Added bitbucketserver_project_permissions_group

This commit is contained in:
Gavin Bunney
2019-10-09 23:09:01 -07:00
parent f3a9683fd1
commit acf8c904e0
6 changed files with 283 additions and 28 deletions

View File

@@ -48,6 +48,7 @@ provider "bitbucketserver" {
You can also specify these parameters through the `BITBUCKET_SERVER`, `BITBUCKER_USERNAME` and `BITBUCKET_PASSWORD` environment variables. You can also specify these parameters through the `BITBUCKET_SERVER`, `BITBUCKER_USERNAME` and `BITBUCKET_PASSWORD` environment variables.
### Create a Bitbucket Project ### Create a Bitbucket Project
```hcl ```hcl
@@ -59,7 +60,7 @@ resource "bitbucketserver_project" "test" {
} }
``` ```
* `key` - Required. Project key to set * `key` - Required. Project key to set.
* `name` - Required. Name of the project. * `name` - Required. Name of the project.
* `description` - Optional. Description of the project. * `description` - Optional. Description of the project.
* `avatar` - Optional. Avatar to use containing base64-encoded image data. Format: `data:(content type, e.g. image/png);base64,(data)` * `avatar` - Optional. Avatar to use containing base64-encoded image data. Format: `data:(content type, e.g. image/png);base64,(data)`
@@ -70,6 +71,28 @@ resource "bitbucketserver_project" "test" {
$ terraform import bitbucketserver_project.test TEST $ terraform import bitbucketserver_project.test TEST
``` ```
### Assign Project Permissions for Group
```hcl
resource "bitbucketserver_project_permissions_group" "test" {
project = "TEST"
group = "stash-users"
permission = "PROJECT_WRITE"
}
```
* `project` - Required. Project key to set permissions for.
* `group` - Required. Name of the group permissions are for.
* `permission` - Required. The permission to grant. Available project permissions are: `PROJECT_READ`, `PROJECT_WRITE`, `PROJECT_ADMIN`
#### Import Group Permission for Project
```bash
$ terraform import bitbucketserver_project_permissions_group.test TEST/stash-users
```
### Create a Bitbucket Repository ### Create a Bitbucket Repository
```hcl ```hcl
@@ -98,6 +121,7 @@ Additional to the above, the following attributes are emitted:
$ terraform import bitbucketserver_repository.test TEST/test-01 $ terraform import bitbucketserver_repository.test TEST/test-01
``` ```
### Set Server License ### Set Server License
```hcl ```hcl
@@ -130,6 +154,7 @@ Additional to the above, the following attributes are emitted:
$ terraform import bitbucketserver_admin_license.main license $ terraform import bitbucketserver_admin_license.main license
``` ```
### Set Mail Server Configuration ### Set Mail Server Configuration
```hcl ```hcl
@@ -160,8 +185,11 @@ $ terraform import bitbucketserver_admin_mail_server.mail mail.example.com
## Data Sources ## Data Sources
### Application Properties ### Application Properties
Retrieve version information and other application properties.
```hcl ```hcl
data "bitbucketserver_application_properties" "main" {} data "bitbucketserver_application_properties" "main" {}
``` ```
@@ -173,7 +201,10 @@ data "bitbucketserver_application_properties" "main" {}
* `build_date` - Date the Bitbucket build was made, * `build_date` - Date the Bitbucket build was made,
* `display_name` - Name of the Bitbucket instance. * `display_name` - Name of the Bitbucket instance.
### Application Properties
### Project Permissions Groups
Retrieve a list of groups that have been granted at least one permission for the specified project.
```hcl ```hcl
data "bitbucketserver_project_permissions_groups" "proj" { data "bitbucketserver_project_permissions_groups" "proj" {
@@ -181,6 +212,9 @@ data "bitbucketserver_project_permissions_groups" "proj" {
} }
``` ```
* `project` - Required. Project Key to lookup permissions for.
* `filter` - Optional. If specified only group names containing the supplied string will be returned.
#### Attributes #### Attributes
* `groups` - List of maps containing `name` and `permission` keys. * `groups` - List of maps containing `name` and `permission` keys.

