@pulumi/snowflake 0.56.0-alpha.1721327760 → 0.56.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (160) hide show
  1. package/apiAuthenticationIntegrationWithAuthorizationCodeGrant.d.ts +195 -0
  2. package/apiAuthenticationIntegrationWithAuthorizationCodeGrant.js +91 -0
  3. package/apiAuthenticationIntegrationWithAuthorizationCodeGrant.js.map +1 -0
  4. package/apiAuthenticationIntegrationWithClientCredentials.d.ts +183 -0
  5. package/apiAuthenticationIntegrationWithClientCredentials.js +89 -0
  6. package/apiAuthenticationIntegrationWithClientCredentials.js.map +1 -0
  7. package/apiAuthenticationIntegrationWithJwtBearer.d.ts +186 -0
  8. package/apiAuthenticationIntegrationWithJwtBearer.js +94 -0
  9. package/apiAuthenticationIntegrationWithJwtBearer.js.map +1 -0
  10. package/cortexSearchService.d.ts +159 -0
  11. package/cortexSearchService.js +92 -0
  12. package/cortexSearchService.js.map +1 -0
  13. package/database.d.ts +240 -77
  14. package/database.js +94 -45
  15. package/database.js.map +1 -1
  16. package/databaseOld.d.ts +187 -0
  17. package/databaseOld.js +110 -0
  18. package/databaseOld.js.map +1 -0
  19. package/externalOauthIntegration.d.ts +118 -116
  20. package/externalOauthIntegration.js +43 -55
  21. package/externalOauthIntegration.js.map +1 -1
  22. package/failoverGroup.d.ts +1 -1
  23. package/failoverGroup.js +1 -1
  24. package/getCortexSearchServices.d.ts +136 -0
  25. package/getCortexSearchServices.js +83 -0
  26. package/getCortexSearchServices.js.map +1 -0
  27. package/getDatabases.d.ts +41 -38
  28. package/getDatabases.js +8 -17
  29. package/getDatabases.js.map +1 -1
  30. package/getSecurityIntegrations.d.ts +61 -0
  31. package/getSecurityIntegrations.js +31 -0
  32. package/getSecurityIntegrations.js.map +1 -0
  33. package/getWarehouses.d.ts +53 -17
  34. package/getWarehouses.js +13 -18
  35. package/getWarehouses.js.map +1 -1
  36. package/grantPrivilegesToDatabaseRole.d.ts +0 -2
  37. package/grantPrivilegesToDatabaseRole.js +0 -2
  38. package/grantPrivilegesToDatabaseRole.js.map +1 -1
  39. package/index.d.ts +37 -82
  40. package/index.js +60 -139
  41. package/index.js.map +1 -1
  42. package/managedAccount.d.ts +3 -3
  43. package/oauthIntegration.d.ts +2 -0
  44. package/oauthIntegration.js +2 -0
  45. package/oauthIntegration.js.map +1 -1
  46. package/oauthIntegrationForCustomClients.d.ts +274 -0
  47. package/oauthIntegrationForCustomClients.js +148 -0
  48. package/oauthIntegrationForCustomClients.js.map +1 -0
  49. package/oauthIntegrationForPartnerApplications.d.ts +162 -0
  50. package/oauthIntegrationForPartnerApplications.js +84 -0
  51. package/oauthIntegrationForPartnerApplications.js.map +1 -0
  52. package/package.json +2 -2
  53. package/saml2Integration.d.ts +267 -0
  54. package/saml2Integration.js +106 -0
  55. package/saml2Integration.js.map +1 -0
  56. package/samlIntegration.d.ts +2 -0
  57. package/samlIntegration.js +2 -0
  58. package/samlIntegration.js.map +1 -1
  59. package/scimIntegration.d.ts +67 -33
  60. package/scimIntegration.js +19 -20
  61. package/scimIntegration.js.map +1 -1
  62. package/secondaryDatabase.d.ts +289 -0
  63. package/secondaryDatabase.js +103 -0
  64. package/secondaryDatabase.js.map +1 -0
  65. package/sequence.d.ts +3 -3
  66. package/sequence.js +3 -3
  67. package/sharedDatabase.d.ts +251 -0
  68. package/sharedDatabase.js +95 -0
  69. package/sharedDatabase.js.map +1 -0
  70. package/tagAssociation.d.ts +19 -19
  71. package/tagAssociation.js +19 -19
  72. package/types/input.d.ts +1015 -75
  73. package/types/output.d.ts +1835 -280
  74. package/userPasswordPolicyAttachment.d.ts +18 -0
  75. package/userPasswordPolicyAttachment.js +18 -0
  76. package/userPasswordPolicyAttachment.js.map +1 -1
  77. package/warehouse.d.ts +61 -48
  78. package/warehouse.js +8 -2
  79. package/warehouse.js.map +1 -1
  80. package/accountGrant.d.ts +0 -102
  81. package/accountGrant.js +0 -82
  82. package/accountGrant.js.map +0 -1
  83. package/databaseGrant.d.ts +0 -143
  84. package/databaseGrant.js +0 -96
  85. package/databaseGrant.js.map +0 -1
  86. package/externalTableGrant.d.ts +0 -194
  87. package/externalTableGrant.js +0 -110
  88. package/externalTableGrant.js.map +0 -1
  89. package/failoverGroupGrant.d.ts +0 -102
  90. package/failoverGroupGrant.js +0 -65
  91. package/failoverGroupGrant.js.map +0 -1
  92. package/fileFormatGrant.d.ts +0 -178
  93. package/fileFormatGrant.js +0 -104
  94. package/fileFormatGrant.js.map +0 -1
  95. package/functionGrant.d.ts +0 -210
  96. package/functionGrant.js +0 -116
  97. package/functionGrant.js.map +0 -1
  98. package/grantPrivilegesToRole.d.ts +0 -323
  99. package/grantPrivilegesToRole.js +0 -255
  100. package/grantPrivilegesToRole.js.map +0 -1
  101. package/integrationGrant.d.ts +0 -127
  102. package/integrationGrant.js +0 -90
  103. package/integrationGrant.js.map +0 -1
  104. package/maskingPolicyGrant.d.ts +0 -154
  105. package/maskingPolicyGrant.js +0 -103
  106. package/maskingPolicyGrant.js.map +0 -1
  107. package/materializedViewGrant.d.ts +0 -194
  108. package/materializedViewGrant.js +0 -107
  109. package/materializedViewGrant.js.map +0 -1
  110. package/pipeGrant.d.ts +0 -166
  111. package/pipeGrant.js +0 -99
  112. package/pipeGrant.js.map +0 -1
  113. package/procedureGrant.d.ts +0 -210
