@pulumi/gitlab 9.6.0 → 9.8.0-alpha.1766469107

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (97) hide show
  1. package/getArtifactFile.d.ts +2 -2
  2. package/getArtifactFile.js +2 -2
  3. package/getGroupBillableMemberMemberships.d.ts +2 -2
  4. package/getGroupBillableMemberMemberships.js +2 -2
  5. package/getGroupMembership.d.ts +2 -2
  6. package/getGroupMembership.js +2 -2
  7. package/getGroupServiceAccount.d.ts +2 -2
  8. package/getGroupServiceAccount.js +2 -2
  9. package/getGroupServiceAccountAccessTokens.d.ts +66 -0
  10. package/getGroupServiceAccountAccessTokens.js +42 -0
  11. package/getGroupServiceAccountAccessTokens.js.map +1 -0
  12. package/getGroupVariable.d.ts +1 -1
  13. package/getInstanceServiceAccount.d.ts +2 -2
  14. package/getInstanceServiceAccount.js +2 -2
  15. package/getProject.d.ts +4 -0
  16. package/getProject.js.map +1 -1
  17. package/getProjectIssueLabelEvents.d.ts +94 -0
  18. package/getProjectIssueLabelEvents.js +60 -0
  19. package/getProjectIssueLabelEvents.js.map +1 -0
  20. package/getProjectMembership.d.ts +2 -2
  21. package/getProjectMembership.js +2 -2
  22. package/getProjectProtectedTag.d.ts +2 -2
  23. package/getProjectProtectedTag.js +2 -2
  24. package/getProjectSecureFile.d.ts +125 -0
  25. package/getProjectSecureFile.js +68 -0
  26. package/getProjectSecureFile.js.map +1 -0
  27. package/getProjects.d.ts +3 -3
  28. package/getReleaseLink.d.ts +5 -5
  29. package/getReleaseLinks.d.ts +3 -3
  30. package/getSecurityPolicyDocument.d.ts +112 -0
  31. package/getSecurityPolicyDocument.js +96 -0
  32. package/getSecurityPolicyDocument.js.map +1 -0
  33. package/globalLevelNotifications.d.ts +1 -1
  34. package/globalLevelNotifications.js +1 -1
  35. package/groupAccessToken.d.ts +2 -2
  36. package/groupAccessToken.js +2 -2
  37. package/groupLabel.d.ts +3 -3
  38. package/groupMembership.d.ts +1 -1
  39. package/groupMembership.js +1 -1
  40. package/groupServiceAccount.d.ts +1 -1
  41. package/groupServiceAccount.js +1 -1
  42. package/groupServiceAccountAccessToken.d.ts +1 -1
  43. package/groupServiceAccountAccessToken.js +1 -1
  44. package/groupShareGroup.d.ts +1 -1
  45. package/groupShareGroup.js +1 -1
  46. package/index.d.ts +15 -0
  47. package/index.js +23 -5
  48. package/index.js.map +1 -1
  49. package/instanceServiceAccount.d.ts +1 -1
  50. package/instanceServiceAccount.js +1 -1
  51. package/instanceVariable.d.ts +8 -8
  52. package/label.d.ts +3 -3
  53. package/memberRole.d.ts +4 -4
  54. package/memberRole.js +1 -1
  55. package/package.json +2 -2
  56. package/pagesDomain.d.ts +3 -3
  57. package/personalAccessToken.d.ts +1 -1
  58. package/personalAccessToken.js +1 -1
  59. package/pipelineScheduleVariable.d.ts +1 -1
  60. package/pipelineScheduleVariable.js +1 -1
  61. package/project.d.ts +15 -3
  62. package/project.js +2 -0
  63. package/project.js.map +1 -1
  64. package/projectAccessToken.d.ts +1 -1
  65. package/projectAccessToken.js +1 -1
  66. package/projectDeployToken.d.ts +1 -1
  67. package/projectDeployToken.js +1 -1
  68. package/projectHook.d.ts +1 -1
  69. package/projectHook.js +1 -1
  70. package/projectLabel.d.ts +5 -5
  71. package/projectLabel.js +2 -2
  72. package/projectLevelMrApprovals.d.ts +1 -1
  73. package/projectLevelMrApprovals.js +1 -1
  74. package/projectLevelNotifications.d.ts +1 -1
  75. package/projectLevelNotifications.js +1 -1
  76. package/projectMembership.d.ts +1 -1
  77. package/projectMembership.js +1 -1
  78. package/projectTargetBranchRule.d.ts +1 -1
  79. package/projectTargetBranchRule.js +1 -1
  80. package/projectVariable.d.ts +3 -3
  81. package/releaseLink.d.ts +8 -8
  82. package/runner.d.ts +1 -1
  83. package/runner.js +1 -1
  84. package/systemHook.d.ts +3 -3
  85. package/types/input.d.ts +224 -0
  86. package/types/output.d.ts +257 -4
  87. package/userAvatar.d.ts +126 -0
  88. package/userAvatar.js +99 -0
  89. package/userAvatar.js.map +1 -0
  90. package/userGpgKey.d.ts +1 -1
  91. package/userGpgKey.js +1 -1
  92. package/userImpersonationToken.d.ts +1 -1
  93. package/userImpersonationToken.js +1 -1
  94. package/userRunner.d.ts +1 -1
  95. package/userRunner.js +1 -1
  96. package/userSshKey.d.ts +1 -1
  97. package/userSshKey.js +1 -1
@@ -0,0 +1,125 @@
1
+ import * as pulumi from "@pulumi/pulumi";
2
+ import * as outputs from "./types/output";
3
+ /**
4
+ * The `gitlab.getProjectSecureFile` data source allows the contents of a secure file to be retrieved by either Name or ID.
