@pulumi/keycloak 5.3.1 → 5.3.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (245) hide show
  1. package/attributeImporterIdentityProviderMapper.d.ts +4 -5
  2. package/attributeImporterIdentityProviderMapper.js +4 -5
  3. package/attributeImporterIdentityProviderMapper.js.map +1 -1
  4. package/attributeToRoleIdentityMapper.d.ts +6 -6
  5. package/attributeToRoleIdentityMapper.js +6 -6
  6. package/authentication/bindings.d.ts +3 -5
  7. package/authentication/bindings.js +3 -5
  8. package/authentication/bindings.js.map +1 -1
  9. package/authentication/execution.d.ts +2 -4
  10. package/authentication/execution.js +2 -4
  11. package/authentication/execution.js.map +1 -1
  12. package/authentication/executionConfig.d.ts +0 -2
  13. package/authentication/executionConfig.js +0 -2
  14. package/authentication/executionConfig.js.map +1 -1
  15. package/authentication/flow.d.ts +0 -2
  16. package/authentication/flow.js +0 -2
  17. package/authentication/flow.js.map +1 -1
  18. package/authentication/subflow.d.ts +0 -2
  19. package/authentication/subflow.js +0 -2
  20. package/authentication/subflow.js.map +1 -1
  21. package/customIdentityProviderMapping.d.ts +7 -8
  22. package/customIdentityProviderMapping.js +4 -5
  23. package/customIdentityProviderMapping.js.map +1 -1
  24. package/customUserFederation.d.ts +8 -9
  25. package/customUserFederation.js +5 -6
  26. package/customUserFederation.js.map +1 -1
  27. package/defaultGroups.d.ts +6 -5
  28. package/defaultGroups.js +6 -5
  29. package/defaultGroups.js.map +1 -1
  30. package/defaultRoles.d.ts +1 -3
  31. package/defaultRoles.js +1 -3
  32. package/defaultRoles.js.map +1 -1
  33. package/genericClientProtocolMapper.d.ts +8 -9
  34. package/genericClientProtocolMapper.js +8 -9
  35. package/genericClientProtocolMapper.js.map +1 -1
  36. package/genericClientRoleMapper.d.ts +28 -21
  37. package/genericClientRoleMapper.js +28 -21
  38. package/genericClientRoleMapper.js.map +1 -1
  39. package/genericProtocolMapper.d.ts +3 -4
  40. package/genericProtocolMapper.js +3 -4
  41. package/genericProtocolMapper.js.map +1 -1
  42. package/genericRoleMapper.d.ts +28 -21
  43. package/genericRoleMapper.js +28 -21
  44. package/genericRoleMapper.js.map +1 -1
  45. package/getAuthenticationExecution.d.ts +0 -4
  46. package/getAuthenticationExecution.js +0 -4
  47. package/getAuthenticationExecution.js.map +1 -1
  48. package/getAuthenticationFlow.d.ts +0 -4
  49. package/getAuthenticationFlow.js +0 -4
  50. package/getAuthenticationFlow.js.map +1 -1
  51. package/getClientDescriptionConverter.d.ts +50 -54
  52. package/getClientDescriptionConverter.js +50 -54
  53. package/getClientDescriptionConverter.js.map +1 -1
  54. package/getRealm.d.ts +10 -6
  55. package/getRealm.js +10 -6
  56. package/getRealm.js.map +1 -1
  57. package/getUser.d.ts +2 -4
  58. package/getUser.js +2 -4
  59. package/getUser.js.map +1 -1
  60. package/getUserRealmRoles.d.ts +4 -4
  61. package/getUserRealmRoles.js +4 -4
  62. package/group.d.ts +12 -9
  63. package/group.js +12 -9
  64. package/group.js.map +1 -1
  65. package/groupMemberships.d.ts +7 -6
  66. package/groupMemberships.js +7 -6
  67. package/groupMemberships.js.map +1 -1
  68. package/groupRoles.d.ts +16 -12
  69. package/groupRoles.js +16 -12
  70. package/groupRoles.js.map +1 -1
  71. package/hardcodedAttributeIdentityProviderMapper.d.ts +4 -5
  72. package/hardcodedAttributeIdentityProviderMapper.js +4 -5
  73. package/hardcodedAttributeIdentityProviderMapper.js.map +1 -1
  74. package/hardcodedRoleIdentityMapper.d.ts +6 -6
  75. package/hardcodedRoleIdentityMapper.js +6 -6
  76. package/identityProviderTokenExchangeScopePermission.d.ts +5 -6
  77. package/identityProviderTokenExchangeScopePermission.js +5 -6
  78. package/identityProviderTokenExchangeScopePermission.js.map +1 -1
  79. package/ldap/customMapper.d.ts +6 -6
  80. package/ldap/customMapper.js +6 -6
  81. package/ldap/fullNameMapper.d.ts +13 -13
  82. package/ldap/fullNameMapper.js +13 -13
  83. package/ldap/groupMapper.d.ts +15 -15
  84. package/ldap/groupMapper.js +15 -15
  85. package/ldap/hardcodedAttributeMapper.d.ts +4 -4
  86. package/ldap/hardcodedAttributeMapper.js +4 -4
  87. package/ldap/hardcodedGroupMapper.d.ts +8 -5
  88. package/ldap/hardcodedGroupMapper.js +8 -5
  89. package/ldap/hardcodedGroupMapper.js.map +1 -1
  90. package/ldap/hardcodedRoleMapper.d.ts +4 -4
  91. package/ldap/hardcodedRoleMapper.js +4 -4
  92. package/ldap/msadLdsUserAccountControlMapper.d.ts +4 -4
  93. package/ldap/msadLdsUserAccountControlMapper.js +4 -4
  94. package/ldap/msadUserAccountControlMapper.d.ts +12 -12
  95. package/ldap/msadUserAccountControlMapper.js +12 -12
  96. package/ldap/roleMapper.d.ts +4 -4
  97. package/ldap/roleMapper.js +4 -4
  98. package/ldap/userAttributeMapper.d.ts +16 -16
  99. package/ldap/userAttributeMapper.js +13 -13
  100. package/ldap/userFederation.d.ts +11 -12
  101. package/ldap/userFederation.js +11 -12
  102. package/ldap/userFederation.js.map +1 -1
  103. package/oidc/googleIdentityProvider.d.ts +2 -4
  104. package/oidc/googleIdentityProvider.js +2 -4
  105. package/oidc/googleIdentityProvider.js.map +1 -1
  106. package/oidc/identityProvider.d.ts +1 -3
  107. package/oidc/identityProvider.js +1 -3
  108. package/oidc/identityProvider.js.map +1 -1
  109. package/openid/audienceProtocolMapper.d.ts +16 -14
  110. package/openid/audienceProtocolMapper.js +16 -14
  111. package/openid/audienceProtocolMapper.js.map +1 -1
  112. package/openid/audienceResolveProtocolMapper.d.ts +9 -8
