@pulumi/auth0 3.3.0 → 3.3.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/action.d.ts +6 -6
- package/action.js +3 -3
- package/attackProtection.d.ts +20 -20
- package/attackProtection.js +20 -20
- package/branding.d.ts +3 -22
- package/branding.js +3 -22
- package/branding.js.map +1 -1
- package/brandingTheme.d.ts +1 -82
- package/brandingTheme.js +1 -82
- package/brandingTheme.js.map +1 -1
- package/client.d.ts +48 -48
- package/client.js +43 -43
- package/clientCredentials.d.ts +3 -73
- package/clientCredentials.js +3 -55
- package/clientCredentials.js.map +1 -1
- package/clientGrant.d.ts +2 -2
- package/clientGrant.js +2 -2
- package/connection.d.ts +467 -91
- package/connection.js +464 -88
- package/connection.js.map +1 -1
- package/connectionClient.d.ts +9 -6
- package/connectionClient.js +9 -6
- package/connectionClient.js.map +1 -1
- package/connectionClients.d.ts +8 -5
- package/connectionClients.js +8 -5
- package/connectionClients.js.map +1 -1
- package/customDomain.d.ts +4 -4
- package/customDomain.js +4 -4
- package/customDomainVerification.d.ts +1 -9
- package/customDomainVerification.js +1 -1
- package/customDomainVerification.js.map +1 -1
- package/emailProvider.d.ts +3 -39
- package/emailProvider.js +3 -39
- package/emailProvider.js.map +1 -1
- package/emailTemplate.d.ts +9 -8
- package/emailTemplate.js +9 -8
- package/emailTemplate.js.map +1 -1
- package/getClient.d.ts +16 -0
- package/getClient.js +4 -0
- package/getClient.js.map +1 -1
- package/getConnection.d.ts +10 -0
- package/getConnection.js +4 -0
- package/getConnection.js.map +1 -1
- package/getOrganization.d.ts +4 -0
- package/getOrganization.js +4 -0
- package/getOrganization.js.map +1 -1
- package/getResourceServer.d.ts +4 -0
- package/getResourceServer.js +4 -0
- package/getResourceServer.js.map +1 -1
- package/getRole.d.ts +10 -0
- package/getRole.js +4 -0
- package/getRole.js.map +1 -1
- package/getUser.d.ts +2 -0
- package/getUser.js +2 -0
- package/getUser.js.map +1 -1
- package/guardian.d.ts +20 -20
- package/guardian.js +20 -20
- package/hook.d.ts +8 -8
- package/hook.js +8 -8
- package/logStream.d.ts +13 -11
- package/logStream.js +13 -11
- package/logStream.js.map +1 -1
- package/organization.d.ts +6 -5
- package/organization.js +6 -5
- package/organization.js.map +1 -1
- package/organizationConnection.d.ts +12 -6
- package/organizationConnection.js +12 -6
- package/organizationConnection.js.map +1 -1
- package/organizationConnections.d.ts +13 -4
- package/organizationConnections.js +13 -4
- package/organizationConnections.js.map +1 -1
- package/organizationMember.d.ts +8 -5
- package/organizationMember.js +8 -5
- package/organizationMember.js.map +1 -1
- package/organizationMemberRole.d.ts +10 -7
- package/organizationMemberRole.js +10 -7
- package/organizationMemberRole.js.map +1 -1
- package/organizationMemberRoles.d.ts +11 -8
- package/organizationMemberRoles.js +11 -8
- package/organizationMemberRoles.js.map +1 -1
- package/organizationMembers.d.ts +8 -5
- package/organizationMembers.js +8 -5
- package/organizationMembers.js.map +1 -1
- package/package.json +1 -1
- package/pages.d.ts +12 -12
- package/pages.js +12 -12
- package/prompt.d.ts +5 -5
- package/prompt.js +5 -5
- package/promptCustomText.d.ts +3 -3
- package/promptCustomText.js +3 -3
- package/promptPartials.d.ts +6 -6
