@pulumi/github 6.13.0-alpha.1777011674 → 6.13.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (75) hide show
  1. package/actionsEnvironmentSecret.d.ts +52 -16
  2. package/actionsEnvironmentSecret.js +10 -6
  3. package/actionsEnvironmentSecret.js.map +1 -1
  4. package/actionsOrganizationPermissions.d.ts +3 -3
  5. package/actionsOrganizationSecret.d.ts +56 -20
  6. package/actionsOrganizationSecret.js +13 -9
  7. package/actionsOrganizationSecret.js.map +1 -1
  8. package/actionsOrganizationSecretRepositories.d.ts +1 -1
  9. package/actionsOrganizationSecretRepositories.js +1 -1
  10. package/actionsOrganizationSecretRepository.d.ts +1 -1
  11. package/actionsOrganizationSecretRepository.js +1 -1
  12. package/actionsOrganizationVariableRepositories.d.ts +1 -1
  13. package/actionsOrganizationVariableRepositories.js +1 -1
  14. package/actionsOrganizationVariableRepository.d.ts +1 -1
  15. package/actionsOrganizationVariableRepository.js +1 -1
  16. package/actionsRepositoryPermissions.d.ts +3 -3
  17. package/actionsSecret.d.ts +51 -15
  18. package/actionsSecret.js +11 -7
  19. package/actionsSecret.js.map +1 -1
  20. package/dependabotOrganizationSecret.d.ts +57 -15
  21. package/dependabotOrganizationSecret.js +11 -7
  22. package/dependabotOrganizationSecret.js.map +1 -1
  23. package/dependabotOrganizationSecretRepositories.d.ts +1 -1
  24. package/dependabotOrganizationSecretRepositories.js +1 -1
  25. package/dependabotOrganizationSecretRepository.d.ts +1 -1
  26. package/dependabotOrganizationSecretRepository.js +1 -1
  27. package/dependabotSecret.d.ts +54 -18
  28. package/dependabotSecret.js +11 -7
  29. package/dependabotSecret.js.map +1 -1
  30. package/emuGroupMapping.d.ts +12 -6
  31. package/emuGroupMapping.js +2 -2
  32. package/emuGroupMapping.js.map +1 -1
  33. package/enterpriseIpAllowListEntry.d.ts +125 -0
  34. package/enterpriseIpAllowListEntry.js +90 -0
  35. package/enterpriseIpAllowListEntry.js.map +1 -0
  36. package/getIpRanges.d.ts +28 -4
  37. package/getIpRanges.js.map +1 -1
  38. package/getOrganizationAppInstallations.d.ts +45 -0
  39. package/getOrganizationAppInstallations.js +46 -0
  40. package/getOrganizationAppInstallations.js.map +1 -0
  41. package/getRepository.d.ts +3 -1
  42. package/getRepository.js.map +1 -1
  43. package/getRepositoryPages.d.ts +96 -0
  44. package/getRepositoryPages.js +50 -0
  45. package/getRepositoryPages.js.map +1 -0
  46. package/index.d.ts +15 -0
  47. package/index.js +26 -5
  48. package/index.js.map +1 -1
  49. package/organizationRuleset.d.ts +38 -0
  50. package/organizationRuleset.js +38 -0
  51. package/organizationRuleset.js.map +1 -1
  52. package/package.json +2 -2
  53. package/repository.d.ts +28 -35
  54. package/repository.js +0 -19
  55. package/repository.js.map +1 -1
  56. package/repositoryCollaborators.d.ts +8 -8
  57. package/repositoryCollaborators.js +2 -8
  58. package/repositoryCollaborators.js.map +1 -1
  59. package/repositoryEnvironment.d.ts +13 -1
  60. package/repositoryEnvironment.js +7 -1
  61. package/repositoryEnvironment.js.map +1 -1
  62. package/repositoryEnvironmentDeploymentPolicy.d.ts +21 -1
  63. package/repositoryEnvironmentDeploymentPolicy.js +9 -1
  64. package/repositoryEnvironmentDeploymentPolicy.js.map +1 -1
  65. package/repositoryPages.d.ts +228 -0
  66. package/repositoryPages.js +150 -0
  67. package/repositoryPages.js.map +1 -0
  68. package/repositoryVulnerabilityAlerts.d.ts +98 -0
  69. package/repositoryVulnerabilityAlerts.js +86 -0
  70. package/repositoryVulnerabilityAlerts.js.map +1 -0
  71. package/teamSettings.d.ts +35 -12
  72. package/teamSettings.js +21 -8
  73. package/teamSettings.js.map +1 -1
  74. package/types/input.d.ts +52 -8
  75. package/types/output.d.ts +118 -8
@@ -6,9 +6,9 @@ import * as pulumi from "@pulumi/pulumi";
6
6
  * Secret values are encrypted using the [Go '/crypto/box' module](https://godoc.org/golang.org/x/crypto/nacl/box) which is
7
7
  * interoperable with [libsodium](https://libsodium.gitbook.io/doc/). Libsodium is used by GitHub to decrypt secret values.
8
8
  *
9
- * For the purposes of security, the contents of the `plaintextValue` field have been marked as `sensitive` to Terraform,
9
+ * For the purposes of security, the contents of the `value` field have been marked as `sensitive` to Terraform,
10
10
  * but it is important to note that **this does not hide it from state files**. You should treat state as sensitive always.
11
- * It is also advised that you do not store plaintext values in your code but rather populate the `encryptedValue`
11
+ * It is also advised that you do not store plaintext values in your code but rather populate the `valueEncrypted`
12
12
  * using fields from a resource, data source or variable as, while encrypted in state, these will be easily accessible
13
13
  * in your code. See below for an example of this abstraction.
