@pulumi/keycloak 5.3.1 → 5.3.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/attributeImporterIdentityProviderMapper.d.ts +4 -5
- package/attributeImporterIdentityProviderMapper.js +4 -5
- package/attributeImporterIdentityProviderMapper.js.map +1 -1
- package/attributeToRoleIdentityMapper.d.ts +6 -6
- package/attributeToRoleIdentityMapper.js +6 -6
- package/authentication/bindings.d.ts +3 -5
- package/authentication/bindings.js +3 -5
- package/authentication/bindings.js.map +1 -1
- package/authentication/execution.d.ts +2 -4
- package/authentication/execution.js +2 -4
- package/authentication/execution.js.map +1 -1
- package/authentication/executionConfig.d.ts +0 -2
- package/authentication/executionConfig.js +0 -2
- package/authentication/executionConfig.js.map +1 -1
- package/authentication/flow.d.ts +0 -2
- package/authentication/flow.js +0 -2
- package/authentication/flow.js.map +1 -1
- package/authentication/subflow.d.ts +0 -2
- package/authentication/subflow.js +0 -2
- package/authentication/subflow.js.map +1 -1
- package/customIdentityProviderMapping.d.ts +7 -8
- package/customIdentityProviderMapping.js +4 -5
- package/customIdentityProviderMapping.js.map +1 -1
- package/customUserFederation.d.ts +8 -9
- package/customUserFederation.js +5 -6
- package/customUserFederation.js.map +1 -1
- package/defaultGroups.d.ts +6 -5
- package/defaultGroups.js +6 -5
- package/defaultGroups.js.map +1 -1
- package/defaultRoles.d.ts +1 -3
- package/defaultRoles.js +1 -3
- package/defaultRoles.js.map +1 -1
- package/genericClientProtocolMapper.d.ts +8 -9
- package/genericClientProtocolMapper.js +8 -9
- package/genericClientProtocolMapper.js.map +1 -1
- package/genericClientRoleMapper.d.ts +28 -21
- package/genericClientRoleMapper.js +28 -21
- package/genericClientRoleMapper.js.map +1 -1
- package/genericProtocolMapper.d.ts +3 -4
- package/genericProtocolMapper.js +3 -4
- package/genericProtocolMapper.js.map +1 -1
- package/genericRoleMapper.d.ts +28 -21
- package/genericRoleMapper.js +28 -21
- package/genericRoleMapper.js.map +1 -1
- package/getAuthenticationExecution.d.ts +0 -4
- package/getAuthenticationExecution.js +0 -4
- package/getAuthenticationExecution.js.map +1 -1
- package/getAuthenticationFlow.d.ts +0 -4
- package/getAuthenticationFlow.js +0 -4
- package/getAuthenticationFlow.js.map +1 -1
- package/getClientDescriptionConverter.d.ts +50 -54
- package/getClientDescriptionConverter.js +50 -54
- package/getClientDescriptionConverter.js.map +1 -1
- package/getRealm.d.ts +10 -6
- package/getRealm.js +10 -6
- package/getRealm.js.map +1 -1
- package/getUser.d.ts +2 -4
- package/getUser.js +2 -4
- package/getUser.js.map +1 -1
- package/getUserRealmRoles.d.ts +4 -4
- package/getUserRealmRoles.js +4 -4
- package/group.d.ts +12 -9
- package/group.js +12 -9
- package/group.js.map +1 -1
- package/groupMemberships.d.ts +7 -6
- package/groupMemberships.js +7 -6
- package/groupMemberships.js.map +1 -1
- package/groupRoles.d.ts +16 -12
- package/groupRoles.js +16 -12
- package/groupRoles.js.map +1 -1
- package/hardcodedAttributeIdentityProviderMapper.d.ts +4 -5
- package/hardcodedAttributeIdentityProviderMapper.js +4 -5
- package/hardcodedAttributeIdentityProviderMapper.js.map +1 -1
- package/hardcodedRoleIdentityMapper.d.ts +6 -6
- package/hardcodedRoleIdentityMapper.js +6 -6
- package/identityProviderTokenExchangeScopePermission.d.ts +5 -6
- package/identityProviderTokenExchangeScopePermission.js +5 -6
- package/identityProviderTokenExchangeScopePermission.js.map +1 -1
- package/ldap/customMapper.d.ts +6 -6
- package/ldap/customMapper.js +6 -6
- package/ldap/fullNameMapper.d.ts +13 -13
- package/ldap/fullNameMapper.js +13 -13
- package/ldap/groupMapper.d.ts +15 -15
- package/ldap/groupMapper.js +15 -15
- package/ldap/hardcodedAttributeMapper.d.ts +4 -4
- package/ldap/hardcodedAttributeMapper.js +4 -4
- package/ldap/hardcodedGroupMapper.d.ts +8 -5
- package/ldap/hardcodedGroupMapper.js +8 -5
- package/ldap/hardcodedGroupMapper.js.map +1 -1
- package/ldap/hardcodedRoleMapper.d.ts +4 -4
- package/ldap/hardcodedRoleMapper.js +4 -4
- package/ldap/msadLdsUserAccountControlMapper.d.ts +4 -4
- package/ldap/msadLdsUserAccountControlMapper.js +4 -4
- package/ldap/msadUserAccountControlMapper.d.ts +12 -12
- package/ldap/msadUserAccountControlMapper.js +12 -12
- package/ldap/roleMapper.d.ts +4 -4
- package/ldap/roleMapper.js +4 -4
- package/ldap/userAttributeMapper.d.ts +16 -16
- package/ldap/userAttributeMapper.js +13 -13
- package/ldap/userFederation.d.ts +11 -12
- package/ldap/userFederation.js +11 -12
- package/ldap/userFederation.js.map +1 -1
- package/oidc/googleIdentityProvider.d.ts +2 -4
- package/oidc/googleIdentityProvider.js +2 -4
- package/oidc/googleIdentityProvider.js.map +1 -1
- package/oidc/identityProvider.d.ts +1 -3
- package/oidc/identityProvider.js +1 -3
- package/oidc/identityProvider.js.map +1 -1
- package/openid/audienceProtocolMapper.d.ts +16 -14
- package/openid/audienceProtocolMapper.js +16 -14
- package/openid/audienceProtocolMapper.js.map +1 -1
- package/openid/audienceResolveProtocolMapper.d.ts +9 -8
- package/openid/audienceResolveProtocolMapper.js +9 -8
- package/openid/audienceResolveProtocolMapper.js.map +1 -1
- package/openid/audienceResolveProtocolMappter.d.ts +9 -8
- package/openid/audienceResolveProtocolMappter.js +9 -8
- package/openid/audienceResolveProtocolMappter.js.map +1 -1
- package/openid/client.d.ts +5 -6
