@pulumi/okta 4.9.0-alpha.1718431198 → 4.9.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/adminRoleCustom.d.ts +105 -107
- package/adminRoleCustom.js +3 -5
- package/adminRoleCustom.js.map +1 -1
- package/adminRoleCustomAssignments.d.ts +12 -18
- package/adminRoleCustomAssignments.js +3 -6
- package/adminRoleCustomAssignments.js.map +1 -1
- package/adminRoleTargets.d.ts +14 -16
- package/adminRoleTargets.js +0 -2
- package/adminRoleTargets.js.map +1 -1
- package/app/accessPolicyAssignment.d.ts +23 -2
- package/app/accessPolicyAssignment.js +23 -2
- package/app/accessPolicyAssignment.js.map +1 -1
- package/app/autoLogin.d.ts +63 -97
- package/app/autoLogin.js +3 -37
- package/app/autoLogin.js.map +1 -1
- package/app/basicAuth.d.ts +30 -33
- package/app/basicAuth.js +4 -7
- package/app/basicAuth.js.map +1 -1
- package/app/bookmark.d.ts +30 -33
- package/app/bookmark.js +3 -6
- package/app/bookmark.js.map +1 -1
- package/app/getApp.d.ts +58 -25
- package/app/getApp.js +2 -2
- package/app/getApp.js.map +1 -1
- package/app/getMetadataSaml.d.ts +11 -5
- package/app/getMetadataSaml.js +2 -2
- package/app/getMetadataSaml.js.map +1 -1
- package/app/getOauth.d.ts +62 -34
- package/app/getOauth.js +2 -2
- package/app/getOauth.js.map +1 -1
- package/app/getSaml.d.ts +75 -56
- package/app/getSaml.js +2 -2
- package/app/getSaml.js.map +1 -1
- package/app/groupAssignment.d.ts +23 -9
- package/app/groupAssignment.js +17 -3
- package/app/groupAssignment.js.map +1 -1
- package/app/oauth.d.ts +135 -273
- package/app/oauth.js +6 -60
- package/app/oauth.js.map +1 -1
- package/app/oauthPostLogoutRedirectUri.d.ts +4 -6
- package/app/oauthPostLogoutRedirectUri.js +1 -3
- package/app/oauthPostLogoutRedirectUri.js.map +1 -1
- package/app/oauthRedirectUri.d.ts +4 -6
- package/app/oauthRedirectUri.js +1 -3
- package/app/oauthRedirectUri.js.map +1 -1
- package/app/oauthRoleAssignment.d.ts +4 -29
- package/app/oauthRoleAssignment.js +4 -29
- package/app/oauthRoleAssignment.js.map +1 -1
- package/app/saml.d.ts +161 -289
- package/app/saml.js +6 -152
- package/app/saml.js.map +1 -1
- package/app/securePasswordStore.d.ts +79 -80
- package/app/securePasswordStore.js +6 -7
- package/app/securePasswordStore.js.map +1 -1
- package/app/swa.d.ts +70 -71
- package/app/swa.js +4 -5
- package/app/swa.js.map +1 -1
- package/app/threeField.d.ts +74 -76
- package/app/threeField.js +5 -7
- package/app/threeField.js.map +1 -1
- package/app/user.d.ts +12 -17
- package/app/user.js +0 -2
- package/app/user.js.map +1 -1
- package/appGroupAssignments.d.ts +6 -8
- package/appGroupAssignments.js +3 -5
- package/appGroupAssignments.js.map +1 -1
- package/appOauthApiScope.d.ts +5 -7
- package/appOauthApiScope.js +2 -4
- package/appOauthApiScope.js.map +1 -1
- package/appSamlAppSettings.d.ts +6 -7
- package/appSamlAppSettings.js +3 -4
- package/appSamlAppSettings.js.map +1 -1
- package/appSharedCredentials.d.ts +61 -63
- package/appSharedCredentials.js +4 -6
- package/appSharedCredentials.js.map +1 -1
- package/appSignonPolicy.d.ts +3 -39
- package/appSignonPolicy.js +3 -39
- package/appSignonPolicy.js.map +1 -1
- package/appSignonPolicyRule.d.ts +69 -361
- package/appSignonPolicyRule.js +1 -278
- package/appSignonPolicyRule.js.map +1 -1
- package/appUserBaseSchemaProperty.d.ts +25 -29
- package/appUserBaseSchemaProperty.js +1 -5
- package/appUserBaseSchemaProperty.js.map +1 -1
- package/appUserSchemaProperty.d.ts +51 -41
- package/appUserSchemaProperty.js +0 -2
- package/appUserSchemaProperty.js.map +1 -1
- package/auth/getServer.d.ts +11 -11
- package/auth/getServer.js +2 -2
- package/auth/getServerPolicy.d.ts +15 -9
- package/auth/getServerPolicy.js +2 -2
- package/auth/getServerPolicy.js.map +1 -1
- package/auth/getServerScopes.d.ts +8 -5
- package/auth/getServerScopes.js +2 -2
- package/auth/getServerScopes.js.map +1 -1
- package/auth/server.d.ts +15 -19
- package/auth/server.js +1 -5
- package/auth/server.js.map +1 -1
- package/auth/serverClaim.d.ts +13 -17
- package/auth/serverClaim.js +1 -5
- package/auth/serverClaim.js.map +1 -1
- package/auth/serverPolicy.d.ts +10 -14
- package/auth/serverPolicy.js +1 -5
- package/auth/serverPolicy.js.map +1 -1
- package/auth/serverPolicyClaim.d.ts +50 -66
- package/auth/serverPolicyClaim.js +0 -25
- package/auth/serverPolicyClaim.js.map +1 -1
- package/auth/serverPolicyRule.d.ts +32 -43
- package/auth/serverPolicyRule.js +0 -2
- package/auth/serverPolicyRule.js.map +1 -1
- package/auth/serverScope.d.ts +16 -20
- package/auth/serverScope.js +1 -5
- package/auth/serverScope.js.map +1 -1
- package/authServerClaimDefault.d.ts +10 -25
- package/authServerClaimDefault.js +0 -9
- package/authServerClaimDefault.js.map +1 -1
- package/authServerDefault.d.ts +15 -19
- package/authServerDefault.js +1 -5
- package/authServerDefault.js.map +1 -1
- package/authenticator.d.ts +53 -61
- package/authenticator.js +11 -11
- package/authenticator.js.map +1 -1
- package/behaviour.d.ts +21 -41
- package/behaviour.js +0 -2
- package/behaviour.js.map +1 -1
- package/brand.d.ts +23 -22
- package/brand.js +8 -4
- package/brand.js.map +1 -1
- package/captcha.d.ts +15 -17
- package/captcha.js +3 -5
- package/captcha.js.map +1 -1
- package/captchaOrgWideSettings.d.ts +8 -43
- package/captchaOrgWideSettings.js +2 -37
- package/captchaOrgWideSettings.js.map +1 -1
- package/domain.d.ts +13 -21
- package/domain.js +0 -2
- package/domain.js.map +1 -1
- package/domainCertificate.d.ts +17 -24
- package/domainCertificate.js +2 -9
- package/domainCertificate.js.map +1 -1
- package/domainVerification.d.ts +4 -10
- package/domainVerification.js +1 -7
- package/domainVerification.js.map +1 -1
- package/emailCustomization.d.ts +38 -222
- package/emailCustomization.js +29 -33
- package/emailCustomization.js.map +1 -1
