@pulumi/github 6.13.0-alpha.1777011674 → 6.13.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (75) hide show
  1. package/actionsEnvironmentSecret.d.ts +52 -16
  2. package/actionsEnvironmentSecret.js +10 -6
  3. package/actionsEnvironmentSecret.js.map +1 -1
  4. package/actionsOrganizationPermissions.d.ts +3 -3
  5. package/actionsOrganizationSecret.d.ts +56 -20
  6. package/actionsOrganizationSecret.js +13 -9
  7. package/actionsOrganizationSecret.js.map +1 -1
  8. package/actionsOrganizationSecretRepositories.d.ts +1 -1
  9. package/actionsOrganizationSecretRepositories.js +1 -1
  10. package/actionsOrganizationSecretRepository.d.ts +1 -1
  11. package/actionsOrganizationSecretRepository.js +1 -1
  12. package/actionsOrganizationVariableRepositories.d.ts +1 -1
  13. package/actionsOrganizationVariableRepositories.js +1 -1
  14. package/actionsOrganizationVariableRepository.d.ts +1 -1
  15. package/actionsOrganizationVariableRepository.js +1 -1
  16. package/actionsRepositoryPermissions.d.ts +3 -3
  17. package/actionsSecret.d.ts +51 -15
  18. package/actionsSecret.js +11 -7
  19. package/actionsSecret.js.map +1 -1
  20. package/dependabotOrganizationSecret.d.ts +57 -15
  21. package/dependabotOrganizationSecret.js +11 -7
  22. package/dependabotOrganizationSecret.js.map +1 -1
  23. package/dependabotOrganizationSecretRepositories.d.ts +1 -1
  24. package/dependabotOrganizationSecretRepositories.js +1 -1
  25. package/dependabotOrganizationSecretRepository.d.ts +1 -1
  26. package/dependabotOrganizationSecretRepository.js +1 -1
  27. package/dependabotSecret.d.ts +54 -18
  28. package/dependabotSecret.js +11 -7
  29. package/dependabotSecret.js.map +1 -1
  30. package/emuGroupMapping.d.ts +12 -6
  31. package/emuGroupMapping.js +2 -2
  32. package/emuGroupMapping.js.map +1 -1
  33. package/enterpriseIpAllowListEntry.d.ts +125 -0
  34. package/enterpriseIpAllowListEntry.js +90 -0
  35. package/enterpriseIpAllowListEntry.js.map +1 -0
  36. package/getIpRanges.d.ts +28 -4
  37. package/getIpRanges.js.map +1 -1
  38. package/getOrganizationAppInstallations.d.ts +45 -0
  39. package/getOrganizationAppInstallations.js +46 -0
  40. package/getOrganizationAppInstallations.js.map +1 -0
  41. package/getRepository.d.ts +3 -1
  42. package/getRepository.js.map +1 -1
  43. package/getRepositoryPages.d.ts +96 -0
  44. package/getRepositoryPages.js +50 -0
  45. package/getRepositoryPages.js.map +1 -0
  46. package/index.d.ts +15 -0
  47. package/index.js +26 -5
  48. package/index.js.map +1 -1
  49. package/organizationRuleset.d.ts +38 -0
  50. package/organizationRuleset.js +38 -0
  51. package/organizationRuleset.js.map +1 -1
  52. package/package.json +2 -2
  53. package/repository.d.ts +28 -35
  54. package/repository.js +0 -19
  55. package/repository.js.map +1 -1
  56. package/repositoryCollaborators.d.ts +8 -8
  57. package/repositoryCollaborators.js +2 -8
  58. package/repositoryCollaborators.js.map +1 -1
  59. package/repositoryEnvironment.d.ts +13 -1
  60. package/repositoryEnvironment.js +7 -1
  61. package/repositoryEnvironment.js.map +1 -1
  62. package/repositoryEnvironmentDeploymentPolicy.d.ts +21 -1
  63. package/repositoryEnvironmentDeploymentPolicy.js +9 -1
  64. package/repositoryEnvironmentDeploymentPolicy.js.map +1 -1
  65. package/repositoryPages.d.ts +228 -0
  66. package/repositoryPages.js +150 -0
  67. package/repositoryPages.js.map +1 -0
  68. package/repositoryVulnerabilityAlerts.d.ts +98 -0
  69. package/repositoryVulnerabilityAlerts.js +86 -0
  70. package/repositoryVulnerabilityAlerts.js.map +1 -0
  71. package/teamSettings.d.ts +35 -12
  72. package/teamSettings.js +21 -8
  73. package/teamSettings.js.map +1 -1
  74. package/types/input.d.ts +52 -8
  75. package/types/output.d.ts +118 -8
@@ -19,7 +19,7 @@ const utilities = require("./utilities");
19
19
  *
20
20
  * const example = new github.ActionsOrganizationVariable("example", {
21
21
  * variableName: "myvariable",
22
- * plaintextValue: "foo",
22
+ * value: "foo",
23
23
  * visibility: "selected",
24
24
  * });
25
25
  * const exampleRepository = new github.Repository("example", {
@@ -67,7 +67,7 @@ export declare class ActionsRepositoryPermissions extends pulumi.CustomResource
67
67
  */
68
68
  readonly repository: pulumi.Output<string>;
69
69
  /**
70
- * Whether pinning to a specific SHA is required for all actions and reusable workflows in a repository.