5
+ *
6
+ * **Upstream API**: [GitLab REST API docs](https://docs.gitlab.com/api/secure_files/)
7
+ *
8
+ * ## Example Usage
9
+ *
10
+ * ```typescript
11
+ * import * as pulumi from "@pulumi/pulumi";
12
+ * import * as gitlab from "@pulumi/gitlab";
13
+ *
14
+ * const byId = gitlab.getProjectSecureFile({
15
+ * project: "123",
16
+ * secureFileId: 123,
17
+ * });
18
+ * const byName = gitlab.getProjectSecureFile({
19
+ * project: "123",
20
+ * name: "secret.pem",
21
+ * });
22
+ * ```
23
+ */
24
+ export declare function getProjectSecureFile(args: GetProjectSecureFileArgs, opts?: pulumi.InvokeOptions): Promise<GetProjectSecureFileResult>;
25
+ /**
26
+ * A collection of arguments for invoking getProjectSecureFile.
27
+ */
28
+ export interface GetProjectSecureFileArgs {
29
+ /**
30
+ * The name for the secure file, unique per project
31
+ */
32
+ name?: string;
33
+ /**
34
+ * The ID or full path of the project the secure file resides.
35
+ */
36
+ project: string;
37
+ /**
38
+ * The id of the secure file in gitlab
39
+ */
40
+ secureFileId?: number;
41
+ }
42
+ /**
43
+ * A collection of values returned by getProjectSecureFile.
44
+ */
45
+ export interface GetProjectSecureFileResult {
46
+ /**
47
+ * The checksum of the file
48
+ */
49
+ readonly checksum: string;
50
+ /**
51
+ * The checksum algorithm used
52
+ */
53
+ readonly checksumAlgorithm: string;
54
+ /**
55
+ * The contents of the secure file
56
+ */
57
+ readonly content: string;
58
+ /**
59
+ * The time the secure file was uploaded
60
+ */
61
+ readonly createdAt: string;
62
+ /**
63
+ * The time the secure file will expire
64
+ */
65
+ readonly expiresAt: string;
66
+ /**
67
+ * The ID of this data source. In the format `<project:id>`
68
+ */
69
+ readonly id: string;
70
+ /**
71
+ * metadata returned by the gitlab api about the secure file
72
+ */
73
+ readonly metadata: outputs.GetProjectSecureFileMetadata;
74
+ /**
75
+ * The name for the secure file, unique per project
76
+ */
77
+ readonly name?: string;
78
+ /**
79
+ * The ID or full path of the project the secure file resides.
80
+ */
81
+ readonly project: string;
82
+ /**
83
+ * The id of the secure file in gitlab
84
+ */
85
+ readonly secureFileId: number;
86
+ }
87
+ /**
88
+ * The `gitlab.getProjectSecureFile` data source allows the contents of a secure file to be retrieved by either Name or ID.
89
+ *
90
+ * **Upstream API**: [GitLab REST API docs](https://docs.gitlab.com/api/secure_files/)
91
+ *
92
+ * ## Example Usage
93
+ *
94
+ * ```typescript
95
+ * import * as pulumi from "@pulumi/pulumi";
96
+ * import * as gitlab from "@pulumi/gitlab";
97
+ *
98
+ * const byId = gitlab.getProjectSecureFile({
99
+ * project: "123",
100
+ * secureFileId: 123,
101
+ * });
102
+ * const byName = gitlab.getProjectSecureFile({
103
+ * project: "123",
104
+ * name: "secret.pem",
105
+ * });
106
+ * ```
107
+ */
108
+ export declare function getProjectSecureFileOutput(args: GetProjectSecureFileOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output<GetProjectSecureFileResult>;
109
+ /**
110
+ * A collection of arguments for invoking getProjectSecureFile.
111
+ */
112
+ export interface GetProjectSecureFileOutputArgs {
113
+ /**
114
+ * The name for the secure file, unique per project
115
+ */
116
+ name?: pulumi.Input<string>;
117
+ /**
118
+ * The ID or full path of the project the secure file resides.
