pulumi-alicloud 3.77.0a1746163013__py3-none-any.whl → 3.78.0a1746422202__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of pulumi-alicloud might be problematic. Click here for more details.

Files changed (83) hide show
  1. pulumi_alicloud/__init__.py +72 -0
  2. pulumi_alicloud/_inputs.py +13 -0
  3. pulumi_alicloud/adb/db_cluster_lake_version.py +94 -0
  4. pulumi_alicloud/alb/_inputs.py +6 -3
  5. pulumi_alicloud/alb/outputs.py +4 -2
  6. pulumi_alicloud/apig/environment.py +2 -2
  7. pulumi_alicloud/apig/http_api.py +2 -2
  8. pulumi_alicloud/arms/grafana_workspace.py +56 -14
  9. pulumi_alicloud/cloudfirewall/instance_member.py +4 -4
  10. pulumi_alicloud/cloudfirewall/vpc_cen_tr_firewall.py +2 -2
  11. pulumi_alicloud/cloudsso/_inputs.py +697 -7
  12. pulumi_alicloud/cloudsso/directory.py +345 -65
  13. pulumi_alicloud/cloudsso/outputs.py +557 -8
  14. pulumi_alicloud/config/outputs.py +8 -0
  15. pulumi_alicloud/cs/_inputs.py +18 -18
  16. pulumi_alicloud/cs/edge_kubernetes.py +136 -100
  17. pulumi_alicloud/cs/get_kubernetes_node_pools.py +21 -1
  18. pulumi_alicloud/cs/kubernetes.py +118 -39
  19. pulumi_alicloud/cs/managed_kubernetes.py +125 -46
  20. pulumi_alicloud/cs/outputs.py +14 -14
  21. pulumi_alicloud/cs/serverless_kubernetes.py +66 -73
  22. pulumi_alicloud/ddos/ddos_coo_instance.py +175 -25
  23. pulumi_alicloud/dns/ddos_coo_instance.py +175 -25
  24. pulumi_alicloud/dts/job_monitor_rule.py +2 -2
  25. pulumi_alicloud/dts/synchronization_job.py +2 -2
  26. pulumi_alicloud/ecs/get_instance_types.py +4 -4
  27. pulumi_alicloud/ecs/instance.py +28 -28
  28. pulumi_alicloud/ecs/outputs.py +2 -2
  29. pulumi_alicloud/ecs/security_group_rule.py +32 -4
  30. pulumi_alicloud/eflo/__init__.py +3 -0
  31. pulumi_alicloud/eflo/_inputs.py +623 -0
  32. pulumi_alicloud/eflo/experiment_plan.py +573 -0
  33. pulumi_alicloud/eflo/experiment_plan_template.py +464 -0
  34. pulumi_alicloud/eflo/outputs.py +476 -0
  35. pulumi_alicloud/eflo/resource.py +388 -0
  36. pulumi_alicloud/ens/disk.py +120 -69
  37. pulumi_alicloud/ens/eip.py +45 -41
  38. pulumi_alicloud/esa/__init__.py +2 -0
  39. pulumi_alicloud/esa/scheduled_preload_execution.py +479 -0
  40. pulumi_alicloud/esa/scheduled_preload_job.py +467 -0
  41. pulumi_alicloud/gwlb/listener.py +2 -2
  42. pulumi_alicloud/gwlb/load_balancer.py +2 -2
  43. pulumi_alicloud/gwlb/server_group.py +2 -2
  44. pulumi_alicloud/ims/__init__.py +2 -0
  45. pulumi_alicloud/ims/get_oidc_providers.py +216 -0
  46. pulumi_alicloud/ims/outputs.py +138 -0
  47. pulumi_alicloud/mongodb/__init__.py +2 -0
  48. pulumi_alicloud/mongodb/_inputs.py +154 -0
  49. pulumi_alicloud/mongodb/instance.py +7 -7
  50. pulumi_alicloud/mongodb/outputs.py +121 -0
  51. pulumi_alicloud/mongodb/public_network_address.py +275 -0
  52. pulumi_alicloud/mongodb/replica_set_role.py +533 -0
  53. pulumi_alicloud/nas/_inputs.py +252 -18
