pulumi-github 6.11.0a1768966924__py3-none-any.whl → 6.12.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (31) hide show
  1. pulumi_github/__init__.py +28 -0
  2. pulumi_github/_inputs.py +324 -19
  3. pulumi_github/actions_environment_secret.py +141 -12
  4. pulumi_github/actions_environment_variable.py +71 -37
  5. pulumi_github/actions_organization_permissions.py +50 -3
  6. pulumi_github/actions_organization_secret.py +164 -55
  7. pulumi_github/actions_organization_secret_repositories.py +44 -28
  8. pulumi_github/actions_organization_secret_repository.py +44 -28
  9. pulumi_github/actions_organization_variable.py +44 -47
  10. pulumi_github/actions_organization_variable_repositories.py +262 -0
  11. pulumi_github/actions_organization_variable_repository.py +262 -0
  12. pulumi_github/actions_repository_permissions.py +50 -3
  13. pulumi_github/actions_secret.py +176 -41
  14. pulumi_github/actions_variable.py +65 -33
  15. pulumi_github/app_installation_repositories.py +6 -6
  16. pulumi_github/app_installation_repository.py +6 -6
  17. pulumi_github/dependabot_organization_secret.py +128 -59
  18. pulumi_github/dependabot_organization_secret_repositories.py +44 -36
  19. pulumi_github/dependabot_organization_secret_repository.py +262 -0
  20. pulumi_github/dependabot_secret.py +154 -41
  21. pulumi_github/emu_group_mapping.py +64 -4
  22. pulumi_github/get_release_asset.py +370 -0
  23. pulumi_github/organization_ruleset.py +11 -17
  24. pulumi_github/outputs.py +234 -13
  25. pulumi_github/pulumi-plugin.json +1 -1
  26. pulumi_github/repository.py +32 -27
  27. pulumi_github/repository_ruleset.py +7 -7
  28. {pulumi_github-6.11.0a1768966924.dist-info → pulumi_github-6.12.0.dist-info}/METADATA +1 -1
  29. {pulumi_github-6.11.0a1768966924.dist-info → pulumi_github-6.12.0.dist-info}/RECORD +31 -27
  30. {pulumi_github-6.11.0a1768966924.dist-info → pulumi_github-6.12.0.dist-info}/WHEEL +1 -1
  31. {pulumi_github-6.11.0a1768966924.dist-info → pulumi_github-6.12.0.dist-info}/top_level.txt +0 -0
@@ -63,7 +63,7 @@ class RepositoryArgs:
63
63
  """
64
64
  The set of arguments for constructing a Repository resource.
65
65
  :param pulumi.Input[_builtins.bool] allow_auto_merge: Set to `true` to allow auto-merging pull requests on the repository.
66
- :param pulumi.Input[_builtins.bool] allow_forking: Set to `true` to allow private forking on the repository; this is only relevant if the repository is owned by an organization and is private or internal.
66
+ :param pulumi.Input[_builtins.bool] allow_forking: Configure private forking for organization owned private and internal repositories; set to `true` to enable, `false` to disable, and leave unset for the default behaviour. Configuring this requires that private forking is not being explicitly configured at the organization level.
67
67
  :param pulumi.Input[_builtins.bool] allow_merge_commit: Set to `false` to disable merge commits on the repository.
68
68
  :param pulumi.Input[_builtins.bool] allow_rebase_merge: Set to `false` to disable rebase merges on the repository.
69
69
  :param pulumi.Input[_builtins.bool] allow_squash_merge: Set to `false` to disable squash merges on the repository.
@@ -86,7 +86,7 @@ class RepositoryArgs:
86
86
  :param pulumi.Input[_builtins.bool] has_wiki: Set to `true` to enable the GitHub Wiki features on
87
87
  the repository.
88
88
  :param pulumi.Input[_builtins.str] homepage_url: URL of a page describing the project.
89
- :param pulumi.Input[_builtins.bool] ignore_vulnerability_alerts_during_read: Set to `true` to not call the vulnerability alerts endpoint so the resource can also be used without admin permissions during read.
89
+ :param pulumi.Input[_builtins.bool] ignore_vulnerability_alerts_during_read: (Optional) - This is ignored as the provider now handles lack of permissions automatically.
90
90
  :param pulumi.Input[_builtins.bool] is_template: Set to `true` to tell GitHub that this is a template repository.
91
91
  :param pulumi.Input[_builtins.str] license_template: Use the [name of the template](https://github.com/github/choosealicense.com/tree/gh-pages/_licenses) without the extension. For example, "mit" or "mpl-2.0".
92
92
  :param pulumi.Input[_builtins.str] merge_commit_message: Can be `PR_BODY`, `PR_TITLE`, or `BLANK` for a default merge commit message. Applicable only if `allow_merge_commit` is `true`.
@@ -103,7 +103,7 @@ class RepositoryArgs:
103
103
  :param pulumi.Input['RepositoryTemplateArgs'] template: Use a template repository to create this resource. See Template Repositories below for details.
104
104
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] topics: The list of topics of the repository.
105
105
  :param pulumi.Input[_builtins.str] visibility: Can be `public` or `private`. If your organization is associated with an enterprise account using GitHub Enterprise Cloud or GitHub Enterprise Server 2.20+, visibility can also be `internal`. The `visibility` parameter overrides the `private` parameter.
106
- :param pulumi.Input[_builtins.bool] vulnerability_alerts: Set to `true` to enable security alerts for vulnerable dependencies. Enabling requires alerts to be enabled on the owner level. (Note for importing: GitHub enables the alerts on public repos but disables them on private repos by default.) See [GitHub Documentation](https://help.github.com/en/github/managing-security-vulnerabilities/about-security-alerts-for-vulnerable-dependencies) for details. Note that vulnerability alerts have not been successfully tested on any GitHub Enterprise instance and may be unavailable in those settings.
106
+ :param pulumi.Input[_builtins.bool] vulnerability_alerts: Configure [Dependabot security alerts](https://help.github.com/en/github/managing-security-vulnerabilities/about-security-alerts-for-vulnerable-dependencies) for vulnerable dependencies; set to `true` to enable, set to `false` to disable, and leave unset for the default behavior. Configuring this requires that alerts are not being explicitly configured at the organization level.
107
107
  :param pulumi.Input[_builtins.bool] web_commit_signoff_required: Require contributors to sign off on web-based commits. See more [here](https://docs.github.com/en/repositories/managing-your-repositorys-settings-and-features/managing-repository-settings/managing-the-commit-signoff-policy-for-your-repository). Defaults to `false`.
108
108
  """
109
109
  if allow_auto_merge is not None:
@@ -154,6 +154,9 @@ class RepositoryArgs:
154
154
  pulumi.set(__self__, "has_wiki", has_wiki)
155
155
  if homepage_url is not None:
156
156
  pulumi.set(__self__, "homepage_url", homepage_url)
157
+ if ignore_vulnerability_alerts_during_read is not None:
158
+ warnings.warn("""This is ignored as the provider now handles lack of permissions automatically.""", DeprecationWarning)
159
+ pulumi.log.warn("""ignore_vulnerability_alerts_during_read is deprecated: This is ignored as the provider now handles lack of permissions automatically.""")
157
160
  if ignore_vulnerability_alerts_during_read is not None:
158
161
  pulumi.set(__self__, "ignore_vulnerability_alerts_during_read", ignore_vulnerability_alerts_during_read)
159
162
  if is_template is not None:
@@ -210,7 +213,7 @@ class RepositoryArgs:
210
213
  @pulumi.getter(name="allowForking")
211
214
  def allow_forking(self) -> Optional[pulumi.Input[_builtins.bool]]:
212
215
  """
213
- Set to `true` to allow private forking on the repository; this is only relevant if the repository is owned by an organization and is private or internal.
216
+ Configure private forking for organization owned private and internal repositories; set to `true` to enable, `false` to disable, and leave unset for the default behaviour. Configuring this requires that private forking is not being explicitly configured at the organization level.
214
217
  """
215
218
  return pulumi.get(self, "allow_forking")
216
219
 