119
+ */
120
+ project: pulumi.Input<string>;
121
+ /**
122
+ * The id of the secure file in gitlab
123
+ */
124
+ secureFileId?: pulumi.Input<number>;
125
+ }
@@ -0,0 +1,68 @@
1
+ "use strict";
2
+ // *** WARNING: this file was generated by pulumi-language-nodejs. ***
3
+ // *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+ Object.defineProperty(exports, "__esModule", { value: true });
5
+ exports.getProjectSecureFileOutput = exports.getProjectSecureFile = void 0;
6
+ const pulumi = require("@pulumi/pulumi");
7
+ const utilities = require("./utilities");
8
+ /**
9
+ * The `gitlab.getProjectSecureFile` data source allows the contents of a secure file to be retrieved by either Name or ID.
10
+ *
11
+ * **Upstream API**: [GitLab REST API docs](https://docs.gitlab.com/api/secure_files/)
12
+ *
13
+ * ## Example Usage
14
+ *
15
+ * ```typescript
16
+ * import * as pulumi from "@pulumi/pulumi";
17
+ * import * as gitlab from "@pulumi/gitlab";
18
+ *
19
+ * const byId = gitlab.getProjectSecureFile({
20
+ * project: "123",
21
+ * secureFileId: 123,
22
+ * });
23
+ * const byName = gitlab.getProjectSecureFile({
24
+ * project: "123",
25
+ * name: "secret.pem",
26
+ * });
27
+ * ```
28
+ */
29
+ function getProjectSecureFile(args, opts) {
30
+ opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
31
+ return pulumi.runtime.invoke("gitlab:index/getProjectSecureFile:getProjectSecureFile", {
32
+ "name": args.name,
33
+ "project": args.project,
34
+ "secureFileId": args.secureFileId,
35
+ }, opts);
36
+ }
37
+ exports.getProjectSecureFile = getProjectSecureFile;
38
+ /**
39
+ * The `gitlab.getProjectSecureFile` data source allows the contents of a secure file to be retrieved by either Name or ID.
40
+ *
41
+ * **Upstream API**: [GitLab REST API docs](https://docs.gitlab.com/api/secure_files/)
42
+ *
43
+ * ## Example Usage
44
+ *
45
+ * ```typescript
46
+ * import * as pulumi from "@pulumi/pulumi";
47
+ * import * as gitlab from "@pulumi/gitlab";
48
+ *
49
+ * const byId = gitlab.getProjectSecureFile({
50
+ * project: "123",
51
+ * secureFileId: 123,
52
+ * });
53
+ * const byName = gitlab.getProjectSecureFile({
54
+ * project: "123",
55
+ * name: "secret.pem",
56
+ * });
57
+ * ```
58
+ */
59
+ function getProjectSecureFileOutput(args, opts) {
60
+ opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
61
+ return pulumi.runtime.invokeOutput("gitlab:index/getProjectSecureFile:getProjectSecureFile", {
62
+ "name": args.name,
63
+ "project": args.project,
64
+ "secureFileId": args.secureFileId,
65
+ }, opts);
66
+ }
67
+ exports.getProjectSecureFileOutput = getProjectSecureFileOutput;
68
+ //# sourceMappingURL=getProjectSecureFile.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"getProjectSecureFile.js","sourceRoot":"","sources":["../getProjectSecureFile.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;GAoBG;AACH,SAAgB,oBAAoB,CAAC,IAA8B,EAAE,IAA2B;IAC5F,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,wDAAwD,EAAE;QACnF,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,cAAc,EAAE,IAAI,CAAC,YAAY;KACpC,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAPD,oDAOC;AAiED;;;;;;;;;;;;;;;;;;;;GAoBG;AACH,SAAgB,0BAA0B,CAAC,IAAoC,EAAE,IAAiC;IAC9G,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,YAAY,CAAC,wDAAwD,EAAE;QACzF,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,cAAc,EAAE,IAAI,CAAC,YAAY;KACpC,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAPD,gEAOC"}
package/getProjects.d.ts CHANGED
@@ -58,7 +58,7 @@ export interface GetProjectsArgs {
58
58
  */
59
59
  membership?: boolean;
60
60
  /**
61
- * Limit to projects where current user has at least this access level, refer to the [official documentation](https://docs.gitlab.com/api/members/) for values. Cannot be used with `groupId`.
61
+ * Limit to projects where current user has at least this access level, refer to the [official documentation](https://docs.gitlab.com/user/permissions/#default-roles) for values. Cannot be used with `groupId`.
62
62
  */
63
63
  minAccessLevel?: number;
64
64
  /**
@@ -155,7 +155,7 @@ export interface GetProjectsResult {
155
155
  */
156
156
  readonly membership?: boolean;
157
157
  /**
158
- * Limit to projects where current user has at least this access level, refer to the [official documentation](https://docs.gitlab.com/api/members/) for values. Cannot be used with `groupId`.
158
+ * Limit to projects where current user has at least this access level, refer to the [official documentation](https://docs.gitlab.com/user/permissions/#default-roles) for values. Cannot be used with `groupId`.
