You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- resource/gitlab_personal_access_token: Support `admin_mode` as value in the `scopes` attribute ([#1456](https://gitlab.com/gitlab-org/terraform-provider-gitlab/-/merge_requests/1456))
13
+
- resource/gitlab_group: Remove explicit attribute defaults. This solves an issue where newly imported resources may have plan changes for default attributes. In some cases, the new API-based default values are more permissive than the old provider-based defaults. See The linked MR for details. ([#1479](https://gitlab.com/gitlab-org/terraform-provider-gitlab/-/merge_requests/1479))
14
+
- resource/gitlab_repository_file: Add validator to avoid leading `/` and `./` in path ([#1472](https://gitlab.com/gitlab-org/terraform-provider-gitlab/-/merge_requests/1472))
15
+
- resource/gitlab_project: Deprecate the `name_regex_delete` in favor of the `name_regex` attribute ([#1466](https://gitlab.com/gitlab-org/terraform-provider-gitlab/-/merge_requests/1466))
16
+
- resource/gitlab_project: Support `environments_access_level` attribute ([#1469](https://gitlab.com/gitlab-org/terraform-provider-gitlab/-/merge_requests/1469))
17
+
- resource/gitlab_project: Support `feature_flags_access_level` attribute ([#1469](https://gitlab.com/gitlab-org/terraform-provider-gitlab/-/merge_requests/1469))
18
+
- resource/gitlab_project: Support `infrastructure_access_level` attribute ([#1469](https://gitlab.com/gitlab-org/terraform-provider-gitlab/-/merge_requests/1469))
19
+
- resource/gitlab_project: Support `monitor_access_level` attribute ([#1469](https://gitlab.com/gitlab-org/terraform-provider-gitlab/-/merge_requests/1469))
20
+
- resource/gitlab_project: Support `release_access_level` attribute ([#1469](https://gitlab.com/gitlab-org/terraform-provider-gitlab/-/merge_requests/1469))
21
+
- datasource/gitlab_project: Mark `runners_token` as sensitive ([#1461](https://gitlab.com/gitlab-org/terraform-provider-gitlab/-/merge_requests/1461))
22
+
- datasource/gitlab_project: Support `environments_access_level` attribute ([#1469](https://gitlab.com/gitlab-org/terraform-provider-gitlab/-/merge_requests/1469))
23
+
- datasource/gitlab_project: Support `feature_flags_access_level` attribute ([#1469](https://gitlab.com/gitlab-org/terraform-provider-gitlab/-/merge_requests/1469))
24
+
- datasource/gitlab_project: Support `infrastructure_access_level` attribute ([#1469](https://gitlab.com/gitlab-org/terraform-provider-gitlab/-/merge_requests/1469))
25
+
- datasource/gitlab_project: Support `monitor_access_level` attribute ([#1469](https://gitlab.com/gitlab-org/terraform-provider-gitlab/-/merge_requests/1469))
26
+
- datasource/gitlab_project: Support `release_access_level` attribute ([#1469](https://gitlab.com/gitlab-org/terraform-provider-gitlab/-/merge_requests/1469))
27
+
- datasource/gitlab_projects: Support `environments_access_level` attribute ([#1469](https://gitlab.com/gitlab-org/terraform-provider-gitlab/-/merge_requests/1469))
28
+
- datasource/gitlab_projects: Support `feature_flags_access_level` attribute ([#1469](https://gitlab.com/gitlab-org/terraform-provider-gitlab/-/merge_requests/1469))
29
+
- datasource/gitlab_projects: Support `infrastructure_access_level` attribute ([#1469](https://gitlab.com/gitlab-org/terraform-provider-gitlab/-/merge_requests/1469))
30
+
- datasource/gitlab_projects: Support `monitor_access_level` attribute ([#1469](https://gitlab.com/gitlab-org/terraform-provider-gitlab/-/merge_requests/1469))
31
+
- datasource/gitlab_projects: Support `release_access_level` attribute ([#1469](https://gitlab.com/gitlab-org/terraform-provider-gitlab/-/merge_requests/1469))
32
+
33