- package/promptPartials.js +6 -6
- package/provider.d.ts +4 -4
- package/resourceServer.d.ts +5 -4
- package/resourceServer.js +5 -4
- package/resourceServer.js.map +1 -1
- package/resourceServerScope.d.ts +9 -6
- package/resourceServerScope.js +9 -6
- package/resourceServerScope.js.map +1 -1
- package/resourceServerScopes.d.ts +6 -3
- package/resourceServerScopes.js +6 -3
- package/resourceServerScopes.js.map +1 -1
- package/role.d.ts +5 -2
- package/role.js +5 -2
- package/role.js.map +1 -1
- package/rule.d.ts +4 -4
- package/rule.js +4 -4
- package/ruleConfig.d.ts +5 -5
- package/ruleConfig.js +5 -5
- package/tenant.d.ts +14 -14
- package/tenant.js +14 -14
- package/triggerAction.d.ts +6 -5
- package/triggerAction.js +6 -5
- package/triggerAction.js.map +1 -1
- package/triggerActions.d.ts +6 -4
- package/triggerActions.js +6 -4
- package/triggerActions.js.map +1 -1
- package/types/input.d.ts +30 -39
- package/types/output.d.ts +30 -39
- package/user.d.ts +5 -4
- package/user.js +5 -4
- package/user.js.map +1 -1
- package/userPermission.d.ts +3 -3
- package/userPermission.js +3 -3
- package/userPermissions.d.ts +1 -1
- package/userPermissions.js +1 -1
- package/userRole.d.ts +9 -5
- package/userRole.js +9 -5
- package/userRole.js.map +1 -1
- package/userRoles.d.ts +7 -3
- package/userRoles.js +7 -3
- package/userRoles.js.map +1 -1
package/client.d.ts
CHANGED
|
@@ -10,38 +10,18 @@ import * as outputs from "./types/output";
|
|
|
10
10
|
* import * as pulumi from "@pulumi/pulumi";
|
|
11
11
|
* import * as auth0 from "@pulumi/auth0";
|
|
12
12
|
*
|
|
13
|
-
* const myClient = new auth0.Client("
|
|
14
|
-
*
|
|
15
|
-
*
|
|
16
|
-
* audience: "https://example.com/saml",
|
|
17
|
-
* createUpnClaim: false,
|
|
18
|
-
* issuer: "https://example.com",
|
|
19
|
-
* mapIdentities: false,
|
|
20
|
-
* mapUnknownClaimsAsIs: false,
|
|
21
|
-
* mappings: {
|
|
22
|
-
* email: "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress",
|
|
23
|
-
* name: "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name",
|
|
24
|
-
* },
|
|
25
|
-
* nameIdentifierFormat: "urn:oasis:names:tc:SAML:2.0:nameid-format:persistent",
|
|
26
|
-
* nameIdentifierProbes: ["http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress"],
|
|
27
|
-
* passthroughClaimsWithNoMapping: false,
|
|
28
|
-
* signingCert: `-----BEGIN PUBLIC KEY-----
|
|
29
|
-
* MIGf...bpP/t3
|
|
30
|
-
* +JGNGIRMj1hF1rnb6QIDAQAB
|
|
31
|
-
* -----END PUBLIC KEY-----
|
|
32
|
-
*
|
|
33
|
-
* `,
|
|
34
|
-
* },
|
|
35
|
-
* },
|
|
36
|
-
* allowedLogoutUrls: ["https://example.com"],
|
|
37
|
-
* allowedOrigins: ["https://example.com"],
|
|
13
|
+
* const myClient = new auth0.Client("my_client", {
|
|
14
|
+
* name: "Application - Acceptance Test",
|
|
15
|
+
* description: "Test Applications Long Description",
|
|
38
16
|
* appType: "non_interactive",
|
|
39
|
-
* callbacks: ["https://example.com/callback"],
|
|
40
|
-
* clientMetadata: {
|
|
41
|
-
* foo: "zoo",
|
|
42
|
-
* },
|
|
43
17
|
* customLoginPageOn: true,
|
|
44
|
-
*
|
|
18
|
+
* isFirstParty: true,
|
|
19
|
+
* isTokenEndpointIpHeaderTrusted: true,
|
|
20
|
+
* oidcConformant: false,
|
|
21
|
+
* callbacks: ["https://example.com/callback"],
|
|
22
|
+
* allowedOrigins: ["https://example.com"],
|
|
23
|
+
* allowedLogoutUrls: ["https://example.com"],