159
159
  */
160
160
  readonly minAccessLevel?: number;
161
161
  /**
@@ -285,7 +285,7 @@ export interface GetProjectsOutputArgs {
285
285
  */
286
286
  membership?: pulumi.Input<boolean>;
287
287
  /**
288
- * Limit to projects where current user has at least this access level, refer to the [official documentation](https://docs.gitlab.com/api/members/) for values. Cannot be used with `groupId`.
288
+ * Limit to projects where current user has at least this access level, refer to the [official documentation](https://docs.gitlab.com/user/permissions/#default-roles) for values. Cannot be used with `groupId`.
289
289
  */
290
290
  minAccessLevel?: pulumi.Input<number>;
291
291
  /**
@@ -14,7 +14,7 @@ export interface GetReleaseLinkArgs {
14
14
  */
15
15
  linkId: number;
16
16
  /**
17
- * The ID or [URL-encoded path of the project](https://docs.gitlab.com/api/index/#namespaced-path-encoding).
17
+ * The ID or Namespace path of the project.
18
18
  */
19
19
  project: string;
20
20
  /**
@@ -27,7 +27,7 @@ export interface GetReleaseLinkArgs {
27
27
  */
28
28
  export interface GetReleaseLinkResult {
29
29
  /**
30
- * Full path for a [Direct Asset link](https://docs.gitlab.com/user/project/releases/index/#permanent-links-to-release-assets).
30
+ * Full path for a [Direct Asset link](https://docs.gitlab.com/user/project/releases/release_fields/#permanent-links-to-latest-release-assets).
31
31
  */
32
32
  readonly directAssetUrl: string;
33
33
  /**
@@ -35,7 +35,7 @@ export interface GetReleaseLinkResult {
35
35
  */
36
36
  readonly external: boolean;
37
37
  /**
38
- * Relative path for a [Direct Asset link](https://docs.gitlab.com/user/project/releases/index/#permanent-links-to-release-assets).
38
+ * Relative path for a [Direct Asset link](https://docs.gitlab.com/user/project/releases/release_fields/#permanent-links-to-latest-release-assets).
39
39
  */
40
40
  readonly filepath: string;
41
41
  /**
@@ -55,7 +55,7 @@ export interface GetReleaseLinkResult {
55
55
  */
56
56
  readonly name: string;
57
57
  /**
58
- * The ID or [URL-encoded path of the project](https://docs.gitlab.com/api/index/#namespaced-path-encoding).
58
+ * The ID or Namespace path of the project.
59
59
  */
60
60
  readonly project: string;
61
61
  /**
@@ -82,7 +82,7 @@ export interface GetReleaseLinkOutputArgs {
82
82
  */
83
83
  linkId: pulumi.Input<number>;
84
84
  /**
85
- * The ID or [URL-encoded path of the project](https://docs.gitlab.com/api/index/#namespaced-path-encoding).
85
+ * The ID or Namespace path of the project.
86
86
  */
87
87
  project: pulumi.Input<string>;
88
88
  /**
@@ -11,7 +11,7 @@ export declare function getReleaseLinks(args: GetReleaseLinksArgs, opts?: pulumi
11
11
  */
12
12
  export interface GetReleaseLinksArgs {
13
13
  /**
14
- * The ID or [URL-encoded path of the project](https://docs.gitlab.com/api/index/#namespaced-path-encoding).
14
+ * The ID or Namespace path of the project.
15
15
  */
16
16
  project: string;
17
17
  /**
@@ -28,7 +28,7 @@ export interface GetReleaseLinksResult {
28
28
  */
29
29
  readonly id: string;
30
30
  /**
31
- * The ID or [URL-encoded path of the project](https://docs.gitlab.com/api/index/#namespaced-path-encoding).
31
+ * The ID or Namespace path of the project.
32
32
  */
33
33
  readonly project: string;
34
34
  /**
@@ -51,7 +51,7 @@ export declare function getReleaseLinksOutput(args: GetReleaseLinksOutputArgs, o
51
51
  */
52
52
  export interface GetReleaseLinksOutputArgs {
53
53
  /**
54
- * The ID or [URL-encoded path of the project](https://docs.gitlab.com/api/index/#namespaced-path-encoding).
54
+ * The ID or Namespace path of the project.
55
55
  */
56
56
  project: pulumi.Input<string>;
57
57
  /**
@@ -0,0 +1,112 @@
1
+ import * as pulumi from "@pulumi/pulumi";
2
+ import * as inputs from "./types/input";
3
+ import * as outputs from "./types/output";
4
+ /**
5
+ * Generates a GitLab security policy YAML document from structured configuration.
6
+ * This data source performs pure transformation without any API calls.
