@pulumi/cloudflare 5.44.0-alpha.1732685334 → 5.44.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/logpushJob.d.ts +3 -3
- package/notificationPolicy.d.ts +3 -3
- package/package.json +2 -2
- package/r2bucket.d.ts +3 -3
- package/types/input.d.ts +36 -26
- package/types/output.d.ts +36 -26
package/logpushJob.d.ts
CHANGED
|
@@ -39,7 +39,7 @@ export declare class LogpushJob extends pulumi.CustomResource {
|
|
|
39
39
|
*/
|
|
40
40
|
readonly accountId: pulumi.Output<string | undefined>;
|
|
41
41
|
/**
|
|
42
|
-
* The kind of the dataset to use with the logpush job. Available values: `accessRequests`, `casbFindings`, `firewallEvents`, `httpRequests`, `spectrumEvents`, `nelReports`, `auditLogs`, `gatewayDns`, `gatewayHttp`, `gatewayNetwork`, `dnsLogs`, `networkAnalyticsLogs`, `workersTraceEvents`, `devicePostureResults`, `zeroTrustNetworkSessions`, `magicIdsDetections`, `pageShieldEvents`.
|
|
42
|
+
* The kind of the dataset to use with the logpush job. Available values: `accessRequests`, `casbFindings`, `firewallEvents`, `httpRequests`, `spectrumEvents`, `nelReports`, `auditLogs`, `gatewayDns`, `gatewayHttp`, `gatewayNetwork`, `dnsLogs`, `networkAnalyticsLogs`, `workersTraceEvents`, `devicePostureResults`, `zeroTrustNetworkSessions`, `magicIdsDetections`, `pageShieldEvents`, `dlpForensicCopies`.
|
|
43
43
|
*/
|
|
44
44
|
readonly dataset: pulumi.Output<string>;
|
|
45
45
|
/**
|
|
@@ -114,7 +114,7 @@ export interface LogpushJobState {
|
|
|
114
114
|
*/
|
|
115
115
|
accountId?: pulumi.Input<string>;
|
|
116
116
|
/**
|
|
117
|
-
* The kind of the dataset to use with the logpush job. Available values: `accessRequests`, `casbFindings`, `firewallEvents`, `httpRequests`, `spectrumEvents`, `nelReports`, `auditLogs`, `gatewayDns`, `gatewayHttp`, `gatewayNetwork`, `dnsLogs`, `networkAnalyticsLogs`, `workersTraceEvents`, `devicePostureResults`, `zeroTrustNetworkSessions`, `magicIdsDetections`, `pageShieldEvents`.
|
|
117
|
+
* The kind of the dataset to use with the logpush job. Available values: `accessRequests`, `casbFindings`, `firewallEvents`, `httpRequests`, `spectrumEvents`, `nelReports`, `auditLogs`, `gatewayDns`, `gatewayHttp`, `gatewayNetwork`, `dnsLogs`, `networkAnalyticsLogs`, `workersTraceEvents`, `devicePostureResults`, `zeroTrustNetworkSessions`, `magicIdsDetections`, `pageShieldEvents`, `dlpForensicCopies`.
|
|
118
118
|
*/
|
|
119
119
|
dataset?: pulumi.Input<string>;
|
|
120
120
|
/**
|
|
@@ -181,7 +181,7 @@ export interface LogpushJobArgs {
|
|
|
181
181
|
*/
|
|
182
182
|
accountId?: pulumi.Input<string>;
|
|
183
183
|
/**
|
|
184
|
-
* The kind of the dataset to use with the logpush job. Available values: `accessRequests`, `casbFindings`, `firewallEvents`, `httpRequests`, `spectrumEvents`, `nelReports`, `auditLogs`, `gatewayDns`, `gatewayHttp`, `gatewayNetwork`, `dnsLogs`, `networkAnalyticsLogs`, `workersTraceEvents`, `devicePostureResults`, `zeroTrustNetworkSessions`, `magicIdsDetections`, `pageShieldEvents`.
|
|
184
|
+
* The kind of the dataset to use with the logpush job. Available values: `accessRequests`, `casbFindings`, `firewallEvents`, `httpRequests`, `spectrumEvents`, `nelReports`, `auditLogs`, `gatewayDns`, `gatewayHttp`, `gatewayNetwork`, `dnsLogs`, `networkAnalyticsLogs`, `workersTraceEvents`, `devicePostureResults`, `zeroTrustNetworkSessions`, `magicIdsDetections`, `pageShieldEvents`, `dlpForensicCopies`.
|
|
185
185
|
*/
|
|
186
186
|
dataset: pulumi.Input<string>;
|
|
187
187
|
/**
|
package/notificationPolicy.d.ts
CHANGED
|
@@ -33,7 +33,7 @@ export declare class NotificationPolicy extends pulumi.CustomResource {
|
|
|
33
33
|
*/
|
|
34
34
|
readonly accountId: pulumi.Output<string>;
|
|
35
35
|
/**
|
|
36
|
-
* The event type that will trigger the dispatch of a notification. See the developer documentation for descriptions of [available alert types](https://developers.cloudflare.com/fundamentals/notifications/notification-available/). Available values: `advancedHttpAlertError`, `accessCustomCertificateExpirationType`, `advancedDdosAttackL4Alert`, `advancedDdosAttackL7Alert`, `bgpHijackNotification`, `billingUsageAlert`, `blockNotificationBlockRemoved`, `blockNotificationNewBlock`, `blockNotificationReviewRejected`, `brandProtectionAlert`, `brandProtectionDigest`, `clickhouseAlertFwAnomaly`, `clickhouseAlertFwEntAnomaly`, `customSslCertificateEventType`, `dedicatedSslCertificateEventType`, `dosAttackL4`, `dosAttackL7`, `expiringServiceTokenAlert`, `failingLogpushJobDisabledAlert`, `fbmAutoAdvertisement`, `fbmDosdAttack`, `fbmVolumetricAttack`, `healthCheckStatusNotification`, `hostnameAopCustomCertificateExpirationType`, `httpAlertEdgeError`, `httpAlertOriginError`, `imageNotification`, `incidentAlert`, `loadBalancingHealthAlert`, `loadBalancingPoolEnablementAlert`, `logoMatchAlert`, `magicTunnelHealthCheckEvent`, `maintenanceEventNotification`, `mtlsCertificateStoreCertificateExpirationType`, `pagesEventAlert`, `radarNotification`, `realOriginMonitoring`, `scriptmonitorAlertNewCodeChangeDetections`, `scriptmonitorAlertNewHosts`, `scriptmonitorAlertNewMaliciousHosts`, `scriptmonitorAlertNewMaliciousScripts`, `scriptmonitorAlertNewMaliciousUrl`, `scriptmonitorAlertNewMaxLengthResourceUrl`, `scriptmonitorAlertNewResources`, `secondaryDnsAllPrimariesFailing`, `secondaryDnsPrimariesFailing`, `secondaryDnsZoneSuccessfullyUpdated`, `secondaryDnsZoneValidationWarning`, `sentinelAlert`, `streamLiveNotifications`, `trafficAnomaliesAlert`, `tunnelHealthEvent`, `tunnelUpdateEvent`, `universalSslEventType`, `webAnalyticsMetricsUpdate`, `weeklyAccountOverview`, `workersAlert`, `zoneAopCustomCertificateExpirationType`.
