@pulumi/okta 3.4.0 → 3.5.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/adminRoleCustom.d.ts +113 -0
- package/adminRoleCustom.js +87 -0
- package/adminRoleCustom.js.map +1 -0
- package/adminRoleCustomAssignments.d.ts +90 -0
- package/adminRoleCustomAssignments.js +76 -0
- package/adminRoleCustomAssignments.js.map +1 -0
- package/app/getApp.d.ts +2 -30
- package/app/getApp.js +0 -2
- package/app/getApp.js.map +1 -1
- package/app/getOauth.d.ts +2 -30
- package/app/getOauth.js +0 -2
- package/app/getOauth.js.map +1 -1
- package/app/getSaml.d.ts +31 -285
- package/app/getSaml.js +0 -30
- package/app/getSaml.js.map +1 -1
- package/app/oauth.d.ts +15 -15
- package/app/oauthRedirectUri.d.ts +39 -0
- package/app/oauthRedirectUri.js +30 -0
- package/app/oauthRedirectUri.js.map +1 -1
- package/app/userBaseSchema.d.ts +1 -1
- package/app/userBaseSchema.js +1 -1
- package/appUserSchemaProperty.d.ts +1 -2
- package/appUserSchemaProperty.js +1 -2
- package/appUserSchemaProperty.js.map +1 -1
- package/authServerClaimDefault.d.ts +4 -0
- package/authServerClaimDefault.js +1 -1
- package/authServerClaimDefault.js.map +1 -1
- package/captcha.d.ts +110 -0
- package/captcha.js +92 -0
- package/captcha.js.map +1 -0
- package/captchaOrgWideSettings.d.ts +105 -0
- package/captchaOrgWideSettings.js +98 -0
- package/captchaOrgWideSettings.js.map +1 -0
- package/deprecated/signonPolicyRule.d.ts +12 -0
- package/deprecated/signonPolicyRule.js +2 -0
- package/deprecated/signonPolicyRule.js.map +1 -1
- package/deprecated/socialIdp.d.ts +36 -0
- package/deprecated/socialIdp.js +6 -0
- package/deprecated/socialIdp.js.map +1 -1
- package/domainCertificate.d.ts +7 -5
- package/domainCertificate.js +5 -0
- package/domainCertificate.js.map +1 -1
- package/idp/social.d.ts +42 -0
- package/idp/social.js +6 -0
- package/idp/social.js.map +1 -1
- package/index.d.ts +8 -0
- package/index.js +40 -0
- package/index.js.map +1 -1
- package/linkDefinition.d.ts +138 -0
- package/linkDefinition.js +109 -0
- package/linkDefinition.js.map +1 -0
- package/linkValue.d.ts +125 -0
- package/linkValue.js +114 -0
- package/linkValue.js.map +1 -0
- package/package.json +2 -2
- package/package.json.dev +1 -1
- package/policy/ruleSignon.d.ts +20 -4
- package/policy/ruleSignon.js +4 -1
- package/policy/ruleSignon.js.map +1 -1
- package/rateLimiting.d.ts +104 -0
- package/rateLimiting.js +87 -0
- package/rateLimiting.js.map +1 -0
- package/resourceSet.d.ts +97 -0
- package/resourceSet.js +83 -0
- package/resourceSet.js.map +1 -0
- package/types/input.d.ts +0 -338
- package/user/baseSchema.d.ts +1 -1
- package/user/baseSchema.js +1 -1
- package/user/getUserType.d.ts +3 -19
- package/user/getUserType.js +0 -2
- package/user/getUserType.js.map +1 -1
- package/user/getUsers.d.ts +1 -9
- package/user/getUsers.js +0 -1
- package/user/getUsers.js.map +1 -1
- package/user/user.d.ts +38 -0
- package/user/user.js +19 -0
- package/user/user.js.map +1 -1
|
@@ -0,0 +1,113 @@
|
|
|
1
|
+
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
/**
|
|
3
|
+
* These operations allow the creation and manipulation of custom roles as custom collections of permissions.
|
|
4
|
+
*
|
|
5
|
+
* > **NOTE:** This an `Early Access` feature.
|
|
6
|
+
*
|
|
7
|
+
* ## Example Usage
|
|
8
|
+
*
|
|
9
|
+
* ```typescript
|
|
10
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
11
|
+
* import * as okta from "@pulumi/okta";
|
|
12
|
+
*
|
|
13
|
+
* const example = new okta.AdminRoleCustom("example", {
|
|
14
|
+
* description: "This role allows app assignment management",
|
|
15
|
+
* label: "AppAssignmentManager",
|
|
16
|
+
* permissions: ["okta.apps.assignment.manage"],
|
|
17
|
+
* });
|
|
18
|
+
* ```
|
|
19
|
+
*
|
|
20
|
+
* ## Import
|
|
21
|
+
*
|
|
22
|
+
* Okta Custom Admin Role can be imported via the Okta ID.
|
|
23
|
+
*
|
|
24
|
+
* ```sh
|
|
25
|
+
* $ pulumi import okta:index/adminRoleCustom:AdminRoleCustom example <custom role id>
|
|
26
|
+
* ```
|
|
27
|
+
*/
|
|
28
|
+
export declare class AdminRoleCustom extends pulumi.CustomResource {
|
|
29
|
+
/**
|
|
30
|
+
* Get an existing AdminRoleCustom resource's state with the given name, ID, and optional extra
|
|
31
|
+
* properties used to qualify the lookup.
