@pulumi/gitlab 8.6.0 → 8.6.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/group.d.ts
CHANGED
|
@@ -120,7 +120,7 @@ export declare class Group extends pulumi.CustomResource {
|
|
|
120
120
|
/**
|
|
121
121
|
* A list of email address domains to allow group access. Will be concatenated together into a comma separated string.
|
|
122
122
|
*/
|
|
123
|
-
readonly allowedEmailDomainsLists: pulumi.Output<string[]
|
|
123
|
+
readonly allowedEmailDomainsLists: pulumi.Output<string[]>;
|
|
124
124
|
/**
|
|
125
125
|
* Default to Auto DevOps pipeline for all projects within this group.
|
|
126
126
|
*/
|
|
@@ -1,4 +1,6 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
import * as inputs from "./types/input";
|
|
3
|
+
import * as outputs from "./types/output";
|
|
2
4
|
/**
|
|
3
5
|
* The `gitlab.GroupServiceAccountAccessToken` resource allows to manage the lifecycle of a group service account access token.
|
|
4
6
|
*
|
|
@@ -6,42 +8,11 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
6
8
|
*
|
|
7
9
|
* > Reading the access token status of a service account requires an admin token or a top-level group owner token on gitlab.com. As a result, this resource will ignore permission errors when attempting to read the token status, and will rely on the values in state instead. This can lead to apply-time failures if the token configured for the provider doesn't have permissions to rotate tokens for the service account.
|
|
8
10
|
*
|
|
9
|
-
*
|
|
11
|
+
* > Use `rotationConfiguration` to automatically rotate tokens instead of using `timestamp()` as timestamp will cause changes with every plan. `pulumi up` must still be run to rotate the token.
|
|
10
12
|
*
|
|
11
|
-
*
|
|
12
|
-
*
|
|
13
|
-
*
|
|
14
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
15
|
-
* import * as gitlab from "@pulumi/gitlab";
|
|
16
|
-
*
|
|
17
|
-
* // This must be a top-level group
|
|
18
|
-
* const example = new gitlab.Group("example", {
|
|
19
|
-
* name: "example",
|
|
20
|
-
* path: "example",
|
|
21
|
-
* description: "An example group",
|
|
22
|
-
* });
|
|
23
|
-
* // The service account against the top-level group
|
|
24
|
-
* const exampleSa = new gitlab.GroupServiceAccount("example_sa", {
|
|
25
|
-
* group: example.id,
|
|
26
|
-
* name: "example-name",
|
|
27
|
-
* username: "example-username",
|
|
28
|
-
* });
|
|
29
|
-
* // To assign the service account to a group
|
|
30
|
-
* const exampleMembership = new gitlab.GroupMembership("example_membership", {
|
|
31
|
-
* groupId: example.id,
|
|
32
|
-
* userId: exampleSa.serviceAccountId,
|
|
33
|
-
* accessLevel: "developer",
|
|
34
|
-
* expiresAt: "2020-03-14",
|
|
35
|
-
* });
|
|
36
|
-
* // The service account access token
|
|
37
|
-
* const exampleSaToken = new gitlab.GroupServiceAccountAccessToken("example_sa_token", {
|
|
38
|
-
* group: example.id,
|
|
39
|
-
* userId: exampleSa.serviceAccountId,
|
|
40
|
-
* name: "Example service account access token",
|
|
41
|
-
* expiresAt: "2020-03-14",
|
|
42
|
-
* scopes: ["api"],
|
|
43
|
-
* });
|
|
44
|
-
* ```
|
|
13
|
+
* > Due to a limitation in the API, the `rotationConfiguration` is unable to set the new expiry date. Instead, when the resource is created, it will default the expiry date to 7 days in the future. On each subsequent apply, the new expiry will be 7 days from the date of the apply.
|
|
14
|
+
*
|
|
15
|
+
* **Upstream API**: [GitLab API docs](https://docs.gitlab.com/ee/api/group_service_accounts.html#create-a-personal-access-token-for-a-service-account-user)
|
|
45
16
|
*
|
|
46
17
|
* ## Import
|
|
47
18
|
*
|
|
@@ -96,7 +67,7 @@ export declare class GroupServiceAccountAccessToken extends pulumi.CustomResourc
|
|
|
96
67
|
*/
|
|
97
68
|
readonly createdAt: pulumi.Output<string>;
|
|
98
69
|
/**
|
|
99
|
-
* The
|
|
70
|
+
* The service account access token expiry date. When left blank, the token follows the standard rule of expiry for personal access tokens.
