@pulumi/gitlab 8.3.0 → 8.3.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -36,11 +36,11 @@ export declare class GroupProtectedEnvironment extends pulumi.CustomResource {
36
36
  */
37
37
  static isInstance(obj: any): obj is GroupProtectedEnvironment;
38
38
  /**
39
- * Array of approval rules to deploy, with each described by a hash.
39
+ * Array of approval rules to deploy, with each described by a hash. Elements in the `approvalRules` should be one of `userId`, `groupId` or `accessLevel`.
40
40
  */
41
41
  readonly approvalRules: pulumi.Output<outputs.GroupProtectedEnvironmentApprovalRule[]>;
42
42
  /**
43
- * Array of access levels allowed to deploy, with each described by a hash.
43
+ * Array of access levels allowed to deploy, with each described by a hash. Elements in the `deployAccessLevels` should be one of `userId`, `groupId` or `accessLevel`.
44
44
  */
45
45
  readonly deployAccessLevels: pulumi.Output<outputs.GroupProtectedEnvironmentDeployAccessLevel[]>;
46
46
  /**
@@ -65,11 +65,11 @@ export declare class GroupProtectedEnvironment extends pulumi.CustomResource {
65
65
  */
66
66
  export interface GroupProtectedEnvironmentState {
67
67
  /**
68
- * Array of approval rules to deploy, with each described by a hash.
68
+ * Array of approval rules to deploy, with each described by a hash. Elements in the `approvalRules` should be one of `userId`, `groupId` or `accessLevel`.
69
69
  */
70
70
  approvalRules?: pulumi.Input<pulumi.Input<inputs.GroupProtectedEnvironmentApprovalRule>[]>;
71
71
  /**
72
- * Array of access levels allowed to deploy, with each described by a hash.
72
+ * Array of access levels allowed to deploy, with each described by a hash. Elements in the `deployAccessLevels` should be one of `userId`, `groupId` or `accessLevel`.
73
73
  */
74
74
  deployAccessLevels?: pulumi.Input<pulumi.Input<inputs.GroupProtectedEnvironmentDeployAccessLevel>[]>;
75
75
  /**
@@ -86,11 +86,11 @@ export interface GroupProtectedEnvironmentState {
86
86
  */
87
87
  export interface GroupProtectedEnvironmentArgs {
88
88
  /**
89
- * Array of approval rules to deploy, with each described by a hash.
89
+ * Array of approval rules to deploy, with each described by a hash. Elements in the `approvalRules` should be one of `userId`, `groupId` or `accessLevel`.
90
90
  */
91
91
  approvalRules?: pulumi.Input<pulumi.Input<inputs.GroupProtectedEnvironmentApprovalRule>[]>;
92
92
  /**
93
- * Array of access levels allowed to deploy, with each described by a hash.
93
+ * Array of access levels allowed to deploy, with each described by a hash. Elements in the `deployAccessLevels` should be one of `userId`, `groupId` or `accessLevel`.
94
94
  */
95
95
  deployAccessLevels: pulumi.Input<pulumi.Input<inputs.GroupProtectedEnvironmentDeployAccessLevel>[]>;
96
96
  /**
@@ -17,6 +17,8 @@ import * as pulumi from "@pulumi/pulumi";
17
17
  * samlGroupName: "samlgroupname1",
18
18
  * });
19
19
  * // Example using a Custom Role (Ultimate only)
20
+ * // When using the custom role, the `access_level` must match the
21
+ * // base role used to create the custom role.
20
22
  * const testCustomRole = new gitlab.GroupSamlLink("test_custom_role", {
21
23
  * group: "12345",
22
24
  * accessLevel: "developer",
@@ -58,7 +60,7 @@ export declare class GroupSamlLink extends pulumi.CustomResource {
58
60
  */
59
61
  readonly group: pulumi.Output<string>;
60
62
  /**
61
- * The ID of a custom member role. Only available for Ultimate instances.
63
+ * The ID of a custom member role. Only available for Ultimate instances. When using a custom role, the `accessLevel` must match the base role used to create the custom role.