@@ -451,9 +454,10 @@ class RepositoryArgs:
451
454
 
452
455
  @_builtins.property
453
456
  @pulumi.getter(name="ignoreVulnerabilityAlertsDuringRead")
457
+ @_utilities.deprecated("""This is ignored as the provider now handles lack of permissions automatically.""")
454
458
  def ignore_vulnerability_alerts_during_read(self) -> Optional[pulumi.Input[_builtins.bool]]:
455
459
  """
456
- Set to `true` to not call the vulnerability alerts endpoint so the resource can also be used without admin permissions during read.
460
+ (Optional) - This is ignored as the provider now handles lack of permissions automatically.
457
461
  """
458
462
  return pulumi.get(self, "ignore_vulnerability_alerts_during_read")
459
463
 
@@ -647,7 +651,7 @@ class RepositoryArgs:
647
651
  @pulumi.getter(name="vulnerabilityAlerts")
648
652
  def vulnerability_alerts(self) -> Optional[pulumi.Input[_builtins.bool]]:
649
653
  """
650
- Set to `true` to enable security alerts for vulnerable dependencies. Enabling requires alerts to be enabled on the owner level. (Note for importing: GitHub enables the alerts on public repos but disables them on private repos by default.) See [GitHub Documentation](https://help.github.com/en/github/managing-security-vulnerabilities/about-security-alerts-for-vulnerable-dependencies) for details. Note that vulnerability alerts have not been successfully tested on any GitHub Enterprise instance and may be unavailable in those settings.
654
+ Configure [Dependabot security alerts](https://help.github.com/en/github/managing-security-vulnerabilities/about-security-alerts-for-vulnerable-dependencies) for vulnerable dependencies; set to `true` to enable, set to `false` to disable, and leave unset for the default behavior. Configuring this requires that alerts are not being explicitly configured at the organization level.
651
655
  """
652
656
  return pulumi.get(self, "vulnerability_alerts")
653
657
 
@@ -722,7 +726,7 @@ class _RepositoryState:
722
726
  """
723
727
  Input properties used for looking up and filtering Repository resources.
724
728
  :param pulumi.Input[_builtins.bool] allow_auto_merge: Set to `true` to allow auto-merging pull requests on the repository.
725
- :param pulumi.Input[_builtins.bool] allow_forking: Set to `true` to allow private forking on the repository; this is only relevant if the repository is owned by an organization and is private or internal.
729
+ :param pulumi.Input[_builtins.bool] allow_forking: Configure private forking for organization owned private and internal repositories; set to `true` to enable, `false` to disable, and leave unset for the default behaviour. Configuring this requires that private forking is not being explicitly configured at the organization level.
726
730
  :param pulumi.Input[_builtins.bool] allow_merge_commit: Set to `false` to disable merge commits on the repository.
727
731
  :param pulumi.Input[_builtins.bool] allow_rebase_merge: Set to `false` to disable rebase merges on the repository.
728
732
  :param pulumi.Input[_builtins.bool] allow_squash_merge: Set to `false` to disable squash merges on the repository.
@@ -749,7 +753,7 @@ class _RepositoryState:
749
753
  :param pulumi.Input[_builtins.str] homepage_url: URL of a page describing the project.
750
754
  :param pulumi.Input[_builtins.str] html_url: The absolute URL (including scheme) of the rendered GitHub Pages site e.g. `https://username.github.io`.
751
755
  :param pulumi.Input[_builtins.str] http_clone_url: URL that can be provided to `git clone` to clone the repository via HTTPS.
752
- :param pulumi.Input[_builtins.bool] ignore_vulnerability_alerts_during_read: Set to `true` to not call the vulnerability alerts endpoint so the resource can also be used without admin permissions during read.
756
+ :param pulumi.Input[_builtins.bool] ignore_vulnerability_alerts_during_read: (Optional) - This is ignored as the provider now handles lack of permissions automatically.
753
757
  :param pulumi.Input[_builtins.bool] is_template: Set to `true` to tell GitHub that this is a template repository.
754
758
  :param pulumi.Input[_builtins.str] license_template: Use the [name of the template](https://github.com/github/choosealicense.com/tree/gh-pages/_licenses) without the extension. For example, "mit" or "mpl-2.0".
755
759
  :param pulumi.Input[_builtins.str] merge_commit_message: Can be `PR_BODY`, `PR_TITLE`, or `BLANK` for a default merge commit message. Applicable only if `allow_merge_commit` is `true`.
@@ -771,7 +775,7 @@ class _RepositoryState:
771
775
  :param pulumi.Input['RepositoryTemplateArgs'] template: Use a template repository to create this resource. See Template Repositories below for details.
772
776
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] topics: The list of topics of the repository.
773
777
  :param pulumi.Input[_builtins.str] visibility: Can be `public` or `private`. If your organization is associated with an enterprise account using GitHub Enterprise Cloud or GitHub Enterprise Server 2.20+, visibility can also be `internal`. The `visibility` parameter overrides the `private` parameter.
774
- :param pulumi.Input[_builtins.bool] vulnerability_alerts: Set to `true` to enable security alerts for vulnerable dependencies. Enabling requires alerts to be enabled on the owner level. (Note for importing: GitHub enables the alerts on public repos but disables them on private repos by default.) See [GitHub Documentation](https://help.github.com/en/github/managing-security-vulnerabilities/about-security-alerts-for-vulnerable-dependencies) for details. Note that vulnerability alerts have not been successfully tested on any GitHub Enterprise instance and may be unavailable in those settings.
778
+ :param pulumi.Input[_builtins.bool] vulnerability_alerts: Configure [Dependabot security alerts](https://help.github.com/en/github/managing-security-vulnerabilities/about-security-alerts-for-vulnerable-dependencies) for vulnerable dependencies; set to `true` to enable, set to `false` to disable, and leave unset for the default behavior. Configuring this requires that alerts are not being explicitly configured at the organization level.
775
779
  :param pulumi.Input[_builtins.bool] web_commit_signoff_required: Require contributors to sign off on web-based commits. See more [here](https://docs.github.com/en/repositories/managing-your-repositorys-settings-and-features/managing-repository-settings/managing-the-commit-signoff-policy-for-your-repository). Defaults to `false`.
776
780
  """
777
781
  if allow_auto_merge is not None:
@@ -830,6 +834,9 @@ class _RepositoryState:
830
834
  pulumi.set(__self__, "html_url", html_url)
831
835
  if http_clone_url is not None:
832
836
  pulumi.set(__self__, "http_clone_url", http_clone_url)
837
+ if ignore_vulnerability_alerts_during_read is not None:
838
+ warnings.warn("""This is ignored as the provider now handles lack of permissions automatically.""", DeprecationWarning)
839
+ pulumi.log.warn("""ignore_vulnerability_alerts_during_read is deprecated: This is ignored as the provider now handles lack of permissions automatically.""")
833
840
  if ignore_vulnerability_alerts_during_read is not None:
834
841
  pulumi.set(__self__, "ignore_vulnerability_alerts_during_read", ignore_vulnerability_alerts_during_read)
835
842
  if is_template is not None:
@@ -896,7 +903,7 @@ class _RepositoryState:
896
903
  @pulumi.getter(name="allowForking")
897
904
  def allow_forking(self) -> Optional[pulumi.Input[_builtins.bool]]:
898
905
  """
899
- Set to `true` to allow private forking on the repository; this is only relevant if the repository is owned by an organization and is private or internal.
906
+ Configure private forking for organization owned private and internal repositories; set to `true` to enable, `false` to disable, and leave unset for the default behaviour. Configuring this requires that private forking is not being explicitly configured at the organization level.
900
907
  """
901
908
  return pulumi.get(self, "allow_forking")
902
909
 