|
|
32
|
+
*
|
|
33
|
+
* @param name The _unique_ name of the resulting resource.
|
|
34
|
+
* @param id The _unique_ provider ID of the resource to lookup.
|
|
35
|
+
* @param state Any extra arguments used during the lookup.
|
|
36
|
+
* @param opts Optional settings to control the behavior of the CustomResource.
|
|
37
|
+
*/
|
|
38
|
+
static get(name: string, id: pulumi.Input<pulumi.ID>, state?: AdminRoleCustomState, opts?: pulumi.CustomResourceOptions): AdminRoleCustom;
|
|
39
|
+
/**
|
|
40
|
+
* Returns true if the given object is an instance of AdminRoleCustom. This is designed to work even
|
|
41
|
+
* when multiple copies of the Pulumi SDK have been loaded into the same process.
|
|
42
|
+
*/
|
|
43
|
+
static isInstance(obj: any): obj is AdminRoleCustom;
|
|
44
|
+
/**
|
|
45
|
+
* A human-readable description of the new Role.
|
|
46
|
+
*/
|
|
47
|
+
readonly description: pulumi.Output<string>;
|
|
48
|
+
/**
|
|
49
|
+
* The name given to the new Role.
|
|
50
|
+
*/
|
|
51
|
+
readonly label: pulumi.Output<string>;
|
|
52
|
+
/**
|
|
53
|
+
* The permissions that the new Role grants. At least one
|
|
54
|
+
* permission must be specified when creating custom role. Valid values:`"okta.users.manage"`,
|
|
55
|
+
* `"okta.users.create"`,`"okta.users.read"`,`"okta.users.credentials.manage"`,`"okta.users.userprofile.manage"`,
|
|
56
|
+
* `"okta.users.lifecycle.manage"`,`"okta.users.groupMembership.manage"`,`"okta.users.appAssignment.manage"`,
|
|
57
|
+
* `"okta.groups.manage"`,`"okta.groups.create"`,`"okta.groups.members.manage"`,`"okta.groups.read"`,
|
|
58
|
+
* `"okta.groups.appAssignment.manage"`,`"okta.apps.read"`,`"okta.apps.manage"`,`"okta.apps.assignment.manage"`.
|
|
59
|
+
*/
|
|
60
|
+
readonly permissions: pulumi.Output<string[] | undefined>;
|
|
61
|
+
/**
|
|
62
|
+
* Create a AdminRoleCustom resource with the given unique name, arguments, and options.
|
|
63
|
+
*
|
|
64
|
+
* @param name The _unique_ name of the resource.
|
|
65
|
+
* @param args The arguments to use to populate this resource's properties.
|
|
66
|
+
* @param opts A bag of options that control this resource's behavior.
|
|
67
|
+
*/
|
|
68
|
+
constructor(name: string, args: AdminRoleCustomArgs, opts?: pulumi.CustomResourceOptions);
|
|
69
|
+
}
|
|
70
|
+
/**
|
|
71
|
+
* Input properties used for looking up and filtering AdminRoleCustom resources.
|
|
72
|
+
*/
|
|
73
|
+
export interface AdminRoleCustomState {
|
|
74
|
+
/**
|
|
75
|
+
* A human-readable description of the new Role.
|
|
76
|
+
*/
|
|
77
|
+
description?: pulumi.Input<string>;
|
|
78
|
+
/**
|
|
79
|
+
* The name given to the new Role.
|
|
80
|
+
*/
|
|
81
|
+
label?: pulumi.Input<string>;
|
|
82
|
+
/**
|
|
83
|
+
* The permissions that the new Role grants. At least one
|
|
84
|
+
* permission must be specified when creating custom role. Valid values:`"okta.users.manage"`,
|
|
85
|
+
* `"okta.users.create"`,`"okta.users.read"`,`"okta.users.credentials.manage"`,`"okta.users.userprofile.manage"`,
|
|
86
|
+
* `"okta.users.lifecycle.manage"`,`"okta.users.groupMembership.manage"`,`"okta.users.appAssignment.manage"`,
|
|
87
|
+
* `"okta.groups.manage"`,`"okta.groups.create"`,`"okta.groups.members.manage"`,`"okta.groups.read"`,
|
|
88
|
+
* `"okta.groups.appAssignment.manage"`,`"okta.apps.read"`,`"okta.apps.manage"`,`"okta.apps.assignment.manage"`.
|
|
89
|
+
*/
|
|
90
|
+
permissions?: pulumi.Input<pulumi.Input<string>[]>;
|
|
91
|
+
}
|
|
92
|
+
/**
|
|
93
|
+
* The set of arguments for constructing a AdminRoleCustom resource.
|
|
94
|
+
*/
|
|
95
|
+
export interface AdminRoleCustomArgs {
|
|
96
|
+
/**
|
|
97
|
+
* A human-readable description of the new Role.
|
|
98
|
+
*/
|
|
99
|
+
description: pulumi.Input<string>;
|
|
100
|
+
/**
|
|
101
|
+
* The name given to the new Role.
