@pulumi/gitlab 9.6.0 → 9.8.0-alpha.1766469107
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/getArtifactFile.d.ts +2 -2
- package/getArtifactFile.js +2 -2
- package/getGroupBillableMemberMemberships.d.ts +2 -2
- package/getGroupBillableMemberMemberships.js +2 -2
- package/getGroupMembership.d.ts +2 -2
- package/getGroupMembership.js +2 -2
- package/getGroupServiceAccount.d.ts +2 -2
- package/getGroupServiceAccount.js +2 -2
- package/getGroupServiceAccountAccessTokens.d.ts +66 -0
- package/getGroupServiceAccountAccessTokens.js +42 -0
- package/getGroupServiceAccountAccessTokens.js.map +1 -0
- package/getGroupVariable.d.ts +1 -1
- package/getInstanceServiceAccount.d.ts +2 -2
- package/getInstanceServiceAccount.js +2 -2
- package/getProject.d.ts +4 -0
- package/getProject.js.map +1 -1
- package/getProjectIssueLabelEvents.d.ts +94 -0
- package/getProjectIssueLabelEvents.js +60 -0
- package/getProjectIssueLabelEvents.js.map +1 -0
- package/getProjectMembership.d.ts +2 -2
- package/getProjectMembership.js +2 -2
- package/getProjectProtectedTag.d.ts +2 -2
- package/getProjectProtectedTag.js +2 -2
- package/getProjectSecureFile.d.ts +125 -0
- package/getProjectSecureFile.js +68 -0
- package/getProjectSecureFile.js.map +1 -0
- package/getProjects.d.ts +3 -3
- package/getReleaseLink.d.ts +5 -5
- package/getReleaseLinks.d.ts +3 -3
- package/getSecurityPolicyDocument.d.ts +112 -0
- package/getSecurityPolicyDocument.js +96 -0
- package/getSecurityPolicyDocument.js.map +1 -0
- package/globalLevelNotifications.d.ts +1 -1
- package/globalLevelNotifications.js +1 -1
- package/groupAccessToken.d.ts +2 -2
- package/groupAccessToken.js +2 -2
- package/groupLabel.d.ts +3 -3
- package/groupMembership.d.ts +1 -1
- package/groupMembership.js +1 -1
- package/groupServiceAccount.d.ts +1 -1
- package/groupServiceAccount.js +1 -1
- package/groupServiceAccountAccessToken.d.ts +1 -1
- package/groupServiceAccountAccessToken.js +1 -1
- package/groupShareGroup.d.ts +1 -1
- package/groupShareGroup.js +1 -1
- package/index.d.ts +15 -0
- package/index.js +23 -5
- package/index.js.map +1 -1
- package/instanceServiceAccount.d.ts +1 -1
- package/instanceServiceAccount.js +1 -1
- package/instanceVariable.d.ts +8 -8
- package/label.d.ts +3 -3
- package/memberRole.d.ts +4 -4
- package/memberRole.js +1 -1
- package/package.json +2 -2
- package/pagesDomain.d.ts +3 -3
- package/personalAccessToken.d.ts +1 -1
- package/personalAccessToken.js +1 -1
- package/pipelineScheduleVariable.d.ts +1 -1
- package/pipelineScheduleVariable.js +1 -1
- package/project.d.ts +15 -3
- package/project.js +2 -0
- package/project.js.map +1 -1
- package/projectAccessToken.d.ts +1 -1
- package/projectAccessToken.js +1 -1
- package/projectDeployToken.d.ts +1 -1
- package/projectDeployToken.js +1 -1
- package/projectHook.d.ts +1 -1
- package/projectHook.js +1 -1
- package/projectLabel.d.ts +5 -5
- package/projectLabel.js +2 -2
- package/projectLevelMrApprovals.d.ts +1 -1
- package/projectLevelMrApprovals.js +1 -1
- package/projectLevelNotifications.d.ts +1 -1
- package/projectLevelNotifications.js +1 -1
- package/projectMembership.d.ts +1 -1
- package/projectMembership.js +1 -1
- package/projectTargetBranchRule.d.ts +1 -1
- package/projectTargetBranchRule.js +1 -1
- package/projectVariable.d.ts +3 -3
- package/releaseLink.d.ts +8 -8
- package/runner.d.ts +1 -1
- package/runner.js +1 -1
- package/systemHook.d.ts +3 -3
- package/types/input.d.ts +224 -0
- package/types/output.d.ts +257 -4
- package/userAvatar.d.ts +126 -0
- package/userAvatar.js +99 -0
- package/userAvatar.js.map +1 -0
- package/userGpgKey.d.ts +1 -1
- package/userGpgKey.js +1 -1
- package/userImpersonationToken.d.ts +1 -1
- package/userImpersonationToken.js +1 -1
- package/userRunner.d.ts +1 -1
- package/userRunner.js +1 -1
- package/userSshKey.d.ts +1 -1
- package/userSshKey.js +1 -1
package/types/input.d.ts
CHANGED
|
@@ -706,6 +706,230 @@ export interface GetReleaseAssetsSourceArgs {
|
|
|
706
706
|
*/
|
|
707
707
|
url?: pulumi.Input<string>;
|
|
708
708
|
}
|
|
709
|
+
export interface GetSecurityPolicyDocumentScanExecutionPolicy {
|
|
710
|
+
/**
|
|
711
|
+
* Actions to execute when rules match. At least one action is required.