|
|
100
71
|
*/
|
|
101
72
|
readonly expiresAt: pulumi.Output<string>;
|
|
102
73
|
/**
|
|
@@ -111,6 +82,10 @@ export declare class GroupServiceAccountAccessToken extends pulumi.CustomResourc
|
|
|
111
82
|
* True if the token is revoked.
|
|
112
83
|
*/
|
|
113
84
|
readonly revoked: pulumi.Output<boolean>;
|
|
85
|
+
/**
|
|
86
|
+
* The configuration for when to rotate a token automatically. Will not rotate a token until `pulumi up` is run.
|
|
87
|
+
*/
|
|
88
|
+
readonly rotationConfiguration: pulumi.Output<outputs.GroupServiceAccountAccessTokenRotationConfiguration | undefined>;
|
|
114
89
|
/**
|
|
115
90
|
* The scopes of the group service account access token. valid values are: `api`, `readApi`, `readRegistry`, `writeRegistry`, `readRepository`, `writeRepository`, `createRunner`, `manageRunner`, `aiFeatures`, `k8sProxy`, `readObservability`, `writeObservability`
|
|
116
91
|
*/
|
|
@@ -145,7 +120,7 @@ export interface GroupServiceAccountAccessTokenState {
|
|
|
145
120
|
*/
|
|
146
121
|
createdAt?: pulumi.Input<string>;
|
|
147
122
|
/**
|
|
148
|
-
* The
|
|
123
|
+
* The service account access token expiry date. When left blank, the token follows the standard rule of expiry for personal access tokens.
|
|
149
124
|
*/
|
|
150
125
|
expiresAt?: pulumi.Input<string>;
|
|
151
126
|
/**
|
|
@@ -160,6 +135,10 @@ export interface GroupServiceAccountAccessTokenState {
|
|
|
160
135
|
* True if the token is revoked.
|
|
161
136
|
*/
|
|
162
137
|
revoked?: pulumi.Input<boolean>;
|
|
138
|
+
/**
|
|
139
|
+
* The configuration for when to rotate a token automatically. Will not rotate a token until `pulumi up` is run.
|
|
140
|
+
*/
|
|
141
|
+
rotationConfiguration?: pulumi.Input<inputs.GroupServiceAccountAccessTokenRotationConfiguration>;
|
|
163
142
|
/**
|
|
164
143
|
* The scopes of the group service account access token. valid values are: `api`, `readApi`, `readRegistry`, `writeRegistry`, `readRepository`, `writeRepository`, `createRunner`, `manageRunner`, `aiFeatures`, `k8sProxy`, `readObservability`, `writeObservability`
|
|
165
144
|
*/
|
|
@@ -178,7 +157,7 @@ export interface GroupServiceAccountAccessTokenState {
|
|
|
178
157
|
*/
|
|
179
158
|
export interface GroupServiceAccountAccessTokenArgs {
|
|
180
159
|
/**
|
|
181
|
-
* The
|
|
160
|
+
* The service account access token expiry date. When left blank, the token follows the standard rule of expiry for personal access tokens.
|
|
182
161
|
*/
|
|
183
162
|
expiresAt?: pulumi.Input<string>;
|
|
184
163
|
/**
|
|
@@ -189,6 +168,10 @@ export interface GroupServiceAccountAccessTokenArgs {
|
|
|
189
168
|
* The name of the personal access token.
|
|
190
169
|
*/
|
|
191
170
|
name?: pulumi.Input<string>;
|
|
171
|
+
/**
|
|
172
|
+
* The configuration for when to rotate a token automatically. Will not rotate a token until `pulumi up` is run.
