1. Packages
  2. Google Cloud (GCP) Classic
  3. API Docs
  4. cloudbuildv2
  5. Repository
Google Cloud Classic v8.9.3 published on Monday, Nov 18, 2024 by Pulumi

gcp.cloudbuildv2.Repository

Explore with Pulumi AI

gcp logo
Google Cloud Classic v8.9.3 published on Monday, Nov 18, 2024 by Pulumi

    A repository associated to a parent connection.

    To get more information about Repository, see:

    Example Usage

    Cloudbuildv2 Repository Ghe Doc

    import * as pulumi from "@pulumi/pulumi";
    import * as gcp from "@pulumi/gcp";
    import * as std from "@pulumi/std";
    
    const private_key_secret = new gcp.secretmanager.Secret("private-key-secret", {
        secretId: "ghe-pk-secret",
        replication: {
            auto: {},
        },
    });
    const private_key_secret_version = new gcp.secretmanager.SecretVersion("private-key-secret-version", {
        secret: private_key_secret.id,
        secretData: std.file({
            input: "private-key.pem",
        }).then(invoke => invoke.result),
    });
    const webhook_secret_secret = new gcp.secretmanager.Secret("webhook-secret-secret", {
        secretId: "github-token-secret",
        replication: {
            auto: {},
        },
    });
    const webhook_secret_secret_version = new gcp.secretmanager.SecretVersion("webhook-secret-secret-version", {
        secret: webhook_secret_secret.id,
        secretData: "<webhook-secret-data>",
    });
    const p4sa-secretAccessor = gcp.organizations.getIAMPolicy({
        bindings: [{
            role: "roles/secretmanager.secretAccessor",
            members: ["serviceAccount:service-123456789@gcp-sa-cloudbuild.iam.gserviceaccount.com"],
        }],
    });
    const policy_pk = new gcp.secretmanager.SecretIamPolicy("policy-pk", {
        secretId: private_key_secret.secretId,
        policyData: p4sa_secretAccessor.then(p4sa_secretAccessor => p4sa_secretAccessor.policyData),
    });
    const policy_whs = new gcp.secretmanager.SecretIamPolicy("policy-whs", {
        secretId: webhook_secret_secret.secretId,
        policyData: p4sa_secretAccessor.then(p4sa_secretAccessor => p4sa_secretAccessor.policyData),
    });
    const my_connection = new gcp.cloudbuildv2.Connection("my-connection", {
        location: "us-central1",
        name: "my-terraform-ghe-connection",
        githubEnterpriseConfig: {
            hostUri: "https://ghe.com",
            privateKeySecretVersion: private_key_secret_version.id,
            webhookSecretSecretVersion: webhook_secret_secret_version.id,
            appId: 200,
            appSlug: "gcb-app",
            appInstallationId: 300,
        },
    }, {
        dependsOn: [
            policy_pk,
            policy_whs,
        ],
    });
    const my_repository = new gcp.cloudbuildv2.Repository("my-repository", {
        name: "my-terraform-ghe-repo",
        location: "us-central1",
        parentConnection: my_connection.name,
        remoteUri: "https://ghe.com/hashicorp/terraform-provider-google.git",
    });
    