|
|
712
|
+
*/
|
|
713
|
+
actions: inputs.GetSecurityPolicyDocumentScanExecutionPolicyAction[];
|
|
714
|
+
/**
|
|
715
|
+
* Description of the scan execution policy.
|
|
716
|
+
*/
|
|
717
|
+
description?: string;
|
|
718
|
+
/**
|
|
719
|
+
* Whether the policy is enabled.
|
|
720
|
+
*/
|
|
721
|
+
enabled: boolean;
|
|
722
|
+
/**
|
|
723
|
+
* Name of the scan execution policy.
|
|
724
|
+
*/
|
|
725
|
+
name: string;
|
|
726
|
+
/**
|
|
727
|
+
* Scope configuration to limit which projects the policy applies to.
|
|
728
|
+
*/
|
|
729
|
+
policyScope?: inputs.GetSecurityPolicyDocumentScanExecutionPolicyPolicyScope;
|
|
730
|
+
/**
|
|
731
|
+
* Rules that trigger the policy. At least one rule is required.
|
|
732
|
+
*/
|
|
733
|
+
rules: inputs.GetSecurityPolicyDocumentScanExecutionPolicyRule[];
|
|
734
|
+
/**
|
|
735
|
+
* Control whether users can use the skip-ci directive.
|
|
736
|
+
*/
|
|
737
|
+
skipCi?: inputs.GetSecurityPolicyDocumentScanExecutionPolicySkipCi;
|
|
738
|
+
}
|
|
739
|
+
export interface GetSecurityPolicyDocumentScanExecutionPolicyArgs {
|
|
740
|
+
/**
|
|
741
|
+
* Actions to execute when rules match. At least one action is required.
|
|
742
|
+
*/
|
|
743
|
+
actions: pulumi.Input<pulumi.Input<inputs.GetSecurityPolicyDocumentScanExecutionPolicyActionArgs>[]>;
|
|
744
|
+
/**
|
|
745
|
+
* Description of the scan execution policy.
|
|
746
|
+
*/
|
|
747
|
+
description?: pulumi.Input<string>;
|
|
748
|
+
/**
|
|
749
|
+
* Whether the policy is enabled.
|
|
750
|
+
*/
|
|
751
|
+
enabled: pulumi.Input<boolean>;
|
|
752
|
+
/**
|
|
753
|
+
* Name of the scan execution policy.
|
|
754
|
+
*/
|
|
755
|
+
name: pulumi.Input<string>;
|
|
756
|
+
/**
|
|
757
|
+
* Scope configuration to limit which projects the policy applies to.
|
|
758
|
+
*/
|
|
759
|
+
policyScope?: pulumi.Input<inputs.GetSecurityPolicyDocumentScanExecutionPolicyPolicyScopeArgs>;
|
|
760
|
+
/**
|
|
761
|
+
* Rules that trigger the policy. At least one rule is required.
|
|
762
|
+
*/
|
|
763
|
+
rules: pulumi.Input<pulumi.Input<inputs.GetSecurityPolicyDocumentScanExecutionPolicyRuleArgs>[]>;
|
|
764
|
+
/**
|
|
765
|
+
* Control whether users can use the skip-ci directive.
|
|
766
|
+
*/
|
|
767
|
+
skipCi?: pulumi.Input<inputs.GetSecurityPolicyDocumentScanExecutionPolicySkipCiArgs>;
|
|
768
|
+
}
|
|
769
|
+
export interface GetSecurityPolicyDocumentScanExecutionPolicyAction {
|
|
770
|
+
/**
|
|
771
|
+
* Type of scan to run. Valid values: `sast`, `secretDetection`, `containerScanning`, `dependencyScanning`, `dast`, `sastIac`, `clusterImageScanning`, `apiFuzzing`, `coverageFuzzing`.
|
|
772
|
+
*/
|
|
773
|
+
scan: string;
|
|
774
|
+
/**
|
|
775
|
+
* Scanner profile to use for DAST scans.
|
|
776
|
+
*/
|
|
777
|
+
scannerProfile?: string;
|
|
778
|
+
/**
|
|
779
|
+
* Site profile to use for DAST scans.
|
|
780
|
+
*/
|
|
781
|
+
siteProfile?: string;
|
|
782
|
+
/**
|
|
783
|
+
* Tags to exclude from the scan.
|
|
784
|
+
*/
|
|
785
|
+
tagsToExcludes?: string[];
|
|
786
|
+
/**
|
|
787
|
+
* The template to use for the scan. Valid values: `default`, `latest`.
|
|
788
|
+
*/
|
|
789
|
+
template?: string;
|
|
790
|
+
/**
|
|
791
|
+
* Environment variables to pass to the scan job.
|
|
792
|
+
*/
|
|
793
|
+
variables?: {
|
|
794
|
+
[key: string]: string;
|
|
795
|
+
};
|
|
796
|
+
}
|
|
797
|
+
export interface GetSecurityPolicyDocumentScanExecutionPolicyActionArgs {
|
|
798
|
+
/**
|
|
799
|
+
* Type of scan to run. Valid values: `sast`, `secretDetection`, `containerScanning`, `dependencyScanning`, `dast`, `sastIac`, `clusterImageScanning`, `apiFuzzing`, `coverageFuzzing`.
