Skip to content

Commit

Permalink
Add OPTIONS Allowlist support to vercel terraform provider (#186)
Browse files Browse the repository at this point in the history
* add OPTIONS Allowlist to terraform

* tests

* descriptions

* task docs
  • Loading branch information
kitfoster committed May 22, 2024
1 parent 1762a94 commit 611e611
Show file tree
Hide file tree
Showing 9 changed files with 174 additions and 4 deletions.
8 changes: 8 additions & 0 deletions client/deployment_protection.go
Original file line number Diff line number Diff line change
Expand Up @@ -26,3 +26,11 @@ type TrustedIps struct {
type ProtectionBypass struct {
Scope string `json:"scope"`
}

type OptionsAllowlist struct {
Paths []OptionsAllowlistPath `json:"paths"`
}

type OptionsAllowlistPath struct {
Value string `json:"value"`
}
2 changes: 2 additions & 0 deletions client/project.go
Original file line number Diff line number Diff line change
Expand Up @@ -169,6 +169,7 @@ type ProjectResponse struct {
VercelAuthentication *VercelAuthentication `json:"ssoProtection"`
PasswordProtection *PasswordProtection `json:"passwordProtection"`
TrustedIps *TrustedIps `json:"trustedIps"`
OptionsAllowlist *OptionsAllowlist `json:"optionsAllowlist"`
ProtectionBypass map[string]ProtectionBypass `json:"protectionBypass"`
AutoExposeSystemEnvVars *bool `json:"autoExposeSystemEnvs"`
EnablePreviewFeedback *bool `json:"enablePreviewFeedback"`
Expand Down Expand Up @@ -261,6 +262,7 @@ type UpdateProjectRequest struct {
VercelAuthentication *VercelAuthentication `json:"ssoProtection"`
PasswordProtection *PasswordProtectionWithPassword `json:"passwordProtection"`
TrustedIps *TrustedIps `json:"trustedIps"`
OptionsAllowlist *OptionsAllowlist `json:"optionsAllowlist"`
AutoExposeSystemEnvVars bool `json:"autoExposeSystemEnvs"`
EnablePreviewFeedback *bool `json:"enablePreviewFeedback"`
AutoAssignCustomDomains bool `json:"autoAssignCustomDomains"`
Expand Down
17 changes: 17 additions & 0 deletions docs/data-sources/project.md
Original file line number Diff line number Diff line change
Expand Up @@ -58,6 +58,7 @@ output "project_id" {
- `id` (String) The ID of this resource.
- `ignore_command` (String) When a commit is pushed to the Git repository that is connected with your Project, its SHA will determine if a new Build has to be issued. If the SHA was deployed before, no new Build will be issued. You can customize this behavior with a command that exits with code 1 (new Build needed) or code 0.
- `install_command` (String) The install command for this project. If omitted, this value will be automatically detected.
- `options_allowlist` (Attributes) Disable Deployment Protection for CORS preflight `OPTIONS` requests for a list of paths. (see [below for nested schema](#nestedatt--options_allowlist))
- `output_directory` (String) The output directory of the project. When null is used this value will be automatically detected.
- `password_protection` (Attributes) Ensures visitors of your Preview Deployments must enter a password in order to gain access. (see [below for nested schema](#nestedatt--password_protection))
- `preview_comments` (Boolean) Whether comments are enabled on your Preview Deployments.
Expand Down Expand Up @@ -114,6 +115,22 @@ Read-Only:



<a id="nestedatt--options_allowlist"></a>
### Nested Schema for `options_allowlist`

Read-Only:

- `paths` (List of Object) The allowed paths for the OPTIONS Allowlist. Incoming requests will bypass Deployment Protection if they have the method `OPTIONS` and **start with** one of the path values. (see [below for nested schema](#nestedatt--options_allowlist--paths))

<a id="nestedatt--options_allowlist--paths"></a>
### Nested Schema for `options_allowlist.paths`

Read-Only:

- `value` (String)



<a id="nestedatt--password_protection"></a>
### Nested Schema for `password_protection`

