pulumi-alicloud 3.77.0a1746163013__py3-none-any.whl → 3.77.0a1746220593__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-alicloud might be problematic. Click here for more details.
- pulumi_alicloud/__init__.py +72 -0
- pulumi_alicloud/_inputs.py +13 -0
- pulumi_alicloud/adb/db_cluster_lake_version.py +94 -0
- pulumi_alicloud/alb/_inputs.py +6 -3
- pulumi_alicloud/alb/outputs.py +4 -2
- pulumi_alicloud/apig/environment.py +2 -2
- pulumi_alicloud/apig/http_api.py +2 -2
- pulumi_alicloud/arms/grafana_workspace.py +56 -14
- pulumi_alicloud/cloudfirewall/instance_member.py +4 -4
- pulumi_alicloud/cloudfirewall/vpc_cen_tr_firewall.py +2 -2
- pulumi_alicloud/cloudsso/_inputs.py +697 -7
- pulumi_alicloud/cloudsso/directory.py +345 -65
- pulumi_alicloud/cloudsso/outputs.py +557 -8
- pulumi_alicloud/config/outputs.py +8 -0
- pulumi_alicloud/cs/_inputs.py +18 -18
- pulumi_alicloud/cs/edge_kubernetes.py +136 -100
- pulumi_alicloud/cs/get_kubernetes_node_pools.py +21 -1
- pulumi_alicloud/cs/kubernetes.py +118 -39
- pulumi_alicloud/cs/managed_kubernetes.py +125 -46
- pulumi_alicloud/cs/outputs.py +14 -14
- pulumi_alicloud/cs/serverless_kubernetes.py +66 -73
- pulumi_alicloud/ddos/ddos_coo_instance.py +175 -25
- pulumi_alicloud/dns/ddos_coo_instance.py +175 -25
- pulumi_alicloud/dts/job_monitor_rule.py +2 -2
- pulumi_alicloud/dts/synchronization_job.py +2 -2
- pulumi_alicloud/ecs/get_instance_types.py +4 -4
- pulumi_alicloud/ecs/instance.py +28 -28
- pulumi_alicloud/ecs/outputs.py +2 -2
- pulumi_alicloud/ecs/security_group_rule.py +32 -4
- pulumi_alicloud/eflo/__init__.py +3 -0
- pulumi_alicloud/eflo/_inputs.py +623 -0
- pulumi_alicloud/eflo/experiment_plan.py +573 -0
- pulumi_alicloud/eflo/experiment_plan_template.py +464 -0
- pulumi_alicloud/eflo/outputs.py +476 -0
- pulumi_alicloud/eflo/resource.py +388 -0
- pulumi_alicloud/ens/disk.py +120 -69
- pulumi_alicloud/ens/eip.py +45 -41
- pulumi_alicloud/esa/__init__.py +2 -0
- pulumi_alicloud/esa/scheduled_preload_execution.py +479 -0
- pulumi_alicloud/esa/scheduled_preload_job.py +467 -0
- pulumi_alicloud/gwlb/listener.py +2 -2
- pulumi_alicloud/gwlb/load_balancer.py +2 -2
- pulumi_alicloud/gwlb/server_group.py +2 -2
- pulumi_alicloud/ims/__init__.py +2 -0
- pulumi_alicloud/ims/get_oidc_providers.py +216 -0
- pulumi_alicloud/ims/outputs.py +138 -0
- pulumi_alicloud/mongodb/__init__.py +2 -0
- pulumi_alicloud/mongodb/_inputs.py +154 -0
- pulumi_alicloud/mongodb/instance.py +7 -7
- pulumi_alicloud/mongodb/outputs.py +121 -0
- pulumi_alicloud/mongodb/public_network_address.py +275 -0
- pulumi_alicloud/mongodb/replica_set_role.py +533 -0
- pulumi_alicloud/nas/_inputs.py +252 -18
- pulumi_alicloud/nas/file_system.py +649 -264
- pulumi_alicloud/nas/outputs.py +198 -12
- pulumi_alicloud/nlb/server_group_server_attachment.py +4 -0
- pulumi_alicloud/pai/__init__.py +1 -0
- pulumi_alicloud/pai/flow_pipeline.py +491 -0
- pulumi_alicloud/pulumi-plugin.json +1 -1
- pulumi_alicloud/ram/__init__.py +1 -0
- pulumi_alicloud/ram/get_role_policy_attachments.py +272 -0
- pulumi_alicloud/ram/outputs.py +63 -0
- pulumi_alicloud/ram/security_preference.py +496 -110
- pulumi_alicloud/rdc/organization.py +2 -2
- pulumi_alicloud/rds/instance.py +1 -1
- pulumi_alicloud/sae/application_scaling_rule.py +2 -2
- pulumi_alicloud/sae/ingress.py +2 -2
- pulumi_alicloud/schedulerx/app_group.py +2 -2
- pulumi_alicloud/schedulerx/job.py +2 -2
- pulumi_alicloud/selectdb/db_cluster.py +2 -0
- pulumi_alicloud/selectdb/db_instance.py +43 -13
- pulumi_alicloud/selectdb/get_db_clusters.py +2 -0
- pulumi_alicloud/selectdb/get_db_instances.py +2 -0
- pulumi_alicloud/selectdb/outputs.py +3 -3
- pulumi_alicloud/sls/__init__.py +1 -0
- pulumi_alicloud/sls/_inputs.py +295 -0
- pulumi_alicloud/sls/etl.py +516 -0
- pulumi_alicloud/sls/outputs.py +209 -0
- pulumi_alicloud/vpc/network.py +156 -88
- {pulumi_alicloud-3.77.0a1746163013.dist-info → pulumi_alicloud-3.77.0a1746220593.dist-info}/METADATA +1 -1
