-
Notifications
You must be signed in to change notification settings - Fork 280
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New resource azuredevops_workitemquery_permissions #79
Conversation
17b70e6
to
5d307bd
Compare
azuredevops/internal/service/permissions/resource_workitemquery_permissions.go
Outdated
Show resolved
Hide resolved
azuredevops/internal/service/permissions/resource_workitemquery_permissions.go
Outdated
Show resolved
Hide resolved
azuredevops/internal/service/permissions/resource_workitemquery_permissions.go
Show resolved
Hide resolved
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@tmeckel I try run the example HCl config and failed.
$ terraform apply --auto-approve=true
azuredevops_project.project: Creating...
azuredevops_project.project: Still creating... [10s elapsed]
azuredevops_project.project: Still creating... [20s elapsed]
azuredevops_project.project: Creation complete after 20s [id=xxxxxx-xxxx-xxxx-xxxx-xxxxxx]
data.azuredevops_group.project-contributors: Refreshing state...
data.azuredevops_group.project-administrators: Refreshing state...
data.azuredevops_group.project-readers: Refreshing state...
azuredevops_workitemquery_permissions.wiq-project-permissions: Creating...
azuredevops_workitemquery_permissions.wiq-sharedqueries-permissions: Creating...
azuredevops_workitemquery_permissions.wiq-folder-permissions: Creating...
azuredevops_workitemquery_permissions.wiq-project-permissions: Creation complete after 1s [id=$/xxxxxxxxxx/vssgp.xxxxxxxx]
Error: VS403284: Invalid operation. Unable to set bits '64' in security namespace 'xxxx-xxxx-xxxx-xxxxx-xxxxxxxx' as it is reserved by the system.
on main.tf line 34, in resource "azuredevops_workitemquery_permissions" "wiq-sharedqueries-permissions":
34: resource "azuredevops_workitemquery_permissions" "wiq-sharedqueries-permissions" {
Error: Unable to find query [Team] in folder [Shared Queries] because it has no children
on main.tf line 44, in resource "azuredevops_workitemquery_permissions" "wiq-folder-permissions":
44: resource "azuredevops_workitemquery_permissions" "wiq-folder-permissions" {
5d307bd
to
1c31240
Compare
Hi @tmeckel Thanks for your contribute to this PR. I have several questions for this PR.
|
…itemquery_permissions
…missions in website/docs/r/workitemquery_permissions.html.markdown
…vops/internal/service/permissions/resource_workitemquery_permissions.go
…ry_permissions.go according to review
…rmissions in azuredevops/internal/service/permissions/resource_workitemquery_permissions.go
…query_permissions.go * Corrected list of available permissions * Corrected sample
…ncetests/testutils/hcl.go
…ource_workitemquery_permissions_test.go
f0d662a
to
2240b85
Compare
You have to separate the inner working of the various Security Namespaces to the functionality in UI portal, which is mostly streamlined for easy usage or hides (does not) use certain functions of Azure DevOps. So perhaps you should ask someone from the product group how the
As I stated about how the UI implements (reflects) the Security Namespace settings, here you have an example that the UI team didn't implement any functions to manage the Work Item Query permissions on the project level. You can use an indirect approach though, because as usual the permissions from the project level is inherited down to any folder and query. When you set the permissions for the permissions = {
Read = "Allow"
Delete = "Deny"
Contribute = "Deny"
ManagePermissions = "Deny"
} you'll see the following permissions assign to this group for the The Permission
I updated the acceptance tests and added a test to check the update of permissions
The issue with |
azuredevops/internal/acceptancetests/resource_workitemquery_permissions_test.go
Outdated
Show resolved
Hide resolved
…ctPermissions in azuredevops/internal/acceptancetests/resource_workitemquery_permissions_test.go
@tmeckel LGTM . But I think we can remove the
|
…e/docs/r/workitemquery_permissions.html.markdown
All Submissions:
What about the current behavior has changed?
This PR introduces a new resource
azuredevops_workitemquery_permissions
to manage permissions on Work Item Queries and their folders inside a Azure DevOps Project.Does this introduce a change to
go.mod
,go.sum
orvendor/
?Does this introduce a breaking change?
Any relevant logs, error output, etc?
(If it’s long, please paste to https://ghostbin.com/ and insert the link here.)
Other information