70
+ * Whether pinning to a specific SHA is required for all actions and reusable workflows in the repository.
71
71
  */
72
72
  readonly shaPinningRequired: pulumi.Output<boolean>;
73
73
  /**
@@ -100,7 +100,7 @@ export interface ActionsRepositoryPermissionsState {
100
100
  */
101
101
  repository?: pulumi.Input<string>;
102
102
  /**
103
- * Whether pinning to a specific SHA is required for all actions and reusable workflows in a repository.
103
+ * Whether pinning to a specific SHA is required for all actions and reusable workflows in the repository.
104
104
  */
105
105
  shaPinningRequired?: pulumi.Input<boolean>;
106
106
  }
@@ -125,7 +125,7 @@ export interface ActionsRepositoryPermissionsArgs {
125
125
  */
126
126
  repository: pulumi.Input<string>;
127
127
  /**
128
- * Whether pinning to a specific SHA is required for all actions and reusable workflows in a repository.
128
+ * Whether pinning to a specific SHA is required for all actions and reusable workflows in the repository.
129
129
  */
130
130
  shaPinningRequired?: pulumi.Input<boolean>;
131
131
  }
@@ -6,9 +6,9 @@ import * as pulumi from "@pulumi/pulumi";
6
6
  * Secret values are encrypted using the [Go '/crypto/box' module](https://godoc.org/golang.org/x/crypto/nacl/box) which is
7
7
  * interoperable with [libsodium](https://libsodium.gitbook.io/doc/). Libsodium is used by GitHub to decrypt secret values.
8
8
  *
9
- * For the purposes of security, the contents of the `plaintextValue` field have been marked as `sensitive` to Terraform,
9
+ * For the purposes of security, the contents of the `value` field have been marked as `sensitive` to Terraform,
10
10
  * but it is important to note that **this does not hide it from state files**. You should treat state as sensitive always.
11
- * It is also advised that you do not store plaintext values in your code but rather populate the `encryptedValue`
11
+ * It is also advised that you do not store plaintext values in your code but rather populate the `valueEncrypted`
12
12
  * using fields from a resource, data source or variable as, while encrypted in state, these will be easily accessible
13
13
  * in your code. See below for an example of this abstraction.
14
14
  *
@@ -21,12 +21,12 @@ import * as pulumi from "@pulumi/pulumi";
21
21
  * const examplePlaintext = new github.ActionsSecret("example_plaintext", {
22
22
  * repository: "example_repository",
23
23
  * secretName: "example_secret_name",
24
- * plaintextValue: someSecretString,
24
+ * value: someSecretString,
25
25
  * });
26
26
  * const exampleEncrypted = new github.ActionsSecret("example_encrypted", {
27
27
  * repository: "example_repository",
28
28
  * secretName: "example_secret_name",
29
- * encryptedValue: someEncryptedSecretString,
29
+ * valueEncrypted: someEncryptedSecretString,
30
30
  * });
31
31
  * ```
32
32
  *
@@ -41,7 +41,7 @@ import * as pulumi from "@pulumi/pulumi";
41
41
  * const exampleAllowDrift = new github.ActionsSecret("example_allow_drift", {
42
42
  * repository: "example_repository",
43
43
  * secretName: "example_secret_name",
44
- * plaintextValue: "placeholder",
44
+ * value: "placeholder",
45
45
  * });
46
46
  * ```
47
47
  *
@@ -49,7 +49,7 @@ import * as pulumi from "@pulumi/pulumi";
49
49
  *
50
50
  * This resource can be imported using an ID made of the repository name, and secret name separated by a `:`.
51
51
  *
52
- * > **Note**: When importing secrets, the `plaintextValue` or `encryptedValue` fields will not be populated in the state. You may need to ignore changes for these as a workaround if you're not planning on updating the secret through Terraform.
52
+ * > **Note**: When importing secrets, the `value`, `valueEncrypted`, `encryptedValue`, or `plaintextValue` fields will not be populated in the state. You may need to ignore changes for these as a workaround if you're not planning on updating the secret through Terraform.
53
53
  *
54
54
  * ### Import Command
55
55
  *
@@ -88,15 +88,19 @@ export declare class ActionsSecret extends pulumi.CustomResource {
88
88
  */
89
89
  readonly destroyOnDrift: pulumi.Output<boolean | undefined>;
90
90
  /**
91
- * Encrypted value of the secret using the GitHub public key in Base64 format.
91
+ * (Optional) Please use `valueEncrypted`.
92
+ *
93
+ * @deprecated Use valueEncrypted and key_id.
92
94
  */
93
95
  readonly encryptedValue: pulumi.Output<string | undefined>;
94
96
  /**
95
- * ID of the public key used to encrypt the secret. This should be provided when setting `encryptedValue`; if it isn't then the current public key will be looked up, which could cause a missmatch. This conflicts with `plaintextValue`.
97
+ * ID of the public key used to encrypt the secret, required when setting `encryptedValue`.
96
98
  */
97
99
  readonly keyId: pulumi.Output<string>;
98
100
  /**
99
- * Plaintext value of the secret to be encrypted.
101
+ * (Optional) Please use `value`.
102
+ *
103
+ * @deprecated Use value.