- package/emailDomain.d.ts +4 -8
- package/emailDomain.js +0 -4
- package/emailDomain.js.map +1 -1
- package/emailDomainVerification.d.ts +3 -7
- package/emailDomainVerification.js +0 -4
- package/emailDomainVerification.js.map +1 -1
- package/emailSender.d.ts +15 -17
- package/emailSender.js +2 -4
- package/emailSender.js.map +1 -1
- package/emailSenderVerification.d.ts +5 -9
- package/emailSenderVerification.js +2 -6
- package/emailSenderVerification.js.map +1 -1
- package/eventHook.d.ts +16 -11
- package/eventHook.js +1 -5
- package/eventHook.js.map +1 -1
- package/eventHookVerification.d.ts +4 -10
- package/eventHookVerification.js +1 -7
- package/eventHookVerification.js.map +1 -1
- package/factor/factor.d.ts +4 -9
- package/factor/factor.js +1 -3
- package/factor/factor.js.map +1 -1
- package/factorTotp.d.ts +12 -21
- package/factorTotp.js +3 -3
- package/factorTotp.js.map +1 -1
- package/getAppGroupAssignments.d.ts +6 -6
- package/getAppGroupAssignments.js +2 -2
- package/getAppSignonPolicy.d.ts +16 -6
- package/getAppSignonPolicy.js +8 -4
- package/getAppSignonPolicy.js.map +1 -1
- package/getAppUserAssignments.d.ts +6 -6
- package/getAppUserAssignments.js +2 -2
- package/getAuthServerClaim.d.ts +15 -12
- package/getAuthServerClaim.js +2 -2
- package/getAuthServerClaim.js.map +1 -1
- package/getAuthServerClaims.d.ts +8 -5
- package/getAuthServerClaims.js +2 -2
- package/getAuthServerClaims.js.map +1 -1
- package/getAuthenticator.d.ts +24 -26
- package/getAuthenticator.js +14 -22
- package/getAuthenticator.js.map +1 -1
- package/getBehaviour.d.ts +6 -8
- package/getBehaviour.js +2 -2
- package/getBehaviour.js.map +1 -1
- package/getBehaviours.d.ts +7 -7
- package/getBehaviours.js +2 -2
- package/getBrand.d.ts +9 -6
- package/getBrand.js +2 -2
- package/getBrand.js.map +1 -1
- package/getBrands.d.ts +2 -2
- package/getBrands.js +2 -2
- package/getDomain.d.ts +11 -14
- package/getDomain.js +2 -8
- package/getDomain.js.map +1 -1
- package/getEmailCustomization.d.ts +14 -9
- package/getEmailCustomization.js +2 -6
- package/getEmailCustomization.js.map +1 -1
- package/getEmailCustomizations.d.ts +11 -9
- package/getEmailCustomizations.js +2 -6
- package/getEmailCustomizations.js.map +1 -1
- package/getGroups.d.ts +11 -25
- package/getGroups.js +2 -2
- package/getGroups.js.map +1 -1
- package/getLogStream.d.ts +8 -39
- package/getLogStream.js +2 -24
- package/getLogStream.js.map +1 -1
- package/getNetworkZone.d.ts +12 -12
- package/getNetworkZone.js +2 -2
- package/getOrgMetadata.d.ts +0 -22
- package/getOrgMetadata.js +0 -22
- package/getOrgMetadata.js.map +1 -1
- package/getRoleSubscription.d.ts +13 -35
- package/getRoleSubscription.js +2 -2
- package/getRoleSubscription.js.map +1 -1
- package/getTemplate.d.ts +10 -8
- package/getTemplate.js +2 -6
- package/getTemplate.js.map +1 -1
- package/getTemplates.d.ts +6 -7
- package/getTemplates.js +2 -6
- package/getTemplates.js.map +1 -1
- package/getTheme.d.ts +14 -12
- package/getTheme.js +2 -6
- package/getTheme.js.map +1 -1
- package/getThemes.d.ts +6 -7
- package/getThemes.js +2 -6
- package/getThemes.js.map +1 -1
- package/getTrustedOrigins.d.ts +7 -4
- package/getTrustedOrigins.js +2 -2
- package/getTrustedOrigins.js.map +1 -1
- package/getUserSecurityQuestions.d.ts +4 -8
- package/getUserSecurityQuestions.js +0 -4
- package/getUserSecurityQuestions.js.map +1 -1
- package/group/getEveryoneGroup.d.ts +10 -5
- package/group/getEveryoneGroup.js +4 -2
- package/group/getEveryoneGroup.js.map +1 -1
- package/group/getGroup.d.ts +17 -26
- package/group/getGroup.js +2 -2
- package/group/getGroup.js.map +1 -1
- package/group/getRule.d.ts +9 -9
- package/group/getRule.js +2 -2
- package/group/group.d.ts +4 -36
- package/group/group.js +1 -33
- package/group/group.js.map +1 -1
- package/group/role.d.ts +37 -81
- package/group/role.js +1 -6
- package/group/role.js.map +1 -1
- package/group/rule.d.ts +12 -20
- package/group/rule.js +0 -2
- package/group/rule.js.map +1 -1
- package/groupMemberships.d.ts +8 -10
- package/groupMemberships.js +2 -4
- package/groupMemberships.js.map +1 -1
- package/groupSchemaProperty.d.ts +57 -59
- package/groupSchemaProperty.js +0 -2
- package/groupSchemaProperty.js.map +1 -1
- package/idp/getMetadataSaml.d.ts +9 -6
- package/idp/getMetadataSaml.js +2 -2
- package/idp/getMetadataSaml.js.map +1 -1
- package/idp/getOidc.d.ts +9 -9
- package/idp/getOidc.js +2 -2
- package/idp/getSaml.d.ts +16 -13
- package/idp/getSaml.js +2 -2
- package/idp/getSaml.js.map +1 -1
- package/idp/getSocial.d.ts +8 -2
- package/idp/getSocial.js +2 -2
- package/idp/getSocial.js.map +1 -1
- package/idp/oidc.d.ts +70 -62
- package/idp/oidc.js +3 -5
- package/idp/oidc.js.map +1 -1
- package/idp/saml.d.ts +64 -86
- package/idp/saml.js +1 -5
- package/idp/saml.js.map +1 -1
- package/idp/samlKey.d.ts +3 -5
- package/idp/samlKey.js +0 -2
- package/idp/samlKey.js.map +1 -1
- package/idp/social.d.ts +99 -69
- package/idp/social.js +11 -5
- package/idp/social.js.map +1 -1
- package/inline/hook.d.ts +4 -26
- package/inline/hook.js +1 -5
- package/inline/hook.js.map +1 -1
- package/linkDefinition.d.ts +2 -3
- package/linkDefinition.js +2 -3
- package/linkDefinition.js.map +1 -1
- package/linkValue.d.ts +7 -9
- package/linkValue.js +1 -3
- package/linkValue.js.map +1 -1
- package/logStream.d.ts +32 -27
- package/logStream.js +23 -9
- package/logStream.js.map +1 -1
- package/network/zone.d.ts +25 -66
- package/network/zone.js +1 -39
- package/network/zone.js.map +1 -1
- package/orgConfiguration.d.ts +4 -9
- package/orgConfiguration.js +1 -3
- package/orgConfiguration.js.map +1 -1
- package/orgSupport.d.ts +4 -7
- package/orgSupport.js +1 -4
- package/orgSupport.js.map +1 -1
- package/package.json +3 -3
- package/policy/getDefaultPolicy.d.ts +9 -7