- {pulumi_alicloud-3.77.0a1746163013.dist-info → pulumi_alicloud-3.77.0a1746220593.dist-info}/RECORD +83 -71
- {pulumi_alicloud-3.77.0a1746163013.dist-info → pulumi_alicloud-3.77.0a1746220593.dist-info}/WHEEL +0 -0
- {pulumi_alicloud-3.77.0a1746163013.dist-info → pulumi_alicloud-3.77.0a1746220593.dist-info}/top_level.txt +0 -0
|
@@ -18,7 +18,12 @@ from . import outputs
|
|
|
18
18
|
|
|
19
19
|
__all__ = [
|
|
20
20
|
'AccessConfigurationPermissionPolicy',
|
|
21
|
+
'DirectoryLoginPreference',
|
|
22
|
+
'DirectoryMfaAuthenticationSettingInfo',
|
|
23
|
+
'DirectoryPasswordPolicy',
|
|
21
24
|
'DirectorySamlIdentityProviderConfiguration',
|
|
25
|
+
'DirectorySamlServiceProvider',
|
|
26
|
+
'DirectoryUserProvisioningConfiguration',
|
|
22
27
|
'GetAccessAssignmentsAssignmentResult',
|
|
23
28
|
'GetAccessConfigurationsConfigurationResult',
|
|
24
29
|
'GetAccessConfigurationsConfigurationPermissionPolicyResult',
|
|
@@ -93,15 +98,319 @@ class AccessConfigurationPermissionPolicy(dict):
|
|
|
93
98
|
return pulumi.get(self, "permission_policy_document")
|
|
94
99
|
|
|
95
100
|
|
|
101
|
+
@pulumi.output_type
|
|
102
|
+
class DirectoryLoginPreference(dict):
|
|
103
|
+
@staticmethod
|
|
104
|
+
def __key_warning(key: str):
|
|
105
|
+
suggest = None
|
|
106
|
+
if key == "allowUserToGetCredentials":
|
|
107
|
+
suggest = "allow_user_to_get_credentials"
|
|
108
|
+
elif key == "loginNetworkMasks":
|
|
109
|
+
suggest = "login_network_masks"
|
|
110
|
+
|
|
111
|
+
if suggest:
|
|
112
|
+
pulumi.log.warn(f"Key '{key}' not found in DirectoryLoginPreference. Access the value via the '{suggest}' property getter instead.")
|
|
113
|
+
|
|
114
|
+
def __getitem__(self, key: str) -> Any:
|
|
115
|
+
DirectoryLoginPreference.__key_warning(key)
|
|
116
|
+
return super().__getitem__(key)
|
|
117
|
+
|
|
118
|
+
def get(self, key: str, default = None) -> Any:
|
|
119
|
+
DirectoryLoginPreference.__key_warning(key)
|
|
120
|
+
return super().get(key, default)
|
|
121
|
+
|
|
122
|
+
def __init__(__self__, *,
|
|
123
|
+
allow_user_to_get_credentials: Optional[builtins.bool] = None,
|
|
124
|
+
login_network_masks: Optional[builtins.str] = None):
|
|
125
|
+
"""
|
|
126
|
+
:param builtins.bool allow_user_to_get_credentials: Whether the user can obtain the program access credential in the portal after logging in.
|
|
127
|
+
:param builtins.str login_network_masks: IP address whitelist
|
|
128
|
+
"""
|
|
129
|
+
if allow_user_to_get_credentials is not None:
|
|
130
|
+
pulumi.set(__self__, "allow_user_to_get_credentials", allow_user_to_get_credentials)
|
|
131
|
+
if login_network_masks is not None:
|
|
132
|
+
pulumi.set(__self__, "login_network_masks", login_network_masks)
|
|
133
|
+
|
|
134
|
+
@property
|
|
135
|
+
@pulumi.getter(name="allowUserToGetCredentials")
|
|
136
|
+
def allow_user_to_get_credentials(self) -> Optional[builtins.bool]:
|
|
137
|
+
"""
|
|
138
|
+
Whether the user can obtain the program access credential in the portal after logging in.
|
|
139
|
+
"""
|
|
140
|
+
return pulumi.get(self, "allow_user_to_get_credentials")
|
|
141
|
+
|
|
142
|
+
@property
|
|
143
|
+
@pulumi.getter(name="loginNetworkMasks")
|
|
144
|
+
def login_network_masks(self) -> Optional[builtins.str]:
|
|
145
|
+
"""
|
|
146
|
+
IP address whitelist
|
|
147
|
+
"""
|
|
148
|
+
return pulumi.get(self, "login_network_masks")
|
|
149
|
+
|
|
150
|
+
|
|
151
|
+
@pulumi.output_type
|
|
152
|
+
class DirectoryMfaAuthenticationSettingInfo(dict):
|
|
153
|
+
@staticmethod
|
|
154
|
+
def __key_warning(key: str):
|
|
155
|
+
suggest = None
|
|
156
|
+
if key == "mfaAuthenticationAdvanceSettings":
|
|
157
|
+
suggest = "mfa_authentication_advance_settings"
|
|
158
|
+
elif key == "operationForRiskLogin":
|
|
159
|
+
suggest = "operation_for_risk_login"
|
|
160
|
+
|
|
161
|
+
if suggest:
|
|
162
|
+
pulumi.log.warn(f"Key '{key}' not found in DirectoryMfaAuthenticationSettingInfo. Access the value via the '{suggest}' property getter instead.")