Expand Down
17 changes: 17 additions & 0 deletions docs/resources/project.md
Original file line number Diff line number Diff line change
Expand Up @@ -70,6 +70,7 @@ resource "vercel_project" "example" {
- `git_repository` (Attributes) The Git Repository that will be connected to the project. When this is defined, any pushes to the specified connected Git Repository will be automatically deployed. This requires the corresponding Vercel for [Github](https://vercel.com/docs/concepts/git/vercel-for-github), [Gitlab](https://vercel.com/docs/concepts/git/vercel-for-gitlab) or [Bitbucket](https://vercel.com/docs/concepts/git/vercel-for-bitbucket) plugins to be installed. (see [below for nested schema](#nestedatt--git_repository))
- `ignore_command` (String) When a commit is pushed to the Git repository that is connected with your Project, its SHA will determine if a new Build has to be issued. If the SHA was deployed before, no new Build will be issued. You can customize this behavior with a command that exits with code 1 (new Build needed) or code 0.
- `install_command` (String) The install command for this project. If omitted, this value will be automatically detected.
- `options_allowlist` (Attributes) Disable Deployment Protection for CORS preflight `OPTIONS` requests for a list of paths. (see [below for nested schema](#nestedatt--options_allowlist))
- `output_directory` (String) The output directory of the project. If omitted, this value will be automatically detected.
- `password_protection` (Attributes) Ensures visitors of your Preview Deployments must enter a password in order to gain access. (see [below for nested schema](#nestedatt--password_protection))
- `preview_comments` (Boolean) Whether to enable comments on your Preview Deployments. If omitted, comments are controlled at the team level (default behaviour).
Expand Down Expand Up @@ -144,6 +145,22 @@ Read-Only:



<a id="nestedatt--options_allowlist"></a>
### Nested Schema for `options_allowlist`

Required:

- `paths` (Attributes Set) The allowed paths for the OPTIONS Allowlist. Incoming requests will bypass Deployment Protection if they have the method `OPTIONS` and **start with** one of the path values. (see [below for nested schema](#nestedatt--options_allowlist--paths))

<a id="nestedatt--options_allowlist--paths"></a>
### Nested Schema for `options_allowlist.paths`

Required:

- `value` (String) The path prefix to compare with the incoming request path.



<a id="nestedatt--password_protection"></a>
### Nested Schema for `password_protection`

Expand Down
17 changes: 17 additions & 0 deletions vercel/data_source_project.go
Original file line number Diff line number Diff line change
Expand Up @@ -220,6 +220,21 @@ For more detailed information, please see the [Vercel documentation](https://ver
},
},
},
"options_allowlist": schema.SingleNestedAttribute{
Description: "Disable Deployment Protection for CORS preflight `OPTIONS` requests for a list of paths.",
Computed: true,
Attributes: map[string]schema.Attribute{
"paths": schema.ListAttribute{
Description: "The allowed paths for the OPTIONS Allowlist. Incoming requests will bypass Deployment Protection if they have the method `OPTIONS` and **start with** one of the path values.",
Computed: true,
ElementType: types.ObjectType{
AttrTypes: map[string]attr.Type{
"value": types.StringType,
},
},
},
},
},
"id": schema.StringAttribute{
Computed: true,
},
Expand Down Expand Up @@ -320,6 +335,7 @@ type ProjectDataSource struct {
VercelAuthentication *VercelAuthentication `tfsdk:"vercel_authentication"`
PasswordProtection *PasswordProtection `tfsdk:"password_protection"`
TrustedIps *TrustedIps `tfsdk:"trusted_ips"`
OptionsAllowlist *OptionsAllowlist `tfsdk:"options_allowlist"`
ProtectionBypassForAutomation types.Bool `tfsdk:"protection_bypass_for_automation"`
AutoExposeSystemEnvVars types.Bool `tfsdk:"automatically_expose_system_environment_variables"`
GitComments types.Object `tfsdk:"git_comments"`
Expand Down Expand Up @@ -375,6 +391,7 @@ func convertResponseToProjectDataSource(ctx context.Context, response client.Pro
VercelAuthentication: project.VercelAuthentication,
PasswordProtection: pp,
TrustedIps: project.TrustedIps,
OptionsAllowlist: project.OptionsAllowlist,
AutoExposeSystemEnvVars: types.BoolPointerValue(response.AutoExposeSystemEnvVars),
ProtectionBypassForAutomation: project.ProtectionBypassForAutomation,
GitComments: project.GitComments,
Expand Down
9 changes: 9 additions & 0 deletions vercel/data_source_project_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -35,6 +35,8 @@ func TestAcc_ProjectDataSource(t *testing.T) {
}),
resource.TestCheckResourceAttr("data.vercel_project.test", "trusted_ips.deployment_type", "only_production_deployments"),
resource.TestCheckResourceAttr("data.vercel_project.test", "trusted_ips.protection_mode", "trusted_ip_required"),
resource.TestCheckResourceAttr("data.vercel_project.test", "options_allowlist.paths.#", "1"),
resource.TestCheckResourceAttr("data.vercel_project.test", "options_allowlist.paths.0.value", "/api"),