|
|
24
|
+
* webOrigins: ["https://example.com"],
|
|
45
25
|
* grantTypes: [
|
|
46
26
|
* "authorization_code",
|
|
47
27
|
* "http://auth0.com/oauth/grant-type/password-realm",
|
|
@@ -49,30 +29,50 @@ import * as outputs from "./types/output";
|
|
|
49
29
|
* "password",
|
|
50
30
|
* "refresh_token",
|
|
51
31
|
* ],
|
|
52
|
-
*
|
|
53
|
-
*
|
|
32
|
+
* clientMetadata: {
|
|
33
|
+
* foo: "zoo",
|
|
34
|
+
* },
|
|
54
35
|
* jwtConfiguration: {
|
|
55
|
-
* alg: "RS256",
|
|
56
36
|
* lifetimeInSeconds: 300,
|
|
37
|
+
* secretEncoded: true,
|
|
38
|
+
* alg: "RS256",
|
|
57
39
|
* scopes: {
|
|
58
40
|
* foo: "bar",
|
|
59
41
|
* },
|
|
60
|
-
*
|
|
42
|
+
* },
|
|
43
|
+
* refreshToken: {
|
|
44
|
+
* leeway: 0,
|
|
45
|
+
* tokenLifetime: 2592000,
|
|
46
|
+
* rotationType: "rotating",
|
|
47
|
+
* expirationType: "expiring",
|
|
61
48
|
* },
|
|
62
49
|
* mobile: {
|
|
63
50
|
* ios: {
|
|
64
|
-
* appBundleIdentifier: "com.my.bundle.id",
|
|
65
51
|
* teamId: "9JA89QQLNQ",
|
|
52
|
+
* appBundleIdentifier: "com.my.bundle.id",
|
|
66
53
|
* },
|
|
67
54
|
* },
|
|
68
|
-
*
|
|
69
|
-
*
|
|
70
|
-
*
|
|
71
|
-
*
|
|
72
|
-
*
|
|
73
|
-
*
|
|
55
|
+
* addons: {
|
|
56
|
+
* samlp: {
|
|
57
|
+
* audience: "https://example.com/saml",
|
|
58
|
+
* issuer: "https://example.com",
|
|
59
|
+
* mappings: {
|
|
60
|
+
* email: "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress",
|
|
61
|
+
* name: "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name",
|
|
62
|
+
* },
|
|
63
|
+
* createUpnClaim: false,
|
|
64
|
+
* passthroughClaimsWithNoMapping: false,
|
|
65
|
+
* mapUnknownClaimsAsIs: false,
|
|
66
|
+
* mapIdentities: false,
|
|
67
|
+
* nameIdentifierFormat: "urn:oasis:names:tc:SAML:2.0:nameid-format:persistent",
|
|
68
|
+
* nameIdentifierProbes: ["http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress"],
|
|
69
|
+
* signingCert: `-----BEGIN PUBLIC KEY-----
|
|
70
|
+
* MIGf...bpP/t3
|
|
71
|
+
* +JGNGIRMj1hF1rnb6QIDAQAB
|
|
72
|
+
* -----END PUBLIC KEY-----
|
|
73
|
+
* `,
|
|
74
|
+
* },
|
|
74
75
|
* },
|
|
75
|
-
* webOrigins: ["https://example.com"],
|
|
76
76
|
* });
|
|
77
77
|
* ```
|
|
78
78
|
*
|
|
@@ -82,7 +82,7 @@ import * as outputs from "./types/output";
|
|
|
82
82
|
*
|
|
83
83
|
* #
|
|
84
84
|
*
|
|
85
|
-
*
|
|
85
|
+
* Example:
|
|
86
86
|
*
|
|
87
87
|
* ```sh
|
|
88
88
|
* $ pulumi import auth0:index/client:Client my_client "AaiyAPdpYdesoKnqjj8HJqRn4T5titww"
|
|
@@ -133,7 +133,7 @@ export declare class Client extends pulumi.CustomResource {
|
|
|
133
133
|
*/
|
|
134
134
|
readonly clientAliases: pulumi.Output<string[] | undefined>;
|
|
135
135
|
/**
|
|
136
|
-
*
|
|
136
|
+
* The ID of the client.
|
|
137
137
|
*/
|
|
138
138
|
readonly clientId: pulumi.Output<string>;
|
|
139
139
|
/**
|
|
@@ -201,7 +201,7 @@ export declare class Client extends pulumi.CustomResource {
|
|
|
201
201
|
*/
|
|
202
202
|
readonly mobile: pulumi.Output<outputs.ClientMobile>;
|
|
203
203
|
/**
|
|
204
|
-
*
|
|
204
|
+
* Name of the client.
|
|
205
205
|
*/
|
|
206
206
|
readonly name: pulumi.Output<string>;
|
|
207
207
|
/**
|
|
@@ -292,7 +292,7 @@ export interface ClientState {
|
|
|
292
292
|
*/
|
|
293
293
|
clientAliases?: pulumi.Input<pulumi.Input<string>[]>;
|
|
294
294
|
/**
|
|
295
|
-
*
|
|
295
|
+
* The ID of the client.