|
|
163
|
+
|
|
164
|
+
def __getitem__(self, key: str) -> Any:
|
|
165
|
+
DirectoryMfaAuthenticationSettingInfo.__key_warning(key)
|
|
166
|
+
return super().__getitem__(key)
|
|
167
|
+
|
|
168
|
+
def get(self, key: str, default = None) -> Any:
|
|
169
|
+
DirectoryMfaAuthenticationSettingInfo.__key_warning(key)
|
|
170
|
+
return super().get(key, default)
|
|
171
|
+
|
|
172
|
+
def __init__(__self__, *,
|
|
173
|
+
mfa_authentication_advance_settings: Optional[builtins.str] = None,
|
|
174
|
+
operation_for_risk_login: Optional[builtins.str] = None):
|
|
175
|
+
"""
|
|
176
|
+
:param builtins.str mfa_authentication_advance_settings: Global MFA validation policy
|
|
177
|
+
:param builtins.str operation_for_risk_login: MFA verification policy for abnormal logon.
|
|
178
|
+
"""
|
|
179
|
+
if mfa_authentication_advance_settings is not None:
|
|
180
|
+
pulumi.set(__self__, "mfa_authentication_advance_settings", mfa_authentication_advance_settings)
|
|
181
|
+
if operation_for_risk_login is not None:
|
|
182
|
+
pulumi.set(__self__, "operation_for_risk_login", operation_for_risk_login)
|
|
183
|
+
|
|
184
|
+
@property
|
|
185
|
+
@pulumi.getter(name="mfaAuthenticationAdvanceSettings")
|
|
186
|
+
def mfa_authentication_advance_settings(self) -> Optional[builtins.str]:
|
|
187
|
+
"""
|
|
188
|
+
Global MFA validation policy
|
|
189
|
+
"""
|
|
190
|
+
return pulumi.get(self, "mfa_authentication_advance_settings")
|
|
191
|
+
|
|
192
|
+
@property
|
|
193
|
+
@pulumi.getter(name="operationForRiskLogin")
|
|
194
|
+
def operation_for_risk_login(self) -> Optional[builtins.str]:
|
|
195
|
+
"""
|
|
196
|
+
MFA verification policy for abnormal logon.
|
|
197
|
+
"""
|
|
198
|
+
return pulumi.get(self, "operation_for_risk_login")
|
|
199
|
+
|
|
200
|
+
|
|
201
|
+
@pulumi.output_type
|
|
202
|
+
class DirectoryPasswordPolicy(dict):
|
|
203
|
+
@staticmethod
|
|
204
|
+
def __key_warning(key: str):
|
|
205
|
+
suggest = None
|
|
206
|
+
if key == "hardExpire":
|
|
207
|
+
suggest = "hard_expire"
|
|
208
|
+
elif key == "maxLoginAttempts":
|
|
209
|
+
suggest = "max_login_attempts"
|
|
210
|
+
elif key == "maxPasswordAge":
|
|
211
|
+
suggest = "max_password_age"
|
|
212
|
+
elif key == "maxPasswordLength":
|
|
213
|
+
suggest = "max_password_length"
|
|
214
|
+
elif key == "minPasswordDifferentChars":
|
|
215
|
+
suggest = "min_password_different_chars"
|
|
216
|
+
elif key == "minPasswordLength":
|
|
217
|
+
suggest = "min_password_length"
|
|
218
|
+
elif key == "passwordNotContainUsername":
|
|
219
|
+
suggest = "password_not_contain_username"
|
|
220
|
+
elif key == "passwordReusePrevention":
|
|
221
|
+
suggest = "password_reuse_prevention"
|
|
222
|
+
elif key == "requireLowerCaseChars":
|
|
223
|
+
suggest = "require_lower_case_chars"
|
|
224
|
+
elif key == "requireNumbers":
|
|
225
|
+
suggest = "require_numbers"
|
|
226
|
+
elif key == "requireSymbols":
|
|
227
|
+
suggest = "require_symbols"
|
|
228
|
+
elif key == "requireUpperCaseChars":
|
|
229
|
+
suggest = "require_upper_case_chars"
|
|
230
|
+
|
|
231
|
+
if suggest:
|
|
232
|
+
pulumi.log.warn(f"Key '{key}' not found in DirectoryPasswordPolicy. Access the value via the '{suggest}' property getter instead.")
|
|
233
|
+
|
|
234
|
+
def __getitem__(self, key: str) -> Any:
|
|
235
|
+
DirectoryPasswordPolicy.__key_warning(key)
|
|
236
|
+
return super().__getitem__(key)
|
|
237
|
+
|
|
238
|
+
def get(self, key: str, default = None) -> Any:
|
|
239
|
+
DirectoryPasswordPolicy.__key_warning(key)
|
|
240
|
+
return super().get(key, default)
|
|
241
|
+
|
|
242
|
+
def __init__(__self__, *,
|
|
243
|
+
hard_expire: Optional[builtins.bool] = None,
|
|
244
|
+
max_login_attempts: Optional[builtins.int] = None,
|
|
245
|
+
max_password_age: Optional[builtins.int] = None,
|
|
246
|
+
max_password_length: Optional[builtins.int] = None,
|
|
247
|
+
min_password_different_chars: Optional[builtins.int] = None,
|
|
248
|
+
min_password_length: Optional[builtins.int] = None,
|
|
249
|
+
password_not_contain_username: Optional[builtins.bool] = None,
|
|
250
|
+
password_reuse_prevention: Optional[builtins.int] = None,
|
|
251
|
+
require_lower_case_chars: Optional[builtins.bool] = None,
|
|
252
|
+
require_numbers: Optional[builtins.bool] = None,
|
|
253
|
+
require_symbols: Optional[builtins.bool] = None,
|
|
254
|
+
require_upper_case_chars: Optional[builtins.bool] = None):
|
|
255
|
+
"""
|
|
256
|
+
:param builtins.bool hard_expire: Whether to restrict login after Password Expiration
|
|
257
|
+
:param builtins.int max_login_attempts: Number of password retries.