@@ -1185,9 +1192,10 @@ class _RepositoryState:
1185
1192
 
1186
1193
  @_builtins.property
1187
1194
  @pulumi.getter(name="ignoreVulnerabilityAlertsDuringRead")
1195
+ @_utilities.deprecated("""This is ignored as the provider now handles lack of permissions automatically.""")
1188
1196
  def ignore_vulnerability_alerts_during_read(self) -> Optional[pulumi.Input[_builtins.bool]]:
1189
1197
  """
1190
- Set to `true` to not call the vulnerability alerts endpoint so the resource can also be used without admin permissions during read.
1198
+ (Optional) - This is ignored as the provider now handles lack of permissions automatically.
1191
1199
  """
1192
1200
  return pulumi.get(self, "ignore_vulnerability_alerts_during_read")
1193
1201
 
@@ -1441,7 +1449,7 @@ class _RepositoryState:
1441
1449
  @pulumi.getter(name="vulnerabilityAlerts")
1442
1450
  def vulnerability_alerts(self) -> Optional[pulumi.Input[_builtins.bool]]:
1443
1451
  """
1444
- Set to `true` to enable security alerts for vulnerable dependencies. Enabling requires alerts to be enabled on the owner level. (Note for importing: GitHub enables the alerts on public repos but disables them on private repos by default.) See [GitHub Documentation](https://help.github.com/en/github/managing-security-vulnerabilities/about-security-alerts-for-vulnerable-dependencies) for details. Note that vulnerability alerts have not been successfully tested on any GitHub Enterprise instance and may be unavailable in those settings.
1452
+ Configure [Dependabot security alerts](https://help.github.com/en/github/managing-security-vulnerabilities/about-security-alerts-for-vulnerable-dependencies) for vulnerable dependencies; set to `true` to enable, set to `false` to disable, and leave unset for the default behavior. Configuring this requires that alerts are not being explicitly configured at the organization level.
1445
1453
  """
1446
1454
  return pulumi.get(self, "vulnerability_alerts")
1447
1455
 
@@ -1567,16 +1575,14 @@ class Repository(pulumi.CustomResource):
1567
1575
 
1568
1576
  Repositories can be imported using the `name`, e.g.
1569
1577
 
1570
- text
1571
-
1572
1578
  ```sh
1573
- $ pulumi import github:index/repository:Repository terraform terraform
1579
+ $ pulumi import github:index/repository:Repository terraform myrepo
1574
1580
  ```
1575
1581
 
1576
1582
  :param str resource_name: The name of the resource.
1577
1583
  :param pulumi.ResourceOptions opts: Options for the resource.
1578
1584
  :param pulumi.Input[_builtins.bool] allow_auto_merge: Set to `true` to allow auto-merging pull requests on the repository.
1579
- :param pulumi.Input[_builtins.bool] allow_forking: Set to `true` to allow private forking on the repository; this is only relevant if the repository is owned by an organization and is private or internal.
1585
+ :param pulumi.Input[_builtins.bool] allow_forking: Configure private forking for organization owned private and internal repositories; set to `true` to enable, `false` to disable, and leave unset for the default behaviour. Configuring this requires that private forking is not being explicitly configured at the organization level.
1580
1586
  :param pulumi.Input[_builtins.bool] allow_merge_commit: Set to `false` to disable merge commits on the repository.
1581
1587
  :param pulumi.Input[_builtins.bool] allow_rebase_merge: Set to `false` to disable rebase merges on the repository.
1582
1588
  :param pulumi.Input[_builtins.bool] allow_squash_merge: Set to `false` to disable squash merges on the repository.
@@ -1599,7 +1605,7 @@ class Repository(pulumi.CustomResource):
1599
1605
  :param pulumi.Input[_builtins.bool] has_wiki: Set to `true` to enable the GitHub Wiki features on
1600
1606
  the repository.
1601
1607
  :param pulumi.Input[_builtins.str] homepage_url: URL of a page describing the project.
1602
- :param pulumi.Input[_builtins.bool] ignore_vulnerability_alerts_during_read: Set to `true` to not call the vulnerability alerts endpoint so the resource can also be used without admin permissions during read.
1608
+ :param pulumi.Input[_builtins.bool] ignore_vulnerability_alerts_during_read: (Optional) - This is ignored as the provider now handles lack of permissions automatically.
1603
1609
  :param pulumi.Input[_builtins.bool] is_template: Set to `true` to tell GitHub that this is a template repository.
1604
1610
  :param pulumi.Input[_builtins.str] license_template: Use the [name of the template](https://github.com/github/choosealicense.com/tree/gh-pages/_licenses) without the extension. For example, "mit" or "mpl-2.0".
1605
1611
  :param pulumi.Input[_builtins.str] merge_commit_message: Can be `PR_BODY`, `PR_TITLE`, or `BLANK` for a default merge commit message. Applicable only if `allow_merge_commit` is `true`.
@@ -1616,7 +1622,7 @@ class Repository(pulumi.CustomResource):
1616
1622
  :param pulumi.Input[Union['RepositoryTemplateArgs', 'RepositoryTemplateArgsDict']] template: Use a template repository to create this resource. See Template Repositories below for details.
1617
1623
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] topics: The list of topics of the repository.
1618
1624
  :param pulumi.Input[_builtins.str] visibility: Can be `public` or `private`. If your organization is associated with an enterprise account using GitHub Enterprise Cloud or GitHub Enterprise Server 2.20+, visibility can also be `internal`. The `visibility` parameter overrides the `private` parameter.
1619
- :param pulumi.Input[_builtins.bool] vulnerability_alerts: Set to `true` to enable security alerts for vulnerable dependencies. Enabling requires alerts to be enabled on the owner level. (Note for importing: GitHub enables the alerts on public repos but disables them on private repos by default.) See [GitHub Documentation](https://help.github.com/en/github/managing-security-vulnerabilities/about-security-alerts-for-vulnerable-dependencies) for details. Note that vulnerability alerts have not been successfully tested on any GitHub Enterprise instance and may be unavailable in those settings.
1625
+ :param pulumi.Input[_builtins.bool] vulnerability_alerts: Configure [Dependabot security alerts](https://help.github.com/en/github/managing-security-vulnerabilities/about-security-alerts-for-vulnerable-dependencies) for vulnerable dependencies; set to `true` to enable, set to `false` to disable, and leave unset for the default behavior. Configuring this requires that alerts are not being explicitly configured at the organization level.
1620
1626
  :param pulumi.Input[_builtins.bool] web_commit_signoff_required: Require contributors to sign off on web-based commits. See more [here](https://docs.github.com/en/repositories/managing-your-repositorys-settings-and-features/managing-repository-settings/managing-the-commit-signoff-policy-for-your-repository). Defaults to `false`.
1621
1627
  """
1622
1628
  ...
@@ -1684,10 +1690,8 @@ class Repository(pulumi.CustomResource):
1684
1690
 
