@pulumi/github 6.13.0-alpha.1777011674 → 6.13.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/actionsEnvironmentSecret.d.ts +52 -16
- package/actionsEnvironmentSecret.js +10 -6
- package/actionsEnvironmentSecret.js.map +1 -1
- package/actionsOrganizationPermissions.d.ts +3 -3
- package/actionsOrganizationSecret.d.ts +56 -20
- package/actionsOrganizationSecret.js +13 -9
- package/actionsOrganizationSecret.js.map +1 -1
- package/actionsOrganizationSecretRepositories.d.ts +1 -1
- package/actionsOrganizationSecretRepositories.js +1 -1
- package/actionsOrganizationSecretRepository.d.ts +1 -1
- package/actionsOrganizationSecretRepository.js +1 -1
- package/actionsOrganizationVariableRepositories.d.ts +1 -1
- package/actionsOrganizationVariableRepositories.js +1 -1
- package/actionsOrganizationVariableRepository.d.ts +1 -1
- package/actionsOrganizationVariableRepository.js +1 -1
- package/actionsRepositoryPermissions.d.ts +3 -3
- package/actionsSecret.d.ts +51 -15
- package/actionsSecret.js +11 -7
- package/actionsSecret.js.map +1 -1
- package/dependabotOrganizationSecret.d.ts +57 -15
- package/dependabotOrganizationSecret.js +11 -7
- package/dependabotOrganizationSecret.js.map +1 -1
- package/dependabotOrganizationSecretRepositories.d.ts +1 -1
- package/dependabotOrganizationSecretRepositories.js +1 -1
- package/dependabotOrganizationSecretRepository.d.ts +1 -1
- package/dependabotOrganizationSecretRepository.js +1 -1
- package/dependabotSecret.d.ts +54 -18
- package/dependabotSecret.js +11 -7
- package/dependabotSecret.js.map +1 -1
- package/emuGroupMapping.d.ts +12 -6
- package/emuGroupMapping.js +2 -2
- package/emuGroupMapping.js.map +1 -1
- package/enterpriseIpAllowListEntry.d.ts +125 -0
- package/enterpriseIpAllowListEntry.js +90 -0
- package/enterpriseIpAllowListEntry.js.map +1 -0
- package/getIpRanges.d.ts +28 -4
- package/getIpRanges.js.map +1 -1
- package/getOrganizationAppInstallations.d.ts +45 -0
- package/getOrganizationAppInstallations.js +46 -0
- package/getOrganizationAppInstallations.js.map +1 -0
- package/getRepository.d.ts +3 -1
- package/getRepository.js.map +1 -1
- package/getRepositoryPages.d.ts +96 -0
- package/getRepositoryPages.js +50 -0
- package/getRepositoryPages.js.map +1 -0
- package/index.d.ts +15 -0
- package/index.js +26 -5
- package/index.js.map +1 -1
- package/organizationRuleset.d.ts +38 -0
- package/organizationRuleset.js +38 -0
- package/organizationRuleset.js.map +1 -1
- package/package.json +2 -2
- package/repository.d.ts +28 -35
- package/repository.js +0 -19
- package/repository.js.map +1 -1
- package/repositoryCollaborators.d.ts +8 -8
- package/repositoryCollaborators.js +2 -8
- package/repositoryCollaborators.js.map +1 -1
- package/repositoryEnvironment.d.ts +13 -1
- package/repositoryEnvironment.js +7 -1
- package/repositoryEnvironment.js.map +1 -1
- package/repositoryEnvironmentDeploymentPolicy.d.ts +21 -1
- package/repositoryEnvironmentDeploymentPolicy.js +9 -1
- package/repositoryEnvironmentDeploymentPolicy.js.map +1 -1
- package/repositoryPages.d.ts +228 -0
- package/repositoryPages.js +150 -0
- package/repositoryPages.js.map +1 -0
- package/repositoryVulnerabilityAlerts.d.ts +98 -0
- package/repositoryVulnerabilityAlerts.js +86 -0
- package/repositoryVulnerabilityAlerts.js.map +1 -0
- package/teamSettings.d.ts +35 -12
- package/teamSettings.js +21 -8
- package/teamSettings.js.map +1 -1
- package/types/input.d.ts +52 -8
- package/types/output.d.ts +118 -8
|
@@ -6,9 +6,9 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
6
6
|
* Secret values are encrypted using the [Go '/crypto/box' module](https://godoc.org/golang.org/x/crypto/nacl/box) which is
|
|
7
7
|
* interoperable with [libsodium](https://libsodium.gitbook.io/doc/). Libsodium is used by GitHub to decrypt secret values.
|
|
8
8
|
*
|
|
9
|
-
* For the purposes of security, the contents of the `
|
|
9
|
+
* For the purposes of security, the contents of the `value` field have been marked as `sensitive` to Terraform,
|
|
10
10
|
* but it is important to note that **this does not hide it from state files**. You should treat state as sensitive always.
|
|
11
|
-
* It is also advised that you do not store plaintext values in your code but rather populate the `
|
|
11
|
+
* It is also advised that you do not store plaintext values in your code but rather populate the `valueEncrypted`
|
|
12
12
|
* using fields from a resource, data source or variable as, while encrypted in state, these will be easily accessible
|
|
13
13
|
* in your code. See below for an example of this abstraction.
|
|
14
14
|
*
|
|
@@ -24,7 +24,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
24
24
|
* repository: "example-repo",
|
|
25
25
|
* environment: "example-environment",
|
|
26
26
|
* secretName: "example_secret_name",
|
|
27
|
-
*
|
|
27
|
+
* value: "placeholder",
|
|
28
28
|
* });
|
|
29
29
|
* ```
|
|
30
30
|
*
|
|
@@ -32,7 +32,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
32
32
|
*
|
|
33
33
|
* This resource can be imported using an ID made of the repository name, environment name (URL escaped), and secret name all separated by a `:`.
