@pulumi/gitlab 8.6.0 → 8.6.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/group.d.ts CHANGED
@@ -120,7 +120,7 @@ export declare class Group extends pulumi.CustomResource {
120
120
  /**
121
121
  * A list of email address domains to allow group access. Will be concatenated together into a comma separated string.
122
122
  */
123
- readonly allowedEmailDomainsLists: pulumi.Output<string[] | undefined>;
123
+ readonly allowedEmailDomainsLists: pulumi.Output<string[]>;
124
124
  /**
125
125
  * Default to Auto DevOps pipeline for all projects within this group.
126
126
  */
@@ -1,4 +1,6 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
+ import * as inputs from "./types/input";
3
+ import * as outputs from "./types/output";
2
4
  /**
3
5
  * The `gitlab.GroupServiceAccountAccessToken` resource allows to manage the lifecycle of a group service account access token.
4
6
  *
@@ -6,42 +8,11 @@ import * as pulumi from "@pulumi/pulumi";
6
8
  *
7
9
  * > Reading the access token status of a service account requires an admin token or a top-level group owner token on gitlab.com. As a result, this resource will ignore permission errors when attempting to read the token status, and will rely on the values in state instead. This can lead to apply-time failures if the token configured for the provider doesn't have permissions to rotate tokens for the service account.
8
10
  *
9
- * **Upstream API**: [GitLab API docs](https://docs.gitlab.com/ee/api/group_service_accounts.html#create-a-personal-access-token-for-a-service-account-user)
11
+ * > Use `rotationConfiguration` to automatically rotate tokens instead of using `timestamp()` as timestamp will cause changes with every plan. `pulumi up` must still be run to rotate the token.
10
12
  *
11
- * ## Example Usage
12
- *
13
- * ```typescript
14
- * import * as pulumi from "@pulumi/pulumi";
15
- * import * as gitlab from "@pulumi/gitlab";
16
- *
17
- * // This must be a top-level group
18
- * const example = new gitlab.Group("example", {
19
- * name: "example",
20
- * path: "example",
21
- * description: "An example group",
22
- * });
23
- * // The service account against the top-level group
24
- * const exampleSa = new gitlab.GroupServiceAccount("example_sa", {
25
- * group: example.id,
26
- * name: "example-name",
27
- * username: "example-username",
28
- * });
29
- * // To assign the service account to a group
30
- * const exampleMembership = new gitlab.GroupMembership("example_membership", {
31
- * groupId: example.id,
32
- * userId: exampleSa.serviceAccountId,
33
- * accessLevel: "developer",
34
- * expiresAt: "2020-03-14",
35
- * });
36
- * // The service account access token
37
- * const exampleSaToken = new gitlab.GroupServiceAccountAccessToken("example_sa_token", {
38
- * group: example.id,
39
- * userId: exampleSa.serviceAccountId,
40
- * name: "Example service account access token",
41
- * expiresAt: "2020-03-14",
42
- * scopes: ["api"],
43
- * });
44
- * ```
13
+ * > Due to a limitation in the API, the `rotationConfiguration` is unable to set the new expiry date. Instead, when the resource is created, it will default the expiry date to 7 days in the future. On each subsequent apply, the new expiry will be 7 days from the date of the apply.
14
+ *
15
+ * **Upstream API**: [GitLab API docs](https://docs.gitlab.com/ee/api/group_service_accounts.html#create-a-personal-access-token-for-a-service-account-user)
45
16
  *
46
17
  * ## Import
47
18
  *
@@ -96,7 +67,7 @@ export declare class GroupServiceAccountAccessToken extends pulumi.CustomResourc
96
67
  */
97
68
  readonly createdAt: pulumi.Output<string>;
98
69
  /**
99
- * The personal access token expiry date. When left blank, the token follows the standard rule of expiry for personal access tokens.
70
+ * The service account access token expiry date. When left blank, the token follows the standard rule of expiry for personal access tokens.
