@pulumi/artifactory 6.1.2 → 6.1.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/accessToken.d.ts CHANGED
@@ -2,6 +2,13 @@ import * as pulumi from "@pulumi/pulumi";
2
2
  import * as inputs from "./types/input";
3
3
  import * as outputs from "./types/output";
4
4
  /**
5
+ * !> **Warning:** This resource is being deprecated and replaced by `artifactory.ScopedToken` since v6.8.0.
6
+ *
7
+ * Provides an Artifactory Access Token resource. This can be used to create and manage Artifactory Access Tokens.
8
+ *
9
+ * > **Note:** Access Tokens will be stored in the raw state as plain-text. Read more about sensitive data in
10
+ * state.
11
+ *
5
12
  * ## Example Usage
6
13
  *
7
14
  * ### S
package/accessToken.js CHANGED
@@ -6,6 +6,13 @@ exports.AccessToken = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("./utilities");
8
8
  /**
9
+ * !> **Warning:** This resource is being deprecated and replaced by `artifactory.ScopedToken` since v6.8.0.
10
+ *
11
+ * Provides an Artifactory Access Token resource. This can be used to create and manage Artifactory Access Tokens.
12
+ *
13
+ * > **Note:** Access Tokens will be stored in the raw state as plain-text. Read more about sensitive data in
14
+ * state.
15
+ *
9
16
  * ## Example Usage
10
17
  *
11
18
  * ### S
@@ -1 +1 @@
1
- {"version":3,"file":"accessToken.js","sourceRoot":"","sources":["../accessToken.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA+HG;AACH,MAAa,WAAY,SAAQ,MAAM,CAAC,cAAc;IAClD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwB,EAAE,IAAmC;QACtH,OAAO,IAAI,WAAW,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAClE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,WAAW,CAAC,YAAY,CAAC;IAC5D,CAAC;IA+CD,YAAY,IAAY,EAAE,WAAgD,EAAE,IAAmC;QAC3G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA2C,CAAC;YAC1D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SACnE;aAAM;YACH,MAAM,IAAI,GAAG,WAA0C,CAAC;YACxD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,aAAa,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAClD,cAAc,CAAC,cAAc,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACtD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,aAAa,EAAE,cAAc,CAAC,EAAE,CAAC;QAChF,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,WAAW,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAChE,CAAC;;AA1GL,kCA2GC;AA7FG,gBAAgB;AACO,wBAAY,GAAG,2CAA2C,CAAC"}
1
+ {"version":3,"file":"accessToken.js","sourceRoot":"","sources":["../accessToken.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAsIG;AACH,MAAa,WAAY,SAAQ,MAAM,CAAC,cAAc;IAClD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwB,EAAE,IAAmC;QACtH,OAAO,IAAI,WAAW,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAClE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,WAAW,CAAC,YAAY,CAAC;IAC5D,CAAC;IA+CD,YAAY,IAAY,EAAE,WAAgD,EAAE,IAAmC;QAC3G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA2C,CAAC;YAC1D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SACnE;aAAM;YACH,MAAM,IAAI,GAAG,WAA0C,CAAC;YACxD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,aAAa,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAClD,cAAc,CAAC,cAAc,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACtD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,aAAa,EAAE,cAAc,CAAC,EAAE,CAAC;QAChF,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,WAAW,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAChE,CAAC;;AA1GL,kCA2GC;AA7FG,gBAAgB;AACO,wBAAY,GAAG,2CAA2C,CAAC"}
package/config/vars.d.ts CHANGED
@@ -1,11 +1,11 @@
1
1
  /**
2
- * This is a access token that can be given to you by your admin under `User Management -> Access Tokens`. If not set, the
2
+ * This is a access token that can be given to you by your admin under `User Management > Access Tokens`. If not set, the
3
3
  * 'api_key' attribute value will be used.