|
|
173
|
+
*/
|
|
174
|
+
rotationConfiguration?: pulumi.Input<inputs.GroupServiceAccountAccessTokenRotationConfiguration>;
|
|
192
175
|
/**
|
|
193
176
|
* The scopes of the group service account access token. valid values are: `api`, `readApi`, `readRegistry`, `writeRegistry`, `readRepository`, `writeRepository`, `createRunner`, `manageRunner`, `aiFeatures`, `k8sProxy`, `readObservability`, `writeObservability`
|
|
194
177
|
*/
|
|
@@ -12,42 +12,11 @@ const utilities = require("./utilities");
|
|
|
12
12
|
*
|
|
13
13
|
* > Reading the access token status of a service account requires an admin token or a top-level group owner token on gitlab.com. As a result, this resource will ignore permission errors when attempting to read the token status, and will rely on the values in state instead. This can lead to apply-time failures if the token configured for the provider doesn't have permissions to rotate tokens for the service account.
|
|
14
14
|
*
|
|
15
|
-
*
|
|
15
|
+
* > Use `rotationConfiguration` to automatically rotate tokens instead of using `timestamp()` as timestamp will cause changes with every plan. `pulumi up` must still be run to rotate the token.
|
|
16
16
|
*
|
|
17
|
-
*
|
|
18
|
-
*
|
|
19
|
-
*
|
|
20
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
21
|
-
* import * as gitlab from "@pulumi/gitlab";
|
|
22
|
-
*
|
|
23
|
-
* // This must be a top-level group
|
|
24
|
-
* const example = new gitlab.Group("example", {
|
|
25
|
-
* name: "example",
|
|
26
|
-
* path: "example",
|
|
27
|
-
* description: "An example group",
|
|
28
|
-
* });
|
|
29
|
-
* // The service account against the top-level group
|
|
30
|
-
* const exampleSa = new gitlab.GroupServiceAccount("example_sa", {
|
|
31
|
-
* group: example.id,
|
|
32
|
-
* name: "example-name",
|
|
33
|
-
* username: "example-username",
|
|
34
|
-
* });
|
|
35
|
-
* // To assign the service account to a group
|
|
36
|
-
* const exampleMembership = new gitlab.GroupMembership("example_membership", {
|
|
37
|
-
* groupId: example.id,
|
|
38
|
-
* userId: exampleSa.serviceAccountId,
|
|
39
|
-
* accessLevel: "developer",
|
|
40
|
-
* expiresAt: "2020-03-14",
|
|
41
|
-
* });
|
|
42
|
-
* // The service account access token
|
|
43
|
-
* const exampleSaToken = new gitlab.GroupServiceAccountAccessToken("example_sa_token", {
|
|
44
|
-
* group: example.id,
|
|
45
|
-
* userId: exampleSa.serviceAccountId,
|
|
46
|
-
* name: "Example service account access token",
|
|
47
|
-
* expiresAt: "2020-03-14",
|
|
48
|
-
* scopes: ["api"],
|
|
49
|
-
* });
|
|
50
|
-
* ```
|
|
17
|
+
* > Due to a limitation in the API, the `rotationConfiguration` is unable to set the new expiry date. Instead, when the resource is created, it will default the expiry date to 7 days in the future. On each subsequent apply, the new expiry will be 7 days from the date of the apply.
|
|
18
|
+
*
|
|
19
|
+
* **Upstream API**: [GitLab API docs](https://docs.gitlab.com/ee/api/group_service_accounts.html#create-a-personal-access-token-for-a-service-account-user)
|
|
51
20
|
*
|
|
52
21
|
* ## Import
|
|
53
22
|
*
|
|
@@ -111,6 +80,7 @@ class GroupServiceAccountAccessToken extends pulumi.CustomResource {
|
|
|
111
80
|
resourceInputs["group"] = state ? state.group : undefined;
|
|
112
81
|
resourceInputs["name"] = state ? state.name : undefined;
|
|
113
82
|
resourceInputs["revoked"] = state ? state.revoked : undefined;
|
|
83
|
+
resourceInputs["rotationConfiguration"] = state ? state.rotationConfiguration : undefined;
|
|
114
84
|
resourceInputs["scopes"] = state ? state.scopes : undefined;
|
|
115
85
|
resourceInputs["token"] = state ? state.token : undefined;
|
|
116
86
|
resourceInputs["userId"] = state ? state.userId : undefined;
|
|
@@ -129,6 +99,7 @@ class GroupServiceAccountAccessToken extends pulumi.CustomResource {
|
|
|
129
99
|
resourceInputs["expiresAt"] = args ? args.expiresAt : undefined;
|
|
130
100
|
