azuredevops.RepositoryPolicyCaseEnforcement
Explore with Pulumi AI
Manages a case enforcement repository policy within Azure DevOps project.
If both project and project policy are enabled, the project policy has high priority.
Relevant Links
Example Usage
using System.Collections.Generic;
using Pulumi;
using AzureDevOps = Pulumi.AzureDevOps;
return await Deployment.RunAsync(() =>
{
var exampleProject = new AzureDevOps.Project("exampleProject", new()
{
Visibility = "private",
VersionControl = "Git",
WorkItemTemplate = "Agile",
Description = "Managed by Terraform",
});
var exampleGit = new AzureDevOps.Git("exampleGit", new()
{
ProjectId = exampleProject.Id,
Initialization = new AzureDevOps.Inputs.GitInitializationArgs
{
InitType = "Clean",
},
});
var exampleRepositoryPolicyCaseEnforcement = new AzureDevOps.RepositoryPolicyCaseEnforcement("exampleRepositoryPolicyCaseEnforcement", new()
{
ProjectId = exampleProject.Id,
Enabled = true,
Blocking = true,
EnforceConsistentCase = true,
RepositoryIds = new[]
{
exampleGit.Id,
},
});
});
package main
import (
"github.com/pulumi/pulumi-azuredevops/sdk/v2/go/azuredevops"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
exampleProject, err := azuredevops.NewProject(ctx, "exampleProject", &azuredevops.ProjectArgs{
Visibility: pulumi.String("private"),
VersionControl: pulumi.String("Git"),
WorkItemTemplate: pulumi.String("Agile"),
Description: pulumi.String("Managed by Terraform"),
})
if err != nil {
return err
}
exampleGit, err := azuredevops.NewGit(ctx, "exampleGit", &azuredevops.GitArgs{
ProjectId: exampleProject.ID(),
Initialization: &azuredevops.GitInitializationArgs{
InitType: pulumi.String("Clean"),
},
})
if err != nil {
return err
}
_, err = azuredevops.NewRepositoryPolicyCaseEnforcement(ctx, "exampleRepositoryPolicyCaseEnforcement", &azuredevops.RepositoryPolicyCaseEnforcementArgs{
ProjectId: exampleProject.ID(),
Enabled: pulumi.Bool(true),
Blocking: pulumi.Bool(true),
EnforceConsistentCase: pulumi.Bool(true),
RepositoryIds: pulumi.StringArray{
exampleGit.ID(),
},
})
if err != nil {
return err
}
return nil
})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.azuredevops.Project;
import com.pulumi.azuredevops.ProjectArgs;
import com.pulumi.azuredevops.Git;
import com.pulumi.azuredevops.GitArgs;
import com.pulumi.azuredevops.inputs.GitInitializationArgs;
import com.pulumi.azuredevops.RepositoryPolicyCaseEnforcement;
import com.pulumi.azuredevops.RepositoryPolicyCaseEnforcementArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var exampleProject = new Project("exampleProject", ProjectArgs.builder()
.visibility("private")
.versionControl("Git")
.workItemTemplate("Agile")
.description("Managed by Terraform")
.build());
var exampleGit = new Git("exampleGit", GitArgs.builder()
.projectId(exampleProject.id())
.initialization(GitInitializationArgs.builder()
.initType("Clean")
.build())
.build());
var exampleRepositoryPolicyCaseEnforcement = new RepositoryPolicyCaseEnforcement("exampleRepositoryPolicyCaseEnforcement", RepositoryPolicyCaseEnforcementArgs.builder()
.projectId(exampleProject.id())
.enabled(true)
.blocking(true)
.enforceConsistentCase(true)
.repositoryIds(exampleGit.id())
.build());
}
}
import pulumi
import pulumi_azuredevops as azuredevops
example_project = azuredevops.Project("exampleProject",
visibility="private",
version_control="Git",
work_item_template="Agile",
description="Managed by Terraform")
example_git = azuredevops.Git("exampleGit",
project_id=example_project.id,
initialization=azuredevops.GitInitializationArgs(
init_type="Clean",
))
example_repository_policy_case_enforcement = azuredevops.RepositoryPolicyCaseEnforcement("exampleRepositoryPolicyCaseEnforcement",
project_id=example_project.id,
enabled=True,
blocking=True,
enforce_consistent_case=True,
repository_ids=[example_git.id])
import * as pulumi from "@pulumi/pulumi";
import * as azuredevops from "@pulumi/azuredevops";
const exampleProject = new azuredevops.Project("exampleProject", {
visibility: "private",
versionControl: "Git",
workItemTemplate: "Agile",
description: "Managed by Terraform",
});
const exampleGit = new azuredevops.Git("exampleGit", {
projectId: exampleProject.id,
initialization: {
initType: "Clean",
},
});
const exampleRepositoryPolicyCaseEnforcement = new azuredevops.RepositoryPolicyCaseEnforcement("exampleRepositoryPolicyCaseEnforcement", {
projectId: exampleProject.id,
enabled: true,
blocking: true,
enforceConsistentCase: true,
repositoryIds: [exampleGit.id],
});
resources:
exampleProject:
type: azuredevops:Project
properties:
visibility: private
versionControl: Git
workItemTemplate: Agile
description: Managed by Terraform