    import pulumi
    import pulumi_gcp as gcp
    import pulumi_std as std
    
    private_key_secret = gcp.secretmanager.Secret("private-key-secret",
        secret_id="ghe-pk-secret",
        replication={
            "auto": {},
        })
    private_key_secret_version = gcp.secretmanager.SecretVersion("private-key-secret-version",
        secret=private_key_secret.id,
        secret_data=std.file(input="private-key.pem").result)
    webhook_secret_secret = gcp.secretmanager.Secret("webhook-secret-secret",
        secret_id="github-token-secret",
        replication={
            "auto": {},
        })
    webhook_secret_secret_version = gcp.secretmanager.SecretVersion("webhook-secret-secret-version",
        secret=webhook_secret_secret.id,
        secret_data="<webhook-secret-data>")
    p4sa_secret_accessor = gcp.organizations.get_iam_policy(bindings=[{
        "role": "roles/secretmanager.secretAccessor",
        "members": ["serviceAccount:service-123456789@gcp-sa-cloudbuild.iam.gserviceaccount.com"],
    }])
    policy_pk = gcp.secretmanager.SecretIamPolicy("policy-pk",
        secret_id=private_key_secret.secret_id,
        policy_data=p4sa_secret_accessor.policy_data)
    policy_whs = gcp.secretmanager.SecretIamPolicy("policy-whs",
        secret_id=webhook_secret_secret.secret_id,
        policy_data=p4sa_secret_accessor.policy_data)
    my_connection = gcp.cloudbuildv2.Connection("my-connection",
        location="us-central1",
        name="my-terraform-ghe-connection",
        github_enterprise_config={
            "host_uri": "https://ghe.com",
            "private_key_secret_version": private_key_secret_version.id,
            "webhook_secret_secret_version": webhook_secret_secret_version.id,
            "app_id": 200,
            "app_slug": "gcb-app",
            "app_installation_id": 300,
        },
        opts = pulumi.ResourceOptions(depends_on=[
                policy_pk,
                policy_whs,
            ]))
    my_repository = gcp.cloudbuildv2.Repository("my-repository",
        name="my-terraform-ghe-repo",
        location="us-central1",
        parent_connection=my_connection.name,
        remote_uri="https://ghe.com/hashicorp/terraform-provider-google.git")
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-gcp/sdk/v8/go/gcp/cloudbuildv2"
    	"github.com/pulumi/pulumi-gcp/sdk/v8/go/gcp/organizations"
    	"github.com/pulumi/pulumi-gcp/sdk/v8/go/gcp/secretmanager"
    	"github.com/pulumi/pulumi-std/sdk/go/std"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := secretmanager.NewSecret(ctx, "private-key-secret", &secretmanager.SecretArgs{
    			SecretId: pulumi.String("ghe-pk-secret"),
    			Replication: &secretmanager.SecretReplicationArgs{
    				Auto: &secretmanager.SecretReplicationAutoArgs{},
    			},
    		})
    		if err != nil {
    			return err
    		}
    		invokeFile, err := std.File(ctx, &std.FileArgs{
    			Input: "private-key.pem",
    		}, nil)
    		if err != nil {
    			return err
    		}
    		_, err = secretmanager.NewSecretVersion(ctx, "private-key-secret-version", &secretmanager.SecretVersionArgs{
    			Secret:     private_key_secret.ID(),
    			SecretData: pulumi.String(invokeFile.Result),
    		})
    		if err != nil {
    			return err
    		}
    		_, err = secretmanager.NewSecret(ctx, "webhook-secret-secret", &secretmanager.SecretArgs{
    			SecretId: pulumi.String("github-token-secret"),
    			Replication: &secretmanager.SecretReplicationArgs{
    				Auto: &secretmanager.SecretReplicationAutoArgs{},
    			},
    		})
    		if err != nil {
    			return err
    		}
    		_, err = secretmanager.NewSecretVersion(ctx, "webhook-secret-secret-version", &secretmanager.SecretVersionArgs{
    			Secret:     webhook_secret_secret.ID(),
    			SecretData: pulumi.String("<webhook-secret-data>"),
    		})
    		if err != nil {
    			return err
    		}
    		p4sa_secretAccessor, err := organizations.LookupIAMPolicy(ctx, &organizations.LookupIAMPolicyArgs{
    			Bindings: []organizations.GetIAMPolicyBinding{
    				{
    					Role: "roles/secretmanager.secretAccessor",
    					Members: []string{
    						"serviceAccount:service-123456789@gcp-sa-cloudbuild.iam.gserviceaccount.com",
    					},
    				},
    			},
    		}, nil)
    		if err != nil {
    			return err
    		}
    		_, err = secretmanager.NewSecretIamPolicy(ctx, "policy-pk", &secretmanager.SecretIamPolicyArgs{
    			SecretId:   private_key_secret.SecretId,
    			PolicyData: pulumi.String(p4sa_secretAccessor.PolicyData),
    		})
    		if err != nil {
    			return err
    		}
    		_, err = secretmanager.NewSecretIamPolicy(ctx, "policy-whs", &secretmanager.SecretIamPolicyArgs{
    			SecretId:   webhook_secret_secret.SecretId,
    			PolicyData: pulumi.String(p4sa_secretAccessor.PolicyData),
    		})
    		if err != nil {
    			return err
    		}
    		_, err = cloudbuildv2.NewConnection(ctx, "my-connection", &cloudbuildv2.ConnectionArgs{
    			Location: pulumi.String("us-central1"),
    			Name:     pulumi.String("my-terraform-ghe-connection"),
    			GithubEnterpriseConfig: &cloudbuildv2.ConnectionGithubEnterpriseConfigArgs{
    				HostUri:                    pulumi.String("https://ghe.com"),
    				PrivateKeySecretVersion:    private_key_secret_version.ID(),
    				WebhookSecretSecretVersion: webhook_secret_secret_version.ID(),
    				AppId:                      pulumi.Int(200),
    				AppSlug:                    pulumi.String("gcb-app"),
    				AppInstallationId:          pulumi.Int(300),
    			},
    		}, pulumi.DependsOn([]pulumi.Resource{
    			policy_pk,
    			policy_whs,
    		}))
    		if err != nil {
    			return err
    		}
    		_, err = cloudbuildv2.NewRepository(ctx, "my-repository", &cloudbuildv2.RepositoryArgs{
    			Name:             pulumi.String("my-terraform-ghe-repo"),
    			Location:         pulumi.String("us-central1"),
    			ParentConnection: my_connection.Name,
    			RemoteUri:        pulumi.String("https://ghe.com/hashicorp/terraform-provider-google.git"),
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Gcp = Pulumi.Gcp;
    using Std = Pulumi.Std;
    
    return await Deployment.RunAsync(() => 
    {
        var private_key_secret = new Gcp.SecretManager.Secret("private-key-secret", new()
        {
            SecretId = "ghe-pk-secret",
            Replication = new Gcp.SecretManager.Inputs.SecretReplicationArgs
            {
                Auto = null,
            },
        });
    
        var private_key_secret_version = new Gcp.SecretManager.SecretVersion("private-key-secret-version", new()
        {
            Secret = private_key_secret.Id,
            SecretData = Std.File.Invoke(new()
            {
                Input = "private-key.pem",
            }).Apply(invoke => invoke.Result),
        });
    
        var webhook_secret_secret = new Gcp.SecretManager.Secret("webhook-secret-secret", new()
        {
            SecretId = "github-token-secret",
            Replication = new Gcp.SecretManager.Inputs.SecretReplicationArgs
            {
                Auto = null,
            },
        });
    
        var webhook_secret_secret_version = new Gcp.SecretManager.SecretVersion("webhook-secret-secret-version", new()
        {
            Secret = webhook_secret_secret.Id,
            SecretData = "<webhook-secret-data>",
        });
    
        var p4sa_secretAccessor = Gcp.Organizations.GetIAMPolicy.Invoke(new()
        {
            Bindings = new[]
            {
                new Gcp.Organizations.Inputs.GetIAMPolicyBindingInputArgs
                {
                    Role = "roles/secretmanager.secretAccessor",
                    Members = new[]
                    {
                        "serviceAccount:service-123456789@gcp-sa-cloudbuild.iam.gserviceaccount.com",
                    },
                },
            },
        });
    
        var policy_pk = new Gcp.SecretManager.SecretIamPolicy("policy-pk", new()
        {
            SecretId = private_key_secret.SecretId,
            PolicyData = p4sa_secretAccessor.Apply(p4sa_secretAccessor => p4sa_secretAccessor.Apply(getIAMPolicyResult => getIAMPolicyResult.PolicyData)),
        });
    
