pulumi-github 6.12.0__py3-none-any.whl → 6.12.0a1769172728__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (31) hide show
  1. pulumi_github/__init__.py +0 -28
  2. pulumi_github/_inputs.py +19 -324
  3. pulumi_github/actions_environment_secret.py +12 -141
  4. pulumi_github/actions_environment_variable.py +37 -71
  5. pulumi_github/actions_organization_permissions.py +3 -50
  6. pulumi_github/actions_organization_secret.py +55 -164
  7. pulumi_github/actions_organization_secret_repositories.py +28 -44
  8. pulumi_github/actions_organization_secret_repository.py +28 -44
  9. pulumi_github/actions_organization_variable.py +47 -44
  10. pulumi_github/actions_repository_permissions.py +3 -50
  11. pulumi_github/actions_secret.py +41 -176
  12. pulumi_github/actions_variable.py +33 -65
  13. pulumi_github/app_installation_repositories.py +6 -6
  14. pulumi_github/app_installation_repository.py +6 -6
  15. pulumi_github/dependabot_organization_secret.py +59 -128
  16. pulumi_github/dependabot_organization_secret_repositories.py +36 -44
  17. pulumi_github/dependabot_secret.py +41 -154
  18. pulumi_github/emu_group_mapping.py +4 -64
  19. pulumi_github/organization_ruleset.py +17 -11
  20. pulumi_github/outputs.py +13 -234
  21. pulumi_github/pulumi-plugin.json +1 -1
  22. pulumi_github/repository.py +27 -32
  23. pulumi_github/repository_ruleset.py +7 -7
  24. {pulumi_github-6.12.0.dist-info → pulumi_github-6.12.0a1769172728.dist-info}/METADATA +1 -1
  25. {pulumi_github-6.12.0.dist-info → pulumi_github-6.12.0a1769172728.dist-info}/RECORD +27 -31
  26. {pulumi_github-6.12.0.dist-info → pulumi_github-6.12.0a1769172728.dist-info}/WHEEL +1 -1
  27. pulumi_github/actions_organization_variable_repositories.py +0 -262
  28. pulumi_github/actions_organization_variable_repository.py +0 -262
  29. pulumi_github/dependabot_organization_secret_repository.py +0 -262
  30. pulumi_github/get_release_asset.py +0 -370
  31. {pulumi_github-6.12.0.dist-info → pulumi_github-6.12.0a1769172728.dist-info}/top_level.txt +0 -0
@@ -63,7 +63,7 @@ class RepositoryArgs:
63
63
  """
64
64
  The set of arguments for constructing a Repository resource.
65
65
  :param pulumi.Input[_builtins.bool] allow_auto_merge: Set to `true` to allow auto-merging pull requests on the repository.
66
- :param pulumi.Input[_builtins.bool] allow_forking: Configure private forking for organization owned private and internal repositories; set to `true` to enable, `false` to disable, and leave unset for the default behaviour. Configuring this requires that private forking is not being explicitly configured at the organization level.
66
+ :param pulumi.Input[_builtins.bool] allow_forking: Set to `true` to allow private forking on the repository; this is only relevant if the repository is owned by an organization and is private or internal.
67
67
  :param pulumi.Input[_builtins.bool] allow_merge_commit: Set to `false` to disable merge commits on the repository.
68
68
  :param pulumi.Input[_builtins.bool] allow_rebase_merge: Set to `false` to disable rebase merges on the repository.
69
69
  :param pulumi.Input[_builtins.bool] allow_squash_merge: Set to `false` to disable squash merges on the repository.
@@ -86,7 +86,7 @@ class RepositoryArgs:
86
86
  :param pulumi.Input[_builtins.bool] has_wiki: Set to `true` to enable the GitHub Wiki features on
87
87
  the repository.
88
88
  :param pulumi.Input[_builtins.str] homepage_url: URL of a page describing the project.
89
- :param pulumi.Input[_builtins.bool] ignore_vulnerability_alerts_during_read: (Optional) - This is ignored as the provider now handles lack of permissions automatically.
89
+ :param pulumi.Input[_builtins.bool] ignore_vulnerability_alerts_during_read: Set to `true` to not call the vulnerability alerts endpoint so the resource can also be used without admin permissions during read.
90
90
  :param pulumi.Input[_builtins.bool] is_template: Set to `true` to tell GitHub that this is a template repository.
91
91
  :param pulumi.Input[_builtins.str] license_template: Use the [name of the template](https://github.com/github/choosealicense.com/tree/gh-pages/_licenses) without the extension. For example, "mit" or "mpl-2.0".
92
92
  :param pulumi.Input[_builtins.str] merge_commit_message: Can be `PR_BODY`, `PR_TITLE`, or `BLANK` for a default merge commit message. Applicable only if `allow_merge_commit` is `true`.
@@ -103,7 +103,7 @@ class RepositoryArgs:
103
103
  :param pulumi.Input['RepositoryTemplateArgs'] template: Use a template repository to create this resource. See Template Repositories below for details.
104
104
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] topics: The list of topics of the repository.
105
105
  :param pulumi.Input[_builtins.str] visibility: Can be `public` or `private`. If your organization is associated with an enterprise account using GitHub Enterprise Cloud or GitHub Enterprise Server 2.20+, visibility can also be `internal`. The `visibility` parameter overrides the `private` parameter.
106
- :param pulumi.Input[_builtins.bool] vulnerability_alerts: Configure [Dependabot security alerts](https://help.github.com/en/github/managing-security-vulnerabilities/about-security-alerts-for-vulnerable-dependencies) for vulnerable dependencies; set to `true` to enable, set to `false` to disable, and leave unset for the default behavior. Configuring this requires that alerts are not being explicitly configured at the organization level.
106
+ :param pulumi.Input[_builtins.bool] vulnerability_alerts: Set to `true` to enable security alerts for vulnerable dependencies. Enabling requires alerts to be enabled on the owner level. (Note for importing: GitHub enables the alerts on public repos but disables them on private repos by default.) See [GitHub Documentation](https://help.github.com/en/github/managing-security-vulnerabilities/about-security-alerts-for-vulnerable-dependencies) for details. Note that vulnerability alerts have not been successfully tested on any GitHub Enterprise instance and may be unavailable in those settings.
107
107
  :param pulumi.Input[_builtins.bool] web_commit_signoff_required: Require contributors to sign off on web-based commits. See more [here](https://docs.github.com/en/repositories/managing-your-repositorys-settings-and-features/managing-repository-settings/managing-the-commit-signoff-policy-for-your-repository). Defaults to `false`.
108
108
  """
109
109
  if allow_auto_merge is not None:
@@ -154,9 +154,6 @@ class RepositoryArgs:
154
154
  pulumi.set(__self__, "has_wiki", has_wiki)
155
155
  if homepage_url is not None:
156
156
  pulumi.set(__self__, "homepage_url", homepage_url)
157
- if ignore_vulnerability_alerts_during_read is not None:
158
- warnings.warn("""This is ignored as the provider now handles lack of permissions automatically.""", DeprecationWarning)
159
- pulumi.log.warn("""ignore_vulnerability_alerts_during_read is deprecated: This is ignored as the provider now handles lack of permissions automatically.""")
160
157
  if ignore_vulnerability_alerts_during_read is not None:
161
158
  pulumi.set(__self__, "ignore_vulnerability_alerts_during_read", ignore_vulnerability_alerts_during_read)
162
159
  if is_template is not None:
@@ -213,7 +210,7 @@ class RepositoryArgs:
213
210
  @pulumi.getter(name="allowForking")
214
211
  def allow_forking(self) -> Optional[pulumi.Input[_builtins.bool]]:
215
212
  """
216
- Configure private forking for organization owned private and internal repositories; set to `true` to enable, `false` to disable, and leave unset for the default behaviour. Configuring this requires that private forking is not being explicitly configured at the organization level.
213
+ Set to `true` to allow private forking on the repository; this is only relevant if the repository is owned by an organization and is private or internal.
217
214
  """
218
215
  return pulumi.get(self, "allow_forking")
219
216
 
