parent
908105f643
commit
d18a812ea4
5 changed files with 229 additions and 1 deletions
|
@ -9,5 +9,6 @@ All notable changes to this project will be documented in this file.
|
||||||
- Added provider configuration.
|
- Added provider configuration.
|
||||||
- Added organizations data-source.
|
- Added organizations data-source.
|
||||||
- Added repositories data-source.
|
- Added repositories data-source.
|
||||||
|
- Added repository actions secret resource.
|
||||||
- Added teams data-source.
|
- Added teams data-source.
|
||||||
- Added users data-source.
|
- Added users data-source.
|
||||||
|
|
36
docs/resources/repository_actions_secret.md
Normal file
36
docs/resources/repository_actions_secret.md
Normal file
|
@ -0,0 +1,36 @@
|
||||||
|
---
|
||||||
|
# generated by https://github.com/hashicorp/terraform-plugin-docs
|
||||||
|
page_title: "forgejo_repository_actions_secret Resource - terraform-provider-forgejo"
|
||||||
|
subcategory: ""
|
||||||
|
description: |-
|
||||||
|
Use this resource to create and manage a repository actions secret.
|
||||||
|
---
|
||||||
|
|
||||||
|
# forgejo_repository_actions_secret (Resource)
|
||||||
|
|
||||||
|
Use this resource to create and manage a repository actions secret.
|
||||||
|
|
||||||
|
## Example Usage
|
||||||
|
|
||||||
|
```terraform
|
||||||
|
resource "forgejo_repository_actions_secret" {
|
||||||
|
data = "secret"
|
||||||
|
name = "test"
|
||||||
|
owner = "adyxax"
|
||||||
|
repository = "example"
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
<!-- schema generated by tfplugindocs -->
|
||||||
|
## Schema
|
||||||
|
|
||||||
|
### Required
|
||||||
|
|
||||||
|
- `data` (String, Sensitive) The secret's data.
|
||||||
|
- `name` (String) The secret's name.
|
||||||
|
- `owner` (String) The secret's owner.
|
||||||
|
- `repository` (String) The secret's repository.
|
||||||
|
|
||||||
|
### Read-Only
|
||||||
|
|
||||||
|
- `created_at` (String) The secret's creation date and time.
|
|
@ -0,0 +1,6 @@
|
||||||
|
resource "forgejo_repository_actions_secret" {
|
||||||
|
data = "secret"
|
||||||
|
name = "test"
|
||||||
|
owner = "adyxax"
|
||||||
|
repository = "example"
|
||||||
|
}
|
|
@ -75,7 +75,9 @@ func (p *Provider) Configure(ctx context.Context, req provider.ConfigureRequest,
|
||||||
}
|
}
|
||||||
|
|
||||||
func (p *Provider) Resources(ctx context.Context) []func() resource.Resource {
|
func (p *Provider) Resources(ctx context.Context) []func() resource.Resource {
|
||||||
return []func() resource.Resource{}
|
return []func() resource.Resource{
|
||||||
|
NewRepositoryActionsSecretResource,
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (p *Provider) DataSources(ctx context.Context) []func() datasource.DataSource {
|
func (p *Provider) DataSources(ctx context.Context) []func() datasource.DataSource {
|
||||||
|
|
183
internal/provider/repository_actions_secret_resource.go
Normal file
183
internal/provider/repository_actions_secret_resource.go
Normal file
|
@ -0,0 +1,183 @@
|
||||||
|
package provider
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"fmt"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"git.adyxax.org/adyxax/terraform-provider-forgejo/internal/client"
|
||||||
|
"github.com/hashicorp/terraform-plugin-framework-timetypes/timetypes"
|
||||||
|
"github.com/hashicorp/terraform-plugin-framework/resource"
|
||||||
|
"github.com/hashicorp/terraform-plugin-framework/resource/schema"
|
||||||
|
"github.com/hashicorp/terraform-plugin-framework/resource/schema/planmodifier"
|
||||||
|
"github.com/hashicorp/terraform-plugin-framework/resource/schema/stringplanmodifier"
|
||||||
|
"github.com/hashicorp/terraform-plugin-framework/types"
|
||||||
|
)
|
||||||
|
|
||||||
|
type RepositoryActionsSecretResource struct {
|
||||||
|
client *client.Client
|
||||||
|
}
|
||||||
|
|
||||||
|
var _ resource.Resource = &RepositoryActionsSecretResource{} // Ensure provider defined types fully satisfy framework interfaces
