@pulumi/okta 6.0.0-alpha.1760078393 → 6.0.0-alpha.1768025445
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/adminRoleCustomAssignments.d.ts +76 -0
- package/adminRoleCustomAssignments.js +76 -0
- package/adminRoleCustomAssignments.js.map +1 -1
- package/apiServiceIntegration.d.ts +110 -0
- package/apiServiceIntegration.js +96 -0
- package/apiServiceIntegration.js.map +1 -0
- package/apiToken.d.ts +141 -0
- package/apiToken.js +93 -0
- package/apiToken.js.map +1 -0
- package/app/connection.d.ts +164 -0
- package/app/connection.js +136 -0
- package/app/connection.js.map +1 -0
- package/app/features.d.ts +121 -0
- package/app/features.js +77 -0
- package/app/features.js.map +1 -0
- package/app/getConnection.d.ts +106 -0
- package/app/getConnection.js +62 -0
- package/app/getConnection.js.map +1 -0
- package/app/getFeatures.d.ts +156 -0
- package/app/getFeatures.js +116 -0
- package/app/getFeatures.js.map +1 -0
- package/app/getToken.d.ts +98 -0
- package/app/getToken.js +62 -0
- package/app/getToken.js.map +1 -0
- package/app/groupAssignment.d.ts +1 -1
- package/app/groupAssignment.js +1 -1
- package/app/index.d.ts +18 -0
- package/app/index.js +25 -1
- package/app/index.js.map +1 -1
- package/app/oauth.d.ts +51 -0
- package/app/oauth.js +6 -0
- package/app/oauth.js.map +1 -1
- package/app/threeField.d.ts +15 -0
- package/app/threeField.js +15 -0
- package/app/threeField.js.map +1 -1
- package/app/token.d.ts +108 -0
- package/app/token.js +93 -0
- package/app/token.js.map +1 -0
- package/appSignonPolicyRule.d.ts +1 -7
- package/appSignonPolicyRule.js +1 -7
- package/appSignonPolicyRule.js.map +1 -1
- package/auth/getServerClients.d.ts +114 -0
- package/auth/getServerClients.js +58 -0
- package/auth/getServerClients.js.map +1 -0
- package/auth/getServerKeys.d.ts +113 -0
- package/auth/getServerKeys.js +70 -0
- package/auth/getServerKeys.js.map +1 -0
- package/auth/index.d.ts +6 -0
- package/auth/index.js +7 -1
- package/auth/index.js.map +1 -1
- package/authenticator.d.ts +42 -10
- package/authenticator.js +26 -4
- package/authenticator.js.map +1 -1
- package/customizedSigninPage.d.ts +68 -0
- package/customizedSigninPage.js +68 -0
- package/customizedSigninPage.js.map +1 -1
- package/device.d.ts +80 -0
- package/device.js +69 -0
- package/device.js.map +1 -0
- package/emailCustomization.d.ts +30 -0
- package/emailCustomization.js +30 -0
- package/emailCustomization.js.map +1 -1
- package/feature.d.ts +12 -0
- package/feature.js +12 -0
- package/feature.js.map +1 -1
- package/getApiServiceIntegration.d.ts +85 -0
- package/getApiServiceIntegration.js +78 -0
- package/getApiServiceIntegration.js.map +1 -0
- package/getApiToken.d.ts +88 -0
- package/getApiToken.js +52 -0
- package/getApiToken.js.map +1 -0
- package/getBehaviour.d.ts +4 -0
- package/getBehaviour.js +4 -0
- package/getBehaviour.js.map +1 -1
- package/getBrand.d.ts +30 -0
- package/getBrand.js +30 -0
- package/getBrand.js.map +1 -1
- package/getCatalogEntryUserAccessRequestFields.d.ts +42 -0
- package/getCatalogEntryUserAccessRequestFields.js +24 -0
- package/getCatalogEntryUserAccessRequestFields.js.map +1 -1
- package/getDevice.d.ts +90 -0
- package/getDevice.js +54 -0
- package/getDevice.js.map +1 -0
- package/getEmailCustomization.d.ts +36 -0
- package/getEmailCustomization.js +36 -0
- package/getEmailCustomization.js.map +1 -1
- package/getEmailCustomizations.d.ts +26 -0
- package/getEmailCustomizations.js +26 -0
- package/getEmailCustomizations.js.map +1 -1
- package/getHookKey.d.ts +77 -0
- package/getHookKey.js +52 -0
- package/getHookKey.js.map +1 -0
- package/getPrincipalEntitlements.d.ts +116 -0
- package/getPrincipalEntitlements.js +116 -0
- package/getPrincipalEntitlements.js.map +1 -1
- package/getPushProvider.d.ts +118 -0
- package/getPushProvider.js +86 -0
- package/getPushProvider.js.map +1 -0
- package/getRealmAssignment.d.ts +4 -0
- package/getRealmAssignment.js +4 -0
- package/getRealmAssignment.js.map +1 -1
- package/getRequestSettingResource.d.ts +4 -0
- package/getRequestSettingResource.js +4 -0
- package/getRequestSettingResource.js.map +1 -1
- package/getRequestV2.d.ts +79 -0
- package/getRequestV2.js +28 -0
- package/getRequestV2.js.map +1 -1
- package/getSecurityEventsProvider.d.ts +79 -0
- package/getSecurityEventsProvider.js +52 -0
- package/getSecurityEventsProvider.js.map +1 -0
- package/getTemplate.d.ts +26 -0
- package/getTemplate.js +26 -0
- package/getTemplate.js.map +1 -1
- package/getTemplates.d.ts +24 -0
- package/getTemplates.js +24 -0
- package/getTemplates.js.map +1 -1
- package/getTheme.d.ts +26 -0
- package/getTheme.js +26 -0
- package/getTheme.js.map +1 -1
- package/getThemes.d.ts +24 -0
- package/getThemes.js +24 -0
- package/getThemes.js.map +1 -1
- package/getUiSchema.d.ts +80 -0
- package/getUiSchema.js +52 -0
- package/getUiSchema.js.map +1 -0
- package/group/owner.d.ts +24 -0
- package/group/owner.js +24 -0
- package/group/owner.js.map +1 -1
- package/group/role.d.ts +41 -0
- package/group/role.js +41 -0
- package/group/role.js.map +1 -1
- package/hookKey.d.ts +102 -0
- package/hookKey.js +79 -0
- package/hookKey.js.map +1 -0
- package/index.d.ts +42 -0
- package/index.js +61 -4
- package/index.js.map +1 -1
- package/inline/hook.d.ts +15 -15
- package/inline/hook.js +15 -15
- package/package.json +3 -3
- package/policy/deviceAssuranceAndroid.d.ts +24 -0
- package/policy/deviceAssuranceAndroid.js +24 -0
- package/policy/deviceAssuranceAndroid.js.map +1 -1
- package/policy/deviceAssuranceIos.d.ts +17 -0
- package/policy/deviceAssuranceIos.js +17 -0
- package/policy/deviceAssuranceIos.js.map +1 -1
- package/policy/deviceAssuranceMacos.d.ts +37 -0
- package/policy/deviceAssuranceMacos.js +37 -0
- package/policy/deviceAssuranceMacos.js.map +1 -1
- package/policy/deviceAssuranceWindows.d.ts +43 -0
- package/policy/deviceAssuranceWindows.js +43 -0
- package/policy/deviceAssuranceWindows.js.map +1 -1
- package/policy/mfa.d.ts +18 -0
- package/policy/mfa.js +2 -0
- package/policy/mfa.js.map +1 -1
- package/policyMfaDefault.d.ts +18 -0
- package/policyMfaDefault.js +2 -0
- package/policyMfaDefault.js.map +1 -1