|
|
34
34
|
*
|
|
35
|
-
* > **Note**: When importing secrets, the `
|
|
35
|
+
* > **Note**: When importing secrets, the `value`, `valueEncrypted`, `encryptedValue`, or `plaintextValue` fields will not be populated in the state. You may need to ignore changes for these as a workaround if you're not planning on updating the secret through Terraform.
|
|
36
36
|
*
|
|
37
37
|
* ### Import Command
|
|
38
38
|
*
|
|
@@ -63,7 +63,9 @@ export declare class ActionsEnvironmentSecret extends pulumi.CustomResource {
|
|
|
63
63
|
*/
|
|
64
64
|
readonly createdAt: pulumi.Output<string>;
|
|
65
65
|
/**
|
|
66
|
-
*
|
|
66
|
+
* (Optional) Please use `valueEncrypted`.
|
|
67
|
+
*
|
|
68
|
+
* @deprecated Use valueEncrypted and key_id.
|
|
67
69
|
*/
|
|
68
70
|
readonly encryptedValue: pulumi.Output<string | undefined>;
|
|
69
71
|
/**
|
|
@@ -71,13 +73,15 @@ export declare class ActionsEnvironmentSecret extends pulumi.CustomResource {
|
|
|
71
73
|
*/
|
|
72
74
|
readonly environment: pulumi.Output<string>;
|
|
73
75
|
/**
|
|
74
|
-
* ID of the public key used to encrypt the secret
|
|
76
|
+
* ID of the public key used to encrypt the secret, required when setting `encryptedValue`.
|
|
75
77
|
*/
|
|
76
78
|
readonly keyId: pulumi.Output<string>;
|
|
77
79
|
/**
|
|
78
|
-
*
|
|
80
|
+
* (Optional) Please use `value`.
|
|
81
|
+
*
|
|
82
|
+
* > **Note**: One of either `value`, `valueEncrypted`, `encryptedValue`, or `plaintextValue` must be specified.
|
|
79
83
|
*
|
|
80
|
-
*
|
|
84
|
+
* @deprecated Use value.
|
|
81
85
|
*/
|
|
82
86
|
readonly plaintextValue: pulumi.Output<string | undefined>;
|
|
83
87
|
/**
|
|
@@ -100,6 +104,14 @@ export declare class ActionsEnvironmentSecret extends pulumi.CustomResource {
|
|
|
100
104
|
* Date the secret was last updated by the provider.
|
|
101
105
|
*/
|
|
102
106
|
readonly updatedAt: pulumi.Output<string>;
|
|
107
|
+
/**
|
|
108
|
+
* Plaintext value of the secret to be encrypted. This conflicts with `valueEncrypted`, `encryptedValue` & `plaintextValue`.
|
|
109
|
+
*/
|
|
110
|
+
readonly value: pulumi.Output<string | undefined>;
|
|
111
|
+
/**
|
|
112
|
+
* Encrypted value of the secret using the GitHub public key in Base64 format, `keyId` is required with this value. This conflicts with `value`, `encryptedValue` & `plaintextValue`.
|
|
113
|
+
*/
|
|
114
|
+
readonly valueEncrypted: pulumi.Output<string | undefined>;
|
|
103
115
|
/**
|
|
104
116
|
* Create a ActionsEnvironmentSecret resource with the given unique name, arguments, and options.
|
|
105
117
|
*
|
|
@@ -118,7 +130,9 @@ export interface ActionsEnvironmentSecretState {
|
|
|
118
130
|
*/
|
|
119
131
|
createdAt?: pulumi.Input<string>;
|
|
120
132
|
/**
|
|
121
|
-
*
|
|
133
|
+
* (Optional) Please use `valueEncrypted`.
|
|
134
|
+
*
|
|
135
|
+
* @deprecated Use valueEncrypted and key_id.
|
|
122
136
|
*/
|
|
123
137
|
encryptedValue?: pulumi.Input<string>;
|
|
124
138
|
/**
|
|
@@ -126,13 +140,15 @@ export interface ActionsEnvironmentSecretState {
|
|
|
126
140
|
*/
|
|
127
141
|
environment?: pulumi.Input<string>;
|
|
128
142
|
/**
|
|
129
|
-
* ID of the public key used to encrypt the secret
|
|
143
|
+
* ID of the public key used to encrypt the secret, required when setting `encryptedValue`.
|
|
130
144
|
*/
|
|
131
145
|
keyId?: pulumi.Input<string>;
|
|
132
146
|
/**
|
|
133
|
-
*
|
|
147
|
+
* (Optional) Please use `value`.
|
|
134
148
|
*
|
|
135
|
-
* > **Note**: One of either `
|
|
149
|
+
* > **Note**: One of either `value`, `valueEncrypted`, `encryptedValue`, or `plaintextValue` must be specified.
|
|
150
|
+
*
|
|
151
|
+
* @deprecated Use value.
|
|
136
152
|
*/
|
|
137
153
|
plaintextValue?: pulumi.Input<string>;
|
|
138
154
|
/**
|
|
@@ -155,13 +171,23 @@ export interface ActionsEnvironmentSecretState {
|
|
|
155
171
|
* Date the secret was last updated by the provider.
|
|
156
172
|
*/
|
|
157
173
|
updatedAt?: pulumi.Input<string>;
|
|
174
|
+
/**
|
|
175
|
+
* Plaintext value of the secret to be encrypted. This conflicts with `valueEncrypted`, `encryptedValue` & `plaintextValue`.
|
|
176
|
+
*/
|
|
177
|
+
value?: pulumi.Input<string>;
|
|
178
|
+
/**
|
|
179
|
+
* Encrypted value of the secret using the GitHub public key in Base64 format, `keyId` is required with this value. This conflicts with `value`, `encryptedValue` & `plaintextValue`.
|
|
180
|
+
*/
|
|
181
|
+
valueEncrypted?: pulumi.Input<string>;
|
|
158
182
|
}
|
|
159
183
|
/**
|
|
160
184
|
* The set of arguments for constructing a ActionsEnvironmentSecret resource.