1685
1691
  Repositories can be imported using the `name`, e.g.
1686
1692
 
1687
- text
1688
-
1689
1693
  ```sh
1690
- $ pulumi import github:index/repository:Repository terraform terraform
1694
+ $ pulumi import github:index/repository:Repository terraform myrepo
1691
1695
  ```
1692
1696
 
1693
1697
  :param str resource_name: The name of the resource.
@@ -1867,7 +1871,7 @@ class Repository(pulumi.CustomResource):
1867
1871
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
1868
1872
  :param pulumi.ResourceOptions opts: Options for the resource.
1869
1873
  :param pulumi.Input[_builtins.bool] allow_auto_merge: Set to `true` to allow auto-merging pull requests on the repository.
1870
- :param pulumi.Input[_builtins.bool] allow_forking: Set to `true` to allow private forking on the repository; this is only relevant if the repository is owned by an organization and is private or internal.
1874
+ :param pulumi.Input[_builtins.bool] allow_forking: Configure private forking for organization owned private and internal repositories; set to `true` to enable, `false` to disable, and leave unset for the default behaviour. Configuring this requires that private forking is not being explicitly configured at the organization level.
1871
1875
  :param pulumi.Input[_builtins.bool] allow_merge_commit: Set to `false` to disable merge commits on the repository.
1872
1876
  :param pulumi.Input[_builtins.bool] allow_rebase_merge: Set to `false` to disable rebase merges on the repository.
1873
1877
  :param pulumi.Input[_builtins.bool] allow_squash_merge: Set to `false` to disable squash merges on the repository.
@@ -1894,7 +1898,7 @@ class Repository(pulumi.CustomResource):
1894
1898
  :param pulumi.Input[_builtins.str] homepage_url: URL of a page describing the project.
1895
1899
  :param pulumi.Input[_builtins.str] html_url: The absolute URL (including scheme) of the rendered GitHub Pages site e.g. `https://username.github.io`.
1896
1900
  :param pulumi.Input[_builtins.str] http_clone_url: URL that can be provided to `git clone` to clone the repository via HTTPS.
1897
- :param pulumi.Input[_builtins.bool] ignore_vulnerability_alerts_during_read: Set to `true` to not call the vulnerability alerts endpoint so the resource can also be used without admin permissions during read.
1901
+ :param pulumi.Input[_builtins.bool] ignore_vulnerability_alerts_during_read: (Optional) - This is ignored as the provider now handles lack of permissions automatically.
1898
1902
  :param pulumi.Input[_builtins.bool] is_template: Set to `true` to tell GitHub that this is a template repository.
1899
1903
  :param pulumi.Input[_builtins.str] license_template: Use the [name of the template](https://github.com/github/choosealicense.com/tree/gh-pages/_licenses) without the extension. For example, "mit" or "mpl-2.0".
1900
1904
  :param pulumi.Input[_builtins.str] merge_commit_message: Can be `PR_BODY`, `PR_TITLE`, or `BLANK` for a default merge commit message. Applicable only if `allow_merge_commit` is `true`.
@@ -1916,7 +1920,7 @@ class Repository(pulumi.CustomResource):
1916
1920
  :param pulumi.Input[Union['RepositoryTemplateArgs', 'RepositoryTemplateArgsDict']] template: Use a template repository to create this resource. See Template Repositories below for details.
1917
1921
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] topics: The list of topics of the repository.
1918
1922
  :param pulumi.Input[_builtins.str] visibility: Can be `public` or `private`. If your organization is associated with an enterprise account using GitHub Enterprise Cloud or GitHub Enterprise Server 2.20+, visibility can also be `internal`. The `visibility` parameter overrides the `private` parameter.
1919
- :param pulumi.Input[_builtins.bool] vulnerability_alerts: Set to `true` to enable security alerts for vulnerable dependencies. Enabling requires alerts to be enabled on the owner level. (Note for importing: GitHub enables the alerts on public repos but disables them on private repos by default.) See [GitHub Documentation](https://help.github.com/en/github/managing-security-vulnerabilities/about-security-alerts-for-vulnerable-dependencies) for details. Note that vulnerability alerts have not been successfully tested on any GitHub Enterprise instance and may be unavailable in those settings.
1923
+ :param pulumi.Input[_builtins.bool] vulnerability_alerts: Configure [Dependabot security alerts](https://help.github.com/en/github/managing-security-vulnerabilities/about-security-alerts-for-vulnerable-dependencies) for vulnerable dependencies; set to `true` to enable, set to `false` to disable, and leave unset for the default behavior. Configuring this requires that alerts are not being explicitly configured at the organization level.
1920
1924
  :param pulumi.Input[_builtins.bool] web_commit_signoff_required: Require contributors to sign off on web-based commits. See more [here](https://docs.github.com/en/repositories/managing-your-repositorys-settings-and-features/managing-repository-settings/managing-the-commit-signoff-policy-for-your-repository). Defaults to `false`.
1921
1925
  """
1922
1926
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -1985,7 +1989,7 @@ class Repository(pulumi.CustomResource):
1985
1989
  @pulumi.getter(name="allowForking")
1986
1990
  def allow_forking(self) -> pulumi.Output[_builtins.bool]:
1987
1991
  """
1988
- Set to `true` to allow private forking on the repository; this is only relevant if the repository is owned by an organization and is private or internal.
1992
+ Configure private forking for organization owned private and internal repositories; set to `true` to enable, `false` to disable, and leave unset for the default behaviour. Configuring this requires that private forking is not being explicitly configured at the organization level.
1989
1993
  """
1990
1994
  return pulumi.get(self, "allow_forking")
1991
1995
 
