All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.pulumi.gcp.cloudbuildv2.kotlin.RepositoryArgs.kt Maven / Gradle / Ivy

Go to download

Build cloud applications and infrastructure by combining the safety and reliability of infrastructure as code with the power of the Kotlin programming language.

There is a newer version: 8.10.0.0
Show newest version
@file:Suppress("NAME_SHADOWING", "DEPRECATION")

package com.pulumi.gcp.cloudbuildv2.kotlin

import com.pulumi.core.Output
import com.pulumi.core.Output.of
import com.pulumi.gcp.cloudbuildv2.RepositoryArgs.builder
import com.pulumi.kotlin.ConvertibleToJava
import com.pulumi.kotlin.PulumiTagMarker
import kotlin.Pair
import kotlin.String
import kotlin.Suppress
import kotlin.collections.Map
import kotlin.jvm.JvmName

/**
 * A repository associated to a parent connection.
 * To get more information about Repository, see:
 * * [API documentation](https://cloud.google.com/build/docs/api/reference/rest)
 * * How-to Guides
 *     * [Official Documentation](https://cloud.google.com/build/docs)
 * ## Example Usage
 * ### Cloudbuildv2 Repository Ghe Doc
 * 
 * ```typescript
 * import * as pulumi from "@pulumi/pulumi";
 * import * as gcp from "@pulumi/gcp";
 * import * as std from "@pulumi/std";
 * const private_key_secret = new gcp.secretmanager.Secret("private-key-secret", {
 *     secretId: "ghe-pk-secret",
 *     replication: {
 *         auto: {},
 *     },
 * });
 * const private_key_secret_version = new gcp.secretmanager.SecretVersion("private-key-secret-version", {
 *     secret: private_key_secret.id,
 *     secretData: std.file({
 *         input: "private-key.pem",
 *     }).then(invoke => invoke.result),
 * });
 * const webhook_secret_secret = new gcp.secretmanager.Secret("webhook-secret-secret", {
 *     secretId: "github-token-secret",
 *     replication: {
 *         auto: {},
 *     },
 * });
 * const webhook_secret_secret_version = new gcp.secretmanager.SecretVersion("webhook-secret-secret-version", {
 *     secret: webhook_secret_secret.id,
 *     secretData: "",
 * });
 * const p4sa-secretAccessor = gcp.organizations.getIAMPolicy({
 *     bindings: [{
 *         role: "roles/secretmanager.secretAccessor",
 *         members: ["serviceAccount:service-123456789@gcp-sa-cloudbuild.iam.gserviceaccount.com"],
 *     }],
 * });
 * const policy_pk = new gcp.secretmanager.SecretIamPolicy("policy-pk", {
 *     secretId: private_key_secret.secretId,
 *     policyData: p4sa_secretAccessor.then(p4sa_secretAccessor => p4sa_secretAccessor.policyData),
 * });
 * const policy_whs = new gcp.secretmanager.SecretIamPolicy("policy-whs", {
 *     secretId: webhook_secret_secret.secretId,
 *     policyData: p4sa_secretAccessor.then(p4sa_secretAccessor => p4sa_secretAccessor.policyData),
 * });
 * const my_connection = new gcp.cloudbuildv2.Connection("my-connection", {
 *     location: "us-central1",
 *     name: "my-terraform-ghe-connection",
 *     githubEnterpriseConfig: {
 *         hostUri: "https://ghe.com",
 *         privateKeySecretVersion: private_key_secret_version.id,
 *         webhookSecretSecretVersion: webhook_secret_secret_version.id,
 *         appId: 200,
 *         appSlug: "gcb-app",
 *         appInstallationId: 300,
 *     },
 * });
 * const my_repository = new gcp.cloudbuildv2.Repository("my-repository", {
 *     name: "my-terraform-ghe-repo",
 *     location: "us-central1",
 *     parentConnection: my_connection.name,
 *     remoteUri: "https://ghe.com/hashicorp/terraform-provider-google.git",
 * });
 * ```
 * ```python
 * import pulumi
 * import pulumi_gcp as gcp
 * import pulumi_std as std
 * private_key_secret = gcp.secretmanager.Secret("private-key-secret",
 *     secret_id="ghe-pk-secret",
 *     replication=gcp.secretmanager.SecretReplicationArgs(
 *         auto=gcp.secretmanager.SecretReplicationAutoArgs(),
 *     ))
 * private_key_secret_version = gcp.secretmanager.SecretVersion("private-key-secret-version",
 *     secret=private_key_secret.id,
 *     secret_data=std.file(input="private-key.pem").result)
 * webhook_secret_secret = gcp.secretmanager.Secret("webhook-secret-secret",
 *     secret_id="github-token-secret",
 *     replication=gcp.secretmanager.SecretReplicationArgs(
 *         auto=gcp.secretmanager.SecretReplicationAutoArgs(),
 *     ))
 * webhook_secret_secret_version = gcp.secretmanager.SecretVersion("webhook-secret-secret-version",
 *     secret=webhook_secret_secret.id,
 *     secret_data="")
 * p4sa_secret_accessor = gcp.organizations.get_iam_policy(bindings=[gcp.organizations.GetIAMPolicyBindingArgs(
 *     role="roles/secretmanager.secretAccessor",
 *     members=["serviceAccount:service-123456789@gcp-sa-cloudbuild.iam.gserviceaccount.com"],
 * )])
 * policy_pk = gcp.secretmanager.SecretIamPolicy("policy-pk",
 *     secret_id=private_key_secret.secret_id,
 *     policy_data=p4sa_secret_accessor.policy_data)
 * policy_whs = gcp.secretmanager.SecretIamPolicy("policy-whs",
 *     secret_id=webhook_secret_secret.secret_id,
 *     policy_data=p4sa_secret_accessor.policy_data)