- package/previewSigninPage.d.ts +68 -0
- package/previewSigninPage.js +68 -0
- package/previewSigninPage.js.map +1 -1
- package/pushProvider.d.ts +150 -0
- package/pushProvider.js +126 -0
- package/pushProvider.js.map +1 -0
- package/rateLimiting.d.ts +13 -0
- package/rateLimiting.js +13 -0
- package/rateLimiting.js.map +1 -1
- package/requestCondition.d.ts +47 -2
- package/requestCondition.js +42 -1
- package/requestCondition.js.map +1 -1
- package/requestSettingOrganization.d.ts +19 -0
- package/requestSettingOrganization.js +19 -0
- package/requestSettingOrganization.js.map +1 -1
- package/requestSettingResource.d.ts +20 -0
- package/requestSettingResource.js +20 -0
- package/requestSettingResource.js.map +1 -1
- package/requestV2.d.ts +39 -12
- package/requestV2.js +27 -0
- package/requestV2.js.map +1 -1
- package/securityEventsProvider.d.ts +138 -0
- package/securityEventsProvider.js +107 -0
- package/securityEventsProvider.js.map +1 -0
- package/theme.d.ts +23 -0
- package/theme.js +23 -0
- package/theme.js.map +1 -1
- package/types/input.d.ts +1041 -18
- package/types/output.d.ts +691 -5
- package/uiSchema.d.ts +74 -0
- package/uiSchema.js +73 -0
- package/uiSchema.js.map +1 -0
- package/user/getUser.d.ts +1 -0
- package/user/getUser.js.map +1 -1
- package/user/user.d.ts +12 -0
- package/user/user.js +2 -0
- package/user/user.js.map +1 -1
|
@@ -0,0 +1,58 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
// *** WARNING: this file was generated by pulumi-language-nodejs. ***
|
|
3
|
+
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.getServerClientsOutput = exports.getServerClients = void 0;
|
|
6
|
+
const pulumi = require("@pulumi/pulumi");
|
|
7
|
+
const utilities = require("../utilities");
|
|
8
|
+
/**
|
|
9
|
+
* Get OAuth 2.0 refresh token information for an authorization server client from Okta.
|
|
10
|
+
*
|
|
11
|
+
* ## Example Usage
|
|
12
|
+
*
|
|
13
|
+
* ```typescript
|
|
14
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
15
|
+
* import * as okta from "@pulumi/okta";
|
|
16
|
+
*
|
|
17
|
+
* const example = okta.auth.getServerClients({
|
|
18
|
+
* id: "oar123456abcdefghijklm",
|
|
19
|
+
* authServerId: "aus123456abcdefghijklm",
|
|
20
|
+
* clientId: "0oa123456abcdefghijklm",
|
|
21
|
+
* });
|
|
22
|
+
* ```
|
|
23
|
+
*/
|
|
24
|
+
function getServerClients(args, opts) {
|
|
25
|
+
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
|
|
26
|
+
return pulumi.runtime.invoke("okta:auth/getServerClients:getServerClients", {
|
|
27
|
+
"authServerId": args.authServerId,
|
|
28
|
+
"clientId": args.clientId,
|
|
29
|
+
"id": args.id,
|
|
30
|
+
}, opts);
|
|
31
|
+
}
|
|
32
|
+
exports.getServerClients = getServerClients;
|
|
33
|
+
/**
|
|
34
|
+
* Get OAuth 2.0 refresh token information for an authorization server client from Okta.
|
|
35
|
+
*
|
|
36
|
+
* ## Example Usage
|
|
37
|
+
*
|
|
38
|
+
* ```typescript
|
|
39
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
40
|
+
* import * as okta from "@pulumi/okta";
|
|
41
|
+
*
|
|
42
|
+
* const example = okta.auth.getServerClients({
|
|
43
|
+
* id: "oar123456abcdefghijklm",
|
|
44
|
+
* authServerId: "aus123456abcdefghijklm",
|
|
45
|
+
* clientId: "0oa123456abcdefghijklm",
|
|
46
|
+
* });
|
|
47
|
+
* ```
|
|
48
|
+
*/
|
|
49
|
+
function getServerClientsOutput(args, opts) {
|
|
50
|
+
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
|
|
51
|
+
return pulumi.runtime.invokeOutput("okta:auth/getServerClients:getServerClients", {
|
|
52
|
+
"authServerId": args.authServerId,
|
|
53
|
+
"clientId": args.clientId,
|
|
54
|
+
"id": args.id,
|
|
55
|
+
}, opts);
|
|
56
|
+
}
|
|
57
|
+
exports.getServerClientsOutput = getServerClientsOutput;
|
|
58
|
+
//# sourceMappingURL=getServerClients.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"getServerClients.js","sourceRoot":"","sources":["../../auth/getServerClients.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;GAeG;AACH,SAAgB,gBAAgB,CAAC,IAA0B,EAAE,IAA2B;IACpF,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,6CAA6C,EAAE;QACxE,cAAc,EAAE,IAAI,CAAC,YAAY;QACjC,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,IAAI,EAAE,IAAI,CAAC,EAAE;KAChB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAPD,4CAOC;AAiED;;;;;;;;;;;;;;;GAeG;AACH,SAAgB,sBAAsB,CAAC,IAAgC,EAAE,IAAiC;IACtG,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,YAAY,CAAC,6CAA6C,EAAE;QAC9E,cAAc,EAAE,IAAI,CAAC,YAAY;QACjC,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,IAAI,EAAE,IAAI,CAAC,EAAE;KAChB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAPD,wDAOC"}
|
|
@@ -0,0 +1,113 @@
|
|
|
1
|
+
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
/**
|
|
3
|
+
* Get a specific authorization server credential key from Okta. Authorization server keys are JSON Web Keys (JWK) used for signing tokens issued by the authorization server.
|
|
4
|
+
*
|
|
5
|
+
* This data source allows you to retrieve information about a specific key used by an authorization server for token signing operations.
|
|
6
|
+
*
|
|
7
|
+
* ## Example Usage
|
|
8
|
+
*
|
|
9
|
+
* ```typescript
|
|
10
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
11
|
+
* import * as okta from "@pulumi/okta";
|
|
12
|
+
*
|
|
13
|
+
* const example = okta.auth.getServerKeys({
|
|
14
|
+
* authServerId: "aus123456789abcdefgh",
|
|
15
|
+
* keyId: "abcdefghijk0123456789",
|
|
16
|
+
* });
|
|
17
|
+
* ```
|
|
18
|
+
*
|
|
19
|
+
* ## Notes
|
|
20
|
+
*
|
|
21
|
+
* - To find available key IDs for an authorization server, you can use the Okta Admin Console or make a direct API call to `/api/v1/authorizationServers/{authServerId}/credentials/keys`
|
|
22
|
+
* - The key ID (`kid`) is automatically generated by Okta and is unique within the authorization server
|
|
23
|
+
* - This data source is useful for retrieving key information for verification purposes or to reference in other configurations
|
|
24
|
+
*/
|
|
25
|
+
export declare function getServerKeys(args: GetServerKeysArgs, opts?: pulumi.InvokeOptions): Promise<GetServerKeysResult>;
|
|
26
|
+
/**
|
|
27
|
+
* A collection of arguments for invoking getServerKeys.