- package/policy/getDefaultPolicy.js +6 -2
- package/policy/getDefaultPolicy.js.map +1 -1
- package/policy/getPolicy.d.ts +11 -26
- package/policy/getPolicy.js +2 -2
- package/policy/getPolicy.js.map +1 -1
- package/policy/mfa.d.ts +18 -220
- package/policy/mfa.js +0 -10
- package/policy/mfa.js.map +1 -1
- package/policy/password.d.ts +91 -95
- package/policy/password.js +1 -5
- package/policy/password.js.map +1 -1
- package/policy/ruleIdpDiscovery.d.ts +111 -93
- package/policy/ruleIdpDiscovery.js +48 -57
- package/policy/ruleIdpDiscovery.js.map +1 -1
- package/policy/ruleMfa.d.ts +40 -30
- package/policy/ruleMfa.js +1 -3
- package/policy/ruleMfa.js.map +1 -1
- package/policy/rulePassword.d.ts +34 -38
- package/policy/rulePassword.js +1 -5
- package/policy/rulePassword.js.map +1 -1
- package/policy/ruleSignon.d.ts +94 -85
- package/policy/ruleSignon.js +1 -4
- package/policy/ruleSignon.js.map +1 -1
- package/policy/signon.d.ts +16 -20
- package/policy/signon.js +1 -5
- package/policy/signon.js.map +1 -1
- package/policyMfaDefault.d.ts +15 -214
- package/policyMfaDefault.js +2 -9
- package/policyMfaDefault.js.map +1 -1
- package/policyPasswordDefault.d.ts +85 -101
- package/policyPasswordDefault.js +1 -5
- package/policyPasswordDefault.js.map +1 -1
- package/policyProfileEnrollment.d.ts +8 -9
- package/policyProfileEnrollment.js +2 -3
- package/policyProfileEnrollment.js.map +1 -1
- package/policyProfileEnrollmentApps.d.ts +8 -11
- package/policyProfileEnrollmentApps.js +3 -6
- package/policyProfileEnrollmentApps.js.map +1 -1
- package/policyRuleProfileEnrollment.d.ts +42 -31
- package/policyRuleProfileEnrollment.js +2 -3
- package/policyRuleProfileEnrollment.js.map +1 -1
- package/profile/mapping.d.ts +19 -34
- package/profile/mapping.js +4 -4
- package/profile/mapping.js.map +1 -1
- package/rateLimiting.d.ts +8 -17
- package/rateLimiting.js +2 -5
- package/rateLimiting.js.map +1 -1
- package/resourceSet.d.ts +18 -26
- package/resourceSet.js +9 -14
- package/resourceSet.js.map +1 -1
- package/roleSubscription.d.ts +35 -86
- package/roleSubscription.js +2 -2
- package/roleSubscription.js.map +1 -1
- package/securityNotificationEmails.d.ts +4 -7
- package/securityNotificationEmails.js +4 -7
- package/securityNotificationEmails.js.map +1 -1
- package/templateSms.d.ts +4 -8
- package/templateSms.js +1 -5
- package/templateSms.js.map +1 -1
- package/theme.d.ts +46 -46
- package/theme.js +2 -2
- package/threatInsightSettings.d.ts +7 -27
- package/threatInsightSettings.js +1 -3
- package/threatInsightSettings.js.map +1 -1
- package/trustedorigin/origin.d.ts +13 -17
- package/trustedorigin/origin.js +1 -5
- package/trustedorigin/origin.js.map +1 -1
- package/types/input.d.ts +65 -162
- package/types/output.d.ts +75 -275
- package/user/getUser.d.ts +32 -104
- package/user/getUser.js +2 -2
- package/user/getUser.js.map +1 -1
- package/user/getUserProfileMappingSource.d.ts +9 -7
- package/user/getUserProfileMappingSource.js +6 -4
- package/user/getUserProfileMappingSource.js.map +1 -1
- package/user/getUserType.d.ts +7 -7
- package/user/getUserType.js +2 -2
- package/user/getUsers.d.ts +95 -37
- package/user/getUsers.js +64 -24
- package/user/getUsers.js.map +1 -1
- package/user/user.d.ts +160 -209
- package/user/user.js +43 -65
- package/user/user.js.map +1 -1
- package/user/userType.d.ts +1 -5
- package/user/userType.js +1 -5
- package/user/userType.js.map +1 -1
- package/userAdminRoles.d.ts +10 -17
- package/userAdminRoles.js +1 -5
- package/userAdminRoles.js.map +1 -1
- package/userBaseSchemaProperty.d.ts +26 -34
- package/userBaseSchemaProperty.js +2 -10
- package/userBaseSchemaProperty.js.map +1 -1
- package/userFactorQuestion.d.ts +1 -5
- package/userFactorQuestion.js +1 -5
- package/userFactorQuestion.js.map +1 -1
- package/userGroupMemberships.d.ts +3 -3
- package/userSchemaProperty.d.ts +57 -56
- package/userSchemaProperty.js +0 -8
- package/userSchemaProperty.js.map +1 -1
package/group/getGroup.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getGroup.js","sourceRoot":"","sources":["../../group/getGroup.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;GAaG;AACH,SAAgB,QAAQ,CAAC,IAAmB,EAAE,IAA2B;IACrE,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;IAElB,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,8BAA8B,EAAE;QACzD,kBAAkB,EAAE,IAAI,CAAC,gBAAgB;QACzC,IAAI,EAAE,IAAI,CAAC,EAAE;QACb,cAAc,EAAE,IAAI,CAAC,YAAY;QACjC,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAXD,4BAWC;
|
|
1
|
+
{"version":3,"file":"getGroup.js","sourceRoot":"","sources":["../../group/getGroup.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;GAaG;AACH,SAAgB,QAAQ,CAAC,IAAmB,EAAE,IAA2B;IACrE,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;IAElB,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,8BAA8B,EAAE;QACzD,kBAAkB,EAAE,IAAI,CAAC,gBAAgB;QACzC,IAAI,EAAE,IAAI,CAAC,EAAE;QACb,cAAc,EAAE,IAAI,CAAC,YAAY;QACjC,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAXD,4BAWC;AAuDD;;;;;;;;;;;;;GAaG;AACH,SAAgB,cAAc,CAAC,IAAyB,EAAE,IAA2B;IACjF,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAM,EAAE,EAAE,CAAC,QAAQ,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACnE,CAAC;AAFD,wCAEC"}
|
package/group/getRule.d.ts
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
|
-
*
|
|
3
|
+
* Get a group rule from Okta.
|
|
4
4
|
*
|
|
5
5
|
* ## Example Usage
|
|
6
6
|
*
|
|
@@ -19,15 +19,15 @@ export declare function getRule(args?: GetRuleArgs, opts?: pulumi.InvokeOptions)
|
|
|
19
19
|
*/
|
|
20
20
|
export interface GetRuleArgs {
|
|
21
21
|
/**
|
|
22
|
-
* The ID of the
|
|
22
|
+
* The ID of the Group Rule.
|
|
23
23
|
*/
|
|
24
24
|
id?: string;
|
|
25
25
|
/**
|
|
26
|
-
* The name of the Group Rule
|
|
26
|
+
* The name of the Group Rule.
