@pulumi/github 6.13.0-alpha.1777011674 → 6.13.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/actionsEnvironmentSecret.d.ts +52 -16
- package/actionsEnvironmentSecret.js +10 -6
- package/actionsEnvironmentSecret.js.map +1 -1
- package/actionsOrganizationPermissions.d.ts +3 -3
- package/actionsOrganizationSecret.d.ts +56 -20
- package/actionsOrganizationSecret.js +13 -9
- package/actionsOrganizationSecret.js.map +1 -1
- package/actionsOrganizationSecretRepositories.d.ts +1 -1
- package/actionsOrganizationSecretRepositories.js +1 -1
- package/actionsOrganizationSecretRepository.d.ts +1 -1
- package/actionsOrganizationSecretRepository.js +1 -1
- package/actionsOrganizationVariableRepositories.d.ts +1 -1
- package/actionsOrganizationVariableRepositories.js +1 -1
- package/actionsOrganizationVariableRepository.d.ts +1 -1
- package/actionsOrganizationVariableRepository.js +1 -1
- package/actionsRepositoryPermissions.d.ts +3 -3
- package/actionsSecret.d.ts +51 -15
- package/actionsSecret.js +11 -7
- package/actionsSecret.js.map +1 -1
- package/dependabotOrganizationSecret.d.ts +57 -15
- package/dependabotOrganizationSecret.js +11 -7
- package/dependabotOrganizationSecret.js.map +1 -1
- package/dependabotOrganizationSecretRepositories.d.ts +1 -1
- package/dependabotOrganizationSecretRepositories.js +1 -1
- package/dependabotOrganizationSecretRepository.d.ts +1 -1
- package/dependabotOrganizationSecretRepository.js +1 -1
- package/dependabotSecret.d.ts +54 -18
- package/dependabotSecret.js +11 -7
- package/dependabotSecret.js.map +1 -1
- package/emuGroupMapping.d.ts +12 -6
- package/emuGroupMapping.js +2 -2
- package/emuGroupMapping.js.map +1 -1
- package/enterpriseIpAllowListEntry.d.ts +125 -0
- package/enterpriseIpAllowListEntry.js +90 -0
- package/enterpriseIpAllowListEntry.js.map +1 -0
- package/getIpRanges.d.ts +28 -4
- package/getIpRanges.js.map +1 -1
- package/getOrganizationAppInstallations.d.ts +45 -0
- package/getOrganizationAppInstallations.js +46 -0
- package/getOrganizationAppInstallations.js.map +1 -0
- package/getRepository.d.ts +3 -1
- package/getRepository.js.map +1 -1
- package/getRepositoryPages.d.ts +96 -0
- package/getRepositoryPages.js +50 -0
- package/getRepositoryPages.js.map +1 -0
- package/index.d.ts +15 -0
- package/index.js +26 -5
- package/index.js.map +1 -1
- package/organizationRuleset.d.ts +38 -0
- package/organizationRuleset.js +38 -0
- package/organizationRuleset.js.map +1 -1
- package/package.json +2 -2
- package/repository.d.ts +28 -35
- package/repository.js +0 -19
- package/repository.js.map +1 -1
- package/repositoryCollaborators.d.ts +8 -8
- package/repositoryCollaborators.js +2 -8
- package/repositoryCollaborators.js.map +1 -1
- package/repositoryEnvironment.d.ts +13 -1
- package/repositoryEnvironment.js +7 -1
- package/repositoryEnvironment.js.map +1 -1
- package/repositoryEnvironmentDeploymentPolicy.d.ts +21 -1
- package/repositoryEnvironmentDeploymentPolicy.js +9 -1
- package/repositoryEnvironmentDeploymentPolicy.js.map +1 -1
- package/repositoryPages.d.ts +228 -0
- package/repositoryPages.js +150 -0
- package/repositoryPages.js.map +1 -0
- package/repositoryVulnerabilityAlerts.d.ts +98 -0
- package/repositoryVulnerabilityAlerts.js +86 -0
- package/repositoryVulnerabilityAlerts.js.map +1 -0
- package/teamSettings.d.ts +35 -12
- package/teamSettings.js +21 -8
- package/teamSettings.js.map +1 -1
- package/types/input.d.ts +52 -8
- package/types/output.d.ts +118 -8
|
@@ -19,7 +19,7 @@ const utilities = require("./utilities");
|
|
|
19
19
|
*
|
|
20
20
|
* const example = new github.ActionsOrganizationVariable("example", {
|
|
21
21
|
* variableName: "myvariable",
|
|
22
|
-
*
|
|
22
|
+
* value: "foo",
|
|
23
23
|
* visibility: "selected",
|
|
24
24
|
* });
|
|
25
25
|
* const exampleRepository = new github.Repository("example", {
|
|
@@ -67,7 +67,7 @@ export declare class ActionsRepositoryPermissions extends pulumi.CustomResource
|
|
|
67
67
|
*/
|
|
68
68
|
readonly repository: pulumi.Output<string>;
|
|
69
69
|
/**
|
|
70
|
-
* Whether pinning to a specific SHA is required for all actions and reusable workflows in
|
|
70
|
+
* Whether pinning to a specific SHA is required for all actions and reusable workflows in the repository.
|
|
71
71
|
*/
|
|
72
72
|
readonly shaPinningRequired: pulumi.Output<boolean>;
|
|
73
73
|
/**
|
|
@@ -100,7 +100,7 @@ export interface ActionsRepositoryPermissionsState {
|
|
|
100
100
|
*/
|
|
101
101
|
repository?: pulumi.Input<string>;
|
|
102
102
|
/**
|
|
103
|
-
* Whether pinning to a specific SHA is required for all actions and reusable workflows in
|
|
103
|
+
* Whether pinning to a specific SHA is required for all actions and reusable workflows in the repository.