14
14
  *
@@ -24,7 +24,7 @@ import * as pulumi from "@pulumi/pulumi";
24
24
  * repository: "example-repo",
25
25
  * environment: "example-environment",
26
26
  * secretName: "example_secret_name",
27
- * plaintextValue: "placeholder",
27
+ * value: "placeholder",
28
28
  * });
29
29
  * ```
30
30
  *
@@ -32,7 +32,7 @@ import * as pulumi from "@pulumi/pulumi";
32
32
  *
33
33
  * This resource can be imported using an ID made of the repository name, environment name (URL escaped), and secret name all separated by a `:`.
34
34
  *
35
- * > **Note**: When importing secrets, the `plaintextValue` or `encryptedValue` fields will not be populated in the state. You may need to ignore changes for these as a workaround if you're not planning on updating the secret through Terraform.
35
+ * > **Note**: When importing secrets, the `value`, `valueEncrypted`, `encryptedValue`, or `plaintextValue` fields will not be populated in the state. You may need to ignore changes for these as a workaround if you're not planning on updating the secret through Terraform.
36
36
  *
37
37
  * ### Import Command
38
38
  *
@@ -63,7 +63,9 @@ export declare class ActionsEnvironmentSecret extends pulumi.CustomResource {
63
63
  */
64
64
  readonly createdAt: pulumi.Output<string>;
65
65
  /**
66
- * Encrypted value of the secret using the GitHub public key in Base64 format.
66
+ * (Optional) Please use `valueEncrypted`.
67
+ *
68
+ * @deprecated Use valueEncrypted and key_id.
67
69
  */
68
70
  readonly encryptedValue: pulumi.Output<string | undefined>;
69
71
  /**
@@ -71,13 +73,15 @@ export declare class ActionsEnvironmentSecret extends pulumi.CustomResource {
71
73
  */
72
74
  readonly environment: pulumi.Output<string>;
73
75
  /**
74
- * ID of the public key used to encrypt the secret. This should be provided when setting `encryptedValue`; if it isn't then the current public key will be looked up, which could cause a missmatch. This conflicts with `plaintextValue`.
76
+ * ID of the public key used to encrypt the secret, required when setting `encryptedValue`.
75
77
  */
76
78
  readonly keyId: pulumi.Output<string>;
77
79
  /**
78
- * Plaintext value of the secret to be encrypted.
80
+ * (Optional) Please use `value`.
81
+ *
82
+ * > **Note**: One of either `value`, `valueEncrypted`, `encryptedValue`, or `plaintextValue` must be specified.
79
83
  *
80
- * > **Note**: One of either `encryptedValue` or `plaintextValue` must be specified.
84
+ * @deprecated Use value.
81
85
  */
82
86
  readonly plaintextValue: pulumi.Output<string | undefined>;
83
87
  /**
@@ -100,6 +104,14 @@ export declare class ActionsEnvironmentSecret extends pulumi.CustomResource {
100
104
  * Date the secret was last updated by the provider.
101
105
  */
102
106
  readonly updatedAt: pulumi.Output<string>;
107
+ /**
108
+ * Plaintext value of the secret to be encrypted. This conflicts with `valueEncrypted`, `encryptedValue` & `plaintextValue`.
109
+ */
110
+ readonly value: pulumi.Output<string | undefined>;
111
+ /**
112
+ * Encrypted value of the secret using the GitHub public key in Base64 format, `keyId` is required with this value. This conflicts with `value`, `encryptedValue` & `plaintextValue`.
113
+ */
114
+ readonly valueEncrypted: pulumi.Output<string | undefined>;
103
115
  /**
104
116
  * Create a ActionsEnvironmentSecret resource with the given unique name, arguments, and options.
105
117
  *
@@ -118,7 +130,9 @@ export interface ActionsEnvironmentSecretState {
118
130
  */
119
131
  createdAt?: pulumi.Input<string>;
120
132
  /**
121
- * Encrypted value of the secret using the GitHub public key in Base64 format.
133
+ * (Optional) Please use `valueEncrypted`.
134
+ *
135
+ * @deprecated Use valueEncrypted and key_id.
122
136
  */
123
137
  encryptedValue?: pulumi.Input<string>;
124
138
  /**
@@ -126,13 +140,15 @@ export interface ActionsEnvironmentSecretState {
126
140
  */
127
141
  environment?: pulumi.Input<string>;
128
142
  /**
129
- * ID of the public key used to encrypt the secret. This should be provided when setting `encryptedValue`; if it isn't then the current public key will be looked up, which could cause a missmatch. This conflicts with `plaintextValue`.
143
+ * ID of the public key used to encrypt the secret, required when setting `encryptedValue`.
130
144
  */
131
145
  keyId?: pulumi.Input<string>;
132
146
  /**
133
- * Plaintext value of the secret to be encrypted.
147
+ * (Optional) Please use `value`.
134
148
  *
135
- * > **Note**: One of either `encryptedValue` or `plaintextValue` must be specified.
149
+ * > **Note**: One of either `value`, `valueEncrypted`, `encryptedValue`, or `plaintextValue` must be specified.
150
+ *
151
+ * @deprecated Use value.
136
152
  */
137
153
  plaintextValue?: pulumi.Input<string>;
138
154
  /**
@@ -155,13 +171,23 @@ export interface ActionsEnvironmentSecretState {
155
171
  * Date the secret was last updated by the provider.
156
172
  */
157
173
  updatedAt?: pulumi.Input<string>;
174
+ /**
175
+ * Plaintext value of the secret to be encrypted. This conflicts with `valueEncrypted`, `encryptedValue` & `plaintextValue`.
176
+ */
177
+ value?: pulumi.Input<string>;
178
+ /**
179
+ * Encrypted value of the secret using the GitHub public key in Base64 format, `keyId` is required with this value. This conflicts with `value`, `encryptedValue` & `plaintextValue`.