  113. package/openid/audienceResolveProtocolMapper.js +9 -8
  114. package/openid/audienceResolveProtocolMapper.js.map +1 -1
  115. package/openid/audienceResolveProtocolMappter.d.ts +9 -8
  116. package/openid/audienceResolveProtocolMappter.js +9 -8
  117. package/openid/audienceResolveProtocolMappter.js.map +1 -1
  118. package/openid/client.d.ts +5 -6
  119. package/openid/client.js +5 -6
  120. package/openid/client.js.map +1 -1
  121. package/openid/clientDefaultScopes.d.ts +8 -7
  122. package/openid/clientDefaultScopes.js +8 -7
  123. package/openid/clientDefaultScopes.js.map +1 -1
  124. package/openid/clientOptionalScopes.d.ts +8 -7
  125. package/openid/clientOptionalScopes.js +8 -7
  126. package/openid/clientOptionalScopes.js.map +1 -1
  127. package/openid/clientPolicy.d.ts +5 -5
  128. package/openid/clientPolicy.js +5 -5
  129. package/openid/clientScope.d.ts +4 -5
  130. package/openid/clientScope.js +4 -5
  131. package/openid/clientScope.js.map +1 -1
  132. package/openid/clientServiceAccountRealmRole.d.ts +6 -4
  133. package/openid/clientServiceAccountRealmRole.js +6 -4
  134. package/openid/clientServiceAccountRealmRole.js.map +1 -1
  135. package/openid/clientServiceAccountRole.d.ts +8 -5
  136. package/openid/clientServiceAccountRole.js +8 -5
  137. package/openid/clientServiceAccountRole.js.map +1 -1
  138. package/openid/fullNameProtocolMapper.d.ts +16 -14
  139. package/openid/fullNameProtocolMapper.js +16 -14
  140. package/openid/fullNameProtocolMapper.js.map +1 -1
  141. package/openid/getClient.d.ts +2 -4
  142. package/openid/getClient.js +2 -4
  143. package/openid/getClient.js.map +1 -1
  144. package/openid/getClientAuthorizationPolicy.d.ts +8 -6
  145. package/openid/getClientAuthorizationPolicy.js +8 -6
  146. package/openid/getClientAuthorizationPolicy.js.map +1 -1
  147. package/openid/getClientScope.d.ts +4 -6
  148. package/openid/getClientScope.js +4 -6
  149. package/openid/getClientScope.js.map +1 -1
  150. package/openid/getClientServiceAccountUser.d.ts +4 -6
  151. package/openid/getClientServiceAccountUser.js +4 -6
  152. package/openid/getClientServiceAccountUser.js.map +1 -1
  153. package/openid/groupMembershipProtocolMapper.d.ts +18 -16
  154. package/openid/groupMembershipProtocolMapper.js +18 -16
  155. package/openid/groupMembershipProtocolMapper.js.map +1 -1
  156. package/openid/hardcodedClaimProtocolMapper.d.ts +18 -16
  157. package/openid/hardcodedClaimProtocolMapper.js +18 -16
  158. package/openid/hardcodedClaimProtocolMapper.js.map +1 -1
  159. package/openid/hardcodedRoleProtocolMapper.d.ts +24 -16
  160. package/openid/hardcodedRoleProtocolMapper.js +24 -16
  161. package/openid/hardcodedRoleProtocolMapper.js.map +1 -1
  162. package/openid/scriptProtocolMapper.d.ts +10 -8
  163. package/openid/scriptProtocolMapper.js +10 -8
  164. package/openid/scriptProtocolMapper.js.map +1 -1
  165. package/openid/userAttributeProtocolMapper.d.ts +18 -16
  166. package/openid/userAttributeProtocolMapper.js +18 -16
  167. package/openid/userAttributeProtocolMapper.js.map +1 -1
  168. package/openid/userClientRoleProtocolMapper.d.ts +10 -8
  169. package/openid/userClientRoleProtocolMapper.js +10 -8
  170. package/openid/userClientRoleProtocolMapper.js.map +1 -1
  171. package/openid/userPropertyProtocolMapper.d.ts +18 -16
  172. package/openid/userPropertyProtocolMapper.js +18 -16
  173. package/openid/userPropertyProtocolMapper.js.map +1 -1
  174. package/openid/userRealmRoleProtocolMapper.d.ts +18 -16
  175. package/openid/userRealmRoleProtocolMapper.js +18 -16
  176. package/openid/userRealmRoleProtocolMapper.js.map +1 -1
  177. package/openid/userSessionNoteProtocolMapper.d.ts +10 -8
  178. package/openid/userSessionNoteProtocolMapper.js +10 -8
  179. package/openid/userSessionNoteProtocolMapper.js.map +1 -1
  180. package/package.json +1 -1
  181. package/realmEvents.d.ts +5 -7
  182. package/realmEvents.js +5 -7
  183. package/realmEvents.js.map +1 -1
  184. package/realmKeystoreAesGenerated.d.ts +2 -3
  185. package/realmKeystoreAesGenerated.js +2 -3
  186. package/realmKeystoreAesGenerated.js.map +1 -1
  187. package/realmKeystoreEcdsaGenerated.d.ts +2 -3
  188. package/realmKeystoreEcdsaGenerated.js +2 -3
  189. package/realmKeystoreEcdsaGenerated.js.map +1 -1
  190. package/realmKeystoreHmacGenerated.d.ts +2 -3
  191. package/realmKeystoreHmacGenerated.js +2 -3
  192. package/realmKeystoreHmacGenerated.js.map +1 -1
  193. package/realmKeystoreJavaGenerated.d.ts +2 -3
  194. package/realmKeystoreJavaGenerated.js +2 -3
  195. package/realmKeystoreJavaGenerated.js.map +1 -1
  196. package/realmKeystoreRsaGenerated.d.ts +2 -3
  197. package/realmKeystoreRsaGenerated.js +2 -3
  198. package/realmKeystoreRsaGenerated.js.map +1 -1
  199. package/realmUserProfile.d.ts +1 -3
  200. package/realmUserProfile.js +1 -3
  201. package/realmUserProfile.js.map +1 -1
  202. package/requiredAction.d.ts +2 -3
  203. package/requiredAction.js +2 -3
  204. package/requiredAction.js.map +1 -1
  205. package/role.d.ts +41 -27
  206. package/role.js +41 -27
  207. package/role.js.map +1 -1
  208. package/saml/client.d.ts +0 -54
  209. package/saml/client.js +0 -54
  210. package/saml/client.js.map +1 -1
  211. package/saml/clientDefaultScope.d.ts +0 -37
  212. package/saml/clientDefaultScope.js +0 -37
  213. package/saml/clientDefaultScope.js.map +1 -1
  214. package/saml/clientScope.d.ts +2 -3
  215. package/saml/clientScope.js +2 -3
  216. package/saml/clientScope.js.map +1 -1
  217. package/saml/getClient.d.ts +2 -4
  218. package/saml/getClient.js +2 -4
  219. package/saml/getClient.js.map +1 -1