|
|
258
|
+
:param builtins.int max_password_age: Password validity period.
|
|
259
|
+
:param builtins.int max_password_length: Maximum password length.
|
|
260
|
+
:param builtins.int min_password_different_chars: The minimum number of different characters in a password.
|
|
261
|
+
:param builtins.int min_password_length: Minimum password length.
|
|
262
|
+
:param builtins.bool password_not_contain_username: Whether the user name is not allowed in the password.
|
|
263
|
+
:param builtins.int password_reuse_prevention: Historical password check policy.
|
|
264
|
+
:param builtins.bool require_lower_case_chars: Whether lowercase letters are required in the password.
|
|
265
|
+
:param builtins.bool require_numbers: Whether numbers are required in the password.
|
|
266
|
+
:param builtins.bool require_symbols: Whether symbols are required in the password.
|
|
267
|
+
:param builtins.bool require_upper_case_chars: Whether uppercase letters are required in the password.
|
|
268
|
+
"""
|
|
269
|
+
if hard_expire is not None:
|
|
270
|
+
pulumi.set(__self__, "hard_expire", hard_expire)
|
|
271
|
+
if max_login_attempts is not None:
|
|
272
|
+
pulumi.set(__self__, "max_login_attempts", max_login_attempts)
|
|
273
|
+
if max_password_age is not None:
|
|
274
|
+
pulumi.set(__self__, "max_password_age", max_password_age)
|
|
275
|
+
if max_password_length is not None:
|
|
276
|
+
pulumi.set(__self__, "max_password_length", max_password_length)
|
|
277
|
+
if min_password_different_chars is not None:
|
|
278
|
+
pulumi.set(__self__, "min_password_different_chars", min_password_different_chars)
|
|
279
|
+
if min_password_length is not None:
|
|
280
|
+
pulumi.set(__self__, "min_password_length", min_password_length)
|
|
281
|
+
if password_not_contain_username is not None:
|
|
282
|
+
pulumi.set(__self__, "password_not_contain_username", password_not_contain_username)
|
|
283
|
+
if password_reuse_prevention is not None:
|
|
284
|
+
pulumi.set(__self__, "password_reuse_prevention", password_reuse_prevention)
|
|
285
|
+
if require_lower_case_chars is not None:
|
|
286
|
+
pulumi.set(__self__, "require_lower_case_chars", require_lower_case_chars)
|
|
287
|
+
if require_numbers is not None:
|
|
288
|
+
pulumi.set(__self__, "require_numbers", require_numbers)
|
|
289
|
+
if require_symbols is not None:
|
|
290
|
+
pulumi.set(__self__, "require_symbols", require_symbols)
|
|
291
|
+
if require_upper_case_chars is not None:
|
|
292
|
+
pulumi.set(__self__, "require_upper_case_chars", require_upper_case_chars)
|
|
293
|
+
|
|
294
|
+
@property
|
|
295
|
+
@pulumi.getter(name="hardExpire")
|
|
296
|
+
def hard_expire(self) -> Optional[builtins.bool]:
|
|
297
|
+
"""
|
|
298
|
+
Whether to restrict login after Password Expiration
|
|
299
|
+
"""
|
|
300
|
+
return pulumi.get(self, "hard_expire")
|
|
301
|
+
|
|
302
|
+
@property
|
|
303
|
+
@pulumi.getter(name="maxLoginAttempts")
|
|
304
|
+
def max_login_attempts(self) -> Optional[builtins.int]:
|
|
305
|
+
"""
|
|
306
|
+
Number of password retries.
|
|
307
|
+
"""
|
|
308
|
+
return pulumi.get(self, "max_login_attempts")
|
|
309
|
+
|
|
310
|
+
@property
|
|
311
|
+
@pulumi.getter(name="maxPasswordAge")
|
|
312
|
+
def max_password_age(self) -> Optional[builtins.int]:
|
|
313
|
+
"""
|
|
314
|
+
Password validity period.
|
|
315
|
+
"""
|
|
316
|
+
return pulumi.get(self, "max_password_age")
|
|
317
|
+
|
|
318
|
+
@property
|
|
319
|
+
@pulumi.getter(name="maxPasswordLength")
|
|
320
|
+
def max_password_length(self) -> Optional[builtins.int]:
|
|
321
|
+
"""
|
|
322
|
+
Maximum password length.
|
|
323
|
+
"""
|
|
324
|
+
return pulumi.get(self, "max_password_length")
|
|
325
|
+
|
|
326
|
+
@property
|
|
327
|
+
@pulumi.getter(name="minPasswordDifferentChars")
|
|
328
|
+
def min_password_different_chars(self) -> Optional[builtins.int]:
|
|
329
|
+
"""
|
|
330
|
+
The minimum number of different characters in a password.
|
|
331
|
+
"""
|
|
332
|
+
return pulumi.get(self, "min_password_different_chars")
|
|
333
|
+
|
|
334
|
+
@property
|
|
335
|
+
@pulumi.getter(name="minPasswordLength")
|
|
336
|
+
def min_password_length(self) -> Optional[builtins.int]:
|
|
337
|
+
"""
|
|
338
|
+
Minimum password length.