|
|
36
|
+
* The event type that will trigger the dispatch of a notification. See the developer documentation for descriptions of [available alert types](https://developers.cloudflare.com/fundamentals/notifications/notification-available/). Available values: `advancedHttpAlertError`, `accessCustomCertificateExpirationType`, `advancedDdosAttackL4Alert`, `advancedDdosAttackL7Alert`, `bgpHijackNotification`, `billingUsageAlert`, `blockNotificationBlockRemoved`, `blockNotificationNewBlock`, `blockNotificationReviewRejected`, `brandProtectionAlert`, `brandProtectionDigest`, `clickhouseAlertFwAnomaly`, `clickhouseAlertFwEntAnomaly`, `customSslCertificateEventType`, `dedicatedSslCertificateEventType`, `dosAttackL4`, `dosAttackL7`, `expiringServiceTokenAlert`, `failingLogpushJobDisabledAlert`, `fbmAutoAdvertisement`, `fbmDosdAttack`, `fbmVolumetricAttack`, `healthCheckStatusNotification`, `hostnameAopCustomCertificateExpirationType`, `httpAlertEdgeError`, `httpAlertOriginError`, `imageNotification`, `imageResizingNotification`, `incidentAlert`, `loadBalancingHealthAlert`, `loadBalancingPoolEnablementAlert`, `logoMatchAlert`, `magicTunnelHealthCheckEvent`, `maintenanceEventNotification`, `mtlsCertificateStoreCertificateExpirationType`, `pagesEventAlert`, `radarNotification`, `realOriginMonitoring`, `scriptmonitorAlertNewCodeChangeDetections`, `scriptmonitorAlertNewHosts`, `scriptmonitorAlertNewMaliciousHosts`, `scriptmonitorAlertNewMaliciousScripts`, `scriptmonitorAlertNewMaliciousUrl`, `scriptmonitorAlertNewMaxLengthResourceUrl`, `scriptmonitorAlertNewResources`, `secondaryDnsAllPrimariesFailing`, `secondaryDnsPrimariesFailing`, `secondaryDnsZoneSuccessfullyUpdated`, `secondaryDnsZoneValidationWarning`, `sentinelAlert`, `streamLiveNotifications`, `trafficAnomaliesAlert`, `tunnelHealthEvent`, `tunnelUpdateEvent`, `universalSslEventType`, `webAnalyticsMetricsUpdate`, `weeklyAccountOverview`, `workersAlert`, `zoneAopCustomCertificateExpirationType`.
|
|
37
37
|
*/
|
|
38
38
|
readonly alertType: pulumi.Output<string>;
|
|
39
39
|
/**
|
|
@@ -90,7 +90,7 @@ export interface NotificationPolicyState {
|
|
|
90
90
|
*/
|
|
91
91
|
accountId?: pulumi.Input<string>;
|
|
92
92
|
/**
|
|
93
|
-
* The event type that will trigger the dispatch of a notification. See the developer documentation for descriptions of [available alert types](https://developers.cloudflare.com/fundamentals/notifications/notification-available/). Available values: `advancedHttpAlertError`, `accessCustomCertificateExpirationType`, `advancedDdosAttackL4Alert`, `advancedDdosAttackL7Alert`, `bgpHijackNotification`, `billingUsageAlert`, `blockNotificationBlockRemoved`, `blockNotificationNewBlock`, `blockNotificationReviewRejected`, `brandProtectionAlert`, `brandProtectionDigest`, `clickhouseAlertFwAnomaly`, `clickhouseAlertFwEntAnomaly`, `customSslCertificateEventType`, `dedicatedSslCertificateEventType`, `dosAttackL4`, `dosAttackL7`, `expiringServiceTokenAlert`, `failingLogpushJobDisabledAlert`, `fbmAutoAdvertisement`, `fbmDosdAttack`, `fbmVolumetricAttack`, `healthCheckStatusNotification`, `hostnameAopCustomCertificateExpirationType`, `httpAlertEdgeError`, `httpAlertOriginError`, `imageNotification`, `incidentAlert`, `loadBalancingHealthAlert`, `loadBalancingPoolEnablementAlert`, `logoMatchAlert`, `magicTunnelHealthCheckEvent`, `maintenanceEventNotification`, `mtlsCertificateStoreCertificateExpirationType`, `pagesEventAlert`, `radarNotification`, `realOriginMonitoring`, `scriptmonitorAlertNewCodeChangeDetections`, `scriptmonitorAlertNewHosts`, `scriptmonitorAlertNewMaliciousHosts`, `scriptmonitorAlertNewMaliciousScripts`, `scriptmonitorAlertNewMaliciousUrl`, `scriptmonitorAlertNewMaxLengthResourceUrl`, `scriptmonitorAlertNewResources`, `secondaryDnsAllPrimariesFailing`, `secondaryDnsPrimariesFailing`, `secondaryDnsZoneSuccessfullyUpdated`, `secondaryDnsZoneValidationWarning`, `sentinelAlert`, `streamLiveNotifications`, `trafficAnomaliesAlert`, `tunnelHealthEvent`, `tunnelUpdateEvent`, `universalSslEventType`, `webAnalyticsMetricsUpdate`, `weeklyAccountOverview`, `workersAlert`, `zoneAopCustomCertificateExpirationType`.