|
|
161
185
|
*/
|
|
162
186
|
export interface ActionsEnvironmentSecretArgs {
|
|
163
187
|
/**
|
|
164
|
-
*
|
|
188
|
+
* (Optional) Please use `valueEncrypted`.
|
|
189
|
+
*
|
|
190
|
+
* @deprecated Use valueEncrypted and key_id.
|
|
165
191
|
*/
|
|
166
192
|
encryptedValue?: pulumi.Input<string>;
|
|
167
193
|
/**
|
|
@@ -169,13 +195,15 @@ export interface ActionsEnvironmentSecretArgs {
|
|
|
169
195
|
*/
|
|
170
196
|
environment: pulumi.Input<string>;
|
|
171
197
|
/**
|
|
172
|
-
* ID of the public key used to encrypt the secret
|
|
198
|
+
* ID of the public key used to encrypt the secret, required when setting `encryptedValue`.
|
|
173
199
|
*/
|
|
174
200
|
keyId?: pulumi.Input<string>;
|
|
175
201
|
/**
|
|
176
|
-
*
|
|
202
|
+
* (Optional) Please use `value`.
|
|
203
|
+
*
|
|
204
|
+
* > **Note**: One of either `value`, `valueEncrypted`, `encryptedValue`, or `plaintextValue` must be specified.
|
|
177
205
|
*
|
|
178
|
-
*
|
|
206
|
+
* @deprecated Use value.
|
|
179
207
|
*/
|
|
180
208
|
plaintextValue?: pulumi.Input<string>;
|
|
181
209
|
/**
|
|
@@ -186,4 +214,12 @@ export interface ActionsEnvironmentSecretArgs {
|
|
|
186
214
|
* Name of the secret.
|
|
187
215
|
*/
|
|
188
216
|
secretName: pulumi.Input<string>;
|
|
217
|
+
/**
|
|
218
|
+
* Plaintext value of the secret to be encrypted. This conflicts with `valueEncrypted`, `encryptedValue` & `plaintextValue`.
|
|
219
|
+
*/
|
|
220
|
+
value?: pulumi.Input<string>;
|
|
221
|
+
/**
|
|
222
|
+
* Encrypted value of the secret using the GitHub public key in Base64 format, `keyId` is required with this value. This conflicts with `value`, `encryptedValue` & `plaintextValue`.
|
|
223
|
+
*/
|
|
224
|
+
valueEncrypted?: pulumi.Input<string>;
|
|
189
225
|
}
|
|
@@ -12,9 +12,9 @@ const utilities = require("./utilities");
|
|
|
12
12
|
* Secret values are encrypted using the [Go '/crypto/box' module](https://godoc.org/golang.org/x/crypto/nacl/box) which is
|
|
13
13
|
* interoperable with [libsodium](https://libsodium.gitbook.io/doc/). Libsodium is used by GitHub to decrypt secret values.
|
|
14
14
|
*
|
|
15
|
-
* For the purposes of security, the contents of the `
|
|
15
|
+
* For the purposes of security, the contents of the `value` field have been marked as `sensitive` to Terraform,
|
|
16
16
|
* but it is important to note that **this does not hide it from state files**. You should treat state as sensitive always.
|
|
17
|
-
* It is also advised that you do not store plaintext values in your code but rather populate the `
|
|
17
|
+
* It is also advised that you do not store plaintext values in your code but rather populate the `valueEncrypted`
|
|
18
18
|
* using fields from a resource, data source or variable as, while encrypted in state, these will be easily accessible
|
|
19
19
|
* in your code. See below for an example of this abstraction.
|
|
20
20
|
*
|
|
@@ -30,7 +30,7 @@ const utilities = require("./utilities");
|
|
|
30
30
|
* repository: "example-repo",
|
|
31
31
|
* environment: "example-environment",
|
|
32
32
|
* secretName: "example_secret_name",
|
|
33
|
-
*
|
|
33
|
+
* value: "placeholder",
|
|
34
34
|
* });
|
|
35
35
|
* ```
|
|
36
36
|
*
|
|
@@ -38,7 +38,7 @@ const utilities = require("./utilities");
|
|
|
38
38
|
*
|
|
39
39
|
* This resource can be imported using an ID made of the repository name, environment name (URL escaped), and secret name all separated by a `:`.
|
|
40
40
|
*
|
|
41
|
-
* > **Note**: When importing secrets, the `
|
|
41
|
+
* > **Note**: When importing secrets, the `value`, `valueEncrypted`, `encryptedValue`, or `plaintextValue` fields will not be populated in the state. You may need to ignore changes for these as a workaround if you're not planning on updating the secret through Terraform.