|
|
800
|
+
*/
|
|
801
|
+
scan: pulumi.Input<string>;
|
|
802
|
+
/**
|
|
803
|
+
* Scanner profile to use for DAST scans.
|
|
804
|
+
*/
|
|
805
|
+
scannerProfile?: pulumi.Input<string>;
|
|
806
|
+
/**
|
|
807
|
+
* Site profile to use for DAST scans.
|
|
808
|
+
*/
|
|
809
|
+
siteProfile?: pulumi.Input<string>;
|
|
810
|
+
/**
|
|
811
|
+
* Tags to exclude from the scan.
|
|
812
|
+
*/
|
|
813
|
+
tagsToExcludes?: pulumi.Input<pulumi.Input<string>[]>;
|
|
814
|
+
/**
|
|
815
|
+
* The template to use for the scan. Valid values: `default`, `latest`.
|
|
816
|
+
*/
|
|
817
|
+
template?: pulumi.Input<string>;
|
|
818
|
+
/**
|
|
819
|
+
* Environment variables to pass to the scan job.
|
|
820
|
+
*/
|
|
821
|
+
variables?: pulumi.Input<{
|
|
822
|
+
[key: string]: pulumi.Input<string>;
|
|
823
|
+
}>;
|
|
824
|
+
}
|
|
825
|
+
export interface GetSecurityPolicyDocumentScanExecutionPolicyPolicyScope {
|
|
826
|
+
/**
|
|
827
|
+
* Compliance framework names to scope the policy to.
|
|
828
|
+
*/
|
|
829
|
+
complianceFrameworks?: string[];
|
|
830
|
+
/**
|
|
831
|
+
* Project scope configuration.
|
|
832
|
+
*/
|
|
833
|
+
projects?: inputs.GetSecurityPolicyDocumentScanExecutionPolicyPolicyScopeProjects;
|
|
834
|
+
}
|
|
835
|
+
export interface GetSecurityPolicyDocumentScanExecutionPolicyPolicyScopeArgs {
|
|
836
|
+
/**
|
|
837
|
+
* Compliance framework names to scope the policy to.
|
|
838
|
+
*/
|
|
839
|
+
complianceFrameworks?: pulumi.Input<pulumi.Input<string>[]>;
|
|
840
|
+
/**
|
|
841
|
+
* Project scope configuration.
|
|
842
|
+
*/
|
|
843
|
+
projects?: pulumi.Input<inputs.GetSecurityPolicyDocumentScanExecutionPolicyPolicyScopeProjectsArgs>;
|
|
844
|
+
}
|
|
845
|
+
export interface GetSecurityPolicyDocumentScanExecutionPolicyPolicyScopeProjects {
|
|
846
|
+
/**
|
|
847
|
+
* List of project IDs to exclude from this policy.
|
|
848
|
+
*/
|
|
849
|
+
excludings?: number[];
|
|
850
|
+
/**
|
|
851
|
+
* List of project IDs to explicitly include in this policy.
|
|
852
|
+
*/
|
|
853
|
+
includings?: number[];
|
|
854
|
+
}
|
|
855
|
+
export interface GetSecurityPolicyDocumentScanExecutionPolicyPolicyScopeProjectsArgs {
|
|
856
|
+
/**
|
|
857
|
+
* List of project IDs to exclude from this policy.
|
|
858
|
+
*/
|
|
859
|
+
excludings?: pulumi.Input<pulumi.Input<number>[]>;
|
|
860
|
+
/**
|
|
861
|
+
* List of project IDs to explicitly include in this policy.
|
|
862
|
+
*/
|
|
863
|
+
includings?: pulumi.Input<pulumi.Input<number>[]>;
|
|
864
|
+
}
|
|
865
|
+
export interface GetSecurityPolicyDocumentScanExecutionPolicyRule {
|
|
866
|
+
/**
|
|
867
|
+
* Kubernetes agents configuration for agent-based policies.
|
|
868
|
+
*/
|
|
869
|
+
agents?: {
|
|
870
|
+
[key: string]: string;
|
|
871
|
+
};
|
|
872
|
+
/**
|
|
873
|
+
* Branches to exclude from the policy.
|
|
874
|
+
*/
|
|
875
|
+
branchExceptions?: string[];
|
|
876
|
+
/**
|
|
877
|
+
* Type of branches to match. Valid values: `all`, `protected`, `default`.
|
|
878
|
+
*/
|
|
879
|
+
branchType?: string;
|
|
880
|
+
/**
|
|
881
|
+
* Branch names or patterns to match.
|
|
882
|
+
*/
|
|
883
|
+
branches?: string[];
|
|
884
|
+
/**
|
|
885
|
+
* Cron expression for schedule type rules (e.g., `*/15 * * * *` for every 15 minutes).
|
|
886
|
+
*/
|
|
887
|
+
cadence?: string;
|
|
888
|
+
/**
|
|
889
|
+
* Type of rule. Valid values: `pipeline`, `schedule`, `agent`.
|
|
890
|
+
*/
|
|
891
|
+
type: string;
|
|
892
|
+
}
|
|
893
|
+
export interface GetSecurityPolicyDocumentScanExecutionPolicyRuleArgs {
|
|
894
|
+
/**
|
|
895
|
+
* Kubernetes agents configuration for agent-based policies.