|
|
93
|
+
* The event type that will trigger the dispatch of a notification. See the developer documentation for descriptions of [available alert types](https://developers.cloudflare.com/fundamentals/notifications/notification-available/). Available values: `advancedHttpAlertError`, `accessCustomCertificateExpirationType`, `advancedDdosAttackL4Alert`, `advancedDdosAttackL7Alert`, `bgpHijackNotification`, `billingUsageAlert`, `blockNotificationBlockRemoved`, `blockNotificationNewBlock`, `blockNotificationReviewRejected`, `brandProtectionAlert`, `brandProtectionDigest`, `clickhouseAlertFwAnomaly`, `clickhouseAlertFwEntAnomaly`, `customSslCertificateEventType`, `dedicatedSslCertificateEventType`, `dosAttackL4`, `dosAttackL7`, `expiringServiceTokenAlert`, `failingLogpushJobDisabledAlert`, `fbmAutoAdvertisement`, `fbmDosdAttack`, `fbmVolumetricAttack`, `healthCheckStatusNotification`, `hostnameAopCustomCertificateExpirationType`, `httpAlertEdgeError`, `httpAlertOriginError`, `imageNotification`, `imageResizingNotification`, `incidentAlert`, `loadBalancingHealthAlert`, `loadBalancingPoolEnablementAlert`, `logoMatchAlert`, `magicTunnelHealthCheckEvent`, `maintenanceEventNotification`, `mtlsCertificateStoreCertificateExpirationType`, `pagesEventAlert`, `radarNotification`, `realOriginMonitoring`, `scriptmonitorAlertNewCodeChangeDetections`, `scriptmonitorAlertNewHosts`, `scriptmonitorAlertNewMaliciousHosts`, `scriptmonitorAlertNewMaliciousScripts`, `scriptmonitorAlertNewMaliciousUrl`, `scriptmonitorAlertNewMaxLengthResourceUrl`, `scriptmonitorAlertNewResources`, `secondaryDnsAllPrimariesFailing`, `secondaryDnsPrimariesFailing`, `secondaryDnsZoneSuccessfullyUpdated`, `secondaryDnsZoneValidationWarning`, `sentinelAlert`, `streamLiveNotifications`, `trafficAnomaliesAlert`, `tunnelHealthEvent`, `tunnelUpdateEvent`, `universalSslEventType`, `webAnalyticsMetricsUpdate`, `weeklyAccountOverview`, `workersAlert`, `zoneAopCustomCertificateExpirationType`.
|
|
94
94
|
*/
|
|
95
95
|
alertType?: pulumi.Input<string>;
|
|
96
96
|
/**
|
|
@@ -139,7 +139,7 @@ export interface NotificationPolicyArgs {
|
|
|
139
139
|
*/
|
|
140
140
|
accountId: pulumi.Input<string>;
|
|
141
141
|
/**
|
|
142
|
-
* The event type that will trigger the dispatch of a notification. See the developer documentation for descriptions of [available alert types](https://developers.cloudflare.com/fundamentals/notifications/notification-available/). Available values: `advancedHttpAlertError`, `accessCustomCertificateExpirationType`, `advancedDdosAttackL4Alert`, `advancedDdosAttackL7Alert`, `bgpHijackNotification`, `billingUsageAlert`, `blockNotificationBlockRemoved`, `blockNotificationNewBlock`, `blockNotificationReviewRejected`, `brandProtectionAlert`, `brandProtectionDigest`, `clickhouseAlertFwAnomaly`, `clickhouseAlertFwEntAnomaly`, `customSslCertificateEventType`, `dedicatedSslCertificateEventType`, `dosAttackL4`, `dosAttackL7`, `expiringServiceTokenAlert`, `failingLogpushJobDisabledAlert`, `fbmAutoAdvertisement`, `fbmDosdAttack`, `fbmVolumetricAttack`, `healthCheckStatusNotification`, `hostnameAopCustomCertificateExpirationType`, `httpAlertEdgeError`, `httpAlertOriginError`, `imageNotification`, `incidentAlert`, `loadBalancingHealthAlert`, `loadBalancingPoolEnablementAlert`, `logoMatchAlert`, `magicTunnelHealthCheckEvent`, `maintenanceEventNotification`, `mtlsCertificateStoreCertificateExpirationType`, `pagesEventAlert`, `radarNotification`, `realOriginMonitoring`, `scriptmonitorAlertNewCodeChangeDetections`, `scriptmonitorAlertNewHosts`, `scriptmonitorAlertNewMaliciousHosts`, `scriptmonitorAlertNewMaliciousScripts`, `scriptmonitorAlertNewMaliciousUrl`, `scriptmonitorAlertNewMaxLengthResourceUrl`, `scriptmonitorAlertNewResources`, `secondaryDnsAllPrimariesFailing`, `secondaryDnsPrimariesFailing`, `secondaryDnsZoneSuccessfullyUpdated`, `secondaryDnsZoneValidationWarning`, `sentinelAlert`, `streamLiveNotifications`, `trafficAnomaliesAlert`, `tunnelHealthEvent`, `tunnelUpdateEvent`, `universalSslEventType`, `webAnalyticsMetricsUpdate`, `weeklyAccountOverview`, `workersAlert`, `zoneAopCustomCertificateExpirationType`.