100
104
  */
101
105
  readonly plaintextValue: pulumi.Output<string | undefined>;
102
106
  /**
@@ -119,6 +123,14 @@ export declare class ActionsSecret extends pulumi.CustomResource {
119
123
  * Date the secret was last updated by the provider.
120
124
  */
121
125
  readonly updatedAt: pulumi.Output<string>;
126
+ /**
127
+ * Plaintext value of the secret to be encrypted. This conflicts with `valueEncrypted`, `encryptedValue` & `plaintextValue`.
128
+ */
129
+ readonly value: pulumi.Output<string | undefined>;
130
+ /**
131
+ * Encrypted value of the secret using the GitHub public key in Base64 format, `keyId` is required with this value. This conflicts with `value`, `encryptedValue` & `plaintextValue`.
132
+ */
133
+ readonly valueEncrypted: pulumi.Output<string | undefined>;
122
134
  /**
123
135
  * Create a ActionsSecret resource with the given unique name, arguments, and options.
124
136
  *
@@ -145,15 +157,19 @@ export interface ActionsSecretState {
145
157
  */
146
158
  destroyOnDrift?: pulumi.Input<boolean>;
147
159
  /**
148
- * Encrypted value of the secret using the GitHub public key in Base64 format.
160
+ * (Optional) Please use `valueEncrypted`.
161
+ *
162
+ * @deprecated Use valueEncrypted and key_id.
149
163
  */
150
164
  encryptedValue?: pulumi.Input<string>;
151
165
  /**
152
- * ID of the public key used to encrypt the secret. This should be provided when setting `encryptedValue`; if it isn't then the current public key will be looked up, which could cause a missmatch. This conflicts with `plaintextValue`.
166
+ * ID of the public key used to encrypt the secret, required when setting `encryptedValue`.
153
167
  */
154
168
  keyId?: pulumi.Input<string>;
155
169
  /**
156
- * Plaintext value of the secret to be encrypted.
170
+ * (Optional) Please use `value`.
171
+ *
172
+ * @deprecated Use value.
157
173
  */
158
174
  plaintextValue?: pulumi.Input<string>;
159
175
  /**
@@ -176,6 +192,14 @@ export interface ActionsSecretState {
176
192
  * Date the secret was last updated by the provider.
177
193
  */
178
194
  updatedAt?: pulumi.Input<string>;
195
+ /**
196
+ * Plaintext value of the secret to be encrypted. This conflicts with `valueEncrypted`, `encryptedValue` & `plaintextValue`.
197
+ */
198
+ value?: pulumi.Input<string>;
199
+ /**
200
+ * Encrypted value of the secret using the GitHub public key in Base64 format, `keyId` is required with this value. This conflicts with `value`, `encryptedValue` & `plaintextValue`.
201
+ */
202
+ valueEncrypted?: pulumi.Input<string>;
179
203
  }
180
204
  /**
181
205
  * The set of arguments for constructing a ActionsSecret resource.
@@ -190,15 +214,19 @@ export interface ActionsSecretArgs {
190
214
  */
191
215
  destroyOnDrift?: pulumi.Input<boolean>;
192
216
  /**
193
- * Encrypted value of the secret using the GitHub public key in Base64 format.
217
+ * (Optional) Please use `valueEncrypted`.
218
+ *
219
+ * @deprecated Use valueEncrypted and key_id.
194
220
  */
195
221
  encryptedValue?: pulumi.Input<string>;
196
222
  /**
197
- * ID of the public key used to encrypt the secret. This should be provided when setting `encryptedValue`; if it isn't then the current public key will be looked up, which could cause a missmatch. This conflicts with `plaintextValue`.
223
+ * ID of the public key used to encrypt the secret, required when setting `encryptedValue`.
198
224
  */
199
225
  keyId?: pulumi.Input<string>;
200
226
  /**
201
- * Plaintext value of the secret to be encrypted.
227
+ * (Optional) Please use `value`.
228
+ *
229
+ * @deprecated Use value.
202
230
  */
203
231
  plaintextValue?: pulumi.Input<string>;
204
232
  /**
@@ -209,4 +237,12 @@ export interface ActionsSecretArgs {
209
237
  * Name of the secret.
210
238
  */
211
239
  secretName: pulumi.Input<string>;
240
+ /**
241
+ * Plaintext value of the secret to be encrypted. This conflicts with `valueEncrypted`, `encryptedValue` & `plaintextValue`.
242
+ */
243
+ value?: pulumi.Input<string>;
244
+ /**
245
+ * Encrypted value of the secret using the GitHub public key in Base64 format, `keyId` is required with this value. This conflicts with `value`, `encryptedValue` & `plaintextValue`.
246
+ */
247
+ valueEncrypted?: pulumi.Input<string>;
212
248
  }
package/actionsSecret.js CHANGED
@@ -12,9 +12,9 @@ const utilities = require("./utilities");
12
12
  * Secret values are encrypted using the [Go '/crypto/box' module](https://godoc.org/golang.org/x/crypto/nacl/box) which is
13
13
  * interoperable with [libsodium](https://libsodium.gitbook.io/doc/). Libsodium is used by GitHub to decrypt secret values.