  220. package/saml/getClientInstallationProvider.d.ts +0 -66
  221. package/saml/getClientInstallationProvider.js +0 -66
  222. package/saml/getClientInstallationProvider.js.map +1 -1
  223. package/saml/identityProvider.d.ts +7 -9
  224. package/saml/identityProvider.js +7 -9
  225. package/saml/identityProvider.js.map +1 -1
  226. package/saml/scriptProtocolMapper.d.ts +4 -4
  227. package/saml/scriptProtocolMapper.js +4 -4
  228. package/saml/userAttributeProtocolMapper.d.ts +8 -8
  229. package/saml/userAttributeProtocolMapper.js +8 -8
  230. package/saml/userPropertyProtocolMapper.d.ts +8 -8
  231. package/saml/userPropertyProtocolMapper.js +8 -8
  232. package/types/input.d.ts +0 -48
  233. package/types/output.d.ts +0 -48
  234. package/user.d.ts +10 -12
  235. package/user.js +10 -12
  236. package/user.js.map +1 -1
  237. package/userGroups.d.ts +4 -40
  238. package/userGroups.js +4 -40
  239. package/userGroups.js.map +1 -1
  240. package/userRoles.d.ts +7 -6
  241. package/userRoles.js +7 -6
  242. package/userRoles.js.map +1 -1
  243. package/userTemplateImporterIdentityProviderMapper.d.ts +2 -3
  244. package/userTemplateImporterIdentityProviderMapper.js +2 -3
  245. package/userTemplateImporterIdentityProviderMapper.js.map +1 -1
@@ -8,7 +8,6 @@ import * as pulumi from "@pulumi/pulumi";
8
8
  *
9
9
  * ## Example Usage
10
10
  *
11
- * <!--Start PulumiCodeChooser -->
12
11
  * ```typescript
13
12
  * import * as pulumi from "@pulumi/pulumi";
14
13
  * import * as keycloak from "@pulumi/keycloak";
@@ -18,25 +17,29 @@ import * as pulumi from "@pulumi/pulumi";
18
17
  * enabled: true,
19
18
  * });
20
19
  * // client1 provides a role to other clients
21
- * const client1 = new keycloak.openid.Client("client1", {realmId: realm.id});
22
- * const client1Role = new keycloak.Role("client1Role", {
20
+ * const client1 = new keycloak.openid.Client("client1", {
21
+ * realmId: realm.id,
22
+ * name: "client1",
23
+ * });
24
+ * const client1Role = new keycloak.Role("client1_role", {
23
25
  * realmId: realm.id,
24
26
  * clientId: client1.id,
27
+ * name: "my-client1-role",
25
28
  * description: "A role that client1 provides",
26
29
  * });
27
30
  * // client2 is assigned the role of client1
28
31
  * const client2 = new keycloak.openid.Client("client2", {
29
32
  * realmId: realm.id,
33
+ * name: "client2",
30
34
  * serviceAccountsEnabled: true,
31
35
  * });
32
- * const client2ServiceAccountRole = new keycloak.openid.ClientServiceAccountRole("client2ServiceAccountRole", {
36
+ * const client2ServiceAccountRole = new keycloak.openid.ClientServiceAccountRole("client2_service_account_role", {
33
37
  * realmId: realm.id,
34
38
  * serviceAccountUserId: client2.serviceAccountUserId,
35
39
  * clientId: client1.id,
36
40
  * role: client1Role.name,
37
41
  * });
38
42
  * ```
39
- * <!--End PulumiCodeChooser -->
40
43
  *
41
44
  * ## Import
42
45
  *
@@ -14,7 +14,6 @@ const utilities = require("../utilities");
14
14
  *
15
15
  * ## Example Usage
16
16
  *
17
- * <!--Start PulumiCodeChooser -->
18
17
  * ```typescript
19
18
  * import * as pulumi from "@pulumi/pulumi";
20
19
  * import * as keycloak from "@pulumi/keycloak";
@@ -24,25 +23,29 @@ const utilities = require("../utilities");
24
23
  * enabled: true,
25
24
  * });
26
25
  * // client1 provides a role to other clients
27
- * const client1 = new keycloak.openid.Client("client1", {realmId: realm.id});
28
- * const client1Role = new keycloak.Role("client1Role", {
26
+ * const client1 = new keycloak.openid.Client("client1", {
27
+ * realmId: realm.id,
28
+ * name: "client1",
29
+ * });
30
+ * const client1Role = new keycloak.Role("client1_role", {
29
31
  * realmId: realm.id,
30
32
  * clientId: client1.id,
33
+ * name: "my-client1-role",
31
34
  * description: "A role that client1 provides",
32
35
  * });
33
36
  * // client2 is assigned the role of client1
34
37
  * const client2 = new keycloak.openid.Client("client2", {
35
38
  * realmId: realm.id,
39
+ * name: "client2",
36
40
  * serviceAccountsEnabled: true,
37
41
  * });
38
- * const client2ServiceAccountRole = new keycloak.openid.ClientServiceAccountRole("client2ServiceAccountRole", {
42
+ * const client2ServiceAccountRole = new keycloak.openid.ClientServiceAccountRole("client2_service_account_role", {
39
43
  * realmId: realm.id,
40
44
  * serviceAccountUserId: client2.serviceAccountUserId,
41
45
  * clientId: client1.id,
42
46
  * role: client1Role.name,
43
47
  * });
44
48
  * ```
45
- * <!--End PulumiCodeChooser -->
46
49
  *
47
50
  * ## Import
48
51
  *
@@ -1 +1 @@
1
- {"version":3,"file":"clientServiceAccountRole.js","sourceRoot":"","sources":["../../openid/clientServiceAccountRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAkDG;AACH,MAAa,wBAAyB,SAAQ,MAAM,CAAC,cAAc;IAC/D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAqC,EAAE,IAAmC;QACnI,OAAO,IAAI,wBAAwB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC/E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,wBAAwB,CAAC,YAAY,CAAC;IACzE,CAAC;IA2BD,YAAY,IAAY,EAAE,WAA0E,EAAE,IAAmC;QACrI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAwD,CAAC;YACvE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3F;aAAM;YACH,MAAM,IAAI,GAAG,WAAuD,CAAC;YACrE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,oBAAoB,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjE,MAAM,IAAI,KAAK,CAAC,kDAAkD,CAAC,CAAC;aACvE;YACD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;SACzF;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,wBAAwB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC7E,CAAC;;AAnFL,4DAoFC;AAtEG,gBAAgB;AACO,qCAAY,GAAG,mEAAmE,CAAC"}