|
|
142
|
+
* The event type that will trigger the dispatch of a notification. See the developer documentation for descriptions of [available alert types](https://developers.cloudflare.com/fundamentals/notifications/notification-available/). Available values: `advancedHttpAlertError`, `accessCustomCertificateExpirationType`, `advancedDdosAttackL4Alert`, `advancedDdosAttackL7Alert`, `bgpHijackNotification`, `billingUsageAlert`, `blockNotificationBlockRemoved`, `blockNotificationNewBlock`, `blockNotificationReviewRejected`, `brandProtectionAlert`, `brandProtectionDigest`, `clickhouseAlertFwAnomaly`, `clickhouseAlertFwEntAnomaly`, `customSslCertificateEventType`, `dedicatedSslCertificateEventType`, `dosAttackL4`, `dosAttackL7`, `expiringServiceTokenAlert`, `failingLogpushJobDisabledAlert`, `fbmAutoAdvertisement`, `fbmDosdAttack`, `fbmVolumetricAttack`, `healthCheckStatusNotification`, `hostnameAopCustomCertificateExpirationType`, `httpAlertEdgeError`, `httpAlertOriginError`, `imageNotification`, `imageResizingNotification`, `incidentAlert`, `loadBalancingHealthAlert`, `loadBalancingPoolEnablementAlert`, `logoMatchAlert`, `magicTunnelHealthCheckEvent`, `maintenanceEventNotification`, `mtlsCertificateStoreCertificateExpirationType`, `pagesEventAlert`, `radarNotification`, `realOriginMonitoring`, `scriptmonitorAlertNewCodeChangeDetections`, `scriptmonitorAlertNewHosts`, `scriptmonitorAlertNewMaliciousHosts`, `scriptmonitorAlertNewMaliciousScripts`, `scriptmonitorAlertNewMaliciousUrl`, `scriptmonitorAlertNewMaxLengthResourceUrl`, `scriptmonitorAlertNewResources`, `secondaryDnsAllPrimariesFailing`, `secondaryDnsPrimariesFailing`, `secondaryDnsZoneSuccessfullyUpdated`, `secondaryDnsZoneValidationWarning`, `sentinelAlert`, `streamLiveNotifications`, `trafficAnomaliesAlert`, `tunnelHealthEvent`, `tunnelUpdateEvent`, `universalSslEventType`, `webAnalyticsMetricsUpdate`, `weeklyAccountOverview`, `workersAlert`, `zoneAopCustomCertificateExpirationType`.
|
|
143
143
|
*/
|
|
144
144
|
alertType: pulumi.Input<string>;
|
|
145
145
|
/**
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@pulumi/cloudflare",
|
|
3
|
-
"version": "5.44.0
|
|
3
|
+
"version": "5.44.0",
|
|
4
4
|
"description": "A Pulumi package for creating and managing Cloudflare cloud resources.",
|
|
5
5
|
"keywords": [
|
|
6
6
|
"pulumi",
|
|
@@ -23,6 +23,6 @@
|
|
|
23
23
|
"pulumi": {
|
|
24
24
|
"resource": true,
|
|
25
25
|
"name": "cloudflare",
|
|
26
|
-
"version": "5.44.0
|
|
26
|
+
"version": "5.44.0"
|
|
27
27
|
}
|
|
28
28
|
}
|
package/r2bucket.d.ts
CHANGED
|
@@ -42,7 +42,7 @@ export declare class R2Bucket extends pulumi.CustomResource {
|
|
|
42
42
|
*/
|
|
43
43
|
readonly accountId: pulumi.Output<string>;
|
|
44
44
|
/**
|
|
45
|
-
* The location hint of the R2 bucket. Available values: `WNAM`, `ENAM`, `WEUR`, `EEUR`, `APAC`
|
|
45
|
+
* The location hint of the R2 bucket. Available values: `WNAM`, `ENAM`, `WEUR`, `EEUR`, `APAC`, `OC`
|
|
46
46
|
*/
|
|
47
47
|
readonly location: pulumi.Output<string>;
|
|
48
48
|
/**
|
|
@@ -67,7 +67,7 @@ export interface R2BucketState {
|
|
|
67
67
|
*/
|
|
68
68
|
accountId?: pulumi.Input<string>;
|
|
69
69
|
/**
|
|
70
|
-
* The location hint of the R2 bucket. Available values: `WNAM`, `ENAM`, `WEUR`, `EEUR`, `APAC`
|
|
70
|
+
* The location hint of the R2 bucket. Available values: `WNAM`, `ENAM`, `WEUR`, `EEUR`, `APAC`, `OC`
|
|
71
71
|
*/
|
|
72
72
|
location?: pulumi.Input<string>;
|
|
73
73
|
/**
|
|
@@ -84,7 +84,7 @@ export interface R2BucketArgs {
|
|
|
84
84
|
*/
|
|
85
85
|
accountId: pulumi.Input<string>;
|
|
86
86
|
/**
|
|
87
|
-
* The location hint of the R2 bucket. Available values: `WNAM`, `ENAM`, `WEUR`, `EEUR`, `APAC`
|
|
87
|
+
* The location hint of the R2 bucket. Available values: `WNAM`, `ENAM`, `WEUR`, `EEUR`, `APAC`, `OC`
|
|
88
88
|
*/
|
|
89
89
|
location?: pulumi.Input<string>;
|
|
90
90
|
/**
|
package/types/input.d.ts
CHANGED
|
@@ -248,7 +248,7 @@ export interface AccessApplicationScimConfig {
|
|
|
248
248
|
*/
|
|
249
249
|
enabled?: pulumi.Input<boolean>;
|
|
250
250
|
/**
|
|
251
|
-
* The
|
|
251
|
+
* The UIDs of the IdP to use as the source for SCIM resources to provision to this application.
|
|
252
252
|
*/
|
|
253
253
|
idpUid: pulumi.Input<string>;
|
|
254
254
|
/**
|
|
@@ -315,6 +315,10 @@ export interface AccessApplicationScimConfigMapping {
|
|
|
315
315
|
* Which SCIM resource type this mapping applies to.
|
|
316
316
|
*/
|
|
317
317
|
schema: pulumi.Input<string>;
|
|
318
|
+
/**
|
|
319
|
+
* How strictly to adhere to outbound resource schemas when provisioning to this mapping. "strict" will remove unknown values when provisioning, while "passthrough" will pass unknown values to the target.
|
|
320
|
+
*/
|
|
321
|
+
strictness?: pulumi.Input<string>;
|
|
318
322
|
/**
|
|
319
323
|
* A [JSONata](https://jsonata.org/) expression that transforms the resource before provisioning it in the application.