7
+ *
8
+ * **Upstream API**: [GitLab Security Policies Documentation](https://docs.gitlab.com/ee/user/application_security/policies/scan_execution_policies/)
9
+ *
10
+ * ## Example Usage
11
+ *
12
+ * ```typescript
13
+ * import * as pulumi from "@pulumi/pulumi";
14
+ * import * as gitlab from "@pulumi/gitlab";
15
+ *
16
+ * // Use this with `gitlab_repository_file` to manage your policies using native HCL
17
+ * const scan = gitlab.getSecurityPolicyDocument({
18
+ * scanExecutionPolicies: [{
19
+ * name: "Basic SAST Policy",
20
+ * enabled: true,
21
+ * rules: [{
22
+ * type: "pipeline",
23
+ * branchType: "all",
24
+ * }],
25
+ * actions: [{
26
+ * scan: "sast",
27
+ * }],
28
+ * }],
29
+ * });
30
+ * // See `gitlab_project_security_policy_attachment` or `gitlab_group_security_policy_attachment`
31
+ * // for how to link a security policy project to a project or group.
32
+ * const policy = new gitlab.RepositoryFile("policy", {
33
+ * project: "1234",
34
+ * ref: "main",
35
+ * filePath: ".gitlab/security-policies/policy.yml",
36
+ * content: scan.then(scan => scan.yaml),
37
+ * });
38
+ * ```
39
+ */
40
+ export declare function getSecurityPolicyDocument(args?: GetSecurityPolicyDocumentArgs, opts?: pulumi.InvokeOptions): Promise<GetSecurityPolicyDocumentResult>;
41
+ /**
42
+ * A collection of arguments for invoking getSecurityPolicyDocument.
43
+ */
44
+ export interface GetSecurityPolicyDocumentArgs {
45
+ /**
46
+ * Scan execution policy configuration. Multiple policies can be specified.
47
+ */
48
+ scanExecutionPolicies?: inputs.GetSecurityPolicyDocumentScanExecutionPolicy[];
49
+ }
50
+ /**
51
+ * A collection of values returned by getSecurityPolicyDocument.
52
+ */
53
+ export interface GetSecurityPolicyDocumentResult {
54
+ /**
55
+ * Unique identifier for this policy document (hash of generated YAML).
56
+ */
57
+ readonly id: string;
58
+ /**
59
+ * Scan execution policy configuration. Multiple policies can be specified.
60
+ */
61
+ readonly scanExecutionPolicies?: outputs.GetSecurityPolicyDocumentScanExecutionPolicy[];
62
+ /**
63
+ * The generated policy document in YAML format, ready to write to `.gitlab/security-policies/policy.yml`.
64
+ */
65
+ readonly yaml: string;
66
+ }
67
+ /**
68
+ * Generates a GitLab security policy YAML document from structured configuration.
69
+ * This data source performs pure transformation without any API calls.
70
+ *
71
+ * **Upstream API**: [GitLab Security Policies Documentation](https://docs.gitlab.com/ee/user/application_security/policies/scan_execution_policies/)
72
+ *
73
+ * ## Example Usage
74
+ *
75
+ * ```typescript
76
+ * import * as pulumi from "@pulumi/pulumi";
77
+ * import * as gitlab from "@pulumi/gitlab";
78
+ *
79
+ * // Use this with `gitlab_repository_file` to manage your policies using native HCL
80
+ * const scan = gitlab.getSecurityPolicyDocument({
81
+ * scanExecutionPolicies: [{
82
+ * name: "Basic SAST Policy",
83
+ * enabled: true,
84
+ * rules: [{
85
+ * type: "pipeline",
86
+ * branchType: "all",
87
+ * }],
88
+ * actions: [{
89
+ * scan: "sast",
90
+ * }],
91
+ * }],
92
+ * });
93
+ * // See `gitlab_project_security_policy_attachment` or `gitlab_group_security_policy_attachment`
94
+ * // for how to link a security policy project to a project or group.
95
+ * const policy = new gitlab.RepositoryFile("policy", {
96
+ * project: "1234",
97
+ * ref: "main",
98
+ * filePath: ".gitlab/security-policies/policy.yml",
99
+ * content: scan.then(scan => scan.yaml),
100
+ * });
101
+ * ```
102
+ */
103
+ export declare function getSecurityPolicyDocumentOutput(args?: GetSecurityPolicyDocumentOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output<GetSecurityPolicyDocumentResult>;
104
+ /**
105
+ * A collection of arguments for invoking getSecurityPolicyDocument.
106
+ */
107
+ export interface GetSecurityPolicyDocumentOutputArgs {
108
+ /**
109
+ * Scan execution policy configuration. Multiple policies can be specified.
110
+ */
111
+ scanExecutionPolicies?: pulumi.Input<pulumi.Input<inputs.GetSecurityPolicyDocumentScanExecutionPolicyArgs>[]>;
112
+ }
@@ -0,0 +1,96 @@
1
+ "use strict";
2
+ // *** WARNING: this file was generated by pulumi-language-nodejs. ***
3
+ // *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+ Object.defineProperty(exports, "__esModule", { value: true });
5
+ exports.getSecurityPolicyDocumentOutput = exports.getSecurityPolicyDocument = void 0;
6
+ const pulumi = require("@pulumi/pulumi");
7
+ const utilities = require("./utilities");
8
+ /**
9
+ * Generates a GitLab security policy YAML document from structured configuration.
10
+ * This data source performs pure transformation without any API calls.