|
|
104
104
|
*/
|
|
105
105
|
shaPinningRequired?: pulumi.Input<boolean>;
|
|
106
106
|
}
|
|
@@ -125,7 +125,7 @@ export interface ActionsRepositoryPermissionsArgs {
|
|
|
125
125
|
*/
|
|
126
126
|
repository: pulumi.Input<string>;
|
|
127
127
|
/**
|
|
128
|
-
* Whether pinning to a specific SHA is required for all actions and reusable workflows in
|
|
128
|
+
* Whether pinning to a specific SHA is required for all actions and reusable workflows in the repository.
|
|
129
129
|
*/
|
|
130
130
|
shaPinningRequired?: pulumi.Input<boolean>;
|
|
131
131
|
}
|
package/actionsSecret.d.ts
CHANGED
|
@@ -6,9 +6,9 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
6
6
|
* Secret values are encrypted using the [Go '/crypto/box' module](https://godoc.org/golang.org/x/crypto/nacl/box) which is
|
|
7
7
|
* interoperable with [libsodium](https://libsodium.gitbook.io/doc/). Libsodium is used by GitHub to decrypt secret values.
|
|
8
8
|
*
|
|
9
|
-
* For the purposes of security, the contents of the `
|
|
9
|
+
* For the purposes of security, the contents of the `value` field have been marked as `sensitive` to Terraform,
|
|
10
10
|
* but it is important to note that **this does not hide it from state files**. You should treat state as sensitive always.
|
|
11
|
-
* It is also advised that you do not store plaintext values in your code but rather populate the `
|
|
11
|
+
* It is also advised that you do not store plaintext values in your code but rather populate the `valueEncrypted`
|
|
12
12
|
* using fields from a resource, data source or variable as, while encrypted in state, these will be easily accessible
|
|
13
13
|
* in your code. See below for an example of this abstraction.
|
|
14
14
|
*
|
|
@@ -21,12 +21,12 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
21
21
|
* const examplePlaintext = new github.ActionsSecret("example_plaintext", {
|
|
22
22
|
* repository: "example_repository",
|
|
23
23
|
* secretName: "example_secret_name",
|
|
24
|
-
*
|
|
24
|
+
* value: someSecretString,
|
|
25
25
|
* });
|
|
26
26
|
* const exampleEncrypted = new github.ActionsSecret("example_encrypted", {
|
|
27
27
|
* repository: "example_repository",
|
|
28
28
|
* secretName: "example_secret_name",
|
|
29
|
-
*
|
|
29
|
+
* valueEncrypted: someEncryptedSecretString,
|
|
30
30
|
* });
|
|
31
31
|
* ```
|
|
32
32
|
*
|
|
@@ -41,7 +41,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
41
41
|
* const exampleAllowDrift = new github.ActionsSecret("example_allow_drift", {
|
|
42
42
|
* repository: "example_repository",
|
|
43
43
|
* secretName: "example_secret_name",
|
|
44
|
-
*
|
|
44
|
+
* value: "placeholder",
|
|
45
45
|
* });
|
|
46
46
|
* ```
|
|
47
47
|
*
|
|
@@ -49,7 +49,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
49
49
|
*
|
|
50
50
|
* This resource can be imported using an ID made of the repository name, and secret name separated by a `:`.
|
|
51
51
|
*
|
|
52
|
-
* > **Note**: When importing secrets, the `
|
|
52
|
+
* > **Note**: When importing secrets, the `value`, `valueEncrypted`, `encryptedValue`, or `plaintextValue` fields will not be populated in the state. You may need to ignore changes for these as a workaround if you're not planning on updating the secret through Terraform.
|
|
53
53
|
*
|
|
54
54
|
* ### Import Command
|
|
55
55
|
*
|
|
@@ -88,15 +88,19 @@ export declare class ActionsSecret extends pulumi.CustomResource {
|
|
|
88
88
|
*/
|
|
89
89
|
readonly destroyOnDrift: pulumi.Output<boolean | undefined>;
|
|
90
90
|
/**
|
|
91
|
-
*
|
|
91
|
+
* (Optional) Please use `valueEncrypted`.
|
|
92
|
+
*
|
|
93
|
+
* @deprecated Use valueEncrypted and key_id.
|
|
92
94
|
*/
|
|
93
95
|
readonly encryptedValue: pulumi.Output<string | undefined>;
|
|
94
96
|
/**
|
|
95
|
-
* ID of the public key used to encrypt the secret
|
|
97
|
+
* ID of the public key used to encrypt the secret, required when setting `encryptedValue`.
|
|
96
98
|
*/
|
|
97
99
|
readonly keyId: pulumi.Output<string>;
|
|
98
100
|
/**
|
|
99
|
-
*
|
|
101
|
+
* (Optional) Please use `value`.
|
|
102
|
+
*
|
|
103
|
+
* @deprecated Use value.
|
|
100
104
|
*/
|
|
101
105
|
readonly plaintextValue: pulumi.Output<string | undefined>;
|
|
102
106
|
/**
|
|
@@ -119,6 +123,14 @@ export declare class ActionsSecret extends pulumi.CustomResource {
|
|
|
119
123
|
* Date the secret was last updated by the provider.