|
|
28
|
+
*/
|
|
29
|
+
export interface GetServerKeysArgs {
|
|
30
|
+
/**
|
|
31
|
+
* The ID of the authorization server.
|
|
32
|
+
*/
|
|
33
|
+
authServerId: string;
|
|
34
|
+
/**
|
|
35
|
+
* The ID of the certificate key.
|
|
36
|
+
*/
|
|
37
|
+
keyId: string;
|
|
38
|
+
}
|
|
39
|
+
/**
|
|
40
|
+
* A collection of values returned by getServerKeys.
|
|
41
|
+
*/
|
|
42
|
+
export interface GetServerKeysResult {
|
|
43
|
+
/**
|
|
44
|
+
* The algorithm used with the Key. Typically "RS256" for RSA keys.
|
|
45
|
+
*/
|
|
46
|
+
readonly alg: string;
|
|
47
|
+
/**
|
|
48
|
+
* The ID of the authorization server.
|
|
49
|
+
*/
|
|
50
|
+
readonly authServerId: string;
|
|
51
|
+
/**
|
|
52
|
+
* RSA key value (public exponent) for Key binding. Typically "AQAB".
|
|
53
|
+
*/
|
|
54
|
+
readonly e: string;
|
|
55
|
+
readonly id: string;
|
|
56
|
+
/**
|
|
57
|
+
* The ID of the certificate key.
|
|
58
|
+
*/
|
|
59
|
+
readonly keyId: string;
|
|
60
|
+
/**
|
|
61
|
+
* Unique identifier for the key (Key ID).
|
|
62
|
+
*/
|
|
63
|
+
readonly kid: string;
|
|
64
|
+
/**
|
|
65
|
+
* RSA modulus value that is used by both the public and private keys and provides a link between them.
|
|
66
|
+
*/
|
|
67
|
+
readonly n: string;
|
|
68
|
+
/**
|
|
69
|
+
* The status of the key. An ACTIVE key is used to sign tokens issued by the authorization server. Supported values: `ACTIVE`, `NEXT`, or `EXPIRED`. A NEXT key is the next key that the authorization server uses to sign tokens when keys are rotated. The NEXT key might not be listed if it hasn't been generated. An EXPIRED key is the previous key that the authorization server used to sign tokens. The EXPIRED key might not be listed if no key has expired or the expired key was deleted.
|
|
70
|
+
*/
|
|
71
|
+
readonly status: string;
|
|
72
|
+
/**
|
|
73
|
+
* Acceptable use of the key. Typically "sig" for signature operations.
|
|
74
|
+
*/
|
|
75
|
+
readonly use: string;
|
|
76
|
+
}
|
|
77
|
+
/**
|
|
78
|
+
* Get a specific authorization server credential key from Okta. Authorization server keys are JSON Web Keys (JWK) used for signing tokens issued by the authorization server.
|
|
79
|
+
*
|
|
80
|
+
* This data source allows you to retrieve information about a specific key used by an authorization server for token signing operations.
|
|
81
|
+
*
|
|
82
|
+
* ## Example Usage
|
|
83
|
+
*
|
|
84
|
+
* ```typescript
|
|
85
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
86
|
+
* import * as okta from "@pulumi/okta";
|
|
87
|
+
*
|
|
88
|
+
* const example = okta.auth.getServerKeys({
|
|
89
|
+
* authServerId: "aus123456789abcdefgh",
|
|
90
|
+
* keyId: "abcdefghijk0123456789",
|
|
91
|
+
* });
|
|
92
|
+
* ```
|
|
93
|
+
*
|
|
94
|
+
* ## Notes
|
|
95
|
+
*
|
|
96
|
+
* - To find available key IDs for an authorization server, you can use the Okta Admin Console or make a direct API call to `/api/v1/authorizationServers/{authServerId}/credentials/keys`
|
|
97
|
+
* - The key ID (`kid`) is automatically generated by Okta and is unique within the authorization server
|
|
98
|
+
* - This data source is useful for retrieving key information for verification purposes or to reference in other configurations
|
|
99
|
+
*/
|
|
100
|
+
export declare function getServerKeysOutput(args: GetServerKeysOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output<GetServerKeysResult>;
|
|
101
|
+
/**
|
|
102
|
+
* A collection of arguments for invoking getServerKeys.
|
|
103
|
+
*/
|
|
104
|
+
export interface GetServerKeysOutputArgs {
|
|
105
|
+
/**
|
|
106
|
+
* The ID of the authorization server.
|
|
107
|
+
*/
|
|
108
|
+
authServerId: pulumi.Input<string>;
|
|
109
|
+
/**
|
|
110
|
+
* The ID of the certificate key.
|
|
111
|
+
*/
|
|
112
|
+
keyId: pulumi.Input<string>;
|
|
113
|
+
}
|
|
@@ -0,0 +1,70 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
// *** WARNING: this file was generated by pulumi-language-nodejs. ***
|
|
3
|
+
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.getServerKeysOutput = exports.getServerKeys = void 0;
|
|
6
|
+
const pulumi = require("@pulumi/pulumi");
|
|
7
|
+
const utilities = require("../utilities");
|
|
8
|
+
/**
|
|
9
|
+
* Get a specific authorization server credential key from Okta. Authorization server keys are JSON Web Keys (JWK) used for signing tokens issued by the authorization server.
|
|
10
|
+
*
|
|
11
|
+
* This data source allows you to retrieve information about a specific key used by an authorization server for token signing operations.
|
|
12
|
+
*
|
|
13
|
+
* ## Example Usage
|
|
14
|
+
*
|
|
15
|
+
* ```typescript
|
|
16
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
17
|
+
* import * as okta from "@pulumi/okta";
|
|
18
|
+
*
|
|
19
|
+
* const example = okta.auth.getServerKeys({
|
|
20
|
+
* authServerId: "aus123456789abcdefgh",
|
|
21
|
+
* keyId: "abcdefghijk0123456789",
|
|
22
|
+
* });
|
|
23
|
+
* ```
|
|
24
|
+
*
|
|
25
|
+
* ## Notes
|
|
26
|
+
*
|
|
27
|
+
* - To find available key IDs for an authorization server, you can use the Okta Admin Console or make a direct API call to `/api/v1/authorizationServers/{authServerId}/credentials/keys`
|
|
28
|
+
* - The key ID (`kid`) is automatically generated by Okta and is unique within the authorization server
|
|
29
|
+
* - This data source is useful for retrieving key information for verification purposes or to reference in other configurations
|
|
30
|
+
*/
|
|
31
|
+
function getServerKeys(args, opts) {
|
|
32
|
+
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
|
|
33
|
+
return pulumi.runtime.invoke("okta:auth/getServerKeys:getServerKeys", {
|
|
34
|
+
"authServerId": args.authServerId,
|
|
35
|
+
"keyId": args.keyId,
|
|
36
|
+
}, opts);
|
|
37
|
+
}
|
|
38
|
+
exports.getServerKeys = getServerKeys;
|
|
39
|
+
/**
|
|
40
|
+
* Get a specific authorization server credential key from Okta. Authorization server keys are JSON Web Keys (JWK) used for signing tokens issued by the authorization server.