resource.TestCheckTypeSetElemNestedAttrs("data.vercel_project.test", "environment.*", map[string]string{
"key": "foo",
Expand Down Expand Up @@ -86,6 +88,13 @@ resource "vercel_project" "test" {
deployment_type = "only_production_deployments"
protection_mode = "trusted_ip_required"
}
options_allowlist = {
paths = [
{
value = "/api"
}
]
}
%s
environment = [
{
Expand Down
8 changes: 8 additions & 0 deletions vercel/deployment_protection.go
Original file line number Diff line number Diff line change
Expand Up @@ -28,3 +28,11 @@ type TrustedIps struct {
type ProtectionBypass struct {
Scope types.String `tfsdk:"scope"`
}

type OptionsAllowlist struct {
Paths []OptionsAllowlistPath `tfsdk:"paths"`
}

type OptionsAllowlistPath struct {
Value types.String `tfsdk:"value"`
}
56 changes: 56 additions & 0 deletions vercel/resource_project.go
Original file line number Diff line number Diff line change
Expand Up @@ -300,6 +300,28 @@ At this time you cannot use a Vercel Project resource with in-line ` + "`environ
},
},
},
"options_allowlist": schema.SingleNestedAttribute{
Description: "Disable Deployment Protection for CORS preflight `OPTIONS` requests for a list of paths.",
Optional: true,
Attributes: map[string]schema.Attribute{
"paths": schema.SetNestedAttribute{
Description: "The allowed paths for the OPTIONS Allowlist. Incoming requests will bypass Deployment Protection if they have the method `OPTIONS` and **start with** one of the path values.",
Required: true,
PlanModifiers: []planmodifier.Set{setplanmodifier.UseStateForUnknown()},
NestedObject: schema.NestedAttributeObject{
Attributes: map[string]schema.Attribute{
"value": schema.StringAttribute{
Description: "The path prefix to compare with the incoming request path.",
Required: true,
},
},
},
Validators: []validator.Set{
stringSetMinCount(1),
},
},
},
},
"id": schema.StringAttribute{
Computed: true,
PlanModifiers: []planmodifier.String{stringplanmodifier.UseStateForUnknown()},
Expand Down Expand Up @@ -425,6 +447,7 @@ type Project struct {
VercelAuthentication *VercelAuthentication `tfsdk:"vercel_authentication"`
PasswordProtection *PasswordProtectionWithPassword `tfsdk:"password_protection"`
TrustedIps *TrustedIps `tfsdk:"trusted_ips"`
OptionsAllowlist *OptionsAllowlist `tfsdk:"options_allowlist"`
ProtectionBypassForAutomation types.Bool `tfsdk:"protection_bypass_for_automation"`
ProtectionBypassForAutomationSecret types.String `tfsdk:"protection_bypass_for_automation_secret"`
AutoExposeSystemEnvVars types.Bool `tfsdk:"automatically_expose_system_environment_variables"`
Expand Down Expand Up @@ -459,6 +482,7 @@ func (p Project) RequiresUpdateAfterCreation() bool {
return p.PasswordProtection != nil ||
p.VercelAuthentication != nil ||
p.TrustedIps != nil ||
p.OptionsAllowlist != nil ||
!p.AutoExposeSystemEnvVars.IsNull() ||
p.GitComments.IsNull() ||
!p.PreviewComments.IsNull() ||
Expand Down Expand Up @@ -581,6 +605,7 @@ func (p *Project) toUpdateProjectRequest(ctx context.Context, oldName string) (r
PasswordProtection: p.PasswordProtection.toUpdateProjectRequest(),
VercelAuthentication: p.VercelAuthentication.toUpdateProjectRequest(),
TrustedIps: p.TrustedIps.toUpdateProjectRequest(),
OptionsAllowlist: p.OptionsAllowlist.toUpdateProjectRequest(),
AutoExposeSystemEnvVars: p.AutoExposeSystemEnvVars.ValueBool(),
EnablePreviewFeedback: p.PreviewComments.ValueBoolPointer(),
AutoAssignCustomDomains: p.AutoAssignCustomDomains.ValueBool(),
Expand Down Expand Up @@ -758,6 +783,23 @@ func (t *TrustedIps) toUpdateProjectRequest() *client.TrustedIps {
}
}

func (t *OptionsAllowlist) toUpdateProjectRequest() *client.OptionsAllowlist {
if t == nil {
return nil
}

