mirror of
https://github.com/Kichiyaki/terraform-provider-woodpecker.git
synced 2024-06-18 02:27:38 +00:00
366 lines
11 KiB
Go
366 lines
11 KiB
Go
package internal
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"slices"
|
|
"strconv"
|
|
|
|
"github.com/hashicorp/terraform-plugin-framework-validators/int64validator"
|
|
"github.com/hashicorp/terraform-plugin-framework-validators/stringvalidator"
|
|
"github.com/hashicorp/terraform-plugin-framework/path"
|
|
"github.com/hashicorp/terraform-plugin-framework/resource"
|
|
"github.com/hashicorp/terraform-plugin-framework/resource/schema"
|
|
"github.com/hashicorp/terraform-plugin-framework/resource/schema/boolplanmodifier"
|
|
"github.com/hashicorp/terraform-plugin-framework/resource/schema/int64planmodifier"
|
|
"github.com/hashicorp/terraform-plugin-framework/resource/schema/planmodifier"
|
|
"github.com/hashicorp/terraform-plugin-framework/resource/schema/stringplanmodifier"
|
|
"github.com/hashicorp/terraform-plugin-framework/schema/validator"
|
|
"github.com/woodpecker-ci/woodpecker/woodpecker-go/woodpecker"
|
|
)
|
|
|
|
type repositoryResource struct {
|
|
client woodpecker.Client
|
|
}
|
|
|
|
var _ resource.Resource = (*repositoryResource)(nil)
|
|
var _ resource.ResourceWithConfigure = (*repositoryResource)(nil)
|
|
var _ resource.ResourceWithImportState = (*repositoryResource)(nil)
|
|
|
|
func newRepositoryResource() resource.Resource {
|
|
return &repositoryResource{}
|
|
}
|
|
|
|
func (r *repositoryResource) Metadata(
|
|
_ context.Context,
|
|
req resource.MetadataRequest,
|
|
resp *resource.MetadataResponse,
|
|
) {
|
|
resp.TypeName = req.ProviderTypeName + "_repository"
|
|
}
|
|
|
|
func (r *repositoryResource) Schema(_ context.Context, _ resource.SchemaRequest, resp *resource.SchemaResponse) {
|
|
resp.Schema = schema.Schema{
|
|
MarkdownDescription: `Provides a repository resource.`,
|
|
Attributes: map[string]schema.Attribute{
|
|
"id": schema.Int64Attribute{
|
|
Computed: true,
|
|
Description: "the repository's id",
|
|
PlanModifiers: []planmodifier.Int64{
|
|
int64planmodifier.UseStateForUnknown(),
|
|
},
|
|
},
|
|
"forge_remote_id": schema.StringAttribute{
|
|
Computed: true,
|
|
Description: "the unique identifier for the repository on the forge",
|
|
PlanModifiers: []planmodifier.String{
|
|
stringplanmodifier.UseStateForUnknown(),
|
|
},
|
|
},
|
|
"owner": schema.StringAttribute{
|
|
Computed: true,
|
|
Description: "the owner of the repository",
|
|
PlanModifiers: []planmodifier.String{
|
|
stringplanmodifier.UseStateForUnknown(),
|
|
},
|
|
},
|
|
"name": schema.StringAttribute{
|
|
Computed: true,
|
|
Description: "the name of the repository",
|
|
PlanModifiers: []planmodifier.String{
|
|
stringplanmodifier.UseStateForUnknown(),
|
|
},
|
|
},
|
|
"full_name": schema.StringAttribute{
|
|
Required: true,
|
|
Description: "the full name of the repository (format: owner/reponame)",
|
|
PlanModifiers: []planmodifier.String{
|
|
stringplanmodifier.RequiresReplace(),
|
|
},
|
|
},
|
|