        var policy_whs = new Gcp.SecretManager.SecretIamPolicy("policy-whs", new()
        {
            SecretId = webhook_secret_secret.SecretId,
            PolicyData = p4sa_secretAccessor.Apply(p4sa_secretAccessor => p4sa_secretAccessor.Apply(getIAMPolicyResult => getIAMPolicyResult.PolicyData)),
        });
    
        var my_connection = new Gcp.CloudBuildV2.Connection("my-connection", new()
        {
            Location = "us-central1",
            Name = "my-terraform-ghe-connection",
            GithubEnterpriseConfig = new Gcp.CloudBuildV2.Inputs.ConnectionGithubEnterpriseConfigArgs
            {
                HostUri = "https://ghe.com",
                PrivateKeySecretVersion = private_key_secret_version.Id,
                WebhookSecretSecretVersion = webhook_secret_secret_version.Id,
                AppId = 200,
                AppSlug = "gcb-app",
                AppInstallationId = 300,
            },
        }, new CustomResourceOptions
        {
            DependsOn =
            {
                policy_pk,
                policy_whs,
            },
        });
    
        var my_repository = new Gcp.CloudBuildV2.Repository("my-repository", new()
        {
            Name = "my-terraform-ghe-repo",
            Location = "us-central1",
            ParentConnection = my_connection.Name,
            RemoteUri = "https://ghe.com/hashicorp/terraform-provider-google.git",
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.gcp.secretmanager.Secret;
    import com.pulumi.gcp.secretmanager.SecretArgs;
    import com.pulumi.gcp.secretmanager.inputs.SecretReplicationArgs;
    import com.pulumi.gcp.secretmanager.inputs.SecretReplicationAutoArgs;
    import com.pulumi.gcp.secretmanager.SecretVersion;
    import com.pulumi.gcp.secretmanager.SecretVersionArgs;
    import com.pulumi.gcp.organizations.OrganizationsFunctions;
    import com.pulumi.gcp.organizations.inputs.GetIAMPolicyArgs;
    import com.pulumi.gcp.secretmanager.SecretIamPolicy;
    import com.pulumi.gcp.secretmanager.SecretIamPolicyArgs;
    import com.pulumi.gcp.cloudbuildv2.Connection;
    import com.pulumi.gcp.cloudbuildv2.ConnectionArgs;
    import com.pulumi.gcp.cloudbuildv2.inputs.ConnectionGithubEnterpriseConfigArgs;
    import com.pulumi.gcp.cloudbuildv2.Repository;
    import com.pulumi.gcp.cloudbuildv2.RepositoryArgs;
    import com.pulumi.resources.CustomResourceOptions;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var private_key_secret = new Secret("private-key-secret", SecretArgs.builder()
                .secretId("ghe-pk-secret")
                .replication(SecretReplicationArgs.builder()
                    .auto()
                    .build())
                .build());
    
            var private_key_secret_version = new SecretVersion("private-key-secret-version", SecretVersionArgs.builder()
                .secret(private_key_secret.id())
                .secretData(StdFunctions.file(FileArgs.builder()
                    .input("private-key.pem")
                    .build()).result())
                .build());
    
            var webhook_secret_secret = new Secret("webhook-secret-secret", SecretArgs.builder()
                .secretId("github-token-secret")
                .replication(SecretReplicationArgs.builder()
                    .auto()
                    .build())
                .build());
    
            var webhook_secret_secret_version = new SecretVersion("webhook-secret-secret-version", SecretVersionArgs.builder()
                .secret(webhook_secret_secret.id())
                .secretData("<webhook-secret-data>")
                .build());
    
            final var p4sa-secretAccessor = OrganizationsFunctions.getIAMPolicy(GetIAMPolicyArgs.builder()
                .bindings(GetIAMPolicyBindingArgs.builder()
                    .role("roles/secretmanager.secretAccessor")
                    .members("serviceAccount:service-123456789@gcp-sa-cloudbuild.iam.gserviceaccount.com")
                    .build())
                .build());
    
            var policy_pk = new SecretIamPolicy("policy-pk", SecretIamPolicyArgs.builder()
                .secretId(private_key_secret.secretId())
                .policyData(p4sa_secretAccessor.policyData())
                .build());
    
            var policy_whs = new SecretIamPolicy("policy-whs", SecretIamPolicyArgs.builder()
                .secretId(webhook_secret_secret.secretId())
                .policyData(p4sa_secretAccessor.policyData())
                .build());
    
            var my_connection = new Connection("my-connection", ConnectionArgs.builder()
                .location("us-central1")
                .name("my-terraform-ghe-connection")
                .githubEnterpriseConfig(ConnectionGithubEnterpriseConfigArgs.builder()
                    .hostUri("https://ghe.com")
                    .privateKeySecretVersion(private_key_secret_version.id())
                    .webhookSecretSecretVersion(webhook_secret_secret_version.id())
                    .appId(200)
                    .appSlug("gcb-app")
                    .appInstallationId(300)
                    .build())
                .build(), CustomResourceOptions.builder()
                    .dependsOn(                
                        policy_pk,
                        policy_whs)
                    .build());
    
            var my_repository = new Repository("my-repository", RepositoryArgs.builder()
                .name("my-terraform-ghe-repo")
                .location("us-central1")
                .parentConnection(my_connection.name())
                .remoteUri("https://ghe.com/hashicorp/terraform-provider-google.git")
                .build());
    