14
14
  *
15
- * For the purposes of security, the contents of the `plaintextValue` field have been marked as `sensitive` to Terraform,
15
+ * For the purposes of security, the contents of the `value` field have been marked as `sensitive` to Terraform,
16
16
  * but it is important to note that **this does not hide it from state files**. You should treat state as sensitive always.
17
- * It is also advised that you do not store plaintext values in your code but rather populate the `encryptedValue`
17
+ * It is also advised that you do not store plaintext values in your code but rather populate the `valueEncrypted`
18
18
  * using fields from a resource, data source or variable as, while encrypted in state, these will be easily accessible
19
19
  * in your code. See below for an example of this abstraction.
20
20
  *
@@ -27,12 +27,12 @@ const utilities = require("./utilities");
27
27
  * const examplePlaintext = new github.ActionsSecret("example_plaintext", {
28
28
  * repository: "example_repository",
29
29
  * secretName: "example_secret_name",
30
- * plaintextValue: someSecretString,
30
+ * value: someSecretString,
31
31
  * });
32
32
  * const exampleEncrypted = new github.ActionsSecret("example_encrypted", {
33
33
  * repository: "example_repository",
34
34
  * secretName: "example_secret_name",
35
- * encryptedValue: someEncryptedSecretString,
35
+ * valueEncrypted: someEncryptedSecretString,
36
36
  * });
37
37
  * ```
38
38
  *
@@ -47,7 +47,7 @@ const utilities = require("./utilities");
47
47
  * const exampleAllowDrift = new github.ActionsSecret("example_allow_drift", {
48
48
  * repository: "example_repository",
49
49
  * secretName: "example_secret_name",
50
- * plaintextValue: "placeholder",
50
+ * value: "placeholder",
51
51
  * });
52
52
  * ```
53
53
  *
@@ -55,7 +55,7 @@ const utilities = require("./utilities");
55
55
  *
56
56
  * This resource can be imported using an ID made of the repository name, and secret name separated by a `:`.
57
57
  *
58
- * > **Note**: When importing secrets, the `plaintextValue` or `encryptedValue` fields will not be populated in the state. You may need to ignore changes for these as a workaround if you're not planning on updating the secret through Terraform.
58
+ * > **Note**: When importing secrets, the `value`, `valueEncrypted`, `encryptedValue`, or `plaintextValue` fields will not be populated in the state. You may need to ignore changes for these as a workaround if you're not planning on updating the secret through Terraform.
59
59
  *
60
60
  * ### Import Command
61
61
  *
@@ -103,6 +103,8 @@ class ActionsSecret extends pulumi.CustomResource {
103
103
  resourceInputs["repositoryId"] = state?.repositoryId;
104
104
  resourceInputs["secretName"] = state?.secretName;
105
105
  resourceInputs["updatedAt"] = state?.updatedAt;
106
+ resourceInputs["value"] = state?.value;
107
+ resourceInputs["valueEncrypted"] = state?.valueEncrypted;
106
108
  }
107
109
  else {
108
110
  const args = argsOrState;
@@ -118,13 +120,15 @@ class ActionsSecret extends pulumi.CustomResource {
118
120
  resourceInputs["plaintextValue"] = args?.plaintextValue ? pulumi.secret(args.plaintextValue) : undefined;
119
121
  resourceInputs["repository"] = args?.repository;
120
122
  resourceInputs["secretName"] = args?.secretName;
123
+ resourceInputs["value"] = args?.value ? pulumi.secret(args.value) : undefined;
124
+ resourceInputs["valueEncrypted"] = args?.valueEncrypted ? pulumi.secret(args.valueEncrypted) : undefined;
121
125
  resourceInputs["createdAt"] = undefined /*out*/;
122
126
  resourceInputs["remoteUpdatedAt"] = undefined /*out*/;
123
127
  resourceInputs["repositoryId"] = undefined /*out*/;
124
128
  resourceInputs["updatedAt"] = undefined /*out*/;
125
129
  }
126
130
  opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
127
- const secretOpts = { additionalSecretOutputs: ["encryptedValue", "plaintextValue"] };
131
+ const secretOpts = { additionalSecretOutputs: ["encryptedValue", "plaintextValue", "value", "valueEncrypted"] };
128
132
  opts = pulumi.mergeOptions(opts, secretOpts);
129
133
  super(ActionsSecret.__pulumiType, name, resourceInputs, opts);
130
134
  }
@@ -1 +1 @@
1
- {"version":3,"file":"actionsSecret.js","sourceRoot":"","sources":["../actionsSecret.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2DG;AACH,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;IACpD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA0B,EAAE,IAAmC;QACxH,OAAO,IAAI,aAAa,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACpE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,aAAa,CAAC,YAAY,CAAC;IAC9D,CAAC;IAuDD,YAAY,IAAY,EAAE,WAAoD,EAAE,IAAmC;QAC/G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA6C,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,EAAE,eAAe,CAAC;YAC3D,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;SAClD;aAAM;YACH,MAAM,IAAI,GAAG,WAA4C,CAAC;YAC1D,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC;YACxD,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACzG,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC;YACtC,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACzG,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAChD,cAAc,CAAC,iBAAiB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACtD,cAAc,CAAC,cAAc,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACnD,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACnD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,gBAAgB,EAAE,gBAAgB,CAAC,EAAE,CAAC;QACrF,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAClE,CAAC;;AAvHL,sCAwHC;AA1GG,gBAAgB;AACO,0BAAY,GAAG,0CAA0C,CAAC"}
