mirror of
https://github.com/ysoftdevs/terraform-provider-bitbucketserver.git
synced 2026-01-19 01:57:38 +01:00
Added data.bitbucketserver_global_permissions_groups and data.bitbucketserver_global_permissions_users
This commit is contained in:
34
README.md
34
README.md
@@ -320,7 +320,37 @@ data "bitbucketserver_group_users" "stash-users" {
|
||||
* `users` - List of users containing `name`, `email_address`, `display_name` and `active` keys.
|
||||
|
||||
|
||||
### Project Permissions Groups
|
||||
### Global Permissions - Groups
|
||||
|
||||
Retrieve a list of groups that have been granted at least one global permission.
|
||||
|
||||
```hcl
|
||||
data "bitbucketserver_global_permissions_groups" "all" { }
|
||||
```
|
||||
|
||||
* `filter` - Optional. If specified only group names containing the supplied string will be returned.
|
||||
|
||||
#### Attributes
|
||||
|
||||
* `groups` - List of maps containing `name` and `permission` keys. Available permissions are: `LICENSED_USER`, `PROJECT_CREATE`, `ADMIN`, `SYS_ADMIN`
|
||||
|
||||
|
||||
### Global Permissions - Users
|
||||
|
||||
Retrieve a list of users that have been granted at least one global permission.
|
||||
|
||||
```hcl
|
||||
data "bitbucketserver_global_permissions_users" "proj" { }
|
||||
```
|
||||
|
||||
* `filter` - Optional. If specified only user names containing the supplied string will be returned.
|
||||
|
||||
#### Attributes
|
||||
|
||||
* `users` - List of maps containing `name`, `email_address`, `display_name`, `active` and `permission` keys. Available permissions are: `LICENSED_USER`, `PROJECT_CREATE`, `ADMIN`, `SYS_ADMIN`
|
||||
|
||||
|
||||
### Project Permissions - Groups
|
||||
|
||||
Retrieve a list of groups that have been granted at least one permission for the specified project.
|
||||
|
||||
@@ -338,7 +368,7 @@ data "bitbucketserver_project_permissions_groups" "proj" {
|
||||
* `groups` - List of maps containing `name` and `permission` keys.
|
||||
|
||||
|
||||
### Project Permissions Users
|
||||
### Project Permissions - Users
|
||||
|
||||
Retrieve a list of users that have been granted at least one permission for the specified project.
|
||||
|
||||
|
||||
128
bitbucket/data_global_permissions_groups.go
Normal file
128
bitbucket/data_global_permissions_groups.go
Normal file
@@ -0,0 +1,128 @@
|
||||
package bitbucket
|
||||
|
||||
import (
|
||||
"encoding/json"
|
||||
"fmt"
|
||||
"github.com/hashicorp/terraform/helper/schema"
|
||||
"net/url"
|
||||
)
|
||||
|
||||
type PaginatedGlobalPermissionsGroupsValue struct {
|
||||
Group struct {
|
||||
Name string `json:"name,omitempty"`
|
||||
} `json:"group,omitempty"`
|
||||
Permission string `json:"permission,omitempty"`
|
||||
}
|
||||
|
||||
type GlobalPermissionsGroup struct {
|
||||
Name string
|
||||
Permission string
|
||||
}
|
||||
|
||||
type PaginatedGlobalPermissionsGroups struct {
|
||||
Values []PaginatedGlobalPermissionsGroupsValue `json:"values,omitempty"`
|
||||
Size int `json:"size,omitempty"`
|
||||
Limit int `json:"limit,omitempty"`
|
||||
IsLastPage bool `json:"isLastPage,omitempty"`
|
||||
Start int `json:"start,omitempty"`
|
||||
NextPageStart int `json:"nextPageStart,omitempty"`
|
||||
}
|
||||
|
||||
func dataSourceGlobalPermissionsGroups() *schema.Resource {
|
||||
return &schema.Resource{
|
||||
Read: dataSourceGlobalPermissionsGroupsRead,