1
+ {"version":3,"file":"clientServiceAccountRole.js","sourceRoot":"","sources":["../../openid/clientServiceAccountRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAqDG;AACH,MAAa,wBAAyB,SAAQ,MAAM,CAAC,cAAc;IAC/D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAqC,EAAE,IAAmC;QACnI,OAAO,IAAI,wBAAwB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC/E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,wBAAwB,CAAC,YAAY,CAAC;IACzE,CAAC;IA2BD,YAAY,IAAY,EAAE,WAA0E,EAAE,IAAmC;QACrI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAwD,CAAC;YACvE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3F;aAAM;YACH,MAAM,IAAI,GAAG,WAAuD,CAAC;YACrE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,oBAAoB,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjE,MAAM,IAAI,KAAK,CAAC,kDAAkD,CAAC,CAAC;aACvE;YACD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;SACzF;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,wBAAwB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC7E,CAAC;;AAnFL,4DAoFC;AAtEG,gBAAgB;AACO,qCAAY,GAAG,mEAAmE,CAAC"}
@@ -12,47 +12,49 @@ import * as pulumi from "@pulumi/pulumi";
12
12
  *
13
13
  * ### Example Usage (Client)
14
14
  *
15
- * <!--Start PulumiCodeChooser -->
16
15
  * ```typescript
17
16
  * import * as pulumi from "@pulumi/pulumi";
18
17
  * import * as keycloak from "@pulumi/keycloak";
19
18
  *
20
19
  * const realm = new keycloak.Realm("realm", {
21
- * enabled: true,
22
20
  * realm: "my-realm",
21
+ * enabled: true,
23
22
  * });
24
- * const openidClient = new keycloak.openid.Client("openidClient", {
25
- * accessType: "CONFIDENTIAL",
23
+ * const openidClient = new keycloak.openid.Client("openid_client", {
24
+ * realmId: realm.id,
26
25
  * clientId: "test-client",
26
+ * name: "test client",
27
27
  * enabled: true,
28
- * realmId: realm.id,
28
+ * accessType: "CONFIDENTIAL",
29
29
  * validRedirectUris: ["http://localhost:8080/openid-callback"],
30
30
  * });
31
- * const fullNameMapper = new keycloak.openid.FullNameProtocolMapper("fullNameMapper", {
32
- * clientId: openidClient.id,
31
+ * const fullNameMapper = new keycloak.openid.FullNameProtocolMapper("full_name_mapper", {
33
32
  * realmId: realm.id,
33
+ * clientId: openidClient.id,
34
+ * name: "full-name-mapper",
34
35
  * });
35
36
  * ```
36
- * <!--End PulumiCodeChooser -->
37
37
  *
38
38
  * ### Example Usage (Client Scope)
39
39
  *
40
- * <!--Start PulumiCodeChooser -->
41
40
  * ```typescript
42
41
  * import * as pulumi from "@pulumi/pulumi";
43
42
  * import * as keycloak from "@pulumi/keycloak";
44
43
  *
45
44
  * const realm = new keycloak.Realm("realm", {
46
- * enabled: true,
47
45
  * realm: "my-realm",
46
+ * enabled: true,
48
47
  * });
49
- * const clientScope = new keycloak.openid.ClientScope("clientScope", {realmId: realm.id});
50
- * const fullNameMapper = new keycloak.openid.FullNameProtocolMapper("fullNameMapper", {
51
- * clientScopeId: clientScope.id,
48
+ * const clientScope = new keycloak.openid.ClientScope("client_scope", {
52
49
  * realmId: realm.id,
50
+ * name: "test-client-scope",
51
+ * });
52
+ * const fullNameMapper = new keycloak.openid.FullNameProtocolMapper("full_name_mapper", {
53
+ * realmId: realm.id,
54
+ * clientScopeId: clientScope.id,
55
+ * name: "full-name-mapper",
53
56
  * });
54
57
  * ```
55
- * <!--End PulumiCodeChooser -->
56
58
  *
57
59
  * ### Argument Reference
58
60
  *
@@ -18,47 +18,49 @@ const utilities = require("../utilities");
18
18
  *
19
19
  * ### Example Usage (Client)
20
20
  *
21
- * <!--Start PulumiCodeChooser -->
22
21
  * ```typescript
23
22
  * import * as pulumi from "@pulumi/pulumi";
24
23
  * import * as keycloak from "@pulumi/keycloak";
25
24
  *
26
25
  * const realm = new keycloak.Realm("realm", {
27
- * enabled: true,
28
26
  * realm: "my-realm",
27
+ * enabled: true,
29
28
  * });
30
- * const openidClient = new keycloak.openid.Client("openidClient", {
31
- * accessType: "CONFIDENTIAL",
29
+ * const openidClient = new keycloak.openid.Client("openid_client", {
30
+ * realmId: realm.id,
32
31
  * clientId: "test-client",
32
+ * name: "test client",
33
33
  * enabled: true,
34
- * realmId: realm.id,
34
+ * accessType: "CONFIDENTIAL",
35
35
  * validRedirectUris: ["http://localhost:8080/openid-callback"],
36
36
  * });
37
- * const fullNameMapper = new keycloak.openid.FullNameProtocolMapper("fullNameMapper", {
38
- * clientId: openidClient.id,
37
+ * const fullNameMapper = new keycloak.openid.FullNameProtocolMapper("full_name_mapper", {
39
38
  * realmId: realm.id,
39
+ * clientId: openidClient.id,
40
+ * name: "full-name-mapper",
40
41
  * });
41
42
  * ```
42
- * <!--End PulumiCodeChooser -->
43
43
  *
44
44
  * ### Example Usage (Client Scope)
45
45
  *
46
- * <!--Start PulumiCodeChooser -->
47
46
  * ```typescript
48
47
  * import * as pulumi from "@pulumi/pulumi";
49
48
  * import * as keycloak from "@pulumi/keycloak";
50
49
  *
51
50
  * const realm = new keycloak.Realm("realm", {
52
- * enabled: true,
53
51
  * realm: "my-realm",
52
+ * enabled: true,
54
53
  * });
55
- * const clientScope = new keycloak.openid.ClientScope("clientScope", {realmId: realm.id});
56
- * const fullNameMapper = new keycloak.openid.FullNameProtocolMapper("fullNameMapper", {
57
- * clientScopeId: clientScope.id,
54
+ * const clientScope = new keycloak.openid.ClientScope("client_scope", {
58
55
  * realmId: realm.id,
56
+ * name: "test-client-scope",
57
+ * });
58
+ * const fullNameMapper = new keycloak.openid.FullNameProtocolMapper("full_name_mapper", {
59
+ * realmId: realm.id,
60