|
|
320
324
|
*/
|
|
@@ -501,11 +505,11 @@ export interface AccessGroupExcludeGsuite {
|
|
|
501
505
|
/**
|
|
502
506
|
* The email of the Google Workspace group.
|
|
503
507
|
*/
|
|
504
|
-
emails
|
|
508
|
+
emails: pulumi.Input<pulumi.Input<string>[]>;
|
|
505
509
|
/**
|
|
506
510
|
* The ID of your Google Workspace identity provider.
|
|
507
511
|
*/
|
|
508
|
-
identityProviderId
|
|
512
|
+
identityProviderId: pulumi.Input<string>;
|
|
509
513
|
}
|
|
510
514
|
export interface AccessGroupExcludeOkta {
|
|
511
515
|
/**
|
|
@@ -674,11 +678,11 @@ export interface AccessGroupIncludeGsuite {
|
|
|
674
678
|
/**
|
|
675
679
|
* The email of the Google Workspace group.
|
|
676
680
|
*/
|
|
677
|
-
emails
|
|
681
|
+
emails: pulumi.Input<pulumi.Input<string>[]>;
|
|
678
682
|
/**
|
|
679
683
|
* The ID of your Google Workspace identity provider.
|
|
680
684
|
*/
|
|
681
|
-
identityProviderId
|
|
685
|
+
identityProviderId: pulumi.Input<string>;
|
|
682
686
|
}
|
|
683
687
|
export interface AccessGroupIncludeOkta {
|
|
684
688
|
/**
|
|
@@ -847,11 +851,11 @@ export interface AccessGroupRequireGsuite {
|
|
|
847
851
|
/**
|
|
848
852
|
* The email of the Google Workspace group.
|
|
849
853
|
*/
|
|
850
|
-
emails
|
|
854
|
+
emails: pulumi.Input<pulumi.Input<string>[]>;
|
|
851
855
|
/**
|
|
852
856
|
* The ID of your Google Workspace identity provider.
|
|
853
857
|
*/
|
|
854
|
-
identityProviderId
|
|
858
|
+
identityProviderId: pulumi.Input<string>;
|
|
855
859
|
}
|
|
856
860
|
export interface AccessGroupRequireOkta {
|
|
857
861
|
/**
|
|
@@ -909,6 +913,7 @@ export interface AccessIdentityProviderConfig {
|
|
|
909
913
|
export interface AccessIdentityProviderScimConfig {
|
|
910
914
|
enabled?: pulumi.Input<boolean>;
|
|
911
915
|
groupMemberDeprovision?: pulumi.Input<boolean>;
|
|
916
|
+
identityUpdateBehavior?: pulumi.Input<string>;
|
|
912
917
|
seatDeprovision?: pulumi.Input<boolean>;
|
|
913
918
|
secret?: pulumi.Input<string>;
|
|
914
919
|
userDeprovision?: pulumi.Input<boolean>;
|
|
@@ -1125,11 +1130,11 @@ export interface AccessPolicyExcludeGsuite {
|
|
|
1125
1130
|
/**
|
|
1126
1131
|
* The email of the Google Workspace group.
|
|
1127
1132
|
*/
|
|
1128
|
-
emails
|
|
1133
|
+
emails: pulumi.Input<pulumi.Input<string>[]>;
|
|
1129
1134
|
/**
|
|
1130
1135
|
* The ID of your Google Workspace identity provider.
|
|
1131
1136
|
*/
|
|
1132
|
-
identityProviderId
|
|
1137
|
+
identityProviderId: pulumi.Input<string>;
|
|
1133
1138
|
}
|
|
1134
1139
|
export interface AccessPolicyExcludeOkta {
|
|
1135
1140
|
/**
|
|
@@ -1298,11 +1303,11 @@ export interface AccessPolicyIncludeGsuite {
|
|
|
1298
1303
|
/**
|
|
1299
1304
|
* The email of the Google Workspace group.
|
|
1300
1305
|
*/
|
|
1301
|
-
emails
|
|
1306
|
+
emails: pulumi.Input<pulumi.Input<string>[]>;
|
|
1302
1307
|
/**
|
|
1303
1308
|
* The ID of your Google Workspace identity provider.
|
|
1304
1309
|
*/
|
|
1305
|
-
identityProviderId
|
|
1310
|
+
identityProviderId: pulumi.Input<string>;
|
|
1306
1311
|
}
|
|
1307
1312
|
export interface AccessPolicyIncludeOkta {
|
|
1308
1313
|
/**
|
|
@@ -1471,11 +1476,11 @@ export interface AccessPolicyRequireGsuite {
|
|
|
1471
1476
|
/**
|
|
1472
1477
|
* The email of the Google Workspace group.
|
|
1473
1478
|
*/
|
|
1474
|
-
emails
|
|
1479
|
+
emails: pulumi.Input<pulumi.Input<string>[]>;
|
|
1475
1480
|
/**
|
|
1476
1481
|
* The ID of your Google Workspace identity provider.
|
|
1477
1482
|
*/
|
|
1478
|
-
identityProviderId
|
|
1483
|
+
identityProviderId: pulumi.Input<string>;
|
|
1479
1484
|
}
|
|
1480
1485
|
export interface AccessPolicyRequireOkta {
|
|
1481
1486
|
/**
|
|
@@ -5689,7 +5694,7 @@ export interface ZeroTrustAccessApplicationScimConfig {
|
|
|
5689
5694
|
*/
|
|
5690
5695
|
enabled?: pulumi.Input<boolean>;
|
|
5691
5696
|
/**
|
|
5692
|
-
* The
|
|
5697
|
+
* The UIDs of the IdP to use as the source for SCIM resources to provision to this application.
|
|
5693
5698
|
*/
|
|
5694
5699
|
idpUid: pulumi.Input<string>;
|
|
5695
5700
|
/**
|
|
@@ -5756,6 +5761,10 @@ export interface ZeroTrustAccessApplicationScimConfigMapping {
|
|
|
5756
5761
|
* Which SCIM resource type this mapping applies to.
|
|
5757
5762
|
*/
|
|
5758
5763
|
schema: pulumi.Input<string>;
|
|
5764
|
+
/**
|
|
5765
|
+
* How strictly to adhere to outbound resource schemas when provisioning to this mapping. "strict" will remove unknown values when provisioning, while "passthrough" will pass unknown values to the target.
