@pulumi/gitlab 9.6.0-alpha.1766429294 → 9.6.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (97) hide show
  1. package/getArtifactFile.d.ts +2 -2
  2. package/getArtifactFile.js +2 -2
  3. package/getGroupBillableMemberMemberships.d.ts +2 -2
  4. package/getGroupBillableMemberMemberships.js +2 -2
  5. package/getGroupMembership.d.ts +2 -2
  6. package/getGroupMembership.js +2 -2
  7. package/getGroupServiceAccount.d.ts +2 -2
  8. package/getGroupServiceAccount.js +2 -2
  9. package/getGroupVariable.d.ts +1 -1
  10. package/getInstanceServiceAccount.d.ts +2 -2
  11. package/getInstanceServiceAccount.js +2 -2
  12. package/getProject.d.ts +0 -4
  13. package/getProject.js.map +1 -1
  14. package/getProjectMembership.d.ts +2 -2
  15. package/getProjectMembership.js +2 -2
  16. package/getProjectProtectedTag.d.ts +2 -2
  17. package/getProjectProtectedTag.js +2 -2
  18. package/getProjects.d.ts +3 -3
  19. package/getReleaseLink.d.ts +5 -5
  20. package/getReleaseLinks.d.ts +3 -3
  21. package/globalLevelNotifications.d.ts +1 -1
  22. package/globalLevelNotifications.js +1 -1
  23. package/groupAccessToken.d.ts +2 -2
  24. package/groupAccessToken.js +2 -2
  25. package/groupLabel.d.ts +3 -3
  26. package/groupMembership.d.ts +1 -1
  27. package/groupMembership.js +1 -1
  28. package/groupServiceAccount.d.ts +1 -1
  29. package/groupServiceAccount.js +1 -1
  30. package/groupServiceAccountAccessToken.d.ts +1 -1
  31. package/groupServiceAccountAccessToken.js +1 -1
  32. package/groupShareGroup.d.ts +1 -1
  33. package/groupShareGroup.js +1 -1
  34. package/index.d.ts +0 -15
  35. package/index.js +5 -23
  36. package/index.js.map +1 -1
  37. package/instanceServiceAccount.d.ts +1 -1
  38. package/instanceServiceAccount.js +1 -1
  39. package/instanceVariable.d.ts +8 -8
  40. package/label.d.ts +3 -3
  41. package/memberRole.d.ts +4 -4
  42. package/memberRole.js +1 -1
  43. package/package.json +2 -2
  44. package/pagesDomain.d.ts +3 -3
  45. package/personalAccessToken.d.ts +1 -1
  46. package/personalAccessToken.js +1 -1
  47. package/pipelineScheduleVariable.d.ts +1 -1
  48. package/pipelineScheduleVariable.js +1 -1
  49. package/project.d.ts +3 -15
  50. package/project.js +0 -2
  51. package/project.js.map +1 -1
  52. package/projectAccessToken.d.ts +1 -1
  53. package/projectAccessToken.js +1 -1
  54. package/projectDeployToken.d.ts +1 -1
  55. package/projectDeployToken.js +1 -1
  56. package/projectHook.d.ts +1 -1
  57. package/projectHook.js +1 -1
  58. package/projectLabel.d.ts +5 -5
  59. package/projectLabel.js +2 -2
  60. package/projectLevelMrApprovals.d.ts +1 -1
  61. package/projectLevelMrApprovals.js +1 -1
  62. package/projectLevelNotifications.d.ts +1 -1
  63. package/projectLevelNotifications.js +1 -1
  64. package/projectMembership.d.ts +1 -1
  65. package/projectMembership.js +1 -1
  66. package/projectTargetBranchRule.d.ts +1 -1
  67. package/projectTargetBranchRule.js +1 -1
  68. package/projectVariable.d.ts +3 -3
  69. package/releaseLink.d.ts +8 -8
  70. package/runner.d.ts +1 -1
  71. package/runner.js +1 -1
  72. package/systemHook.d.ts +3 -3
  73. package/types/input.d.ts +0 -224
  74. package/types/output.d.ts +4 -257
  75. package/userGpgKey.d.ts +1 -1
  76. package/userGpgKey.js +1 -1
  77. package/userImpersonationToken.d.ts +1 -1
  78. package/userImpersonationToken.js +1 -1
  79. package/userRunner.d.ts +1 -1
  80. package/userRunner.js +1 -1
  81. package/userSshKey.d.ts +1 -1