|
|
339
|
+
"""
|
|
340
|
+
return pulumi.get(self, "min_password_length")
|
|
341
|
+
|
|
342
|
+
@property
|
|
343
|
+
@pulumi.getter(name="passwordNotContainUsername")
|
|
344
|
+
def password_not_contain_username(self) -> Optional[builtins.bool]:
|
|
345
|
+
"""
|
|
346
|
+
Whether the user name is not allowed in the password.
|
|
347
|
+
"""
|
|
348
|
+
return pulumi.get(self, "password_not_contain_username")
|
|
349
|
+
|
|
350
|
+
@property
|
|
351
|
+
@pulumi.getter(name="passwordReusePrevention")
|
|
352
|
+
def password_reuse_prevention(self) -> Optional[builtins.int]:
|
|
353
|
+
"""
|
|
354
|
+
Historical password check policy.
|
|
355
|
+
"""
|
|
356
|
+
return pulumi.get(self, "password_reuse_prevention")
|
|
357
|
+
|
|
358
|
+
@property
|
|
359
|
+
@pulumi.getter(name="requireLowerCaseChars")
|
|
360
|
+
def require_lower_case_chars(self) -> Optional[builtins.bool]:
|
|
361
|
+
"""
|
|
362
|
+
Whether lowercase letters are required in the password.
|
|
363
|
+
"""
|
|
364
|
+
return pulumi.get(self, "require_lower_case_chars")
|
|
365
|
+
|
|
366
|
+
@property
|
|
367
|
+
@pulumi.getter(name="requireNumbers")
|
|
368
|
+
def require_numbers(self) -> Optional[builtins.bool]:
|
|
369
|
+
"""
|
|
370
|
+
Whether numbers are required in the password.
|
|
371
|
+
"""
|
|
372
|
+
return pulumi.get(self, "require_numbers")
|
|
373
|
+
|
|
374
|
+
@property
|
|
375
|
+
@pulumi.getter(name="requireSymbols")
|
|
376
|
+
def require_symbols(self) -> Optional[builtins.bool]:
|
|
377
|
+
"""
|
|
378
|
+
Whether symbols are required in the password.
|
|
379
|
+
"""
|
|
380
|
+
return pulumi.get(self, "require_symbols")
|
|
381
|
+
|
|
382
|
+
@property
|
|
383
|
+
@pulumi.getter(name="requireUpperCaseChars")
|
|
384
|
+
def require_upper_case_chars(self) -> Optional[builtins.bool]:
|
|
385
|
+
"""
|
|
386
|
+
Whether uppercase letters are required in the password.
|
|
387
|
+
"""
|
|
388
|
+
return pulumi.get(self, "require_upper_case_chars")
|
|
389
|
+
|
|
390
|
+
|
|
96
391
|
@pulumi.output_type
|
|
97
392
|
class DirectorySamlIdentityProviderConfiguration(dict):
|
|
98
393
|
@staticmethod
|
|
99
394
|
def __key_warning(key: str):
|
|
100
395
|
suggest = None
|
|
101
|
-
if key == "
|
|
396
|
+
if key == "bindingType":
|
|
397
|
+
suggest = "binding_type"
|
|
398
|
+
elif key == "certificateIds":
|
|
399
|
+
suggest = "certificate_ids"
|
|
400
|
+
elif key == "createTime":
|
|
401
|
+
suggest = "create_time"
|
|
402
|
+
elif key == "encodedMetadataDocument":
|
|
102
403
|
suggest = "encoded_metadata_document"
|
|
404
|
+
elif key == "entityId":
|
|
405
|
+
suggest = "entity_id"
|
|
406
|
+
elif key == "loginUrl":
|
|
407
|
+
suggest = "login_url"
|
|
103
408
|
elif key == "ssoStatus":
|
|
104
409
|
suggest = "sso_status"
|
|
410
|
+
elif key == "updateTime":
|
|
411
|
+
suggest = "update_time"
|
|
412
|
+
elif key == "wantRequestSigned":
|
|
413
|
+
suggest = "want_request_signed"
|
|
105
414
|
|
|
106
415
|
if suggest:
|
|
107
416
|
pulumi.log.warn(f"Key '{key}' not found in DirectorySamlIdentityProviderConfiguration. Access the value via the '{suggest}' property getter instead.")
|
|
@@ -115,33 +424,273 @@ class DirectorySamlIdentityProviderConfiguration(dict):
|
|
|
115
424
|
return super().get(key, default)
|
|
116
425
|
|
|
117
426
|
def __init__(__self__, *,
|
|
427
|
+
binding_type: Optional[builtins.str] = None,
|
|
428
|
+
certificate_ids: Optional[Sequence[builtins.str]] = None,
|
|
429
|
+
create_time: Optional[builtins.str] = None,
|
|
118
430
|
encoded_metadata_document: Optional[builtins.str] = None,
|
|
119
|
-
|
|
120
|
-
|
|
121
|
-
|
|
122
|
-
|
|
123
|
-
|
|
431
|
+
entity_id: Optional[builtins.str] = None,
|
|
432
|
+
login_url: Optional[builtins.str] = None,
|
|
433
|
+
sso_status: Optional[builtins.str] = None,
|
|
434
|
+
update_time: Optional[builtins.str] = None,
|
|
435
|
+
want_request_signed: Optional[builtins.bool] = None):
|
|
436
|
+
"""
|
|
437
|
+
:param builtins.str binding_type: The Binding method for initiating a SAML request.