 * my_connection = gcp.cloudbuildv2.Connection("my-connection",
 *     location="us-central1",
 *     name="my-terraform-ghe-connection",
 *     github_enterprise_config=gcp.cloudbuildv2.ConnectionGithubEnterpriseConfigArgs(
 *         host_uri="https://ghe.com",
 *         private_key_secret_version=private_key_secret_version.id,
 *         webhook_secret_secret_version=webhook_secret_secret_version.id,
 *         app_id=200,
 *         app_slug="gcb-app",
 *         app_installation_id=300,
 *     ))
 * my_repository = gcp.cloudbuildv2.Repository("my-repository",
 *     name="my-terraform-ghe-repo",
 *     location="us-central1",
 *     parent_connection=my_connection.name,
 *     remote_uri="https://ghe.com/hashicorp/terraform-provider-google.git")
 * ```
 * ```csharp
 * using System.Collections.Generic;
 * using System.Linq;
 * using Pulumi;
 * using Gcp = Pulumi.Gcp;
 * using Std = Pulumi.Std;
 * return await Deployment.RunAsync(() =>
 * {
 *     var private_key_secret = new Gcp.SecretManager.Secret("private-key-secret", new()
 *     {
 *         SecretId = "ghe-pk-secret",
 *         Replication = new Gcp.SecretManager.Inputs.SecretReplicationArgs
 *         {
 *             Auto = null,
 *         },
 *     });
 *     var private_key_secret_version = new Gcp.SecretManager.SecretVersion("private-key-secret-version", new()
 *     {
 *         Secret = private_key_secret.Id,
 *         SecretData = Std.File.Invoke(new()
 *         {
 *             Input = "private-key.pem",
 *         }).Apply(invoke => invoke.Result),
 *     });
 *     var webhook_secret_secret = new Gcp.SecretManager.Secret("webhook-secret-secret", new()
 *     {
 *         SecretId = "github-token-secret",
 *         Replication = new Gcp.SecretManager.Inputs.SecretReplicationArgs
 *         {
 *             Auto = null,
 *         },
 *     });
 *     var webhook_secret_secret_version = new Gcp.SecretManager.SecretVersion("webhook-secret-secret-version", new()
 *     {
 *         Secret = webhook_secret_secret.Id,
 *         SecretData = "",
 *     });
 *     var p4sa_secretAccessor = Gcp.Organizations.GetIAMPolicy.Invoke(new()
 *     {
 *         Bindings = new[]
 *         {
 *             new Gcp.Organizations.Inputs.GetIAMPolicyBindingInputArgs
 *             {
 *                 Role = "roles/secretmanager.secretAccessor",
 *                 Members = new[]
 *                 {
 *                     "serviceAccount:[email protected]",
 *                 },
 *             },
 *         },
 *     });
 *     var policy_pk = new Gcp.SecretManager.SecretIamPolicy("policy-pk", new()
 *     {
 *         SecretId = private_key_secret.SecretId,
 *         PolicyData = p4sa_secretAccessor.Apply(p4sa_secretAccessor => p4sa_secretAccessor.Apply(getIAMPolicyResult => getIAMPolicyResult.PolicyData)),
 *     });
 *     var policy_whs = new Gcp.SecretManager.SecretIamPolicy("policy-whs", new()
 *     {
 *         SecretId = webhook_secret_secret.SecretId,
 *         PolicyData = p4sa_secretAccessor.Apply(p4sa_secretAccessor => p4sa_secretAccessor.Apply(getIAMPolicyResult => getIAMPolicyResult.PolicyData)),
 *     });
 *     var my_connection = new Gcp.CloudBuildV2.Connection("my-connection", new()
 *     {
 *         Location = "us-central1",
 *         Name = "my-terraform-ghe-connection",
 *         GithubEnterpriseConfig = new Gcp.CloudBuildV2.Inputs.ConnectionGithubEnterpriseConfigArgs
 *         {
 *             HostUri = "https://ghe.com",
 *             PrivateKeySecretVersion = private_key_secret_version.Id,
 *             WebhookSecretSecretVersion = webhook_secret_secret_version.Id,
 *             AppId = 200,
 *             AppSlug = "gcb-app",
 *             AppInstallationId = 300,
 *         },
 *     });
 *     var my_repository = new Gcp.CloudBuildV2.Repository("my-repository", new()
 *     {
 *         Name = "my-terraform-ghe-repo",
 *         Location = "us-central1",
 *         ParentConnection = my_connection.Name,
 *         RemoteUri = "https://ghe.com/hashicorp/terraform-provider-google.git",
 *     });
 * });
 * ```
 * ```go
 * package main
 * import (
 * 	"github.com/pulumi/pulumi-gcp/sdk/v7/go/gcp/cloudbuildv2"
 * 	"github.com/pulumi/pulumi-gcp/sdk/v7/go/gcp/organizations"
 * 	"github.com/pulumi/pulumi-gcp/sdk/v7/go/gcp/secretmanager"
 * 	"github.com/pulumi/pulumi-std/sdk/go/std"
 * 	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
 * )
 * func main() {
 * 	pulumi.Run(func(ctx *pulumi.Context) error {
 * 		_, err := secretmanager.NewSecret(ctx, "private-key-secret", &secretmanager.SecretArgs{
 * 			SecretId: pulumi.String("ghe-pk-secret"),
 * 			Replication: &secretmanager.SecretReplicationArgs{
 * 				Auto: nil,
 * 			},
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		invokeFile, err := std.File(ctx, &std.FileArgs{
 * 			Input: "private-key.pem",
 * 		}, nil)
 * 		if err != nil {
 * 			return err
 * 		}
 * 		_, err = secretmanager.NewSecretVersion(ctx, "private-key-secret-version", &secretmanager.SecretVersionArgs{