  82. package/userSshKey.js +1 -1
  83. package/getGroupServiceAccountAccessTokens.d.ts +0 -66
  84. package/getGroupServiceAccountAccessTokens.js +0 -42
  85. package/getGroupServiceAccountAccessTokens.js.map +0 -1
  86. package/getProjectIssueLabelEvents.d.ts +0 -94
  87. package/getProjectIssueLabelEvents.js +0 -60
  88. package/getProjectIssueLabelEvents.js.map +0 -1
  89. package/getProjectSecureFile.d.ts +0 -125
  90. package/getProjectSecureFile.js +0 -68
  91. package/getProjectSecureFile.js.map +0 -1
  92. package/getSecurityPolicyDocument.d.ts +0 -112
  93. package/getSecurityPolicyDocument.js +0 -96
  94. package/getSecurityPolicyDocument.js.map +0 -1
  95. package/userAvatar.d.ts +0 -126
  96. package/userAvatar.js +0 -99
  97. package/userAvatar.js.map +0 -1
package/types/input.d.ts CHANGED
@@ -706,230 +706,6 @@ export interface GetReleaseAssetsSourceArgs {
706
706
  */
707
707
  url?: pulumi.Input<string>;
708
708
  }
709
- export interface GetSecurityPolicyDocumentScanExecutionPolicy {
710
- /**
711
- * Actions to execute when rules match. At least one action is required.
712
- */
713
- actions: inputs.GetSecurityPolicyDocumentScanExecutionPolicyAction[];
714
- /**
715
- * Description of the scan execution policy.
716
- */
717
- description?: string;
718
- /**
719
- * Whether the policy is enabled.
720
- */
721
- enabled: boolean;
722
- /**
723
- * Name of the scan execution policy.
724
- */
725
- name: string;
726
- /**
727
- * Scope configuration to limit which projects the policy applies to.
728
- */
729
- policyScope?: inputs.GetSecurityPolicyDocumentScanExecutionPolicyPolicyScope;
730
- /**
731
- * Rules that trigger the policy. At least one rule is required.
732
- */
733
- rules: inputs.GetSecurityPolicyDocumentScanExecutionPolicyRule[];
734
- /**
735
- * Control whether users can use the skip-ci directive.
736
- */
737
- skipCi?: inputs.GetSecurityPolicyDocumentScanExecutionPolicySkipCi;
738
- }
739
- export interface GetSecurityPolicyDocumentScanExecutionPolicyArgs {
740
- /**
741
- * Actions to execute when rules match. At least one action is required.
742
- */
743
- actions: pulumi.Input<pulumi.Input<inputs.GetSecurityPolicyDocumentScanExecutionPolicyActionArgs>[]>;
744
- /**
745
- * Description of the scan execution policy.
746
- */
747
- description?: pulumi.Input<string>;
748
- /**
749
- * Whether the policy is enabled.
750
- */
751
- enabled: pulumi.Input<boolean>;
752
- /**
753
- * Name of the scan execution policy.
754
- */
755
- name: pulumi.Input<string>;
756
- /**
757
- * Scope configuration to limit which projects the policy applies to.
758
- */
759
- policyScope?: pulumi.Input<inputs.GetSecurityPolicyDocumentScanExecutionPolicyPolicyScopeArgs>;
760
- /**
761
- * Rules that trigger the policy. At least one rule is required.
762
- */
763
- rules: pulumi.Input<pulumi.Input<inputs.GetSecurityPolicyDocumentScanExecutionPolicyRuleArgs>[]>;
764
- /**
765
- * Control whether users can use the skip-ci directive.
766
- */
767
- skipCi?: pulumi.Input<inputs.GetSecurityPolicyDocumentScanExecutionPolicySkipCiArgs>;
768
- }
769
- export interface GetSecurityPolicyDocumentScanExecutionPolicyAction {
770
- /**
771
- * Type of scan to run. Valid values: `sast`, `secretDetection`, `containerScanning`, `dependencyScanning`, `dast`, `sastIac`, `clusterImageScanning`, `apiFuzzing`, `coverageFuzzing`.
772
- */
773
- scan: string;
774
- /**
775
- * Scanner profile to use for DAST scans.
