@pulumi/okta 4.6.2 → 4.6.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (397) hide show
  1. package/adminRoleCustom.d.ts +129 -10
  2. package/adminRoleCustom.js +24 -1
  3. package/adminRoleCustom.js.map +1 -1
  4. package/adminRoleCustomAssignments.d.ts +25 -10
  5. package/adminRoleCustomAssignments.js +13 -1
  6. package/adminRoleCustomAssignments.js.map +1 -1
  7. package/adminRoleTargets.d.ts +44 -14
  8. package/adminRoleTargets.js +30 -0
  9. package/adminRoleTargets.js.map +1 -1
  10. package/app/accessPolicyAssignment.d.ts +20 -1
  11. package/app/accessPolicyAssignment.js +20 -1
  12. package/app/accessPolicyAssignment.js.map +1 -1
  13. package/app/autoLogin.d.ts +119 -72
  14. package/app/autoLogin.js +47 -0
  15. package/app/autoLogin.js.map +1 -1
  16. package/app/basicAuth.d.ts +66 -38
  17. package/app/basicAuth.js +28 -0
  18. package/app/basicAuth.js.map +1 -1
  19. package/app/bookmark.d.ts +71 -35
  20. package/app/bookmark.js +27 -0
  21. package/app/bookmark.js.map +1 -1
  22. package/app/getApp.d.ts +25 -58
  23. package/app/getApp.js +2 -2
  24. package/app/getApp.js.map +1 -1
  25. package/app/getMetadataSaml.d.ts +5 -11
  26. package/app/getMetadataSaml.js +2 -2
  27. package/app/getMetadataSaml.js.map +1 -1
  28. package/app/getOauth.d.ts +34 -62
  29. package/app/getOauth.js +2 -2
  30. package/app/getOauth.js.map +1 -1
  31. package/app/getSaml.d.ts +55 -75
  32. package/app/getSaml.js +2 -2
  33. package/app/getSaml.js.map +1 -1
  34. package/app/groupAssignment.d.ts +15 -6
  35. package/app/groupAssignment.js +9 -0
  36. package/app/groupAssignment.js.map +1 -1
  37. package/app/oauth.d.ts +301 -123
  38. package/app/oauth.js +82 -0
  39. package/app/oauth.js.map +1 -1
  40. package/app/oauthPostLogoutRedirectUri.d.ts +38 -3
  41. package/app/oauthPostLogoutRedirectUri.js +35 -0
  42. package/app/oauthPostLogoutRedirectUri.js.map +1 -1
  43. package/app/oauthRedirectUri.d.ts +37 -3
  44. package/app/oauthRedirectUri.js +34 -0
  45. package/app/oauthRedirectUri.js.map +1 -1
  46. package/app/saml.d.ts +303 -133
  47. package/app/saml.js +161 -0
  48. package/app/saml.js.map +1 -1
  49. package/app/securePasswordStore.d.ts +109 -79
  50. package/app/securePasswordStore.js +30 -0
  51. package/app/securePasswordStore.js.map +1 -1
  52. package/app/swa.d.ts +102 -72
  53. package/app/swa.js +30 -0
  54. package/app/swa.js.map +1 -1
  55. package/app/threeField.d.ts +87 -72
  56. package/app/threeField.js +15 -0
  57. package/app/threeField.js.map +1 -1
  58. package/app/user.d.ts +37 -12
  59. package/app/user.js +22 -0
  60. package/app/user.js.map +1 -1
  61. package/appGroupAssignments.d.ts +40 -3
  62. package/appGroupAssignments.js +37 -0
  63. package/appGroupAssignments.js.map +1 -1
  64. package/appOauthApiScope.d.ts +36 -3
  65. package/appOauthApiScope.js +33 -0
  66. package/appOauthApiScope.js.map +1 -1
  67. package/appSamlAppSettings.d.ts +44 -6
  68. package/appSamlAppSettings.js +38 -0
  69. package/appSamlAppSettings.js.map +1 -1
  70. package/appSharedCredentials.d.ts +115 -72
  71. package/appSharedCredentials.js +43 -0
  72. package/appSharedCredentials.js.map +1 -1
  73. package/appSignonPolicy.d.ts +44 -6
  74. package/appSignonPolicy.js +38 -0
  75. package/appSignonPolicy.js.map +1 -1
  76. package/appSignonPolicyRule.d.ts +327 -68
  77. package/appSignonPolicyRule.js +244 -0
  78. package/appSignonPolicyRule.js.map +1 -1
  79. package/appUserBaseSchemaProperty.d.ts +52 -24
  80. package/appUserBaseSchemaProperty.js +28 -0
  81. package/appUserBaseSchemaProperty.js.map +1 -1
  82. package/appUserSchemaProperty.d.ts +80 -54
  83. package/appUserSchemaProperty.js +26 -0
  84. package/appUserSchemaProperty.js.map +1 -1
  85. package/auth/getServer.d.ts +11 -11
  86. package/auth/getServer.js +2 -2
  87. package/auth/getServerPolicy.d.ts +9 -15
  88. package/auth/getServerPolicy.js +2 -2
  89. package/auth/getServerPolicy.js.map +1 -1
  90. package/auth/getServerScopes.d.ts +5 -8
  91. package/auth/getServerScopes.js +2 -2
  92. package/auth/getServerScopes.js.map +1 -1
  93. package/auth/server.d.ts +49 -13
  94. package/auth/server.js +27 -0
  95. package/auth/server.js.map +1 -1
  96. package/auth/serverClaim.d.ts +54 -18
  97. package/auth/serverClaim.js +27 -0
  98. package/auth/serverClaim.js.map +1 -1
  99. package/auth/serverPolicy.d.ts +43 -6
  100. package/auth/serverPolicy.js +28 -0
  101. package/auth/serverPolicy.js.map +1 -1
  102. package/auth/serverPolicyRule.d.ts +72 -29
  103. package/auth/serverPolicyRule.js +25 -0
  104. package/auth/serverPolicyRule.js.map +1 -1
  105. package/auth/serverScope.d.ts +41 -15
  106. package/auth/serverScope.js +26 -0
  107. package/auth/serverScope.js.map +1 -1
  108. package/authServerClaimDefault.d.ts +50 -13
  109. package/authServerClaimDefault.js +31 -0
  110. package/authServerClaimDefault.js.map +1 -1
  111. package/authServerDefault.d.ts +47 -13
  112. package/authServerDefault.js +25 -0
  113. package/authServerDefault.js.map +1 -1
  114. package/authenticator.d.ts +94 -38
  115. package/authenticator.js +38 -0
  116. package/authenticator.js.map +1 -1
  117. package/behaviour.d.ts +78 -18
  118. package/behaviour.js +42 -0
  119. package/behaviour.js.map +1 -1
  120. package/brand.d.ts +28 -19
  121. package/brand.js +10 -1
  122. package/brand.js.map +1 -1