1
+ {"version":3,"file":"actionsSecret.js","sourceRoot":"","sources":["../actionsSecret.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2DG;AACH,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;IACpD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA0B,EAAE,IAAmC;QACxH,OAAO,IAAI,aAAa,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACpE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,aAAa,CAAC,YAAY,CAAC;IAC9D,CAAC;IAmED,YAAY,IAAY,EAAE,WAAoD,EAAE,IAAmC;QAC/G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA6C,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,EAAE,eAAe,CAAC;YAC3D,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;SAC5D;aAAM;YACH,MAAM,IAAI,GAAG,WAA4C,CAAC;YAC1D,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC;YACxD,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACzG,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC;YACtC,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACzG,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACzG,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAChD,cAAc,CAAC,iBAAiB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACtD,cAAc,CAAC,cAAc,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACnD,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACnD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,gBAAgB,EAAE,gBAAgB,EAAE,OAAO,EAAE,gBAAgB,CAAC,EAAE,CAAC;QAChH,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAClE,CAAC;;AAvIL,sCAwIC;AA1HG,gBAAgB;AACO,0BAAY,GAAG,0CAA0C,CAAC"}
@@ -6,9 +6,9 @@ import * as pulumi from "@pulumi/pulumi";
6
6
  * Secret values are encrypted using the [Go '/crypto/box' module](https://godoc.org/golang.org/x/crypto/nacl/box) which is
7
7
  * interoperable with [libsodium](https://libsodium.gitbook.io/doc/). Libsodium is used by GitHub to decrypt secret values.
8
8
  *
9
- * For the purposes of security, the contents of the `plaintextValue` field have been marked as `sensitive` to Terraform,
9
+ * For the purposes of security, the contents of the `value` field have been marked as `sensitive` to Terraform,
10
10
  * but it is important to note that **this does not hide it from state files**. You should treat state as sensitive always.
11
- * It is also advised that you do not store plaintext values in your code but rather populate the `encryptedValue`
11
+ * It is also advised that you do not store plaintext values in your code but rather populate the `valueEncrypted`
12
12
  * using fields from a resource, data source or variable as, while encrypted in state, these will be easily accessible
13
13
  * in your code. See below for an example of this abstraction.
14
14
  *
@@ -21,12 +21,12 @@ import * as pulumi from "@pulumi/pulumi";
21
21
  * const examplePlaintext = new github.DependabotOrganizationSecret("example_plaintext", {
22
22
  * secretName: "example_secret_name",
23
23
  * visibility: "all",
24
- * plaintextValue: someSecretString,
24
+ * value: someSecretString,
25
25
  * });
26
26
  * const exampleSecret = new github.DependabotOrganizationSecret("example_secret", {
27
27
  * secretName: "example_secret_name",
28
28
  * visibility: "all",
29
- * encryptedValue: someEncryptedSecretString,
29
+ * valueEncrypted: someEncryptedSecretString,
30
30
  * });
31
31
  * ```
32
32
  *
@@ -40,13 +40,13 @@ import * as pulumi from "@pulumi/pulumi";
40
40
  * const examplePlaintext = new github.DependabotOrganizationSecret("example_plaintext", {
41
41
  * secretName: "example_secret_name",
42
42
  * visibility: "selected",
43
- * plaintextValue: someSecretString,
43
+ * value: someSecretString,
44
44
  * selectedRepositoryIds: [repo.then(repo => repo.repoId)],
45
45
  * });
46
46
  * const exampleEncrypted = new github.DependabotOrganizationSecret("example_encrypted", {
47
47
  * secretName: "example_secret_name",
48
48
  * visibility: "selected",
49
- * encryptedValue: someEncryptedSecretString,
49
+ * valueEncrypted: someEncryptedSecretString,
50
50
  * selectedRepositoryIds: [repo.then(repo => repo.repoId)],
51
51
  * });
52
52
  * ```
@@ -80,15 +80,19 @@ export declare class DependabotOrganizationSecret extends pulumi.CustomResource
80
80
  */
81
81
  readonly createdAt: pulumi.Output<string>;
82
82
  /**
83
- * Encrypted value of the secret using the GitHub public key in Base64 format.
83
+ * (Optional) Please use `valueEncrypted`.
84
+ *
85
+ * @deprecated Use valueEncrypted and key_id.
84
86
  */
85
87
  readonly encryptedValue: pulumi.Output<string | undefined>;
86
88
  /**
87
- * ID of the public key used to encrypt the secret. This should be provided when setting `encryptedValue`; if it isn't then the current public key will be looked up, which could cause a missmatch. This conflicts with `plaintextValue`.
89
+ * ID of the public key used to encrypt the secret, required when setting `encryptedValue`.
88
90
  */
89
91
  readonly keyId: pulumi.Output<string>;
90
92
  /**
91
- * Plaintext value of the secret to be encrypted.
93
+ * (Optional) Please use `value`.
94
+ *
95
+ * @deprecated Use value.