@@ -454,10 +451,9 @@ class RepositoryArgs:
454
451
 
455
452
  @_builtins.property
456
453
  @pulumi.getter(name="ignoreVulnerabilityAlertsDuringRead")
457
- @_utilities.deprecated("""This is ignored as the provider now handles lack of permissions automatically.""")
458
454
  def ignore_vulnerability_alerts_during_read(self) -> Optional[pulumi.Input[_builtins.bool]]:
459
455
  """
460
- (Optional) - This is ignored as the provider now handles lack of permissions automatically.
456
+ Set to `true` to not call the vulnerability alerts endpoint so the resource can also be used without admin permissions during read.
461
457
  """
462
458
  return pulumi.get(self, "ignore_vulnerability_alerts_during_read")
463
459
 
@@ -651,7 +647,7 @@ class RepositoryArgs:
651
647
  @pulumi.getter(name="vulnerabilityAlerts")
652
648
  def vulnerability_alerts(self) -> Optional[pulumi.Input[_builtins.bool]]:
653
649
  """
654
- Configure [Dependabot security alerts](https://help.github.com/en/github/managing-security-vulnerabilities/about-security-alerts-for-vulnerable-dependencies) for vulnerable dependencies; set to `true` to enable, set to `false` to disable, and leave unset for the default behavior. Configuring this requires that alerts are not being explicitly configured at the organization level.
650
+ Set to `true` to enable security alerts for vulnerable dependencies. Enabling requires alerts to be enabled on the owner level. (Note for importing: GitHub enables the alerts on public repos but disables them on private repos by default.) See [GitHub Documentation](https://help.github.com/en/github/managing-security-vulnerabilities/about-security-alerts-for-vulnerable-dependencies) for details. Note that vulnerability alerts have not been successfully tested on any GitHub Enterprise instance and may be unavailable in those settings.
655
651
  """
656
652
  return pulumi.get(self, "vulnerability_alerts")
657
653
 
@@ -726,7 +722,7 @@ class _RepositoryState:
726
722
  """
727
723
  Input properties used for looking up and filtering Repository resources.
728
724
  :param pulumi.Input[_builtins.bool] allow_auto_merge: Set to `true` to allow auto-merging pull requests on the repository.
729
- :param pulumi.Input[_builtins.bool] allow_forking: Configure private forking for organization owned private and internal repositories; set to `true` to enable, `false` to disable, and leave unset for the default behaviour. Configuring this requires that private forking is not being explicitly configured at the organization level.
725
+ :param pulumi.Input[_builtins.bool] allow_forking: Set to `true` to allow private forking on the repository; this is only relevant if the repository is owned by an organization and is private or internal.
730
726
  :param pulumi.Input[_builtins.bool] allow_merge_commit: Set to `false` to disable merge commits on the repository.
731
727
  :param pulumi.Input[_builtins.bool] allow_rebase_merge: Set to `false` to disable rebase merges on the repository.
732
728
  :param pulumi.Input[_builtins.bool] allow_squash_merge: Set to `false` to disable squash merges on the repository.
@@ -753,7 +749,7 @@ class _RepositoryState:
753
749
  :param pulumi.Input[_builtins.str] homepage_url: URL of a page describing the project.
754
750
  :param pulumi.Input[_builtins.str] html_url: The absolute URL (including scheme) of the rendered GitHub Pages site e.g. `https://username.github.io`.
755
751
  :param pulumi.Input[_builtins.str] http_clone_url: URL that can be provided to `git clone` to clone the repository via HTTPS.
756
- :param pulumi.Input[_builtins.bool] ignore_vulnerability_alerts_during_read: (Optional) - This is ignored as the provider now handles lack of permissions automatically.
752
+ :param pulumi.Input[_builtins.bool] ignore_vulnerability_alerts_during_read: Set to `true` to not call the vulnerability alerts endpoint so the resource can also be used without admin permissions during read.
757
753
  :param pulumi.Input[_builtins.bool] is_template: Set to `true` to tell GitHub that this is a template repository.
758
754
  :param pulumi.Input[_builtins.str] license_template: Use the [name of the template](https://github.com/github/choosealicense.com/tree/gh-pages/_licenses) without the extension. For example, "mit" or "mpl-2.0".
759
755
  :param pulumi.Input[_builtins.str] merge_commit_message: Can be `PR_BODY`, `PR_TITLE`, or `BLANK` for a default merge commit message. Applicable only if `allow_merge_commit` is `true`.
@@ -775,7 +771,7 @@ class _RepositoryState:
775
771
  :param pulumi.Input['RepositoryTemplateArgs'] template: Use a template repository to create this resource. See Template Repositories below for details.
776
772
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] topics: The list of topics of the repository.
777
773
  :param pulumi.Input[_builtins.str] visibility: Can be `public` or `private`. If your organization is associated with an enterprise account using GitHub Enterprise Cloud or GitHub Enterprise Server 2.20+, visibility can also be `internal`. The `visibility` parameter overrides the `private` parameter.
778
- :param pulumi.Input[_builtins.bool] vulnerability_alerts: Configure [Dependabot security alerts](https://help.github.com/en/github/managing-security-vulnerabilities/about-security-alerts-for-vulnerable-dependencies) for vulnerable dependencies; set to `true` to enable, set to `false` to disable, and leave unset for the default behavior. Configuring this requires that alerts are not being explicitly configured at the organization level.
774
+ :param pulumi.Input[_builtins.bool] vulnerability_alerts: Set to `true` to enable security alerts for vulnerable dependencies. Enabling requires alerts to be enabled on the owner level. (Note for importing: GitHub enables the alerts on public repos but disables them on private repos by default.) See [GitHub Documentation](https://help.github.com/en/github/managing-security-vulnerabilities/about-security-alerts-for-vulnerable-dependencies) for details. Note that vulnerability alerts have not been successfully tested on any GitHub Enterprise instance and may be unavailable in those settings.
779
775
  :param pulumi.Input[_builtins.bool] web_commit_signoff_required: Require contributors to sign off on web-based commits. See more [here](https://docs.github.com/en/repositories/managing-your-repositorys-settings-and-features/managing-repository-settings/managing-the-commit-signoff-policy-for-your-repository). Defaults to `false`.
780
776
  """
781
777
  if allow_auto_merge is not None:
@@ -834,9 +830,6 @@ class _RepositoryState:
834
830
  pulumi.set(__self__, "html_url", html_url)
835
831
  if http_clone_url is not None:
836
832
  pulumi.set(__self__, "http_clone_url", http_clone_url)
837
- if ignore_vulnerability_alerts_during_read is not None:
838
- warnings.warn("""This is ignored as the provider now handles lack of permissions automatically.""", DeprecationWarning)
839
- pulumi.log.warn("""ignore_vulnerability_alerts_during_read is deprecated: This is ignored as the provider now handles lack of permissions automatically.""")
840
833
  if ignore_vulnerability_alerts_during_read is not None:
841
834
  pulumi.set(__self__, "ignore_vulnerability_alerts_during_read", ignore_vulnerability_alerts_during_read)
842
835
  if is_template is not None:
@@ -903,7 +896,7 @@ class _RepositoryState:
903
896
  @pulumi.getter(name="allowForking")
904
897
  def allow_forking(self) -> Optional[pulumi.Input[_builtins.bool]]:
905
898
  """
906
- Configure private forking for organization owned private and internal repositories; set to `true` to enable, `false` to disable, and leave unset for the default behaviour. Configuring this requires that private forking is not being explicitly configured at the organization level.
899
+ Set to `true` to allow private forking on the repository; this is only relevant if the repository is owned by an organization and is private or internal.
907
900
  """
908
901
  return pulumi.get(self, "allow_forking")
909
902
 