        }
    }
    
    resources:
      private-key-secret:
        type: gcp:secretmanager:Secret
        properties:
          secretId: ghe-pk-secret
          replication:
            auto: {}
      private-key-secret-version:
        type: gcp:secretmanager:SecretVersion
        properties:
          secret: ${["private-key-secret"].id}
          secretData:
            fn::invoke:
              Function: std:file
              Arguments:
                input: private-key.pem
              Return: result
      webhook-secret-secret:
        type: gcp:secretmanager:Secret
        properties:
          secretId: github-token-secret
          replication:
            auto: {}
      webhook-secret-secret-version:
        type: gcp:secretmanager:SecretVersion
        properties:
          secret: ${["webhook-secret-secret"].id}
          secretData: <webhook-secret-data>
      policy-pk:
        type: gcp:secretmanager:SecretIamPolicy
        properties:
          secretId: ${["private-key-secret"].secretId}
          policyData: ${["p4sa-secretAccessor"].policyData}
      policy-whs:
        type: gcp:secretmanager:SecretIamPolicy
        properties:
          secretId: ${["webhook-secret-secret"].secretId}
          policyData: ${["p4sa-secretAccessor"].policyData}
      my-connection:
        type: gcp:cloudbuildv2:Connection
        properties:
          location: us-central1
          name: my-terraform-ghe-connection
          githubEnterpriseConfig:
            hostUri: https://ghe.com
            privateKeySecretVersion: ${["private-key-secret-version"].id}
            webhookSecretSecretVersion: ${["webhook-secret-secret-version"].id}
            appId: 200
            appSlug: gcb-app
            appInstallationId: 300
        options:
          dependson:
            - ${["policy-pk"]}
            - ${["policy-whs"]}
      my-repository:
        type: gcp:cloudbuildv2:Repository
        properties:
          name: my-terraform-ghe-repo
          location: us-central1
          parentConnection: ${["my-connection"].name}
          remoteUri: https://ghe.com/hashicorp/terraform-provider-google.git
    variables:
      p4sa-secretAccessor:
        fn::invoke:
          Function: gcp:organizations:getIAMPolicy
          Arguments:
            bindings:
              - role: roles/secretmanager.secretAccessor
                members:
                  - serviceAccount:service-123456789@gcp-sa-cloudbuild.iam.gserviceaccount.com
    

    Cloudbuildv2 Repository Github Doc

    import * as pulumi from "@pulumi/pulumi";
    import * as gcp from "@pulumi/gcp";
    import * as std from "@pulumi/std";
    
    const github_token_secret = new gcp.secretmanager.Secret("github-token-secret", {
        secretId: "github-token-secret",
        replication: {
            auto: {},
        },
    });
    const github_token_secret_version = new gcp.secretmanager.SecretVersion("github-token-secret-version", {
        secret: github_token_secret.id,
        secretData: std.file({
            input: "my-github-token.txt",
        }).then(invoke => invoke.result),
    });
    const p4sa-secretAccessor = gcp.organizations.getIAMPolicy({
        bindings: [{
            role: "roles/secretmanager.secretAccessor",
            members: ["serviceAccount:service-123456789@gcp-sa-cloudbuild.iam.gserviceaccount.com"],
        }],
    });
    const policy = new gcp.secretmanager.SecretIamPolicy("policy", {
        secretId: github_token_secret.secretId,
        policyData: p4sa_secretAccessor.then(p4sa_secretAccessor => p4sa_secretAccessor.policyData),
    });
    const my_connection = new gcp.cloudbuildv2.Connection("my-connection", {
        location: "us-central1",
        name: "my-connection",
        githubConfig: {
            appInstallationId: 123123,
            authorizerCredential: {
                oauthTokenSecretVersion: github_token_secret_version.id,
            },
        },
    });
    const my_repository = new gcp.cloudbuildv2.Repository("my-repository", {
        location: "us-central1",
        name: "my-repo",
        parentConnection: my_connection.name,
        remoteUri: "https://github.com/myuser/myrepo.git",
    });
    
    import pulumi
    import pulumi_gcp as gcp
    import pulumi_std as std
    
    github_token_secret = gcp.secretmanager.Secret("github-token-secret",
        secret_id="github-token-secret",
        replication={
            "auto": {},
        })
    github_token_secret_version = gcp.secretmanager.SecretVersion("github-token-secret-version",
        secret=github_token_secret.id,
        secret_data=std.file(input="my-github-token.txt").result)
    p4sa_secret_accessor = gcp.organizations.get_iam_policy(bindings=[{
        "role": "roles/secretmanager.secretAccessor",
        "members": ["serviceAccount:service-123456789@gcp-sa-cloudbuild.iam.gserviceaccount.com"],
    }])
    policy = gcp.secretmanager.SecretIamPolicy("policy",
        secret_id=github_token_secret.secret_id,
        policy_data=p4sa_secret_accessor.policy_data)
    my_connection = gcp.cloudbuildv2.Connection("my-connection",
        location="us-central1",
        name="my-connection",
        github_config={
            "app_installation_id": 123123,
            "authorizer_credential": {
                "oauth_token_secret_version": github_token_secret_version.id,
            },
        })
    my_repository = gcp.cloudbuildv2.Repository("my-repository",
        location="us-central1",
        name="my-repo",
        parent_connection=my_connection.name,
        remote_uri="https://github.com/myuser/myrepo.git")
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-gcp/sdk/v8/go/gcp/cloudbuildv2"
    	"github.com/pulumi/pulumi-gcp/sdk/v8/go/gcp/organizations"
    	"github.com/pulumi/pulumi-gcp/sdk/v8/go/gcp/secretmanager"
    	"github.com/pulumi/pulumi-std/sdk/go/std"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := secretmanager.NewSecret(ctx, "github-token-secret", &secretmanager.SecretArgs{
    			SecretId: pulumi.String("github-token-secret"),
    			Replication: &secretmanager.SecretReplicationArgs{
    				Auto: &secretmanager.SecretReplicationAutoArgs{},
    			},
    		})
    		if err != nil {
    			return err
    		}
    		invokeFile, err := std.File(ctx, &std.FileArgs{
    			Input: "my-github-token.txt",
    		}, nil)
    		if err != nil {
    			return err
    		}
    		_, err = secretmanager.NewSecretVersion(ctx, "github-token-secret-version", &secretmanager.SecretVersionArgs{
    			Secret:     github_token_secret.ID(),
    			SecretData: pulumi.String(invokeFile.Result),
    		})
    		if err != nil {
    			return err
    		}
    		p4sa_secretAccessor, err := organizations.LookupIAMPolicy(ctx, &organizations.LookupIAMPolicyArgs{
    			Bindings: []organizations.GetIAMPolicyBinding{
    				{
    					Role: "roles/secretmanager.secretAccessor",
    					Members: []string{
    						"serviceAccount:service-123456789@gcp-sa-cloudbuild.iam.gserviceaccount.com",
    					},
    				},
    			},
    		}, nil)
    		if err != nil {
    			return err
    		}
    		_, err = secretmanager.NewSecretIamPolicy(ctx, "policy", &secretmanager.SecretIamPolicyArgs{
    			SecretId:   github_token_secret.SecretId,
    			PolicyData: pulumi.String(p4sa_secretAccessor.PolicyData),
    		})
    		if err != nil {
    			return err
    		}
    		_, err = cloudbuildv2.NewConnection(ctx, "my-connection", &cloudbuildv2.ConnectionArgs{
    			Location: pulumi.String("us-central1"),
    			Name:     pulumi.String("my-connection"),
    			GithubConfig: &cloudbuildv2.ConnectionGithubConfigArgs{
    				AppInstallationId: pulumi.Int(123123),
    				AuthorizerCredential: &cloudbuildv2.ConnectionGithubConfigAuthorizerCredentialArgs{
    					OauthTokenSecretVersion: github_token_secret_version.ID(),
    				},
    			},
    		})
    		if err != nil {
    			return err
    		}
    		_, err = cloudbuildv2.NewRepository(ctx, "my-repository", &cloudbuildv2.RepositoryArgs{
    			Location:         pulumi.String("us-central1"),
    			Name:             pulumi.String("my-repo"),
    			ParentConnection: my_connection.Name,
    			RemoteUri:        pulumi.String("https://github.com/myuser/myrepo.git"),
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Gcp = Pulumi.Gcp;
    using Std = Pulumi.Std;
    