|
|
438
|
+
:param Sequence[builtins.str] certificate_ids: Certificate ID list
|
|
439
|
+
:param builtins.str create_time: CreateTime
|
|
440
|
+
:param builtins.str encoded_metadata_document: EncodedMetadataDocument
|
|
441
|
+
:param builtins.str entity_id: EntityId
|
|
442
|
+
:param builtins.str login_url: LoginUrl
|
|
443
|
+
:param builtins.str sso_status: SSOStatus
|
|
444
|
+
:param builtins.str update_time: UpdateTime
|
|
445
|
+
:param builtins.bool want_request_signed: SP Request whether the signature is required
|
|
446
|
+
"""
|
|
447
|
+
if binding_type is not None:
|
|
448
|
+
pulumi.set(__self__, "binding_type", binding_type)
|
|
449
|
+
if certificate_ids is not None:
|
|
450
|
+
pulumi.set(__self__, "certificate_ids", certificate_ids)
|
|
451
|
+
if create_time is not None:
|
|
452
|
+
pulumi.set(__self__, "create_time", create_time)
|
|
124
453
|
if encoded_metadata_document is not None:
|
|
125
454
|
pulumi.set(__self__, "encoded_metadata_document", encoded_metadata_document)
|
|
455
|
+
if entity_id is not None:
|
|
456
|
+
pulumi.set(__self__, "entity_id", entity_id)
|
|
457
|
+
if login_url is not None:
|
|
458
|
+
pulumi.set(__self__, "login_url", login_url)
|
|
126
459
|
if sso_status is not None:
|
|
127
460
|
pulumi.set(__self__, "sso_status", sso_status)
|
|
461
|
+
if update_time is not None:
|
|
462
|
+
pulumi.set(__self__, "update_time", update_time)
|
|
463
|
+
if want_request_signed is not None:
|
|
464
|
+
pulumi.set(__self__, "want_request_signed", want_request_signed)
|
|
465
|
+
|
|
466
|
+
@property
|
|
467
|
+
@pulumi.getter(name="bindingType")
|
|
468
|
+
def binding_type(self) -> Optional[builtins.str]:
|
|
469
|
+
"""
|
|
470
|
+
The Binding method for initiating a SAML request.
|
|
471
|
+
"""
|
|
472
|
+
return pulumi.get(self, "binding_type")
|
|
473
|
+
|
|
474
|
+
@property
|
|
475
|
+
@pulumi.getter(name="certificateIds")
|
|
476
|
+
def certificate_ids(self) -> Optional[Sequence[builtins.str]]:
|
|
477
|
+
"""
|
|
478
|
+
Certificate ID list
|
|
479
|
+
"""
|
|
480
|
+
return pulumi.get(self, "certificate_ids")
|
|
481
|
+
|
|
482
|
+
@property
|
|
483
|
+
@pulumi.getter(name="createTime")
|
|
484
|
+
def create_time(self) -> Optional[builtins.str]:
|
|
485
|
+
"""
|
|
486
|
+
CreateTime
|
|
487
|
+
"""
|
|
488
|
+
return pulumi.get(self, "create_time")
|
|
128
489
|
|
|
129
490
|
@property
|
|
130
491
|
@pulumi.getter(name="encodedMetadataDocument")
|
|
131
492
|
def encoded_metadata_document(self) -> Optional[builtins.str]:
|
|
132
493
|
"""
|
|
133
|
-
|
|
494
|
+
EncodedMetadataDocument
|
|
134
495
|
"""
|
|
135
496
|
return pulumi.get(self, "encoded_metadata_document")
|
|
136
497
|
|
|
498
|
+
@property
|
|
499
|
+
@pulumi.getter(name="entityId")
|
|
500
|
+
def entity_id(self) -> Optional[builtins.str]:
|
|
501
|
+
"""
|
|
502
|
+
EntityId
|
|
503
|
+
"""
|
|
504
|
+
return pulumi.get(self, "entity_id")
|
|
505
|
+
|
|
506
|
+
@property
|
|
507
|
+
@pulumi.getter(name="loginUrl")
|
|
508
|
+
def login_url(self) -> Optional[builtins.str]:
|
|
509
|
+
"""
|
|
510
|
+
LoginUrl
|
|
511
|
+
"""
|
|
512
|
+
return pulumi.get(self, "login_url")
|
|
513
|
+
|
|
137
514
|
@property
|
|
138
515
|
@pulumi.getter(name="ssoStatus")
|
|
139
516
|
def sso_status(self) -> Optional[builtins.str]:
|
|
140
517
|
"""
|
|
141
|
-
|
|
518
|
+
SSOStatus
|
|
142
519
|
"""
|
|
143
520
|
return pulumi.get(self, "sso_status")
|
|
144
521
|
|
|
522
|
+
@property
|
|
523
|
+
@pulumi.getter(name="updateTime")
|
|
524
|
+
def update_time(self) -> Optional[builtins.str]:
|
|
525
|
+
"""
|
|
526
|
+
UpdateTime
|
|
527
|
+
"""
|
|
528
|
+
return pulumi.get(self, "update_time")
|
|
529
|
+
|
|
530
|
+
@property
|
|
531
|
+
@pulumi.getter(name="wantRequestSigned")
|
|
532
|
+
def want_request_signed(self) -> Optional[builtins.bool]:
|
|
533
|
+
"""
|
|
534
|
+
SP Request whether the signature is required
|
|
535
|
+
"""
|
|
536
|
+
return pulumi.get(self, "want_request_signed")
|
|
537
|
+
|
|
538
|
+
|
|
539
|
+
@pulumi.output_type
|
|
540
|
+
class DirectorySamlServiceProvider(dict):
|
|
541
|
+
@staticmethod
|
|
542
|
+
def __key_warning(key: str):
|
|
543
|
+
suggest = None
|
|
544
|
+
if key == "acsUrl":
|
|
545
|
+
suggest = "acs_url"
|
|
546
|
+
elif key == "authnSignAlgo":
|
|
547
|
+
suggest = "authn_sign_algo"
|
|
548
|
+
elif key == "certificateType":
|
|
549
|
+
suggest = "certificate_type"
|
|
550
|
+
elif key == "encodedMetadataDocument":
|
|
551
|
+
suggest = "encoded_metadata_document"
|
|
552
|
+
elif key == "entityId":
|
|
553
|
+
suggest = "entity_id"
|
|
554
|
+
elif key == "supportEncryptedAssertion":
|
|
555
|
+
suggest = "support_encrypted_assertion"
|
|
556
|
+
|
|
557
|
+
if suggest:
|
|
558
|
+
pulumi.log.warn(f"Key '{key}' not found in DirectorySamlServiceProvider. Access the value via the '{suggest}' property getter instead.")