- package/openid/client.js +5 -6
- package/openid/client.js.map +1 -1
- package/openid/clientDefaultScopes.d.ts +8 -7
- package/openid/clientDefaultScopes.js +8 -7
- package/openid/clientDefaultScopes.js.map +1 -1
- package/openid/clientOptionalScopes.d.ts +8 -7
- package/openid/clientOptionalScopes.js +8 -7
- package/openid/clientOptionalScopes.js.map +1 -1
- package/openid/clientPolicy.d.ts +5 -5
- package/openid/clientPolicy.js +5 -5
- package/openid/clientScope.d.ts +4 -5
- package/openid/clientScope.js +4 -5
- package/openid/clientScope.js.map +1 -1
- package/openid/clientServiceAccountRealmRole.d.ts +6 -4
- package/openid/clientServiceAccountRealmRole.js +6 -4
- package/openid/clientServiceAccountRealmRole.js.map +1 -1
- package/openid/clientServiceAccountRole.d.ts +8 -5
- package/openid/clientServiceAccountRole.js +8 -5
- package/openid/clientServiceAccountRole.js.map +1 -1
- package/openid/fullNameProtocolMapper.d.ts +16 -14
- package/openid/fullNameProtocolMapper.js +16 -14
- package/openid/fullNameProtocolMapper.js.map +1 -1
- package/openid/getClient.d.ts +2 -4
- package/openid/getClient.js +2 -4
- package/openid/getClient.js.map +1 -1
- package/openid/getClientAuthorizationPolicy.d.ts +8 -6
- package/openid/getClientAuthorizationPolicy.js +8 -6
- package/openid/getClientAuthorizationPolicy.js.map +1 -1
- package/openid/getClientScope.d.ts +4 -6
- package/openid/getClientScope.js +4 -6
- package/openid/getClientScope.js.map +1 -1
- package/openid/getClientServiceAccountUser.d.ts +4 -6
- package/openid/getClientServiceAccountUser.js +4 -6
- package/openid/getClientServiceAccountUser.js.map +1 -1
- package/openid/groupMembershipProtocolMapper.d.ts +18 -16
- package/openid/groupMembershipProtocolMapper.js +18 -16
- package/openid/groupMembershipProtocolMapper.js.map +1 -1
- package/openid/hardcodedClaimProtocolMapper.d.ts +18 -16
- package/openid/hardcodedClaimProtocolMapper.js +18 -16
- package/openid/hardcodedClaimProtocolMapper.js.map +1 -1
- package/openid/hardcodedRoleProtocolMapper.d.ts +24 -16
- package/openid/hardcodedRoleProtocolMapper.js +24 -16
- package/openid/hardcodedRoleProtocolMapper.js.map +1 -1
- package/openid/scriptProtocolMapper.d.ts +10 -8
- package/openid/scriptProtocolMapper.js +10 -8
- package/openid/scriptProtocolMapper.js.map +1 -1
- package/openid/userAttributeProtocolMapper.d.ts +18 -16
- package/openid/userAttributeProtocolMapper.js +18 -16
- package/openid/userAttributeProtocolMapper.js.map +1 -1
- package/openid/userClientRoleProtocolMapper.d.ts +10 -8
- package/openid/userClientRoleProtocolMapper.js +10 -8
- package/openid/userClientRoleProtocolMapper.js.map +1 -1
- package/openid/userPropertyProtocolMapper.d.ts +18 -16
- package/openid/userPropertyProtocolMapper.js +18 -16
- package/openid/userPropertyProtocolMapper.js.map +1 -1
- package/openid/userRealmRoleProtocolMapper.d.ts +18 -16
- package/openid/userRealmRoleProtocolMapper.js +18 -16
- package/openid/userRealmRoleProtocolMapper.js.map +1 -1
- package/openid/userSessionNoteProtocolMapper.d.ts +10 -8
- package/openid/userSessionNoteProtocolMapper.js +10 -8
- package/openid/userSessionNoteProtocolMapper.js.map +1 -1
- package/package.json +1 -1
- package/realmEvents.d.ts +5 -7
- package/realmEvents.js +5 -7
- package/realmEvents.js.map +1 -1
- package/realmKeystoreAesGenerated.d.ts +2 -3
- package/realmKeystoreAesGenerated.js +2 -3
- package/realmKeystoreAesGenerated.js.map +1 -1
- package/realmKeystoreEcdsaGenerated.d.ts +2 -3
- package/realmKeystoreEcdsaGenerated.js +2 -3
- package/realmKeystoreEcdsaGenerated.js.map +1 -1
- package/realmKeystoreHmacGenerated.d.ts +2 -3
- package/realmKeystoreHmacGenerated.js +2 -3
- package/realmKeystoreHmacGenerated.js.map +1 -1
- package/realmKeystoreJavaGenerated.d.ts +2 -3
- package/realmKeystoreJavaGenerated.js +2 -3
- package/realmKeystoreJavaGenerated.js.map +1 -1
- package/realmKeystoreRsaGenerated.d.ts +2 -3
- package/realmKeystoreRsaGenerated.js +2 -3
- package/realmKeystoreRsaGenerated.js.map +1 -1
- package/realmUserProfile.d.ts +1 -3
- package/realmUserProfile.js +1 -3
- package/realmUserProfile.js.map +1 -1
- package/requiredAction.d.ts +2 -3
- package/requiredAction.js +2 -3
- package/requiredAction.js.map +1 -1
- package/role.d.ts +41 -27
- package/role.js +41 -27
- package/role.js.map +1 -1
- package/saml/client.d.ts +0 -54
- package/saml/client.js +0 -54
- package/saml/client.js.map +1 -1
- package/saml/clientDefaultScope.d.ts +0 -37
- package/saml/clientDefaultScope.js +0 -37
- package/saml/clientDefaultScope.js.map +1 -1
- package/saml/clientScope.d.ts +2 -3
- package/saml/clientScope.js +2 -3
- package/saml/clientScope.js.map +1 -1
- package/saml/getClient.d.ts +2 -4
- package/saml/getClient.js +2 -4
- package/saml/getClient.js.map +1 -1
- package/saml/getClientInstallationProvider.d.ts +0 -66
- package/saml/getClientInstallationProvider.js +0 -66
- package/saml/getClientInstallationProvider.js.map +1 -1
- package/saml/identityProvider.d.ts +7 -9
- package/saml/identityProvider.js +7 -9
- package/saml/identityProvider.js.map +1 -1
- package/saml/scriptProtocolMapper.d.ts +4 -4
- package/saml/scriptProtocolMapper.js +4 -4
- package/saml/userAttributeProtocolMapper.d.ts +8 -8
- package/saml/userAttributeProtocolMapper.js +8 -8
- package/saml/userPropertyProtocolMapper.d.ts +8 -8
- package/saml/userPropertyProtocolMapper.js +8 -8
- package/types/input.d.ts +0 -48
