@pulumi/okta 4.6.2 → 4.6.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/adminRoleCustom.d.ts +129 -10
- package/adminRoleCustom.js +24 -1
- package/adminRoleCustom.js.map +1 -1
- package/adminRoleCustomAssignments.d.ts +25 -10
- package/adminRoleCustomAssignments.js +13 -1
- package/adminRoleCustomAssignments.js.map +1 -1
- package/adminRoleTargets.d.ts +44 -14
- package/adminRoleTargets.js +30 -0
- package/adminRoleTargets.js.map +1 -1
- package/app/accessPolicyAssignment.d.ts +20 -1
- package/app/accessPolicyAssignment.js +20 -1
- package/app/accessPolicyAssignment.js.map +1 -1
- package/app/autoLogin.d.ts +119 -72
- package/app/autoLogin.js +47 -0
- package/app/autoLogin.js.map +1 -1
- package/app/basicAuth.d.ts +66 -38
- package/app/basicAuth.js +28 -0
- package/app/basicAuth.js.map +1 -1
- package/app/bookmark.d.ts +71 -35
- package/app/bookmark.js +27 -0
- package/app/bookmark.js.map +1 -1
- package/app/getApp.d.ts +25 -58
- package/app/getApp.js +2 -2
- package/app/getApp.js.map +1 -1
- package/app/getMetadataSaml.d.ts +5 -11
- package/app/getMetadataSaml.js +2 -2
- package/app/getMetadataSaml.js.map +1 -1
- package/app/getOauth.d.ts +34 -62
- package/app/getOauth.js +2 -2
- package/app/getOauth.js.map +1 -1
- package/app/getSaml.d.ts +55 -75
- package/app/getSaml.js +2 -2
- package/app/getSaml.js.map +1 -1
- package/app/groupAssignment.d.ts +15 -6
- package/app/groupAssignment.js +9 -0
- package/app/groupAssignment.js.map +1 -1
- package/app/oauth.d.ts +301 -123
- package/app/oauth.js +82 -0
- package/app/oauth.js.map +1 -1
- package/app/oauthPostLogoutRedirectUri.d.ts +38 -3
- package/app/oauthPostLogoutRedirectUri.js +35 -0
- package/app/oauthPostLogoutRedirectUri.js.map +1 -1
- package/app/oauthRedirectUri.d.ts +37 -3
- package/app/oauthRedirectUri.js +34 -0
- package/app/oauthRedirectUri.js.map +1 -1
- package/app/saml.d.ts +303 -133
- package/app/saml.js +161 -0
- package/app/saml.js.map +1 -1
- package/app/securePasswordStore.d.ts +109 -79
- package/app/securePasswordStore.js +30 -0
- package/app/securePasswordStore.js.map +1 -1
- package/app/swa.d.ts +102 -72
- package/app/swa.js +30 -0
- package/app/swa.js.map +1 -1
- package/app/threeField.d.ts +87 -72
- package/app/threeField.js +15 -0
- package/app/threeField.js.map +1 -1
- package/app/user.d.ts +37 -12
- package/app/user.js +22 -0
- package/app/user.js.map +1 -1
- package/appGroupAssignments.d.ts +40 -3
- package/appGroupAssignments.js +37 -0
- package/appGroupAssignments.js.map +1 -1
- package/appOauthApiScope.d.ts +36 -3
- package/appOauthApiScope.js +33 -0
- package/appOauthApiScope.js.map +1 -1
- package/appSamlAppSettings.d.ts +44 -6
- package/appSamlAppSettings.js +38 -0
- package/appSamlAppSettings.js.map +1 -1
- package/appSharedCredentials.d.ts +115 -72
- package/appSharedCredentials.js +43 -0
- package/appSharedCredentials.js.map +1 -1
- package/appSignonPolicy.d.ts +44 -6
- package/appSignonPolicy.js +38 -0
- package/appSignonPolicy.js.map +1 -1
- package/appSignonPolicyRule.d.ts +327 -68
- package/appSignonPolicyRule.js +244 -0
- package/appSignonPolicyRule.js.map +1 -1
- package/appUserBaseSchemaProperty.d.ts +52 -24
- package/appUserBaseSchemaProperty.js +28 -0
- package/appUserBaseSchemaProperty.js.map +1 -1
- package/appUserSchemaProperty.d.ts +80 -54
- package/appUserSchemaProperty.js +26 -0
- package/appUserSchemaProperty.js.map +1 -1
- package/auth/getServer.d.ts +11 -11
- package/auth/getServer.js +2 -2
- package/auth/getServerPolicy.d.ts +9 -15
- package/auth/getServerPolicy.js +2 -2
- package/auth/getServerPolicy.js.map +1 -1
- package/auth/getServerScopes.d.ts +5 -8
- package/auth/getServerScopes.js +2 -2
- package/auth/getServerScopes.js.map +1 -1
- package/auth/server.d.ts +49 -13
- package/auth/server.js +27 -0
- package/auth/server.js.map +1 -1
- package/auth/serverClaim.d.ts +54 -18
- package/auth/serverClaim.js +27 -0
- package/auth/serverClaim.js.map +1 -1
- package/auth/serverPolicy.d.ts +43 -6
- package/auth/serverPolicy.js +28 -0
- package/auth/serverPolicy.js.map +1 -1
- package/auth/serverPolicyRule.d.ts +72 -29
- package/auth/serverPolicyRule.js +25 -0
- package/auth/serverPolicyRule.js.map +1 -1
- package/auth/serverScope.d.ts +41 -15
- package/auth/serverScope.js +26 -0
- package/auth/serverScope.js.map +1 -1
- package/authServerClaimDefault.d.ts +50 -13
- package/authServerClaimDefault.js +31 -0
- package/authServerClaimDefault.js.map +1 -1
- package/authServerDefault.d.ts +47 -13
- package/authServerDefault.js +25 -0
- package/authServerDefault.js.map +1 -1
- package/authenticator.d.ts +94 -38
- package/authenticator.js +38 -0
- package/authenticator.js.map +1 -1
- package/behaviour.d.ts +78 -18
- package/behaviour.js +42 -0
- package/behaviour.js.map +1 -1
- package/brand.d.ts +28 -19
- package/brand.js +10 -1
- package/brand.js.map +1 -1
- package/captcha.d.ts +38 -12
- package/captcha.js +26 -0
- package/captcha.js.map +1 -1
- package/captchaOrgWideSettings.d.ts +51 -6
- package/captchaOrgWideSettings.js +45 -0
- package/captchaOrgWideSettings.js.map +1 -1
- package/domain.d.ts +39 -13
- package/domain.js +20 -0
- package/domain.js.map +1 -1
- package/domainCertificate.d.ts +63 -15
- package/domainCertificate.js +48 -0
- package/domainCertificate.js.map +1 -1