100
71
  */
101
72
  readonly expiresAt: pulumi.Output<string>;
102
73
  /**
@@ -111,6 +82,10 @@ export declare class GroupServiceAccountAccessToken extends pulumi.CustomResourc
111
82
  * True if the token is revoked.
112
83
  */
113
84
  readonly revoked: pulumi.Output<boolean>;
85
+ /**
86
+ * The configuration for when to rotate a token automatically. Will not rotate a token until `pulumi up` is run.
87
+ */
88
+ readonly rotationConfiguration: pulumi.Output<outputs.GroupServiceAccountAccessTokenRotationConfiguration | undefined>;
114
89
  /**
115
90
  * The scopes of the group service account access token. valid values are: `api`, `readApi`, `readRegistry`, `writeRegistry`, `readRepository`, `writeRepository`, `createRunner`, `manageRunner`, `aiFeatures`, `k8sProxy`, `readObservability`, `writeObservability`
116
91
  */
@@ -145,7 +120,7 @@ export interface GroupServiceAccountAccessTokenState {
145
120
  */
146
121
  createdAt?: pulumi.Input<string>;
147
122
  /**
148
- * The personal access token expiry date. When left blank, the token follows the standard rule of expiry for personal access tokens.
123
+ * The service account access token expiry date. When left blank, the token follows the standard rule of expiry for personal access tokens.
149
124
  */
150
125
  expiresAt?: pulumi.Input<string>;
151
126
  /**
@@ -160,6 +135,10 @@ export interface GroupServiceAccountAccessTokenState {
160
135
  * True if the token is revoked.
161
136
  */
162
137
  revoked?: pulumi.Input<boolean>;
138
+ /**
139
+ * The configuration for when to rotate a token automatically. Will not rotate a token until `pulumi up` is run.
140
+ */
141
+ rotationConfiguration?: pulumi.Input<inputs.GroupServiceAccountAccessTokenRotationConfiguration>;
163
142
  /**
164
143
  * The scopes of the group service account access token. valid values are: `api`, `readApi`, `readRegistry`, `writeRegistry`, `readRepository`, `writeRepository`, `createRunner`, `manageRunner`, `aiFeatures`, `k8sProxy`, `readObservability`, `writeObservability`
165
144
  */
@@ -178,7 +157,7 @@ export interface GroupServiceAccountAccessTokenState {
178
157
  */
179
158
  export interface GroupServiceAccountAccessTokenArgs {
180
159
  /**
181
- * The personal access token expiry date. When left blank, the token follows the standard rule of expiry for personal access tokens.
160
+ * The service account access token expiry date. When left blank, the token follows the standard rule of expiry for personal access tokens.
182
161
  */
183
162
  expiresAt?: pulumi.Input<string>;
184
163
  /**
@@ -189,6 +168,10 @@ export interface GroupServiceAccountAccessTokenArgs {
189
168
  * The name of the personal access token.
190
169
  */
191
170
  name?: pulumi.Input<string>;
171
+ /**
172
+ * The configuration for when to rotate a token automatically. Will not rotate a token until `pulumi up` is run.
173
+ */
174
+ rotationConfiguration?: pulumi.Input<inputs.GroupServiceAccountAccessTokenRotationConfiguration>;
192
175
  /**
193
176
  * The scopes of the group service account access token. valid values are: `api`, `readApi`, `readRegistry`, `writeRegistry`, `readRepository`, `writeRepository`, `createRunner`, `manageRunner`, `aiFeatures`, `k8sProxy`, `readObservability`, `writeObservability`
194
177
  */
@@ -12,42 +12,11 @@ const utilities = require("./utilities");
12
12
  *
13
13
  * > Reading the access token status of a service account requires an admin token or a top-level group owner token on gitlab.com. As a result, this resource will ignore permission errors when attempting to read the token status, and will rely on the values in state instead. This can lead to apply-time failures if the token configured for the provider doesn't have permissions to rotate tokens for the service account.