 * 			Secret:     private_key_secret.ID(),
 * 			SecretData: invokeFile.Result,
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		_, err = secretmanager.NewSecret(ctx, "webhook-secret-secret", &secretmanager.SecretArgs{
 * 			SecretId: pulumi.String("github-token-secret"),
 * 			Replication: &secretmanager.SecretReplicationArgs{
 * 				Auto: nil,
 * 			},
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		_, err = secretmanager.NewSecretVersion(ctx, "webhook-secret-secret-version", &secretmanager.SecretVersionArgs{
 * 			Secret:     webhook_secret_secret.ID(),
 * 			SecretData: pulumi.String(""),
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		p4sa_secretAccessor, err := organizations.LookupIAMPolicy(ctx, &organizations.LookupIAMPolicyArgs{
 * 			Bindings: []organizations.GetIAMPolicyBinding{
 * 				{
 * 					Role: "roles/secretmanager.secretAccessor",
 * 					Members: []string{
 * 						"serviceAccount:[email protected]",
 * 					},
 * 				},
 * 			},
 * 		}, nil)
 * 		if err != nil {
 * 			return err
 * 		}
 * 		_, err = secretmanager.NewSecretIamPolicy(ctx, "policy-pk", &secretmanager.SecretIamPolicyArgs{
 * 			SecretId:   private_key_secret.SecretId,
 * 			PolicyData: pulumi.String(p4sa_secretAccessor.PolicyData),
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		_, err = secretmanager.NewSecretIamPolicy(ctx, "policy-whs", &secretmanager.SecretIamPolicyArgs{
 * 			SecretId:   webhook_secret_secret.SecretId,
 * 			PolicyData: pulumi.String(p4sa_secretAccessor.PolicyData),
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		_, err = cloudbuildv2.NewConnection(ctx, "my-connection", &cloudbuildv2.ConnectionArgs{
 * 			Location: pulumi.String("us-central1"),
 * 			Name:     pulumi.String("my-terraform-ghe-connection"),
 * 			GithubEnterpriseConfig: &cloudbuildv2.ConnectionGithubEnterpriseConfigArgs{
 * 				HostUri:                    pulumi.String("https://ghe.com"),
 * 				PrivateKeySecretVersion:    private_key_secret_version.ID(),
 * 				WebhookSecretSecretVersion: webhook_secret_secret_version.ID(),
 * 				AppId:                      pulumi.Int(200),
 * 				AppSlug:                    pulumi.String("gcb-app"),
 * 				AppInstallationId:          pulumi.Int(300),
 * 			},
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		_, err = cloudbuildv2.NewRepository(ctx, "my-repository", &cloudbuildv2.RepositoryArgs{
 * 			Name:             pulumi.String("my-terraform-ghe-repo"),
 * 			Location:         pulumi.String("us-central1"),
 * 			ParentConnection: my_connection.Name,
 * 			RemoteUri:        pulumi.String("https://ghe.com/hashicorp/terraform-provider-google.git"),
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		return nil
 * 	})
 * }
 * ```
 * ```java
 * package generated_program;
 * import com.pulumi.Context;
 * import com.pulumi.Pulumi;
 * import com.pulumi.core.Output;
 * import com.pulumi.gcp.secretmanager.Secret;
 * import com.pulumi.gcp.secretmanager.SecretArgs;
 * import com.pulumi.gcp.secretmanager.inputs.SecretReplicationArgs;
 * import com.pulumi.gcp.secretmanager.inputs.SecretReplicationAutoArgs;
 * import com.pulumi.gcp.secretmanager.SecretVersion;
 * import com.pulumi.gcp.secretmanager.SecretVersionArgs;
 * import com.pulumi.gcp.organizations.OrganizationsFunctions;
 * import com.pulumi.gcp.organizations.inputs.GetIAMPolicyArgs;
 * import com.pulumi.gcp.secretmanager.SecretIamPolicy;
 * import com.pulumi.gcp.secretmanager.SecretIamPolicyArgs;
 * import com.pulumi.gcp.cloudbuildv2.Connection;
 * import com.pulumi.gcp.cloudbuildv2.ConnectionArgs;
 * import com.pulumi.gcp.cloudbuildv2.inputs.ConnectionGithubEnterpriseConfigArgs;
 * import com.pulumi.gcp.cloudbuildv2.Repository;
 * import com.pulumi.gcp.cloudbuildv2.RepositoryArgs;
 * import java.util.List;
 * import java.util.ArrayList;
 * import java.util.Map;
 * import java.io.File;
 * import java.nio.file.Files;
 * import java.nio.file.Paths;
 * public class App {
 *     public static void main(String[] args) {
 *         Pulumi.run(App::stack);
 *     }
 *     public static void stack(Context ctx) {
 *         var private_key_secret = new Secret("private-key-secret", SecretArgs.builder()
 *             .secretId("ghe-pk-secret")
 *             .replication(SecretReplicationArgs.builder()
 *                 .auto()
 *                 .build())
 *             .build());
 *         var private_key_secret_version = new SecretVersion("private-key-secret-version", SecretVersionArgs.builder()
 *             .secret(private_key_secret.id())
 *             .secretData(StdFunctions.file(FileArgs.builder()
 *                 .input("private-key.pem")
 *                 .build()).result())
 *             .build());
 *         var webhook_secret_secret = new Secret("webhook-secret-secret", SecretArgs.builder()
 *             .secretId("github-token-secret")
 *             .replication(SecretReplicationArgs.builder()
 *                 .auto()
 *                 .build())
 *             .build());
 *         var webhook_secret_secret_version = new SecretVersion("webhook-secret-secret-version", SecretVersionArgs.builder()