|
|
120
124
|
*/
|
|
121
125
|
readonly updatedAt: pulumi.Output<string>;
|
|
126
|
+
/**
|
|
127
|
+
* Plaintext value of the secret to be encrypted. This conflicts with `valueEncrypted`, `encryptedValue` & `plaintextValue`.
|
|
128
|
+
*/
|
|
129
|
+
readonly value: pulumi.Output<string | undefined>;
|
|
130
|
+
/**
|
|
131
|
+
* Encrypted value of the secret using the GitHub public key in Base64 format, `keyId` is required with this value. This conflicts with `value`, `encryptedValue` & `plaintextValue`.
|
|
132
|
+
*/
|
|
133
|
+
readonly valueEncrypted: pulumi.Output<string | undefined>;
|
|
122
134
|
/**
|
|
123
135
|
* Create a ActionsSecret resource with the given unique name, arguments, and options.
|
|
124
136
|
*
|
|
@@ -145,15 +157,19 @@ export interface ActionsSecretState {
|
|
|
145
157
|
*/
|
|
146
158
|
destroyOnDrift?: pulumi.Input<boolean>;
|
|
147
159
|
/**
|
|
148
|
-
*
|
|
160
|
+
* (Optional) Please use `valueEncrypted`.
|
|
161
|
+
*
|
|
162
|
+
* @deprecated Use valueEncrypted and key_id.
|
|
149
163
|
*/
|
|
150
164
|
encryptedValue?: pulumi.Input<string>;
|
|
151
165
|
/**
|
|
152
|
-
* ID of the public key used to encrypt the secret
|
|
166
|
+
* ID of the public key used to encrypt the secret, required when setting `encryptedValue`.
|
|
153
167
|
*/
|
|
154
168
|
keyId?: pulumi.Input<string>;
|
|
155
169
|
/**
|
|
156
|
-
*
|
|
170
|
+
* (Optional) Please use `value`.
|
|
171
|
+
*
|
|
172
|
+
* @deprecated Use value.
|
|
157
173
|
*/
|
|
158
174
|
plaintextValue?: pulumi.Input<string>;
|
|
159
175
|
/**
|
|
@@ -176,6 +192,14 @@ export interface ActionsSecretState {
|
|
|
176
192
|
* Date the secret was last updated by the provider.
|
|
177
193
|
*/
|
|
178
194
|
updatedAt?: pulumi.Input<string>;
|
|
195
|
+
/**
|
|
196
|
+
* Plaintext value of the secret to be encrypted. This conflicts with `valueEncrypted`, `encryptedValue` & `plaintextValue`.
|
|
197
|
+
*/
|
|
198
|
+
value?: pulumi.Input<string>;
|
|
199
|
+
/**
|
|
200
|
+
* Encrypted value of the secret using the GitHub public key in Base64 format, `keyId` is required with this value. This conflicts with `value`, `encryptedValue` & `plaintextValue`.
|
|
201
|
+
*/
|
|
202
|
+
valueEncrypted?: pulumi.Input<string>;
|
|
179
203
|
}
|
|
180
204
|
/**
|
|
181
205
|
* The set of arguments for constructing a ActionsSecret resource.
|
|
@@ -190,15 +214,19 @@ export interface ActionsSecretArgs {
|
|
|
190
214
|
*/
|
|
191
215
|
destroyOnDrift?: pulumi.Input<boolean>;
|
|
192
216
|
/**
|
|
193
|
-
*
|
|
217
|
+
* (Optional) Please use `valueEncrypted`.
|
|
218
|
+
*
|
|
219
|
+
* @deprecated Use valueEncrypted and key_id.
|
|
194
220
|
*/
|
|
195
221
|
encryptedValue?: pulumi.Input<string>;
|
|
196
222
|
/**
|
|
197
|
-
* ID of the public key used to encrypt the secret
|
|
223
|
+
* ID of the public key used to encrypt the secret, required when setting `encryptedValue`.
|
|
198
224
|
*/
|
|
199
225
|
keyId?: pulumi.Input<string>;
|
|
200
226
|
/**
|
|
201
|
-
*
|
|
227
|
+
* (Optional) Please use `value`.
|
|
228
|
+
*
|
|
229
|
+
* @deprecated Use value.
|
|
202
230
|
*/
|
|
203
231
|
plaintextValue?: pulumi.Input<string>;
|
|
204
232
|
/**
|
|
@@ -209,4 +237,12 @@ export interface ActionsSecretArgs {
|
|
|
209
237
|
* Name of the secret.
|
|
210
238
|
*/
|
|
211
239
|
secretName: pulumi.Input<string>;
|
|
240
|
+
/**
|
|
241
|
+
* Plaintext value of the secret to be encrypted. This conflicts with `valueEncrypted`, `encryptedValue` & `plaintextValue`.
|
|
242
|
+
*/
|
|
243
|
+
value?: pulumi.Input<string>;
|
|
244
|
+
/**
|
|
245
|
+
* Encrypted value of the secret using the GitHub public key in Base64 format, `keyId` is required with this value. This conflicts with `value`, `encryptedValue` & `plaintextValue`.
|
|
246
|
+
*/
|
|
247
|
+
valueEncrypted?: pulumi.Input<string>;
|
|
212
248
|
}
|
package/actionsSecret.js
CHANGED
|
@@ -12,9 +12,9 @@ const utilities = require("./utilities");
|
|
|
12
12
|
* Secret values are encrypted using the [Go '/crypto/box' module](https://godoc.org/golang.org/x/crypto/nacl/box) which is
|
|
13
13
|
* interoperable with [libsodium](https://libsodium.gitbook.io/doc/). Libsodium is used by GitHub to decrypt secret values.
