@pulumi/artifactory 6.1.2 → 6.1.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/accessToken.d.ts +7 -0
- package/accessToken.js +7 -0
- package/accessToken.js.map +1 -1
- package/config/vars.d.ts +3 -3
- package/generalSecurity.d.ts +9 -0
- package/generalSecurity.js.map +1 -1
- package/package.json +1 -1
- package/scopedToken.d.ts +18 -18
- package/types/input.d.ts +1161 -0
- package/types/output.d.ts +783 -0
package/accessToken.d.ts
CHANGED
|
@@ -2,6 +2,13 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
2
2
|
import * as inputs from "./types/input";
|
|
3
3
|
import * as outputs from "./types/output";
|
|
4
4
|
/**
|
|
5
|
+
* !> **Warning:** This resource is being deprecated and replaced by `artifactory.ScopedToken` since v6.8.0.
|
|
6
|
+
*
|
|
7
|
+
* Provides an Artifactory Access Token resource. This can be used to create and manage Artifactory Access Tokens.
|
|
8
|
+
*
|
|
9
|
+
* > **Note:** Access Tokens will be stored in the raw state as plain-text. Read more about sensitive data in
|
|
10
|
+
* state.
|
|
11
|
+
*
|
|
5
12
|
* ## Example Usage
|
|
6
13
|
*
|
|
7
14
|
* ### S
|
package/accessToken.js
CHANGED
|
@@ -6,6 +6,13 @@ exports.AccessToken = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
+
* !> **Warning:** This resource is being deprecated and replaced by `artifactory.ScopedToken` since v6.8.0.
|
|
10
|
+
*
|
|
11
|
+
* Provides an Artifactory Access Token resource. This can be used to create and manage Artifactory Access Tokens.
|
|
12
|
+
*
|
|
13
|
+
* > **Note:** Access Tokens will be stored in the raw state as plain-text. Read more about sensitive data in
|
|
14
|
+
* state.
|
|
15
|
+
*
|
|
9
16
|
* ## Example Usage
|
|
10
17
|
*
|
|
11
18
|
* ### S
|
package/accessToken.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"accessToken.js","sourceRoot":"","sources":["../accessToken.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"accessToken.js","sourceRoot":"","sources":["../accessToken.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAsIG;AACH,MAAa,WAAY,SAAQ,MAAM,CAAC,cAAc;IAClD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwB,EAAE,IAAmC;QACtH,OAAO,IAAI,WAAW,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAClE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,WAAW,CAAC,YAAY,CAAC;IAC5D,CAAC;IA+CD,YAAY,IAAY,EAAE,WAAgD,EAAE,IAAmC;QAC3G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA2C,CAAC;YAC1D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SACnE;aAAM;YACH,MAAM,IAAI,GAAG,WAA0C,CAAC;YACxD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,aAAa,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAClD,cAAc,CAAC,cAAc,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACtD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,aAAa,EAAE,cAAc,CAAC,EAAE,CAAC;QAChF,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,WAAW,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAChE,CAAC;;AA1GL,kCA2GC;AA7FG,gBAAgB;AACO,wBAAY,GAAG,2CAA2C,CAAC"}
|
package/config/vars.d.ts
CHANGED
|
@@ -1,11 +1,11 @@
|
|
|
1
1
|
/**
|
|
2
|
-
* This is a access token that can be given to you by your admin under `User Management
|
|
2
|
+
* This is a access token that can be given to you by your admin under `User Management > Access Tokens`. If not set, the
|
|
3
3
|
* 'api_key' attribute value will be used.
|
|
4
4
|
*/
|
|
5
5
|
export declare const accessToken: string | undefined;
|
|
6
6
|
/**
|
|
7
|
-
* API key. If `
|
|
8
|
-
*
|
|
7
|
+
* API key. If `accessToken` attribute, `JFROG_ACCESS_TOKEN` or `ARTIFACTORY_ACCESS_TOKEN` environment variable is set, the
|
|
8
|
+
* provider will ignore this attribute.
|
|
9
9
|
*/
|
|
10
10
|
export declare const apiKey: string | undefined;
|
|
11
11
|
/**
|
package/generalSecurity.d.ts
CHANGED
|
@@ -41,6 +41,9 @@ export declare class GeneralSecurity extends pulumi.CustomResource {
|
|
|
41
41
|
* when multiple copies of the Pulumi SDK have been loaded into the same process.
|
|
42
42
|
*/
|
|
43
43
|
static isInstance(obj: any): obj is GeneralSecurity;
|
|
44
|
+
/**
|
|
45
|
+
* Enable anonymous access. Default value is `false`.
|
|
46
|
+
*/
|
|
44
47
|
readonly enableAnonymousAccess: pulumi.Output<boolean | undefined>;
|
|
45
48
|
/**
|
|
46
49
|
* Create a GeneralSecurity resource with the given unique name, arguments, and options.
|
|
@@ -55,11 +58,17 @@ export declare class GeneralSecurity extends pulumi.CustomResource {
|
|
|
55
58
|
* Input properties used for looking up and filtering GeneralSecurity resources.