62
64
  */
63
65
  readonly memberRoleId: pulumi.Output<number | undefined>;
64
66
  /**
@@ -87,7 +89,7 @@ export interface GroupSamlLinkState {
87
89
  */
88
90
  group?: pulumi.Input<string>;
89
91
  /**
90
- * The ID of a custom member role. Only available for Ultimate instances.
92
+ * The ID of a custom member role. Only available for Ultimate instances. When using a custom role, the `accessLevel` must match the base role used to create the custom role.
91
93
  */
92
94
  memberRoleId?: pulumi.Input<number>;
93
95
  /**
@@ -108,7 +110,7 @@ export interface GroupSamlLinkArgs {
108
110
  */
109
111
  group: pulumi.Input<string>;
110
112
  /**
111
- * The ID of a custom member role. Only available for Ultimate instances.
113
+ * The ID of a custom member role. Only available for Ultimate instances. When using a custom role, the `accessLevel` must match the base role used to create the custom role.
112
114
  */
113
115
  memberRoleId?: pulumi.Input<number>;
114
116
  /**
package/groupSamlLink.js CHANGED
@@ -23,6 +23,8 @@ const utilities = require("./utilities");
23
23
  * samlGroupName: "samlgroupname1",
24
24
  * });
25
25
  * // Example using a Custom Role (Ultimate only)
26
+ * // When using the custom role, the `access_level` must match the
27
+ * // base role used to create the custom role.
26
28
  * const testCustomRole = new gitlab.GroupSamlLink("test_custom_role", {
27
29
  * group: "12345",
28
30
  * accessLevel: "developer",
@@ -1 +1 @@
1
- {"version":3,"file":"groupSamlLink.js","sourceRoot":"","sources":["../groupSamlLink.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAiCG;AACH,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;IACpD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA0B,EAAE,IAAmC;QACxH,OAAO,IAAI,aAAa,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACpE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,aAAa,CAAC,YAAY,CAAC;IAC9D,CAAC;IA2BD,YAAY,IAAY,EAAE,WAAoD,EAAE,IAAmC;QAC/G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA6C,CAAC;YAC5D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7E;aAAM;YACH,MAAM,IAAI,GAAG,WAA4C,CAAC;YAC1D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,WAAW,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACxD,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,aAAa,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1D,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;aAChE;YACD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3E;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAClE,CAAC;;AAhFL,sCAiFC;AAnEG,gBAAgB;AACO,0BAAY,GAAG,0CAA0C,CAAC"}
1
+ {"version":3,"file":"groupSamlLink.js","sourceRoot":"","sources":["../groupSamlLink.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAmCG;AACH,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;IACpD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA0B,EAAE,IAAmC;QACxH,OAAO,IAAI,aAAa,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACpE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,aAAa,CAAC,YAAY,CAAC;IAC9D,CAAC;IA2BD,YAAY,IAAY,EAAE,WAAoD,EAAE,IAAmC;QAC/G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA6C,CAAC;YAC5D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7E;aAAM;YACH,MAAM,IAAI,GAAG,WAA4C,CAAC;YAC1D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,WAAW,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACxD,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,aAAa,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1D,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;aAChE;YACD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3E;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAClE,CAAC;;AAhFL,sCAiFC;AAnEG,gBAAgB;AACO,0BAAY,GAAG,0CAA0C,CAAC"}
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@pulumi/gitlab",
3
- "version": "8.3.0",
3
+ "version": "8.3.1",
4
4
  "description": "A Pulumi package for creating and managing GitLab resources.",
5
5
  "keywords": [
6
6
  "pulumi",
@@ -25,6 +25,6 @@
25
25
  "pulumi": {
26
26
  "resource": true,
27
27
  "name": "gitlab",
28
- "version": "8.3.0"
28
+ "version": "8.3.1"
29
29
  }
30
30
  }
@@ -37,11 +37,11 @@ export declare class ProjectProtectedEnvironment extends pulumi.CustomResource {
37
37
  */
38
38
  static isInstance(obj: any): obj is ProjectProtectedEnvironment;
39
39
  /**
40
- * Array of approval rules to deploy, with each described by a hash.