- package/types/output.d.ts +0 -48
- package/user.d.ts +10 -12
- package/user.js +10 -12
- package/user.js.map +1 -1
- package/userGroups.d.ts +4 -40
- package/userGroups.js +4 -40
- package/userGroups.js.map +1 -1
- package/userRoles.d.ts +7 -6
- package/userRoles.js +7 -6
- package/userRoles.js.map +1 -1
- package/userTemplateImporterIdentityProviderMapper.d.ts +2 -3
- package/userTemplateImporterIdentityProviderMapper.js +2 -3
- package/userTemplateImporterIdentityProviderMapper.js.map +1 -1
|
@@ -8,7 +8,6 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
8
8
|
*
|
|
9
9
|
* ## Example Usage
|
|
10
10
|
*
|
|
11
|
-
* <!--Start PulumiCodeChooser -->
|
|
12
11
|
* ```typescript
|
|
13
12
|
* import * as pulumi from "@pulumi/pulumi";
|
|
14
13
|
* import * as keycloak from "@pulumi/keycloak";
|
|
@@ -18,25 +17,29 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
18
17
|
* enabled: true,
|
|
19
18
|
* });
|
|
20
19
|
* // client1 provides a role to other clients
|
|
21
|
-
* const client1 = new keycloak.openid.Client("client1", {
|
|
22
|
-
*
|
|
20
|
+
* const client1 = new keycloak.openid.Client("client1", {
|
|
21
|
+
* realmId: realm.id,
|
|
22
|
+
* name: "client1",
|
|
23
|
+
* });
|
|
24
|
+
* const client1Role = new keycloak.Role("client1_role", {
|
|
23
25
|
* realmId: realm.id,
|
|
24
26
|
* clientId: client1.id,
|
|
27
|
+
* name: "my-client1-role",
|
|
25
28
|
* description: "A role that client1 provides",
|
|
26
29
|
* });
|
|
27
30
|
* // client2 is assigned the role of client1
|
|
28
31
|
* const client2 = new keycloak.openid.Client("client2", {
|
|
29
32
|
* realmId: realm.id,
|
|
33
|
+
* name: "client2",
|
|
30
34
|
* serviceAccountsEnabled: true,
|
|
31
35
|
* });
|
|
32
|
-
* const client2ServiceAccountRole = new keycloak.openid.ClientServiceAccountRole("
|
|
36
|
+
* const client2ServiceAccountRole = new keycloak.openid.ClientServiceAccountRole("client2_service_account_role", {
|
|
33
37
|
* realmId: realm.id,
|
|
34
38
|
* serviceAccountUserId: client2.serviceAccountUserId,
|
|
35
39
|
* clientId: client1.id,
|
|
36
40
|
* role: client1Role.name,
|
|
37
41
|
* });
|
|
38
42
|
* ```
|
|
39
|
-
* <!--End PulumiCodeChooser -->
|
|
40
43
|
*
|
|
41
44
|
* ## Import
|
|
42
45
|
*
|
|
@@ -14,7 +14,6 @@ const utilities = require("../utilities");
|
|
|
14
14
|
*
|
|
15
15
|
* ## Example Usage
|
|
16
16
|
*
|
|
17
|
-
* <!--Start PulumiCodeChooser -->
|
|
18
17
|
* ```typescript
|
|
19
18
|
* import * as pulumi from "@pulumi/pulumi";
|
|
20
19
|
* import * as keycloak from "@pulumi/keycloak";
|
|
@@ -24,25 +23,29 @@ const utilities = require("../utilities");
|
|
|
24
23
|
* enabled: true,
|
|
25
24
|
* });
|
|
26
25
|
* // client1 provides a role to other clients
|
|
27
|
-
* const client1 = new keycloak.openid.Client("client1", {
|
|
28
|
-
*
|
|
26
|
+
* const client1 = new keycloak.openid.Client("client1", {
|
|
27
|
+
* realmId: realm.id,
|
|
28
|
+
* name: "client1",
|
|
29
|
+
* });
|
|
30
|
+
* const client1Role = new keycloak.Role("client1_role", {
|
|
29
31
|
* realmId: realm.id,
|
|
30
32
|
* clientId: client1.id,
|
|
33
|
+
* name: "my-client1-role",
|
|
31
34
|
* description: "A role that client1 provides",
|
|
32
35
|
* });
|
|
33
36
|
* // client2 is assigned the role of client1
|
|
34
37
|
* const client2 = new keycloak.openid.Client("client2", {
|
|
35
38
|
* realmId: realm.id,
|
|
39
|
+
* name: "client2",
|
|
36
40
|
* serviceAccountsEnabled: true,
|
|
37
41
|
* });
|
|
38
|
-
* const client2ServiceAccountRole = new keycloak.openid.ClientServiceAccountRole("
|
|
42
|
+
* const client2ServiceAccountRole = new keycloak.openid.ClientServiceAccountRole("client2_service_account_role", {
|
|
39
43
|
* realmId: realm.id,
|
|
40
44
|
* serviceAccountUserId: client2.serviceAccountUserId,
|
|
41
45
|
* clientId: client1.id,
|
|
42
46
|
* role: client1Role.name,
|
|
43
47
|
* });
|
|
44
48
|
* ```
|
|
45
|
-
* <!--End PulumiCodeChooser -->
|
|
46
49
|
*
|
|
47
50
|
* ## Import
|
|
48
51
|
*
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"clientServiceAccountRole.js","sourceRoot":"","sources":["../../openid/clientServiceAccountRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"clientServiceAccountRole.js","sourceRoot":"","sources":["../../openid/clientServiceAccountRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAqDG;AACH,MAAa,wBAAyB,SAAQ,MAAM,CAAC,cAAc;IAC/D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAqC,EAAE,IAAmC;QACnI,OAAO,IAAI,wBAAwB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC/E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,wBAAwB,CAAC,YAAY,CAAC;IACzE,CAAC;IA2BD,YAAY,IAAY,EAAE,WAA0E,EAAE,IAAmC;QACrI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAwD,CAAC;YACvE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3F;aAAM;YACH,MAAM,IAAI,GAAG,WAAuD,CAAC;YACrE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,oBAAoB,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjE,MAAM,IAAI,KAAK,CAAC,kDAAkD,CAAC,CAAC;aACvE;YACD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;SACzF;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,wBAAwB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC7E,CAAC;;AAnFL,4DAoFC;AAtEG,gBAAgB;AACO,qCAAY,GAAG,mEAAmE,CAAC"}
|
|
@@ -12,47 +12,49 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
12
12
|
*
|
|
13
13
|
* ### Example Usage (Client)
|
|
14
14
|
*
|
|
15
|
-
* <!--Start PulumiCodeChooser -->
|
|
16
15
|