180
+ */
181
+ valueEncrypted?: pulumi.Input<string>;
158
182
  }
159
183
  /**
160
184
  * The set of arguments for constructing a ActionsEnvironmentSecret resource.
161
185
  */
162
186
  export interface ActionsEnvironmentSecretArgs {
163
187
  /**
164
- * Encrypted value of the secret using the GitHub public key in Base64 format.
188
+ * (Optional) Please use `valueEncrypted`.
189
+ *
190
+ * @deprecated Use valueEncrypted and key_id.
165
191
  */
166
192
  encryptedValue?: pulumi.Input<string>;
167
193
  /**
@@ -169,13 +195,15 @@ export interface ActionsEnvironmentSecretArgs {
169
195
  */
170
196
  environment: pulumi.Input<string>;
171
197
  /**
172
- * ID of the public key used to encrypt the secret. This should be provided when setting `encryptedValue`; if it isn't then the current public key will be looked up, which could cause a missmatch. This conflicts with `plaintextValue`.
198
+ * ID of the public key used to encrypt the secret, required when setting `encryptedValue`.
173
199
  */
174
200
  keyId?: pulumi.Input<string>;
175
201
  /**
176
- * Plaintext value of the secret to be encrypted.
202
+ * (Optional) Please use `value`.
203
+ *
204
+ * > **Note**: One of either `value`, `valueEncrypted`, `encryptedValue`, or `plaintextValue` must be specified.
177
205
  *
178
- * > **Note**: One of either `encryptedValue` or `plaintextValue` must be specified.
206
+ * @deprecated Use value.
179
207
  */
180
208
  plaintextValue?: pulumi.Input<string>;
181
209
  /**
@@ -186,4 +214,12 @@ export interface ActionsEnvironmentSecretArgs {
186
214
  * Name of the secret.
187
215
  */
188
216
  secretName: pulumi.Input<string>;
217
+ /**
218
+ * Plaintext value of the secret to be encrypted. This conflicts with `valueEncrypted`, `encryptedValue` & `plaintextValue`.
219
+ */
220
+ value?: pulumi.Input<string>;
221
+ /**
222
+ * Encrypted value of the secret using the GitHub public key in Base64 format, `keyId` is required with this value. This conflicts with `value`, `encryptedValue` & `plaintextValue`.
223
+ */
224
+ valueEncrypted?: pulumi.Input<string>;
189
225
  }
@@ -12,9 +12,9 @@ const utilities = require("./utilities");
12
12
  * Secret values are encrypted using the [Go '/crypto/box' module](https://godoc.org/golang.org/x/crypto/nacl/box) which is
13
13
  * interoperable with [libsodium](https://libsodium.gitbook.io/doc/). Libsodium is used by GitHub to decrypt secret values.
14
14
  *
15
- * For the purposes of security, the contents of the `plaintextValue` field have been marked as `sensitive` to Terraform,
15
+ * For the purposes of security, the contents of the `value` field have been marked as `sensitive` to Terraform,
16
16
  * but it is important to note that **this does not hide it from state files**. You should treat state as sensitive always.
17
- * It is also advised that you do not store plaintext values in your code but rather populate the `encryptedValue`
17
+ * It is also advised that you do not store plaintext values in your code but rather populate the `valueEncrypted`
18
18
  * using fields from a resource, data source or variable as, while encrypted in state, these will be easily accessible
19
19
  * in your code. See below for an example of this abstraction.
20
20
  *
@@ -30,7 +30,7 @@ const utilities = require("./utilities");
30
30
  * repository: "example-repo",
31
31
  * environment: "example-environment",
32
32
  * secretName: "example_secret_name",
33
- * plaintextValue: "placeholder",
33
+ * value: "placeholder",
34
34
  * });
35
35
  * ```
36
36
  *
@@ -38,7 +38,7 @@ const utilities = require("./utilities");
38
38
  *
39
39
  * This resource can be imported using an ID made of the repository name, environment name (URL escaped), and secret name all separated by a `:`.
40
40
  *
41
- * > **Note**: When importing secrets, the `plaintextValue` or `encryptedValue` fields will not be populated in the state. You may need to ignore changes for these as a workaround if you're not planning on updating the secret through Terraform.
41
+ * > **Note**: When importing secrets, the `value`, `valueEncrypted`, `encryptedValue`, or `plaintextValue` fields will not be populated in the state. You may need to ignore changes for these as a workaround if you're not planning on updating the secret through Terraform.
