added ssh key management resource
All checks were successful
continuous-integration/drone/push Build is passing
All checks were successful
continuous-integration/drone/push Build is passing
This commit is contained in:
parent
041ad9e393
commit
26eb2c104a
4
Makefile
4
Makefile
@ -3,7 +3,7 @@ GOFMT_FILES?=$$(find . -name '*.go' |grep -v vendor)
|
|||||||
|
|
||||||
GOFMT ?= gofmt -s
|
GOFMT ?= gofmt -s
|
||||||
|
|
||||||
VERSION = 0.4.0
|
VERSION = 0.5.0
|
||||||
|
|
||||||
test: fmt-check
|
test: fmt-check
|
||||||
go test -i $(TEST) || exit 1
|
go test -i $(TEST) || exit 1
|
||||||
@ -37,3 +37,5 @@ install: build
|
|||||||
@echo ~/.terraform.d/plugins/terraform.local/lerentis/gitea/${VERSION}/linux_amd64/terraform-provider-gitea_${VERSION}
|
@echo ~/.terraform.d/plugins/terraform.local/lerentis/gitea/${VERSION}/linux_amd64/terraform-provider-gitea_${VERSION}
|
||||||
@mkdir -p ~/.terraform.d/plugins/terraform.local/lerentis/gitea/${VERSION}/linux_amd64
|
@mkdir -p ~/.terraform.d/plugins/terraform.local/lerentis/gitea/${VERSION}/linux_amd64
|
||||||
@mv terraform-provider-gitea_${VERSION} ~/.terraform.d/plugins/terraform.local/lerentis/gitea/${VERSION}/linux_amd64/terraform-provider-gitea_${VERSION}
|
@mv terraform-provider-gitea_${VERSION} ~/.terraform.d/plugins/terraform.local/lerentis/gitea/${VERSION}/linux_amd64/terraform-provider-gitea_${VERSION}
|
||||||
|
doc:
|
||||||
|
tfplugindocs
|
52
docs/resources/public_key.md
Normal file
52
docs/resources/public_key.md
Normal file
@ -0,0 +1,52 @@
|
|||||||
|
---
|
||||||
|
# generated by https://github.com/hashicorp/terraform-plugin-docs
|
||||||
|
page_title: "gitea_public_key Resource - terraform-provider-gitea"
|
||||||
|
subcategory: ""
|
||||||
|
description: |-
|
||||||
|
gitea_public_key manages ssh key that are associated with users.
|
||||||
|
---
|
||||||
|
|
||||||
|
# gitea_public_key (Resource)
|
||||||
|
|
||||||
|
`gitea_public_key` manages ssh key that are associated with users.
|
||||||
|
|
||||||
|
## Example Usage
|
||||||
|
|
||||||
|
```terraform
|
||||||
|
resource "gitea_user" "test" {
|
||||||
|
username = "test"
|
||||||
|
login_name = "test"
|
||||||
|
password = "Geheim1!"
|
||||||
|
email = "test@user.dev"
|
||||||
|
must_change_password = false
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
resource "gitea_public_key" "test_user_key" {
|
||||||
|
title = "test"
|
||||||
|
key = file("${path.module}/id_ed25519.pub")
|
||||||
|
username = gitea_user.test.username
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
<!-- schema generated by tfplugindocs -->
|
||||||
|
## Schema
|
||||||
|
|
||||||
|
### Required
|
||||||
|
|
||||||
|
- `key` (String, Sensitive) An armored SSH key to add
|
||||||
|
- `title` (String) Title of the key to add
|
||||||
|
- `username` (String) User to associate with the added key
|
||||||
|
|
||||||
|
### Optional
|
||||||
|
|
||||||
|
- `read_only` (Boolean) Describe if the key has only read access or read/write
|
||||||
|
|
||||||
|
### Read-Only
|
||||||
|
|
||||||
|
- `created` (String)
|
||||||
|
- `fingerprint` (String)
|
||||||
|
- `id` (String) The ID of this resource.