14
14
  *
15
- * **Upstream API**: [GitLab API docs](https://docs.gitlab.com/ee/api/group_service_accounts.html#create-a-personal-access-token-for-a-service-account-user)
15
+ * > Use `rotationConfiguration` to automatically rotate tokens instead of using `timestamp()` as timestamp will cause changes with every plan. `pulumi up` must still be run to rotate the token.
16
16
  *
17
- * ## Example Usage
18
- *
19
- * ```typescript
20
- * import * as pulumi from "@pulumi/pulumi";
21
- * import * as gitlab from "@pulumi/gitlab";
22
- *
23
- * // This must be a top-level group
24
- * const example = new gitlab.Group("example", {
25
- * name: "example",
26
- * path: "example",
27
- * description: "An example group",
28
- * });
29
- * // The service account against the top-level group
30
- * const exampleSa = new gitlab.GroupServiceAccount("example_sa", {
31
- * group: example.id,
32
- * name: "example-name",
33
- * username: "example-username",
34
- * });
35
- * // To assign the service account to a group
36
- * const exampleMembership = new gitlab.GroupMembership("example_membership", {
37
- * groupId: example.id,
38
- * userId: exampleSa.serviceAccountId,
39
- * accessLevel: "developer",
40
- * expiresAt: "2020-03-14",
41
- * });
42
- * // The service account access token
43
- * const exampleSaToken = new gitlab.GroupServiceAccountAccessToken("example_sa_token", {
44
- * group: example.id,
45
- * userId: exampleSa.serviceAccountId,
46
- * name: "Example service account access token",
47
- * expiresAt: "2020-03-14",
48
- * scopes: ["api"],
49
- * });
50
- * ```
17
+ * > Due to a limitation in the API, the `rotationConfiguration` is unable to set the new expiry date. Instead, when the resource is created, it will default the expiry date to 7 days in the future. On each subsequent apply, the new expiry will be 7 days from the date of the apply.
18
+ *
19
+ * **Upstream API**: [GitLab API docs](https://docs.gitlab.com/ee/api/group_service_accounts.html#create-a-personal-access-token-for-a-service-account-user)
51
20
  *
52
21
  * ## Import
53
22
  *
@@ -111,6 +80,7 @@ class GroupServiceAccountAccessToken extends pulumi.CustomResource {
111
80
  resourceInputs["group"] = state ? state.group : undefined;
112
81
  resourceInputs["name"] = state ? state.name : undefined;
113
82
  resourceInputs["revoked"] = state ? state.revoked : undefined;
83
+ resourceInputs["rotationConfiguration"] = state ? state.rotationConfiguration : undefined;
114
84
  resourceInputs["scopes"] = state ? state.scopes : undefined;
115
85
  resourceInputs["token"] = state ? state.token : undefined;
116
86
  resourceInputs["userId"] = state ? state.userId : undefined;
@@ -129,6 +99,7 @@ class GroupServiceAccountAccessToken extends pulumi.CustomResource {
129
99
  resourceInputs["expiresAt"] = args ? args.expiresAt : undefined;
130
100
  resourceInputs["group"] = args ? args.group : undefined;
131
101
  resourceInputs["name"] = args ? args.name : undefined;
102
+ resourceInputs["rotationConfiguration"] = args ? args.rotationConfiguration : undefined;
132
103
  resourceInputs["scopes"] = args ? args.scopes : undefined;
133
104
  resourceInputs["userId"] = args ? args.userId : undefined;
134
105
  resourceInputs["active"] = undefined /*out*/;
@@ -1 +1 @@
1
