-
Notifications
You must be signed in to change notification settings - Fork 280
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Permission management #18
Conversation
azuredevops/internal/service/permissions/resource_git_permissions.go
Outdated
Show resolved
Hide resolved
azuredevops/internal/service/permissions/resource_project_permissions.go
Outdated
Show resolved
Hide resolved
azuredevops/internal/service/permissions/resource_project_permissions_test.go
Show resolved
Hide resolved
It looks great! But the build is broken and I think we should have a build that runs the test before we can merge this. The build is being blocked by #10 |
@EliiseS I totally agree, but I've got the impression that we already lost momentum here again. Since the provider has been migrated to Hashicorp I don't see much progress. It got kinda silent here. Not much from @nmiodice or @xuzhang3 either. The build pipeline has to be fixed QUICKLY! Thought about removing the log messages from the Who is working on #10? Nick? @xuzhang3? You? Someone from Hashicorp? A slightly unsatisfactory situation right now again. 😞 |
@tmeckel Can we split this huge PR into small PRs? Dependency upgrade can be included in separate PR. One PR for one feature or function will be great. |
I know the pull request is big, but to break it up into small pieces again would take a lot of time for me and I mostly don't get paid for this work, especially for work that's related to get a PR merged, because the customers I'm working with, use an own version of the provider that has those changes incorporated already. |
…tyNamespace implementation from azuredevops\utils\securityhelper\namespaces.go
… the corresponding tests
…tyhelper\namespaces.go
…vops\utils\securityhelper\baseSchema.go and corresponding test
…ding Git branch support
…RequiredWith contrained
HALLELUJAH!!! The pipeline passed 🚀 Well ... without acceptance tests ... Not that great that reviewers currently must execute the acceptance tests locally. 😞 Requesting review @EliiseS , @xuzhang3 @nmiodice Oh and I again had to update the vendor directory. Added 50 files to the number of Files changed ... the number is insane already 😁 💥 |
@tmeckel I will be late for this PR. I'm busy this week. |
@xuzhang3 Thanks for letting me know |
PreventPostDestroyRefresh: true, | ||
Steps: []resource.TestStep{ | ||
{ | ||
Config: tfConfigStep1, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is this config was just for verify if terraform apply
works? No check is configured for this step
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I simply copied the code that @nmiodice created to test the multi value data source in azuredevops/internal/acceptancetests/data_git_repositories_test.go
If there is an issue here we have to check about the acceptance test in this data source as well.
azuredevops/internal/acceptancetests/resource_group_membership_test.go
Outdated
Show resolved
Hide resolved
azuredevops/internal/service/permissions/resource_project_permissions.go
Outdated
Show resolved
Hide resolved
azuredevops/internal/service/permissions/resource_project_permissions.go
Outdated
Show resolved
Hide resolved
azuredevops/internal/service/permissions/utils/namespaces_test.go
Outdated
Show resolved
Hide resolved
azuredevops/internal/service/permissions/resource_project_permissions_test.go
Outdated
Show resolved
Hide resolved
Hi @tmeckel I need some extra test for this huge PR 🍡. I found bug when I execute the example configuration script in Steps to reproduce
|
I can reproduce the error on my side. |
@xuzhang3 if you remove the Finally I could track down that |
@xuzhang3 Mistery solved. The value for the property
Presumably you don't wanna add me option 2. to this monster 👹 PR 😁 Nevertheless I update the sample in the documentation around |
@tmeckel Thanks for your PR, all feature is OK. Example: |
@xuzhang3 I think you refer to this behavior, right? I mean that if you reset a defined value to The value To emphasize it a bit more: every time you define a The fact that the web interface of Azure DevOps is nice enough to always show the user (admin) the effective permissions for an identity at one level may require explanation but is technically irrelevant for the provider. Oh and not to forget, if you want to reset a And I don't want to be mean, but I can't find a single word about this whole topic in the official documentation of the REST API. So why should we make up for this deficit on our side? |
All Submissions:
What about the current behavior has changed?
Initially filed as Pull Request at #238
Issue Number:
The current implementation of the provider does not support the management of permission for project and git repositories.
This PR provides an implementation for two new resources (
azuredevops_project_permissions
,azuredevops_git_permissions
) as described in the issues mentioned above and provides a framework for an easy implementation for other permission related Terraform resources (Security Namespace).In addition the single-value data source
azuredevops_git_repository
has been added.Does this introduce a change to
go.mod
,go.sum
orvendor/
?RequiredWith
validation in resources schema.github.com/microsoft/terraform-provider-azuredevops
Does this introduce a breaking change?
Any relevant logs, error output, etc?
[N/A]
Other information