|
|
5766
|
+
*/
|
|
5767
|
+
strictness?: pulumi.Input<string>;
|
|
5759
5768
|
/**
|
|
5760
5769
|
* A [JSONata](https://jsonata.org/) expression that transforms the resource before provisioning it in the application.
|
|
5761
5770
|
*/
|
|
@@ -5942,11 +5951,11 @@ export interface ZeroTrustAccessGroupExcludeGsuite {
|
|
|
5942
5951
|
/**
|
|
5943
5952
|
* The email of the Google Workspace group.
|
|
5944
5953
|
*/
|
|
5945
|
-
emails
|
|
5954
|
+
emails: pulumi.Input<pulumi.Input<string>[]>;
|
|
5946
5955
|
/**
|
|
5947
5956
|
* The ID of your Google Workspace identity provider.
|
|
5948
5957
|
*/
|
|
5949
|
-
identityProviderId
|
|
5958
|
+
identityProviderId: pulumi.Input<string>;
|
|
5950
5959
|
}
|
|
5951
5960
|
export interface ZeroTrustAccessGroupExcludeOkta {
|
|
5952
5961
|
/**
|
|
@@ -6115,11 +6124,11 @@ export interface ZeroTrustAccessGroupIncludeGsuite {
|
|
|
6115
6124
|
/**
|
|
6116
6125
|
* The email of the Google Workspace group.
|
|
6117
6126
|
*/
|
|
6118
|
-
emails
|
|
6127
|
+
emails: pulumi.Input<pulumi.Input<string>[]>;
|
|
6119
6128
|
/**
|
|
6120
6129
|
* The ID of your Google Workspace identity provider.
|
|
6121
6130
|
*/
|
|
6122
|
-
identityProviderId
|
|
6131
|
+
identityProviderId: pulumi.Input<string>;
|
|
6123
6132
|
}
|
|
6124
6133
|
export interface ZeroTrustAccessGroupIncludeOkta {
|
|
6125
6134
|
/**
|
|
@@ -6288,11 +6297,11 @@ export interface ZeroTrustAccessGroupRequireGsuite {
|
|
|
6288
6297
|
/**
|
|
6289
6298
|
* The email of the Google Workspace group.
|
|
6290
6299
|
*/
|
|
6291
|
-
emails
|
|
6300
|
+
emails: pulumi.Input<pulumi.Input<string>[]>;
|
|
6292
6301
|
/**
|
|
6293
6302
|
* The ID of your Google Workspace identity provider.
|
|
6294
6303
|
*/
|
|
6295
|
-
identityProviderId
|
|
6304
|
+
identityProviderId: pulumi.Input<string>;
|
|
6296
6305
|
}
|
|
6297
6306
|
export interface ZeroTrustAccessGroupRequireOkta {
|
|
6298
6307
|
/**
|
|
@@ -6350,6 +6359,7 @@ export interface ZeroTrustAccessIdentityProviderConfig {
|
|
|
6350
6359
|
export interface ZeroTrustAccessIdentityProviderScimConfig {
|
|
6351
6360
|
enabled?: pulumi.Input<boolean>;
|
|
6352
6361
|
groupMemberDeprovision?: pulumi.Input<boolean>;
|
|
6362
|
+
identityUpdateBehavior?: pulumi.Input<string>;
|
|
6353
6363
|
seatDeprovision?: pulumi.Input<boolean>;
|
|
6354
6364
|
secret?: pulumi.Input<string>;
|
|
6355
6365
|
userDeprovision?: pulumi.Input<boolean>;
|
|
@@ -6566,11 +6576,11 @@ export interface ZeroTrustAccessPolicyExcludeGsuite {
|
|
|
6566
6576
|
/**
|
|
6567
6577
|
* The email of the Google Workspace group.
|
|
6568
6578
|
*/
|
|
6569
|
-
emails
|
|
6579
|
+
emails: pulumi.Input<pulumi.Input<string>[]>;
|
|
6570
6580
|
/**
|
|
6571
6581
|
* The ID of your Google Workspace identity provider.
|
|
6572
6582
|
*/
|
|
6573
|
-
identityProviderId
|
|
6583
|
+
identityProviderId: pulumi.Input<string>;
|
|
6574
6584
|
}
|
|
6575
6585
|
export interface ZeroTrustAccessPolicyExcludeOkta {
|
|
6576
6586
|
/**
|
|
@@ -6739,11 +6749,11 @@ export interface ZeroTrustAccessPolicyIncludeGsuite {
|
|
|
6739
6749
|
/**
|
|
6740
6750
|
* The email of the Google Workspace group.
|
|
6741
6751
|
*/
|
|
6742
|
-
emails
|
|
6752
|
+
emails: pulumi.Input<pulumi.Input<string>[]>;
|
|
6743
6753
|
/**
|
|
6744
6754
|
* The ID of your Google Workspace identity provider.
|
|
6745
6755
|
*/
|
|
6746
|
-
identityProviderId
|
|
6756
|
+
identityProviderId: pulumi.Input<string>;
|
|
6747
6757
|
}
|
|
6748
6758
|
export interface ZeroTrustAccessPolicyIncludeOkta {
|
|
6749
6759
|
/**
|
|
@@ -6912,11 +6922,11 @@ export interface ZeroTrustAccessPolicyRequireGsuite {
|
|
|
6912
6922
|
/**
|
|
6913
6923
|
* The email of the Google Workspace group.
|
|
6914
6924
|
*/
|
|
6915
|
-
emails
|
|
6925
|
+
emails: pulumi.Input<pulumi.Input<string>[]>;
|
|
6916
6926
|
/**
|
|
6917
6927
|
* The ID of your Google Workspace identity provider.