* ```typescript
|
|
17
16
|
* import * as pulumi from "@pulumi/pulumi";
|
|
18
17
|
* import * as keycloak from "@pulumi/keycloak";
|
|
19
18
|
*
|
|
20
19
|
* const realm = new keycloak.Realm("realm", {
|
|
21
|
-
* enabled: true,
|
|
22
20
|
* realm: "my-realm",
|
|
21
|
+
* enabled: true,
|
|
23
22
|
* });
|
|
24
|
-
* const openidClient = new keycloak.openid.Client("
|
|
25
|
-
*
|
|
23
|
+
* const openidClient = new keycloak.openid.Client("openid_client", {
|
|
24
|
+
* realmId: realm.id,
|
|
26
25
|
* clientId: "test-client",
|
|
26
|
+
* name: "test client",
|
|
27
27
|
* enabled: true,
|
|
28
|
-
*
|
|
28
|
+
* accessType: "CONFIDENTIAL",
|
|
29
29
|
* validRedirectUris: ["http://localhost:8080/openid-callback"],
|
|
30
30
|
* });
|
|
31
|
-
* const fullNameMapper = new keycloak.openid.FullNameProtocolMapper("
|
|
32
|
-
* clientId: openidClient.id,
|
|
31
|
+
* const fullNameMapper = new keycloak.openid.FullNameProtocolMapper("full_name_mapper", {
|
|
33
32
|
* realmId: realm.id,
|
|
33
|
+
* clientId: openidClient.id,
|
|
34
|
+
* name: "full-name-mapper",
|
|
34
35
|
* });
|
|
35
36
|
* ```
|
|
36
|
-
* <!--End PulumiCodeChooser -->
|
|
37
37
|
*
|
|
38
38
|
* ### Example Usage (Client Scope)
|
|
39
39
|
*
|
|
40
|
-
* <!--Start PulumiCodeChooser -->
|
|
41
40
|
* ```typescript
|
|
42
41
|
* import * as pulumi from "@pulumi/pulumi";
|
|
43
42
|
* import * as keycloak from "@pulumi/keycloak";
|
|
44
43
|
*
|
|
45
44
|
* const realm = new keycloak.Realm("realm", {
|
|
46
|
-
* enabled: true,
|
|
47
45
|
* realm: "my-realm",
|
|
46
|
+
* enabled: true,
|
|
48
47
|
* });
|
|
49
|
-
* const clientScope = new keycloak.openid.ClientScope("
|
|
50
|
-
* const fullNameMapper = new keycloak.openid.FullNameProtocolMapper("fullNameMapper", {
|
|
51
|
-
* clientScopeId: clientScope.id,
|
|
48
|
+
* const clientScope = new keycloak.openid.ClientScope("client_scope", {
|
|
52
49
|
* realmId: realm.id,
|
|
50
|
+
* name: "test-client-scope",
|
|
51
|
+
* });
|
|
52
|
+
* const fullNameMapper = new keycloak.openid.FullNameProtocolMapper("full_name_mapper", {
|
|
53
|
+
* realmId: realm.id,
|
|
54
|
+
* clientScopeId: clientScope.id,
|
|
55
|
+
* name: "full-name-mapper",
|
|
53
56
|
* });
|
|
54
57
|
* ```
|
|
55
|
-
* <!--End PulumiCodeChooser -->
|
|
56
58
|
*
|
|
57
59
|
* ### Argument Reference
|
|
58
60
|
*
|
|
@@ -18,47 +18,49 @@ const utilities = require("../utilities");
|
|
|
18
18
|
*
|
|
19
19
|
* ### Example Usage (Client)
|
|
20
20
|
*
|
|
21
|
-
* <!--Start PulumiCodeChooser -->
|
|
22
21
|
* ```typescript
|
|
23
22
|
* import * as pulumi from "@pulumi/pulumi";
|
|
24
23
|
* import * as keycloak from "@pulumi/keycloak";
|
|
25
24
|
*
|
|
26
25
|
* const realm = new keycloak.Realm("realm", {
|
|
27
|
-
* enabled: true,
|
|
28
26
|
* realm: "my-realm",
|
|
27
|
+
* enabled: true,
|
|
29
28
|
* });
|
|
30
|
-
* const openidClient = new keycloak.openid.Client("
|
|
31
|
-
*
|
|
29
|
+
* const openidClient = new keycloak.openid.Client("openid_client", {
|
|
30
|
+
* realmId: realm.id,
|
|
32
31
|
* clientId: "test-client",
|
|
32
|
+
* name: "test client",
|
|
33
33
|
* enabled: true,
|
|
34
|
-
*
|
|
34
|
+
* accessType: "CONFIDENTIAL",
|
|
35
35
|
* validRedirectUris: ["http://localhost:8080/openid-callback"],
|
|
36
36
|
* });
|
|
37
|
-
* const fullNameMapper = new keycloak.openid.FullNameProtocolMapper("
|
|
38
|
-
* clientId: openidClient.id,
|
|
37
|
+
* const fullNameMapper = new keycloak.openid.FullNameProtocolMapper("full_name_mapper", {
|
|
39
38
|
* realmId: realm.id,
|
|
39
|
+
* clientId: openidClient.id,
|
|
40
|
+
* name: "full-name-mapper",
|
|
40
41
|
* });
|
|
41
42
|
* ```
|
|
42
|
-
* <!--End PulumiCodeChooser -->
|
|
43
43
|
*
|
|
44
44
|
* ### Example Usage (Client Scope)
|
|
45
45
|
*
|
|
46
|
-
* <!--Start PulumiCodeChooser -->
|
|
47
46
|
* ```typescript
|
|
48
47
|
* import * as pulumi from "@pulumi/pulumi";
|
|
49
48
|
* import * as keycloak from "@pulumi/keycloak";
|
|
50
49
|
*
|
|
51
50
|
* const realm = new keycloak.Realm("realm", {
|
|
52
|
-
* enabled: true,
|
|
53
51
|
* realm: "my-realm",
|
|
52
|
+
* enabled: true,
|
|
54
53
|
* });
|
|
55
|
-
* const clientScope = new keycloak.openid.ClientScope("
|
|
56
|
-
* const fullNameMapper = new keycloak.openid.FullNameProtocolMapper("fullNameMapper", {
|
|
57
|
-
* clientScopeId: clientScope.id,
|
|
54
|
+
* const clientScope = new keycloak.openid.ClientScope("client_scope", {
|
|
58
55
|
* realmId: realm.id,
|
|
56
|
+
* name: "test-client-scope",
|
|
57
|
+
* });
|
|
58
|
+
* const fullNameMapper = new keycloak.openid.FullNameProtocolMapper("full_name_mapper", {
|
|
59
|
+
* realmId: realm.id,
|
|
60
|
+
* clientScopeId: clientScope.id,
|
|
61
|
+
* name: "full-name-mapper",
|
|
59
62
|
* });
|
|
60
63
|
* ```
|
|
61
|
-
* <!--End PulumiCodeChooser -->
|
|
62
64
|
*
|
|
63
65
|
* ### Argument Reference
|
|
64
66
|
*
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"fullNameProtocolMapper.js","sourceRoot":"","sources":["../../openid/fullNameProtocolMapper.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"fullNameProtocolMapper.js","sourceRoot":"","sources":["../../openid/fullNameProtocolMapper.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA4EG;AACH,MAAa,sBAAuB,SAAQ,MAAM,CAAC,cAAc;IAC7D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAmC,EAAE,IAAmC;QACjI,OAAO,IAAI,sBAAsB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC7E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,sBAAsB,CAAC,YAAY,CAAC;IACvE,CAAC;IA8BD,YAAY,IAAY,EAAE,WAAsE,EAAE,IAAmC;QACjI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAsD,CAAC;YACrE,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;SACjE;aAAM;YACH,MAAM,IAAI,GAAG,WAAqD,CAAC;YACnE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,sBAAsB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC3E,CAAC;;AAnFL,wDAoFC;AAtEG,gBAAgB;AACO,mCAAY,GAAG,+DAA+D,CAAC"}