  123. package/captcha.d.ts +38 -12
  124. package/captcha.js +26 -0
  125. package/captcha.js.map +1 -1
  126. package/captchaOrgWideSettings.d.ts +51 -6
  127. package/captchaOrgWideSettings.js +45 -0
  128. package/captchaOrgWideSettings.js.map +1 -1
  129. package/domain.d.ts +39 -13
  130. package/domain.js +20 -0
  131. package/domain.js.map +1 -1
  132. package/domainCertificate.d.ts +63 -15
  133. package/domainCertificate.js +48 -0
  134. package/domainCertificate.js.map +1 -1
  135. package/domainVerification.d.ts +22 -3
  136. package/domainVerification.js +19 -0
  137. package/domainVerification.js.map +1 -1
  138. package/emailCustomization.d.ts +224 -3
  139. package/emailCustomization.js +41 -0
  140. package/emailCustomization.js.map +1 -1
  141. package/emailSender.d.ts +39 -13
  142. package/emailSender.js +26 -0
  143. package/emailSender.js.map +1 -1
  144. package/emailSenderVerification.d.ts +26 -3
  145. package/emailSenderVerification.js +23 -0
  146. package/emailSenderVerification.js.map +1 -1
  147. package/eventHook.d.ts +37 -0
  148. package/eventHook.js +37 -0
  149. package/eventHook.js.map +1 -1
  150. package/eventHookVerification.d.ts +37 -3
  151. package/eventHookVerification.js +34 -0
  152. package/eventHookVerification.js.map +1 -1
  153. package/factor/factor.d.ts +23 -6
  154. package/factor/factor.js +14 -0
  155. package/factor/factor.js.map +1 -1
  156. package/factorTotp.d.ts +44 -12
  157. package/factorTotp.js +23 -0
  158. package/factorTotp.js.map +1 -1
  159. package/getAppGroupAssignments.d.ts +6 -6
  160. package/getAppGroupAssignments.js +2 -2
  161. package/getAppSignonPolicy.d.ts +6 -16
  162. package/getAppSignonPolicy.js +4 -8
  163. package/getAppSignonPolicy.js.map +1 -1
  164. package/getAppUserAssignments.d.ts +6 -6
  165. package/getAppUserAssignments.js +2 -2
  166. package/getAuthServerClaim.d.ts +12 -15
  167. package/getAuthServerClaim.js +2 -2
  168. package/getAuthServerClaim.js.map +1 -1
  169. package/getAuthServerClaims.d.ts +5 -8
  170. package/getAuthServerClaims.js +2 -2
  171. package/getAuthServerClaims.js.map +1 -1
  172. package/getAuthenticator.d.ts +26 -24
  173. package/getAuthenticator.js +22 -14
  174. package/getAuthenticator.js.map +1 -1
  175. package/getBehaviour.d.ts +8 -6
  176. package/getBehaviour.js +2 -2
  177. package/getBehaviour.js.map +1 -1
  178. package/getBehaviours.d.ts +7 -7
  179. package/getBehaviours.js +2 -2
  180. package/getBrand.d.ts +6 -9
  181. package/getBrand.js +2 -2
  182. package/getBrand.js.map +1 -1
  183. package/getBrands.d.ts +2 -2
  184. package/getBrands.js +2 -2
  185. package/getEmailCustomization.d.ts +9 -14
  186. package/getEmailCustomization.js +6 -2
  187. package/getEmailCustomization.js.map +1 -1
  188. package/getEmailCustomizations.d.ts +9 -11
  189. package/getEmailCustomizations.js +6 -2
  190. package/getEmailCustomizations.js.map +1 -1
  191. package/getGroups.d.ts +25 -11
  192. package/getGroups.js +2 -2
  193. package/getGroups.js.map +1 -1
  194. package/getNetworkZone.d.ts +12 -12
  195. package/getNetworkZone.js +2 -2
  196. package/getRoleSubscription.d.ts +35 -13
  197. package/getRoleSubscription.js +2 -2
  198. package/getRoleSubscription.js.map +1 -1
  199. package/getTemplate.d.ts +8 -10
  200. package/getTemplate.js +6 -2
  201. package/getTemplate.js.map +1 -1
  202. package/getTemplates.d.ts +7 -6
  203. package/getTemplates.js +6 -2
  204. package/getTemplates.js.map +1 -1
  205. package/getTheme.d.ts +12 -14
  206. package/getTheme.js +6 -2
  207. package/getTheme.js.map +1 -1
  208. package/getThemes.d.ts +7 -6
  209. package/getThemes.js +6 -2
  210. package/getThemes.js.map +1 -1
  211. package/getTrustedOrigins.d.ts +4 -7
  212. package/getTrustedOrigins.js +2 -2
  213. package/getTrustedOrigins.js.map +1 -1
  214. package/getUserSecurityQuestions.d.ts +8 -4
  215. package/getUserSecurityQuestions.js +4 -0
  216. package/getUserSecurityQuestions.js.map +1 -1
  217. package/group/getEveryoneGroup.d.ts +5 -10
  218. package/group/getEveryoneGroup.js +2 -4
  219. package/group/getEveryoneGroup.js.map +1 -1
  220. package/group/getGroup.d.ts +26 -17
  221. package/group/getGroup.js +2 -2
  222. package/group/getGroup.js.map +1 -1
  223. package/group/getRule.d.ts +15 -6
  224. package/group/getRule.js +2 -2
  225. package/group/getRule.js.map +1 -1
  226. package/group/group.d.ts +46 -9
  227. package/group/group.js +37 -0
  228. package/group/group.js.map +1 -1
  229. package/group/role.d.ts +101 -15
  230. package/group/role.js +26 -0
  231. package/group/role.js.map +1 -1
  232. package/group/rule.d.ts +80 -6
  233. package/group/rule.js +23 -0
  234. package/group/rule.js.map +1 -1
  235. package/groupMemberships.d.ts +48 -7
  236. package/groupMemberships.js +42 -1
  237. package/groupMemberships.js.map +1 -1
  238. package/groupSchemaProperty.d.ts +94 -51
  239. package/groupSchemaProperty.js +25 -0
  240. package/groupSchemaProperty.js.map +1 -1
  241. package/idp/getMetadataSaml.d.ts +6 -9
  242. package/idp/getMetadataSaml.js +2 -2
  243. package/idp/getMetadataSaml.js.map +1 -1
  244. package/idp/getOidc.d.ts +9 -9
  245. package/idp/getOidc.js +2 -2
  246. package/idp/getSaml.d.ts +13 -16
  247. package/idp/getSaml.js +2 -2
  248. package/idp/getSaml.js.map +1 -1
  249. package/idp/getSocial.d.ts +2 -8