|
|
296
296
|
*/
|
|
297
297
|
clientId?: pulumi.Input<string>;
|
|
298
298
|
/**
|
|
@@ -360,7 +360,7 @@ export interface ClientState {
|
|
|
360
360
|
*/
|
|
361
361
|
mobile?: pulumi.Input<inputs.ClientMobile>;
|
|
362
362
|
/**
|
|
363
|
-
*
|
|
363
|
+
* Name of the client.
|
|
364
364
|
*/
|
|
365
365
|
name?: pulumi.Input<string>;
|
|
366
366
|
/**
|
|
@@ -507,7 +507,7 @@ export interface ClientArgs {
|
|
|
507
507
|
*/
|
|
508
508
|
mobile?: pulumi.Input<inputs.ClientMobile>;
|
|
509
509
|
/**
|
|
510
|
-
*
|
|
510
|
+
* Name of the client.
|
|
511
511
|
*/
|
|
512
512
|
name?: pulumi.Input<string>;
|
|
513
513
|
/**
|
package/client.js
CHANGED
|
@@ -14,38 +14,18 @@ const utilities = require("./utilities");
|
|
|
14
14
|
* import * as pulumi from "@pulumi/pulumi";
|
|
15
15
|
* import * as auth0 from "@pulumi/auth0";
|
|
16
16
|
*
|
|
17
|
-
* const myClient = new auth0.Client("
|
|
18
|
-
*
|
|
19
|
-
*
|
|
20
|
-
* audience: "https://example.com/saml",
|
|
21
|
-
* createUpnClaim: false,
|
|
22
|
-
* issuer: "https://example.com",
|
|
23
|
-
* mapIdentities: false,
|
|
24
|
-
* mapUnknownClaimsAsIs: false,
|
|
25
|
-
* mappings: {
|
|
26
|
-
* email: "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress",
|
|
27
|
-
* name: "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name",
|
|
28
|
-
* },
|
|
29
|
-
* nameIdentifierFormat: "urn:oasis:names:tc:SAML:2.0:nameid-format:persistent",
|
|
30
|
-
* nameIdentifierProbes: ["http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress"],
|
|
31
|
-
* passthroughClaimsWithNoMapping: false,
|
|
32
|
-
* signingCert: `-----BEGIN PUBLIC KEY-----
|
|
33
|
-
* MIGf...bpP/t3
|
|
34
|
-
* +JGNGIRMj1hF1rnb6QIDAQAB
|
|
35
|
-
* -----END PUBLIC KEY-----
|
|
36
|
-
*
|
|
37
|
-
* `,
|
|
38
|
-
* },
|
|
39
|
-
* },
|
|
40
|
-
* allowedLogoutUrls: ["https://example.com"],
|
|
41
|
-
* allowedOrigins: ["https://example.com"],
|
|
17
|
+
* const myClient = new auth0.Client("my_client", {
|
|
18
|
+
* name: "Application - Acceptance Test",
|
|
19
|
+
* description: "Test Applications Long Description",
|
|
42
20
|
* appType: "non_interactive",
|
|
43
|
-
* callbacks: ["https://example.com/callback"],
|
|
44
|
-
* clientMetadata: {
|
|
45
|
-
* foo: "zoo",
|
|
46
|
-
* },
|
|
47
21
|
* customLoginPageOn: true,
|
|
48
|
-
*
|
|
22
|
+
* isFirstParty: true,
|
|
23
|
+
* isTokenEndpointIpHeaderTrusted: true,
|
|
24
|
+
* oidcConformant: false,
|
|
25
|
+
* callbacks: ["https://example.com/callback"],
|
|
26
|
+
* allowedOrigins: ["https://example.com"],
|
|
27
|
+
* allowedLogoutUrls: ["https://example.com"],
|
|
28
|
+
* webOrigins: ["https://example.com"],
|
|
49
29
|
* grantTypes: [
|
|
50
30
|
* "authorization_code",
|
|
51
31
|
* "http://auth0.com/oauth/grant-type/password-realm",
|
|
@@ -53,30 +33,50 @@ const utilities = require("./utilities");
|
|
|
53
33
|
* "password",
|
|
54
34
|
* "refresh_token",
|
|
55
35
|
* ],
|
|
56
|
-
*
|
|
57
|
-
*
|
|
36
|
+
* clientMetadata: {
|
|
37
|
+
* foo: "zoo",
|
|
38
|
+
* },
|
|
58
39
|
* jwtConfiguration: {
|
|
59
|
-
* alg: "RS256",
|
|
60
40
|
* lifetimeInSeconds: 300,
|
|
41
|
+
* secretEncoded: true,
|
|
42
|
+
* alg: "RS256",
|
|