|
|
102
|
+
*/
|
|
103
|
+
label: pulumi.Input<string>;
|
|
104
|
+
/**
|
|
105
|
+
* The permissions that the new Role grants. At least one
|
|
106
|
+
* permission must be specified when creating custom role. Valid values:`"okta.users.manage"`,
|
|
107
|
+
* `"okta.users.create"`,`"okta.users.read"`,`"okta.users.credentials.manage"`,`"okta.users.userprofile.manage"`,
|
|
108
|
+
* `"okta.users.lifecycle.manage"`,`"okta.users.groupMembership.manage"`,`"okta.users.appAssignment.manage"`,
|
|
109
|
+
* `"okta.groups.manage"`,`"okta.groups.create"`,`"okta.groups.members.manage"`,`"okta.groups.read"`,
|
|
110
|
+
* `"okta.groups.appAssignment.manage"`,`"okta.apps.read"`,`"okta.apps.manage"`,`"okta.apps.assignment.manage"`.
|
|
111
|
+
*/
|
|
112
|
+
permissions?: pulumi.Input<pulumi.Input<string>[]>;
|
|
113
|
+
}
|
|
@@ -0,0 +1,87 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
|
+
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.AdminRoleCustom = void 0;
|
|
6
|
+
const pulumi = require("@pulumi/pulumi");
|
|
7
|
+
const utilities = require("./utilities");
|
|
8
|
+
/**
|
|
9
|
+
* These operations allow the creation and manipulation of custom roles as custom collections of permissions.
|
|
10
|
+
*
|
|
11
|
+
* > **NOTE:** This an `Early Access` feature.
|
|
12
|
+
*
|
|
13
|
+
* ## Example Usage
|
|
14
|
+
*
|
|
15
|
+
* ```typescript
|
|
16
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
17
|
+
* import * as okta from "@pulumi/okta";
|
|
18
|
+
*
|
|
19
|
+
* const example = new okta.AdminRoleCustom("example", {
|
|
20
|
+
* description: "This role allows app assignment management",
|
|
21
|
+
* label: "AppAssignmentManager",
|
|
22
|
+
* permissions: ["okta.apps.assignment.manage"],
|
|
23
|
+
* });
|
|
24
|
+
* ```
|
|
25
|
+
*
|
|
26
|
+
* ## Import
|
|
27
|
+
*
|
|
28
|
+
* Okta Custom Admin Role can be imported via the Okta ID.
|
|
29
|
+
*
|
|
30
|
+
* ```sh
|
|
31
|
+
* $ pulumi import okta:index/adminRoleCustom:AdminRoleCustom example <custom role id>
|
|
32
|
+
* ```
|
|
33
|
+
*/
|
|
34
|
+
class AdminRoleCustom extends pulumi.CustomResource {
|
|
35
|
+
constructor(name, argsOrState, opts) {
|
|
36
|
+
let inputs = {};
|
|
37
|
+
opts = opts || {};
|
|
38
|
+
if (opts.id) {
|
|
39
|
+
const state = argsOrState;
|
|
40
|
+
inputs["description"] = state ? state.description : undefined;
|
|
41
|
+
inputs["label"] = state ? state.label : undefined;
|
|
42
|
+
inputs["permissions"] = state ? state.permissions : undefined;
|
|
43
|
+
}
|
|
44
|
+
else {
|
|
45
|
+
const args = argsOrState;
|
|
46
|
+
if ((!args || args.description === undefined) && !opts.urn) {
|
|
47
|
+
throw new Error("Missing required property 'description'");
|
|
48
|
+
}
|
|
49
|
+
if ((!args || args.label === undefined) && !opts.urn) {
|
|
50
|
+
throw new Error("Missing required property 'label'");
|
|
51
|
+
}
|
|
52
|
+
inputs["description"] = args ? args.description : undefined;
|
|
53
|
+
inputs["label"] = args ? args.label : undefined;
|
|
54
|
+
inputs["permissions"] = args ? args.permissions : undefined;
|
|
55
|
+
}
|
|
56
|
+
if (!opts.version) {
|
|
57
|
+
opts = pulumi.mergeOptions(opts, { version: utilities.getVersion() });
|
|
58
|
+
}
|
|
59
|
+
super(AdminRoleCustom.__pulumiType, name, inputs, opts);
|
|
60
|
+
}
|
|
61
|
+
/**
|
|
62
|
+
* Get an existing AdminRoleCustom resource's state with the given name, ID, and optional extra
|
|
63
|
+
* properties used to qualify the lookup.
|
|
64
|
+
*
|
|
65
|
+
* @param name The _unique_ name of the resulting resource.
|
|
66
|
+
* @param id The _unique_ provider ID of the resource to lookup.
|
|
67
|
+
* @param state Any extra arguments used during the lookup.
|
|
68
|
+
* @param opts Optional settings to control the behavior of the CustomResource.
|
|
69
|
+
*/
|
|
70
|
+
static get(name, id, state, opts) {
|
|
71
|
+
return new AdminRoleCustom(name, state, Object.assign(Object.assign({}, opts), { id: id }));
|
|
72
|
+
}
|
|
73
|
+
/**
|
|
74
|
+
* Returns true if the given object is an instance of AdminRoleCustom. This is designed to work even
|
|
75
|
+
* when multiple copies of the Pulumi SDK have been loaded into the same process.