|
|
896
|
+
*/
|
|
897
|
+
agents?: pulumi.Input<{
|
|
898
|
+
[key: string]: pulumi.Input<string>;
|
|
899
|
+
}>;
|
|
900
|
+
/**
|
|
901
|
+
* Branches to exclude from the policy.
|
|
902
|
+
*/
|
|
903
|
+
branchExceptions?: pulumi.Input<pulumi.Input<string>[]>;
|
|
904
|
+
/**
|
|
905
|
+
* Type of branches to match. Valid values: `all`, `protected`, `default`.
|
|
906
|
+
*/
|
|
907
|
+
branchType?: pulumi.Input<string>;
|
|
908
|
+
/**
|
|
909
|
+
* Branch names or patterns to match.
|
|
910
|
+
*/
|
|
911
|
+
branches?: pulumi.Input<pulumi.Input<string>[]>;
|
|
912
|
+
/**
|
|
913
|
+
* Cron expression for schedule type rules (e.g., `*/15 * * * *` for every 15 minutes).
|
|
914
|
+
*/
|
|
915
|
+
cadence?: pulumi.Input<string>;
|
|
916
|
+
/**
|
|
917
|
+
* Type of rule. Valid values: `pipeline`, `schedule`, `agent`.
|
|
918
|
+
*/
|
|
919
|
+
type: pulumi.Input<string>;
|
|
920
|
+
}
|
|
921
|
+
export interface GetSecurityPolicyDocumentScanExecutionPolicySkipCi {
|
|
922
|
+
/**
|
|
923
|
+
* Allow (true) or prevent (false) the use of skip-ci directive.
|
|
924
|
+
*/
|
|
925
|
+
allowed: boolean;
|
|
926
|
+
}
|
|
927
|
+
export interface GetSecurityPolicyDocumentScanExecutionPolicySkipCiArgs {
|
|
928
|
+
/**
|
|
929
|
+
* Allow (true) or prevent (false) the use of skip-ci directive.
|
|
930
|
+
*/
|
|
931
|
+
allowed: pulumi.Input<boolean>;
|
|
932
|
+
}
|
|
709
933
|
export interface GroupAccessTokenRotationConfiguration {
|
|
710
934
|
/**
|
|
711
935
|
* The duration (in days) the new token should be valid for.
|
package/types/output.d.ts
CHANGED
|
@@ -203,7 +203,7 @@ export interface GetGroupAccessTokensAccessToken {
|
|
|
203
203
|
}
|
|
204
204
|
export interface GetGroupBillableMemberMembershipsMembership {
|
|
205
205
|
/**
|
|
206
|
-
* Access-level of the member. For details see: https://docs.gitlab.com/
|
|
206
|
+
* Access-level of the member. For details see: https://docs.gitlab.com/user/permissions/#default-roles
|
|
207
207
|
*/
|
|
208
208
|
accessLevel: string;
|
|
209
209
|
/**
|
|
@@ -473,6 +473,15 @@ export interface GetGroupSamlLinksSamlLink {
|
|
|
473
473
|
*/
|
|
474
474
|
name: string;
|
|
475
475
|
}
|
|
476
|
+
export interface GetGroupServiceAccountAccessTokensAccessToken {
|
|
477
|
+
active: boolean;
|
|
478
|
+
createdAt: string;
|
|
479
|
+
expiresAt: string;
|
|
480
|
+
id: string;
|
|
481
|
+
name: string;
|
|
482
|
+
revoked: boolean;
|
|
483
|
+
scopes: string[];
|
|
484
|
+
}
|
|
476
485
|
export interface GetGroupSharedWithGroup {
|
|
477
486
|
/**
|
|
478
487
|
* Share with group expiration date.
|
|
@@ -1232,6 +1241,80 @@ export interface GetProjectHooksHook {
|
|
|
1232
1241
|
*/
|
|
1233
1242
|
wikiPageEvents: boolean;
|
|
1234
1243
|
}
|
|
1244
|
+
export interface GetProjectIssueLabelEventsEvent {
|
|
1245
|
+
/**
|
|
1246
|
+
* The action performed on the label (add, remove).
|
|
1247
|
+
*/
|
|
1248
|
+
action: string;
|
|
1249
|
+
/**
|
|
1250
|
+
* The date and time when the label event was created.
|
|
1251
|
+
*/
|
|
1252
|
+
createdAt: string;
|
|
1253
|
+
/**
|
|
1254
|
+
* The ID of the label event.
|
|
1255
|
+
*/
|
|
1256
|
+
id: number;
|
|
1257
|
+
/**
|
|
1258
|
+
* The label that was added or removed.
|
|
1259
|
+
*/
|
|
1260
|
+
label: outputs.GetProjectIssueLabelEventsEventLabel;
|
|
1261
|
+
/**
|
|
1262
|
+
* The ID of the resource associated with the label event.
|
|
1263
|
+
*/
|
|
1264
|
+
resourceId: number;
|
|
1265
|
+
/**
|
|
1266
|
+
* The type of the resource associated with the label event.
|
|
1267
|
+
*/
|
|
1268
|
+
resourceType: string;
|
|
1269
|
+
/**
|
|
1270
|
+
* The user who performed the action.