- package/domainVerification.d.ts +22 -3
- package/domainVerification.js +19 -0
- package/domainVerification.js.map +1 -1
- package/emailCustomization.d.ts +224 -3
- package/emailCustomization.js +41 -0
- package/emailCustomization.js.map +1 -1
- package/emailSender.d.ts +39 -13
- package/emailSender.js +26 -0
- package/emailSender.js.map +1 -1
- package/emailSenderVerification.d.ts +26 -3
- package/emailSenderVerification.js +23 -0
- package/emailSenderVerification.js.map +1 -1
- package/eventHook.d.ts +37 -0
- package/eventHook.js +37 -0
- package/eventHook.js.map +1 -1
- package/eventHookVerification.d.ts +37 -3
- package/eventHookVerification.js +34 -0
- package/eventHookVerification.js.map +1 -1
- package/factor/factor.d.ts +23 -6
- package/factor/factor.js +14 -0
- package/factor/factor.js.map +1 -1
- package/factorTotp.d.ts +44 -12
- package/factorTotp.js +23 -0
- package/factorTotp.js.map +1 -1
- package/getAppGroupAssignments.d.ts +6 -6
- package/getAppGroupAssignments.js +2 -2
- package/getAppSignonPolicy.d.ts +6 -16
- package/getAppSignonPolicy.js +4 -8
- package/getAppSignonPolicy.js.map +1 -1
- package/getAppUserAssignments.d.ts +6 -6
- package/getAppUserAssignments.js +2 -2
- package/getAuthServerClaim.d.ts +12 -15
- package/getAuthServerClaim.js +2 -2
- package/getAuthServerClaim.js.map +1 -1
- package/getAuthServerClaims.d.ts +5 -8
- package/getAuthServerClaims.js +2 -2
- package/getAuthServerClaims.js.map +1 -1
- package/getAuthenticator.d.ts +26 -24
- package/getAuthenticator.js +22 -14
- package/getAuthenticator.js.map +1 -1
- package/getBehaviour.d.ts +8 -6
- package/getBehaviour.js +2 -2
- package/getBehaviour.js.map +1 -1
- package/getBehaviours.d.ts +7 -7
- package/getBehaviours.js +2 -2
- package/getBrand.d.ts +6 -9
- package/getBrand.js +2 -2
- package/getBrand.js.map +1 -1
- package/getBrands.d.ts +2 -2
- package/getBrands.js +2 -2
- package/getEmailCustomization.d.ts +9 -14
- package/getEmailCustomization.js +6 -2
- package/getEmailCustomization.js.map +1 -1
- package/getEmailCustomizations.d.ts +9 -11
- package/getEmailCustomizations.js +6 -2
- package/getEmailCustomizations.js.map +1 -1
- package/getGroups.d.ts +25 -11
- package/getGroups.js +2 -2
- package/getGroups.js.map +1 -1
- package/getNetworkZone.d.ts +12 -12
- package/getNetworkZone.js +2 -2
- package/getRoleSubscription.d.ts +35 -13
- package/getRoleSubscription.js +2 -2
- package/getRoleSubscription.js.map +1 -1
- package/getTemplate.d.ts +8 -10
- package/getTemplate.js +6 -2
- package/getTemplate.js.map +1 -1
- package/getTemplates.d.ts +7 -6
- package/getTemplates.js +6 -2
- package/getTemplates.js.map +1 -1
- package/getTheme.d.ts +12 -14
- package/getTheme.js +6 -2
- package/getTheme.js.map +1 -1
- package/getThemes.d.ts +7 -6
- package/getThemes.js +6 -2
- package/getThemes.js.map +1 -1
- package/getTrustedOrigins.d.ts +4 -7
- package/getTrustedOrigins.js +2 -2
- package/getTrustedOrigins.js.map +1 -1
- package/getUserSecurityQuestions.d.ts +8 -4
- package/getUserSecurityQuestions.js +4 -0
- package/getUserSecurityQuestions.js.map +1 -1
- package/group/getEveryoneGroup.d.ts +5 -10
- package/group/getEveryoneGroup.js +2 -4
- package/group/getEveryoneGroup.js.map +1 -1
- package/group/getGroup.d.ts +26 -17
- package/group/getGroup.js +2 -2
- package/group/getGroup.js.map +1 -1
- package/group/getRule.d.ts +15 -6
- package/group/getRule.js +2 -2
- package/group/getRule.js.map +1 -1
- package/group/group.d.ts +46 -9
- package/group/group.js +37 -0
- package/group/group.js.map +1 -1
- package/group/role.d.ts +101 -15
- package/group/role.js +26 -0
- package/group/role.js.map +1 -1
- package/group/rule.d.ts +80 -6
- package/group/rule.js +23 -0
- package/group/rule.js.map +1 -1
- package/groupMemberships.d.ts +48 -7
- package/groupMemberships.js +42 -1
- package/groupMemberships.js.map +1 -1
- package/groupSchemaProperty.d.ts +94 -51
- package/groupSchemaProperty.js +25 -0
- package/groupSchemaProperty.js.map +1 -1
- package/idp/getMetadataSaml.d.ts +6 -9
- package/idp/getMetadataSaml.js +2 -2
- package/idp/getMetadataSaml.js.map +1 -1
- package/idp/getOidc.d.ts +9 -9
- package/idp/getOidc.js +2 -2
- package/idp/getSaml.d.ts +13 -16
- package/idp/getSaml.js +2 -2
- package/idp/getSaml.js.map +1 -1
- package/idp/getSocial.d.ts +2 -8
- package/idp/getSocial.js +2 -2
- package/idp/getSocial.js.map +1 -1
- package/idp/oidc.d.ts +297 -12
- package/idp/oidc.js +36 -0
- package/idp/oidc.js.map +1 -1
- package/idp/saml.d.ts +284 -18
- package/idp/saml.js +32 -0
- package/idp/saml.js.map +1 -1
- package/idp/samlKey.d.ts +48 -3
- package/idp/samlKey.js +9 -0
- package/idp/samlKey.js.map +1 -1
- package/idp/social.d.ts +251 -18
- package/idp/social.js +32 -0
- package/idp/social.js.map +1 -1
- package/index/emailDomain.d.ts +41 -16
- package/index/emailDomain.js +25 -0
- package/index/emailDomain.js.map +1 -1
- package/index/emailDomainVerification.d.ts +25 -3
- package/index/emailDomainVerification.js +22 -0
- package/index/emailDomainVerification.js.map +1 -1
- package/index/getDomain.d.ts +14 -11
- package/index/getDomain.js +8 -2
- package/index/getDomain.js.map +1 -1
- package/inline/hook.d.ts +89 -0
- package/inline/hook.js +35 -0
- package/inline/hook.js.map +1 -1