@@ -1192,10 +1185,9 @@ class _RepositoryState:
1192
1185
 
1193
1186
  @_builtins.property
1194
1187
  @pulumi.getter(name="ignoreVulnerabilityAlertsDuringRead")
1195
- @_utilities.deprecated("""This is ignored as the provider now handles lack of permissions automatically.""")
1196
1188
  def ignore_vulnerability_alerts_during_read(self) -> Optional[pulumi.Input[_builtins.bool]]:
1197
1189
  """
1198
- (Optional) - This is ignored as the provider now handles lack of permissions automatically.
1190
+ Set to `true` to not call the vulnerability alerts endpoint so the resource can also be used without admin permissions during read.
1199
1191
  """
1200
1192
  return pulumi.get(self, "ignore_vulnerability_alerts_during_read")
1201
1193
 
@@ -1449,7 +1441,7 @@ class _RepositoryState:
1449
1441
  @pulumi.getter(name="vulnerabilityAlerts")
1450
1442
  def vulnerability_alerts(self) -> Optional[pulumi.Input[_builtins.bool]]:
1451
1443
  """
1452
- Configure [Dependabot security alerts](https://help.github.com/en/github/managing-security-vulnerabilities/about-security-alerts-for-vulnerable-dependencies) for vulnerable dependencies; set to `true` to enable, set to `false` to disable, and leave unset for the default behavior. Configuring this requires that alerts are not being explicitly configured at the organization level.
1444
+ Set to `true` to enable security alerts for vulnerable dependencies. Enabling requires alerts to be enabled on the owner level. (Note for importing: GitHub enables the alerts on public repos but disables them on private repos by default.) See [GitHub Documentation](https://help.github.com/en/github/managing-security-vulnerabilities/about-security-alerts-for-vulnerable-dependencies) for details. Note that vulnerability alerts have not been successfully tested on any GitHub Enterprise instance and may be unavailable in those settings.
1453
1445
  """
1454
1446
  return pulumi.get(self, "vulnerability_alerts")
1455
1447
 
@@ -1575,14 +1567,16 @@ class Repository(pulumi.CustomResource):
1575
1567
 
1576
1568
  Repositories can be imported using the `name`, e.g.
1577
1569
 
1570
+ text
1571
+
1578
1572
  ```sh
1579
- $ pulumi import github:index/repository:Repository terraform myrepo
1573
+ $ pulumi import github:index/repository:Repository terraform terraform
1580
1574
  ```
1581
1575
 
1582
1576
  :param str resource_name: The name of the resource.
1583
1577
  :param pulumi.ResourceOptions opts: Options for the resource.
1584
1578
  :param pulumi.Input[_builtins.bool] allow_auto_merge: Set to `true` to allow auto-merging pull requests on the repository.
1585
- :param pulumi.Input[_builtins.bool] allow_forking: Configure private forking for organization owned private and internal repositories; set to `true` to enable, `false` to disable, and leave unset for the default behaviour. Configuring this requires that private forking is not being explicitly configured at the organization level.
1579
+ :param pulumi.Input[_builtins.bool] allow_forking: Set to `true` to allow private forking on the repository; this is only relevant if the repository is owned by an organization and is private or internal.
1586
1580
  :param pulumi.Input[_builtins.bool] allow_merge_commit: Set to `false` to disable merge commits on the repository.
1587
1581
  :param pulumi.Input[_builtins.bool] allow_rebase_merge: Set to `false` to disable rebase merges on the repository.
1588
1582
  :param pulumi.Input[_builtins.bool] allow_squash_merge: Set to `false` to disable squash merges on the repository.
@@ -1605,7 +1599,7 @@ class Repository(pulumi.CustomResource):
1605
1599
  :param pulumi.Input[_builtins.bool] has_wiki: Set to `true` to enable the GitHub Wiki features on
1606
1600
  the repository.
1607
1601
  :param pulumi.Input[_builtins.str] homepage_url: URL of a page describing the project.
1608
- :param pulumi.Input[_builtins.bool] ignore_vulnerability_alerts_during_read: (Optional) - This is ignored as the provider now handles lack of permissions automatically.
1602
+ :param pulumi.Input[_builtins.bool] ignore_vulnerability_alerts_during_read: Set to `true` to not call the vulnerability alerts endpoint so the resource can also be used without admin permissions during read.
1609
1603
  :param pulumi.Input[_builtins.bool] is_template: Set to `true` to tell GitHub that this is a template repository.
1610
1604
  :param pulumi.Input[_builtins.str] license_template: Use the [name of the template](https://github.com/github/choosealicense.com/tree/gh-pages/_licenses) without the extension. For example, "mit" or "mpl-2.0".
1611
1605
  :param pulumi.Input[_builtins.str] merge_commit_message: Can be `PR_BODY`, `PR_TITLE`, or `BLANK` for a default merge commit message. Applicable only if `allow_merge_commit` is `true`.
@@ -1622,7 +1616,7 @@ class Repository(pulumi.CustomResource):
1622
1616
  :param pulumi.Input[Union['RepositoryTemplateArgs', 'RepositoryTemplateArgsDict']] template: Use a template repository to create this resource. See Template Repositories below for details.
1623
1617
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] topics: The list of topics of the repository.
1624
1618
  :param pulumi.Input[_builtins.str] visibility: Can be `public` or `private`. If your organization is associated with an enterprise account using GitHub Enterprise Cloud or GitHub Enterprise Server 2.20+, visibility can also be `internal`. The `visibility` parameter overrides the `private` parameter.
1625
- :param pulumi.Input[_builtins.bool] vulnerability_alerts: Configure [Dependabot security alerts](https://help.github.com/en/github/managing-security-vulnerabilities/about-security-alerts-for-vulnerable-dependencies) for vulnerable dependencies; set to `true` to enable, set to `false` to disable, and leave unset for the default behavior. Configuring this requires that alerts are not being explicitly configured at the organization level.
1619
+ :param pulumi.Input[_builtins.bool] vulnerability_alerts: Set to `true` to enable security alerts for vulnerable dependencies. Enabling requires alerts to be enabled on the owner level. (Note for importing: GitHub enables the alerts on public repos but disables them on private repos by default.) See [GitHub Documentation](https://help.github.com/en/github/managing-security-vulnerabilities/about-security-alerts-for-vulnerable-dependencies) for details. Note that vulnerability alerts have not been successfully tested on any GitHub Enterprise instance and may be unavailable in those settings.
1626
1620
  :param pulumi.Input[_builtins.bool] web_commit_signoff_required: Require contributors to sign off on web-based commits. See more [here](https://docs.github.com/en/repositories/managing-your-repositorys-settings-and-features/managing-repository-settings/managing-the-commit-signoff-policy-for-your-repository). Defaults to `false`.
1627
1621
  """
1628
1622
  ...
@@ -1690,8 +1684,10 @@ class Repository(pulumi.CustomResource):
1690
1684
 