|
|
41
|
+
*
|
|
42
|
+
* This data source allows you to retrieve information about a specific key used by an authorization server for token signing operations.
|
|
43
|
+
*
|
|
44
|
+
* ## Example Usage
|
|
45
|
+
*
|
|
46
|
+
* ```typescript
|
|
47
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
48
|
+
* import * as okta from "@pulumi/okta";
|
|
49
|
+
*
|
|
50
|
+
* const example = okta.auth.getServerKeys({
|
|
51
|
+
* authServerId: "aus123456789abcdefgh",
|
|
52
|
+
* keyId: "abcdefghijk0123456789",
|
|
53
|
+
* });
|
|
54
|
+
* ```
|
|
55
|
+
*
|
|
56
|
+
* ## Notes
|
|
57
|
+
*
|
|
58
|
+
* - To find available key IDs for an authorization server, you can use the Okta Admin Console or make a direct API call to `/api/v1/authorizationServers/{authServerId}/credentials/keys`
|
|
59
|
+
* - The key ID (`kid`) is automatically generated by Okta and is unique within the authorization server
|
|
60
|
+
* - This data source is useful for retrieving key information for verification purposes or to reference in other configurations
|
|
61
|
+
*/
|
|
62
|
+
function getServerKeysOutput(args, opts) {
|
|
63
|
+
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
|
|
64
|
+
return pulumi.runtime.invokeOutput("okta:auth/getServerKeys:getServerKeys", {
|
|
65
|
+
"authServerId": args.authServerId,
|
|
66
|
+
"keyId": args.keyId,
|
|
67
|
+
}, opts);
|
|
68
|
+
}
|
|
69
|
+
exports.getServerKeysOutput = getServerKeysOutput;
|
|
70
|
+
//# sourceMappingURL=getServerKeys.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"getServerKeys.js","sourceRoot":"","sources":["../../auth/getServerKeys.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;GAsBG;AACH,SAAgB,aAAa,CAAC,IAAuB,EAAE,IAA2B;IAC9E,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,uCAAuC,EAAE;QAClE,cAAc,EAAE,IAAI,CAAC,YAAY;QACjC,OAAO,EAAE,IAAI,CAAC,KAAK;KACtB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAND,sCAMC;AAsDD;;;;;;;;;;;;;;;;;;;;;;GAsBG;AACH,SAAgB,mBAAmB,CAAC,IAA6B,EAAE,IAAiC;IAChG,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,YAAY,CAAC,uCAAuC,EAAE;QACxE,cAAc,EAAE,IAAI,CAAC,YAAY;QACjC,OAAO,EAAE,IAAI,CAAC,KAAK;KACtB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAND,kDAMC"}
|
package/auth/index.d.ts
CHANGED
|
@@ -1,6 +1,12 @@
|
|
|
1
1
|
export { GetServerArgs, GetServerResult, GetServerOutputArgs } from "./getServer";
|
|
2
2
|
export declare const getServer: typeof import("./getServer").getServer;
|
|
3
3
|
export declare const getServerOutput: typeof import("./getServer").getServerOutput;
|
|
4
|
+
export { GetServerClientsArgs, GetServerClientsResult, GetServerClientsOutputArgs } from "./getServerClients";
|
|
5
|
+
export declare const getServerClients: typeof import("./getServerClients").getServerClients;
|
|
6
|
+
export declare const getServerClientsOutput: typeof import("./getServerClients").getServerClientsOutput;
|
|
7
|
+
export { GetServerKeysArgs, GetServerKeysResult, GetServerKeysOutputArgs } from "./getServerKeys";
|
|
8
|
+
export declare const getServerKeys: typeof import("./getServerKeys").getServerKeys;
|
|
9
|
+
export declare const getServerKeysOutput: typeof import("./getServerKeys").getServerKeysOutput;
|
|
4
10
|
export { GetServerPolicyArgs, GetServerPolicyResult, GetServerPolicyOutputArgs } from "./getServerPolicy";
|
|
5
11
|
export declare const getServerPolicy: typeof import("./getServerPolicy").getServerPolicy;
|
|
6
12
|
export declare const getServerPolicyOutput: typeof import("./getServerPolicy").getServerPolicyOutput;
|
package/auth/index.js
CHANGED
|
@@ -2,12 +2,18 @@
|
|
|
2
2
|
// *** WARNING: this file was generated by pulumi-language-nodejs. ***
|
|
3
3
|
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
4
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
-
exports.ServerScope = exports.ServerPolicyRule = exports.ServerPolicy = exports.ServerClaim = exports.Server = exports.getServerScopesOutput = exports.getServerScopes = exports.getServerPolicyOutput = exports.getServerPolicy = exports.getServerOutput = exports.getServer = void 0;
|
|
5
|
+
exports.ServerScope = exports.ServerPolicyRule = exports.ServerPolicy = exports.ServerClaim = exports.Server = exports.getServerScopesOutput = exports.getServerScopes = exports.getServerPolicyOutput = exports.getServerPolicy = exports.getServerKeysOutput = exports.getServerKeys = exports.getServerClientsOutput = exports.getServerClients = exports.getServerOutput = exports.getServer = void 0;
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
8
|
exports.getServer = null;
|
|
9
9
|
exports.getServerOutput = null;
|
|
10
10
|
utilities.lazyLoad(exports, ["getServer", "getServerOutput"], () => require("./getServer"));
|
|
11
|
+
exports.getServerClients = null;
|
|
12
|
+
exports.getServerClientsOutput = null;
|
|
13
|
+
utilities.lazyLoad(exports, ["getServerClients", "getServerClientsOutput"], () => require("./getServerClients"));
|
|
14
|
+
exports.getServerKeys = null;
|
|
15
|
+
exports.getServerKeysOutput = null;
|
|
16
|
+
utilities.lazyLoad(exports, ["getServerKeys", "getServerKeysOutput"], () => require("./getServerKeys"));
|
|
11
17
|
exports.getServerPolicy = null;
|
|
12
18
|
exports.getServerPolicyOutput = null;
|
|
13
19
|
utilities.lazyLoad(exports, ["getServerPolicy", "getServerPolicyOutput"], () => require("./getServerPolicy"));
|