|
|
42
42
|
*
|
|
43
43
|
* ### Import Command
|
|
44
44
|
*
|
|
@@ -86,6 +86,8 @@ class ActionsEnvironmentSecret extends pulumi.CustomResource {
|
|
|
86
86
|
resourceInputs["repositoryId"] = state?.repositoryId;
|
|
87
87
|
resourceInputs["secretName"] = state?.secretName;
|
|
88
88
|
resourceInputs["updatedAt"] = state?.updatedAt;
|
|
89
|
+
resourceInputs["value"] = state?.value;
|
|
90
|
+
resourceInputs["valueEncrypted"] = state?.valueEncrypted;
|
|
89
91
|
}
|
|
90
92
|
else {
|
|
91
93
|
const args = argsOrState;
|
|
@@ -98,19 +100,21 @@ class ActionsEnvironmentSecret extends pulumi.CustomResource {
|
|
|
98
100
|
if (args?.secretName === undefined && !opts.urn) {
|
|
99
101
|
throw new Error("Missing required property 'secretName'");
|
|
100
102
|
}
|
|
101
|
-
resourceInputs["encryptedValue"] = args?.encryptedValue;
|
|
103
|
+
resourceInputs["encryptedValue"] = args?.encryptedValue ? pulumi.secret(args.encryptedValue) : undefined;
|
|
102
104
|
resourceInputs["environment"] = args?.environment;
|
|
103
105
|
resourceInputs["keyId"] = args?.keyId;
|
|
104
106
|
resourceInputs["plaintextValue"] = args?.plaintextValue ? pulumi.secret(args.plaintextValue) : undefined;
|
|
105
107
|
resourceInputs["repository"] = args?.repository;
|
|
106
108
|
resourceInputs["secretName"] = args?.secretName;
|
|
109
|
+
resourceInputs["value"] = args?.value ? pulumi.secret(args.value) : undefined;
|
|
110
|
+
resourceInputs["valueEncrypted"] = args?.valueEncrypted ? pulumi.secret(args.valueEncrypted) : undefined;
|
|
107
111
|
resourceInputs["createdAt"] = undefined /*out*/;
|
|
108
112
|
resourceInputs["remoteUpdatedAt"] = undefined /*out*/;
|
|
109
113
|
resourceInputs["repositoryId"] = undefined /*out*/;
|
|
110
114
|
resourceInputs["updatedAt"] = undefined /*out*/;
|
|
111
115
|
}
|
|
112
116
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
113
|
-
const secretOpts = { additionalSecretOutputs: ["plaintextValue"] };
|
|
117
|
+
const secretOpts = { additionalSecretOutputs: ["encryptedValue", "plaintextValue", "value", "valueEncrypted"] };
|
|
114
118
|
opts = pulumi.mergeOptions(opts, secretOpts);
|
|
115
119
|
super(ActionsEnvironmentSecret.__pulumiType, name, resourceInputs, opts);
|
|
116
120
|
}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"actionsEnvironmentSecret.js","sourceRoot":"","sources":["../actionsEnvironmentSecret.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA0CG;AACH,MAAa,wBAAyB,SAAQ,MAAM,CAAC,cAAc;IAC/D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAqC,EAAE,IAAmC;QACnI,OAAO,IAAI,wBAAwB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC/E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,wBAAwB,CAAC,YAAY,CAAC;IACzE,CAAC;
|
|
1
|
+
{"version":3,"file":"actionsEnvironmentSecret.js","sourceRoot":"","sources":["../actionsEnvironmentSecret.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA0CG;AACH,MAAa,wBAAyB,SAAQ,MAAM,CAAC,cAAc;IAC/D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAqC,EAAE,IAAmC;QACnI,OAAO,IAAI,wBAAwB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC/E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,wBAAwB,CAAC,YAAY,CAAC;IACzE,CAAC;IAiED,YAAY,IAAY,EAAE,WAA0E,EAAE,IAAmC;QACrI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAwD,CAAC;YACvE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,EAAE,eAAe,CAAC;YAC3D,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;SAC5D;aAAM;YACH,MAAM,IAAI,GAAG,WAAuD,CAAC;YACrE,IAAI,IAAI,EAAE,WAAW,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC9C,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACzG,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC;YACtC,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACzG,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACzG,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAChD,cAAc,CAAC,iBAAiB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACtD,cAAc,CAAC,cAAc,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACnD,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACnD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,gBAAgB,EAAE,gBAAgB,EAAE,OAAO,EAAE,gBAAgB,CAAC,EAAE,CAAC;QAChH,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,wBAAwB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC7E,CAAC;;AAxIL,4DAyIC;AA3HG,gBAAgB;AACO,qCAAY,GAAG,gEAAgE,CAAC"}
|
|
@@ -70,7 +70,7 @@ export declare class ActionsOrganizationPermissions extends pulumi.CustomResourc
|
|
|
70
70
|
*/
|
|
71
71
|
readonly enabledRepositoriesConfig: pulumi.Output<outputs.ActionsOrganizationPermissionsEnabledRepositoriesConfig | undefined>;
|
|
72
72
|
/**
|
|
73
|
-
* Whether pinning to a specific SHA is required for all actions and reusable workflows in
|
|
73
|
+
* Whether pinning to a specific SHA is required for all actions and reusable workflows in the organization.
|
|
74
74
|
*/
|
|
75
75
|
readonly shaPinningRequired: pulumi.Output<boolean>;
|
|
76
76
|
/**
|
|
@@ -103,7 +103,7 @@ export interface ActionsOrganizationPermissionsState {
|
|
|
103
103
|
*/
|
|
104
104
|
enabledRepositoriesConfig?: pulumi.Input<inputs.ActionsOrganizationPermissionsEnabledRepositoriesConfig>;
|
|
105
105
|
/**
|
|
106
|
-
* Whether pinning to a specific SHA is required for all actions and reusable workflows in
|
|
106
|
+
* Whether pinning to a specific SHA is required for all actions and reusable workflows in the organization.
|
|
107
107
|
*/
|
|
108
108
|
shaPinningRequired?: pulumi.Input<boolean>;
|
|
109
109
|
}
|
|
@@ -128,7 +128,7 @@ export interface ActionsOrganizationPermissionsArgs {
|
|
|
128
128
|
*/
|
|
129
129
|
enabledRepositoriesConfig?: pulumi.Input<inputs.ActionsOrganizationPermissionsEnabledRepositoriesConfig>;
|
|
130
130
|
/**
|
|
131
|
-
* Whether pinning to a specific SHA is required for all actions and reusable workflows in
|
|
131
|
+
* Whether pinning to a specific SHA is required for all actions and reusable workflows in the organization.
|
|
132
132
|
*/
|
|
133
133
|
shaPinningRequired?: pulumi.Input<boolean>;
|
|
134
134
|
}
|
|
@@ -6,9 +6,9 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
6
6
|
* Secret values are encrypted using the [Go '/crypto/box' module](https://godoc.org/golang.org/x/crypto/nacl/box) which is
|
|
7
7
|
* interoperable with [libsodium](https://libsodium.gitbook.io/doc/). Libsodium is used by GitHub to decrypt secret values.
|
|
8
8
|
*
|
|
9
|
-
* For the purposes of security, the contents of the `
|
|
9
|
+
* For the purposes of security, the contents of the `value` field have been marked as `sensitive` to Terraform,
|
|
10
10
|
* but it is important to note that **this does not hide it from state files**. You should treat state as sensitive always.