|
|
27
27
|
*/
|
|
28
28
|
name?: string;
|
|
29
29
|
/**
|
|
30
|
-
*
|
|
30
|
+
* Default to `ACTIVE`
|
|
31
31
|
*/
|
|
32
32
|
status?: string;
|
|
33
33
|
}
|
|
@@ -56,7 +56,7 @@ export interface GetRuleResult {
|
|
|
56
56
|
*/
|
|
57
57
|
readonly name?: string;
|
|
58
58
|
/**
|
|
59
|
-
*
|
|
59
|
+
* Default to `ACTIVE`
|
|
60
60
|
*/
|
|
61
61
|
readonly status?: string;
|
|
62
62
|
/**
|
|
@@ -65,7 +65,7 @@ export interface GetRuleResult {
|
|
|
65
65
|
readonly usersExcludeds: string[];
|
|
66
66
|
}
|
|
67
67
|
/**
|
|
68
|
-
*
|
|
68
|
+
* Get a group rule from Okta.
|
|
69
69
|
*
|
|
70
70
|
* ## Example Usage
|
|
71
71
|
*
|
|
@@ -84,15 +84,15 @@ export declare function getRuleOutput(args?: GetRuleOutputArgs, opts?: pulumi.In
|
|
|
84
84
|
*/
|
|
85
85
|
export interface GetRuleOutputArgs {
|
|
86
86
|
/**
|
|
87
|
-
* The ID of the
|
|
87
|
+
* The ID of the Group Rule.
|
|
88
88
|
*/
|
|
89
89
|
id?: pulumi.Input<string>;
|
|
90
90
|
/**
|
|
91
|
-
* The name of the Group Rule
|
|
91
|
+
* The name of the Group Rule.
|
|
92
92
|
*/
|
|
93
93
|
name?: pulumi.Input<string>;
|
|
94
94
|
/**
|
|
95
|
-
*
|
|
95
|
+
* Default to `ACTIVE`
|
|
96
96
|
*/
|
|
97
97
|
status?: pulumi.Input<string>;
|
|
98
98
|
}
|
package/group/getRule.js
CHANGED
|
@@ -6,7 +6,7 @@ exports.getRuleOutput = exports.getRule = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
8
|
/**
|
|
9
|
-
*
|
|
9
|
+
* Get a group rule from Okta.
|
|
10
10
|
*
|
|
11
11
|
* ## Example Usage
|
|
12
12
|
*
|
|
@@ -30,7 +30,7 @@ function getRule(args, opts) {
|
|
|
30
30
|
}
|
|
31
31
|
exports.getRule = getRule;
|
|
32
32
|
/**
|
|
33
|
-
*
|
|
33
|
+
* Get a group rule from Okta.
|
|
34
34
|
*
|
|
35
35
|
* ## Example Usage
|
|
36
36
|
*
|
package/group/group.d.ts
CHANGED
|
@@ -1,41 +1,9 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
|
-
* Creates an Okta Group.
|
|
4
|
-
*
|
|
5
|
-
* This resource allows you to create and configure an Okta Group.
|
|
6
|
-
*
|
|
7
|
-
* ## Example Usage
|
|
8
|
-
*
|
|
9
|
-
* ```typescript
|
|
10
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
11
|
-
* import * as okta from "@pulumi/okta";
|
|
12
|
-
*
|
|
13
|
-
* const example = new okta.group.Group("example", {
|
|
14
|
-
* name: "Example",
|
|
15
|
-
* description: "My Example Group",
|
|
16
|
-
* });
|
|
17
|
-
* ```
|
|
18
|
-
*
|
|
19
|
-
* Custom profile attributes
|
|
20
|
-
* ```typescript
|
|
21
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
22
|
-
* import * as okta from "@pulumi/okta";
|
|
23
|
-
*
|
|
24
|
-
* const example = new okta.group.Group("example", {
|
|
25
|
-
* name: "Example",
|
|
26
|
-
* description: "My Example Group",
|
|
27
|
-
* customProfileAttributes: JSON.stringify({
|
|
28
|
-
* example1: "testing1234",
|
|
29
|
-
* example2: true,
|
|
30
|
-
* example3: 54321,
|
|
31
|
-
* }),
|
|
32
|
-
* });
|
|
33
|
-
* ```
|
|
3
|
+
* Creates an Okta Group. This resource allows you to create and configure an Okta Group.
|
|
34
4
|
*
|
|
35
5
|
* ## Import
|
|
36
6
|
*
|
|
37
|
-
* An Okta Group can be imported via the Okta ID.
|
|
38
|
-
*
|
|
39
7
|
* ```sh
|
|
40
8
|
* $ pulumi import okta:group/group:Group example <group id>
|
|
41
9
|
* ```
|
|
@@ -57,7 +25,7 @@ export declare class Group extends pulumi.CustomResource {
|
|
|
57
25
|
*/
|
|
58
26
|
static isInstance(obj: any): obj is Group;
|
|
59
27
|
/**
|
|
60
|
-
*
|
|
28
|
+
* JSON formatted custom attributes for a group. It must be JSON due to various types Okta allows.
|
|
61
29
|
*/
|
|
62
30
|
readonly customProfileAttributes: pulumi.Output<string | undefined>;
|
|
63
31
|
/**
|
|
@@ -88,7 +56,7 @@ export declare class Group extends pulumi.CustomResource {
|
|
|
88
56
|
*/
|
|
89
57
|
export interface GroupState {
|
|
90
58
|
/**
|
|
91
|
-
*
|
|
59
|
+
* JSON formatted custom attributes for a group. It must be JSON due to various types Okta allows.
|
|
92
60
|
*/
|
|
93
61
|
customProfileAttributes?: pulumi.Input<string>;
|
|
94
62
|
/**
|
|
@@ -111,7 +79,7 @@ export interface GroupState {
|
|
|
111
79
|
*/
|
|
112
80
|
export interface GroupArgs {
|
|
113
81
|
/**
|
|
114
|
-
*
|
|
82
|
+
* JSON formatted custom attributes for a group. It must be JSON due to various types Okta allows.
|
|
115
83
|
*/
|
|
116
84
|
customProfileAttributes?: pulumi.Input<string>;
|
|
117
85
|
/**
|
package/group/group.js
CHANGED
|
@@ -6,42 +6,10 @@ exports.Group = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
8
|
/**
|
|
9
|
-
* Creates an Okta Group.
|
|
10
|
-
*
|
|
11
|
-
* This resource allows you to create and configure an Okta Group.
|
|
12
|
-
*
|
|
13
|
-
* ## Example Usage
|
|
14
|
-
*
|
|
15
|
-
* ```typescript
|
|
16
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
17
|
-
* import * as okta from "@pulumi/okta";
|
|
18
|
-
*
|
|
19
|
-
* const example = new okta.group.Group("example", {
|
|
20
|
-
* name: "Example",
|
|
21
|
-
* description: "My Example Group",
|
|
22
|
-
* });
|
|
23
|
-
* ```
|
|
24
|
-
*
|
|
25
|
-
* Custom profile attributes
|
|
26
|
-
* ```typescript
|
|
27
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
28
|
-
* import * as okta from "@pulumi/okta";
|
|
29
|
-
*
|
|
30
|
-
* const example = new okta.group.Group("example", {
|
|
31
|
-
* name: "Example",
|
|
32
|
-
* description: "My Example Group",
|
|
33
|
-
* customProfileAttributes: JSON.stringify({
|
|
34
|
-
* example1: "testing1234",
|
|
35
|
-
* example2: true,
|
|
36
|
-
* example3: 54321,
|
|
37
|
-
* }),
|
|
38
|
-
* });
|
|
39
|
-
* ```
|
|
9
|
+
* Creates an Okta Group. This resource allows you to create and configure an Okta Group.