|
|
56
59
|
*/
|
|
57
60
|
export interface GeneralSecurityState {
|
|
61
|
+
/**
|
|
62
|
+
* Enable anonymous access. Default value is `false`.
|
|
63
|
+
*/
|
|
58
64
|
enableAnonymousAccess?: pulumi.Input<boolean>;
|
|
59
65
|
}
|
|
60
66
|
/**
|
|
61
67
|
* The set of arguments for constructing a GeneralSecurity resource.
|
|
62
68
|
*/
|
|
63
69
|
export interface GeneralSecurityArgs {
|
|
70
|
+
/**
|
|
71
|
+
* Enable anonymous access. Default value is `false`.
|
|
72
|
+
*/
|
|
64
73
|
enableAnonymousAccess?: pulumi.Input<boolean>;
|
|
65
74
|
}
|
package/generalSecurity.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"generalSecurity.js","sourceRoot":"","sources":["../generalSecurity.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;GAyBG;AACH,MAAa,eAAgB,SAAQ,MAAM,CAAC,cAAc;IACtD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA4B,EAAE,IAAmC;QAC1H,OAAO,IAAI,eAAe,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACtE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,eAAe,CAAC,YAAY,CAAC;IAChE,CAAC;
|
|
1
|
+
{"version":3,"file":"generalSecurity.js","sourceRoot":"","sources":["../generalSecurity.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;GAyBG;AACH,MAAa,eAAgB,SAAQ,MAAM,CAAC,cAAc;IACtD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA4B,EAAE,IAAmC;QAC1H,OAAO,IAAI,eAAe,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACtE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,eAAe,CAAC,YAAY,CAAC;IAChE,CAAC;IAeD,YAAY,IAAY,EAAE,WAAwD,EAAE,IAAmC;QACnH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA+C,CAAC;YAC9D,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,qBAAqB,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7F;aAAM;YACH,MAAM,IAAI,GAAG,WAA8C,CAAC;YAC5D,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,qBAAqB,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3F;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,eAAe,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACpE,CAAC;;AArDL,0CAsDC;AAxCG,gBAAgB;AACO,4BAAY,GAAG,mDAAmD,CAAC"}
|
package/package.json
CHANGED
package/scopedToken.d.ts
CHANGED
|
@@ -144,18 +144,18 @@ export declare class ScopedToken extends pulumi.CustomResource {
|
|
|
144
144
|
* supported scopes include: * `applied-permissions/user` - provides user access. If left at the default setting, the token
|
|
145
145
|
* will be created with the user-identity scope, which allows users to identify themselves in the Platform but does not
|
|
146
146
|
* grant any specific access permissions.* `applied-permissions/admin` - the scope assigned to admin users.*
|
|
147
|
-
* `applied-permissions/groups` - the group to which permissions are assigned by group name (use username to
|
|
147
|
+
* `applied-permissions/groups` - the group to which permissions are assigned by group name (use username to indicate the
|
|
148
148
|
* group name)* `system:metrics:r` - for getting the service metrics* `system:livelogs:r` - for getting the service
|
|
149
|
-
*
|
|
149
|
+
* livelogsr. The scope to assign to the token should be provided as a list of scope tokens, limited to 500 characters in
|
|
150
150
|
* total. Resource Permissions From Artifactory 7.38.x, resource permissions scoped tokens are also supported in the REST
|
|
151
151
|
* API. A permission can be represented as a scope token string in the following format:
|
|
152
152
|
* `<resource-type>:<target>[/<sub-resource>]:<actions>` Where: `<resource-type>` - one of the permission resource types,
|
|
153
153
|
* from a predefined closed list. Currently, the only resource type that is supported is the artifact resource type.
|
|
154
154
|
* `<target>` - the target resource, can be exact name or a pattern `<sub-resource>` - optional, the target sub-resource,
|
|
155
|
-
* can be exact name or a pattern `<actions>` - comma-separated list of action acronyms.The actions allowed are
|
|
156
|
-
* a
|
|
157
|
-
* "artifact:generic-local:r"]` `["applied-permissions/group",
|
|
158
|
-
* `["applied-permissions/admin", "system:metrics:r", "artifact:generic-local:*"]`
|
|
155
|
+
* can be exact name or a pattern `<actions>` - comma-separated list of action acronyms.The actions allowed are `r`, `w`,
|
|
156
|
+
* `d`, `a`, `m`, `x`, `s`, or any combination of these actions. To allow all actions - use `*` Examples:
|
|
157
|
+
* `["applied-permissions/user", "artifact:generic-local:r"]` `["applied-permissions/group",
|
|
158
|
+
* "artifact:generic-local/path:*"]` `["applied-permissions/admin", "system:metrics:r", "artifact:generic-local:*"]`
|
|
159
159
|
*/
|
|
160
160
|
readonly scopes: pulumi.Output<string[]>;
|
|
161
161
|
/**
|
|
@@ -254,18 +254,18 @@ export interface ScopedTokenState {
|
|
|
254
254
|
* supported scopes include: * `applied-permissions/user` - provides user access. If left at the default setting, the token
|
|
255
255
|
* will be created with the user-identity scope, which allows users to identify themselves in the Platform but does not
|
|
256
256
|
* grant any specific access permissions.* `applied-permissions/admin` - the scope assigned to admin users.*
|
|
257
|
-
* `applied-permissions/groups` - the group to which permissions are assigned by group name (use username to
|
|
257
|
+
* `applied-permissions/groups` - the group to which permissions are assigned by group name (use username to indicate the
|
|
258
258
|
* group name)* `system:metrics:r` - for getting the service metrics* `system:livelogs:r` - for getting the service
|
|
259
|
-
*
|
|
259
|
+
* livelogsr. The scope to assign to the token should be provided as a list of scope tokens, limited to 500 characters in
|
|
260
260
|
* total. Resource Permissions From Artifactory 7.38.x, resource permissions scoped tokens are also supported in the REST
|
|
261
261
|
* API. A permission can be represented as a scope token string in the following format:
|
|
262
262
|
* `<resource-type>:<target>[/<sub-resource>]:<actions>` Where: `<resource-type>` - one of the permission resource types,
|
|
263
263
|
* from a predefined closed list. Currently, the only resource type that is supported is the artifact resource type.