|
|
559
|
+
|
|
560
|
+
def __getitem__(self, key: str) -> Any:
|
|
561
|
+
DirectorySamlServiceProvider.__key_warning(key)
|
|
562
|
+
return super().__getitem__(key)
|
|
563
|
+
|
|
564
|
+
def get(self, key: str, default = None) -> Any:
|
|
565
|
+
DirectorySamlServiceProvider.__key_warning(key)
|
|
566
|
+
return super().get(key, default)
|
|
567
|
+
|
|
568
|
+
def __init__(__self__, *,
|
|
569
|
+
acs_url: Optional[builtins.str] = None,
|
|
570
|
+
authn_sign_algo: Optional[builtins.str] = None,
|
|
571
|
+
certificate_type: Optional[builtins.str] = None,
|
|
572
|
+
encoded_metadata_document: Optional[builtins.str] = None,
|
|
573
|
+
entity_id: Optional[builtins.str] = None,
|
|
574
|
+
support_encrypted_assertion: Optional[builtins.bool] = None):
|
|
575
|
+
"""
|
|
576
|
+
:param builtins.str acs_url: ACS URL of SP.
|
|
577
|
+
:param builtins.str authn_sign_algo: Signature algorithms supported by AuthNRequest
|
|
578
|
+
:param builtins.str certificate_type: Type of certificate used for signing in the SSO process
|
|
579
|
+
:param builtins.str encoded_metadata_document: SP metadata document (Base64 encoding).
|
|
580
|
+
:param builtins.str entity_id: SP identity.
|
|
581
|
+
:param builtins.bool support_encrypted_assertion: Whether IdP-side encryption of Assertion is supported.
|
|
582
|
+
"""
|
|
583
|
+
if acs_url is not None:
|
|
584
|
+
pulumi.set(__self__, "acs_url", acs_url)
|
|
585
|
+
if authn_sign_algo is not None:
|
|
586
|
+
pulumi.set(__self__, "authn_sign_algo", authn_sign_algo)
|
|
587
|
+
if certificate_type is not None:
|
|
588
|
+
pulumi.set(__self__, "certificate_type", certificate_type)
|
|
589
|
+
if encoded_metadata_document is not None:
|
|
590
|
+
pulumi.set(__self__, "encoded_metadata_document", encoded_metadata_document)
|
|
591
|
+
if entity_id is not None:
|
|
592
|
+
pulumi.set(__self__, "entity_id", entity_id)
|
|
593
|
+
if support_encrypted_assertion is not None:
|
|
594
|
+
pulumi.set(__self__, "support_encrypted_assertion", support_encrypted_assertion)
|
|
595
|
+
|
|
596
|
+
@property
|
|
597
|
+
@pulumi.getter(name="acsUrl")
|
|
598
|
+
def acs_url(self) -> Optional[builtins.str]:
|
|
599
|
+
"""
|
|
600
|
+
ACS URL of SP.
|
|
601
|
+
"""
|
|
602
|
+
return pulumi.get(self, "acs_url")
|
|
603
|
+
|
|
604
|
+
@property
|
|
605
|
+
@pulumi.getter(name="authnSignAlgo")
|
|
606
|
+
def authn_sign_algo(self) -> Optional[builtins.str]:
|
|
607
|
+
"""
|
|
608
|
+
Signature algorithms supported by AuthNRequest
|
|
609
|
+
"""
|
|
610
|
+
return pulumi.get(self, "authn_sign_algo")
|
|
611
|
+
|
|
612
|
+
@property
|
|
613
|
+
@pulumi.getter(name="certificateType")
|
|
614
|
+
def certificate_type(self) -> Optional[builtins.str]:
|
|
615
|
+
"""
|
|
616
|
+
Type of certificate used for signing in the SSO process
|
|
617
|
+
"""
|
|
618
|
+
return pulumi.get(self, "certificate_type")
|
|
619
|
+
|
|
620
|
+
@property
|
|
621
|
+
@pulumi.getter(name="encodedMetadataDocument")
|
|
622
|
+
def encoded_metadata_document(self) -> Optional[builtins.str]:
|
|
623
|
+
"""
|
|
624
|
+
SP metadata document (Base64 encoding).
|
|
625
|
+
"""
|
|
626
|
+
return pulumi.get(self, "encoded_metadata_document")
|
|
627
|
+
|
|
628
|
+
@property
|
|
629
|
+
@pulumi.getter(name="entityId")
|
|
630
|
+
def entity_id(self) -> Optional[builtins.str]:
|
|
631
|
+
"""
|
|
632
|
+
SP identity.
