Added bitbucket_user_access_token resource

This commit is contained in:
Gavin Bunney
2019-10-15 13:47:59 -07:00
parent 567a08231d
commit a4982b3748
6 changed files with 295 additions and 0 deletions

View File

@@ -61,6 +61,7 @@ func Provider() terraform.ResourceProvider {
"bitbucketserver_repository_permissions_group": resourceRepositoryPermissionsGroup(),
"bitbucketserver_repository_permissions_user": resourceRepositoryPermissionsUser(),
"bitbucketserver_user": resourceUser(),
"bitbucketserver_user_access_token": resourceUserAccessToken(),
"bitbucketserver_user_group": resourceUserGroup(),
},
}

View File

@@ -0,0 +1,188 @@
package bitbucket
import (
"bytes"
"encoding/json"
"fmt"
"github.com/hashicorp/terraform/helper/schema"
"io/ioutil"
)
type AccessTokenRequest struct {
Name string `json:"name,omitempty"`
Permissions []interface{} `json:"permissions,omitempty"`
}
type AccessTokenResponse struct {
Id string `json:"id,omitempty"`
CreatedDate jsonTime `json:"createdDate,omitempty"`
LastAuthenticated jsonTime `json:"lastAuthenticated,omitempty"`
Name string `json:"name,omitempty"`
Permissions []string `json:"permissions,omitempty"`
Token string `json:"token,omitempty"`
}
func resourceUserAccessToken() *schema.Resource {
return &schema.Resource{
Create: resourceUserAccessTokenCreate,
Update: resourceUserAccessTokenUpdate,
Read: resourceUserAccessTokenRead,
Exists: resourceUserAccessTokenExists,
Delete: resourceUserAccessTokenDelete,
Importer: &schema.ResourceImporter{
State: schema.ImportStatePassthrough,
},
Schema: map[string]*schema.Schema{
"user": {
Type: schema.TypeString,
Required: true,
ForceNew: true,
},
"name": {
Type: schema.TypeString,
Required: true,
},
"permissions": {
Type: schema.TypeList,
Required: true,
Elem: &schema.Schema{Type: schema.TypeString},
},
"created_date": {
Type: schema.TypeString,
Computed: true,
},
"last_authenticated": {
Type: schema.TypeString,
Computed: true,
},
"access_token": {
Type: schema.TypeString,
Sensitive: true,
Computed: true,
},
},
}
}
func resourceUserAccessTokenCreate(d *schema.ResourceData, m interface{}) error {
client := m.(*BitbucketServerProvider).BitbucketClient
accessTokenRequest := &AccessTokenRequest{
Name: d.Get("name").(string),
Permissions: d.Get("permissions").([]interface{}),
}
byteData, err := json.Marshal(accessTokenRequest)
if err != nil {
return err
}
res, err := client.Put(fmt.Sprintf("/rest/access-tokens/1.0/users/%s",
d.Get("user").(string),
), bytes.NewBuffer(byteData))
if err != nil {
return err
}
var accessTokenResponse AccessTokenResponse
body, readErr := ioutil.ReadAll(res.Body)
if readErr != nil {
return readErr
}
decodeErr := json.Unmarshal(body, &accessTokenResponse)
if decodeErr != nil {
return decodeErr
}
d.SetId(accessTokenResponse.Id)
_ = d.Set("access_token", accessTokenResponse.Token)
return resourceUserAccessTokenRead(d, m)
}
func resourceUserAccessTokenUpdate(d *schema.ResourceData, m interface{}) error {
client := m.(*BitbucketServerProvider).BitbucketClient
accessTokenRequest := &AccessTokenRequest{
Name: d.Get("name").(string),
Permissions: d.Get("permissions").([]interface{}),
}
byteData, err := json.Marshal(accessTokenRequest)
if err != nil {
return err
}
_, err = client.Post(fmt.Sprintf("/rest/access-tokens/1.0/users/%s/%s",
d.Get("user").(string),
d.Id(),
), bytes.NewBuffer(byteData))
if err != nil {
return err
}
return resourceUserAccessTokenRead(d, m)
}
func resourceUserAccessTokenRead(d *schema.ResourceData, m interface{}) error {
client := m.(*BitbucketServerProvider).BitbucketClient
res, err := client.Get(fmt.Sprintf("/rest/access-tokens/1.0/users/%s/%s",
d.Get("user").(string),
d.Id(),
))
if err != nil {
return err
}
var accessTokenResponse AccessTokenResponse
body, readErr := ioutil.ReadAll(res.Body)
if readErr != nil {
return readErr
}
decodeErr := json.Unmarshal(body, &accessTokenResponse)
if decodeErr != nil {
return decodeErr
}
_ = d.Set("name", accessTokenResponse.Name)
_ = d.Set("created_date", accessTokenResponse.CreatedDate.String())
_ = d.Set("last_authenticated", accessTokenResponse.LastAuthenticated.String())
return nil
}
func resourceUserAccessTokenExists(d *schema.ResourceData, m interface{}) (bool, error) {
client := m.(*BitbucketServerProvider).BitbucketClient
req, err := client.Get(fmt.Sprintf("/rest/access-tokens/1.0/users/%s/%s",
d.Get("user").(string),
d.Id(),
))
if err != nil {
return false, fmt.Errorf("failed to get access token %s for user %s from bitbucket: %+v", d.Id(), d.Get("user").(string), err)
}
if req.StatusCode == 200 {
return true, nil
} else {
return false, nil
}
}
func resourceUserAccessTokenDelete(d *schema.ResourceData, m interface{}) error {
client := m.(*BitbucketServerProvider).BitbucketClient
_, err := client.Delete(fmt.Sprintf("/rest/access-tokens/1.0/users/%s/%s",
d.Get("user").(string),
d.Id(),
))
return err
}