1691
1685
  Repositories can be imported using the `name`, e.g.
1692
1686
 
1687
+ text
1688
+
1693
1689
  ```sh
1694
- $ pulumi import github:index/repository:Repository terraform myrepo
1690
+ $ pulumi import github:index/repository:Repository terraform terraform
1695
1691
  ```
1696
1692
 
1697
1693
  :param str resource_name: The name of the resource.
@@ -1871,7 +1867,7 @@ class Repository(pulumi.CustomResource):
1871
1867
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
1872
1868
  :param pulumi.ResourceOptions opts: Options for the resource.
1873
1869
  :param pulumi.Input[_builtins.bool] allow_auto_merge: Set to `true` to allow auto-merging pull requests on the repository.
1874
- :param pulumi.Input[_builtins.bool] allow_forking: Configure private forking for organization owned private and internal repositories; set to `true` to enable, `false` to disable, and leave unset for the default behaviour. Configuring this requires that private forking is not being explicitly configured at the organization level.
1870
+ :param pulumi.Input[_builtins.bool] allow_forking: Set to `true` to allow private forking on the repository; this is only relevant if the repository is owned by an organization and is private or internal.
1875
1871
  :param pulumi.Input[_builtins.bool] allow_merge_commit: Set to `false` to disable merge commits on the repository.
1876
1872
  :param pulumi.Input[_builtins.bool] allow_rebase_merge: Set to `false` to disable rebase merges on the repository.
1877
1873
  :param pulumi.Input[_builtins.bool] allow_squash_merge: Set to `false` to disable squash merges on the repository.
@@ -1898,7 +1894,7 @@ class Repository(pulumi.CustomResource):
1898
1894
  :param pulumi.Input[_builtins.str] homepage_url: URL of a page describing the project.
1899
1895
  :param pulumi.Input[_builtins.str] html_url: The absolute URL (including scheme) of the rendered GitHub Pages site e.g. `https://username.github.io`.
1900
1896
  :param pulumi.Input[_builtins.str] http_clone_url: URL that can be provided to `git clone` to clone the repository via HTTPS.
1901
- :param pulumi.Input[_builtins.bool] ignore_vulnerability_alerts_during_read: (Optional) - This is ignored as the provider now handles lack of permissions automatically.
1897
+ :param pulumi.Input[_builtins.bool] ignore_vulnerability_alerts_during_read: Set to `true` to not call the vulnerability alerts endpoint so the resource can also be used without admin permissions during read.
1902
1898
  :param pulumi.Input[_builtins.bool] is_template: Set to `true` to tell GitHub that this is a template repository.
1903
1899
  :param pulumi.Input[_builtins.str] license_template: Use the [name of the template](https://github.com/github/choosealicense.com/tree/gh-pages/_licenses) without the extension. For example, "mit" or "mpl-2.0".
1904
1900
  :param pulumi.Input[_builtins.str] merge_commit_message: Can be `PR_BODY`, `PR_TITLE`, or `BLANK` for a default merge commit message. Applicable only if `allow_merge_commit` is `true`.
@@ -1920,7 +1916,7 @@ class Repository(pulumi.CustomResource):
1920
1916
  :param pulumi.Input[Union['RepositoryTemplateArgs', 'RepositoryTemplateArgsDict']] template: Use a template repository to create this resource. See Template Repositories below for details.
1921
1917
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] topics: The list of topics of the repository.
1922
1918
  :param pulumi.Input[_builtins.str] visibility: Can be `public` or `private`. If your organization is associated with an enterprise account using GitHub Enterprise Cloud or GitHub Enterprise Server 2.20+, visibility can also be `internal`. The `visibility` parameter overrides the `private` parameter.
1923
- :param pulumi.Input[_builtins.bool] vulnerability_alerts: Configure [Dependabot security alerts](https://help.github.com/en/github/managing-security-vulnerabilities/about-security-alerts-for-vulnerable-dependencies) for vulnerable dependencies; set to `true` to enable, set to `false` to disable, and leave unset for the default behavior. Configuring this requires that alerts are not being explicitly configured at the organization level.
1919
+ :param pulumi.Input[_builtins.bool] vulnerability_alerts: Set to `true` to enable security alerts for vulnerable dependencies. Enabling requires alerts to be enabled on the owner level. (Note for importing: GitHub enables the alerts on public repos but disables them on private repos by default.) See [GitHub Documentation](https://help.github.com/en/github/managing-security-vulnerabilities/about-security-alerts-for-vulnerable-dependencies) for details. Note that vulnerability alerts have not been successfully tested on any GitHub Enterprise instance and may be unavailable in those settings.
1924
1920
  :param pulumi.Input[_builtins.bool] web_commit_signoff_required: Require contributors to sign off on web-based commits. See more [here](https://docs.github.com/en/repositories/managing-your-repositorys-settings-and-features/managing-repository-settings/managing-the-commit-signoff-policy-for-your-repository). Defaults to `false`.
1925
1921
  """
1926
1922
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -1989,7 +1985,7 @@ class Repository(pulumi.CustomResource):
1989
1985
  @pulumi.getter(name="allowForking")
1990
1986
  def allow_forking(self) -> pulumi.Output[_builtins.bool]:
1991
1987
  """
1992
- Configure private forking for organization owned private and internal repositories; set to `true` to enable, `false` to disable, and leave unset for the default behaviour. Configuring this requires that private forking is not being explicitly configured at the organization level.
1988
+ Set to `true` to allow private forking on the repository; this is only relevant if the repository is owned by an organization and is private or internal.
1993
1989
  """
1994
1990
  return pulumi.get(self, "allow_forking")
1995
1991
 
