mirror of
https://github.com/Kichiyaki/terraform-provider-woodpecker.git
synced 2024-06-18 10:37:39 +00:00
feat: woodpecker 2.0 support (#19)
This commit is contained in:
parent
1763f24888
commit
014265dc57
10
.github/workflows/ci.yml
vendored
10
.github/workflows/ci.yml
vendored
|
@ -31,13 +31,13 @@ jobs:
|
||||||
- uses: golangci/golangci-lint-action@v3
|
- uses: golangci/golangci-lint-action@v3
|
||||||
with:
|
with:
|
||||||
version: v1.55
|
version: v1.55
|
||||||
- name: Gitea 1.20 & Woodpecker 1.0
|
- name: Gitea 1.21 & Woodpecker 2.0
|
||||||
run: go test -race -coverprofile=coverage.txt -covermode=atomic ./...
|
run: go test -race -coverprofile=coverage.txt -covermode=atomic ./...
|
||||||
env:
|
env:
|
||||||
GITEA_IMAGE: gitea/gitea:1.20
|
GITEA_IMAGE: gitea/gitea:1.21
|
||||||
WOODPECKER_IMAGE: woodpeckerci/woodpecker-server:v1.0
|
WOODPECKER_IMAGE: woodpeckerci/woodpecker-server:v2.0
|
||||||
- name: Forgejo 1.20 & Woodpecker 1.0
|
- name: Forgejo 1.20 & Woodpecker 2.0
|
||||||
run: go test -race -coverprofile=coverage.txt -covermode=atomic ./...
|
run: go test -race -coverprofile=coverage.txt -covermode=atomic ./...
|
||||||
env:
|
env:
|
||||||
GITEA_IMAGE: codeberg.org/forgejo/forgejo:1.20
|
GITEA_IMAGE: codeberg.org/forgejo/forgejo:1.20
|
||||||
WOODPECKER_IMAGE: woodpeckerci/woodpecker-server:v1.0
|
WOODPECKER_IMAGE: woodpeckerci/woodpecker-server:v2.0
|
||||||
|
|
|
@ -1,6 +1,8 @@
|
||||||
run:
|
run:
|
||||||
tests: true
|
tests: true
|
||||||
timeout: 5m
|
timeout: 5m
|
||||||
|
skip-dirs:
|
||||||
|
- internal/woodpecker
|
||||||
|
|
||||||
linters:
|
linters:
|
||||||
disable-all: true
|
disable-all: true
|
||||||
|
|
|
@ -36,4 +36,3 @@ data "woodpecker_repository_secret" "test_secret" {
|
||||||
- `events` (Set of String) events for which the secret is available (push, tag, pull_request, deployment, cron, manual)
|
- `events` (Set of String) events for which the secret is available (push, tag, pull_request, deployment, cron, manual)
|
||||||
- `id` (Number) the secret's id
|
- `id` (Number) the secret's id
|
||||||
- `images` (Set of String) list of Docker images for which this secret is available
|
- `images` (Set of String) list of Docker images for which this secret is available
|
||||||
- `plugins_only` (Boolean) whether secret is only available for [plugins](https://woodpecker-ci.org/docs/usage/plugins/plugins)
|
|
||||||
|
|
|
@ -30,4 +30,3 @@ data "woodpecker_secret" "test_secret" {
|
||||||
- `events` (Set of String) events for which the secret is available (push, tag, pull_request, deployment, cron, manual)
|
- `events` (Set of String) events for which the secret is available (push, tag, pull_request, deployment, cron, manual)
|
||||||
- `id` (Number) the secret's id
|
- `id` (Number) the secret's id
|
||||||
- `images` (Set of String) list of Docker images for which this secret is available
|
- `images` (Set of String) list of Docker images for which this secret is available
|
||||||
- `plugins_only` (Boolean) whether secret is only available for [plugins](https://woodpecker-ci.org/docs/usage/plugins/plugins)
|
|
||||||
|
|
|
@ -4,12 +4,17 @@ page_title: "woodpecker Provider"
|
||||||
subcategory: ""
|
subcategory: ""
|
||||||
description: |-
|
description: |-
|
||||||
A Terraform provider used to interact with Woodpecker CI https://woodpecker-ci.org/ resources.
|
A Terraform provider used to interact with Woodpecker CI https://woodpecker-ci.org/ resources.
|
||||||
|
v0.2.x and later versions of the provider work with Woodpecker 2.x+v0.1.x version of the provider works with Woodpecker 2.0.0>1.x>=1.0.0
|
||||||
---
|
---
|
||||||
|
|
||||||
# woodpecker Provider
|
# woodpecker Provider
|
||||||
|
|
||||||
A Terraform provider used to interact with [Woodpecker CI](https://woodpecker-ci.org/) resources.
|
A Terraform provider used to interact with [Woodpecker CI](https://woodpecker-ci.org/) resources.
|
||||||
|
|
||||||
|
|
||||||
|
- v0.2.x and later versions of the provider work with Woodpecker 2.x+
|
||||||
|
- v0.1.x version of the provider works with Woodpecker 2.0.0>1.x>=1.0.0
|
||||||
|
|
||||||
## Example Usage
|
## Example Usage
|
||||||
|
|
||||||
```terraform
|
```terraform
|
||||||
|
|
|
@ -40,7 +40,6 @@ resource "woodpecker_repository_secret" "test" {
|
||||||
### Optional
|
### Optional
|
||||||
|
|
||||||
- `images` (Set of String) list of Docker images for which this secret is available, leave blank to allow all images
|
- `images` (Set of String) list of Docker images for which this secret is available, leave blank to allow all images
|
||||||
- `plugins_only` (Boolean) whether secret is only available for [plugins](https://woodpecker-ci.org/docs/usage/plugins/plugins)
|
|
||||||
|
|
||||||
### Read-Only
|
### Read-Only
|
||||||
|
|
||||||
|
|
|
@ -33,7 +33,6 @@ resource "woodpecker_secret" "test" {
|
||||||
### Optional
|
### Optional
|
||||||
|
|
||||||
- `images` (Set of String) list of Docker images for which this secret is available, leave blank to allow all images
|
- `images` (Set of String) list of Docker images for which this secret is available, leave blank to allow all images
|
||||||
- `plugins_only` (Boolean) whether secret is only available for [plugins](https://woodpecker-ci.org/docs/usage/plugins/plugins)
|
|
||||||
|
|
||||||
### Read-Only
|
### Read-Only
|
||||||
|
|
||||||
|
|
6
go.mod
6
go.mod
|
@ -4,13 +4,13 @@ go 1.21
|
||||||
|
|
||||||
require (
|
require (
|
||||||
code.gitea.io/sdk/gitea v0.16.0
|
code.gitea.io/sdk/gitea v0.16.0
|
||||||
|
github.com/Masterminds/semver/v3 v3.2.1
|
||||||
github.com/google/uuid v1.4.0
|
github.com/google/uuid v1.4.0
|
||||||
github.com/hashicorp/terraform-plugin-framework v1.3.5
|
github.com/hashicorp/terraform-plugin-framework v1.3.5
|
||||||
github.com/hashicorp/terraform-plugin-framework-validators v0.12.0
|
github.com/hashicorp/terraform-plugin-framework-validators v0.12.0
|
||||||
github.com/hashicorp/terraform-plugin-go v0.18.0
|
github.com/hashicorp/terraform-plugin-go v0.18.0
|
||||||
github.com/hashicorp/terraform-plugin-testing v1.5.1
|
github.com/hashicorp/terraform-plugin-testing v1.5.1
|
||||||
github.com/ory/dockertest/v3 v3.10.0
|
github.com/ory/dockertest/v3 v3.10.0
|
||||||
go.woodpecker-ci.org/woodpecker v1.0.5
|
|
||||||
golang.org/x/oauth2 v0.14.0
|
golang.org/x/oauth2 v0.14.0
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -31,6 +31,7 @@ require (
|
||||||
github.com/docker/go-units v0.5.0 // indirect
|
github.com/docker/go-units v0.5.0 // indirect
|
||||||
github.com/fatih/color v1.13.0 // indirect
|
github.com/fatih/color v1.13.0 // indirect
|
||||||
github.com/go-fed/httpsig v1.1.0 // indirect
|
github.com/go-fed/httpsig v1.1.0 // indirect
|
||||||
|
github.com/go-sql-driver/mysql v1.7.1 // indirect
|
||||||
github.com/gogo/protobuf v1.3.2 // indirect
|
github.com/gogo/protobuf v1.3.2 // indirect
|
||||||
github.com/golang/protobuf v1.5.3 // indirect
|
github.com/golang/protobuf v1.5.3 // indirect
|
||||||
github.com/google/go-cmp v0.6.0 // indirect
|
github.com/google/go-cmp v0.6.0 // indirect
|
||||||
|
@ -55,6 +56,7 @@ require (
|
||||||
github.com/hashicorp/terraform-svchost v0.1.1 // indirect
|
github.com/hashicorp/terraform-svchost v0.1.1 // indirect
|
||||||
github.com/hashicorp/yamux v0.0.0-20181012175058-2f1d1f20f75d // indirect
|
github.com/hashicorp/yamux v0.0.0-20181012175058-2f1d1f20f75d // indirect
|
||||||
github.com/imdario/mergo v0.3.13 // indirect
|
github.com/imdario/mergo v0.3.13 // indirect
|
||||||
|
github.com/lib/pq v1.10.9 // indirect
|
||||||
github.com/mattn/go-colorable v0.1.12 // indirect
|
github.com/mattn/go-colorable v0.1.12 // indirect
|
||||||
github.com/mattn/go-isatty v0.0.19 // indirect
|
github.com/mattn/go-isatty v0.0.19 // indirect
|
||||||
github.com/mitchellh/copystructure v1.2.0 // indirect
|
github.com/mitchellh/copystructure v1.2.0 // indirect
|
||||||
|
@ -69,6 +71,7 @@ require (
|
||||||
github.com/opencontainers/runc v1.1.5 // indirect
|
github.com/opencontainers/runc v1.1.5 // indirect
|
||||||
github.com/pkg/errors v0.9.1 // indirect
|
github.com/pkg/errors v0.9.1 // indirect
|
||||||
github.com/sirupsen/logrus v1.9.0 // indirect
|
github.com/sirupsen/logrus v1.9.0 // indirect
|
||||||
|
github.com/stretchr/testify v1.8.3 // indirect
|
||||||
github.com/vmihailenco/msgpack v4.0.4+incompatible // indirect
|
github.com/vmihailenco/msgpack v4.0.4+incompatible // indirect
|
||||||
github.com/vmihailenco/msgpack/v5 v5.4.1 // indirect
|
github.com/vmihailenco/msgpack/v5 v5.4.1 // indirect
|
||||||
github.com/vmihailenco/tagparser/v2 v2.0.0 // indirect
|
github.com/vmihailenco/tagparser/v2 v2.0.0 // indirect
|
||||||
|
@ -88,4 +91,5 @@ require (
|
||||||
google.golang.org/grpc v1.59.0 // indirect
|
google.golang.org/grpc v1.59.0 // indirect
|
||||||
google.golang.org/protobuf v1.31.0 // indirect
|
google.golang.org/protobuf v1.31.0 // indirect
|
||||||
gopkg.in/yaml.v2 v2.4.0 // indirect
|
gopkg.in/yaml.v2 v2.4.0 // indirect
|
||||||
|
gotest.tools/v3 v3.4.0 // indirect
|
||||||
)
|
)
|
||||||
|
|
8
go.sum
8
go.sum
|
@ -1,10 +1,10 @@
|
||||||
code.gitea.io/sdk/gitea v0.15.1-0.20230815151548-091528835fc2 h1:IFmjjaW1PUn4yUB9a3F59KjVcVMB8TDdocL5Cqy6Xrk=
|
|
||||||
code.gitea.io/sdk/gitea v0.15.1-0.20230815151548-091528835fc2/go.mod h1:ndkDk99BnfiUCCYEUhpNzi0lpmApXlwRFqClBlOlEBg=
|
|
||||||
code.gitea.io/sdk/gitea v0.16.0 h1:gAfssETO1Hv9QbE+/nhWu7EjoFQYKt6kPoyDytQgw00=
|
code.gitea.io/sdk/gitea v0.16.0 h1:gAfssETO1Hv9QbE+/nhWu7EjoFQYKt6kPoyDytQgw00=
|
||||||
code.gitea.io/sdk/gitea v0.16.0/go.mod h1:ndkDk99BnfiUCCYEUhpNzi0lpmApXlwRFqClBlOlEBg=
|
code.gitea.io/sdk/gitea v0.16.0/go.mod h1:ndkDk99BnfiUCCYEUhpNzi0lpmApXlwRFqClBlOlEBg=
|
||||||
github.com/Azure/go-ansiterm v0.0.0-20210617225240-d185dfc1b5a1 h1:UQHMgLO+TxOElx5B5HZ4hJQsoJ/PvUvKRhJHDQXO8P8=
|
github.com/Azure/go-ansiterm v0.0.0-20210617225240-d185dfc1b5a1 h1:UQHMgLO+TxOElx5B5HZ4hJQsoJ/PvUvKRhJHDQXO8P8=
|
||||||
github.com/Azure/go-ansiterm v0.0.0-20210617225240-d185dfc1b5a1/go.mod h1:xomTg63KZ2rFqZQzSB4Vz2SUXa1BpHTVz9L5PTmPC4E=
|
github.com/Azure/go-ansiterm v0.0.0-20210617225240-d185dfc1b5a1/go.mod h1:xomTg63KZ2rFqZQzSB4Vz2SUXa1BpHTVz9L5PTmPC4E=
|
||||||
github.com/BurntSushi/toml v0.3.1/go.mod h1:xHWCNGjB5oqiDr8zfno3MHue2Ht5sIBksp03qcyfWMU=
|
github.com/BurntSushi/toml v0.3.1/go.mod h1:xHWCNGjB5oqiDr8zfno3MHue2Ht5sIBksp03qcyfWMU=
|
||||||
|
github.com/Masterminds/semver/v3 v3.2.1 h1:RN9w6+7QoMeJVGyfmbcgs28Br8cvmnucEXnY0rYXWg0=
|
||||||
|
github.com/Masterminds/semver/v3 v3.2.1/go.mod h1:qvl/7zhW3nngYb5+80sSMF+FG2BjYrf8m9wsX0PNOMQ=
|
||||||
github.com/Microsoft/go-winio v0.6.1 h1:9/kr64B9VUZrLm5YYwbGtUJnMgqWVOdUAXu6Migciow=
|
github.com/Microsoft/go-winio v0.6.1 h1:9/kr64B9VUZrLm5YYwbGtUJnMgqWVOdUAXu6Migciow=
|
||||||
github.com/Microsoft/go-winio v0.6.1/go.mod h1:LRdKpFKfdobln8UmuiYcKPot9D2v6svN5+sAH+4kjUM=
|
github.com/Microsoft/go-winio v0.6.1/go.mod h1:LRdKpFKfdobln8UmuiYcKPot9D2v6svN5+sAH+4kjUM=
|
||||||
github.com/Nvveen/Gotty v0.0.0-20120604004816-cd527374f1e5 h1:TngWCqHvy9oXAN6lEVMRuU21PR1EtLVZJmdB18Gu3Rw=
|
github.com/Nvveen/Gotty v0.0.0-20120604004816-cd527374f1e5 h1:TngWCqHvy9oXAN6lEVMRuU21PR1EtLVZJmdB18Gu3Rw=
|
||||||
|
@ -233,8 +233,6 @@ github.com/yuin/goldmark v1.1.27/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9de
|
||||||
github.com/yuin/goldmark v1.2.1/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
|
github.com/yuin/goldmark v1.2.1/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
|
||||||
github.com/zclconf/go-cty v1.13.3 h1:m+b9q3YDbg6Bec5rr+KGy1MzEVzY/jC2X+YX4yqKtHI=
|
github.com/zclconf/go-cty v1.13.3 h1:m+b9q3YDbg6Bec5rr+KGy1MzEVzY/jC2X+YX4yqKtHI=
|
||||||
github.com/zclconf/go-cty v1.13.3/go.mod h1:YKQzy/7pZ7iq2jNFzy5go57xdxdWoLLpaEp4u238AE0=
|
github.com/zclconf/go-cty v1.13.3/go.mod h1:YKQzy/7pZ7iq2jNFzy5go57xdxdWoLLpaEp4u238AE0=
|
||||||
go.woodpecker-ci.org/woodpecker v1.0.5 h1:pPkSrfzK1y2PRYokJVJdyyvot7IG056Hdin/4Y38C8M=
|
|
||||||
go.woodpecker-ci.org/woodpecker v1.0.5/go.mod h1:R9G3k/rj+INGcHgrCd/BlhOaKQGdru5agHMIRZsIDVk=
|
|
||||||
golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
|
golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
|
||||||
golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
|
golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
|
||||||
golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
|
golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
|
||||||
|
@ -276,6 +274,7 @@ golang.org/x/sys v0.0.0-20200116001909-b77594299b42/go.mod h1:h1NjWce9XRLGQEsW7w
|
||||||
golang.org/x/sys v0.0.0-20200223170610-d5e6a3e2c0ae/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
golang.org/x/sys v0.0.0-20200223170610-d5e6a3e2c0ae/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
||||||
golang.org/x/sys v0.0.0-20200930185726-fdedc70b468f/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
golang.org/x/sys v0.0.0-20200930185726-fdedc70b468f/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
||||||
golang.org/x/sys v0.0.0-20201119102817-f84b799fce68/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
golang.org/x/sys v0.0.0-20201119102817-f84b799fce68/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
||||||
|
golang.org/x/sys v0.0.0-20210119212857-b64e53b001e4/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
||||||
golang.org/x/sys v0.0.0-20210124154548-22da62e12c0c/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
golang.org/x/sys v0.0.0-20210124154548-22da62e12c0c/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
||||||
golang.org/x/sys v0.0.0-20210423082822-04245dca01da/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
golang.org/x/sys v0.0.0-20210423082822-04245dca01da/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
||||||
golang.org/x/sys v0.0.0-20210615035016-665e8c7367d1/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
golang.org/x/sys v0.0.0-20210615035016-665e8c7367d1/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
|
@ -304,6 +303,7 @@ golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGm
|
||||||
golang.org/x/tools v0.0.0-20191119224855-298f0cb1881e/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
|
golang.org/x/tools v0.0.0-20191119224855-298f0cb1881e/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
|
||||||
golang.org/x/tools v0.0.0-20200619180055-7c47624df98f/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
|
golang.org/x/tools v0.0.0-20200619180055-7c47624df98f/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
|
||||||
golang.org/x/tools v0.0.0-20210106214847-113979e3529a/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