|
|
76
|
+
*/
|
|
77
|
+
static isInstance(obj) {
|
|
78
|
+
if (obj === undefined || obj === null) {
|
|
79
|
+
return false;
|
|
80
|
+
}
|
|
81
|
+
return obj['__pulumiType'] === AdminRoleCustom.__pulumiType;
|
|
82
|
+
}
|
|
83
|
+
}
|
|
84
|
+
exports.AdminRoleCustom = AdminRoleCustom;
|
|
85
|
+
/** @internal */
|
|
86
|
+
AdminRoleCustom.__pulumiType = 'okta:index/adminRoleCustom:AdminRoleCustom';
|
|
87
|
+
//# sourceMappingURL=adminRoleCustom.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"adminRoleCustom.js","sourceRoot":"","sources":["../adminRoleCustom.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;GAyBG;AACH,MAAa,eAAgB,SAAQ,MAAM,CAAC,cAAc;IAsDtD,YAAY,IAAY,EAAE,WAAwD,EAAE,IAAmC;QACnH,IAAI,MAAM,GAAkB,EAAE,CAAC;QAC/B,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA+C,CAAC;YAC9D,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;SACjE;aAAM;YACH,MAAM,IAAI,GAAG,WAA8C,CAAC;YAC5D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,WAAW,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACxD,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;QACD,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;YACf,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE,EAAC,CAAC,CAAC;SACxE;QACD,KAAK,CAAC,eAAe,CAAC,YAAY,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,CAAC,CAAC;IAC5D,CAAC;IA7ED;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA4B,EAAE,IAAmC;QAC1H,OAAO,IAAI,eAAe,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACtE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,eAAe,CAAC,YAAY,CAAC;IAChE,CAAC;;AA1BL,0CA+EC;AAjEG,gBAAgB;AACO,4BAAY,GAAG,4CAA4C,CAAC"}
|
|
@@ -0,0 +1,90 @@
|
|
|
1
|
+
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
/**
|
|
3
|
+
* This resource allows the assignment and unassignment of Custom Roles. The `members` field supports these type of resources:
|
|
4
|
+
* - Groups
|
|
5
|
+
* - Users
|
|
6
|
+
*
|
|
7
|
+
* > **NOTE:** This an `Early Access` feature.
|
|
8
|
+
*
|
|
9
|
+
* ## Import
|
|
10
|
+
*
|
|
11
|
+
* Okta Custom Admin Role Assignments can be imported via the Okta ID.
|
|
12
|
+
*
|
|
13
|
+
* ```sh
|
|
14
|
+
* $ pulumi import okta:index/adminRoleCustomAssignments:AdminRoleCustomAssignments example <resource_set_id>/<custom_role_id>
|
|
15
|
+
* ```
|
|
16
|
+
*/
|
|
17
|
+
export declare class AdminRoleCustomAssignments extends pulumi.CustomResource {
|
|
18
|
+
/**
|
|
19
|
+
* Get an existing AdminRoleCustomAssignments resource's state with the given name, ID, and optional extra
|
|
20
|
+
* properties used to qualify the lookup.
|
|
21
|
+
*
|
|
22
|
+
* @param name The _unique_ name of the resulting resource.
|
|
23
|
+
* @param id The _unique_ provider ID of the resource to lookup.
|
|
24
|
+
* @param state Any extra arguments used during the lookup.
|
|
25
|
+
* @param opts Optional settings to control the behavior of the CustomResource.
|
|
26
|
+
*/
|
|
27
|
+
static get(name: string, id: pulumi.Input<pulumi.ID>, state?: AdminRoleCustomAssignmentsState, opts?: pulumi.CustomResourceOptions): AdminRoleCustomAssignments;
|
|
28
|
+
/**
|
|
29
|
+
* Returns true if the given object is an instance of AdminRoleCustomAssignments. This is designed to work even
|
|
30
|
+
* when multiple copies of the Pulumi SDK have been loaded into the same process.
|
|
31
|
+
*/
|
|
32
|
+
static isInstance(obj: any): obj is AdminRoleCustomAssignments;
|
|
33
|
+
/**
|
|
34
|
+
* ID of the Custom Role.
|
|
35
|
+
*/
|
|
36
|
+
readonly customRoleId: pulumi.Output<string>;
|
|
37
|
+
/**
|
|
38
|
+
* The hrefs that point to User(s) and/or Group(s) that receive the Role. At least one
|
|
39
|
+
* permission must be specified when creating custom role.
|
|
40
|
+
*/
|
|
41
|
+
readonly members: pulumi.Output<string[] | undefined>;
|
|
42
|
+
/**
|
|
43
|
+
* ID of the target Resource Set.
|
|
44
|
+
*/
|
|
45
|
+
readonly resourceSetId: pulumi.Output<string>;
|
|
46
|
+
/**
|
|
47
|
+
* Create a AdminRoleCustomAssignments resource with the given unique name, arguments, and options.
|
|
48
|
+
*
|
|
49
|
+
* @param name The _unique_ name of the resource.
|
|
50
|
+
* @param args The arguments to use to populate this resource's properties.
|
|
51
|
+
* @param opts A bag of options that control this resource's behavior.
|
|
52
|
+
*/
|
|
53
|
+
constructor(name: string, args: AdminRoleCustomAssignmentsArgs, opts?: pulumi.CustomResourceOptions);
|
|
54
|
+
}
|
|
55
|
+
/**
|
|
56
|
+
* Input properties used for looking up and filtering AdminRoleCustomAssignments resources.
|
|
57
|
+
*/
|
|
58
|
+
export interface AdminRoleCustomAssignmentsState {
|
|
59
|
+
/**
|
|
60
|
+
* ID of the Custom Role.
|
|
61
|
+
*/
|
|
62
|
+
customRoleId?: pulumi.Input<string>;
|
|
63
|
+
/**
|
|
64
|
+
* The hrefs that point to User(s) and/or Group(s) that receive the Role. At least one
|
|
65
|
+
* permission must be specified when creating custom role.