776
- */
777
- scannerProfile?: string;
778
- /**
779
- * Site profile to use for DAST scans.
780
- */
781
- siteProfile?: string;
782
- /**
783
- * Tags to exclude from the scan.
784
- */
785
- tagsToExcludes?: string[];
786
- /**
787
- * The template to use for the scan. Valid values: `default`, `latest`.
788
- */
789
- template?: string;
790
- /**
791
- * Environment variables to pass to the scan job.
792
- */
793
- variables?: {
794
- [key: string]: string;
795
- };
796
- }
797
- export interface GetSecurityPolicyDocumentScanExecutionPolicyActionArgs {
798
- /**
799
- * Type of scan to run. Valid values: `sast`, `secretDetection`, `containerScanning`, `dependencyScanning`, `dast`, `sastIac`, `clusterImageScanning`, `apiFuzzing`, `coverageFuzzing`.
800
- */
801
- scan: pulumi.Input<string>;
802
- /**
803
- * Scanner profile to use for DAST scans.
804
- */
805
- scannerProfile?: pulumi.Input<string>;
806
- /**
807
- * Site profile to use for DAST scans.
808
- */
809
- siteProfile?: pulumi.Input<string>;
810
- /**
811
- * Tags to exclude from the scan.
812
- */
813
- tagsToExcludes?: pulumi.Input<pulumi.Input<string>[]>;
814
- /**
815
- * The template to use for the scan. Valid values: `default`, `latest`.
816
- */
817
- template?: pulumi.Input<string>;
818
- /**
819
- * Environment variables to pass to the scan job.
820
- */
821
- variables?: pulumi.Input<{
822
- [key: string]: pulumi.Input<string>;
823
- }>;
824
- }
825
- export interface GetSecurityPolicyDocumentScanExecutionPolicyPolicyScope {
826
- /**
827
- * Compliance framework names to scope the policy to.
828
- */
829
- complianceFrameworks?: string[];
830
- /**
831
- * Project scope configuration.
832
- */
833
- projects?: inputs.GetSecurityPolicyDocumentScanExecutionPolicyPolicyScopeProjects;
834
- }
835
- export interface GetSecurityPolicyDocumentScanExecutionPolicyPolicyScopeArgs {
836
- /**
837
- * Compliance framework names to scope the policy to.
838
- */
839
- complianceFrameworks?: pulumi.Input<pulumi.Input<string>[]>;
840
- /**
841
- * Project scope configuration.
842
- */
843
- projects?: pulumi.Input<inputs.GetSecurityPolicyDocumentScanExecutionPolicyPolicyScopeProjectsArgs>;
844
- }
845
- export interface GetSecurityPolicyDocumentScanExecutionPolicyPolicyScopeProjects {
846
- /**
847
- * List of project IDs to exclude from this policy.
848
- */
849
- excludings?: number[];
850
- /**
851
- * List of project IDs to explicitly include in this policy.
852
- */
853
- includings?: number[];
854
- }
855
- export interface GetSecurityPolicyDocumentScanExecutionPolicyPolicyScopeProjectsArgs {
856
- /**
857
- * List of project IDs to exclude from this policy.
858
- */
859
- excludings?: pulumi.Input<pulumi.Input<number>[]>;
860
- /**
861
- * List of project IDs to explicitly include in this policy.
862
- */
863
- includings?: pulumi.Input<pulumi.Input<number>[]>;
864
- }
865
- export interface GetSecurityPolicyDocumentScanExecutionPolicyRule {
866
- /**
867
- * Kubernetes agents configuration for agent-based policies.
868
- */
869
- agents?: {
870
- [key: string]: string;
871
- };
872
- /**
873
- * Branches to exclude from the policy.
874
- */
875
- branchExceptions?: string[];
876
- /**
877
- * Type of branches to match. Valid values: `all`, `protected`, `default`.
878
- */
879
- branchType?: string;
880
- /**
881
- * Branch names or patterns to match.
882
- */
883
- branches?: string[];
884
- /**
885
- * Cron expression for schedule type rules (e.g., `*&#47;15 * * * *` for every 15 minutes).
886
- */
887
- cadence?: string;
888
- /**
889
- * Type of rule. Valid values: `pipeline`, `schedule`, `agent`.