  114. package/procedureGrant.js +0 -116
  115. package/procedureGrant.js.map +0 -1
  116. package/resourceMonitorGrant.d.ts +0 -112
  117. package/resourceMonitorGrant.js +0 -85
  118. package/resourceMonitorGrant.js.map +0 -1
  119. package/roleGrants.d.ts +0 -115
  120. package/roleGrants.js +0 -98
  121. package/roleGrants.js.map +0 -1
  122. package/roleOwnershipGrant.d.ts +0 -108
  123. package/roleOwnershipGrant.js +0 -94
  124. package/roleOwnershipGrant.js.map +0 -1
  125. package/rowAccessPolicyGrant.d.ts +0 -153
  126. package/rowAccessPolicyGrant.js +0 -102
  127. package/rowAccessPolicyGrant.js.map +0 -1
  128. package/schemaGrant.d.ts +0 -172
  129. package/schemaGrant.js +0 -104
  130. package/schemaGrant.js.map +0 -1
  131. package/sequenceGrant.d.ts +0 -178
  132. package/sequenceGrant.js +0 -104
  133. package/sequenceGrant.js.map +0 -1
  134. package/stageGrant.d.ts +0 -178
  135. package/stageGrant.js +0 -104
  136. package/stageGrant.js.map +0 -1
  137. package/streamGrant.d.ts +0 -178
  138. package/streamGrant.js +0 -104
  139. package/streamGrant.js.map +0 -1
  140. package/tableGrant.d.ts +0 -188
  141. package/tableGrant.js +0 -101
  142. package/tableGrant.js.map +0 -1
  143. package/tagGrant.d.ts +0 -149
  144. package/tagGrant.js +0 -98
  145. package/tagGrant.js.map +0 -1
  146. package/taskGrant.d.ts +0 -178
  147. package/taskGrant.js +0 -104
  148. package/taskGrant.js.map +0 -1
  149. package/userGrant.d.ts +0 -115
  150. package/userGrant.js +0 -91
  151. package/userGrant.js.map +0 -1
  152. package/userOwnershipGrant.d.ts +0 -78
  153. package/userOwnershipGrant.js +0 -64
  154. package/userOwnershipGrant.js.map +0 -1
  155. package/viewGrant.d.ts +0 -205
  156. package/viewGrant.js +0 -118
  157. package/viewGrant.js.map +0 -1
  158. package/warehouseGrant.d.ts +0 -127
  159. package/warehouseGrant.js +0 -90
  160. package/warehouseGrant.js.map +0 -1
@@ -1,29 +1,15 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
+ import * as inputs from "./types/input";
3
+ import * as outputs from "./types/output";
2
4
  /**
3
- * An External OAuth security integration allows a client to use a third-party authorization server to obtain the access tokens needed to interact with Snowflake.
5
+ * !> **V1 release candidate** This resource was reworked and is a release candidate for the V1. We do not expect significant changes in it before the V1. We will welcome any feedback and adjust the resource if needed. Any errors reported will be resolved with a higher priority. We encourage checking this resource out before the V1 release. Please follow the migration guide to use it.
4
6
  *
5
- * ## Example Usage
6
- *
7
- * ```typescript
8
- * import * as pulumi from "@pulumi/pulumi";
9
- * import * as snowflake from "@pulumi/snowflake";
10
- *
11
- * const azure = new snowflake.ExternalOauthIntegration("azure", {
12
- * name: "AZURE_POWERBI",
13
- * type: "AZURE",
14
- * enabled: true,
15
- * issuer: "https://sts.windows.net/00000000-0000-0000-0000-000000000000",
16
- * snowflakeUserMappingAttribute: "LOGIN_NAME",
17
- * jwsKeysUrls: ["https://login.windows.net/common/discovery/keys"],
18
- * audienceUrls: ["https://analysis.windows.net/powerbi/connector/Snowflake"],
19
- * tokenUserMappingClaims: ["upn"],
20
- * });
21
- * ```
7
+ * Resource used to manage external oauth security integrations. For more information, check [documentation](https://docs.snowflake.com/en/sql-reference/sql/create-security-integration-oauth-external).
22
8
  *
23
9
  * ## Import
24
10
  *
25
11
  * ```sh
26
- * $ pulumi import snowflake:index/externalOauthIntegration:ExternalOauthIntegration example name
12
+ * $ pulumi import snowflake:index/externalOauthIntegration:ExternalOauthIntegration example "name"
27
13
  * ```
28
14
  */
29
15
  export declare class ExternalOauthIntegration extends pulumi.CustomResource {
@@ -43,73 +29,81 @@ export declare class ExternalOauthIntegration extends pulumi.CustomResource {
43
29
  */
44
30
  static isInstance(obj: any): obj is ExternalOauthIntegration;
45
31
  /**
46
- * Specifies the list of roles that the client can set as the primary role.
32
+ * Specifies a comment for the OAuth integration.
47
33
  */
48
- readonly allowedRoles: pulumi.Output<string[] | undefined>;
34
+ readonly comment: pulumi.Output<string | undefined>;
49
35
  /**
50
- * Specifies whether the OAuth client or user can use a role that is not defined in the OAuth access token.
36
+ * Outputs the result of `DESCRIBE SECURITY INTEGRATIONS` for the given security integration.
51
37
  */
52
- readonly anyRoleMode: pulumi.Output<string | undefined>;
38
+ readonly describeOutputs: pulumi.Output<outputs.ExternalOauthIntegrationDescribeOutput[]>;
53
39
  /**
54
- * Specifies additional values that can be used for the access token's audience validation on top of using the Customer's Snowflake Account URL
40
+ * Specifies whether to initiate operation of the integration or suspend it.
55
41
  */
56
- readonly audienceUrls: pulumi.Output<string[] | undefined>;
42
+ readonly enabled: pulumi.Output<boolean>;
57
43
  /**
58
- * Specifies the list of roles that a client cannot set as the primary role. Do not include ACCOUNTADMIN, ORGADMIN or SECURITYADMIN as they are already implicitly enforced and will cause in-place updates.
44
+ * Specifies the list of roles that the client can set as the primary role.