+ * clientScopeId: clientScope.id,
61
+ * name: "full-name-mapper",
59
62
  * });
60
63
  * ```
61
- * <!--End PulumiCodeChooser -->
62
64
  *
63
65
  * ### Argument Reference
64
66
  *
@@ -1 +1 @@
1
- {"version":3,"file":"fullNameProtocolMapper.js","sourceRoot":"","sources":["../../openid/fullNameProtocolMapper.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA0EG;AACH,MAAa,sBAAuB,SAAQ,MAAM,CAAC,cAAc;IAC7D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAmC,EAAE,IAAmC;QACjI,OAAO,IAAI,sBAAsB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC7E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,sBAAsB,CAAC,YAAY,CAAC;IACvE,CAAC;IA8BD,YAAY,IAAY,EAAE,WAAsE,EAAE,IAAmC;QACjI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAsD,CAAC;YACrE,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;SACjE;aAAM;YACH,MAAM,IAAI,GAAG,WAAqD,CAAC;YACnE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,sBAAsB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC3E,CAAC;;AAnFL,wDAoFC;AAtEG,gBAAgB;AACO,mCAAY,GAAG,+DAA+D,CAAC"}
1
+ {"version":3,"file":"fullNameProtocolMapper.js","sourceRoot":"","sources":["../../openid/fullNameProtocolMapper.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA4EG;AACH,MAAa,sBAAuB,SAAQ,MAAM,CAAC,cAAc;IAC7D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAmC,EAAE,IAAmC;QACjI,OAAO,IAAI,sBAAsB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC7E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,sBAAsB,CAAC,YAAY,CAAC;IACvE,CAAC;IA8BD,YAAY,IAAY,EAAE,WAAsE,EAAE,IAAmC;QACjI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAsD,CAAC;YACrE,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;SACjE;aAAM;YACH,MAAM,IAAI,GAAG,WAAqD,CAAC;YACnE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,sBAAsB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC3E,CAAC;;AAnFL,wDAoFC;AAtEG,gBAAgB;AACO,mCAAY,GAAG,+DAA+D,CAAC"}
@@ -7,7 +7,6 @@ import * as outputs from "../types/output";
7
7
  *
8
8
  * ### Example Usage
9
9
  *
10
- * <!--Start PulumiCodeChooser -->
11
10
  * ```typescript
12
11
  * import * as pulumi from "@pulumi/pulumi";
13
12
  * import * as keycloak from "@pulumi/keycloak";
@@ -16,13 +15,13 @@ import * as outputs from "../types/output";
16
15
  * realmId: "my-realm",
17
16
  * clientId: "realm-management",
18
17
  * });
18
+ * // use the data source
19
19
  * const admin = realmManagement.then(realmManagement => keycloak.getRole({
20
20
  * realmId: "my-realm",
21
21
  * clientId: realmManagement.id,
22
22
  * name: "realm-admin",
23
23
  * }));
24
24
  * ```
25
- * <!--End PulumiCodeChooser -->
26
25
  *
27
26
  * ### Argument Reference
28
27
  *
@@ -114,7 +113,6 @@ export interface GetClientResult {
114
113
  *
115
114
  * ### Example Usage
116
115
  *
117
- * <!--Start PulumiCodeChooser -->
118
116
  * ```typescript
119
117
  * import * as pulumi from "@pulumi/pulumi";
120
118
  * import * as keycloak from "@pulumi/keycloak";
@@ -123,13 +121,13 @@ export interface GetClientResult {
123
121
  * realmId: "my-realm",
124
122
  * clientId: "realm-management",
125
123
  * });
124
+ * // use the data source
126
125
  * const admin = realmManagement.then(realmManagement => keycloak.getRole({
127
126
  * realmId: "my-realm",
128
127
  * clientId: realmManagement.id,
129
128
  * name: "realm-admin",
130
129
  * }));
131
130
  * ```
132
- * <!--End PulumiCodeChooser -->
133
131
  *
134
132
  * ### Argument Reference
135
133
  *
@@ -12,7 +12,6 @@ const utilities = require("../utilities");
12
12
  *
13
13
  * ### Example Usage
14
14
  *
15
- * <!--Start PulumiCodeChooser -->
16
15
  * ```typescript
17
16
  * import * as pulumi from "@pulumi/pulumi";
18
17
  * import * as keycloak from "@pulumi/keycloak";
@@ -21,13 +20,13 @@ const utilities = require("../utilities");
21
20
  * realmId: "my-realm",
22
21
  * clientId: "realm-management",
23
22
  * });
23
+ * // use the data source
24
24
  * const admin = realmManagement.then(realmManagement => keycloak.getRole({
25
25
  * realmId: "my-realm",
26
26
  * clientId: realmManagement.id,
27
27
  * name: "realm-admin",
28
28
  * }));
29
29
  * ```
30
- * <!--End PulumiCodeChooser -->
31
30
  *
32
31
  * ### Argument Reference
33
32
  *
@@ -61,7 +60,6 @@ exports.getClient = getClient;
61
60
  *
62
61
  * ### Example Usage
63
62
  *
64
- * <!--Start PulumiCodeChooser -->
65
63
  * ```typescript
66
64
  * import * as pulumi from "@pulumi/pulumi";
67
65
  * import * as keycloak from "@pulumi/keycloak";
@@ -70,13 +68,13 @@ exports.getClient = getClient;
70
68
  * realmId: "my-realm",
71
69
  * clientId: "realm-management",
72
70
  * });
71
+ * // use the data source
73
72
  * const admin = realmManagement.then(realmManagement => keycloak.getRole({
74
73
  * realmId: "my-realm",
75
74
  * clientId: realmManagement.id,
76
75
  * name: "realm-admin",
77
76
  * }));
78
77
  * ```
79
- * <!--End PulumiCodeChooser -->
80
78
  *
81
79
  * ### Argument Reference
82
80
  *
@@ -1 +1 @@
1
- {"version":3,"file":"getClient.js","sourceRoot":"","sources":["../../openid/getClient.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAkCG;AACH,SAAgB,SAAS,CAAC,IAAmB,EAAE,IAA2B;IAEtE,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,qCAAqC,EAAE;QAChE,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,mBAAmB,EAAE,IAAI,CAAC,iBAAiB;QAC3C,wBAAwB,EAAE,IAAI,CAAC,sBAAsB;QACrD,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,uCAAuC,EAAE,IAAI,CAAC,qCAAqC;QACnF,0BAA0B,EAAE,IAAI,CAAC,wBAAwB;QACzD,6BAA6B,EAAE,IAAI,CAAC,2BAA2B;QAC/D,SAAS,EAAE,IAAI,CAAC,OAAO;KAC1B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAbD,8BAaC;AAsED;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAkCG;AACH,SAAgB,eAAe,CAAC,IAAyB,EAAE,IAA2B;IAClF,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAM,EAAE,EAAE,CAAC,SAAS,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACpE,CAAC;AAFD,0CAEC"}