|
|
6918
6928
|
*/
|
|
6919
|
-
identityProviderId
|
|
6929
|
+
identityProviderId: pulumi.Input<string>;
|
|
6920
6930
|
}
|
|
6921
6931
|
export interface ZeroTrustAccessPolicyRequireOkta {
|
|
6922
6932
|
/**
|
package/types/output.d.ts
CHANGED
|
@@ -247,7 +247,7 @@ export interface AccessApplicationScimConfig {
|
|
|
247
247
|
*/
|
|
248
248
|
enabled?: boolean;
|
|
249
249
|
/**
|
|
250
|
-
* The
|
|
250
|
+
* The UIDs of the IdP to use as the source for SCIM resources to provision to this application.
|
|
251
251
|
*/
|
|
252
252
|
idpUid: string;
|
|
253
253
|
/**
|
|
@@ -314,6 +314,10 @@ export interface AccessApplicationScimConfigMapping {
|
|
|
314
314
|
* Which SCIM resource type this mapping applies to.
|
|
315
315
|
*/
|
|
316
316
|
schema: string;
|
|
317
|
+
/**
|
|
318
|
+
* How strictly to adhere to outbound resource schemas when provisioning to this mapping. "strict" will remove unknown values when provisioning, while "passthrough" will pass unknown values to the target.
|
|
319
|
+
*/
|
|
320
|
+
strictness?: string;
|
|
317
321
|
/**
|
|
318
322
|
* A [JSONata](https://jsonata.org/) expression that transforms the resource before provisioning it in the application.
|
|
319
323
|
*/
|
|
@@ -500,11 +504,11 @@ export interface AccessGroupExcludeGsuite {
|
|
|
500
504
|
/**
|
|
501
505
|
* The email of the Google Workspace group.
|
|
502
506
|
*/
|
|
503
|
-
emails
|
|
507
|
+
emails: string[];
|
|
504
508
|
/**
|
|
505
509
|
* The ID of your Google Workspace identity provider.
|
|
506
510
|
*/
|
|
507
|
-
identityProviderId
|
|
511
|
+
identityProviderId: string;
|
|
508
512
|
}
|
|
509
513
|
export interface AccessGroupExcludeOkta {
|
|
510
514
|
/**
|
|
@@ -673,11 +677,11 @@ export interface AccessGroupIncludeGsuite {
|
|
|
673
677
|
/**
|
|
674
678
|
* The email of the Google Workspace group.
|
|
675
679
|
*/
|
|
676
|
-
emails
|
|
680
|
+
emails: string[];
|
|
677
681
|
/**
|
|
678
682
|
* The ID of your Google Workspace identity provider.
|
|
679
683
|
*/
|
|
680
|
-
identityProviderId
|
|
684
|
+
identityProviderId: string;
|
|
681
685
|
}
|
|
682
686
|
export interface AccessGroupIncludeOkta {
|
|
683
687
|
/**
|
|
@@ -846,11 +850,11 @@ export interface AccessGroupRequireGsuite {
|
|
|
846
850
|
/**
|
|
847
851
|
* The email of the Google Workspace group.
|
|
848
852
|
*/
|
|
849
|
-
emails
|
|
853
|
+
emails: string[];
|
|
850
854
|
/**
|
|
851
855
|
* The ID of your Google Workspace identity provider.
|
|
852
856
|
*/
|
|
853
|
-
identityProviderId
|
|
857
|
+
identityProviderId: string;
|
|
854
858
|
}
|
|
855
859
|
export interface AccessGroupRequireOkta {
|
|
856
860
|
/**
|
|
@@ -908,6 +912,7 @@ export interface AccessIdentityProviderConfig {
|
|
|
908
912
|
export interface AccessIdentityProviderScimConfig {
|
|
909
913
|
enabled?: boolean;
|
|
910
914
|
groupMemberDeprovision?: boolean;
|
|
915
|
+
identityUpdateBehavior: string;
|
|
911
916
|
seatDeprovision?: boolean;
|
|
912
917
|
secret: string;
|
|
913
918
|
userDeprovision?: boolean;
|
|
@@ -1124,11 +1129,11 @@ export interface AccessPolicyExcludeGsuite {
|
|
|
1124
1129
|
/**
|
|
1125
1130
|
* The email of the Google Workspace group.
|
|
1126
1131
|
*/
|
|
1127
|
-
emails
|
|
1132
|
+
emails: string[];
|
|
1128
1133
|
/**
|
|
1129
1134
|
* The ID of your Google Workspace identity provider.
|
|
1130
1135
|
*/
|
|
1131
|
-
identityProviderId
|
|
1136
|
+
identityProviderId: string;
|
|
1132
1137
|
}
|
|
1133
1138
|
export interface AccessPolicyExcludeOkta {
|
|
1134
1139
|
/**
|
|
@@ -1297,11 +1302,11 @@ export interface AccessPolicyIncludeGsuite {
|
|
|
1297
1302
|
/**
|
|
1298
1303
|
* The email of the Google Workspace group.
|
|
1299
1304
|
*/
|
|
1300
|
-
emails
|
|
1305
|
+
emails: string[];
|
|
1301
1306
|
/**
|
|
1302
1307
|
* The ID of your Google Workspace identity provider.
|
|
1303
1308
|
*/
|
|
1304
|
-
identityProviderId
|
|
1309
|
+
identityProviderId: string;
|
|
1305
1310
|
}
|
|
1306
1311
|
export interface AccessPolicyIncludeOkta {
|
|
1307
1312
|
/**
|
|
@@ -1470,11 +1475,11 @@ export interface AccessPolicyRequireGsuite {
|
|
|
1470
1475
|
/**
|
|
1471
1476
|
* The email of the Google Workspace group.
|
|
1472
1477
|
*/
|
|
1473
|
-
emails
|
|
1478
|
+
emails: string[];
|
|
1474
1479
|
/**
|
|
1475
1480
|
* The ID of your Google Workspace identity provider.
|
|
1476
1481
|
*/
|
|
1477
|
-
identityProviderId
|
|
1482
|
+
identityProviderId: string;
|
|
1478
1483
|
}
|
|
1479
1484
|
export interface AccessPolicyRequireOkta {
|
|
1480
1485
|
/**
|
|
@@ -6598,7 +6603,7 @@ export interface ZeroTrustAccessApplicationScimConfig {
|
|
|
6598
6603
|
*/
|
|
6599
6604
|
enabled?: boolean;
|
|
6600
6605
|
/**
|
|
6601
|
-
* The
|
|
6606
|
+
* The UIDs of the IdP to use as the source for SCIM resources to provision to this application.