42
42
  *
43
43
  * ### Import Command
44
44
  *
@@ -86,6 +86,8 @@ class ActionsEnvironmentSecret extends pulumi.CustomResource {
86
86
  resourceInputs["repositoryId"] = state?.repositoryId;
87
87
  resourceInputs["secretName"] = state?.secretName;
88
88
  resourceInputs["updatedAt"] = state?.updatedAt;
89
+ resourceInputs["value"] = state?.value;
90
+ resourceInputs["valueEncrypted"] = state?.valueEncrypted;
89
91
  }
90
92
  else {
91
93
  const args = argsOrState;
@@ -98,19 +100,21 @@ class ActionsEnvironmentSecret extends pulumi.CustomResource {
98
100
  if (args?.secretName === undefined && !opts.urn) {
99
101
  throw new Error("Missing required property 'secretName'");
100
102
  }
101
- resourceInputs["encryptedValue"] = args?.encryptedValue;
103
+ resourceInputs["encryptedValue"] = args?.encryptedValue ? pulumi.secret(args.encryptedValue) : undefined;
102
104
  resourceInputs["environment"] = args?.environment;
103
105
  resourceInputs["keyId"] = args?.keyId;
104
106
  resourceInputs["plaintextValue"] = args?.plaintextValue ? pulumi.secret(args.plaintextValue) : undefined;
105
107
  resourceInputs["repository"] = args?.repository;
106
108
  resourceInputs["secretName"] = args?.secretName;
109
+ resourceInputs["value"] = args?.value ? pulumi.secret(args.value) : undefined;
110
+ resourceInputs["valueEncrypted"] = args?.valueEncrypted ? pulumi.secret(args.valueEncrypted) : undefined;
107
111
  resourceInputs["createdAt"] = undefined /*out*/;
108
112
  resourceInputs["remoteUpdatedAt"] = undefined /*out*/;
109
113
  resourceInputs["repositoryId"] = undefined /*out*/;
110
114
  resourceInputs["updatedAt"] = undefined /*out*/;
111
115
  }
112
116
  opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
113
- const secretOpts = { additionalSecretOutputs: ["plaintextValue"] };
117
+ const secretOpts = { additionalSecretOutputs: ["encryptedValue", "plaintextValue", "value", "valueEncrypted"] };
114
118
  opts = pulumi.mergeOptions(opts, secretOpts);
115
119
  super(ActionsEnvironmentSecret.__pulumiType, name, resourceInputs, opts);
116
120
  }
@@ -1 +1 @@
1
- {"version":3,"file":"actionsEnvironmentSecret.js","sourceRoot":"","sources":["../actionsEnvironmentSecret.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA0CG;AACH,MAAa,wBAAyB,SAAQ,MAAM,CAAC,cAAc;IAC/D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAqC,EAAE,IAAmC;QACnI,OAAO,IAAI,wBAAwB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC/E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,wBAAwB,CAAC,YAAY,CAAC;IACzE,CAAC;IAqDD,YAAY,IAAY,EAAE,WAA0E,EAAE,IAAmC;QACrI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAwD,CAAC;YACvE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,EAAE,eAAe,CAAC;YAC3D,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;SAClD;aAAM;YACH,MAAM,IAAI,GAAG,WAAuD,CAAC;YACrE,IAAI,IAAI,EAAE,WAAW,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC9C,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC;YACxD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC;YACtC,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACzG,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAChD,cAAc,CAAC,iBAAiB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACtD,cAAc,CAAC,cAAc,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACnD,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACnD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,gBAAgB,CAAC,EAAE,CAAC;QACnE,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,wBAAwB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC7E,CAAC;;AAxHL,4DAyHC;AA3GG,gBAAgB;AACO,qCAAY,GAAG,gEAAgE,CAAC"}
1
+ {"version":3,"file":"actionsEnvironmentSecret.js","sourceRoot":"","sources":["../actionsEnvironmentSecret.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA0CG;AACH,MAAa,wBAAyB,SAAQ,MAAM,CAAC,cAAc;IAC/D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAqC,EAAE,IAAmC;QACnI,OAAO,IAAI,wBAAwB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC/E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,wBAAwB,CAAC,YAAY,CAAC;IACzE,CAAC;IAiED,YAAY,IAAY,EAAE,WAA0E,EAAE,IAAmC;QACrI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAwD,CAAC;YACvE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,EAAE,eAAe,CAAC;YAC3D,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;SAC5D;aAAM;YACH,MAAM,IAAI,GAAG,WAAuD,CAAC;YACrE,IAAI,IAAI,EAAE,WAAW,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC9C,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACzG,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC;YACtC,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACzG,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACzG,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAChD,cAAc,CAAC,iBAAiB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACtD,cAAc,CAAC,cAAc,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACnD,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACnD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,gBAAgB,EAAE,gBAAgB,EAAE,OAAO,EAAE,gBAAgB,CAAC,EAAE,CAAC;QAChH,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,wBAAwB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC7E,CAAC;;AAxIL,4DAyIC;AA3HG,gBAAgB;AACO,qCAAY,GAAG,gEAAgE,CAAC"}
@@ -70,7 +70,7 @@ export declare class ActionsOrganizationPermissions extends pulumi.CustomResourc
70
70
  */
71
71
  readonly enabledRepositoriesConfig: pulumi.Output<outputs.ActionsOrganizationPermissionsEnabledRepositoriesConfig | undefined>;
72
72
  /**
73
- * Whether pinning to a specific SHA is required for all actions and reusable workflows in an organization.
73
+ * Whether pinning to a specific SHA is required for all actions and reusable workflows in the organization.
74
74
  */
75
75
  readonly shaPinningRequired: pulumi.Output<boolean>;
76
76
  /**
@@ -103,7 +103,7 @@ export interface ActionsOrganizationPermissionsState {
103
103
  */
104
104
  enabledRepositoriesConfig?: pulumi.Input<inputs.ActionsOrganizationPermissionsEnabledRepositoriesConfig>;
105
105
  /**
106
- * Whether pinning to a specific SHA is required for all actions and reusable workflows in an organization.
106
+ * Whether pinning to a specific SHA is required for all actions and reusable workflows in the organization.
107
107
  */
108
108
  shaPinningRequired?: pulumi.Input<boolean>;
109
109
  }
@@ -128,7 +128,7 @@ export interface ActionsOrganizationPermissionsArgs {
128
128
  */
129
129
  enabledRepositoriesConfig?: pulumi.Input<inputs.ActionsOrganizationPermissionsEnabledRepositoriesConfig>;
130
130
  /**
131
- * Whether pinning to a specific SHA is required for all actions and reusable workflows in an organization.
131
+ * Whether pinning to a specific SHA is required for all actions and reusable workflows in the organization.
132
132
  */
133
133
  shaPinningRequired?: pulumi.Input<boolean>;
134
134
  }
@@ -6,9 +6,9 @@ import * as pulumi from "@pulumi/pulumi";
6
6
  * Secret values are encrypted using the [Go '/crypto/box' module](https://godoc.org/golang.org/x/crypto/nacl/box) which is
7
7
  * interoperable with [libsodium](https://libsodium.gitbook.io/doc/). Libsodium is used by GitHub to decrypt secret values.