|
|
633
|
+
"""
|
|
634
|
+
return pulumi.get(self, "entity_id")
|
|
635
|
+
|
|
636
|
+
@property
|
|
637
|
+
@pulumi.getter(name="supportEncryptedAssertion")
|
|
638
|
+
def support_encrypted_assertion(self) -> Optional[builtins.bool]:
|
|
639
|
+
"""
|
|
640
|
+
Whether IdP-side encryption of Assertion is supported.
|
|
641
|
+
"""
|
|
642
|
+
return pulumi.get(self, "support_encrypted_assertion")
|
|
643
|
+
|
|
644
|
+
|
|
645
|
+
@pulumi.output_type
|
|
646
|
+
class DirectoryUserProvisioningConfiguration(dict):
|
|
647
|
+
@staticmethod
|
|
648
|
+
def __key_warning(key: str):
|
|
649
|
+
suggest = None
|
|
650
|
+
if key == "defaultLandingPage":
|
|
651
|
+
suggest = "default_landing_page"
|
|
652
|
+
elif key == "sessionDuration":
|
|
653
|
+
suggest = "session_duration"
|
|
654
|
+
|
|
655
|
+
if suggest:
|
|
656
|
+
pulumi.log.warn(f"Key '{key}' not found in DirectoryUserProvisioningConfiguration. Access the value via the '{suggest}' property getter instead.")
|
|
657
|
+
|
|
658
|
+
def __getitem__(self, key: str) -> Any:
|
|
659
|
+
DirectoryUserProvisioningConfiguration.__key_warning(key)
|
|
660
|
+
return super().__getitem__(key)
|
|
661
|
+
|
|
662
|
+
def get(self, key: str, default = None) -> Any:
|
|
663
|
+
DirectoryUserProvisioningConfiguration.__key_warning(key)
|
|
664
|
+
return super().get(key, default)
|
|
665
|
+
|
|
666
|
+
def __init__(__self__, *,
|
|
667
|
+
default_landing_page: Optional[builtins.str] = None,
|
|
668
|
+
session_duration: Optional[builtins.str] = None):
|
|
669
|
+
"""
|
|
670
|
+
:param builtins.str default_landing_page: The duration of the Session after the user logs in.
|
|
671
|
+
:param builtins.str session_duration: The duration of the Session after the user logs in.
|
|
672
|
+
"""
|
|
673
|
+
if default_landing_page is not None:
|
|
674
|
+
pulumi.set(__self__, "default_landing_page", default_landing_page)
|
|
675
|
+
if session_duration is not None:
|
|
676
|
+
pulumi.set(__self__, "session_duration", session_duration)
|
|
677
|
+
|
|
678
|
+
@property
|
|
679
|
+
@pulumi.getter(name="defaultLandingPage")
|
|
680
|
+
def default_landing_page(self) -> Optional[builtins.str]:
|
|
681
|
+
"""
|
|
682
|
+
The duration of the Session after the user logs in.
|
|
683
|
+
"""
|
|
684
|
+
return pulumi.get(self, "default_landing_page")
|
|
685
|
+
|
|
686
|
+
@property
|
|
687
|
+
@pulumi.getter(name="sessionDuration")
|
|
688
|
+
def session_duration(self) -> Optional[builtins.str]:
|
|
689
|
+
"""
|
|
690
|
+
The duration of the Session after the user logs in.
|
|
691
|
+
"""
|
|
692
|
+
return pulumi.get(self, "session_duration")
|
|
693
|
+
|
|
145
694
|
|
|
146
695
|
@pulumi.output_type
|
|
147
696
|
class GetAccessAssignmentsAssignmentResult(dict):
|
|
@@ -239,6 +239,7 @@ class Endpoints(dict):
|
|
|
239
239
|
eds_user: Optional[builtins.str] = None,
|
|
240
240
|
edsuser: Optional[builtins.str] = None,
|
|
241
241
|
eflo: Optional[builtins.str] = None,
|
|
242
|
+
eflo_cnp: Optional[builtins.str] = None,
|
|
242
243
|
eflo_controller: Optional[builtins.str] = None,
|
|
243
244
|
ehpc: Optional[builtins.str] = None,
|
|
244
245
|
ehs: Optional[builtins.str] = None,
|
|
@@ -621,6 +622,8 @@ class Endpoints(dict):
|
|
|
621
622
|
pulumi.set(__self__, "edsuser", edsuser)
|
|
622
623
|
if eflo is not None:
|
|
623
624
|
pulumi.set(__self__, "eflo", eflo)
|
|
625
|
+
if eflo_cnp is not None:
|
|
626
|
+
pulumi.set(__self__, "eflo_cnp", eflo_cnp)
|
|
624
627
|
if eflo_controller is not None:
|
|
625
628
|
pulumi.set(__self__, "eflo_controller", eflo_controller)
|
|
626
629
|
if ehpc is not None:
|
|
@@ -1354,6 +1357,11 @@ class Endpoints(dict):
|
|
|
1354
1357
|
"""
|
|
1355
1358
|
return pulumi.get(self, "eflo")
|
|
1356
1359
|
|
|
1360
|
+
@property
|
|
1361
|
+
@pulumi.getter(name="efloCnp")
|
|
1362
|
+
def eflo_cnp(self) -> Optional[builtins.str]:
|
|
1363
|
+
return pulumi.get(self, "eflo_cnp")
|
|
1364
|
+
|
|
1357
1365
|
@property
|
|
1358
1366
|
@pulumi.getter(name="efloController")
|
|
1359
1367
|
def eflo_controller(self) -> Optional[builtins.str]:
|