|
|
11
|
-
* It is also advised that you do not store plaintext values in your code but rather populate the `
|
|
11
|
+
* It is also advised that you do not store plaintext values in your code but rather populate the `valueEncrypted`
|
|
12
12
|
* using fields from a resource, data source or variable as, while encrypted in state, these will be easily accessible
|
|
13
13
|
* in your code. See below for an example of this abstraction.
|
|
14
14
|
*
|
|
@@ -21,12 +21,12 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
21
21
|
* const examplePlaintext = new github.ActionsOrganizationSecret("example_plaintext", {
|
|
22
22
|
* secretName: "example_secret_name",
|
|
23
23
|
* visibility: "all",
|
|
24
|
-
*
|
|
24
|
+
* value: someSecretString,
|
|
25
25
|
* });
|
|
26
26
|
* const exampleEncrypted = new github.ActionsOrganizationSecret("example_encrypted", {
|
|
27
27
|
* secretName: "example_secret_name",
|
|
28
28
|
* visibility: "all",
|
|
29
|
-
*
|
|
29
|
+
* valueEncrypted: someEncryptedSecretString,
|
|
30
30
|
* });
|
|
31
31
|
* ```
|
|
32
32
|
*
|
|
@@ -40,13 +40,13 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
40
40
|
* const exampleEncrypted = new github.ActionsOrganizationSecret("example_encrypted", {
|
|
41
41
|
* secretName: "example_secret_name",
|
|
42
42
|
* visibility: "selected",
|
|
43
|
-
*
|
|
43
|
+
* value: someSecretString,
|
|
44
44
|
* selectedRepositoryIds: [repo.then(repo => repo.repoId)],
|
|
45
45
|
* });
|
|
46
46
|
* const exampleSecret = new github.ActionsOrganizationSecret("example_secret", {
|
|
47
47
|
* secretName: "example_secret_name",
|
|
48
48
|
* visibility: "selected",
|
|
49
|
-
*
|
|
49
|
+
* valueEncrypted: someEncryptedSecretString,
|
|
50
50
|
* selectedRepositoryIds: [repo.then(repo => repo.repoId)],
|
|
51
51
|
* });
|
|
52
52
|
* ```
|
|
@@ -62,7 +62,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
62
62
|
* const exampleAllowDrift = new github.ActionsOrganizationSecret("example_allow_drift", {
|
|
63
63
|
* secretName: "example_secret_name",
|
|
64
64
|
* visibility: "all",
|
|
65
|
-
*
|
|
65
|
+
* value: "placeholder",
|
|
66
66
|
* });
|
|
67
67
|
* ```
|
|
68
68
|
*
|
|
@@ -70,7 +70,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
70
70
|
*
|
|
71
71
|
* This resource can be imported using the secret name as the ID.
|
|
72
72
|
*
|
|
73
|
-
* > **Note**: When importing secrets, the `
|
|
73
|
+
* > **Note**: When importing secrets, the `value`, `valueEncrypted`, `encryptedValue`, or `plaintextValue` fields will not be populated in the state. You may need to ignore changes for these as a workaround if you're not planning on updating the secret through Terraform.
|
|
74
74
|
*
|
|
75
75
|
* ### Import Command
|
|
76
76
|
*
|
|
@@ -103,21 +103,25 @@ export declare class ActionsOrganizationSecret extends pulumi.CustomResource {
|
|
|
103
103
|
/**
|
|
104
104
|
* (Optional) This is ignored as drift detection is built into the resource.
|
|
105
105
|
*
|
|
106
|
-
* > **Note**: One of either `
|
|
106
|
+
* > **Note**: One of either `value`, `valueEncrypted`, `encryptedValue`, or `plaintextValue` must be specified.
|
|
107
107
|
*
|
|
108
108
|
* @deprecated This is no longer required and will be removed in a future release. Drift detection is now always performed, and external changes will result in the secret being updated to match the Terraform configuration. If you want to ignore external changes, you can use the `lifecycle` block with `ignoreChanges` on the `remoteUpdatedAt` field.
|
|
109
109
|
*/
|
|
110
110
|
readonly destroyOnDrift: pulumi.Output<boolean | undefined>;
|
|
111
111
|
/**
|
|
112
|
-
*
|
|
112
|
+
* (Optional) Please use `valueEncrypted`.
|
|
113
|
+
*
|
|
114
|
+
* @deprecated Use valueEncrypted and key_id.
|
|
113
115
|
*/
|
|
114
116
|
readonly encryptedValue: pulumi.Output<string | undefined>;
|
|
115
117
|
/**
|
|
116
|
-
* ID of the public key used to encrypt the secret
|
|
118
|
+
* ID of the public key used to encrypt the secret, required when setting `encryptedValue`.
|
|
117
119
|
*/
|
|
118
120
|
readonly keyId: pulumi.Output<string>;
|
|
119
121
|
/**
|
|
120
|
-
*
|
|
122
|
+
* (Optional) Please use `value`.
|
|
123
|
+
*
|
|
124
|
+
* @deprecated Use value.
|
|
121
125
|
*/
|
|
122
126
|
readonly plaintextValue: pulumi.Output<string | undefined>;
|
|
123
127
|
/**
|
|
@@ -138,6 +142,14 @@ export declare class ActionsOrganizationSecret extends pulumi.CustomResource {
|
|
|
138
142
|
* Date the secret was last updated by the provider.
|
|
139
143
|
*/
|
|
140
144
|
readonly updatedAt: pulumi.Output<string>;
|
|
145
|
+
/**
|
|
146
|
+
* Plaintext value of the secret to be encrypted. This conflicts with `valueEncrypted`, `encryptedValue` & `plaintextValue`.
|
|
147
|
+
*/
|
|
148
|
+
readonly value: pulumi.Output<string | undefined>;
|
|
149
|
+
/**
|
|
150
|
+
* Encrypted value of the secret using the GitHub public key in Base64 format, `keyId` is required with this value. This conflicts with `value`, `encryptedValue` & `plaintextValue`.