4
4
  */
5
5
  export declare const accessToken: string | undefined;
6
6
  /**
7
- * API key. If `access_token` attribute, `JFROG_ACCESS_TOKEN` or `ARTIFACTORY_ACCESS_TOKEN` environment variable is set,
8
- * the provider will ignore this attribute.
7
+ * API key. If `accessToken` attribute, `JFROG_ACCESS_TOKEN` or `ARTIFACTORY_ACCESS_TOKEN` environment variable is set, the
8
+ * provider will ignore this attribute.
9
9
  */
10
10
  export declare const apiKey: string | undefined;
11
11
  /**
@@ -41,6 +41,9 @@ export declare class GeneralSecurity extends pulumi.CustomResource {
41
41
  * when multiple copies of the Pulumi SDK have been loaded into the same process.
42
42
  */
43
43
  static isInstance(obj: any): obj is GeneralSecurity;
44
+ /**
45
+ * Enable anonymous access. Default value is `false`.
46
+ */
44
47
  readonly enableAnonymousAccess: pulumi.Output<boolean | undefined>;
45
48
  /**
46
49
  * Create a GeneralSecurity resource with the given unique name, arguments, and options.
@@ -55,11 +58,17 @@ export declare class GeneralSecurity extends pulumi.CustomResource {
55
58
  * Input properties used for looking up and filtering GeneralSecurity resources.
56
59
  */
57
60
  export interface GeneralSecurityState {
61
+ /**
62
+ * Enable anonymous access. Default value is `false`.
63
+ */
58
64
  enableAnonymousAccess?: pulumi.Input<boolean>;
59
65
  }
60
66
  /**
61
67
  * The set of arguments for constructing a GeneralSecurity resource.
62
68
  */
63
69
  export interface GeneralSecurityArgs {
70
+ /**
71
+ * Enable anonymous access. Default value is `false`.
72
+ */
64
73
  enableAnonymousAccess?: pulumi.Input<boolean>;
65
74
  }
@@ -1 +1 @@
1
- {"version":3,"file":"generalSecurity.js","sourceRoot":"","sources":["../generalSecurity.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;GAyBG;AACH,MAAa,eAAgB,SAAQ,MAAM,CAAC,cAAc;IACtD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA4B,EAAE,IAAmC;QAC1H,OAAO,IAAI,eAAe,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACtE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,eAAe,CAAC,YAAY,CAAC;IAChE,CAAC;IAYD,YAAY,IAAY,EAAE,WAAwD,EAAE,IAAmC;QACnH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA+C,CAAC;YAC9D,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,qBAAqB,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7F;aAAM;YACH,MAAM,IAAI,GAAG,WAA8C,CAAC;YAC5D,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,qBAAqB,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3F;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,eAAe,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACpE,CAAC;;AAlDL,0CAmDC;AArCG,gBAAgB;AACO,4BAAY,GAAG,mDAAmD,CAAC"}
1
+ {"version":3,"file":"generalSecurity.js","sourceRoot":"","sources":["../generalSecurity.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;GAyBG;AACH,MAAa,eAAgB,SAAQ,MAAM,CAAC,cAAc;IACtD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA4B,EAAE,IAAmC;QAC1H,OAAO,IAAI,eAAe,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACtE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,eAAe,CAAC,YAAY,CAAC;IAChE,CAAC;IAeD,YAAY,IAAY,EAAE,WAAwD,EAAE,IAAmC;QACnH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA+C,CAAC;YAC9D,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,qBAAqB,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7F;aAAM;YACH,MAAM,IAAI,GAAG,WAA8C,CAAC;YAC5D,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,qBAAqB,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3F;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,eAAe,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACpE,CAAC;;AArDL,0CAsDC;AAxCG,gBAAgB;AACO,4BAAY,GAAG,mDAAmD,CAAC"}
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@pulumi/artifactory",
3
- "version": "v6.1.2",
3
+ "version": "v6.1.3",
4
4
  "description": "A Pulumi package for creating and managing artifactory cloud resources.",
5
5
  "keywords": [
6
6
  "pulumi",
package/scopedToken.d.ts CHANGED
@@ -144,18 +144,18 @@ export declare class ScopedToken extends pulumi.CustomResource {
144
144
