@pulumi/artifactory 6.1.4 → 6.1.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (2) hide show
  1. package/package.json +1 -1
  2. package/scopedToken.d.ts +30 -30
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@pulumi/artifactory",
3
- "version": "v6.1.4",
3
+ "version": "v6.1.5",
4
4
  "description": "A Pulumi package for creating and managing artifactory cloud resources.",
5
5
  "keywords": [
6
6
  "pulumi",
package/scopedToken.d.ts CHANGED
@@ -144,16 +144,16 @@ export declare class ScopedToken extends pulumi.CustomResource {
144
144
  * supported scopes include: * `applied-permissions/user` - provides user access. If left at the default setting, the token
145
145
  * will be created with the user-identity scope, which allows users to identify themselves in the Platform but does not
146
146
  * grant any specific access permissions.* `applied-permissions/admin` - the scope assigned to admin users.*
147
- * `applied-permissions/groups` - the group to which permissions are assigned by group name (use username to indicate the
148
- * group name)* `system:metrics:r` - for getting the service metrics* `system:livelogs:r` - for getting the service
149
- * livelogsr. The scope to assign to the token should be provided as a list of scope tokens, limited to 500 characters in
150
- * total. Resource Permissions From Artifactory 7.38.x, resource permissions scoped tokens are also supported in the REST
151
- * API. A permission can be represented as a scope token string in the following format:
152
- * `<resource-type>:<target>[/<sub-resource>]:<actions>` Where: `<resource-type>` - one of the permission resource types,
153
- * from a predefined closed list. Currently, the only resource type that is supported is the artifact resource type.
154
- * `<target>` - the target resource, can be exact name or a pattern `<sub-resource>` - optional, the target sub-resource,
155
- * can be exact name or a pattern `<actions>` - comma-separated list of action acronyms.The actions allowed are `r`, `w`,
156
- * `d`, `a`, `m`, `x`, `s`, or any combination of these actions. To allow all actions - use `*` Examples:
147
+ * `applied-permissions/groups` - this scope assigns permissions to groups using the following format:
148
+ * applied-permissions/groups:<group-name>[,<group-name>...]* `system:metrics:r` - for getting the service metrics*
149
+ * `system:livelogs:r` - for getting the service livelogsr. The scope to assign to the token should be provided as a list
150
+ * of scope tokens, limited to 500 characters in total. Resource Permissions From Artifactory 7.38.x, resource permissions
151
+ * scoped tokens are also supported in the REST API. A permission can be represented as a scope token string in the
152
+ * following format: `<resource-type>:<target>[/<sub-resource>]:<actions>` Where: `<resource-type>` - one of the permission
153
+ * resource types, from a predefined closed list. Currently, the only resource type that is supported is the artifact
154
+ * resource type. `<target>` - the target resource, can be exact name or a pattern `<sub-resource>` - optional, the target
155
+ * sub-resource, can be exact name or a pattern `<actions>` - comma-separated list of action acronyms.The actions allowed
156
+ * are `r`, `w`, `d`, `a`, `m`, `x`, `s`, or any combination of these actions. To allow all actions - use `*` Examples:
157
157
  * `["applied-permissions/user", "artifact:generic-local:r"]` `["applied-permissions/group",
158
158
  * "artifact:generic-local/path:*"]` `["applied-permissions/admin", "system:metrics:r", "artifact:generic-local:*"]`
159
159
  */
@@ -254,16 +254,16 @@ export interface ScopedTokenState {
254
254
  * supported scopes include: * `applied-permissions/user` - provides user access. If left at the default setting, the token
255
255
  * will be created with the user-identity scope, which allows users to identify themselves in the Platform but does not
256
256
  * grant any specific access permissions.* `applied-permissions/admin` - the scope assigned to admin users.*
257
- * `applied-permissions/groups` - the group to which permissions are assigned by group name (use username to indicate the
258
- * group name)* `system:metrics:r` - for getting the service metrics* `system:livelogs:r` - for getting the service
259
- * livelogsr. The scope to assign to the token should be provided as a list of scope tokens, limited to 500 characters in
260
- * total. Resource Permissions From Artifactory 7.38.x, resource permissions scoped tokens are also supported in the REST
261
- * API. A permission can be represented as a scope token string in the following format:
262
- * `<resource-type>:<target>[/<sub-resource>]:<actions>` Where: `<resource-type>` - one of the permission resource types,
263
- * from a predefined closed list. Currently, the only resource type that is supported is the artifact resource type.