40
+ * Array of approval rules to deploy, with each described by a hash. Elements in the `approvalRules` should be one of `userId`, `groupId` or `accessLevel`.
41
41
  */
42
42
  readonly approvalRules: pulumi.Output<outputs.ProjectProtectedEnvironmentApprovalRule[]>;
43
43
  /**
44
- * Array of access levels allowed to deploy, with each described by a hash.
44
+ * Array of access levels allowed to deploy, with each described by a hash. Elements in the `deployAccessLevels` should be one of `userId`, `groupId` or `accessLevel`.
45
45
  */
46
46
  readonly deployAccessLevels: pulumi.Output<outputs.ProjectProtectedEnvironmentDeployAccessLevel[] | undefined>;
47
47
  /**
@@ -66,11 +66,11 @@ export declare class ProjectProtectedEnvironment extends pulumi.CustomResource {
66
66
  */
67
67
  export interface ProjectProtectedEnvironmentState {
68
68
  /**
69
- * Array of approval rules to deploy, with each described by a hash.
69
+ * Array of approval rules to deploy, with each described by a hash. Elements in the `approvalRules` should be one of `userId`, `groupId` or `accessLevel`.
70
70
  */
71
71
  approvalRules?: pulumi.Input<pulumi.Input<inputs.ProjectProtectedEnvironmentApprovalRule>[]>;
72
72
  /**
73
- * Array of access levels allowed to deploy, with each described by a hash.
73
+ * Array of access levels allowed to deploy, with each described by a hash. Elements in the `deployAccessLevels` should be one of `userId`, `groupId` or `accessLevel`.
74
74
  */
75
75
  deployAccessLevels?: pulumi.Input<pulumi.Input<inputs.ProjectProtectedEnvironmentDeployAccessLevel>[]>;
76
76
  /**
@@ -87,11 +87,11 @@ export interface ProjectProtectedEnvironmentState {
87
87
  */
88
88
  export interface ProjectProtectedEnvironmentArgs {
89
89
  /**
90
- * Array of approval rules to deploy, with each described by a hash.
90
+ * Array of approval rules to deploy, with each described by a hash. Elements in the `approvalRules` should be one of `userId`, `groupId` or `accessLevel`.
91
91
  */
92
92
  approvalRules?: pulumi.Input<pulumi.Input<inputs.ProjectProtectedEnvironmentApprovalRule>[]>;
93
93
  /**
94
- * Array of access levels allowed to deploy, with each described by a hash.
94
+ * Array of access levels allowed to deploy, with each described by a hash. Elements in the `deployAccessLevels` should be one of `userId`, `groupId` or `accessLevel`.
95
95
  */
96
96
  deployAccessLevels?: pulumi.Input<pulumi.Input<inputs.ProjectProtectedEnvironmentDeployAccessLevel>[]>;
97
97
  /**
package/types/input.d.ts CHANGED
@@ -420,7 +420,7 @@ export interface GroupIssueBoardList {
420
420
  }
421
421
  export interface GroupProtectedEnvironmentApprovalRule {
422
422
  /**
423
- * Levels of access allowed to approve a deployment to this protected environment. Valid values are `developer`, `maintainer`.
423
+ * Levels of access allowed to approve a deployment to this protected environment. Mutually exclusive with `userId` and `groupId`. Valid values are `developer`, `maintainer`.
424
424
  */
425
425
  accessLevel?: pulumi.Input<string>;
426
426
  /**
@@ -428,7 +428,7 @@ export interface GroupProtectedEnvironmentApprovalRule {
428
428
  */
429
429
  accessLevelDescription?: pulumi.Input<string>;
430
430
  /**
431
- * The ID of the group allowed to approve a deployment to this protected environment. TThe group must be a sub-group under the given group. This is mutually exclusive with user_id.
431
+ * The ID of the group allowed to approve a deployment to this protected environment. TThe group must be a sub-group under the given group. Mutually exclusive with `accessLevel` and `userId`.