8
8
  *
9
- * For the purposes of security, the contents of the `plaintextValue` field have been marked as `sensitive` to Terraform,
9
+ * For the purposes of security, the contents of the `value` field have been marked as `sensitive` to Terraform,
10
10
  * but it is important to note that **this does not hide it from state files**. You should treat state as sensitive always.
11
- * It is also advised that you do not store plaintext values in your code but rather populate the `encryptedValue`
11
+ * It is also advised that you do not store plaintext values in your code but rather populate the `valueEncrypted`
12
12
  * using fields from a resource, data source or variable as, while encrypted in state, these will be easily accessible
13
13
  * in your code. See below for an example of this abstraction.
14
14
  *
@@ -21,12 +21,12 @@ import * as pulumi from "@pulumi/pulumi";
21
21
  * const examplePlaintext = new github.ActionsOrganizationSecret("example_plaintext", {
22
22
  * secretName: "example_secret_name",
23
23
  * visibility: "all",
24
- * plaintextValue: someSecretString,
24
+ * value: someSecretString,
25
25
  * });
26
26
  * const exampleEncrypted = new github.ActionsOrganizationSecret("example_encrypted", {
27
27
  * secretName: "example_secret_name",
28
28
  * visibility: "all",
29
- * encryptedValue: someEncryptedSecretString,
29
+ * valueEncrypted: someEncryptedSecretString,
30
30
  * });
31
31
  * ```
32
32
  *
@@ -40,13 +40,13 @@ import * as pulumi from "@pulumi/pulumi";
40
40
  * const exampleEncrypted = new github.ActionsOrganizationSecret("example_encrypted", {
41
41
  * secretName: "example_secret_name",
42
42
  * visibility: "selected",
43
- * plaintextValue: someSecretString,
43
+ * value: someSecretString,
44
44
  * selectedRepositoryIds: [repo.then(repo => repo.repoId)],
45
45
  * });
46
46
  * const exampleSecret = new github.ActionsOrganizationSecret("example_secret", {
47
47
  * secretName: "example_secret_name",
48
48
  * visibility: "selected",
49
- * encryptedValue: someEncryptedSecretString,
49
+ * valueEncrypted: someEncryptedSecretString,
50
50
  * selectedRepositoryIds: [repo.then(repo => repo.repoId)],
51
51
  * });
52
52
  * ```
@@ -62,7 +62,7 @@ import * as pulumi from "@pulumi/pulumi";
62
62
  * const exampleAllowDrift = new github.ActionsOrganizationSecret("example_allow_drift", {
63
63
  * secretName: "example_secret_name",
64
64
  * visibility: "all",
65
- * plaintextValue: "placeholder",
65
+ * value: "placeholder",
66
66
  * });
67
67
  * ```
68
68
  *
@@ -70,7 +70,7 @@ import * as pulumi from "@pulumi/pulumi";
70
70
  *
71
71
  * This resource can be imported using the secret name as the ID.
72
72
  *
73
- * > **Note**: When importing secrets, the `plaintextValue` or `encryptedValue` fields will not be populated in the state. You may need to ignore changes for these as a workaround if you're not planning on updating the secret through Terraform.
73
+ * > **Note**: When importing secrets, the `value`, `valueEncrypted`, `encryptedValue`, or `plaintextValue` fields will not be populated in the state. You may need to ignore changes for these as a workaround if you're not planning on updating the secret through Terraform.
74
74
  *
75
75
  * ### Import Command
76
76
  *
@@ -103,21 +103,25 @@ export declare class ActionsOrganizationSecret extends pulumi.CustomResource {
103
103
  /**
104
104
  * (Optional) This is ignored as drift detection is built into the resource.
105
105
  *
106
- * > **Note**: One of either `encryptedValue` or `plaintextValue` must be specified.
106
+ * > **Note**: One of either `value`, `valueEncrypted`, `encryptedValue`, or `plaintextValue` must be specified.
107
107
  *
108
108
  * @deprecated This is no longer required and will be removed in a future release. Drift detection is now always performed, and external changes will result in the secret being updated to match the Terraform configuration. If you want to ignore external changes, you can use the `lifecycle` block with `ignoreChanges` on the `remoteUpdatedAt` field.
109
109
  */
110
110
  readonly destroyOnDrift: pulumi.Output<boolean | undefined>;
111
111
  /**
112
- * Encrypted value of the secret using the GitHub public key in Base64 format.
112
+ * (Optional) Please use `valueEncrypted`.
113
+ *
114
+ * @deprecated Use valueEncrypted and key_id.
113
115
  */
114
116
  readonly encryptedValue: pulumi.Output<string | undefined>;
115
117
  /**
116
- * ID of the public key used to encrypt the secret. This should be provided when setting `encryptedValue`; if it isn't then the current public key will be looked up, which could cause a missmatch. This conflicts with `plaintextValue`.
118
+ * ID of the public key used to encrypt the secret, required when setting `encryptedValue`.
117
119
  */
118
120
  readonly keyId: pulumi.Output<string>;
119
121
  /**
120
- * Plaintext value of the secret to be encrypted.
122
+ * (Optional) Please use `value`.
123
+ *
124
+ * @deprecated Use value.
121
125
  */
122
126
  readonly plaintextValue: pulumi.Output<string | undefined>;
123
127
  /**
@@ -138,6 +142,14 @@ export declare class ActionsOrganizationSecret extends pulumi.CustomResource {
138
142
  * Date the secret was last updated by the provider.
139
143
  */
140
144
  readonly updatedAt: pulumi.Output<string>;
145
+ /**
146
+ * Plaintext value of the secret to be encrypted. This conflicts with `valueEncrypted`, `encryptedValue` & `plaintextValue`.