"avatar_url": schema.StringAttribute{
|
|
Computed: true,
|
|
Description: "the repository's avatar URL",
|
|
PlanModifiers: []planmodifier.String{
|
|
stringplanmodifier.UseStateForUnknown(),
|
|
},
|
|
},
|
|
"url": schema.StringAttribute{
|
|
Computed: true,
|
|
Description: "the URL of the repository on the forge",
|
|
PlanModifiers: []planmodifier.String{
|
|
stringplanmodifier.UseStateForUnknown(),
|
|
},
|
|
},
|
|
"clone_url": schema.StringAttribute{
|
|
Computed: true,
|
|
Description: "the URL to clone repository",
|
|
PlanModifiers: []planmodifier.String{
|
|
stringplanmodifier.UseStateForUnknown(),
|
|
},
|
|
},
|
|
"default_branch": schema.StringAttribute{
|
|
Computed: true,
|
|
Description: "the name of the default branch",
|
|
PlanModifiers: []planmodifier.String{
|
|
stringplanmodifier.UseStateForUnknown(),
|
|
},
|
|
},
|
|
"scm": schema.StringAttribute{
|
|
Computed: true,
|
|
MarkdownDescription: "type of repository " +
|
|
"(see [the source code](https://github.com/woodpecker-ci/woodpecker/blob/main/server/model/const.go#L67))",
|
|
PlanModifiers: []planmodifier.String{
|
|
stringplanmodifier.UseStateForUnknown(),
|
|
},
|
|
},
|
|
"timeout": schema.Int64Attribute{
|
|
Optional: true,
|
|
Computed: true,
|
|
Description: "after this timeout a pipeline has to finish or will be treated as timed out (in minutes)",
|
|
Validators: []validator.Int64{
|
|
int64validator.AtLeast(1),
|
|
},
|
|
PlanModifiers: []planmodifier.Int64{
|
|
int64planmodifier.UseStateForUnknown(),
|
|
},
|
|
},
|
|
"visibility": schema.StringAttribute{
|
|
Optional: true,
|
|
Computed: true,
|
|
MarkdownDescription: "project visibility (public, private, internal), " +
|
|
"see [the docs](https://woodpecker-ci.org/docs/usage/project-settings#project-visibility) for more info",
|
|
Validators: []validator.String{
|
|
stringvalidator.OneOfCaseInsensitive("public", "private", "internal"),
|
|
},
|
|
PlanModifiers: []planmodifier.String{
|
|
stringplanmodifier.UseStateForUnknown(),
|
|
},
|
|
},
|
|
"is_private": schema.BoolAttribute{
|
|
Computed: true,
|
|
Description: "whether the repo (SCM) is private",
|
|
PlanModifiers: []planmodifier.Bool{
|
|
boolplanmodifier.UseStateForUnknown(),
|
|
},
|
|
},
|
|
"is_trusted": schema.BoolAttribute{
|
|
Optional: true,
|
|
Computed: true,
|
|
Description: "when true, underlying pipeline containers get access to escalated capabilities like mounting volumes",
|
|
PlanModifiers: []planmodifier.Bool{
|
|
boolplanmodifier.UseStateForUnknown(),
|
|
},
|
|
},
|
|
"is_gated": schema.BoolAttribute{
|
|
Optional: true,
|
|
Computed: true,
|
|
Description: "when true, every pipeline needs to be approved before being executed",
|
|
PlanModifiers: []planmodifier.Bool{
|
|
boolplanmodifier.UseStateForUnknown(),
|
|
},
|
|
},
|
|
"allow_pull_requests": schema.BoolAttribute{
|
|
Optional: true,
|
|
Computed: true,
|
|
Description: "Enables handling webhook's pull request event." +
|
|
" If disabled, then pipeline won't run for pull requests.",
|
|
PlanModifiers: []planmodifier.Bool{