|
|
1271
|
+
*/
|
|
1272
|
+
user: outputs.GetProjectIssueLabelEventsEventUser;
|
|
1273
|
+
}
|
|
1274
|
+
export interface GetProjectIssueLabelEventsEventLabel {
|
|
1275
|
+
/**
|
|
1276
|
+
* The color of the label.
|
|
1277
|
+
*/
|
|
1278
|
+
color: string;
|
|
1279
|
+
/**
|
|
1280
|
+
* The description of the label.
|
|
1281
|
+
*/
|
|
1282
|
+
description: string;
|
|
1283
|
+
/**
|
|
1284
|
+
* The ID of the label.
|
|
1285
|
+
*/
|
|
1286
|
+
id: number;
|
|
1287
|
+
/**
|
|
1288
|
+
* The name of the label.
|
|
1289
|
+
*/
|
|
1290
|
+
name: string;
|
|
1291
|
+
}
|
|
1292
|
+
export interface GetProjectIssueLabelEventsEventUser {
|
|
1293
|
+
/**
|
|
1294
|
+
* The avatar URL of the user.
|
|
1295
|
+
*/
|
|
1296
|
+
avatarUrl: string;
|
|
1297
|
+
/**
|
|
1298
|
+
* The ID of the user.
|
|
1299
|
+
*/
|
|
1300
|
+
id: number;
|
|
1301
|
+
/**
|
|
1302
|
+
* The name of the user.
|
|
1303
|
+
*/
|
|
1304
|
+
name: string;
|
|
1305
|
+
/**
|
|
1306
|
+
* The state of the user.
|
|
1307
|
+
*/
|
|
1308
|
+
state: string;
|
|
1309
|
+
/**
|
|
1310
|
+
* The username of the user.
|
|
1311
|
+
*/
|
|
1312
|
+
username: string;
|
|
1313
|
+
/**
|
|
1314
|
+
* The web URL of the user.
|
|
1315
|
+
*/
|
|
1316
|
+
webUrl: string;
|
|
1317
|
+
}
|
|
1235
1318
|
export interface GetProjectIssueTaskCompletionStatus {
|
|
1236
1319
|
/**
|
|
1237
1320
|
* The number of tasks that are completed.
|
|
@@ -1911,6 +1994,64 @@ export interface GetProjectPushRule {
|
|
|
1911
1994
|
*/
|
|
1912
1995
|
rejectUnsignedCommits: boolean;
|
|
1913
1996
|
}
|
|
1997
|
+
export interface GetProjectSecureFileMetadata {
|
|
1998
|
+
/**
|
|
1999
|
+
* Certificate expiration date
|
|
2000
|
+
*/
|
|
2001
|
+
expiresAt: string;
|
|
2002
|
+
/**
|
|
2003
|
+
* Certificate ID
|
|
2004
|
+
*/
|
|
2005
|
+
id: string;
|
|
2006
|
+
/**
|
|
2007
|
+
* Certificate issuer information
|
|
2008
|
+
*/
|
|
2009
|
+
issuer: outputs.GetProjectSecureFileMetadataIssuer;
|
|
2010
|
+
/**
|
|
2011
|
+
* Certificate subject information
|
|
2012
|
+
*/
|
|
2013
|
+
subject: outputs.GetProjectSecureFileMetadataSubject;
|
|
2014
|
+
}
|
|
2015
|
+
export interface GetProjectSecureFileMetadataIssuer {
|
|
2016
|
+
/**
|
|
2017
|
+
* Country
|
|
2018
|
+
*/
|
|
2019
|
+
c: string;
|
|
2020
|
+
/**
|
|
2021
|
+
* Common Name
|
|
2022
|
+
*/
|
|
2023
|
+
cn: string;
|
|
2024
|
+
/**
|
|
2025
|
+
* Organization
|
|
2026
|
+
*/
|
|
2027
|
+
o: string;
|
|
2028
|
+
/**
|
|
2029
|
+
* Organizational Unit
|
|
2030
|
+
*/
|
|
2031
|
+
ou: string;
|
|
2032
|
+
}
|
|
2033
|
+
export interface GetProjectSecureFileMetadataSubject {
|
|
2034
|
+
/**
|
|
2035
|
+
* Country
|
|
2036
|
+
*/
|
|
2037
|
+
c: string;
|
|
2038
|
+
/**
|
|
2039
|
+
* Common Name
|
|
2040
|
+
*/
|
|
2041
|
+
cn: string;
|
|
2042
|
+
/**
|
|
2043
|
+
* Organization
|
|
2044
|
+
*/
|
|
2045
|
+
o: string;
|
|
2046
|
+
/**
|
|
2047
|
+
* Organizational Unit
|
|
2048
|
+
*/
|
|
2049
|
+
ou: string;
|
|
2050
|
+
/**
|
|
2051
|
+
* User ID
|
|
2052
|
+
*/
|
|
2053
|
+
uid: string;
|
|
2054
|
+
}
|
|
1914
2055
|
export interface GetProjectSharedWithGroup {
|
|
1915
2056
|
/**
|
|
1916
2057
|
* The accessLevel permission level of the shared group.
|
|
@@ -2718,7 +2859,7 @@ export interface GetReleaseAssetsSource {
|
|
|
2718
2859
|
}
|
|
2719
2860
|
export interface GetReleaseLinksReleaseLink {
|
|
2720
2861
|
/**
|
|
2721
|
-
* Full path for a [Direct Asset link](https://docs.gitlab.com/user/project/releases/
|
|
2862
|
+
* Full path for a [Direct Asset link](https://docs.gitlab.com/user/project/releases/release_fields/#permanent-links-to-latest-release-assets).