- package/linkDefinition.d.ts +30 -0
- package/linkDefinition.js +30 -0
- package/linkDefinition.js.map +1 -1
- package/linkValue.d.ts +59 -6
- package/linkValue.js +53 -0
- package/linkValue.js.map +1 -1
- package/network/zone.d.ts +74 -27
- package/network/zone.js +44 -0
- package/network/zone.js.map +1 -1
- package/orgConfiguration.d.ts +25 -0
- package/orgConfiguration.js +25 -0
- package/orgConfiguration.js.map +1 -1
- package/orgSupport.d.ts +20 -3
- package/orgSupport.js +17 -0
- package/orgSupport.js.map +1 -1
- package/package.json +1 -1
- package/policy/getDefaultPolicy.d.ts +7 -9
- package/policy/getDefaultPolicy.js +2 -6
- package/policy/getDefaultPolicy.js.map +1 -1
- package/policy/getPolicy.d.ts +10 -11
- package/policy/getPolicy.js +2 -2
- package/policy/getPolicy.js.map +1 -1
- package/policy/mfa.d.ts +259 -18
- package/policy/mfa.js +49 -0
- package/policy/mfa.js.map +1 -1
- package/policy/password.d.ts +117 -90
- package/policy/password.js +27 -0
- package/policy/password.js.map +1 -1
- package/policy/ruleIdpDiscovery.d.ts +149 -27
- package/policy/ruleIdpDiscovery.js +65 -0
- package/policy/ruleIdpDiscovery.js.map +1 -1
- package/policy/ruleMfa.d.ts +35 -24
- package/policy/ruleMfa.js +11 -0
- package/policy/ruleMfa.js.map +1 -1
- package/policy/rulePassword.d.ts +46 -33
- package/policy/rulePassword.js +13 -0
- package/policy/rulePassword.js.map +1 -1
- package/policy/ruleSignon.d.ts +170 -57
- package/policy/ruleSignon.js +92 -0
- package/policy/ruleSignon.js.map +1 -1
- package/policy/signon.d.ts +41 -15
- package/policy/signon.js +26 -0
- package/policy/signon.js.map +1 -1
- package/policyMfaDefault.d.ts +250 -13
- package/policyMfaDefault.js +45 -0
- package/policyMfaDefault.js.map +1 -1
- package/policyPasswordDefault.d.ts +88 -54
- package/policyPasswordDefault.js +22 -0
- package/policyPasswordDefault.js.map +1 -1
- package/policyProfileEnrollment.d.ts +28 -6
- package/policyProfileEnrollment.js +22 -0
- package/policyProfileEnrollment.js.map +1 -1
- package/policyProfileEnrollmentApps.d.ts +42 -5
- package/policyProfileEnrollmentApps.js +37 -0
- package/policyProfileEnrollmentApps.js.map +1 -1
- package/policyRuleProfileEnrollment.d.ts +88 -26
- package/policyRuleProfileEnrollment.js +62 -0
- package/policyRuleProfileEnrollment.js.map +1 -1
- package/profile/mapping.d.ts +95 -9
- package/profile/mapping.js +41 -0
- package/profile/mapping.js.map +1 -1
- package/rateLimiting.d.ts +43 -9
- package/rateLimiting.js +28 -0
- package/rateLimiting.js.map +1 -1
- package/resourceSet.d.ts +32 -10
- package/resourceSet.js +20 -1
- package/resourceSet.js.map +1 -1
- package/roleSubscription.d.ts +110 -9
- package/roleSubscription.js +26 -0
- package/roleSubscription.js.map +1 -1
- package/securityNotificationEmails.d.ts +45 -15
- package/securityNotificationEmails.js +30 -0
- package/securityNotificationEmails.js.map +1 -1
- package/templateSms.d.ts +47 -3
- package/templateSms.js +35 -0
- package/templateSms.js.map +1 -1
- package/theme.d.ts +59 -44
- package/theme.js +15 -0
- package/theme.js.map +1 -1
- package/threatInsightSettings.d.ts +58 -6
- package/threatInsightSettings.js +34 -0
- package/threatInsightSettings.js.map +1 -1
- package/trustedorigin/origin.d.ts +37 -12
- package/trustedorigin/origin.js +25 -0
- package/trustedorigin/origin.js.map +1 -1
- package/types/input.d.ts +227 -60
- package/types/output.d.ts +446 -56
- package/user/getUser.d.ts +104 -32
- package/user/getUser.js +2 -2
- package/user/getUser.js.map +1 -1
- package/user/getUserProfileMappingSource.d.ts +7 -9
- package/user/getUserProfileMappingSource.js +4 -6
- package/user/getUserProfileMappingSource.js.map +1 -1
- package/user/getUserType.d.ts +7 -7
- package/user/getUserType.js +2 -2
- package/user/getUsers.d.ts +57 -61
- package/user/getUsers.js +44 -30
- package/user/getUsers.js.map +1 -1
- package/user/user.d.ts +215 -117
- package/user/user.js +71 -0
- package/user/user.js.map +1 -1
- package/user/userType.d.ts +34 -9
- package/user/userType.js +25 -0
- package/user/userType.js.map +1 -1
- package/userAdminRoles.d.ts +41 -10
- package/userAdminRoles.js +29 -1
- package/userAdminRoles.js.map +1 -1
- package/userBaseSchemaProperty.d.ts +67 -24
- package/userBaseSchemaProperty.js +43 -0
- package/userBaseSchemaProperty.js.map +1 -1
- package/userFactorQuestion.d.ts +52 -14
- package/userFactorQuestion.js +39 -1
- package/userFactorQuestion.js.map +1 -1
- package/userGroupMemberships.d.ts +23 -4
- package/userGroupMemberships.js +20 -1
- package/userGroupMemberships.js.map +1 -1
- package/userSchemaProperty.d.ts +107 -57
- package/userSchemaProperty.js +32 -0
- package/userSchemaProperty.js.map +1 -1
- package/utilities.d.ts +4 -0
- package/utilities.js +33 -1
- package/utilities.js.map +1 -1
|
@@ -1,6 +1,71 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
import * as inputs from "../types/input";
|
|
3
3
|
import * as outputs from "../types/output";
|
|
4
|
+
/**
|
|
5
|
+
* This resource allows you to create and configure an IdP Discovery Policy Rule.
|
|
6
|
+
*
|
|
7
|
+
* > If you receive the error `You do not have permission to access the feature
|
|
8
|
+
* you are requesting` contact support and
|
|
9
|
+
* request feature flag `ADVANCED_SSO` be applied to your org.