|
|
66
|
+
*/
|
|
67
|
+
members?: pulumi.Input<pulumi.Input<string>[]>;
|
|
68
|
+
/**
|
|
69
|
+
* ID of the target Resource Set.
|
|
70
|
+
*/
|
|
71
|
+
resourceSetId?: pulumi.Input<string>;
|
|
72
|
+
}
|
|
73
|
+
/**
|
|
74
|
+
* The set of arguments for constructing a AdminRoleCustomAssignments resource.
|
|
75
|
+
*/
|
|
76
|
+
export interface AdminRoleCustomAssignmentsArgs {
|
|
77
|
+
/**
|
|
78
|
+
* ID of the Custom Role.
|
|
79
|
+
*/
|
|
80
|
+
customRoleId: pulumi.Input<string>;
|
|
81
|
+
/**
|
|
82
|
+
* The hrefs that point to User(s) and/or Group(s) that receive the Role. At least one
|
|
83
|
+
* permission must be specified when creating custom role.
|
|
84
|
+
*/
|
|
85
|
+
members?: pulumi.Input<pulumi.Input<string>[]>;
|
|
86
|
+
/**
|
|
87
|
+
* ID of the target Resource Set.
|
|
88
|
+
*/
|
|
89
|
+
resourceSetId: pulumi.Input<string>;
|
|
90
|
+
}
|
|
@@ -0,0 +1,76 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
|
+
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.AdminRoleCustomAssignments = void 0;
|
|
6
|
+
const pulumi = require("@pulumi/pulumi");
|
|
7
|
+
const utilities = require("./utilities");
|
|
8
|
+
/**
|
|
9
|
+
* This resource allows the assignment and unassignment of Custom Roles. The `members` field supports these type of resources:
|
|
10
|
+
* - Groups
|
|
11
|
+
* - Users
|
|
12
|
+
*
|
|
13
|
+
* > **NOTE:** This an `Early Access` feature.
|
|
14
|
+
*
|
|
15
|
+
* ## Import
|
|
16
|
+
*
|
|
17
|
+
* Okta Custom Admin Role Assignments can be imported via the Okta ID.
|
|
18
|
+
*
|
|
19
|
+
* ```sh
|
|
20
|
+
* $ pulumi import okta:index/adminRoleCustomAssignments:AdminRoleCustomAssignments example <resource_set_id>/<custom_role_id>
|
|
21
|
+
* ```
|
|
22
|
+
*/
|
|
23
|
+
class AdminRoleCustomAssignments extends pulumi.CustomResource {
|
|
24
|
+
constructor(name, argsOrState, opts) {
|
|
25
|
+
let inputs = {};
|
|
26
|
+
opts = opts || {};
|
|
27
|
+
if (opts.id) {
|
|
28
|
+
const state = argsOrState;
|
|
29
|
+
inputs["customRoleId"] = state ? state.customRoleId : undefined;
|
|
30
|
+
inputs["members"] = state ? state.members : undefined;
|
|
31
|
+
inputs["resourceSetId"] = state ? state.resourceSetId : undefined;
|
|
32
|
+
}
|
|
33
|
+
else {
|
|
34
|
+
const args = argsOrState;
|
|
35
|
+
if ((!args || args.customRoleId === undefined) && !opts.urn) {
|
|
36
|
+
throw new Error("Missing required property 'customRoleId'");
|
|
37
|
+
}
|
|
38
|
+
if ((!args || args.resourceSetId === undefined) && !opts.urn) {
|
|
39
|
+
throw new Error("Missing required property 'resourceSetId'");
|
|
40
|
+
}
|
|
41
|
+
inputs["customRoleId"] = args ? args.customRoleId : undefined;
|
|
42
|
+
inputs["members"] = args ? args.members : undefined;
|
|
43
|
+
inputs["resourceSetId"] = args ? args.resourceSetId : undefined;
|
|
44
|
+
}
|
|
45
|
+
if (!opts.version) {
|
|
46
|
+
opts = pulumi.mergeOptions(opts, { version: utilities.getVersion() });
|
|
47
|
+
}
|
|
48
|
+
super(AdminRoleCustomAssignments.__pulumiType, name, inputs, opts);
|
|
49
|
+
}
|
|
50
|
+
/**
|
|
51
|
+
* Get an existing AdminRoleCustomAssignments resource's state with the given name, ID, and optional extra
|
|
52
|
+
* properties used to qualify the lookup.
|
|
53
|
+
*
|
|
54
|
+
* @param name The _unique_ name of the resulting resource.
|
|
55
|
+
* @param id The _unique_ provider ID of the resource to lookup.
|
|
56
|
+
* @param state Any extra arguments used during the lookup.
|
|
57
|
+
* @param opts Optional settings to control the behavior of the CustomResource.
|
|
58
|
+
*/
|
|
59
|
+
static get(name, id, state, opts) {
|
|
60
|
+
return new AdminRoleCustomAssignments(name, state, Object.assign(Object.assign({}, opts), { id: id }));
|
|
61
|
+
}
|
|
62
|
+
/**
|
|
63
|
+
* Returns true if the given object is an instance of AdminRoleCustomAssignments. This is designed to work even
|
|
64
|
+
* when multiple copies of the Pulumi SDK have been loaded into the same process.