|
||||
|
||||
Schema: map[string]*schema.Schema{
|
||||
"filter": {
|
||||
Type: schema.TypeString,
|
||||
Optional: true,
|
||||
},
|
||||
"groups": {
|
||||
Type: schema.TypeList,
|
||||
Computed: true,
|
||||
Elem: &schema.Resource{
|
||||
Schema: map[string]*schema.Schema{
|
||||
"name": {
|
||||
Type: schema.TypeString,
|
||||
Computed: true,
|
||||
},
|
||||
"permission": {
|
||||
Type: schema.TypeString,
|
||||
Computed: true,
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
}
|
||||
}
|
||||
|
||||
func dataSourceGlobalPermissionsGroupsRead(d *schema.ResourceData, m interface{}) error {
|
||||
groups, err := readGlobalPermissionsGroups(m, d.Get("filter").(string))
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
d.SetId("global-permissions-groups")
|
||||
|
||||
var terraformGroups []interface{}
|
||||
for _, group := range groups {
|
||||
g := make(map[string]interface{})
|
||||
g["name"] = group.Name
|
||||
g["permission"] = group.Permission
|
||||
terraformGroups = append(terraformGroups, g)
|
||||
}
|
||||
|
||||
_ = d.Set("groups", terraformGroups)
|
||||
return nil
|
||||
}
|
||||
|
||||
func readGlobalPermissionsGroups(m interface{}, filter string) ([]GlobalPermissionsGroup, error) {
|
||||
client := m.(*BitbucketClient)
|
||||
|
||||
resourceURL := "/rest/api/1.0/admin/permissions/groups"
|
||||
|
||||
if filter != "" {
|
||||
resourceURL += "?filter=" + url.QueryEscape(filter)
|
||||
}
|
||||
|
||||
var groupGroups PaginatedGlobalPermissionsGroups
|
||||
var groups []GlobalPermissionsGroup
|
||||
|
||||
for {
|
||||
resp, err := client.Get(resourceURL)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
decoder := json.NewDecoder(resp.Body)
|
||||
err = decoder.Decode(&groupGroups)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
for _, group := range groupGroups.Values {
|
||||
g := GlobalPermissionsGroup{
|
||||
Name: group.Group.Name,
|
||||
Permission: group.Permission,
|
||||
}
|
||||
groups = append(groups, g)
|
||||
}
|
||||
|
||||
if groupGroups.IsLastPage == false {
|
||||
resourceURL = fmt.Sprintf("/rest/api/1.0/admin/permissions/groups?start=%d",
|
||||
groupGroups.NextPageStart,
|
||||
)
|
||||
|
||||
if filter != "" {
|
||||
resourceURL += "&filter=" + url.QueryEscape(filter)
|
||||
}
|
||||
|
||||
groupGroups = PaginatedGlobalPermissionsGroups{}
|
||||
} else {
|
||||
break
|
||||
}
|
||||
}
|
||||
|
||||
return groups, nil
|
||||
}
|
||||
72
bitbucket/data_global_permissions_groups_test.go
Normal file
72
bitbucket/data_global_permissions_groups_test.go
Normal file
@@ -0,0 +1,72 @@
|
||||
package bitbucket
|
||||
|
||||
import (
|
||||
"github.com/hashicorp/terraform/helper/resource"
|
||||
"testing"
|
||||
)
|
||||
|
||||
func TestAccBitbucketDataGlobalPermissionsGroups_basic(t *testing.T) {
|
||||
config := `
|
||||
data "bitbucketserver_global_permissions_groups" "test" {
|
||||
}
|
||||
`
|
||||
|
||||
resource.Test(t, resource.TestCase{
|
||||
PreCheck: func() { testAccPreCheck(t) },
|
||||
Providers: testAccProviders,
|
||||
Steps: []resource.TestStep{
|
||||
{
|
||||
Config: config,
|
||||
Check: resource.ComposeTestCheckFunc(
|
||||
resource.TestCheckResourceAttr("data.bitbucketserver_global_permissions_groups.test", "groups.#", "1"),
|
||||
resource.TestCheckResourceAttr("data.bitbucketserver_global_permissions_groups.test", "groups.0.name", "stash-users"),