@@ -2178,9 +2182,10 @@ class Repository(pulumi.CustomResource):
2178
2182
 
2179
2183
  @_builtins.property
2180
2184
  @pulumi.getter(name="ignoreVulnerabilityAlertsDuringRead")
2185
+ @_utilities.deprecated("""This is ignored as the provider now handles lack of permissions automatically.""")
2181
2186
  def ignore_vulnerability_alerts_during_read(self) -> pulumi.Output[Optional[_builtins.bool]]:
2182
2187
  """
2183
- Set to `true` to not call the vulnerability alerts endpoint so the resource can also be used without admin permissions during read.
2188
+ (Optional) - This is ignored as the provider now handles lack of permissions automatically.
2184
2189
  """
2185
2190
  return pulumi.get(self, "ignore_vulnerability_alerts_during_read")
2186
2191
 
@@ -2350,7 +2355,7 @@ class Repository(pulumi.CustomResource):
2350
2355
  @pulumi.getter(name="vulnerabilityAlerts")
2351
2356
  def vulnerability_alerts(self) -> pulumi.Output[_builtins.bool]:
2352
2357
  """
2353
- Set to `true` to enable security alerts for vulnerable dependencies. Enabling requires alerts to be enabled on the owner level. (Note for importing: GitHub enables the alerts on public repos but disables them on private repos by default.) See [GitHub Documentation](https://help.github.com/en/github/managing-security-vulnerabilities/about-security-alerts-for-vulnerable-dependencies) for details. Note that vulnerability alerts have not been successfully tested on any GitHub Enterprise instance and may be unavailable in those settings.
2358
+ Configure [Dependabot security alerts](https://help.github.com/en/github/managing-security-vulnerabilities/about-security-alerts-for-vulnerable-dependencies) for vulnerable dependencies; set to `true` to enable, set to `false` to disable, and leave unset for the default behavior. Configuring this requires that alerts are not being explicitly configured at the organization level.
2354
2359
  """
2355
2360
  return pulumi.get(self, "vulnerability_alerts")
2356
2361
 
@@ -35,7 +35,7 @@ class RepositoryRulesetArgs:
35
35
  :param pulumi.Input['RepositoryRulesetRulesArgs'] rules: (Block List, Min: 1, Max: 1) Rules within the ruleset. (see below for nested schema)
36
36
  :param pulumi.Input[_builtins.str] target: (String) Possible values are `branch`, `tag` and `push`.
37
37
  :param pulumi.Input[Sequence[pulumi.Input['RepositoryRulesetBypassActorArgs']]] bypass_actors: (Block List) The actors that can bypass the rules in this ruleset. (see below for nested schema)
38
- :param pulumi.Input['RepositoryRulesetConditionsArgs'] conditions: (Block List, Max: 1) Parameters for a repository ruleset ref name condition. (see below for nested schema)
38
+ :param pulumi.Input['RepositoryRulesetConditionsArgs'] conditions: (Block List, Max: 1) Parameters for a repository ruleset condition. For `branch` and `tag` targets, `ref_name` is required. For `push` targets, `ref_name` must NOT be set - conditions are optional for push targets. (see below for nested schema)
39
39
  :param pulumi.Input[_builtins.str] name: (String) The name of the ruleset.
40
40
  """
41
41
  pulumi.set(__self__, "enforcement", enforcement)
@@ -113,7 +113,7 @@ class RepositoryRulesetArgs:
113
113
  @pulumi.getter
114
114
  def conditions(self) -> Optional[pulumi.Input['RepositoryRulesetConditionsArgs']]:
115
115
  """
116
- (Block List, Max: 1) Parameters for a repository ruleset ref name condition. (see below for nested schema)
116
+ (Block List, Max: 1) Parameters for a repository ruleset condition. For `branch` and `tag` targets, `ref_name` is required. For `push` targets, `ref_name` must NOT be set - conditions are optional for push targets. (see below for nested schema)
117
117
  """
118
118
  return pulumi.get(self, "conditions")
119
119
 
@@ -150,7 +150,7 @@ class _RepositoryRulesetState:
150
150
  """
151
151
  Input properties used for looking up and filtering RepositoryRuleset resources.
152
152
  :param pulumi.Input[Sequence[pulumi.Input['RepositoryRulesetBypassActorArgs']]] bypass_actors: (Block List) The actors that can bypass the rules in this ruleset. (see below for nested schema)
153
- :param pulumi.Input['RepositoryRulesetConditionsArgs'] conditions: (Block List, Max: 1) Parameters for a repository ruleset ref name condition. (see below for nested schema)
153
+ :param pulumi.Input['RepositoryRulesetConditionsArgs'] conditions: (Block List, Max: 1) Parameters for a repository ruleset condition. For `branch` and `tag` targets, `ref_name` is required. For `push` targets, `ref_name` must NOT be set - conditions are optional for push targets. (see below for nested schema)
154
154
  :param pulumi.Input[_builtins.str] enforcement: (String) Possible values for Enforcement are `disabled`, `active`, `evaluate`. Note: `evaluate` is currently only supported for owners of type `organization`.
155
155
  :param pulumi.Input[_builtins.str] etag: (String)
156
156
  :param pulumi.Input[_builtins.str] name: (String) The name of the ruleset.
@@ -197,7 +197,7 @@ class _RepositoryRulesetState:
197
197
  @pulumi.getter
198
198
  def conditions(self) -> Optional[pulumi.Input['RepositoryRulesetConditionsArgs']]:
199
199
  """
200
- (Block List, Max: 1) Parameters for a repository ruleset ref name condition. (see below for nested schema)
200
+ (Block List, Max: 1) Parameters for a repository ruleset condition. For `branch` and `tag` targets, `ref_name` is required. For `push` targets, `ref_name` must NOT be set - conditions are optional for push targets. (see below for nested schema)
201
201
  """
202
202
  return pulumi.get(self, "conditions")
203
203
 