59
45
  */
60
- readonly blockedRoles: pulumi.Output<string[] | undefined>;
46
+ readonly externalOauthAllowedRolesLists: pulumi.Output<string[] | undefined>;
61
47
  /**
62
- * Specifies a comment for the OAuth integration.
48
+ * Specifies whether the OAuth client or user can use a role that is not defined in the OAuth access token. Valid values are (case-insensitive): `DISABLE` | `ENABLE` | `ENABLE_FOR_PRIVILEGE`.
63
49
  */
64
- readonly comment: pulumi.Output<string | undefined>;
50
+ readonly externalOauthAnyRoleMode: pulumi.Output<string | undefined>;
65
51
  /**
66
- * Date and time when the External OAUTH integration was created.
52
+ * Specifies additional values that can be used for the access token's audience validation on top of using the Customer's Snowflake Account URL
67
53
  */
68
- readonly createdOn: pulumi.Output<string>;
54
+ readonly externalOauthAudienceLists: pulumi.Output<string[] | undefined>;
69
55
  /**
70
- * Specifies whether to initiate operation of the integration or suspend it.
56
+ * Specifies the list of roles that a client cannot set as the primary role. By default, this list includes the ACCOUNTADMIN, ORGADMIN and SECURITYADMIN roles. To remove these privileged roles from the list, use the ALTER ACCOUNT command to set the EXTERNAL*OAUTH*ADD*PRIVILEGED*ROLES*TO*BLOCKED_LIST account parameter to FALSE.
71
57
  */
72
- readonly enabled: pulumi.Output<boolean>;
58
+ readonly externalOauthBlockedRolesLists: pulumi.Output<string[] | undefined>;
73
59
  /**
74
60
  * Specifies the URL to define the OAuth 2.0 authorization server.
75
61
  */
76
- readonly issuer: pulumi.Output<string>;
62
+ readonly externalOauthIssuer: pulumi.Output<string>;
77
63
  /**
78
- * Specifies the endpoint or a list of endpoints from which to download public keys or certificates to validate an External OAuth access token. The maximum number of URLs that can be specified in the list is 3.
64
+ * Specifies the endpoint or a list of endpoints from which to download public keys or certificates to validate an External OAuth access token. The maximum number of URLs that can be specified in the list is 3. If removed from the config, the resource is recreated.
79
65
  */
80
- readonly jwsKeysUrls: pulumi.Output<string[] | undefined>;
66
+ readonly externalOauthJwsKeysUrls: pulumi.Output<string[] | undefined>;
81
67
  /**
82
- * Specifies the name of the External Oath integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account.
68
+ * Specifies a Base64-encoded RSA public key, without the -----BEGIN PUBLIC KEY----- and -----END PUBLIC KEY----- headers. If removed from the config, the resource is recreated.
83
69
  */
84
- readonly name: pulumi.Output<string>;
70
+ readonly externalOauthRsaPublicKey: pulumi.Output<string | undefined>;
85
71
  /**
86
- * Specifies a Base64-encoded RSA public key, without the -----BEGIN PUBLIC KEY----- and -----END PUBLIC KEY----- headers.
72
+ * Specifies a second RSA public key, without the -----BEGIN PUBLIC KEY----- and -----END PUBLIC KEY----- headers. Used for key rotation. If removed from the config, the resource is recreated.
87
73
  */
88
- readonly rsaPublicKey: pulumi.Output<string | undefined>;
74
+ readonly externalOauthRsaPublicKey2: pulumi.Output<string | undefined>;
89
75
  /**
90
- * Specifies a second RSA public key, without the -----BEGIN PUBLIC KEY----- and -----END PUBLIC KEY----- headers. Used for key rotation.
76
+ * Specifies the scope delimiter in the authorization token.
91
77
  */
92
- readonly rsaPublicKey2: pulumi.Output<string | undefined>;
78
+ readonly externalOauthScopeDelimiter: pulumi.Output<string | undefined>;
93
79
  /**
94
- * Specifies the scope delimiter in the authorization token.
80
+ * Specifies the access token claim to map the access token to an account role. If removed from the config, the resource is recreated.
81
+ */
82
+ readonly externalOauthScopeMappingAttribute: pulumi.Output<string | undefined>;
83
+ /**
84
+ * Indicates which Snowflake user record attribute should be used to map the access token to a Snowflake user record. Valid values are (case-insensitive): `LOGIN_NAME` | `EMAIL_ADDRESS`.
95
85
  */
96
- readonly scopeDelimiter: pulumi.Output<string | undefined>;
86
+ readonly externalOauthSnowflakeUserMappingAttribute: pulumi.Output<string>;
97
87
  /**
98
- * Specifies the access token claim to map the access token to an account role.
88
+ * Specifies the access token claim or claims that can be used to map the access token to a Snowflake user record. If removed from the config, the resource is recreated.
99
89
  */
100
- readonly scopeMappingAttribute: pulumi.Output<string | undefined>;
90
+ readonly externalOauthTokenUserMappingClaims: pulumi.Output<string[]>;
101
91
  /**
102
- * Indicates which Snowflake user record attribute should be used to map the access token to a Snowflake user record.
92
+ * Specifies the OAuth 2.0 authorization server to be Okta, Microsoft Azure AD, Ping Identity PingFederate, or a Custom OAuth 2.0 authorization server. Valid values are (case-insensitive): `OKTA` | `AZURE` | `PING_FEDERATE` | `CUSTOM`.
103
93
  */
104
- readonly snowflakeUserMappingAttribute: pulumi.Output<string>;
94
+ readonly externalOauthType: pulumi.Output<string>;
95
+ /**
96
+ * Specifies the name of the External Oath integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account.
97
+ */
98
+ readonly name: pulumi.Output<string>;
105
99
  /**
106
- * Specifies the access token claim or claims that can be used to map the access token to a Snowflake user record.
100
+ * Paramteres related to this security integration.
107
101
  */
108
- readonly tokenUserMappingClaims: pulumi.Output<string[]>;
102
+ readonly relatedParameters: pulumi.Output<outputs.ExternalOauthIntegrationRelatedParameter[]>;
109
103
  /**
110
- * Specifies the OAuth 2.0 authorization server to be Okta, Microsoft Azure AD, Ping Identity PingFederate, or a Custom OAuth 2.0 authorization server.
104
+ * Outputs the result of `SHOW SECURITY INTEGRATIONS` for the given security integration.