|
||||
resource.TestCheckResourceAttr("data.bitbucketserver_global_permissions_groups.test", "groups.0.permission", "LICENSED_USER"),
|
||||
),
|
||||
},
|
||||
},
|
||||
})
|
||||
}
|
||||
|
||||
func TestAccBitbucketDataGlobalPermissionsGroups_filter(t *testing.T) {
|
||||
config := `
|
||||
data "bitbucketserver_global_permissions_groups" "test" {
|
||||
filter = "stash-users"
|
||||
}
|
||||
`
|
||||
|
||||
resource.Test(t, resource.TestCase{
|
||||
PreCheck: func() { testAccPreCheck(t) },
|
||||
Providers: testAccProviders,
|
||||
Steps: []resource.TestStep{
|
||||
{
|
||||
Config: config,
|
||||
Check: resource.ComposeTestCheckFunc(
|
||||
resource.TestCheckResourceAttr("data.bitbucketserver_global_permissions_groups.test", "groups.#", "1"),
|
||||
resource.TestCheckResourceAttr("data.bitbucketserver_global_permissions_groups.test", "groups.0.name", "stash-users"),
|
||||
resource.TestCheckResourceAttr("data.bitbucketserver_global_permissions_groups.test", "groups.0.permission", "LICENSED_USER"),
|
||||
),
|
||||
},
|
||||
},
|
||||
})
|
||||
}
|
||||
|
||||
func TestAccBitbucketDataGlobalPermissionsGroups_filter_no_match(t *testing.T) {
|
||||
config := `
|
||||
data "bitbucketserver_global_permissions_groups" "test" {
|
||||
filter = "stashing"
|
||||
}
|
||||
`
|
||||
|
||||
resource.Test(t, resource.TestCase{
|
||||
PreCheck: func() { testAccPreCheck(t) },
|
||||
Providers: testAccProviders,
|
||||
Steps: []resource.TestStep{
|
||||
{
|
||||
Config: config,
|
||||
Check: resource.ComposeTestCheckFunc(
|
||||
resource.TestCheckResourceAttr("data.bitbucketserver_global_permissions_groups.test", "groups.#", "0"),
|
||||
),
|
||||
},
|
||||
},
|
||||
})
|
||||
}
|
||||
152
bitbucket/data_global_permissions_users.go
Normal file
152
bitbucket/data_global_permissions_users.go
Normal file
@@ -0,0 +1,152 @@
|
||||
package bitbucket
|
||||
|
||||
import (
|
||||
"encoding/json"
|
||||
"fmt"
|
||||
"github.com/hashicorp/terraform/helper/schema"
|
||||
"net/url"
|
||||
)
|
||||
|
||||
type PaginatedGlobalPermissionsUsersValue struct {
|
||||
User struct {
|
||||
Name string `json:"name,omitempty"`
|
||||
EmailAddress string `json:"emailAddress,omitempty"`
|
||||
DisplayName string `json:"displayName,omitempty"`
|
||||
Active bool `json:"active,omitempty"`
|
||||
} `json:"user,omitempty"`
|
||||
Permission string `json:"permission,omitempty"`
|
||||
}
|
||||
|
||||
type GlobalPermissionsUser struct {
|
||||
Name string
|
||||
EmailAddress string
|
||||
DisplayName string
|
||||
Active bool
|
||||
Permission string
|
||||
}
|
||||
|
||||
type PaginatedGlobalPermissionsUsers struct {
|
||||
Values []PaginatedGlobalPermissionsUsersValue `json:"values,omitempty"`
|
||||
Size int `json:"size,omitempty"`
|
||||
Limit int `json:"limit,omitempty"`
|
||||
IsLastPage bool `json:"isLastPage,omitempty"`
|
||||
Start int `json:"start,omitempty"`
|
||||
NextPageStart int `json:"nextPageStart,omitempty"`
|
||||
}
|
||||
|
||||
func dataSourceGlobalPermissionsUsers() *schema.Resource {
|
||||
return &schema.Resource{
|
||||
Read: dataSourceGlobalPermissionsUsersRead,
|
||||
|
||||
Schema: map[string]*schema.Schema{
|
||||
"filter": {
|
||||
Type: schema.TypeString,
|
||||
Optional: true,
|
||||
},
|
||||
"users": {
|
||||
Type: schema.TypeList,
|
||||
Computed: true,
|
||||
Elem: &schema.Resource{
|
||||