61
43
|
* scopes: {
|
|
62
44
|
* foo: "bar",
|
|
63
45
|
* },
|
|
64
|
-
*
|
|
46
|
+
* },
|
|
47
|
+
* refreshToken: {
|
|
48
|
+
* leeway: 0,
|
|
49
|
+
* tokenLifetime: 2592000,
|
|
50
|
+
* rotationType: "rotating",
|
|
51
|
+
* expirationType: "expiring",
|
|
65
52
|
* },
|
|
66
53
|
* mobile: {
|
|
67
54
|
* ios: {
|
|
68
|
-
* appBundleIdentifier: "com.my.bundle.id",
|
|
69
55
|
* teamId: "9JA89QQLNQ",
|
|
56
|
+
* appBundleIdentifier: "com.my.bundle.id",
|
|
70
57
|
* },
|
|
71
58
|
* },
|
|
72
|
-
*
|
|
73
|
-
*
|
|
74
|
-
*
|
|
75
|
-
*
|
|
76
|
-
*
|
|
77
|
-
*
|
|
59
|
+
* addons: {
|
|
60
|
+
* samlp: {
|
|
61
|
+
* audience: "https://example.com/saml",
|
|
62
|
+
* issuer: "https://example.com",
|
|
63
|
+
* mappings: {
|
|
64
|
+
* email: "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress",
|
|
65
|
+
* name: "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name",
|
|
66
|
+
* },
|
|
67
|
+
* createUpnClaim: false,
|
|
68
|
+
* passthroughClaimsWithNoMapping: false,
|
|
69
|
+
* mapUnknownClaimsAsIs: false,
|
|
70
|
+
* mapIdentities: false,
|
|
71
|
+
* nameIdentifierFormat: "urn:oasis:names:tc:SAML:2.0:nameid-format:persistent",
|
|
72
|
+
* nameIdentifierProbes: ["http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress"],
|
|
73
|
+
* signingCert: `-----BEGIN PUBLIC KEY-----
|
|
74
|
+
* MIGf...bpP/t3
|
|
75
|
+
* +JGNGIRMj1hF1rnb6QIDAQAB
|
|
76
|
+
* -----END PUBLIC KEY-----
|
|
77
|
+
* `,
|
|
78
|
+
* },
|
|
78
79
|
* },
|
|
79
|
-
* webOrigins: ["https://example.com"],
|
|
80
80
|
* });
|
|
81
81
|
* ```
|
|
82
82
|
*
|
|
@@ -86,7 +86,7 @@ const utilities = require("./utilities");
|
|
|
86
86
|
*
|
|
87
87
|
* #
|
|
88
88
|
*
|
|
89
|
-
*
|
|
89
|
+
* Example:
|
|
90
90
|
*
|
|
91
91
|
* ```sh
|
|
92
92
|
* $ pulumi import auth0:index/client:Client my_client "AaiyAPdpYdesoKnqjj8HJqRn4T5titww"
|
package/clientCredentials.d.ts
CHANGED
|
@@ -7,73 +7,21 @@ import * as outputs from "./types/output";
|
|
|
7
7
|
* > Refer to the client secret rotation guide
|
|
8
8
|
* for instructions on how to rotate client secrets with zero downtime.
|
|
9
9
|
*
|
|
10
|
-
* ## Example Usage
|
|
11
|
-
*
|
|
12
|
-
* ```typescript
|
|
13
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
14
|
-
* import * as auth0 from "@pulumi/auth0";
|
|
15
|
-
*
|
|
16
|
-
* const myClient = new auth0.Client("myClient", {
|
|
17
|
-
* appType: "non_interactive",
|
|
18
|
-
* jwtConfiguration: {
|
|
19
|
-
* alg: "RS256",
|
|
20
|
-
* },
|
|
21
|
-
* });
|
|
22
|
-
* // Configuring client_secret_post as an authentication method.
|
|
23
|
-
* const testClientCredentials = new auth0.ClientCredentials("testClientCredentials", {
|
|
24
|
-
* clientId: myClient.id,
|
|
25
|
-
* authenticationMethod: "client_secret_post",
|
|
26
|
-
* });
|
|
27
|
-
* // Configuring client_secret_basic as an authentication method.
|
|
28
|
-
* const testIndex_clientCredentialsClientCredentials = new auth0.ClientCredentials("testIndex/clientCredentialsClientCredentials", {
|
|
29
|
-
* clientId: myClient.id,
|
|
30
|
-
* authenticationMethod: "client_secret_basic",
|
|
31
|
-
* });
|
|
32
|
-
* // Configuring none as an authentication method.