|
|
2722
2863
|
*/
|
|
2723
2864
|
directAssetUrl: string;
|
|
2724
2865
|
/**
|
|
@@ -2726,7 +2867,7 @@ export interface GetReleaseLinksReleaseLink {
|
|
|
2726
2867
|
*/
|
|
2727
2868
|
external: boolean;
|
|
2728
2869
|
/**
|
|
2729
|
-
* Relative path for a [Direct Asset link](https://docs.gitlab.com/user/project/releases/
|
|
2870
|
+
* Relative path for a [Direct Asset link](https://docs.gitlab.com/user/project/releases/release_fields/#permanent-links-to-latest-release-assets).
|
|
2730
2871
|
*/
|
|
2731
2872
|
filepath: string;
|
|
2732
2873
|
/**
|
|
@@ -2742,7 +2883,7 @@ export interface GetReleaseLinksReleaseLink {
|
|
|
2742
2883
|
*/
|
|
2743
2884
|
name: string;
|
|
2744
2885
|
/**
|
|
2745
|
-
* The ID or
|
|
2886
|
+
* The ID or Namespace path of the project.
|
|
2746
2887
|
*/
|
|
2747
2888
|
project: string;
|
|
2748
2889
|
/**
|
|
@@ -2812,6 +2953,118 @@ export interface GetRunnersRunner {
|
|
|
2812
2953
|
*/
|
|
2813
2954
|
status: string;
|
|
2814
2955
|
}
|
|
2956
|
+
export interface GetSecurityPolicyDocumentScanExecutionPolicy {
|
|
2957
|
+
/**
|
|
2958
|
+
* Actions to execute when rules match. At least one action is required.
|
|
2959
|
+
*/
|
|
2960
|
+
actions: outputs.GetSecurityPolicyDocumentScanExecutionPolicyAction[];
|
|
2961
|
+
/**
|
|
2962
|
+
* Description of the scan execution policy.
|
|
2963
|
+
*/
|
|
2964
|
+
description?: string;
|
|
2965
|
+
/**
|
|
2966
|
+
* Whether the policy is enabled.
|
|
2967
|
+
*/
|
|
2968
|
+
enabled: boolean;
|
|
2969
|
+
/**
|
|
2970
|
+
* Name of the scan execution policy.
|
|
2971
|
+
*/
|
|
2972
|
+
name: string;
|
|
2973
|
+
/**
|
|
2974
|
+
* Scope configuration to limit which projects the policy applies to.
|
|
2975
|
+
*/
|
|
2976
|
+
policyScope?: outputs.GetSecurityPolicyDocumentScanExecutionPolicyPolicyScope;
|
|
2977
|
+
/**
|
|
2978
|
+
* Rules that trigger the policy. At least one rule is required.
|
|
2979
|
+
*/
|
|
2980
|
+
rules: outputs.GetSecurityPolicyDocumentScanExecutionPolicyRule[];
|
|
2981
|
+
/**
|
|
2982
|
+
* Control whether users can use the skip-ci directive.
|
|
2983
|
+
*/
|
|
2984
|
+
skipCi?: outputs.GetSecurityPolicyDocumentScanExecutionPolicySkipCi;
|
|
2985
|
+
}
|
|
2986
|
+
export interface GetSecurityPolicyDocumentScanExecutionPolicyAction {
|
|
2987
|
+
/**
|
|
2988
|
+
* Type of scan to run. Valid values: `sast`, `secretDetection`, `containerScanning`, `dependencyScanning`, `dast`, `sastIac`, `clusterImageScanning`, `apiFuzzing`, `coverageFuzzing`.
|
|
2989
|
+
*/
|
|
2990
|
+
scan: string;
|
|
2991
|
+
/**
|
|
2992
|
+
* Scanner profile to use for DAST scans.
|
|
2993
|
+
*/
|
|
2994
|
+
scannerProfile?: string;
|
|
2995
|
+
/**
|
|
2996
|
+
* Site profile to use for DAST scans.
|
|
2997
|
+
*/
|
|
2998
|
+
siteProfile?: string;
|
|
2999
|
+
/**
|
|
3000
|
+
* Tags to exclude from the scan.
|
|
3001
|
+
*/
|
|
3002
|
+
tagsToExcludes?: string[];
|
|
3003
|
+
/**
|
|
3004
|
+
* The template to use for the scan. Valid values: `default`, `latest`.
|
|
3005
|
+
*/
|
|
3006
|
+
template?: string;
|
|
3007
|
+
/**
|
|
3008
|
+
* Environment variables to pass to the scan job.
|
|
3009
|
+
*/
|
|
3010
|
+
variables?: {
|
|
3011
|
+
[key: string]: string;
|
|
3012
|
+
};
|
|
3013
|
+
}
|
|
3014
|
+
export interface GetSecurityPolicyDocumentScanExecutionPolicyPolicyScope {
|
|
3015
|
+
/**
|
|
3016
|
+
* Compliance framework names to scope the policy to.
|
|
3017
|
+
*/
|
|
3018
|
+
complianceFrameworks?: string[];
|
|
3019
|
+
/**
|
|
3020
|
+
* Project scope configuration.