@@ -403,7 +403,7 @@ class RepositoryRuleset(pulumi.CustomResource):
403
403
  :param str resource_name: The name of the resource.
404
404
  :param pulumi.ResourceOptions opts: Options for the resource.
405
405
  :param pulumi.Input[Sequence[pulumi.Input[Union['RepositoryRulesetBypassActorArgs', 'RepositoryRulesetBypassActorArgsDict']]]] bypass_actors: (Block List) The actors that can bypass the rules in this ruleset. (see below for nested schema)
406
- :param pulumi.Input[Union['RepositoryRulesetConditionsArgs', 'RepositoryRulesetConditionsArgsDict']] conditions: (Block List, Max: 1) Parameters for a repository ruleset ref name condition. (see below for nested schema)
406
+ :param pulumi.Input[Union['RepositoryRulesetConditionsArgs', 'RepositoryRulesetConditionsArgsDict']] conditions: (Block List, Max: 1) Parameters for a repository ruleset condition. For `branch` and `tag` targets, `ref_name` is required. For `push` targets, `ref_name` must NOT be set - conditions are optional for push targets. (see below for nested schema)
407
407
  :param pulumi.Input[_builtins.str] enforcement: (String) Possible values for Enforcement are `disabled`, `active`, `evaluate`. Note: `evaluate` is currently only supported for owners of type `organization`.
408
408
  :param pulumi.Input[_builtins.str] name: (String) The name of the ruleset.
409
409
  :param pulumi.Input[_builtins.str] repository: (String) Name of the repository to apply ruleset to.
@@ -577,7 +577,7 @@ class RepositoryRuleset(pulumi.CustomResource):
577
577
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
578
578
  :param pulumi.ResourceOptions opts: Options for the resource.
579
579
  :param pulumi.Input[Sequence[pulumi.Input[Union['RepositoryRulesetBypassActorArgs', 'RepositoryRulesetBypassActorArgsDict']]]] bypass_actors: (Block List) The actors that can bypass the rules in this ruleset. (see below for nested schema)
580
- :param pulumi.Input[Union['RepositoryRulesetConditionsArgs', 'RepositoryRulesetConditionsArgsDict']] conditions: (Block List, Max: 1) Parameters for a repository ruleset ref name condition. (see below for nested schema)
580
+ :param pulumi.Input[Union['RepositoryRulesetConditionsArgs', 'RepositoryRulesetConditionsArgsDict']] conditions: (Block List, Max: 1) Parameters for a repository ruleset condition. For `branch` and `tag` targets, `ref_name` is required. For `push` targets, `ref_name` must NOT be set - conditions are optional for push targets. (see below for nested schema)
581
581
  :param pulumi.Input[_builtins.str] enforcement: (String) Possible values for Enforcement are `disabled`, `active`, `evaluate`. Note: `evaluate` is currently only supported for owners of type `organization`.
582
582
  :param pulumi.Input[_builtins.str] etag: (String)
583
583
  :param pulumi.Input[_builtins.str] name: (String) The name of the ruleset.
@@ -615,7 +615,7 @@ class RepositoryRuleset(pulumi.CustomResource):
615
615
  @pulumi.getter
616
616
  def conditions(self) -> pulumi.Output[Optional['outputs.RepositoryRulesetConditions']]:
617
617
  """
618
- (Block List, Max: 1) Parameters for a repository ruleset ref name condition. (see below for nested schema)
618
+ (Block List, Max: 1) Parameters for a repository ruleset condition. For `branch` and `tag` targets, `ref_name` is required. For `push` targets, `ref_name` must NOT be set - conditions are optional for push targets. (see below for nested schema)
619
619
  """
620
620
  return pulumi.get(self, "conditions")
621
621
 