|
|
33
|
-
* const testAuth0Index_clientCredentialsClientCredentials = new auth0.ClientCredentials("testAuth0Index/clientCredentialsClientCredentials", {
|
|
34
|
-
* clientId: myClient.id,
|
|
35
|
-
* authenticationMethod: "none",
|
|
36
|
-
* });
|
|
37
|
-
* // Configuring private_key_jwt as an authentication method.
|
|
38
|
-
* const testAuth0Index_clientCredentialsClientCredentials1 = new auth0.ClientCredentials("testAuth0Index/clientCredentialsClientCredentials1", {
|
|
39
|
-
* clientId: myClient.id,
|
|
40
|
-
* authenticationMethod: "private_key_jwt",
|
|
41
|
-
* privateKeyJwt: {
|
|
42
|
-
* credentials: [{
|
|
43
|
-
* name: "Testing Credentials 1",
|
|
44
|
-
* credentialType: "public_key",
|
|
45
|
-
* algorithm: "RS256",
|
|
46
|
-
* parseExpiryFromCert: true,
|
|
47
|
-
* pem: `-----BEGIN CERTIFICATE-----
|
|
48
|
-
* MIIFWDCCA0ACCQDXqpBo3R...G9w0BAQsFADBuMQswCQYDVQQGEwJl
|
|
49
|
-
* -----END CERTIFICATE-----
|
|
50
|
-
* `,
|
|
51
|
-
* }],
|
|
52
|
-
* },
|
|
53
|
-
* });
|
|
54
|
-
* // Configuring the client_secret.
|
|
55
|
-
* const testAuth0Index_clientCredentialsClientCredentials2 = new auth0.ClientCredentials("testAuth0Index/clientCredentialsClientCredentials2", {
|
|
56
|
-
* clientId: myClient.id,
|
|
57
|
-
* authenticationMethod: "client_secret_basic",
|
|
58
|
-
* clientSecret: "LUFqPx+sRLjbL7peYRPFmFu-bbvE7u7og4YUNe_C345=683341",
|
|
59
|
-
* });
|
|
60
|
-
* ```
|
|
61
|
-
*
|
|
62
10
|
* ## Import
|
|
63
11
|
*
|
|
64
12
|
* This resource can be imported by specifying the client ID.
|
|
65
13
|
*
|
|
66
14
|
* #
|
|
67
15
|
*
|
|
68
|
-
*
|
|
16
|
+
* Example:
|
|
69
17
|
*
|
|
70
18
|
* ```sh
|
|
71
19
|
* $ pulumi import auth0:index/clientCredentials:ClientCredentials my_creds "AaiyAPdpYdesoKnqjj8HJqRn4T5titww"
|
|
72
20
|
* ```
|
|
73
21
|
*
|
|
74
|
-
*
|
|
22
|
+
* ~> Importing this resource when the `authentication_method` is set to `private_key_jwt` will force the resource to be recreated.
|
|
75
23
|
*
|
|
76
|
-
*
|
|
24
|
+
* This is to be expected, because the pem file can't be checked for differences.
|
|
77
25
|
*/
|
|
78
26
|
export declare class ClientCredentials extends pulumi.CustomResource {
|
|
79
27
|
/**
|
|
@@ -99,12 +47,6 @@ export declare class ClientCredentials extends pulumi.CustomResource {
|
|
|
99
47
|
* The ID of the client for which to configure the authentication method.
|
|
100
48
|
*/
|
|
101
49
|
readonly clientId: pulumi.Output<string>;
|
|
102
|
-
/**
|
|
103
|
-
* Secret for the client when using `client_secret_post` or `client_secret_basic` authentication method. Keep this private.
|
|
104
|
-
* To access this attribute you need to add the `read:client_keys` scope to the Terraform client. Otherwise, the attribute
|
|
105
|
-
* will contain an empty string. The attribute will also be an empty string in case `private_key_jwt` is selected as an
|
|
106
|
-
* authentication method.
|
|
107
|
-
*/
|
|
108
50
|
readonly clientSecret: pulumi.Output<string>;
|
|
109
51
|
/**
|
|
110
52
|
* Defines `privateKeyJwt` client authentication method.
|
|
@@ -131,12 +73,6 @@ export interface ClientCredentialsState {
|
|
|
131
73
|
* The ID of the client for which to configure the authentication method.
|
|
132
74
|
*/
|
|
133
75
|
clientId?: pulumi.Input<string>;
|
|
134
|
-
/**
|
|
135
|
-
* Secret for the client when using `client_secret_post` or `client_secret_basic` authentication method. Keep this private.