|
|
3021
|
+
*/
|
|
3022
|
+
projects?: outputs.GetSecurityPolicyDocumentScanExecutionPolicyPolicyScopeProjects;
|
|
3023
|
+
}
|
|
3024
|
+
export interface GetSecurityPolicyDocumentScanExecutionPolicyPolicyScopeProjects {
|
|
3025
|
+
/**
|
|
3026
|
+
* List of project IDs to exclude from this policy.
|
|
3027
|
+
*/
|
|
3028
|
+
excludings?: number[];
|
|
3029
|
+
/**
|
|
3030
|
+
* List of project IDs to explicitly include in this policy.
|
|
3031
|
+
*/
|
|
3032
|
+
includings?: number[];
|
|
3033
|
+
}
|
|
3034
|
+
export interface GetSecurityPolicyDocumentScanExecutionPolicyRule {
|
|
3035
|
+
/**
|
|
3036
|
+
* Kubernetes agents configuration for agent-based policies.
|
|
3037
|
+
*/
|
|
3038
|
+
agents?: {
|
|
3039
|
+
[key: string]: string;
|
|
3040
|
+
};
|
|
3041
|
+
/**
|
|
3042
|
+
* Branches to exclude from the policy.
|
|
3043
|
+
*/
|
|
3044
|
+
branchExceptions?: string[];
|
|
3045
|
+
/**
|
|
3046
|
+
* Type of branches to match. Valid values: `all`, `protected`, `default`.
|
|
3047
|
+
*/
|
|
3048
|
+
branchType?: string;
|
|
3049
|
+
/**
|
|
3050
|
+
* Branch names or patterns to match.
|
|
3051
|
+
*/
|
|
3052
|
+
branches?: string[];
|
|
3053
|
+
/**
|
|
3054
|
+
* Cron expression for schedule type rules (e.g., `*/15 * * * *` for every 15 minutes).
|
|
3055
|
+
*/
|
|
3056
|
+
cadence?: string;
|
|
3057
|
+
/**
|
|
3058
|
+
* Type of rule. Valid values: `pipeline`, `schedule`, `agent`.
|
|
3059
|
+
*/
|
|
3060
|
+
type: string;
|
|
3061
|
+
}
|
|
3062
|
+
export interface GetSecurityPolicyDocumentScanExecutionPolicySkipCi {
|
|
3063
|
+
/**
|
|
3064
|
+
* Allow (true) or prevent (false) the use of skip-ci directive.
|
|
3065
|
+
*/
|
|
3066
|
+
allowed: boolean;
|
|
3067
|
+
}
|
|
2815
3068
|
export interface GetUserSshkeysKey {
|
|
2816
3069
|
/**
|
|
2817
3070
|
* The time when this key was created in GitLab.
|
package/userAvatar.d.ts
ADDED
|
@@ -0,0 +1,126 @@
|
|
|
1
|
+
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
/**
|
|
3
|
+
* The `gitlab.UserAvatar` resource allows users to manage the lifecycle of a user avatar.
|
|
4
|
+
* The resource can also be used to set the avatar on project or group access tokens, as well as on service accounts.
|
|
5
|
+
*
|
|
6
|
+
* > The `token` attribute is optional only when the GitLab token used by the provider has an administrator scope, as this allows an administrator to manage user avatars.
|
|
7
|
+
*
|
|
8
|
+
* > The provided `token` must have the `api` scope in order to set the avatar.
|
|
9
|
+
*
|
|
10
|
+
* **Upstream API**: [GitLab API docs](https://docs.gitlab.com/api/users/#upload-an-avatar-for-yourself)
|
|
11
|
+
*
|
|
12
|
+
* ## Import
|
|
13
|
+
*
|
|
14
|
+
* Starting in Terraform v1.5.0, you can use an import block to import `gitlab_user_avatar`. For example:
|
|
15
|
+
*
|
|
16
|
+
* terraform
|
|
17
|
+
*
|
|
18
|
+
* import {
|
|
19
|
+
*
|
|
20
|
+
* to = gitlab_user_avatar.example
|
|
21
|
+
*
|
|
22
|
+
* id = "see CLI command below for ID"
|
|
23
|
+
*
|
|
24
|
+
* }
|
|
25
|
+
*
|
|
26
|
+
* Importing using the CLI is supported with the following syntax:
|
|
27
|
+
*
|
|
28
|
+
* A GitLab User Avatar can be imported using the user id, e.g.
|
|
29
|
+
*
|
|
30
|
+
* ```sh
|
|
31
|
+
* $ pulumi import gitlab:index/userAvatar:UserAvatar example "12345"
|
|
32
|
+
* ```
|
|
33
|
+
*
|
|
34
|
+
* NOTE: the `token` and `avatar` resource attributes are not available for imported resources as this information cannot be read from the GitLab API.
|
|
35
|
+
*/
|
|
36
|
+
export declare class UserAvatar extends pulumi.CustomResource {
|
|
37
|
+
/**
|
|
38
|
+
* Get an existing UserAvatar resource's state with the given name, ID, and optional extra
|
|
39
|
+
* properties used to qualify the lookup.
|
|
40
|
+
*
|
|
41
|
+
* @param name The _unique_ name of the resulting resource.
|
|
42
|
+
* @param id The _unique_ provider ID of the resource to lookup.