    return await Deployment.RunAsync(() => 
    {
        var github_token_secret = new Gcp.SecretManager.Secret("github-token-secret", new()
        {
            SecretId = "github-token-secret",
            Replication = new Gcp.SecretManager.Inputs.SecretReplicationArgs
            {
                Auto = null,
            },
        });
    
        var github_token_secret_version = new Gcp.SecretManager.SecretVersion("github-token-secret-version", new()
        {
            Secret = github_token_secret.Id,
            SecretData = Std.File.Invoke(new()
            {
                Input = "my-github-token.txt",
            }).Apply(invoke => invoke.Result),
        });
    
        var p4sa_secretAccessor = Gcp.Organizations.GetIAMPolicy.Invoke(new()
        {
            Bindings = new[]
            {
                new Gcp.Organizations.Inputs.GetIAMPolicyBindingInputArgs
                {
                    Role = "roles/secretmanager.secretAccessor",
                    Members = new[]
                    {
                        "serviceAccount:service-123456789@gcp-sa-cloudbuild.iam.gserviceaccount.com",
                    },
                },
            },
        });
    
        var policy = new Gcp.SecretManager.SecretIamPolicy("policy", new()
        {
            SecretId = github_token_secret.SecretId,
            PolicyData = p4sa_secretAccessor.Apply(p4sa_secretAccessor => p4sa_secretAccessor.Apply(getIAMPolicyResult => getIAMPolicyResult.PolicyData)),
        });
    
        var my_connection = new Gcp.CloudBuildV2.Connection("my-connection", new()
        {
            Location = "us-central1",
            Name = "my-connection",
            GithubConfig = new Gcp.CloudBuildV2.Inputs.ConnectionGithubConfigArgs
            {
                AppInstallationId = 123123,
                AuthorizerCredential = new Gcp.CloudBuildV2.Inputs.ConnectionGithubConfigAuthorizerCredentialArgs
                {
                    OauthTokenSecretVersion = github_token_secret_version.Id,
                },
            },
        });
    
        var my_repository = new Gcp.CloudBuildV2.Repository("my-repository", new()
        {
            Location = "us-central1",
            Name = "my-repo",
            ParentConnection = my_connection.Name,
            RemoteUri = "https://github.com/myuser/myrepo.git",
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.gcp.secretmanager.Secret;
    import com.pulumi.gcp.secretmanager.SecretArgs;
    import com.pulumi.gcp.secretmanager.inputs.SecretReplicationArgs;
    import com.pulumi.gcp.secretmanager.inputs.SecretReplicationAutoArgs;
    import com.pulumi.gcp.secretmanager.SecretVersion;
    import com.pulumi.gcp.secretmanager.SecretVersionArgs;
    import com.pulumi.gcp.organizations.OrganizationsFunctions;
    import com.pulumi.gcp.organizations.inputs.GetIAMPolicyArgs;
    import com.pulumi.gcp.secretmanager.SecretIamPolicy;
    import com.pulumi.gcp.secretmanager.SecretIamPolicyArgs;
    import com.pulumi.gcp.cloudbuildv2.Connection;
    import com.pulumi.gcp.cloudbuildv2.ConnectionArgs;
    import com.pulumi.gcp.cloudbuildv2.inputs.ConnectionGithubConfigArgs;
    import com.pulumi.gcp.cloudbuildv2.inputs.ConnectionGithubConfigAuthorizerCredentialArgs;
    import com.pulumi.gcp.cloudbuildv2.Repository;
    import com.pulumi.gcp.cloudbuildv2.RepositoryArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var github_token_secret = new Secret("github-token-secret", SecretArgs.builder()
                .secretId("github-token-secret")
                .replication(SecretReplicationArgs.builder()
                    .auto()
                    .build())
                .build());
    
