@pulumi/okta 4.4.0 → 4.4.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (399) hide show
  1. package/adminRoleCustom.d.ts +10 -129
  2. package/adminRoleCustom.js +1 -24
  3. package/adminRoleCustom.js.map +1 -1
  4. package/adminRoleCustomAssignments.d.ts +10 -25
  5. package/adminRoleCustomAssignments.js +1 -13
  6. package/adminRoleCustomAssignments.js.map +1 -1
  7. package/adminRoleTargets.d.ts +14 -44
  8. package/adminRoleTargets.js +0 -30
  9. package/adminRoleTargets.js.map +1 -1
  10. package/app/accessPolicyAssignment.d.ts +1 -20
  11. package/app/accessPolicyAssignment.js +1 -20
  12. package/app/accessPolicyAssignment.js.map +1 -1
  13. package/app/autoLogin.d.ts +72 -115
  14. package/app/autoLogin.js +0 -43
  15. package/app/autoLogin.js.map +1 -1
  16. package/app/basicAuth.d.ts +38 -62
  17. package/app/basicAuth.js +0 -24
  18. package/app/basicAuth.js.map +1 -1
  19. package/app/bookmark.d.ts +35 -67
  20. package/app/bookmark.js +0 -23
  21. package/app/bookmark.js.map +1 -1
  22. package/app/getApp.d.ts +58 -25
  23. package/app/getApp.js +2 -2
  24. package/app/getApp.js.map +1 -1
  25. package/app/getMetadataSaml.d.ts +11 -5
  26. package/app/getMetadataSaml.js +2 -2
  27. package/app/getMetadataSaml.js.map +1 -1
  28. package/app/getOauth.d.ts +62 -34
  29. package/app/getOauth.js +2 -2
  30. package/app/getOauth.js.map +1 -1
  31. package/app/getSaml.d.ts +75 -55
  32. package/app/getSaml.js +2 -2
  33. package/app/getSaml.js.map +1 -1
  34. package/app/groupAssignment.d.ts +6 -15
  35. package/app/groupAssignment.js +0 -9
  36. package/app/groupAssignment.js.map +1 -1
  37. package/app/oauth.d.ts +125 -299
  38. package/app/oauth.js +0 -78
  39. package/app/oauth.js.map +1 -1
  40. package/app/oauthPostLogoutRedirectUri.d.ts +0 -31
  41. package/app/oauthPostLogoutRedirectUri.js +0 -31
  42. package/app/oauthPostLogoutRedirectUri.js.map +1 -1
  43. package/app/oauthRedirectUri.d.ts +0 -30
  44. package/app/oauthRedirectUri.js +0 -30
  45. package/app/oauthRedirectUri.js.map +1 -1
  46. package/app/saml.d.ts +133 -299
  47. package/app/saml.js +0 -157
  48. package/app/saml.js.map +1 -1
  49. package/app/securePasswordStore.d.ts +79 -105
  50. package/app/securePasswordStore.js +0 -26
  51. package/app/securePasswordStore.js.map +1 -1
  52. package/app/swa.d.ts +72 -98
  53. package/app/swa.js +0 -26
  54. package/app/swa.js.map +1 -1
  55. package/app/threeField.d.ts +72 -83
  56. package/app/threeField.js +0 -11
  57. package/app/threeField.js.map +1 -1
  58. package/app/user.d.ts +12 -37
  59. package/app/user.js +0 -22
  60. package/app/user.js.map +1 -1
  61. package/appGroupAssignments.d.ts +3 -51
  62. package/appGroupAssignments.js +0 -48
  63. package/appGroupAssignments.js.map +1 -1
  64. package/appOauthApiScope.d.ts +3 -36
  65. package/appOauthApiScope.js +0 -33
  66. package/appOauthApiScope.js.map +1 -1
  67. package/appSamlAppSettings.d.ts +6 -44
  68. package/appSamlAppSettings.js +0 -38
  69. package/appSamlAppSettings.js.map +1 -1
  70. package/appSharedCredentials.d.ts +72 -111
  71. package/appSharedCredentials.js +0 -39
  72. package/appSharedCredentials.js.map +1 -1
  73. package/appSignonPolicy.d.ts +6 -44
  74. package/appSignonPolicy.js +0 -38
  75. package/appSignonPolicy.js.map +1 -1
  76. package/appSignonPolicyRule.d.ts +63 -322
  77. package/appSignonPolicyRule.js +0 -244
  78. package/appSignonPolicyRule.js.map +1 -1
  79. package/appUserBaseSchemaProperty.d.ts +24 -52
  80. package/appUserBaseSchemaProperty.js +0 -28
  81. package/appUserBaseSchemaProperty.js.map +1 -1
  82. package/appUserSchemaProperty.d.ts +54 -80
  83. package/appUserSchemaProperty.js +0 -26
  84. package/appUserSchemaProperty.js.map +1 -1
  85. package/auth/getServer.d.ts +11 -11
  86. package/auth/getServer.js +2 -2
  87. package/auth/getServerPolicy.d.ts +15 -9
  88. package/auth/getServerPolicy.js +2 -2
  89. package/auth/getServerPolicy.js.map +1 -1
  90. package/auth/getServerScopes.d.ts +8 -5
  91. package/auth/getServerScopes.js +2 -2
  92. package/auth/getServerScopes.js.map +1 -1
  93. package/auth/server.d.ts +13 -49
  94. package/auth/server.js +0 -27
  95. package/auth/server.js.map +1 -1
  96. package/auth/serverClaim.d.ts +18 -54
  97. package/auth/serverClaim.js +0 -27
  98. package/auth/serverClaim.js.map +1 -1
  99. package/auth/serverPolicy.d.ts +6 -43
  100. package/auth/serverPolicy.js +0 -28
  101. package/auth/serverPolicy.js.map +1 -1
  102. package/auth/serverPolicyClaim.d.ts +35 -71
  103. package/auth/serverPolicyClaim.js +4 -28
  104. package/auth/serverPolicyClaim.js.map +1 -1
  105. package/auth/serverPolicyRule.d.ts +27 -70
  106. package/auth/serverPolicyRule.js +0 -25
  107. package/auth/serverPolicyRule.js.map +1 -1
  108. package/auth/serverScope.d.ts +15 -41
  109. package/auth/serverScope.js +0 -26
  110. package/auth/serverScope.js.map +1 -1
  111. package/authServerClaimDefault.d.ts +13 -50
  112. package/authServerClaimDefault.js +0 -31
  113. package/authServerClaimDefault.js.map +1 -1
  114. package/authServerDefault.d.ts +13 -47
  115. package/authServerDefault.js +0 -25
  116. package/authServerDefault.js.map +1 -1