147
+ */
148
+ readonly value: pulumi.Output<string | undefined>;
149
+ /**
150
+ * Encrypted value of the secret using the GitHub public key in Base64 format, `keyId` is required with this value. This conflicts with `value`, `encryptedValue` & `plaintextValue`.
151
+ */
152
+ readonly valueEncrypted: pulumi.Output<string | undefined>;
141
153
  /**
142
154
  * Configures the access that repositories have to the organization secret; must be one of `all`, `private`, or `selected`.
143
155
  */
@@ -162,21 +174,25 @@ export interface ActionsOrganizationSecretState {
162
174
  /**
163
175
  * (Optional) This is ignored as drift detection is built into the resource.
164
176
  *
165
- * > **Note**: One of either `encryptedValue` or `plaintextValue` must be specified.
177
+ * > **Note**: One of either `value`, `valueEncrypted`, `encryptedValue`, or `plaintextValue` must be specified.
166
178
  *
167
179
  * @deprecated This is no longer required and will be removed in a future release. Drift detection is now always performed, and external changes will result in the secret being updated to match the Terraform configuration. If you want to ignore external changes, you can use the `lifecycle` block with `ignoreChanges` on the `remoteUpdatedAt` field.
168
180
  */
169
181
  destroyOnDrift?: pulumi.Input<boolean>;
170
182
  /**
171
- * Encrypted value of the secret using the GitHub public key in Base64 format.
183
+ * (Optional) Please use `valueEncrypted`.
184
+ *
185
+ * @deprecated Use valueEncrypted and key_id.
172
186
  */
173
187
  encryptedValue?: pulumi.Input<string>;
174
188
  /**
175
- * ID of the public key used to encrypt the secret. This should be provided when setting `encryptedValue`; if it isn't then the current public key will be looked up, which could cause a missmatch. This conflicts with `plaintextValue`.
189
+ * ID of the public key used to encrypt the secret, required when setting `encryptedValue`.
176
190
  */
177
191
  keyId?: pulumi.Input<string>;
178
192
  /**
179
- * Plaintext value of the secret to be encrypted.
193
+ * (Optional) Please use `value`.
194
+ *
195
+ * @deprecated Use value.
180
196
  */
181
197
  plaintextValue?: pulumi.Input<string>;
182
198
  /**
@@ -197,6 +213,14 @@ export interface ActionsOrganizationSecretState {
197
213
  * Date the secret was last updated by the provider.
198
214
  */
199
215
  updatedAt?: pulumi.Input<string>;
216
+ /**
217
+ * Plaintext value of the secret to be encrypted. This conflicts with `valueEncrypted`, `encryptedValue` & `plaintextValue`.
218
+ */
219
+ value?: pulumi.Input<string>;
220
+ /**
221
+ * Encrypted value of the secret using the GitHub public key in Base64 format, `keyId` is required with this value. This conflicts with `value`, `encryptedValue` & `plaintextValue`.
222
+ */
223
+ valueEncrypted?: pulumi.Input<string>;
200
224
  /**
201
225
  * Configures the access that repositories have to the organization secret; must be one of `all`, `private`, or `selected`.
202
226
  */
@@ -209,21 +233,25 @@ export interface ActionsOrganizationSecretArgs {
209
233
  /**
210
234
  * (Optional) This is ignored as drift detection is built into the resource.
211
235
  *
212
- * > **Note**: One of either `encryptedValue` or `plaintextValue` must be specified.
236
+ * > **Note**: One of either `value`, `valueEncrypted`, `encryptedValue`, or `plaintextValue` must be specified.
213
237
  *
214
238
  * @deprecated This is no longer required and will be removed in a future release. Drift detection is now always performed, and external changes will result in the secret being updated to match the Terraform configuration. If you want to ignore external changes, you can use the `lifecycle` block with `ignoreChanges` on the `remoteUpdatedAt` field.
215
239
  */
216
240
  destroyOnDrift?: pulumi.Input<boolean>;
217
241
  /**
218
- * Encrypted value of the secret using the GitHub public key in Base64 format.
242
+ * (Optional) Please use `valueEncrypted`.
243
+ *
244
+ * @deprecated Use valueEncrypted and key_id.
219
245
  */
220
246
  encryptedValue?: pulumi.Input<string>;
221
247
  /**
222
- * ID of the public key used to encrypt the secret. This should be provided when setting `encryptedValue`; if it isn't then the current public key will be looked up, which could cause a missmatch. This conflicts with `plaintextValue`.
248
+ * ID of the public key used to encrypt the secret, required when setting `encryptedValue`.
223
249
  */
224
250
  keyId?: pulumi.Input<string>;
225
251
  /**
226
- * Plaintext value of the secret to be encrypted.
252
+ * (Optional) Please use `value`.
253
+ *
254
+ * @deprecated Use value.
227
255
  */
228
256
  plaintextValue?: pulumi.Input<string>;
229
257
  /**
@@ -236,6 +264,14 @@ export interface ActionsOrganizationSecretArgs {
236
264
  * @deprecated This field is deprecated and will be removed in a future release. Please use the `github.ActionsOrganizationSecretRepositories` or `github.ActionsOrganizationSecretRepository` resources to manage repository access to organization secrets.
237
265
  */
238
266
  selectedRepositoryIds?: pulumi.Input<pulumi.Input<number>[]>;
267
+ /**
268
+ * Plaintext value of the secret to be encrypted. This conflicts with `valueEncrypted`, `encryptedValue` & `plaintextValue`.
269
+ */
270
+ value?: pulumi.Input<string>;
271
+ /**
272
+ * Encrypted value of the secret using the GitHub public key in Base64 format, `keyId` is required with this value. This conflicts with `value`, `encryptedValue` & `plaintextValue`.