            var github_token_secret_version = new SecretVersion("github-token-secret-version", SecretVersionArgs.builder()
                .secret(github_token_secret.id())
                .secretData(StdFunctions.file(FileArgs.builder()
                    .input("my-github-token.txt")
                    .build()).result())
                .build());
    
            final var p4sa-secretAccessor = OrganizationsFunctions.getIAMPolicy(GetIAMPolicyArgs.builder()
                .bindings(GetIAMPolicyBindingArgs.builder()
                    .role("roles/secretmanager.secretAccessor")
                    .members("serviceAccount:service-123456789@gcp-sa-cloudbuild.iam.gserviceaccount.com")
                    .build())
                .build());
    
            var policy = new SecretIamPolicy("policy", SecretIamPolicyArgs.builder()
                .secretId(github_token_secret.secretId())
                .policyData(p4sa_secretAccessor.policyData())
                .build());
    
            var my_connection = new Connection("my-connection", ConnectionArgs.builder()
                .location("us-central1")
                .name("my-connection")
                .githubConfig(ConnectionGithubConfigArgs.builder()
                    .appInstallationId(123123)
                    .authorizerCredential(ConnectionGithubConfigAuthorizerCredentialArgs.builder()
                        .oauthTokenSecretVersion(github_token_secret_version.id())
                        .build())
                    .build())
                .build());
    
            var my_repository = new Repository("my-repository", RepositoryArgs.builder()
                .location("us-central1")
                .name("my-repo")
                .parentConnection(my_connection.name())
                .remoteUri("https://github.com/myuser/myrepo.git")
                .build());
    
        }
    }
    
    resources:
      github-token-secret:
        type: gcp:secretmanager:Secret
        properties:
          secretId: github-token-secret
          replication:
            auto: {}
      github-token-secret-version:
        type: gcp:secretmanager:SecretVersion
        properties:
          secret: ${["github-token-secret"].id}
          secretData:
            fn::invoke:
              Function: std:file
              Arguments:
                input: my-github-token.txt
              Return: result
      policy:
        type: gcp:secretmanager:SecretIamPolicy
        properties:
          secretId: ${["github-token-secret"].secretId}
          policyData: ${["p4sa-secretAccessor"].policyData}
      my-connection:
        type: gcp:cloudbuildv2:Connection
        properties:
          location: us-central1
          name: my-connection
          githubConfig:
            appInstallationId: 123123
            authorizerCredential:
              oauthTokenSecretVersion: ${["github-token-secret-version"].id}
      my-repository:
        type: gcp:cloudbuildv2:Repository
        properties:
          location: us-central1
          name: my-repo
          parentConnection: ${["my-connection"].name}
          remoteUri: https://github.com/myuser/myrepo.git
    variables:
      p4sa-secretAccessor:
        fn::invoke:
          Function: gcp:organizations:getIAMPolicy
          Arguments:
            bindings:
              - role: roles/secretmanager.secretAccessor
                members:
                  - serviceAccount:service-123456789@gcp-sa-cloudbuild.iam.gserviceaccount.com
    

    Create Repository Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new Repository(name: string, args: RepositoryArgs, opts?: CustomResourceOptions);
    @overload
    def Repository(resource_name: str,
                   args: RepositoryArgs,
                   opts: Optional[ResourceOptions] = None)
    
    @overload
    def Repository(resource_name: str,
                   opts: Optional[ResourceOptions] = None,
                   parent_connection: Optional[str] = None,
                   remote_uri: Optional[str] = None,
                   annotations: Optional[Mapping[str, str]] = None,
                   location: Optional[str] = None,
                   name: Optional[str] = None,
                   project: Optional[str] = None)
    func NewRepository(ctx *Context, name string, args RepositoryArgs, opts ...ResourceOption) (*Repository, error)
    public Repository(string name, RepositoryArgs args, CustomResourceOptions? opts = null)
    public Repository(String name, RepositoryArgs args)
    public Repository(String name, RepositoryArgs args, CustomResourceOptions options)
    
    type: gcp:cloudbuildv2:Repository
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args RepositoryArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args RepositoryArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args RepositoryArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args RepositoryArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args RepositoryArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var gcpRepositoryResource = new Gcp.CloudBuildV2.Repository("gcpRepositoryResource", new()
    {
        ParentConnection = "string",
        RemoteUri = "string",
        Annotations = 
        {
            { "string", "string" },
        },
        Location = "string",
        Name = "string",
        Project = "string",
    });
    
    example, err := cloudbuildv2.NewRepository(ctx, "gcpRepositoryResource", &cloudbuildv2.RepositoryArgs{
    	ParentConnection: pulumi.String("string"),
    	RemoteUri:        pulumi.String("string"),
    	Annotations: pulumi.StringMap{
    		"string": pulumi.String("string"),
    	},
    	Location: pulumi.String("string"),
    	Name:     pulumi.String("string"),
    	Project:  pulumi.String("string"),
    })
    
    var gcpRepositoryResource = new Repository("gcpRepositoryResource", RepositoryArgs.builder()
        .parentConnection("string")
        .remoteUri("string")
        .annotations(Map.of("string", "string"))
        .location("string")
        .name("string")
        .project("string")
        .build());
    
    gcp_repository_resource = gcp.cloudbuildv2.Repository("gcpRepositoryResource",
        parent_connection="string",
        remote_uri="string",
        annotations={
            "string": "string",
        },
        location="string",
        name="string",
        project="string")
    
    const gcpRepositoryResource = new gcp.cloudbuildv2.Repository("gcpRepositoryResource", {
        parentConnection: "string",
        remoteUri: "string",
        annotations: {
            string: "string",
        },
        location: "string",
        name: "string",
        project: "string",
    });
    
    type: gcp:cloudbuildv2:Repository
    properties:
        annotations:
            string: string
        location: string
        name: string
        parentConnection: string
        project: string
        remoteUri: string
    