  250. package/idp/getSocial.js +2 -2
  251. package/idp/getSocial.js.map +1 -1
  252. package/idp/oidc.d.ts +297 -12
  253. package/idp/oidc.js +36 -0
  254. package/idp/oidc.js.map +1 -1
  255. package/idp/saml.d.ts +284 -18
  256. package/idp/saml.js +32 -0
  257. package/idp/saml.js.map +1 -1
  258. package/idp/samlKey.d.ts +48 -3
  259. package/idp/samlKey.js +9 -0
  260. package/idp/samlKey.js.map +1 -1
  261. package/idp/social.d.ts +251 -18
  262. package/idp/social.js +32 -0
  263. package/idp/social.js.map +1 -1
  264. package/index/emailDomain.d.ts +41 -16
  265. package/index/emailDomain.js +25 -0
  266. package/index/emailDomain.js.map +1 -1
  267. package/index/emailDomainVerification.d.ts +25 -3
  268. package/index/emailDomainVerification.js +22 -0
  269. package/index/emailDomainVerification.js.map +1 -1
  270. package/index/getDomain.d.ts +14 -11
  271. package/index/getDomain.js +8 -2
  272. package/index/getDomain.js.map +1 -1
  273. package/inline/hook.d.ts +89 -0
  274. package/inline/hook.js +35 -0
  275. package/inline/hook.js.map +1 -1
  276. package/linkDefinition.d.ts +30 -0
  277. package/linkDefinition.js +30 -0
  278. package/linkDefinition.js.map +1 -1
  279. package/linkValue.d.ts +59 -6
  280. package/linkValue.js +53 -0
  281. package/linkValue.js.map +1 -1
  282. package/network/zone.d.ts +74 -27
  283. package/network/zone.js +44 -0
  284. package/network/zone.js.map +1 -1
  285. package/orgConfiguration.d.ts +25 -0
  286. package/orgConfiguration.js +25 -0
  287. package/orgConfiguration.js.map +1 -1
  288. package/orgSupport.d.ts +20 -3
  289. package/orgSupport.js +17 -0
  290. package/orgSupport.js.map +1 -1
  291. package/package.json +1 -1
  292. package/policy/getDefaultPolicy.d.ts +7 -9
  293. package/policy/getDefaultPolicy.js +2 -6
  294. package/policy/getDefaultPolicy.js.map +1 -1
  295. package/policy/getPolicy.d.ts +10 -11
  296. package/policy/getPolicy.js +2 -2
  297. package/policy/getPolicy.js.map +1 -1
  298. package/policy/mfa.d.ts +259 -18
  299. package/policy/mfa.js +49 -0
  300. package/policy/mfa.js.map +1 -1
  301. package/policy/password.d.ts +117 -90
  302. package/policy/password.js +27 -0
  303. package/policy/password.js.map +1 -1
  304. package/policy/ruleIdpDiscovery.d.ts +149 -27
  305. package/policy/ruleIdpDiscovery.js +65 -0
  306. package/policy/ruleIdpDiscovery.js.map +1 -1
  307. package/policy/ruleMfa.d.ts +35 -24
  308. package/policy/ruleMfa.js +11 -0
  309. package/policy/ruleMfa.js.map +1 -1
  310. package/policy/rulePassword.d.ts +46 -33
  311. package/policy/rulePassword.js +13 -0
  312. package/policy/rulePassword.js.map +1 -1
  313. package/policy/ruleSignon.d.ts +170 -57
  314. package/policy/ruleSignon.js +92 -0
  315. package/policy/ruleSignon.js.map +1 -1
  316. package/policy/signon.d.ts +41 -15
  317. package/policy/signon.js +26 -0
  318. package/policy/signon.js.map +1 -1
  319. package/policyMfaDefault.d.ts +250 -13
  320. package/policyMfaDefault.js +45 -0
  321. package/policyMfaDefault.js.map +1 -1
  322. package/policyPasswordDefault.d.ts +88 -54
  323. package/policyPasswordDefault.js +22 -0
  324. package/policyPasswordDefault.js.map +1 -1
  325. package/policyProfileEnrollment.d.ts +28 -6
  326. package/policyProfileEnrollment.js +22 -0
  327. package/policyProfileEnrollment.js.map +1 -1
  328. package/policyProfileEnrollmentApps.d.ts +42 -5
  329. package/policyProfileEnrollmentApps.js +37 -0
  330. package/policyProfileEnrollmentApps.js.map +1 -1
  331. package/policyRuleProfileEnrollment.d.ts +88 -26
  332. package/policyRuleProfileEnrollment.js +62 -0
  333. package/policyRuleProfileEnrollment.js.map +1 -1
  334. package/profile/mapping.d.ts +95 -9
  335. package/profile/mapping.js +41 -0
  336. package/profile/mapping.js.map +1 -1
  337. package/rateLimiting.d.ts +43 -9
  338. package/rateLimiting.js +28 -0
  339. package/rateLimiting.js.map +1 -1
  340. package/resourceSet.d.ts +32 -10
  341. package/resourceSet.js +20 -1
  342. package/resourceSet.js.map +1 -1
  343. package/roleSubscription.d.ts +110 -9
  344. package/roleSubscription.js +26 -0
  345. package/roleSubscription.js.map +1 -1
  346. package/securityNotificationEmails.d.ts +45 -15
  347. package/securityNotificationEmails.js +30 -0
  348. package/securityNotificationEmails.js.map +1 -1
  349. package/templateSms.d.ts +47 -3
  350. package/templateSms.js +35 -0
  351. package/templateSms.js.map +1 -1
  352. package/theme.d.ts +59 -44
  353. package/theme.js +15 -0
  354. package/theme.js.map +1 -1
  355. package/threatInsightSettings.d.ts +58 -6
  356. package/threatInsightSettings.js +34 -0
  357. package/threatInsightSettings.js.map +1 -1
  358. package/trustedorigin/origin.d.ts +37 -12
  359. package/trustedorigin/origin.js +25 -0
  360. package/trustedorigin/origin.js.map +1 -1
  361. package/types/input.d.ts +227 -60
  362. package/types/output.d.ts +446 -56
  363. package/user/getUser.d.ts +104 -32
  364. package/user/getUser.js +2 -2
  365. package/user/getUser.js.map +1 -1
  366. package/user/getUserProfileMappingSource.d.ts +7 -9
  367. package/user/getUserProfileMappingSource.js +4 -6
  368. package/user/getUserProfileMappingSource.js.map +1 -1
  369. package/user/getUserType.d.ts +7 -7
  370. package/user/getUserType.js +2 -2
  371. package/user/getUsers.d.ts +57 -61
  372. package/user/getUsers.js +44 -30