var paths = []client.OptionsAllowlistPath{}
for _, path := range t.Paths {
paths = append(paths, client.OptionsAllowlistPath{
Value: path.Value.ValueString(),
})
}

return &client.OptionsAllowlist{
Paths: paths,
}
}

/*
* In the Vercel API the following fields are coerced to null during project creation
Expand Down Expand Up @@ -937,6 +979,19 @@ func convertResponseToProject(ctx context.Context, response client.ProjectRespon
}
}

var oal *OptionsAllowlist
if response.OptionsAllowlist != nil {
var paths []OptionsAllowlistPath
for _, path := range response.OptionsAllowlist.Paths {
paths = append(paths, OptionsAllowlistPath{
Value: types.StringValue(path.Value),
})
}
oal = &OptionsAllowlist{
Paths: paths,
}
}

var env []attr.Value
for _, e := range environmentVariables {
target := []attr.Value{}
Expand Down Expand Up @@ -1029,6 +1084,7 @@ func convertResponseToProject(ctx context.Context, response client.ProjectRespon
PasswordProtection: pp,
VercelAuthentication: va,
TrustedIps: tip,
OptionsAllowlist: oal,
ProtectionBypassForAutomation: protectionBypass,
ProtectionBypassForAutomationSecret: protectionBypassSecret,
AutoExposeSystemEnvVars: types.BoolPointerValue(response.AutoExposeSystemEnvVars),
Expand Down
44 changes: 40 additions & 4 deletions vercel/resource_project_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -166,7 +166,7 @@ func TestAcc_ProjectWithVercelAuthAndPasswordProtectionAndTrustedIps(t *testing.
CheckDestroy: testAccProjectDestroy("vercel_project.enabled_to_start", testTeam()),
Steps: []resource.TestStep{
{
Config: testAccProjectConfigWithVercelAuthAndPasswordAndTrustedIps(projectSuffix, teamIDConfig()),
Config: testAccProjectConfigWithVercelAuthAndPasswordAndTrustedIpsAndOptionsAllowlist(projectSuffix, teamIDConfig()),
Check: resource.ComposeAggregateTestCheckFunc(
testAccProjectExists("vercel_project.enabled_to_start", testTeam()),
resource.TestCheckResourceAttr("vercel_project.enabled_to_start", "vercel_authentication.deployment_type", "all_deployments"),
Expand All @@ -179,6 +179,8 @@ func TestAcc_ProjectWithVercelAuthAndPasswordProtectionAndTrustedIps(t *testing.
}),
resource.TestCheckResourceAttr("vercel_project.enabled_to_start", "trusted_ips.deployment_type", "all_deployments"),
resource.TestCheckResourceAttr("vercel_project.enabled_to_start", "trusted_ips.protection_mode", "trusted_ip_optional"),
resource.TestCheckResourceAttr("vercel_project.enabled_to_start", "options_allowlist.paths.#", "1"),
resource.TestCheckResourceAttr("vercel_project.enabled_to_start", "options_allowlist.paths.0.value", "/foo"),
resource.TestCheckResourceAttr("vercel_project.enabled_to_start", "protection_bypass_for_automation", "true"),
resource.TestCheckResourceAttrSet("vercel_project.enabled_to_start", "protection_bypass_for_automation_secret"),
testAccProjectExists("vercel_project.disabled_to_start", testTeam()),
Expand All @@ -198,12 +200,14 @@ func TestAcc_ProjectWithVercelAuthAndPasswordProtectionAndTrustedIps(t *testing.
}),
resource.TestCheckResourceAttr("vercel_project.enabled_to_update", "trusted_ips.deployment_type", "only_production_deployments"),
resource.TestCheckResourceAttr("vercel_project.enabled_to_update", "trusted_ips.protection_mode", "trusted_ip_required"),
resource.TestCheckResourceAttr("vercel_project.enabled_to_update", "options_allowlist.paths.#", "1"),
resource.TestCheckResourceAttr("vercel_project.enabled_to_update", "options_allowlist.paths.0.value", "/bar"),
resource.TestCheckResourceAttr("vercel_project.enabled_to_update", "protection_bypass_for_automation", "true"),
resource.TestCheckResourceAttrSet("vercel_project.enabled_to_update", "protection_bypass_for_automation_secret"),
),
},
{
Config: testAccProjectConfigWithVercelAuthAndPasswordAndTrustedIpsUpdated(projectSuffix, teamIDConfig()),
Config: testAccProjectConfigWithVercelAuthAndPasswordAndTrustedIpsAndOptionsAllowlistUpdated(projectSuffix, teamIDConfig()),
Check: resource.ComposeAggregateTestCheckFunc(
resource.TestCheckResourceAttr("vercel_project.enabled_to_start", "vercel_authentication.deployment_type", "standard_protection"),
resource.TestCheckNoResourceAttr("vercel_project.enabled_to_start", "password_protection"),
Expand All @@ -221,6 +225,8 @@ func TestAcc_ProjectWithVercelAuthAndPasswordProtectionAndTrustedIps(t *testing.
}),
resource.TestCheckResourceAttr("vercel_project.disabled_to_start", "trusted_ips.deployment_type", "standard_protection"),
resource.TestCheckResourceAttr("vercel_project.disabled_to_start", "trusted_ips.protection_mode", "trusted_ip_required"),
resource.TestCheckResourceAttr("vercel_project.disabled_to_start", "options_allowlist.paths.#", "1"),
resource.TestCheckResourceAttr("vercel_project.disabled_to_start", "options_allowlist.paths.0.value", "/foo"),
resource.TestCheckResourceAttr("vercel_project.disabled_to_start", "protection_bypass_for_automation", "true"),
resource.TestCheckResourceAttrSet("vercel_project.disabled_to_start", "protection_bypass_for_automation_secret"),