|
|
151
|
+
*/
|
|
152
|
+
readonly valueEncrypted: pulumi.Output<string | undefined>;
|
|
141
153
|
/**
|
|
142
154
|
* Configures the access that repositories have to the organization secret; must be one of `all`, `private`, or `selected`.
|
|
143
155
|
*/
|
|
@@ -162,21 +174,25 @@ export interface ActionsOrganizationSecretState {
|
|
|
162
174
|
/**
|
|
163
175
|
* (Optional) This is ignored as drift detection is built into the resource.
|
|
164
176
|
*
|
|
165
|
-
* > **Note**: One of either `
|
|
177
|
+
* > **Note**: One of either `value`, `valueEncrypted`, `encryptedValue`, or `plaintextValue` must be specified.
|
|
166
178
|
*
|
|
167
179
|
* @deprecated This is no longer required and will be removed in a future release. Drift detection is now always performed, and external changes will result in the secret being updated to match the Terraform configuration. If you want to ignore external changes, you can use the `lifecycle` block with `ignoreChanges` on the `remoteUpdatedAt` field.
|
|
168
180
|
*/
|
|
169
181
|
destroyOnDrift?: pulumi.Input<boolean>;
|
|
170
182
|
/**
|
|
171
|
-
*
|
|
183
|
+
* (Optional) Please use `valueEncrypted`.
|
|
184
|
+
*
|
|
185
|
+
* @deprecated Use valueEncrypted and key_id.
|
|
172
186
|
*/
|
|
173
187
|
encryptedValue?: pulumi.Input<string>;
|
|
174
188
|
/**
|
|
175
|
-
* ID of the public key used to encrypt the secret
|
|
189
|
+
* ID of the public key used to encrypt the secret, required when setting `encryptedValue`.
|
|
176
190
|
*/
|
|
177
191
|
keyId?: pulumi.Input<string>;
|
|
178
192
|
/**
|
|
179
|
-
*
|
|
193
|
+
* (Optional) Please use `value`.
|
|
194
|
+
*
|
|
195
|
+
* @deprecated Use value.
|
|
180
196
|
*/
|
|
181
197
|
plaintextValue?: pulumi.Input<string>;
|
|
182
198
|
/**
|
|
@@ -197,6 +213,14 @@ export interface ActionsOrganizationSecretState {
|
|
|
197
213
|
* Date the secret was last updated by the provider.
|
|
198
214
|
*/
|
|
199
215
|
updatedAt?: pulumi.Input<string>;
|
|
216
|
+
/**
|
|
217
|
+
* Plaintext value of the secret to be encrypted. This conflicts with `valueEncrypted`, `encryptedValue` & `plaintextValue`.
|
|
218
|
+
*/
|
|
219
|
+
value?: pulumi.Input<string>;
|
|
220
|
+
/**
|
|
221
|
+
* Encrypted value of the secret using the GitHub public key in Base64 format, `keyId` is required with this value. This conflicts with `value`, `encryptedValue` & `plaintextValue`.
|
|
222
|
+
*/
|
|
223
|
+
valueEncrypted?: pulumi.Input<string>;
|
|
200
224
|
/**
|
|
201
225
|
* Configures the access that repositories have to the organization secret; must be one of `all`, `private`, or `selected`.
|
|
202
226
|
*/
|
|
@@ -209,21 +233,25 @@ export interface ActionsOrganizationSecretArgs {
|
|
|
209
233
|
/**
|
|
210
234
|
* (Optional) This is ignored as drift detection is built into the resource.
|
|
211
235
|
*
|
|
212
|
-
* > **Note**: One of either `
|
|
236
|
+
* > **Note**: One of either `value`, `valueEncrypted`, `encryptedValue`, or `plaintextValue` must be specified.
|
|
213
237
|
*
|
|
214
238
|
* @deprecated This is no longer required and will be removed in a future release. Drift detection is now always performed, and external changes will result in the secret being updated to match the Terraform configuration. If you want to ignore external changes, you can use the `lifecycle` block with `ignoreChanges` on the `remoteUpdatedAt` field.
|
|
215
239
|
*/
|
|
216
240
|
destroyOnDrift?: pulumi.Input<boolean>;
|
|
217
241
|
/**
|
|
218
|
-
*
|
|
242
|
+
* (Optional) Please use `valueEncrypted`.
|
|
243
|
+
*
|
|
244
|
+
* @deprecated Use valueEncrypted and key_id.
|
|
219
245
|
*/
|
|
220
246
|
encryptedValue?: pulumi.Input<string>;
|
|
221
247
|
/**
|
|
222
|
-
* ID of the public key used to encrypt the secret
|
|
248
|
+
* ID of the public key used to encrypt the secret, required when setting `encryptedValue`.
|
|
223
249
|
*/
|
|
224
250
|
keyId?: pulumi.Input<string>;
|
|
225
251
|
/**
|
|
226
|
-
*
|
|
252
|
+
* (Optional) Please use `value`.
|
|
253
|
+
*
|
|
254
|
+
* @deprecated Use value.
|
|
227
255
|
*/
|
|
228
256
|
plaintextValue?: pulumi.Input<string>;
|
|
229
257
|
/**
|
|
@@ -236,6 +264,14 @@ export interface ActionsOrganizationSecretArgs {
|
|
|
236
264
|
* @deprecated This field is deprecated and will be removed in a future release. Please use the `github.ActionsOrganizationSecretRepositories` or `github.ActionsOrganizationSecretRepository` resources to manage repository access to organization secrets.
|
|
237
265
|
*/
|
|
238
266
|
selectedRepositoryIds?: pulumi.Input<pulumi.Input<number>[]>;
|
|
267
|
+
/**
|
|
268
|
+
* Plaintext value of the secret to be encrypted. This conflicts with `valueEncrypted`, `encryptedValue` & `plaintextValue`.