|
|
10
|
+
*
|
|
11
|
+
* ## Example Usage
|
|
12
|
+
*
|
|
13
|
+
* ```typescript
|
|
14
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
15
|
+
* import * as okta from "@pulumi/okta";
|
|
16
|
+
*
|
|
17
|
+
* const idpDiscoveryPolicy = okta.policy.getPolicy({
|
|
18
|
+
* name: "Idp Discovery Policy",
|
|
19
|
+
* type: "IDP_DISCOVERY",
|
|
20
|
+
* });
|
|
21
|
+
* const example = new okta.policy.RuleIdpDiscovery("example", {
|
|
22
|
+
* policyId: idpDiscoveryPolicy.then(idpDiscoveryPolicy => idpDiscoveryPolicy.id),
|
|
23
|
+
* idpId: "<idp id>",
|
|
24
|
+
* idpType: "OIDC",
|
|
25
|
+
* networkConnection: "ANYWHERE",
|
|
26
|
+
* priority: 1,
|
|
27
|
+
* status: "ACTIVE",
|
|
28
|
+
* userIdentifierType: "ATTRIBUTE",
|
|
29
|
+
* userIdentifierAttribute: "company",
|
|
30
|
+
* appExcludes: [
|
|
31
|
+
* {
|
|
32
|
+
* id: "<app id>",
|
|
33
|
+
* type: "APP",
|
|
34
|
+
* },
|
|
35
|
+
* {
|
|
36
|
+
* name: "yahoo_mail",
|
|
37
|
+
* type: "APP_TYPE",
|
|
38
|
+
* },
|
|
39
|
+
* ],
|
|
40
|
+
* appIncludes: [
|
|
41
|
+
* {
|
|
42
|
+
* id: "<app id>",
|
|
43
|
+
* type: "APP",
|
|
44
|
+
* },
|
|
45
|
+
* {
|
|
46
|
+
* name: "<app type name>",
|
|
47
|
+
* type: "APP_TYPE",
|
|
48
|
+
* },
|
|
49
|
+
* ],
|
|
50
|
+
* platformIncludes: [{
|
|
51
|
+
* type: "MOBILE",
|
|
52
|
+
* osType: "OSX",
|
|
53
|
+
* }],
|
|
54
|
+
* userIdentifierPatterns: [{
|
|
55
|
+
* matchType: "EQUALS",
|
|
56
|
+
* value: "Articulate",
|
|
57
|
+
* }],
|
|
58
|
+
* });
|
|
59
|
+
* ```
|
|
60
|
+
*
|
|
61
|
+
* ## Import
|
|
62
|
+
*
|
|
63
|
+
* A Policy Rule can be imported via the Policy and Rule ID.
|
|
64
|
+
*
|
|
65
|
+
* ```sh
|
|
66
|
+
* $ pulumi import okta:policy/ruleIdpDiscovery:RuleIdpDiscovery example <policy id>/<rule id>
|
|
67
|
+
* ```
|
|
68
|
+
*/
|
|
4
69
|
export declare class RuleIdpDiscovery extends pulumi.CustomResource {
|
|
5
70
|
/**
|
|
6
71
|
* Get an existing RuleIdpDiscovery resource's state with the given name, ID, and optional extra
|
|
@@ -18,46 +83,65 @@ export declare class RuleIdpDiscovery extends pulumi.CustomResource {
|
|
|
18
83
|
*/
|
|
19
84
|
static isInstance(obj: any): obj is RuleIdpDiscovery;
|
|
20
85
|
/**
|
|
21
|
-
* Applications to exclude in discovery
|
|
86
|
+
* Applications to exclude in discovery. See `appInclude` for details.
|
|
87
|
+
*
|
|
88
|
+
* ```typescript
|
|
89
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
90
|
+
* ```
|
|
22
91
|
*/
|
|
23
92
|
readonly appExcludes: pulumi.Output<outputs.policy.RuleIdpDiscoveryAppExclude[] | undefined>;
|
|
24
93
|
/**
|
|
25
|
-
* Applications to include in discovery rule
|
|
94
|
+
* Applications to include in discovery rule.
|
|
26
95
|
*/
|
|
27
96
|
readonly appIncludes: pulumi.Output<outputs.policy.RuleIdpDiscoveryAppInclude[] | undefined>;
|
|
97
|
+
/**
|
|
98
|
+
* The identifier for the Idp the rule should route to if all conditions are met.
|
|
99
|
+
*/
|
|
28
100
|
readonly idpId: pulumi.Output<string | undefined>;
|
|
101
|
+
/**
|
|
102
|
+
* Type of Idp. One of: `"SAML2"`, `"IWA"`, `"AgentlessDSSO"`, `"X509"`, `"FACEBOOK"`, `"GOOGLE"`, `"LINKEDIN"`, `"MICROSOFT"`, `"OIDC"`
|
|
103
|
+
*/
|
|
29
104
|
readonly idpType: pulumi.Output<string | undefined>;
|
|
30
105
|
/**
|
|
31
|
-
*
|
|
106
|
+
* Use if the `type` is `"APP_TYPE"` to indicate the type of application(s) to include in instances where an entire group (i.e. `yahooMail`) of applications should be included.
|
|
32
107
|
*/
|
|
33
108
|
readonly name: pulumi.Output<string>;
|
|
34
109
|
/**
|
|
35
|
-
*
|
|
110
|
+
* The network selection mode. One of `"ANYWEHRE"` or `"ZONE"`.
|
|
36
111
|
*/
|
|
37
112
|
readonly networkConnection: pulumi.Output<string | undefined>;
|
|
38
113
|
/**
|
|
39
|
-
*
|
|
114
|
+
* Required if `networkConnection` = `"ZONE"`. Indicates the network zones to exclude.
|
|
40
115
|
*/
|
|
41
116
|
readonly networkExcludes: pulumi.Output<string[] | undefined>;
|
|
42
117
|
/**
|
|
43
|
-
*
|
|
118
|
+
* Required if `networkConnection` = `"ZONE"`. Indicates the network zones to include.
|
|
44
119
|
*/
|
|
45
120
|
readonly networkIncludes: pulumi.Output<string[] | undefined>;
|
|
46
121
|
readonly platformIncludes: pulumi.Output<outputs.policy.RuleIdpDiscoveryPlatformInclude[] | undefined>;
|
|
47
122
|
/**
|
|
48
|
-
* Policy ID
|
|
123
|
+
* Policy ID.
|
|
49
124
|
*/
|
|
50
125
|
readonly policyId: pulumi.Output<string | undefined>;
|
|
51
126
|
/**
|
|
52
|
-
*
|
|
127
|
+
* Idp rule priority. This attribute can be set to a valid priority. To avoid an endless diff situation an error is thrown if an invalid property is provided. The Okta API defaults to the last (lowest) if not provided.
|
|
53
128
|
*/
|
|
54
129
|
readonly priority: pulumi.Output<number | undefined>;
|
|
55
130
|
/**
|
|
56
|
-
*
|
|
131
|
+
* Idp rule status: `"ACTIVE"` or `"INACTIVE"`. By default, it is `"ACTIVE"`.
|
|
57
132
|
*/
|
|
58
133
|
readonly status: pulumi.Output<string | undefined>;
|
|
134
|
+
/**
|
|
135
|
+
* Profile attribute matching can only have a single value that describes the type indicated in `userIdentifierType`. This is the attribute or identifier that the `userIdentifierPatterns` are checked against.
|
|
136
|
+
*/
|
|
59
137
|
readonly userIdentifierAttribute: pulumi.Output<string | undefined>;
|
|
138
|
+
/**
|
|
139
|
+
* Specifies a User Identifier pattern condition to match against. If `matchType` of `"EXPRESSION"` is used, only a *single* element can be set, otherwise multiple elements of matching patterns may be provided.
|
|
140
|
+
*/
|
|
60
141
|
readonly userIdentifierPatterns: pulumi.Output<outputs.policy.RuleIdpDiscoveryUserIdentifierPattern[] | undefined>;
|
|
142
|
+
/**
|
|
143
|
+
* One of: `"IDENTIFIER"`, `"ATTRIBUTE"`
|
|
144
|
+
*/
|
|
61
145
|
readonly userIdentifierType: pulumi.Output<string | undefined>;
|
|
62
146
|
/**
|
|
63
147
|
* Create a RuleIdpDiscovery resource with the given unique name, arguments, and options.