|
||||||
|
- `type` (String)
|
||||||
|
|
||||||
|
|
3
examples/.gitignore
vendored
3
examples/.gitignore
vendored
@ -2,4 +2,5 @@
|
|||||||
.terraform.lock.hcl
|
.terraform.lock.hcl
|
||||||
terraform.tfstate
|
terraform.tfstate
|
||||||
terraform.tfstate.backup
|
terraform.tfstate.backup
|
||||||
*.tfvars
|
*.tfvars
|
||||||
|
id_ed25519
|
@ -38,3 +38,11 @@ resource "gitea_user" "test" {
|
|||||||
must_change_password = false
|
must_change_password = false
|
||||||
admin = true
|
admin = true
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
resource "gitea_public_key" "test_user_key" {
|
||||||
|
title = "test"
|
||||||
|
key = file("${path.module}/resources/gitea_public_key/id_ed25519.pub")
|
||||||
|
read_only = true
|
||||||
|
username = gitea_user.test.username
|
||||||
|
}
|
||||||
|
@ -2,7 +2,7 @@ terraform {
|
|||||||
required_providers {
|
required_providers {
|
||||||
gitea = {
|
gitea = {
|
||||||
source = "terraform.local/lerentis/gitea"
|
source = "terraform.local/lerentis/gitea"
|
||||||
version = "0.4.0"
|
version = "0.5.0"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
1
examples/resources/gitea_public_key/id_ed25519.pub
Normal file
1
examples/resources/gitea_public_key/id_ed25519.pub
Normal file
@ -0,0 +1 @@
|
|||||||
|
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINn6hAP48oKz6MVWjYvn0fne2YeaOv/zC6zuvFXlJKf2 test@dev.local
|
14
examples/resources/gitea_public_key/resource.tf
Normal file
14
examples/resources/gitea_public_key/resource.tf
Normal file
@ -0,0 +1,14 @@
|
|||||||
|
resource "gitea_user" "test" {
|
||||||
|
username = "test"
|
||||||
|
login_name = "test"
|
||||||
|
password = "Geheim1!"
|
||||||
|
email = "test@user.dev"
|
||||||
|
must_change_password = false
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
resource "gitea_public_key" "test_user_key" {
|
||||||
|
title = "test"
|
||||||
|
key = file("${path.module}/id_ed25519.pub")
|
||||||
|
username = gitea_user.test.username
|
||||||
|
}
|
@ -79,6 +79,7 @@ func Provider() terraform.ResourceProvider {
|
|||||||
"gitea_user": resourceGiteaUser(),
|
"gitea_user": resourceGiteaUser(),
|
||||||
"gitea_oauth2_app": resourceGiteaOauthApp(),
|
"gitea_oauth2_app": resourceGiteaOauthApp(),
|
||||||
"gitea_repository": resourceGiteaRepository(),
|
"gitea_repository": resourceGiteaRepository(),
|
||||||
|
"gitea_public_key": resourceGiteaPublicKey(),
|
||||||
},
|
},
|
||||||
|
|
||||||
ConfigureFunc: providerConfigure,
|
ConfigureFunc: providerConfigure,
|
||||||
|
155
gitea/resource_gitea_public_key.go
Normal file
155
gitea/resource_gitea_public_key.go
Normal file
@ -0,0 +1,155 @@
|
|||||||
|
package gitea
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"strconv"
|
||||||
|
|
||||||
|
"code.gitea.io/sdk/gitea"
|
||||||
|
"github.com/hashicorp/terraform-plugin-sdk/helper/schema"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
PublicKeyUser string = "username"
|
||||||
|
PublicKey string = "key"
|
||||||
|
PublicKeyReadOnlyFlag string = "read_only"
|
||||||
|
PublicKeyTitle string = "title"
|
||||||
|
PublicKeyId string = "id"
|
||||||
|
PublicKeyFingerprint string = "fingerprint"
|
||||||
|
PublicKeyCreated string = "created"
|
||||||
|
PublicKeyType string = "type"
|
||||||
|
)
|
||||||
|
|
||||||
|
func resourcePublicKeyRead(d *schema.ResourceData, meta interface{}) (err error) {
|
||||||
|
client := meta.(*gitea.Client)
|
||||||
|
|
||||||
|
id, err := strconv.ParseInt(d.Id(), 10, 64)
|
||||||
|
|
||||||
|
var resp *gitea.Response
|
||||||
|
var pubKey *gitea.PublicKey
|
||||||
|
|
||||||
|
pubKey, resp, err = client.GetPublicKey(id)
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
if resp.StatusCode == 404 {
|
||||||
|
d.SetId("")
|
||||||
|
return nil
|
||||||
|
} else {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