@@ -2182,10 +2178,9 @@ class Repository(pulumi.CustomResource):
2182
2178
 
2183
2179
  @_builtins.property
2184
2180
  @pulumi.getter(name="ignoreVulnerabilityAlertsDuringRead")
2185
- @_utilities.deprecated("""This is ignored as the provider now handles lack of permissions automatically.""")
2186
2181
  def ignore_vulnerability_alerts_during_read(self) -> pulumi.Output[Optional[_builtins.bool]]:
2187
2182
  """
2188
- (Optional) - This is ignored as the provider now handles lack of permissions automatically.
2183
+ Set to `true` to not call the vulnerability alerts endpoint so the resource can also be used without admin permissions during read.
2189
2184
  """
2190
2185
  return pulumi.get(self, "ignore_vulnerability_alerts_during_read")
2191
2186
 
@@ -2355,7 +2350,7 @@ class Repository(pulumi.CustomResource):
2355
2350
  @pulumi.getter(name="vulnerabilityAlerts")
2356
2351
  def vulnerability_alerts(self) -> pulumi.Output[_builtins.bool]:
2357
2352
  """
2358
- Configure [Dependabot security alerts](https://help.github.com/en/github/managing-security-vulnerabilities/about-security-alerts-for-vulnerable-dependencies) for vulnerable dependencies; set to `true` to enable, set to `false` to disable, and leave unset for the default behavior. Configuring this requires that alerts are not being explicitly configured at the organization level.
2353
+ Set to `true` to enable security alerts for vulnerable dependencies. Enabling requires alerts to be enabled on the owner level. (Note for importing: GitHub enables the alerts on public repos but disables them on private repos by default.) See [GitHub Documentation](https://help.github.com/en/github/managing-security-vulnerabilities/about-security-alerts-for-vulnerable-dependencies) for details. Note that vulnerability alerts have not been successfully tested on any GitHub Enterprise instance and may be unavailable in those settings.
2359
2354
  """
2360
2355
  return pulumi.get(self, "vulnerability_alerts")
2361
2356
 
@@ -35,7 +35,7 @@ class RepositoryRulesetArgs:
35
35
  :param pulumi.Input['RepositoryRulesetRulesArgs'] rules: (Block List, Min: 1, Max: 1) Rules within the ruleset. (see below for nested schema)
36
36
  :param pulumi.Input[_builtins.str] target: (String) Possible values are `branch`, `tag` and `push`.
37
37
  :param pulumi.Input[Sequence[pulumi.Input['RepositoryRulesetBypassActorArgs']]] bypass_actors: (Block List) The actors that can bypass the rules in this ruleset. (see below for nested schema)
38
- :param pulumi.Input['RepositoryRulesetConditionsArgs'] conditions: (Block List, Max: 1) Parameters for a repository ruleset condition. For `branch` and `tag` targets, `ref_name` is required. For `push` targets, `ref_name` must NOT be set - conditions are optional for push targets. (see below for nested schema)
38
+ :param pulumi.Input['RepositoryRulesetConditionsArgs'] conditions: (Block List, Max: 1) Parameters for a repository ruleset ref name condition. (see below for nested schema)
39
39
  :param pulumi.Input[_builtins.str] name: (String) The name of the ruleset.
40
40
  """
41
41
  pulumi.set(__self__, "enforcement", enforcement)
@@ -113,7 +113,7 @@ class RepositoryRulesetArgs:
113
113
  @pulumi.getter
114
114
  def conditions(self) -> Optional[pulumi.Input['RepositoryRulesetConditionsArgs']]:
115
115
  """
116
- (Block List, Max: 1) Parameters for a repository ruleset condition. For `branch` and `tag` targets, `ref_name` is required. For `push` targets, `ref_name` must NOT be set - conditions are optional for push targets. (see below for nested schema)
116
+ (Block List, Max: 1) Parameters for a repository ruleset ref name condition. (see below for nested schema)
117
117
  """
118
118
  return pulumi.get(self, "conditions")
119
119
 
@@ -150,7 +150,7 @@ class _RepositoryRulesetState:
150
150
  """
151
151
  Input properties used for looking up and filtering RepositoryRuleset resources.
152
152
  :param pulumi.Input[Sequence[pulumi.Input['RepositoryRulesetBypassActorArgs']]] bypass_actors: (Block List) The actors that can bypass the rules in this ruleset. (see below for nested schema)
153
- :param pulumi.Input['RepositoryRulesetConditionsArgs'] conditions: (Block List, Max: 1) Parameters for a repository ruleset condition. For `branch` and `tag` targets, `ref_name` is required. For `push` targets, `ref_name` must NOT be set - conditions are optional for push targets. (see below for nested schema)
153
+ :param pulumi.Input['RepositoryRulesetConditionsArgs'] conditions: (Block List, Max: 1) Parameters for a repository ruleset ref name condition. (see below for nested schema)
154
154
  :param pulumi.Input[_builtins.str] enforcement: (String) Possible values for Enforcement are `disabled`, `active`, `evaluate`. Note: `evaluate` is currently only supported for owners of type `organization`.
155
155
  :param pulumi.Input[_builtins.str] etag: (String)
156
156
  :param pulumi.Input[_builtins.str] name: (String) The name of the ruleset.
@@ -197,7 +197,7 @@ class _RepositoryRulesetState:
197
197
  @pulumi.getter
198
198
  def conditions(self) -> Optional[pulumi.Input['RepositoryRulesetConditionsArgs']]:
199
199
  """
200
- (Block List, Max: 1) Parameters for a repository ruleset condition. For `branch` and `tag` targets, `ref_name` is required. For `push` targets, `ref_name` must NOT be set - conditions are optional for push targets. (see below for nested schema)
200
+ (Block List, Max: 1) Parameters for a repository ruleset ref name condition. (see below for nested schema)
201
201
  """
202
202
  return pulumi.get(self, "conditions")
203
203
 