  54. pulumi_alicloud/nas/file_system.py +649 -264
  55. pulumi_alicloud/nas/outputs.py +198 -12
  56. pulumi_alicloud/nlb/server_group_server_attachment.py +4 -0
  57. pulumi_alicloud/pai/__init__.py +1 -0
  58. pulumi_alicloud/pai/flow_pipeline.py +491 -0
  59. pulumi_alicloud/pulumi-plugin.json +1 -1
  60. pulumi_alicloud/ram/__init__.py +1 -0
  61. pulumi_alicloud/ram/get_role_policy_attachments.py +272 -0
  62. pulumi_alicloud/ram/outputs.py +63 -0
  63. pulumi_alicloud/ram/security_preference.py +496 -110
  64. pulumi_alicloud/rdc/organization.py +2 -2
  65. pulumi_alicloud/rds/instance.py +1 -1
  66. pulumi_alicloud/sae/application_scaling_rule.py +2 -2
  67. pulumi_alicloud/sae/ingress.py +2 -2
  68. pulumi_alicloud/schedulerx/app_group.py +2 -2
  69. pulumi_alicloud/schedulerx/job.py +2 -2
  70. pulumi_alicloud/selectdb/db_cluster.py +2 -0
  71. pulumi_alicloud/selectdb/db_instance.py +43 -13
  72. pulumi_alicloud/selectdb/get_db_clusters.py +2 -0
  73. pulumi_alicloud/selectdb/get_db_instances.py +2 -0
  74. pulumi_alicloud/selectdb/outputs.py +3 -3
  75. pulumi_alicloud/sls/__init__.py +1 -0
  76. pulumi_alicloud/sls/_inputs.py +295 -0
  77. pulumi_alicloud/sls/etl.py +516 -0
  78. pulumi_alicloud/sls/outputs.py +209 -0
  79. pulumi_alicloud/vpc/network.py +156 -88
  80. {pulumi_alicloud-3.77.0a1746163013.dist-info → pulumi_alicloud-3.78.0a1746422202.dist-info}/METADATA +1 -1
  81. {pulumi_alicloud-3.77.0a1746163013.dist-info → pulumi_alicloud-3.78.0a1746422202.dist-info}/RECORD +83 -71
  82. {pulumi_alicloud-3.77.0a1746163013.dist-info → pulumi_alicloud-3.78.0a1746422202.dist-info}/WHEEL +1 -1
  83. {pulumi_alicloud-3.77.0a1746163013.dist-info → pulumi_alicloud-3.78.0a1746422202.dist-info}/top_level.txt +0 -0
@@ -18,7 +18,12 @@ from . import outputs
18
18
 
19
19
  __all__ = [
20
20
  'AccessConfigurationPermissionPolicy',
21
+ 'DirectoryLoginPreference',
22
+ 'DirectoryMfaAuthenticationSettingInfo',
23
+ 'DirectoryPasswordPolicy',
21
24
  'DirectorySamlIdentityProviderConfiguration',
25
+ 'DirectorySamlServiceProvider',
26
+ 'DirectoryUserProvisioningConfiguration',
22
27
  'GetAccessAssignmentsAssignmentResult',
23
28
  'GetAccessConfigurationsConfigurationResult',
24
29
  'GetAccessConfigurationsConfigurationPermissionPolicyResult',
@@ -93,15 +98,319 @@ class AccessConfigurationPermissionPolicy(dict):
93
98
  return pulumi.get(self, "permission_policy_document")
94
99
 
95
100
 
101
+ @pulumi.output_type
102
+ class DirectoryLoginPreference(dict):
103
+ @staticmethod
104
+ def __key_warning(key: str):
105
+ suggest = None
106
+ if key == "allowUserToGetCredentials":
107
+ suggest = "allow_user_to_get_credentials"
108
+ elif key == "loginNetworkMasks":
109
+ suggest = "login_network_masks"
110
+
111
+ if suggest:
112
+ pulumi.log.warn(f"Key '{key}' not found in DirectoryLoginPreference. Access the value via the '{suggest}' property getter instead.")