  373. package/user/getUsers.js.map +1 -1
  374. package/user/user.d.ts +215 -117
  375. package/user/user.js +71 -0
  376. package/user/user.js.map +1 -1
  377. package/user/userType.d.ts +34 -9
  378. package/user/userType.js +25 -0
  379. package/user/userType.js.map +1 -1
  380. package/userAdminRoles.d.ts +41 -10
  381. package/userAdminRoles.js +29 -1
  382. package/userAdminRoles.js.map +1 -1
  383. package/userBaseSchemaProperty.d.ts +67 -24
  384. package/userBaseSchemaProperty.js +43 -0
  385. package/userBaseSchemaProperty.js.map +1 -1
  386. package/userFactorQuestion.d.ts +52 -14
  387. package/userFactorQuestion.js +39 -1
  388. package/userFactorQuestion.js.map +1 -1
  389. package/userGroupMemberships.d.ts +23 -4
  390. package/userGroupMemberships.js +20 -1
  391. package/userGroupMemberships.js.map +1 -1
  392. package/userSchemaProperty.d.ts +107 -57
  393. package/userSchemaProperty.js +32 -0
  394. package/userSchemaProperty.js.map +1 -1
  395. package/utilities.d.ts +4 -0
  396. package/utilities.js +33 -1
  397. package/utilities.js.map +1 -1
@@ -1,4 +1,29 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
+ /**
3
+ * Configures Default Authorization Server.
4
+ *
5
+ * This resource allows you to configure Default Authorization Server.
6
+ *
7
+ * ## Example Usage
8
+ *
9
+ * ```typescript
10
+ * import * as pulumi from "@pulumi/pulumi";
11
+ * import * as okta from "@pulumi/okta";
12
+ *
13
+ * const example = new okta.AuthServerDefault("example", {
14
+ * audiences: ["api://default"],
15
+ * description: "Default Authorization Server for your Applications",
16
+ * });
17
+ * ```
18
+ *
19
+ * ## Import
20
+ *
21
+ * Authorization Server can be imported via the Okta ID.
22
+ *
23
+ * ```sh
24
+ * $ pulumi import okta:index/authServerDefault:AuthServerDefault example <default>
25
+ * ```
26
+ */
2
27
  export declare class AuthServerDefault extends pulumi.CustomResource {
3
28
  /**
4
29
  * Get an existing AuthServerDefault resource's state with the given name, ID, and optional extra
@@ -16,7 +41,7 @@ export declare class AuthServerDefault extends pulumi.CustomResource {
16
41
  */
17
42
  static isInstance(obj: any): obj is AuthServerDefault;
18
43
  /**
19
- * Currently Okta only supports a single value here
44
+ * The recipients that the tokens are intended for. This becomes the `aud` claim in an access token.
20
45
  */
21
46
  readonly audiences: pulumi.Output<string[] | undefined>;
22
47
  /**
@@ -24,11 +49,11 @@ export declare class AuthServerDefault extends pulumi.CustomResource {
24
49
  */
25
50
  readonly credentialsLastRotated: pulumi.Output<string>;
26
51
  /**
27
- * The timestamp when the authorization server changes the key for signing tokens. Only returned when `credentialsRotationMode` is `AUTO`.
52
+ * The timestamp when the authorization server changes the key for signing tokens. Only returned when `credentialsRotationMode` is `"AUTO"`.
28
53
  */
29
54
  readonly credentialsNextRotation: pulumi.Output<string>;
30
55
  /**
31
- * Credential rotation mode, in many cases you cannot set this to MANUAL, the API will ignore the value and you will get a perpetual diff. This should rarely be used.
56
+ * The key rotation mode for the authorization server. Can be `"AUTO"` or `"MANUAL"`.
32
57
  */
33
58
  readonly credentialsRotationMode: pulumi.Output<string | undefined>;
34
59
  /**
@@ -36,11 +61,11 @@ export declare class AuthServerDefault extends pulumi.CustomResource {
36
61
  */
37
62
  readonly description: pulumi.Output<string | undefined>;
38
63
  /**
39
- * allows you to use a custom issuer URL
64
+ * The complete URL for a Custom Authorization Server. This becomes the `iss` claim in an access token.
40
65
  */
41
66
  readonly issuer: pulumi.Output<string>;
42
67
  /**
43
- * *Early Access Property*. Indicates which value is specified in the issuer of the tokens that a Custom Authorization Server returns: the original Okta org domain URL or a custom domain URL
68
+ * Allows you to use a custom issuer URL. It can be set to `"CUSTOM_URL"`, `"ORG_URL"`, or `"DYNAMIC"`.
44
69
  */
45
70
  readonly issuerMode: pulumi.Output<string | undefined>;
46
71
  /**
@@ -51,6 +76,9 @@ export declare class AuthServerDefault extends pulumi.CustomResource {
51
76
  * The name of the authorization server. Not necessary but left for backwards capacity with legacy implementation.
52
77
  */
53
78
  readonly name: pulumi.Output<string>;
79
+ /**
80
+ * The status of the auth server.
81
+ */
54
82
  readonly status: pulumi.Output<string | undefined>;
55
83
  /**
56
84
  * Create a AuthServerDefault resource with the given unique name, arguments, and options.
@@ -66,7 +94,7 @@ export declare class AuthServerDefault extends pulumi.CustomResource {
66
94
  */
67
95
  export interface AuthServerDefaultState {
68
96
  /**
69
- * Currently Okta only supports a single value here
97
+ * The recipients that the tokens are intended for. This becomes the `aud` claim in an access token.
70
98
  */
71
99
  audiences?: pulumi.Input<pulumi.Input<string>[]>;
72
100
  /**
@@ -74,11 +102,11 @@ export interface AuthServerDefaultState {
74
102
  */
75
103
  credentialsLastRotated?: pulumi.Input<string>;
76
104
  /**
77
- * The timestamp when the authorization server changes the key for signing tokens. Only returned when `credentialsRotationMode` is `AUTO`.