|
package/openid/getClient.d.ts
CHANGED
|
@@ -7,7 +7,6 @@ import * as outputs from "../types/output";
|
|
|
7
7
|
*
|
|
8
8
|
* ### Example Usage
|
|
9
9
|
*
|
|
10
|
-
* <!--Start PulumiCodeChooser -->
|
|
11
10
|
* ```typescript
|
|
12
11
|
* import * as pulumi from "@pulumi/pulumi";
|
|
13
12
|
* import * as keycloak from "@pulumi/keycloak";
|
|
@@ -16,13 +15,13 @@ import * as outputs from "../types/output";
|
|
|
16
15
|
* realmId: "my-realm",
|
|
17
16
|
* clientId: "realm-management",
|
|
18
17
|
* });
|
|
18
|
+
* // use the data source
|
|
19
19
|
* const admin = realmManagement.then(realmManagement => keycloak.getRole({
|
|
20
20
|
* realmId: "my-realm",
|
|
21
21
|
* clientId: realmManagement.id,
|
|
22
22
|
* name: "realm-admin",
|
|
23
23
|
* }));
|
|
24
24
|
* ```
|
|
25
|
-
* <!--End PulumiCodeChooser -->
|
|
26
25
|
*
|
|
27
26
|
* ### Argument Reference
|
|
28
27
|
*
|
|
@@ -114,7 +113,6 @@ export interface GetClientResult {
|
|
|
114
113
|
*
|
|
115
114
|
* ### Example Usage
|
|
116
115
|
*
|
|
117
|
-
* <!--Start PulumiCodeChooser -->
|
|
118
116
|
* ```typescript
|
|
119
117
|
* import * as pulumi from "@pulumi/pulumi";
|
|
120
118
|
* import * as keycloak from "@pulumi/keycloak";
|
|
@@ -123,13 +121,13 @@ export interface GetClientResult {
|
|
|
123
121
|
* realmId: "my-realm",
|
|
124
122
|
* clientId: "realm-management",
|
|
125
123
|
* });
|
|
124
|
+
* // use the data source
|
|
126
125
|
* const admin = realmManagement.then(realmManagement => keycloak.getRole({
|
|
127
126
|
* realmId: "my-realm",
|
|
128
127
|
* clientId: realmManagement.id,
|
|
129
128
|
* name: "realm-admin",
|
|
130
129
|
* }));
|
|
131
130
|
* ```
|
|
132
|
-
* <!--End PulumiCodeChooser -->
|
|
133
131
|
*
|
|
134
132
|
* ### Argument Reference
|
|
135
133
|
*
|
package/openid/getClient.js
CHANGED
|
@@ -12,7 +12,6 @@ const utilities = require("../utilities");
|
|
|
12
12
|
*
|
|
13
13
|
* ### Example Usage
|
|
14
14
|
*
|
|
15
|
-
* <!--Start PulumiCodeChooser -->
|
|
16
15
|
* ```typescript
|
|
17
16
|
* import * as pulumi from "@pulumi/pulumi";
|
|
18
17
|
* import * as keycloak from "@pulumi/keycloak";
|
|
@@ -21,13 +20,13 @@ const utilities = require("../utilities");
|
|
|
21
20
|
* realmId: "my-realm",
|
|
22
21
|
* clientId: "realm-management",
|
|
23
22
|
* });
|
|
23
|
+
* // use the data source
|
|
24
24
|
* const admin = realmManagement.then(realmManagement => keycloak.getRole({
|
|
25
25
|
* realmId: "my-realm",
|
|
26
26
|
* clientId: realmManagement.id,
|
|
27
27
|
* name: "realm-admin",
|
|
28
28
|
* }));
|
|
29
29
|
* ```
|
|
30
|
-
* <!--End PulumiCodeChooser -->
|
|
31
30
|
*
|
|
32
31
|
* ### Argument Reference
|
|
33
32
|
*
|
|
@@ -61,7 +60,6 @@ exports.getClient = getClient;
|
|
|
61
60
|
*
|
|
62
61
|
* ### Example Usage
|
|
63
62
|
*
|
|
64
|
-
* <!--Start PulumiCodeChooser -->
|
|
65
63
|
* ```typescript
|
|
66
64
|
* import * as pulumi from "@pulumi/pulumi";
|
|
67
65
|
* import * as keycloak from "@pulumi/keycloak";
|
|
@@ -70,13 +68,13 @@ exports.getClient = getClient;
|
|
|
70
68
|
* realmId: "my-realm",
|
|
71
69
|
* clientId: "realm-management",
|
|
72
70
|
* });
|
|
71
|
+
* // use the data source
|
|
73
72
|
* const admin = realmManagement.then(realmManagement => keycloak.getRole({
|
|
74
73
|
* realmId: "my-realm",
|
|
75
74
|
* clientId: realmManagement.id,
|
|
76
75
|
* name: "realm-admin",
|
|
77
76
|
* }));
|
|
78
77
|
* ```
|
|
79
|
-
* <!--End PulumiCodeChooser -->
|
|
80
78
|
*
|
|
81
79
|
* ### Argument Reference
|
|
82
80
|
*
|
package/openid/getClient.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getClient.js","sourceRoot":"","sources":["../../openid/getClient.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"getClient.js","sourceRoot":"","sources":["../../openid/getClient.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAiCG;AACH,SAAgB,SAAS,CAAC,IAAmB,EAAE,IAA2B;IAEtE,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,qCAAqC,EAAE;QAChE,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,mBAAmB,EAAE,IAAI,CAAC,iBAAiB;QAC3C,wBAAwB,EAAE,IAAI,CAAC,sBAAsB;QACrD,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,uCAAuC,EAAE,IAAI,CAAC,qCAAqC;QACnF,0BAA0B,EAAE,IAAI,CAAC,wBAAwB;QACzD,6BAA6B,EAAE,IAAI,CAAC,2BAA2B;QAC/D,SAAS,EAAE,IAAI,CAAC,OAAO;KAC1B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAbD,8BAaC;AAsED;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAiCG;AACH,SAAgB,eAAe,CAAC,IAAyB,EAAE,IAA2B;IAClF,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAM,EAAE,EAAE,CAAC,SAAS,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACpE,CAAC;AAFD,0CAEC"}
|
|
@@ -8,7 +8,6 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
8
8
|
* permission for this client called "Default Permission". We'll use the `keycloak.openid.getClientAuthorizationPolicy` data
|
|
9
9
|
* source to fetch information about this permission, so we can use it to create a new resource-based authorization permission.