890
- */
891
- type: string;
892
- }
893
- export interface GetSecurityPolicyDocumentScanExecutionPolicyRuleArgs {
894
- /**
895
- * Kubernetes agents configuration for agent-based policies.
896
- */
897
- agents?: pulumi.Input<{
898
- [key: string]: pulumi.Input<string>;
899
- }>;
900
- /**
901
- * Branches to exclude from the policy.
902
- */
903
- branchExceptions?: pulumi.Input<pulumi.Input<string>[]>;
904
- /**
905
- * Type of branches to match. Valid values: `all`, `protected`, `default`.
906
- */
907
- branchType?: pulumi.Input<string>;
908
- /**
909
- * Branch names or patterns to match.
910
- */
911
- branches?: pulumi.Input<pulumi.Input<string>[]>;
912
- /**
913
- * Cron expression for schedule type rules (e.g., `*&#47;15 * * * *` for every 15 minutes).
914
- */
915
- cadence?: pulumi.Input<string>;
916
- /**
917
- * Type of rule. Valid values: `pipeline`, `schedule`, `agent`.
918
- */
919
- type: pulumi.Input<string>;
920
- }
921
- export interface GetSecurityPolicyDocumentScanExecutionPolicySkipCi {
922
- /**
923
- * Allow (true) or prevent (false) the use of skip-ci directive.
924
- */
925
- allowed: boolean;
926
- }
927
- export interface GetSecurityPolicyDocumentScanExecutionPolicySkipCiArgs {
928
- /**
929
- * Allow (true) or prevent (false) the use of skip-ci directive.
930
- */
931
- allowed: pulumi.Input<boolean>;
932
- }
933
709
  export interface GroupAccessTokenRotationConfiguration {
934
710
  /**
935
711
  * The duration (in days) the new token should be valid for.
package/types/output.d.ts CHANGED
@@ -203,7 +203,7 @@ export interface GetGroupAccessTokensAccessToken {
203
203
  }
204
204
  export interface GetGroupBillableMemberMembershipsMembership {
205
205
  /**
206
- * Access-level of the member. For details see: https://docs.gitlab.com/user/permissions/#default-roles
206
+ * Access-level of the member. For details see: https://docs.gitlab.com/api/access_requests/#valid-access-levels
207
207
  */
208
208
  accessLevel: string;
209
209
  /**
@@ -473,15 +473,6 @@ export interface GetGroupSamlLinksSamlLink {
473
473
  */
474
474
  name: string;
475
475
  }
476
- export interface GetGroupServiceAccountAccessTokensAccessToken {
477
- active: boolean;
478
- createdAt: string;
479
- expiresAt: string;
480
- id: string;
481
- name: string;
482
- revoked: boolean;
483
- scopes: string[];
484
- }
485
476
  export interface GetGroupSharedWithGroup {
486
477
  /**
487
478
  * Share with group expiration date.
@@ -1241,80 +1232,6 @@ export interface GetProjectHooksHook {
1241
1232
  */
1242
1233
  wikiPageEvents: boolean;
1243
1234
  }
1244
- export interface GetProjectIssueLabelEventsEvent {
1245
- /**
1246
- * The action performed on the label (add, remove).
1247
- */
1248
- action: string;
1249
- /**
1250
- * The date and time when the label event was created.
1251
- */
1252
- createdAt: string;
1253
- /**
1254
- * The ID of the label event.
1255
- */
1256
- id: number;
1257
- /**
1258
- * The label that was added or removed.
1259
- */
1260
- label: outputs.GetProjectIssueLabelEventsEventLabel;
1261
- /**
1262
- * The ID of the resource associated with the label event.
1263
- */
1264
- resourceId: number;
1265
- /**
1266
- * The type of the resource associated with the label event.
1267
- */
1268
- resourceType: string;
1269
- /**
1270
- * The user who performed the action.
1271
- */
1272
- user: outputs.GetProjectIssueLabelEventsEventUser;
1273
- }
1274
- export interface GetProjectIssueLabelEventsEventLabel {
1275
- /**
1276
- * The color of the label.
1277
- */
1278
- color: string;
1279
- /**
1280
- * The description of the label.
1281
- */
1282
- description: string;
1283
- /**
1284
- * The ID of the label.
1285
- */
1286
- id: number;
1287
- /**
1288
- * The name of the label.