  117. package/authenticator.d.ts +38 -94
  118. package/authenticator.js +0 -38
  119. package/authenticator.js.map +1 -1
  120. package/behaviour.d.ts +18 -78
  121. package/behaviour.js +0 -42
  122. package/behaviour.js.map +1 -1
  123. package/brand.d.ts +17 -26
  124. package/brand.js +1 -10
  125. package/brand.js.map +1 -1
  126. package/captcha.d.ts +12 -38
  127. package/captcha.js +0 -26
  128. package/captcha.js.map +1 -1
  129. package/captchaOrgWideSettings.d.ts +6 -51
  130. package/captchaOrgWideSettings.js +0 -45
  131. package/captchaOrgWideSettings.js.map +1 -1
  132. package/domain.d.ts +13 -39
  133. package/domain.js +0 -20
  134. package/domain.js.map +1 -1
  135. package/domainCertificate.d.ts +15 -51
  136. package/domainCertificate.js +0 -36
  137. package/domainCertificate.js.map +1 -1
  138. package/domainVerification.d.ts +3 -22
  139. package/domainVerification.js +0 -19
  140. package/domainVerification.js.map +1 -1
  141. package/emailCustomization.d.ts +3 -224
  142. package/emailCustomization.js +0 -41
  143. package/emailCustomization.js.map +1 -1
  144. package/emailSender.d.ts +13 -39
  145. package/emailSender.js +0 -26
  146. package/emailSender.js.map +1 -1
  147. package/emailSenderVerification.d.ts +3 -26
  148. package/emailSenderVerification.js +0 -23
  149. package/emailSenderVerification.js.map +1 -1
  150. package/eventHook.d.ts +0 -37
  151. package/eventHook.js +0 -37
  152. package/eventHook.js.map +1 -1
  153. package/eventHookVerification.d.ts +3 -37
  154. package/eventHookVerification.js +0 -34
  155. package/eventHookVerification.js.map +1 -1
  156. package/factor/factor.d.ts +6 -23
  157. package/factor/factor.js +0 -14
  158. package/factor/factor.js.map +1 -1
  159. package/factorTotp.d.ts +12 -44
  160. package/factorTotp.js +0 -23
  161. package/factorTotp.js.map +1 -1
  162. package/getAppGroupAssignments.d.ts +6 -6
  163. package/getAppGroupAssignments.js +2 -2
  164. package/getAppSignonPolicy.d.ts +16 -6
  165. package/getAppSignonPolicy.js +8 -4
  166. package/getAppSignonPolicy.js.map +1 -1
  167. package/getAppUserAssignments.d.ts +6 -6
  168. package/getAppUserAssignments.js +2 -2
  169. package/getAuthServerClaim.d.ts +15 -12
  170. package/getAuthServerClaim.js +2 -2
  171. package/getAuthServerClaim.js.map +1 -1
  172. package/getAuthServerClaims.d.ts +8 -5
  173. package/getAuthServerClaims.js +2 -2
  174. package/getAuthServerClaims.js.map +1 -1
  175. package/getAuthenticator.d.ts +24 -26
  176. package/getAuthenticator.js +14 -22
  177. package/getAuthenticator.js.map +1 -1
  178. package/getBehaviour.d.ts +6 -8
  179. package/getBehaviour.js +2 -2
  180. package/getBehaviour.js.map +1 -1
  181. package/getBehaviours.d.ts +7 -7
  182. package/getBehaviours.js +2 -2
  183. package/getBrand.d.ts +9 -6
  184. package/getBrand.js +2 -2
  185. package/getBrand.js.map +1 -1
  186. package/getBrands.d.ts +2 -2
  187. package/getBrands.js +2 -2
  188. package/getEmailCustomization.d.ts +14 -9
  189. package/getEmailCustomization.js +2 -6
  190. package/getEmailCustomization.js.map +1 -1
  191. package/getEmailCustomizations.d.ts +11 -9
  192. package/getEmailCustomizations.js +2 -6
  193. package/getEmailCustomizations.js.map +1 -1
  194. package/getGroups.d.ts +11 -25
  195. package/getGroups.js +2 -2
  196. package/getGroups.js.map +1 -1
  197. package/getNetworkZone.d.ts +12 -12
  198. package/getNetworkZone.js +2 -2
  199. package/getRoleSubscription.d.ts +13 -35
  200. package/getRoleSubscription.js +2 -2
  201. package/getRoleSubscription.js.map +1 -1
  202. package/getTemplate.d.ts +10 -8
  203. package/getTemplate.js +2 -6
  204. package/getTemplate.js.map +1 -1
  205. package/getTemplates.d.ts +6 -7
  206. package/getTemplates.js +2 -6
  207. package/getTemplates.js.map +1 -1
  208. package/getTheme.d.ts +14 -12
  209. package/getTheme.js +2 -6
  210. package/getTheme.js.map +1 -1
  211. package/getThemes.d.ts +6 -7
  212. package/getThemes.js +2 -6
  213. package/getThemes.js.map +1 -1
  214. package/getTrustedOrigins.d.ts +7 -4
  215. package/getTrustedOrigins.js +2 -2
  216. package/getTrustedOrigins.js.map +1 -1
  217. package/getUserSecurityQuestions.d.ts +4 -8
  218. package/getUserSecurityQuestions.js +0 -4
  219. package/getUserSecurityQuestions.js.map +1 -1
  220. package/group/getEveryoneGroup.d.ts +10 -5
  221. package/group/getEveryoneGroup.js +4 -2
  222. package/group/getEveryoneGroup.js.map +1 -1
  223. package/group/getGroup.d.ts +17 -22
  224. package/group/getGroup.js +2 -2
  225. package/group/getGroup.js.map +1 -1
  226. package/group/getRule.d.ts +6 -15
  227. package/group/getRule.js +2 -2
  228. package/group/getRule.js.map +1 -1
  229. package/group/group.d.ts +9 -46
  230. package/group/group.js +0 -37
  231. package/group/group.js.map +1 -1
  232. package/group/role.d.ts +15 -101
  233. package/group/role.js +0 -26
  234. package/group/role.js.map +1 -1
  235. package/group/rule.d.ts +6 -84
  236. package/group/rule.js +0 -27
  237. package/group/rule.js.map +1 -1
  238. package/groupMemberships.d.ts +7 -42
  239. package/groupMemberships.js +1 -36
  240. package/groupMemberships.js.map +1 -1