264
- * `<target>` - the target resource, can be exact name or a pattern `<sub-resource>` - optional, the target sub-resource,
265
- * can be exact name or a pattern `<actions>` - comma-separated list of action acronyms.The actions allowed are `r`, `w`,
266
- * `d`, `a`, `m`, `x`, `s`, or any combination of these actions. To allow all actions - use `*` Examples:
257
+ * `applied-permissions/groups` - this scope assigns permissions to groups using the following format:
258
+ * applied-permissions/groups:<group-name>[,<group-name>...]* `system:metrics:r` - for getting the service metrics*
259
+ * `system:livelogs:r` - for getting the service livelogsr. The scope to assign to the token should be provided as a list
260
+ * of scope tokens, limited to 500 characters in total. Resource Permissions From Artifactory 7.38.x, resource permissions
261
+ * scoped tokens are also supported in the REST API. A permission can be represented as a scope token string in the
262
+ * following format: `<resource-type>:<target>[/<sub-resource>]:<actions>` Where: `<resource-type>` - one of the permission
263
+ * resource types, from a predefined closed list. Currently, the only resource type that is supported is the artifact
264
+ * resource type. `<target>` - the target resource, can be exact name or a pattern `<sub-resource>` - optional, the target
265
+ * sub-resource, can be exact name or a pattern `<actions>` - comma-separated list of action acronyms.The actions allowed
266
+ * are `r`, `w`, `d`, `a`, `m`, `x`, `s`, or any combination of these actions. To allow all actions - use `*` Examples:
267
267
  * `["applied-permissions/user", "artifact:generic-local:r"]` `["applied-permissions/group",
268
268
  * "artifact:generic-local/path:*"]` `["applied-permissions/admin", "system:metrics:r", "artifact:generic-local:*"]`
269
269
  */
@@ -332,16 +332,16 @@ export interface ScopedTokenArgs {
332
332
  * supported scopes include: * `applied-permissions/user` - provides user access. If left at the default setting, the token
333
333
  * will be created with the user-identity scope, which allows users to identify themselves in the Platform but does not
334
334
  * grant any specific access permissions.* `applied-permissions/admin` - the scope assigned to admin users.*
335
- * `applied-permissions/groups` - the group to which permissions are assigned by group name (use username to indicate the
336
- * group name)* `system:metrics:r` - for getting the service metrics* `system:livelogs:r` - for getting the service
337
- * livelogsr. The scope to assign to the token should be provided as a list of scope tokens, limited to 500 characters in
338
- * total. Resource Permissions From Artifactory 7.38.x, resource permissions scoped tokens are also supported in the REST
339
- * API. A permission can be represented as a scope token string in the following format:
340
- * `<resource-type>:<target>[/<sub-resource>]:<actions>` Where: `<resource-type>` - one of the permission resource types,
341
- * from a predefined closed list. Currently, the only resource type that is supported is the artifact resource type.
342
- * `<target>` - the target resource, can be exact name or a pattern `<sub-resource>` - optional, the target sub-resource,
343
- * can be exact name or a pattern `<actions>` - comma-separated list of action acronyms.The actions allowed are `r`, `w`,
344
- * `d`, `a`, `m`, `x`, `s`, or any combination of these actions. To allow all actions - use `*` Examples:
335
+ * `applied-permissions/groups` - this scope assigns permissions to groups using the following format:
336
+ * applied-permissions/groups:<group-name>[,<group-name>...]* `system:metrics:r` - for getting the service metrics*
337
+ * `system:livelogs:r` - for getting the service livelogsr. The scope to assign to the token should be provided as a list
338
+ * of scope tokens, limited to 500 characters in total. Resource Permissions From Artifactory 7.38.x, resource permissions
339
+ * scoped tokens are also supported in the REST API. A permission can be represented as a scope token string in the
340
+ * following format: `<resource-type>:<target>[/<sub-resource>]:<actions>` Where: `<resource-type>` - one of the permission
341
+ * resource types, from a predefined closed list. Currently, the only resource type that is supported is the artifact
342
+ * resource type. `<target>` - the target resource, can be exact name or a pattern `<sub-resource>` - optional, the target
343
+ * sub-resource, can be exact name or a pattern `<actions>` - comma-separated list of action acronyms.The actions allowed
344
+ * are `r`, `w`, `d`, `a`, `m`, `x`, `s`, or any combination of these actions. To allow all actions - use `*` Examples:
345
345
  * `["applied-permissions/user", "artifact:generic-local:r"]` `["applied-permissions/group",
346
346
  * "artifact:generic-local/path:*"]` `["applied-permissions/admin", "system:metrics:r", "artifact:generic-local:*"]`
347
347
  */