View File

@@ -6,20 +6,25 @@ import (
"github.com/hashicorp/terraform/helper/schema" "github.com/hashicorp/terraform/helper/schema"
) )
type ProjectPermissionsGroup struct { type PaginatedProjectPermissionsGroupsValue struct {
Group struct { Group struct {
Name string `json:"name,omitempty"` Name string `json:"name,omitempty"`
} `json:"group,omitempty"` } `json:"group,omitempty"`
Permission string `json:"permission,omitempty"` Permission string `json:"permission,omitempty"`
} }
type ProjectPermissionsGroup struct {
Name string
Permission string
}
type PaginatedProjectPermissionsGroups struct { type PaginatedProjectPermissionsGroups struct {
Values []ProjectPermissionsGroup `json:"values,omitempty"` Values []PaginatedProjectPermissionsGroupsValue `json:"values,omitempty"`
Size int `json:"size,omitempty"` Size int `json:"size,omitempty"`
Limit int `json:"limit,omitempty"` Limit int `json:"limit,omitempty"`
IsLastPage bool `json:"isLastPage,omitempty"` IsLastPage bool `json:"isLastPage,omitempty"`
Start int `json:"start,omitempty"` Start int `json:"start,omitempty"`
NextPageStart int `json:"nextPageStart,omitempty"` NextPageStart int `json:"nextPageStart,omitempty"`
} }
func dataSourceProjectPermissionsGroups() *schema.Resource { func dataSourceProjectPermissionsGroups() *schema.Resource {
@@ -31,6 +36,10 @@ func dataSourceProjectPermissionsGroups() *schema.Resource {
Type: schema.TypeString, Type: schema.TypeString,
Required: true, Required: true,
}, },
"filter": {
Type: schema.TypeString,
Optional: true,
},
"groups": { "groups": {
Type: schema.TypeList, Type: schema.TypeList,
Computed: true, Computed: true,
@@ -52,46 +61,74 @@ func dataSourceProjectPermissionsGroups() *schema.Resource {
} }
func dataSourceProjectPermissionsGroupsRead(d *schema.ResourceData, m interface{}) error { func dataSourceProjectPermissionsGroupsRead(d *schema.ResourceData, m interface{}) error {
groups, err := readProjectPermissionsGroups(m, d.Get("project").(string), d.Get("filter").(string))
if err != nil {
return err
}
d.SetId(d.Get("project").(string))
var terraformGroups []interface{}
for _, group := range groups {
g := make(map[string]interface{})
g["name"] = group.Name
g["permission"] = group.Permission
terraformGroups = append(terraformGroups, g)
}
d.Set("groups", terraformGroups)
return nil
}
func readProjectPermissionsGroups(m interface{}, project string, filter string) ([]ProjectPermissionsGroup, error) {
client := m.(*BitbucketClient) client := m.(*BitbucketClient)
resourceURL := fmt.Sprintf("/rest/api/1.0/projects/%s/permissions/groups", resourceURL := fmt.Sprintf("/rest/api/1.0/projects/%s/permissions/groups",
d.Get("project").(string), project,
) )
if filter != "" {
resourceURL += "?filter=" + filter
}
var projectGroups PaginatedProjectPermissionsGroups var projectGroups PaginatedProjectPermissionsGroups
var terraformGroups []interface{} var groups []ProjectPermissionsGroup
for { for {
reviewersResponse, err := client.Get(resourceURL) resp, err := client.Get(resourceURL)
if err != nil { if err != nil {
return err return nil, err
} }
decoder := json.NewDecoder(reviewersResponse.Body) decoder := json.NewDecoder(resp.Body)
err = decoder.Decode(&projectGroups) err = decoder.Decode(&projectGroups)
if err != nil { if err != nil {
return err return nil, err
} }
for _, group := range projectGroups.Values { for _, group := range projectGroups.Values {
g := make(map[string]interface{}) g := ProjectPermissionsGroup{
g["name"] = group.Group.Name Name: group.Group.Name,
g["permission"] = group.Permission Permission: group.Permission,
terraformGroups = append(terraformGroups, g) }
groups = append(groups, g)
} }
if projectGroups.IsLastPage == false { if projectGroups.IsLastPage == false {
resourceURL = fmt.Sprintf("/rest/api/1.0/projects/%s/permissions/groups?start=%d", resourceURL = fmt.Sprintf("/rest/api/1.0/projects/%s/permissions/groups?start=%d",
d.Get("project").(string), project,
projectGroups.NextPageStart, projectGroups.NextPageStart,
) )
if filter != "" {
resourceURL += "&filter=" + filter
}
projectGroups = PaginatedProjectPermissionsGroups{} projectGroups = PaginatedProjectPermissionsGroups{}
} else { } else {
break break
} }
} }
d.SetId(d.Get("project").(string)) return groups, nil
d.Set("groups", terraformGroups)
return nil
} }