 *             .secret(webhook_secret_secret.id())
 *             .secretData("")
 *             .build());
 *         final var p4sa-secretAccessor = OrganizationsFunctions.getIAMPolicy(GetIAMPolicyArgs.builder()
 *             .bindings(GetIAMPolicyBindingArgs.builder()
 *                 .role("roles/secretmanager.secretAccessor")
 *                 .members("serviceAccount:[email protected]")
 *                 .build())
 *             .build());
 *         var policy_pk = new SecretIamPolicy("policy-pk", SecretIamPolicyArgs.builder()
 *             .secretId(private_key_secret.secretId())
 *             .policyData(p4sa_secretAccessor.policyData())
 *             .build());
 *         var policy_whs = new SecretIamPolicy("policy-whs", SecretIamPolicyArgs.builder()
 *             .secretId(webhook_secret_secret.secretId())
 *             .policyData(p4sa_secretAccessor.policyData())
 *             .build());
 *         var my_connection = new Connection("my-connection", ConnectionArgs.builder()
 *             .location("us-central1")
 *             .name("my-terraform-ghe-connection")
 *             .githubEnterpriseConfig(ConnectionGithubEnterpriseConfigArgs.builder()
 *                 .hostUri("https://ghe.com")
 *                 .privateKeySecretVersion(private_key_secret_version.id())
 *                 .webhookSecretSecretVersion(webhook_secret_secret_version.id())
 *                 .appId(200)
 *                 .appSlug("gcb-app")
 *                 .appInstallationId(300)
 *                 .build())
 *             .build());
 *         var my_repository = new Repository("my-repository", RepositoryArgs.builder()
 *             .name("my-terraform-ghe-repo")
 *             .location("us-central1")
 *             .parentConnection(my_connection.name())
 *             .remoteUri("https://ghe.com/hashicorp/terraform-provider-google.git")
 *             .build());
 *     }
 * }
 * ```
 * ```yaml
 * resources:
 *   private-key-secret:
 *     type: gcp:secretmanager:Secret
 *     properties:
 *       secretId: ghe-pk-secret
 *       replication:
 *         auto: {}
 *   private-key-secret-version:
 *     type: gcp:secretmanager:SecretVersion
 *     properties:
 *       secret: ${["private-key-secret"].id}
 *       secretData:
 *         fn::invoke:
 *           Function: std:file
 *           Arguments:
 *             input: private-key.pem
 *           Return: result
 *   webhook-secret-secret:
 *     type: gcp:secretmanager:Secret
 *     properties:
 *       secretId: github-token-secret
 *       replication:
 *         auto: {}
 *   webhook-secret-secret-version:
 *     type: gcp:secretmanager:SecretVersion
 *     properties:
 *       secret: ${["webhook-secret-secret"].id}
 *       secretData: 
 *   policy-pk:
 *     type: gcp:secretmanager:SecretIamPolicy
 *     properties:
 *       secretId: ${["private-key-secret"].secretId}
 *       policyData: ${["p4sa-secretAccessor"].policyData}
 *   policy-whs:
 *     type: gcp:secretmanager:SecretIamPolicy
 *     properties:
 *       secretId: ${["webhook-secret-secret"].secretId}
 *       policyData: ${["p4sa-secretAccessor"].policyData}
 *   my-connection:
 *     type: gcp:cloudbuildv2:Connection
 *     properties:
 *       location: us-central1
 *       name: my-terraform-ghe-connection
 *       githubEnterpriseConfig:
 *         hostUri: https://ghe.com
 *         privateKeySecretVersion: ${["private-key-secret-version"].id}
 *         webhookSecretSecretVersion: ${["webhook-secret-secret-version"].id}
 *         appId: 200
 *         appSlug: gcb-app
 *         appInstallationId: 300
 *   my-repository:
 *     type: gcp:cloudbuildv2:Repository
 *     properties:
 *       name: my-terraform-ghe-repo
 *       location: us-central1
 *       parentConnection: ${["my-connection"].name}
 *       remoteUri: https://ghe.com/hashicorp/terraform-provider-google.git
 * variables:
 *   p4sa-secretAccessor:
 *     fn::invoke:
 *       Function: gcp:organizations:getIAMPolicy
 *       Arguments:
 *         bindings:
 *           - role: roles/secretmanager.secretAccessor
 *             members:
 *               - serviceAccount:[email protected]
 * ```
 * 
 * ### Cloudbuildv2 Repository Github Doc
 * 
 * ```typescript
 * import * as pulumi from "@pulumi/pulumi";
 * import * as gcp from "@pulumi/gcp";
 * import * as std from "@pulumi/std";
 * const github_token_secret = new gcp.secretmanager.Secret("github-token-secret", {
 *     secretId: "github-token-secret",
 *     replication: {
 *         auto: {},
 *     },
 * });
 * const github_token_secret_version = new gcp.secretmanager.SecretVersion("github-token-secret-version", {
 *     secret: github_token_secret.id,
 *     secretData: std.file({
 *         input: "my-github-token.txt",
 *     }).then(invoke => invoke.result),
 * });
 * const p4sa-secretAccessor = gcp.organizations.getIAMPolicy({
 *     bindings: [{
 *         role: "roles/secretmanager.secretAccessor",