1
+ {"version":3,"file":"getClient.js","sourceRoot":"","sources":["../../openid/getClient.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAiCG;AACH,SAAgB,SAAS,CAAC,IAAmB,EAAE,IAA2B;IAEtE,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,qCAAqC,EAAE;QAChE,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,mBAAmB,EAAE,IAAI,CAAC,iBAAiB;QAC3C,wBAAwB,EAAE,IAAI,CAAC,sBAAsB;QACrD,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,uCAAuC,EAAE,IAAI,CAAC,qCAAqC;QACnF,0BAA0B,EAAE,IAAI,CAAC,wBAAwB;QACzD,6BAA6B,EAAE,IAAI,CAAC,2BAA2B;QAC/D,SAAS,EAAE,IAAI,CAAC,OAAO;KAC1B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAbD,8BAaC;AAsED;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAiCG;AACH,SAAgB,eAAe,CAAC,IAAyB,EAAE,IAA2B;IAClF,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAM,EAAE,EAAE,CAAC,SAAS,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACpE,CAAC;AAFD,0CAEC"}
@@ -8,7 +8,6 @@ import * as pulumi from "@pulumi/pulumi";
8
8
  * permission for this client called "Default Permission". We'll use the `keycloak.openid.getClientAuthorizationPolicy` data
9
9
  * source to fetch information about this permission, so we can use it to create a new resource-based authorization permission.
10
10
  *
11
- * <!--Start PulumiCodeChooser -->
12
11
  * ```typescript
13
12
  * import * as pulumi from "@pulumi/pulumi";
14
13
  * import * as keycloak from "@pulumi/keycloak";
@@ -17,8 +16,9 @@ import * as pulumi from "@pulumi/pulumi";
17
16
  * realm: "my-realm",
18
17
  * enabled: true,
19
18
  * });
20
- * const clientWithAuthz = new keycloak.openid.Client("clientWithAuthz", {
19
+ * const clientWithAuthz = new keycloak.openid.Client("client_with_authz", {
21
20
  * clientId: "client-with-authz",
21
+ * name: "client-with-authz",
22
22
  * realmId: realm.id,
23
23
  * accessType: "CONFIDENTIAL",
24
24
  * serviceAccountsEnabled: true,
@@ -33,6 +33,7 @@ import * as pulumi from "@pulumi/pulumi";
33
33
  * });
34
34
  * const resource = new keycloak.openid.ClientAuthorizationResource("resource", {
35
35
  * resourceServerId: clientWithAuthz.resourceServerId,
36
+ * name: "authorization-resource",
36
37
  * realmId: realm.id,
37
38
  * uris: ["/endpoint/*"],
38
39
  * attributes: {
@@ -42,11 +43,11 @@ import * as pulumi from "@pulumi/pulumi";
42
43
  * const permission = new keycloak.openid.ClientAuthorizationPermission("permission", {
43
44
  * resourceServerId: clientWithAuthz.resourceServerId,
44
45
  * realmId: realm.id,
46
+ * name: "authorization-permission",
45
47
  * policies: [defaultPermission.apply(defaultPermission => defaultPermission.id)],
46
48
  * resources: [resource.id],
47
49
  * });
48
50
  * ```
49
- * <!--End PulumiCodeChooser -->
50
51
  */
51
52
  export declare function getClientAuthorizationPolicy(args: GetClientAuthorizationPolicyArgs, opts?: pulumi.InvokeOptions): Promise<GetClientAuthorizationPolicyResult>;
52
53
  /**
@@ -115,7 +116,6 @@ export interface GetClientAuthorizationPolicyResult {
115
116
  * permission for this client called "Default Permission". We'll use the `keycloak.openid.getClientAuthorizationPolicy` data
116
117
  * source to fetch information about this permission, so we can use it to create a new resource-based authorization permission.
117
118
  *
118
- * <!--Start PulumiCodeChooser -->
119
119
  * ```typescript
120
120
  * import * as pulumi from "@pulumi/pulumi";
121
121
  * import * as keycloak from "@pulumi/keycloak";
@@ -124,8 +124,9 @@ export interface GetClientAuthorizationPolicyResult {
124
124
  * realm: "my-realm",
125
125
  * enabled: true,
126
126
  * });
127
- * const clientWithAuthz = new keycloak.openid.Client("clientWithAuthz", {
127
+ * const clientWithAuthz = new keycloak.openid.Client("client_with_authz", {
128
128
  * clientId: "client-with-authz",
129
+ * name: "client-with-authz",
129
130
  * realmId: realm.id,
130
131
  * accessType: "CONFIDENTIAL",
131
132
  * serviceAccountsEnabled: true,
@@ -140,6 +141,7 @@ export interface GetClientAuthorizationPolicyResult {
140
141
  * });
141
142
  * const resource = new keycloak.openid.ClientAuthorizationResource("resource", {
142
143
  * resourceServerId: clientWithAuthz.resourceServerId,
144
+ * name: "authorization-resource",
143
145
  * realmId: realm.id,
144
146
  * uris: ["/endpoint/*"],
145
147
  * attributes: {
@@ -149,11 +151,11 @@ export interface GetClientAuthorizationPolicyResult {
149
151
  * const permission = new keycloak.openid.ClientAuthorizationPermission("permission", {
150
152
  * resourceServerId: clientWithAuthz.resourceServerId,
151
153
  * realmId: realm.id,
154
+ * name: "authorization-permission",
152
155
  * policies: [defaultPermission.apply(defaultPermission => defaultPermission.id)],
153
156
  * resources: [resource.id],
154
157
  * });
155
158
  * ```
156
- * <!--End PulumiCodeChooser -->
157
159
  */
158
160
  export declare function getClientAuthorizationPolicyOutput(args: GetClientAuthorizationPolicyOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output<GetClientAuthorizationPolicyResult>;
159
161
  /**
@@ -14,7 +14,6 @@ const utilities = require("../utilities");
14
14
  * permission for this client called "Default Permission". We'll use the `keycloak.openid.getClientAuthorizationPolicy` data
15
15
  * source to fetch information about this permission, so we can use it to create a new resource-based authorization permission.