|
|
6602
6607
|
*/
|
|
6603
6608
|
idpUid: string;
|
|
6604
6609
|
/**
|
|
@@ -6665,6 +6670,10 @@ export interface ZeroTrustAccessApplicationScimConfigMapping {
|
|
|
6665
6670
|
* Which SCIM resource type this mapping applies to.
|
|
6666
6671
|
*/
|
|
6667
6672
|
schema: string;
|
|
6673
|
+
/**
|
|
6674
|
+
* How strictly to adhere to outbound resource schemas when provisioning to this mapping. "strict" will remove unknown values when provisioning, while "passthrough" will pass unknown values to the target.
|
|
6675
|
+
*/
|
|
6676
|
+
strictness?: string;
|
|
6668
6677
|
/**
|
|
6669
6678
|
* A [JSONata](https://jsonata.org/) expression that transforms the resource before provisioning it in the application.
|
|
6670
6679
|
*/
|
|
@@ -6851,11 +6860,11 @@ export interface ZeroTrustAccessGroupExcludeGsuite {
|
|
|
6851
6860
|
/**
|
|
6852
6861
|
* The email of the Google Workspace group.
|
|
6853
6862
|
*/
|
|
6854
|
-
emails
|
|
6863
|
+
emails: string[];
|
|
6855
6864
|
/**
|
|
6856
6865
|
* The ID of your Google Workspace identity provider.
|
|
6857
6866
|
*/
|
|
6858
|
-
identityProviderId
|
|
6867
|
+
identityProviderId: string;
|
|
6859
6868
|
}
|
|
6860
6869
|
export interface ZeroTrustAccessGroupExcludeOkta {
|
|
6861
6870
|
/**
|
|
@@ -7024,11 +7033,11 @@ export interface ZeroTrustAccessGroupIncludeGsuite {
|
|
|
7024
7033
|
/**
|
|
7025
7034
|
* The email of the Google Workspace group.
|
|
7026
7035
|
*/
|
|
7027
|
-
emails
|
|
7036
|
+
emails: string[];
|
|
7028
7037
|
/**
|
|
7029
7038
|
* The ID of your Google Workspace identity provider.
|
|
7030
7039
|
*/
|
|
7031
|
-
identityProviderId
|
|
7040
|
+
identityProviderId: string;
|
|
7032
7041
|
}
|
|
7033
7042
|
export interface ZeroTrustAccessGroupIncludeOkta {
|
|
7034
7043
|
/**
|
|
@@ -7197,11 +7206,11 @@ export interface ZeroTrustAccessGroupRequireGsuite {
|
|
|
7197
7206
|
/**
|
|
7198
7207
|
* The email of the Google Workspace group.
|
|
7199
7208
|
*/
|
|
7200
|
-
emails
|
|
7209
|
+
emails: string[];
|
|
7201
7210
|
/**
|
|
7202
7211
|
* The ID of your Google Workspace identity provider.
|
|
7203
7212
|
*/
|
|
7204
|
-
identityProviderId
|
|
7213
|
+
identityProviderId: string;
|
|
7205
7214
|
}
|
|
7206
7215
|
export interface ZeroTrustAccessGroupRequireOkta {
|
|
7207
7216
|
/**
|
|
@@ -7259,6 +7268,7 @@ export interface ZeroTrustAccessIdentityProviderConfig {
|
|
|
7259
7268
|
export interface ZeroTrustAccessIdentityProviderScimConfig {
|
|
7260
7269
|
enabled?: boolean;
|
|
7261
7270
|
groupMemberDeprovision?: boolean;
|
|
7271
|
+
identityUpdateBehavior: string;
|
|
7262
7272
|
seatDeprovision?: boolean;
|
|
7263
7273
|
secret: string;
|
|
7264
7274
|
userDeprovision?: boolean;
|
|
@@ -7475,11 +7485,11 @@ export interface ZeroTrustAccessPolicyExcludeGsuite {
|
|
|
7475
7485
|
/**
|
|
7476
7486
|
* The email of the Google Workspace group.
|
|
7477
7487
|
*/
|
|
7478
|
-
emails
|
|
7488
|
+
emails: string[];
|
|
7479
7489
|
/**
|
|
7480
7490
|
* The ID of your Google Workspace identity provider.
|
|
7481
7491
|
*/
|
|
7482
|
-
identityProviderId
|
|
7492
|
+
identityProviderId: string;
|
|
7483
7493
|
}
|
|
7484
7494
|
export interface ZeroTrustAccessPolicyExcludeOkta {
|
|
7485
7495
|
/**
|
|
@@ -7648,11 +7658,11 @@ export interface ZeroTrustAccessPolicyIncludeGsuite {
|
|
|
7648
7658
|
/**
|
|
7649
7659
|
* The email of the Google Workspace group.
|
|
7650
7660
|
*/
|
|
7651
|
-
emails
|
|
7661
|
+
emails: string[];
|
|
7652
7662
|
/**
|
|
7653
7663
|
* The ID of your Google Workspace identity provider.
|
|
7654
7664
|
*/
|
|
7655
|
-
identityProviderId
|
|
7665
|
+
identityProviderId: string;
|
|
7656
7666
|
}
|
|
7657
7667
|
export interface ZeroTrustAccessPolicyIncludeOkta {
|
|
7658
7668
|
/**
|
|
@@ -7821,11 +7831,11 @@ export interface ZeroTrustAccessPolicyRequireGsuite {
|
|
|
7821
7831
|
/**
|
|
7822
7832
|
* The email of the Google Workspace group.
|
|
7823
7833
|
*/
|
|
7824
|
-
emails
|
|
7834
|
+
emails: string[];
|
|
7825
7835
|
/**
|
|
7826
7836
|
* The ID of your Google Workspace identity provider.
|
|
7827
7837
|
*/
|
|
7828
|
-
identityProviderId
|
|
7838
|
+
identityProviderId: string;
|
|
7829
7839
|
}
|
|
7830
7840
|
export interface ZeroTrustAccessPolicyRequireOkta {
|
|
7831
7841
|
/**
|