@@ -403,7 +403,7 @@ class RepositoryRuleset(pulumi.CustomResource):
403
403
  :param str resource_name: The name of the resource.
404
404
  :param pulumi.ResourceOptions opts: Options for the resource.
405
405
  :param pulumi.Input[Sequence[pulumi.Input[Union['RepositoryRulesetBypassActorArgs', 'RepositoryRulesetBypassActorArgsDict']]]] bypass_actors: (Block List) The actors that can bypass the rules in this ruleset. (see below for nested schema)
406
- :param pulumi.Input[Union['RepositoryRulesetConditionsArgs', 'RepositoryRulesetConditionsArgsDict']] conditions: (Block List, Max: 1) Parameters for a repository ruleset condition. For `branch` and `tag` targets, `ref_name` is required. For `push` targets, `ref_name` must NOT be set - conditions are optional for push targets. (see below for nested schema)
406
+ :param pulumi.Input[Union['RepositoryRulesetConditionsArgs', 'RepositoryRulesetConditionsArgsDict']] conditions: (Block List, Max: 1) Parameters for a repository ruleset ref name condition. (see below for nested schema)
407
407
  :param pulumi.Input[_builtins.str] enforcement: (String) Possible values for Enforcement are `disabled`, `active`, `evaluate`. Note: `evaluate` is currently only supported for owners of type `organization`.
408
408
  :param pulumi.Input[_builtins.str] name: (String) The name of the ruleset.
409
409
  :param pulumi.Input[_builtins.str] repository: (String) Name of the repository to apply ruleset to.
@@ -577,7 +577,7 @@ class RepositoryRuleset(pulumi.CustomResource):
577
577
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
578
578
  :param pulumi.ResourceOptions opts: Options for the resource.
579
579
  :param pulumi.Input[Sequence[pulumi.Input[Union['RepositoryRulesetBypassActorArgs', 'RepositoryRulesetBypassActorArgsDict']]]] bypass_actors: (Block List) The actors that can bypass the rules in this ruleset. (see below for nested schema)
580
- :param pulumi.Input[Union['RepositoryRulesetConditionsArgs', 'RepositoryRulesetConditionsArgsDict']] conditions: (Block List, Max: 1) Parameters for a repository ruleset condition. For `branch` and `tag` targets, `ref_name` is required. For `push` targets, `ref_name` must NOT be set - conditions are optional for push targets. (see below for nested schema)
580
+ :param pulumi.Input[Union['RepositoryRulesetConditionsArgs', 'RepositoryRulesetConditionsArgsDict']] conditions: (Block List, Max: 1) Parameters for a repository ruleset ref name condition. (see below for nested schema)
581
581
  :param pulumi.Input[_builtins.str] enforcement: (String) Possible values for Enforcement are `disabled`, `active`, `evaluate`. Note: `evaluate` is currently only supported for owners of type `organization`.
582
582
  :param pulumi.Input[_builtins.str] etag: (String)
583
583
  :param pulumi.Input[_builtins.str] name: (String) The name of the ruleset.
@@ -615,7 +615,7 @@ class RepositoryRuleset(pulumi.CustomResource):
615
615
  @pulumi.getter
616
616
  def conditions(self) -> pulumi.Output[Optional['outputs.RepositoryRulesetConditions']]:
617
617
  """
618
- (Block List, Max: 1) Parameters for a repository ruleset condition. For `branch` and `tag` targets, `ref_name` is required. For `push` targets, `ref_name` must NOT be set - conditions are optional for push targets. (see below for nested schema)
618
+ (Block List, Max: 1) Parameters for a repository ruleset ref name condition. (see below for nested schema)
619
619
  """
620
620
  return pulumi.get(self, "conditions")
621
621
 