  241. package/groupSchemaProperty.d.ts +51 -94
  242. package/groupSchemaProperty.js +0 -25
  243. package/groupSchemaProperty.js.map +1 -1
  244. package/idp/getMetadataSaml.d.ts +9 -6
  245. package/idp/getMetadataSaml.js +2 -2
  246. package/idp/getMetadataSaml.js.map +1 -1
  247. package/idp/getOidc.d.ts +9 -9
  248. package/idp/getOidc.js +2 -2
  249. package/idp/getSaml.d.ts +16 -13
  250. package/idp/getSaml.js +2 -2
  251. package/idp/getSaml.js.map +1 -1
  252. package/idp/getSocial.d.ts +8 -2
  253. package/idp/getSocial.js +2 -2
  254. package/idp/getSocial.js.map +1 -1
  255. package/idp/oidc.d.ts +12 -297
  256. package/idp/oidc.js +0 -36
  257. package/idp/oidc.js.map +1 -1
  258. package/idp/saml.d.ts +18 -284
  259. package/idp/saml.js +0 -32
  260. package/idp/saml.js.map +1 -1
  261. package/idp/samlKey.d.ts +3 -48
  262. package/idp/samlKey.js +0 -9
  263. package/idp/samlKey.js.map +1 -1
  264. package/idp/social.d.ts +18 -251
  265. package/idp/social.js +0 -32
  266. package/idp/social.js.map +1 -1
  267. package/index/emailDomain.d.ts +16 -41
  268. package/index/emailDomain.js +0 -25
  269. package/index/emailDomain.js.map +1 -1
  270. package/index/emailDomainVerification.d.ts +3 -25
  271. package/index/emailDomainVerification.js +0 -22
  272. package/index/emailDomainVerification.js.map +1 -1
  273. package/index/getDomain.d.ts +11 -14
  274. package/index/getDomain.js +2 -8
  275. package/index/getDomain.js.map +1 -1
  276. package/inline/hook.d.ts +0 -89
  277. package/inline/hook.js +0 -35
  278. package/inline/hook.js.map +1 -1
  279. package/linkDefinition.d.ts +0 -30
  280. package/linkDefinition.js +0 -30
  281. package/linkDefinition.js.map +1 -1
  282. package/linkValue.d.ts +6 -59
  283. package/linkValue.js +0 -53
  284. package/linkValue.js.map +1 -1
  285. package/network/zone.d.ts +27 -74
  286. package/network/zone.js +0 -44
  287. package/network/zone.js.map +1 -1
  288. package/orgConfiguration.d.ts +0 -25
  289. package/orgConfiguration.js +0 -25
  290. package/orgConfiguration.js.map +1 -1
  291. package/orgSupport.d.ts +3 -20
  292. package/orgSupport.js +0 -17
  293. package/orgSupport.js.map +1 -1
  294. package/package.json +2 -2
  295. package/package.json.bak +1 -1
  296. package/policy/getDefaultPolicy.d.ts +9 -7
  297. package/policy/getDefaultPolicy.js +6 -2
  298. package/policy/getDefaultPolicy.js.map +1 -1
  299. package/policy/getPolicy.d.ts +11 -10
  300. package/policy/getPolicy.js +2 -2
  301. package/policy/getPolicy.js.map +1 -1
  302. package/policy/mfa.d.ts +18 -259
  303. package/policy/mfa.js +0 -49
  304. package/policy/mfa.js.map +1 -1
  305. package/policy/password.d.ts +90 -117
  306. package/policy/password.js +0 -27
  307. package/policy/password.js.map +1 -1
  308. package/policy/ruleIdpDiscovery.d.ts +27 -149
  309. package/policy/ruleIdpDiscovery.js +0 -65
  310. package/policy/ruleIdpDiscovery.js.map +1 -1
  311. package/policy/ruleMfa.d.ts +24 -35
  312. package/policy/ruleMfa.js +0 -11
  313. package/policy/ruleMfa.js.map +1 -1
  314. package/policy/rulePassword.d.ts +33 -46
  315. package/policy/rulePassword.js +0 -13
  316. package/policy/rulePassword.js.map +1 -1
  317. package/policy/ruleSignon.d.ts +57 -170
  318. package/policy/ruleSignon.js +0 -92
  319. package/policy/ruleSignon.js.map +1 -1
  320. package/policy/signon.d.ts +15 -41
  321. package/policy/signon.js +0 -26
  322. package/policy/signon.js.map +1 -1
  323. package/policyMfaDefault.d.ts +13 -250
  324. package/policyMfaDefault.js +0 -45
  325. package/policyMfaDefault.js.map +1 -1
  326. package/policyPasswordDefault.d.ts +54 -88
  327. package/policyPasswordDefault.js +0 -22
  328. package/policyPasswordDefault.js.map +1 -1
  329. package/policyProfileEnrollment.d.ts +6 -28
  330. package/policyProfileEnrollment.js +0 -22
  331. package/policyProfileEnrollment.js.map +1 -1
  332. package/policyProfileEnrollmentApps.d.ts +5 -42
  333. package/policyProfileEnrollmentApps.js +0 -37
  334. package/policyProfileEnrollmentApps.js.map +1 -1
  335. package/policyRuleProfileEnrollment.d.ts +23 -85
  336. package/policyRuleProfileEnrollment.js +0 -62
  337. package/policyRuleProfileEnrollment.js.map +1 -1
  338. package/profile/mapping.d.ts +9 -95
  339. package/profile/mapping.js +0 -41
  340. package/profile/mapping.js.map +1 -1
  341. package/rateLimiting.d.ts +9 -43
  342. package/rateLimiting.js +0 -28
  343. package/rateLimiting.js.map +1 -1
  344. package/resourceSet.d.ts +10 -32
  345. package/resourceSet.js +1 -20
  346. package/resourceSet.js.map +1 -1
  347. package/roleSubscription.d.ts +9 -110
  348. package/roleSubscription.js +0 -26
  349. package/roleSubscription.js.map +1 -1
  350. package/securityNotificationEmails.d.ts +15 -45
  351. package/securityNotificationEmails.js +0 -30
  352. package/securityNotificationEmails.js.map +1 -1
  353. package/templateSms.d.ts +3 -47
  354. package/templateSms.js +0 -35
  355. package/templateSms.js.map +1 -1
  356. package/theme.d.ts +44 -53
  357. package/theme.js +0 -9
  358. package/theme.js.map +1 -1
  359. package/threatInsightSettings.d.ts +6 -58
  360. package/threatInsightSettings.js +0 -34