|
golang.org/x/tools v0.0.0-20210106214847-113979e3529a/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
|
||||||
|
golang.org/x/tools v0.1.0/go.mod h1:xkSsbof2nBLbhDlRMhhhyNLN/zl3eTqcnHD5viDpcZ0=
|
||||||
golang.org/x/tools v0.7.0 h1:W4OVu8VVOaIO0yzWMNdepAulS7YfoS3Zabrm8DOXXU4=
|
golang.org/x/tools v0.7.0 h1:W4OVu8VVOaIO0yzWMNdepAulS7YfoS3Zabrm8DOXXU4=
|
||||||
golang.org/x/tools v0.7.0/go.mod h1:4pg6aUX35JBAogB10C9AtvVL+qowtN4pT3CGSQex14s=
|
golang.org/x/tools v0.7.0/go.mod h1:4pg6aUX35JBAogB10C9AtvVL+qowtN4pT3CGSQex14s=
|
||||||
golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
|
golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
|
||||||
|
|
|
@ -4,9 +4,9 @@ import (
|
||||||
"context"
|
"context"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
|
||||||
|
"github.com/Kichiyaki/terraform-provider-woodpecker/internal/woodpecker"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/datasource"
|
"github.com/hashicorp/terraform-plugin-framework/datasource"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/datasource/schema"
|
"github.com/hashicorp/terraform-plugin-framework/datasource/schema"
|
||||||
"go.woodpecker-ci.org/woodpecker/woodpecker-go/woodpecker"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
type repositoryDataSource struct {
|
type repositoryDataSource struct {
|
||||||
|
|
|
@ -4,9 +4,9 @@ import (
|
||||||
"context"
|
"context"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
|
||||||
|
"github.com/Kichiyaki/terraform-provider-woodpecker/internal/woodpecker"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/datasource"
|
"github.com/hashicorp/terraform-plugin-framework/datasource"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/datasource/schema"
|
"github.com/hashicorp/terraform-plugin-framework/datasource/schema"
|
||||||
"go.woodpecker-ci.org/woodpecker/woodpecker-go/woodpecker"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
type repositoryCronDataSource struct {
|
type repositoryCronDataSource struct {
|
||||||
|
|
|
@ -4,9 +4,9 @@ import (
|
||||||
"context"
|
"context"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
|
||||||
|
"github.com/Kichiyaki/terraform-provider-woodpecker/internal/woodpecker"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/datasource"
|
"github.com/hashicorp/terraform-plugin-framework/datasource"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/datasource/schema"
|
"github.com/hashicorp/terraform-plugin-framework/datasource/schema"
|
||||||
"go.woodpecker-ci.org/woodpecker/woodpecker-go/woodpecker"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
type repositoryRegistryDataSource struct {
|
type repositoryRegistryDataSource struct {
|
||||||
|
|
|
@ -4,10 +4,10 @@ import (
|
||||||
"context"
|
"context"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
|
||||||
|
"github.com/Kichiyaki/terraform-provider-woodpecker/internal/woodpecker"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/datasource"
|
"github.com/hashicorp/terraform-plugin-framework/datasource"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/datasource/schema"
|
"github.com/hashicorp/terraform-plugin-framework/datasource/schema"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/types"
|
"github.com/hashicorp/terraform-plugin-framework/types"
|
||||||
"go.woodpecker-ci.org/woodpecker/woodpecker-go/woodpecker"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
type repositorySecretDataSource struct {
|
type repositorySecretDataSource struct {
|
||||||
|
@ -54,11 +54,6 @@ func (d *repositorySecretDataSource) Schema(
|
||||||
Computed: true,
|
Computed: true,
|
||||||
Description: "events for which the secret is available (push, tag, pull_request, deployment, cron, manual)",
|
Description: "events for which the secret is available (push, tag, pull_request, deployment, cron, manual)",
|
||||||
},
|
},
|
||||||
"plugins_only": schema.BoolAttribute{
|
|
||||||
Computed: true,
|
|
||||||
MarkdownDescription: "whether secret is only available for " +
|
|
||||||
"[plugins](https://woodpecker-ci.org/docs/usage/plugins/plugins)",
|
|
||||||
},
|
|
||||||
"images": schema.SetAttribute{
|
"images": schema.SetAttribute{
|
||||||
ElementType: types.StringType,
|
ElementType: types.StringType,
|
||||||
Computed: true,
|
Computed: true,
|
||||||
|
|
|
@ -41,7 +41,6 @@ data "woodpecker_repository_secret" "test_secret" {
|
||||||
resource.TestCheckResourceAttrSet("data.woodpecker_repository_secret.test_secret", "repository_id"),
|
resource.TestCheckResourceAttrSet("data.woodpecker_repository_secret.test_secret", "repository_id"),
|
||||||
resource.TestCheckResourceAttr("data.woodpecker_repository_secret.test_secret", "name", name),
|
resource.TestCheckResourceAttr("data.woodpecker_repository_secret.test_secret", "name", name),
|
||||||
resource.TestCheckTypeSetElemAttr("data.woodpecker_repository_secret.test_secret", "events.*", "push"),
|
resource.TestCheckTypeSetElemAttr("data.woodpecker_repository_secret.test_secret", "events.*", "push"),
|
||||||
resource.TestCheckResourceAttr("data.woodpecker_repository_secret.test_secret", "plugins_only", "false"),
|
|
||||||
),
|
),
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
|
|
@ -4,10 +4,10 @@ import (
|
||||||
"context"
|
"context"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
|
||||||
|
"github.com/Kichiyaki/terraform-provider-woodpecker/internal/woodpecker"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/datasource"
|
"github.com/hashicorp/terraform-plugin-framework/datasource"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/datasource/schema"
|
"github.com/hashicorp/terraform-plugin-framework/datasource/schema"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/types"
|
"github.com/hashicorp/terraform-plugin-framework/types"
|
||||||
"go.woodpecker-ci.org/woodpecker/woodpecker-go/woodpecker"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
type secretDataSource struct {
|
type secretDataSource struct {
|
||||||
|
@ -46,11 +46,6 @@ func (d *secretDataSource) Schema(_ context.Context, _ datasource.SchemaRequest,
|
||||||
Computed: true,
|
Computed: true,
|
||||||
Description: "events for which the secret is available (push, tag, pull_request, deployment, cron, manual)",
|
Description: "events for which the secret is available (push, tag, pull_request, deployment, cron, manual)",
|
||||||
},
|
},
|
||||||
"plugins_only": schema.BoolAttribute{
|
|
||||||
Computed: true,
|
|
||||||
MarkdownDescription: "whether secret is only available for " +
|
|
||||||
"[plugins](https://woodpecker-ci.org/docs/usage/plugins/plugins)",
|
|
||||||
},
|
|
||||||
"images": schema.SetAttribute{
|
"images": schema.SetAttribute{
|
||||||
ElementType: types.StringType,
|
ElementType: types.StringType,
|
||||||
Computed: true,
|
Computed: true,
|
||||||
|
|
|
@ -33,7 +33,6 @@ data "woodpecker_secret" "test_secret" {
|
||||||
resource.TestCheckResourceAttrSet("data.woodpecker_secret.test_secret", "id"),
|
resource.TestCheckResourceAttrSet("data.woodpecker_secret.test_secret", "id"),
|
||||||
resource.TestCheckResourceAttr("data.woodpecker_secret.test_secret", "name", name),
|
resource.TestCheckResourceAttr("data.woodpecker_secret.test_secret", "name", name),
|
||||||
resource.TestCheckTypeSetElemAttr("data.woodpecker_secret.test_secret", "events.*", "push"),
|
resource.TestCheckTypeSetElemAttr("data.woodpecker_secret.test_secret", "events.*", "push"),
|
||||||
resource.TestCheckResourceAttr("data.woodpecker_secret.test_secret", "plugins_only", "false"),
|
|
||||||
),
|
),
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
|
|
@ -4,9 +4,9 @@ import (
|
||||||
"context"
|
"context"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
|
||||||
|
"github.com/Kichiyaki/terraform-provider-woodpecker/internal/woodpecker"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/datasource"
|
"github.com/hashicorp/terraform-plugin-framework/datasource"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/datasource/schema"
|
"github.com/hashicorp/terraform-plugin-framework/datasource/schema"
|
||||||
"go.woodpecker-ci.org/woodpecker/woodpecker-go/woodpecker"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
type userDataSource struct {
|
type userDataSource struct {
|
||||||
|
|
|
@ -19,10 +19,10 @@ import (
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"code.gitea.io/sdk/gitea"
|
"code.gitea.io/sdk/gitea"
|
||||||
|
"github.com/Kichiyaki/terraform-provider-woodpecker/internal/woodpecker"
|
||||||
"github.com/google/uuid"
|
"github.com/google/uuid"
|
||||||
"github.com/ory/dockertest/v3"
|
"github.com/ory/dockertest/v3"
|
||||||
"github.com/ory/dockertest/v3/docker"
|
"github.com/ory/dockertest/v3/docker"
|
||||||
"go.woodpecker-ci.org/woodpecker/woodpecker-go/woodpecker"
|
|
||||||
"golang.org/x/oauth2"
|
"golang.org/x/oauth2"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -345,7 +345,7 @@ func (r woodpeckerResource) Close() error {
|
||||||
return r.docker.Close()
|
return r.docker.Close()
|
||||||
}
|
}
|
||||||
|
|
||||||
const defaultWoodpeckerImage = "woodpeckerci/woodpecker-server:v1.0.2"
|
const defaultWoodpeckerImage = "woodpeckerci/woodpecker-server:v2.0.0"
|
||||||
|
|
||||||
//nolint:nonamedreturns
|
//nolint:nonamedreturns
|
||||||
func getWoodpeckerRepoTag() (repo string, tag string) {
|
func getWoodpeckerRepoTag() (repo string, tag string) {
|
||||||
|
|
|
@ -3,9 +3,9 @@ package internal
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
|
|
||||||
|
"github.com/Kichiyaki/terraform-provider-woodpecker/internal/woodpecker"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/diag"
|
"github.com/hashicorp/terraform-plugin-framework/diag"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/types"
|
"github.com/hashicorp/terraform-plugin-framework/types"
|
||||||
"go.woodpecker-ci.org/woodpecker/woodpecker-go/woodpecker"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
type userModel struct {
|
type userModel struct {
|
||||||
|
@ -38,7 +38,7 @@ func (m *userModel) toWoodpeckerModel(_ context.Context) (*woodpecker.User, diag
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
type secretResourceModel struct {
|
type secretResourceModelV0 struct {
|
||||||
ID types.Int64 `tfsdk:"id"`
|
ID types.Int64 `tfsdk:"id"`
|
||||||
Name types.String `tfsdk:"name"`
|
Name types.String `tfsdk:"name"`
|
||||||
Value types.String `tfsdk:"value"`
|
Value types.String `tfsdk:"value"`
|
||||||
|
@ -47,7 +47,15 @@ type secretResourceModel struct {
|
||||||
Events types.Set `tfsdk:"events"`
|
Events types.Set `tfsdk:"events"`
|
||||||
}
|
}
|
||||||
|
|
||||||
func (m *secretResourceModel) setValues(ctx context.Context, secret *woodpecker.Secret) diag.Diagnostics {
|
type secretResourceModelV1 struct {
|
||||||
|
ID types.Int64 `tfsdk:"id"`
|
||||||
|
Name types.String `tfsdk:"name"`
|
||||||
|
Value types.String `tfsdk:"value"`
|
||||||
|
Images types.Set `tfsdk:"images"`
|
||||||
|
Events types.Set `tfsdk:"events"`
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *secretResourceModelV1) setValues(ctx context.Context, secret *woodpecker.Secret) diag.Diagnostics {
|
||||||
var diagsRes diag.Diagnostics
|
var diagsRes diag.Diagnostics
|
||||||
var diags diag.Diagnostics
|
var diags diag.Diagnostics
|
||||||
|
|
||||||
|
@ -55,21 +63,19 @@ func (m *secretResourceModel) setValues(ctx context.Context, secret *woodpecker.
|
||||||
m.Name = types.StringValue(secret.Name)
|
m.Name = types.StringValue(secret.Name)
|
||||||
m.Images, diags = types.SetValueFrom(ctx, types.StringType, secret.Images)
|
m.Images, diags = types.SetValueFrom(ctx, types.StringType, secret.Images)
|
||||||
diagsRes.Append(diags...)
|
diagsRes.Append(diags...)
|
||||||
m.PluginsOnly = types.BoolValue(secret.PluginsOnly)
|
|
||||||
m.Events, diags = types.SetValueFrom(ctx, types.StringType, secret.Events)
|
m.Events, diags = types.SetValueFrom(ctx, types.StringType, secret.Events)
|
||||||
diagsRes.Append(diags...)
|
diagsRes.Append(diags...)
|
||||||
|
|
||||||
return diagsRes
|
return diagsRes
|
||||||
}
|
}
|
||||||
|
|
||||||
func (m *secretResourceModel) toWoodpeckerModel(ctx context.Context) (*woodpecker.Secret, diag.Diagnostics) {
|
func (m *secretResourceModelV1) toWoodpeckerModel(ctx context.Context) (*woodpecker.Secret, diag.Diagnostics) {
|
||||||
var diags diag.Diagnostics
|
var diags diag.Diagnostics
|
||||||
|
|
||||||
secret := &woodpecker.Secret{
|
secret := &woodpecker.Secret{
|
||||||
ID: m.ID.ValueInt64(),
|
ID: m.ID.ValueInt64(),
|
||||||
Name: m.Name.ValueString(),
|
Name: m.Name.ValueString(),
|
||||||
Value: m.Value.ValueString(),
|
Value: m.Value.ValueString(),
|
||||||
PluginsOnly: m.PluginsOnly.ValueBool(),
|
|
||||||
}
|
}
|
||||||
diags.Append(m.Images.ElementsAs(ctx, &secret.Images, false)...)
|
diags.Append(m.Images.ElementsAs(ctx, &secret.Images, false)...)
|
||||||
diags.Append(m.Events.ElementsAs(ctx, &secret.Events, false)...)
|
diags.Append(m.Events.ElementsAs(ctx, &secret.Events, false)...)
|
||||||
|
@ -78,11 +84,10 @@ func (m *secretResourceModel) toWoodpeckerModel(ctx context.Context) (*woodpecke
|
||||||
}
|
}
|
||||||
|
|
||||||
type secretDataSourceModel struct {
|
type secretDataSourceModel struct {
|
||||||
ID types.Int64 `tfsdk:"id"`
|
ID types.Int64 `tfsdk:"id"`
|
||||||
Name types.String `tfsdk:"name"`
|
Name types.String `tfsdk:"name"`
|
||||||
Images types.Set `tfsdk:"images"`
|
Images types.Set `tfsdk:"images"`
|
||||||
PluginsOnly types.Bool `tfsdk:"plugins_only"`
|
Events types.Set `tfsdk:"events"`
|
||||||
Events types.Set `tfsdk:"events"`
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (m *secretDataSourceModel) setValues(ctx context.Context, secret *woodpecker.Secret) diag.Diagnostics {
|
func (m *secretDataSourceModel) setValues(ctx context.Context, secret *woodpecker.Secret) diag.Diagnostics {
|
||||||
|
@ -93,7 +98,6 @@ func (m *secretDataSourceModel) setValues(ctx context.Context, secret *woodpecke
|
||||||
m.Name = types.StringValue(secret.Name)
|
m.Name = types.StringValue(secret.Name)
|
||||||
m.Images, diags = types.SetValueFrom(ctx, types.StringType, secret.Images)
|
m.Images, diags = types.SetValueFrom(ctx, types.StringType, secret.Images)
|
||||||
diagsRes.Append(diags...)
|
diagsRes.Append(diags...)
|
||||||
m.PluginsOnly = types.BoolValue(secret.PluginsOnly)
|
|
||||||
m.Events, diags = types.SetValueFrom(ctx, types.StringType, secret.Events)
|
m.Events, diags = types.SetValueFrom(ctx, types.StringType, secret.Events)
|
||||||
diagsRes.Append(diags...)
|
diagsRes.Append(diags...)
