@pulumi/mongodbatlas 3.16.0-alpha.1718171600 → 3.16.0-alpha.1718212141
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/databaseUser.d.ts +6 -3
- package/databaseUser.js.map +1 -1
- package/federatedSettingsIdentityProvider.d.ts +33 -3
- package/federatedSettingsIdentityProvider.js +8 -2
- package/federatedSettingsIdentityProvider.js.map +1 -1
- package/federatedSettingsOrgConfig.d.ts +35 -6
- package/federatedSettingsOrgConfig.js +6 -4
- package/federatedSettingsOrgConfig.js.map +1 -1
- package/getControlPlaneIpAddresses.d.ts +57 -0
- package/getControlPlaneIpAddresses.js +53 -0
- package/getControlPlaneIpAddresses.js.map +1 -0
- package/getDatabaseUser.d.ts +2 -1
- package/getDatabaseUser.js.map +1 -1
- package/getFederatedSettingsIdentityProvider.d.ts +14 -2
- package/getFederatedSettingsIdentityProvider.js.map +1 -1
- package/getFederatedSettingsIdentityProviders.d.ts +18 -0
- package/getFederatedSettingsIdentityProviders.js +2 -0
- package/getFederatedSettingsIdentityProviders.js.map +1 -1
- package/getFederatedSettingsOrgConfig.d.ts +21 -5
- package/getFederatedSettingsOrgConfig.js +8 -4
- package/getFederatedSettingsOrgConfig.js.map +1 -1
- package/getFederatedSettingsOrgConfigs.d.ts +8 -4
- package/getFederatedSettingsOrgConfigs.js +8 -4
- package/getFederatedSettingsOrgConfigs.js.map +1 -1
- package/getPrivatelinkEndpointsServiceServerless.d.ts +0 -24
- package/getPrivatelinkEndpointsServiceServerless.js +0 -2
- package/getPrivatelinkEndpointsServiceServerless.js.map +1 -1
- package/index.d.ts +3 -0
- package/index.js +7 -4
- package/index.js.map +1 -1
- package/package.json +2 -2
- package/types/input.d.ts +22 -0
- package/types/output.d.ts +90 -3
package/types/output.d.ts
CHANGED
|
@@ -1134,6 +1134,28 @@ export interface FederatedDatabaseInstanceStorageStoreReadPreferenceTagSetTag {
|
|
|
1134
1134
|
name: string;
|
|
1135
1135
|
value: string;
|
|
1136
1136
|
}
|
|
1137
|
+
export interface FederatedSettingsOrgConfigUserConflict {
|
|
1138
|
+
/**
|
|
1139
|
+
* Email address of the the user that conflicts with selected domains.
|
|
1140
|
+
*/
|
|
1141
|
+
emailAddress: string;
|
|
1142
|
+
/**
|
|
1143
|
+
* Unique 24-hexadecimal digit string that identifies the federated authentication configuration.
|
|
1144
|
+
*/
|
|
1145
|
+
federationSettingsId: string;
|
|
1146
|
+
/**
|
|
1147
|
+
* First name of the the user that conflicts with selected domains.
|
|
1148
|
+
*/
|
|
1149
|
+
firstName: string;
|
|
1150
|
+
/**
|
|
1151
|
+
* Last name of the the user that conflicts with selected domains.
|
|
1152
|
+
*/
|
|
1153
|
+
lastName: string;
|
|
1154
|
+
/**
|
|
1155
|
+
* Name of the Atlas user that conflicts with selected domains.
|
|
1156
|
+
*/
|
|
1157
|
+
userId: string;
|
|
1158
|
+
}
|
|
1137
1159
|
export interface FederatedSettingsOrgRoleMappingRoleAssignment {
|
|
1138
1160
|
/**
|
|
1139
1161
|
* Unique identifier of the project to which you want the role mapping to apply.
|
|
@@ -3436,6 +3458,46 @@ export interface GetClustersResultTag {
|
|
|
3436
3458
|
*/
|
|
3437
3459
|
value: string;
|
|
3438
3460
|
}
|
|
3461
|
+
export interface GetControlPlaneIpAddressesInbound {
|
|
3462
|
+
/**
|
|
3463
|
+
* Control plane IP addresses in AWS. Each key identifies an Amazon Web Services (AWS) region. Each value identifies control plane IP addresses in the AWS region.