  361. package/threatInsightSettings.js.map +1 -1
  362. package/trustedorigin/origin.d.ts +12 -37
  363. package/trustedorigin/origin.js +0 -25
  364. package/trustedorigin/origin.js.map +1 -1
  365. package/types/input.d.ts +60 -227
  366. package/types/output.d.ts +56 -446
  367. package/user/getUser.d.ts +32 -104
  368. package/user/getUser.js +2 -2
  369. package/user/getUser.js.map +1 -1
  370. package/user/getUserProfileMappingSource.d.ts +9 -7
  371. package/user/getUserProfileMappingSource.js +6 -4
  372. package/user/getUserProfileMappingSource.js.map +1 -1
  373. package/user/getUserType.d.ts +7 -7
  374. package/user/getUserType.js +2 -2
  375. package/user/getUsers.d.ts +61 -57
  376. package/user/getUsers.js +30 -44
  377. package/user/getUsers.js.map +1 -1
  378. package/user/user.d.ts +117 -215
  379. package/user/user.js +0 -71
  380. package/user/user.js.map +1 -1
  381. package/user/userType.d.ts +9 -34
  382. package/user/userType.js +0 -25
  383. package/user/userType.js.map +1 -1
  384. package/userAdminRoles.d.ts +10 -41
  385. package/userAdminRoles.js +1 -29
  386. package/userAdminRoles.js.map +1 -1
  387. package/userBaseSchemaProperty.d.ts +24 -67
  388. package/userBaseSchemaProperty.js +0 -43
  389. package/userBaseSchemaProperty.js.map +1 -1
  390. package/userFactorQuestion.d.ts +14 -52
  391. package/userFactorQuestion.js +1 -39
  392. package/userFactorQuestion.js.map +1 -1
  393. package/userGroupMemberships.d.ts +4 -23
  394. package/userGroupMemberships.js +1 -20
  395. package/userGroupMemberships.js.map +1 -1
  396. package/userSchemaProperty.d.ts +57 -107
  397. package/userSchemaProperty.js +0 -32
  398. package/userSchemaProperty.js.map +1 -1
  399. package/scripts/install-pulumi-plugin.js +0 -21
@@ -1,29 +1,6 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
2
  /**
3
- * These operations allow the creation and manipulation of custom roles as custom collections of permissions.
4
- *
5
- * > **NOTE:** This an `Early Access` feature.
6
- *
7
- * ## Example Usage
8
- *
9
- * ```typescript
10
- * import * as pulumi from "@pulumi/pulumi";
11
- * import * as okta from "@pulumi/okta";
12
- *
13
- * const example = new okta.AdminRoleCustom("example", {
14
- * description: "This role allows app assignment management",
15
- * label: "AppAssignmentManager",
16
- * permissions: ["okta.apps.assignment.manage"],
17
- * });
18
- * ```
19
- *
20
- * ## Import
21
- *
22
- * Okta Custom Admin Role can be imported via the Okta ID.
23
- *
24
- * ```sh
25
- * $ pulumi import okta:index/adminRoleCustom:AdminRoleCustom example <custom role id>
26
- * ```
3
+ * Resource to manage administrative Role assignments for a User
27
4
  */
28
5
  export declare class AdminRoleCustom extends pulumi.CustomResource {
29
6
  /**
@@ -42,47 +19,15 @@ export declare class AdminRoleCustom extends pulumi.CustomResource {
42
19
  */
43
20
  static isInstance(obj: any): obj is AdminRoleCustom;
44
21
  /**
45
- * A human-readable description of the new Role.
22
+ * A human-readable description of the new Role
46
23
  */
47
24
  readonly description: pulumi.Output<string>;
48
25
  /**
49
- * The name given to the new Role.
26
+ * The name given to the new Role
50
27
  */
51
28
  readonly label: pulumi.Output<string>;
52
29
  /**
53
- * The permissions that the new Role grants. At least one
54
- * permission must be specified when creating custom role. Valid values: `"okta.authzServers.manage"`,
55
- * `"okta.authzServers.read"`,
56
- * `"okta.apps.assignment.manage"`,
57
- * `"okta.apps.manage"`,
58
- * `"okta.apps.read"`,
59
- * `"okta.customizations.manage"`,
60
- * `"okta.customizations.read"`,
61
- * `"okta.groups.appAssignment.manage"`,
62
- * `"okta.groups.create"`,
63
- * `"okta.groups.manage"`,
64
- * `"okta.groups.members.manage"`,
65
- * `"okta.groups.read"`,
66
- * `"okta.profilesources.import.run"`,
67
- * `"okta.users.appAssignment.manage"`,
68
- * `"okta.users.create"`,
69
- * `"okta.users.credentials.expirePassword"`,
70
- * `"okta.users.credentials.manage"`,
71
- * `"okta.users.credentials.resetFactors"`,
72
- * `"okta.users.credentials.resetPassword"`,
73
- * `"okta.users.groupMembership.manage"`,
74
- * `"okta.users.lifecycle.activate"`,
75
- * `"okta.users.lifecycle.clearSessions"`,
76
- * `"okta.users.lifecycle.deactivate"`,
77
- * `"okta.users.lifecycle.delete"`,
78
- * `"okta.users.lifecycle.manage"`,
79
- * `"okta.users.lifecycle.suspend"`,
80
- * `"okta.users.lifecycle.unlock"`,
81
- * `"okta.users.lifecycle.unsuspend"`,
82
- * `"okta.users.manage"`,
83
- * `"okta.users.read"`,
84
- * `"okta.users.userprofile.manage"`,
85
- * `"okta.workflows.invoke"`.,
30
+ * The permissions that the new Role grants.
86
31
  */
87
32
  readonly permissions: pulumi.Output<string[] | undefined>;
88
33
  /**
@@ -99,47 +44,15 @@ export declare class AdminRoleCustom extends pulumi.CustomResource {
99
44
  */
100
45
  export interface AdminRoleCustomState {
101
46
  /**
102
- * A human-readable description of the new Role.
47
+ * A human-readable description of the new Role
103
48
  */
104
49
  description?: pulumi.Input<string>;
105
50
  /**
106
- * The name given to the new Role.