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.4
2
2
  Name: pulumi_github
3
- Version: 6.11.0a1768966924
3
+ Version: 6.12.0
4
4
  Summary: A Pulumi package for creating and managing github cloud resources.
5
5
  License: Apache-2.0
6
6
  Project-URL: Homepage, https://pulumi.io
@@ -1,24 +1,26 @@
1
- pulumi_github/__init__.py,sha256=l6-9ExfkAnCREFoCE0h_gR7vw21jeVs0nMUWcAHtc_8,23513
2
- pulumi_github/_inputs.py,sha256=AS0eA0HZslgVBklMVsF7gPfyLs10_bqRfRyUkLECN6k,316850
1
+ pulumi_github/__init__.py,sha256=ZxQOtjQOkqdvM20LltXUxMeHwLrHAIm9Q-q_8CtGk8s,24515
2
+ pulumi_github/_inputs.py,sha256=PUbJvSpA8mPt5sC1-ZIKyIk3ZqokRTtDGFrOMNZHFGE,333317
3
3
  pulumi_github/_utilities.py,sha256=66uLGQDI1oMFOI3Fe5igAphtexWhcSLDyuVW50jW3ik,10789
4
- pulumi_github/actions_environment_secret.py,sha256=_U4w3lI1aW6BFsM2Sc2_2jxDzqXRTLo9Sip7BoRK76c,17774
5
- pulumi_github/actions_environment_variable.py,sha256=EbqXG9falr6HX6FihnJA8neWTop1MotA7EzyToMrfbQ,17267
4
+ pulumi_github/actions_environment_secret.py,sha256=i4ima60wz7L_v0eBLBvq2T5fuXpSpPEjYvwlQ_cGN7k,24662
5
+ pulumi_github/actions_environment_variable.py,sha256=qXDupTmDSUa1ihp1L8o7YiVeMEeGhJQ-xxWsoZR-JGI,18521
6
6
  pulumi_github/actions_hosted_runner.py,sha256=itmCa2JVslSj7C_C7mY3k76cQwfm-4q2GseS7jsNrCE,38401
7
7
  pulumi_github/actions_organization_oidc_subject_claim_customization_template.py,sha256=4PFkbU5kRN_1fSmFg8Q2_NKe1h-kkuDuToOKktQ9qXQ,9643
8
- pulumi_github/actions_organization_permissions.py,sha256=jHAIUwWThY7_dymme9Ir34fLbj6eYPUZNER4B1eTveQ,21764
9
- pulumi_github/actions_organization_secret.py,sha256=FcTJoiXyanPOgjdC7IC73UxEhEfQfqVB9yW3t_IN9w8,22247
10
- pulumi_github/actions_organization_secret_repositories.py,sha256=2x8u9O0u3DQrThJ2_6dLinLdweZiuSY2fGyUkjhWa5I,11526
11
- pulumi_github/actions_organization_secret_repository.py,sha256=gk4BdtJ-Jkt9XeWjVGD-XFEJvMsuUFGkNEjGYWOdfb0,10744
12
- pulumi_github/actions_organization_variable.py,sha256=Ay0W4H2O-IXQDxjJLXTSpYluixlZSYVvT6t6aksuNeI,18866
8
+ pulumi_github/actions_organization_permissions.py,sha256=H22240IvswqX1Mju5-mga5zVysJRQD4pqwN0ogkyHdM,24636
9
+ pulumi_github/actions_organization_secret.py,sha256=MQKrGWy3_Li6z1o5yltEbPbX8xsq6noH-P8rxyVDFk0,32951
10
+ pulumi_github/actions_organization_secret_repositories.py,sha256=sFvI5amosSGOWFl8JjxV5lgRBQ-UOkhA_JNmW1Yclsk,12422
11
+ pulumi_github/actions_organization_secret_repository.py,sha256=znaHEEfFianSaZzYD2uUovg7Izr-bk8Lgz-hVrIdSgg,11581
12
+ pulumi_github/actions_organization_variable.py,sha256=3wpxDnYbnPSo1AtNKlAuY34bopX4fB3W07AOUq9WfYE,18957
13
+ pulumi_github/actions_organization_variable_repositories.py,sha256=Ls6u4z6RJxetcS2kRDXgJLs_eEF6j2lZvZnMuX22eaU,12624
14
+ pulumi_github/actions_organization_variable_repository.py,sha256=Fv789X57CS4XkNvpu1dc_hDbr3zUWv1aRZmhEdZ50iI,11785
13
15
  pulumi_github/actions_organization_workflow_permissions.py,sha256=PoGdEMv0YB9VGR-_4Becnq9jAoqvi7BFZEoKzYvQMog,16381
14
16
  pulumi_github/actions_repository_access_level.py,sha256=IwvKo_HBydIsxw7ZkkwwEjuoksG9F08-1_unk4m4xJk,10671
15
17
  pulumi_github/actions_repository_oidc_subject_claim_customization_template.py,sha256=Tc1PB-VE06zFe3SxyLOk7h1CpJNtZopn3_osj50cSHY,15685
16
- pulumi_github/actions_repository_permissions.py,sha256=QUpLWfH2i6mp08gybSl6vt-6I2hsm_Z27WtKSKERpp8,17265
18
+ pulumi_github/actions_repository_permissions.py,sha256=1SpCXRHuDZHZ-5rO-YnYktDmE1SpcQBuZCcKBAirz8w,20116
17
19
  pulumi_github/actions_runner_group.py,sha256=4ZIiDcoHchnjHNswhEntqFE5loLsFbXdBUdWBeBR8zw,29003
18
- pulumi_github/actions_secret.py,sha256=M3seUSvuPFuBhFj6b30I-JVHFx6-nI4niBBvT0BE3zE,17789
19
- pulumi_github/actions_variable.py,sha256=vCHieDbfbDYMRjIwQVozcKJ1FdrsFkFPCx7PApD6Hx8,13526
20
- pulumi_github/app_installation_repositories.py,sha256=0j6sO_ZY_ZtrCxBlhWd-n7ThwV-x_ys1K6eNJWrd-Ks,13589
21
- pulumi_github/app_installation_repository.py,sha256=Q-MNyDAJYpHaqy-Fz2pylbBua8oSfr-fhOB9d95vlIM,11895
20
+ pulumi_github/actions_secret.py,sha256=FD_ff02onr2Mo1lkuyV2dvCBEencM_9nWbJdQwQatak,27675
21
+ pulumi_github/actions_variable.py,sha256=FopfW6jAJ-noRu4koqRb-EGbGFiXIxPCXgyjNVXvr2c,14854
22
+ pulumi_github/app_installation_repositories.py,sha256=EyOwCJdyuDMu4jWnMgEQS41Bqda73JJvfptS3w3IegA,13937
23
+ pulumi_github/app_installation_repository.py,sha256=rPXlr-VoDkqG_Eod-hJd3eybCOgLug7ZRs_-jnQVLLM,12243
22
24
  pulumi_github/branch.py,sha256=C1ruPNSW-YuZ-1eil6Jt3r8tFtBvjF9bOKcHzWFwklM,18841
23
25
  pulumi_github/branch_default.py,sha256=t6QYm8AFOs2tFJLANPnK7zqP4rtq52DXW79233gmGRQ,14225
24
26
  pulumi_github/branch_protection.py,sha256=EQgKChwyyBXJmwSak_aRZXcjMWK60cNwtOvYgwhDUnc,48369
@@ -27,10 +29,11 @@ pulumi_github/codespaces_organization_secret.py,sha256=Gm1ZohHi5R4TDt3CjX2K2z8-o
27
29
  pulumi_github/codespaces_organization_secret_repositories.py,sha256=bYb-IWvQ2aP89SGYSyMGMV4n0PAnMfL2oN7MH5G2C4U,11624
28
30
  pulumi_github/codespaces_secret.py,sha256=MsXP38COG9rmQDOWk_1ejln_cnccZl2O9bo0htLOzPs,16256
29
31
  pulumi_github/codespaces_user_secret.py,sha256=mUzjFl65oNscUMr2BRcGI-tvQtZJy5j7WlFlEcIu68Q,17310
30
- pulumi_github/dependabot_organization_secret.py,sha256=2F53WIm73BmfPmE2oBWFYPTiEAvycpkIdoI-zcyZsIQ,20686
31
- pulumi_github/dependabot_organization_secret_repositories.py,sha256=aQqRYVASQyeJjSh6djn97MSfHcGagjjKXWYAvvr78Ic,12048
32
- pulumi_github/dependabot_secret.py,sha256=OSKDM3ZngmErR7XEvAntRcsK66RbqxYFzin5ogLU43c,16246
33
- pulumi_github/emu_group_mapping.py,sha256=SgqoynPuAE2JHvz6yELLM0bbLk-OqkVicW8M_Fy1H7E,9906
32
+ pulumi_github/dependabot_organization_secret.py,sha256=JglQ3AeUkmpDAsDANZ8I15NzOxNY3p3AsZhaEEwO7BE,27025
33
+ pulumi_github/dependabot_organization_secret_repositories.py,sha256=rXOJTi9Jslfa9wQNHAjUPaSVn5yQydSYj22kaChgTfQ,12555
34
+ pulumi_github/dependabot_organization_secret_repository.py,sha256=2rYisCmvJhxQBXLLmVGsDkReeRqZLx896DOjZFrynTA,11620
35