  * supported scopes include: * `applied-permissions/user` - provides user access. If left at the default setting, the token
145
145
  * will be created with the user-identity scope, which allows users to identify themselves in the Platform but does not
146
146
  * grant any specific access permissions.* `applied-permissions/admin` - the scope assigned to admin users.*
147
- * `applied-permissions/groups` - the group to which permissions are assigned by group name (use username to inicate the
147
+ * `applied-permissions/groups` - the group to which permissions are assigned by group name (use username to indicate the
148
148
  * group name)* `system:metrics:r` - for getting the service metrics* `system:livelogs:r` - for getting the service
149
- * livelogsrThe scope to assign to the token should be provided as a list of scope tokens, limited to 500 characters in
149
+ * livelogsr. The scope to assign to the token should be provided as a list of scope tokens, limited to 500 characters in
150
150
  * total. Resource Permissions From Artifactory 7.38.x, resource permissions scoped tokens are also supported in the REST
151
151
  * API. A permission can be represented as a scope token string in the following format:
152
152
  * `<resource-type>:<target>[/<sub-resource>]:<actions>` Where: `<resource-type>` - one of the permission resource types,
153
153
  * from a predefined closed list. Currently, the only resource type that is supported is the artifact resource type.
154
154
  * `<target>` - the target resource, can be exact name or a pattern `<sub-resource>` - optional, the target sub-resource,
155
- * can be exact name or a pattern `<actions>` - comma-separated list of action acronyms.The actions allowed are <r, w, d,
156
- * a, m, x, s> or any combination of these actions. To allow all actions - use `*` Examples: `["applied-permissions/user",
157
- * "artifact:generic-local:r"]` `["applied-permissions/group", "artifact:generic-local/path:*"]`
158
- * `["applied-permissions/admin", "system:metrics:r", "artifact:generic-local:*"]`
155
+ * can be exact name or a pattern `<actions>` - comma-separated list of action acronyms.The actions allowed are `r`, `w`,
156
+ * `d`, `a`, `m`, `x`, `s`, or any combination of these actions. To allow all actions - use `*` Examples:
157
+ * `["applied-permissions/user", "artifact:generic-local:r"]` `["applied-permissions/group",
158
+ * "artifact:generic-local/path:*"]` `["applied-permissions/admin", "system:metrics:r", "artifact:generic-local:*"]`
159
159
  */
160
160
  readonly scopes: pulumi.Output<string[]>;
161
161
  /**
@@ -254,18 +254,18 @@ export interface ScopedTokenState {
254
254
  * supported scopes include: * `applied-permissions/user` - provides user access. If left at the default setting, the token
255
255
  * will be created with the user-identity scope, which allows users to identify themselves in the Platform but does not
256
256
  * grant any specific access permissions.* `applied-permissions/admin` - the scope assigned to admin users.*
257
- * `applied-permissions/groups` - the group to which permissions are assigned by group name (use username to inicate the
257
+ * `applied-permissions/groups` - the group to which permissions are assigned by group name (use username to indicate the
258
258
  * group name)* `system:metrics:r` - for getting the service metrics* `system:livelogs:r` - for getting the service
259
- * livelogsrThe scope to assign to the token should be provided as a list of scope tokens, limited to 500 characters in
259
+ * livelogsr. The scope to assign to the token should be provided as a list of scope tokens, limited to 500 characters in
260
260
  * total. Resource Permissions From Artifactory 7.38.x, resource permissions scoped tokens are also supported in the REST
261
261
  * API. A permission can be represented as a scope token string in the following format:
262
262
  * `<resource-type>:<target>[/<sub-resource>]:<actions>` Where: `<resource-type>` - one of the permission resource types,
263
263
  * from a predefined closed list. Currently, the only resource type that is supported is the artifact resource type.