51
+ * The name given to the new Role
107
52
  */
108
53
  label?: pulumi.Input<string>;
109
54
  /**
110
- * The permissions that the new Role grants. At least one
111
- * permission must be specified when creating custom role. Valid values: `"okta.authzServers.manage"`,
112
- * `"okta.authzServers.read"`,
113
- * `"okta.apps.assignment.manage"`,
114
- * `"okta.apps.manage"`,
115
- * `"okta.apps.read"`,
116
- * `"okta.customizations.manage"`,
117
- * `"okta.customizations.read"`,
118
- * `"okta.groups.appAssignment.manage"`,
119
- * `"okta.groups.create"`,
120
- * `"okta.groups.manage"`,
121
- * `"okta.groups.members.manage"`,
122
- * `"okta.groups.read"`,
123
- * `"okta.profilesources.import.run"`,
124
- * `"okta.users.appAssignment.manage"`,
125
- * `"okta.users.create"`,
126
- * `"okta.users.credentials.expirePassword"`,
127
- * `"okta.users.credentials.manage"`,
128
- * `"okta.users.credentials.resetFactors"`,
129
- * `"okta.users.credentials.resetPassword"`,
130
- * `"okta.users.groupMembership.manage"`,
131
- * `"okta.users.lifecycle.activate"`,
132
- * `"okta.users.lifecycle.clearSessions"`,
133
- * `"okta.users.lifecycle.deactivate"`,
134
- * `"okta.users.lifecycle.delete"`,
135
- * `"okta.users.lifecycle.manage"`,
136
- * `"okta.users.lifecycle.suspend"`,
137
- * `"okta.users.lifecycle.unlock"`,
138
- * `"okta.users.lifecycle.unsuspend"`,
139
- * `"okta.users.manage"`,
140
- * `"okta.users.read"`,
141
- * `"okta.users.userprofile.manage"`,
142
- * `"okta.workflows.invoke"`.,
55
+ * The permissions that the new Role grants.
143
56
  */
144
57
  permissions?: pulumi.Input<pulumi.Input<string>[]>;
145
58
  }
@@ -148,47 +61,15 @@ export interface AdminRoleCustomState {
148
61
  */
149
62
  export interface AdminRoleCustomArgs {
150
63
  /**
151
- * A human-readable description of the new Role.
64
+ * A human-readable description of the new Role
152
65
  */
153
66
  description: pulumi.Input<string>;
154
67
  /**
155
- * The name given to the new Role.
68
+ * The name given to the new Role
156
69
  */
157
70
  label: pulumi.Input<string>;
158
71
  /**
159
- * The permissions that the new Role grants. At least one
160
- * permission must be specified when creating custom role. Valid values: `"okta.authzServers.manage"`,
161
- * `"okta.authzServers.read"`,
162
- * `"okta.apps.assignment.manage"`,
163
- * `"okta.apps.manage"`,
164
- * `"okta.apps.read"`,
165
- * `"okta.customizations.manage"`,
166
- * `"okta.customizations.read"`,
167
- * `"okta.groups.appAssignment.manage"`,
168
- * `"okta.groups.create"`,
169
- * `"okta.groups.manage"`,
170
- * `"okta.groups.members.manage"`,
171
- * `"okta.groups.read"`,
172
- * `"okta.profilesources.import.run"`,
173
- * `"okta.users.appAssignment.manage"`,
174
- * `"okta.users.create"`,
175
- * `"okta.users.credentials.expirePassword"`,
176
- * `"okta.users.credentials.manage"`,
177
- * `"okta.users.credentials.resetFactors"`,
178
- * `"okta.users.credentials.resetPassword"`,
179
- * `"okta.users.groupMembership.manage"`,
180
- * `"okta.users.lifecycle.activate"`,
181
- * `"okta.users.lifecycle.clearSessions"`,
182
- * `"okta.users.lifecycle.deactivate"`,
183
- * `"okta.users.lifecycle.delete"`,
184
- * `"okta.users.lifecycle.manage"`,
185
- * `"okta.users.lifecycle.suspend"`,
186
- * `"okta.users.lifecycle.unlock"`,
187
- * `"okta.users.lifecycle.unsuspend"`,
188
- * `"okta.users.manage"`,
189
- * `"okta.users.read"`,
190
- * `"okta.users.userprofile.manage"`,
191
- * `"okta.workflows.invoke"`.,
72
+ * The permissions that the new Role grants.
192
73
  */
193
74
  permissions?: pulumi.Input<pulumi.Input<string>[]>;
194
75
  }
@@ -6,30 +6,7 @@ exports.AdminRoleCustom = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("./utilities");
8
8
  /**
9
- * These operations allow the creation and manipulation of custom roles as custom collections of permissions.
10
- *
11
- * > **NOTE:** This an `Early Access` feature.
12
- *
13
- * ## Example Usage
14
- *
15
- * ```typescript
16
- * import * as pulumi from "@pulumi/pulumi";
17
- * import * as okta from "@pulumi/okta";
18
- *
19
- * const example = new okta.AdminRoleCustom("example", {
20
- * description: "This role allows app assignment management",
21
- * label: "AppAssignmentManager",
22
- * permissions: ["okta.apps.assignment.manage"],
23
- * });
24
- * ```
25
- *
26
- * ## Import
27
- *
28
- * Okta Custom Admin Role can be imported via the Okta ID.
29
- *
30
- * ```sh
31
- * $ pulumi import okta:index/adminRoleCustom:AdminRoleCustom example &#60;custom role id&#62;
32
- * ```
9
+ * Resource to manage administrative Role assignments for a User
33
10
  */
34
11
  class AdminRoleCustom extends pulumi.CustomResource {
35
12
  /**
@@ -1 +1 @@
1
- {"version":3,"file":"adminRoleCustom.js","sourceRoot":"","sources":["../adminRoleCustom.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;GAyBG;AACH,MAAa,eAAgB,SAAQ,MAAM,CAAC,cAAc;IACtD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA4B,EAAE,IAAmC;QAC1H,OAAO,IAAI,eAAe,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACtE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,eAAe,CAAC,YAAY,CAAC;IAChE,CAAC;IAuDD,YAAY,IAAY,EAAE,WAAwD,EAAE,IAAmC;QACnH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA+C,CAAC;YAC9D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;SACzE;aAAM;YACH,MAAM,IAAI,GAAG,WAA8C,CAAC;YAC5D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,WAAW,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACxD,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;SACvE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,eAAe,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACpE,CAAC;;AAvGL,0CAwGC;AA1FG,gBAAgB;AACO,4BAAY,GAAG,4CAA4C,CAAC"}
1
+ {"version":3,"file":"adminRoleCustom.js","sourceRoot":"","sources":["../adminRoleCustom.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;GAEG;AACH,MAAa,eAAgB,SAAQ,MAAM,CAAC,cAAc;IACtD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA4B,EAAE,IAAmC;QAC1H,OAAO,IAAI,eAAe,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACtE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,eAAe,CAAC,YAAY,CAAC;IAChE,CAAC;IAuBD,YAAY,IAAY,EAAE,WAAwD,EAAE,IAAmC;QACnH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA+C,CAAC;YAC9D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;SACzE;aAAM;YACH,MAAM,IAAI,GAAG,WAA8C,CAAC;YAC5D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,WAAW,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACxD,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;SACvE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,eAAe,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACpE,CAAC;;AAvEL,0CAwEC;AA1DG,gBAAgB;AACO,4BAAY,GAAG,4CAA4C,CAAC"}
@@ -1,18 +1,6 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
2
  /**
3
- * This resource allows the assignment and unassignment of Custom Roles. The `members` field supports these type of resources:
4
- * - Groups
5
- * - Users
6
- *
7
- * > **NOTE:** This an `Early Access` feature.