exampleGit:
type: azuredevops:Git
properties:
projectId: ${exampleProject.id}
initialization:
initType: Clean
exampleRepositoryPolicyCaseEnforcement:
type: azuredevops:RepositoryPolicyCaseEnforcement
properties:
projectId: ${exampleProject.id}
enabled: true
blocking: true
enforceConsistentCase: true
repositoryIds:
- ${exampleGit.id}
using System.Collections.Generic;
using Pulumi;
using AzureDevOps = Pulumi.AzureDevOps;
return await Deployment.RunAsync(() =>
{
var exampleProject = new AzureDevOps.Project("exampleProject", new()
{
Visibility = "private",
VersionControl = "Git",
WorkItemTemplate = "Agile",
Description = "Managed by Terraform",
});
var exampleRepositoryPolicyCaseEnforcement = new AzureDevOps.RepositoryPolicyCaseEnforcement("exampleRepositoryPolicyCaseEnforcement", new()
{
ProjectId = exampleProject.Id,
Enabled = true,
Blocking = true,
EnforceConsistentCase = true,
});
});
package main
import (
"github.com/pulumi/pulumi-azuredevops/sdk/v2/go/azuredevops"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
exampleProject, err := azuredevops.NewProject(ctx, "exampleProject", &azuredevops.ProjectArgs{
Visibility: pulumi.String("private"),
VersionControl: pulumi.String("Git"),
WorkItemTemplate: pulumi.String("Agile"),
Description: pulumi.String("Managed by Terraform"),
})
if err != nil {
return err
}
_, err = azuredevops.NewRepositoryPolicyCaseEnforcement(ctx, "exampleRepositoryPolicyCaseEnforcement", &azuredevops.RepositoryPolicyCaseEnforcementArgs{
ProjectId: exampleProject.ID(),
Enabled: pulumi.Bool(true),
Blocking: pulumi.Bool(true),
EnforceConsistentCase: pulumi.Bool(true),
})
if err != nil {
return err
}
return nil
})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.azuredevops.Project;
import com.pulumi.azuredevops.ProjectArgs;
import com.pulumi.azuredevops.RepositoryPolicyCaseEnforcement;
import com.pulumi.azuredevops.RepositoryPolicyCaseEnforcementArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var exampleProject = new Project("exampleProject", ProjectArgs.builder()
.visibility("private")
.versionControl("Git")
.workItemTemplate("Agile")
.description("Managed by Terraform")
.build());
var exampleRepositoryPolicyCaseEnforcement = new RepositoryPolicyCaseEnforcement("exampleRepositoryPolicyCaseEnforcement", RepositoryPolicyCaseEnforcementArgs.builder()
.projectId(exampleProject.id())
.enabled(true)
.blocking(true)
.enforceConsistentCase(true)
.build());
}
}
import pulumi
import pulumi_azuredevops as azuredevops
example_project = azuredevops.Project("exampleProject",
visibility="private",
version_control="Git",
work_item_template="Agile",
description="Managed by Terraform")
example_repository_policy_case_enforcement = azuredevops.RepositoryPolicyCaseEnforcement("exampleRepositoryPolicyCaseEnforcement",
project_id=example_project.id,
enabled=True,
blocking=True,
enforce_consistent_case=True)
import * as pulumi from "@pulumi/pulumi";
import * as azuredevops from "@pulumi/azuredevops";
const exampleProject = new azuredevops.Project("exampleProject", {
visibility: "private",
versionControl: "Git",
workItemTemplate: "Agile",
description: "Managed by Terraform",
});
const exampleRepositoryPolicyCaseEnforcement = new azuredevops.RepositoryPolicyCaseEnforcement("exampleRepositoryPolicyCaseEnforcement", {
projectId: exampleProject.id,
enabled: true,
blocking: true,
enforceConsistentCase: true,
});
resources:
exampleProject:
type: azuredevops:Project
properties:
visibility: private
versionControl: Git
workItemTemplate: Agile
description: Managed by Terraform
exampleRepositoryPolicyCaseEnforcement:
type: azuredevops:RepositoryPolicyCaseEnforcement
properties:
projectId: ${exampleProject.id}
enabled: true
blocking: true
enforceConsistentCase: true
Create RepositoryPolicyCaseEnforcement Resource
new RepositoryPolicyCaseEnforcement(name: string, args: RepositoryPolicyCaseEnforcementArgs, opts?: CustomResourceOptions);
@overload
def RepositoryPolicyCaseEnforcement(resource_name: str,
opts: Optional[ResourceOptions] = None,
blocking: Optional[bool] = None,
enabled: Optional[bool] = None,
enforce_consistent_case: Optional[bool] = None,
project_id: Optional[str] = None,
repository_ids: Optional[Sequence[str]] = None)
@overload
def RepositoryPolicyCaseEnforcement(resource_name: str,
args: RepositoryPolicyCaseEnforcementArgs,
opts: Optional[ResourceOptions] = None)
func NewRepositoryPolicyCaseEnforcement(ctx *Context, name string, args RepositoryPolicyCaseEnforcementArgs, opts ...ResourceOption) (*RepositoryPolicyCaseEnforcement, error)
public RepositoryPolicyCaseEnforcement(string name, RepositoryPolicyCaseEnforcementArgs args, CustomResourceOptions? opts = null)
