@pulumi/auth0 3.3.2 → 3.3.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/package.json +3 -2
- package/rolePermission.d.ts +16 -0
- package/rolePermission.js +16 -0
- package/rolePermission.js.map +1 -1
- package/rolePermissions.d.ts +50 -0
- package/rolePermissions.js +50 -0
- package/rolePermissions.js.map +1 -1
- package/package.json.bak +0 -27
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@pulumi/auth0",
|
|
3
|
-
"version": "
|
|
3
|
+
"version": "3.3.3",
|
|
4
4
|
"description": "A Pulumi package for creating and managing auth0 cloud resources.",
|
|
5
5
|
"keywords": [
|
|
6
6
|
"pulumi",
|
|
@@ -22,6 +22,7 @@
|
|
|
22
22
|
},
|
|
23
23
|
"pulumi": {
|
|
24
24
|
"resource": true,
|
|
25
|
-
"name": "auth0"
|
|
25
|
+
"name": "auth0",
|
|
26
|
+
"version": "3.3.3"
|
|
26
27
|
}
|
|
27
28
|
}
|
package/rolePermission.d.ts
CHANGED
|
@@ -5,6 +5,22 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
5
5
|
* !> This resource appends a permission to a role. In contrast, the `auth0.RolePermissions` resource manages all the
|
|
6
6
|
* permissions assigned to a role. To avoid potential issues, it is recommended not to use this resource in conjunction
|
|
7
7
|
* with the `auth0.RolePermissions` resource when managing permissions for the same role id.
|
|
8
|
+
*
|
|
9
|
+
* ## Import
|
|
10
|
+
*
|
|
11
|
+
* This resource can be imported by specifying the
|
|
12
|
+
*
|
|
13
|
+
* role ID, resource identifier, and permission name separated by "::" (note the double colon)
|
|
14
|
+
*
|
|
15
|
+
* <roleID>::<resourceServerIdentifier>::<permission>
|
|
16
|
+
*
|
|
17
|
+
* #
|
|
18
|
+
*
|
|
19
|
+
* Example:
|
|
20
|
+
*
|
|
21
|
+
* ```sh
|
|
22
|
+
* $ pulumi import auth0:index/rolePermission:RolePermission permission "rol_XXXXXXXXXXXXX::https://example.com::read:foo"
|
|
23
|
+
* ```
|
|
8
24
|
*/
|
|
9
25
|
export declare class RolePermission extends pulumi.CustomResource {
|
|
10
26
|
/**
|
package/rolePermission.js
CHANGED
|
@@ -11,6 +11,22 @@ const utilities = require("./utilities");
|
|
|
11
11
|
* !> This resource appends a permission to a role. In contrast, the `auth0.RolePermissions` resource manages all the
|
|
12
12
|
* permissions assigned to a role. To avoid potential issues, it is recommended not to use this resource in conjunction
|
|
13
13
|
* with the `auth0.RolePermissions` resource when managing permissions for the same role id.
|
|
14
|
+
*
|
|
15
|
+
* ## Import
|
|
16
|
+
*
|
|
17
|
+
* This resource can be imported by specifying the
|
|
18
|
+
*
|
|
19
|
+
* role ID, resource identifier, and permission name separated by "::" (note the double colon)
|
|
20
|
+
*
|
|
21
|
+
* <roleID>::<resourceServerIdentifier>::<permission>
|
|
22
|
+
*
|
|
23
|
+
* #
|
|
24
|
+
*
|
|
25
|
+
* Example:
|
|
26
|
+
*
|
|
27
|
+
* ```sh
|
|
28
|
+
* $ pulumi import auth0:index/rolePermission:RolePermission permission "rol_XXXXXXXXXXXXX::https://example.com::read:foo"
|
|
29
|
+
* ```
|
|
14
30
|
*/
|
|
15
31
|
class RolePermission extends pulumi.CustomResource {
|
|
16
32
|
/**
|
package/rolePermission.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"rolePermission.js","sourceRoot":"","sources":["../rolePermission.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"rolePermission.js","sourceRoot":"","sources":["../rolePermission.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;GAsBG;AACH,MAAa,cAAe,SAAQ,MAAM,CAAC,cAAc;IACrD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA2B,EAAE,IAAmC;QACzH,OAAO,IAAI,cAAc,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACrE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,cAAc,CAAC,YAAY,CAAC;IAC/D,CAAC;IA+BD,YAAY,IAAY,EAAE,WAAsD,EAAE,IAAmC;QACjH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA8C,CAAC;YAC7D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,0BAA0B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAA6C,CAAC;YAC3D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,UAAU,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACvD,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,wBAAwB,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrE,MAAM,IAAI,KAAK,CAAC,sDAAsD,CAAC,CAAC;aAC3E;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,0BAA0B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,aAAa,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAClD,cAAc,CAAC,oBAAoB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAC5D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,cAAc,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACnE,CAAC;;AAtFL,wCAuFC;AAzEG,gBAAgB;AACO,2BAAY,GAAG,2CAA2C,CAAC"}
|
package/rolePermissions.d.ts
CHANGED
|
@@ -7,6 +7,56 @@ import * as outputs from "./types/output";
|
|
|
7
7
|
* !> This resource manages all the permissions assigned to a role. In contrast, the `auth0.RolePermission` resource only
|
|
8
8
|
* appends a permission to a role. To avoid potential issues, it is recommended not to use this resource in conjunction
|
|
9
9
|
* with the `auth0.RolePermission` resource when managing permissions for the same role id.