+
BUG FIXES:
34
+
35
+
- resource/gitlab_project: Add validator to the `id` attribute to prevent misuse ([#1476](https://gitlab.com/gitlab-org/terraform-provider-gitlab/-/merge_requests/1476))
36
+
- resource/gitlab_group: Wait for the group to be fully created and functional ([#1465](https://gitlab.com/gitlab-org/terraform-provider-gitlab/-/merge_requests/1465))
37
+
- resource/gitlab_service_slack: Fix perpetual diff in `webhook` attribute due to upstream API deprecation ([#1470](https://gitlab.com/gitlab-org/terraform-provider-gitlab/-/merge_requests/1470))
38
+
- resource/gitlab_service_microsoft_teams: Fix perpetual diff in `webhook` attribute due to upstream API deprecation ([#1470](https://gitlab.com/gitlab-org/terraform-provider-gitlab/-/merge_requests/1470))
39
+
1
40
## 15.9.0 (2023-02-22)
2
41
3
42
This release was tested against GitLab 15.7, 15.8 and 15.9 for both CE and EE.
-`environments_access_level` (String) Set the environments access level. Valid values are `disabled`, `private`, `enabled`.
56
59
-`external_authorization_classification_label` (String) The classification label for the project.
60
+
-`feature_flags_access_level` (String) Set the feature flags access level. Valid values are `disabled`, `private`, `enabled`.
57
61
-`forking_access_level` (String) Set the forking access level. Valid values are `disabled`, `private`, `enabled`.
58
62
-`http_url_to_repo` (String) URL that can be provided to `git clone` to clone the
59
63
-`import_url` (String) URL the project was imported from.
64
+
-`infrastructure_access_level` (String) Set the infrastructure access level. Valid values are `disabled`, `private`, `enabled`.
60
65
-`issues_access_level` (String) Set the issues access level. Valid values are `disabled`, `private`, `enabled`.
61
66
-`issues_enabled` (Boolean) Enable issue tracking for the project.
62
67
-`lfs_enabled` (Boolean) Enable LFS for the project.
@@ -65,21 +70,23 @@ data "gitlab_project" "example" {
65
70
-`merge_requests_access_level` (String) Set the merge requests access level. Valid values are `disabled`, `private`, `enabled`.
66
71
-`merge_requests_enabled` (Boolean) Enable merge requests for the project.
67
72
-`merge_trains_enabled` (Boolean) Enable or disable merge trains.
73
+
-`monitor_access_level` (String) Set the monitor access level. Valid values are `disabled`, `private`, `enabled`.
68
74
-`name` (String) The name of the project.
69
75
-`namespace_id` (Number) The namespace (group or user) of the project. Defaults to your user.
70
76
-`operations_access_level` (String) Set the operations access level. Valid values are `disabled`, `private`, `enabled`.
71
77
-`path` (String) The path of the repository.
72
78
-`pipelines_enabled` (Boolean) Enable pipelines for the project.
73
79
-`printing_merge_request_link_enabled` (Boolean) Show link to create/view merge request when pushing from the command line
74
80
-`push_rules` (List of Object) Push rules for the project. Push rules are only available on Enterprise plans and if the authenticated has permissions to read them. (see [below for nested schema](#nestedatt--push_rules))
81
+
-`releases_access_level` (String) Set the releases access level. Valid values are `disabled`, `private`, `enabled`.
75
82
-`remove_source_branch_after_merge` (Boolean) Enable `Delete source branch` option by default for all new merge requests
76
83
-`repository_access_level` (String) Set the repository access level. Valid values are `disabled`, `private`, `enabled`.
77
84
-`repository_storage` (String) Which storage shard the repository is on. (administrator only)
78
85
-`request_access_enabled` (Boolean) Allow users to request member access.