16
16
  *
17
- * <!--Start PulumiCodeChooser -->
18
17
  * ```typescript
19
18
  * import * as pulumi from "@pulumi/pulumi";
20
19
  * import * as keycloak from "@pulumi/keycloak";
@@ -23,8 +22,9 @@ const utilities = require("../utilities");
23
22
  * realm: "my-realm",
24
23
  * enabled: true,
25
24
  * });
26
- * const clientWithAuthz = new keycloak.openid.Client("clientWithAuthz", {
25
+ * const clientWithAuthz = new keycloak.openid.Client("client_with_authz", {
27
26
  * clientId: "client-with-authz",
27
+ * name: "client-with-authz",
28
28
  * realmId: realm.id,
29
29
  * accessType: "CONFIDENTIAL",
30
30
  * serviceAccountsEnabled: true,
@@ -39,6 +39,7 @@ const utilities = require("../utilities");
39
39
  * });
40
40
  * const resource = new keycloak.openid.ClientAuthorizationResource("resource", {
41
41
  * resourceServerId: clientWithAuthz.resourceServerId,
42
+ * name: "authorization-resource",
42
43
  * realmId: realm.id,
43
44
  * uris: ["/endpoint/*"],
44
45
  * attributes: {
@@ -48,11 +49,11 @@ const utilities = require("../utilities");
48
49
  * const permission = new keycloak.openid.ClientAuthorizationPermission("permission", {
49
50
  * resourceServerId: clientWithAuthz.resourceServerId,
50
51
  * realmId: realm.id,
52
+ * name: "authorization-permission",
51
53
  * policies: [defaultPermission.apply(defaultPermission => defaultPermission.id)],
52
54
  * resources: [resource.id],
53
55
  * });
54
56
  * ```
55
- * <!--End PulumiCodeChooser -->
56
57
  */
57
58
  function getClientAuthorizationPolicy(args, opts) {
58
59
  opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
@@ -72,7 +73,6 @@ exports.getClientAuthorizationPolicy = getClientAuthorizationPolicy;
72
73
  * permission for this client called "Default Permission". We'll use the `keycloak.openid.getClientAuthorizationPolicy` data
73
74
  * source to fetch information about this permission, so we can use it to create a new resource-based authorization permission.
74
75
  *
75
- * <!--Start PulumiCodeChooser -->
76
76
  * ```typescript
77
77
  * import * as pulumi from "@pulumi/pulumi";
78
78
  * import * as keycloak from "@pulumi/keycloak";
@@ -81,8 +81,9 @@ exports.getClientAuthorizationPolicy = getClientAuthorizationPolicy;
81
81
  * realm: "my-realm",
82
82
  * enabled: true,
83
83
  * });
84
- * const clientWithAuthz = new keycloak.openid.Client("clientWithAuthz", {
84
+ * const clientWithAuthz = new keycloak.openid.Client("client_with_authz", {
85
85
  * clientId: "client-with-authz",
86
+ * name: "client-with-authz",
86
87
  * realmId: realm.id,
87
88
  * accessType: "CONFIDENTIAL",
88
89
  * serviceAccountsEnabled: true,
@@ -97,6 +98,7 @@ exports.getClientAuthorizationPolicy = getClientAuthorizationPolicy;
97
98
  * });
98
99
  * const resource = new keycloak.openid.ClientAuthorizationResource("resource", {
99
100
  * resourceServerId: clientWithAuthz.resourceServerId,
101
+ * name: "authorization-resource",
100
102
  * realmId: realm.id,
101
103
  * uris: ["/endpoint/*"],
102
104
  * attributes: {
@@ -106,11 +108,11 @@ exports.getClientAuthorizationPolicy = getClientAuthorizationPolicy;
106
108
  * const permission = new keycloak.openid.ClientAuthorizationPermission("permission", {
107
109
  * resourceServerId: clientWithAuthz.resourceServerId,
108
110
  * realmId: realm.id,
111
+ * name: "authorization-permission",
109
112
  * policies: [defaultPermission.apply(defaultPermission => defaultPermission.id)],
110
113
  * resources: [resource.id],
111
114
  * });
112
115
  * ```
113
- * <!--End PulumiCodeChooser -->
114
116
  */
115
117
  function getClientAuthorizationPolicyOutput(args, opts) {
116
118
  return pulumi.output(args).apply((a) => getClientAuthorizationPolicy(a, opts));
@@ -1 +1 @@
1
- {"version":3,"file":"getClientAuthorizationPolicy.js","sourceRoot":"","sources":["../../openid/getClientAuthorizationPolicy.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAgDG;AACH,SAAgB,4BAA4B,CAAC,IAAsC,EAAE,IAA2B;IAE5G,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,2EAA2E,EAAE;QACtG,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,kBAAkB,EAAE,IAAI,CAAC,gBAAgB;KAC5C,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AARD,oEAQC;AA4DD;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAgDG;AACH,SAAgB,kCAAkC,CAAC,IAA4C,EAAE,IAA2B;IACxH,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAM,EAAE,EAAE,CAAC,4BAA4B,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACvF,CAAC;AAFD,gFAEC"}
1
+ {"version":3,"file":"getClientAuthorizationPolicy.js","sourceRoot":"","sources":["../../openid/getClientAuthorizationPolicy.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAiDG;AACH,SAAgB,4BAA4B,CAAC,IAAsC,EAAE,IAA2B;IAE5G,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,2EAA2E,EAAE;QACtG,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,kBAAkB,EAAE,IAAI,CAAC,gBAAgB;KAC5C,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AARD,oEAQC;AA4DD;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAiDG;AACH,SAAgB,kCAAkC,CAAC,IAA4C,EAAE,IAA2B;IACxH,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAM,EAAE,EAAE,CAAC,4BAA4B,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACvF,CAAC;AAFD,gFAEC"}
@@ -4,7 +4,6 @@ import * as pulumi from "@pulumi/pulumi";
4
4
  *
5
5
  * ## Example Usage
6
6
  *
7
- * <!--Start PulumiCodeChooser -->
8
7
  * ```typescript
9
8