|
|
10
10
|
*
|
|
11
|
-
* <!--Start PulumiCodeChooser -->
|
|
12
11
|
* ```typescript
|
|
13
12
|
* import * as pulumi from "@pulumi/pulumi";
|
|
14
13
|
* import * as keycloak from "@pulumi/keycloak";
|
|
@@ -17,8 +16,9 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
17
16
|
* realm: "my-realm",
|
|
18
17
|
* enabled: true,
|
|
19
18
|
* });
|
|
20
|
-
* const clientWithAuthz = new keycloak.openid.Client("
|
|
19
|
+
* const clientWithAuthz = new keycloak.openid.Client("client_with_authz", {
|
|
21
20
|
* clientId: "client-with-authz",
|
|
21
|
+
* name: "client-with-authz",
|
|
22
22
|
* realmId: realm.id,
|
|
23
23
|
* accessType: "CONFIDENTIAL",
|
|
24
24
|
* serviceAccountsEnabled: true,
|
|
@@ -33,6 +33,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
33
33
|
* });
|
|
34
34
|
* const resource = new keycloak.openid.ClientAuthorizationResource("resource", {
|
|
35
35
|
* resourceServerId: clientWithAuthz.resourceServerId,
|
|
36
|
+
* name: "authorization-resource",
|
|
36
37
|
* realmId: realm.id,
|
|
37
38
|
* uris: ["/endpoint/*"],
|
|
38
39
|
* attributes: {
|
|
@@ -42,11 +43,11 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
42
43
|
* const permission = new keycloak.openid.ClientAuthorizationPermission("permission", {
|
|
43
44
|
* resourceServerId: clientWithAuthz.resourceServerId,
|
|
44
45
|
* realmId: realm.id,
|
|
46
|
+
* name: "authorization-permission",
|
|
45
47
|
* policies: [defaultPermission.apply(defaultPermission => defaultPermission.id)],
|
|
46
48
|
* resources: [resource.id],
|
|
47
49
|
* });
|
|
48
50
|
* ```
|
|
49
|
-
* <!--End PulumiCodeChooser -->
|
|
50
51
|
*/
|
|
51
52
|
export declare function getClientAuthorizationPolicy(args: GetClientAuthorizationPolicyArgs, opts?: pulumi.InvokeOptions): Promise<GetClientAuthorizationPolicyResult>;
|
|
52
53
|
/**
|
|
@@ -115,7 +116,6 @@ export interface GetClientAuthorizationPolicyResult {
|
|
|
115
116
|
* permission for this client called "Default Permission". We'll use the `keycloak.openid.getClientAuthorizationPolicy` data
|
|
116
117
|
* source to fetch information about this permission, so we can use it to create a new resource-based authorization permission.
|
|
117
118
|
*
|
|
118
|
-
* <!--Start PulumiCodeChooser -->
|
|
119
119
|
* ```typescript
|
|
120
120
|
* import * as pulumi from "@pulumi/pulumi";
|
|
121
121
|
* import * as keycloak from "@pulumi/keycloak";
|
|
@@ -124,8 +124,9 @@ export interface GetClientAuthorizationPolicyResult {
|
|
|
124
124
|
* realm: "my-realm",
|
|
125
125
|
* enabled: true,
|
|
126
126
|
* });
|
|
127
|
-
* const clientWithAuthz = new keycloak.openid.Client("
|
|
127
|
+
* const clientWithAuthz = new keycloak.openid.Client("client_with_authz", {
|
|
128
128
|
* clientId: "client-with-authz",
|
|
129
|
+
* name: "client-with-authz",
|
|
129
130
|
* realmId: realm.id,
|
|
130
131
|
* accessType: "CONFIDENTIAL",
|
|
131
132
|
* serviceAccountsEnabled: true,
|
|
@@ -140,6 +141,7 @@ export interface GetClientAuthorizationPolicyResult {
|
|
|
140
141
|
* });
|
|
141
142
|
* const resource = new keycloak.openid.ClientAuthorizationResource("resource", {
|
|
142
143
|
* resourceServerId: clientWithAuthz.resourceServerId,
|
|
144
|
+
* name: "authorization-resource",
|
|
143
145
|
* realmId: realm.id,
|
|
144
146
|
* uris: ["/endpoint/*"],
|
|
145
147
|
* attributes: {
|
|
@@ -149,11 +151,11 @@ export interface GetClientAuthorizationPolicyResult {
|
|
|
149
151
|
* const permission = new keycloak.openid.ClientAuthorizationPermission("permission", {
|
|
150
152
|
* resourceServerId: clientWithAuthz.resourceServerId,
|
|
151
153
|
* realmId: realm.id,
|
|
154
|
+
* name: "authorization-permission",
|
|
152
155
|
* policies: [defaultPermission.apply(defaultPermission => defaultPermission.id)],
|
|
153
156
|
* resources: [resource.id],
|
|
154
157
|
* });
|
|
155
158
|
* ```
|
|
156
|
-
* <!--End PulumiCodeChooser -->
|
|
157
159
|
*/
|
|
158
160
|
export declare function getClientAuthorizationPolicyOutput(args: GetClientAuthorizationPolicyOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output<GetClientAuthorizationPolicyResult>;
|
|
159
161
|
/**
|
|
@@ -14,7 +14,6 @@ const utilities = require("../utilities");
|
|
|
14
14
|
* permission for this client called "Default Permission". We'll use the `keycloak.openid.getClientAuthorizationPolicy` data
|
|
15
15
|
* source to fetch information about this permission, so we can use it to create a new resource-based authorization permission.