err = setPublicKeyResourceData(pubKey, d)
|
||||||
|
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func resourcePublicKeyCreate(d *schema.ResourceData, meta interface{}) (err error) {
|
||||||
|
client := meta.(*gitea.Client)
|
||||||
|
|
||||||
|
var pubKey *gitea.PublicKey
|
||||||
|
|
||||||
|
opts := gitea.CreateKeyOption{
|
||||||
|
Title: d.Get(PublicKeyTitle).(string),
|
||||||
|
Key: d.Get(PublicKey).(string),
|
||||||
|
ReadOnly: d.Get(PublicKeyReadOnlyFlag).(bool),
|
||||||
|
}
|
||||||
|
|
||||||
|
pubKey, _, err = client.AdminCreateUserPublicKey(d.Get(PublicKeyUser).(string), opts)
|
||||||
|
|
||||||
|
err = setPublicKeyResourceData(pubKey, d)
|
||||||
|
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func resourcePublicKeyUpdate(d *schema.ResourceData, meta interface{}) (err error) {
|
||||||
|
// update = recreate
|
||||||
|
resourcePublicKeyDelete(d, meta)
|
||||||
|
resourcePublicKeyCreate(d, meta)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func resourcePublicKeyDelete(d *schema.ResourceData, meta interface{}) (err error) {
|
||||||
|
client := meta.(*gitea.Client)
|
||||||
|
|
||||||
|
id, err := strconv.ParseInt(d.Id(), 10, 64)
|
||||||
|
|
||||||
|
var resp *gitea.Response
|
||||||
|
|
||||||
|
resp, err = client.AdminDeleteUserPublicKey(d.Get(PublicKeyUser).(string), int(id))
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
if resp.StatusCode == 404 {
|
||||||
|
return
|
||||||
|
} else {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func setPublicKeyResourceData(pubKey *gitea.PublicKey, d *schema.ResourceData) (err error) {
|
||||||
|
d.SetId(fmt.Sprintf("%d", pubKey.ID))
|
||||||
|
d.Set(PublicKeyUser, pubKey.Owner.UserName)
|
||||||
|
d.Set(PublicKey, pubKey.Key)
|
||||||
|
d.Set(PublicKeyTitle, pubKey.Title)
|
||||||
|
d.Set(PublicKeyReadOnlyFlag, pubKey.ReadOnly)
|
||||||
|
d.Set(PublicKeyCreated, pubKey.Created)
|
||||||
|
d.Set(PublicKeyFingerprint, pubKey.Fingerprint)
|
||||||
|
d.Set(PublicKeyType, pubKey.KeyType)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func resourceGiteaPublicKey() *schema.Resource {
|
||||||
|
return &schema.Resource{
|
||||||
|
Read: resourcePublicKeyRead,
|
||||||
|
Create: resourcePublicKeyCreate,
|
||||||
|
Update: resourcePublicKeyUpdate,
|
||||||
|
Delete: resourcePublicKeyDelete,
|
||||||
|
Importer: &schema.ResourceImporter{
|
||||||
|
State: schema.ImportStatePassthrough,
|
||||||
|
},
|
||||||
|
Schema: map[string]*schema.Schema{
|
||||||
|
"title": {
|
||||||
|
Type: schema.TypeString,
|
||||||
|
Required: true,
|
||||||
|
ForceNew: true,
|
||||||
|
Description: "Title of the key to add",
|
||||||
|
},
|
||||||
|
"key": {
|
||||||
|
Type: schema.TypeString,
|
||||||
|
Required: true,
|
||||||
|
ForceNew: true,
|
||||||
|
Sensitive: true,
|
||||||
|
Description: "An armored SSH key to add",
|
||||||
|
},
|
||||||
|
"read_only": {
|
||||||
|
Type: schema.TypeBool,
|
||||||
|
Required: false,
|
||||||
|
Optional: true,
|
||||||
|
Default: false,
|
||||||
|
Description: "Describe if the key has only read access or read/write",
|
||||||
|
},
|
||||||
|
"username": {
|
||||||
|
Type: schema.TypeString,
|
||||||
|
Required: true,
|
||||||
|
Optional: false,
|
||||||
|
ForceNew: true,
|
||||||
|
Description: "User to associate with the added key",
|
||||||
|
},
|
||||||
|
"fingerprint": {
|
||||||
|
Type: schema.TypeString,
|
||||||
|
Computed: true,
|
||||||
|
},
|
||||||
|
"created": {
|
||||||
|
Type: schema.TypeString,
|
||||||
|
Computed: true,
|
||||||
|
},
|
||||||
|
"type": {
|
||||||
|
Type: schema.TypeString,
|
||||||
|
Computed: true,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Description: "`gitea_public_key` manages ssh key that are associated with users.",
|
||||||
|
}
|
||||||
|
}
|
Loading…
Reference in New Issue
Block a user