 *         members: ["serviceAccount:service-123456789@gcp-sa-cloudbuild.iam.gserviceaccount.com"],
 *     }],
 * });
 * const policy = new gcp.secretmanager.SecretIamPolicy("policy", {
 *     secretId: github_token_secret.secretId,
 *     policyData: p4sa_secretAccessor.then(p4sa_secretAccessor => p4sa_secretAccessor.policyData),
 * });
 * const my_connection = new gcp.cloudbuildv2.Connection("my-connection", {
 *     location: "us-central1",
 *     name: "my-connection",
 *     githubConfig: {
 *         appInstallationId: 123123,
 *         authorizerCredential: {
 *             oauthTokenSecretVersion: github_token_secret_version.id,
 *         },
 *     },
 * });
 * const my_repository = new gcp.cloudbuildv2.Repository("my-repository", {
 *     location: "us-central1",
 *     name: "my-repo",
 *     parentConnection: my_connection.name,
 *     remoteUri: "https://github.com/myuser/myrepo.git",
 * });
 * ```
 * ```python
 * import pulumi
 * import pulumi_gcp as gcp
 * import pulumi_std as std
 * github_token_secret = gcp.secretmanager.Secret("github-token-secret",
 *     secret_id="github-token-secret",
 *     replication=gcp.secretmanager.SecretReplicationArgs(
 *         auto=gcp.secretmanager.SecretReplicationAutoArgs(),
 *     ))
 * github_token_secret_version = gcp.secretmanager.SecretVersion("github-token-secret-version",
 *     secret=github_token_secret.id,
 *     secret_data=std.file(input="my-github-token.txt").result)
 * p4sa_secret_accessor = gcp.organizations.get_iam_policy(bindings=[gcp.organizations.GetIAMPolicyBindingArgs(
 *     role="roles/secretmanager.secretAccessor",
 *     members=["serviceAccount:service-123456789@gcp-sa-cloudbuild.iam.gserviceaccount.com"],
 * )])
 * policy = gcp.secretmanager.SecretIamPolicy("policy",
 *     secret_id=github_token_secret.secret_id,
 *     policy_data=p4sa_secret_accessor.policy_data)
 * my_connection = gcp.cloudbuildv2.Connection("my-connection",
 *     location="us-central1",
 *     name="my-connection",
 *     github_config=gcp.cloudbuildv2.ConnectionGithubConfigArgs(
 *         app_installation_id=123123,
 *         authorizer_credential=gcp.cloudbuildv2.ConnectionGithubConfigAuthorizerCredentialArgs(
 *             oauth_token_secret_version=github_token_secret_version.id,
 *         ),
 *     ))
 * my_repository = gcp.cloudbuildv2.Repository("my-repository",
 *     location="us-central1",
 *     name="my-repo",
 *     parent_connection=my_connection.name,
 *     remote_uri="https://github.com/myuser/myrepo.git")
 * ```
 * ```csharp
 * using System.Collections.Generic;
 * using System.Linq;
 * using Pulumi;
 * using Gcp = Pulumi.Gcp;
 * using Std = Pulumi.Std;
 * return await Deployment.RunAsync(() =>
 * {
 *     var github_token_secret = new Gcp.SecretManager.Secret("github-token-secret", new()
 *     {
 *         SecretId = "github-token-secret",
 *         Replication = new Gcp.SecretManager.Inputs.SecretReplicationArgs
 *         {
 *             Auto = null,
 *         },
 *     });
 *     var github_token_secret_version = new Gcp.SecretManager.SecretVersion("github-token-secret-version", new()
 *     {
 *         Secret = github_token_secret.Id,
 *         SecretData = Std.File.Invoke(new()
 *         {
 *             Input = "my-github-token.txt",
 *         }).Apply(invoke => invoke.Result),
 *     });
 *     var p4sa_secretAccessor = Gcp.Organizations.GetIAMPolicy.Invoke(new()
 *     {
 *         Bindings = new[]
 *         {
 *             new Gcp.Organizations.Inputs.GetIAMPolicyBindingInputArgs
 *             {
 *                 Role = "roles/secretmanager.secretAccessor",
 *                 Members = new[]
 *                 {
 *                     "serviceAccount:[email protected]",
 *                 },
 *             },
 *         },
 *     });
 *     var policy = new Gcp.SecretManager.SecretIamPolicy("policy", new()
 *     {
 *         SecretId = github_token_secret.SecretId,
 *         PolicyData = p4sa_secretAccessor.Apply(p4sa_secretAccessor => p4sa_secretAccessor.Apply(getIAMPolicyResult => getIAMPolicyResult.PolicyData)),
 *     });
 *     var my_connection = new Gcp.CloudBuildV2.Connection("my-connection", new()
 *     {
 *         Location = "us-central1",
 *         Name = "my-connection",
 *         GithubConfig = new Gcp.CloudBuildV2.Inputs.ConnectionGithubConfigArgs
 *         {
 *             AppInstallationId = 123123,
 *             AuthorizerCredential = new Gcp.CloudBuildV2.Inputs.ConnectionGithubConfigAuthorizerCredentialArgs
 *             {
 *                 OauthTokenSecretVersion = github_token_secret_version.Id,
 *             },
 *         },
 *     });
 *     var my_repository = new Gcp.CloudBuildV2.Repository("my-repository", new()
 *     {
 *         Location = "us-central1",
 *         Name = "my-repo",
 *         ParentConnection = my_connection.Name,
 *         RemoteUri = "https://github.com/myuser/myrepo.git",
 *     });
 * });
 * ```
 * ```go
 * package main
 * import (
 * 	"github.com/pulumi/pulumi-gcp/sdk/v7/go/gcp/cloudbuildv2"
 * 	"github.com/pulumi/pulumi-gcp/sdk/v7/go/gcp/organizations"