111
105
  */
112
- readonly type: pulumi.Output<string>;
106
+ readonly showOutputs: pulumi.Output<outputs.ExternalOauthIntegrationShowOutput[]>;
113
107
  /**
114
108
  * Create a ExternalOauthIntegration resource with the given unique name, arguments, and options.
115
109
  *
@@ -124,140 +118,148 @@ export declare class ExternalOauthIntegration extends pulumi.CustomResource {
124
118
  */
125
119
  export interface ExternalOauthIntegrationState {
126
120
  /**
127
- * Specifies the list of roles that the client can set as the primary role.
121
+ * Specifies a comment for the OAuth integration.
128
122
  */
129
- allowedRoles?: pulumi.Input<pulumi.Input<string>[]>;
123
+ comment?: pulumi.Input<string>;
130
124
  /**
131
- * Specifies whether the OAuth client or user can use a role that is not defined in the OAuth access token.
125
+ * Outputs the result of `DESCRIBE SECURITY INTEGRATIONS` for the given security integration.
132
126
  */
133
- anyRoleMode?: pulumi.Input<string>;
127
+ describeOutputs?: pulumi.Input<pulumi.Input<inputs.ExternalOauthIntegrationDescribeOutput>[]>;
134
128
  /**
135
- * Specifies additional values that can be used for the access token's audience validation on top of using the Customer's Snowflake Account URL
129
+ * Specifies whether to initiate operation of the integration or suspend it.
136
130
  */
137
- audienceUrls?: pulumi.Input<pulumi.Input<string>[]>;
131
+ enabled?: pulumi.Input<boolean>;
138
132
  /**
139
- * Specifies the list of roles that a client cannot set as the primary role. Do not include ACCOUNTADMIN, ORGADMIN or SECURITYADMIN as they are already implicitly enforced and will cause in-place updates.
133
+ * Specifies the list of roles that the client can set as the primary role.
140
134
  */
141
- blockedRoles?: pulumi.Input<pulumi.Input<string>[]>;
135
+ externalOauthAllowedRolesLists?: pulumi.Input<pulumi.Input<string>[]>;
142
136
  /**
143
- * Specifies a comment for the OAuth integration.
137
+ * Specifies whether the OAuth client or user can use a role that is not defined in the OAuth access token. Valid values are (case-insensitive): `DISABLE` | `ENABLE` | `ENABLE_FOR_PRIVILEGE`.
144
138
  */
145
- comment?: pulumi.Input<string>;
139
+ externalOauthAnyRoleMode?: pulumi.Input<string>;
146
140
  /**
147
- * Date and time when the External OAUTH integration was created.
141
+ * Specifies additional values that can be used for the access token's audience validation on top of using the Customer's Snowflake Account URL
148
142
  */
149
- createdOn?: pulumi.Input<string>;
143
+ externalOauthAudienceLists?: pulumi.Input<pulumi.Input<string>[]>;
150
144
  /**
151
- * Specifies whether to initiate operation of the integration or suspend it.
145
+ * Specifies the list of roles that a client cannot set as the primary role. By default, this list includes the ACCOUNTADMIN, ORGADMIN and SECURITYADMIN roles. To remove these privileged roles from the list, use the ALTER ACCOUNT command to set the EXTERNAL*OAUTH*ADD*PRIVILEGED*ROLES*TO*BLOCKED_LIST account parameter to FALSE.
152
146
  */
153
- enabled?: pulumi.Input<boolean>;
147
+ externalOauthBlockedRolesLists?: pulumi.Input<pulumi.Input<string>[]>;
154
148
  /**
155
149
  * Specifies the URL to define the OAuth 2.0 authorization server.
156
150
  */
157
- issuer?: pulumi.Input<string>;
151
+ externalOauthIssuer?: pulumi.Input<string>;
158
152
  /**
159
- * Specifies the endpoint or a list of endpoints from which to download public keys or certificates to validate an External OAuth access token. The maximum number of URLs that can be specified in the list is 3.
153
+ * Specifies the endpoint or a list of endpoints from which to download public keys or certificates to validate an External OAuth access token. The maximum number of URLs that can be specified in the list is 3. If removed from the config, the resource is recreated.
160
154
  */
161
- jwsKeysUrls?: pulumi.Input<pulumi.Input<string>[]>;
155
+ externalOauthJwsKeysUrls?: pulumi.Input<pulumi.Input<string>[]>;
162
156
  /**
163
- * Specifies the name of the External Oath integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account.
157
+ * Specifies a Base64-encoded RSA public key, without the -----BEGIN PUBLIC KEY----- and -----END PUBLIC KEY----- headers. If removed from the config, the resource is recreated.
164
158
  */
165
- name?: pulumi.Input<string>;
159
+ externalOauthRsaPublicKey?: pulumi.Input<string>;
166
160
  /**
167
- * Specifies a Base64-encoded RSA public key, without the -----BEGIN PUBLIC KEY----- and -----END PUBLIC KEY----- headers.
161
+ * Specifies a second RSA public key, without the -----BEGIN PUBLIC KEY----- and -----END PUBLIC KEY----- headers. Used for key rotation. If removed from the config, the resource is recreated.
168
162
  */
169
- rsaPublicKey?: pulumi.Input<string>;
163
+ externalOauthRsaPublicKey2?: pulumi.Input<string>;
170
164
  /**
171
- * Specifies a second RSA public key, without the -----BEGIN PUBLIC KEY----- and -----END PUBLIC KEY----- headers. Used for key rotation.
165
+ * Specifies the scope delimiter in the authorization token.
172
166
  */
173
- rsaPublicKey2?: pulumi.Input<string>;
167
+ externalOauthScopeDelimiter?: pulumi.Input<string>;
174
168
  /**
175
- * Specifies the scope delimiter in the authorization token.
169
+ * Specifies the access token claim to map the access token to an account role. If removed from the config, the resource is recreated.
176
170
  */
177
- scopeDelimiter?: pulumi.Input<string>;
171
+ externalOauthScopeMappingAttribute?: pulumi.Input<string>;
178
172
  /**
179
- * Specifies the access token claim to map the access token to an account role.
173
+ * Indicates which Snowflake user record attribute should be used to map the access token to a Snowflake user record. Valid values are (case-insensitive): `LOGIN_NAME` | `EMAIL_ADDRESS`.
180
174
  */
181
- scopeMappingAttribute?: pulumi.Input<string>;
175
+ externalOauthSnowflakeUserMappingAttribute?: pulumi.Input<string>;
182
176
  /**
183
- * Indicates which Snowflake user record attribute should be used to map the access token to a Snowflake user record.