resourceInputs["group"] = args ? args.group : undefined;
|
|
131
101
|
resourceInputs["name"] = args ? args.name : undefined;
|
|
102
|
+
resourceInputs["rotationConfiguration"] = args ? args.rotationConfiguration : undefined;
|
|
132
103
|
resourceInputs["scopes"] = args ? args.scopes : undefined;
|
|
133
104
|
resourceInputs["userId"] = args ? args.userId : undefined;
|
|
134
105
|
resourceInputs["active"] = undefined /*out*/;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"groupServiceAccountAccessToken.js","sourceRoot":"","sources":["../groupServiceAccountAccessToken.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;
|
|
1
|
+
{"version":3,"file":"groupServiceAccountAccessToken.js","sourceRoot":"","sources":["../groupServiceAccountAccessToken.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAwCG;AACH,MAAa,8BAA+B,SAAQ,MAAM,CAAC,cAAc;IACrE;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA2C,EAAE,IAAmC;QACzI,OAAO,IAAI,8BAA8B,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACrF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,8BAA8B,CAAC,YAAY,CAAC;IAC/E,CAAC;IAmDD,YAAY,IAAY,EAAE,WAAsF,EAAE,IAAmC;QACjJ,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA8D,CAAC;YAC7E,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,qBAAqB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAA6D,CAAC;YAC3E,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,qBAAqB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,QAAQ,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC7C,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAChD,cAAc,CAAC,SAAS,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC9C,cAAc,CAAC,OAAO,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAC/C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,OAAO,CAAC,EAAE,CAAC;QAC1D,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,8BAA8B,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACnF,CAAC;;AAtHL,wEAuHC;AAzGG,gBAAgB;AACO,2CAAY,GAAG,4EAA4E,CAAC"}
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@pulumi/gitlab",
|
|
3
|
-
"version": "8.6.
|
|
3
|
+
"version": "8.6.1",
|
|
4
4
|
"description": "A Pulumi package for creating and managing GitLab resources.",
|
|
5
5
|
"keywords": [
|
|
6
6
|
"pulumi",
|
|
@@ -25,6 +25,6 @@
|
|
|
25
25
|
"pulumi": {
|
|
26
26
|
"resource": true,
|
|
27
27
|
"name": "gitlab",
|
|
28
|
-
"version": "8.6.
|
|
28
|
+
"version": "8.6.1"
|
|
29
29
|
}
|
|
30
30
|
}
|
package/types/input.d.ts
CHANGED
|
@@ -798,6 +798,12 @@ export interface GroupPushRules {
|
|
|
798
798
|
*/
|
|
799
799
|
rejectUnsignedCommits?: pulumi.Input<boolean>;
|
|
800
800
|
}
|
|
801
|
+
export interface GroupServiceAccountAccessTokenRotationConfiguration {
|
|
802
|
+
/**
|
|
803
|
+
* The duration (in days) before the expiration when the token should be rotated. As an example, if set to 7 days, the token will rotate 7 days before the expiration date, but only when `pulumi up` is run in that timeframe.
|
|
804
|
+
*/
|
|
805
|
+
rotateBeforeDays: pulumi.Input<number>;
|
|
806
|
+
}
|
|
801
807
|
export interface PersonalAccessTokenRotationConfiguration {
|
|
802
808
|
/**
|
|
803
809
|
* The duration (in days) the new token should be valid for.
|
package/types/output.d.ts
CHANGED
|
@@ -2832,6 +2832,12 @@ export interface GroupPushRules {
|
|
|
2832
2832
|
*/
|
|
2833
2833
|
rejectUnsignedCommits: boolean;
|
|
2834
2834
|
}
|
|
2835
|
+
export interface GroupServiceAccountAccessTokenRotationConfiguration {
|
|
2836
|
+
/**
|
|
2837
|
+
* The duration (in days) before the expiration when the token should be rotated. As an example, if set to 7 days, the token will rotate 7 days before the expiration date, but only when `pulumi up` is run in that timeframe.
|
|
2838
|
+
*/
|
|
2839
|
+
rotateBeforeDays: number;
|
|
2840
|
+
}
|
|
2835
2841
|
export interface PersonalAccessTokenRotationConfiguration {
|
|
2836
2842
|
/**
|
|
2837
2843
|
* The duration (in days) the new token should be valid for.
|