8
- *
9
- * ## Import
10
- *
11
- * Okta Custom Admin Role Assignments can be imported via the Okta ID.
12
- *
13
- * ```sh
14
- * $ pulumi import okta:index/adminRoleCustomAssignments:AdminRoleCustomAssignments example &#60;resource_set_id&#62;/&#60;custom_role_id&#62;
15
- * ```
3
+ * Resource to manage the assignment and unassignment of Custom Roles
16
4
  */
17
5
  export declare class AdminRoleCustomAssignments extends pulumi.CustomResource {
18
6
  /**
@@ -31,16 +19,15 @@ export declare class AdminRoleCustomAssignments extends pulumi.CustomResource {
31
19
  */
32
20
  static isInstance(obj: any): obj is AdminRoleCustomAssignments;
33
21
  /**
34
- * ID of the Custom Role.
22
+ * ID of the Custom Role
35
23
  */
36
24
  readonly customRoleId: pulumi.Output<string>;
37
25
  /**
38
- * The hrefs that point to User(s) and/or Group(s) that receive the Role. At least one
39
- * permission must be specified when creating custom role.
26
+ * The hrefs that point to User(s) and/or Group(s) that receive the Role
40
27
  */
41
28
  readonly members: pulumi.Output<string[] | undefined>;
42
29
  /**
43
- * ID of the target Resource Set.
30
+ * ID of the target Resource Set
44
31
  */
45
32
  readonly resourceSetId: pulumi.Output<string>;
46
33
  /**
@@ -57,16 +44,15 @@ export declare class AdminRoleCustomAssignments extends pulumi.CustomResource {
57
44
  */
58
45
  export interface AdminRoleCustomAssignmentsState {
59
46
  /**
60
- * ID of the Custom Role.
47
+ * ID of the Custom Role
61
48
  */
62
49
  customRoleId?: pulumi.Input<string>;
63
50
  /**
64
- * The hrefs that point to User(s) and/or Group(s) that receive the Role. At least one
65
- * permission must be specified when creating custom role.
51
+ * The hrefs that point to User(s) and/or Group(s) that receive the Role
66
52
  */
67
53
  members?: pulumi.Input<pulumi.Input<string>[]>;
68
54
  /**
69
- * ID of the target Resource Set.
55
+ * ID of the target Resource Set
70
56
  */
71
57
  resourceSetId?: pulumi.Input<string>;
72
58
  }
@@ -75,16 +61,15 @@ export interface AdminRoleCustomAssignmentsState {
75
61
  */
76
62
  export interface AdminRoleCustomAssignmentsArgs {
77
63
  /**
78
- * ID of the Custom Role.
64
+ * ID of the Custom Role
79
65
  */
80
66
  customRoleId: pulumi.Input<string>;
81
67
  /**
82
- * The hrefs that point to User(s) and/or Group(s) that receive the Role. At least one
83
- * permission must be specified when creating custom role.
68
+ * The hrefs that point to User(s) and/or Group(s) that receive the Role
84
69
  */
85
70
  members?: pulumi.Input<pulumi.Input<string>[]>;
86
71
  /**
87
- * ID of the target Resource Set.
72
+ * ID of the target Resource Set
88
73
  */
89
74
  resourceSetId: pulumi.Input<string>;
90
75
  }
@@ -6,19 +6,7 @@ exports.AdminRoleCustomAssignments = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("./utilities");
8
8
  /**
9
- * This resource allows the assignment and unassignment of Custom Roles. The `members` field supports these type of resources:
10
- * - Groups
11
- * - Users
12
- *
13
- * > **NOTE:** This an `Early Access` feature.
14
- *
15
- * ## Import
16
- *
17
- * Okta Custom Admin Role Assignments can be imported via the Okta ID.
18
- *
19
- * ```sh
20
- * $ pulumi import okta:index/adminRoleCustomAssignments:AdminRoleCustomAssignments example &#60;resource_set_id&#62;/&#60;custom_role_id&#62;
21
- * ```
9
+ * Resource to manage the assignment and unassignment of Custom Roles
22
10
  */
23
11
  class AdminRoleCustomAssignments extends pulumi.CustomResource {
24
12
  /**
@@ -1 +1 @@
1
- {"version":3,"file":"adminRoleCustomAssignments.js","sourceRoot":"","sources":["../adminRoleCustomAssignments.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;GAcG;AACH,MAAa,0BAA2B,SAAQ,MAAM,CAAC,cAAc;IACjE;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAuC,EAAE,IAAmC;QACrI,OAAO,IAAI,0BAA0B,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACjF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,0BAA0B,CAAC,YAAY,CAAC;IAC3E,CAAC;IAwBD,YAAY,IAAY,EAAE,WAA8E,EAAE,IAAmC;QACzI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA0D,CAAC;YACzE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7E;aAAM;YACH,MAAM,IAAI,GAAG,WAAyD,CAAC;YACvE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,YAAY,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACzD,MAAM,IAAI,KAAK,CAAC,0CAA0C,CAAC,CAAC;aAC/D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,aAAa,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1D,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;aAChE;YACD,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3E;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,0BAA0B,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC/E,CAAC;;AAxEL,gEAyEC;AA3DG,gBAAgB;AACO,uCAAY,GAAG,kEAAkE,CAAC"}
1
+ {"version":3,"file":"adminRoleCustomAssignments.js","sourceRoot":"","sources":["../adminRoleCustomAssignments.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;GAEG;AACH,MAAa,0BAA2B,SAAQ,MAAM,CAAC,cAAc;IACjE;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAuC,EAAE,IAAmC;QACrI,OAAO,IAAI,0BAA0B,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACjF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,0BAA0B,CAAC,YAAY,CAAC;IAC3E,CAAC;IAuBD,YAAY,IAAY,EAAE,WAA8E,EAAE,IAAmC;QACzI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA0D,CAAC;YACzE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7E;aAAM;YACH,MAAM,IAAI,GAAG,WAAyD,CAAC;YACvE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,YAAY,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACzD,MAAM,IAAI,KAAK,CAAC,0CAA0C,CAAC,CAAC;aAC/D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,aAAa,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1D,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;aAChE;YACD,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3E;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,0BAA0B,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC/E,CAAC;;AAvEL,gEAwEC;AA1DG,gBAAgB;AACO,uCAAY,GAAG,kEAAkE,CAAC"}
@@ -1,34 +1,4 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
- /**
3
- * Manages targets for administrator roles.