92
96
  */
93
97
  readonly plaintextValue: pulumi.Output<string | undefined>;
94
98
  /**
@@ -102,6 +106,8 @@ export declare class DependabotOrganizationSecret extends pulumi.CustomResource
102
106
  /**
103
107
  * An array of repository IDs that can access the organization variable; this requires `visibility` to be set to `selected`.
104
108
  *
109
+ * > **Note**: One of either `value`, `valueEncrypted`, `encryptedValue`, or `plaintextValue` must be specified.
110
+ *
105
111
  * @deprecated This field is deprecated and will be removed in a future release. Please use the `github.DependabotOrganizationSecretRepositories` or `github.DependabotOrganizationSecretRepository` resources to manage repository access to organization secrets.
106
112
  */
107
113
  readonly selectedRepositoryIds: pulumi.Output<number[] | undefined>;
@@ -109,6 +115,14 @@ export declare class DependabotOrganizationSecret extends pulumi.CustomResource
109
115
  * Date the secret was last updated by the provider.
110
116
  */
111
117
  readonly updatedAt: pulumi.Output<string>;
118
+ /**
119
+ * Plaintext value of the secret to be encrypted. This conflicts with `valueEncrypted`, `encryptedValue` & `plaintextValue`.
120
+ */
121
+ readonly value: pulumi.Output<string | undefined>;
122
+ /**
123
+ * Encrypted value of the secret using the GitHub public key in Base64 format, `keyId` is required with this value. This conflicts with `value`, `encryptedValue` & `plaintextValue`.
124
+ */
125
+ readonly valueEncrypted: pulumi.Output<string | undefined>;
112
126
  /**
113
127
  * Configures the access that repositories have to the organization secret; must be one of `all`, `private`, or `selected`.
114
128
  */
@@ -131,15 +145,19 @@ export interface DependabotOrganizationSecretState {
131
145
  */
132
146
  createdAt?: pulumi.Input<string>;
133
147
  /**
134
- * Encrypted value of the secret using the GitHub public key in Base64 format.
148
+ * (Optional) Please use `valueEncrypted`.
149
+ *
150
+ * @deprecated Use valueEncrypted and key_id.
135
151
  */
136
152
  encryptedValue?: pulumi.Input<string>;
137
153
  /**
138
- * ID of the public key used to encrypt the secret. This should be provided when setting `encryptedValue`; if it isn't then the current public key will be looked up, which could cause a missmatch. This conflicts with `plaintextValue`.
154
+ * ID of the public key used to encrypt the secret, required when setting `encryptedValue`.
139
155
  */
140
156
  keyId?: pulumi.Input<string>;
141
157
  /**
142
- * Plaintext value of the secret to be encrypted.
158
+ * (Optional) Please use `value`.
159
+ *
160
+ * @deprecated Use value.
143
161
  */
144
162
  plaintextValue?: pulumi.Input<string>;
145
163
  /**
@@ -153,6 +171,8 @@ export interface DependabotOrganizationSecretState {
153
171
  /**
154
172
  * An array of repository IDs that can access the organization variable; this requires `visibility` to be set to `selected`.
155
173
  *
174
+ * > **Note**: One of either `value`, `valueEncrypted`, `encryptedValue`, or `plaintextValue` must be specified.
175
+ *
156
176
  * @deprecated This field is deprecated and will be removed in a future release. Please use the `github.DependabotOrganizationSecretRepositories` or `github.DependabotOrganizationSecretRepository` resources to manage repository access to organization secrets.
157
177
  */
158
178
  selectedRepositoryIds?: pulumi.Input<pulumi.Input<number>[]>;
@@ -160,6 +180,14 @@ export interface DependabotOrganizationSecretState {
160
180
  * Date the secret was last updated by the provider.
161
181
  */
162
182
  updatedAt?: pulumi.Input<string>;
183
+ /**
184
+ * Plaintext value of the secret to be encrypted. This conflicts with `valueEncrypted`, `encryptedValue` & `plaintextValue`.
185
+ */
186
+ value?: pulumi.Input<string>;
187
+ /**
188
+ * Encrypted value of the secret using the GitHub public key in Base64 format, `keyId` is required with this value. This conflicts with `value`, `encryptedValue` & `plaintextValue`.
189
+ */
190
+ valueEncrypted?: pulumi.Input<string>;
163
191
  /**
164
192
  * Configures the access that repositories have to the organization secret; must be one of `all`, `private`, or `selected`.
165
193
  */
@@ -170,15 +198,19 @@ export interface DependabotOrganizationSecretState {
170
198
  */
171
199
  export interface DependabotOrganizationSecretArgs {
172
200
  /**
173
- * Encrypted value of the secret using the GitHub public key in Base64 format.
201
+ * (Optional) Please use `valueEncrypted`.
202
+ *
203
+ * @deprecated Use valueEncrypted and key_id.
174
204
  */
175
205
  encryptedValue?: pulumi.Input<string>;
176
206
  /**
177
- * ID of the public key used to encrypt the secret. This should be provided when setting `encryptedValue`; if it isn't then the current public key will be looked up, which could cause a missmatch. This conflicts with `plaintextValue`.
207
+ * ID of the public key used to encrypt the secret, required when setting `encryptedValue`.
178
208
  */
179
209
  keyId?: pulumi.Input<string>;
180
210
  /**
181
- * Plaintext value of the secret to be encrypted.