package/auth/index.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../auth/index.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAI7B,QAAA,SAAS,GAA2C,IAAW,CAAC;AAChE,QAAA,eAAe,GAAiD,IAAW,CAAC;AACzF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,WAAW,EAAC,iBAAiB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC,CAAC;AAG9E,QAAA,eAAe,GAAuD,IAAW,CAAC;AAClF,QAAA,qBAAqB,GAA6D,IAAW,CAAC;AAC3G,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,iBAAiB,EAAC,uBAAuB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,mBAAmB,CAAC,CAAC,CAAC;AAGhG,QAAA,eAAe,GAAuD,IAAW,CAAC;AAClF,QAAA,qBAAqB,GAA6D,IAAW,CAAC;AAC3G,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,iBAAiB,EAAC,uBAAuB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,mBAAmB,CAAC,CAAC,CAAC;AAIhG,QAAA,MAAM,GAAqC,IAAW,CAAC;AACpE,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,QAAQ,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC,CAAC;AAItD,QAAA,WAAW,GAA+C,IAAW,CAAC;AACnF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,aAAa,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,eAAe,CAAC,CAAC,CAAC;AAIhE,QAAA,YAAY,GAAiD,IAAW,CAAC;AACtF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,cAAc,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,gBAAgB,CAAC,CAAC,CAAC;AAIlE,QAAA,gBAAgB,GAAyD,IAAW,CAAC;AAClG,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,kBAAkB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,oBAAoB,CAAC,CAAC,CAAC;AAI1E,QAAA,WAAW,GAA+C,IAAW,CAAC;AACnF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,aAAa,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,eAAe,CAAC,CAAC,CAAC;AAG7E,MAAM,OAAO,GAAG;IACZ,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE;IAC/B,SAAS,EAAE,CAAC,IAAY,EAAE,IAAY,EAAE,GAAW,EAAmB,EAAE;QACpE,QAAQ,IAAI,EAAE;YACV,KAAK,yBAAyB;gBAC1B,OAAO,IAAI,cAAM,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACpD,KAAK,mCAAmC;gBACpC,OAAO,IAAI,mBAAW,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACzD,KAAK,qCAAqC;gBACtC,OAAO,IAAI,oBAAY,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC1D,KAAK,6CAA6C;gBAC9C,OAAO,IAAI,wBAAgB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC9D,KAAK,mCAAmC;gBACpC,OAAO,IAAI,mBAAW,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACzD;gBACI,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,EAAE,CAAC,CAAC;SACxD;IACL,CAAC;CACJ,CAAC;AACF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,MAAM,EAAE,aAAa,EAAE,OAAO,CAAC,CAAA;AACrE,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,MAAM,EAAE,kBAAkB,EAAE,OAAO,CAAC,CAAA;AAC1E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,MAAM,EAAE,mBAAmB,EAAE,OAAO,CAAC,CAAA;AAC3E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,MAAM,EAAE,uBAAuB,EAAE,OAAO,CAAC,CAAA;AAC/E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,MAAM,EAAE,kBAAkB,EAAE,OAAO,CAAC,CAAA"}
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../auth/index.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAI7B,QAAA,SAAS,GAA2C,IAAW,CAAC;AAChE,QAAA,eAAe,GAAiD,IAAW,CAAC;AACzF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,WAAW,EAAC,iBAAiB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC,CAAC;AAG9E,QAAA,gBAAgB,GAAyD,IAAW,CAAC;AACrF,QAAA,sBAAsB,GAA+D,IAAW,CAAC;AAC9G,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,kBAAkB,EAAC,wBAAwB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,oBAAoB,CAAC,CAAC,CAAC;AAGnG,QAAA,aAAa,GAAmD,IAAW,CAAC;AAC5E,QAAA,mBAAmB,GAAyD,IAAW,CAAC;AACrG,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,eAAe,EAAC,qBAAqB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,iBAAiB,CAAC,CAAC,CAAC;AAG1F,QAAA,eAAe,GAAuD,IAAW,CAAC;AAClF,QAAA,qBAAqB,GAA6D,IAAW,CAAC;AAC3G,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,iBAAiB,EAAC,uBAAuB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,mBAAmB,CAAC,CAAC,CAAC;AAGhG,QAAA,eAAe,GAAuD,IAAW,CAAC;AAClF,QAAA,qBAAqB,GAA6D,IAAW,CAAC;AAC3G,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,iBAAiB,EAAC,uBAAuB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,mBAAmB,CAAC,CAAC,CAAC;AAIhG,QAAA,MAAM,GAAqC,IAAW,CAAC;AACpE,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,QAAQ,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC,CAAC;AAItD,QAAA,WAAW,GAA+C,IAAW,CAAC;AACnF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,aAAa,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,eAAe,CAAC,CAAC,CAAC;AAIhE,QAAA,YAAY,GAAiD,IAAW,CAAC;AACtF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,cAAc,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,gBAAgB,CAAC,CAAC,CAAC;AAIlE,QAAA,gBAAgB,GAAyD,IAAW,CAAC;AAClG,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,kBAAkB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,oBAAoB,CAAC,CAAC,CAAC;AAI1E,QAAA,WAAW,GAA+C,IAAW,CAAC;AACnF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,aAAa,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,eAAe,CAAC,CAAC,CAAC;AAG7E,MAAM,OAAO,GAAG;IACZ,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE;IAC/B,SAAS,EAAE,CAAC,IAAY,EAAE,IAAY,EAAE,GAAW,EAAmB,EAAE;QACpE,QAAQ,IAAI,EAAE;YACV,KAAK,yBAAyB;gBAC1B,OAAO,IAAI,cAAM,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACpD,KAAK,mCAAmC;gBACpC,OAAO,IAAI,mBAAW,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACzD,KAAK,qCAAqC;gBACtC,OAAO,IAAI,oBAAY,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC1D,KAAK,6CAA6C;gBAC9C,OAAO,IAAI,wBAAgB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC9D,KAAK,mCAAmC;gBACpC,OAAO,IAAI,mBAAW,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACzD;gBACI,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,EAAE,CAAC,CAAC;SACxD;IACL,CAAC;CACJ,CAAC;AACF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,MAAM,EAAE,aAAa,EAAE,OAAO,CAAC,CAAA;AACrE,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,MAAM,EAAE,kBAAkB,EAAE,OAAO,CAAC,CAAA;AAC1E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,MAAM,EAAE,mBAAmB,EAAE,OAAO,CAAC,CAAA;AAC3E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,MAAM,EAAE,uBAAuB,EAAE,OAAO,CAAC,CAAA;AAC/E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,MAAM,EAAE,kBAAkB,EAAE,OAAO,CAAC,CAAA"}
|
package/authenticator.d.ts
CHANGED
|
@@ -9,10 +9,11 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
9
9
|
* create the authenticator (hard create) will be performed. Thereafter, that
|
|
10
10
|
* authenticator is never deleted, it is only deactivated (soft delete). Therefore,
|
|
11
11
|
* if the authenticator already exists create is just a soft import of an existing
|
|
12
|
-
* authenticator. This does not apply to customOtp
|
|
13
|
-
* multiple customOtp
|
|
14
|
-
* name and key = customOtp is required. If an old name is
|
|
15
|
-
* reactivate the old customOtp authenticator
|
|
12
|
+
* authenticator. This does not apply to customOtp and customApp authenticators.
|
|
13
|
+
* There can be multiple customOtp authenticators. To create new customOtp
|
|
14
|
+
* authenticator, a new name and key = customOtp is required. If an old name is
|
|
15
|
+
* used, it will simply reactivate the old customOtp authenticator. For customApp
|
|
16
|
+
* authenticators, legacyIgnoreName must be set to false.