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.4
2
2
  Name: pulumi_github
3
- Version: 6.12.0
3
+ Version: 6.12.0a1769172728
4
4
  Summary: A Pulumi package for creating and managing github cloud resources.
5
5
  License: Apache-2.0
6
6
  Project-URL: Homepage, https://pulumi.io
@@ -1,26 +1,24 @@
1
- pulumi_github/__init__.py,sha256=ZxQOtjQOkqdvM20LltXUxMeHwLrHAIm9Q-q_8CtGk8s,24515
2
- pulumi_github/_inputs.py,sha256=PUbJvSpA8mPt5sC1-ZIKyIk3ZqokRTtDGFrOMNZHFGE,333317
1
+ pulumi_github/__init__.py,sha256=l6-9ExfkAnCREFoCE0h_gR7vw21jeVs0nMUWcAHtc_8,23513
2
+ pulumi_github/_inputs.py,sha256=AS0eA0HZslgVBklMVsF7gPfyLs10_bqRfRyUkLECN6k,316850
3
3
  pulumi_github/_utilities.py,sha256=66uLGQDI1oMFOI3Fe5igAphtexWhcSLDyuVW50jW3ik,10789
4
- pulumi_github/actions_environment_secret.py,sha256=i4ima60wz7L_v0eBLBvq2T5fuXpSpPEjYvwlQ_cGN7k,24662
5
- pulumi_github/actions_environment_variable.py,sha256=qXDupTmDSUa1ihp1L8o7YiVeMEeGhJQ-xxWsoZR-JGI,18521
4
+ pulumi_github/actions_environment_secret.py,sha256=_U4w3lI1aW6BFsM2Sc2_2jxDzqXRTLo9Sip7BoRK76c,17774
5
+ pulumi_github/actions_environment_variable.py,sha256=EbqXG9falr6HX6FihnJA8neWTop1MotA7EzyToMrfbQ,17267
6
6
  pulumi_github/actions_hosted_runner.py,sha256=itmCa2JVslSj7C_C7mY3k76cQwfm-4q2GseS7jsNrCE,38401
7
7
  pulumi_github/actions_organization_oidc_subject_claim_customization_template.py,sha256=4PFkbU5kRN_1fSmFg8Q2_NKe1h-kkuDuToOKktQ9qXQ,9643
8
- pulumi_github/actions_organization_permissions.py,sha256=H22240IvswqX1Mju5-mga5zVysJRQD4pqwN0ogkyHdM,24636
9
- pulumi_github/actions_organization_secret.py,sha256=MQKrGWy3_Li6z1o5yltEbPbX8xsq6noH-P8rxyVDFk0,32951
10
- pulumi_github/actions_organization_secret_repositories.py,sha256=sFvI5amosSGOWFl8JjxV5lgRBQ-UOkhA_JNmW1Yclsk,12422
11
- pulumi_github/actions_organization_secret_repository.py,sha256=znaHEEfFianSaZzYD2uUovg7Izr-bk8Lgz-hVrIdSgg,11581
12
- pulumi_github/actions_organization_variable.py,sha256=3wpxDnYbnPSo1AtNKlAuY34bopX4fB3W07AOUq9WfYE,18957
13
- pulumi_github/actions_organization_variable_repositories.py,sha256=Ls6u4z6RJxetcS2kRDXgJLs_eEF6j2lZvZnMuX22eaU,12624
14
- pulumi_github/actions_organization_variable_repository.py,sha256=Fv789X57CS4XkNvpu1dc_hDbr3zUWv1aRZmhEdZ50iI,11785
8
+ pulumi_github/actions_organization_permissions.py,sha256=jHAIUwWThY7_dymme9Ir34fLbj6eYPUZNER4B1eTveQ,21764
9
+ pulumi_github/actions_organization_secret.py,sha256=FcTJoiXyanPOgjdC7IC73UxEhEfQfqVB9yW3t_IN9w8,22247
10
+ pulumi_github/actions_organization_secret_repositories.py,sha256=2x8u9O0u3DQrThJ2_6dLinLdweZiuSY2fGyUkjhWa5I,11526
11
+ pulumi_github/actions_organization_secret_repository.py,sha256=gk4BdtJ-Jkt9XeWjVGD-XFEJvMsuUFGkNEjGYWOdfb0,10744
12
+ pulumi_github/actions_organization_variable.py,sha256=Ay0W4H2O-IXQDxjJLXTSpYluixlZSYVvT6t6aksuNeI,18866
15
13
  pulumi_github/actions_organization_workflow_permissions.py,sha256=PoGdEMv0YB9VGR-_4Becnq9jAoqvi7BFZEoKzYvQMog,16381
16
14
  pulumi_github/actions_repository_access_level.py,sha256=IwvKo_HBydIsxw7ZkkwwEjuoksG9F08-1_unk4m4xJk,10671
17
15
  pulumi_github/actions_repository_oidc_subject_claim_customization_template.py,sha256=Tc1PB-VE06zFe3SxyLOk7h1CpJNtZopn3_osj50cSHY,15685
18
- pulumi_github/actions_repository_permissions.py,sha256=1SpCXRHuDZHZ-5rO-YnYktDmE1SpcQBuZCcKBAirz8w,20116
16
+ pulumi_github/actions_repository_permissions.py,sha256=QUpLWfH2i6mp08gybSl6vt-6I2hsm_Z27WtKSKERpp8,17265
19
17
  pulumi_github/actions_runner_group.py,sha256=4ZIiDcoHchnjHNswhEntqFE5loLsFbXdBUdWBeBR8zw,29003
20
- pulumi_github/actions_secret.py,sha256=FD_ff02onr2Mo1lkuyV2dvCBEencM_9nWbJdQwQatak,27675
21
- pulumi_github/actions_variable.py,sha256=FopfW6jAJ-noRu4koqRb-EGbGFiXIxPCXgyjNVXvr2c,14854
22
- pulumi_github/app_installation_repositories.py,sha256=EyOwCJdyuDMu4jWnMgEQS41Bqda73JJvfptS3w3IegA,13937
23
- pulumi_github/app_installation_repository.py,sha256=rPXlr-VoDkqG_Eod-hJd3eybCOgLug7ZRs_-jnQVLLM,12243
18
+ pulumi_github/actions_secret.py,sha256=M3seUSvuPFuBhFj6b30I-JVHFx6-nI4niBBvT0BE3zE,17789
19
+ pulumi_github/actions_variable.py,sha256=vCHieDbfbDYMRjIwQVozcKJ1FdrsFkFPCx7PApD6Hx8,13526
20
+ pulumi_github/app_installation_repositories.py,sha256=0j6sO_ZY_ZtrCxBlhWd-n7ThwV-x_ys1K6eNJWrd-Ks,13589
21
+ pulumi_github/app_installation_repository.py,sha256=Q-MNyDAJYpHaqy-Fz2pylbBua8oSfr-fhOB9d95vlIM,11895
24
22
  pulumi_github/branch.py,sha256=C1ruPNSW-YuZ-1eil6Jt3r8tFtBvjF9bOKcHzWFwklM,18841
25
23
  pulumi_github/branch_default.py,sha256=t6QYm8AFOs2tFJLANPnK7zqP4rtq52DXW79233gmGRQ,14225
26
24
  pulumi_github/branch_protection.py,sha256=EQgKChwyyBXJmwSak_aRZXcjMWK60cNwtOvYgwhDUnc,48369
@@ -29,11 +27,10 @@ pulumi_github/codespaces_organization_secret.py,sha256=Gm1ZohHi5R4TDt3CjX2K2z8-o
29
27
  pulumi_github/codespaces_organization_secret_repositories.py,sha256=bYb-IWvQ2aP89SGYSyMGMV4n0PAnMfL2oN7MH5G2C4U,11624
30
28
  pulumi_github/codespaces_secret.py,sha256=MsXP38COG9rmQDOWk_1ejln_cnccZl2O9bo0htLOzPs,16256
31
29
  pulumi_github/codespaces_user_secret.py,sha256=mUzjFl65oNscUMr2BRcGI-tvQtZJy5j7WlFlEcIu68Q,17310
32
- pulumi_github/dependabot_organization_secret.py,sha256=JglQ3AeUkmpDAsDANZ8I15NzOxNY3p3AsZhaEEwO7BE,27025
33
- pulumi_github/dependabot_organization_secret_repositories.py,sha256=rXOJTi9Jslfa9wQNHAjUPaSVn5yQydSYj22kaChgTfQ,12555
34
- pulumi_github/dependabot_organization_secret_repository.py,sha256=2rYisCmvJhxQBXLLmVGsDkReeRqZLx896DOjZFrynTA,11620
35
- pulumi_github/dependabot_secret.py,sha256=R0HwryN59W8J3wAXk9wnNPnHLP9HSa4Ousud1hxGsTM,22446
36
- pulumi_github/emu_group_mapping.py,sha256=SM7OzIlmMgbXGT9jNfewDTqqN2rLor2CvUyV0_BtH4E,12949
30
+ pulumi_github/dependabot_organization_secret.py,sha256=2F53WIm73BmfPmE2oBWFYPTiEAvycpkIdoI-zcyZsIQ,20686
31
+ pulumi_github/dependabot_organization_secret_repositories.py,sha256=aQqRYVASQyeJjSh6djn97MSfHcGagjjKXWYAvvr78Ic,12048
32