11
+ *
12
+ * **Upstream API**: [GitLab Security Policies Documentation](https://docs.gitlab.com/ee/user/application_security/policies/scan_execution_policies/)
13
+ *
14
+ * ## Example Usage
15
+ *
16
+ * ```typescript
17
+ * import * as pulumi from "@pulumi/pulumi";
18
+ * import * as gitlab from "@pulumi/gitlab";
19
+ *
20
+ * // Use this with `gitlab_repository_file` to manage your policies using native HCL
21
+ * const scan = gitlab.getSecurityPolicyDocument({
22
+ * scanExecutionPolicies: [{
23
+ * name: "Basic SAST Policy",
24
+ * enabled: true,
25
+ * rules: [{
26
+ * type: "pipeline",
27
+ * branchType: "all",
28
+ * }],
29
+ * actions: [{
30
+ * scan: "sast",
31
+ * }],
32
+ * }],
33
+ * });
34
+ * // See `gitlab_project_security_policy_attachment` or `gitlab_group_security_policy_attachment`
35
+ * // for how to link a security policy project to a project or group.
36
+ * const policy = new gitlab.RepositoryFile("policy", {
37
+ * project: "1234",
38
+ * ref: "main",
39
+ * filePath: ".gitlab/security-policies/policy.yml",
40
+ * content: scan.then(scan => scan.yaml),
41
+ * });
42
+ * ```
43
+ */
44
+ function getSecurityPolicyDocument(args, opts) {
45
+ args = args || {};
46
+ opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
47
+ return pulumi.runtime.invoke("gitlab:index/getSecurityPolicyDocument:getSecurityPolicyDocument", {
48
+ "scanExecutionPolicies": args.scanExecutionPolicies,
49
+ }, opts);
50
+ }
51
+ exports.getSecurityPolicyDocument = getSecurityPolicyDocument;
52
+ /**
53
+ * Generates a GitLab security policy YAML document from structured configuration.
54
+ * This data source performs pure transformation without any API calls.
55
+ *
56
+ * **Upstream API**: [GitLab Security Policies Documentation](https://docs.gitlab.com/ee/user/application_security/policies/scan_execution_policies/)
57
+ *
58
+ * ## Example Usage
59
+ *
60
+ * ```typescript
61
+ * import * as pulumi from "@pulumi/pulumi";
62
+ * import * as gitlab from "@pulumi/gitlab";
63
+ *
64
+ * // Use this with `gitlab_repository_file` to manage your policies using native HCL
65
+ * const scan = gitlab.getSecurityPolicyDocument({
66
+ * scanExecutionPolicies: [{
67
+ * name: "Basic SAST Policy",
68
+ * enabled: true,
69
+ * rules: [{
70
+ * type: "pipeline",
71
+ * branchType: "all",
72
+ * }],
73
+ * actions: [{
74
+ * scan: "sast",
75
+ * }],
76
+ * }],
77
+ * });
78
+ * // See `gitlab_project_security_policy_attachment` or `gitlab_group_security_policy_attachment`
79
+ * // for how to link a security policy project to a project or group.
80
+ * const policy = new gitlab.RepositoryFile("policy", {
81
+ * project: "1234",
82
+ * ref: "main",
83
+ * filePath: ".gitlab/security-policies/policy.yml",
84
+ * content: scan.then(scan => scan.yaml),
85
+ * });
86
+ * ```
87
+ */
88
+ function getSecurityPolicyDocumentOutput(args, opts) {
89
+ args = args || {};
90
+ opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
91
+ return pulumi.runtime.invokeOutput("gitlab:index/getSecurityPolicyDocument:getSecurityPolicyDocument", {
92
+ "scanExecutionPolicies": args.scanExecutionPolicies,
93
+ }, opts);
94
+ }
95
+ exports.getSecurityPolicyDocumentOutput = getSecurityPolicyDocumentOutput;
96
+ //# sourceMappingURL=getSecurityPolicyDocument.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"getSecurityPolicyDocument.js","sourceRoot":"","sources":["../getSecurityPolicyDocument.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAmCG;AACH,SAAgB,yBAAyB,CAAC,IAAoC,EAAE,IAA2B;IACvG,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;IAClB,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,kEAAkE,EAAE;QAC7F,uBAAuB,EAAE,IAAI,CAAC,qBAAqB;KACtD,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAND,8DAMC;AA6BD;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAmCG;AACH,SAAgB,+BAA+B,CAAC,IAA0C,EAAE,IAAiC;IACzH,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;IAClB,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,YAAY,CAAC,kEAAkE,EAAE;QACnG,uBAAuB,EAAE,IAAI,CAAC,qBAAqB;KACtD,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAND,0EAMC"}
@@ -2,7 +2,7 @@ import * as pulumi from "@pulumi/pulumi";
2
2
  /**
3
3
  * The `gitlab.GlobalLevelNotifications` resource allows to manage global notifications.