105
+ * The timestamp when the authorization server changes the key for signing tokens. Only returned when `credentialsRotationMode` is `"AUTO"`.
78
106
  */
79
107
  credentialsNextRotation?: pulumi.Input<string>;
80
108
  /**
81
- * Credential rotation mode, in many cases you cannot set this to MANUAL, the API will ignore the value and you will get a perpetual diff. This should rarely be used.
109
+ * The key rotation mode for the authorization server. Can be `"AUTO"` or `"MANUAL"`.
82
110
  */
83
111
  credentialsRotationMode?: pulumi.Input<string>;
84
112
  /**
@@ -86,11 +114,11 @@ export interface AuthServerDefaultState {
86
114
  */
87
115
  description?: pulumi.Input<string>;
88
116
  /**
89
- * allows you to use a custom issuer URL
117
+ * The complete URL for a Custom Authorization Server. This becomes the `iss` claim in an access token.
90
118
  */
91
119
  issuer?: pulumi.Input<string>;
92
120
  /**
93
- * *Early Access Property*. Indicates which value is specified in the issuer of the tokens that a Custom Authorization Server returns: the original Okta org domain URL or a custom domain URL
121
+ * Allows you to use a custom issuer URL. It can be set to `"CUSTOM_URL"`, `"ORG_URL"`, or `"DYNAMIC"`.
94
122
  */
95
123
  issuerMode?: pulumi.Input<string>;
96
124
  /**
@@ -101,6 +129,9 @@ export interface AuthServerDefaultState {
101
129
  * The name of the authorization server. Not necessary but left for backwards capacity with legacy implementation.
102
130
  */
103
131
  name?: pulumi.Input<string>;
132
+ /**
133
+ * The status of the auth server.
134
+ */
104
135
  status?: pulumi.Input<string>;
105
136
  }
106
137
  /**
@@ -108,11 +139,11 @@ export interface AuthServerDefaultState {
108
139
  */
109
140
  export interface AuthServerDefaultArgs {
110
141
  /**
111
- * Currently Okta only supports a single value here
142
+ * The recipients that the tokens are intended for. This becomes the `aud` claim in an access token.
112
143
  */
113
144
  audiences?: pulumi.Input<pulumi.Input<string>[]>;
114
145
  /**
115
- * Credential rotation mode, in many cases you cannot set this to MANUAL, the API will ignore the value and you will get a perpetual diff. This should rarely be used.
146
+ * The key rotation mode for the authorization server. Can be `"AUTO"` or `"MANUAL"`.
116
147
  */
117
148
  credentialsRotationMode?: pulumi.Input<string>;
118
149
  /**
@@ -120,12 +151,15 @@ export interface AuthServerDefaultArgs {
120
151
  */
121
152
  description?: pulumi.Input<string>;
122
153
  /**
123
- * *Early Access Property*. Indicates which value is specified in the issuer of the tokens that a Custom Authorization Server returns: the original Okta org domain URL or a custom domain URL
154
+ * Allows you to use a custom issuer URL. It can be set to `"CUSTOM_URL"`, `"ORG_URL"`, or `"DYNAMIC"`.
124
155
  */
125
156
  issuerMode?: pulumi.Input<string>;
126
157
  /**
127
158
  * The name of the authorization server. Not necessary but left for backwards capacity with legacy implementation.
128
159
  */
129
160
  name?: pulumi.Input<string>;
161
+ /**
162
+ * The status of the auth server.
163
+ */
130
164
  status?: pulumi.Input<string>;
131
165
  }
@@ -5,6 +5,31 @@ Object.defineProperty(exports, "__esModule", { value: true });
5
5
  exports.AuthServerDefault = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("./utilities");
8
+ /**
9
+ * Configures Default Authorization Server.
10
+ *
11
+ * This resource allows you to configure Default Authorization Server.
12
+ *
13
+ * ## Example Usage
14
+ *
15
+ * ```typescript
16
+ * import * as pulumi from "@pulumi/pulumi";
17
+ * import * as okta from "@pulumi/okta";
18
+ *
19
+ * const example = new okta.AuthServerDefault("example", {
20
+ * audiences: ["api://default"],
21
+ * description: "Default Authorization Server for your Applications",
22
+ * });
23
+ * ```
24
+ *
25
+ * ## Import
26
+ *
27
+ * Authorization Server can be imported via the Okta ID.
28
+ *
29
+ * ```sh
30
+ * $ pulumi import okta:index/authServerDefault:AuthServerDefault example &#60;default&#62;
31
+ * ```
32
+ */
8
33
  class AuthServerDefault extends pulumi.CustomResource {
9
34
  /**
10
35
  * Get an existing AuthServerDefault resource's state with the given name, ID, and optional extra
@@ -1 +1 @@
1
- {"version":3,"file":"authServerDefault.js","sourceRoot":"","sources":["../authServerDefault.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC,MAAa,iBAAkB,SAAQ,MAAM,CAAC,cAAc;IACxD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA8B,EAAE,IAAmC;QAC5H,OAAO,IAAI,iBAAiB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACxE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,iBAAiB,CAAC,YAAY,CAAC;IAClE,CAAC;IAgDD,YAAY,IAAY,EAAE,WAA4D,EAAE,IAAmC;QACvH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAiD,CAAC;YAChE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,yBAAyB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,yBAAyB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAAgD,CAAC;YAC9D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,yBAAyB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,wBAAwB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC7D,cAAc,CAAC,yBAAyB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC7C,cAAc,CAAC,KAAK,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAC7C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,iBAAiB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACtE,CAAC;;AAxGL,8CAyGC;AA3FG,gBAAgB;AACO,8BAAY,GAAG,gDAAgD,CAAC"}
1
+ {"version":3,"file":"authServerDefault.js","sourceRoot":"","sources":["../authServerDefault.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;GAwBG;AACH,MAAa,iBAAkB,SAAQ,MAAM,CAAC,cAAc;IACxD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA8B,EAAE,IAAmC;QAC5H,OAAO,IAAI,iBAAiB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACxE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,iBAAiB,CAAC,YAAY,CAAC;IAClE,CAAC;IAmDD,YAAY,IAAY,EAAE,WAA4D,EAAE,IAAmC;QACvH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAiD,CAAC;YAChE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,yBAAyB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,yBAAyB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAAgD,CAAC;YAC9D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,yBAAyB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,wBAAwB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC7D,cAAc,CAAC,yBAAyB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC7C,cAAc,CAAC,KAAK,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAC7C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,iBAAiB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACtE,CAAC;;AA3GL,8CA4GC;AA9FG,gBAAgB;AACO,8BAAY,GAAG,gDAAgD,CAAC"}
@@ -1,4 +1,42 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
+ /**
3
+ * > **WARNING:** This feature is only available as a part of the Identity Engine. Contact support for further information.