177
+ * Specifies the access token claim or claims that can be used to map the access token to a Snowflake user record. If removed from the config, the resource is recreated.
184
178
  */
185
- snowflakeUserMappingAttribute?: pulumi.Input<string>;
179
+ externalOauthTokenUserMappingClaims?: pulumi.Input<pulumi.Input<string>[]>;
186
180
  /**
187
- * Specifies the access token claim or claims that can be used to map the access token to a Snowflake user record.
181
+ * Specifies the OAuth 2.0 authorization server to be Okta, Microsoft Azure AD, Ping Identity PingFederate, or a Custom OAuth 2.0 authorization server. Valid values are (case-insensitive): `OKTA` | `AZURE` | `PING_FEDERATE` | `CUSTOM`.
188
182
  */
189
- tokenUserMappingClaims?: pulumi.Input<pulumi.Input<string>[]>;
183
+ externalOauthType?: pulumi.Input<string>;
190
184
  /**
191
- * Specifies the OAuth 2.0 authorization server to be Okta, Microsoft Azure AD, Ping Identity PingFederate, or a Custom OAuth 2.0 authorization server.
185
+ * Specifies the name of the External Oath integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account.
186
+ */
187
+ name?: pulumi.Input<string>;
188
+ /**
189
+ * Paramteres related to this security integration.
192
190
  */
193
- type?: pulumi.Input<string>;
191
+ relatedParameters?: pulumi.Input<pulumi.Input<inputs.ExternalOauthIntegrationRelatedParameter>[]>;
192
+ /**
193
+ * Outputs the result of `SHOW SECURITY INTEGRATIONS` for the given security integration.
194
+ */
195
+ showOutputs?: pulumi.Input<pulumi.Input<inputs.ExternalOauthIntegrationShowOutput>[]>;
194
196
  }
195
197
  /**
196
198
  * The set of arguments for constructing a ExternalOauthIntegration resource.
197
199
  */
198
200
  export interface ExternalOauthIntegrationArgs {
199
201
  /**
200
- * Specifies the list of roles that the client can set as the primary role.
202
+ * Specifies a comment for the OAuth integration.
201
203
  */
202
- allowedRoles?: pulumi.Input<pulumi.Input<string>[]>;
204
+ comment?: pulumi.Input<string>;
203
205
  /**
204
- * Specifies whether the OAuth client or user can use a role that is not defined in the OAuth access token.
206
+ * Specifies whether to initiate operation of the integration or suspend it.
205
207
  */
206
- anyRoleMode?: pulumi.Input<string>;
208
+ enabled: pulumi.Input<boolean>;
207
209
  /**
208
- * Specifies additional values that can be used for the access token's audience validation on top of using the Customer's Snowflake Account URL
210
+ * Specifies the list of roles that the client can set as the primary role.
209
211
  */
210
- audienceUrls?: pulumi.Input<pulumi.Input<string>[]>;
212
+ externalOauthAllowedRolesLists?: pulumi.Input<pulumi.Input<string>[]>;
211
213
  /**
212
- * Specifies the list of roles that a client cannot set as the primary role. Do not include ACCOUNTADMIN, ORGADMIN or SECURITYADMIN as they are already implicitly enforced and will cause in-place updates.
214
+ * Specifies whether the OAuth client or user can use a role that is not defined in the OAuth access token. Valid values are (case-insensitive): `DISABLE` | `ENABLE` | `ENABLE_FOR_PRIVILEGE`.
213
215
  */
214
- blockedRoles?: pulumi.Input<pulumi.Input<string>[]>;
216
+ externalOauthAnyRoleMode?: pulumi.Input<string>;
215
217
  /**
216
- * Specifies a comment for the OAuth integration.
218
+ * Specifies additional values that can be used for the access token's audience validation on top of using the Customer's Snowflake Account URL
217
219
  */
218
- comment?: pulumi.Input<string>;
220
+ externalOauthAudienceLists?: pulumi.Input<pulumi.Input<string>[]>;
219
221
  /**
220
- * Specifies whether to initiate operation of the integration or suspend it.
222
+ * Specifies the list of roles that a client cannot set as the primary role. By default, this list includes the ACCOUNTADMIN, ORGADMIN and SECURITYADMIN roles. To remove these privileged roles from the list, use the ALTER ACCOUNT command to set the EXTERNAL*OAUTH*ADD*PRIVILEGED*ROLES*TO*BLOCKED_LIST account parameter to FALSE.
221
223
  */
222
- enabled: pulumi.Input<boolean>;
224
+ externalOauthBlockedRolesLists?: pulumi.Input<pulumi.Input<string>[]>;
223
225
  /**
224
226
  * Specifies the URL to define the OAuth 2.0 authorization server.
225
227
  */
226
- issuer: pulumi.Input<string>;
228
+ externalOauthIssuer: pulumi.Input<string>;
227
229
  /**
228
- * Specifies the endpoint or a list of endpoints from which to download public keys or certificates to validate an External OAuth access token. The maximum number of URLs that can be specified in the list is 3.
230
+ * Specifies the endpoint or a list of endpoints from which to download public keys or certificates to validate an External OAuth access token. The maximum number of URLs that can be specified in the list is 3. If removed from the config, the resource is recreated.
229
231
  */
230
- jwsKeysUrls?: pulumi.Input<pulumi.Input<string>[]>;
232
+ externalOauthJwsKeysUrls?: pulumi.Input<pulumi.Input<string>[]>;
231
233
  /**
232
- * Specifies the name of the External Oath integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account.
234
+ * Specifies a Base64-encoded RSA public key, without the -----BEGIN PUBLIC KEY----- and -----END PUBLIC KEY----- headers. If removed from the config, the resource is recreated.
233
235
  */
234
- name?: pulumi.Input<string>;
236
+ externalOauthRsaPublicKey?: pulumi.Input<string>;
235
237
  /**
236
- * Specifies a Base64-encoded RSA public key, without the -----BEGIN PUBLIC KEY----- and -----END PUBLIC KEY----- headers.
238
+ * Specifies a second RSA public key, without the -----BEGIN PUBLIC KEY----- and -----END PUBLIC KEY----- headers. Used for key rotation. If removed from the config, the resource is recreated.