 * 	"github.com/pulumi/pulumi-gcp/sdk/v7/go/gcp/secretmanager"
 * 	"github.com/pulumi/pulumi-std/sdk/go/std"
 * 	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
 * )
 * func main() {
 * 	pulumi.Run(func(ctx *pulumi.Context) error {
 * 		_, err := secretmanager.NewSecret(ctx, "github-token-secret", &secretmanager.SecretArgs{
 * 			SecretId: pulumi.String("github-token-secret"),
 * 			Replication: &secretmanager.SecretReplicationArgs{
 * 				Auto: nil,
 * 			},
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		invokeFile, err := std.File(ctx, &std.FileArgs{
 * 			Input: "my-github-token.txt",
 * 		}, nil)
 * 		if err != nil {
 * 			return err
 * 		}
 * 		_, err = secretmanager.NewSecretVersion(ctx, "github-token-secret-version", &secretmanager.SecretVersionArgs{
 * 			Secret:     github_token_secret.ID(),
 * 			SecretData: invokeFile.Result,
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		p4sa_secretAccessor, err := organizations.LookupIAMPolicy(ctx, &organizations.LookupIAMPolicyArgs{
 * 			Bindings: []organizations.GetIAMPolicyBinding{
 * 				{
 * 					Role: "roles/secretmanager.secretAccessor",
 * 					Members: []string{
 * 						"serviceAccount:[email protected]",
 * 					},
 * 				},
 * 			},
 * 		}, nil)
 * 		if err != nil {
 * 			return err
 * 		}
 * 		_, err = secretmanager.NewSecretIamPolicy(ctx, "policy", &secretmanager.SecretIamPolicyArgs{
 * 			SecretId:   github_token_secret.SecretId,
 * 			PolicyData: pulumi.String(p4sa_secretAccessor.PolicyData),
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		_, err = cloudbuildv2.NewConnection(ctx, "my-connection", &cloudbuildv2.ConnectionArgs{
 * 			Location: pulumi.String("us-central1"),
 * 			Name:     pulumi.String("my-connection"),
 * 			GithubConfig: &cloudbuildv2.ConnectionGithubConfigArgs{
 * 				AppInstallationId: pulumi.Int(123123),
 * 				AuthorizerCredential: &cloudbuildv2.ConnectionGithubConfigAuthorizerCredentialArgs{
 * 					OauthTokenSecretVersion: github_token_secret_version.ID(),
 * 				},
 * 			},
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		_, err = cloudbuildv2.NewRepository(ctx, "my-repository", &cloudbuildv2.RepositoryArgs{
 * 			Location:         pulumi.String("us-central1"),
 * 			Name:             pulumi.String("my-repo"),
 * 			ParentConnection: my_connection.Name,
 * 			RemoteUri:        pulumi.String("https://github.com/myuser/myrepo.git"),
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		return nil
 * 	})
 * }
 * ```
 * ```java
 * package generated_program;
 * import com.pulumi.Context;
 * import com.pulumi.Pulumi;
 * import com.pulumi.core.Output;
 * import com.pulumi.gcp.secretmanager.Secret;
 * import com.pulumi.gcp.secretmanager.SecretArgs;
 * import com.pulumi.gcp.secretmanager.inputs.SecretReplicationArgs;
 * import com.pulumi.gcp.secretmanager.inputs.SecretReplicationAutoArgs;
 * import com.pulumi.gcp.secretmanager.SecretVersion;
 * import com.pulumi.gcp.secretmanager.SecretVersionArgs;
 * import com.pulumi.gcp.organizations.OrganizationsFunctions;
 * import com.pulumi.gcp.organizations.inputs.GetIAMPolicyArgs;
 * import com.pulumi.gcp.secretmanager.SecretIamPolicy;
 * import com.pulumi.gcp.secretmanager.SecretIamPolicyArgs;
 * import com.pulumi.gcp.cloudbuildv2.Connection;
 * import com.pulumi.gcp.cloudbuildv2.ConnectionArgs;
 * import com.pulumi.gcp.cloudbuildv2.inputs.ConnectionGithubConfigArgs;
 * import com.pulumi.gcp.cloudbuildv2.inputs.ConnectionGithubConfigAuthorizerCredentialArgs;
 * import com.pulumi.gcp.cloudbuildv2.Repository;
 * import com.pulumi.gcp.cloudbuildv2.RepositoryArgs;
 * import java.util.List;
 * import java.util.ArrayList;
 * import java.util.Map;
 * import java.io.File;
 * import java.nio.file.Files;
 * import java.nio.file.Paths;
 * public class App {
 *     public static void main(String[] args) {
 *         Pulumi.run(App::stack);
 *     }
 *     public static void stack(Context ctx) {
 *         var github_token_secret = new Secret("github-token-secret", SecretArgs.builder()
 *             .secretId("github-token-secret")
 *             .replication(SecretReplicationArgs.builder()
 *                 .auto()
 *                 .build())
 *             .build());
 *         var github_token_secret_version = new SecretVersion("github-token-secret-version", SecretVersionArgs.builder()
 *             .secret(github_token_secret.id())
 *             .secretData(StdFunctions.file(FileArgs.builder()
 *                 .input("my-github-token.txt")
 *                 .build()).result())
 *             .build());
 *         final var p4sa-secretAccessor = OrganizationsFunctions.getIAMPolicy(GetIAMPolicyArgs.builder()
 *             .bindings(GetIAMPolicyBindingArgs.builder()
 *                 .role("roles/secretmanager.secretAccessor")
 *                 .members("serviceAccount:[email protected]")
 *                 .build())
 *             .build());
 *         var policy = new SecretIamPolicy("policy", SecretIamPolicyArgs.builder()
 *             .secretId(github_token_secret.secretId())