4
4
  *
5
- * **Upstream API**: [GitLab REST API docs](https://docs.gitlab.com/api/notification_settings/#group--project-level-notification-settings)
5
+ * **Upstream API**: [GitLab REST API docs](https://docs.gitlab.com/api/notification_settings/#get-group-or-project-notification-settings)
6
6
  *
7
7
  * ## Import
8
8
  *
@@ -8,7 +8,7 @@ const utilities = require("./utilities");
8
8
  /**
9
9
  * The `gitlab.GlobalLevelNotifications` resource allows to manage global notifications.
10
10
  *
11
- * **Upstream API**: [GitLab REST API docs](https://docs.gitlab.com/api/notification_settings/#group--project-level-notification-settings)
11
+ * **Upstream API**: [GitLab REST API docs](https://docs.gitlab.com/api/notification_settings/#get-group-or-project-notification-settings)
12
12
  *
13
13
  * ## Import
14
14
  *
@@ -4,11 +4,11 @@ import * as outputs from "./types/output";
4
4
  /**
5
5
  * The `gitlab.GroupAccessToken` resource allows to manage the lifecycle of a group access token.
6
6
  *
7
- * > Observability scopes are in beta and may not work on all instances. See more details in [the documentation](https://docs.gitlab.com/operations/tracing/)
7
+ * > Observability scopes are in beta and may not work on all instances. See more details in [the documentation](https://docs.gitlab.com/development/tracing/)
8
8
  *
9
9
  * > Use `rotationConfiguration` to automatically rotate tokens instead of using `timestamp()` as timestamp will cause changes with every plan. `pulumi up` must still be run to rotate the token.
10
10
  *
11
- * > Due to [Automatic reuse detection](https://docs.gitlab.com/api/group_access_tokens/#automatic-reuse-detection) it's possible that a new Group Access Token will immediately be revoked. Check if an old process using the old token is running if this happens.
11
+ * > Due to [Automatic reuse detection](https://docs.gitlab.com/api/personal_access_tokens/#automatic-reuse-detection) it's possible that a new Group Access Token will immediately be revoked. Check if an old process using the old token is running if this happens.
12
12
  *
13
13
  * **Upstream API**: [GitLab REST API](https://docs.gitlab.com/api/group_access_tokens/)
14
14
  *
@@ -8,11 +8,11 @@ const utilities = require("./utilities");
8
8
  /**
9
9
  * The `gitlab.GroupAccessToken` resource allows to manage the lifecycle of a group access token.
10
10
  *
11
- * > Observability scopes are in beta and may not work on all instances. See more details in [the documentation](https://docs.gitlab.com/operations/tracing/)
11
+ * > Observability scopes are in beta and may not work on all instances. See more details in [the documentation](https://docs.gitlab.com/development/tracing/)
12
12
  *
13
13
  * > Use `rotationConfiguration` to automatically rotate tokens instead of using `timestamp()` as timestamp will cause changes with every plan. `pulumi up` must still be run to rotate the token.
14
14
  *
15
- * > Due to [Automatic reuse detection](https://docs.gitlab.com/api/group_access_tokens/#automatic-reuse-detection) it's possible that a new Group Access Token will immediately be revoked. Check if an old process using the old token is running if this happens.
15
+ * > Due to [Automatic reuse detection](https://docs.gitlab.com/api/personal_access_tokens/#automatic-reuse-detection) it's possible that a new Group Access Token will immediately be revoked. Check if an old process using the old token is running if this happens.
16
16
  *
17
17
  * **Upstream API**: [GitLab REST API](https://docs.gitlab.com/api/group_access_tokens/)
18
18
  *
package/groupLabel.d.ts CHANGED
@@ -57,7 +57,7 @@ export declare class GroupLabel extends pulumi.CustomResource {
57
57
  */
58
58
  static isInstance(obj: any): obj is GroupLabel;
59
59
  /**
60
- * The color of the label given in 6-digit hex notation with leading '#' sign (e.g. #FFAABB) or one of the [CSS color names](https://developer.mozilla.org/en-US/docs/Web/CSS/color_value#Color_keywords).
60
+ * The color of the label given in 6-digit hex notation with leading '#' sign (e.g. #FFAABB) or one of the [CSS color names](https://developer.mozilla.org/en-US/docs/Web/CSS/Reference/Values/color_value#Color_keywords).
61
61
  */
62
62
  readonly color: pulumi.Output<string>;
63
63
  /**
@@ -94,7 +94,7 @@ export declare class GroupLabel extends pulumi.CustomResource {
94
94
  */
95
95
  export interface GroupLabelState {
96
96
  /**
97
- * The color of the label given in 6-digit hex notation with leading '#' sign (e.g. #FFAABB) or one of the [CSS color names](https://developer.mozilla.org/en-US/docs/Web/CSS/color_value#Color_keywords).
97
+ * The color of the label given in 6-digit hex notation with leading '#' sign (e.g. #FFAABB) or one of the [CSS color names](https://developer.mozilla.org/en-US/docs/Web/CSS/Reference/Values/color_value#Color_keywords).