|
|
14
14
|
*
|
|
15
|
-
* For the purposes of security, the contents of the `
|
|
15
|
+
* For the purposes of security, the contents of the `value` field have been marked as `sensitive` to Terraform,
|
|
16
16
|
* but it is important to note that **this does not hide it from state files**. You should treat state as sensitive always.
|
|
17
|
-
* It is also advised that you do not store plaintext values in your code but rather populate the `
|
|
17
|
+
* It is also advised that you do not store plaintext values in your code but rather populate the `valueEncrypted`
|
|
18
18
|
* using fields from a resource, data source or variable as, while encrypted in state, these will be easily accessible
|
|
19
19
|
* in your code. See below for an example of this abstraction.
|
|
20
20
|
*
|
|
@@ -27,12 +27,12 @@ const utilities = require("./utilities");
|
|
|
27
27
|
* const examplePlaintext = new github.ActionsSecret("example_plaintext", {
|
|
28
28
|
* repository: "example_repository",
|
|
29
29
|
* secretName: "example_secret_name",
|
|
30
|
-
*
|
|
30
|
+
* value: someSecretString,
|
|
31
31
|
* });
|
|
32
32
|
* const exampleEncrypted = new github.ActionsSecret("example_encrypted", {
|
|
33
33
|
* repository: "example_repository",
|
|
34
34
|
* secretName: "example_secret_name",
|
|
35
|
-
*
|
|
35
|
+
* valueEncrypted: someEncryptedSecretString,
|
|
36
36
|
* });
|
|
37
37
|
* ```
|
|
38
38
|
*
|
|
@@ -47,7 +47,7 @@ const utilities = require("./utilities");
|
|
|
47
47
|
* const exampleAllowDrift = new github.ActionsSecret("example_allow_drift", {
|
|
48
48
|
* repository: "example_repository",
|
|
49
49
|
* secretName: "example_secret_name",
|
|
50
|
-
*
|
|
50
|
+
* value: "placeholder",
|
|
51
51
|
* });
|
|
52
52
|
* ```
|
|
53
53
|
*
|
|
@@ -55,7 +55,7 @@ const utilities = require("./utilities");
|
|
|
55
55
|
*
|
|
56
56
|
* This resource can be imported using an ID made of the repository name, and secret name separated by a `:`.
|
|
57
57
|
*
|
|
58
|
-
* > **Note**: When importing secrets, the `
|
|
58
|
+
* > **Note**: When importing secrets, the `value`, `valueEncrypted`, `encryptedValue`, or `plaintextValue` fields will not be populated in the state. You may need to ignore changes for these as a workaround if you're not planning on updating the secret through Terraform.
|
|
59
59
|
*
|
|
60
60
|
* ### Import Command
|
|
61
61
|
*
|
|
@@ -103,6 +103,8 @@ class ActionsSecret extends pulumi.CustomResource {
|
|
|
103
103
|
resourceInputs["repositoryId"] = state?.repositoryId;
|
|
104
104
|
resourceInputs["secretName"] = state?.secretName;
|
|
105
105
|
resourceInputs["updatedAt"] = state?.updatedAt;
|
|
106
|
+
resourceInputs["value"] = state?.value;
|
|
107
|
+
resourceInputs["valueEncrypted"] = state?.valueEncrypted;
|
|
106
108
|
}
|
|
107
109
|
else {
|
|
108
110
|
const args = argsOrState;
|
|
@@ -118,13 +120,15 @@ class ActionsSecret extends pulumi.CustomResource {
|
|
|
118
120
|
resourceInputs["plaintextValue"] = args?.plaintextValue ? pulumi.secret(args.plaintextValue) : undefined;
|
|
119
121
|
resourceInputs["repository"] = args?.repository;
|
|
120
122
|
resourceInputs["secretName"] = args?.secretName;
|
|
123
|
+
resourceInputs["value"] = args?.value ? pulumi.secret(args.value) : undefined;
|
|
124
|
+
resourceInputs["valueEncrypted"] = args?.valueEncrypted ? pulumi.secret(args.valueEncrypted) : undefined;
|
|
121
125
|
resourceInputs["createdAt"] = undefined /*out*/;
|
|
122
126
|
resourceInputs["remoteUpdatedAt"] = undefined /*out*/;
|
|
123
127
|
resourceInputs["repositoryId"] = undefined /*out*/;
|
|
124
128
|
resourceInputs["updatedAt"] = undefined /*out*/;
|
|
125
129
|
}
|
|
126
130
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
127
|
-
const secretOpts = { additionalSecretOutputs: ["encryptedValue", "plaintextValue"] };
|
|
131
|
+
const secretOpts = { additionalSecretOutputs: ["encryptedValue", "plaintextValue", "value", "valueEncrypted"] };
|
|
128
132
|
opts = pulumi.mergeOptions(opts, secretOpts);
|
|
129
133
|
super(ActionsSecret.__pulumiType, name, resourceInputs, opts);
|
|
130
134
|
}
|
package/actionsSecret.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"actionsSecret.js","sourceRoot":"","sources":["../actionsSecret.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2DG;AACH,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;IACpD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA0B,EAAE,IAAmC;QACxH,OAAO,IAAI,aAAa,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACpE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,aAAa,CAAC,YAAY,CAAC;IAC9D,CAAC;
|
|
1
|
+
{"version":3,"file":"actionsSecret.js","sourceRoot":"","sources":["../actionsSecret.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2DG;AACH,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;IACpD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA0B,EAAE,IAAmC;QACxH,OAAO,IAAI,aAAa,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACpE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,aAAa,CAAC,YAAY,CAAC;IAC9D,CAAC;IAmED,YAAY,IAAY,EAAE,WAAoD,EAAE,IAAmC;QAC/G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA6C,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,EAAE,eAAe,CAAC;YAC3D,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;SAC5D;aAAM;YACH,MAAM,IAAI,GAAG,WAA4C,CAAC;YAC1D,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC;YACxD,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACzG,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC;YACtC,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACzG,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACzG,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAChD,cAAc,CAAC,iBAAiB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACtD,cAAc,CAAC,cAAc,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACnD,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACnD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,gBAAgB,EAAE,gBAAgB,EAAE,OAAO,EAAE,gBAAgB,CAAC,EAAE,CAAC;QAChH,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAClE,CAAC;;AAvIL,sCAwIC;AA1HG,gBAAgB;AACO,0BAAY,GAAG,0CAA0C,CAAC"}
|
|
@@ -6,9 +6,9 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
6
6
|
* Secret values are encrypted using the [Go '/crypto/box' module](https://godoc.org/golang.org/x/crypto/nacl/box) which is
|
|
7
7
|
* interoperable with [libsodium](https://libsodium.gitbook.io/doc/). Libsodium is used by GitHub to decrypt secret values.