    Repository Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The Repository resource accepts the following input properties:

    ParentConnection string
    The connection for the resource


    RemoteUri string
    Required. Git Clone HTTPS URI.
    Annotations Dictionary<string, string>
    Allows clients to store small amounts of arbitrary data. Note: This field is non-authoritative, and will only manage the annotations present in your configuration. Please refer to the field effective_annotations for all of the annotations present on the resource.
    Location string
    The location for the resource
    Name string
    Name of the repository.
    Project string
    The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
    ParentConnection string
    The connection for the resource


    RemoteUri string
    Required. Git Clone HTTPS URI.
    Annotations map[string]string
    Allows clients to store small amounts of arbitrary data. Note: This field is non-authoritative, and will only manage the annotations present in your configuration. Please refer to the field effective_annotations for all of the annotations present on the resource.
    Location string
    The location for the resource
    Name string
    Name of the repository.
    Project string
    The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
    parentConnection String
    The connection for the resource


    remoteUri String
    Required. Git Clone HTTPS URI.
    annotations Map<String,String>
    Allows clients to store small amounts of arbitrary data. Note: This field is non-authoritative, and will only manage the annotations present in your configuration. Please refer to the field effective_annotations for all of the annotations present on the resource.
    location String
    The location for the resource
    name String
    Name of the repository.
    project String
    The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
    parentConnection string
    The connection for the resource


    remoteUri string
    Required. Git Clone HTTPS URI.
    annotations {[key: string]: string}
    Allows clients to store small amounts of arbitrary data. Note: This field is non-authoritative, and will only manage the annotations present in your configuration. Please refer to the field effective_annotations for all of the annotations present on the resource.
    location string
    The location for the resource
    name string
    Name of the repository.
    project string
    The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
    parent_connection str
    The connection for the resource


    remote_uri str
    Required. Git Clone HTTPS URI.
    annotations Mapping[str, str]
    Allows clients to store small amounts of arbitrary data. Note: This field is non-authoritative, and will only manage the annotations present in your configuration. Please refer to the field effective_annotations for all of the annotations present on the resource.
    location str
    The location for the resource
    name str
    Name of the repository.
    project str
    The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
    parentConnection String
    The connection for the resource


    remoteUri String
    Required. Git Clone HTTPS URI.
    annotations Map<String>
    Allows clients to store small amounts of arbitrary data. Note: This field is non-authoritative, and will only manage the annotations present in your configuration. Please refer to the field effective_annotations for all of the annotations present on the resource.
    location String
    The location for the resource
    name String
    Name of the repository.
    project String
    The ID of the project in which the resource belongs. If it is not provided, the provider project is used.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the Repository resource produces the following output properties:

    CreateTime string
    Output only. Server assigned timestamp for when the connection was created.
    EffectiveAnnotations Dictionary<string, string>
    Etag string
    This checksum is computed by the server based on the value of other fields, and may be sent on update and delete requests to ensure the client has an up-to-date value before proceeding.
    Id string
    The provider-assigned unique ID for this managed resource.
    UpdateTime string
    Output only. Server assigned timestamp for when the connection was updated.
    CreateTime string
    Output only. Server assigned timestamp for when the connection was created.
    EffectiveAnnotations map[string]string
    Etag string
    This checksum is computed by the server based on the value of other fields, and may be sent on update and delete requests to ensure the client has an up-to-date value before proceeding.
    Id string
    The provider-assigned unique ID for this managed resource.
    UpdateTime string
    Output only. Server assigned timestamp for when the connection was updated.
    createTime String
    Output only. Server assigned timestamp for when the connection was created.
    effectiveAnnotations Map<String,String>
    etag String
    This checksum is computed by the server based on the value of other fields, and may be sent on update and delete requests to ensure the client has an up-to-date value before proceeding.
    id String
    The provider-assigned unique ID for this managed resource.
    updateTime String
    Output only. Server assigned timestamp for when the connection was updated.
    createTime string
    Output only. Server assigned timestamp for when the connection was created.
    effectiveAnnotations {[key: string]: string}
    etag string
    This checksum is computed by the server based on the value of other fields, and may be sent on update and delete requests to ensure the client has an up-to-date value before proceeding.
    id string
    The provider-assigned unique ID for this managed resource.
    updateTime string
    Output only. Server assigned timestamp for when the connection was updated.
    create_time str
    Output only. Server assigned timestamp for when the connection was created.
    effective_annotations Mapping[str, str]
    etag str
    This checksum is computed by the server based on the value of other fields, and may be sent on update and delete requests to ensure the client has an up-to-date value before proceeding.
    id str
    The provider-assigned unique ID for this managed resource.
    update_time str
    Output only. Server assigned timestamp for when the connection was updated.
    createTime String
    Output only. Server assigned timestamp for when the connection was created.
    effectiveAnnotations Map<String>
    etag String
    This checksum is computed by the server based on the value of other fields, and may be sent on update and delete requests to ensure the client has an up-to-date value before proceeding.
    id String
    The provider-assigned unique ID for this managed resource.
    updateTime String
    Output only. Server assigned timestamp for when the connection was updated.