|
|
3464
|
+
*/
|
|
3465
|
+
aws: {
|
|
3466
|
+
[key: string]: string[];
|
|
3467
|
+
};
|
|
3468
|
+
/**
|
|
3469
|
+
* Control plane IP addresses in Azure. Each key identifies an Azure region. Each value identifies control plane IP addresses in the Azure region.
|
|
3470
|
+
*/
|
|
3471
|
+
azure: {
|
|
3472
|
+
[key: string]: string[];
|
|
3473
|
+
};
|
|
3474
|
+
/**
|
|
3475
|
+
* Control plane IP addresses in GCP. Each key identifies a Google Cloud (GCP) region. Each value identifies control plane IP addresses in the GCP region.
|
|
3476
|
+
*/
|
|
3477
|
+
gcp: {
|
|
3478
|
+
[key: string]: string[];
|
|
3479
|
+
};
|
|
3480
|
+
}
|
|
3481
|
+
export interface GetControlPlaneIpAddressesOutbound {
|
|
3482
|
+
/**
|
|
3483
|
+
* Control plane IP addresses in AWS. Each key identifies an Amazon Web Services (AWS) region. Each value identifies control plane IP addresses in the AWS region.
|
|
3484
|
+
*/
|
|
3485
|
+
aws: {
|
|
3486
|
+
[key: string]: string[];
|
|
3487
|
+
};
|
|
3488
|
+
/**
|
|
3489
|
+
* Control plane IP addresses in Azure. Each key identifies an Azure region. Each value identifies control plane IP addresses in the Azure region.
|
|
3490
|
+
*/
|
|
3491
|
+
azure: {
|
|
3492
|
+
[key: string]: string[];
|
|
3493
|
+
};
|
|
3494
|
+
/**
|
|
3495
|
+
* Control plane IP addresses in GCP. Each key identifies a Google Cloud (GCP) region. Each value identifies control plane IP addresses in the GCP region.
|
|
3496
|
+
*/
|
|
3497
|
+
gcp: {
|
|
3498
|
+
[key: string]: string[];
|
|
3499
|
+
};
|
|
3500
|
+
}
|
|
3439
3501
|
export interface GetCustomDbRoleAction {
|
|
3440
3502
|
/**
|
|
3441
3503
|
* (Required) Name of the privilege action. For a complete list of actions available in the Atlas API, see Custom Role Actions.
|
|
@@ -3786,7 +3848,8 @@ export interface GetDatabaseUsersResult {
|
|
|
3786
3848
|
/**
|
|
3787
3849
|
* (Optional) Human-readable label that indicates whether the new database user authenticates with OIDC (OpenID Connect) federated authentication. If no value is given, Atlas uses the default value of `NONE`. The accepted types are:
|
|
3788
3850
|
* * `NONE` - The user does not use OIDC federated authentication.
|
|
3789
|
-
* * `IDP_GROUP` -
|
|
3851
|
+
* * `IDP_GROUP` - OIDC Workforce federated authentication group. To learn more about OIDC federated authentication, see [Set up Workforce Identity Federation with OIDC](https://www.mongodb.com/docs/atlas/security-oidc/).
|
|
3852
|
+
* * `USER` - OIDC Workload federated authentication user. To learn more about OIDC federated authentication, see [Set up Workload Identity Federation with OIDC](https://www.mongodb.com/docs/atlas/security-oidc/).
|
|
3790
3853
|
*/
|
|
3791
3854
|
oidcAuthType: string;
|
|
3792
3855
|
/**
|
|
@@ -4359,15 +4422,23 @@ export interface GetFederatedSettingsIdentityProvidersResult {
|
|
|
4359
4422
|
/**
|
|
4360
4423
|
* Identifier of the intended recipient of the token.
|
|
4361
4424
|
*/
|
|
4362
|
-
|
|
4425
|
+
audience: string;
|
|
4363
4426
|
/**
|
|
4364
4427
|
* Identifier for the intended audience of the SAML Assertion.