273
+ */
274
+ valueEncrypted?: pulumi.Input<string>;
239
275
  /**
240
276
  * Configures the access that repositories have to the organization secret; must be one of `all`, `private`, or `selected`.
241
277
  */
@@ -12,9 +12,9 @@ const utilities = require("./utilities");
12
12
  * Secret values are encrypted using the [Go '/crypto/box' module](https://godoc.org/golang.org/x/crypto/nacl/box) which is
13
13
  * interoperable with [libsodium](https://libsodium.gitbook.io/doc/). Libsodium is used by GitHub to decrypt secret values.
14
14
  *
15
- * For the purposes of security, the contents of the `plaintextValue` field have been marked as `sensitive` to Terraform,
15
+ * For the purposes of security, the contents of the `value` field have been marked as `sensitive` to Terraform,
16
16
  * but it is important to note that **this does not hide it from state files**. You should treat state as sensitive always.
17
- * It is also advised that you do not store plaintext values in your code but rather populate the `encryptedValue`
17
+ * It is also advised that you do not store plaintext values in your code but rather populate the `valueEncrypted`
18
18
  * using fields from a resource, data source or variable as, while encrypted in state, these will be easily accessible
19
19
  * in your code. See below for an example of this abstraction.
20
20
  *
@@ -27,12 +27,12 @@ const utilities = require("./utilities");
27
27
  * const examplePlaintext = new github.ActionsOrganizationSecret("example_plaintext", {
28
28
  * secretName: "example_secret_name",
29
29
  * visibility: "all",
30
- * plaintextValue: someSecretString,
30
+ * value: someSecretString,
31
31
  * });
32
32
  * const exampleEncrypted = new github.ActionsOrganizationSecret("example_encrypted", {
33
33
  * secretName: "example_secret_name",
34
34
  * visibility: "all",
35
- * encryptedValue: someEncryptedSecretString,
35
+ * valueEncrypted: someEncryptedSecretString,
36
36
  * });
37
37
  * ```
38
38
  *
@@ -46,13 +46,13 @@ const utilities = require("./utilities");
46
46
  * const exampleEncrypted = new github.ActionsOrganizationSecret("example_encrypted", {
47
47
  * secretName: "example_secret_name",
48
48
  * visibility: "selected",
49
- * plaintextValue: someSecretString,
49
+ * value: someSecretString,
50
50
  * selectedRepositoryIds: [repo.then(repo => repo.repoId)],
51
51
  * });
52
52
  * const exampleSecret = new github.ActionsOrganizationSecret("example_secret", {
53
53
  * secretName: "example_secret_name",
54
54
  * visibility: "selected",
55
- * encryptedValue: someEncryptedSecretString,
55
+ * valueEncrypted: someEncryptedSecretString,
56
56
  * selectedRepositoryIds: [repo.then(repo => repo.repoId)],
57
57
  * });
58
58
  * ```
@@ -68,7 +68,7 @@ const utilities = require("./utilities");
68
68
  * const exampleAllowDrift = new github.ActionsOrganizationSecret("example_allow_drift", {
69
69
  * secretName: "example_secret_name",
70
70
  * visibility: "all",
71
- * plaintextValue: "placeholder",
71
+ * value: "placeholder",
72
72
  * });
73
73
  * ```
74
74
  *
@@ -76,7 +76,7 @@ const utilities = require("./utilities");
76
76
  *
77
77
  * This resource can be imported using the secret name as the ID.
78
78
  *
79
- * > **Note**: When importing secrets, the `plaintextValue` or `encryptedValue` fields will not be populated in the state. You may need to ignore changes for these as a workaround if you're not planning on updating the secret through Terraform.
79
+ * > **Note**: When importing secrets, the `value`, `valueEncrypted`, `encryptedValue`, or `plaintextValue` fields will not be populated in the state. You may need to ignore changes for these as a workaround if you're not planning on updating the secret through Terraform.
80
80
  *
81
81
  * ### Import Command
82
82
  *
@@ -123,6 +123,8 @@ class ActionsOrganizationSecret extends pulumi.CustomResource {
123
123
  resourceInputs["secretName"] = state?.secretName;
124
124
  resourceInputs["selectedRepositoryIds"] = state?.selectedRepositoryIds;
125
125
  resourceInputs["updatedAt"] = state?.updatedAt;
126
+ resourceInputs["value"] = state?.value;
127
+ resourceInputs["valueEncrypted"] = state?.valueEncrypted;
126
128
  resourceInputs["visibility"] = state?.visibility;
127
129
  }
128
130
  else {
@@ -139,13 +141,15 @@ class ActionsOrganizationSecret extends pulumi.CustomResource {
139
141
  resourceInputs["plaintextValue"] = args?.plaintextValue ? pulumi.secret(args.plaintextValue) : undefined;
140
142
  resourceInputs["secretName"] = args?.secretName;
141
143
  resourceInputs["selectedRepositoryIds"] = args?.selectedRepositoryIds;
144
+ resourceInputs["value"] = args?.value ? pulumi.secret(args.value) : undefined;
145
+ resourceInputs["valueEncrypted"] = args?.valueEncrypted ? pulumi.secret(args.valueEncrypted) : undefined;
142
146
  resourceInputs["visibility"] = args?.visibility;
143
147
  resourceInputs["createdAt"] = undefined /*out*/;
144
148
  resourceInputs["remoteUpdatedAt"] = undefined /*out*/;
145
149
  resourceInputs["updatedAt"] = undefined /*out*/;
146
150
  }
147
151
  opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
148
- const secretOpts = { additionalSecretOutputs: ["encryptedValue", "plaintextValue"] };
152
+ const secretOpts = { additionalSecretOutputs: ["encryptedValue", "plaintextValue", "value", "valueEncrypted"] };
149
153
  opts = pulumi.mergeOptions(opts, secretOpts);
150
154
  super(ActionsOrganizationSecret.__pulumiType, name, resourceInputs, opts);
151
155
  }
@@ -1 +1 @@
1