432
432
  */
433
433
  groupId?: pulumi.Input<number>;
434
434
  /**
@@ -444,13 +444,13 @@ export interface GroupProtectedEnvironmentApprovalRule {
444
444
  */
445
445
  requiredApprovals?: pulumi.Input<number>;
446
446
  /**
447
- * The ID of the user allowed to approve a deployment to this protected environment. The user must be a member of the group with Maintainer role or higher. This is mutually exclusive with group*id and required*approvals.
447
+ * The ID of the user allowed to approve a deployment to this protected environment. The user must be a member of the group with Maintainer role or higher. Mutually exclusive with `accessLevel` and `groupId`.
448
448
  */
449
449
  userId?: pulumi.Input<number>;
450
450
  }
451
451
  export interface GroupProtectedEnvironmentDeployAccessLevel {
452
452
  /**
453
- * Levels of access required to deploy to this protected environment. Valid values are `developer`, `maintainer`.
453
+ * Levels of access required to deploy to this protected environment. Mutually exclusive with `userId` and `groupId`. Valid values are `developer`, `maintainer`.
454
454
  */
455
455
  accessLevel?: pulumi.Input<string>;
456
456
  /**
@@ -458,7 +458,7 @@ export interface GroupProtectedEnvironmentDeployAccessLevel {
458
458
  */
459
459
  accessLevelDescription?: pulumi.Input<string>;
460
460
  /**
461
- * The ID of the group allowed to deploy to this protected environment. The group must be a sub-group under the given group.
461
+ * The ID of the group allowed to deploy to this protected environment. The group must be a sub-group under the given group. Mutually exclusive with `accessLevel` and `userId`.
462
462
  */
463
463
  groupId?: pulumi.Input<number>;
464
464
  /**
@@ -470,7 +470,7 @@ export interface GroupProtectedEnvironmentDeployAccessLevel {
470
470
  */
471
471
  id?: pulumi.Input<number>;
472
472
  /**
473
- * The ID of the user allowed to deploy to this protected environment. The user must be a member of the group with Maintainer role or higher.
473
+ * The ID of the user allowed to deploy to this protected environment. The user must be a member of the group with Maintainer role or higher. Mutually exclusive with `accessLevel` and `groupId`.
474
474
  */
475
475
  userId?: pulumi.Input<number>;
476
476
  }
@@ -608,7 +608,7 @@ export interface ProjectIssueTaskCompletionStatus {
608
608
  }
609
609
  export interface ProjectProtectedEnvironmentApprovalRule {
610
610
  /**
611
- * Levels of access allowed to approve a deployment to this protected environment. Valid values are `developer`, `maintainer`.
611
+ * Levels of access allowed to approve a deployment to this protected environment. Mutually exclusive with `userId` and `groupId`. Valid values are `developer`, `maintainer`.
612
612
  */
613
613
  accessLevel?: pulumi.Input<string>;
614
614
  /**
@@ -616,7 +616,7 @@ export interface ProjectProtectedEnvironmentApprovalRule {
616
616
  */
617
617
  accessLevelDescription?: pulumi.Input<string>;
618
618
  /**
619
- * The ID of the group allowed to approve a deployment to this protected environment. The project must be shared with the group. This is mutually exclusive with user_id.
619
+ * The ID of the group allowed to approve a deployment to this protected environment. The project must be shared with the group. Mutually exclusive with `accessLevel` and `userId`.
620
620
  */
621
621
  groupId?: pulumi.Input<number>;
622
622
  /**
@@ -632,13 +632,13 @@ export interface ProjectProtectedEnvironmentApprovalRule {
632
632
  */
633
633
  requiredApprovals?: pulumi.Input<number>;
634
634
  /**
635
- * The ID of the user allowed to approve a deployment to this protected environment. The user must be a member of the project. This is mutually exclusive with group*id and required*approvals.
635
+ * The ID of the user allowed to approve a deployment to this protected environment. The user must be a member of the project. Mutually exclusive with `accessLevel` and `groupId`.
636
636
  */
637
637
  userId?: pulumi.Input<number>;
638
638
  }
639
639
  export interface ProjectProtectedEnvironmentDeployAccessLevel {
640
640
  /**
641
- * Levels of access required to deploy to this protected environment. Valid values are `developer`, `maintainer`.