- {"version":3,"file":"groupServiceAccountAccessToken.js","sourceRoot":"","sources":["../groupServiceAccountAccessToken.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAuEG;AACH,MAAa,8BAA+B,SAAQ,MAAM,CAAC,cAAc;IACrE;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA2C,EAAE,IAAmC;QACzI,OAAO,IAAI,8BAA8B,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACrF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,8BAA8B,CAAC,YAAY,CAAC;IAC/E,CAAC;IA+CD,YAAY,IAAY,EAAE,WAAsF,EAAE,IAAmC;QACjJ,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA8D,CAAC;YAC7E,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAA6D,CAAC;YAC3E,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,QAAQ,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC7C,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAChD,cAAc,CAAC,SAAS,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC9C,cAAc,CAAC,OAAO,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAC/C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,OAAO,CAAC,EAAE,CAAC;QAC1D,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,8BAA8B,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACnF,CAAC;;AAhHL,wEAiHC;AAnGG,gBAAgB;AACO,2CAAY,GAAG,4EAA4E,CAAC"}
1
+ {"version":3,"file":"groupServiceAccountAccessToken.js","sourceRoot":"","sources":["../groupServiceAccountAccessToken.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAwCG;AACH,MAAa,8BAA+B,SAAQ,MAAM,CAAC,cAAc;IACrE;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA2C,EAAE,IAAmC;QACzI,OAAO,IAAI,8BAA8B,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACrF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,8BAA8B,CAAC,YAAY,CAAC;IAC/E,CAAC;IAmDD,YAAY,IAAY,EAAE,WAAsF,EAAE,IAAmC;QACjJ,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA8D,CAAC;YAC7E,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,qBAAqB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAA6D,CAAC;YAC3E,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,qBAAqB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,QAAQ,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC7C,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAChD,cAAc,CAAC,SAAS,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC9C,cAAc,CAAC,OAAO,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAC/C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,OAAO,CAAC,EAAE,CAAC;QAC1D,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,8BAA8B,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACnF,CAAC;;AAtHL,wEAuHC;AAzGG,gBAAgB;AACO,2CAAY,GAAG,4EAA4E,CAAC"}
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@pulumi/gitlab",
3
- "version": "8.6.0",
3
+ "version": "8.6.1",
4
4
  "description": "A Pulumi package for creating and managing GitLab resources.",
5
5
  "keywords": [
6
6
  "pulumi",
@@ -25,6 +25,6 @@
25
25
  "pulumi": {
26
26
  "resource": true,
27
27
  "name": "gitlab",
28
- "version": "8.6.0"
28
+ "version": "8.6.1"
29
29
  }
30
30
  }
package/types/input.d.ts CHANGED
@@ -798,6 +798,12 @@ export interface GroupPushRules {
798
798
  */
799
799
  rejectUnsignedCommits?: pulumi.Input<boolean>;
800
800
  }
801
+ export interface GroupServiceAccountAccessTokenRotationConfiguration {
802
+ /**
803
+ * The duration (in days) before the expiration when the token should be rotated. As an example, if set to 7 days, the token will rotate 7 days before the expiration date, but only when `pulumi up` is run in that timeframe.
804
+ */
805
+ rotateBeforeDays: pulumi.Input<number>;
806
+ }
801
807
  export interface PersonalAccessTokenRotationConfiguration {
802
808
  /**
803
809
  * The duration (in days) the new token should be valid for.
package/types/output.d.ts CHANGED
@@ -2832,6 +2832,12 @@ export interface GroupPushRules {
2832
2832
  */
2833
2833
  rejectUnsignedCommits: boolean;
2834
2834
  }
2835
+ export interface GroupServiceAccountAccessTokenRotationConfiguration {
2836
+ /**
2837
+ * The duration (in days) before the expiration when the token should be rotated. As an example, if set to 7 days, the token will rotate 7 days before the expiration date, but only when `pulumi up` is run in that timeframe.
2838
+ */
2839
+ rotateBeforeDays: number;
2840
+ }
2835
2841
  export interface PersonalAccessTokenRotationConfiguration {
2836
2842
  /**
2837
2843
  * The duration (in days) the new token should be valid for.