|
|
40
10
|
*
|
|
41
11
|
* ## Import
|
|
42
12
|
*
|
|
43
|
-
* An Okta Group can be imported via the Okta ID.
|
|
44
|
-
*
|
|
45
13
|
* ```sh
|
|
46
14
|
* $ pulumi import okta:group/group:Group example <group id>
|
|
47
15
|
* ```
|
package/group/group.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"group.js","sourceRoot":"","sources":["../../group/group.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"group.js","sourceRoot":"","sources":["../../group/group.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;GAQG;AACH,MAAa,KAAM,SAAQ,MAAM,CAAC,cAAc;IAC5C;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAkB,EAAE,IAAmC;QAChH,OAAO,IAAI,KAAK,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC5D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,KAAK,CAAC,YAAY,CAAC;IACtD,CAAC;IA6BD,YAAY,IAAY,EAAE,WAAoC,EAAE,IAAmC;QAC/F,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAqC,CAAC;YACpD,cAAc,CAAC,yBAAyB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;SACrE;aAAM;YACH,MAAM,IAAI,GAAG,WAAoC,CAAC;YAClD,cAAc,CAAC,yBAAyB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;SACnE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,KAAK,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC1D,CAAC;;AAzEL,sBA0EC;AA5DG,gBAAgB;AACO,kBAAY,GAAG,wBAAwB,CAAC"}
|
package/group/role.d.ts
CHANGED
|
@@ -1,9 +1,6 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
|
-
* Assigns Admin roles to Okta Groups.
|
|
4
|
-
*
|
|
5
|
-
* This resource allows you to assign Okta administrator roles to Okta Groups. This resource provides a one-to-one
|
|
6
|
-
* interface between the Okta group and the admin role.
|
|
3
|
+
* Assigns Admin roles to Okta Groups. This resource allows you to assign Okta administrator roles to Okta Groups. This resource provides a one-to-one interface between the Okta group and the admin role.
|
|
7
4
|
*
|
|
8
5
|
* ## Example Usage
|
|
9
6
|
*
|
|
@@ -19,8 +16,6 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
19
16
|
*
|
|
20
17
|
* ## Import
|
|
21
18
|
*
|
|
22
|
-
* Individual admin role assignment can be imported by passing the group and role assignment IDs as follows:
|
|
23
|
-
*
|
|
24
19
|
* ```sh
|
|
25
20
|
* $ pulumi import okta:group/role:Role example <group id>/<role id>
|
|
26
21
|
* ```
|
|
@@ -42,43 +37,30 @@ export declare class Role extends pulumi.CustomResource {
|
|
|
42
37
|
*/
|
|
43
38
|
static isInstance(obj: any): obj is Role;
|
|
44
39
|
/**
|
|
45
|
-
* When this setting is enabled, the admins won't receive any of the default Okta
|
|
46
|
-
*
|
|
40
|
+
* When this setting is enabled, the admins won't receive any of the default Okta administrator emails. These admins also
|
|
41
|
+
* won't have access to contact Okta Support and open support cases on behalf of your org.
|
|
47
42
|
*/
|
|
48
43
|
readonly disableNotifications: pulumi.Output<boolean | undefined>;
|
|
49
44
|
/**
|
|
50
|
-
*
|
|
45
|
+
* ID of group to attach admin roles to
|
|
51
46
|
*/
|
|
52
47
|
readonly groupId: pulumi.Output<string>;
|
|
53
48
|
/**
|
|
54
|
-
* Admin role assigned to the group. It can be any one of the following values:
|
|
55
|
-
*
|
|
56
|
-
*
|
|
57
|
-
*
|
|
58
|
-
* `"GROUP_MEMBERSHIP_ADMIN"`,
|
|
59
|
-
* `"HELP_DESK_ADMIN"`,
|
|
60
|
-
* `"MOBILE_ADMIN"`,
|
|
61
|
-
* `"ORG_ADMIN"`,
|
|
62
|
-
* `"READ_ONLY_ADMIN"`,
|
|
63
|
-
* `"REPORT_ADMIN"`,
|
|
64
|
-
* `"SUPER_ADMIN"`,
|
|
65
|
-
* `"USER_ADMIN"`
|
|
66
|
-
* . See [API Docs](https://developer.okta.com/docs/reference/api/roles/#role-types).
|
|
67
|
-
*
|
|
68
|
-
*
|
|
69
|
-
* - `"USER_ADMIN"` is the Group Administrator.
|
|
49
|
+
* Admin role assigned to the group. It can be any one of the following values: "API_ADMIN", "APP_ADMIN", "CUSTOM",
|
|
50
|
+
* "GROUP_MEMBERSHIP_ADMIN", "HELP_DESK_ADMIN", "MOBILE_ADMIN", "ORG_ADMIN", "READ_ONLY_ADMIN", "REPORT_ADMIN",
|
|
51
|
+
* "SUPER_ADMIN", "USER_ADMIN" . See [API Docs](https://developer.okta.com/docs/reference/api/roles/#role-types). -
|
|
52
|
+
* "USER_ADMIN" is the Group Administrator.
|
|
70
53
|
*/
|
|
71
54
|
readonly roleType: pulumi.Output<string>;
|
|
72
55
|
/**
|
|
73
|
-
* A list of app names (name represents set of app instances, like 'salesforce' or '
|
|
74
|
-
*
|
|
75
|
-
*
|
|
76
|
-
* - Only supported when used with the role type `"APP_ADMIN"`.
|
|
56
|
+
* A list of app names (name represents set of app instances, like 'salesforce' or 'facebook'), or a combination of app
|
|
57
|
+
* name and app instance ID (like 'facebook.0oapsqQ6dv19pqyEo0g3') you would like as the targets of the admin role. - Only
|
|
58
|
+
* supported when used with the role type `APP_ADMIN`.
|
|
77
59
|
*/
|
|
78
60
|
readonly targetAppLists: pulumi.Output<string[] | undefined>;
|
|
79
61
|
/**
|
|
80
|
-
* A list of group IDs you would like as the targets of the admin role.
|
|
81
|
-
*
|
|
62
|
+
* A list of group IDs you would like as the targets of the admin role. - Only supported when used with the role types:
|
|
63
|
+
* `GROUP_MEMBERSHIP_ADMIN`, `HELP_DESK_ADMIN`, or `USER_ADMIN`.
|
|
82
64
|
*/
|
|
83
65
|
readonly targetGroupLists: pulumi.Output<string[] | undefined>;
|
|
84
66
|
/**
|
|
@@ -95,43 +77,30 @@ export declare class Role extends pulumi.CustomResource {
|
|
|
95
77
|
*/
|
|
96
78
|
export interface RoleState {
|
|
97
79
|
/**
|
|
98
|
-
* When this setting is enabled, the admins won't receive any of the default Okta
|
|
99
|
-
*
|
|
80
|
+
* When this setting is enabled, the admins won't receive any of the default Okta administrator emails. These admins also
|
|
81
|
+
* won't have access to contact Okta Support and open support cases on behalf of your org.