4
- *
5
- * This resource allows you to define permissions for admin roles into a smaller subset of Groups or Apps within your org.
6
- * You can define admin roles to target Groups, Applications, and Application Instances.
7
- *
8
- * ## Example Usage
9
- *
10
- * ```typescript
11
- * import * as pulumi from "@pulumi/pulumi";
12
- * import * as okta from "@pulumi/okta";
13
- *
14
- * const example = new okta.AdminRoleTargets("example", {
15
- * apps: [
16
- * "oidc_client.<app_id>",
17
- * "facebook",
18
- * ],
19
- * roleType: "APP_ADMIN",
20
- * userId: "<user_id>",
21
- * });
22
- * ```
23
- *
24
- * ## Import
25
- *
26
- * Okta Admin Role Targets can be imported via the Okta ID.
27
- *
28
- * ```sh
29
- * $ pulumi import okta:index/adminRoleTargets:AdminRoleTargets example &#60;user id&#62;/&#60;role type&#62;
30
- * ```
31
- */
32
2
  export declare class AdminRoleTargets extends pulumi.CustomResource {
33
3
  /**
34
4
  * Get an existing AdminRoleTargets resource's state with the given name, ID, and optional extra
@@ -46,23 +16,23 @@ export declare class AdminRoleTargets extends pulumi.CustomResource {
46
16
  */
47
17
  static isInstance(obj: any): obj is AdminRoleTargets;
48
18
  /**
49
- * List of app names (name represents set of app instances) or a combination of app name and app instance ID (like 'salesforce' or 'facebook.0oapsqQ6dv19pqyEo0g3').
19
+ * List of app names (name represents set of app instances) or a combination of app name and app instance ID (like 'salesforce' or 'facebook.0oapsqQ6dv19pqyEo0g3')
50
20
  */
51
21
  readonly apps: pulumi.Output<string[] | undefined>;
52
22
  /**
53
- * List of group IDs. Conflicts with `apps`.
23
+ * List of group IDs
54
24
  */
55
25
  readonly groups: pulumi.Output<string[] | undefined>;
56
26
  /**
57
- * Role ID.
27
+ * ID of a role
58
28
  */
59
29
  readonly roleId: pulumi.Output<string>;
60
30
  /**
61
- * Name of the role associated with the user. See [API Docs](https://developer.okta.com/docs/reference/api/roles/#role-types).
31
+ * Type of the role that is assigned to the user and supports optional targets
62
32
  */
63
33
  readonly roleType: pulumi.Output<string>;
64
34
  /**
65
- * ID of the user.
35
+ * User associated with the role
66
36
  */
67
37
  readonly userId: pulumi.Output<string>;
68
38
  /**
@@ -79,23 +49,23 @@ export declare class AdminRoleTargets extends pulumi.CustomResource {
79
49
  */
80
50
  export interface AdminRoleTargetsState {
81
51
  /**
82
- * List of app names (name represents set of app instances) or a combination of app name and app instance ID (like 'salesforce' or 'facebook.0oapsqQ6dv19pqyEo0g3').
52
+ * List of app names (name represents set of app instances) or a combination of app name and app instance ID (like 'salesforce' or 'facebook.0oapsqQ6dv19pqyEo0g3')
83
53
  */
84
54
  apps?: pulumi.Input<pulumi.Input<string>[]>;
85
55
  /**
86
- * List of group IDs. Conflicts with `apps`.
56
+ * List of group IDs
87
57
  */
88
58
  groups?: pulumi.Input<pulumi.Input<string>[]>;
89
59
  /**
90
- * Role ID.
60
+ * ID of a role
91
61
  */
92
62
  roleId?: pulumi.Input<string>;
93
63
  /**
94
- * Name of the role associated with the user. See [API Docs](https://developer.okta.com/docs/reference/api/roles/#role-types).
64
+ * Type of the role that is assigned to the user and supports optional targets
95
65
  */
96
66
  roleType?: pulumi.Input<string>;
97
67
  /**
98
- * ID of the user.
68
+ * User associated with the role
99
69
  */
100
70
  userId?: pulumi.Input<string>;
101
71
  }
@@ -104,19 +74,19 @@ export interface AdminRoleTargetsState {
104
74
  */
105
75
  export interface AdminRoleTargetsArgs {
106
76
  /**
107
- * List of app names (name represents set of app instances) or a combination of app name and app instance ID (like 'salesforce' or 'facebook.0oapsqQ6dv19pqyEo0g3').
77
+ * List of app names (name represents set of app instances) or a combination of app name and app instance ID (like 'salesforce' or 'facebook.0oapsqQ6dv19pqyEo0g3')
108
78
  */
109
79
  apps?: pulumi.Input<pulumi.Input<string>[]>;
110
80
  /**
111
- * List of group IDs. Conflicts with `apps`.
81
+ * List of group IDs
112
82
  */
113
83
  groups?: pulumi.Input<pulumi.Input<string>[]>;
114
84
  /**
115
- * Name of the role associated with the user. See [API Docs](https://developer.okta.com/docs/reference/api/roles/#role-types).
85
+ * Type of the role that is assigned to the user and supports optional targets
116
86
  */
117
87
  roleType: pulumi.Input<string>;
118
88
  /**
119
- * ID of the user.
89
+ * User associated with the role
120
90
  */
121
91
  userId: pulumi.Input<string>;
122
92
  }
@@ -5,36 +5,6 @@ Object.defineProperty(exports, "__esModule", { value: true });
5
5
  exports.AdminRoleTargets = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("./utilities");
8
- /**
9
- * Manages targets for administrator roles.
10
- *
11
- * This resource allows you to define permissions for admin roles into a smaller subset of Groups or Apps within your org.
12
- * You can define admin roles to target Groups, Applications, and Application Instances.
13
- *
14
- * ## Example Usage
15
- *
16
- * ```typescript
17
- * import * as pulumi from "@pulumi/pulumi";
18
- * import * as okta from "@pulumi/okta";
19
- *
20
- * const example = new okta.AdminRoleTargets("example", {
21
- * apps: [
22
- * "oidc_client.<app_id>",
23
- * "facebook",
24
- * ],
25
- * roleType: "APP_ADMIN",
26
- * userId: "<user_id>",
27
- * });
28
- * ```
29
- *
30
- * ## Import
31
- *
32
- * Okta Admin Role Targets can be imported via the Okta ID.