|
|
8
8
|
*
|
|
9
|
-
* For the purposes of security, the contents of the `
|
|
9
|
+
* For the purposes of security, the contents of the `value` field have been marked as `sensitive` to Terraform,
|
|
10
10
|
* but it is important to note that **this does not hide it from state files**. You should treat state as sensitive always.
|
|
11
|
-
* It is also advised that you do not store plaintext values in your code but rather populate the `
|
|
11
|
+
* It is also advised that you do not store plaintext values in your code but rather populate the `valueEncrypted`
|
|
12
12
|
* using fields from a resource, data source or variable as, while encrypted in state, these will be easily accessible
|
|
13
13
|
* in your code. See below for an example of this abstraction.
|
|
14
14
|
*
|
|
@@ -21,12 +21,12 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
21
21
|
* const examplePlaintext = new github.DependabotOrganizationSecret("example_plaintext", {
|
|
22
22
|
* secretName: "example_secret_name",
|
|
23
23
|
* visibility: "all",
|
|
24
|
-
*
|
|
24
|
+
* value: someSecretString,
|
|
25
25
|
* });
|
|
26
26
|
* const exampleSecret = new github.DependabotOrganizationSecret("example_secret", {
|
|
27
27
|
* secretName: "example_secret_name",
|
|
28
28
|
* visibility: "all",
|
|
29
|
-
*
|
|
29
|
+
* valueEncrypted: someEncryptedSecretString,
|
|
30
30
|
* });
|
|
31
31
|
* ```
|
|
32
32
|
*
|
|
@@ -40,13 +40,13 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
40
40
|
* const examplePlaintext = new github.DependabotOrganizationSecret("example_plaintext", {
|
|
41
41
|
* secretName: "example_secret_name",
|
|
42
42
|
* visibility: "selected",
|
|
43
|
-
*
|
|
43
|
+
* value: someSecretString,
|
|
44
44
|
* selectedRepositoryIds: [repo.then(repo => repo.repoId)],
|
|
45
45
|
* });
|
|
46
46
|
* const exampleEncrypted = new github.DependabotOrganizationSecret("example_encrypted", {
|
|
47
47
|
* secretName: "example_secret_name",
|
|
48
48
|
* visibility: "selected",
|
|
49
|
-
*
|
|
49
|
+
* valueEncrypted: someEncryptedSecretString,
|
|
50
50
|
* selectedRepositoryIds: [repo.then(repo => repo.repoId)],
|
|
51
51
|
* });
|
|
52
52
|
* ```
|
|
@@ -80,15 +80,19 @@ export declare class DependabotOrganizationSecret extends pulumi.CustomResource
|
|
|
80
80
|
*/
|
|
81
81
|
readonly createdAt: pulumi.Output<string>;
|
|
82
82
|
/**
|
|
83
|
-
*
|
|
83
|
+
* (Optional) Please use `valueEncrypted`.
|
|
84
|
+
*
|
|
85
|
+
* @deprecated Use valueEncrypted and key_id.
|
|
84
86
|
*/
|
|
85
87
|
readonly encryptedValue: pulumi.Output<string | undefined>;
|
|
86
88
|
/**
|
|
87
|
-
* ID of the public key used to encrypt the secret
|
|
89
|
+
* ID of the public key used to encrypt the secret, required when setting `encryptedValue`.
|
|
88
90
|
*/
|
|
89
91
|
readonly keyId: pulumi.Output<string>;
|
|
90
92
|
/**
|
|
91
|
-
*
|
|
93
|
+
* (Optional) Please use `value`.
|
|
94
|
+
*
|
|
95
|
+
* @deprecated Use value.
|
|
92
96
|
*/
|
|
93
97
|
readonly plaintextValue: pulumi.Output<string | undefined>;
|
|
94
98
|
/**
|
|
@@ -102,6 +106,8 @@ export declare class DependabotOrganizationSecret extends pulumi.CustomResource
|
|
|
102
106
|
/**
|
|
103
107
|
* An array of repository IDs that can access the organization variable; this requires `visibility` to be set to `selected`.