|
|
100
82
|
*/
|
|
101
83
|
disableNotifications?: pulumi.Input<boolean>;
|
|
102
84
|
/**
|
|
103
|
-
*
|
|
85
|
+
* ID of group to attach admin roles to
|
|
104
86
|
*/
|
|
105
87
|
groupId?: pulumi.Input<string>;
|
|
106
88
|
/**
|
|
107
|
-
* Admin role assigned to the group. It can be any one of the following values:
|
|
108
|
-
*
|
|
109
|
-
*
|
|
110
|
-
*
|
|
111
|
-
* `"GROUP_MEMBERSHIP_ADMIN"`,
|
|
112
|
-
* `"HELP_DESK_ADMIN"`,
|
|
113
|
-
* `"MOBILE_ADMIN"`,
|
|
114
|
-
* `"ORG_ADMIN"`,
|
|
115
|
-
* `"READ_ONLY_ADMIN"`,
|
|
116
|
-
* `"REPORT_ADMIN"`,
|
|
117
|
-
* `"SUPER_ADMIN"`,
|
|
118
|
-
* `"USER_ADMIN"`
|
|
119
|
-
* . See [API Docs](https://developer.okta.com/docs/reference/api/roles/#role-types).
|
|
120
|
-
*
|
|
121
|
-
*
|
|
122
|
-
* - `"USER_ADMIN"` is the Group Administrator.
|
|
89
|
+
* Admin role assigned to the group. It can be any one of the following values: "API_ADMIN", "APP_ADMIN", "CUSTOM",
|
|
90
|
+
* "GROUP_MEMBERSHIP_ADMIN", "HELP_DESK_ADMIN", "MOBILE_ADMIN", "ORG_ADMIN", "READ_ONLY_ADMIN", "REPORT_ADMIN",
|
|
91
|
+
* "SUPER_ADMIN", "USER_ADMIN" . See [API Docs](https://developer.okta.com/docs/reference/api/roles/#role-types). -
|
|
92
|
+
* "USER_ADMIN" is the Group Administrator.
|
|
123
93
|
*/
|
|
124
94
|
roleType?: pulumi.Input<string>;
|
|
125
95
|
/**
|
|
126
|
-
* A list of app names (name represents set of app instances, like 'salesforce' or '
|
|
127
|
-
*
|
|
128
|
-
*
|
|
129
|
-
* - Only supported when used with the role type `"APP_ADMIN"`.
|
|
96
|
+
* A list of app names (name represents set of app instances, like 'salesforce' or 'facebook'), or a combination of app
|
|
97
|
+
* name and app instance ID (like 'facebook.0oapsqQ6dv19pqyEo0g3') you would like as the targets of the admin role. - Only
|
|
98
|
+
* supported when used with the role type `APP_ADMIN`.
|
|
130
99
|
*/
|
|
131
100
|
targetAppLists?: pulumi.Input<pulumi.Input<string>[]>;
|
|
132
101
|
/**
|
|
133
|
-
* A list of group IDs you would like as the targets of the admin role.
|
|
134
|
-
*
|
|
102
|
+
* A list of group IDs you would like as the targets of the admin role. - Only supported when used with the role types:
|
|
103
|
+
* `GROUP_MEMBERSHIP_ADMIN`, `HELP_DESK_ADMIN`, or `USER_ADMIN`.
|
|
135
104
|
*/
|
|
136
105
|
targetGroupLists?: pulumi.Input<pulumi.Input<string>[]>;
|
|
137
106
|
}
|
|
@@ -140,43 +109,30 @@ export interface RoleState {
|
|
|
140
109
|
*/
|
|
141
110
|
export interface RoleArgs {
|
|
142
111
|
/**
|
|
143
|
-
* When this setting is enabled, the admins won't receive any of the default Okta
|
|
144
|
-
*
|
|
112
|
+
* When this setting is enabled, the admins won't receive any of the default Okta administrator emails. These admins also
|
|
113
|
+
* won't have access to contact Okta Support and open support cases on behalf of your org.
|
|
145
114
|
*/
|
|
146
115
|
disableNotifications?: pulumi.Input<boolean>;
|
|
147
116
|
/**
|
|
148
|
-
*
|
|
117
|
+
* ID of group to attach admin roles to
|
|
149
118
|
*/
|
|
150
119
|
groupId: pulumi.Input<string>;
|
|
151
120
|
/**
|
|
152
|
-
* Admin role assigned to the group. It can be any one of the following values:
|
|
153
|
-
*
|
|
154
|
-
*
|
|
155
|
-
*
|
|
156
|
-
* `"GROUP_MEMBERSHIP_ADMIN"`,
|
|
157
|
-
* `"HELP_DESK_ADMIN"`,
|
|
158
|
-
* `"MOBILE_ADMIN"`,
|
|
159
|
-
* `"ORG_ADMIN"`,
|
|
160
|
-
* `"READ_ONLY_ADMIN"`,
|
|
161
|
-
* `"REPORT_ADMIN"`,
|
|
162
|
-
* `"SUPER_ADMIN"`,
|
|
163
|
-
* `"USER_ADMIN"`
|
|
164
|
-
* . See [API Docs](https://developer.okta.com/docs/reference/api/roles/#role-types).
|
|
165
|
-
*
|
|
166
|
-
*
|
|
167
|
-
* - `"USER_ADMIN"` is the Group Administrator.
|
|
121
|
+
* Admin role assigned to the group. It can be any one of the following values: "API_ADMIN", "APP_ADMIN", "CUSTOM",
|
|
122
|
+
* "GROUP_MEMBERSHIP_ADMIN", "HELP_DESK_ADMIN", "MOBILE_ADMIN", "ORG_ADMIN", "READ_ONLY_ADMIN", "REPORT_ADMIN",
|
|
123
|
+
* "SUPER_ADMIN", "USER_ADMIN" . See [API Docs](https://developer.okta.com/docs/reference/api/roles/#role-types). -
|
|
124
|
+
* "USER_ADMIN" is the Group Administrator.
|
|
168
125
|
*/
|
|
169
126
|
roleType: pulumi.Input<string>;
|
|
170
127
|
/**
|
|
171
|
-
* A list of app names (name represents set of app instances, like 'salesforce' or '
|
|
172
|
-
*
|
|
173
|
-
*
|
|
174
|
-
* - Only supported when used with the role type `"APP_ADMIN"`.
|
|
128
|
+
* A list of app names (name represents set of app instances, like 'salesforce' or 'facebook'), or a combination of app
|
|
129
|
+
* name and app instance ID (like 'facebook.0oapsqQ6dv19pqyEo0g3') you would like as the targets of the admin role. - Only
|
|
130
|
+
* supported when used with the role type `APP_ADMIN`.
|
|
175
131
|
*/
|
|
176
132
|
targetAppLists?: pulumi.Input<pulumi.Input<string>[]>;
|
|
177
133
|
/**
|
|
178
|
-
* A list of group IDs you would like as the targets of the admin role.
|
|
179
|
-
*
|
|
134
|
+
* A list of group IDs you would like as the targets of the admin role. - Only supported when used with the role types:
|
|
135
|
+
* `GROUP_MEMBERSHIP_ADMIN`, `HELP_DESK_ADMIN`, or `USER_ADMIN`.