+ pulumi_github/dependabot_secret.py,sha256=R0HwryN59W8J3wAXk9wnNPnHLP9HSa4Ousud1hxGsTM,22446
36
+ pulumi_github/emu_group_mapping.py,sha256=SM7OzIlmMgbXGT9jNfewDTqqN2rLor2CvUyV0_BtH4E,12949
34
37
  pulumi_github/enterprise_actions_permissions.py,sha256=Wop0r64sgXbtkNdZsBE8DgaI58w1x4OcxgT8T56P5Qo,23953
35
38
  pulumi_github/enterprise_actions_runner_group.py,sha256=XRMC8_uXYz8KglBKRXbc5gnoqFyNi1ek2VSPtN4lhE8,30898
36
39
  pulumi_github/enterprise_actions_workflow_permissions.py,sha256=hJX81_SlhVJeTXyTLPtpF7SpcJADdy7NquEIDKNhYl4,16191
@@ -86,6 +89,7 @@ pulumi_github/get_organization_teams.py,sha256=IuFZWkZFMIK1Rk4SpHqG5I453hKm1ebON
86
89
  pulumi_github/get_organization_webhooks.py,sha256=EN1RlTzXO73d956YJGuIzuoI8lDvLMZnRr5cP-XSL_I,3747
87
90
  pulumi_github/get_ref.py,sha256=tjnOKTTXoGx59wTgXmkrQ9HDgFOf7KmsSPFMnDy4o1A,6111
88
91
  pulumi_github/get_release.py,sha256=E5ThEgvhY_rmhTvYx0w-jQ-ww8GeSjgCc3Vnt6j3mEQ,17015
92
+ pulumi_github/get_release_asset.py,sha256=377aLeUUoMRq9lTAGIcch56-WO8-ThDMil2QmVeGiOk,14706
89
93
  pulumi_github/get_repositories.py,sha256=aMsVbbabJ6apgCBfI0VpoEhatCDunc0wjVq5yXfekeY,9099
90
94
  pulumi_github/get_repository.py,sha256=bRW00uZ7CeHzGHwdvsvR-_u33g74287dFEHA95mEnLU,28840
91
95
  pulumi_github/get_repository_autolink_references.py,sha256=jWapWwoHbsP-iLUNZdRtX-g7PdeBezolCbAt6KT_65M,5089
@@ -121,18 +125,18 @@ pulumi_github/organization_role.py,sha256=iWwMCsSGnJFzhSNynsHV2QpVNavE14DFEzYuWv
121
125
  pulumi_github/organization_role_team.py,sha256=OP6BOO_OzCXRKmxiBmtuSEVNDUFmrrxRc0rDx7nVJus,9143
122
126
  pulumi_github/organization_role_team_assignment.py,sha256=9DC2sWPd-v_8gWt8FIJ8u7ocsgMrDAcbLxUtVno55YU,10404
123
127
  pulumi_github/organization_role_user.py,sha256=NPWKzsUdq2-B_SnQC5n96Qb4OvZb0PNjzkiuY6ZBHBg,9042
124
- pulumi_github/organization_ruleset.py,sha256=v4m4WlsNbbQD-44Ell22b9SR0KKiCuHoAQ6jUuk474A,30368
128
+ pulumi_github/organization_ruleset.py,sha256=Z1JyKOUmhlPCeie2Lwvowf4f1IX3K3KM1NPKrAoCEXg,31293
125
129
  pulumi_github/organization_security_manager.py,sha256=_d0ioo2TFtYBWu0I4sKVJiFoYGR58OcjAsiJHqr-GGM,7634
126
130
  pulumi_github/organization_settings.py,sha256=j-UhuwUCzrzVdnpKMYMqtnpeJnXdyP7gK44Nh6BWx10,84552
127
131
  pulumi_github/organization_webhook.py,sha256=ZBNHqHxNNxRK6Idi05yQjw2sEfDM2JBsO2AoPObJGdM,15991
128
- pulumi_github/outputs.py,sha256=Q1kkW87C9BqR9fF59ewqVkcpnFALK9iI1J4DwtwxDr8,309974
132
+ pulumi_github/outputs.py,sha256=sVsE4d_hSQMRlL4c8BWfWHwK5EBsgxE5sW5Qs03O8kE,321200
129
133
  pulumi_github/project_card.py,sha256=x_A-Iv8cb94mTA5sx1nRlCh2sSmxfTAvuwaNPLAYY7Q,18969
130
134
  pulumi_github/project_column.py,sha256=QTcfk22084bOk7BTTVeqk4RyzOY8WdWLNlz8kIjD-VM,11250
131
135
  pulumi_github/provider.py,sha256=EpU2hqQ5WGwM5nq_c5rGE7MJLNAskPz32F03EJ-GIoc,23731
132
- pulumi_github/pulumi-plugin.json,sha256=oTIWGR0oLPFkpWMSMldQfJ_QXfBQvYIHh07pVqMG7F0,83
136
+ pulumi_github/pulumi-plugin.json,sha256=Uf7ovhpSSVUS5MIi5HHJaBuwHda6yfRcLMGSJUxqNSc,66
133
137
  pulumi_github/py.typed,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
134
138
  pulumi_github/release.py,sha256=udD_Paft3i0R_W9ktVPxnlsx8PzvLfi1LsLcmspgLnU,43043
135
- pulumi_github/repository.py,sha256=IjQsFh8qGVrP7_8VrLw65v4uMezdHk2yO10CNzDCzMs,136494
139
+ pulumi_github/repository.py,sha256=gMFjkKrsFsuFacPIUKbq3aCcNWeKYYKvispSRfhFdHg,137039
136
140
  pulumi_github/repository_autolink_reference.py,sha256=7BziThFSVSHTbflGHTzsz6X-UB9aJj1vCVKErQ6i62E,17479
137
141
  pulumi_github/repository_collaborator.py,sha256=uFs8uJF8HktK-MLYP9WzzCDsDWO4zsz0VhCMl6e5sDg,20644
138
142
  pulumi_github/repository_collaborators.py,sha256=G8kcY52vBH3AMD-U5p5MD_lnfeMxijW3csdvqAmu1DU,19090
@@ -146,7 +150,7 @@ pulumi_github/repository_file.py,sha256=64QTmA1hRsmSlSWfzkKqb03bBptGiYZTjW9EjwLR
146
150
  pulumi_github/repository_milestone.py,sha256=5vqlWJAkp0-U310nsmpKJDBvtxfKNmtD4EIeb0OuRKc,18465
147
151
  pulumi_github/repository_project.py,sha256=l38rsdFcHzdz3dNdjdFS1euE91WEvlCU0y1ffHHUk7o,13329
148
152
  pulumi_github/repository_pull_request.py,sha256=fiDd8z0AltmhHdvkLDjtC3U6uilZarbcxxp5yWDi6wo,30934
149
- pulumi_github/repository_ruleset.py,sha256=m5_L7kV5bV93sKfTcfHzUFz1ZfEbmi0TPPJ9v9Z3FhA,30867
153
+ pulumi_github/repository_ruleset.py,sha256=fj_XXvkqAlWypK5X2Q2P7G2NV6q2o1L89wYbnghPcNk,31833
150
154
  pulumi_github/repository_topics.py,sha256=QgbO_Lfthloe0x7l1WK2k1c0wIRIvgbJM4RJJP1H-SE,9331
151
155
  pulumi_github/repository_webhook.py,sha256=596-JnU1pGyu8BMcYCTaQnT6YPiZ19BjjdpjD4j_TN0,18869
152
156
  pulumi_github/team.py,sha256=ns2N_MXIJgrP6GnsjL45SzYo_zWjUpfylYJDMVLL1Iw,32769
@@ -163,7 +167,7 @@ pulumi_github/config/__init__.py,sha256=XWnQfVtc2oPapjSXXCdORFJvMpXt_SMJQASWdTRo
163
167
  pulumi_github/config/__init__.pyi,sha256=M2eV8Tt6VJ60ULawmuIyADkImmrlvoT7zrqnv6QRfUQ,2568
164
168
  pulumi_github/config/outputs.py,sha256=B49PRqlSRiWQLjrE6YGuDSNwd6JTXzlRtYm1vw743S0,1758
165
169
  pulumi_github/config/vars.py,sha256=McIM_AqaMDbpD67QH1LNkR2D-VYe6qirG7E1x9uZFTM,4234
166
- pulumi_github-6.11.0a1768966924.dist-info/METADATA,sha256=p5GvimSehsoAw34KvUPjOJ9M15yXl22y1ofHDfrsQB4,2912
167
- pulumi_github-6.11.0a1768966924.dist-info/WHEEL,sha256=_zCd3N1l69ArxyTb8rzEoP9TpbYXkqRFSNOD5OuxnTs,91
168
- pulumi_github-6.11.0a1768966924.dist-info/top_level.txt,sha256=0kq3fQJy2bJ9f0g7Mz21Ley0o3Go-U0OXSU4tRUpR2s,14
169
- pulumi_github-6.11.0a1768966924.dist-info/RECORD,,
170
+ pulumi_github-6.12.0.dist-info/METADATA,sha256=8QuOLREj3ocyWndBZRd1guOwl_P-RWA8md3Mx1FFM1U,2901
171
+ pulumi_github-6.12.0.dist-info/WHEEL,sha256=wUyA8OaulRlbfwMtmQsvNngGrxQHAvkKcvRmdizlJi0,92
172
+ pulumi_github-6.12.0.dist-info/top_level.txt,sha256=0kq3fQJy2bJ9f0g7Mz21Ley0o3Go-U0OXSU4tRUpR2s,14
173
+ pulumi_github-6.12.0.dist-info/RECORD,,
@@ -1,5 +1,5 @@
1
1
  Wheel-Version: 1.0
2
- Generator: setuptools (80.9.0)
2
+ Generator: setuptools (80.10.2)
3
3
  Root-Is-Purelib: true
4
4
  Tag: py3-none-any
5
5