|
||||||
|
|
||||||
|
@ -128,7 +132,7 @@ func (m *repositoryModel) setValues(_ context.Context, repo *woodpecker.Repo) di
|
||||||
m.Name = types.StringValue(repo.Name)
|
m.Name = types.StringValue(repo.Name)
|
||||||
m.FullName = types.StringValue(repo.FullName)
|
m.FullName = types.StringValue(repo.FullName)
|
||||||
m.AvatarURL = types.StringValue(repo.Avatar)
|
m.AvatarURL = types.StringValue(repo.Avatar)
|
||||||
m.URL = types.StringValue(repo.Link)
|
m.URL = types.StringValue(repo.ForgeURL)
|
||||||
m.CloneURL = types.StringValue(repo.Clone)
|
m.CloneURL = types.StringValue(repo.Clone)
|
||||||
m.DefaultBranch = types.StringValue(repo.DefaultBranch)
|
m.DefaultBranch = types.StringValue(repo.DefaultBranch)
|
||||||
m.SCMKind = types.StringValue(repo.SCMKind)
|
m.SCMKind = types.StringValue(repo.SCMKind)
|
||||||
|
@ -154,7 +158,7 @@ func (m *repositoryModel) toWoodpeckerPatch(_ context.Context) (*woodpecker.Repo
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
type repositorySecretResourceModel struct {
|
type repositorySecretResourceModelV0 struct {
|
||||||
ID types.Int64 `tfsdk:"id"`
|
ID types.Int64 `tfsdk:"id"`
|
||||||
RepositoryID types.Int64 `tfsdk:"repository_id"`
|
RepositoryID types.Int64 `tfsdk:"repository_id"`
|
||||||
Name types.String `tfsdk:"name"`
|
Name types.String `tfsdk:"name"`
|
||||||
|
@ -164,7 +168,16 @@ type repositorySecretResourceModel struct {
|
||||||
Events types.Set `tfsdk:"events"`
|
Events types.Set `tfsdk:"events"`
|
||||||
}
|
}
|
||||||
|
|
||||||
func (m *repositorySecretResourceModel) setValues(ctx context.Context, secret *woodpecker.Secret) diag.Diagnostics {
|
type repositorySecretResourceModelV1 struct {
|
||||||
|
ID types.Int64 `tfsdk:"id"`
|
||||||
|
RepositoryID types.Int64 `tfsdk:"repository_id"`
|
||||||
|
Name types.String `tfsdk:"name"`
|
||||||
|
Value types.String `tfsdk:"value"`
|
||||||
|
Images types.Set `tfsdk:"images"`
|
||||||
|
Events types.Set `tfsdk:"events"`
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *repositorySecretResourceModelV1) setValues(ctx context.Context, secret *woodpecker.Secret) diag.Diagnostics {
|
||||||
var diagsRes diag.Diagnostics
|
var diagsRes diag.Diagnostics
|
||||||
var diags diag.Diagnostics
|
var diags diag.Diagnostics
|
||||||
|
|
||||||
|
@ -172,21 +185,21 @@ func (m *repositorySecretResourceModel) setValues(ctx context.Context, secret *w
|
||||||
m.Name = types.StringValue(secret.Name)
|
m.Name = types.StringValue(secret.Name)
|
||||||
m.Images, diags = types.SetValueFrom(ctx, types.StringType, secret.Images)
|
m.Images, diags = types.SetValueFrom(ctx, types.StringType, secret.Images)
|
||||||
diagsRes.Append(diags...)
|
diagsRes.Append(diags...)
|
||||||
m.PluginsOnly = types.BoolValue(secret.PluginsOnly)
|
|
||||||
m.Events, diags = types.SetValueFrom(ctx, types.StringType, secret.Events)
|
m.Events, diags = types.SetValueFrom(ctx, types.StringType, secret.Events)
|
||||||
diagsRes.Append(diags...)
|
diagsRes.Append(diags...)
|
||||||
|
|
||||||
return diagsRes
|
return diagsRes
|
||||||
}
|
}
|
||||||
|
|
||||||
func (m *repositorySecretResourceModel) toWoodpeckerModel(ctx context.Context) (*woodpecker.Secret, diag.Diagnostics) {
|
func (m *repositorySecretResourceModelV1) toWoodpeckerModel(
|
||||||
|
ctx context.Context,
|
||||||
|
) (*woodpecker.Secret, diag.Diagnostics) {
|
||||||
var diags diag.Diagnostics
|
var diags diag.Diagnostics
|
||||||
|
|
||||||
secret := &woodpecker.Secret{
|
secret := &woodpecker.Secret{
|
||||||
ID: m.ID.ValueInt64(),
|
ID: m.ID.ValueInt64(),
|
||||||
Name: m.Name.ValueString(),
|
Name: m.Name.ValueString(),
|
||||||
Value: m.Value.ValueString(),
|
Value: m.Value.ValueString(),
|
||||||
PluginsOnly: m.PluginsOnly.ValueBool(),
|
|
||||||
}
|
}
|
||||||
diags.Append(m.Images.ElementsAs(ctx, &secret.Images, false)...)
|
diags.Append(m.Images.ElementsAs(ctx, &secret.Images, false)...)
|
||||||
diags.Append(m.Events.ElementsAs(ctx, &secret.Events, false)...)
|
diags.Append(m.Events.ElementsAs(ctx, &secret.Events, false)...)
|
||||||
|
@ -199,7 +212,6 @@ type repositorySecretDataSourceModel struct {
|
||||||
RepositoryID types.Int64 `tfsdk:"repository_id"`
|
RepositoryID types.Int64 `tfsdk:"repository_id"`
|
||||||
Name types.String `tfsdk:"name"`
|
Name types.String `tfsdk:"name"`
|
||||||
Images types.Set `tfsdk:"images"`
|
Images types.Set `tfsdk:"images"`
|
||||||
PluginsOnly types.Bool `tfsdk:"plugins_only"`
|
|
||||||
Events types.Set `tfsdk:"events"`
|
Events types.Set `tfsdk:"events"`
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -211,7 +223,6 @@ func (m *repositorySecretDataSourceModel) setValues(ctx context.Context, secret
|
||||||
m.Name = types.StringValue(secret.Name)
|
m.Name = types.StringValue(secret.Name)
|
||||||
m.Images, diags = types.SetValueFrom(ctx, types.StringType, secret.Images)
|
m.Images, diags = types.SetValueFrom(ctx, types.StringType, secret.Images)
|
||||||
diagsRes.Append(diags...)
|
diagsRes.Append(diags...)
|
||||||
m.PluginsOnly = types.BoolValue(secret.PluginsOnly)
|
|
||||||
m.Events, diags = types.SetValueFrom(ctx, types.StringType, secret.Events)
|
m.Events, diags = types.SetValueFrom(ctx, types.StringType, secret.Events)
|
||||||
diagsRes.Append(diags...)
|
diagsRes.Append(diags...)
|
||||||
|
|
||||||
|
|
|
@ -2,14 +2,17 @@ package internal
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
|
"fmt"
|
||||||
"os"
|
"os"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/Kichiyaki/terraform-provider-woodpecker/internal/woodpecker"
|
||||||
|
"github.com/Masterminds/semver/v3"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/datasource"
|
"github.com/hashicorp/terraform-plugin-framework/datasource"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/provider"
|
"github.com/hashicorp/terraform-plugin-framework/provider"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/provider/schema"
|
"github.com/hashicorp/terraform-plugin-framework/provider/schema"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/resource"
|
"github.com/hashicorp/terraform-plugin-framework/resource"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/types"
|
"github.com/hashicorp/terraform-plugin-framework/types"
|
||||||
"go.woodpecker-ci.org/woodpecker/woodpecker-go/woodpecker"
|
|
||||||
"golang.org/x/oauth2"
|
"golang.org/x/oauth2"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -37,7 +40,9 @@ func (p *woodpeckerProvider) Metadata(_ context.Context, _ provider.MetadataRequ
|
||||||
func (p *woodpeckerProvider) Schema(_ context.Context, _ provider.SchemaRequest, resp *provider.SchemaResponse) {
|
func (p *woodpeckerProvider) Schema(_ context.Context, _ provider.SchemaRequest, resp *provider.SchemaResponse) {
|
||||||
resp.Schema = schema.Schema{
|
resp.Schema = schema.Schema{
|
||||||
MarkdownDescription: "A Terraform provider used to interact with" +
|
MarkdownDescription: "A Terraform provider used to interact with" +
|
||||||
" [Woodpecker CI](https://woodpecker-ci.org/) resources.",
|
" [Woodpecker CI](https://woodpecker-ci.org/) resources." +
|
||||||
|
"\n\n\n- v0.2.x and later versions of the provider work with Woodpecker 2.x+" +
|
||||||
|
"\n- v0.1.x version of the provider works with Woodpecker 2.0.0>1.x>=1.0.0",
|
||||||
Attributes: map[string]schema.Attribute{
|
Attributes: map[string]schema.Attribute{
|
||||||
"server": schema.StringAttribute{
|
"server": schema.StringAttribute{
|
||||||
Optional: true,
|
Optional: true,
|
||||||
|
@ -88,6 +93,9 @@ func (p *woodpeckerProvider) Configure(
|
||||||
}
|
}
|
||||||
|
|
||||||
client := newClient(ctx, cfg, resp)
|
client := newClient(ctx, cfg, resp)
|
||||||
|
if resp.Diagnostics.HasError() {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
resp.DataSourceData = client
|
resp.DataSourceData = client
|
||||||
resp.ResourceData = client
|
resp.ResourceData = client
|
||||||
|
@ -156,5 +164,49 @@ func newClient(
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
c, err := semver.NewConstraint(">= 2.0.0")
|
||||||
|
if err != nil {
|
||||||
|
resp.Diagnostics.AddError(
|
||||||
|
"Couldn't parse woodpecker version constraint",
|
||||||
|
fmt.Sprintf(
|
||||||
|
"%s. Please report this issue to the provider developers.",
|
||||||
|
err,
|
||||||
|
),
|
||||||
|
)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
ver, err := client.Version()
|
||||||
|
if err != nil {
|
||||||
|
resp.Diagnostics.AddError("Couldn't get woodpecker version", err.Error())
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// split is required because in some cases the version looks like this: 2.0.0-f05c1631d2
|
||||||
|
parsedVer, err := semver.NewVersion(strings.Split(ver.Version, "-")[0])
|
||||||
|
if err != nil {
|
||||||
|
resp.Diagnostics.AddError(
|
||||||
|
"Couldn't parse woodpecker version",
|
||||||
|
fmt.Sprintf(
|
||||||
|
"%s. Please report this issue to the provider developers.",
|
||||||
|
err,
|
||||||
|
),
|
||||||
|
)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
if !c.Check(parsedVer) {
|
||||||
|
resp.Diagnostics.AddError(
|
||||||
|
"Woodpecker version doesn't satisfy the constraint",
|
||||||
|
fmt.Sprintf(
|
||||||
|
"Current woodpecker version: %s, expected: %s."+
|
||||||
|
" Consider using an older version of the provider or update woodpecker.",
|
||||||
|
ver.Version,
|
||||||
|
c.String(),
|
||||||
|
),
|
||||||
|
)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
return client
|
return client
|
||||||
}
|
}
|
||||||
|
|
|
@ -6,6 +6,7 @@ import (
|
||||||
"slices"
|
"slices"
|
||||||
"strconv"
|
"strconv"
|
||||||
|
|
||||||
|
"github.com/Kichiyaki/terraform-provider-woodpecker/internal/woodpecker"
|
||||||
"github.com/hashicorp/terraform-plugin-framework-validators/int64validator"
|
"github.com/hashicorp/terraform-plugin-framework-validators/int64validator"
|
||||||
"github.com/hashicorp/terraform-plugin-framework-validators/stringvalidator"
|
"github.com/hashicorp/terraform-plugin-framework-validators/stringvalidator"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/path"
|
"github.com/hashicorp/terraform-plugin-framework/path"
|
||||||
|
@ -16,7 +17,6 @@ import (
|
||||||
"github.com/hashicorp/terraform-plugin-framework/resource/schema/planmodifier"
|
"github.com/hashicorp/terraform-plugin-framework/resource/schema/planmodifier"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/resource/schema/stringplanmodifier"
|
"github.com/hashicorp/terraform-plugin-framework/resource/schema/stringplanmodifier"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/schema/validator"
|
"github.com/hashicorp/terraform-plugin-framework/schema/validator"
|
||||||
"go.woodpecker-ci.org/woodpecker/woodpecker-go/woodpecker"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
type repositoryResource struct {
|
type repositoryResource struct {
|
||||||
|
@ -242,7 +242,7 @@ func (r *repositoryResource) Create(ctx context.Context, req resource.CreateRequ
|
||||||
|
|
||||||
repoFullName := data.FullName.ValueString()
|
repoFullName := data.FullName.ValueString()
|
||||||
|
|
||||||
repos, err := r.client.RepoListOpts(true, true)
|
repos, err := r.client.RepoListOpts(true)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
resp.Diagnostics.AddError("Couldn't list repositories", err.Error())
|
resp.Diagnostics.AddError("Couldn't list repositories", err.Error())
|
||||||
return
|
return
|
||||||
|
|
|
@ -6,13 +6,13 @@ import (
|
||||||
"strconv"
|
"strconv"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
|
"github.com/Kichiyaki/terraform-provider-woodpecker/internal/woodpecker"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/path"
|
"github.com/hashicorp/terraform-plugin-framework/path"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/resource"
|
"github.com/hashicorp/terraform-plugin-framework/resource"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/resource/schema"
|
"github.com/hashicorp/terraform-plugin-framework/resource/schema"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/resource/schema/int64planmodifier"
|
"github.com/hashicorp/terraform-plugin-framework/resource/schema/int64planmodifier"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/resource/schema/planmodifier"
|
"github.com/hashicorp/terraform-plugin-framework/resource/schema/planmodifier"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/resource/schema/stringplanmodifier"
|
"github.com/hashicorp/terraform-plugin-framework/resource/schema/stringplanmodifier"
|
||||||
"go.woodpecker-ci.org/woodpecker/woodpecker-go/woodpecker"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
type repositoryCronResource struct {
|
type repositoryCronResource struct {
|
||||||
|
|
|
@ -7,11 +7,11 @@ import (
|
||||||
"strconv"
|
"strconv"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
|
"github.com/Kichiyaki/terraform-provider-woodpecker/internal/woodpecker"
|
||||||
"github.com/google/uuid"
|
"github.com/google/uuid"
|
||||||
"github.com/hashicorp/terraform-plugin-testing/helper/resource"
|
"github.com/hashicorp/terraform-plugin-testing/helper/resource"
|
||||||
"github.com/hashicorp/terraform-plugin-testing/plancheck"
|
"github.com/hashicorp/terraform-plugin-testing/plancheck"
|
||||||
"github.com/hashicorp/terraform-plugin-testing/terraform"
|
"github.com/hashicorp/terraform-plugin-testing/terraform"
|
||||||
"go.woodpecker-ci.org/woodpecker/woodpecker-go/woodpecker"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestRepositoryCronResource(t *testing.T) {
|
func TestRepositoryCronResource(t *testing.T) {
|
||||||
|
|
|
@ -6,13 +6,13 @@ import (
|
||||||
"strconv"
|
"strconv"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
|
"github.com/Kichiyaki/terraform-provider-woodpecker/internal/woodpecker"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/path"
|
"github.com/hashicorp/terraform-plugin-framework/path"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/resource"
|
"github.com/hashicorp/terraform-plugin-framework/resource"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/resource/schema"
|
"github.com/hashicorp/terraform-plugin-framework/resource/schema"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/resource/schema/int64planmodifier"
|
"github.com/hashicorp/terraform-plugin-framework/resource/schema/int64planmodifier"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/resource/schema/planmodifier"
|
"github.com/hashicorp/terraform-plugin-framework/resource/schema/planmodifier"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/resource/schema/stringplanmodifier"
|
"github.com/hashicorp/terraform-plugin-framework/resource/schema/stringplanmodifier"
|
||||||
"go.woodpecker-ci.org/woodpecker/woodpecker-go/woodpecker"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
type repositoryRegistryResource struct {
|
type repositoryRegistryResource struct {
|
||||||
|
|
|
@ -7,11 +7,11 @@ import (
|
||||||
"strconv"
|
"strconv"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
|
"github.com/Kichiyaki/terraform-provider-woodpecker/internal/woodpecker"
|
||||||
"github.com/google/uuid"
|
"github.com/google/uuid"
|
||||||
"github.com/hashicorp/terraform-plugin-testing/helper/resource"
|
"github.com/hashicorp/terraform-plugin-testing/helper/resource"
|
||||||
"github.com/hashicorp/terraform-plugin-testing/plancheck"
|
"github.com/hashicorp/terraform-plugin-testing/plancheck"
|
||||||
"github.com/hashicorp/terraform-plugin-testing/terraform"
|
"github.com/hashicorp/terraform-plugin-testing/terraform"
|
||||||
"go.woodpecker-ci.org/woodpecker/woodpecker-go/woodpecker"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestRepositoryRegistryResource(t *testing.T) {
|
func TestRepositoryRegistryResource(t *testing.T) {
|
||||||
|
|
|
@ -6,6 +6,7 @@ import (
|
||||||
"strconv"
|
"strconv"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
|
"github.com/Kichiyaki/terraform-provider-woodpecker/internal/woodpecker"
|
||||||
"github.com/hashicorp/terraform-plugin-framework-validators/setvalidator"
|
"github.com/hashicorp/terraform-plugin-framework-validators/setvalidator"
|
||||||
"github.com/hashicorp/terraform-plugin-framework-validators/stringvalidator"
|
"github.com/hashicorp/terraform-plugin-framework-validators/stringvalidator"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/path"
|
"github.com/hashicorp/terraform-plugin-framework/path"
|
||||||
|
@ -18,7 +19,6 @@ import (
|
||||||
"github.com/hashicorp/terraform-plugin-framework/resource/schema/stringplanmodifier"
|
"github.com/hashicorp/terraform-plugin-framework/resource/schema/stringplanmodifier"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/schema/validator"
|
"github.com/hashicorp/terraform-plugin-framework/schema/validator"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/types"
|
"github.com/hashicorp/terraform-plugin-framework/types"
|
||||||
"go.woodpecker-ci.org/woodpecker/woodpecker-go/woodpecker"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
type repositorySecretResource struct {
|
type repositorySecretResource struct {
|
||||||
|
@ -28,6 +28,7 @@ type repositorySecretResource struct {
|
||||||
var _ resource.Resource = (*repositorySecretResource)(nil)
|
var _ resource.Resource = (*repositorySecretResource)(nil)
|
||||||
var _ resource.ResourceWithConfigure = (*repositorySecretResource)(nil)
|
var _ resource.ResourceWithConfigure = (*repositorySecretResource)(nil)
|
||||||
var _ resource.ResourceWithImportState = (*repositorySecretResource)(nil)
|
var _ resource.ResourceWithImportState = (*repositorySecretResource)(nil)
|
||||||
|
var _ resource.ResourceWithUpgradeState = (*repositorySecretResource)(nil)
|
||||||
|
|
||||||
func newRepositorySecretResource() resource.Resource {
|
func newRepositorySecretResource() resource.Resource {
|
||||||
return &repositorySecretResource{}
|
return &repositorySecretResource{}
|
||||||
|
@ -91,15 +92,6 @@ func (r *repositorySecretResource) Schema(_ context.Context, _ resource.SchemaRe
|
||||||
setplanmodifier.UseStateForUnknown(),
|
setplanmodifier.UseStateForUnknown(),
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
"plugins_only": schema.BoolAttribute{
|
|
||||||
Optional: true,
|
|
||||||
Computed: true,
|
|
||||||
MarkdownDescription: "whether secret is only available for" +
|
|
||||||
" [plugins](https://woodpecker-ci.org/docs/usage/plugins/plugins)",
|
|
||||||
PlanModifiers: []planmodifier.Bool{
|
|
||||||
boolplanmodifier.UseStateForUnknown(),
|
|
||||||
},
|
|
||||||
},
|
|
||||||
"images": schema.SetAttribute{
|
"images": schema.SetAttribute{
|
||||||
ElementType: types.StringType,
|
ElementType: types.StringType,
|
||||||
Optional: true,
|
Optional: true,
|
||||||
|
@ -110,6 +102,7 @@ func (r *repositorySecretResource) Schema(_ context.Context, _ resource.SchemaRe
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
Version: 1,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -143,7 +136,7 @@ func (r *repositorySecretResource) Create(
|
||||||
req resource.CreateRequest,
|
req resource.CreateRequest,
|
||||||
resp *resource.CreateResponse,
|
resp *resource.CreateResponse,
|
||||||
) {
|
) {
|
||||||
var data repositorySecretResourceModel
|
var data repositorySecretResourceModelV1
|
||||||
|
|
||||||
resp.Diagnostics.Append(req.Config.Get(ctx, &data)...)