1289
- */
1290
- name: string;
1291
- }
1292
- export interface GetProjectIssueLabelEventsEventUser {
1293
- /**
1294
- * The avatar URL of the user.
1295
- */
1296
- avatarUrl: string;
1297
- /**
1298
- * The ID of the user.
1299
- */
1300
- id: number;
1301
- /**
1302
- * The name of the user.
1303
- */
1304
- name: string;
1305
- /**
1306
- * The state of the user.
1307
- */
1308
- state: string;
1309
- /**
1310
- * The username of the user.
1311
- */
1312
- username: string;
1313
- /**
1314
- * The web URL of the user.
1315
- */
1316
- webUrl: string;
1317
- }
1318
1235
  export interface GetProjectIssueTaskCompletionStatus {
1319
1236
  /**
1320
1237
  * The number of tasks that are completed.
@@ -1994,64 +1911,6 @@ export interface GetProjectPushRule {
1994
1911
  */
1995
1912
  rejectUnsignedCommits: boolean;
1996
1913
  }
1997
- export interface GetProjectSecureFileMetadata {
1998
- /**
1999
- * Certificate expiration date
2000
- */
2001
- expiresAt: string;
2002
- /**
2003
- * Certificate ID
2004
- */
2005
- id: string;
2006
- /**
2007
- * Certificate issuer information
2008
- */
2009
- issuer: outputs.GetProjectSecureFileMetadataIssuer;
2010
- /**
2011
- * Certificate subject information
2012
- */
2013
- subject: outputs.GetProjectSecureFileMetadataSubject;
2014
- }
2015
- export interface GetProjectSecureFileMetadataIssuer {
2016
- /**
2017
- * Country
2018
- */
2019
- c: string;
2020
- /**
2021
- * Common Name
2022
- */
2023
- cn: string;
2024
- /**
2025
- * Organization
2026
- */
2027
- o: string;
2028
- /**
2029
- * Organizational Unit
2030
- */
2031
- ou: string;
2032
- }
2033
- export interface GetProjectSecureFileMetadataSubject {
2034
- /**
2035
- * Country
2036
- */
2037
- c: string;
2038
- /**
2039
- * Common Name
2040
- */
2041
- cn: string;
2042
- /**
2043
- * Organization
2044
- */
2045
- o: string;
2046
- /**
2047
- * Organizational Unit
2048
- */
2049
- ou: string;
2050
- /**
2051
- * User ID
2052
- */
2053
- uid: string;
2054
- }
2055
1914
  export interface GetProjectSharedWithGroup {
2056
1915
  /**
2057
1916
  * The accessLevel permission level of the shared group.
@@ -2859,7 +2718,7 @@ export interface GetReleaseAssetsSource {
2859
2718
  }
2860
2719
  export interface GetReleaseLinksReleaseLink {
2861
2720
  /**
2862
- * Full path for a [Direct Asset link](https://docs.gitlab.com/user/project/releases/release_fields/#permanent-links-to-latest-release-assets).
2721
+ * Full path for a [Direct Asset link](https://docs.gitlab.com/user/project/releases/index/#permanent-links-to-release-assets).
2863
2722
  */
2864
2723
  directAssetUrl: string;
2865
2724
  /**
@@ -2867,7 +2726,7 @@ export interface GetReleaseLinksReleaseLink {
2867
2726
  */
2868
2727
  external: boolean;
2869
2728
  /**
2870
- * Relative path for a [Direct Asset link](https://docs.gitlab.com/user/project/releases/release_fields/#permanent-links-to-latest-release-assets).
2729
+ * Relative path for a [Direct Asset link](https://docs.gitlab.com/user/project/releases/index/#permanent-links-to-release-assets).
2871
2730
  */
2872
2731
  filepath: string;
2873
2732
  /**
@@ -2883,7 +2742,7 @@ export interface GetReleaseLinksReleaseLink {
2883
2742
  */
2884
2743
  name: string;
2885
2744
  /**
2886
- * The ID or Namespace path of the project.
2745
+ * The ID or [URL-encoded path of the project](https://docs.gitlab.com/api/index/#namespaced-path-encoding).