|
|
16
17
|
*
|
|
17
18
|
* > **Update:** customOtp authenticator cannot be updated
|
|
18
19
|
*
|
|
@@ -47,6 +48,25 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
47
48
|
* }),
|
|
48
49
|
* legacyIgnoreName: false,
|
|
49
50
|
* });
|
|
51
|
+
* const customApp = new okta.Authenticator("custom_app", {
|
|
52
|
+
* key: "custom_app",
|
|
53
|
+
* name: "Custom Push Auth",
|
|
54
|
+
* status: "ACTIVE",
|
|
55
|
+
* agreeToTerms: true,
|
|
56
|
+
* legacyIgnoreName: false,
|
|
57
|
+
* settings: JSON.stringify({
|
|
58
|
+
* userVerification: "REQUIRED",
|
|
59
|
+
* appInstanceId: "0oasontedmcepr0Uf1d7",
|
|
60
|
+
* }),
|
|
61
|
+
* providerJson: JSON.stringify({
|
|
62
|
+
* type: "PUSH",
|
|
63
|
+
* configuration: {
|
|
64
|
+
* fcm: {
|
|
65
|
+
* id: "ppcrb12345678ABCDEF",
|
|
66
|
+
* },
|
|
67
|
+
* },
|
|
68
|
+
* }),
|
|
69
|
+
* });
|
|
50
70
|
* ```
|
|
51
71
|
*
|
|
52
72
|
* ## Import
|
|
@@ -72,11 +92,15 @@ export declare class Authenticator extends pulumi.CustomResource {
|
|
|
72
92
|
*/
|
|
73
93
|
static isInstance(obj: any): obj is Authenticator;
|
|
74
94
|
/**
|
|
75
|
-
* A
|
|
95
|
+
* A value of true indicates that the administrator accepts the terms for creating a new authenticator. Okta requires that you accept the terms when creating a new customApp authenticator. Other authenticators don't require this field.
|
|
96
|
+
*/
|
|
97
|
+
readonly agreeToTerms: pulumi.Output<boolean | undefined>;
|
|
98
|
+
/**
|
|
99
|
+
* A human-readable string that identifies the authenticator. Some authenticators are available by feature flag on the organization. Possible values inclue: `customApp`, `customOtp`, `duo`, `externalIdp`, `googleOtp`, `oktaEmail`, `oktaPassword`, `oktaVerify`, `onpremMfa`, `phoneNumber`, `rsaToken`, `securityQuestion`, `webauthn`
|
|
76
100
|
*/
|
|
77
101
|
readonly key: pulumi.Output<string>;
|
|
78
102
|
/**
|
|
79
|
-
* Name does not trigger change detection (legacy behavior)
|
|
103
|
+
* Name does not trigger change detection (legacy behavior). Must be set to false for customApp authenticators.
|
|
80
104
|
*/
|
|
81
105
|
readonly legacyIgnoreName: pulumi.Output<boolean | undefined>;
|
|
82
106
|
/**
|
|
@@ -149,11 +173,15 @@ export declare class Authenticator extends pulumi.CustomResource {
|
|
|
149
173
|
*/
|
|
150
174
|
export interface AuthenticatorState {
|
|
151
175
|
/**
|
|
152
|
-
* A
|
|
176
|
+
* A value of true indicates that the administrator accepts the terms for creating a new authenticator. Okta requires that you accept the terms when creating a new customApp authenticator. Other authenticators don't require this field.
|
|
177
|
+
*/
|
|
178
|
+
agreeToTerms?: pulumi.Input<boolean>;
|
|
179
|
+
/**
|
|
180
|
+
* A human-readable string that identifies the authenticator. Some authenticators are available by feature flag on the organization. Possible values inclue: `customApp`, `customOtp`, `duo`, `externalIdp`, `googleOtp`, `oktaEmail`, `oktaPassword`, `oktaVerify`, `onpremMfa`, `phoneNumber`, `rsaToken`, `securityQuestion`, `webauthn`
|
|
153
181
|
*/
|
|
154
182
|
key?: pulumi.Input<string>;
|
|
155
183
|
/**
|
|
156
|
-
* Name does not trigger change detection (legacy behavior)
|
|
184
|
+
* Name does not trigger change detection (legacy behavior). Must be set to false for customApp authenticators.
|
|
157
185
|
*/
|
|
158
186
|
legacyIgnoreName?: pulumi.Input<boolean>;
|
|
159
187
|
/**
|
|
@@ -218,11 +246,15 @@ export interface AuthenticatorState {
|
|
|
218
246
|
*/
|
|
219
247
|
export interface AuthenticatorArgs {
|
|
220
248
|
/**
|
|
221
|
-
* A
|
|
249
|
+
* A value of true indicates that the administrator accepts the terms for creating a new authenticator. Okta requires that you accept the terms when creating a new customApp authenticator. Other authenticators don't require this field.
|
|
250
|
+
*/
|
|
251
|
+
agreeToTerms?: pulumi.Input<boolean>;
|
|
252
|
+
/**
|
|
253
|
+
* A human-readable string that identifies the authenticator. Some authenticators are available by feature flag on the organization. Possible values inclue: `customApp`, `customOtp`, `duo`, `externalIdp`, `googleOtp`, `oktaEmail`, `oktaPassword`, `oktaVerify`, `onpremMfa`, `phoneNumber`, `rsaToken`, `securityQuestion`, `webauthn`
|
|
222
254
|
*/
|
|
223
255
|
key: pulumi.Input<string>;
|
|
224
256
|
/**
|
|
225
|
-
* Name does not trigger change detection (legacy behavior)
|
|
257
|
+
* Name does not trigger change detection (legacy behavior). Must be set to false for customApp authenticators.
|
|
226
258
|
*/
|
|
227
259
|
legacyIgnoreName?: pulumi.Input<boolean>;
|
|
228
260
|
/**
|
package/authenticator.js
CHANGED
|
@@ -15,10 +15,11 @@ const utilities = require("./utilities");
|
|
|
15
15
|
* create the authenticator (hard create) will be performed. Thereafter, that
|
|
16
16
|
* authenticator is never deleted, it is only deactivated (soft delete). Therefore,
|
|
17
17
|
* if the authenticator already exists create is just a soft import of an existing
|
|
18
|
-
* authenticator. This does not apply to customOtp
|
|
19
|
-
* multiple customOtp
|
|
20
|
-
* name and key = customOtp is required. If an old name is
|
|
21
|
-
* reactivate the old customOtp authenticator
|
|
18
|
+
* authenticator. This does not apply to customOtp and customApp authenticators.
|
|
19
|
+
* There can be multiple customOtp authenticators. To create new customOtp
|
|
20
|
+
* authenticator, a new name and key = customOtp is required. If an old name is
|
|
21
|
+
* used, it will simply reactivate the old customOtp authenticator. For customApp
|
|
22
|
+
* authenticators, legacyIgnoreName must be set to false.