|
|
16
16
|
*
|
|
17
|
-
* <!--Start PulumiCodeChooser -->
|
|
18
17
|
* ```typescript
|
|
19
18
|
* import * as pulumi from "@pulumi/pulumi";
|
|
20
19
|
* import * as keycloak from "@pulumi/keycloak";
|
|
@@ -23,8 +22,9 @@ const utilities = require("../utilities");
|
|
|
23
22
|
* realm: "my-realm",
|
|
24
23
|
* enabled: true,
|
|
25
24
|
* });
|
|
26
|
-
* const clientWithAuthz = new keycloak.openid.Client("
|
|
25
|
+
* const clientWithAuthz = new keycloak.openid.Client("client_with_authz", {
|
|
27
26
|
* clientId: "client-with-authz",
|
|
27
|
+
* name: "client-with-authz",
|
|
28
28
|
* realmId: realm.id,
|
|
29
29
|
* accessType: "CONFIDENTIAL",
|
|
30
30
|
* serviceAccountsEnabled: true,
|
|
@@ -39,6 +39,7 @@ const utilities = require("../utilities");
|
|
|
39
39
|
* });
|
|
40
40
|
* const resource = new keycloak.openid.ClientAuthorizationResource("resource", {
|
|
41
41
|
* resourceServerId: clientWithAuthz.resourceServerId,
|
|
42
|
+
* name: "authorization-resource",
|
|
42
43
|
* realmId: realm.id,
|
|
43
44
|
* uris: ["/endpoint/*"],
|
|
44
45
|
* attributes: {
|
|
@@ -48,11 +49,11 @@ const utilities = require("../utilities");
|
|
|
48
49
|
* const permission = new keycloak.openid.ClientAuthorizationPermission("permission", {
|
|
49
50
|
* resourceServerId: clientWithAuthz.resourceServerId,
|
|
50
51
|
* realmId: realm.id,
|
|
52
|
+
* name: "authorization-permission",
|
|
51
53
|
* policies: [defaultPermission.apply(defaultPermission => defaultPermission.id)],
|
|
52
54
|
* resources: [resource.id],
|
|
53
55
|
* });
|
|
54
56
|
* ```
|
|
55
|
-
* <!--End PulumiCodeChooser -->
|
|
56
57
|
*/
|
|
57
58
|
function getClientAuthorizationPolicy(args, opts) {
|
|
58
59
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
|
|
@@ -72,7 +73,6 @@ exports.getClientAuthorizationPolicy = getClientAuthorizationPolicy;
|
|
|
72
73
|
* permission for this client called "Default Permission". We'll use the `keycloak.openid.getClientAuthorizationPolicy` data
|
|
73
74
|
* source to fetch information about this permission, so we can use it to create a new resource-based authorization permission.
|
|
74
75
|
*
|
|
75
|
-
* <!--Start PulumiCodeChooser -->
|
|
76
76
|
* ```typescript
|
|
77
77
|
* import * as pulumi from "@pulumi/pulumi";
|
|
78
78
|
* import * as keycloak from "@pulumi/keycloak";
|
|
@@ -81,8 +81,9 @@ exports.getClientAuthorizationPolicy = getClientAuthorizationPolicy;
|
|
|
81
81
|
* realm: "my-realm",
|
|
82
82
|
* enabled: true,
|
|
83
83
|
* });
|
|
84
|
-
* const clientWithAuthz = new keycloak.openid.Client("
|
|
84
|
+
* const clientWithAuthz = new keycloak.openid.Client("client_with_authz", {
|
|
85
85
|
* clientId: "client-with-authz",
|
|
86
|
+
* name: "client-with-authz",
|
|
86
87
|
* realmId: realm.id,
|
|
87
88
|
* accessType: "CONFIDENTIAL",
|
|
88
89
|
* serviceAccountsEnabled: true,
|
|
@@ -97,6 +98,7 @@ exports.getClientAuthorizationPolicy = getClientAuthorizationPolicy;
|
|
|
97
98
|
* });
|
|
98
99
|
* const resource = new keycloak.openid.ClientAuthorizationResource("resource", {
|
|
99
100
|
* resourceServerId: clientWithAuthz.resourceServerId,
|
|
101
|
+
* name: "authorization-resource",
|
|
100
102
|
* realmId: realm.id,
|
|
101
103
|
* uris: ["/endpoint/*"],
|
|
102
104
|
* attributes: {
|
|
@@ -106,11 +108,11 @@ exports.getClientAuthorizationPolicy = getClientAuthorizationPolicy;
|
|
|
106
108
|
* const permission = new keycloak.openid.ClientAuthorizationPermission("permission", {
|
|
107
109
|
* resourceServerId: clientWithAuthz.resourceServerId,
|
|
108
110
|
* realmId: realm.id,
|
|
111
|
+
* name: "authorization-permission",
|
|
109
112
|
* policies: [defaultPermission.apply(defaultPermission => defaultPermission.id)],
|
|
110
113
|
* resources: [resource.id],
|
|
111
114
|
* });
|
|
112
115
|
* ```
|
|
113
|
-
* <!--End PulumiCodeChooser -->
|
|
114
116
|
*/
|
|
115
117
|
function getClientAuthorizationPolicyOutput(args, opts) {
|
|
116
118
|
return pulumi.output(args).apply((a) => getClientAuthorizationPolicy(a, opts));
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getClientAuthorizationPolicy.js","sourceRoot":"","sources":["../../openid/getClientAuthorizationPolicy.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"getClientAuthorizationPolicy.js","sourceRoot":"","sources":["../../openid/getClientAuthorizationPolicy.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAiDG;AACH,SAAgB,4BAA4B,CAAC,IAAsC,EAAE,IAA2B;IAE5G,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,2EAA2E,EAAE;QACtG,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,kBAAkB,EAAE,IAAI,CAAC,gBAAgB;KAC5C,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AARD,oEAQC;AA4DD;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAiDG;AACH,SAAgB,kCAAkC,CAAC,IAA4C,EAAE,IAA2B;IACxH,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAM,EAAE,EAAE,CAAC,4BAA4B,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACvF,CAAC;AAFD,gFAEC"}
|
|
@@ -4,7 +4,6 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
4
4
|
*
|
|
5
5
|
* ## Example Usage
|
|
6
6
|
*
|
|
7
|
-
* <!--Start PulumiCodeChooser -->
|
|
8
7
|
* ```typescript
|
|
9
8
|
* import * as pulumi from "@pulumi/pulumi";