|
resp.Diagnostics.Append(req.Config.Get(ctx, &data)...)
|
||||||
if resp.Diagnostics.HasError() {
|
if resp.Diagnostics.HasError() {
|
||||||
|
@ -171,7 +164,7 @@ func (r *repositorySecretResource) Create(
|
||||||
}
|
}
|
||||||
|
|
||||||
func (r *repositorySecretResource) Read(ctx context.Context, req resource.ReadRequest, resp *resource.ReadResponse) {
|
func (r *repositorySecretResource) Read(ctx context.Context, req resource.ReadRequest, resp *resource.ReadResponse) {
|
||||||
var data repositorySecretResourceModel
|
var data repositorySecretResourceModelV1
|
||||||
|
|
||||||
resp.Diagnostics.Append(req.State.Get(ctx, &data)...)
|
resp.Diagnostics.Append(req.State.Get(ctx, &data)...)
|
||||||
if resp.Diagnostics.HasError() {
|
if resp.Diagnostics.HasError() {
|
||||||
|
@ -196,7 +189,7 @@ func (r *repositorySecretResource) Update(
|
||||||
req resource.UpdateRequest,
|
req resource.UpdateRequest,
|
||||||
resp *resource.UpdateResponse,
|
resp *resource.UpdateResponse,
|
||||||
) {
|
) {
|
||||||
var data repositorySecretResourceModel
|
var data repositorySecretResourceModelV1
|
||||||
|
|
||||||
resp.Diagnostics.Append(req.Plan.Get(ctx, &data)...)
|
resp.Diagnostics.Append(req.Plan.Get(ctx, &data)...)
|
||||||
if resp.Diagnostics.HasError() {
|
if resp.Diagnostics.HasError() {
|
||||||
|
@ -228,7 +221,7 @@ func (r *repositorySecretResource) Delete(
|
||||||
req resource.DeleteRequest,
|
req resource.DeleteRequest,
|
||||||
resp *resource.DeleteResponse,
|
resp *resource.DeleteResponse,
|
||||||
) {
|
) {
|
||||||
var data repositorySecretResourceModel
|
var data repositorySecretResourceModelV1
|
||||||
|
|
||||||
resp.Diagnostics.Append(req.State.Get(ctx, &data)...)
|
resp.Diagnostics.Append(req.State.Get(ctx, &data)...)
|
||||||
if resp.Diagnostics.HasError() {
|
if resp.Diagnostics.HasError() {
|
||||||
|
@ -267,3 +260,93 @@ func (r *repositorySecretResource) ImportState(
|
||||||
resp.Diagnostics.Append(resp.State.SetAttribute(ctx, path.Root("repository_id"), repoID)...)
|
resp.Diagnostics.Append(resp.State.SetAttribute(ctx, path.Root("repository_id"), repoID)...)
|
||||||
resp.Diagnostics.Append(resp.State.SetAttribute(ctx, path.Root("name"), idParts[1])...)
|
resp.Diagnostics.Append(resp.State.SetAttribute(ctx, path.Root("name"), idParts[1])...)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (r *repositorySecretResource) UpgradeState(_ context.Context) map[int64]resource.StateUpgrader {
|
||||||
|
return map[int64]resource.StateUpgrader{
|
||||||
|
// State upgrade implementation from 0 (prior state version) to 1 (Schema.Version)
|
||||||
|
0: {
|
||||||
|
// remove plugins_only attribute
|
||||||
|
PriorSchema: &schema.Schema{
|
||||||
|
Attributes: map[string]schema.Attribute{
|
||||||
|
"id": schema.Int64Attribute{
|
||||||
|
Computed: true,
|
||||||
|
Description: "the secret's id",
|
||||||
|
PlanModifiers: []planmodifier.Int64{
|
||||||
|
int64planmodifier.UseStateForUnknown(),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"repository_id": schema.Int64Attribute{
|
||||||
|
Required: true,
|
||||||
|
Description: "the ID of the repository",
|
||||||
|
PlanModifiers: []planmodifier.Int64{
|
||||||
|
int64planmodifier.RequiresReplace(),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"name": schema.StringAttribute{
|
||||||
|
Required: true,
|
||||||
|
Description: "the name of the secret",
|
||||||
|
PlanModifiers: []planmodifier.String{
|
||||||
|
stringplanmodifier.RequiresReplace(),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"value": schema.StringAttribute{
|
||||||
|
Required: true,
|
||||||
|
Description: "the value of the secret",
|
||||||
|
Sensitive: true,
|
||||||
|
PlanModifiers: []planmodifier.String{
|
||||||
|
stringplanmodifier.UseStateForUnknown(),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"events": schema.SetAttribute{
|
||||||
|
ElementType: types.StringType,
|
||||||
|
Required: true,
|
||||||
|
Description: "events for which the secret is available (push, tag, pull_request, deployment, cron, manual)",
|
||||||
|
Validators: []validator.Set{
|
||||||
|
setvalidator.ValueStringsAre(
|
||||||
|
stringvalidator.OneOfCaseInsensitive("push", "tag", "pull_request", "deployment", "cron", "manual"),
|
||||||
|
),
|
||||||
|
},
|
||||||
|
PlanModifiers: []planmodifier.Set{
|
||||||
|
setplanmodifier.UseStateForUnknown(),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"plugins_only": schema.BoolAttribute{
|
||||||
|
Optional: true,
|
||||||
|
Computed: true,
|
||||||
|
MarkdownDescription: "whether secret is only available for" +
|
||||||
|
" [plugins](https://woodpecker-ci.org/docs/usage/plugins/plugins)",
|
||||||
|
PlanModifiers: []planmodifier.Bool{
|
||||||
|
boolplanmodifier.UseStateForUnknown(),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"images": schema.SetAttribute{
|
||||||
|
ElementType: types.StringType,
|
||||||
|
Optional: true,
|
||||||
|
Computed: true,
|
||||||
|
Description: "list of Docker images for which this secret is available, leave blank to allow all images",
|
||||||
|
PlanModifiers: []planmodifier.Set{
|
||||||
|
setplanmodifier.UseStateForUnknown(),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
StateUpgrader: func(ctx context.Context, req resource.UpgradeStateRequest, resp *resource.UpgradeStateResponse) {
|
||||||
|
var priorStateData repositorySecretResourceModelV0
|
||||||
|
|
||||||
|
resp.Diagnostics.Append(req.State.Get(ctx, &priorStateData)...)
|
||||||
|
if resp.Diagnostics.HasError() {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
resp.Diagnostics.Append(resp.State.Set(ctx, repositorySecretResourceModelV1{
|
||||||
|
ID: priorStateData.ID,
|
||||||
|
RepositoryID: priorStateData.RepositoryID,
|
||||||
|
Name: priorStateData.Name,
|
||||||
|
Value: priorStateData.Value,
|
||||||
|
Images: priorStateData.Images,
|
||||||
|
Events: priorStateData.Events,
|
||||||
|
})...)
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
|
@ -8,11 +8,11 @@ import (
|
||||||
"strconv"
|
"strconv"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
|
"github.com/Kichiyaki/terraform-provider-woodpecker/internal/woodpecker"
|
||||||
"github.com/google/uuid"
|
"github.com/google/uuid"
|
||||||
"github.com/hashicorp/terraform-plugin-testing/helper/resource"
|
"github.com/hashicorp/terraform-plugin-testing/helper/resource"
|
||||||
"github.com/hashicorp/terraform-plugin-testing/plancheck"
|
"github.com/hashicorp/terraform-plugin-testing/plancheck"
|
||||||
"github.com/hashicorp/terraform-plugin-testing/terraform"
|
"github.com/hashicorp/terraform-plugin-testing/terraform"
|
||||||
"go.woodpecker-ci.org/woodpecker/woodpecker-go/woodpecker"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestRepositorySecretResource(t *testing.T) {
|
func TestRepositorySecretResource(t *testing.T) {
|
||||||
|
@ -54,7 +54,6 @@ resource "woodpecker_repository_secret" "test_secret" {
|
||||||
resource.TestCheckResourceAttr("woodpecker_repository_secret.test_secret", "name", name),
|
resource.TestCheckResourceAttr("woodpecker_repository_secret.test_secret", "name", name),
|
||||||
resource.TestCheckResourceAttr("woodpecker_repository_secret.test_secret", "value", "test123"),
|
resource.TestCheckResourceAttr("woodpecker_repository_secret.test_secret", "value", "test123"),
|
||||||
resource.TestCheckTypeSetElemAttr("woodpecker_repository_secret.test_secret", "events.*", "push"),
|
resource.TestCheckTypeSetElemAttr("woodpecker_repository_secret.test_secret", "events.*", "push"),
|
||||||
resource.TestCheckResourceAttr("woodpecker_repository_secret.test_secret", "plugins_only", "false"),
|
|
||||||
),
|
),
|
||||||
},
|
},
|
||||||
{ // update secret
|
{ // update secret
|
||||||
|
@ -64,7 +63,6 @@ resource "woodpecker_repository_secret" "test_secret" {
|
||||||
name = "%s"
|
name = "%s"
|
||||||
value = "test123123"
|
value = "test123123"
|
||||||
events = ["push", "deployment"]
|
events = ["push", "deployment"]
|
||||||
plugins_only = true
|
|
||||||
images = ["testimage"]
|
images = ["testimage"]
|
||||||
}
|
}
|
||||||
`, repo.ID, name),
|
`, repo.ID, name),
|
||||||
|
@ -79,7 +77,6 @@ resource "woodpecker_repository_secret" "test_secret" {
|
||||||
resource.TestCheckResourceAttr("woodpecker_repository_secret.test_secret", "value", "test123123"),
|
resource.TestCheckResourceAttr("woodpecker_repository_secret.test_secret", "value", "test123123"),
|
||||||
resource.TestCheckTypeSetElemAttr("woodpecker_repository_secret.test_secret", "events.*", "push"),
|
resource.TestCheckTypeSetElemAttr("woodpecker_repository_secret.test_secret", "events.*", "push"),
|
||||||
resource.TestCheckTypeSetElemAttr("woodpecker_repository_secret.test_secret", "events.*", "deployment"),
|
resource.TestCheckTypeSetElemAttr("woodpecker_repository_secret.test_secret", "events.*", "deployment"),
|
||||||
resource.TestCheckResourceAttr("woodpecker_repository_secret.test_secret", "plugins_only", "true"),
|
|
||||||
resource.TestCheckTypeSetElemAttr("woodpecker_repository_secret.test_secret", "images.*", "testimage"),
|
resource.TestCheckTypeSetElemAttr("woodpecker_repository_secret.test_secret", "images.*", "testimage"),
|
||||||
),
|
),
|
||||||
},
|
},
|
||||||
|
@ -104,7 +101,6 @@ resource "woodpecker_repository_secret" "test_secret" {
|
||||||
resource.TestCheckTypeSetElemAttr("woodpecker_repository_secret.test_secret", "events.*", "push"),
|
resource.TestCheckTypeSetElemAttr("woodpecker_repository_secret.test_secret", "events.*", "push"),
|
||||||
resource.TestCheckTypeSetElemAttr("woodpecker_repository_secret.test_secret", "events.*", "deployment"),
|
resource.TestCheckTypeSetElemAttr("woodpecker_repository_secret.test_secret", "events.*", "deployment"),
|
||||||
resource.TestCheckTypeSetElemAttr("woodpecker_repository_secret.test_secret", "events.*", "cron"),
|
resource.TestCheckTypeSetElemAttr("woodpecker_repository_secret.test_secret", "events.*", "cron"),
|
||||||
resource.TestCheckResourceAttr("woodpecker_repository_secret.test_secret", "plugins_only", "true"),
|
|
||||||
resource.TestCheckTypeSetElemAttr("woodpecker_repository_secret.test_secret", "images.*", "testimage"),
|
resource.TestCheckTypeSetElemAttr("woodpecker_repository_secret.test_secret", "images.*", "testimage"),
|
||||||
),
|
),
|
||||||
},
|
},
|
||||||
|
@ -139,7 +135,6 @@ resource "woodpecker_repository_secret" "test_secret" {
|
||||||
resource.TestCheckResourceAttr("woodpecker_repository_secret.test_secret", "name", newName),
|
resource.TestCheckResourceAttr("woodpecker_repository_secret.test_secret", "name", newName),
|
||||||
resource.TestCheckResourceAttr("woodpecker_repository_secret.test_secret", "value", "test123New"),
|
resource.TestCheckResourceAttr("woodpecker_repository_secret.test_secret", "value", "test123New"),
|
||||||
resource.TestCheckTypeSetElemAttr("woodpecker_repository_secret.test_secret", "events.*", "push"),
|
resource.TestCheckTypeSetElemAttr("woodpecker_repository_secret.test_secret", "events.*", "push"),
|
||||||
resource.TestCheckResourceAttr("woodpecker_repository_secret.test_secret", "plugins_only", "false"),
|
|
||||||
),
|
),
|
||||||
},
|
},
|
||||||
{ // replace secret (new repo id)
|
{ // replace secret (new repo id)
|
||||||
|
@ -166,7 +161,6 @@ resource "woodpecker_repository_secret" "test_secret" {
|
||||||
resource.TestCheckResourceAttr("woodpecker_repository_secret.test_secret", "name", newName),
|
resource.TestCheckResourceAttr("woodpecker_repository_secret.test_secret", "name", newName),
|
||||||
resource.TestCheckResourceAttr("woodpecker_repository_secret.test_secret", "value", "test123New"),
|
resource.TestCheckResourceAttr("woodpecker_repository_secret.test_secret", "value", "test123New"),
|
||||||
resource.TestCheckTypeSetElemAttr("woodpecker_repository_secret.test_secret", "events.*", "push"),
|
resource.TestCheckTypeSetElemAttr("woodpecker_repository_secret.test_secret", "events.*", "push"),
|
||||||
resource.TestCheckResourceAttr("woodpecker_repository_secret.test_secret", "plugins_only", "false"),
|
|
||||||
),
|
),
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
|
|
@ -8,11 +8,11 @@ import (
|
||||||
"strconv"
|
"strconv"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
|
"github.com/Kichiyaki/terraform-provider-woodpecker/internal/woodpecker"
|
||||||
"github.com/google/uuid"
|
"github.com/google/uuid"
|
||||||
"github.com/hashicorp/terraform-plugin-testing/helper/resource"
|
"github.com/hashicorp/terraform-plugin-testing/helper/resource"
|
||||||
"github.com/hashicorp/terraform-plugin-testing/plancheck"
|
"github.com/hashicorp/terraform-plugin-testing/plancheck"
|
||||||
"github.com/hashicorp/terraform-plugin-testing/terraform"
|
"github.com/hashicorp/terraform-plugin-testing/terraform"
|
||||||
"go.woodpecker-ci.org/woodpecker/woodpecker-go/woodpecker"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestRepositoryResource(t *testing.T) {
|
func TestRepositoryResource(t *testing.T) {
|
||||||
|
@ -230,7 +230,7 @@ resource "woodpecker_repository" "test_repo" {
|
||||||
|
|
||||||
func checkRepositoryResourceDestroy(names ...string) func(state *terraform.State) error {
|
func checkRepositoryResourceDestroy(names ...string) func(state *terraform.State) error {
|
||||||
return func(state *terraform.State) error {
|
return func(state *terraform.State) error {
|
||||||
repos, err := woodpeckerClient.RepoListOpts(true, true)
|
repos, err := woodpeckerClient.RepoListOpts(true)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("couldn't list repos: %w", err)
|
return fmt.Errorf("couldn't list repos: %w", err)
|
||||||
}
|
}
|
||||||
|
|
|
@ -4,6 +4,7 @@ import (
|
||||||
"context"
|
"context"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
|
||||||
|
"github.com/Kichiyaki/terraform-provider-woodpecker/internal/woodpecker"
|
||||||
"github.com/hashicorp/terraform-plugin-framework-validators/setvalidator"
|
"github.com/hashicorp/terraform-plugin-framework-validators/setvalidator"
|
||||||
"github.com/hashicorp/terraform-plugin-framework-validators/stringvalidator"
|
"github.com/hashicorp/terraform-plugin-framework-validators/stringvalidator"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/path"
|
"github.com/hashicorp/terraform-plugin-framework/path"
|
||||||
|
@ -16,7 +17,6 @@ import (
|
||||||
"github.com/hashicorp/terraform-plugin-framework/resource/schema/stringplanmodifier"
|
"github.com/hashicorp/terraform-plugin-framework/resource/schema/stringplanmodifier"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/schema/validator"
|
"github.com/hashicorp/terraform-plugin-framework/schema/validator"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/types"
|
"github.com/hashicorp/terraform-plugin-framework/types"
|
||||||
"go.woodpecker-ci.org/woodpecker/woodpecker-go/woodpecker"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
type secretResource struct {
|
type secretResource struct {
|
||||||
|
@ -26,6 +26,7 @@ type secretResource struct {
|
||||||
var _ resource.Resource = (*secretResource)(nil)
|
var _ resource.Resource = (*secretResource)(nil)
|
||||||
var _ resource.ResourceWithConfigure = (*secretResource)(nil)
|
var _ resource.ResourceWithConfigure = (*secretResource)(nil)
|
||||||
var _ resource.ResourceWithImportState = (*secretResource)(nil)
|
var _ resource.ResourceWithImportState = (*secretResource)(nil)
|
||||||
|
var _ resource.ResourceWithUpgradeState = (*secretResource)(nil)
|
||||||
|
|
||||||
func newSecretResource() resource.Resource {
|
func newSecretResource() resource.Resource {
|
||||||
return &secretResource{}
|
return &secretResource{}
|
||||||
|
@ -77,15 +78,6 @@ func (r *secretResource) Schema(_ context.Context, _ resource.SchemaRequest, res
|
||||||
setplanmodifier.UseStateForUnknown(),
|
setplanmodifier.UseStateForUnknown(),
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
"plugins_only": schema.BoolAttribute{
|
|
||||||
Optional: true,
|
|
||||||
Computed: true,
|
|
||||||
MarkdownDescription: "whether secret is only available for" +
|
|
||||||
" [plugins](https://woodpecker-ci.org/docs/usage/plugins/plugins)",
|
|
||||||
PlanModifiers: []planmodifier.Bool{
|
|
||||||
boolplanmodifier.UseStateForUnknown(),
|
|
||||||
},
|
|
||||||
},
|
|
||||||
"images": schema.SetAttribute{
|
"images": schema.SetAttribute{
|
||||||
ElementType: types.StringType,
|
ElementType: types.StringType,
|
||||||
Optional: true,
|
Optional: true,
|
||||||
|
@ -96,6 +88,7 @@ func (r *secretResource) Schema(_ context.Context, _ resource.SchemaRequest, res
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
Version: 1,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -121,7 +114,7 @@ func (r *secretResource) Configure(_ context.Context, req resource.ConfigureRequ
|
||||||
}
|
}
|
||||||
|
|
||||||
func (r *secretResource) Create(ctx context.Context, req resource.CreateRequest, resp *resource.CreateResponse) {
|
func (r *secretResource) Create(ctx context.Context, req resource.CreateRequest, resp *resource.CreateResponse) {
|
||||||
var data secretResourceModel
|
var data secretResourceModelV1
|
||||||
|
|
||||||
resp.Diagnostics.Append(req.Config.Get(ctx, &data)...)