113
+
114
+ def __getitem__(self, key: str) -> Any:
115
+ DirectoryLoginPreference.__key_warning(key)
116
+ return super().__getitem__(key)
117
+
118
+ def get(self, key: str, default = None) -> Any:
119
+ DirectoryLoginPreference.__key_warning(key)
120
+ return super().get(key, default)
121
+
122
+ def __init__(__self__, *,
123
+ allow_user_to_get_credentials: Optional[builtins.bool] = None,
124
+ login_network_masks: Optional[builtins.str] = None):
125
+ """
126
+ :param builtins.bool allow_user_to_get_credentials: Whether the user can obtain the program access credential in the portal after logging in.
127
+ :param builtins.str login_network_masks: IP address whitelist
128
+ """
129
+ if allow_user_to_get_credentials is not None:
130
+ pulumi.set(__self__, "allow_user_to_get_credentials", allow_user_to_get_credentials)
131
+ if login_network_masks is not None:
132
+ pulumi.set(__self__, "login_network_masks", login_network_masks)
133
+
134
+ @property
135
+ @pulumi.getter(name="allowUserToGetCredentials")
136
+ def allow_user_to_get_credentials(self) -> Optional[builtins.bool]:
137
+ """
138
+ Whether the user can obtain the program access credential in the portal after logging in.
139
+ """
140
+ return pulumi.get(self, "allow_user_to_get_credentials")
141
+
142
+ @property
143
+ @pulumi.getter(name="loginNetworkMasks")
144
+ def login_network_masks(self) -> Optional[builtins.str]:
145
+ """
146
+ IP address whitelist
147
+ """
148
+ return pulumi.get(self, "login_network_masks")
149
+
150
+
151
+ @pulumi.output_type
152
+ class DirectoryMfaAuthenticationSettingInfo(dict):
153
+ @staticmethod
154
+ def __key_warning(key: str):
155
+ suggest = None
156
+ if key == "mfaAuthenticationAdvanceSettings":
157
+ suggest = "mfa_authentication_advance_settings"
158
+ elif key == "operationForRiskLogin":
159
+ suggest = "operation_for_risk_login"
160
+
161
+ if suggest:
162
+ pulumi.log.warn(f"Key '{key}' not found in DirectoryMfaAuthenticationSettingInfo. Access the value via the '{suggest}' property getter instead.")
163
+
164
+ def __getitem__(self, key: str) -> Any:
165
+ DirectoryMfaAuthenticationSettingInfo.__key_warning(key)
166
+ return super().__getitem__(key)
167
+
168
+ def get(self, key: str, default = None) -> Any:
169
+ DirectoryMfaAuthenticationSettingInfo.__key_warning(key)
170
+ return super().get(key, default)
171
+
172
+ def __init__(__self__, *,
173
+ mfa_authentication_advance_settings: Optional[builtins.str] = None,
174
+ operation_for_risk_login: Optional[builtins.str] = None):
175
+ """
176
+ :param builtins.str mfa_authentication_advance_settings: Global MFA validation policy
177
+ :param builtins.str operation_for_risk_login: MFA verification policy for abnormal logon.
178
+ """
179
+ if mfa_authentication_advance_settings is not None:
180
+ pulumi.set(__self__, "mfa_authentication_advance_settings", mfa_authentication_advance_settings)
181
+ if operation_for_risk_login is not None:
182
+ pulumi.set(__self__, "operation_for_risk_login", operation_for_risk_login)
183
+
184
+ @property
185
+ @pulumi.getter(name="mfaAuthenticationAdvanceSettings")
186
+ def mfa_authentication_advance_settings(self) -> Optional[builtins.str]:
187
+ """
188
+ Global MFA validation policy
189
+ """
190
+ return pulumi.get(self, "mfa_authentication_advance_settings")
191
+
192
+ @property
193
+ @pulumi.getter(name="operationForRiskLogin")
194
+ def operation_for_risk_login(self) -> Optional[builtins.str]:
195
+ """
196
+ MFA verification policy for abnormal logon.