4
+ *
5
+ * This resource allows you to configure different authenticators.
6
+ *
7
+ * > **Create:** The Okta API has an odd notion of create for authenticators. If
8
+ * the authenticator doesn't exist then a one time `POST /api/v1/authenticators` to
9
+ * create the authenticator (hard create) will be performed. Thereafter, that
10
+ * authenticator is never deleted, it is only deactivated (soft delete). Therefore,
11
+ * if the authenticator already exists create is just a soft import of an existing
12
+ * authenticator.
13
+ *
14
+ * > **Delete:** Authenticators can not be truly deleted therefore delete is soft.
15
+ * Delete will attempt to deativate the authenticator. An authenticator can only be
16
+ * deactivated if it's not in use by any other policy.
17
+ *
18
+ * ## Example Usage
19
+ *
20
+ * ```typescript
21
+ * import * as pulumi from "@pulumi/pulumi";
22
+ * import * as okta from "@pulumi/okta";
23
+ *
24
+ * const test = new okta.Authenticator("test", {
25
+ * key: "security_question",
26
+ * settings: JSON.stringify({
27
+ * allowedFor: "recovery",
28
+ * }),
29
+ * });
30
+ * ```
31
+ *
32
+ * ## Import
33
+ *
34
+ * Okta authenticator can be imported via the Okta ID.
35
+ *
36
+ * ```sh
37
+ * $ pulumi import okta:index/authenticator:Authenticator example &#60;authenticator_id&#62;
38
+ * ```
39
+ */
2
40
  export declare class Authenticator extends pulumi.CustomResource {
3
41
  /**
4
42
  * Get an existing Authenticator resource's state with the given name, ID, and optional extra
@@ -16,23 +54,23 @@ export declare class Authenticator extends pulumi.CustomResource {
16
54
  */
17
55
  static isInstance(obj: any): obj is Authenticator;
18
56
  /**
19
- * A human-readable string that identifies the Authenticator
57
+ * A human-readable string that identifies the authenticator. Some authenticators are available by feature flag on the organization. Possible values inclue: `duo`, `externalIdp`, `googleOtp`, `oktaEmail`, `oktaPassword`, `oktaVerify`, `onpremMfa`, `phoneNumber`, `rsaToken`, `securityQuestion`, `webauthn`
20
58
  */
21
59
  readonly key: pulumi.Output<string>;
22
60
  /**
23
- * Display name of the Authenticator
61
+ * Name of the authenticator.
24
62
  */
25
63
  readonly name: pulumi.Output<string>;
26
64
  /**
27
- * The RADIUS server port (for example 1812). This is defined when the On-Prem RADIUS server is configured
65
+ * The RADIUS server port (for example 1812). This is defined when the On-Prem RADIUS server is configured. Used only for authenticators with type `"securityKey"`. Conflicts with `providerJson` argument.
28
66
  */
29
67
  readonly providerAuthPort: pulumi.Output<number | undefined>;
30
68
  /**
31
- * The Duo Security API hostname
69
+ * (DUO specific) - The Duo Security API hostname". Conflicts with `providerJson` argument.
32
70
  */
33
71
  readonly providerHost: pulumi.Output<string | undefined>;
34
72
  /**
35
- * Server host name or IP address
73
+ * Server host name or IP address. Default is `"localhost"`. Used only for authenticators with type `"securityKey"`. Conflicts with `providerJson` argument.
36
74
  */
37
75
  readonly providerHostname: pulumi.Output<string | undefined>;
38
76
  /**
@@ -40,19 +78,25 @@ export declare class Authenticator extends pulumi.CustomResource {
40
78
  */
41
79
  readonly providerInstanceId: pulumi.Output<string>;
42
80
  /**
43
- * The Duo Security integration key
81
+ * (DUO specific) - The Duo Security integration key. Conflicts with `providerJson` argument.
44
82
  */
45
83
  readonly providerIntegrationKey: pulumi.Output<string | undefined>;
46
84
  /**
47
- * Provider in JSON format
85
+ * Provider JSON allows for expressive provider
86
+ * values. This argument conflicts with the other `providerXxx` arguments. The
87
+ * [Create
88
+ * Provider](https://developer.okta.com/docs/reference/api/authenticators-admin/#request)
89
+ * illustrates detailed provider values for a Duo authenticator. [Provider
90
+ * values](https://developer.okta.com/docs/reference/api/authenticators-admin/#authenticators-administration-api-object)
91
+ * are listed in Okta API.
48
92
  */
49
93
  readonly providerJson: pulumi.Output<string | undefined>;
50
94
  /**
51
- * The Duo Security secret key
95
+ * (DUO specific) - The Duo Security secret key. Conflicts with `providerJson` argument.
52
96
  */
53
97
  readonly providerSecretKey: pulumi.Output<string | undefined>;
54
98
  /**
55
- * An authentication key that must be defined when the RADIUS server is configured, and must be the same on both the RADIUS client and server.
99
+ * An authentication key that must be defined when the RADIUS server is configured, and must be the same on both the RADIUS client and server. Used only for authenticators with type `"securityKey"`. Conflicts with `providerJson` argument.
56
100
  */
57
101
  readonly providerSharedSecret: pulumi.Output<string | undefined>;
58
102
  /**
@@ -60,19 +104,19 @@ export declare class Authenticator extends pulumi.CustomResource {
60
104
  */
61
105
  readonly providerType: pulumi.Output<string>;
62
106
  /**
63
- * Format expected by the provider
107
+ * Username template expected by the provider. Used only for authenticators with type `"securityKey"`. Conflicts with `providerJson` argument.
64
108
  */
65
109
  readonly providerUserNameTemplate: pulumi.Output<string | undefined>;
66
110
  /**
67
- * Authenticator settings in JSON format
111
+ * Settings for the authenticator. The settings JSON contains values based on Authenticator key. It is not used for authenticators with type `"securityKey"`.
68
112
  */
69
113
  readonly settings: pulumi.Output<string | undefined>;
70
114
  /**
71
- * Authenticator status: ACTIVE or INACTIVE
115
+ * Status of the authenticator. Default is `ACTIVE`.
72
116
  */
73
117
  readonly status: pulumi.Output<string | undefined>;
74
118
  /**
75
- * The type of Authenticator
119
+ * The type of Authenticator. Values include: `"password"`, `"securityQuestion"`, `"phone"`, `"email"`, `"app"`, `"federated"`, and `"securityKey"`.