+ pulumi_github/dependabot_secret.py,sha256=OSKDM3ZngmErR7XEvAntRcsK66RbqxYFzin5ogLU43c,16246
33
+ pulumi_github/emu_group_mapping.py,sha256=SgqoynPuAE2JHvz6yELLM0bbLk-OqkVicW8M_Fy1H7E,9906
37
34
  pulumi_github/enterprise_actions_permissions.py,sha256=Wop0r64sgXbtkNdZsBE8DgaI58w1x4OcxgT8T56P5Qo,23953
38
35
  pulumi_github/enterprise_actions_runner_group.py,sha256=XRMC8_uXYz8KglBKRXbc5gnoqFyNi1ek2VSPtN4lhE8,30898
39
36
  pulumi_github/enterprise_actions_workflow_permissions.py,sha256=hJX81_SlhVJeTXyTLPtpF7SpcJADdy7NquEIDKNhYl4,16191
@@ -89,7 +86,6 @@ pulumi_github/get_organization_teams.py,sha256=IuFZWkZFMIK1Rk4SpHqG5I453hKm1ebON
89
86
  pulumi_github/get_organization_webhooks.py,sha256=EN1RlTzXO73d956YJGuIzuoI8lDvLMZnRr5cP-XSL_I,3747
90
87
  pulumi_github/get_ref.py,sha256=tjnOKTTXoGx59wTgXmkrQ9HDgFOf7KmsSPFMnDy4o1A,6111
91
88
  pulumi_github/get_release.py,sha256=E5ThEgvhY_rmhTvYx0w-jQ-ww8GeSjgCc3Vnt6j3mEQ,17015
92
- pulumi_github/get_release_asset.py,sha256=377aLeUUoMRq9lTAGIcch56-WO8-ThDMil2QmVeGiOk,14706
93
89
  pulumi_github/get_repositories.py,sha256=aMsVbbabJ6apgCBfI0VpoEhatCDunc0wjVq5yXfekeY,9099
94
90
  pulumi_github/get_repository.py,sha256=bRW00uZ7CeHzGHwdvsvR-_u33g74287dFEHA95mEnLU,28840
95
91
  pulumi_github/get_repository_autolink_references.py,sha256=jWapWwoHbsP-iLUNZdRtX-g7PdeBezolCbAt6KT_65M,5089
@@ -125,18 +121,18 @@ pulumi_github/organization_role.py,sha256=iWwMCsSGnJFzhSNynsHV2QpVNavE14DFEzYuWv
125
121
  pulumi_github/organization_role_team.py,sha256=OP6BOO_OzCXRKmxiBmtuSEVNDUFmrrxRc0rDx7nVJus,9143
126
122
  pulumi_github/organization_role_team_assignment.py,sha256=9DC2sWPd-v_8gWt8FIJ8u7ocsgMrDAcbLxUtVno55YU,10404
127
123
  pulumi_github/organization_role_user.py,sha256=NPWKzsUdq2-B_SnQC5n96Qb4OvZb0PNjzkiuY6ZBHBg,9042
128
- pulumi_github/organization_ruleset.py,sha256=Z1JyKOUmhlPCeie2Lwvowf4f1IX3K3KM1NPKrAoCEXg,31293
124
+ pulumi_github/organization_ruleset.py,sha256=v4m4WlsNbbQD-44Ell22b9SR0KKiCuHoAQ6jUuk474A,30368
129
125
  pulumi_github/organization_security_manager.py,sha256=_d0ioo2TFtYBWu0I4sKVJiFoYGR58OcjAsiJHqr-GGM,7634
130
126
  pulumi_github/organization_settings.py,sha256=j-UhuwUCzrzVdnpKMYMqtnpeJnXdyP7gK44Nh6BWx10,84552
131
127
  pulumi_github/organization_webhook.py,sha256=ZBNHqHxNNxRK6Idi05yQjw2sEfDM2JBsO2AoPObJGdM,15991
132
- pulumi_github/outputs.py,sha256=sVsE4d_hSQMRlL4c8BWfWHwK5EBsgxE5sW5Qs03O8kE,321200
128
+ pulumi_github/outputs.py,sha256=Q1kkW87C9BqR9fF59ewqVkcpnFALK9iI1J4DwtwxDr8,309974
133
129
  pulumi_github/project_card.py,sha256=x_A-Iv8cb94mTA5sx1nRlCh2sSmxfTAvuwaNPLAYY7Q,18969
134
130
  pulumi_github/project_column.py,sha256=QTcfk22084bOk7BTTVeqk4RyzOY8WdWLNlz8kIjD-VM,11250
135
131
  pulumi_github/provider.py,sha256=EpU2hqQ5WGwM5nq_c5rGE7MJLNAskPz32F03EJ-GIoc,23731
136
- pulumi_github/pulumi-plugin.json,sha256=Uf7ovhpSSVUS5MIi5HHJaBuwHda6yfRcLMGSJUxqNSc,66
132
+ pulumi_github/pulumi-plugin.json,sha256=fjh5oeDLxuQ9j0oksrcuoMg3gN2IZq3ufDiAIH2bLNg,83
137
133
  pulumi_github/py.typed,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
138
134
  pulumi_github/release.py,sha256=udD_Paft3i0R_W9ktVPxnlsx8PzvLfi1LsLcmspgLnU,43043
139
- pulumi_github/repository.py,sha256=gMFjkKrsFsuFacPIUKbq3aCcNWeKYYKvispSRfhFdHg,137039
135
+ pulumi_github/repository.py,sha256=IjQsFh8qGVrP7_8VrLw65v4uMezdHk2yO10CNzDCzMs,136494
140
136
  pulumi_github/repository_autolink_reference.py,sha256=7BziThFSVSHTbflGHTzsz6X-UB9aJj1vCVKErQ6i62E,17479
141
137
  pulumi_github/repository_collaborator.py,sha256=uFs8uJF8HktK-MLYP9WzzCDsDWO4zsz0VhCMl6e5sDg,20644
142
138
  pulumi_github/repository_collaborators.py,sha256=G8kcY52vBH3AMD-U5p5MD_lnfeMxijW3csdvqAmu1DU,19090
@@ -150,7 +146,7 @@ pulumi_github/repository_file.py,sha256=64QTmA1hRsmSlSWfzkKqb03bBptGiYZTjW9EjwLR
150
146
  pulumi_github/repository_milestone.py,sha256=5vqlWJAkp0-U310nsmpKJDBvtxfKNmtD4EIeb0OuRKc,18465
151
147
  pulumi_github/repository_project.py,sha256=l38rsdFcHzdz3dNdjdFS1euE91WEvlCU0y1ffHHUk7o,13329
152
148
  pulumi_github/repository_pull_request.py,sha256=fiDd8z0AltmhHdvkLDjtC3U6uilZarbcxxp5yWDi6wo,30934
153
- pulumi_github/repository_ruleset.py,sha256=fj_XXvkqAlWypK5X2Q2P7G2NV6q2o1L89wYbnghPcNk,31833
149
+ pulumi_github/repository_ruleset.py,sha256=m5_L7kV5bV93sKfTcfHzUFz1ZfEbmi0TPPJ9v9Z3FhA,30867
154
150
  pulumi_github/repository_topics.py,sha256=QgbO_Lfthloe0x7l1WK2k1c0wIRIvgbJM4RJJP1H-SE,9331
155
151
  pulumi_github/repository_webhook.py,sha256=596-JnU1pGyu8BMcYCTaQnT6YPiZ19BjjdpjD4j_TN0,18869
156
152
  pulumi_github/team.py,sha256=ns2N_MXIJgrP6GnsjL45SzYo_zWjUpfylYJDMVLL1Iw,32769
@@ -167,7 +163,7 @@ pulumi_github/config/__init__.py,sha256=XWnQfVtc2oPapjSXXCdORFJvMpXt_SMJQASWdTRo
167
163
  pulumi_github/config/__init__.pyi,sha256=M2eV8Tt6VJ60ULawmuIyADkImmrlvoT7zrqnv6QRfUQ,2568
168
164
  pulumi_github/config/outputs.py,sha256=B49PRqlSRiWQLjrE6YGuDSNwd6JTXzlRtYm1vw743S0,1758
169
165
  pulumi_github/config/vars.py,sha256=McIM_AqaMDbpD67QH1LNkR2D-VYe6qirG7E1x9uZFTM,4234
170
- pulumi_github-6.12.0.dist-info/METADATA,sha256=8QuOLREj3ocyWndBZRd1guOwl_P-RWA8md3Mx1FFM1U,2901
171
- pulumi_github-6.12.0.dist-info/WHEEL,sha256=wUyA8OaulRlbfwMtmQsvNngGrxQHAvkKcvRmdizlJi0,92
172
- pulumi_github-6.12.0.dist-info/top_level.txt,sha256=0kq3fQJy2bJ9f0g7Mz21Ley0o3Go-U0OXSU4tRUpR2s,14
173
- pulumi_github-6.12.0.dist-info/RECORD,,
166
+ pulumi_github-6.12.0a1769172728.dist-info/METADATA,sha256=251oBbo6of5N0WWq8rbZP5EMFVpqZVMHHCHktu_ICbE,2912
167
+ pulumi_github-6.12.0a1769172728.dist-info/WHEEL,sha256=qELbo2s1Yzl39ZmrAibXA2jjPLUYfnVhUNTlyF1rq0Y,92
168
+ pulumi_github-6.12.0a1769172728.dist-info/top_level.txt,sha256=0kq3fQJy2bJ9f0g7Mz21Ley0o3Go-U0OXSU4tRUpR2s,14
169
+ pulumi_github-6.12.0a1769172728.dist-info/RECORD,,
@@ -1,5 +1,5 @@
1
1
  Wheel-Version: 1.0
2
- Generator: setuptools (80.10.2)
2
+ Generator: setuptools (80.10.1)
3
3
  Root-Is-Purelib: true
4
4
  Tag: py3-none-any
5
5