-
Notifications
You must be signed in to change notification settings - Fork 894
feat: Adds enterprise settings resources to the provider #2852
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
stevehipwell
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@nickfloyd I think this resource should be broken up to be a 1-2-1 mapping between API calls and TF resources. This is the idiomatic TF pattern and puts the least pressure on the GitHub API.
Let me put together something next week and I'll cc you to make sure I address your thoughts as expected. ❤️ |
…aligns with the API resource structure
…aligns with the API resource structure
|
@nickfloyd is this still a work in progress? |
@stevehipwell I feel like it's in a pretty good spot for 👀 and feedback - I'd love to get it in if we all agree it's good to go! ❤️ |
|
@nickfloyd I only asked because it looks like you've only got tests for one of the new resources? |
Oh man! Great catch... |
stevehipwell
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
FYI - There is a missing new line ending for the example TF file.
Resolves #1199
Before the change?
Prior to this change we were missing some enterprise settings resources in the provider
After the change?
Adds the following enterprise settings resources to the provider
✅ Read-only workflow permissions by default - Available via DefaultWorkflowPermissionEnterprise
✅ Contributor approval permissions - Available via ContributorApprovalPermissions
✅ Advanced Security - Available via EnterpriseSecurityAnalysisSettings
✅ Secret scanning - Available via EnableDisableSecurityFeature
✅ Secret scanning push protection - Available via EnableDisableSecurityFeature
✅ Self-hosted runner permissions - Available via SelfHostRunnerPermissionsEnterprise
Pull request checklist
Does this introduce a breaking change?
Please see our docs on breaking changes to help!