|
|
10
|
+
*
|
|
11
|
+
* ## Example Usage
|
|
12
|
+
*
|
|
13
|
+
* ```typescript
|
|
14
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
15
|
+
* import * as auth0 from "@pulumi/auth0";
|
|
16
|
+
*
|
|
17
|
+
* // Example:
|
|
18
|
+
* const resourceServer = new auth0.ResourceServer("resource_server", {
|
|
19
|
+
* name: "test",
|
|
20
|
+
* identifier: "test.example.com",
|
|
21
|
+
* });
|
|
22
|
+
* const resourceServerScopes = new auth0.ResourceServerScopes("resource_server_scopes", {
|
|
23
|
+
* resourceServerIdentifier: resourceServer.identifier,
|
|
24
|
+
* scopes: [
|
|
25
|
+
* {
|
|
26
|
+
* name: "store:create",
|
|
27
|
+
* },
|
|
28
|
+
* {
|
|
29
|
+
* name: "store:read",
|
|
30
|
+
* },
|
|
31
|
+
* {
|
|
32
|
+
* name: "store:update",
|
|
33
|
+
* },
|
|
34
|
+
* {
|
|
35
|
+
* name: "store:delete",
|
|
36
|
+
* },
|
|
37
|
+
* ],
|
|
38
|
+
* });
|
|
39
|
+
* const myRole = new auth0.Role("my_role", {name: "My Role"});
|
|
40
|
+
* const myRolePerms = new auth0.RolePermissions("my_role_perms", {
|
|
41
|
+
* permissions: resourceServer.identifier.apply(identifier => .map(entry => ({
|
|
42
|
+
* name: entry.value.name,
|
|
43
|
+
* resourceServerIdentifier: identifier,
|
|
44
|
+
* }))),
|
|
45
|
+
* roleId: myRole.id,
|
|
46
|
+
* });
|
|
47
|
+
* ```
|
|
48
|
+
*
|
|
49
|
+
* ## Import
|
|
50
|
+
*
|
|
51
|
+
* This resource can be imported by specifying the role ID
|
|
52
|
+
*
|
|
53
|
+
* #
|
|
54
|
+
*
|
|
55
|
+
* Example:
|
|
56
|
+
*
|
|
57
|
+
* ```sh
|
|
58
|
+
* $ pulumi import auth0:index/rolePermissions:RolePermissions all_role_permissions "rol_XXXXXXXXXXXX"
|
|
59
|
+
* ```
|
|
10
60
|
*/
|
|
11
61
|
export declare class RolePermissions extends pulumi.CustomResource {
|
|
12
62
|
/**
|
package/rolePermissions.js
CHANGED
|
@@ -11,6 +11,56 @@ const utilities = require("./utilities");
|
|
|
11
11
|
* !> This resource manages all the permissions assigned to a role. In contrast, the `auth0.RolePermission` resource only
|
|
12
12
|
* appends a permission to a role. To avoid potential issues, it is recommended not to use this resource in conjunction
|
|
13
13
|
* with the `auth0.RolePermission` resource when managing permissions for the same role id.