211
+ * (Optional) Please use `value`.
212
+ *
213
+ * @deprecated Use value.
182
214
  */
183
215
  plaintextValue?: pulumi.Input<string>;
184
216
  /**
@@ -188,9 +220,19 @@ export interface DependabotOrganizationSecretArgs {
188
220
  /**
189
221
  * An array of repository IDs that can access the organization variable; this requires `visibility` to be set to `selected`.
190
222
  *
223
+ * > **Note**: One of either `value`, `valueEncrypted`, `encryptedValue`, or `plaintextValue` must be specified.
224
+ *
191
225
  * @deprecated This field is deprecated and will be removed in a future release. Please use the `github.DependabotOrganizationSecretRepositories` or `github.DependabotOrganizationSecretRepository` resources to manage repository access to organization secrets.
192
226
  */
193
227
  selectedRepositoryIds?: pulumi.Input<pulumi.Input<number>[]>;
228
+ /**
229
+ * Plaintext value of the secret to be encrypted. This conflicts with `valueEncrypted`, `encryptedValue` & `plaintextValue`.
230
+ */
231
+ value?: pulumi.Input<string>;
232
+ /**
233
+ * Encrypted value of the secret using the GitHub public key in Base64 format, `keyId` is required with this value. This conflicts with `value`, `encryptedValue` & `plaintextValue`.
234
+ */
235
+ valueEncrypted?: pulumi.Input<string>;
194
236
  /**
195
237
  * Configures the access that repositories have to the organization secret; must be one of `all`, `private`, or `selected`.
196
238
  */
@@ -12,9 +12,9 @@ const utilities = require("./utilities");
12
12
  * Secret values are encrypted using the [Go '/crypto/box' module](https://godoc.org/golang.org/x/crypto/nacl/box) which is
13
13
  * interoperable with [libsodium](https://libsodium.gitbook.io/doc/). Libsodium is used by GitHub to decrypt secret values.
14
14
  *
15
- * For the purposes of security, the contents of the `plaintextValue` field have been marked as `sensitive` to Terraform,
15
+ * For the purposes of security, the contents of the `value` field have been marked as `sensitive` to Terraform,
16
16
  * but it is important to note that **this does not hide it from state files**. You should treat state as sensitive always.
17
- * It is also advised that you do not store plaintext values in your code but rather populate the `encryptedValue`
17
+ * It is also advised that you do not store plaintext values in your code but rather populate the `valueEncrypted`
18
18
  * using fields from a resource, data source or variable as, while encrypted in state, these will be easily accessible
19
19
  * in your code. See below for an example of this abstraction.
20
20
  *
@@ -27,12 +27,12 @@ const utilities = require("./utilities");
27
27
  * const examplePlaintext = new github.DependabotOrganizationSecret("example_plaintext", {
28
28
  * secretName: "example_secret_name",
29
29
  * visibility: "all",
30
- * plaintextValue: someSecretString,
30
+ * value: someSecretString,
31
31
  * });
32
32
  * const exampleSecret = new github.DependabotOrganizationSecret("example_secret", {
33
33
  * secretName: "example_secret_name",
34
34
  * visibility: "all",
35
- * encryptedValue: someEncryptedSecretString,
35
+ * valueEncrypted: someEncryptedSecretString,
36
36
  * });
37
37
  * ```
38
38
  *
@@ -46,13 +46,13 @@ const utilities = require("./utilities");
46
46
  * const examplePlaintext = new github.DependabotOrganizationSecret("example_plaintext", {
47
47
  * secretName: "example_secret_name",
48
48
  * visibility: "selected",
49
- * plaintextValue: someSecretString,
49
+ * value: someSecretString,
50
50
  * selectedRepositoryIds: [repo.then(repo => repo.repoId)],
51
51
  * });
52
52
  * const exampleEncrypted = new github.DependabotOrganizationSecret("example_encrypted", {
53
53
  * secretName: "example_secret_name",
54
54
  * visibility: "selected",
55
- * encryptedValue: someEncryptedSecretString,
55
+ * valueEncrypted: someEncryptedSecretString,
56
56
  * selectedRepositoryIds: [repo.then(repo => repo.repoId)],
57
57
  * });
58
58
  * ```
@@ -101,6 +101,8 @@ class DependabotOrganizationSecret extends pulumi.CustomResource {
101
101
  resourceInputs["secretName"] = state?.secretName;
102
102
  resourceInputs["selectedRepositoryIds"] = state?.selectedRepositoryIds;
103
103
  resourceInputs["updatedAt"] = state?.updatedAt;
104
+ resourceInputs["value"] = state?.value;
105
+ resourceInputs["valueEncrypted"] = state?.valueEncrypted;
104
106
  resourceInputs["visibility"] = state?.visibility;
105
107
  }
106
108
  else {
@@ -116,13 +118,15 @@ class DependabotOrganizationSecret extends pulumi.CustomResource {
116
118
  resourceInputs["plaintextValue"] = args?.plaintextValue ? pulumi.secret(args.plaintextValue) : undefined;
117
119
  resourceInputs["secretName"] = args?.secretName;
118
120
  resourceInputs["selectedRepositoryIds"] = args?.selectedRepositoryIds;
121
+ resourceInputs["value"] = args?.value ? pulumi.secret(args.value) : undefined;
122
+ resourceInputs["valueEncrypted"] = args?.valueEncrypted ? pulumi.secret(args.valueEncrypted) : undefined;
119
123
  resourceInputs["visibility"] = args?.visibility;