|
|
104
108
|
*
|
|
109
|
+
* > **Note**: One of either `value`, `valueEncrypted`, `encryptedValue`, or `plaintextValue` must be specified.
|
|
110
|
+
*
|
|
105
111
|
* @deprecated This field is deprecated and will be removed in a future release. Please use the `github.DependabotOrganizationSecretRepositories` or `github.DependabotOrganizationSecretRepository` resources to manage repository access to organization secrets.
|
|
106
112
|
*/
|
|
107
113
|
readonly selectedRepositoryIds: pulumi.Output<number[] | undefined>;
|
|
@@ -109,6 +115,14 @@ export declare class DependabotOrganizationSecret extends pulumi.CustomResource
|
|
|
109
115
|
* Date the secret was last updated by the provider.
|
|
110
116
|
*/
|
|
111
117
|
readonly updatedAt: pulumi.Output<string>;
|
|
118
|
+
/**
|
|
119
|
+
* Plaintext value of the secret to be encrypted. This conflicts with `valueEncrypted`, `encryptedValue` & `plaintextValue`.
|
|
120
|
+
*/
|
|
121
|
+
readonly value: pulumi.Output<string | undefined>;
|
|
122
|
+
/**
|
|
123
|
+
* Encrypted value of the secret using the GitHub public key in Base64 format, `keyId` is required with this value. This conflicts with `value`, `encryptedValue` & `plaintextValue`.
|
|
124
|
+
*/
|
|
125
|
+
readonly valueEncrypted: pulumi.Output<string | undefined>;
|
|
112
126
|
/**
|
|
113
127
|
* Configures the access that repositories have to the organization secret; must be one of `all`, `private`, or `selected`.
|
|
114
128
|
*/
|
|
@@ -131,15 +145,19 @@ export interface DependabotOrganizationSecretState {
|
|
|
131
145
|
*/
|
|
132
146
|
createdAt?: pulumi.Input<string>;
|
|
133
147
|
/**
|
|
134
|
-
*
|
|
148
|
+
* (Optional) Please use `valueEncrypted`.
|
|
149
|
+
*
|
|
150
|
+
* @deprecated Use valueEncrypted and key_id.
|
|
135
151
|
*/
|
|
136
152
|
encryptedValue?: pulumi.Input<string>;
|
|
137
153
|
/**
|
|
138
|
-
* ID of the public key used to encrypt the secret
|
|
154
|
+
* ID of the public key used to encrypt the secret, required when setting `encryptedValue`.
|
|
139
155
|
*/
|
|
140
156
|
keyId?: pulumi.Input<string>;
|
|
141
157
|
/**
|
|
142
|
-
*
|
|
158
|
+
* (Optional) Please use `value`.
|
|
159
|
+
*
|
|
160
|
+
* @deprecated Use value.
|
|
143
161
|
*/
|
|
144
162
|
plaintextValue?: pulumi.Input<string>;
|
|
145
163
|
/**
|
|
@@ -153,6 +171,8 @@ export interface DependabotOrganizationSecretState {
|
|
|
153
171
|
/**
|
|
154
172
|
* An array of repository IDs that can access the organization variable; this requires `visibility` to be set to `selected`.
|
|
155
173
|
*
|
|
174
|
+
* > **Note**: One of either `value`, `valueEncrypted`, `encryptedValue`, or `plaintextValue` must be specified.
|
|
175
|
+
*
|
|
156
176
|
* @deprecated This field is deprecated and will be removed in a future release. Please use the `github.DependabotOrganizationSecretRepositories` or `github.DependabotOrganizationSecretRepository` resources to manage repository access to organization secrets.
|
|
157
177
|
*/
|
|
158
178
|
selectedRepositoryIds?: pulumi.Input<pulumi.Input<number>[]>;
|
|
@@ -160,6 +180,14 @@ export interface DependabotOrganizationSecretState {
|
|
|
160
180
|
* Date the secret was last updated by the provider.
|
|
161
181
|
*/
|
|
162
182
|
updatedAt?: pulumi.Input<string>;
|
|
183
|
+
/**
|
|
184
|
+
* Plaintext value of the secret to be encrypted. This conflicts with `valueEncrypted`, `encryptedValue` & `plaintextValue`.
|
|
185
|
+
*/
|
|
186
|
+
value?: pulumi.Input<string>;
|
|
187
|
+
/**
|
|
188
|
+
* Encrypted value of the secret using the GitHub public key in Base64 format, `keyId` is required with this value. This conflicts with `value`, `encryptedValue` & `plaintextValue`.
|
|
189
|
+
*/
|
|
190
|
+
valueEncrypted?: pulumi.Input<string>;
|
|
163
191
|
/**
|
|
164
192
|
* Configures the access that repositories have to the organization secret; must be one of `all`, `private`, or `selected`.
|
|
165
193
|
*/
|
|
@@ -170,15 +198,19 @@ export interface DependabotOrganizationSecretState {
|
|
|
170
198
|
*/
|
|
171
199
|
export interface DependabotOrganizationSecretArgs {
|
|
172
200
|
/**
|
|
173
|
-
*
|
|
201
|
+
* (Optional) Please use `valueEncrypted`.
|
|
202
|
+
*
|
|
203
|
+
* @deprecated Use valueEncrypted and key_id.
|
|
174
204
|
*/
|
|
175
205
|
encryptedValue?: pulumi.Input<string>;
|
|
176
206
|
/**
|
|
177
|
-
* ID of the public key used to encrypt the secret
|
|
207
|
+
* ID of the public key used to encrypt the secret, required when setting `encryptedValue`.