|
|
269
|
+
*/
|
|
270
|
+
value?: pulumi.Input<string>;
|
|
271
|
+
/**
|
|
272
|
+
* Encrypted value of the secret using the GitHub public key in Base64 format, `keyId` is required with this value. This conflicts with `value`, `encryptedValue` & `plaintextValue`.
|
|
273
|
+
*/
|
|
274
|
+
valueEncrypted?: pulumi.Input<string>;
|
|
239
275
|
/**
|
|
240
276
|
* Configures the access that repositories have to the organization secret; must be one of `all`, `private`, or `selected`.
|
|
241
277
|
*/
|
|
@@ -12,9 +12,9 @@ const utilities = require("./utilities");
|
|
|
12
12
|
* Secret values are encrypted using the [Go '/crypto/box' module](https://godoc.org/golang.org/x/crypto/nacl/box) which is
|
|
13
13
|
* interoperable with [libsodium](https://libsodium.gitbook.io/doc/). Libsodium is used by GitHub to decrypt secret values.
|
|
14
14
|
*
|
|
15
|
-
* For the purposes of security, the contents of the `
|
|
15
|
+
* For the purposes of security, the contents of the `value` field have been marked as `sensitive` to Terraform,
|
|
16
16
|
* but it is important to note that **this does not hide it from state files**. You should treat state as sensitive always.
|
|
17
|
-
* It is also advised that you do not store plaintext values in your code but rather populate the `
|
|
17
|
+
* It is also advised that you do not store plaintext values in your code but rather populate the `valueEncrypted`
|
|
18
18
|
* using fields from a resource, data source or variable as, while encrypted in state, these will be easily accessible
|
|
19
19
|
* in your code. See below for an example of this abstraction.
|
|
20
20
|
*
|
|
@@ -27,12 +27,12 @@ const utilities = require("./utilities");
|
|
|
27
27
|
* const examplePlaintext = new github.ActionsOrganizationSecret("example_plaintext", {
|
|
28
28
|
* secretName: "example_secret_name",
|
|
29
29
|
* visibility: "all",
|
|
30
|
-
*
|
|
30
|
+
* value: someSecretString,
|
|
31
31
|
* });
|
|
32
32
|
* const exampleEncrypted = new github.ActionsOrganizationSecret("example_encrypted", {
|
|
33
33
|
* secretName: "example_secret_name",
|
|
34
34
|
* visibility: "all",
|
|
35
|
-
*
|
|
35
|
+
* valueEncrypted: someEncryptedSecretString,
|
|
36
36
|
* });
|
|
37
37
|
* ```
|
|
38
38
|
*
|
|
@@ -46,13 +46,13 @@ const utilities = require("./utilities");
|
|
|
46
46
|
* const exampleEncrypted = new github.ActionsOrganizationSecret("example_encrypted", {
|
|
47
47
|
* secretName: "example_secret_name",
|
|
48
48
|
* visibility: "selected",
|
|
49
|
-
*
|
|
49
|
+
* value: someSecretString,
|
|
50
50
|
* selectedRepositoryIds: [repo.then(repo => repo.repoId)],
|
|
51
51
|
* });
|
|
52
52
|
* const exampleSecret = new github.ActionsOrganizationSecret("example_secret", {
|
|
53
53
|
* secretName: "example_secret_name",
|
|
54
54
|
* visibility: "selected",
|
|
55
|
-
*
|
|
55
|
+
* valueEncrypted: someEncryptedSecretString,
|
|
56
56
|
* selectedRepositoryIds: [repo.then(repo => repo.repoId)],
|
|
57
57
|
* });
|
|
58
58
|
* ```
|
|
@@ -68,7 +68,7 @@ const utilities = require("./utilities");
|
|
|
68
68
|
* const exampleAllowDrift = new github.ActionsOrganizationSecret("example_allow_drift", {
|
|
69
69
|
* secretName: "example_secret_name",
|
|
70
70
|
* visibility: "all",
|
|
71
|
-
*
|
|
71
|
+
* value: "placeholder",
|
|
72
72
|
* });
|
|
73
73
|
* ```
|
|
74
74
|
*
|
|
@@ -76,7 +76,7 @@ const utilities = require("./utilities");
|
|
|
76
76
|
*
|
|
77
77
|
* This resource can be imported using the secret name as the ID.
|
|
78
78
|
*
|
|
79
|
-
* > **Note**: When importing secrets, the `
|
|
79
|
+
* > **Note**: When importing secrets, the `value`, `valueEncrypted`, `encryptedValue`, or `plaintextValue` fields will not be populated in the state. You may need to ignore changes for these as a workaround if you're not planning on updating the secret through Terraform.