264
264
  * `<target>` - the target resource, can be exact name or a pattern `<sub-resource>` - optional, the target sub-resource,
265
- * can be exact name or a pattern `<actions>` - comma-separated list of action acronyms.The actions allowed are <r, w, d,
266
- * a, m, x, s> or any combination of these actions. To allow all actions - use `*` Examples: `["applied-permissions/user",
267
- * "artifact:generic-local:r"]` `["applied-permissions/group", "artifact:generic-local/path:*"]`
268
- * `["applied-permissions/admin", "system:metrics:r", "artifact:generic-local:*"]`
265
+ * can be exact name or a pattern `<actions>` - comma-separated list of action acronyms.The actions allowed are `r`, `w`,
266
+ * `d`, `a`, `m`, `x`, `s`, or any combination of these actions. To allow all actions - use `*` Examples:
267
+ * `["applied-permissions/user", "artifact:generic-local:r"]` `["applied-permissions/group",
268
+ * "artifact:generic-local/path:*"]` `["applied-permissions/admin", "system:metrics:r", "artifact:generic-local:*"]`
269
269
  */
270
270
  scopes?: pulumi.Input<pulumi.Input<string>[]>;
271
271
  /**
@@ -332,18 +332,18 @@ export interface ScopedTokenArgs {
332
332
  * supported scopes include: * `applied-permissions/user` - provides user access. If left at the default setting, the token
333
333
  * will be created with the user-identity scope, which allows users to identify themselves in the Platform but does not
334
334
  * grant any specific access permissions.* `applied-permissions/admin` - the scope assigned to admin users.*
335
- * `applied-permissions/groups` - the group to which permissions are assigned by group name (use username to inicate the
335
+ * `applied-permissions/groups` - the group to which permissions are assigned by group name (use username to indicate the
336
336
  * group name)* `system:metrics:r` - for getting the service metrics* `system:livelogs:r` - for getting the service
337
- * livelogsrThe scope to assign to the token should be provided as a list of scope tokens, limited to 500 characters in
337
+ * livelogsr. The scope to assign to the token should be provided as a list of scope tokens, limited to 500 characters in
338
338
  * total. Resource Permissions From Artifactory 7.38.x, resource permissions scoped tokens are also supported in the REST
339
339
  * API. A permission can be represented as a scope token string in the following format:
340
340
  * `<resource-type>:<target>[/<sub-resource>]:<actions>` Where: `<resource-type>` - one of the permission resource types,
341
341
  * from a predefined closed list. Currently, the only resource type that is supported is the artifact resource type.
342
342
  * `<target>` - the target resource, can be exact name or a pattern `<sub-resource>` - optional, the target sub-resource,
343
- * can be exact name or a pattern `<actions>` - comma-separated list of action acronyms.The actions allowed are <r, w, d,
344
- * a, m, x, s> or any combination of these actions. To allow all actions - use `*` Examples: `["applied-permissions/user",
345
- * "artifact:generic-local:r"]` `["applied-permissions/group", "artifact:generic-local/path:*"]`
346
- * `["applied-permissions/admin", "system:metrics:r", "artifact:generic-local:*"]`
343
+ * can be exact name or a pattern `<actions>` - comma-separated list of action acronyms.The actions allowed are `r`, `w`,
344
+ * `d`, `a`, `m`, `x`, `s`, or any combination of these actions. To allow all actions - use `*` Examples:
345
+ * `["applied-permissions/user", "artifact:generic-local:r"]` `["applied-permissions/group",
346
+ * "artifact:generic-local/path:*"]` `["applied-permissions/admin", "system:metrics:r", "artifact:generic-local:*"]`
347
347
  */
348
348
  scopes?: pulumi.Input<pulumi.Input<string>[]>;
349
349
  /**