|
|
178
208
|
*/
|
|
179
209
|
keyId?: pulumi.Input<string>;
|
|
180
210
|
/**
|
|
181
|
-
*
|
|
211
|
+
* (Optional) Please use `value`.
|
|
212
|
+
*
|
|
213
|
+
* @deprecated Use value.
|
|
182
214
|
*/
|
|
183
215
|
plaintextValue?: pulumi.Input<string>;
|
|
184
216
|
/**
|
|
@@ -188,9 +220,19 @@ export interface DependabotOrganizationSecretArgs {
|
|
|
188
220
|
/**
|
|
189
221
|
* An array of repository IDs that can access the organization variable; this requires `visibility` to be set to `selected`.
|
|
190
222
|
*
|
|
223
|
+
* > **Note**: One of either `value`, `valueEncrypted`, `encryptedValue`, or `plaintextValue` must be specified.
|
|
224
|
+
*
|
|
191
225
|
* @deprecated This field is deprecated and will be removed in a future release. Please use the `github.DependabotOrganizationSecretRepositories` or `github.DependabotOrganizationSecretRepository` resources to manage repository access to organization secrets.
|
|
192
226
|
*/
|
|
193
227
|
selectedRepositoryIds?: pulumi.Input<pulumi.Input<number>[]>;
|
|
228
|
+
/**
|
|
229
|
+
* Plaintext value of the secret to be encrypted. This conflicts with `valueEncrypted`, `encryptedValue` & `plaintextValue`.
|
|
230
|
+
*/
|
|
231
|
+
value?: pulumi.Input<string>;
|
|
232
|
+
/**
|
|
233
|
+
* Encrypted value of the secret using the GitHub public key in Base64 format, `keyId` is required with this value. This conflicts with `value`, `encryptedValue` & `plaintextValue`.
|
|
234
|
+
*/
|
|
235
|
+
valueEncrypted?: pulumi.Input<string>;
|
|
194
236
|
/**
|
|
195
237
|
* Configures the access that repositories have to the organization secret; must be one of `all`, `private`, or `selected`.
|
|
196
238
|
*/
|
|
@@ -12,9 +12,9 @@ const utilities = require("./utilities");
|
|
|
12
12
|
* Secret values are encrypted using the [Go '/crypto/box' module](https://godoc.org/golang.org/x/crypto/nacl/box) which is
|
|
13
13
|
* interoperable with [libsodium](https://libsodium.gitbook.io/doc/). Libsodium is used by GitHub to decrypt secret values.
|
|
14
14
|
*
|
|
15
|
-
* For the purposes of security, the contents of the `
|
|
15
|
+
* For the purposes of security, the contents of the `value` field have been marked as `sensitive` to Terraform,
|
|
16
16
|
* but it is important to note that **this does not hide it from state files**. You should treat state as sensitive always.
|
|
17
|
-
* It is also advised that you do not store plaintext values in your code but rather populate the `
|
|
17
|
+
* It is also advised that you do not store plaintext values in your code but rather populate the `valueEncrypted`
|
|
18
18
|
* using fields from a resource, data source or variable as, while encrypted in state, these will be easily accessible
|
|
19
19
|
* in your code. See below for an example of this abstraction.
|
|
20
20
|
*
|
|
@@ -27,12 +27,12 @@ const utilities = require("./utilities");
|
|
|
27
27
|
* const examplePlaintext = new github.DependabotOrganizationSecret("example_plaintext", {
|
|
28
28
|
* secretName: "example_secret_name",
|
|
29
29
|
* visibility: "all",
|
|
30
|
-
*
|
|
30
|
+
* value: someSecretString,
|
|
31
31
|
* });
|
|
32
32
|
* const exampleSecret = new github.DependabotOrganizationSecret("example_secret", {
|
|
33
33
|
* secretName: "example_secret_name",
|
|
34
34
|
* visibility: "all",
|
|
35
|
-
*
|
|
35
|
+
* valueEncrypted: someEncryptedSecretString,
|
|
36
36
|
* });
|
|
37
37
|
* ```
|
|
38
38
|
*
|
|
@@ -46,13 +46,13 @@ const utilities = require("./utilities");
|
|
|
46
46
|
* const examplePlaintext = new github.DependabotOrganizationSecret("example_plaintext", {
|
|
47
47
|
* secretName: "example_secret_name",
|
|
48
48
|
* visibility: "selected",
|
|
49
|
-
*
|
|
49
|
+
* value: someSecretString,
|
|
50
50
|
* selectedRepositoryIds: [repo.then(repo => repo.repoId)],
|
|
51
51
|
* });
|
|
52
52
|
* const exampleEncrypted = new github.DependabotOrganizationSecret("example_encrypted", {
|
|
53
53
|
* secretName: "example_secret_name",
|
|
54
54
|
* visibility: "selected",
|
|
55
|
-
*
|
|
55
|
+
* valueEncrypted: someEncryptedSecretString,
|
|
56
56
|
* selectedRepositoryIds: [repo.then(repo => repo.repoId)],
|
|
57
57
|
* });
|
|
58
58
|
* ```
|
|
@@ -101,6 +101,8 @@ class DependabotOrganizationSecret extends pulumi.CustomResource {
|
|
|
101
101
|
resourceInputs["secretName"] = state?.secretName;
|
|
102
102
|
resourceInputs["selectedRepositoryIds"] = state?.selectedRepositoryIds;
|
|
103
103
|
resourceInputs["updatedAt"] = state?.updatedAt;
|
|
104
|
+
resourceInputs["value"] = state?.value;
|
|
105
|
+
resourceInputs["valueEncrypted"] = state?.valueEncrypted;
|
|
104
106
|
resourceInputs["visibility"] = state?.visibility;
|
|
105
107
|
}
|
|
106
108
|
else {
|
|
@@ -116,13 +118,15 @@ class DependabotOrganizationSecret extends pulumi.CustomResource {
