
Optional: true,
|
||||
},
|
||||
},
|
||||
}
|
||||
}
|
||||
|
||||
func resourceProjectHookUpdate(d *schema.ResourceData, m interface{}) error {
|
||||
client := m.(*BitbucketServerProvider).BitbucketClient
|
||||
|
||||
project := d.Get("project").(string)
|
||||
hook := d.Get("hook").(string)
|
||||
settings := d.Get("settings").(map[string]interface{})
|
||||
|
||||
settingsJson, err := json.Marshal(settings)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
_, err = client.Put(fmt.Sprintf("/rest/api/1.0/projects/%s/settings/hooks/%s/enabled",
|
||||
project,
|
||||
hook,
|
||||
), bytes.NewBuffer(settingsJson))
|
||||
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return resourceProjectHookRead(d, m)
|
||||
}
|
||||
|
||||
func resourceProjectHookCreate(d *schema.ResourceData, m interface{}) error {
|
||||
err := resourceProjectHookUpdate(d, m)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
d.SetId(fmt.Sprintf("%s/%s", d.Get("project").(string), d.Get("hook").(string)))
|
||||
return resourceProjectHookRead(d, m)
|
||||
}
|
||||
|
||||
func resourceProjectHookRead(d *schema.ResourceData, m interface{}) error {
|
||||
id := d.Id()
|
||||
if id != "" {
|
||||
parts := strings.Split(id, "/")
|
||||
if len(parts) == 2 {
|
||||
d.Set("project", parts[0])
|
||||
d.Set("hook", parts[1])
|
||||
} else {
|
||||
return fmt.Errorf("incorrect ID format, should match `project/hook`")
|
||||
}
|
||||
}
|
||||
|
||||
project := d.Get("project").(string)
|
||||
hook := d.Get("hook").(string)
|
||||
|
||||
client := m.(*BitbucketServerProvider).BitbucketClient
|
||||
resp, err := client.Get(fmt.Sprintf("/rest/api/1.0/projects/%s/settings/hooks/%s/settings",
|
||||
project,
|
||||
hook,
|
||||
))
|
||||
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
var settings map[string]interface{}
|
||||
decoder := json.NewDecoder(resp.Body)
|
||||
err = decoder.Decode(&settings)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
_ = d.Set("settings", settings)
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
func resourceProjectHookDelete(d *schema.ResourceData, m interface{}) error {
|
||||
client := m.(*BitbucketServerProvider).BitbucketClient
|
||||
_, err := client.Delete(fmt.Sprintf("/rest/api/1.0/projects/%s/settings/hooks/%s/enabled",
|
||||
d.Get("project").(string),
|
||||
d.Get("hook").(string)))
|
||||
|
||||
return err
|
||||
}
|
||||
40
bitbucket/resource_project_hook_test.go
Normal file
40
bitbucket/resource_project_hook_test.go
Normal file
@@ -0,0 +1,40 @@
|
||||
package bitbucket
|
||||
|
||||
import (
|
||||
"fmt"
|
||||
"math/rand"
|
||||
"testing"
|
||||
"time"
|
||||
|
||||
"github.com/hashicorp/terraform/helper/resource"
|
||||
)
|
||||
|
||||
func TestAccBitbucketResourceProjectHook_simple(t *testing.T) {
|
||||
projectKey := fmt.Sprintf("TEST%v", rand.New(rand.NewSource(time.Now().UnixNano())).Int())
|
||||
|
||||
config := fmt.Sprintf(`
|
||||
resource "bitbucketserver_project" "test" {
|
||||
key = "%v"
|
||||
name = "test-project-%v"
|
||||
}
|
||||
|
||||
resource "bitbucketserver_project_hook" "test" {
|
||||
project = bitbucketserver_project.test.key
|
||||
hook = "com.atlassian.bitbucket.server.bitbucket-bundled-hooks:force-push-hook"
|
||||
}
|
||||
`, projectKey, projectKey)
|
||||
resource.Test(t, resource.TestCase{
|
||||
PreCheck: func() { testAccPreCheck(t) },
|
||||
Providers: testAccProviders,
|
||||
Steps: []resource.TestStep{
|
||||
{
|
||||
Config: config,
|
||||
Check: resource.ComposeTestCheckFunc(
|
||||
resource.TestCheckResourceAttr("bitbucketserver_project_hook.test", "project", projectKey),
|
||||
resource.TestCheckResourceAttr("bitbucketserver_project_hook.test", "hook", "com.atlassian.bitbucket.server.bitbucket-bundled-hooks:force-push-hook"),
|
||||
resource.TestCheckResourceAttr("bitbucketserver_project_hook.test", "settings.%", "0"),
|
||||
),
|
||||
},
|
||||
},
|
||||
})
|
||||
}
|
||||
@@ -99,9 +99,5 @@ func resourceProjectPermissionsGroupDelete(d *schema.ResourceData, m interface{}
|
||||
url.QueryEscape(d.Get("group").(string)),
|
||||
))
|
||||
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return resourceProjectPermissionsGroupRead(d, m)
|
||||
return err
|
||||
}
|
||||
|
||||
@@ -99,9 +99,5 @@ func resourceProjectPermissionsUserDelete(d *schema.ResourceData, m interface{})
|
||||
url.QueryEscape(d.Get("user").(string)),
|
||||
))
|
||||
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return resourceProjectPermissionsUserRead(d, m)
|
||||
return err
|
||||
}
|
||||
|
||||
@@ -107,9 +107,5 @@ func resourceRepositoryPermissionsGroupDelete(d *schema.ResourceData, m interfac
|
||||
url.QueryEscape(d.Get("group").(string)),
|
||||
))
|
||||
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return resourceRepositoryPermissionsGroupRead(d, m)
|
||||
return err
|
||||
}
|
||||
|
||||
@@ -107,9 +107,5 @@ func resourceRepositoryPermissionsUserDelete(d *schema.ResourceData, m interface
|
||||
url.QueryEscape(d.Get("user").(string)),
|
||||
))
|
||||
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return resourceRepositoryPermissionsUserRead(d, m)
|
||||
return err
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user