2887
2746
  */
2888
2747
  project: string;
2889
2748
  /**
@@ -2953,118 +2812,6 @@ export interface GetRunnersRunner {
2953
2812
  */
2954
2813
  status: string;
2955
2814
  }
2956
- export interface GetSecurityPolicyDocumentScanExecutionPolicy {
2957
- /**
2958
- * Actions to execute when rules match. At least one action is required.
2959
- */
2960
- actions: outputs.GetSecurityPolicyDocumentScanExecutionPolicyAction[];
2961
- /**
2962
- * Description of the scan execution policy.
2963
- */
2964
- description?: string;
2965
- /**
2966
- * Whether the policy is enabled.
2967
- */
2968
- enabled: boolean;
2969
- /**
2970
- * Name of the scan execution policy.
2971
- */
2972
- name: string;
2973
- /**
2974
- * Scope configuration to limit which projects the policy applies to.
2975
- */
2976
- policyScope?: outputs.GetSecurityPolicyDocumentScanExecutionPolicyPolicyScope;
2977
- /**
2978
- * Rules that trigger the policy. At least one rule is required.
2979
- */
2980
- rules: outputs.GetSecurityPolicyDocumentScanExecutionPolicyRule[];
2981
- /**
2982
- * Control whether users can use the skip-ci directive.
2983
- */
2984
- skipCi?: outputs.GetSecurityPolicyDocumentScanExecutionPolicySkipCi;
2985
- }
2986
- export interface GetSecurityPolicyDocumentScanExecutionPolicyAction {
2987
- /**
2988
- * Type of scan to run. Valid values: `sast`, `secretDetection`, `containerScanning`, `dependencyScanning`, `dast`, `sastIac`, `clusterImageScanning`, `apiFuzzing`, `coverageFuzzing`.
2989
- */
2990
- scan: string;
2991
- /**
2992
- * Scanner profile to use for DAST scans.
2993
- */
2994
- scannerProfile?: string;
2995
- /**
2996
- * Site profile to use for DAST scans.
2997
- */
2998
- siteProfile?: string;
2999
- /**
3000
- * Tags to exclude from the scan.
3001
- */
3002
- tagsToExcludes?: string[];
3003
- /**
3004
- * The template to use for the scan. Valid values: `default`, `latest`.
3005
- */
3006
- template?: string;
3007
- /**
3008
- * Environment variables to pass to the scan job.
3009
- */
3010
- variables?: {
3011
- [key: string]: string;
3012
- };
3013
- }
3014
- export interface GetSecurityPolicyDocumentScanExecutionPolicyPolicyScope {
3015
- /**
3016
- * Compliance framework names to scope the policy to.
3017
- */
3018
- complianceFrameworks?: string[];
3019
- /**
3020
- * Project scope configuration.
3021
- */
3022
- projects?: outputs.GetSecurityPolicyDocumentScanExecutionPolicyPolicyScopeProjects;
3023
- }
3024
- export interface GetSecurityPolicyDocumentScanExecutionPolicyPolicyScopeProjects {
3025
- /**
3026
- * List of project IDs to exclude from this policy.
3027
- */
3028
- excludings?: number[];
3029
- /**
3030
- * List of project IDs to explicitly include in this policy.
3031
- */
3032
- includings?: number[];
3033
- }
3034
- export interface GetSecurityPolicyDocumentScanExecutionPolicyRule {
3035
- /**
3036
- * Kubernetes agents configuration for agent-based policies.
3037
- */
3038
- agents?: {
3039
- [key: string]: string;
3040
- };
3041
- /**
3042
- * Branches to exclude from the policy.
3043
- */
3044
- branchExceptions?: string[];
3045
- /**
3046
- * Type of branches to match. Valid values: `all`, `protected`, `default`.
3047
- */
3048
- branchType?: string;
3049
- /**
3050
- * Branch names or patterns to match.
3051
- */
3052
- branches?: string[];
3053
- /**
3054
- * Cron expression for schedule type rules (e.g., `*&#47;15 * * * *` for every 15 minutes).
3055
- */
3056
- cadence?: string;
3057
- /**
3058
- * Type of rule. Valid values: `pipeline`, `schedule`, `agent`.
3059
- */
3060
- type: string;
3061
- }
3062
- export interface GetSecurityPolicyDocumentScanExecutionPolicySkipCi {
3063
- /**
3064
- * Allow (true) or prevent (false) the use of skip-ci directive.