|
|
4365
4428
|
*/
|
|
4366
4429
|
audienceUri: string;
|
|
4430
|
+
/**
|
|
4431
|
+
* Indicates whether authorization is granted based on group membership or user ID. Valid values are `GROUP` or `USER`.
|
|
4432
|
+
*/
|
|
4433
|
+
authorizationType: string;
|
|
4367
4434
|
/**
|
|
4368
4435
|
* Client identifier that is assigned to an application by the Identity Provider.
|
|
4369
4436
|
*/
|
|
4370
4437
|
clientId: string;
|
|
4438
|
+
/**
|
|
4439
|
+
* The description of the identity provider.
|
|
4440
|
+
*/
|
|
4441
|
+
description: string;
|
|
4371
4442
|
/**
|
|
4372
4443
|
* Human-readable label that identifies the IdP.
|
|
4373
4444
|
*/
|
|
@@ -4380,6 +4451,10 @@ export interface GetFederatedSettingsIdentityProvidersResult {
|
|
|
4380
4451
|
* Unique 24-hexadecimal digit string that identifies the IdP.
|
|
4381
4452
|
*/
|
|
4382
4453
|
idpId: string;
|
|
4454
|
+
/**
|
|
4455
|
+
* Type of the identity provider. Valid values are `WORKFORCE` or `WORKLOAD`.
|
|
4456
|
+
*/
|
|
4457
|
+
idpType: string;
|
|
4383
4458
|
/**
|
|
4384
4459
|
* Identifier for the issuer of the SAML Assertion.
|
|
4385
4460
|
*/
|
|
@@ -4565,6 +4640,10 @@ export interface GetFederatedSettingsOrgConfigUserConflict {
|
|
|
4565
4640
|
userId: string;
|
|
4566
4641
|
}
|
|
4567
4642
|
export interface GetFederatedSettingsOrgConfigsResult {
|
|
4643
|
+
/**
|
|
4644
|
+
* The collection of unique ids representing the identity providers that can be used for data access in this organization.
|
|
4645
|
+
*/
|
|
4646
|
+
dataAccessIdentityProviderIds: string[];
|
|
4568
4647
|
/**
|
|
4569
4648
|
* List that contains the approved domains from which organization users can log in.
|
|
4570
4649
|
*/
|
|
@@ -4574,7 +4653,9 @@ export interface GetFederatedSettingsOrgConfigsResult {
|
|
|
4574
4653
|
*/
|
|
4575
4654
|
domainRestrictionEnabled: boolean;
|
|
4576
4655
|
/**
|
|
4577
|
-
*
|
|
4656
|
+
* Legacy 20-hexadecimal digit string that identifies the SAML access identity provider that this connected org config is associated with. This id can be found in two ways:
|
|
4657
|
+
* 1. Within the Federation Management UI in Atlas in the Identity Providers tab by clicking the info icon in the IdP ID row of a configured SAML identity provider
|
|
4658
|
+
* 2. `oktaIdpId` on the `mongodbatlas.FederatedSettingsIdentityProvider` resource
|
|
4578
4659
|
*/
|
|
4579
4660
|
identityProviderId: string;
|
|
4580
4661
|
/**
|
|
@@ -4585,7 +4666,13 @@ export interface GetFederatedSettingsOrgConfigsResult {
|
|
|
4585
4666
|
* List that contains the default roles granted to users who authenticate through the IdP in a connected organization.
|
|
4586
4667
|
*/
|
|
4587
4668
|
postAuthRoleGrants: string[];
|
|
4669
|
+
/**
|
|
4670
|
+
* Role mappings that are configured in this organization. See below
|
|
4671
|
+
*/
|
|
4588
4672
|
roleMappings: outputs.GetFederatedSettingsOrgConfigsResultRoleMapping[];
|
|
4673
|
+
/**
|
|
4674
|
+
* List that contains the users who have an email address that doesn't match any domain on the allowed list. See below
|
|
4675
|
+
*/
|
|
4589
4676
|
userConflicts: outputs.GetFederatedSettingsOrgConfigsResultUserConflict[];
|
|
4590
4677
|
}
|
|
4591
4678
|
export interface GetFederatedSettingsOrgConfigsResultRoleMapping {
|