|
resp.Diagnostics.Append(req.Config.Get(ctx, &data)...)
|
||||||
if resp.Diagnostics.HasError() {
|
if resp.Diagnostics.HasError() {
|
||||||
|
@ -149,7 +142,7 @@ func (r *secretResource) Create(ctx context.Context, req resource.CreateRequest,
|
||||||
}
|
}
|
||||||
|
|
||||||
func (r *secretResource) Read(ctx context.Context, req resource.ReadRequest, resp *resource.ReadResponse) {
|
func (r *secretResource) Read(ctx context.Context, req resource.ReadRequest, resp *resource.ReadResponse) {
|
||||||
var data secretResourceModel
|
var data secretResourceModelV1
|
||||||
|
|
||||||
resp.Diagnostics.Append(req.State.Get(ctx, &data)...)
|
resp.Diagnostics.Append(req.State.Get(ctx, &data)...)
|
||||||
if resp.Diagnostics.HasError() {
|
if resp.Diagnostics.HasError() {
|
||||||
|
@ -170,7 +163,7 @@ func (r *secretResource) Read(ctx context.Context, req resource.ReadRequest, res
|
||||||
}
|
}
|
||||||
|
|
||||||
func (r *secretResource) Update(ctx context.Context, req resource.UpdateRequest, resp *resource.UpdateResponse) {
|
func (r *secretResource) Update(ctx context.Context, req resource.UpdateRequest, resp *resource.UpdateResponse) {
|
||||||
var data secretResourceModel
|
var data secretResourceModelV1
|
||||||
|
|
||||||
resp.Diagnostics.Append(req.Plan.Get(ctx, &data)...)
|
resp.Diagnostics.Append(req.Plan.Get(ctx, &data)...)
|
||||||
if resp.Diagnostics.HasError() {
|
if resp.Diagnostics.HasError() {
|
||||||
|
@ -198,7 +191,7 @@ func (r *secretResource) Update(ctx context.Context, req resource.UpdateRequest,
|
||||||
}
|
}
|
||||||
|
|
||||||
func (r *secretResource) Delete(ctx context.Context, req resource.DeleteRequest, resp *resource.DeleteResponse) {
|
func (r *secretResource) Delete(ctx context.Context, req resource.DeleteRequest, resp *resource.DeleteResponse) {
|
||||||
var data secretResourceModel
|
var data secretResourceModelV1
|
||||||
|
|
||||||
resp.Diagnostics.Append(req.State.Get(ctx, &data)...)
|
resp.Diagnostics.Append(req.State.Get(ctx, &data)...)
|
||||||
if resp.Diagnostics.HasError() {
|
if resp.Diagnostics.HasError() {
|
||||||
|
@ -220,3 +213,85 @@ func (r *secretResource) ImportState(
|
||||||
) {
|
) {
|
||||||
resp.Diagnostics.Append(resp.State.SetAttribute(ctx, path.Root("name"), req.ID)...)
|
resp.Diagnostics.Append(resp.State.SetAttribute(ctx, path.Root("name"), req.ID)...)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (r *secretResource) UpgradeState(_ context.Context) map[int64]resource.StateUpgrader {
|
||||||
|
return map[int64]resource.StateUpgrader{
|
||||||
|
// State upgrade implementation from 0 (prior state version) to 1 (Schema.Version)
|
||||||
|
0: {
|
||||||
|
// remove plugins_only attribute
|
||||||
|
PriorSchema: &schema.Schema{
|
||||||
|
Attributes: map[string]schema.Attribute{
|
||||||
|
"id": schema.Int64Attribute{
|
||||||
|
Computed: true,
|
||||||
|
Description: "the secret's id",
|
||||||
|
PlanModifiers: []planmodifier.Int64{
|
||||||
|
int64planmodifier.UseStateForUnknown(),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"name": schema.StringAttribute{
|
||||||
|
Required: true,
|
||||||
|
Description: "the name of the secret",
|
||||||
|
PlanModifiers: []planmodifier.String{
|
||||||
|
stringplanmodifier.RequiresReplace(),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"value": schema.StringAttribute{
|
||||||
|
Required: true,
|
||||||
|
Description: "the value of the secret",
|
||||||
|
Sensitive: true,
|
||||||
|
PlanModifiers: []planmodifier.String{
|
||||||
|
stringplanmodifier.UseStateForUnknown(),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"events": schema.SetAttribute{
|
||||||
|
ElementType: types.StringType,
|
||||||
|
Required: true,
|
||||||
|
Description: "events for which the secret is available (push, tag, pull_request, deployment, cron, manual)",
|
||||||
|
Validators: []validator.Set{
|
||||||
|
setvalidator.ValueStringsAre(
|
||||||
|
stringvalidator.OneOfCaseInsensitive("push", "tag", "pull_request", "deployment", "cron", "manual"),
|
||||||
|
),
|
||||||
|
},
|
||||||
|
PlanModifiers: []planmodifier.Set{
|
||||||
|
setplanmodifier.UseStateForUnknown(),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"plugins_only": schema.BoolAttribute{
|
||||||
|
Optional: true,
|
||||||
|
Computed: true,
|
||||||
|
MarkdownDescription: "whether secret is only available for" +
|
||||||
|
" [plugins](https://woodpecker-ci.org/docs/usage/plugins/plugins)",
|
||||||
|
PlanModifiers: []planmodifier.Bool{
|
||||||
|
boolplanmodifier.UseStateForUnknown(),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"images": schema.SetAttribute{
|
||||||
|
ElementType: types.StringType,
|
||||||
|
Optional: true,
|
||||||
|
Computed: true,
|
||||||
|
Description: "list of Docker images for which this secret is available, leave blank to allow all images",
|
||||||
|
PlanModifiers: []planmodifier.Set{
|
||||||
|
setplanmodifier.UseStateForUnknown(),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
StateUpgrader: func(ctx context.Context, req resource.UpgradeStateRequest, resp *resource.UpgradeStateResponse) {
|
||||||
|
var priorStateData secretResourceModelV0
|
||||||
|
|
||||||
|
resp.Diagnostics.Append(req.State.Get(ctx, &priorStateData)...)
|
||||||
|
if resp.Diagnostics.HasError() {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
resp.Diagnostics.Append(resp.State.Set(ctx, secretResourceModelV1{
|
||||||
|
ID: priorStateData.ID,
|
||||||
|
Name: priorStateData.Name,
|
||||||
|
Value: priorStateData.Value,
|
||||||
|
Images: priorStateData.Images,
|
||||||
|
Events: priorStateData.Events,
|
||||||
|
})...)
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
|
@ -7,11 +7,11 @@ import (
|
||||||
"slices"
|
"slices"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
|
"github.com/Kichiyaki/terraform-provider-woodpecker/internal/woodpecker"
|
||||||
"github.com/google/uuid"
|
"github.com/google/uuid"
|
||||||
"github.com/hashicorp/terraform-plugin-testing/helper/resource"
|
"github.com/hashicorp/terraform-plugin-testing/helper/resource"
|
||||||
"github.com/hashicorp/terraform-plugin-testing/plancheck"
|
"github.com/hashicorp/terraform-plugin-testing/plancheck"
|
||||||
"github.com/hashicorp/terraform-plugin-testing/terraform"
|
"github.com/hashicorp/terraform-plugin-testing/terraform"
|
||||||
"go.woodpecker-ci.org/woodpecker/woodpecker-go/woodpecker"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestSecretResource(t *testing.T) {
|
func TestSecretResource(t *testing.T) {
|
||||||
|
@ -41,7 +41,6 @@ resource "woodpecker_secret" "test_secret" {
|
||||||
resource.TestCheckResourceAttr("woodpecker_secret.test_secret", "name", name),
|
resource.TestCheckResourceAttr("woodpecker_secret.test_secret", "name", name),
|
||||||
resource.TestCheckResourceAttr("woodpecker_secret.test_secret", "value", "test123"),
|
resource.TestCheckResourceAttr("woodpecker_secret.test_secret", "value", "test123"),
|
||||||
resource.TestCheckTypeSetElemAttr("woodpecker_secret.test_secret", "events.*", "push"),
|
resource.TestCheckTypeSetElemAttr("woodpecker_secret.test_secret", "events.*", "push"),
|
||||||
resource.TestCheckResourceAttr("woodpecker_secret.test_secret", "plugins_only", "false"),
|
|
||||||
),
|
),
|
||||||
},
|
},
|
||||||
{ // update secret
|
{ // update secret
|
||||||
|
@ -50,7 +49,6 @@ resource "woodpecker_secret" "test_secret" {
|
||||||
name = "%s"
|
name = "%s"
|
||||||
value = "test123123"
|
value = "test123123"
|
||||||
events = ["push", "deployment"]
|
events = ["push", "deployment"]
|
||||||
plugins_only = true
|
|
||||||
images = ["testimage"]
|
images = ["testimage"]
|
||||||
}
|
}
|
||||||
`, name),
|
`, name),
|
||||||
|
@ -60,7 +58,6 @@ resource "woodpecker_secret" "test_secret" {
|
||||||
resource.TestCheckResourceAttr("woodpecker_secret.test_secret", "value", "test123123"),
|
resource.TestCheckResourceAttr("woodpecker_secret.test_secret", "value", "test123123"),
|
||||||
resource.TestCheckTypeSetElemAttr("woodpecker_secret.test_secret", "events.*", "push"),
|
resource.TestCheckTypeSetElemAttr("woodpecker_secret.test_secret", "events.*", "push"),
|
||||||
resource.TestCheckTypeSetElemAttr("woodpecker_secret.test_secret", "events.*", "deployment"),
|
resource.TestCheckTypeSetElemAttr("woodpecker_secret.test_secret", "events.*", "deployment"),
|
||||||
resource.TestCheckResourceAttr("woodpecker_secret.test_secret", "plugins_only", "true"),
|
|
||||||
resource.TestCheckTypeSetElemAttr("woodpecker_secret.test_secret", "images.*", "testimage"),
|
resource.TestCheckTypeSetElemAttr("woodpecker_secret.test_secret", "images.*", "testimage"),
|
||||||
),
|
),
|
||||||
},
|
},
|
||||||
|
@ -79,7 +76,6 @@ resource "woodpecker_secret" "test_secret" {
|
||||||
resource.TestCheckTypeSetElemAttr("woodpecker_secret.test_secret", "events.*", "push"),
|
resource.TestCheckTypeSetElemAttr("woodpecker_secret.test_secret", "events.*", "push"),
|
||||||
resource.TestCheckTypeSetElemAttr("woodpecker_secret.test_secret", "events.*", "deployment"),
|
resource.TestCheckTypeSetElemAttr("woodpecker_secret.test_secret", "events.*", "deployment"),
|
||||||
resource.TestCheckTypeSetElemAttr("woodpecker_secret.test_secret", "events.*", "cron"),
|
resource.TestCheckTypeSetElemAttr("woodpecker_secret.test_secret", "events.*", "cron"),
|
||||||
resource.TestCheckResourceAttr("woodpecker_secret.test_secret", "plugins_only", "true"),
|
|
||||||
resource.TestCheckTypeSetElemAttr("woodpecker_secret.test_secret", "images.*", "testimage"),
|
resource.TestCheckTypeSetElemAttr("woodpecker_secret.test_secret", "images.*", "testimage"),
|
||||||
),
|
),
|
||||||
},
|
},
|
||||||
|
@ -108,7 +104,6 @@ resource "woodpecker_secret" "test_secret" {
|
||||||
resource.TestCheckResourceAttr("woodpecker_secret.test_secret", "name", newName),
|
resource.TestCheckResourceAttr("woodpecker_secret.test_secret", "name", newName),
|
||||||
resource.TestCheckResourceAttr("woodpecker_secret.test_secret", "value", "test123New"),
|
resource.TestCheckResourceAttr("woodpecker_secret.test_secret", "value", "test123New"),
|
||||||
resource.TestCheckTypeSetElemAttr("woodpecker_secret.test_secret", "events.*", "push"),
|
resource.TestCheckTypeSetElemAttr("woodpecker_secret.test_secret", "events.*", "push"),
|
||||||
resource.TestCheckResourceAttr("woodpecker_secret.test_secret", "plugins_only", "false"),
|
|
||||||
),
|
),
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
|
|
@ -4,6 +4,7 @@ import (
|
||||||
"context"
|
"context"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
|
||||||
|
"github.com/Kichiyaki/terraform-provider-woodpecker/internal/woodpecker"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/path"
|
"github.com/hashicorp/terraform-plugin-framework/path"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/resource"
|
"github.com/hashicorp/terraform-plugin-framework/resource"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/resource/schema"
|
"github.com/hashicorp/terraform-plugin-framework/resource/schema"
|
||||||
|
@ -11,7 +12,6 @@ import (
|
||||||
"github.com/hashicorp/terraform-plugin-framework/resource/schema/int64planmodifier"
|
"github.com/hashicorp/terraform-plugin-framework/resource/schema/int64planmodifier"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/resource/schema/planmodifier"
|
"github.com/hashicorp/terraform-plugin-framework/resource/schema/planmodifier"
|
||||||
"github.com/hashicorp/terraform-plugin-framework/resource/schema/stringplanmodifier"
|
"github.com/hashicorp/terraform-plugin-framework/resource/schema/stringplanmodifier"
|
||||||
"go.woodpecker-ci.org/woodpecker/woodpecker-go/woodpecker"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
type userResource struct {
|
type userResource struct {
|
||||||
|
|
|
@ -6,11 +6,11 @@ import (
|
||||||
"slices"
|
"slices"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
|
"github.com/Kichiyaki/terraform-provider-woodpecker/internal/woodpecker"
|
||||||
"github.com/google/uuid"
|
"github.com/google/uuid"
|
||||||
"github.com/hashicorp/terraform-plugin-testing/helper/resource"
|
"github.com/hashicorp/terraform-plugin-testing/helper/resource"
|
||||||
"github.com/hashicorp/terraform-plugin-testing/plancheck"
|
"github.com/hashicorp/terraform-plugin-testing/plancheck"
|
||||||
"github.com/hashicorp/terraform-plugin-testing/terraform"
|
"github.com/hashicorp/terraform-plugin-testing/terraform"
|
||||||
"go.woodpecker-ci.org/woodpecker/woodpecker-go/woodpecker"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestUserResource(t *testing.T) {
|
func TestUserResource(t *testing.T) {
|
||||||
|
|
|
@ -5,8 +5,8 @@ import (
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"code.gitea.io/sdk/gitea"
|
"code.gitea.io/sdk/gitea"
|
||||||
|
"github.com/Kichiyaki/terraform-provider-woodpecker/internal/woodpecker"
|
||||||
"github.com/google/uuid"
|
"github.com/google/uuid"
|
||||||
"go.woodpecker-ci.org/woodpecker/woodpecker-go/woodpecker"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
func createRepo(tb testing.TB) *gitea.Repository {
|
func createRepo(tb testing.TB) *gitea.Repository {
|
||||||
|
|
667
internal/woodpecker/client.go
Normal file
667
internal/woodpecker/client.go
Normal file
|
@ -0,0 +1,667 @@
|
||||||
|
// Copyright 2022 Woodpecker Authors
|
||||||
|
//
|
||||||
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
// you may not use this file except in compliance with the License.