|
||||||
|
func NewRepositoryActionsSecretResource() resource.Resource {
|
||||||
|
return &RepositoryActionsSecretResource{}
|
||||||
|
}
|
||||||
|
|
||||||
|
type RepositoryActionsSecretResourceModel struct {
|
||||||
|
CreatedAt timetypes.RFC3339 `tfsdk:"created_at"`
|
||||||
|
Data types.String `tfsdk:"data"`
|
||||||
|
Name types.String `tfsdk:"name"`
|
||||||
|
Owner types.String `tfsdk:"owner"`
|
||||||
|
Repository types.String `tfsdk:"repository"`
|
||||||
|
}
|
||||||
|
|
||||||
|
func (d *RepositoryActionsSecretResource) Metadata(ctx context.Context, req resource.MetadataRequest, resp *resource.MetadataResponse) {
|
||||||
|
resp.TypeName = req.ProviderTypeName + "_repository_actions_secret"
|
||||||
|
}
|
||||||
|
|
||||||
|
func (d *RepositoryActionsSecretResource) Schema(ctx context.Context, req resource.SchemaRequest, resp *resource.SchemaResponse) {
|
||||||
|
resp.Schema = schema.Schema{
|
||||||
|
Attributes: map[string]schema.Attribute{
|
||||||
|
"created_at": schema.StringAttribute{
|
||||||
|
Computed: true,
|
||||||
|
CustomType: timetypes.RFC3339Type{},
|
||||||
|
MarkdownDescription: "The secret's creation date and time.",
|
||||||
|
},
|
||||||
|
"data": schema.StringAttribute{
|
||||||
|
MarkdownDescription: "The secret's data.",
|
||||||
|
Required: true,
|
||||||
|
Sensitive: true,
|
||||||
|
},
|
||||||
|
"name": schema.StringAttribute{
|
||||||
|
MarkdownDescription: "The secret's name.",
|
||||||
|
PlanModifiers: []planmodifier.String{
|
||||||
|
stringplanmodifier.RequiresReplace(),
|
||||||
|
},
|
||||||
|
Required: true,
|
||||||
|
},
|
||||||
|
"owner": schema.StringAttribute{
|
||||||
|
MarkdownDescription: "The secret's owner.",
|
||||||
|
PlanModifiers: []planmodifier.String{
|
||||||
|
stringplanmodifier.RequiresReplace(),
|
||||||
|
},
|
||||||
|
Required: true,
|
||||||
|
},
|
||||||
|
"repository": schema.StringAttribute{
|
||||||
|
MarkdownDescription: "The secret's repository.",
|
||||||
|
PlanModifiers: []planmodifier.String{
|
||||||
|
stringplanmodifier.RequiresReplace(),
|
||||||
|
},
|
||||||
|
Required: true,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
MarkdownDescription: "Use this resource to create and manage a repository actions secret.",
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (d *RepositoryActionsSecretResource) Configure(ctx context.Context, req resource.ConfigureRequest, resp *resource.ConfigureResponse) {
|
||||||
|
d.client, _ = req.ProviderData.(*client.Client)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (d *RepositoryActionsSecretResource) Create(ctx context.Context, req resource.CreateRequest, resp *resource.CreateResponse) {
|
||||||
|
var data RepositoryActionsSecretResourceModel
|
||||||
|
resp.Diagnostics.Append(req.Plan.Get(ctx, &data)...)
|
||||||
|
if resp.Diagnostics.HasError() {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
err := d.client.RepoActionSecretPut(
|
||||||
|
ctx,
|
||||||
|
data.Owner.ValueString(),
|
||||||
|
data.Repository.ValueString(),
|
||||||
|
data.Name.ValueString(),
|
||||||
|
data.Data.ValueString())
|
||||||
|
if err != nil {
|
||||||
|
resp.Diagnostics.AddError("CreateRepositoryActionsSecret", fmt.Sprintf("failed to put repository actions secret: %s", err))
|
||||||
|
return
|
||||||
|
}
|
||||||
|
created, err := d.getRepositoryActionsSecret(ctx, data.Owner, data.Repository, data.Name)
|
||||||
|
if err != nil {
|
||||||
|
resp.Diagnostics.AddError("CreateRepositoryActionsSecret", err.Error())
|
||||||
|
return
|
||||||
|
}
|
||||||
|
data.CreatedAt = *created
|
||||||
|
resp.Diagnostics.Append(resp.State.Set(ctx, &data)...)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (d *RepositoryActionsSecretResource) Delete(ctx context.Context, req resource.DeleteRequest, resp *resource.DeleteResponse) {
|
||||||
|
var data RepositoryActionsSecretResourceModel
|
||||||
|
resp.Diagnostics.Append(req.State.Get(ctx, &data)...)