641
+ * Levels of access required to deploy to this protected environment. Mutually exclusive with `userId` and `groupId`. Valid values are `developer`, `maintainer`.
642
642
  */
643
643
  accessLevel?: pulumi.Input<string>;
644
644
  /**
@@ -646,7 +646,7 @@ export interface ProjectProtectedEnvironmentDeployAccessLevel {
646
646
  */
647
647
  accessLevelDescription?: pulumi.Input<string>;
648
648
  /**
649
- * The ID of the group allowed to deploy to this protected environment. The project must be shared with the group.
649
+ * The ID of the group allowed to deploy to this protected environment. The project must be shared with the group. Mutually exclusive with `accessLevel` and `userId`.
650
650
  */
651
651
  groupId?: pulumi.Input<number>;
652
652
  /**
@@ -658,7 +658,7 @@ export interface ProjectProtectedEnvironmentDeployAccessLevel {
658
658
  */
659
659
  id?: pulumi.Input<number>;
660
660
  /**
661
- * The ID of the user allowed to deploy to this protected environment. The user must be a member of the project.
661
+ * The ID of the user allowed to deploy to this protected environment. The user must be a member of the project. Mutually exclusive with `accessLevel` and `groupId`.
662
662
  */
663
663
  userId?: pulumi.Input<number>;
664
664
  }
package/types/output.d.ts CHANGED
@@ -2171,7 +2171,7 @@ export interface GroupIssueBoardList {
2171
2171
  }
2172
2172
  export interface GroupProtectedEnvironmentApprovalRule {
2173
2173
  /**
2174
- * Levels of access allowed to approve a deployment to this protected environment. Valid values are `developer`, `maintainer`.
2174
+ * Levels of access allowed to approve a deployment to this protected environment. Mutually exclusive with `userId` and `groupId`. Valid values are `developer`, `maintainer`.
2175
2175
  */
2176
2176
  accessLevel?: string;
2177
2177
  /**
@@ -2179,7 +2179,7 @@ export interface GroupProtectedEnvironmentApprovalRule {
2179
2179
  */
2180
2180
  accessLevelDescription: string;
2181
2181
  /**
2182
- * The ID of the group allowed to approve a deployment to this protected environment. TThe group must be a sub-group under the given group. This is mutually exclusive with user_id.
2182
+ * The ID of the group allowed to approve a deployment to this protected environment. TThe group must be a sub-group under the given group. Mutually exclusive with `accessLevel` and `userId`.
2183
2183
  */
2184
2184
  groupId?: number;
2185
2185
  /**
@@ -2195,13 +2195,13 @@ export interface GroupProtectedEnvironmentApprovalRule {
2195
2195
  */
2196
2196
  requiredApprovals: number;
2197
2197
  /**
2198
- * The ID of the user allowed to approve a deployment to this protected environment. The user must be a member of the group with Maintainer role or higher. This is mutually exclusive with group*id and required*approvals.
2198
+ * The ID of the user allowed to approve a deployment to this protected environment. The user must be a member of the group with Maintainer role or higher. Mutually exclusive with `accessLevel` and `groupId`.
2199
2199
  */
2200
2200
  userId?: number;
2201
2201
  }
2202
2202
  export interface GroupProtectedEnvironmentDeployAccessLevel {
2203
2203
  /**
2204
- * Levels of access required to deploy to this protected environment. Valid values are `developer`, `maintainer`.
2204
+ * Levels of access required to deploy to this protected environment. Mutually exclusive with `userId` and `groupId`. Valid values are `developer`, `maintainer`.
2205
2205
  */
2206
2206
  accessLevel?: string;
2207
2207
  /**
@@ -2209,7 +2209,7 @@ export interface GroupProtectedEnvironmentDeployAccessLevel {
2209
2209
  */
2210
2210
  accessLevelDescription: string;
2211
2211
  /**
2212
- * The ID of the group allowed to deploy to this protected environment. The group must be a sub-group under the given group.