|
||||||
|
// You may obtain a copy of the License at
|
||||||
|
//
|
||||||
|
// http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
//
|
||||||
|
// Unless required by applicable law or agreed to in writing, software
|
||||||
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
// See the License for the specific language governing permissions and
|
||||||
|
// limitations under the License.
|
||||||
|
|
||||||
|
package woodpecker
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"encoding/json"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"net/http"
|
||||||
|
"net/url"
|
||||||
|
"strconv"
|
||||||
|
"strings"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
pathSelf = "%s/api/user"
|
||||||
|
pathRepos = "%s/api/user/repos"
|
||||||
|
pathRepoPost = "%s/api/repos?forge_remote_id=%d"
|
||||||
|
pathRepo = "%s/api/repos/%d"
|
||||||
|
pathRepoLookup = "%s/api/repos/lookup/%s"
|
||||||
|
pathRepoMove = "%s/api/repos/%d/move?to=%s"
|
||||||
|
pathChown = "%s/api/repos/%d/chown"
|
||||||
|
pathRepair = "%s/api/repos/%d/repair"
|
||||||
|
pathPipelines = "%s/api/repos/%d/pipelines"
|
||||||
|
pathPipeline = "%s/api/repos/%d/pipelines/%v"
|
||||||
|
pathLogs = "%s/api/repos/%d/logs/%d/%d"
|
||||||
|
pathApprove = "%s/api/repos/%d/pipelines/%d/approve"
|
||||||
|
pathDecline = "%s/api/repos/%d/pipelines/%d/decline"
|
||||||
|
pathStop = "%s/api/repos/%d/pipelines/%d/cancel"
|
||||||
|
pathLogPurge = "%s/api/repos/%d/logs/%d"
|
||||||
|
pathRepoSecrets = "%s/api/repos/%d/secrets"
|
||||||
|
pathRepoSecret = "%s/api/repos/%d/secrets/%s"
|
||||||
|
pathRepoRegistries = "%s/api/repos/%d/registry"
|
||||||
|
pathRepoRegistry = "%s/api/repos/%d/registry/%s"
|
||||||
|
pathRepoCrons = "%s/api/repos/%d/cron"
|
||||||
|
pathRepoCron = "%s/api/repos/%d/cron/%d"
|
||||||
|
pathOrg = "%s/api/orgs/%d"
|
||||||
|
pathOrgLookup = "%s/api/orgs/lookup/%s"
|
||||||
|
pathOrgSecrets = "%s/api/orgs/%d/secrets"
|
||||||
|
pathOrgSecret = "%s/api/orgs/%d/secrets/%s"
|
||||||
|
pathGlobalSecrets = "%s/api/secrets"
|
||||||
|
pathGlobalSecret = "%s/api/secrets/%s"
|
||||||
|
pathUsers = "%s/api/users"
|
||||||
|
pathUser = "%s/api/users/%s"
|
||||||
|
pathPipelineQueue = "%s/api/pipelines"
|
||||||
|
pathQueue = "%s/api/queue"
|
||||||
|
pathLogLevel = "%s/api/log-level"
|
||||||
|
pathAgents = "%s/api/agents"
|
||||||
|
pathAgent = "%s/api/agents/%d"
|
||||||
|
pathAgentTasks = "%s/api/agents/%d/tasks"
|
||||||
|
pathVersion = "%s/version"
|
||||||
|
// TODO: implement endpoints
|
||||||
|
// pathFeed = "%s/api/user/feed"
|
||||||
|
)
|
||||||
|
|
||||||
|
type client struct {
|
||||||
|
client *http.Client
|
||||||
|
addr string
|
||||||
|
}
|
||||||
|
|
||||||
|
// New returns a client at the specified url.
|
||||||
|
func New(uri string) Client {
|
||||||
|
return &client{http.DefaultClient, strings.TrimSuffix(uri, "/")}
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewClient returns a client at the specified url.
|
||||||
|
func NewClient(uri string, cli *http.Client) Client {
|
||||||
|
return &client{cli, strings.TrimSuffix(uri, "/")}
|
||||||
|
}
|
||||||
|
|
||||||
|
// SetClient sets the http.Client.
|
||||||
|
func (c *client) SetClient(client *http.Client) {
|
||||||
|
c.client = client
|
||||||
|
}
|
||||||
|
|
||||||
|
// SetAddress sets the server address.
|
||||||
|
func (c *client) SetAddress(addr string) {
|
||||||
|
c.addr = addr
|
||||||
|
}
|
||||||
|
|
||||||
|
// Self returns the currently authenticated user.
|
||||||
|
func (c *client) Self() (*User, error) {
|
||||||
|
out := new(User)
|
||||||
|
uri := fmt.Sprintf(pathSelf, c.addr)
|
||||||
|
err := c.get(uri, out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// User returns a user by login.
|
||||||
|
func (c *client) User(login string) (*User, error) {
|
||||||
|
out := new(User)
|
||||||
|
uri := fmt.Sprintf(pathUser, c.addr, login)
|
||||||
|
err := c.get(uri, out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// UserList returns a list of all registered users.
|
||||||
|
func (c *client) UserList() ([]*User, error) {
|
||||||
|
var out []*User
|
||||||
|
uri := fmt.Sprintf(pathUsers, c.addr)
|
||||||
|
err := c.get(uri, &out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// UserPost creates a new user account.
|
||||||
|
func (c *client) UserPost(in *User) (*User, error) {
|
||||||
|
out := new(User)
|
||||||
|
uri := fmt.Sprintf(pathUsers, c.addr)
|
||||||
|
err := c.post(uri, in, out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// UserPatch updates a user account.
|
||||||
|
func (c *client) UserPatch(in *User) (*User, error) {
|
||||||
|
out := new(User)
|
||||||
|
uri := fmt.Sprintf(pathUser, c.addr, in.Login)
|
||||||
|
err := c.patch(uri, in, out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// UserDel deletes a user account.
|
||||||
|
func (c *client) UserDel(login string) error {
|
||||||
|
uri := fmt.Sprintf(pathUser, c.addr, login)
|
||||||
|
err := c.delete(uri)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Repo returns a repository by id.
|
||||||
|
func (c *client) Repo(repoID int64) (*Repo, error) {
|
||||||
|
out := new(Repo)
|
||||||
|
uri := fmt.Sprintf(pathRepo, c.addr, repoID)
|
||||||
|
err := c.get(uri, out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// RepoLookup returns a repository by name.
|
||||||
|
func (c *client) RepoLookup(fullName string) (*Repo, error) {
|
||||||
|
out := new(Repo)
|
||||||
|
uri := fmt.Sprintf(pathRepoLookup, c.addr, fullName)
|
||||||
|
err := c.get(uri, out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// RepoList returns a list of all repositories to which
|
||||||
|
// the user has explicit access in the host system.
|
||||||
|
func (c *client) RepoList() ([]*Repo, error) {
|
||||||
|
var out []*Repo
|
||||||
|
uri := fmt.Sprintf(pathRepos, c.addr)
|
||||||
|
err := c.get(uri, &out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// RepoListOpts returns a list of all repositories to which
|
||||||
|
// the user has explicit access in the host system.
|
||||||
|
func (c *client) RepoListOpts(all bool) ([]*Repo, error) {
|
||||||
|
var out []*Repo
|
||||||
|
uri := fmt.Sprintf(pathRepos+"?all=%v", c.addr, all)
|
||||||
|
err := c.get(uri, &out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// RepoPost activates a repository.
|
||||||
|
func (c *client) RepoPost(forgeRemoteID int64) (*Repo, error) {
|
||||||
|
out := new(Repo)
|
||||||
|
uri := fmt.Sprintf(pathRepoPost, c.addr, forgeRemoteID)
|
||||||
|
err := c.post(uri, nil, out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// RepoChown updates a repository owner.
|
||||||
|
func (c *client) RepoChown(repoID int64) (*Repo, error) {
|
||||||
|
out := new(Repo)
|
||||||
|
uri := fmt.Sprintf(pathChown, c.addr, repoID)
|
||||||
|
err := c.post(uri, nil, out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// RepoRepair repairs the repository hooks.
|
||||||
|
func (c *client) RepoRepair(repoID int64) error {
|
||||||
|
uri := fmt.Sprintf(pathRepair, c.addr, repoID)
|
||||||
|
return c.post(uri, nil, nil)
|
||||||
|
}
|
||||||
|
|
||||||
|
// RepoPatch updates a repository.
|
||||||
|
func (c *client) RepoPatch(repoID int64, in *RepoPatch) (*Repo, error) {
|
||||||
|
out := new(Repo)
|
||||||
|
uri := fmt.Sprintf(pathRepo, c.addr, repoID)
|
||||||
|
err := c.patch(uri, in, out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// RepoDel deletes a repository.
|
||||||
|
func (c *client) RepoDel(repoID int64) error {
|
||||||
|
uri := fmt.Sprintf(pathRepo, c.addr, repoID)
|
||||||
|
err := c.delete(uri)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// RepoMove moves a repository
|
||||||
|
func (c *client) RepoMove(repoID int64, newFullName string) error {
|
||||||
|
uri := fmt.Sprintf(pathRepoMove, c.addr, repoID, newFullName)
|
||||||
|
return c.post(uri, nil, nil)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Pipeline returns a repository pipeline by pipeline-id.
|
||||||
|
func (c *client) Pipeline(repoID, pipeline int64) (*Pipeline, error) {
|
||||||
|
out := new(Pipeline)
|
||||||
|
uri := fmt.Sprintf(pathPipeline, c.addr, repoID, pipeline)
|
||||||
|
err := c.get(uri, out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Pipeline returns the latest repository pipeline by branch.
|
||||||
|
func (c *client) PipelineLast(repoID int64, branch string) (*Pipeline, error) {
|
||||||
|
out := new(Pipeline)
|
||||||
|
uri := fmt.Sprintf(pathPipeline, c.addr, repoID, "latest")
|
||||||
|
if len(branch) != 0 {
|
||||||
|
uri += "?branch=" + branch
|
||||||
|
}
|
||||||
|
err := c.get(uri, out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// PipelineList returns a list of recent pipelines for the
|
||||||
|
// the specified repository.
|
||||||
|
func (c *client) PipelineList(repoID int64) ([]*Pipeline, error) {
|
||||||
|
var out []*Pipeline
|
||||||
|
uri := fmt.Sprintf(pathPipelines, c.addr, repoID)
|
||||||
|
err := c.get(uri, &out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *client) PipelineCreate(repoID int64, options *PipelineOptions) (*Pipeline, error) {
|
||||||
|
var out *Pipeline
|
||||||
|
uri := fmt.Sprintf(pathPipelines, c.addr, repoID)
|
||||||
|
err := c.post(uri, options, &out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// PipelineQueue returns a list of enqueued pipelines.
|
||||||
|
func (c *client) PipelineQueue() ([]*Feed, error) {
|
||||||
|
var out []*Feed
|
||||||
|
uri := fmt.Sprintf(pathPipelineQueue, c.addr)
|
||||||
|
err := c.get(uri, &out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// PipelineStart re-starts a stopped pipeline.
|
||||||
|
func (c *client) PipelineStart(repoID, pipeline int64, params map[string]string) (*Pipeline, error) {
|
||||||
|
out := new(Pipeline)
|
||||||
|
val := mapValues(params)
|
||||||
|
uri := fmt.Sprintf(pathPipeline, c.addr, repoID, pipeline)
|
||||||
|
err := c.post(uri+"?"+val.Encode(), nil, out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// PipelineStop cancels the running step.
|
||||||
|
func (c *client) PipelineStop(repoID, pipeline int64) error {
|
||||||
|
uri := fmt.Sprintf(pathStop, c.addr, repoID, pipeline)
|
||||||
|
err := c.post(uri, nil, nil)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// PipelineApprove approves a blocked pipeline.
|
||||||
|
func (c *client) PipelineApprove(repoID, pipeline int64) (*Pipeline, error) {
|
||||||
|
out := new(Pipeline)
|
||||||
|
uri := fmt.Sprintf(pathApprove, c.addr, repoID, pipeline)
|
||||||
|
err := c.post(uri, nil, out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// PipelineDecline declines a blocked pipeline.
|
||||||
|
func (c *client) PipelineDecline(repoID, pipeline int64) (*Pipeline, error) {
|
||||||
|
out := new(Pipeline)
|
||||||
|
uri := fmt.Sprintf(pathDecline, c.addr, repoID, pipeline)
|
||||||
|
err := c.post(uri, nil, out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// PipelineKill force kills the running pipeline.
|
||||||
|
func (c *client) PipelineKill(repoID, pipeline int64) error {
|
||||||
|
uri := fmt.Sprintf(pathPipeline, c.addr, repoID, pipeline)
|
||||||
|
err := c.delete(uri)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// PipelineLogs returns the pipeline logs for the specified step.
|
||||||
|
func (c *client) StepLogEntries(repoID, num, step int64) ([]*LogEntry, error) {
|
||||||
|
uri := fmt.Sprintf(pathLogs, c.addr, repoID, num, step)
|
||||||
|
var out []*LogEntry
|
||||||
|
err := c.get(uri, &out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Deploy triggers a deployment for an existing pipeline using the
|
||||||
|
// specified target environment.
|
||||||
|
func (c *client) Deploy(repoID, pipeline int64, env string, params map[string]string) (*Pipeline, error) {
|
||||||
|
out := new(Pipeline)
|
||||||
|
val := mapValues(params)
|
||||||
|
val.Set("event", EventDeploy)
|
||||||
|
val.Set("deploy_to", env)
|
||||||
|
uri := fmt.Sprintf(pathPipeline, c.addr, repoID, pipeline)
|
||||||
|
err := c.post(uri+"?"+val.Encode(), nil, out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// LogsPurge purges the pipeline logs for the specified pipeline.
|
||||||
|
func (c *client) LogsPurge(repoID, pipeline int64) error {
|
||||||
|
uri := fmt.Sprintf(pathLogPurge, c.addr, repoID, pipeline)
|
||||||
|
err := c.delete(uri)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Registry returns a registry by hostname.
|
||||||
|
func (c *client) Registry(repoID int64, hostname string) (*Registry, error) {
|
||||||
|
out := new(Registry)
|
||||||
|
uri := fmt.Sprintf(pathRepoRegistry, c.addr, repoID, hostname)
|
||||||
|
err := c.get(uri, out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// RegistryList returns a list of all repository registries.
|
||||||
|
func (c *client) RegistryList(repoID int64) ([]*Registry, error) {
|
||||||
|
var out []*Registry
|
||||||
|
uri := fmt.Sprintf(pathRepoRegistries, c.addr, repoID)
|
||||||
|
err := c.get(uri, &out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// RegistryCreate creates a registry.
|
||||||
|
func (c *client) RegistryCreate(repoID int64, in *Registry) (*Registry, error) {
|
||||||
|
out := new(Registry)
|
||||||
|
uri := fmt.Sprintf(pathRepoRegistries, c.addr, repoID)
|
||||||
|
err := c.post(uri, in, out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// RegistryUpdate updates a registry.
|
||||||
|
func (c *client) RegistryUpdate(repoID int64, in *Registry) (*Registry, error) {
|
||||||
|
out := new(Registry)
|
||||||
|
uri := fmt.Sprintf(pathRepoRegistry, c.addr, repoID, in.Address)
|
||||||
|
err := c.patch(uri, in, out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// RegistryDelete deletes a registry.
|
||||||
|
func (c *client) RegistryDelete(repoID int64, hostname string) error {
|
||||||
|
uri := fmt.Sprintf(pathRepoRegistry, c.addr, repoID, hostname)
|
||||||
|
return c.delete(uri)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Secret returns a secret by name.
|
||||||
|
func (c *client) Secret(repoID int64, secret string) (*Secret, error) {
|
||||||
|
out := new(Secret)
|
||||||
|
uri := fmt.Sprintf(pathRepoSecret, c.addr, repoID, secret)
|
||||||
|
err := c.get(uri, out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// SecretList returns a list of all repository secrets.
|
||||||
|
func (c *client) SecretList(repoID int64) ([]*Secret, error) {
|
||||||
|
var out []*Secret
|
||||||
|
uri := fmt.Sprintf(pathRepoSecrets, c.addr, repoID)
|
||||||
|
err := c.get(uri, &out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// SecretCreate creates a secret.
|
||||||
|
func (c *client) SecretCreate(repoID int64, in *Secret) (*Secret, error) {
|
||||||
|
out := new(Secret)
|
||||||
|
uri := fmt.Sprintf(pathRepoSecrets, c.addr, repoID)
|
||||||
|
err := c.post(uri, in, out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// SecretUpdate updates a secret.
|
||||||
|
func (c *client) SecretUpdate(repoID int64, in *Secret) (*Secret, error) {
|
||||||
|
out := new(Secret)
|
||||||
|
uri := fmt.Sprintf(pathRepoSecret, c.addr, repoID, in.Name)
|
||||||
|
err := c.patch(uri, in, out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// SecretDelete deletes a secret.
|
||||||
|
func (c *client) SecretDelete(repoID int64, secret string) error {
|
||||||
|
uri := fmt.Sprintf(pathRepoSecret, c.addr, repoID, secret)
|
||||||
|
return c.delete(uri)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Org returns an organization by id.
|
||||||
|
func (c *client) Org(orgID int64) (*Org, error) {
|
||||||
|
out := new(Org)
|
||||||
|
uri := fmt.Sprintf(pathOrg, c.addr, orgID)
|
||||||
|
err := c.get(uri, out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// OrgLookup returns a organsization by its name.
|
||||||
|
func (c *client) OrgLookup(name string) (*Org, error) {
|
||||||
|
out := new(Org)
|
||||||
|
uri := fmt.Sprintf(pathOrgLookup, c.addr, name)
|
||||||
|
err := c.get(uri, out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// OrgSecret returns an organization secret by name.
|
||||||
|
func (c *client) OrgSecret(orgID int64, secret string) (*Secret, error) {
|
||||||
|
out := new(Secret)
|
||||||
|
uri := fmt.Sprintf(pathOrgSecret, c.addr, orgID, secret)
|
||||||
|
err := c.get(uri, out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// OrgSecretList returns a list of all organization secrets.