public RepositoryPolicyCaseEnforcement(String name, RepositoryPolicyCaseEnforcementArgs args)
public RepositoryPolicyCaseEnforcement(String name, RepositoryPolicyCaseEnforcementArgs args, CustomResourceOptions options)
type: azuredevops:RepositoryPolicyCaseEnforcement
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args RepositoryPolicyCaseEnforcementArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args RepositoryPolicyCaseEnforcementArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args RepositoryPolicyCaseEnforcementArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args RepositoryPolicyCaseEnforcementArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args RepositoryPolicyCaseEnforcementArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
RepositoryPolicyCaseEnforcement Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
The RepositoryPolicyCaseEnforcement resource accepts the following input properties:
- Enforce
Consistent boolCase Avoid case-sensitivity conflicts by blocking pushes that change name casing on files, folders, branches, and tags.
- Project
Id string The ID of the project in which the policy will be created.
- Blocking bool
A flag indicating if the policy should be blocking. Defaults to
true
.- Enabled bool
A flag indicating if the policy should be enabled. Defaults to
true
.- Repository
Ids List<string> Control whether the policy is enabled for the repository or the project. If
repository_ids
not configured, the policy will be set to the project.
- Enforce
Consistent boolCase Avoid case-sensitivity conflicts by blocking pushes that change name casing on files, folders, branches, and tags.
- Project
Id string The ID of the project in which the policy will be created.
- Blocking bool
A flag indicating if the policy should be blocking. Defaults to
true
.- Enabled bool
A flag indicating if the policy should be enabled. Defaults to
true
.- Repository
Ids []string Control whether the policy is enabled for the repository or the project. If
repository_ids
not configured, the policy will be set to the project.
- enforce
Consistent BooleanCase Avoid case-sensitivity conflicts by blocking pushes that change name casing on files, folders, branches, and tags.
- project
Id String The ID of the project in which the policy will be created.
- blocking Boolean
A flag indicating if the policy should be blocking. Defaults to
true
.- enabled Boolean
A flag indicating if the policy should be enabled. Defaults to
true
.- repository
Ids List<String> Control whether the policy is enabled for the repository or the project. If
repository_ids
not configured, the policy will be set to the project.
- enforce
Consistent booleanCase Avoid case-sensitivity conflicts by blocking pushes that change name casing on files, folders, branches, and tags.
- project
Id string The ID of the project in which the policy will be created.
- blocking boolean
A flag indicating if the policy should be blocking. Defaults to
true
.- enabled boolean
A flag indicating if the policy should be enabled. Defaults to
true
.- repository
Ids string[] Control whether the policy is enabled for the repository or the project. If
repository_ids
not configured, the policy will be set to the project.
- enforce_
consistent_ boolcase Avoid case-sensitivity conflicts by blocking pushes that change name casing on files, folders, branches, and tags.
- project_
id str The ID of the project in which the policy will be created.
- blocking bool
A flag indicating if the policy should be blocking. Defaults to
true
.- enabled bool
A flag indicating if the policy should be enabled. Defaults to
true
.- repository_
ids Sequence[str] Control whether the policy is enabled for the repository or the project. If
repository_ids
not configured, the policy will be set to the project.
- enforce
Consistent BooleanCase Avoid case-sensitivity conflicts by blocking pushes that change name casing on files, folders, branches, and tags.
- project
Id String The ID of the project in which the policy will be created.
- blocking Boolean
A flag indicating if the policy should be blocking. Defaults to
true
.- enabled Boolean
A flag indicating if the policy should be enabled. Defaults to
true
.- repository
Ids List<String> Control whether the policy is enabled for the repository or the project. If
repository_ids
not configured, the policy will be set to the project.
Outputs
All input properties are implicitly available as output properties. Additionally, the RepositoryPolicyCaseEnforcement resource produces the following output properties:
- Id string
The provider-assigned unique ID for this managed resource.