76
120
  */
77
121
  readonly type: pulumi.Output<string>;
78
122
  /**
@@ -89,23 +133,23 @@ export declare class Authenticator extends pulumi.CustomResource {
89
133
  */
90
134
  export interface AuthenticatorState {
91
135
  /**
92
- * A human-readable string that identifies the Authenticator
136
+ * A human-readable string that identifies the authenticator. Some authenticators are available by feature flag on the organization. Possible values inclue: `duo`, `externalIdp`, `googleOtp`, `oktaEmail`, `oktaPassword`, `oktaVerify`, `onpremMfa`, `phoneNumber`, `rsaToken`, `securityQuestion`, `webauthn`
93
137
  */
94
138
  key?: pulumi.Input<string>;
95
139
  /**
96
- * Display name of the Authenticator
140
+ * Name of the authenticator.
97
141
  */
98
142
  name?: pulumi.Input<string>;
99
143
  /**
100
- * The RADIUS server port (for example 1812). This is defined when the On-Prem RADIUS server is configured
144
+ * The RADIUS server port (for example 1812). This is defined when the On-Prem RADIUS server is configured. Used only for authenticators with type `"securityKey"`. Conflicts with `providerJson` argument.
101
145
  */
102
146
  providerAuthPort?: pulumi.Input<number>;
103
147
  /**
104
- * The Duo Security API hostname
148
+ * (DUO specific) - The Duo Security API hostname". Conflicts with `providerJson` argument.
105
149
  */
106
150
  providerHost?: pulumi.Input<string>;
107
151
  /**
108
- * Server host name or IP address
152
+ * Server host name or IP address. Default is `"localhost"`. Used only for authenticators with type `"securityKey"`. Conflicts with `providerJson` argument.
109
153
  */
110
154
  providerHostname?: pulumi.Input<string>;
111
155
  /**
@@ -113,19 +157,25 @@ export interface AuthenticatorState {
113
157
  */
114
158
  providerInstanceId?: pulumi.Input<string>;
115
159
  /**
116
- * The Duo Security integration key
160
+ * (DUO specific) - The Duo Security integration key. Conflicts with `providerJson` argument.
117
161
  */
118
162
  providerIntegrationKey?: pulumi.Input<string>;
119
163
  /**
120
- * Provider in JSON format
164
+ * Provider JSON allows for expressive provider
165
+ * values. This argument conflicts with the other `providerXxx` arguments. The
166
+ * [Create
167
+ * Provider](https://developer.okta.com/docs/reference/api/authenticators-admin/#request)
168
+ * illustrates detailed provider values for a Duo authenticator. [Provider
169
+ * values](https://developer.okta.com/docs/reference/api/authenticators-admin/#authenticators-administration-api-object)
170
+ * are listed in Okta API.
121
171
  */
122
172
  providerJson?: pulumi.Input<string>;
123
173
  /**
124
- * The Duo Security secret key
174
+ * (DUO specific) - The Duo Security secret key. Conflicts with `providerJson` argument.
125
175
  */
126
176
  providerSecretKey?: pulumi.Input<string>;
127
177
  /**
128
- * An authentication key that must be defined when the RADIUS server is configured, and must be the same on both the RADIUS client and server.
178
+ * An authentication key that must be defined when the RADIUS server is configured, and must be the same on both the RADIUS client and server. Used only for authenticators with type `"securityKey"`. Conflicts with `providerJson` argument.
129
179
  */
130
180
  providerSharedSecret?: pulumi.Input<string>;
131
181
  /**
@@ -133,19 +183,19 @@ export interface AuthenticatorState {
133
183
  */
134
184
  providerType?: pulumi.Input<string>;
135
185
  /**
136
- * Format expected by the provider
186
+ * Username template expected by the provider. Used only for authenticators with type `"securityKey"`. Conflicts with `providerJson` argument.
137
187
  */
138
188
  providerUserNameTemplate?: pulumi.Input<string>;
139
189
  /**
140
- * Authenticator settings in JSON format
190
+ * Settings for the authenticator. The settings JSON contains values based on Authenticator key. It is not used for authenticators with type `"securityKey"`.
141
191
  */
142
192
  settings?: pulumi.Input<string>;
143
193
  /**
144
- * Authenticator status: ACTIVE or INACTIVE
194
+ * Status of the authenticator. Default is `ACTIVE`.
145
195
  */
146
196
  status?: pulumi.Input<string>;
147
197
  /**
148
- * The type of Authenticator
198
+ * The type of Authenticator. Values include: `"password"`, `"securityQuestion"`, `"phone"`, `"email"`, `"app"`, `"federated"`, and `"securityKey"`.
149
199
  */
150
200
  type?: pulumi.Input<string>;
151
201
  }
@@ -154,51 +204,57 @@ export interface AuthenticatorState {
154
204
  */
155
205
  export interface AuthenticatorArgs {
156
206
  /**
157
- * A human-readable string that identifies the Authenticator
207
+ * A human-readable string that identifies the authenticator. Some authenticators are available by feature flag on the organization. Possible values inclue: `duo`, `externalIdp`, `googleOtp`, `oktaEmail`, `oktaPassword`, `oktaVerify`, `onpremMfa`, `phoneNumber`, `rsaToken`, `securityQuestion`, `webauthn`
158
208
  */
159
209
  key: pulumi.Input<string>;
160
210
  /**
161
- * Display name of the Authenticator
211
+ * Name of the authenticator.
162
212
  */
163
213
  name?: pulumi.Input<string>;
164
214
  /**
165
- * The RADIUS server port (for example 1812). This is defined when the On-Prem RADIUS server is configured
215
+ * The RADIUS server port (for example 1812). This is defined when the On-Prem RADIUS server is configured. Used only for authenticators with type `"securityKey"`. Conflicts with `providerJson` argument.
166
216
  */
167
217
  providerAuthPort?: pulumi.Input<number>;
168
218
  /**
169
- * The Duo Security API hostname
219
+ * (DUO specific) - The Duo Security API hostname". Conflicts with `providerJson` argument.
170
220
  */
171
221
  providerHost?: pulumi.Input<string>;
172
222
  /**
173
- * Server host name or IP address
223
+ * Server host name or IP address. Default is `"localhost"`. Used only for authenticators with type `"securityKey"`. Conflicts with `providerJson` argument.
174
224
  */
175
225
  providerHostname?: pulumi.Input<string>;
176
226
  /**
177
- * The Duo Security integration key
227
+ * (DUO specific) - The Duo Security integration key. Conflicts with `providerJson` argument.