3065
- */
3066
- allowed: boolean;
3067
- }
3068
2815
  export interface GetUserSshkeysKey {
3069
2816
  /**
3070
2817
  * The time when this key was created in GitLab.
package/userGpgKey.d.ts CHANGED
@@ -4,7 +4,7 @@ import * as pulumi from "@pulumi/pulumi";
4
4
  *
5
5
  * > Managing GPG keys for arbitrary users requires admin privileges.
6
6
  *
7
- * **Upstream API**: [GitLab REST API docs](https://docs.gitlab.com/api/user_keys/#get-a-gpg-key-for-a-user)
7
+ * **Upstream API**: [GitLab REST API docs](https://docs.gitlab.com/api/users/#get-a-specific-gpg-key)
8
8
  *
9
9
  * ## Example Usage
10
10
  *
package/userGpgKey.js CHANGED
@@ -10,7 +10,7 @@ const utilities = require("./utilities");
10
10
  *
11
11
  * > Managing GPG keys for arbitrary users requires admin privileges.
12
12
  *
13
- * **Upstream API**: [GitLab REST API docs](https://docs.gitlab.com/api/user_keys/#get-a-gpg-key-for-a-user)
13
+ * **Upstream API**: [GitLab REST API docs](https://docs.gitlab.com/api/users/#get-a-specific-gpg-key)
14
14
  *
15
15
  * ## Example Usage
16
16
  *
@@ -3,7 +3,7 @@ import * as pulumi from "@pulumi/pulumi";
3
3
  * The `gitlab.UserImpersonationToken` resource allows to manage impersonation tokens of users.
4
4
  * Requires administrator access. Token values are returned once. You are only able to create impersonation tokens to impersonate the user and perform both API calls and Git reads and writes. The user can’t see these tokens in their profile settings page.
5
5
  *
6
- * **Upstream API**: [GitLab REST API docs](https://docs.gitlab.com/api/user_tokens/#create-an-impersonation-token)
6
+ * **Upstream API**: [GitLab REST API docs](https://docs.gitlab.com/api/users/#create-an-impersonation-token)
7
7
  *
8
8
  * ## Example Usage
9
9
  *
@@ -9,7 +9,7 @@ const utilities = require("./utilities");
9
9
  * The `gitlab.UserImpersonationToken` resource allows to manage impersonation tokens of users.
10
10
  * Requires administrator access. Token values are returned once. You are only able to create impersonation tokens to impersonate the user and perform both API calls and Git reads and writes. The user can’t see these tokens in their profile settings page.
11
11
  *
12
- * **Upstream API**: [GitLab REST API docs](https://docs.gitlab.com/api/user_tokens/#create-an-impersonation-token)
12
+ * **Upstream API**: [GitLab REST API docs](https://docs.gitlab.com/api/users/#create-an-impersonation-token)
13
13
  *
14
14
  * ## Example Usage
15
15
  *
package/userRunner.d.ts CHANGED
@@ -2,7 +2,7 @@ import * as pulumi from "@pulumi/pulumi";
2
2
  /**
3
3
  * The `gitlab.UserRunner` resource allows creating a GitLab runner using the new [GitLab Runner Registration Flow](https://docs.gitlab.com/ci/runners/new_creation_workflow/).
4
4
  *
5
- * **Upstream API**: [GitLab REST API docs](https://docs.gitlab.com/api/users/#create-a-runner-linked-to-a-user)
5
+ * **Upstream API**: [GitLab REST API docs](https://docs.gitlab.com/api/users/#create-a-runner)
6
6
  *
7
7
  * ## Example Usage
8
8
  *
package/userRunner.js CHANGED
@@ -8,7 +8,7 @@ const utilities = require("./utilities");
8
8
  /**
9
9
  * The `gitlab.UserRunner` resource allows creating a GitLab runner using the new [GitLab Runner Registration Flow](https://docs.gitlab.com/ci/runners/new_creation_workflow/).
10
10
  *
11
- * **Upstream API**: [GitLab REST API docs](https://docs.gitlab.com/api/users/#create-a-runner-linked-to-a-user)
11
+ * **Upstream API**: [GitLab REST API docs](https://docs.gitlab.com/api/users/#create-a-runner)
12
12
  *
13
13
  * ## Example Usage
14
14
  *
package/userSshKey.d.ts CHANGED
@@ -2,7 +2,7 @@ import * as pulumi from "@pulumi/pulumi";
2
2
  /**
3
3
  * The `gitlab.UserSshKey` resource allows to manage the lifecycle of an SSH key assigned to a user.