79
86
-`requirements_access_level` (String) Set the requirements access level. Valid values are `disabled`, `private`, `enabled`.
80
87
-`resolve_outdated_diff_discussions` (Boolean) Automatically resolve merge request diffs discussions on lines changed with a push.
81
88
-`restrict_user_defined_variables` (Boolean) Allow only users with the Maintainer role to pass user-defined variables when triggering a pipeline.
82
-
-`runners_token` (String) Registration token to use during runner setup.
89
+
-`runners_token` (String, Sensitive) Registration token to use during runner setup.
83
90
-`security_and_compliance_access_level` (String) Set the security and compliance access level. Valid values are `disabled`, `private`, `enabled`.
84
91
-`snippets_access_level` (String) Set the snippets access level. Valid values are `disabled`, `private`, `enabled`.
85
92
-`snippets_enabled` (Boolean) Enable snippets for the project.
The gitlab_application resource allows to manage the lifecycle of applications in gitlab.
7
+
~> In order to use a user for a user to create an application, they must have admin priviledges at the instance level.
8
+
To create an OIDC application, a scope of "openid".
9
+
Upstream API: GitLab REST API docs https://docs.gitlab.com/ee/api/applications.html
10
+
---
11
+
12
+
# gitlab_application (Resource)
13
+
14
+
The `gitlab_application` resource allows to manage the lifecycle of applications in gitlab.
15
+
16
+
~> In order to use a user for a user to create an application, they must have admin priviledges at the instance level.
17
+
To create an OIDC application, a scope of "openid".
18
+
19
+
**Upstream API**: [GitLab REST API docs](https://docs.gitlab.com/ee/api/applications.html)
20
+
21
+
## Example Usage
22
+
23
+
```terraform
24
+
resource "gitlab_application" "oidc" {
25
+
confidential = true
26
+
scopes = ["openid"]
27
+
name = "company_oidc"
28
+
redirect_url = "https://mycompany.com"
29
+
}
30
+
```
31
+
32
+
<!-- schema generated by tfplugindocs -->
33
+
## Schema
34
+
35
+
### Required
36
+
37
+
-`name` (String) Name of the application.
38
+
-`redirect_url` (String) The URL gitlab should send the user to after authentication.
39
+
-`scopes` (Set of String) Scopes of the application. Use "openid" if you plan to use this as an oidc authentication application. Valid options are: `api`, `read_api`, `read_user`, `read_repository`, `write_repository`, `read_registry`, `write_registry`, `sudo`, `admin_mode`, `openid`, `profile`, `email`.
40
+
This is only populated when creating a new application. This attribute is not available for imported resources
41
+
42
+
### Optional
43
+
44
+
-`confidential` (Boolean) The application is used where the client secret can be kept confidential. Native mobile apps and Single Page Apps are considered non-confidential. Defaults to true if not supplied
45
+
46
+
### Read-Only
47
+
48
+
-`application_id` (String) Internal name of the application.
49
+
-`id` (String) The ID of this Terraform resource. In the format of `<application_id>`.
50
+
-`secret` (String, Sensitive) Application secret. Sensative and must be kept secret. This is only populated when creating a new application. This attribute is not available for imported resources.
51
+
52
+
## Import
53
+
54
+
Import is supported using the following syntax:
55
+
56
+
```shell
57
+
# Gitlab applications can be imported with their id, e.g.
-`name` (String) The name of the personal access token.
43
-
-`scopes` (Set of String) The scope for the personal access token. It determines the actions which can be performed when authenticating with this token. Valid values are: `api`, `read_user`, `read_api`, `read_repository`, `write_repository`, `read_registry`, `write_registry`, `sudo`.
43
+
-`scopes` (Set of String) The scope for the personal access token. It determines the actions which can be performed when authenticating with this token. Valid values are: `api`, `read_user`, `read_api`, `read_repository`, `write_repository`, `read_registry`, `write_registry`, `sudo`, `admin_mode`.
0 commit comments