237
239
  */
238
- rsaPublicKey?: pulumi.Input<string>;
240
+ externalOauthRsaPublicKey2?: pulumi.Input<string>;
239
241
  /**
240
- * Specifies a second RSA public key, without the -----BEGIN PUBLIC KEY----- and -----END PUBLIC KEY----- headers. Used for key rotation.
242
+ * Specifies the scope delimiter in the authorization token.
241
243
  */
242
- rsaPublicKey2?: pulumi.Input<string>;
244
+ externalOauthScopeDelimiter?: pulumi.Input<string>;
243
245
  /**
244
- * Specifies the scope delimiter in the authorization token.
246
+ * Specifies the access token claim to map the access token to an account role. If removed from the config, the resource is recreated.
245
247
  */
246
- scopeDelimiter?: pulumi.Input<string>;
248
+ externalOauthScopeMappingAttribute?: pulumi.Input<string>;
247
249
  /**
248
- * Specifies the access token claim to map the access token to an account role.
250
+ * Indicates which Snowflake user record attribute should be used to map the access token to a Snowflake user record. Valid values are (case-insensitive): `LOGIN_NAME` | `EMAIL_ADDRESS`.
249
251
  */
250
- scopeMappingAttribute?: pulumi.Input<string>;
252
+ externalOauthSnowflakeUserMappingAttribute: pulumi.Input<string>;
251
253
  /**
252
- * Indicates which Snowflake user record attribute should be used to map the access token to a Snowflake user record.
254
+ * Specifies the access token claim or claims that can be used to map the access token to a Snowflake user record. If removed from the config, the resource is recreated.
253
255
  */
254
- snowflakeUserMappingAttribute: pulumi.Input<string>;
256
+ externalOauthTokenUserMappingClaims: pulumi.Input<pulumi.Input<string>[]>;
255
257
  /**
256
- * Specifies the access token claim or claims that can be used to map the access token to a Snowflake user record.
258
+ * Specifies the OAuth 2.0 authorization server to be Okta, Microsoft Azure AD, Ping Identity PingFederate, or a Custom OAuth 2.0 authorization server. Valid values are (case-insensitive): `OKTA` | `AZURE` | `PING_FEDERATE` | `CUSTOM`.
257
259
  */
258
- tokenUserMappingClaims: pulumi.Input<pulumi.Input<string>[]>;
260
+ externalOauthType: pulumi.Input<string>;
259
261
  /**
260
- * Specifies the OAuth 2.0 authorization server to be Okta, Microsoft Azure AD, Ping Identity PingFederate, or a Custom OAuth 2.0 authorization server.
262
+ * Specifies the name of the External Oath integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account.
261
263
  */
262
- type: pulumi.Input<string>;
264
+ name?: pulumi.Input<string>;
263
265
  }
@@ -6,30 +6,14 @@ exports.ExternalOauthIntegration = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("./utilities");
8
8
  /**
9
- * An External OAuth security integration allows a client to use a third-party authorization server to obtain the access tokens needed to interact with Snowflake.
9
+ * !> **V1 release candidate** This resource was reworked and is a release candidate for the V1. We do not expect significant changes in it before the V1. We will welcome any feedback and adjust the resource if needed. Any errors reported will be resolved with a higher priority. We encourage checking this resource out before the V1 release. Please follow the migration guide to use it.
10
10
  *
11
- * ## Example Usage
12
- *
13
- * ```typescript
14
- * import * as pulumi from "@pulumi/pulumi";
15
- * import * as snowflake from "@pulumi/snowflake";
16
- *
17
- * const azure = new snowflake.ExternalOauthIntegration("azure", {
18
- * name: "AZURE_POWERBI",
19
- * type: "AZURE",
20
- * enabled: true,
21
- * issuer: "https://sts.windows.net/00000000-0000-0000-0000-000000000000",
22
- * snowflakeUserMappingAttribute: "LOGIN_NAME",
23
- * jwsKeysUrls: ["https://login.windows.net/common/discovery/keys"],
24
- * audienceUrls: ["https://analysis.windows.net/powerbi/connector/Snowflake"],
25
- * tokenUserMappingClaims: ["upn"],
26
- * });
27
- * ```
11
+ * Resource used to manage external oauth security integrations. For more information, check [documentation](https://docs.snowflake.com/en/sql-reference/sql/create-security-integration-oauth-external).
28
12
  *
29
13
  * ## Import
30
14
  *
31
15
  * ```sh
32
- * $ pulumi import snowflake:index/externalOauthIntegration:ExternalOauthIntegration example name
16
+ * $ pulumi import snowflake:index/externalOauthIntegration:ExternalOauthIntegration example "name"
33
17
  * ```
34
18
  */
35
19
  class ExternalOauthIntegration extends pulumi.CustomResource {
@@ -60,58 +44,62 @@ class ExternalOauthIntegration extends pulumi.CustomResource {
60
44
  opts = opts || {};
61
45
  if (opts.id) {
62
46
  const state = argsOrState;
63
- resourceInputs["allowedRoles"] = state ? state.allowedRoles : undefined;
64
- resourceInputs["anyRoleMode"] = state ? state.anyRoleMode : undefined;
65
- resourceInputs["audienceUrls"] = state ? state.audienceUrls : undefined;
66
- resourceInputs["blockedRoles"] = state ? state.blockedRoles : undefined;
67
47
  resourceInputs["comment"] = state ? state.comment : undefined;
68
- resourceInputs["createdOn"] = state ? state.createdOn : undefined;
48
+ resourceInputs["describeOutputs"] = state ? state.describeOutputs : undefined;
69
49
  resourceInputs["enabled"] = state ? state.enabled : undefined;
70
- resourceInputs["issuer"] = state ? state.issuer : undefined;
71
- resourceInputs["jwsKeysUrls"] = state ? state.jwsKeysUrls : undefined;
50
+ resourceInputs["externalOauthAllowedRolesLists"] = state ? state.externalOauthAllowedRolesLists : undefined;
51
+ resourceInputs["externalOauthAnyRoleMode"] = state ? state.externalOauthAnyRoleMode : undefined;
52
+ resourceInputs["externalOauthAudienceLists"] = state ? state.externalOauthAudienceLists : undefined;
53
+ resourceInputs["externalOauthBlockedRolesLists"] = state ? state.externalOauthBlockedRolesLists : undefined;
54
+ resourceInputs["externalOauthIssuer"] = state ? state.externalOauthIssuer : undefined;
55
+ resourceInputs["externalOauthJwsKeysUrls"] = state ? state.externalOauthJwsKeysUrls : undefined;
56
+ resourceInputs["externalOauthRsaPublicKey"] = state ? state.externalOauthRsaPublicKey : undefined;
57
+ resourceInputs["externalOauthRsaPublicKey2"] = state ? state.externalOauthRsaPublicKey2 : undefined;