View File

@@ -9,13 +9,47 @@ import (
"github.com/hashicorp/terraform/helper/resource" "github.com/hashicorp/terraform/helper/resource"
) )
func TestAccBitbucketDataProjectPermissionsGroups_check_empty(t *testing.T) { func TestAccBitbucketDataProjectPermissionsGroups_simple(t *testing.T) {
config := fmt.Sprintf(` config := fmt.Sprintf(`
resource "bitbucketserver_project" "test" { resource "bitbucketserver_project" "test" {
key = "TEST%v" key = "TEST%v"
name = "test-repo-for-repository-test" name = "test-repo-for-repository-test"
} }
resource "bitbucketserver_project_permissions_group" "test" {
project = bitbucketserver_project.test.key
group = "stash-users"
permission = "PROJECT_WRITE"
}
data "bitbucketserver_project_permissions_groups" "test" {
project = bitbucketserver_project_permissions_group.test.project
}
`, rand.New(rand.NewSource(time.Now().UnixNano())).Int())
resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders,
Steps: []resource.TestStep{
{
Config: config,
Check: resource.ComposeTestCheckFunc(
resource.TestCheckResourceAttr("data.bitbucketserver_project_permissions_groups.test", "groups.#", "1"),
resource.TestCheckResourceAttr("data.bitbucketserver_project_permissions_groups.test", "groups.0.name", "stash-users"),
resource.TestCheckResourceAttr("data.bitbucketserver_project_permissions_groups.test", "groups.0.permission", "PROJECT_WRITE"),
),
},
},
})
}
func TestAccBitbucketDataProjectPermissionsGroups_check_empty(t *testing.T) {
config := fmt.Sprintf(`
resource "bitbucketserver_project" "test" {
key = "TEST%v"
name = "test-repo-for-repository-test"
}
data "bitbucketserver_project_permissions_groups" "test" { data "bitbucketserver_project_permissions_groups" "test" {
project = bitbucketserver_project.test.key project = bitbucketserver_project.test.key
} }

View File

@@ -33,10 +33,11 @@ func Provider() terraform.ResourceProvider {
"bitbucketserver_project_permissions_groups": dataSourceProjectPermissionsGroups(), "bitbucketserver_project_permissions_groups": dataSourceProjectPermissionsGroups(),
}, },
ResourcesMap: map[string]*schema.Resource{ ResourcesMap: map[string]*schema.Resource{
"bitbucketserver_admin_license": resourceAdminLicense(), "bitbucketserver_admin_license": resourceAdminLicense(),
"bitbucketserver_admin_mail_server": resourceAdminMailServer(), "bitbucketserver_admin_mail_server": resourceAdminMailServer(),
"bitbucketserver_project": resourceProject(), "bitbucketserver_project": resourceProject(),
"bitbucketserver_repository": resourceRepository(), "bitbucketserver_project_permissions_group": resourceProjectPermissionsGroup(),
"bitbucketserver_repository": resourceRepository(),
}, },
} }
} }