|
|
14
|
+
*
|
|
15
|
+
* ## Example Usage
|
|
16
|
+
*
|
|
17
|
+
* ```typescript
|
|
18
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
19
|
+
* import * as auth0 from "@pulumi/auth0";
|
|
20
|
+
*
|
|
21
|
+
* // Example:
|
|
22
|
+
* const resourceServer = new auth0.ResourceServer("resource_server", {
|
|
23
|
+
* name: "test",
|
|
24
|
+
* identifier: "test.example.com",
|
|
25
|
+
* });
|
|
26
|
+
* const resourceServerScopes = new auth0.ResourceServerScopes("resource_server_scopes", {
|
|
27
|
+
* resourceServerIdentifier: resourceServer.identifier,
|
|
28
|
+
* scopes: [
|
|
29
|
+
* {
|
|
30
|
+
* name: "store:create",
|
|
31
|
+
* },
|
|
32
|
+
* {
|
|
33
|
+
* name: "store:read",
|
|
34
|
+
* },
|
|
35
|
+
* {
|
|
36
|
+
* name: "store:update",
|
|
37
|
+
* },
|
|
38
|
+
* {
|
|
39
|
+
* name: "store:delete",
|
|
40
|
+
* },
|
|
41
|
+
* ],
|
|
42
|
+
* });
|
|
43
|
+
* const myRole = new auth0.Role("my_role", {name: "My Role"});
|
|
44
|
+
* const myRolePerms = new auth0.RolePermissions("my_role_perms", {
|
|
45
|
+
* permissions: resourceServer.identifier.apply(identifier => .map(entry => ({
|
|
46
|
+
* name: entry.value.name,
|
|
47
|
+
* resourceServerIdentifier: identifier,
|
|
48
|
+
* }))),
|
|
49
|
+
* roleId: myRole.id,
|
|
50
|
+
* });
|
|
51
|
+
* ```
|
|
52
|
+
*
|
|
53
|
+
* ## Import
|
|
54
|
+
*
|
|
55
|
+
* This resource can be imported by specifying the role ID
|
|
56
|
+
*
|
|
57
|
+
* #
|
|
58
|
+
*
|
|
59
|
+
* Example:
|
|
60
|
+
*
|
|
61
|
+
* ```sh
|
|
62
|
+
* $ pulumi import auth0:index/rolePermissions:RolePermissions all_role_permissions "rol_XXXXXXXXXXXX"
|
|
63
|
+
* ```
|
|
14
64
|
*/
|
|
15
65
|
class RolePermissions extends pulumi.CustomResource {
|
|
16
66
|
/**
|
package/rolePermissions.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"rolePermissions.js","sourceRoot":"","sources":["../rolePermissions.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"rolePermissions.js","sourceRoot":"","sources":["../rolePermissions.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAwDG;AACH,MAAa,eAAgB,SAAQ,MAAM,CAAC,cAAc;IACtD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA4B,EAAE,IAAmC;QAC1H,OAAO,IAAI,eAAe,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACtE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,eAAe,CAAC,YAAY,CAAC;IAChE,CAAC;IAmBD,YAAY,IAAY,EAAE,WAAwD,EAAE,IAAmC;QACnH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA+C,CAAC;YAC9D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAA8C,CAAC;YAC5D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,WAAW,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACxD,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,eAAe,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACpE,CAAC;;AAjEL,0CAkEC;AApDG,gBAAgB;AACO,4BAAY,GAAG,6CAA6C,CAAC"}
|
package/package.json.bak
DELETED
|
@@ -1,27 +0,0 @@
|
|
|
1
|
-
{
|
|
2
|
-
"name": "@pulumi/auth0",
|
|
3
|
-
"version": "${VERSION}",
|
|
4
|
-
"description": "A Pulumi package for creating and managing auth0 cloud resources.",
|
|
5
|
-
"keywords": [
|
|
6
|
-
"pulumi",
|
|
7
|
-
"auth0"
|
|
8
|
-
],
|
|
9
|
-
"homepage": "https://pulumi.io",
|
|
10
|
-
"repository": "https://github.com/pulumi/pulumi-auth0",
|
|
11
|
-
"license": "Apache-2.0",
|
|
12
|
-
"scripts": {
|
|
13
|
-
"build": "tsc"
|
|
14
|
-
},
|
|
15
|
-
"dependencies": {
|
|
16
|
-
"@pulumi/pulumi": "^3.0.0"
|
|
17
|
-
},
|
|
18
|
-
"devDependencies": {
|
|
19
|
-
"@types/mime": "^2.0.0",
|
|
20
|
-
"@types/node": "^10.0.0",
|
|
21
|
-
"typescript": "^4.3.5"
|
|
22
|
-
},
|
|
23
|
-
"pulumi": {
|
|
24
|
-
"resource": true,
|
|
25
|
-
"name": "auth0"
|
|
26
|
-
}
|
|
27
|
-
}
|