Schema: map[string]*schema.Schema{
|
||||
"name": {
|
||||
Type: schema.TypeString,
|
||||
Computed: true,
|
||||
},
|
||||
"email_address": {
|
||||
Type: schema.TypeString,
|
||||
Computed: true,
|
||||
},
|
||||
"display_name": {
|
||||
Type: schema.TypeString,
|
||||
Computed: true,
|
||||
},
|
||||
"active": {
|
||||
Type: schema.TypeBool,
|
||||
Computed: true,
|
||||
},
|
||||
"permission": {
|
||||
Type: schema.TypeString,
|
||||
Computed: true,
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
}
|
||||
}
|
||||
|
||||
func dataSourceGlobalPermissionsUsersRead(d *schema.ResourceData, m interface{}) error {
|
||||
users, err := readGlobalPermissionsUsers(m, d.Get("filter").(string))
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
d.SetId("global-permissions-users")
|
||||
|
||||
var terraformUsers []interface{}
|
||||
for _, group := range users {
|
||||
g := make(map[string]interface{})
|
||||
g["name"] = group.Name
|
||||
g["email_address"] = group.EmailAddress
|
||||
g["display_name"] = group.DisplayName
|
||||
g["active"] = group.Active
|
||||
g["permission"] = group.Permission
|
||||
terraformUsers = append(terraformUsers, g)
|
||||
}
|
||||
|
||||
_ = d.Set("users", terraformUsers)
|
||||
return nil
|
||||
}
|
||||
|
||||
func readGlobalPermissionsUsers(m interface{}, filter string) ([]GlobalPermissionsUser, error) {
|
||||
client := m.(*BitbucketClient)
|
||||
|
||||
resourceURL := "/rest/api/1.0/admin/permissions/users"
|
||||
|
||||
if filter != "" {
|
||||
resourceURL += "?filter=" + url.QueryEscape(filter)
|
||||
}
|
||||
|
||||
var globalUsers PaginatedGlobalPermissionsUsers
|
||||
var users []GlobalPermissionsUser
|
||||
|
||||
for {
|
||||
resp, err := client.Get(resourceURL)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
decoder := json.NewDecoder(resp.Body)
|
||||
err = decoder.Decode(&globalUsers)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
for _, user := range globalUsers.Values {
|
||||
g := GlobalPermissionsUser{
|
||||
Name: user.User.Name,
|
||||
EmailAddress: user.User.EmailAddress,
|
||||
DisplayName: user.User.DisplayName,
|
||||
Active: user.User.Active,
|
||||
Permission: user.Permission,
|
||||
}
|
||||
users = append(users, g)
|
||||
}
|
||||
|
||||
if globalUsers.IsLastPage == false {
|
||||
resourceURL = fmt.Sprintf("/rest/api/1.0/admin/permissions/users?start=%d",
|
||||
globalUsers.NextPageStart,
|
||||
)
|
||||
|
||||
if filter != "" {
|
||||
resourceURL += "&filter=" + url.QueryEscape(filter)
|
||||
}
|
||||
|
||||
globalUsers = PaginatedGlobalPermissionsUsers{}
|
||||
} else {
|
||||
break
|
||||
}
|
||||
}
|
||||
|
||||
return users, nil
|
||||
}
|
||||
78
bitbucket/data_global_permissions_users_test.go
Normal file
78
bitbucket/data_global_permissions_users_test.go
Normal file
@@ -0,0 +1,78 @@
|
||||
package bitbucket
|
||||
|
||||
import (
|
||||
"github.com/hashicorp/terraform/helper/resource"
|
||||
"testing"
|
||||
)
|
||||
|
||||
func TestAccBitbucketDataGlobalPermissionsUsers_basic(t *testing.T) {
|
||||
config := `
|
||||
data "bitbucketserver_global_permissions_users" "test" {
|
||||
}
|
||||
`
|
||||
|
||||
resource.Test(t, resource.TestCase{
|
||||
PreCheck: func() { testAccPreCheck(t) },
|
||||
Providers: testAccProviders,
|
||||
Steps: []resource.TestStep{
|
||||
{
|
||||
Config: config,
|
||||
Check: resource.ComposeTestCheckFunc(