197
+ """
198
+ return pulumi.get(self, "operation_for_risk_login")
199
+
200
+
201
+ @pulumi.output_type
202
+ class DirectoryPasswordPolicy(dict):
203
+ @staticmethod
204
+ def __key_warning(key: str):
205
+ suggest = None
206
+ if key == "hardExpire":
207
+ suggest = "hard_expire"
208
+ elif key == "maxLoginAttempts":
209
+ suggest = "max_login_attempts"
210
+ elif key == "maxPasswordAge":
211
+ suggest = "max_password_age"
212
+ elif key == "maxPasswordLength":
213
+ suggest = "max_password_length"
214
+ elif key == "minPasswordDifferentChars":
215
+ suggest = "min_password_different_chars"
216
+ elif key == "minPasswordLength":
217
+ suggest = "min_password_length"
218
+ elif key == "passwordNotContainUsername":
219
+ suggest = "password_not_contain_username"
220
+ elif key == "passwordReusePrevention":
221
+ suggest = "password_reuse_prevention"
222
+ elif key == "requireLowerCaseChars":
223
+ suggest = "require_lower_case_chars"
224
+ elif key == "requireNumbers":
225
+ suggest = "require_numbers"
226
+ elif key == "requireSymbols":
227
+ suggest = "require_symbols"
228
+ elif key == "requireUpperCaseChars":
229
+ suggest = "require_upper_case_chars"
230
+
231
+ if suggest:
232
+ pulumi.log.warn(f"Key '{key}' not found in DirectoryPasswordPolicy. Access the value via the '{suggest}' property getter instead.")
233
+
234
+ def __getitem__(self, key: str) -> Any:
235
+ DirectoryPasswordPolicy.__key_warning(key)
236
+ return super().__getitem__(key)
237
+
238
+ def get(self, key: str, default = None) -> Any:
239
+ DirectoryPasswordPolicy.__key_warning(key)
240
+ return super().get(key, default)
241
+
242
+ def __init__(__self__, *,
243
+ hard_expire: Optional[builtins.bool] = None,
244
+ max_login_attempts: Optional[builtins.int] = None,
245
+ max_password_age: Optional[builtins.int] = None,
246
+ max_password_length: Optional[builtins.int] = None,
247
+ min_password_different_chars: Optional[builtins.int] = None,
248
+ min_password_length: Optional[builtins.int] = None,
249
+ password_not_contain_username: Optional[builtins.bool] = None,
250
+ password_reuse_prevention: Optional[builtins.int] = None,
251
+ require_lower_case_chars: Optional[builtins.bool] = None,
252
+ require_numbers: Optional[builtins.bool] = None,
253
+ require_symbols: Optional[builtins.bool] = None,
254
+ require_upper_case_chars: Optional[builtins.bool] = None):
255
+ """
256
+ :param builtins.bool hard_expire: Whether to restrict login after Password Expiration
257
+ :param builtins.int max_login_attempts: Number of password retries.
258
+ :param builtins.int max_password_age: Password validity period.
259
+ :param builtins.int max_password_length: Maximum password length.
260
+ :param builtins.int min_password_different_chars: The minimum number of different characters in a password.
261
+ :param builtins.int min_password_length: Minimum password length.
262
+ :param builtins.bool password_not_contain_username: Whether the user name is not allowed in the password.
263
+ :param builtins.int password_reuse_prevention: Historical password check policy.
264
+ :param builtins.bool require_lower_case_chars: Whether lowercase letters are required in the password.
265
+ :param builtins.bool require_numbers: Whether numbers are required in the password.
266
+ :param builtins.bool require_symbols: Whether symbols are required in the password.
267
+ :param builtins.bool require_upper_case_chars: Whether uppercase letters are required in the password.