|
|
180
136
|
*/
|
|
181
137
|
targetGroupLists?: pulumi.Input<pulumi.Input<string>[]>;
|
|
182
138
|
}
|
package/group/role.js
CHANGED
|
@@ -6,10 +6,7 @@ exports.Role = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
8
|
/**
|
|
9
|
-
* Assigns Admin roles to Okta Groups.
|
|
10
|
-
*
|
|
11
|
-
* This resource allows you to assign Okta administrator roles to Okta Groups. This resource provides a one-to-one
|
|
12
|
-
* interface between the Okta group and the admin role.
|
|
9
|
+
* Assigns Admin roles to Okta Groups. This resource allows you to assign Okta administrator roles to Okta Groups. This resource provides a one-to-one interface between the Okta group and the admin role.
|
|
13
10
|
*
|
|
14
11
|
* ## Example Usage
|
|
15
12
|
*
|
|
@@ -25,8 +22,6 @@ const utilities = require("../utilities");
|
|
|
25
22
|
*
|
|
26
23
|
* ## Import
|
|
27
24
|
*
|
|
28
|
-
* Individual admin role assignment can be imported by passing the group and role assignment IDs as follows:
|
|
29
|
-
*
|
|
30
25
|
* ```sh
|
|
31
26
|
* $ pulumi import okta:group/role:Role example <group id>/<role id>
|
|
32
27
|
* ```
|
package/group/role.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"role.js","sourceRoot":"","sources":["../../group/role.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"role.js","sourceRoot":"","sources":["../../group/role.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;GAoBG;AACH,MAAa,IAAK,SAAQ,MAAM,CAAC,cAAc;IAC3C;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAiB,EAAE,IAAmC;QAC/G,OAAO,IAAI,IAAI,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC3D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,IAAI,CAAC,YAAY,CAAC;IACrD,CAAC;IAsCD,YAAY,IAAY,EAAE,WAAkC,EAAE,IAAmC;QAC7F,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAoC,CAAC;YACnD,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;SACnF;aAAM;YACH,MAAM,IAAI,GAAG,WAAmC,CAAC;YACjD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;SACjF;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,IAAI,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACzD,CAAC;;AA1FL,oBA2FC;AA7EG,gBAAgB;AACO,iBAAY,GAAG,sBAAsB,CAAC"}
|
package/group/rule.d.ts
CHANGED
|
@@ -17,8 +17,6 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
17
17
|
*
|
|
18
18
|
* ## Import
|
|
19
19
|
*
|
|
20
|
-
* An Okta Group Rule can be imported via the Okta ID.
|
|
21
|
-
*
|
|
22
20
|
* ```sh
|
|
23
21
|
* $ pulumi import okta:group/rule:Rule example <group rule id>
|
|
24
22
|
* ```
|
|
@@ -40,8 +38,7 @@ export declare class Rule extends pulumi.CustomResource {
|
|
|
40
38
|
*/
|
|
41
39
|
static isInstance(obj: any): obj is Rule;
|
|
42
40
|
/**
|
|
43
|
-
* The expression type to use to invoke the rule. The default
|
|
44
|
-
* is `"urn:okta:expression:1.0"`.
|
|
41
|
+
* The expression type to use to invoke the rule. The default is `urn:okta:expression:1.0`.
|
|
45
42
|
*/
|
|
46
43
|
readonly expressionType: pulumi.Output<string | undefined>;
|
|
47
44
|
/**
|
|
@@ -57,16 +54,15 @@ export declare class Rule extends pulumi.CustomResource {
|
|
|
57
54
|
*/
|
|
58
55
|
readonly name: pulumi.Output<string>;
|
|
59
56
|
/**
|
|
60
|
-
*
|
|
61
|
-
* group after destroying this resource. Default is `false`.
|
|
57
|
+
* Remove users added by this rule from the assigned group after deleting this resource. Default is `false`
|
|
62
58
|
*/
|
|
63
59
|
readonly removeAssignedUsers: pulumi.Output<boolean | undefined>;
|
|
64
60
|
/**
|
|
65
|
-
*
|
|
61
|
+
* Default to `ACTIVE`
|
|
66
62
|
*/
|
|
67
63
|
readonly status: pulumi.Output<string | undefined>;
|
|
68
64
|
/**
|
|
69
|
-
* The list of user IDs that would be excluded when rules are processed
|
|
65
|
+
* The list of user IDs that would be excluded when rules are processed
|
|
70
66
|
*/
|
|
71
67
|
readonly usersExcludeds: pulumi.Output<string[] | undefined>;
|
|
72
68
|
/**
|
|
@@ -83,8 +79,7 @@ export declare class Rule extends pulumi.CustomResource {
|
|
|
83
79
|
*/
|
|
84
80
|
export interface RuleState {
|
|
85
81
|
/**
|
|
86
|
-
* The expression type to use to invoke the rule. The default
|
|
87
|
-
* is `"urn:okta:expression:1.0"`.
|
|
82
|
+
* The expression type to use to invoke the rule. The default is `urn:okta:expression:1.0`.
|
|
88
83
|
*/
|
|
89
84
|
expressionType?: pulumi.Input<string>;
|
|
90
85
|
/**
|
|
@@ -100,16 +95,15 @@ export interface RuleState {
|
|
|
100
95
|
*/
|
|
101
96
|
name?: pulumi.Input<string>;
|
|
102
97
|
/**
|
|
103
|
-
*
|
|
104
|
-
* group after destroying this resource. Default is `false`.
|
|
98
|
+
* Remove users added by this rule from the assigned group after deleting this resource. Default is `false`
|
|
105
99
|
*/
|
|
106
100
|
removeAssignedUsers?: pulumi.Input<boolean>;
|
|
107
101
|
/**
|
|
108
|
-
*
|
|
102
|
+
* Default to `ACTIVE`
|
|
109
103
|
*/
|
|
110
104
|
status?: pulumi.Input<string>;
|
|
111
105
|
/**
|
|
112
|
-
* The list of user IDs that would be excluded when rules are processed
|
|
106
|
+
* The list of user IDs that would be excluded when rules are processed
|
|
113
107
|
*/
|
|
114
108
|
usersExcludeds?: pulumi.Input<pulumi.Input<string>[]>;
|
|
115
109
|
}
|
|
@@ -118,8 +112,7 @@ export interface RuleState {
|
|
|
118
112
|
*/
|
|
119
113
|
export interface RuleArgs {
|
|
120
114
|
/**
|
|
121
|
-
* The expression type to use to invoke the rule. The default
|
|
122
|
-
* is `"urn:okta:expression:1.0"`.
|
|
115
|
+
* The expression type to use to invoke the rule. The default is `urn:okta:expression:1.0`.
|
|
123
116
|
*/
|
|
124
117
|
expressionType?: pulumi.Input<string>;
|
|
125
118
|
/**
|
|
@@ -135,16 +128,15 @@ export interface RuleArgs {
|
|
|
135
128
|
*/
|
|
136
129
|
name?: pulumi.Input<string>;
|
|
137
130
|
/**
|
|
138
|
-
*
|
|
139
|
-
* group after destroying this resource. Default is `false`.