|
|
boolplanmodifier.UseStateForUnknown(),
|
|
},
|
|
},
|
|
"config_file": schema.StringAttribute{
|
|
Optional: true,
|
|
Computed: true,
|
|
Description: "The path to the pipeline config file or folder. " +
|
|
"By default it is left empty which will use the following configuration " +
|
|
"resolution .woodpecker/*.yml -> .woodpecker/*.yaml -> .woodpecker.yml -> .woodpecker.yaml.",
|
|
PlanModifiers: []planmodifier.String{
|
|
stringplanmodifier.UseStateForUnknown(),
|
|
},
|
|
},
|
|
// woodpecker.Client doesn't support editing this field for now
|
|
// "cancel_previous_pipeline_events": schema.SetAttribute{
|
|
// ElementType: types.StringType,
|
|
// Optional: true,
|
|
// Computed: true,
|
|
// Description: "Enables to cancel pending and running pipelines of the same " +
|
|
// "event and context before starting the newly triggered one (push, tag, pull_request, deployment).",
|
|
// Validators: []validator.Set{
|
|
// setvalidator.ValueStringsAre(
|
|
// stringvalidator.OneOfCaseInsensitive("push", "tag", "pull_request", "deployment"),
|
|
// ),
|
|
// },
|
|
// },
|
|
"netrc_only_trusted": schema.BoolAttribute{
|
|
Optional: true,
|
|
Computed: true,
|
|
MarkdownDescription: "whether netrc credentials should be only injected into trusted containers, see" +
|
|
//nolint:lll
|
|
" [the docs](https://woodpecker-ci.org/docs/usage/project-settings#only-inject-netrc-credentials-into-trusted-containers)" +
|
|
" for more info",
|
|
PlanModifiers: []planmodifier.Bool{
|
|
boolplanmodifier.UseStateForUnknown(),
|
|
},
|
|
},
|
|
},
|
|
}
|
|
}
|
|
|
|
func (r *repositoryResource) Configure(
|
|
_ context.Context,
|
|
req resource.ConfigureRequest,
|
|
resp *resource.ConfigureResponse,
|
|
) {
|
|
// Prevent panic if the provider has not been configured.
|
|
if req.ProviderData == nil {
|
|
return
|
|
}
|
|
|
|
client, ok := req.ProviderData.(woodpecker.Client)
|
|
if !ok {
|
|
resp.Diagnostics.AddError(
|
|
"Unexpected Data Source Configure Type",
|
|
fmt.Sprintf(
|
|
"Expected woodpecker.Client, got: %T. Please report this issue to the provider developers.",
|
|
req.ProviderData,
|
|
),
|
|
)
|
|
return
|
|
}
|
|
|
|
r.client = client
|
|
}
|
|
|
|
func (r *repositoryResource) Create(ctx context.Context, req resource.CreateRequest, resp *resource.CreateResponse) {
|
|
var data repositoryModel
|
|
|
|
resp.Diagnostics.Append(req.Config.Get(ctx, &data)...)
|
|
if resp.Diagnostics.HasError() {
|
|
return
|
|
}
|
|
|
|
repoFullName := data.FullName.ValueString()
|
|
|
|
repos, err := r.client.RepoListOpts(true, true)
|
|
if err != nil {
|
|
resp.Diagnostics.AddError("Couldn't list repositories", err.Error())
|
|
return
|
|
}
|
|
|
|
idx := slices.IndexFunc(repos, func(repo *woodpecker.Repo) bool {
|
|
return repo.FullName == repoFullName
|
|
})
|
|
if idx < 0 {
|
|
resp.Diagnostics.AddError("Repository not found", fmt.Sprintf("Repository with name '%s' not found", repoFullName))
|
|
return
|
|
}
|
|
|
|
wData, diags := data.toWoodpeckerPatch(ctx)
|
|
resp.Diagnostics.Append(diags...)