|
|
|
116
118
|
resourceInputs["plaintextValue"] = args?.plaintextValue ? pulumi.secret(args.plaintextValue) : undefined;
|
|
117
119
|
resourceInputs["secretName"] = args?.secretName;
|
|
118
120
|
resourceInputs["selectedRepositoryIds"] = args?.selectedRepositoryIds;
|
|
121
|
+
resourceInputs["value"] = args?.value ? pulumi.secret(args.value) : undefined;
|
|
122
|
+
resourceInputs["valueEncrypted"] = args?.valueEncrypted ? pulumi.secret(args.valueEncrypted) : undefined;
|
|
119
123
|
resourceInputs["visibility"] = args?.visibility;
|
|
120
124
|
resourceInputs["createdAt"] = undefined /*out*/;
|
|
121
125
|
resourceInputs["remoteUpdatedAt"] = undefined /*out*/;
|
|
122
126
|
resourceInputs["updatedAt"] = undefined /*out*/;
|
|
123
127
|
}
|
|
124
128
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
125
|
-
const secretOpts = { additionalSecretOutputs: ["encryptedValue", "plaintextValue"] };
|
|
129
|
+
const secretOpts = { additionalSecretOutputs: ["encryptedValue", "plaintextValue", "value", "valueEncrypted"] };
|
|
126
130
|
opts = pulumi.mergeOptions(opts, secretOpts);
|
|
127
131
|
super(DependabotOrganizationSecret.__pulumiType, name, resourceInputs, opts);
|
|
128
132
|
}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"dependabotOrganizationSecret.js","sourceRoot":"","sources":["../dependabotOrganizationSecret.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2DG;AACH,MAAa,4BAA6B,SAAQ,MAAM,CAAC,cAAc;IACnE;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAyC,EAAE,IAAmC;QACvI,OAAO,IAAI,4BAA4B,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACnF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,4BAA4B,CAAC,YAAY,CAAC;IAC7E,CAAC;
|
|
1
|
+
{"version":3,"file":"dependabotOrganizationSecret.js","sourceRoot":"","sources":["../dependabotOrganizationSecret.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2DG;AACH,MAAa,4BAA6B,SAAQ,MAAM,CAAC,cAAc;IACnE;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAyC,EAAE,IAAmC;QACvI,OAAO,IAAI,4BAA4B,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACnF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,4BAA4B,CAAC,YAAY,CAAC;IAC7E,CAAC;IA+DD,YAAY,IAAY,EAAE,WAAkF,EAAE,IAAmC;QAC7I,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA4D,CAAC;YAC3E,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,EAAE,eAAe,CAAC;YAC3D,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,EAAE,qBAAqB,CAAC;YACvE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;SACpD;aAAM;YACH,MAAM,IAAI,GAAG,WAA2D,CAAC;YACzE,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACzG,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC;YACtC,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACzG,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,EAAE,qBAAqB,CAAC;YACtE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACzG,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAChD,cAAc,CAAC,iBAAiB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACnD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,gBAAgB,EAAE,gBAAgB,EAAE,OAAO,EAAE,gBAAgB,CAAC,EAAE,CAAC;QAChH,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,4BAA4B,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACjF,CAAC;;AAjIL,oEAkIC;AApHG,gBAAgB;AACO,yCAAY,GAAG,wEAAwE,CAAC"}
|
|
@@ -13,7 +13,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
13
13
|
*
|
|
14
14
|
* const example = new github.DependabotOrganizationSecret("example", {
|
|
15
15
|
* secretName: "mysecret",
|
|
16
|
-
*
|
|
16
|
+
* value: "foo",
|
|
17
17
|
* visibility: "selected",
|
|
18
18
|
* });
|
|
19
19
|
* const exampleRepository = new github.Repository("example", {
|
|
@@ -19,7 +19,7 @@ const utilities = require("./utilities");
|
|
|
19
19
|
*
|
|
20
20
|
* const example = new github.DependabotOrganizationSecret("example", {
|
|
21
21
|
* secretName: "mysecret",
|
|
22
|
-
*
|
|
22
|
+
* value: "foo",
|
|
23
23
|
* visibility: "selected",
|
|
24
24
|
* });
|
|
25
25
|
* const exampleRepository = new github.Repository("example", {
|
|
@@ -13,7 +13,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
13
13
|
*
|
|
14
14
|
* const example = new github.DependabotOrganizationSecret("example", {
|
|
15
15
|
* secretName: "mysecret",
|
|
16
|
-
*
|
|
16
|
+
* value: "foo",
|
|
17
17
|
* visibility: "selected",
|
|
18
18
|
* });
|
|
19
19
|
* const exampleRepository = new github.Repository("example", {
|
|
@@ -19,7 +19,7 @@ const utilities = require("./utilities");
|
|
|
19
19
|
*
|
|
20
20
|
* const example = new github.DependabotOrganizationSecret("example", {
|
|
21
21
|
* secretName: "mysecret",
|
|
22
|
-
*
|
|
22
|
+
* value: "foo",
|
|
23
23
|
* visibility: "selected",
|
|
24
24
|
* });
|
|
25
25
|
* const exampleRepository = new github.Repository("example", {
|