2212
+ * The ID of the group allowed to deploy to this protected environment. The group must be a sub-group under the given group. Mutually exclusive with `accessLevel` and `userId`.
2213
2213
  */
2214
2214
  groupId?: number;
2215
2215
  /**
@@ -2221,7 +2221,7 @@ export interface GroupProtectedEnvironmentDeployAccessLevel {
2221
2221
  */
2222
2222
  id: number;
2223
2223
  /**
2224
- * The ID of the user allowed to deploy to this protected environment. The user must be a member of the group with Maintainer role or higher.
2224
+ * The ID of the user allowed to deploy to this protected environment. The user must be a member of the group with Maintainer role or higher. Mutually exclusive with `accessLevel` and `groupId`.
2225
2225
  */
2226
2226
  userId?: number;
2227
2227
  }
@@ -2359,7 +2359,7 @@ export interface ProjectIssueTaskCompletionStatus {
2359
2359
  }
2360
2360
  export interface ProjectProtectedEnvironmentApprovalRule {
2361
2361
  /**
2362
- * Levels of access allowed to approve a deployment to this protected environment. Valid values are `developer`, `maintainer`.
2362
+ * Levels of access allowed to approve a deployment to this protected environment. Mutually exclusive with `userId` and `groupId`. Valid values are `developer`, `maintainer`.
2363
2363
  */
2364
2364
  accessLevel?: string;
2365
2365
  /**
@@ -2367,7 +2367,7 @@ export interface ProjectProtectedEnvironmentApprovalRule {
2367
2367
  */
2368
2368
  accessLevelDescription: string;
2369
2369
  /**
2370
- * The ID of the group allowed to approve a deployment to this protected environment. The project must be shared with the group. This is mutually exclusive with user_id.
2370
+ * The ID of the group allowed to approve a deployment to this protected environment. The project must be shared with the group. Mutually exclusive with `accessLevel` and `userId`.
2371
2371
  */
2372
2372
  groupId?: number;
2373
2373
  /**
@@ -2383,13 +2383,13 @@ export interface ProjectProtectedEnvironmentApprovalRule {
2383
2383
  */
2384
2384
  requiredApprovals: number;
2385
2385
  /**
2386
- * The ID of the user allowed to approve a deployment to this protected environment. The user must be a member of the project. This is mutually exclusive with group*id and required*approvals.
2386
+ * The ID of the user allowed to approve a deployment to this protected environment. The user must be a member of the project. Mutually exclusive with `accessLevel` and `groupId`.
2387
2387
  */
2388
2388
  userId?: number;
2389
2389
  }
2390
2390
  export interface ProjectProtectedEnvironmentDeployAccessLevel {
2391
2391
  /**
2392
- * Levels of access required to deploy to this protected environment. Valid values are `developer`, `maintainer`.
2392
+ * Levels of access required to deploy to this protected environment. Mutually exclusive with `userId` and `groupId`. Valid values are `developer`, `maintainer`.
2393
2393
  */
2394
2394
  accessLevel?: string;
2395
2395
  /**
@@ -2397,7 +2397,7 @@ export interface ProjectProtectedEnvironmentDeployAccessLevel {
2397
2397
  */
2398
2398
  accessLevelDescription: string;
2399
2399
  /**
2400
- * The ID of the group allowed to deploy to this protected environment. The project must be shared with the group.
2400
+ * The ID of the group allowed to deploy to this protected environment. The project must be shared with the group. Mutually exclusive with `accessLevel` and `userId`.
2401
2401
  */
2402
2402
  groupId?: number;
2403
2403
  /**
@@ -2409,7 +2409,7 @@ export interface ProjectProtectedEnvironmentDeployAccessLevel {
2409
2409
  */
2410
2410
  id: number;
2411
2411
  /**
2412
- * The ID of the user allowed to deploy to this protected environment. The user must be a member of the project.
2412
+ * The ID of the user allowed to deploy to this protected environment. The user must be a member of the project. Mutually exclusive with `accessLevel` and `groupId`.
2413
2413
  */
2414
2414
  userId?: number;
2415
2415
  }