178
228
  */
179
229
  providerIntegrationKey?: pulumi.Input<string>;
180
230
  /**
181
- * Provider in JSON format
231
+ * Provider JSON allows for expressive provider
232
+ * values. This argument conflicts with the other `providerXxx` arguments. The
233
+ * [Create
234
+ * Provider](https://developer.okta.com/docs/reference/api/authenticators-admin/#request)
235
+ * illustrates detailed provider values for a Duo authenticator. [Provider
236
+ * values](https://developer.okta.com/docs/reference/api/authenticators-admin/#authenticators-administration-api-object)
237
+ * are listed in Okta API.
182
238
  */
183
239
  providerJson?: pulumi.Input<string>;
184
240
  /**
185
- * The Duo Security secret key
241
+ * (DUO specific) - The Duo Security secret key. Conflicts with `providerJson` argument.
186
242
  */
187
243
  providerSecretKey?: pulumi.Input<string>;
188
244
  /**
189
- * An authentication key that must be defined when the RADIUS server is configured, and must be the same on both the RADIUS client and server.
245
+ * An authentication key that must be defined when the RADIUS server is configured, and must be the same on both the RADIUS client and server. Used only for authenticators with type `"securityKey"`. Conflicts with `providerJson` argument.
190
246
  */
191
247
  providerSharedSecret?: pulumi.Input<string>;
192
248
  /**
193
- * Format expected by the provider
249
+ * Username template expected by the provider. Used only for authenticators with type `"securityKey"`. Conflicts with `providerJson` argument.
194
250
  */
195
251
  providerUserNameTemplate?: pulumi.Input<string>;
196
252
  /**
197
- * Authenticator settings in JSON format
253
+ * Settings for the authenticator. The settings JSON contains values based on Authenticator key. It is not used for authenticators with type `"securityKey"`.
198
254
  */
199
255
  settings?: pulumi.Input<string>;
200
256
  /**
201
- * Authenticator status: ACTIVE or INACTIVE
257
+ * Status of the authenticator. Default is `ACTIVE`.
202
258
  */
203
259
  status?: pulumi.Input<string>;
204
260
  }
package/authenticator.js CHANGED
@@ -5,6 +5,44 @@ Object.defineProperty(exports, "__esModule", { value: true });
5
5
  exports.Authenticator = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("./utilities");
8
+ /**
9
+ * > **WARNING:** This feature is only available as a part of the Identity Engine. Contact support for further information.
10
+ *
11
+ * This resource allows you to configure different authenticators.
12
+ *
13
+ * > **Create:** The Okta API has an odd notion of create for authenticators. If
14
+ * the authenticator doesn't exist then a one time `POST /api/v1/authenticators` to
15
+ * create the authenticator (hard create) will be performed. Thereafter, that
16
+ * authenticator is never deleted, it is only deactivated (soft delete). Therefore,
17
+ * if the authenticator already exists create is just a soft import of an existing
18
+ * authenticator.
19
+ *
20
+ * > **Delete:** Authenticators can not be truly deleted therefore delete is soft.
21
+ * Delete will attempt to deativate the authenticator. An authenticator can only be
22
+ * deactivated if it's not in use by any other policy.
23
+ *
24
+ * ## Example Usage
25
+ *
26
+ * ```typescript
27
+ * import * as pulumi from "@pulumi/pulumi";
28
+ * import * as okta from "@pulumi/okta";
29
+ *
30
+ * const test = new okta.Authenticator("test", {
31
+ * key: "security_question",
32
+ * settings: JSON.stringify({
33
+ * allowedFor: "recovery",
34
+ * }),
35
+ * });
36
+ * ```
37
+ *
38
+ * ## Import
39
+ *
40
+ * Okta authenticator can be imported via the Okta ID.
41
+ *
42
+ * ```sh
43
+ * $ pulumi import okta:index/authenticator:Authenticator example &#60;authenticator_id&#62;
44
+ * ```
45
+ */
8
46
  class Authenticator extends pulumi.CustomResource {
9
47
  /**
10
48
  * Get an existing Authenticator resource's state with the given name, ID, and optional extra
@@ -1 +1 @@
1
- {"version":3,"file":"authenticator.js","sourceRoot":"","sources":["../authenticator.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;IACpD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA0B,EAAE,IAAmC;QACxH,OAAO,IAAI,aAAa,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACpE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,aAAa,CAAC,YAAY,CAAC;IAC9D,CAAC;IAuED,YAAY,IAAY,EAAE,WAAoD,EAAE,IAAmC;QAC/G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA6C,CAAC;YAC5D,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,0BAA0B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3D;aAAM;YACH,MAAM,IAAI,GAAG,WAA4C,CAAC;YAC1D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,GAAG,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAChD,MAAM,IAAI,KAAK,CAAC,iCAAiC,CAAC,CAAC;aACtD;YACD,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,sBAAsB,CAAC,GAAG,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,oBAAoB,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAC3H,cAAc,CAAC,0BAA0B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,oBAAoB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACzD,cAAc,CAAC,cAAc,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACnD,cAAc,CAAC,MAAM,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAC9C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,sBAAsB,CAAC,EAAE,CAAC;QACzE,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAClE,CAAC;;AA9IL,sCA+IC;AAjIG,gBAAgB;AACO,0BAAY,GAAG,wCAAwC,CAAC"}
1
+ {"version":3,"file":"authenticator.js","sourceRoot":"","sources":["../authenticator.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAqCG;AACH,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;IACpD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA0B,EAAE,IAAmC;QACxH,OAAO,IAAI,aAAa,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACpE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,aAAa,CAAC,YAAY,CAAC;IAC9D,CAAC;IA6ED,YAAY,IAAY,EAAE,WAAoD,EAAE,IAAmC;QAC/G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA6C,CAAC;YAC5D,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,0BAA0B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3D;aAAM;YACH,MAAM,IAAI,GAAG,WAA4C,CAAC;YAC1D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,GAAG,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAChD,MAAM,IAAI,KAAK,CAAC,iCAAiC,CAAC,CAAC;aACtD;YACD,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,sBAAsB,CAAC,GAAG,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,oBAAoB,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAC3H,cAAc,CAAC,0BAA0B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,oBAAoB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACzD,cAAc,CAAC,cAAc,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACnD,cAAc,CAAC,MAAM,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAC9C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,sBAAsB,CAAC,EAAE,CAAC;QACzE,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAClE,CAAC;;AApJL,sCAqJC;AAvIG,gBAAgB;AACO,0BAAY,GAAG,wCAAwC,CAAC"}