View File

@@ -0,0 +1,54 @@
package bitbucket
import (
"fmt"
"github.com/hashicorp/terraform/helper/resource"
"github.com/hashicorp/terraform/terraform"
"testing"
)
func TestAccBitbucketUserAccessToken(t *testing.T) {
testAccBitbucketUserConfig := `
resource "bitbucketserver_user_access_token" "test" {
user = "admin"
name = "my-token"
permissions = ["REPO_READ", "PROJECT_WRITE"]
}
`
resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders,
CheckDestroy: testAccCheckBitbucketUserAccessTokenDestroy,
Steps: []resource.TestStep{
{
Config: testAccBitbucketUserConfig,
Check: resource.ComposeTestCheckFunc(
resource.TestCheckResourceAttr("bitbucketserver_user_access_token.test", "name", "my-token"),
resource.TestCheckResourceAttr("bitbucketserver_user_access_token.test", "permissions.#", "2"),
resource.TestCheckResourceAttr("bitbucketserver_user_access_token.test", "permissions.0", "REPO_READ"),
resource.TestCheckResourceAttr("bitbucketserver_user_access_token.test", "permissions.1", "PROJECT_WRITE"),
resource.TestCheckResourceAttrSet("bitbucketserver_user_access_token.test", "created_date"),
resource.TestCheckResourceAttrSet("bitbucketserver_user_access_token.test", "last_authenticated"),
resource.TestCheckResourceAttrSet("bitbucketserver_user_access_token.test", "access_token"),
),
},
},
})
}
func testAccCheckBitbucketUserAccessTokenDestroy(s *terraform.State) error {
client := testAccProvider.Meta().(*BitbucketServerProvider).BitbucketClient
rs, ok := s.RootModule().Resources["bitbucketserver_user_access_token.test"]
if !ok {
return fmt.Errorf("not found %s", "bitbucketserver_user_access_token.test")
}
response, _ := client.Get(fmt.Sprintf("/rest/access-tokens/1.0/users/%s/%s", rs.Primary.Attributes["user"], rs.Primary.ID))
if response.StatusCode != 404 {
return fmt.Errorf("access token still exists")
}
return nil
}