120
124
  resourceInputs["createdAt"] = undefined /*out*/;
121
125
  resourceInputs["remoteUpdatedAt"] = undefined /*out*/;
122
126
  resourceInputs["updatedAt"] = undefined /*out*/;
123
127
  }
124
128
  opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
125
- const secretOpts = { additionalSecretOutputs: ["encryptedValue", "plaintextValue"] };
129
+ const secretOpts = { additionalSecretOutputs: ["encryptedValue", "plaintextValue", "value", "valueEncrypted"] };
126
130
  opts = pulumi.mergeOptions(opts, secretOpts);
127
131
  super(DependabotOrganizationSecret.__pulumiType, name, resourceInputs, opts);
128
132
  }
@@ -1 +1 @@
1
- {"version":3,"file":"dependabotOrganizationSecret.js","sourceRoot":"","sources":["../dependabotOrganizationSecret.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2DG;AACH,MAAa,4BAA6B,SAAQ,MAAM,CAAC,cAAc;IACnE;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAyC,EAAE,IAAmC;QACvI,OAAO,IAAI,4BAA4B,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACnF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,4BAA4B,CAAC,YAAY,CAAC;IAC7E,CAAC;IAiDD,YAAY,IAAY,EAAE,WAAkF,EAAE,IAAmC;QAC7I,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA4D,CAAC;YAC3E,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,EAAE,eAAe,CAAC;YAC3D,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,EAAE,qBAAqB,CAAC;YACvE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;SACpD;aAAM;YACH,MAAM,IAAI,GAAG,WAA2D,CAAC;YACzE,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACzG,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC;YACtC,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACzG,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,EAAE,qBAAqB,CAAC;YACtE,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAChD,cAAc,CAAC,iBAAiB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACnD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,gBAAgB,EAAE,gBAAgB,CAAC,EAAE,CAAC;QACrF,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,4BAA4B,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACjF,CAAC;;AA/GL,oEAgHC;AAlGG,gBAAgB;AACO,yCAAY,GAAG,wEAAwE,CAAC"}
1
+ {"version":3,"file":"dependabotOrganizationSecret.js","sourceRoot":"","sources":["../dependabotOrganizationSecret.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2DG;AACH,MAAa,4BAA6B,SAAQ,MAAM,CAAC,cAAc;IACnE;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAyC,EAAE,IAAmC;QACvI,OAAO,IAAI,4BAA4B,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACnF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,4BAA4B,CAAC,YAAY,CAAC;IAC7E,CAAC;IA+DD,YAAY,IAAY,EAAE,WAAkF,EAAE,IAAmC;QAC7I,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA4D,CAAC;YAC3E,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,EAAE,eAAe,CAAC;YAC3D,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,EAAE,qBAAqB,CAAC;YACvE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;SACpD;aAAM;YACH,MAAM,IAAI,GAAG,WAA2D,CAAC;YACzE,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACzG,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC;YACtC,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACzG,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,EAAE,qBAAqB,CAAC;YACtE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACzG,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAChD,cAAc,CAAC,iBAAiB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACnD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,gBAAgB,EAAE,gBAAgB,EAAE,OAAO,EAAE,gBAAgB,CAAC,EAAE,CAAC;QAChH,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,4BAA4B,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACjF,CAAC;;AAjIL,oEAkIC;AApHG,gBAAgB;AACO,yCAAY,GAAG,wEAAwE,CAAC"}
@@ -13,7 +13,7 @@ import * as pulumi from "@pulumi/pulumi";
13
13
  *
14
14
  * const example = new github.DependabotOrganizationSecret("example", {
15
15
  * secretName: "mysecret",
16
- * plaintextValue: "foo",
16
+ * value: "foo",
17
17
  * visibility: "selected",
18
18
  * });
19
19
  * const exampleRepository = new github.Repository("example", {
@@ -19,7 +19,7 @@ const utilities = require("./utilities");
19
19
  *
20
20
  * const example = new github.DependabotOrganizationSecret("example", {
21
21
  * secretName: "mysecret",
22
- * plaintextValue: "foo",
22
+ * value: "foo",
23
23
  * visibility: "selected",
24
24
  * });
25
25
  * const exampleRepository = new github.Repository("example", {
@@ -13,7 +13,7 @@ import * as pulumi from "@pulumi/pulumi";
13
13
  *
14
14
  * const example = new github.DependabotOrganizationSecret("example", {
15
15
  * secretName: "mysecret",
16
- * plaintextValue: "foo",
16
+ * value: "foo",
17
17
  * visibility: "selected",
18
18
  * });
19
19
  * const exampleRepository = new github.Repository("example", {
@@ -19,7 +19,7 @@ const utilities = require("./utilities");
19
19
  *
20
20
  * const example = new github.DependabotOrganizationSecret("example", {
21
21
  * secretName: "mysecret",
22
- * plaintextValue: "foo",
22
+ * value: "foo",
23
23
  * visibility: "selected",
24
24
  * });
25
25
  * const exampleRepository = new github.Repository("example", {