 *             .policyData(p4sa_secretAccessor.policyData())
 *             .build());
 *         var my_connection = new Connection("my-connection", ConnectionArgs.builder()
 *             .location("us-central1")
 *             .name("my-connection")
 *             .githubConfig(ConnectionGithubConfigArgs.builder()
 *                 .appInstallationId(123123)
 *                 .authorizerCredential(ConnectionGithubConfigAuthorizerCredentialArgs.builder()
 *                     .oauthTokenSecretVersion(github_token_secret_version.id())
 *                     .build())
 *                 .build())
 *             .build());
 *         var my_repository = new Repository("my-repository", RepositoryArgs.builder()
 *             .location("us-central1")
 *             .name("my-repo")
 *             .parentConnection(my_connection.name())
 *             .remoteUri("https://github.com/myuser/myrepo.git")
 *             .build());
 *     }
 * }
 * ```
 * ```yaml
 * resources:
 *   github-token-secret:
 *     type: gcp:secretmanager:Secret
 *     properties:
 *       secretId: github-token-secret
 *       replication:
 *         auto: {}
 *   github-token-secret-version:
 *     type: gcp:secretmanager:SecretVersion
 *     properties:
 *       secret: ${["github-token-secret"].id}
 *       secretData:
 *         fn::invoke:
 *           Function: std:file
 *           Arguments:
 *             input: my-github-token.txt
 *           Return: result
 *   policy:
 *     type: gcp:secretmanager:SecretIamPolicy
 *     properties:
 *       secretId: ${["github-token-secret"].secretId}
 *       policyData: ${["p4sa-secretAccessor"].policyData}
 *   my-connection:
 *     type: gcp:cloudbuildv2:Connection
 *     properties:
 *       location: us-central1
 *       name: my-connection
 *       githubConfig:
 *         appInstallationId: 123123
 *         authorizerCredential:
 *           oauthTokenSecretVersion: ${["github-token-secret-version"].id}
 *   my-repository:
 *     type: gcp:cloudbuildv2:Repository
 *     properties:
 *       location: us-central1
 *       name: my-repo
 *       parentConnection: ${["my-connection"].name}
 *       remoteUri: https://github.com/myuser/myrepo.git
 * variables:
 *   p4sa-secretAccessor:
 *     fn::invoke:
 *       Function: gcp:organizations:getIAMPolicy
 *       Arguments:
 *         bindings:
 *           - role: roles/secretmanager.secretAccessor
 *             members:
 *               - serviceAccount:[email protected]
 * ```
 * 
 * ## Import
 * Repository can be imported using any of these accepted formats:
 * * `projects/{{project}}/locations/{{location}}/connections/{{parent_connection}}/repositories/{{name}}`
 * * `{{project}}/{{location}}/{{parent_connection}}/{{name}}`
 * * `{{location}}/{{parent_connection}}/{{name}}`
 * When using the `pulumi import` command, Repository can be imported using one of the formats above. For example:
 * ```sh
 * $ pulumi import gcp:cloudbuildv2/repository:Repository default projects/{{project}}/locations/{{location}}/connections/{{parent_connection}}/repositories/{{name}}
 * ```
 * ```sh
 * $ pulumi import gcp:cloudbuildv2/repository:Repository default {{project}}/{{location}}/{{parent_connection}}/{{name}}
 * ```
 * ```sh
 * $ pulumi import gcp:cloudbuildv2/repository:Repository default {{location}}/{{parent_connection}}/{{name}}
 * ```
 * @property annotations Allows clients to store small amounts of arbitrary data.
 * **Note**: This field is non-authoritative, and will only manage the annotations present in your configuration.
 * Please refer to the field `effective_annotations` for all of the annotations present on the resource.
 * @property location The location for the resource
 * @property name Name of the repository.
 * @property parentConnection The connection for the resource
 * - - -
 * @property project The ID of the project in which the resource belongs.
 * If it is not provided, the provider project is used.
 * @property remoteUri Required. Git Clone HTTPS URI.
 */
public data class RepositoryArgs(
    public val annotations: Output>? = null,
    public val location: Output? = null,
    public val name: Output? = null,
    public val parentConnection: Output? = null,
    public val project: Output? = null,
    public val remoteUri: Output? = null,
) : ConvertibleToJava {
    override fun toJava(): com.pulumi.gcp.cloudbuildv2.RepositoryArgs =
        com.pulumi.gcp.cloudbuildv2.RepositoryArgs.builder()
            .annotations(
                annotations?.applyValue({ args0 ->
                    args0.map({ args0 ->
                        args0.key.to(args0.value)
                    }).toMap()
                }),
            )
            .location(location?.applyValue({ args0 -> args0 }))
            .name(name?.applyValue({ args0 -> args0 }))
            .parentConnection(parentConnection?.applyValue({ args0 -> args0 }))
            .project(project?.applyValue({ args0 -> args0 }))
            .remoteUri(remoteUri?.applyValue({ args0 -> args0 })).build()
}