View File

@@ -0,0 +1,107 @@
package bitbucket
import (
"fmt"
"github.com/hashicorp/terraform/helper/schema"
"github.com/hashicorp/terraform/helper/validation"
"net/url"
"strings"
)
func resourceProjectPermissionsGroup() *schema.Resource {
return &schema.Resource{
Create: resourceProjectPermissionsGroupCreate,
Update: resourceProjectPermissionsGroupUpdate,
Read: resourceProjectPermissionsGroupRead,
Delete: resourceProjectPermissionsGroupDelete,
Importer: &schema.ResourceImporter{
State: schema.ImportStatePassthrough,
},
Schema: map[string]*schema.Schema{
"project": {
Type: schema.TypeString,
Required: true,
ForceNew: true,
},
"group": {
Type: schema.TypeString,
Required: true,
ForceNew: true,
},
"permission": {
Type: schema.TypeString,
Required: true,
ValidateFunc: validation.StringInSlice([]string{"PROJECT_READ", "PROJECT_WRITE", "PROJECT_ADMIN"}, false),
},
},
}
}
func resourceProjectPermissionsGroupUpdate(d *schema.ResourceData, m interface{}) error {
client := m.(*BitbucketClient)
_, err := client.Put(fmt.Sprintf("/rest/api/1.0/projects/%s/permissions/groups?permission=%s&name=%s",
d.Get("project").(string),
url.QueryEscape(d.Get("permission").(string)),
url.QueryEscape(d.Get("group").(string)),
), nil)
if err != nil {
return err
}
return resourceProjectPermissionsGroupRead(d, m)
}
func resourceProjectPermissionsGroupCreate(d *schema.ResourceData, m interface{}) error {
err := resourceProjectPermissionsGroupUpdate(d, m)
if err != nil {
return err
}
d.SetId(fmt.Sprintf("%s/%s", d.Get("project").(string), d.Get("group").(string)))
return resourceProjectPermissionsGroupRead(d, m)
}
func resourceProjectPermissionsGroupRead(d *schema.ResourceData, m interface{}) error {
id := d.Id()
if id != "" {
parts := strings.Split(id, "/")
if len(parts) == 2 {
d.Set("project", parts[0])
d.Set("group", parts[1])
} else {
return fmt.Errorf("incorrect ID format, should match `project/group`")
}
}
group := d.Get("group").(string)
groups, err := readProjectPermissionsGroups(m, d.Get("project").(string), group)
if err != nil {
return err
}
// API only filters but we need to find an exact match
for _, g := range groups {
if g.Name == group {
d.Set("permission", g.Permission)
break
}
}
return nil
}
func resourceProjectPermissionsGroupDelete(d *schema.ResourceData, m interface{}) error {
client := m.(*BitbucketClient)
_, err := client.Delete(fmt.Sprintf("/rest/api/1.0/projects/%s/permissions/groups?name=%s",
d.Get("project").(string),
url.QueryEscape(d.Get("group").(string)),
))
if err != nil {
return err
}
return resourceProjectPermissionsGroupRead(d, m)
}

View File

@@ -0,0 +1,42 @@
package bitbucket
import (
"fmt"
"math/rand"
"testing"
"time"
"github.com/hashicorp/terraform/helper/resource"
)
func TestAccBitbucketResourceProjectPermissionsGroup(t *testing.T) {
projectKey := fmt.Sprintf("TEST%v", rand.New(rand.NewSource(time.Now().UnixNano())).Int())
config := fmt.Sprintf(`
resource "bitbucketserver_project" "test" {
key = "%v"
name = "test-repo-for-repository-test"
}
resource "bitbucketserver_project_permissions_group" "test" {
project = bitbucketserver_project.test.key
group = "stash-users"
permission = "PROJECT_WRITE"
}
`, projectKey)
resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders,
Steps: []resource.TestStep{
{
Config: config,
Check: resource.ComposeTestCheckFunc(
resource.TestCheckResourceAttr("bitbucketserver_project_permissions_group.test", "id", projectKey+"/stash-users"),
resource.TestCheckResourceAttr("bitbucketserver_project_permissions_group.test", "project", projectKey),
resource.TestCheckResourceAttr("bitbucketserver_project_permissions_group.test", "group", "stash-users"),
resource.TestCheckResourceAttr("bitbucketserver_project_permissions_group.test", "permission", "PROJECT_WRITE"),
),
},
},
})
}