|
|
if resp.Diagnostics.HasError() {
|
|
return
|
|
}
|
|
|
|
forgeRemoteID, err := strconv.ParseInt(repos[idx].ForgeRemoteID, 10, 64)
|
|
if err != nil {
|
|
resp.Diagnostics.AddError("Couldn't parse ForgeRemoteID", err.Error())
|
|
return
|
|
}
|
|
|
|
// I'm not sure why this function wants int64 instead of string
|
|
activatedRepo, err := r.client.RepoPost(forgeRemoteID)
|
|
if err != nil {
|
|
resp.Diagnostics.AddError("Couldn't activate repository", err.Error())
|
|
return
|
|
}
|
|
|
|
updatedRepo, err := r.client.RepoPatch(activatedRepo.ID, wData)
|
|
if err != nil {
|
|
resp.Diagnostics.AddError("Couldn't update repository", err.Error())
|
|
return
|
|
}
|
|
|
|
resp.Diagnostics.Append(data.setValues(ctx, updatedRepo)...)
|
|
if resp.Diagnostics.HasError() {
|
|
return
|
|
}
|
|
|
|
resp.Diagnostics.Append(resp.State.Set(ctx, &data)...)
|
|
}
|
|
|
|
func (r *repositoryResource) Read(ctx context.Context, req resource.ReadRequest, resp *resource.ReadResponse) {
|
|
var data repositoryModel
|
|
|
|
resp.Diagnostics.Append(req.State.Get(ctx, &data)...)
|
|
if resp.Diagnostics.HasError() {
|
|
return
|
|
}
|
|
|
|
repo, err := r.client.RepoLookup(data.FullName.ValueString())
|
|
if err != nil {
|
|
resp.Diagnostics.AddError("Couldn't get repository", err.Error())
|
|
}
|
|
|
|
resp.Diagnostics.Append(data.setValues(ctx, repo)...)
|
|
if resp.Diagnostics.HasError() {
|
|
return
|
|
}
|
|
|
|
resp.Diagnostics.Append(resp.State.Set(ctx, &data)...)
|
|
}
|
|
|
|
func (r *repositoryResource) Update(ctx context.Context, req resource.UpdateRequest, resp *resource.UpdateResponse) {
|
|
var data repositoryModel
|
|
|
|
resp.Diagnostics.Append(req.Plan.Get(ctx, &data)...)
|
|
if resp.Diagnostics.HasError() {
|
|
return
|
|
}
|
|
|
|
wData, diags := data.toWoodpeckerPatch(ctx)
|
|
resp.Diagnostics.Append(diags...)
|
|
if resp.Diagnostics.HasError() {
|
|
return
|
|
}
|
|
|
|
repo, err := r.client.RepoPatch(data.ID.ValueInt64(), wData)
|
|
if err != nil {
|
|
resp.Diagnostics.AddError("Couldn't update repository", err.Error())
|
|
return
|
|
}
|
|
|
|
resp.Diagnostics.Append(data.setValues(ctx, repo)...)
|
|
if resp.Diagnostics.HasError() {
|
|
return
|
|
}
|
|
|
|
resp.Diagnostics.Append(resp.State.Set(ctx, &data)...)
|
|
}
|
|
|
|
func (r *repositoryResource) Delete(ctx context.Context, req resource.DeleteRequest, resp *resource.DeleteResponse) {
|
|
var data repositoryModel
|
|
|
|
resp.Diagnostics.Append(req.State.Get(ctx, &data)...)
|
|
if resp.Diagnostics.HasError() {
|
|
return
|
|
}
|
|
|
|
if err := r.client.RepoDel(data.ID.ValueInt64()); err != nil {
|
|
resp.Diagnostics.AddError("Couldn't delete repository", err.Error())
|
|
return
|
|
}
|
|
|
|
// If execution completes without error, the framework will automatically
|
|
// call DeleteResponse.State.RemoveResource(), so it can be omitted
|
|
// from provider logic.
|
|
}
|
|
|
|
func (r *repositoryResource) ImportState(
|
|
ctx context.Context,
|
|
req resource.ImportStateRequest,
|
|
resp *resource.ImportStateResponse,
|
|
) {
|
|
resp.Diagnostics.Append(resp.State.SetAttribute(ctx, path.Root("full_name"), req.ID)...)
|
|
}
|