98
98
  */
99
99
  color?: pulumi.Input<string>;
100
100
  /**
@@ -123,7 +123,7 @@ export interface GroupLabelState {
123
123
  */
124
124
  export interface GroupLabelArgs {
125
125
  /**
126
- * The color of the label given in 6-digit hex notation with leading '#' sign (e.g. #FFAABB) or one of the [CSS color names](https://developer.mozilla.org/en-US/docs/Web/CSS/color_value#Color_keywords).
126
+ * The color of the label given in 6-digit hex notation with leading '#' sign (e.g. #FFAABB) or one of the [CSS color names](https://developer.mozilla.org/en-US/docs/Web/CSS/Reference/Values/color_value#Color_keywords).
127
127
  */
128
128
  color: pulumi.Input<string>;
129
129
  /**
@@ -4,7 +4,7 @@ import * as pulumi from "@pulumi/pulumi";
4
4
  *
5
5
  * > If a group should grant membership to another group use the `gitlab.GroupShareGroup` resource instead.
6
6
  *
7
- * **Upstream API**: [GitLab REST API docs](https://docs.gitlab.com/api/members/)
7
+ * **Upstream API**: [GitLab REST API docs](https://docs.gitlab.com/api/group_members/)
8
8
  *
9
9
  * ## Example Usage
10
10
  *
@@ -10,7 +10,7 @@ const utilities = require("./utilities");
10
10
  *
11
11
  * > If a group should grant membership to another group use the `gitlab.GroupShareGroup` resource instead.
12
12
  *
13
- * **Upstream API**: [GitLab REST API docs](https://docs.gitlab.com/api/members/)
13
+ * **Upstream API**: [GitLab REST API docs](https://docs.gitlab.com/api/group_members/)
14
14
  *
15
15
  * ## Example Usage
16
16
  *
@@ -4,7 +4,7 @@ import * as outputs from "./types/output";
4
4
  /**
5
5
  * The `gitlab.GroupServiceAccount` resource allows creating a GitLab group service account.
6
6
  *
7
- * **Upstream API**: [GitLab REST API docs](https://docs.gitlab.com/api/group_service_accounts/)
7
+ * **Upstream API**: [GitLab REST API docs](https://docs.gitlab.com/api/service_accounts/#group-service-accounts)
8
8
  *
9
9
  * ## Example Usage
10
10
  *
@@ -8,7 +8,7 @@ const utilities = require("./utilities");
8
8
  /**
9
9
  * The `gitlab.GroupServiceAccount` resource allows creating a GitLab group service account.
10
10
  *
11
- * **Upstream API**: [GitLab REST API docs](https://docs.gitlab.com/api/group_service_accounts/)
11
+ * **Upstream API**: [GitLab REST API docs](https://docs.gitlab.com/api/service_accounts/#group-service-accounts)
12
12
  *
13
13
  * ## Example Usage
14
14
  *
@@ -12,7 +12,7 @@ import * as outputs from "./types/output";
12
12
  *
13
13
  * > Due to a limitation in the API, the `rotationConfiguration` is unable to set the new expiry date before GitLab 17.9. Instead, when the resource is created, it will default the expiry date to 7 days in the future. On each subsequent apply, the new expiry will be 7 days from the date of the apply.
14
14
  *
15
- * **Upstream API**: [GitLab API docs](https://docs.gitlab.com/api/group_service_accounts/#create-a-personal-access-token-for-a-service-account-user)
15
+ * **Upstream API**: [GitLab API docs](https://docs.gitlab.com/api/service_accounts/#create-a-personal-access-token-for-a-group-service-account)
16
16
  *
17
17
  * ## Example Usage
18
18
  *
@@ -16,7 +16,7 @@ const utilities = require("./utilities");
16
16
  *
17
17
  * > Due to a limitation in the API, the `rotationConfiguration` is unable to set the new expiry date before GitLab 17.9. Instead, when the resource is created, it will default the expiry date to 7 days in the future. On each subsequent apply, the new expiry will be 7 days from the date of the apply.
18
18
  *
19
- * **Upstream API**: [GitLab API docs](https://docs.gitlab.com/api/group_service_accounts/#create-a-personal-access-token-for-a-service-account-user)
19
+ * **Upstream API**: [GitLab API docs](https://docs.gitlab.com/api/service_accounts/#create-a-personal-access-token-for-a-group-service-account)
20
20
  *
21
21
  * ## Example Usage
22
22
  *
@@ -4,7 +4,7 @@ import * as pulumi from "@pulumi/pulumi";
4
4
  *
5
5
  * > Note that `memberRoleId` requires a feature flag enabled, see [this feature issue](https://gitlab.com/gitlab-org/gitlab/-/issues/443369) for details.
6
6
  *
7
- * **Upstream API**: [GitLab REST API docs](https://docs.gitlab.com/api/groups/#share-groups-with-groups)
7
+ * **Upstream API**: [GitLab REST API docs](https://docs.gitlab.com/api/groups/#invite-groups)
8
8
  *
9
9
  * ## Example Usage
10
10
  *