  * import * as pulumi from "@pulumi/pulumi";
10
9
  * import * as keycloak from "@pulumi/keycloak";
@@ -14,13 +13,13 @@ import * as pulumi from "@pulumi/pulumi";
14
13
  * name: "offline_access",
15
14
  * });
16
15
  * // use the data source
17
- * const audienceMapper = new keycloak.openid.AudienceProtocolMapper("audienceMapper", {
16
+ * const audienceMapper = new keycloak.openid.AudienceProtocolMapper("audience_mapper", {
18
17
  * realmId: offlineAccess.then(offlineAccess => offlineAccess.realmId),
19
18
  * clientScopeId: offlineAccess.then(offlineAccess => offlineAccess.id),
19
+ * name: "audience-mapper",
20
20
  * includedCustomAudience: "foo",
21
21
  * });
22
22
  * ```
23
- * <!--End PulumiCodeChooser -->
24
23
  */
25
24
  export declare function getClientScope(args: GetClientScopeArgs, opts?: pulumi.InvokeOptions): Promise<GetClientScopeResult>;
26
25
  /**
@@ -56,7 +55,6 @@ export interface GetClientScopeResult {
56
55
  *
57
56
  * ## Example Usage
58
57
  *
59
- * <!--Start PulumiCodeChooser -->
60
58
  * ```typescript
61
59
  * import * as pulumi from "@pulumi/pulumi";
62
60
  * import * as keycloak from "@pulumi/keycloak";
@@ -66,13 +64,13 @@ export interface GetClientScopeResult {
66
64
  * name: "offline_access",
67
65
  * });
68
66
  * // use the data source
69
- * const audienceMapper = new keycloak.openid.AudienceProtocolMapper("audienceMapper", {
67
+ * const audienceMapper = new keycloak.openid.AudienceProtocolMapper("audience_mapper", {
70
68
  * realmId: offlineAccess.then(offlineAccess => offlineAccess.realmId),
71
69
  * clientScopeId: offlineAccess.then(offlineAccess => offlineAccess.id),
70
+ * name: "audience-mapper",
72
71
  * includedCustomAudience: "foo",
73
72
  * });
74
73
  * ```
75
- * <!--End PulumiCodeChooser -->
76
74
  */
77
75
  export declare function getClientScopeOutput(args: GetClientScopeOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output<GetClientScopeResult>;
78
76
  /**
@@ -10,7 +10,6 @@ const utilities = require("../utilities");
10
10
  *
11
11
  * ## Example Usage
12
12
  *
13
- * <!--Start PulumiCodeChooser -->
14
13
  * ```typescript
15
14
  * import * as pulumi from "@pulumi/pulumi";
16
15
  * import * as keycloak from "@pulumi/keycloak";
@@ -20,13 +19,13 @@ const utilities = require("../utilities");
20
19
  * name: "offline_access",
21
20
  * });
22
21
  * // use the data source
23
- * const audienceMapper = new keycloak.openid.AudienceProtocolMapper("audienceMapper", {
22
+ * const audienceMapper = new keycloak.openid.AudienceProtocolMapper("audience_mapper", {
24
23
  * realmId: offlineAccess.then(offlineAccess => offlineAccess.realmId),
25
24
  * clientScopeId: offlineAccess.then(offlineAccess => offlineAccess.id),
25
+ * name: "audience-mapper",
26
26
  * includedCustomAudience: "foo",
27
27
  * });
28
28
  * ```
29
- * <!--End PulumiCodeChooser -->
30
29
  */
31
30
  function getClientScope(args, opts) {
32
31
  opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
@@ -41,7 +40,6 @@ exports.getClientScope = getClientScope;
41
40
  *
42
41
  * ## Example Usage
43
42
  *
44
- * <!--Start PulumiCodeChooser -->
45
43
  * ```typescript
46
44
  * import * as pulumi from "@pulumi/pulumi";
47
45
  * import * as keycloak from "@pulumi/keycloak";
@@ -51,13 +49,13 @@ exports.getClientScope = getClientScope;
51
49
  * name: "offline_access",
52
50
  * });
53
51
  * // use the data source
54
- * const audienceMapper = new keycloak.openid.AudienceProtocolMapper("audienceMapper", {
52
+ * const audienceMapper = new keycloak.openid.AudienceProtocolMapper("audience_mapper", {
55
53
  * realmId: offlineAccess.then(offlineAccess => offlineAccess.realmId),
56
54
  * clientScopeId: offlineAccess.then(offlineAccess => offlineAccess.id),
55
+ * name: "audience-mapper",
57
56
  * includedCustomAudience: "foo",
58
57
  * });
59
58
  * ```
60
- * <!--End PulumiCodeChooser -->
61
59
  */
62
60
  function getClientScopeOutput(args, opts) {
63
61
  return pulumi.output(args).apply((a) => getClientScope(a, opts));
@@ -1 +1 @@
1
- {"version":3,"file":"getClientScope.js","sourceRoot":"","sources":["../../openid/getClientScope.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;GAsBG;AACH,SAAgB,cAAc,CAAC,IAAwB,EAAE,IAA2B;IAEhF,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,+CAA+C,EAAE;QAC1E,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,SAAS,EAAE,IAAI,CAAC,OAAO;KAC1B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAPD,wCAOC;AA+BD;;;;;;;;;;;;;;;;;;;;;;GAsBG;AACH,SAAgB,oBAAoB,CAAC,IAA8B,EAAE,IAA2B;IAC5F,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAM,EAAE,EAAE,CAAC,cAAc,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACzE,CAAC;AAFD,oDAEC"}
1
+ {"version":3,"file":"getClientScope.js","sourceRoot":"","sources":["../../openid/getClientScope.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;GAqBG;AACH,SAAgB,cAAc,CAAC,IAAwB,EAAE,IAA2B;IAEhF,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,+CAA+C,EAAE;QAC1E,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,SAAS,EAAE,IAAI,CAAC,OAAO;KAC1B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAPD,wCAOC;AA+BD;;;;;;;;;;;;;;;;;;;;;GAqBG;AACH,SAAgB,oBAAoB,CAAC,IAA8B,EAAE,IAA2B;IAC5F,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAM,EAAE,EAAE,CAAC,cAAc,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACzE,CAAC;AAFD,oDAEC"}