- {"version":3,"file":"actionsOrganizationSecret.js","sourceRoot":"","sources":["../actionsOrganizationSecret.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAgFG;AACH,MAAa,yBAA0B,SAAQ,MAAM,CAAC,cAAc;IAChE;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAsC,EAAE,IAAmC;QACpI,OAAO,IAAI,yBAAyB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAChF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,yBAAyB,CAAC,YAAY,CAAC;IAC1E,CAAC;IAyDD,YAAY,IAAY,EAAE,WAA4E,EAAE,IAAmC;QACvI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAyD,CAAC;YACxE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,EAAE,eAAe,CAAC;YAC3D,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,EAAE,qBAAqB,CAAC;YACvE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;SACpD;aAAM;YACH,MAAM,IAAI,GAAG,WAAwD,CAAC;YACtE,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC;YACxD,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACzG,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC;YACtC,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACzG,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,EAAE,qBAAqB,CAAC;YACtE,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAChD,cAAc,CAAC,iBAAiB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACnD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,gBAAgB,EAAE,gBAAgB,CAAC,EAAE,CAAC;QACrF,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,yBAAyB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC9E,CAAC;;AAzHL,8DA0HC;AA5GG,gBAAgB;AACO,sCAAY,GAAG,kEAAkE,CAAC"}
1
+ {"version":3,"file":"actionsOrganizationSecret.js","sourceRoot":"","sources":["../actionsOrganizationSecret.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAgFG;AACH,MAAa,yBAA0B,SAAQ,MAAM,CAAC,cAAc;IAChE;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAsC,EAAE,IAAmC;QACpI,OAAO,IAAI,yBAAyB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAChF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,yBAAyB,CAAC,YAAY,CAAC;IAC1E,CAAC;IAqED,YAAY,IAAY,EAAE,WAA4E,EAAE,IAAmC;QACvI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAyD,CAAC;YACxE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,EAAE,eAAe,CAAC;YAC3D,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,EAAE,qBAAqB,CAAC;YACvE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;SACpD;aAAM;YACH,MAAM,IAAI,GAAG,WAAwD,CAAC;YACtE,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC;YACxD,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACzG,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC;YACtC,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACzG,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,EAAE,qBAAqB,CAAC;YACtE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACzG,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAChD,cAAc,CAAC,iBAAiB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACnD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,gBAAgB,EAAE,gBAAgB,EAAE,OAAO,EAAE,gBAAgB,CAAC,EAAE,CAAC;QAChH,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,yBAAyB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC9E,CAAC;;AAzIL,8DA0IC;AA5HG,gBAAgB;AACO,sCAAY,GAAG,kEAAkE,CAAC"}
@@ -13,7 +13,7 @@ import * as pulumi from "@pulumi/pulumi";
13
13
  *
14
14
  * const example = new github.ActionsOrganizationSecret("example", {
15
15
  * secretName: "mysecret",
16
- * plaintextValue: "foo",
16
+ * value: "foo",
17
17
  * visibility: "selected",
18
18
  * });
19
19
  * const exampleRepository = new github.Repository("example", {
@@ -19,7 +19,7 @@ const utilities = require("./utilities");
19
19
  *
20
20
  * const example = new github.ActionsOrganizationSecret("example", {
21
21
  * secretName: "mysecret",
22
- * plaintextValue: "foo",
22
+ * value: "foo",
23
23
  * visibility: "selected",
24
24
  * });
25
25
  * const exampleRepository = new github.Repository("example", {
@@ -13,7 +13,7 @@ import * as pulumi from "@pulumi/pulumi";
13
13
  *
14
14
  * const example = new github.ActionsOrganizationSecret("example", {
15
15
  * secretName: "mysecret",
16
- * plaintextValue: "foo",
16
+ * value: "foo",
17
17
  * visibility: "selected",
18
18
  * });
19
19
  * const exampleRepository = new github.Repository("example", {
@@ -19,7 +19,7 @@ const utilities = require("./utilities");
19
19
  *
20
20
  * const example = new github.ActionsOrganizationSecret("example", {
21
21
  * secretName: "mysecret",
22
- * plaintextValue: "foo",
22
+ * value: "foo",
23
23
  * visibility: "selected",
24
24
  * });
25
25
  * const exampleRepository = new github.Repository("example", {
@@ -13,7 +13,7 @@ import * as pulumi from "@pulumi/pulumi";
13
13
  *
14
14
  * const example = new github.ActionsOrganizationVariable("example", {
15
15
  * variableName: "myvariable",
16
- * plaintextValue: "foo",
16
+ * value: "foo",
17
17
  * visibility: "selected",
18
18
  * });
19
19
  * const exampleRepository = new github.Repository("example", {
@@ -19,7 +19,7 @@ const utilities = require("./utilities");
19
19
  *
20
20
  * const example = new github.ActionsOrganizationVariable("example", {
21
21
  * variableName: "myvariable",
22
- * plaintextValue: "foo",
22
+ * value: "foo",
23
23
  * visibility: "selected",
24
24
  * });
25
25
  * const exampleRepository = new github.Repository("example", {
@@ -13,7 +13,7 @@ import * as pulumi from "@pulumi/pulumi";
13
13
  *
14
14
  * const example = new github.ActionsOrganizationVariable("example", {
15
15
  * variableName: "myvariable",
16
- * plaintextValue: "foo",
16
+ * value: "foo",
17
17
  * visibility: "selected",
18
18
  * });
19
19
  * const exampleRepository = new github.Repository("example", {