|
|
@@ -73,46 +157,65 @@ export declare class RuleIdpDiscovery extends pulumi.CustomResource {
|
|
|
73
157
|
*/
|
|
74
158
|
export interface RuleIdpDiscoveryState {
|
|
75
159
|
/**
|
|
76
|
-
* Applications to exclude in discovery
|
|
160
|
+
* Applications to exclude in discovery. See `appInclude` for details.
|
|
161
|
+
*
|
|
162
|
+
* ```typescript
|
|
163
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
164
|
+
* ```
|
|
77
165
|
*/
|
|
78
166
|
appExcludes?: pulumi.Input<pulumi.Input<inputs.policy.RuleIdpDiscoveryAppExclude>[]>;
|
|
79
167
|
/**
|
|
80
|
-
* Applications to include in discovery rule
|
|
168
|
+
* Applications to include in discovery rule.
|
|
81
169
|
*/
|
|
82
170
|
appIncludes?: pulumi.Input<pulumi.Input<inputs.policy.RuleIdpDiscoveryAppInclude>[]>;
|
|
171
|
+
/**
|
|
172
|
+
* The identifier for the Idp the rule should route to if all conditions are met.
|
|
173
|
+
*/
|
|
83
174
|
idpId?: pulumi.Input<string>;
|
|
175
|
+
/**
|
|
176
|
+
* Type of Idp. One of: `"SAML2"`, `"IWA"`, `"AgentlessDSSO"`, `"X509"`, `"FACEBOOK"`, `"GOOGLE"`, `"LINKEDIN"`, `"MICROSOFT"`, `"OIDC"`
|
|
177
|
+
*/
|
|
84
178
|
idpType?: pulumi.Input<string>;
|
|
85
179
|
/**
|
|
86
|
-
*
|
|
180
|
+
* Use if the `type` is `"APP_TYPE"` to indicate the type of application(s) to include in instances where an entire group (i.e. `yahooMail`) of applications should be included.
|
|
87
181
|
*/
|
|
88
182
|
name?: pulumi.Input<string>;
|
|
89
183
|
/**
|
|
90
|
-
*
|
|
184
|
+
* The network selection mode. One of `"ANYWEHRE"` or `"ZONE"`.
|
|
91
185
|
*/
|
|
92
186
|
networkConnection?: pulumi.Input<string>;
|
|
93
187
|
/**
|
|
94
|
-
*
|
|
188
|
+
* Required if `networkConnection` = `"ZONE"`. Indicates the network zones to exclude.
|
|
95
189
|
*/
|
|
96
190
|
networkExcludes?: pulumi.Input<pulumi.Input<string>[]>;
|
|
97
191
|
/**
|
|
98
|
-
*
|
|
192
|
+
* Required if `networkConnection` = `"ZONE"`. Indicates the network zones to include.
|
|
99
193
|
*/
|
|
100
194
|
networkIncludes?: pulumi.Input<pulumi.Input<string>[]>;
|
|
101
195
|
platformIncludes?: pulumi.Input<pulumi.Input<inputs.policy.RuleIdpDiscoveryPlatformInclude>[]>;
|
|
102
196
|
/**
|
|
103
|
-
* Policy ID
|
|
197
|
+
* Policy ID.
|
|
104
198
|
*/
|
|
105
199
|
policyId?: pulumi.Input<string>;
|
|
106
200
|
/**
|
|
107
|
-
*
|
|
201
|
+
* Idp rule priority. This attribute can be set to a valid priority. To avoid an endless diff situation an error is thrown if an invalid property is provided. The Okta API defaults to the last (lowest) if not provided.
|
|
108
202
|
*/
|
|
109
203
|
priority?: pulumi.Input<number>;
|
|
110
204
|
/**
|
|
111
|
-
*
|
|
205
|
+
* Idp rule status: `"ACTIVE"` or `"INACTIVE"`. By default, it is `"ACTIVE"`.
|
|
112
206
|
*/
|
|
113
207
|
status?: pulumi.Input<string>;
|
|
208
|
+
/**
|
|
209
|
+
* Profile attribute matching can only have a single value that describes the type indicated in `userIdentifierType`. This is the attribute or identifier that the `userIdentifierPatterns` are checked against.
|
|
210
|
+
*/
|
|
114
211
|
userIdentifierAttribute?: pulumi.Input<string>;
|
|
212
|
+
/**
|
|
213
|
+
* Specifies a User Identifier pattern condition to match against. If `matchType` of `"EXPRESSION"` is used, only a *single* element can be set, otherwise multiple elements of matching patterns may be provided.
|
|
214
|
+
*/
|
|
115
215
|
userIdentifierPatterns?: pulumi.Input<pulumi.Input<inputs.policy.RuleIdpDiscoveryUserIdentifierPattern>[]>;
|
|
216
|
+
/**
|
|
217
|
+
* One of: `"IDENTIFIER"`, `"ATTRIBUTE"`
|
|
218
|
+
*/
|
|
116
219
|
userIdentifierType?: pulumi.Input<string>;
|
|
117
220
|
}
|
|
118
221
|
/**
|
|
@@ -120,45 +223,64 @@ export interface RuleIdpDiscoveryState {
|
|
|
120
223
|
*/
|
|
121
224
|
export interface RuleIdpDiscoveryArgs {
|
|
122
225
|
/**
|
|
123
|
-
* Applications to exclude in discovery
|
|
226
|
+
* Applications to exclude in discovery. See `appInclude` for details.
|
|
227
|
+
*
|
|
228
|
+
* ```typescript
|
|
229
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
230
|
+
* ```
|
|
124
231
|
*/
|
|
125
232
|
appExcludes?: pulumi.Input<pulumi.Input<inputs.policy.RuleIdpDiscoveryAppExclude>[]>;
|
|
126
233
|
/**
|
|
127
|
-
* Applications to include in discovery rule
|
|
234
|
+
* Applications to include in discovery rule.
|
|
128
235
|
*/
|
|
129
236
|
appIncludes?: pulumi.Input<pulumi.Input<inputs.policy.RuleIdpDiscoveryAppInclude>[]>;
|
|
237
|
+
/**
|
|
238
|
+
* The identifier for the Idp the rule should route to if all conditions are met.
|
|
239
|
+
*/
|
|
130
240
|
idpId?: pulumi.Input<string>;
|
|
241
|
+
/**
|
|
242
|
+
* Type of Idp. One of: `"SAML2"`, `"IWA"`, `"AgentlessDSSO"`, `"X509"`, `"FACEBOOK"`, `"GOOGLE"`, `"LINKEDIN"`, `"MICROSOFT"`, `"OIDC"`
|
|
243
|
+
*/
|
|
131
244
|
idpType?: pulumi.Input<string>;
|
|
132
245
|
/**
|
|
133
|
-
*
|
|
246
|
+
* Use if the `type` is `"APP_TYPE"` to indicate the type of application(s) to include in instances where an entire group (i.e. `yahooMail`) of applications should be included.