|
|
80
80
|
*
|
|
81
81
|
* ### Import Command
|
|
82
82
|
*
|
|
@@ -123,6 +123,8 @@ class ActionsOrganizationSecret extends pulumi.CustomResource {
|
|
|
123
123
|
resourceInputs["secretName"] = state?.secretName;
|
|
124
124
|
resourceInputs["selectedRepositoryIds"] = state?.selectedRepositoryIds;
|
|
125
125
|
resourceInputs["updatedAt"] = state?.updatedAt;
|
|
126
|
+
resourceInputs["value"] = state?.value;
|
|
127
|
+
resourceInputs["valueEncrypted"] = state?.valueEncrypted;
|
|
126
128
|
resourceInputs["visibility"] = state?.visibility;
|
|
127
129
|
}
|
|
128
130
|
else {
|
|
@@ -139,13 +141,15 @@ class ActionsOrganizationSecret extends pulumi.CustomResource {
|
|
|
139
141
|
resourceInputs["plaintextValue"] = args?.plaintextValue ? pulumi.secret(args.plaintextValue) : undefined;
|
|
140
142
|
resourceInputs["secretName"] = args?.secretName;
|
|
141
143
|
resourceInputs["selectedRepositoryIds"] = args?.selectedRepositoryIds;
|
|
144
|
+
resourceInputs["value"] = args?.value ? pulumi.secret(args.value) : undefined;
|
|
145
|
+
resourceInputs["valueEncrypted"] = args?.valueEncrypted ? pulumi.secret(args.valueEncrypted) : undefined;
|
|
142
146
|
resourceInputs["visibility"] = args?.visibility;
|
|
143
147
|
resourceInputs["createdAt"] = undefined /*out*/;
|
|
144
148
|
resourceInputs["remoteUpdatedAt"] = undefined /*out*/;
|
|
145
149
|
resourceInputs["updatedAt"] = undefined /*out*/;
|
|
146
150
|
}
|
|
147
151
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
148
|
-
const secretOpts = { additionalSecretOutputs: ["encryptedValue", "plaintextValue"] };
|
|
152
|
+
const secretOpts = { additionalSecretOutputs: ["encryptedValue", "plaintextValue", "value", "valueEncrypted"] };
|
|
149
153
|
opts = pulumi.mergeOptions(opts, secretOpts);
|
|
150
154
|
super(ActionsOrganizationSecret.__pulumiType, name, resourceInputs, opts);
|
|
151
155
|
}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"actionsOrganizationSecret.js","sourceRoot":"","sources":["../actionsOrganizationSecret.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAgFG;AACH,MAAa,yBAA0B,SAAQ,MAAM,CAAC,cAAc;IAChE;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAsC,EAAE,IAAmC;QACpI,OAAO,IAAI,yBAAyB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAChF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,yBAAyB,CAAC,YAAY,CAAC;IAC1E,CAAC;
|
|
1
|
+
{"version":3,"file":"actionsOrganizationSecret.js","sourceRoot":"","sources":["../actionsOrganizationSecret.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAgFG;AACH,MAAa,yBAA0B,SAAQ,MAAM,CAAC,cAAc;IAChE;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAsC,EAAE,IAAmC;QACpI,OAAO,IAAI,yBAAyB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAChF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,yBAAyB,CAAC,YAAY,CAAC;IAC1E,CAAC;IAqED,YAAY,IAAY,EAAE,WAA4E,EAAE,IAAmC;QACvI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAyD,CAAC;YACxE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,EAAE,eAAe,CAAC;YAC3D,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,EAAE,qBAAqB,CAAC;YACvE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;SACpD;aAAM;YACH,MAAM,IAAI,GAAG,WAAwD,CAAC;YACtE,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC;YACxD,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACzG,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC;YACtC,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACzG,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,EAAE,qBAAqB,CAAC;YACtE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACzG,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAChD,cAAc,CAAC,iBAAiB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACnD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,gBAAgB,EAAE,gBAAgB,EAAE,OAAO,EAAE,gBAAgB,CAAC,EAAE,CAAC;QAChH,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,yBAAyB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC9E,CAAC;;AAzIL,8DA0IC;AA5HG,gBAAgB;AACO,sCAAY,GAAG,kEAAkE,CAAC"}
|
|
@@ -13,7 +13,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
13
13
|
*
|
|
14
14
|
* const example = new github.ActionsOrganizationSecret("example", {
|
|
15
15
|
* secretName: "mysecret",
|
|
16
|
-
*
|
|
16
|
+
* value: "foo",
|
|
17
17
|
* visibility: "selected",
|
|
18
18
|
* });
|
|
19
19
|
* const exampleRepository = new github.Repository("example", {
|
|
@@ -19,7 +19,7 @@ const utilities = require("./utilities");
|
|
|
19
19
|
*
|
|
20
20
|
* const example = new github.ActionsOrganizationSecret("example", {
|
|
21
21
|
* secretName: "mysecret",
|
|
22
|
-
*
|
|
22
|
+
* value: "foo",
|
|
23
23
|
* visibility: "selected",
|
|
24
24
|
* });
|
|
25
25
|
* const exampleRepository = new github.Repository("example", {
|
|
@@ -13,7 +13,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
13
13
|
*
|
|
14
14
|
* const example = new github.ActionsOrganizationSecret("example", {
|
|
15
15
|
* secretName: "mysecret",
|
|
16
|
-
*
|
|
16
|
+
* value: "foo",
|
|
17
17
|
* visibility: "selected",
|
|
18
18
|
* });
|
|
19
19
|
* const exampleRepository = new github.Repository("example", {
|
|
@@ -19,7 +19,7 @@ const utilities = require("./utilities");
|
|
|
19
19
|
*
|
|
20
20
|
* const example = new github.ActionsOrganizationSecret("example", {
|
|
21
21
|
* secretName: "mysecret",
|
|
22
|
-
*
|
|
22
|
+
* value: "foo",
|
|
23
23
|
* visibility: "selected",
|
|
24
24
|
* });
|
|
25
25
|
* const exampleRepository = new github.Repository("example", {
|
|
@@ -13,7 +13,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
13
13
|
*
|
|
14
14
|
* const example = new github.ActionsOrganizationVariable("example", {
|
|
15
15
|
* variableName: "myvariable",
|
|
16
|
-
*
|
|
16
|
+
* value: "foo",
|
|
17
17
|
* visibility: "selected",
|
|
18
18
|
* });
|
|
19
19
|
* const exampleRepository = new github.Repository("example", {
|
|
@@ -19,7 +19,7 @@ const utilities = require("./utilities");
|
|
|
19
19
|
*
|
|
20
20
|
* const example = new github.ActionsOrganizationVariable("example", {
|
|
21
21
|
* variableName: "myvariable",
|
|
22
|
-
*
|
|
22
|
+
* value: "foo",
|
|
23
23
|
* visibility: "selected",
|
|
24
24
|
* });
|
|
25
25
|
* const exampleRepository = new github.Repository("example", {
|
|
@@ -13,7 +13,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
13
13
|
*
|
|
14
14
|
* const example = new github.ActionsOrganizationVariable("example", {
|
|
15
15
|
* variableName: "myvariable",
|
|
16
|
-
*
|
|
16
|
+
* value: "foo",
|
|
17
17
|
* visibility: "selected",
|
|
18
18
|
* });
|
|
19
19
|
* const exampleRepository = new github.Repository("example", {
|