@pulumi/artifactory 6.1.4 → 6.1.5
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/package.json +1 -1
- package/scopedToken.d.ts +30 -30
package/package.json
CHANGED
package/scopedToken.d.ts
CHANGED
|
@@ -144,16 +144,16 @@ export declare class ScopedToken extends pulumi.CustomResource {
|
|
|
144
144
|
* supported scopes include: * `applied-permissions/user` - provides user access. If left at the default setting, the token
|
|
145
145
|
* will be created with the user-identity scope, which allows users to identify themselves in the Platform but does not
|
|
146
146
|
* grant any specific access permissions.* `applied-permissions/admin` - the scope assigned to admin users.*
|
|
147
|
-
* `applied-permissions/groups` -
|
|
148
|
-
* group
|
|
149
|
-
* livelogsr. The scope to assign to the token should be provided as a list
|
|
150
|
-
* total. Resource Permissions From Artifactory 7.38.x, resource permissions
|
|
151
|
-
* API. A permission can be represented as a scope token string in the
|
|
152
|
-
* `<resource-type>:<target>[/<sub-resource>]:<actions>` Where: `<resource-type>` - one of the permission
|
|
153
|
-
* from a predefined closed list. Currently, the only resource type that is supported is the artifact
|
|
154
|
-
* `<target>` - the target resource, can be exact name or a pattern `<sub-resource>` - optional, the target
|
|
155
|
-
* can be exact name or a pattern `<actions>` - comma-separated list of action acronyms.The actions allowed
|
|
156
|
-
* `d`, `a`, `m`, `x`, `s`, or any combination of these actions. To allow all actions - use `*` Examples:
|
|
147
|
+
* `applied-permissions/groups` - this scope assigns permissions to groups using the following format:
|
|
148
|
+
* applied-permissions/groups:<group-name>[,<group-name>...]* `system:metrics:r` - for getting the service metrics*
|
|
149
|
+
* `system:livelogs:r` - for getting the service livelogsr. The scope to assign to the token should be provided as a list
|
|
150
|
+
* of scope tokens, limited to 500 characters in total. Resource Permissions From Artifactory 7.38.x, resource permissions
|
|
151
|
+
* scoped tokens are also supported in the REST API. A permission can be represented as a scope token string in the
|
|
152
|
+
* following format: `<resource-type>:<target>[/<sub-resource>]:<actions>` Where: `<resource-type>` - one of the permission
|
|
153
|
+
* resource types, from a predefined closed list. Currently, the only resource type that is supported is the artifact
|
|
154
|
+
* resource type. `<target>` - the target resource, can be exact name or a pattern `<sub-resource>` - optional, the target
|
|
155
|
+
* sub-resource, can be exact name or a pattern `<actions>` - comma-separated list of action acronyms.The actions allowed
|
|
156
|
+
* are `r`, `w`, `d`, `a`, `m`, `x`, `s`, or any combination of these actions. To allow all actions - use `*` Examples:
|
|
157
157
|
* `["applied-permissions/user", "artifact:generic-local:r"]` `["applied-permissions/group",
|
|
158
158
|
* "artifact:generic-local/path:*"]` `["applied-permissions/admin", "system:metrics:r", "artifact:generic-local:*"]`
|
|
159
159
|
*/
|
|
@@ -254,16 +254,16 @@ export interface ScopedTokenState {
|
|
|
254
254
|
* supported scopes include: * `applied-permissions/user` - provides user access. If left at the default setting, the token
|
|
255
255
|
* will be created with the user-identity scope, which allows users to identify themselves in the Platform but does not
|
|
256
256
|
* grant any specific access permissions.* `applied-permissions/admin` - the scope assigned to admin users.*
|
|
257
|
-
* `applied-permissions/groups` -
|
|
258
|
-
* group
|
|
259
|
-
* livelogsr. The scope to assign to the token should be provided as a list
|
|
260
|
-
* total. Resource Permissions From Artifactory 7.38.x, resource permissions
|
|
261
|
-
* API. A permission can be represented as a scope token string in the
|
|
262
|
-
* `<resource-type>:<target>[/<sub-resource>]:<actions>` Where: `<resource-type>` - one of the permission
|
|
263
|
-
* from a predefined closed list. Currently, the only resource type that is supported is the artifact
|
|
264
|
-
* `<target>` - the target resource, can be exact name or a pattern `<sub-resource>` - optional, the target
|
|
265
|
-
* can be exact name or a pattern `<actions>` - comma-separated list of action acronyms.The actions allowed
|
|
266
|
-
* `d`, `a`, `m`, `x`, `s`, or any combination of these actions. To allow all actions - use `*` Examples:
|
|
257
|
+
* `applied-permissions/groups` - this scope assigns permissions to groups using the following format:
|
|
258
|
+
* applied-permissions/groups:<group-name>[,<group-name>...]* `system:metrics:r` - for getting the service metrics*
|
|
259
|
+
* `system:livelogs:r` - for getting the service livelogsr. The scope to assign to the token should be provided as a list
|
|
260
|
+
* of scope tokens, limited to 500 characters in total. Resource Permissions From Artifactory 7.38.x, resource permissions
|
|
261
|
+
* scoped tokens are also supported in the REST API. A permission can be represented as a scope token string in the
|
|
262
|
+
* following format: `<resource-type>:<target>[/<sub-resource>]:<actions>` Where: `<resource-type>` - one of the permission
|
|
263
|
+
* resource types, from a predefined closed list. Currently, the only resource type that is supported is the artifact
|
|
264
|
+
* resource type. `<target>` - the target resource, can be exact name or a pattern `<sub-resource>` - optional, the target
|
|
265
|
+
* sub-resource, can be exact name or a pattern `<actions>` - comma-separated list of action acronyms.The actions allowed
|
|
266
|
+
* are `r`, `w`, `d`, `a`, `m`, `x`, `s`, or any combination of these actions. To allow all actions - use `*` Examples:
|
|
267
267
|
* `["applied-permissions/user", "artifact:generic-local:r"]` `["applied-permissions/group",
|
|
268
268
|
* "artifact:generic-local/path:*"]` `["applied-permissions/admin", "system:metrics:r", "artifact:generic-local:*"]`
|
|
269
269
|
*/
|
|
@@ -332,16 +332,16 @@ export interface ScopedTokenArgs {
|
|
|
332
332
|
* supported scopes include: * `applied-permissions/user` - provides user access. If left at the default setting, the token
|
|
333
333
|
* will be created with the user-identity scope, which allows users to identify themselves in the Platform but does not
|
|
334
334
|
* grant any specific access permissions.* `applied-permissions/admin` - the scope assigned to admin users.*
|
|
335
|
-
* `applied-permissions/groups` -
|
|
336
|
-
* group
|
|
337
|
-
* livelogsr. The scope to assign to the token should be provided as a list
|
|
338
|
-
* total. Resource Permissions From Artifactory 7.38.x, resource permissions
|
|
339
|
-
* API. A permission can be represented as a scope token string in the
|
|
340
|
-
* `<resource-type>:<target>[/<sub-resource>]:<actions>` Where: `<resource-type>` - one of the permission
|
|
341
|
-
* from a predefined closed list. Currently, the only resource type that is supported is the artifact
|
|
342
|
-
* `<target>` - the target resource, can be exact name or a pattern `<sub-resource>` - optional, the target
|
|
343
|
-
* can be exact name or a pattern `<actions>` - comma-separated list of action acronyms.The actions allowed
|
|
344
|
-
* `d`, `a`, `m`, `x`, `s`, or any combination of these actions. To allow all actions - use `*` Examples:
|
|
335
|
+
* `applied-permissions/groups` - this scope assigns permissions to groups using the following format:
|
|
336
|
+
* applied-permissions/groups:<group-name>[,<group-name>...]* `system:metrics:r` - for getting the service metrics*
|
|
337
|
+
* `system:livelogs:r` - for getting the service livelogsr. The scope to assign to the token should be provided as a list
|
|
338
|
+
* of scope tokens, limited to 500 characters in total. Resource Permissions From Artifactory 7.38.x, resource permissions
|
|
339
|
+
* scoped tokens are also supported in the REST API. A permission can be represented as a scope token string in the
|
|
340
|
+
* following format: `<resource-type>:<target>[/<sub-resource>]:<actions>` Where: `<resource-type>` - one of the permission
|
|
341
|
+
* resource types, from a predefined closed list. Currently, the only resource type that is supported is the artifact
|
|
342
|
+
* resource type. `<target>` - the target resource, can be exact name or a pattern `<sub-resource>` - optional, the target
|
|
343
|
+
* sub-resource, can be exact name or a pattern `<actions>` - comma-separated list of action acronyms.The actions allowed
|
|
344
|
+
* are `r`, `w`, `d`, `a`, `m`, `x`, `s`, or any combination of these actions. To allow all actions - use `*` Examples:
|
|
345
345
|
* `["applied-permissions/user", "artifact:generic-local:r"]` `["applied-permissions/group",
|
|
346
346
|
* "artifact:generic-local/path:*"]` `["applied-permissions/admin", "system:metrics:r", "artifact:generic-local:*"]`
|
|
347
347
|
*/
|