|
|
136
|
-
* To access this attribute you need to add the `read:client_keys` scope to the Terraform client. Otherwise, the attribute
|
|
137
|
-
* will contain an empty string. The attribute will also be an empty string in case `private_key_jwt` is selected as an
|
|
138
|
-
* authentication method.
|
|
139
|
-
*/
|
|
140
76
|
clientSecret?: pulumi.Input<string>;
|
|
141
77
|
/**
|
|
142
78
|
* Defines `privateKeyJwt` client authentication method.
|
|
@@ -155,12 +91,6 @@ export interface ClientCredentialsArgs {
|
|
|
155
91
|
* The ID of the client for which to configure the authentication method.
|
|
156
92
|
*/
|
|
157
93
|
clientId: pulumi.Input<string>;
|
|
158
|
-
/**
|
|
159
|
-
* Secret for the client when using `client_secret_post` or `client_secret_basic` authentication method. Keep this private.
|
|
160
|
-
* To access this attribute you need to add the `read:client_keys` scope to the Terraform client. Otherwise, the attribute
|
|
161
|
-
* will contain an empty string. The attribute will also be an empty string in case `private_key_jwt` is selected as an
|
|
162
|
-
* authentication method.
|
|
163
|
-
*/
|
|
164
94
|
clientSecret?: pulumi.Input<string>;
|
|
165
95
|
/**
|
|
166
96
|
* Defines `privateKeyJwt` client authentication method.
|
package/clientCredentials.js
CHANGED
|
@@ -11,73 +11,21 @@ const utilities = require("./utilities");
|
|
|
11
11
|
* > Refer to the client secret rotation guide
|
|
12
12
|
* for instructions on how to rotate client secrets with zero downtime.
|
|
13
13
|
*
|
|
14
|
-
* ## Example Usage
|
|
15
|
-
*
|
|
16
|
-
* ```typescript
|
|
17
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
18
|
-
* import * as auth0 from "@pulumi/auth0";
|
|
19
|
-
*
|
|
20
|
-
* const myClient = new auth0.Client("myClient", {
|
|
21
|
-
* appType: "non_interactive",
|
|
22
|
-
* jwtConfiguration: {
|
|
23
|
-
* alg: "RS256",
|
|
24
|
-
* },
|
|
25
|
-
* });
|
|
26
|
-
* // Configuring client_secret_post as an authentication method.
|
|
27
|
-
* const testClientCredentials = new auth0.ClientCredentials("testClientCredentials", {
|
|
28
|
-
* clientId: myClient.id,
|
|
29
|
-
* authenticationMethod: "client_secret_post",
|
|
30
|
-
* });
|
|
31
|
-
* // Configuring client_secret_basic as an authentication method.
|
|
32
|
-
* const testIndex_clientCredentialsClientCredentials = new auth0.ClientCredentials("testIndex/clientCredentialsClientCredentials", {
|
|
33
|
-
* clientId: myClient.id,
|
|
34
|
-
* authenticationMethod: "client_secret_basic",
|
|
35
|
-
* });
|
|
36
|
-
* // Configuring none as an authentication method.
|
|
37
|
-
* const testAuth0Index_clientCredentialsClientCredentials = new auth0.ClientCredentials("testAuth0Index/clientCredentialsClientCredentials", {
|
|
38
|
-
* clientId: myClient.id,
|
|
39
|
-
* authenticationMethod: "none",
|
|
40
|
-
* });
|
|
41
|
-
* // Configuring private_key_jwt as an authentication method.
|
|
42
|
-
* const testAuth0Index_clientCredentialsClientCredentials1 = new auth0.ClientCredentials("testAuth0Index/clientCredentialsClientCredentials1", {
|
|
43
|
-
* clientId: myClient.id,
|
|
44
|
-
* authenticationMethod: "private_key_jwt",
|
|
45
|
-
* privateKeyJwt: {
|
|
46
|
-
* credentials: [{
|
|
47
|
-
* name: "Testing Credentials 1",
|
|
48
|
-
* credentialType: "public_key",
|
|
49
|
-
* algorithm: "RS256",
|
|
50
|
-
* parseExpiryFromCert: true,
|
|
51
|
-
* pem: `-----BEGIN CERTIFICATE-----
|
|
52
|
-
* MIIFWDCCA0ACCQDXqpBo3R...G9w0BAQsFADBuMQswCQYDVQQGEwJl
|
|
53
|
-
* -----END CERTIFICATE-----
|
|
54
|
-
* `,
|
|
55
|
-
* }],
|
|
56
|
-
* },
|
|
57
|
-
* });
|
|
58
|
-
* // Configuring the client_secret.