|
||||
resource.TestCheckResourceAttr("data.bitbucketserver_global_permissions_users.test", "users.#", "1"),
|
||||
resource.TestCheckResourceAttr("data.bitbucketserver_global_permissions_users.test", "users.0.name", "admin"),
|
||||
resource.TestCheckResourceAttr("data.bitbucketserver_global_permissions_users.test", "users.0.display_name", "Admin"),
|
||||
resource.TestCheckResourceAttr("data.bitbucketserver_global_permissions_users.test", "users.0.email_address", "admin@example.com"),
|
||||
resource.TestCheckResourceAttr("data.bitbucketserver_global_permissions_users.test", "users.0.active", "true"),
|
||||
resource.TestCheckResourceAttr("data.bitbucketserver_global_permissions_users.test", "users.0.permission", "SYS_ADMIN"),
|
||||
),
|
||||
},
|
||||
},
|
||||
})
|
||||
}
|
||||
|
||||
func TestAccBitbucketDataGlobalPermissionsUsers_filter(t *testing.T) {
|
||||
config := `
|
||||
data "bitbucketserver_global_permissions_users" "test" {
|
||||
filter = "admin"
|
||||
}
|
||||
`
|
||||
|
||||
resource.Test(t, resource.TestCase{
|
||||
PreCheck: func() { testAccPreCheck(t) },
|
||||
Providers: testAccProviders,
|
||||
Steps: []resource.TestStep{
|
||||
{
|
||||
Config: config,
|
||||
Check: resource.ComposeTestCheckFunc(
|
||||
resource.TestCheckResourceAttr("data.bitbucketserver_global_permissions_users.test", "users.#", "1"),
|
||||
resource.TestCheckResourceAttr("data.bitbucketserver_global_permissions_users.test", "users.0.name", "admin"),
|
||||
resource.TestCheckResourceAttr("data.bitbucketserver_global_permissions_users.test", "users.0.display_name", "Admin"),
|
||||
resource.TestCheckResourceAttr("data.bitbucketserver_global_permissions_users.test", "users.0.email_address", "admin@example.com"),
|
||||
resource.TestCheckResourceAttr("data.bitbucketserver_global_permissions_users.test", "users.0.active", "true"),
|
||||
resource.TestCheckResourceAttr("data.bitbucketserver_global_permissions_users.test", "users.0.permission", "SYS_ADMIN"),
|
||||
),
|
||||
},
|
||||
},
|
||||
})
|
||||
}
|
||||
|
||||
func TestAccBitbucketDataGlobalPermissionsUsers_filter_no_match(t *testing.T) {
|
||||
config := `
|
||||
data "bitbucketserver_global_permissions_users" "test" {
|
||||
filter = "admining-the-country-side"
|
||||
}
|
||||
`
|
||||
|
||||
resource.Test(t, resource.TestCase{
|
||||
PreCheck: func() { testAccPreCheck(t) },
|
||||
Providers: testAccProviders,
|
||||
Steps: []resource.TestStep{
|
||||
{
|
||||
Config: config,
|
||||
Check: resource.ComposeTestCheckFunc(
|
||||
resource.TestCheckResourceAttr("data.bitbucketserver_global_permissions_users.test", "users.#", "0"),
|
||||
),
|
||||
},
|
||||
},
|
||||
})
|
||||
}
|
||||
@@ -30,6 +30,8 @@ func Provider() terraform.ResourceProvider {
|
||||
ConfigureFunc: providerConfigure,
|
||||
DataSourcesMap: map[string]*schema.Resource{
|
||||
"bitbucketserver_application_properties": dataSourceApplicationProperties(),
|
||||
"bitbucketserver_global_permissions_groups": dataSourceGlobalPermissionsGroups(),
|
||||
"bitbucketserver_global_permissions_users": dataSourceGlobalPermissionsUsers(),
|
||||
"bitbucketserver_groups": dataSourceGroups(),
|
||||
"bitbucketserver_group_users": dataSourceGroupUsers(),
|
||||
"bitbucketserver_project_permissions_groups": dataSourceProjectPermissionsGroups(),
|
||||
|
||||
Reference in New Issue
Block a user