|
|
65
|
+
*/
|
|
66
|
+
static isInstance(obj) {
|
|
67
|
+
if (obj === undefined || obj === null) {
|
|
68
|
+
return false;
|
|
69
|
+
}
|
|
70
|
+
return obj['__pulumiType'] === AdminRoleCustomAssignments.__pulumiType;
|
|
71
|
+
}
|
|
72
|
+
}
|
|
73
|
+
exports.AdminRoleCustomAssignments = AdminRoleCustomAssignments;
|
|
74
|
+
/** @internal */
|
|
75
|
+
AdminRoleCustomAssignments.__pulumiType = 'okta:index/adminRoleCustomAssignments:AdminRoleCustomAssignments';
|
|
76
|
+
//# sourceMappingURL=adminRoleCustomAssignments.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"adminRoleCustomAssignments.js","sourceRoot":"","sources":["../adminRoleCustomAssignments.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;GAcG;AACH,MAAa,0BAA2B,SAAQ,MAAM,CAAC,cAAc;IAkDjE,YAAY,IAAY,EAAE,WAA8E,EAAE,IAAmC;QACzI,IAAI,MAAM,GAAkB,EAAE,CAAC;QAC/B,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA0D,CAAC;YACzE,MAAM,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;SACrE;aAAM;YACH,MAAM,IAAI,GAAG,WAAyD,CAAC;YACvE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,YAAY,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACzD,MAAM,IAAI,KAAK,CAAC,0CAA0C,CAAC,CAAC;aAC/D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,aAAa,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1D,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;aAChE;YACD,MAAM,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;SACnE;QACD,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;YACf,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE,EAAC,CAAC,CAAC;SACxE;QACD,KAAK,CAAC,0BAA0B,CAAC,YAAY,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,CAAC,CAAC;IACvE,CAAC;IAzED;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAuC,EAAE,IAAmC;QACrI,OAAO,IAAI,0BAA0B,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACjF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,0BAA0B,CAAC,YAAY,CAAC;IAC3E,CAAC;;AA1BL,gEA2EC;AA7DG,gBAAgB;AACO,uCAAY,GAAG,kEAAkE,CAAC"}
|
package/app/getApp.d.ts
CHANGED
|
@@ -22,13 +22,6 @@ export interface GetAppArgs {
|
|
|
22
22
|
* tells the provider to query for only `ACTIVE` applications.
|
|
23
23
|
*/
|
|
24
24
|
activeOnly?: boolean;
|
|
25
|
-
/**
|
|
26
|
-
* List of groups IDs assigned to the application.
|
|
27
|
-
* - `DEPRECATED`: Please replace all usage of this field with the data source `okta.AppGroupAssignments`.
|
|
28
|
-
*
|
|
29
|
-
* @deprecated The `groups` field is now deprecated for the data source `okta_app`, please replace all uses of this with: `okta_app_group_assignments`
|
|
30
|
-
*/
|
|
31
|
-
groups?: string[];
|
|
32
25
|
/**
|
|
33
26
|
* `id` of application to retrieve, conflicts with `label` and `labelPrefix`.
|
|
34
27
|
*/
|
|
@@ -52,13 +45,6 @@ export interface GetAppArgs {
|
|
|
52
45
|
* Indicator that allows the app to skip `users` sync. Default is `false`.
|
|
53
46
|
*/
|
|
54
47
|
skipUsers?: boolean;
|
|
55
|
-
/**
|
|
56
|
-
* List of users IDs assigned to the application.
|
|
57
|
-
* - `DEPRECATED`: Please replace all usage of this field with the data source `okta.getAppUserAssignments`.
|
|
58
|
-
*
|
|
59
|
-
* @deprecated The `users` field is now deprecated for the data source `okta_app`, please replace all uses of this with: `okta_app_user_assignments`
|
|
60
|
-
*/
|
|
61
|
-
users?: string[];
|
|
62
48
|
}
|
|
63
49
|
/**
|
|
64
50
|
* A collection of values returned by getApp.
|
|
@@ -71,7 +57,7 @@ export interface GetAppResult {
|
|
|
71
57
|
*
|
|
72
58
|
* @deprecated The `groups` field is now deprecated for the data source `okta_app`, please replace all uses of this with: `okta_app_group_assignments`
|
|
73
59
|
*/
|
|
74
|
-
readonly groups
|
|
60
|
+
readonly groups: string[];
|
|
75
61
|
/**
|
|
76
62
|
* Application ID.
|
|
77
63
|
*/
|
|
@@ -101,7 +87,7 @@ export interface GetAppResult {
|
|
|
101
87
|
*
|
|
102
88
|
* @deprecated The `users` field is now deprecated for the data source `okta_app`, please replace all uses of this with: `okta_app_user_assignments`
|
|
103
89
|
*/
|
|
104
|
-
readonly users
|
|
90
|
+
readonly users: string[];
|
|
105
91
|
}
|
|
106
92
|
export declare function getAppOutput(args?: GetAppOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output<GetAppResult>;
|
|
107
93
|
/**
|
|
@@ -112,13 +98,6 @@ export interface GetAppOutputArgs {
|
|
|
112
98
|
* tells the provider to query for only `ACTIVE` applications.
|
|
113
99
|
*/
|
|
114
100
|
activeOnly?: pulumi.Input<boolean>;
|
|
115
|
-
/**
|
|
116
|
-
* List of groups IDs assigned to the application.
|
|
117
|
-
* - `DEPRECATED`: Please replace all usage of this field with the data source `okta.AppGroupAssignments`.