|
|
264
264
|
* `<target>` - the target resource, can be exact name or a pattern `<sub-resource>` - optional, the target sub-resource,
|
|
265
|
-
* can be exact name or a pattern `<actions>` - comma-separated list of action acronyms.The actions allowed are
|
|
266
|
-
* a
|
|
267
|
-
* "artifact:generic-local:r"]` `["applied-permissions/group",
|
|
268
|
-
* `["applied-permissions/admin", "system:metrics:r", "artifact:generic-local:*"]`
|
|
265
|
+
* can be exact name or a pattern `<actions>` - comma-separated list of action acronyms.The actions allowed are `r`, `w`,
|
|
266
|
+
* `d`, `a`, `m`, `x`, `s`, or any combination of these actions. To allow all actions - use `*` Examples:
|
|
267
|
+
* `["applied-permissions/user", "artifact:generic-local:r"]` `["applied-permissions/group",
|
|
268
|
+
* "artifact:generic-local/path:*"]` `["applied-permissions/admin", "system:metrics:r", "artifact:generic-local:*"]`
|
|
269
269
|
*/
|
|
270
270
|
scopes?: pulumi.Input<pulumi.Input<string>[]>;
|
|
271
271
|
/**
|
|
@@ -332,18 +332,18 @@ export interface ScopedTokenArgs {
|
|
|
332
332
|
* supported scopes include: * `applied-permissions/user` - provides user access. If left at the default setting, the token
|
|
333
333
|
* will be created with the user-identity scope, which allows users to identify themselves in the Platform but does not
|
|
334
334
|
* grant any specific access permissions.* `applied-permissions/admin` - the scope assigned to admin users.*
|
|
335
|
-
* `applied-permissions/groups` - the group to which permissions are assigned by group name (use username to
|
|
335
|
+
* `applied-permissions/groups` - the group to which permissions are assigned by group name (use username to indicate the
|
|
336
336
|
* group name)* `system:metrics:r` - for getting the service metrics* `system:livelogs:r` - for getting the service
|
|
337
|
-
*
|
|
337
|
+
* livelogsr. The scope to assign to the token should be provided as a list of scope tokens, limited to 500 characters in
|
|
338
338
|
* total. Resource Permissions From Artifactory 7.38.x, resource permissions scoped tokens are also supported in the REST
|
|
339
339
|
* API. A permission can be represented as a scope token string in the following format:
|
|
340
340
|
* `<resource-type>:<target>[/<sub-resource>]:<actions>` Where: `<resource-type>` - one of the permission resource types,
|
|
341
341
|
* from a predefined closed list. Currently, the only resource type that is supported is the artifact resource type.
|
|
342
342
|
* `<target>` - the target resource, can be exact name or a pattern `<sub-resource>` - optional, the target sub-resource,
|
|
343
|
-
* can be exact name or a pattern `<actions>` - comma-separated list of action acronyms.The actions allowed are
|
|
344
|
-
* a
|
|
345
|
-
* "artifact:generic-local:r"]` `["applied-permissions/group",
|
|
346
|
-
* `["applied-permissions/admin", "system:metrics:r", "artifact:generic-local:*"]`
|
|
343
|
+
* can be exact name or a pattern `<actions>` - comma-separated list of action acronyms.The actions allowed are `r`, `w`,
|
|
344
|
+
* `d`, `a`, `m`, `x`, `s`, or any combination of these actions. To allow all actions - use `*` Examples:
|
|
345
|
+
* `["applied-permissions/user", "artifact:generic-local:r"]` `["applied-permissions/group",
|
|
346
|
+
* "artifact:generic-local/path:*"]` `["applied-permissions/admin", "system:metrics:r", "artifact:generic-local:*"]`
|
|
347
347
|
*/
|
|
348
348
|
scopes?: pulumi.Input<pulumi.Input<string>[]>;
|
|
349
349
|
/**
|