58
+ resourceInputs["externalOauthScopeDelimiter"] = state ? state.externalOauthScopeDelimiter : undefined;
59
+ resourceInputs["externalOauthScopeMappingAttribute"] = state ? state.externalOauthScopeMappingAttribute : undefined;
60
+ resourceInputs["externalOauthSnowflakeUserMappingAttribute"] = state ? state.externalOauthSnowflakeUserMappingAttribute : undefined;
61
+ resourceInputs["externalOauthTokenUserMappingClaims"] = state ? state.externalOauthTokenUserMappingClaims : undefined;
62
+ resourceInputs["externalOauthType"] = state ? state.externalOauthType : undefined;
72
63
  resourceInputs["name"] = state ? state.name : undefined;
73
- resourceInputs["rsaPublicKey"] = state ? state.rsaPublicKey : undefined;
74
- resourceInputs["rsaPublicKey2"] = state ? state.rsaPublicKey2 : undefined;
75
- resourceInputs["scopeDelimiter"] = state ? state.scopeDelimiter : undefined;
76
- resourceInputs["scopeMappingAttribute"] = state ? state.scopeMappingAttribute : undefined;
77
- resourceInputs["snowflakeUserMappingAttribute"] = state ? state.snowflakeUserMappingAttribute : undefined;
78
- resourceInputs["tokenUserMappingClaims"] = state ? state.tokenUserMappingClaims : undefined;
79
- resourceInputs["type"] = state ? state.type : undefined;
64
+ resourceInputs["relatedParameters"] = state ? state.relatedParameters : undefined;
65
+ resourceInputs["showOutputs"] = state ? state.showOutputs : undefined;
80
66
  }
81
67
  else {
82
68
  const args = argsOrState;
83
69
  if ((!args || args.enabled === undefined) && !opts.urn) {
84
70
  throw new Error("Missing required property 'enabled'");
85
71
  }
86
- if ((!args || args.issuer === undefined) && !opts.urn) {
87
- throw new Error("Missing required property 'issuer'");
72
+ if ((!args || args.externalOauthIssuer === undefined) && !opts.urn) {
73
+ throw new Error("Missing required property 'externalOauthIssuer'");
88
74
  }
89
- if ((!args || args.snowflakeUserMappingAttribute === undefined) && !opts.urn) {
90
- throw new Error("Missing required property 'snowflakeUserMappingAttribute'");
75
+ if ((!args || args.externalOauthSnowflakeUserMappingAttribute === undefined) && !opts.urn) {
76
+ throw new Error("Missing required property 'externalOauthSnowflakeUserMappingAttribute'");
91
77
  }
92
- if ((!args || args.tokenUserMappingClaims === undefined) && !opts.urn) {
93
- throw new Error("Missing required property 'tokenUserMappingClaims'");
78
+ if ((!args || args.externalOauthTokenUserMappingClaims === undefined) && !opts.urn) {
79
+ throw new Error("Missing required property 'externalOauthTokenUserMappingClaims'");
94
80
  }
95
- if ((!args || args.type === undefined) && !opts.urn) {
96
- throw new Error("Missing required property 'type'");
81
+ if ((!args || args.externalOauthType === undefined) && !opts.urn) {
82
+ throw new Error("Missing required property 'externalOauthType'");
97
83
  }
98
- resourceInputs["allowedRoles"] = args ? args.allowedRoles : undefined;
99
- resourceInputs["anyRoleMode"] = args ? args.anyRoleMode : undefined;
100
- resourceInputs["audienceUrls"] = args ? args.audienceUrls : undefined;
101
- resourceInputs["blockedRoles"] = args ? args.blockedRoles : undefined;
102
84
  resourceInputs["comment"] = args ? args.comment : undefined;
103
85
  resourceInputs["enabled"] = args ? args.enabled : undefined;
104
- resourceInputs["issuer"] = args ? args.issuer : undefined;
105
- resourceInputs["jwsKeysUrls"] = args ? args.jwsKeysUrls : undefined;
86
+ resourceInputs["externalOauthAllowedRolesLists"] = args ? args.externalOauthAllowedRolesLists : undefined;
87
+ resourceInputs["externalOauthAnyRoleMode"] = args ? args.externalOauthAnyRoleMode : undefined;
88
+ resourceInputs["externalOauthAudienceLists"] = args ? args.externalOauthAudienceLists : undefined;
89
+ resourceInputs["externalOauthBlockedRolesLists"] = args ? args.externalOauthBlockedRolesLists : undefined;
90
+ resourceInputs["externalOauthIssuer"] = args ? args.externalOauthIssuer : undefined;
91
+ resourceInputs["externalOauthJwsKeysUrls"] = args ? args.externalOauthJwsKeysUrls : undefined;
92
+ resourceInputs["externalOauthRsaPublicKey"] = args ? args.externalOauthRsaPublicKey : undefined;
93
+ resourceInputs["externalOauthRsaPublicKey2"] = args ? args.externalOauthRsaPublicKey2 : undefined;
94
+ resourceInputs["externalOauthScopeDelimiter"] = args ? args.externalOauthScopeDelimiter : undefined;
95
+ resourceInputs["externalOauthScopeMappingAttribute"] = args ? args.externalOauthScopeMappingAttribute : undefined;
96
+ resourceInputs["externalOauthSnowflakeUserMappingAttribute"] = args ? args.externalOauthSnowflakeUserMappingAttribute : undefined;
97
+ resourceInputs["externalOauthTokenUserMappingClaims"] = args ? args.externalOauthTokenUserMappingClaims : undefined;
98
+ resourceInputs["externalOauthType"] = args ? args.externalOauthType : undefined;
106
99
  resourceInputs["name"] = args ? args.name : undefined;
107
- resourceInputs["rsaPublicKey"] = args ? args.rsaPublicKey : undefined;
108
- resourceInputs["rsaPublicKey2"] = args ? args.rsaPublicKey2 : undefined;
109
- resourceInputs["scopeDelimiter"] = args ? args.scopeDelimiter : undefined;
110
- resourceInputs["scopeMappingAttribute"] = args ? args.scopeMappingAttribute : undefined;
111
- resourceInputs["snowflakeUserMappingAttribute"] = args ? args.snowflakeUserMappingAttribute : undefined;
112
- resourceInputs["tokenUserMappingClaims"] = args ? args.tokenUserMappingClaims : undefined;
113
- resourceInputs["type"] = args ? args.type : undefined;
114
- resourceInputs["createdOn"] = undefined /*out*/;
100
+ resourceInputs["describeOutputs"] = undefined /*out*/;
101
+ resourceInputs["relatedParameters"] = undefined /*out*/;
102
+ resourceInputs["showOutputs"] = undefined /*out*/;
115
103
  }
116
104
  opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
117
105
  super(ExternalOauthIntegration.__pulumiType, name, resourceInputs, opts);
@@ -1 +1 @@
1