|
|
134
247
|
*/
|
|
135
248
|
name?: pulumi.Input<string>;
|
|
136
249
|
/**
|
|
137
|
-
*
|
|
250
|
+
* The network selection mode. One of `"ANYWEHRE"` or `"ZONE"`.
|
|
138
251
|
*/
|
|
139
252
|
networkConnection?: pulumi.Input<string>;
|
|
140
253
|
/**
|
|
141
|
-
*
|
|
254
|
+
* Required if `networkConnection` = `"ZONE"`. Indicates the network zones to exclude.
|
|
142
255
|
*/
|
|
143
256
|
networkExcludes?: pulumi.Input<pulumi.Input<string>[]>;
|
|
144
257
|
/**
|
|
145
|
-
*
|
|
258
|
+
* Required if `networkConnection` = `"ZONE"`. Indicates the network zones to include.
|
|
146
259
|
*/
|
|
147
260
|
networkIncludes?: pulumi.Input<pulumi.Input<string>[]>;
|
|
148
261
|
platformIncludes?: pulumi.Input<pulumi.Input<inputs.policy.RuleIdpDiscoveryPlatformInclude>[]>;
|
|
149
262
|
/**
|
|
150
|
-
* Policy ID
|
|
263
|
+
* Policy ID.
|
|
151
264
|
*/
|
|
152
265
|
policyId?: pulumi.Input<string>;
|
|
153
266
|
/**
|
|
154
|
-
*
|
|
267
|
+
* Idp rule priority. This attribute can be set to a valid priority. To avoid an endless diff situation an error is thrown if an invalid property is provided. The Okta API defaults to the last (lowest) if not provided.
|
|
155
268
|
*/
|
|
156
269
|
priority?: pulumi.Input<number>;
|
|
157
270
|
/**
|
|
158
|
-
*
|
|
271
|
+
* Idp rule status: `"ACTIVE"` or `"INACTIVE"`. By default, it is `"ACTIVE"`.
|
|
159
272
|
*/
|
|
160
273
|
status?: pulumi.Input<string>;
|
|
274
|
+
/**
|
|
275
|
+
* Profile attribute matching can only have a single value that describes the type indicated in `userIdentifierType`. This is the attribute or identifier that the `userIdentifierPatterns` are checked against.
|
|
276
|
+
*/
|
|
161
277
|
userIdentifierAttribute?: pulumi.Input<string>;
|
|
278
|
+
/**
|
|
279
|
+
* Specifies a User Identifier pattern condition to match against. If `matchType` of `"EXPRESSION"` is used, only a *single* element can be set, otherwise multiple elements of matching patterns may be provided.
|
|
280
|
+
*/
|
|
162
281
|
userIdentifierPatterns?: pulumi.Input<pulumi.Input<inputs.policy.RuleIdpDiscoveryUserIdentifierPattern>[]>;
|
|
282
|
+
/**
|
|
283
|
+
* One of: `"IDENTIFIER"`, `"ATTRIBUTE"`
|
|
284
|
+
*/
|
|
163
285
|
userIdentifierType?: pulumi.Input<string>;
|
|
164
286
|
}
|
|
@@ -5,6 +5,71 @@ Object.defineProperty(exports, "__esModule", { value: true });
|
|
|
5
5
|
exports.RuleIdpDiscovery = void 0;
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
|
+
/**
|
|
9
|
+
* This resource allows you to create and configure an IdP Discovery Policy Rule.
|
|
10
|
+
*
|
|
11
|
+
* > If you receive the error `You do not have permission to access the feature
|
|
12
|
+
* you are requesting` contact support and
|
|
13
|
+
* request feature flag `ADVANCED_SSO` be applied to your org.
|
|
14
|
+
*
|
|
15
|
+
* ## Example Usage
|
|
16
|
+
*
|
|
17
|
+
* ```typescript
|
|
18
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
19
|
+
* import * as okta from "@pulumi/okta";
|
|
20
|
+
*
|
|
21
|
+
* const idpDiscoveryPolicy = okta.policy.getPolicy({
|
|
22
|
+
* name: "Idp Discovery Policy",
|
|
23
|
+
* type: "IDP_DISCOVERY",
|
|
24
|
+
* });
|
|
25
|
+
* const example = new okta.policy.RuleIdpDiscovery("example", {
|
|
26
|
+
* policyId: idpDiscoveryPolicy.then(idpDiscoveryPolicy => idpDiscoveryPolicy.id),
|
|
27
|
+
* idpId: "<idp id>",
|
|
28
|
+
* idpType: "OIDC",
|
|
29
|
+
* networkConnection: "ANYWHERE",
|
|
30
|
+
* priority: 1,
|
|
31
|
+
* status: "ACTIVE",
|
|
32
|
+
* userIdentifierType: "ATTRIBUTE",
|
|
33
|
+
* userIdentifierAttribute: "company",
|
|
34
|
+
* appExcludes: [
|
|
35
|
+
* {
|
|
36
|
+
* id: "<app id>",
|
|
37
|
+
* type: "APP",
|
|
38
|
+
* },
|
|
39
|
+
* {
|
|
40
|
+
* name: "yahoo_mail",
|
|
41
|
+
* type: "APP_TYPE",
|
|
42
|
+
* },
|
|
43
|
+
* ],
|
|
44
|
+
* appIncludes: [
|
|
45
|
+
* {
|
|
46
|
+
* id: "<app id>",
|
|
47
|
+
* type: "APP",
|
|
48
|
+
* },
|
|
49
|
+
* {
|
|
50
|
+
* name: "<app type name>",
|
|
51
|
+
* type: "APP_TYPE",
|
|
52
|
+
* },
|
|
53
|
+
* ],
|
|
54
|
+
* platformIncludes: [{
|
|
55
|
+
* type: "MOBILE",
|
|
56
|
+
* osType: "OSX",
|
|
57
|
+
* }],
|
|
58
|
+
* userIdentifierPatterns: [{
|
|
59
|
+
* matchType: "EQUALS",
|
|
60
|
+
* value: "Articulate",
|
|
61
|
+
* }],
|
|
62
|
+
* });
|
|
63
|
+
* ```
|
|
64
|
+
*
|
|
65
|
+
* ## Import
|
|
66
|
+
*
|
|
67
|
+
* A Policy Rule can be imported via the Policy and Rule ID.