|
|
118
|
-
*
|
|
119
|
-
* @deprecated The `groups` field is now deprecated for the data source `okta_app`, please replace all uses of this with: `okta_app_group_assignments`
|
|
120
|
-
*/
|
|
121
|
-
groups?: pulumi.Input<pulumi.Input<string>[]>;
|
|
122
101
|
/**
|
|
123
102
|
* `id` of application to retrieve, conflicts with `label` and `labelPrefix`.
|
|
124
103
|
*/
|
|
@@ -142,11 +121,4 @@ export interface GetAppOutputArgs {
|
|
|
142
121
|
* Indicator that allows the app to skip `users` sync. Default is `false`.
|
|
143
122
|
*/
|
|
144
123
|
skipUsers?: pulumi.Input<boolean>;
|
|
145
|
-
/**
|
|
146
|
-
* List of users IDs assigned to the application.
|
|
147
|
-
* - `DEPRECATED`: Please replace all usage of this field with the data source `okta.getAppUserAssignments`.
|
|
148
|
-
*
|
|
149
|
-
* @deprecated The `users` field is now deprecated for the data source `okta_app`, please replace all uses of this with: `okta_app_user_assignments`
|
|
150
|
-
*/
|
|
151
|
-
users?: pulumi.Input<pulumi.Input<string>[]>;
|
|
152
124
|
}
|
package/app/getApp.js
CHANGED
|
@@ -29,13 +29,11 @@ function getApp(args, opts) {
|
|
|
29
29
|
}
|
|
30
30
|
return pulumi.runtime.invoke("okta:app/getApp:getApp", {
|
|
31
31
|
"activeOnly": args.activeOnly,
|
|
32
|
-
"groups": args.groups,
|
|
33
32
|
"id": args.id,
|
|
34
33
|
"label": args.label,
|
|
35
34
|
"labelPrefix": args.labelPrefix,
|
|
36
35
|
"skipGroups": args.skipGroups,
|
|
37
36
|
"skipUsers": args.skipUsers,
|
|
38
|
-
"users": args.users,
|
|
39
37
|
}, opts);
|
|
40
38
|
}
|
|
41
39
|
exports.getApp = getApp;
|
package/app/getApp.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getApp.js","sourceRoot":"","sources":["../../app/getApp.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;GAaG;AACH,SAAgB,MAAM,CAAC,IAAiB,EAAE,IAA2B;IACjE,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;IAClB,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;QACf,IAAI,CAAC,OAAO,GAAG,SAAS,CAAC,UAAU,EAAE,CAAC;KACzC;IACD,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,wBAAwB,EAAE;QACnD,YAAY,EAAE,IAAI,CAAC,UAAU;QAC7B,
|
|
1
|
+
{"version":3,"file":"getApp.js","sourceRoot":"","sources":["../../app/getApp.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;GAaG;AACH,SAAgB,MAAM,CAAC,IAAiB,EAAE,IAA2B;IACjE,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;IAClB,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;QACf,IAAI,CAAC,OAAO,GAAG,SAAS,CAAC,UAAU,EAAE,CAAC;KACzC;IACD,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,wBAAwB,EAAE;QACnD,YAAY,EAAE,IAAI,CAAC,UAAU;QAC7B,IAAI,EAAE,IAAI,CAAC,EAAE;QACb,OAAO,EAAE,IAAI,CAAC,KAAK;QACnB,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,YAAY,EAAE,IAAI,CAAC,UAAU;QAC7B,WAAW,EAAE,IAAI,CAAC,SAAS;KAC9B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAjBD,wBAiBC;AA+ED,SAAgB,YAAY,CAAC,IAAuB,EAAE,IAA2B;IAC7E,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,MAAM,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AAC1D,CAAC;AAFD,oCAEC"}
|
package/app/getOauth.d.ts
CHANGED
|
@@ -22,13 +22,6 @@ export interface GetOauthArgs {
|
|
|
22
22
|
* tells the provider to query for only `ACTIVE` applications.
|
|
23
23
|
*/
|
|
24
24
|
activeOnly?: boolean;
|
|
25
|
-
/**
|
|
26
|
-
* List of groups IDs assigned to the application.
|
|
27
|
-
* - `DEPRECATED`: Please replace all usage of this field with the data source `okta.AppGroupAssignments`.
|
|
28
|
-
*
|
|
29
|
-
* @deprecated The `groups` field is now deprecated for the data source `okta_app_oauth`, please replace all uses of this with: `okta_app_group_assignments`
|
|
30
|
-
*/
|
|
31
|
-
groups?: string[];
|
|
32
25
|
/**
|
|
33
26
|
* `id` of application to retrieve, conflicts with `label` and `labelPrefix`.
|
|
34
27
|
*/
|
|
@@ -52,13 +45,6 @@ export interface GetOauthArgs {
|
|
|
52
45
|
* Indicator that allows the app to skip `users` sync. Default is `false`.
|
|
53
46
|
*/
|
|
54
47
|
skipUsers?: boolean;
|
|
55
|
-
/**
|
|
56
|
-
* List of users IDs assigned to the application.
|
|
57
|
-
* - `DEPRECATED`: Please replace all usage of this field with the data source `okta.getAppUserAssignments`.
|
|
58
|
-
*
|
|
59
|
-
* @deprecated The `users` field is now deprecated for the data source `okta_app_oauth`, please replace all uses of this with: `okta_app_user_assignments`
|
|
60
|
-
*/
|
|
61
|
-
users?: string[];
|
|
62
48
|
}
|
|
63
49
|
/**
|
|
64
50
|
* A collection of values returned by getOauth.