|
||||||
|
func (c *client) OrgSecretList(orgID int64) ([]*Secret, error) {
|
||||||
|
var out []*Secret
|
||||||
|
uri := fmt.Sprintf(pathOrgSecrets, c.addr, orgID)
|
||||||
|
err := c.get(uri, &out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// OrgSecretCreate creates an organization secret.
|
||||||
|
func (c *client) OrgSecretCreate(orgID int64, in *Secret) (*Secret, error) {
|
||||||
|
out := new(Secret)
|
||||||
|
uri := fmt.Sprintf(pathOrgSecrets, c.addr, orgID)
|
||||||
|
err := c.post(uri, in, out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// OrgSecretUpdate updates an organization secret.
|
||||||
|
func (c *client) OrgSecretUpdate(orgID int64, in *Secret) (*Secret, error) {
|
||||||
|
out := new(Secret)
|
||||||
|
uri := fmt.Sprintf(pathOrgSecret, c.addr, orgID, in.Name)
|
||||||
|
err := c.patch(uri, in, out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// OrgSecretDelete deletes an organization secret.
|
||||||
|
func (c *client) OrgSecretDelete(orgID int64, secret string) error {
|
||||||
|
uri := fmt.Sprintf(pathOrgSecret, c.addr, orgID, secret)
|
||||||
|
return c.delete(uri)
|
||||||
|
}
|
||||||
|
|
||||||
|
// GlobalOrgSecret returns an global secret by name.
|
||||||
|
func (c *client) GlobalSecret(secret string) (*Secret, error) {
|
||||||
|
out := new(Secret)
|
||||||
|
uri := fmt.Sprintf(pathGlobalSecret, c.addr, secret)
|
||||||
|
err := c.get(uri, out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// GlobalSecretList returns a list of all global secrets.
|
||||||
|
func (c *client) GlobalSecretList() ([]*Secret, error) {
|
||||||
|
var out []*Secret
|
||||||
|
uri := fmt.Sprintf(pathGlobalSecrets, c.addr)
|
||||||
|
err := c.get(uri, &out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// GlobalSecretCreate creates a global secret.
|
||||||
|
func (c *client) GlobalSecretCreate(in *Secret) (*Secret, error) {
|
||||||
|
out := new(Secret)
|
||||||
|
uri := fmt.Sprintf(pathGlobalSecrets, c.addr)
|
||||||
|
err := c.post(uri, in, out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// GlobalSecretUpdate updates a global secret.
|
||||||
|
func (c *client) GlobalSecretUpdate(in *Secret) (*Secret, error) {
|
||||||
|
out := new(Secret)
|
||||||
|
uri := fmt.Sprintf(pathGlobalSecret, c.addr, in.Name)
|
||||||
|
err := c.patch(uri, in, out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// GlobalSecretDelete deletes a global secret.
|
||||||
|
func (c *client) GlobalSecretDelete(secret string) error {
|
||||||
|
uri := fmt.Sprintf(pathGlobalSecret, c.addr, secret)
|
||||||
|
return c.delete(uri)
|
||||||
|
}
|
||||||
|
|
||||||
|
// QueueInfo returns queue info
|
||||||
|
func (c *client) QueueInfo() (*Info, error) {
|
||||||
|
out := new(Info)
|
||||||
|
uri := fmt.Sprintf(pathQueue+"/info", c.addr)
|
||||||
|
err := c.get(uri, out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// LogLevel returns the current logging level
|
||||||
|
func (c *client) LogLevel() (*LogLevel, error) {
|
||||||
|
out := new(LogLevel)
|
||||||
|
uri := fmt.Sprintf(pathLogLevel, c.addr)
|
||||||
|
err := c.get(uri, out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// SetLogLevel sets the logging level of the server
|
||||||
|
func (c *client) SetLogLevel(in *LogLevel) (*LogLevel, error) {
|
||||||
|
out := new(LogLevel)
|
||||||
|
uri := fmt.Sprintf(pathLogLevel, c.addr)
|
||||||
|
err := c.post(uri, in, out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *client) CronList(repoID int64) ([]*Cron, error) {
|
||||||
|
out := make([]*Cron, 0, 5)
|
||||||
|
uri := fmt.Sprintf(pathRepoCrons, c.addr, repoID)
|
||||||
|
return out, c.get(uri, &out)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *client) CronCreate(repoID int64, in *Cron) (*Cron, error) {
|
||||||
|
out := new(Cron)
|
||||||
|
uri := fmt.Sprintf(pathRepoCrons, c.addr, repoID)
|
||||||
|
return out, c.post(uri, in, out)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *client) CronUpdate(repoID int64, in *Cron) (*Cron, error) {
|
||||||
|
out := new(Cron)
|
||||||
|
uri := fmt.Sprintf(pathRepoCron, c.addr, repoID, in.ID)
|
||||||
|
err := c.patch(uri, in, out)
|
||||||
|
return out, err
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *client) CronDelete(repoID, cronID int64) error {
|
||||||
|
uri := fmt.Sprintf(pathRepoCron, c.addr, repoID, cronID)
|
||||||
|
return c.delete(uri)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *client) CronGet(repoID, cronID int64) (*Cron, error) {
|
||||||
|
out := new(Cron)
|
||||||
|
uri := fmt.Sprintf(pathRepoCron, c.addr, repoID, cronID)
|
||||||
|
return out, c.get(uri, out)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *client) AgentList() ([]*Agent, error) {
|
||||||
|
out := make([]*Agent, 0, 5)
|
||||||
|
uri := fmt.Sprintf(pathAgents, c.addr)
|
||||||
|
return out, c.get(uri, &out)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *client) Agent(agentID int64) (*Agent, error) {
|
||||||
|
out := new(Agent)
|
||||||
|
uri := fmt.Sprintf(pathAgent, c.addr, agentID)
|
||||||
|
return out, c.get(uri, out)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *client) AgentCreate(in *Agent) (*Agent, error) {
|
||||||
|
out := new(Agent)
|
||||||
|
uri := fmt.Sprintf(pathAgents, c.addr)
|
||||||
|
return out, c.post(uri, in, out)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *client) AgentUpdate(in *Agent) (*Agent, error) {
|
||||||
|
out := new(Agent)
|
||||||
|
uri := fmt.Sprintf(pathAgent, c.addr, in.ID)
|
||||||
|
return out, c.patch(uri, in, out)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *client) AgentDelete(agentID int64) error {
|
||||||
|
uri := fmt.Sprintf(pathAgent, c.addr, agentID)
|
||||||
|
return c.delete(uri)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *client) AgentTasksList(agentID int64) ([]*Task, error) {
|
||||||
|
out := make([]*Task, 0, 5)
|
||||||
|
uri := fmt.Sprintf(pathAgentTasks, c.addr, agentID)
|
||||||
|
return out, c.get(uri, &out)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *client) Version() (*Version, error) {
|
||||||
|
out := new(Version)
|
||||||
|
uri := fmt.Sprintf(pathVersion, c.addr)
|
||||||
|
return out, c.get(uri, &out)
|
||||||
|
}
|
||||||
|
|
||||||
|
//
|
||||||
|
// http request helper functions
|
||||||
|
//
|
||||||
|
|
||||||
|
// helper function for making an http GET request.
|
||||||
|
func (c *client) get(rawurl string, out any) error {
|
||||||
|
return c.do(rawurl, http.MethodGet, nil, out)
|
||||||
|
}
|
||||||
|
|
||||||
|
// helper function for making an http POST request.
|
||||||
|
func (c *client) post(rawurl string, in, out any) error {
|
||||||
|
return c.do(rawurl, http.MethodPost, in, out)
|
||||||
|
}
|
||||||
|
|
||||||
|
// helper function for making an http PATCH request.
|
||||||
|
func (c *client) patch(rawurl string, in, out any) error {
|
||||||
|
return c.do(rawurl, http.MethodPatch, in, out)
|
||||||
|
}
|
||||||
|
|
||||||
|
// helper function for making an http DELETE request.
|
||||||
|
func (c *client) delete(rawurl string) error {
|
||||||
|
return c.do(rawurl, http.MethodDelete, nil, nil)
|
||||||
|
}
|
||||||
|
|
||||||
|
// helper function to make an http request
|
||||||
|
func (c *client) do(rawurl, method string, in, out any) error {
|
||||||
|
body, err := c.open(rawurl, method, in)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
defer body.Close()
|
||||||
|
if out != nil {
|
||||||
|
return json.NewDecoder(body).Decode(out)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// helper function to open an http request
|
||||||
|
func (c *client) open(rawurl, method string, in any) (io.ReadCloser, error) {
|
||||||
|
uri, err := url.Parse(rawurl)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
req, err := http.NewRequest(method, uri.String(), nil)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if in != nil {
|
||||||
|
decoded, derr := json.Marshal(in)
|
||||||
|
if derr != nil {
|
||||||
|
return nil, derr
|
||||||
|
}
|
||||||
|
buf := bytes.NewBuffer(decoded)
|
||||||
|
req.Body = io.NopCloser(buf)
|
||||||
|
req.ContentLength = int64(len(decoded))
|
||||||
|
req.Header.Set("Content-Length", strconv.Itoa(len(decoded)))
|
||||||
|
req.Header.Set("Content-Type", "application/json")
|
||||||
|
}
|
||||||
|
resp, err := c.client.Do(req)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if resp.StatusCode > http.StatusPartialContent {
|
||||||
|
defer resp.Body.Close()
|
||||||
|
out, _ := io.ReadAll(resp.Body)
|
||||||
|
return nil, fmt.Errorf("client error %d: %s", resp.StatusCode, string(out))
|
||||||
|
}
|
||||||
|
return resp.Body, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// mapValues converts a map to url.Values
|
||||||
|
func mapValues(params map[string]string) url.Values {
|
||||||
|
values := url.Values{}
|
||||||
|
for key, val := range params {
|
||||||
|
values.Add(key, val)
|
||||||
|
}
|
||||||
|
return values
|
||||||
|
}
|
57
internal/woodpecker/const.go
Normal file
57
internal/woodpecker/const.go
Normal file
|
@ -0,0 +1,57 @@
|
||||||
|
// Copyright 2022 Woodpecker Authors
|
||||||
|
//
|
||||||
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
// you may not use this file except in compliance with the License.
|
||||||
|
// You may obtain a copy of the License at
|
||||||
|
//
|
||||||
|
// http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
//
|
||||||
|
// Unless required by applicable law or agreed to in writing, software
|
||||||
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
// See the License for the specific language governing permissions and
|
||||||
|
// limitations under the License.
|
||||||
|
|
||||||
|
package woodpecker
|
||||||
|
|
||||||
|
// Event values.
|
||||||
|
const (
|
||||||
|
EventPush = "push"
|
||||||
|
EventPull = "pull_request"
|
||||||
|
EventTag = "tag"
|
||||||
|
EventDeploy = "deployment"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Status values.
|
||||||
|
const (
|
||||||
|
StatusBlocked = "blocked"
|
||||||
|
StatusSkipped = "skipped"
|
||||||
|
StatusPending = "pending"
|
||||||
|
StatusRunning = "running"
|
||||||
|
StatusSuccess = "success"
|
||||||
|
StatusFailure = "failure"
|
||||||
|
StatusKilled = "killed"
|
||||||
|
StatusError = "error"
|
||||||
|
)
|
||||||
|
|
||||||
|
// LogEntryType identifies the type of line in the logs.
|
||||||
|
type LogEntryType int
|
||||||
|
|
||||||
|
const (
|
||||||
|
LogEntryStdout LogEntryType = iota
|
||||||
|
LogEntryStderr
|
||||||
|
LogEntryExitCode
|
||||||
|
LogEntryMetadata
|
||||||
|
LogEntryProgress
|
||||||
|
)
|
||||||
|
|
||||||
|
// StepType identifies the type of step
|
||||||
|
type StepType string
|
||||||
|
|
||||||
|
const (
|
||||||
|
StepTypeClone StepType = "clone"
|
||||||
|
StepTypeService StepType = "service"
|
||||||
|
StepTypePlugin StepType = "plugin"
|
||||||
|
StepTypeCommands StepType = "commands"
|
||||||
|
StepTypeCache StepType = "cache"
|
||||||
|
)
|
231
internal/woodpecker/interface.go
Normal file
231
internal/woodpecker/interface.go
Normal file
|
@ -0,0 +1,231 @@
|
||||||
|
// Copyright 2022 Woodpecker Authors
|
||||||
|
//
|
||||||
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
// you may not use this file except in compliance with the License.
|
||||||
|
// You may obtain a copy of the License at
|
||||||
|
//
|
||||||
|
// http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
//
|
||||||
|
// Unless required by applicable law or agreed to in writing, software
|
||||||
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
// See the License for the specific language governing permissions and
|
||||||
|
// limitations under the License.
|
||||||
|
|
||||||
|
package woodpecker
|
||||||
|
|
||||||
|
import (
|
||||||
|
"net/http"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Client is used to communicate with a Woodpecker server.
|
||||||
|
type Client interface {
|
||||||
|
// SetClient sets the http.Client.
|
||||||
|
SetClient(*http.Client)
|
||||||
|
|
||||||
|
// SetAddress sets the server address.
|
||||||
|
SetAddress(string)
|
||||||
|
|
||||||
|
// Self returns the currently authenticated user.
|
||||||
|
Self() (*User, error)
|
||||||
|
|
||||||
|
// User returns a user by login.
|
||||||
|
User(string) (*User, error)
|
||||||
|
|
||||||
|
// UserList returns a list of all registered users.
|
||||||
|
UserList() ([]*User, error)
|
||||||
|
|
||||||
|
// UserPost creates a new user account.
|
||||||
|
UserPost(*User) (*User, error)
|
||||||
|
|
||||||
|
// UserPatch updates a user account.
|
||||||
|
UserPatch(*User) (*User, error)
|
||||||
|
|
||||||
|
// UserDel deletes a user account.
|
||||||
|
UserDel(string) error
|
||||||
|
|
||||||
|
// Repo returns a repository by name.
|
||||||
|
Repo(repoID int64) (*Repo, error)
|
||||||
|
|
||||||
|
// RepoLookup returns a repository id by the owner and name.
|
||||||
|
RepoLookup(repoFullName string) (*Repo, error)
|
||||||
|
|
||||||
|
// RepoList returns a list of all repositories to which the user has explicit
|
||||||
|
// access in the host system.
|
||||||
|
RepoList() ([]*Repo, error)
|
||||||
|
|
||||||
|
// RepoListOpts returns a list of all repositories to which the user has
|
||||||
|
// explicit access in the host system.
|
||||||
|
RepoListOpts(bool) ([]*Repo, error)
|
||||||
|
|
||||||
|
// RepoPost activates a repository.
|
||||||
|
RepoPost(forgeRemoteID int64) (*Repo, error)
|
||||||
|
|
||||||
|
// RepoPatch updates a repository.
|
||||||
|
RepoPatch(repoID int64, repo *RepoPatch) (*Repo, error)
|
||||||
|
|
||||||
|
// RepoMove moves the repository
|
||||||
|
RepoMove(repoID int64, dst string) error
|
||||||
|
|
||||||
|
// RepoChown updates a repository owner.
|
||||||
|
RepoChown(repoID int64) (*Repo, error)
|
||||||
|
|
||||||
|
// RepoRepair repairs the repository hooks.
|
||||||
|
RepoRepair(repoID int64) error
|
||||||
|
|
||||||
|
// RepoDel deletes a repository.
|
||||||
|
RepoDel(repoID int64) error
|
||||||
|
|
||||||
|
// Pipeline returns a repository pipeline by number.
|
||||||
|
Pipeline(repoID, pipeline int64) (*Pipeline, error)
|
||||||
|
|
||||||
|
// PipelineLast returns the latest repository pipeline by branch. An empty branch
|
||||||
|
// will result in the default branch.
|
||||||
|
PipelineLast(repoID int64, branch string) (*Pipeline, error)
|
||||||
|
|
||||||
|
// PipelineList returns a list of recent pipelines for the
|
||||||
|
// the specified repository.
|
||||||
|
PipelineList(repoID int64) ([]*Pipeline, error)
|
||||||
|
|
||||||
|
// PipelineQueue returns a list of enqueued pipelines.
|
||||||
|
PipelineQueue() ([]*Feed, error)
|
||||||
|
|
||||||
|
// PipelineCreate returns creates a pipeline on specified branch.
|
||||||
|
PipelineCreate(repoID int64, opts *PipelineOptions) (*Pipeline, error)
|
||||||
|
|
||||||
|
// PipelineStart re-starts a stopped pipeline.
|
||||||
|
PipelineStart(repoID, num int64, params map[string]string) (*Pipeline, error)
|
||||||
|
|
||||||
|
// PipelineStop stops the given pipeline.
|
||||||
|
PipelineStop(repoID, pipeline int64) error
|
||||||
|
|
||||||
|
// PipelineApprove approves a blocked pipeline.
|
||||||
|
PipelineApprove(repoID, pipeline int64) (*Pipeline, error)
|
||||||
|
|
||||||
|
// PipelineDecline declines a blocked pipeline.
|
||||||
|
PipelineDecline(repoID, pipeline int64) (*Pipeline, error)
|
||||||
|
|
||||||
|
// PipelineKill force kills the running pipeline.
|
||||||
|
PipelineKill(repoID, pipeline int64) error
|
||||||
|
|
||||||
|
// StepLogEntries returns the LogEntries for the given pipeline step
|
||||||
|
StepLogEntries(repoID, pipeline, stepID int64) ([]*LogEntry, error)
|
||||||
|
|
||||||
|
// Deploy triggers a deployment for an existing pipeline using the specified
|
||||||
|
// target environment.
|
||||||
|
Deploy(repoID, pipeline int64, env string, params map[string]string) (*Pipeline, error)
|
||||||
|
|
||||||
|
// LogsPurge purges the pipeline logs for the specified pipeline.
|
||||||
|
LogsPurge(repoID, pipeline int64) error
|
||||||
|
|
||||||
|
// Registry returns a registry by hostname.
|
||||||
|
Registry(repoID int64, hostname string) (*Registry, error)
|
||||||
|
|
||||||
|
// RegistryList returns a list of all repository registries.