|
|
68
|
+
*
|
|
69
|
+
* ```sh
|
|
70
|
+
* $ pulumi import okta:policy/ruleIdpDiscovery:RuleIdpDiscovery example <policy id>/<rule id>
|
|
71
|
+
* ```
|
|
72
|
+
*/
|
|
8
73
|
class RuleIdpDiscovery extends pulumi.CustomResource {
|
|
9
74
|
/**
|
|
10
75
|
* Get an existing RuleIdpDiscovery resource's state with the given name, ID, and optional extra
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"ruleIdpDiscovery.js","sourceRoot":"","sources":["../../policy/ruleIdpDiscovery.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C,MAAa,gBAAiB,SAAQ,MAAM,CAAC,cAAc;IACvD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA6B,EAAE,IAAmC;QAC3H,OAAO,IAAI,gBAAgB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACvE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,gBAAgB,CAAC,YAAY,CAAC;IACjE,CAAC;
|
|
1
|
+
{"version":3,"file":"ruleIdpDiscovery.js","sourceRoot":"","sources":["../../policy/ruleIdpDiscovery.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAgEG;AACH,MAAa,gBAAiB,SAAQ,MAAM,CAAC,cAAc;IACvD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA6B,EAAE,IAAmC;QAC3H,OAAO,IAAI,gBAAgB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACvE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,gBAAgB,CAAC,YAAY,CAAC;IACjE,CAAC;IAwED,YAAY,IAAY,EAAE,WAA0D,EAAE,IAAmC;QACrH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAgD,CAAC;YAC/D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,yBAAyB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;SACvF;aAAM;YACH,MAAM,IAAI,GAAG,WAA+C,CAAC;YAC7D,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,yBAAyB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;SACrF;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,gBAAgB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACrE,CAAC;;AA1IL,4CA2IC;AA7HG,gBAAgB;AACO,6BAAY,GAAG,+CAA+C,CAAC"}
|
package/policy/ruleMfa.d.ts
CHANGED
|
@@ -1,6 +1,17 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
import * as inputs from "../types/input";
|
|
3
3
|
import * as outputs from "../types/output";
|
|
4
|
+
/**
|
|
5
|
+
* This resource allows you to create and configure an MFA Policy Rule.
|
|
6
|
+
*
|
|
7
|
+
* ## Import
|
|
8
|
+
*
|
|
9
|
+
* A Policy Rule can be imported via the Policy and Rule ID.
|
|
10
|
+
*
|
|
11
|
+
* ```sh
|
|
12
|
+
* $ pulumi import okta:policy/ruleMfa:RuleMfa example <policy id>/<rule id>
|
|
13
|
+
* ```
|
|
14
|
+
*/
|
|
4
15
|
export declare class RuleMfa extends pulumi.CustomResource {
|
|
5
16
|
/**
|
|
6
17
|
* Get an existing RuleMfa resource's state with the given name, ID, and optional extra
|
|
@@ -22,31 +33,31 @@ export declare class RuleMfa extends pulumi.CustomResource {
|
|
|
22
33
|
*/
|
|
23
34
|
readonly appExcludes: pulumi.Output<outputs.policy.RuleMfaAppExclude[] | undefined>;
|
|
24
35
|
/**
|
|
25
|
-
* Applications to include
|
|
36
|
+
* Applications to include in discovery rule. **IMPORTANT**: this field is only available in Classic Organizations.
|
|
26
37
|
*/
|
|
27
38
|
readonly appIncludes: pulumi.Output<outputs.policy.RuleMfaAppInclude[] | undefined>;
|
|
28
39
|
/**
|
|
29
|
-
*
|
|
40
|
+
* When a user should be prompted for MFA. It can be `"CHALLENGE"`, `"LOGIN"`, or `"NEVER"`.
|
|
30
41
|
*/
|
|
31
42
|
readonly enroll: pulumi.Output<string | undefined>;
|
|
32
43
|
/**
|
|
33
|
-
*
|
|
44
|
+
* Use if the `type` is `"APP_TYPE"` to indicate the type of application(s) to include in instances where an entire group (i.e. `yahooMail`) of applications should be included.
|
|
34
45
|
*/
|
|
35
46
|
readonly name: pulumi.Output<string>;
|
|
36
47
|
/**
|
|
37
|
-
* Network selection mode: ANYWHERE
|
|
48
|
+
* Network selection mode: `"ANYWHERE"`, `"ZONE"`, `"ON_NETWORK"`, or `"OFF_NETWORK"`.
|
|
38
49
|
*/
|
|
39
50
|
readonly networkConnection: pulumi.Output<string | undefined>;
|
|
40
51
|
/**
|
|
41
|
-
* The zones to exclude
|
|
52
|
+
* The network zones to exclude. Conflicts with `networkIncludes`.
|
|
42
53
|
*/
|
|
43
54
|
readonly networkExcludes: pulumi.Output<string[] | undefined>;
|
|
44
55
|
/**
|
|
45
|
-
* The zones to include
|
|
56
|
+
* The network zones to include. Conflicts with `networkExcludes`.
|
|
46
57
|
*/
|
|
47
58
|
readonly networkIncludes: pulumi.Output<string[] | undefined>;
|
|
48
59
|
/**
|
|
49
|
-
* Policy ID
|
|
60
|
+
* Policy ID.
|
|
50
61
|
*/
|
|
51
62
|
readonly policyId: pulumi.Output<string | undefined>;
|
|
52
63
|
/**
|
|
@@ -54,7 +65,7 @@ export declare class RuleMfa extends pulumi.CustomResource {
|
|
|
54
65
|
*/
|
|
55
66
|
readonly priority: pulumi.Output<number | undefined>;
|
|
56
67
|
/**
|
|
57
|
-
* Policy Rule Status: ACTIVE or INACTIVE
|
|
68
|
+
* Policy Rule Status: `"ACTIVE"` or `"INACTIVE"`.
|
|
58
69
|
*/
|
|
59
70
|
readonly status: pulumi.Output<string | undefined>;
|
|
60
71
|
/**
|
|
@@ -79,31 +90,31 @@ export interface RuleMfaState {
|
|
|
79
90
|
*/
|
|
80
91
|
appExcludes?: pulumi.Input<pulumi.Input<inputs.policy.RuleMfaAppExclude>[]>;
|
|
81
92
|
/**
|
|
82
|
-
* Applications to include
|
|
93
|
+
* Applications to include in discovery rule. **IMPORTANT**: this field is only available in Classic Organizations.
|
|
83
94
|
*/
|
|
84
95
|
appIncludes?: pulumi.Input<pulumi.Input<inputs.policy.RuleMfaAppInclude>[]>;
|
|
85
96
|
/**
|
|
86
|
-
*
|
|
97
|
+
* When a user should be prompted for MFA. It can be `"CHALLENGE"`, `"LOGIN"`, or `"NEVER"`.
|
|
87
98
|
*/
|
|
88
99
|
enroll?: pulumi.Input<string>;
|
|
89
100
|
/**
|
|
90
|
-
*
|
|
101
|
+
* Use if the `type` is `"APP_TYPE"` to indicate the type of application(s) to include in instances where an entire group (i.e. `yahooMail`) of applications should be included.
|
|
91
102
|
*/
|
|
92
103
|
name?: pulumi.Input<string>;
|
|
93
104
|
/**
|
|
94
|
-
* Network selection mode: ANYWHERE
|
|
105
|
+
* Network selection mode: `"ANYWHERE"`, `"ZONE"`, `"ON_NETWORK"`, or `"OFF_NETWORK"`.
|
|
95
106
|
*/
|
|
96
107
|
networkConnection?: pulumi.Input<string>;
|
|
97
108
|
/**
|
|
98
|
-
* The zones to exclude
|
|
109
|
+
* The network zones to exclude. Conflicts with `networkIncludes`.