|
|
59
|
-
* const testAuth0Index_clientCredentialsClientCredentials2 = new auth0.ClientCredentials("testAuth0Index/clientCredentialsClientCredentials2", {
|
|
60
|
-
* clientId: myClient.id,
|
|
61
|
-
* authenticationMethod: "client_secret_basic",
|
|
62
|
-
* clientSecret: "LUFqPx+sRLjbL7peYRPFmFu-bbvE7u7og4YUNe_C345=683341",
|
|
63
|
-
* });
|
|
64
|
-
* ```
|
|
65
|
-
*
|
|
66
14
|
* ## Import
|
|
67
15
|
*
|
|
68
16
|
* This resource can be imported by specifying the client ID.
|
|
69
17
|
*
|
|
70
18
|
* #
|
|
71
19
|
*
|
|
72
|
-
*
|
|
20
|
+
* Example:
|
|
73
21
|
*
|
|
74
22
|
* ```sh
|
|
75
23
|
* $ pulumi import auth0:index/clientCredentials:ClientCredentials my_creds "AaiyAPdpYdesoKnqjj8HJqRn4T5titww"
|
|
76
24
|
* ```
|
|
77
25
|
*
|
|
78
|
-
*
|
|
26
|
+
* ~> Importing this resource when the `authentication_method` is set to `private_key_jwt` will force the resource to be recreated.
|
|
79
27
|
*
|
|
80
|
-
*
|
|
28
|
+
* This is to be expected, because the pem file can't be checked for differences.
|
|
81
29
|
*/
|
|
82
30
|
class ClientCredentials extends pulumi.CustomResource {
|
|
83
31
|
/**
|
package/clientCredentials.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"clientCredentials.js","sourceRoot":"","sources":["../clientCredentials.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"clientCredentials.js","sourceRoot":"","sources":["../clientCredentials.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;GAqBG;AACH,MAAa,iBAAkB,SAAQ,MAAM,CAAC,cAAc;IACxD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA8B,EAAE,IAAmC;QAC5H,OAAO,IAAI,iBAAiB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACxE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,iBAAiB,CAAC,YAAY,CAAC;IAClE,CAAC;IAwBD,YAAY,IAAY,EAAE,WAA4D,EAAE,IAAmC;QACvH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAiD,CAAC;YAChE,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7E;aAAM;YACH,MAAM,IAAI,GAAG,WAAgD,CAAC;YAC9D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,oBAAoB,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjE,MAAM,IAAI,KAAK,CAAC,kDAAkD,CAAC,CAAC;aACvE;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,cAAc,CAAC,GAAG,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,YAAY,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACnG,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3E;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,cAAc,CAAC,EAAE,CAAC;QACjE,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,iBAAiB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACtE,CAAC;;AA5EL,8CA6EC;AA/DG,gBAAgB;AACO,8BAAY,GAAG,iDAAiD,CAAC"}
|
package/clientGrant.d.ts
CHANGED
|
@@ -6,11 +6,11 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
6
6
|
*
|
|
7
7
|
* This resource can be imported by specifying the client grant ID.
|
|
8
8
|
*
|
|
9
|
-
*
|
|
9
|
+
* You can find this within the Management Dashboard in Application -> APIs -> Expand the required API.
|
|
10
10
|
*
|
|
11
11
|
* #
|
|
12
12
|
*
|
|
13
|
-
*
|
|
13
|
+
* Example:
|
|
14
14
|
*
|
|
15
15
|
* ```sh
|
|
16
16
|
* $ pulumi import auth0:index/clientGrant:ClientGrant my_client_grant "cgr_XXXXXXXXXXXXXXXX"
|
package/clientGrant.js
CHANGED
|
@@ -12,11 +12,11 @@ const utilities = require("./utilities");
|
|
|
12
12
|
*
|
|
13
13
|
* This resource can be imported by specifying the client grant ID.
|
|
14
14
|
*
|
|
15
|
-
*
|
|
15
|
+
* You can find this within the Management Dashboard in Application -> APIs -> Expand the required API.
|
|
16
16
|
*
|
|
17
17
|
* #
|
|
18
18
|
*
|
|
19
|
-
*
|
|
19
|
+
* Example:
|
|
20
20
|
*
|
|
21
21
|
* ```sh
|
|
22
22
|
* $ pulumi import auth0:index/clientGrant:ClientGrant my_client_grant "cgr_XXXXXXXXXXXXXXXX"
|