|
|
22
23
|
*
|
|
23
24
|
* > **Update:** customOtp authenticator cannot be updated
|
|
24
25
|
*
|
|
@@ -53,6 +54,25 @@ const utilities = require("./utilities");
|
|
|
53
54
|
* }),
|
|
54
55
|
* legacyIgnoreName: false,
|
|
55
56
|
* });
|
|
57
|
+
* const customApp = new okta.Authenticator("custom_app", {
|
|
58
|
+
* key: "custom_app",
|
|
59
|
+
* name: "Custom Push Auth",
|
|
60
|
+
* status: "ACTIVE",
|
|
61
|
+
* agreeToTerms: true,
|
|
62
|
+
* legacyIgnoreName: false,
|
|
63
|
+
* settings: JSON.stringify({
|
|
64
|
+
* userVerification: "REQUIRED",
|
|
65
|
+
* appInstanceId: "0oasontedmcepr0Uf1d7",
|
|
66
|
+
* }),
|
|
67
|
+
* providerJson: JSON.stringify({
|
|
68
|
+
* type: "PUSH",
|
|
69
|
+
* configuration: {
|
|
70
|
+
* fcm: {
|
|
71
|
+
* id: "ppcrb12345678ABCDEF",
|
|
72
|
+
* },
|
|
73
|
+
* },
|
|
74
|
+
* }),
|
|
75
|
+
* });
|
|
56
76
|
* ```
|
|
57
77
|
*
|
|
58
78
|
* ## Import
|
|
@@ -89,6 +109,7 @@ class Authenticator extends pulumi.CustomResource {
|
|
|
89
109
|
opts = opts || {};
|
|
90
110
|
if (opts.id) {
|
|
91
111
|
const state = argsOrState;
|
|
112
|
+
resourceInputs["agreeToTerms"] = state?.agreeToTerms;
|
|
92
113
|
resourceInputs["key"] = state?.key;
|
|
93
114
|
resourceInputs["legacyIgnoreName"] = state?.legacyIgnoreName;
|
|
94
115
|
resourceInputs["name"] = state?.name;
|
|
@@ -111,6 +132,7 @@ class Authenticator extends pulumi.CustomResource {
|
|
|
111
132
|
if (args?.key === undefined && !opts.urn) {
|
|
112
133
|
throw new Error("Missing required property 'key'");
|
|
113
134
|
}
|
|
135
|
+
resourceInputs["agreeToTerms"] = args?.agreeToTerms;
|
|
114
136
|
resourceInputs["key"] = args?.key;
|
|
115
137
|
resourceInputs["legacyIgnoreName"] = args?.legacyIgnoreName;
|
|
116
138
|
resourceInputs["name"] = args?.name;
|
package/authenticator.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"authenticator.js","sourceRoot":"","sources":["../authenticator.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"authenticator.js","sourceRoot":"","sources":["../authenticator.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2EG;AACH,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;IACpD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA0B,EAAE,IAAmC;QACxH,OAAO,IAAI,aAAa,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACpE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,aAAa,CAAC,YAAY,CAAC;IAC9D,CAAC;IA+ED,YAAY,IAAY,EAAE,WAAoD,EAAE,IAAmC;QAC/G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA6C,CAAC;YAC5D,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,EAAE,GAAG,CAAC;YACnC,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,EAAE,gBAAgB,CAAC;YAC7D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,EAAE,gBAAgB,CAAC;YAC7D,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,EAAE,gBAAgB,CAAC;YAC7D,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,EAAE,kBAAkB,CAAC;YACjE,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,EAAE,sBAAsB,CAAC;YACzE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,EAAE,iBAAiB,CAAC;YAC/D,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,EAAE,oBAAoB,CAAC;YACrE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,0BAA0B,CAAC,GAAG,KAAK,EAAE,wBAAwB,CAAC;YAC7E,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;YACzC,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;SACxC;aAAM;YACH,MAAM,IAAI,GAAG,WAA4C,CAAC;YAC1D,IAAI,IAAI,EAAE,GAAG,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACtC,MAAM,IAAI,KAAK,CAAC,iCAAiC,CAAC,CAAC;aACtD;YACD,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,EAAE,GAAG,CAAC;YAClC,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,EAAE,gBAAgB,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,EAAE,gBAAgB,CAAC;YAC5D,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,EAAE,gBAAgB,CAAC;YAC5D,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,EAAE,sBAAsB,CAAC;YACxE,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,EAAE,iBAAiB,CAAC;YAC9D,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,EAAE,oBAAoB,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAC3H,cAAc,CAAC,0BAA0B,CAAC,GAAG,IAAI,EAAE,wBAAwB,CAAC;YAC5E,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,oBAAoB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACzD,cAAc,CAAC,cAAc,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACnD,cAAc,CAAC,MAAM,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAC9C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,sBAAsB,CAAC,EAAE,CAAC;QACzE,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAClE,CAAC;;AA1JL,sCA2JC;AA7IG,gBAAgB;AACO,0BAAY,GAAG,wCAAwC,CAAC"}
|
|
@@ -4,6 +4,74 @@ import * as outputs from "./types/output";
|
|
|
4
4
|
/**
|
|
5
5
|
* Manage the customized signin page of a brand
|
|
6
6
|
*
|
|
7
|
+
* ## Example Usage
|
|
8
|
+
*
|
|
9
|
+
* ```typescript
|
|
10
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
11
|
+
* import * as okta from "@pulumi/okta";
|
|
12
|
+
*
|
|
13
|
+
* const test = new okta.Brand("test", {
|
|
14
|
+
* name: "testBrand",
|
|
15
|
+
* locale: "en",
|
|
16
|
+
* });
|
|
17
|
+
* const testCustomizedSigninPage = new okta.CustomizedSigninPage("test", {
|
|
18
|
+
* brandId: oktaBrand.test.id,
|
|
19
|
+
* pageContent: `<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
|
|
20
|
+
* <html>
|
|
21
|
+
* <head>
|
|
22
|
+
* <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
|
|
23
|
+
* <meta name="viewport" content="width=device-width, initial-scale=1.0" />
|
|
24
|
+
* <meta name="robots" content="noindex,nofollow" />
|
|
25
|
+
* <!-- Styles generated from theme -->
|
|
26
|
+
* <link href="{{themedStylesUrl}}" rel="stylesheet" type="text/css">
|
|
27
|
+
* <!-- Favicon from theme -->
|
|
28
|
+
* <link rel="shortcut icon" href="{{faviconUrl}}" type="image/x-icon"/>
|
|
29
|
+
*
|
|
30
|
+
* <title>{{pageTitle}}</title>
|
|
31
|
+
* {{{SignInWidgetResources}}}
|
|
32
|
+
*
|
|
33
|
+
* <style nonce="{{nonceValue}}">
|
|
34
|
+
* #login-bg-image-id {
|
|
35
|
+
* background-image: {{bgImageUrl}}
|
|
36
|
+
* }
|
|
37
|
+
* </style>
|
|
38
|
+
* </head>
|
|
39
|
+
* <body>
|
|
40
|
+
* <div id="login-bg-image-id" class="login-bg-image tb--background"></div>
|
|
41
|
+
* <div id="okta-login-container"></div>
|
|
42
|
+
*
|
|
43
|
+
* <!--
|
|
44
|
+
* "OktaUtil" defines a global OktaUtil object
|
|
45
|
+
* that contains methods used to complete the Okta login flow.