|
|
99
110
|
*/
|
|
100
111
|
networkExcludes?: pulumi.Input<pulumi.Input<string>[]>;
|
|
101
112
|
/**
|
|
102
|
-
* The zones to include
|
|
113
|
+
* The network zones to include. Conflicts with `networkExcludes`.
|
|
103
114
|
*/
|
|
104
115
|
networkIncludes?: pulumi.Input<pulumi.Input<string>[]>;
|
|
105
116
|
/**
|
|
106
|
-
* Policy ID
|
|
117
|
+
* Policy ID.
|
|
107
118
|
*/
|
|
108
119
|
policyId?: pulumi.Input<string>;
|
|
109
120
|
/**
|
|
@@ -111,7 +122,7 @@ export interface RuleMfaState {
|
|
|
111
122
|
*/
|
|
112
123
|
priority?: pulumi.Input<number>;
|
|
113
124
|
/**
|
|
114
|
-
* Policy Rule Status: ACTIVE or INACTIVE
|
|
125
|
+
* Policy Rule Status: `"ACTIVE"` or `"INACTIVE"`.
|
|
115
126
|
*/
|
|
116
127
|
status?: pulumi.Input<string>;
|
|
117
128
|
/**
|
|
@@ -128,31 +139,31 @@ export interface RuleMfaArgs {
|
|
|
128
139
|
*/
|
|
129
140
|
appExcludes?: pulumi.Input<pulumi.Input<inputs.policy.RuleMfaAppExclude>[]>;
|
|
130
141
|
/**
|
|
131
|
-
* Applications to include
|
|
142
|
+
* Applications to include in discovery rule. **IMPORTANT**: this field is only available in Classic Organizations.
|
|
132
143
|
*/
|
|
133
144
|
appIncludes?: pulumi.Input<pulumi.Input<inputs.policy.RuleMfaAppInclude>[]>;
|
|
134
145
|
/**
|
|
135
|
-
*
|
|
146
|
+
* When a user should be prompted for MFA. It can be `"CHALLENGE"`, `"LOGIN"`, or `"NEVER"`.
|
|
136
147
|
*/
|
|
137
148
|
enroll?: pulumi.Input<string>;
|
|
138
149
|
/**
|
|
139
|
-
*
|
|
150
|
+
* Use if the `type` is `"APP_TYPE"` to indicate the type of application(s) to include in instances where an entire group (i.e. `yahooMail`) of applications should be included.
|
|
140
151
|
*/
|
|
141
152
|
name?: pulumi.Input<string>;
|
|
142
153
|
/**
|
|
143
|
-
* Network selection mode: ANYWHERE
|
|
154
|
+
* Network selection mode: `"ANYWHERE"`, `"ZONE"`, `"ON_NETWORK"`, or `"OFF_NETWORK"`.
|
|
144
155
|
*/
|
|
145
156
|
networkConnection?: pulumi.Input<string>;
|
|
146
157
|
/**
|
|
147
|
-
* The zones to exclude
|
|
158
|
+
* The network zones to exclude. Conflicts with `networkIncludes`.
|
|
148
159
|
*/
|
|
149
160
|
networkExcludes?: pulumi.Input<pulumi.Input<string>[]>;
|
|
150
161
|
/**
|
|
151
|
-
* The zones to include
|
|
162
|
+
* The network zones to include. Conflicts with `networkExcludes`.
|
|
152
163
|
*/
|
|
153
164
|
networkIncludes?: pulumi.Input<pulumi.Input<string>[]>;
|
|
154
165
|
/**
|
|
155
|
-
* Policy ID
|
|
166
|
+
* Policy ID.
|
|
156
167
|
*/
|
|
157
168
|
policyId?: pulumi.Input<string>;
|
|
158
169
|
/**
|
|
@@ -160,7 +171,7 @@ export interface RuleMfaArgs {
|
|
|
160
171
|
*/
|
|
161
172
|
priority?: pulumi.Input<number>;
|
|
162
173
|
/**
|
|
163
|
-
* Policy Rule Status: ACTIVE or INACTIVE
|
|
174
|
+
* Policy Rule Status: `"ACTIVE"` or `"INACTIVE"`.
|
|
164
175
|
*/
|
|
165
176
|
status?: pulumi.Input<string>;
|
|
166
177
|
/**
|
package/policy/ruleMfa.js
CHANGED
|
@@ -5,6 +5,17 @@ Object.defineProperty(exports, "__esModule", { value: true });
|
|
|
5
5
|
exports.RuleMfa = void 0;
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
|
+
/**
|
|
9
|
+
* This resource allows you to create and configure an MFA Policy Rule.
|
|
10
|
+
*
|
|
11
|
+
* ## Import
|
|
12
|
+
*
|
|
13
|
+
* A Policy Rule can be imported via the Policy and Rule ID.
|
|
14
|
+
*
|
|
15
|
+
* ```sh
|
|
16
|
+
* $ pulumi import okta:policy/ruleMfa:RuleMfa example <policy id>/<rule id>
|
|
17
|
+
* ```
|
|
18
|
+
*/
|
|
8
19
|
class RuleMfa extends pulumi.CustomResource {
|
|
9
20
|
/**
|
|
10
21
|
* Get an existing RuleMfa resource's state with the given name, ID, and optional extra
|
package/policy/ruleMfa.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"ruleMfa.js","sourceRoot":"","sources":["../../policy/ruleMfa.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C,MAAa,OAAQ,SAAQ,MAAM,CAAC,cAAc;IAC9C;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAoB,EAAE,IAAmC;QAClH,OAAO,IAAI,OAAO,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC9D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,OAAO,CAAC,YAAY,CAAC;IACxD,CAAC;IAuDD,YAAY,IAAY,EAAE,WAAwC,EAAE,IAAmC;QACnG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAuC,CAAC;YACtD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/E;aAAM;YACH,MAAM,IAAI,GAAG,WAAsC,CAAC;YACpD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7E;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,OAAO,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC5D,CAAC;;AAjHL,0BAkHC;AApGG,gBAAgB;AACO,oBAAY,GAAG,6BAA6B,CAAC"}
|
|
1
|
+
{"version":3,"file":"ruleMfa.js","sourceRoot":"","sources":["../../policy/ruleMfa.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;GAUG;AACH,MAAa,OAAQ,SAAQ,MAAM,CAAC,cAAc;IAC9C;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAoB,EAAE,IAAmC;QAClH,OAAO,IAAI,OAAO,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC9D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,OAAO,CAAC,YAAY,CAAC;IACxD,CAAC;IAuDD,YAAY,IAAY,EAAE,WAAwC,EAAE,IAAmC;QACnG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAuC,CAAC;YACtD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/E;aAAM;YACH,MAAM,IAAI,GAAG,WAAsC,CAAC;YACpD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7E;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,OAAO,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC5D,CAAC;;AAjHL,0BAkHC;AApGG,gBAAgB;AACO,oBAAY,GAAG,6BAA6B,CAAC"}
|