- {"version":3,"file":"externalOauthIntegration.js","sourceRoot":"","sources":["../externalOauthIntegration.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;GA0BG;AACH,MAAa,wBAAyB,SAAQ,MAAM,CAAC,cAAc;IAC/D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAqC,EAAE,IAAmC;QACnI,OAAO,IAAI,wBAAwB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC/E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,wBAAwB,CAAC,YAAY,CAAC;IACzE,CAAC;IA+ED,YAAY,IAAY,EAAE,WAA0E,EAAE,IAAmC;QACrI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAwD,CAAC;YACvE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,qBAAqB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,+BAA+B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,6BAA6B,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1G,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3D;aAAM;YACH,MAAM,IAAI,GAAG,WAAuD,CAAC;YACrE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,6BAA6B,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1E,MAAM,IAAI,KAAK,CAAC,2DAA2D,CAAC,CAAC;aAChF;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,sBAAsB,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnE,MAAM,IAAI,KAAK,CAAC,oDAAoD,CAAC,CAAC;aACzE;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,qBAAqB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,cAAc,CAAC,+BAA+B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,6BAA6B,CAAC,CAAC,CAAC,SAAS,CAAC;YACxG,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACnD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,wBAAwB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC7E,CAAC;;AApKL,4DAqKC;AAvJG,gBAAgB;AACO,qCAAY,GAAG,mEAAmE,CAAC"}
1
+ {"version":3,"file":"externalOauthIntegration.js","sourceRoot":"","sources":["../externalOauthIntegration.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;GAUG;AACH,MAAa,wBAAyB,SAAQ,MAAM,CAAC,cAAc;IAC/D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAqC,EAAE,IAAmC;QACnI,OAAO,IAAI,wBAAwB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC/E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,wBAAwB,CAAC,YAAY,CAAC;IACzE,CAAC;IAuFD,YAAY,IAAY,EAAE,WAA0E,EAAE,IAAmC;QACrI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAwD,CAAC;YACvE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,gCAAgC,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,8BAA8B,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5G,cAAc,CAAC,0BAA0B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,4BAA4B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,0BAA0B,CAAC,CAAC,CAAC,SAAS,CAAC;YACpG,cAAc,CAAC,gCAAgC,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,8BAA8B,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5G,cAAc,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,0BAA0B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,2BAA2B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,yBAAyB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClG,cAAc,CAAC,4BAA4B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,0BAA0B,CAAC,CAAC,CAAC,SAAS,CAAC;YACpG,cAAc,CAAC,6BAA6B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,2BAA2B,CAAC,CAAC,CAAC,SAAS,CAAC;YACtG,cAAc,CAAC,oCAAoC,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kCAAkC,CAAC,CAAC,CAAC,SAAS,CAAC;YACpH,cAAc,CAAC,4CAA4C,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,0CAA0C,CAAC,CAAC,CAAC,SAAS,CAAC;YACpI,cAAc,CAAC,qCAAqC,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mCAAmC,CAAC,CAAC,CAAC,SAAS,CAAC;YACtH,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;SACzE;aAAM;YACH,MAAM,IAAI,GAAG,WAAuD,CAAC;YACrE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,mBAAmB,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAChE,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,CAAC;aACtE;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,0CAA0C,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACvF,MAAM,IAAI,KAAK,CAAC,wEAAwE,CAAC,CAAC;aAC7F;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,mCAAmC,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAChF,MAAM,IAAI,KAAK,CAAC,iEAAiE,CAAC,CAAC;aACtF;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,iBAAiB,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC9D,MAAM,IAAI,KAAK,CAAC,+CAA+C,CAAC,CAAC;aACpE;YACD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,gCAAgC,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,8BAA8B,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1G,cAAc,CAAC,0BAA0B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,4BAA4B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,0BAA0B,CAAC,CAAC,CAAC,SAAS,CAAC;YAClG,cAAc,CAAC,gCAAgC,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,8BAA8B,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1G,cAAc,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,0BAA0B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,2BAA2B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,yBAAyB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,4BAA4B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,0BAA0B,CAAC,CAAC,CAAC,SAAS,CAAC;YAClG,cAAc,CAAC,6BAA6B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,2BAA2B,CAAC,CAAC,CAAC,SAAS,CAAC;YACpG,cAAc,CAAC,oCAAoC,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kCAAkC,CAAC,CAAC,CAAC,SAAS,CAAC;YAClH,cAAc,CAAC,4CAA4C,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,0CAA0C,CAAC,CAAC,CAAC,SAAS,CAAC;YAClI,cAAc,CAAC,qCAAqC,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mCAAmC,CAAC,CAAC,CAAC,SAAS,CAAC;YACpH,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,iBAAiB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACtD,cAAc,CAAC,mBAAmB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACxD,cAAc,CAAC,aAAa,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACrD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,wBAAwB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC7E,CAAC;;AAhLL,4DAiLC;AAnKG,gBAAgB;AACO,qCAAY,GAAG,mEAAmE,CAAC"}
@@ -35,7 +35,7 @@ import * as outputs from "./types/output";
35
35
  * fromReplica: {
36
36
  * organizationName: "...",
37
37
  * sourceAccountName: "...",
38
- * name: fg.name,
38
+ * name: sourceFailoverGroup.name,
39
39
  * },
40
40
  * });
41
41
  * ```
package/failoverGroup.js CHANGED
@@ -39,7 +39,7 @@ const utilities = require("./utilities");
39
39
  * fromReplica: {
40
40
  * organizationName: "...",
41
41
  * sourceAccountName: "...",
42
- * name: fg.name,
42
+ * name: sourceFailoverGroup.name,
43
43
  * },
44
44
  * });
45
45
  * ```