|
|
131
|
+
* Remove users added by this rule from the assigned group after deleting this resource. Default is `false`
|
|
140
132
|
*/
|
|
141
133
|
removeAssignedUsers?: pulumi.Input<boolean>;
|
|
142
134
|
/**
|
|
143
|
-
*
|
|
135
|
+
* Default to `ACTIVE`
|
|
144
136
|
*/
|
|
145
137
|
status?: pulumi.Input<string>;
|
|
146
138
|
/**
|
|
147
|
-
* The list of user IDs that would be excluded when rules are processed
|
|
139
|
+
* The list of user IDs that would be excluded when rules are processed
|
|
148
140
|
*/
|
|
149
141
|
usersExcludeds?: pulumi.Input<pulumi.Input<string>[]>;
|
|
150
142
|
}
|
package/group/rule.js
CHANGED
package/group/rule.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"rule.js","sourceRoot":"","sources":["../../group/rule.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"rule.js","sourceRoot":"","sources":["../../group/rule.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;GAqBG;AACH,MAAa,IAAK,SAAQ,MAAM,CAAC,cAAc;IAC3C;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAiB,EAAE,IAAmC;QAC/G,OAAO,IAAI,IAAI,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC3D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,IAAI,CAAC,YAAY,CAAC;IACrD,CAAC;IAuCD,YAAY,IAAY,EAAE,WAAkC,EAAE,IAAmC;QAC7F,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAoC,CAAC;YACnD,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/E;aAAM;YACH,MAAM,IAAI,GAAG,WAAmC,CAAC;YACjD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,eAAe,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC5D,MAAM,IAAI,KAAK,CAAC,6CAA6C,CAAC,CAAC;aAClE;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,gBAAgB,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7D,MAAM,IAAI,KAAK,CAAC,8CAA8C,CAAC,CAAC;aACnE;YACD,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7E;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,IAAI,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACzD,CAAC;;AA/FL,oBAgGC;AAlFG,gBAAgB;AACO,iBAAY,GAAG,sBAAsB,CAAC"}
|
package/groupMemberships.d.ts
CHANGED
|
@@ -1,16 +1,14 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
3
|
* Resource to manage a set of memberships for a specific group.
|
|
4
|
-
*
|
|
5
4
|
* This resource will allow you to bulk manage group membership in Okta for a given
|
|
6
5
|
* group. This offers an interface to pass multiple users into a single resource
|
|
7
6
|
* call, for better API resource usage. If you need a relationship of a single
|
|
8
|
-
* user to many groups, please use the
|
|
9
|
-
*
|
|
7
|
+
* user to many groups, please use the 'okta_user_group_memberships' resource.
|
|
10
8
|
* **Important**: The default behavior of the resource is to only maintain the
|
|
11
9
|
* state of user ids that are assigned it. This behavior will signal drift only if
|
|
12
10
|
* those users stop being part of the group. If the desired behavior is track all
|
|
13
|
-
* users that are added/removed from the group make use of the
|
|
11
|
+
* users that are added/removed from the group make use of the 'track_all_users'
|
|
14
12
|
* argument with this resource.
|
|
15
13
|
*
|
|
16
14
|
* ## Example Usage
|
|
@@ -63,11 +61,11 @@ export declare class GroupMemberships extends pulumi.CustomResource {
|
|
|
63
61
|
*/
|
|
64
62
|
static isInstance(obj: any): obj is GroupMemberships;
|
|
65
63
|
/**
|
|
66
|
-
* Okta group
|
|
64
|
+
* ID of a Okta group.
|
|
67
65
|
*/
|
|
68
66
|
readonly groupId: pulumi.Output<string>;
|
|
69
67
|
/**
|
|
70
|
-
* The resource
|
|
68
|
+
* The resource concerns itself with all users added/deleted to the group; even those managed outside of the resource.
|
|
71
69
|
*/
|
|
72
70
|
readonly trackAllUsers: pulumi.Output<boolean | undefined>;
|
|
73
71
|
/**
|
|
@@ -88,11 +86,11 @@ export declare class GroupMemberships extends pulumi.CustomResource {
|
|
|
88
86
|
*/
|
|
89
87
|
export interface GroupMembershipsState {
|
|
90
88
|
/**
|
|
91
|
-
* Okta group
|
|
89
|
+
* ID of a Okta group.
|
|
92
90
|
*/
|
|
93
91
|
groupId?: pulumi.Input<string>;
|
|
94
92
|
/**
|
|
95
|
-
* The resource
|
|
93
|
+
* The resource concerns itself with all users added/deleted to the group; even those managed outside of the resource.
|
|
96
94
|
*/
|
|
97
95
|
trackAllUsers?: pulumi.Input<boolean>;
|
|
98
96
|
/**
|
|
@@ -105,11 +103,11 @@ export interface GroupMembershipsState {
|
|
|
105
103
|
*/
|
|
106
104
|
export interface GroupMembershipsArgs {
|
|
107
105
|
/**
|
|
108
|
-
* Okta group
|
|
106
|
+
* ID of a Okta group.
|
|
109
107
|
*/
|
|
110
108
|
groupId: pulumi.Input<string>;
|
|
111
109
|
/**
|
|
112
|
-
* The resource
|
|
110
|
+
* The resource concerns itself with all users added/deleted to the group; even those managed outside of the resource.
|
|
113
111
|
*/
|
|
114
112
|
trackAllUsers?: pulumi.Input<boolean>;
|
|
115
113
|
/**
|
package/groupMemberships.js
CHANGED
|
@@ -7,16 +7,14 @@ const pulumi = require("@pulumi/pulumi");
|
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
9
|
* Resource to manage a set of memberships for a specific group.
|
|
10
|
-
*
|
|
11
10
|
* This resource will allow you to bulk manage group membership in Okta for a given
|
|
12
11
|
* group. This offers an interface to pass multiple users into a single resource
|
|
13
12
|
* call, for better API resource usage. If you need a relationship of a single
|
|
14
|
-
* user to many groups, please use the
|
|
15
|
-
*
|
|
13
|
+
* user to many groups, please use the 'okta_user_group_memberships' resource.
|
|
16
14
|
* **Important**: The default behavior of the resource is to only maintain the
|
|
17
15
|
* state of user ids that are assigned it. This behavior will signal drift only if
|
|
18
16
|
* those users stop being part of the group. If the desired behavior is track all
|
|
19
|
-
* users that are added/removed from the group make use of the
|
|
17
|
+
* users that are added/removed from the group make use of the 'track_all_users'
|
|
20
18
|
* argument with this resource.
|
|
21
19
|
*
|
|
22
20
|
* ## Example Usage
|
package/groupMemberships.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"groupMemberships.js","sourceRoot":"","sources":["../groupMemberships.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"groupMemberships.js","sourceRoot":"","sources":["../groupMemberships.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA4CG;AACH,MAAa,gBAAiB,SAAQ,MAAM,CAAC,cAAc;IACvD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA6B,EAAE,IAAmC;QAC3H,OAAO,IAAI,gBAAgB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACvE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,gBAAgB,CAAC,YAAY,CAAC;IACjE,CAAC;IAuBD,YAAY,IAAY,EAAE,WAA0D,EAAE,IAAmC;QACrH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAgD,CAAC;YAC/D,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7D;aAAM;YACH,MAAM,IAAI,GAAG,WAA+C,CAAC;YAC7D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,gBAAgB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACrE,CAAC;;AAvEL,4CAwEC;AA1DG,gBAAgB;AACO,6BAAY,GAAG,8CAA8C,CAAC"}
|