Expand All @@ -235,6 +241,8 @@ func TestAcc_ProjectWithVercelAuthAndPasswordProtectionAndTrustedIps(t *testing.
resource.TestCheckResourceAttr("vercel_project.enabled_to_update", "trusted_ips.deployment_type", "all_deployments"),
resource.TestCheckResourceAttr("vercel_project.enabled_to_update", "trusted_ips.protection_mode", "trusted_ip_optional"),
resource.TestCheckResourceAttr("vercel_project.enabled_to_update", "protection_bypass_for_automation", "false"),
resource.TestCheckResourceAttr("vercel_project.enabled_to_update", "options_allowlist.paths.#", "1"),
resource.TestCheckResourceAttr("vercel_project.enabled_to_update", "options_allowlist.paths.0.value", "/bar"),
resource.TestCheckNoResourceAttr("vercel_project.enabled_to_update", "protection_bypass_for_automation_secret"),
),
},
Expand Down Expand Up @@ -378,7 +386,7 @@ resource "vercel_project" "test" {
`, projectSuffix, teamID)
}

func testAccProjectConfigWithVercelAuthAndPasswordAndTrustedIps(projectSuffix, teamID string) string {
func testAccProjectConfigWithVercelAuthAndPasswordAndTrustedIpsAndOptionsAllowlist(projectSuffix, teamID string) string {
return fmt.Sprintf(`
resource "vercel_project" "enabled_to_start" {
name = "test-acc-protection-one-%[1]s"
Expand All @@ -400,6 +408,13 @@ resource "vercel_project" "enabled_to_start" {
deployment_type = "all_deployments"
protection_mode = "trusted_ip_optional"
}
options_allowlist = {
paths = [
{
value = "/foo"
}
]
}
protection_bypass_for_automation = true
}
Expand Down Expand Up @@ -431,12 +446,19 @@ resource "vercel_project" "enabled_to_update" {
]
deployment_type = "only_production_deployments"
}
options_allowlist = {
paths = [
{
value = "/bar"
}
]
}
protection_bypass_for_automation = true
}
`, projectSuffix, teamID)
}

func testAccProjectConfigWithVercelAuthAndPasswordAndTrustedIpsUpdated(projectSuffix, teamID string) string {
func testAccProjectConfigWithVercelAuthAndPasswordAndTrustedIpsAndOptionsAllowlistUpdated(projectSuffix, teamID string) string {
return fmt.Sprintf(`
resource "vercel_project" "enabled_to_start" {
name = "test-acc-protection-one-%[1]s"
Expand All @@ -462,6 +484,13 @@ resource "vercel_project" "disabled_to_start" {
]
deployment_type = "standard_protection"
}
options_allowlist = {
paths = [
{
value = "/foo"
}
]
}
protection_bypass_for_automation = true
}
Expand All @@ -485,6 +514,13 @@ resource "vercel_project" "enabled_to_update" {
deployment_type = "all_deployments"
protection_mode = "trusted_ip_optional"
}
options_allowlist = {
paths = [
{
value = "/bar"
}
]
}
protection_bypass_for_automation = false
}
`, projectSuffix, teamID)
Expand Down

0 comments on commit 611e611

Please sign in to comment.