|
||||||
|
if resp.Diagnostics.HasError() {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
err := d.client.RepoActionSecretDelete(
|
||||||
|
ctx,
|
||||||
|
data.Owner.ValueString(),
|
||||||
|
data.Repository.ValueString(),
|
||||||
|
data.Name.ValueString())
|
||||||
|
if err != nil {
|
||||||
|
resp.Diagnostics.AddError("DeleteRepositoryActionsSecret", fmt.Sprintf("failed to delete repository actions secret: %s", err))
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (d *RepositoryActionsSecretResource) getRepositoryActionsSecret(
|
||||||
|
ctx context.Context,
|
||||||
|
owner types.String,
|
||||||
|
repository types.String,
|
||||||
|
name types.String,
|
||||||
|
) (*timetypes.RFC3339, error) {
|
||||||
|
secrets, err := d.client.RepoActionSecretsList(
|
||||||
|
ctx,
|
||||||
|
owner.ValueString(),
|
||||||
|
repository.ValueString())
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("failed to list repository actions secrets: %w", err)
|
||||||
|
}
|
||||||
|
nameStr := strings.ToUpper(name.ValueString())
|
||||||
|
for _, secret := range secrets {
|
||||||
|
if secret.Name == nameStr {
|
||||||
|
created := timetypes.NewRFC3339TimeValue(secret.CreatedAt)
|
||||||
|
return &created, nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil, fmt.Errorf("failed to find repository actions secret")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (d *RepositoryActionsSecretResource) Read(ctx context.Context, req resource.ReadRequest, resp *resource.ReadResponse) {
|
||||||
|
var data RepositoryActionsSecretResourceModel
|
||||||
|
resp.Diagnostics.Append(req.State.Get(ctx, &data)...)
|
||||||
|
if resp.Diagnostics.HasError() {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
created, err := d.getRepositoryActionsSecret(ctx, data.Owner, data.Repository, data.Name)
|
||||||
|
if err != nil {
|
||||||
|
resp.Diagnostics.AddError("CreateRepositoryActionsSecret", err.Error())
|
||||||
|
return
|
||||||
|
}
|
||||||
|
data.CreatedAt = *created
|
||||||
|
resp.Diagnostics.Append(resp.State.Set(ctx, &data)...)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (d *RepositoryActionsSecretResource) Update(ctx context.Context, req resource.UpdateRequest, resp *resource.UpdateResponse) {
|
||||||
|
var data RepositoryActionsSecretResourceModel
|
||||||
|
resp.Diagnostics.Append(req.State.Get(ctx, &data)...)
|
||||||
|
if resp.Diagnostics.HasError() {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
err := d.client.RepoActionSecretPut(
|
||||||
|
ctx,
|
||||||
|
data.Owner.ValueString(),
|
||||||
|
data.Repository.ValueString(),
|
||||||
|
data.Name.ValueString(),
|
||||||
|
data.Data.ValueString())
|
||||||
|
if err != nil {
|
||||||
|
resp.Diagnostics.AddError("UpdateRepositoryActionsSecret", fmt.Sprintf("failed to put repository actions secret: %s", err))
|
||||||
|
return
|
||||||
|
}
|
||||||
|
created, err := d.getRepositoryActionsSecret(ctx, data.Owner, data.Repository, data.Name)
|
||||||
|
if err != nil {
|
||||||
|
resp.Diagnostics.AddError("UpdateRepositoryActionsSecret", err.Error())
|
||||||
|
return
|
||||||
|
}
|
||||||
|
data.CreatedAt = *created
|
||||||
|
}
|
Loading…
Add table
Add a link
Reference in a new issue