|
||||||
|
RegistryList(repoID int64) ([]*Registry, error)
|
||||||
|
|
||||||
|
// RegistryCreate creates a registry.
|
||||||
|
RegistryCreate(repoID int64, registry *Registry) (*Registry, error)
|
||||||
|
|
||||||
|
// RegistryUpdate updates a registry.
|
||||||
|
RegistryUpdate(repoID int64, registry *Registry) (*Registry, error)
|
||||||
|
|
||||||
|
// RegistryDelete deletes a registry.
|
||||||
|
RegistryDelete(repoID int64, hostname string) error
|
||||||
|
|
||||||
|
// Secret returns a secret by name.
|
||||||
|
Secret(repoID int64, secret string) (*Secret, error)
|
||||||
|
|
||||||
|
// SecretList returns a list of all repository secrets.
|
||||||
|
SecretList(repoID int64) ([]*Secret, error)
|
||||||
|
|
||||||
|
// SecretCreate creates a secret.
|
||||||
|
SecretCreate(repoID int64, secret *Secret) (*Secret, error)
|
||||||
|
|
||||||
|
// SecretUpdate updates a secret.
|
||||||
|
SecretUpdate(repoID int64, secret *Secret) (*Secret, error)
|
||||||
|
|
||||||
|
// SecretDelete deletes a secret.
|
||||||
|
SecretDelete(repoID int64, secret string) error
|
||||||
|
|
||||||
|
// Org returns an organization by name.
|
||||||
|
Org(orgID int64) (*Org, error)
|
||||||
|
|
||||||
|
// OrgLookup returns an organization id by name.
|
||||||
|
OrgLookup(orgName string) (*Org, error)
|
||||||
|
|
||||||
|
// OrgSecret returns an organization secret by name.
|
||||||
|
OrgSecret(orgID int64, secret string) (*Secret, error)
|
||||||
|
|
||||||
|
// OrgSecretList returns a list of all organization secrets.
|
||||||
|
OrgSecretList(orgID int64) ([]*Secret, error)
|
||||||
|
|
||||||
|
// OrgSecretCreate creates an organization secret.
|
||||||
|
OrgSecretCreate(orgID int64, secret *Secret) (*Secret, error)
|
||||||
|
|
||||||
|
// OrgSecretUpdate updates an organization secret.
|
||||||
|
OrgSecretUpdate(orgID int64, secret *Secret) (*Secret, error)
|
||||||
|
|
||||||
|
// OrgSecretDelete deletes an organization secret.
|
||||||
|
OrgSecretDelete(orgID int64, secret string) error
|
||||||
|
|
||||||
|
// GlobalSecret returns an global secret by name.
|
||||||
|
GlobalSecret(secret string) (*Secret, error)
|
||||||
|
|
||||||
|
// GlobalSecretList returns a list of all global secrets.
|
||||||
|
GlobalSecretList() ([]*Secret, error)
|
||||||
|
|
||||||
|
// GlobalSecretCreate creates a global secret.
|
||||||
|
GlobalSecretCreate(secret *Secret) (*Secret, error)
|
||||||
|
|
||||||
|
// GlobalSecretUpdate updates a global secret.
|
||||||
|
GlobalSecretUpdate(secret *Secret) (*Secret, error)
|
||||||
|
|
||||||
|
// GlobalSecretDelete deletes a global secret.
|
||||||
|
GlobalSecretDelete(secret string) error
|
||||||
|
|
||||||
|
// QueueInfo returns the queue state.
|
||||||
|
QueueInfo() (*Info, error)
|
||||||
|
|
||||||
|
// LogLevel returns the current logging level
|
||||||
|
LogLevel() (*LogLevel, error)
|
||||||
|
|
||||||
|
// SetLogLevel sets the server's logging level
|
||||||
|
SetLogLevel(logLevel *LogLevel) (*LogLevel, error)
|
||||||
|
|
||||||
|
// CronList list all cron jobs of a repo
|
||||||
|
CronList(repoID int64) ([]*Cron, error)
|
||||||
|
|
||||||
|
// CronGet get a specific cron job of a repo by id
|
||||||
|
CronGet(repoID, cronID int64) (*Cron, error)
|
||||||
|
|
||||||
|
// CronDelete delete a specific cron job of a repo by id
|
||||||
|
CronDelete(repoID, cronID int64) error
|
||||||
|
|
||||||
|
// CronCreate create a new cron job in a repo
|
||||||
|
CronCreate(repoID int64, cron *Cron) (*Cron, error)
|
||||||
|
|
||||||
|
// CronUpdate update an existing cron job of a repo
|
||||||
|
CronUpdate(repoID int64, cron *Cron) (*Cron, error)
|
||||||
|
|
||||||
|
// AgentList returns a list of all registered agents
|
||||||
|
AgentList() ([]*Agent, error)
|
||||||
|
|
||||||
|
// Agent returns an agent by id
|
||||||
|
Agent(int64) (*Agent, error)
|
||||||
|
|
||||||
|
// AgentCreate creates a new agent
|
||||||
|
AgentCreate(*Agent) (*Agent, error)
|
||||||
|
|
||||||
|
// AgentUpdate updates an existing agent
|
||||||
|
AgentUpdate(*Agent) (*Agent, error)
|
||||||
|
|
||||||
|
// AgentDelete deletes an agent
|
||||||
|
AgentDelete(int64) error
|
||||||
|
|
||||||
|
// AgentTasksList returns a list of all tasks executed by an agent
|
||||||
|
AgentTasksList(int64) ([]*Task, error)
|
||||||
|
|
||||||
|
// Version returns the instance version.
|
||||||
|
Version() (*Version, error)
|
||||||
|
}
|
257
internal/woodpecker/types.go
Normal file
257
internal/woodpecker/types.go
Normal file
|
@ -0,0 +1,257 @@
|
||||||
|
// Copyright 2022 Woodpecker Authors
|
||||||
|
//
|
||||||
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
// you may not use this file except in compliance with the License.
|
||||||
|
// You may obtain a copy of the License at
|
||||||
|
//
|
||||||
|
// http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
//
|
||||||
|
// Unless required by applicable law or agreed to in writing, software
|
||||||
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
// See the License for the specific language governing permissions and
|
||||||
|
// limitations under the License.
|
||||||
|
|
||||||
|
package woodpecker
|
||||||
|
|
||||||
|
type (
|
||||||
|
// User represents a user account.
|
||||||
|
User struct {
|
||||||
|
ID int64 `json:"id"`
|
||||||
|
Login string `json:"login"`
|
||||||
|
Email string `json:"email"`
|
||||||
|
Avatar string `json:"avatar_url"`
|
||||||
|
Active bool `json:"active"`
|
||||||
|
Admin bool `json:"admin"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// Repo represents a repository.
|
||||||
|
Repo struct {
|
||||||
|
ID int64 `json:"id,omitempty"`
|
||||||
|
ForgeRemoteID string `json:"forge_remote_id"`
|
||||||
|
Owner string `json:"owner"`
|
||||||
|
Name string `json:"name"`
|
||||||
|
FullName string `json:"full_name"`
|
||||||
|
Avatar string `json:"avatar_url,omitempty"`
|
||||||
|
ForgeURL string `json:"forge_url,omitempty"`
|
||||||
|
Clone string `json:"clone_url,omitempty"`
|
||||||
|
DefaultBranch string `json:"default_branch,omitempty"`
|
||||||
|
SCMKind string `json:"scm,omitempty"`
|
||||||
|
Timeout int64 `json:"timeout,omitempty"`
|
||||||
|
Visibility string `json:"visibility"`
|
||||||
|
IsSCMPrivate bool `json:"private"`
|
||||||
|
IsTrusted bool `json:"trusted"`
|
||||||
|
IsGated bool `json:"gated"`
|
||||||
|
IsActive bool `json:"active"`
|
||||||
|
AllowPullRequests bool `json:"allow_pr"`
|
||||||
|
Config string `json:"config_file"`
|
||||||
|
CancelPreviousPipelineEvents []string `json:"cancel_previous_pipeline_events"`
|
||||||
|
NetrcOnlyTrusted bool `json:"netrc_only_trusted"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// RepoPatch defines a repository patch request.
|
||||||
|
RepoPatch struct {
|
||||||
|
Config *string `json:"config_file,omitempty"`
|
||||||
|
IsTrusted *bool `json:"trusted,omitempty"`
|
||||||
|
IsGated *bool `json:"gated,omitempty"`
|
||||||
|
Timeout *int64 `json:"timeout,omitempty"`
|
||||||
|
Visibility *string `json:"visibility"`
|
||||||
|
AllowPull *bool `json:"allow_pr,omitempty"`
|
||||||
|
PipelineCounter *int `json:"pipeline_counter,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
PipelineError struct {
|
||||||
|
Type string `json:"type"`
|
||||||
|
Message string `json:"message"`
|
||||||
|
IsWarning bool `json:"is_warning"`
|
||||||
|
Data any `json:"data"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// Pipeline defines a pipeline object.
|
||||||
|
Pipeline struct {
|
||||||
|
ID int64 `json:"id"`
|
||||||
|
Number int64 `json:"number"`
|
||||||
|
Parent int64 `json:"parent"`
|
||||||
|
Event string `json:"event"`
|
||||||
|
Status string `json:"status"`
|
||||||
|
Errors PipelineError `json:"errors"`
|
||||||
|
Enqueued int64 `json:"enqueued_at"`
|
||||||
|
Created int64 `json:"created_at"`
|
||||||
|
Updated int64 `json:"updated_at"`
|
||||||
|
Started int64 `json:"started_at"`
|
||||||
|
Finished int64 `json:"finished_at"`
|
||||||
|
Deploy string `json:"deploy_to"`
|
||||||
|
Commit string `json:"commit"`
|
||||||
|
Branch string `json:"branch"`
|
||||||
|
Ref string `json:"ref"`
|
||||||
|
Refspec string `json:"refspec"`
|
||||||
|
CloneURL string `json:"clone_url"`
|
||||||
|
Title string `json:"title"`
|
||||||
|
Message string `json:"message"`
|
||||||
|
Timestamp int64 `json:"timestamp"`
|
||||||
|
Sender string `json:"sender"`
|
||||||
|
Author string `json:"author"`
|
||||||
|
Avatar string `json:"author_avatar"`
|
||||||
|
Email string `json:"author_email"`
|
||||||
|
ForgeURL string `json:"forge_url"`
|
||||||
|
Reviewer string `json:"reviewed_by"`
|
||||||
|
Reviewed int64 `json:"reviewed_at"`
|
||||||
|
Workflows []*Workflow `json:"workflows,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// Workflow represents a workflow in the pipeline.
|
||||||
|
Workflow struct {
|
||||||
|
ID int64 `json:"id"`
|
||||||
|
PID int `json:"pid"`
|
||||||
|
Name string `json:"name"`
|
||||||
|
State string `json:"state"`
|
||||||
|
Error string `json:"error,omitempty"`
|
||||||
|
Started int64 `json:"start_time,omitempty"`
|
||||||
|
Stopped int64 `json:"end_time,omitempty"`
|
||||||
|
AgentID int64 `json:"agent_id,omitempty"`
|
||||||
|
Platform string `json:"platform,omitempty"`
|
||||||
|
Environ map[string]string `json:"environ,omitempty"`
|
||||||
|
Children []*Step `json:"children,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// Step represents a process in the pipeline.
|
||||||
|
Step struct {
|
||||||
|
ID int64 `json:"id"`
|
||||||
|
PID int `json:"pid"`
|
||||||
|
PPID int `json:"ppid"`
|
||||||
|
Name string `json:"name"`
|
||||||
|
State string `json:"state"`
|
||||||
|
Error string `json:"error,omitempty"`
|
||||||
|
ExitCode int `json:"exit_code"`
|
||||||
|
Started int64 `json:"start_time,omitempty"`
|
||||||
|
Stopped int64 `json:"end_time,omitempty"`
|
||||||
|
Type StepType `json:"type,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// Registry represents a docker registry with credentials.
|
||||||
|
Registry struct {
|
||||||
|
ID int64 `json:"id"`
|
||||||
|
Address string `json:"address"`
|
||||||
|
Username string `json:"username"`
|
||||||
|
Password string `json:"password,omitempty"`
|
||||||
|
Email string `json:"email"`
|
||||||
|
Token string `json:"token"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// Secret represents a secret variable, such as a password or token.
|
||||||
|
Secret struct {
|
||||||
|
ID int64 `json:"id"`
|
||||||
|
Name string `json:"name"`
|
||||||
|
Value string `json:"value,omitempty"`
|
||||||
|
Images []string `json:"images"`
|
||||||
|
Events []string `json:"events"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// Feed represents an item in the user's feed or timeline.
|
||||||
|
Feed struct {
|
||||||
|
RepoID int64 `json:"repo_id"`
|
||||||
|
ID int64 `json:"id,omitempty"`
|
||||||
|
Number int64 `json:"number,omitempty"`
|
||||||
|
Event string `json:"event,omitempty"`
|
||||||
|
Status string `json:"status,omitempty"`
|
||||||
|
Created int64 `json:"created_at,omitempty"`
|
||||||
|
Started int64 `json:"started_at,omitempty"`
|
||||||
|
Finished int64 `json:"finished_at,omitempty"`
|
||||||
|
Commit string `json:"commit,omitempty"`
|
||||||
|
Branch string `json:"branch,omitempty"`
|
||||||
|
Ref string `json:"ref,omitempty"`
|
||||||
|
Refspec string `json:"refspec,omitempty"`
|
||||||
|
Remote string `json:"remote,omitempty"`
|
||||||
|
Title string `json:"title,omitempty"`
|
||||||
|
Message string `json:"message,omitempty"`
|
||||||
|
Author string `json:"author,omitempty"`
|
||||||
|
Avatar string `json:"author_avatar,omitempty"`
|
||||||
|
Email string `json:"author_email,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// Version provides system version details.
|
||||||
|
Version struct {
|
||||||
|
Source string `json:"source,omitempty"`
|
||||||
|
Version string `json:"version,omitempty"`
|
||||||
|
Commit string `json:"commit,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// Info provides queue stats.
|
||||||
|
Info struct {
|
||||||
|
Stats struct {
|
||||||
|
Workers int `json:"worker_count"`
|
||||||
|
Pending int `json:"pending_count"`
|
||||||
|
WaitingOnDeps int `json:"waiting_on_deps_count"`
|
||||||
|
Running int `json:"running_count"`
|
||||||
|
Complete int `json:"completed_count"`
|
||||||
|
} `json:"stats"`
|
||||||
|
Paused bool `json:"paused,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// LogLevel is for checking/setting logging level
|
||||||
|
LogLevel struct {
|
||||||
|
Level string `json:"log-level"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// LogEntry is a single log entry
|
||||||
|
LogEntry struct {
|
||||||
|
ID int64 `json:"id"`
|
||||||
|
StepID int64 `json:"step_id"`
|
||||||
|
Time int64 `json:"time"`
|
||||||
|
Line int `json:"line"`
|
||||||
|
Data []byte `json:"data"`
|
||||||
|
Type LogEntryType `json:"type"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// Cron is the JSON data of a cron job
|
||||||
|
Cron struct {
|
||||||
|
ID int64 `json:"id"`
|
||||||
|
Name string `json:"name"`
|
||||||
|
RepoID int64 `json:"repo_id"`
|
||||||
|
CreatorID int64 `json:"creator_id"`
|
||||||
|
NextExec int64 `json:"next_exec"`
|
||||||
|
Schedule string `json:"schedule"`
|
||||||
|
Created int64 `json:"created_at"`
|
||||||
|
Branch string `json:"branch"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// PipelineOptions is the JSON data for creating a new pipeline
|
||||||
|
PipelineOptions struct {
|
||||||
|
Branch string `json:"branch"`
|
||||||
|
Variables map[string]string `json:"variables"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// Agent is the JSON data for an agent
|
||||||
|
Agent struct {
|
||||||
|
ID int64 `json:"id"`
|
||||||
|
Created int64 `json:"created"`
|
||||||
|
Updated int64 `json:"updated"`
|
||||||
|
Name string `json:"name"`
|
||||||
|
OwnerID int64 `json:"owner_id"`
|
||||||
|
Token string `json:"token"`
|
||||||
|
LastContact int64 `json:"last_contact"`
|
||||||
|
Platform string `json:"platform"`
|
||||||
|
Backend string `json:"backend"`
|
||||||
|
Capacity int32 `json:"capacity"`
|
||||||
|
Version string `json:"version"`
|
||||||
|
NoSchedule bool `json:"no_schedule"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// Task is the JSON data for a task
|
||||||
|
Task struct {
|
||||||
|
ID string `json:"id"`
|
||||||
|
Data []byte `json:"data"`
|
||||||
|
Labels map[string]string `json:"labels"`
|
||||||
|
Dependencies []string `json:"dependencies"`
|
||||||
|
RunOn []string `json:"run_on"`
|
||||||
|
DepStatus map[string]string `json:"dep_status"`
|
||||||
|
AgentID int64 `json:"agent_id"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// Org is the JSON data for an organization
|
||||||
|
Org struct {
|
||||||
|
ID int64 `json:"id"`
|
||||||
|
Name string `json:"name"`
|
||||||
|
IsUser bool `json:"is_user"`
|
||||||
|
}
|
||||||
|
)
|
5
internal/woodpecker/woodpecker.go
Normal file
5
internal/woodpecker/woodpecker.go
Normal file
|
@ -0,0 +1,5 @@
|
||||||
|
package woodpecker
|
||||||
|
|
||||||
|
// This package has been copied from https://github.com/woodpecker-ci/woodpecker/tree/v2.0.0/woodpecker-go/woodpecker.
|
||||||
|
// At the moment of writing this comment, this package can't be imported because the module name hasn't been updated - https://github.com/woodpecker-ci/woodpecker/blob/v2.0.0/go.mod#L1.
|
||||||
|
// https://go.dev/blog/v2-go-modules#publishing-v2-and-beyond
|
Loading…
Reference in New Issue
Block a user