You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CHANGELOG.md
+20
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,24 @@
1
1
2
+
## 17.2.0 (2024-07-18)
3
+
4
+
This release was tested against GitLab 17.2, 17.1, and 17.0 for both CE and EE
5
+
6
+
### BREAKING CHANGES (1 change)
7
+
Note: As a security related change, this breaking change is allowed outside a major release. If a non-sensitive token is required for migration purposes users can use the `nonsensitive()` TF function.
8
+
9
+
- resource/gitlab_cluster_agent_token: [Mark GitLab cluster agent token as sensitive](gitlab-org/terraform-provider-gitlab@1eec1065723f6393a3e5deb45356a47ec27b575e) by @CarbonCollins ([merge request](gitlab-org/terraform-provider-gitlab!2032))
10
+
11
+
### IMPROVEMENTS (1 change)
12
+
13
+
-**New Resource** resource/gitlab_project_security_policy_attachment: [Add new resource for associating security policy projects to a project](gitlab-org/terraform-provider-gitlab@3fc5f6c8a9d74f8b034af84a73fb9dcb6d323179) by @PatrickRice ([merge request](gitlab-org/terraform-provider-gitlab!2009))
14
+
- resource/gitlab_personal_access_token: [Migrate `gitlab_personal_access_token` from SDK to TF Plugin Framework](gitlab-org/terraform-provider-gitlab@24489118da1ce464994cdfcedecbe804edf65490) by @theipster ([merge request](gitlab-org/terraform-provider-gitlab!2005))
15
+
-
16
+
17
+
### BUG FIXES (4 changes)
18
+
19
+
- resource/gitlab_deploy_key: [Fix deploy key documentation reference to point to the correct resource for enabling a pre-existing deploy key](gitlab-org/terraform-provider-gitlab@f8718e66a5608c521009d091761b5577a055e904) by @blrz ([merge request](gitlab-org/terraform-provider-gitlab!2024))
20
+
- resource/gitlab_user_runner: [Fix an issue with gitlab_user_runner causing inconsistent TF plans](gitlab-org/terraform-provider-gitlab@a5448baf255134f0d0bff5fe16803ee4cf35ce61) by @PatrickRice ([merge request](gitlab-org/terraform-provider-gitlab!2020))
21
+
2
22
## 17.1.0 (2024-06-20)
3
23
4
24
This release was tested against GitLab 17.1, 17.0, and 16.11 for both CE and EE
The gitlab_personal_access_token resource allows to manage the lifecycle of a personal access token for a specified user.
6
+
The gitlab_personal_access_token resource allows to manage the lifecycle of a personal access token.
7
7
-> This resource requires administration privileges.
8
-
Upstream API: GitLab REST API docs https://docs.gitlab.com/ee/api/personal_access_tokens.html
8
+
~> Use of the timestamp() function with expires_at will cause the resource to be re-created with every apply, it's recommended to use plantimestamp() or a static value instead.
9
+
~> Observability scopes are in beta and may not work on all instances. See more details in the documentation https://docs.gitlab.com/ee/operations/tracing.html
10
+
~> Due to Automatic reuse detection https://docs.gitlab.com/ee/api/personal_access_tokens.html#automatic-reuse-detection it's possible that a new Personal Access Token will immediately be revoked. Check if an old process using the old token is running if this happens.
11
+
Upstream API: GitLab API docs https://docs.gitlab.com/ee/api/personal_access_tokens.html
9
12
---
10
13
11
14
# gitlab_personal_access_token (Resource)
12
15
13
-
The `gitlab_personal_access_token` resource allows to manage the lifecycle of a personal access token for a specified user.
16
+
The `gitlab_personal_access_token` resource allows to manage the lifecycle of a personal access token.
14
17
15
18
-> This resource requires administration privileges.
16
19
17
-
**Upstream API**: [GitLab REST API docs](https://docs.gitlab.com/ee/api/personal_access_tokens.html)
20
+
~> Use of the `timestamp()` function with expires_at will cause the resource to be re-created with every apply, it's recommended to use `plantimestamp()` or a static value instead.
21
+
22
+
~> Observability scopes are in beta and may not work on all instances. See more details in [the documentation](https://docs.gitlab.com/ee/operations/tracing.html)
23
+
24
+
~> Due to [Automatic reuse detection](https://docs.gitlab.com/ee/api/personal_access_tokens.html#automatic-reuse-detection) it's possible that a new Personal Access Token will immediately be revoked. Check if an old process using the old token is running if this happens.
25
+
26
+
**Upstream API**: [GitLab API docs](https://docs.gitlab.com/ee/api/personal_access_tokens.html)
-`name` (String) The name of the personal access token.
43
-
-`scopes` (Set of String) The scope for the personal access token. It determines the actions which can be performed when authenticating with this token. Valid values are: `api`, `read_user`, `read_api`, `read_repository`, `write_repository`, `read_registry`, `write_registry`, `sudo`, `admin_mode`, `create_runner`, `manage_runner`.
44
-
-`user_id` (Number) The id of the user.
52
+
-`scopes` (Set of String) The scopes of the personal access token. valid values are: `api`, `read_user`, `read_api`, `read_repository`, `write_repository`, `read_registry`, `write_registry`, `sudo`, `admin_mode`, `create_runner`, `manage_runner`, `ai_features`, `k8s_proxy`, `read_service_ping`
53
+
-`user_id` (Number) The ID of the user.
45
54
46
55
### Optional
47
56
48
-
-`expires_at` (String) The token expires at midnight UTC on that date. The date must be in the format YYYY-MM-DD.
57
+
-`expires_at` (String) When the token will expire, YYYY-MM-DD format.
49
58
50
59
### Read-Only
51
60
52
61
-`active` (Boolean) True if the token is active.
53
62
-`created_at` (String) Time the token has been created, RFC3339 format.
54
-
-`id` (String) The ID of this resource.
63
+
-`id` (String) The ID of the personal access token.
55
64
-`revoked` (Boolean) True if the token is revoked.
56
-
-`token` (String, Sensitive) The personal access token. This is only populated when creating a new personal access token. This attribute is not available for imported resources.
65
+
-`token` (String, Sensitive) The token of the personal access token. **Note**: the token is not available for imported resources.
-`policy_project` (String) The ID or Full Path of the security policy project.
74
+
-`project` (String) The ID or Full Path of the project which will have the security policy project assigned to it.
75
+
76
+
### Read-Only
77
+
78
+
-`id` (String) The ID of this Terraform resource. In the format of `<project>:<policy_project>`.
79
+
-`policy_project_graphql_id` (String) The GraphQL ID of the security policy project.
80
+
-`project_graphql_id` (String) The GraphQL ID of the project to which the security policty project will be attached.
81
+
82
+
## Import
83
+
84
+
Import is supported using the following syntax:
85
+
86
+
```shell
87
+
# GitLab project security policy attachments can be imported using an id made up of `project:policy_project_id` where the policy project ID is the project ID of the policy project, e.g.
0 commit comments