/**
 * Builder for [RepositoryArgs].
 */
@PulumiTagMarker
public class RepositoryArgsBuilder internal constructor() {
    private var annotations: Output>? = null

    private var location: Output? = null

    private var name: Output? = null

    private var parentConnection: Output? = null

    private var project: Output? = null

    private var remoteUri: Output? = null

    /**
     * @param value Allows clients to store small amounts of arbitrary data.
     * **Note**: This field is non-authoritative, and will only manage the annotations present in your configuration.
     * Please refer to the field `effective_annotations` for all of the annotations present on the resource.
     */
    @JvmName("lbbwaugprliavfjj")
    public suspend fun annotations(`value`: Output>) {
        this.annotations = value
    }

    /**
     * @param value The location for the resource
     */
    @JvmName("hmrmdmpkigvrfjkk")
    public suspend fun location(`value`: Output) {
        this.location = value
    }

    /**
     * @param value Name of the repository.
     */
    @JvmName("wwgyadpgtkiooekn")
    public suspend fun name(`value`: Output) {
        this.name = value
    }

    /**
     * @param value The connection for the resource
     * - - -
     */
    @JvmName("qouihtokomdyyulf")
    public suspend fun parentConnection(`value`: Output) {
        this.parentConnection = value
    }

    /**
     * @param value The ID of the project in which the resource belongs.
     * If it is not provided, the provider project is used.
     */
    @JvmName("ekmdvraxwavufheg")
    public suspend fun project(`value`: Output) {
        this.project = value
    }

    /**
     * @param value Required. Git Clone HTTPS URI.
     */
    @JvmName("hrcenvumgyehsjwk")
    public suspend fun remoteUri(`value`: Output) {
        this.remoteUri = value
    }

    /**
     * @param value Allows clients to store small amounts of arbitrary data.
     * **Note**: This field is non-authoritative, and will only manage the annotations present in your configuration.
     * Please refer to the field `effective_annotations` for all of the annotations present on the resource.
     */
    @JvmName("qvskltflecktpilh")
    public suspend fun annotations(`value`: Map?) {
        val toBeMapped = value
        val mapped = toBeMapped?.let({ args0 -> of(args0) })
        this.annotations = mapped
    }

    /**
     * @param values Allows clients to store small amounts of arbitrary data.
     * **Note**: This field is non-authoritative, and will only manage the annotations present in your configuration.
     * Please refer to the field `effective_annotations` for all of the annotations present on the resource.
     */
    @JvmName("pqgyobjomiwutovs")
    public fun annotations(vararg values: Pair) {
        val toBeMapped = values.toMap()
        val mapped = toBeMapped.let({ args0 -> of(args0) })
        this.annotations = mapped
    }

    /**
     * @param value The location for the resource
     */
    @JvmName("xcxswtpgjmytasct")
    public suspend fun location(`value`: String?) {
        val toBeMapped = value
        val mapped = toBeMapped?.let({ args0 -> of(args0) })
        this.location = mapped
    }

    /**
     * @param value Name of the repository.
     */
    @JvmName("eqncvlrmfmhqdmgc")
    public suspend fun name(`value`: String?) {
        val toBeMapped = value
        val mapped = toBeMapped?.let({ args0 -> of(args0) })
        this.name = mapped
    }

    /**
     * @param value The connection for the resource
     * - - -
     */
    @JvmName("mnafmmbksadimxmo")
    public suspend fun parentConnection(`value`: String?) {
        val toBeMapped = value
        val mapped = toBeMapped?.let({ args0 -> of(args0) })
        this.parentConnection = mapped
    }

    /**
     * @param value The ID of the project in which the resource belongs.
     * If it is not provided, the provider project is used.
     */
    @JvmName("vdkjenkccwcfseyr")
    public suspend fun project(`value`: String?) {
        val toBeMapped = value
        val mapped = toBeMapped?.let({ args0 -> of(args0) })
        this.project = mapped
    }

    /**
     * @param value Required. Git Clone HTTPS URI.
     */
    @JvmName("mraeemxlqnuusahf")
    public suspend fun remoteUri(`value`: String?) {
        val toBeMapped = value
        val mapped = toBeMapped?.let({ args0 -> of(args0) })
        this.remoteUri = mapped
    }

    internal fun build(): RepositoryArgs = RepositoryArgs(
        annotations = annotations,
        location = location,
        name = name,
        parentConnection = parentConnection,
        project = project,
        remoteUri = remoteUri,
    )
}




© 2015 - 2024 Weber Informatics LLC | Privacy Policy