|
|
46
|
+
* -->
|
|
47
|
+
* {{{OktaUtil}}}
|
|
48
|
+
*
|
|
49
|
+
* <script type="text/javascript" nonce="{{nonceValue}}">
|
|
50
|
+
* // "config" object contains default widget configuration
|
|
51
|
+
* // with any custom overrides defined in your admin settings.
|
|
52
|
+
* var config = OktaUtil.getSignInWidgetConfig();
|
|
53
|
+
*
|
|
54
|
+
* // Render the Okta Sign-In Widget
|
|
55
|
+
* var oktaSignIn = new OktaSignIn(config);
|
|
56
|
+
* oktaSignIn.renderEl({ el: '#okta-login-container' },
|
|
57
|
+
* OktaUtil.completeLogin,
|
|
58
|
+
* function(error) {
|
|
59
|
+
* // Logs errors that occur when configuring the widget.
|
|
60
|
+
* // Remove or replace this with your own custom error handler.
|
|
61
|
+
* console.log(error.message, error);
|
|
62
|
+
* }
|
|
63
|
+
* );
|
|
64
|
+
* </script>
|
|
65
|
+
* </body>
|
|
66
|
+
* </html>
|
|
67
|
+
* `,
|
|
68
|
+
* widgetVersion: "^6",
|
|
69
|
+
* widgetCustomizations: {
|
|
70
|
+
* widgetGeneration: "G3",
|
|
71
|
+
* },
|
|
72
|
+
* });
|
|
73
|
+
* ```
|
|
74
|
+
*
|
|
7
75
|
* ## Import
|
|
8
76
|
*
|
|
9
77
|
* ```sh
|
package/customizedSigninPage.js
CHANGED
|
@@ -8,6 +8,74 @@ const utilities = require("./utilities");
|
|
|
8
8
|
/**
|
|
9
9
|
* Manage the customized signin page of a brand
|
|
10
10
|
*
|
|
11
|
+
* ## Example Usage
|
|
12
|
+
*
|
|
13
|
+
* ```typescript
|
|
14
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
15
|
+
* import * as okta from "@pulumi/okta";
|
|
16
|
+
*
|
|
17
|
+
* const test = new okta.Brand("test", {
|
|
18
|
+
* name: "testBrand",
|
|
19
|
+
* locale: "en",
|
|
20
|
+
* });
|
|
21
|
+
* const testCustomizedSigninPage = new okta.CustomizedSigninPage("test", {
|
|
22
|
+
* brandId: oktaBrand.test.id,
|
|
23
|
+
* pageContent: `<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
|
|
24
|
+
* <html>
|
|
25
|
+
* <head>
|
|
26
|
+
* <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
|
|
27
|
+
* <meta name="viewport" content="width=device-width, initial-scale=1.0" />
|
|
28
|
+
* <meta name="robots" content="noindex,nofollow" />
|
|
29
|
+
* <!-- Styles generated from theme -->
|
|
30
|
+
* <link href="{{themedStylesUrl}}" rel="stylesheet" type="text/css">
|
|
31
|
+
* <!-- Favicon from theme -->
|
|
32
|
+
* <link rel="shortcut icon" href="{{faviconUrl}}" type="image/x-icon"/>
|
|
33
|
+
*
|
|
34
|
+
* <title>{{pageTitle}}</title>
|
|
35
|
+
* {{{SignInWidgetResources}}}
|
|
36
|
+
*
|
|
37
|
+
* <style nonce="{{nonceValue}}">
|
|
38
|
+
* #login-bg-image-id {
|
|
39
|
+
* background-image: {{bgImageUrl}}
|
|
40
|
+
* }
|
|
41
|
+
* </style>
|
|
42
|
+
* </head>
|
|
43
|
+
* <body>
|
|
44
|
+
* <div id="login-bg-image-id" class="login-bg-image tb--background"></div>
|
|
45
|
+
* <div id="okta-login-container"></div>
|
|
46
|
+
*
|
|
47
|
+
* <!--
|
|
48
|
+
* "OktaUtil" defines a global OktaUtil object
|
|
49
|
+
* that contains methods used to complete the Okta login flow.
|
|
50
|
+
* -->
|
|
51
|
+
* {{{OktaUtil}}}
|
|
52
|
+
*
|
|
53
|
+
* <script type="text/javascript" nonce="{{nonceValue}}">
|
|
54
|
+
* // "config" object contains default widget configuration
|
|
55
|
+
* // with any custom overrides defined in your admin settings.
|
|
56
|
+
* var config = OktaUtil.getSignInWidgetConfig();
|
|
57
|
+
*
|
|
58
|
+
* // Render the Okta Sign-In Widget
|
|
59
|
+
* var oktaSignIn = new OktaSignIn(config);
|
|
60
|
+
* oktaSignIn.renderEl({ el: '#okta-login-container' },
|
|
61
|
+
* OktaUtil.completeLogin,
|
|
62
|
+
* function(error) {
|
|
63
|
+
* // Logs errors that occur when configuring the widget.
|
|
64
|
+
* // Remove or replace this with your own custom error handler.
|
|
65
|
+
* console.log(error.message, error);
|
|
66
|
+
* }
|
|
67
|
+
* );
|
|
68
|
+
* </script>
|
|
69
|
+
* </body>
|
|
70
|
+
* </html>
|
|
71
|
+
* `,
|
|
72
|
+
* widgetVersion: "^6",
|
|
73
|
+
* widgetCustomizations: {
|
|
74
|
+
* widgetGeneration: "G3",
|
|
75
|
+
* },
|
|
76
|
+
* });
|
|
77
|
+
* ```
|
|
78
|
+
*
|
|
11
79
|
* ## Import
|
|
12
80
|
*
|
|
13
81
|
* ```sh
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"customizedSigninPage.js","sourceRoot":"","sources":["../customizedSigninPage.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"customizedSigninPage.js","sourceRoot":"","sources":["../customizedSigninPage.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA4EG;AACH,MAAa,oBAAqB,SAAQ,MAAM,CAAC,cAAc;IAC3D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAiC,EAAE,IAAmC;QAC/H,OAAO,IAAI,oBAAoB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC3E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,oBAAoB,CAAC,YAAY,CAAC;IACrE,CAAC;IA8BD,YAAY,IAAY,EAAE,WAAkE,EAAE,IAAmC;QAC7H,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAoD,CAAC;YACnE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,8BAA8B,CAAC,GAAG,KAAK,EAAE,4BAA4B,CAAC;YACrF,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,EAAE,oBAAoB,CAAC;YACrE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,EAAE,aAAa,CAAC;SAC1D;aAAM;YACH,MAAM,IAAI,GAAG,WAAmD,CAAC;YACjE,IAAI,IAAI,EAAE,OAAO,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1C,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,IAAI,EAAE,WAAW,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC9C,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,IAAI,IAAI,EAAE,aAAa,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAChD,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;aAChE;YACD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,8BAA8B,CAAC,GAAG,IAAI,EAAE,4BAA4B,CAAC;YACpF,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,EAAE,oBAAoB,CAAC;YACpE,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,EAAE,aAAa,CAAC;SACzD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,oBAAoB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACzE,CAAC;;AArFL,oDAsFC;AAxEG,gBAAgB;AACO,iCAAY,GAAG,sDAAsD,CAAC"}
|