|
|
10
9
|
* import * as keycloak from "@pulumi/keycloak";
|
|
@@ -14,13 +13,13 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
14
13
|
* name: "offline_access",
|
|
15
14
|
* });
|
|
16
15
|
* // use the data source
|
|
17
|
-
* const audienceMapper = new keycloak.openid.AudienceProtocolMapper("
|
|
16
|
+
* const audienceMapper = new keycloak.openid.AudienceProtocolMapper("audience_mapper", {
|
|
18
17
|
* realmId: offlineAccess.then(offlineAccess => offlineAccess.realmId),
|
|
19
18
|
* clientScopeId: offlineAccess.then(offlineAccess => offlineAccess.id),
|
|
19
|
+
* name: "audience-mapper",
|
|
20
20
|
* includedCustomAudience: "foo",
|
|
21
21
|
* });
|
|
22
22
|
* ```
|
|
23
|
-
* <!--End PulumiCodeChooser -->
|
|
24
23
|
*/
|
|
25
24
|
export declare function getClientScope(args: GetClientScopeArgs, opts?: pulumi.InvokeOptions): Promise<GetClientScopeResult>;
|
|
26
25
|
/**
|
|
@@ -56,7 +55,6 @@ export interface GetClientScopeResult {
|
|
|
56
55
|
*
|
|
57
56
|
* ## Example Usage
|
|
58
57
|
*
|
|
59
|
-
* <!--Start PulumiCodeChooser -->
|
|
60
58
|
* ```typescript
|
|
61
59
|
* import * as pulumi from "@pulumi/pulumi";
|
|
62
60
|
* import * as keycloak from "@pulumi/keycloak";
|
|
@@ -66,13 +64,13 @@ export interface GetClientScopeResult {
|
|
|
66
64
|
* name: "offline_access",
|
|
67
65
|
* });
|
|
68
66
|
* // use the data source
|
|
69
|
-
* const audienceMapper = new keycloak.openid.AudienceProtocolMapper("
|
|
67
|
+
* const audienceMapper = new keycloak.openid.AudienceProtocolMapper("audience_mapper", {
|
|
70
68
|
* realmId: offlineAccess.then(offlineAccess => offlineAccess.realmId),
|
|
71
69
|
* clientScopeId: offlineAccess.then(offlineAccess => offlineAccess.id),
|
|
70
|
+
* name: "audience-mapper",
|
|
72
71
|
* includedCustomAudience: "foo",
|
|
73
72
|
* });
|
|
74
73
|
* ```
|
|
75
|
-
* <!--End PulumiCodeChooser -->
|
|
76
74
|
*/
|
|
77
75
|
export declare function getClientScopeOutput(args: GetClientScopeOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output<GetClientScopeResult>;
|
|
78
76
|
/**
|
package/openid/getClientScope.js
CHANGED
|
@@ -10,7 +10,6 @@ const utilities = require("../utilities");
|
|
|
10
10
|
*
|
|
11
11
|
* ## Example Usage
|
|
12
12
|
*
|
|
13
|
-
* <!--Start PulumiCodeChooser -->
|
|
14
13
|
* ```typescript
|
|
15
14
|
* import * as pulumi from "@pulumi/pulumi";
|
|
16
15
|
* import * as keycloak from "@pulumi/keycloak";
|
|
@@ -20,13 +19,13 @@ const utilities = require("../utilities");
|
|
|
20
19
|
* name: "offline_access",
|
|
21
20
|
* });
|
|
22
21
|
* // use the data source
|
|
23
|
-
* const audienceMapper = new keycloak.openid.AudienceProtocolMapper("
|
|
22
|
+
* const audienceMapper = new keycloak.openid.AudienceProtocolMapper("audience_mapper", {
|
|
24
23
|
* realmId: offlineAccess.then(offlineAccess => offlineAccess.realmId),
|
|
25
24
|
* clientScopeId: offlineAccess.then(offlineAccess => offlineAccess.id),
|
|
25
|
+
* name: "audience-mapper",
|
|
26
26
|
* includedCustomAudience: "foo",
|
|
27
27
|
* });
|
|
28
28
|
* ```
|
|
29
|
-
* <!--End PulumiCodeChooser -->
|
|
30
29
|
*/
|
|
31
30
|
function getClientScope(args, opts) {
|
|
32
31
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
|
|
@@ -41,7 +40,6 @@ exports.getClientScope = getClientScope;
|
|
|
41
40
|
*
|
|
42
41
|
* ## Example Usage
|
|
43
42
|
*
|
|
44
|
-
* <!--Start PulumiCodeChooser -->
|
|
45
43
|
* ```typescript
|
|
46
44
|
* import * as pulumi from "@pulumi/pulumi";
|
|
47
45
|
* import * as keycloak from "@pulumi/keycloak";
|
|
@@ -51,13 +49,13 @@ exports.getClientScope = getClientScope;
|
|
|
51
49
|
* name: "offline_access",
|
|
52
50
|
* });
|
|
53
51
|
* // use the data source
|
|
54
|
-
* const audienceMapper = new keycloak.openid.AudienceProtocolMapper("
|
|
52
|
+
* const audienceMapper = new keycloak.openid.AudienceProtocolMapper("audience_mapper", {
|
|
55
53
|
* realmId: offlineAccess.then(offlineAccess => offlineAccess.realmId),
|
|
56
54
|
* clientScopeId: offlineAccess.then(offlineAccess => offlineAccess.id),
|
|
55
|
+
* name: "audience-mapper",
|
|
57
56
|
* includedCustomAudience: "foo",
|
|
58
57
|
* });
|
|
59
58
|
* ```
|
|
60
|
-
* <!--End PulumiCodeChooser -->
|
|
61
59
|
*/
|
|
62
60
|
function getClientScopeOutput(args, opts) {
|
|
63
61
|
return pulumi.output(args).apply((a) => getClientScope(a, opts));
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getClientScope.js","sourceRoot":"","sources":["../../openid/getClientScope.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"getClientScope.js","sourceRoot":"","sources":["../../openid/getClientScope.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;GAqBG;AACH,SAAgB,cAAc,CAAC,IAAwB,EAAE,IAA2B;IAEhF,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,+CAA+C,EAAE;QAC1E,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,SAAS,EAAE,IAAI,CAAC,OAAO;KAC1B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAPD,wCAOC;AA+BD;;;;;;;;;;;;;;;;;;;;;GAqBG;AACH,SAAgB,oBAAoB,CAAC,IAA8B,EAAE,IAA2B;IAC5F,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAM,EAAE,EAAE,CAAC,cAAc,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACzE,CAAC;AAFD,oDAEC"}
|