33
- *
34
- * ```sh
35
- * $ pulumi import okta:index/adminRoleTargets:AdminRoleTargets example &#60;user id&#62;/&#60;role type&#62;
36
- * ```
37
- */
38
8
  class AdminRoleTargets extends pulumi.CustomResource {
39
9
  /**
40
10
  * Get an existing AdminRoleTargets resource's state with the given name, ID, and optional extra
@@ -1 +1 @@
1
- {"version":3,"file":"adminRoleTargets.js","sourceRoot":"","sources":["../adminRoleTargets.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA6BG;AACH,MAAa,gBAAiB,SAAQ,MAAM,CAAC,cAAc;IACvD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA6B,EAAE,IAAmC;QAC3H,OAAO,IAAI,gBAAgB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACvE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,gBAAgB,CAAC,YAAY,CAAC;IACjE,CAAC;IA+BD,YAAY,IAAY,EAAE,WAA0D,EAAE,IAAmC;QACrH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAgD,CAAC;YAC/D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAA+C,CAAC;YAC7D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,QAAQ,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAChD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,gBAAgB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACrE,CAAC;;AAnFL,4CAoFC;AAtEG,gBAAgB;AACO,6BAAY,GAAG,8CAA8C,CAAC"}
1
+ {"version":3,"file":"adminRoleTargets.js","sourceRoot":"","sources":["../adminRoleTargets.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC,MAAa,gBAAiB,SAAQ,MAAM,CAAC,cAAc;IACvD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA6B,EAAE,IAAmC;QAC3H,OAAO,IAAI,gBAAgB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACvE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,gBAAgB,CAAC,YAAY,CAAC;IACjE,CAAC;IA+BD,YAAY,IAAY,EAAE,WAA0D,EAAE,IAAmC;QACrH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAgD,CAAC;YAC/D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAA+C,CAAC;YAC7D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,QAAQ,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAChD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,gBAAgB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACrE,CAAC;;AAnFL,4CAoFC;AAtEG,gBAAgB;AACO,6BAAY,GAAG,8CAA8C,CAAC"}
@@ -1,25 +1,6 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
2
  /**
3
- * Assigns an access policy (colloquially known as a sign-on policy and/or an
4
- * authentication policy) to an application. This resource does not perform true
5
- * delete as it will not delete an application and the app's access policy can't be
6
- * removed; it can only be changed to a different access policy. This resource is
7
- * only logical within the context of an application therefore `appId` is
8
- * immutable once set. Use this resource to manage assigning an access policy to an
9
- * application. It will assign the given `policyId` to the application at creation
10
- * and during update.
11
- *
12
- * > Inside the product a sign-on policy is referenced as an _authentication
13
- * policy_, in the public API the policy is of type
14
- * [`ACCESS_POLICY`](https://developer.okta.com/docs/reference/api/policy/#policy-object).
15
- *
16
- * ## Import
17
- *
18
- * An Okta App's Access Policy Assignment can be imported via its associated Application ID.
19
- *
20
- * ```sh
21
- * $ pulumi import okta:app/accessPolicyAssignment:AccessPolicyAssignment example &#60;app id&#62;
22
- * ```
3
+ * Manages assignment of Access Policy to an Application
23
4
  */
24
5
  export declare class AccessPolicyAssignment extends pulumi.CustomResource {
25
6
  /**
@@ -6,26 +6,7 @@ exports.AccessPolicyAssignment = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("../utilities");
8
8
  /**
9
- * Assigns an access policy (colloquially known as a sign-on policy and/or an
10
- * authentication policy) to an application. This resource does not perform true
11
- * delete as it will not delete an application and the app's access policy can't be
12
- * removed; it can only be changed to a different access policy. This resource is
13
- * only logical within the context of an application therefore `appId` is
14
- * immutable once set. Use this resource to manage assigning an access policy to an
15
- * application. It will assign the given `policyId` to the application at creation
16
- * and during update.
17
- *
18
- * > Inside the product a sign-on policy is referenced as an _authentication
19
- * policy_, in the public API the policy is of type
20
- * [`ACCESS_POLICY`](https://developer.okta.com/docs/reference/api/policy/#policy-object).
21
- *
22
- * ## Import
23
- *
24
- * An Okta App's Access Policy Assignment can be imported via its associated Application ID.
25
- *
26
- * ```sh
27
- * $ pulumi import okta:app/accessPolicyAssignment:AccessPolicyAssignment example &#60;app id&#62;
28
- * ```
9
+ * Manages assignment of Access Policy to an Application
29
10
  */
30
11
  class AccessPolicyAssignment extends pulumi.CustomResource {
31
12
  /**
@@ -1 +1 @@
1
- {"version":3,"file":"accessPolicyAssignment.js","sourceRoot":"","sources":["../../app/accessPolicyAssignment.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;GAqBG;AACH,MAAa,sBAAuB,SAAQ,MAAM,CAAC,cAAc;IAC7D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAmC,EAAE,IAAmC;QACjI,OAAO,IAAI,sBAAsB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC7E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,sBAAsB,CAAC,YAAY,CAAC;IACvE,CAAC;IAmBD,YAAY,IAAY,EAAE,WAAsE,EAAE,IAAmC;QACjI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAsD,CAAC;YACrE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SACnE;aAAM;YACH,MAAM,IAAI,GAAG,WAAqD,CAAC;YACnE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SACjE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,sBAAsB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC3E,CAAC;;AAjEL,wDAkEC;AApDG,gBAAgB;AACO,mCAAY,GAAG,wDAAwD,CAAC"}
1
+ {"version":3,"file":"accessPolicyAssignment.js","sourceRoot":"","sources":["../../app/accessPolicyAssignment.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;GAEG;AACH,MAAa,sBAAuB,SAAQ,MAAM,CAAC,cAAc;IAC7D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAmC,EAAE,IAAmC;QACjI,OAAO,IAAI,sBAAsB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC7E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,sBAAsB,CAAC,YAAY,CAAC;IACvE,CAAC;IAmBD,YAAY,IAAY,EAAE,WAAsE,EAAE,IAAmC;QACjI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAsD,CAAC;YACrE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SACnE;aAAM;YACH,MAAM,IAAI,GAAG,WAAqD,CAAC;YACnE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SACjE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,sBAAsB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC3E,CAAC;;AAjEL,wDAkEC;AApDG,gBAAgB;AACO,mCAAY,GAAG,wDAAwD,CAAC"}