|
|
@@ -87,7 +73,7 @@ export interface GetOauthResult {
|
|
|
87
73
|
*
|
|
88
74
|
* @deprecated The `groups` field is now deprecated for the data source `okta_app_oauth`, please replace all uses of this with: `okta_app_group_assignments`
|
|
89
75
|
*/
|
|
90
|
-
readonly groups
|
|
76
|
+
readonly groups: string[];
|
|
91
77
|
/**
|
|
92
78
|
* Do not display application icon on mobile app.
|
|
93
79
|
*/
|
|
@@ -161,7 +147,7 @@ export interface GetOauthResult {
|
|
|
161
147
|
*
|
|
162
148
|
* @deprecated The `users` field is now deprecated for the data source `okta_app_oauth`, please replace all uses of this with: `okta_app_user_assignments`
|
|
163
149
|
*/
|
|
164
|
-
readonly users
|
|
150
|
+
readonly users: string[];
|
|
165
151
|
readonly wildcardRedirect: string;
|
|
166
152
|
}
|
|
167
153
|
export declare function getOauthOutput(args?: GetOauthOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output<GetOauthResult>;
|
|
@@ -173,13 +159,6 @@ export interface GetOauthOutputArgs {
|
|
|
173
159
|
* tells the provider to query for only `ACTIVE` applications.
|
|
174
160
|
*/
|
|
175
161
|
activeOnly?: pulumi.Input<boolean>;
|
|
176
|
-
/**
|
|
177
|
-
* List of groups IDs assigned to the application.
|
|
178
|
-
* - `DEPRECATED`: Please replace all usage of this field with the data source `okta.AppGroupAssignments`.
|
|
179
|
-
*
|
|
180
|
-
* @deprecated The `groups` field is now deprecated for the data source `okta_app_oauth`, please replace all uses of this with: `okta_app_group_assignments`
|
|
181
|
-
*/
|
|
182
|
-
groups?: pulumi.Input<pulumi.Input<string>[]>;
|
|
183
162
|
/**
|
|
184
163
|
* `id` of application to retrieve, conflicts with `label` and `labelPrefix`.
|
|
185
164
|
*/
|
|
@@ -203,11 +182,4 @@ export interface GetOauthOutputArgs {
|
|
|
203
182
|
* Indicator that allows the app to skip `users` sync. Default is `false`.
|
|
204
183
|
*/
|
|
205
184
|
skipUsers?: pulumi.Input<boolean>;
|
|
206
|
-
/**
|
|
207
|
-
* List of users IDs assigned to the application.
|
|
208
|
-
* - `DEPRECATED`: Please replace all usage of this field with the data source `okta.getAppUserAssignments`.
|
|
209
|
-
*
|
|
210
|
-
* @deprecated The `users` field is now deprecated for the data source `okta_app_oauth`, please replace all uses of this with: `okta_app_user_assignments`
|
|
211
|
-
*/
|
|
212
|
-
users?: pulumi.Input<pulumi.Input<string>[]>;
|
|
213
185
|
}
|
package/app/getOauth.js
CHANGED
|
@@ -29,13 +29,11 @@ function getOauth(args, opts) {
|
|
|
29
29
|
}
|
|
30
30
|
return pulumi.runtime.invoke("okta:app/getOauth:getOauth", {
|
|
31
31
|
"activeOnly": args.activeOnly,
|
|
32
|
-
"groups": args.groups,
|
|
33
32
|
"id": args.id,
|
|
34
33
|
"label": args.label,
|
|
35
34
|
"labelPrefix": args.labelPrefix,
|
|
36
35
|
"skipGroups": args.skipGroups,
|
|
37
36
|
"skipUsers": args.skipUsers,
|
|
38
|
-
"users": args.users,
|
|
39
37
|
}, opts);
|
|
40
38
|
}
|
|
41
39
|
exports.getOauth = getOauth;
|
package/app/getOauth.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getOauth.js","sourceRoot":"","sources":["../../app/getOauth.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;GAaG;AACH,SAAgB,QAAQ,CAAC,IAAmB,EAAE,IAA2B;IACrE,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;IAClB,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;QACf,IAAI,CAAC,OAAO,GAAG,SAAS,CAAC,UAAU,EAAE,CAAC;KACzC;IACD,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,4BAA4B,EAAE;QACvD,YAAY,EAAE,IAAI,CAAC,UAAU;QAC7B,
|
|
1
|
+
{"version":3,"file":"getOauth.js","sourceRoot":"","sources":["../../app/getOauth.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;GAaG;AACH,SAAgB,QAAQ,CAAC,IAAmB,EAAE,IAA2B;IACrE,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;IAClB,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;QACf,IAAI,CAAC,OAAO,GAAG,SAAS,CAAC,UAAU,EAAE,CAAC;KACzC;IACD,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,4BAA4B,EAAE;QACvD,YAAY,EAAE,IAAI,CAAC,UAAU;QAC7B,IAAI,EAAE,IAAI,CAAC,EAAE;QACb,OAAO,EAAE,IAAI,CAAC,KAAK;QACnB,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,YAAY,EAAE,IAAI,CAAC,UAAU;QAC7B,WAAW,EAAE,IAAI,CAAC,SAAS;KAC9B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAjBD,4BAiBC;AA4ID,SAAgB,cAAc,CAAC,IAAyB,EAAE,IAA2B;IACjF,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,QAAQ,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AAC5D,CAAC;AAFD,wCAEC"}
|