- Id string
The provider-assigned unique ID for this managed resource.
- id String
The provider-assigned unique ID for this managed resource.
- id string
The provider-assigned unique ID for this managed resource.
- id str
The provider-assigned unique ID for this managed resource.
- id String
The provider-assigned unique ID for this managed resource.
Look up Existing RepositoryPolicyCaseEnforcement Resource
Get an existing RepositoryPolicyCaseEnforcement resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: RepositoryPolicyCaseEnforcementState, opts?: CustomResourceOptions): RepositoryPolicyCaseEnforcement
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
blocking: Optional[bool] = None,
enabled: Optional[bool] = None,
enforce_consistent_case: Optional[bool] = None,
project_id: Optional[str] = None,
repository_ids: Optional[Sequence[str]] = None) -> RepositoryPolicyCaseEnforcement
func GetRepositoryPolicyCaseEnforcement(ctx *Context, name string, id IDInput, state *RepositoryPolicyCaseEnforcementState, opts ...ResourceOption) (*RepositoryPolicyCaseEnforcement, error)
public static RepositoryPolicyCaseEnforcement Get(string name, Input<string> id, RepositoryPolicyCaseEnforcementState? state, CustomResourceOptions? opts = null)
public static RepositoryPolicyCaseEnforcement get(String name, Output<String> id, RepositoryPolicyCaseEnforcementState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Blocking bool
A flag indicating if the policy should be blocking. Defaults to
true
.- Enabled bool
A flag indicating if the policy should be enabled. Defaults to
true
.- Enforce
Consistent boolCase Avoid case-sensitivity conflicts by blocking pushes that change name casing on files, folders, branches, and tags.
- Project
Id string The ID of the project in which the policy will be created.
- Repository
Ids List<string> Control whether the policy is enabled for the repository or the project. If
repository_ids
not configured, the policy will be set to the project.
- Blocking bool
A flag indicating if the policy should be blocking. Defaults to
true
.- Enabled bool
A flag indicating if the policy should be enabled. Defaults to
true
.- Enforce
Consistent boolCase Avoid case-sensitivity conflicts by blocking pushes that change name casing on files, folders, branches, and tags.
- Project
Id string The ID of the project in which the policy will be created.
- Repository
Ids []string Control whether the policy is enabled for the repository or the project. If
repository_ids
not configured, the policy will be set to the project.
- blocking Boolean
A flag indicating if the policy should be blocking. Defaults to
true
.- enabled Boolean
A flag indicating if the policy should be enabled. Defaults to
true
.- enforce
Consistent BooleanCase Avoid case-sensitivity conflicts by blocking pushes that change name casing on files, folders, branches, and tags.
- project
Id String The ID of the project in which the policy will be created.
- repository
Ids List<String> Control whether the policy is enabled for the repository or the project. If
repository_ids
not configured, the policy will be set to the project.
- blocking boolean
A flag indicating if the policy should be blocking. Defaults to
true
.- enabled boolean
A flag indicating if the policy should be enabled. Defaults to
true
.- enforce
Consistent booleanCase Avoid case-sensitivity conflicts by blocking pushes that change name casing on files, folders, branches, and tags.
- project
Id string The ID of the project in which the policy will be created.
- repository
Ids string[] Control whether the policy is enabled for the repository or the project. If
repository_ids
not configured, the policy will be set to the project.
- blocking bool
A flag indicating if the policy should be blocking. Defaults to
true
.- enabled bool
A flag indicating if the policy should be enabled. Defaults to
true
.- enforce_
consistent_ boolcase Avoid case-sensitivity conflicts by blocking pushes that change name casing on files, folders, branches, and tags.
- project_
id str The ID of the project in which the policy will be created.
- repository_
ids Sequence[str] Control whether the policy is enabled for the repository or the project. If
repository_ids
not configured, the policy will be set to the project.
- blocking Boolean
A flag indicating if the policy should be blocking. Defaults to
true
.- enabled Boolean
A flag indicating if the policy should be enabled. Defaults to
true
.- enforce
Consistent BooleanCase Avoid case-sensitivity conflicts by blocking pushes that change name casing on files, folders, branches, and tags.
- project
Id String The ID of the project in which the policy will be created.
- repository
Ids List<String> Control whether the policy is enabled for the repository or the project. If
repository_ids
not configured, the policy will be set to the project.
Import
Azure DevOps repository policies can be imported using the projectID/policyID or projectName/policyID
$ pulumi import azuredevops:index/repositoryPolicyCaseEnforcement:RepositoryPolicyCaseEnforcement example 00000000-0000-0000-0000-000000000000/0
Package Details
- Repository
- Azure DevOps pulumi/pulumi-azuredevops
- License
- Apache-2.0
- Notes
This Pulumi package is based on the
azuredevops
Terraform Provider.