4
4
  *
5
- * **Upstream API**: [GitLab API docs](https://docs.gitlab.com/api/user_keys/#get-an-ssh-key-for-a-user)
5
+ * **Upstream API**: [GitLab API docs](https://docs.gitlab.com/api/users/#single-ssh-key)
6
6
  *
7
7
  * ## Example Usage
8
8
  *
package/userSshKey.js CHANGED
@@ -8,7 +8,7 @@ const utilities = require("./utilities");
8
8
  /**
9
9
  * The `gitlab.UserSshKey` resource allows to manage the lifecycle of an SSH key assigned to a user.
10
10
  *
11
- * **Upstream API**: [GitLab API docs](https://docs.gitlab.com/api/user_keys/#get-an-ssh-key-for-a-user)
11
+ * **Upstream API**: [GitLab API docs](https://docs.gitlab.com/api/users/#single-ssh-key)
12
12
  *
13
13
  * ## Example Usage
14
14
  *
@@ -1,66 +0,0 @@
1
- import * as pulumi from "@pulumi/pulumi";
2
- import * as outputs from "./types/output";
3
- /**
4
- * The `gitlab.getGroupServiceAccountAccessTokens` data source allows to retrieve all access tokens for a group service account.
5
- *
6
- * > **Note:** The data source returns the token metadata only. The token value is not available.
7
- *
8
- * > **Permissions:** You must have administrator access or be an Owner of the group to list the tokens of a service account.
9
- *
10
- * **Upstream API**: [GitLab REST API docs](https://docs.gitlab.com/api/personal_access_tokens/#list-all-personal-access-tokens)
11
- */
12
- export declare function getGroupServiceAccountAccessTokens(args: GetGroupServiceAccountAccessTokensArgs, opts?: pulumi.InvokeOptions): Promise<GetGroupServiceAccountAccessTokensResult>;
13
- /**
14
- * A collection of arguments for invoking getGroupServiceAccountAccessTokens.
15
- */
16
- export interface GetGroupServiceAccountAccessTokensArgs {
17
- /**
18
- * The ID or URL-encoded path of the group containing the service account. Must be a top level group.
19
- */
20
- group: string;
21
- /**
22
- * The ID of the service account user.
23
- */
24
- serviceAccountId: number;
25
- }
26
- /**
27
- * A collection of values returned by getGroupServiceAccountAccessTokens.
28
- */
29
- export interface GetGroupServiceAccountAccessTokensResult {
30
- /**
31
- * The list of access tokens for the service account.
32
- */
33
- readonly accessTokens: outputs.GetGroupServiceAccountAccessTokensAccessToken[];
34
- /**
35
- * The ID or URL-encoded path of the group containing the service account. Must be a top level group.
36
- */
37
- readonly group: string;
38
- readonly id: string;
39
- /**
40
- * The ID of the service account user.
41
- */
42
- readonly serviceAccountId: number;
43
- }
44
- /**
45
- * The `gitlab.getGroupServiceAccountAccessTokens` data source allows to retrieve all access tokens for a group service account.
46
- *
47
- * > **Note:** The data source returns the token metadata only. The token value is not available.
48
- *
49
- * > **Permissions:** You must have administrator access or be an Owner of the group to list the tokens of a service account.
50
- *
51
- * **Upstream API**: [GitLab REST API docs](https://docs.gitlab.com/api/personal_access_tokens/#list-all-personal-access-tokens)
52
- */
53
- export declare function getGroupServiceAccountAccessTokensOutput(args: GetGroupServiceAccountAccessTokensOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output<GetGroupServiceAccountAccessTokensResult>;
54
- /**
55
- * A collection of arguments for invoking getGroupServiceAccountAccessTokens.
56
- */
57
- export interface GetGroupServiceAccountAccessTokensOutputArgs {
58
- /**
59
- * The ID or URL-encoded path of the group containing the service account. Must be a top level group.
60
- */
61
- group: pulumi.Input<string>;
62
- /**
63
- * The ID of the service account user.
64
- */
65
- serviceAccountId: pulumi.Input<number>;
66
- }