|
|
43
|
+
* @param state Any extra arguments used during the lookup.
|
|
44
|
+
* @param opts Optional settings to control the behavior of the CustomResource.
|
|
45
|
+
*/
|
|
46
|
+
static get(name: string, id: pulumi.Input<pulumi.ID>, state?: UserAvatarState, opts?: pulumi.CustomResourceOptions): UserAvatar;
|
|
47
|
+
/**
|
|
48
|
+
* Returns true if the given object is an instance of UserAvatar. This is designed to work even
|
|
49
|
+
* when multiple copies of the Pulumi SDK have been loaded into the same process.
|
|
50
|
+
*/
|
|
51
|
+
static isInstance(obj: any): obj is UserAvatar;
|
|
52
|
+
/**
|
|
53
|
+
* A local path to the avatar image to upload. **Note**: the avatar is not available for imported resources.
|
|
54
|
+
*/
|
|
55
|
+
readonly avatar: pulumi.Output<string>;
|
|
56
|
+
/**
|
|
57
|
+
* The hash of the avatar image. This is used to track changes to the avatar image if the image contents change but the image name remains the same. Use `filesha256("path/to/avatar.png")` whenever possible.
|
|
58
|
+
*/
|
|
59
|
+
readonly avatarHash: pulumi.Output<string | undefined>;
|
|
60
|
+
/**
|
|
61
|
+
* The URL of the avatar image.
|
|
62
|
+
*/
|
|
63
|
+
readonly avatarUrl: pulumi.Output<string>;
|
|
64
|
+
/**
|
|
65
|
+
* The access token of the user. If this field is omitted, a GitLab token with administrator scope is required to manage the avatar for the specified user. **Note**: the token is not available for imported resources.
|
|
66
|
+
*/
|
|
67
|
+
readonly token: pulumi.Output<string | undefined>;
|
|
68
|
+
/**
|
|
69
|
+
* The ID of the user.
|
|
70
|
+
*/
|
|
71
|
+
readonly userId: pulumi.Output<number>;
|
|
72
|
+
/**
|
|
73
|
+
* Create a UserAvatar resource with the given unique name, arguments, and options.
|
|
74
|
+
*
|
|
75
|
+
* @param name The _unique_ name of the resource.
|
|
76
|
+
* @param args The arguments to use to populate this resource's properties.
|
|
77
|
+
* @param opts A bag of options that control this resource's behavior.
|
|
78
|
+
*/
|
|
79
|
+
constructor(name: string, args: UserAvatarArgs, opts?: pulumi.CustomResourceOptions);
|
|
80
|
+
}
|
|
81
|
+
/**
|
|
82
|
+
* Input properties used for looking up and filtering UserAvatar resources.
|
|
83
|
+
*/
|
|
84
|
+
export interface UserAvatarState {
|
|
85
|
+
/**
|
|
86
|
+
* A local path to the avatar image to upload. **Note**: the avatar is not available for imported resources.
|
|
87
|
+
*/
|
|
88
|
+
avatar?: pulumi.Input<string>;
|
|
89
|
+
/**
|
|
90
|
+
* The hash of the avatar image. This is used to track changes to the avatar image if the image contents change but the image name remains the same. Use `filesha256("path/to/avatar.png")` whenever possible.
|
|
91
|
+
*/
|
|
92
|
+
avatarHash?: pulumi.Input<string>;
|
|
93
|
+
/**
|
|
94
|
+
* The URL of the avatar image.
|
|
95
|
+
*/
|
|
96
|
+
avatarUrl?: pulumi.Input<string>;
|
|
97
|
+
/**
|
|
98
|
+
* The access token of the user. If this field is omitted, a GitLab token with administrator scope is required to manage the avatar for the specified user. **Note**: the token is not available for imported resources.
|
|
99
|
+
*/
|
|
100
|
+
token?: pulumi.Input<string>;
|
|
101
|
+
/**
|
|
102
|
+
* The ID of the user.
|
|
103
|
+
*/
|
|
104
|
+
userId?: pulumi.Input<number>;
|
|
105
|
+
}
|
|
106
|
+
/**
|
|
107
|
+
* The set of arguments for constructing a UserAvatar resource.
|
|
108
|
+
*/
|
|
109
|
+
export interface UserAvatarArgs {
|
|
110
|
+
/**
|
|
111
|
+
* A local path to the avatar image to upload. **Note**: the avatar is not available for imported resources.
|
|
112
|
+
*/
|
|
113
|
+
avatar: pulumi.Input<string>;
|
|
114
|
+
/**
|
|
115
|
+
* The hash of the avatar image. This is used to track changes to the avatar image if the image contents change but the image name remains the same. Use `filesha256("path/to/avatar.png")` whenever possible.
|
|
116
|
+
*/
|
|
117
|
+
avatarHash?: pulumi.Input<string>;
|
|
118
|
+
/**
|
|
119
|
+
* The access token of the user. If this field is omitted, a GitLab token with administrator scope is required to manage the avatar for the specified user. **Note**: the token is not available for imported resources.
|
|
120
|
+
*/
|
|
121
|
+
token?: pulumi.Input<string>;
|
|
122
|
+
/**
|
|
123
|
+
* The ID of the user.
|
|
124
|
+
*/
|
|
125
|
+
userId: pulumi.Input<number>;
|
|
126
|
+
}
|