    Look up Existing Repository Resource

    Get an existing Repository resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: RepositoryState, opts?: CustomResourceOptions): Repository
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            annotations: Optional[Mapping[str, str]] = None,
            create_time: Optional[str] = None,
            effective_annotations: Optional[Mapping[str, str]] = None,
            etag: Optional[str] = None,
            location: Optional[str] = None,
            name: Optional[str] = None,
            parent_connection: Optional[str] = None,
            project: Optional[str] = None,
            remote_uri: Optional[str] = None,
            update_time: Optional[str] = None) -> Repository
    func GetRepository(ctx *Context, name string, id IDInput, state *RepositoryState, opts ...ResourceOption) (*Repository, error)
    public static Repository Get(string name, Input<string> id, RepositoryState? state, CustomResourceOptions? opts = null)
    public static Repository get(String name, Output<String> id, RepositoryState state, CustomResourceOptions options)
    Resource lookup is not supported in YAML
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    Annotations Dictionary<string, string>
    Allows clients to store small amounts of arbitrary data. Note: This field is non-authoritative, and will only manage the annotations present in your configuration. Please refer to the field effective_annotations for all of the annotations present on the resource.
    CreateTime string
    Output only. Server assigned timestamp for when the connection was created.
    EffectiveAnnotations Dictionary<string, string>
    Etag string
    This checksum is computed by the server based on the value of other fields, and may be sent on update and delete requests to ensure the client has an up-to-date value before proceeding.
    Location string
    The location for the resource
    Name string
    Name of the repository.
    ParentConnection string
    The connection for the resource


    Project string
    The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
    RemoteUri string
    Required. Git Clone HTTPS URI.
    UpdateTime string
    Output only. Server assigned timestamp for when the connection was updated.
    Annotations map[string]string
    Allows clients to store small amounts of arbitrary data. Note: This field is non-authoritative, and will only manage the annotations present in your configuration. Please refer to the field effective_annotations for all of the annotations present on the resource.
    CreateTime string
    Output only. Server assigned timestamp for when the connection was created.
    EffectiveAnnotations map[string]string
    Etag string
    This checksum is computed by the server based on the value of other fields, and may be sent on update and delete requests to ensure the client has an up-to-date value before proceeding.
    Location string
    The location for the resource
    Name string
    Name of the repository.
    ParentConnection string
    The connection for the resource


    Project string
    The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
    RemoteUri string
    Required. Git Clone HTTPS URI.
    UpdateTime string
    Output only. Server assigned timestamp for when the connection was updated.
    annotations Map<String,String>
    Allows clients to store small amounts of arbitrary data. Note: This field is non-authoritative, and will only manage the annotations present in your configuration. Please refer to the field effective_annotations for all of the annotations present on the resource.
    createTime String
    Output only. Server assigned timestamp for when the connection was created.
    effectiveAnnotations Map<String,String>
    etag String
    This checksum is computed by the server based on the value of other fields, and may be sent on update and delete requests to ensure the client has an up-to-date value before proceeding.
    location String
    The location for the resource
    name String
    Name of the repository.
    parentConnection String
    The connection for the resource


    project String
    The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
    remoteUri String
    Required. Git Clone HTTPS URI.
    updateTime String
    Output only. Server assigned timestamp for when the connection was updated.
    annotations {[key: string]: string}
    Allows clients to store small amounts of arbitrary data. Note: This field is non-authoritative, and will only manage the annotations present in your configuration. Please refer to the field effective_annotations for all of the annotations present on the resource.
    createTime string
    Output only. Server assigned timestamp for when the connection was created.
    effectiveAnnotations {[key: string]: string}
    etag string
    This checksum is computed by the server based on the value of other fields, and may be sent on update and delete requests to ensure the client has an up-to-date value before proceeding.
    location string
    The location for the resource
    name string
    Name of the repository.
    parentConnection string
    The connection for the resource


    project string
    The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
    remoteUri string
    Required. Git Clone HTTPS URI.
    updateTime string
    Output only. Server assigned timestamp for when the connection was updated.
    annotations Mapping[str, str]
    Allows clients to store small amounts of arbitrary data. Note: This field is non-authoritative, and will only manage the annotations present in your configuration. Please refer to the field effective_annotations for all of the annotations present on the resource.
    create_time str
    Output only. Server assigned timestamp for when the connection was created.
    effective_annotations Mapping[str, str]
    etag str
    This checksum is computed by the server based on the value of other fields, and may be sent on update and delete requests to ensure the client has an up-to-date value before proceeding.
    location str
    The location for the resource
    name str
    Name of the repository.
    parent_connection str
    The connection for the resource


    project str
    The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
    remote_uri str
    Required. Git Clone HTTPS URI.
    update_time str
    Output only. Server assigned timestamp for when the connection was updated.
    annotations Map<String>
    Allows clients to store small amounts of arbitrary data. Note: This field is non-authoritative, and will only manage the annotations present in your configuration. Please refer to the field effective_annotations for all of the annotations present on the resource.
    createTime String
    Output only. Server assigned timestamp for when the connection was created.
    effectiveAnnotations Map<String>
    etag String
    This checksum is computed by the server based on the value of other fields, and may be sent on update and delete requests to ensure the client has an up-to-date value before proceeding.
    location String
    The location for the resource
    name String
    Name of the repository.
    parentConnection String
    The connection for the resource


    project String
    The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
    remoteUri String
    Required. Git Clone HTTPS URI.
    updateTime String
    Output only. Server assigned timestamp for when the connection was updated.

    Import

    Repository can be imported using any of these accepted formats:

    • projects/{{project}}/locations/{{location}}/connections/{{parent_connection}}/repositories/{{name}}

    • {{project}}/{{location}}/{{parent_connection}}/{{name}}

    • {{location}}/{{parent_connection}}/{{name}}

    When using the pulumi import command, Repository can be imported using one of the formats above. For example:

    $ pulumi import gcp:cloudbuildv2/repository:Repository default projects/{{project}}/locations/{{location}}/connections/{{parent_connection}}/repositories/{{name}}
    
    $ pulumi import gcp:cloudbuildv2/repository:Repository default {{project}}/{{location}}/{{parent_connection}}/{{name}}
    
    $ pulumi import gcp:cloudbuildv2/repository:Repository default {{location}}/{{parent_connection}}/{{name}}
    

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    Google Cloud (GCP) Classic pulumi/pulumi-gcp
    License
    Apache-2.0
    Notes
    This Pulumi package is based on the google-beta Terraform Provider.
    gcp logo
    Google Cloud Classic v8.9.3 published on Monday, Nov 18, 2024 by Pulumi