268
+ """
269
+ if hard_expire is not None:
270
+ pulumi.set(__self__, "hard_expire", hard_expire)
271
+ if max_login_attempts is not None:
272
+ pulumi.set(__self__, "max_login_attempts", max_login_attempts)
273
+ if max_password_age is not None:
274
+ pulumi.set(__self__, "max_password_age", max_password_age)
275
+ if max_password_length is not None:
276
+ pulumi.set(__self__, "max_password_length", max_password_length)
277
+ if min_password_different_chars is not None:
278
+ pulumi.set(__self__, "min_password_different_chars", min_password_different_chars)
279
+ if min_password_length is not None:
280
+ pulumi.set(__self__, "min_password_length", min_password_length)
281
+ if password_not_contain_username is not None:
282
+ pulumi.set(__self__, "password_not_contain_username", password_not_contain_username)
283
+ if password_reuse_prevention is not None:
284
+ pulumi.set(__self__, "password_reuse_prevention", password_reuse_prevention)
285
+ if require_lower_case_chars is not None:
286
+ pulumi.set(__self__, "require_lower_case_chars", require_lower_case_chars)
287
+ if require_numbers is not None:
288
+ pulumi.set(__self__, "require_numbers", require_numbers)
289
+ if require_symbols is not None:
290
+ pulumi.set(__self__, "require_symbols", require_symbols)
291
+ if require_upper_case_chars is not None:
292
+ pulumi.set(__self__, "require_upper_case_chars", require_upper_case_chars)
293
+
294
+ @property
295
+ @pulumi.getter(name="hardExpire")
296
+ def hard_expire(self) -> Optional[builtins.bool]:
297
+ """
298
+ Whether to restrict login after Password Expiration
299
+ """
300
+ return pulumi.get(self, "hard_expire")
301
+
302
+ @property
303
+ @pulumi.getter(name="maxLoginAttempts")
304
+ def max_login_attempts(self) -> Optional[builtins.int]:
305
+ """
306
+ Number of password retries.
307
+ """
308
+ return pulumi.get(self, "max_login_attempts")
309
+
310
+ @property
311
+ @pulumi.getter(name="maxPasswordAge")
312
+ def max_password_age(self) -> Optional[builtins.int]:
313
+ """
314
+ Password validity period.
315
+ """
316
+ return pulumi.get(self, "max_password_age")
317
+
318
+ @property
319
+ @pulumi.getter(name="maxPasswordLength")
320
+ def max_password_length(self) -> Optional[builtins.int]:
321
+ """
322
+ Maximum password length.
323
+ """
324
+ return pulumi.get(self, "max_password_length")
325
+
326
+ @property
327
+ @pulumi.getter(name="minPasswordDifferentChars")
328
+ def min_password_different_chars(self) -> Optional[builtins.int]:
329
+ """
330
+ The minimum number of different characters in a password.
331
+ """
332
+ return pulumi.get(self, "min_password_different_chars")
333
+
334
+ @property
335
+ @pulumi.getter(name="minPasswordLength")
336
+ def min_password_length(self) -> Optional[builtins.int]:
337
+ """
338
+ Minimum password length.
339
+ """
340
+ return pulumi.get(self, "min_password_length")
341
+
342
+ @property
343
+ @pulumi.getter(name="passwordNotContainUsername")
344
+ def password_not_contain_username(self) -> Optional[builtins.bool]:
345
+ """
346
+ Whether the user name is not allowed in the password.
347
+ """
348
+ return pulumi.get(self, "password_not_contain_username")
349
+
350
+ @property
351
+ @pulumi.getter(name="passwordReusePrevention")
352
+ def password_reuse_prevention(self) -> Optional[builtins.int]:
353
+ """
354
+ Historical password check policy.
355
+ """
356
+ return pulumi.get(self, "password_reuse_prevention")
357
+
358
+ @property
359
+ @pulumi.getter(name="requireLowerCaseChars")
360
+ def require_lower_case_chars(self) -> Optional[builtins.bool]:
361
+ """
362
+ Whether lowercase letters are required in the password.
363
+ """
364
+ return pulumi.get(self, "require_lower_case_chars")
365
+
366
+ @property
367
+ @pulumi.getter(name="requireNumbers")
368
+ def require_numbers(self) -> Optional[builtins.bool]:
369
+ """
370
+ Whether numbers are required in the password.
371
+ """
372
+ return pulumi.get(self, "require_numbers")
373
+
374
+ @property
375
+ @pulumi.getter(name="requireSymbols")
376
+ def require_symbols(self) -> Optional[builtins.bool]:
377
+ """
378
+ Whether symbols are required in the password.
379
+ """
380
+ return pulumi.get(self, "require_symbols")
381
+
382
+ @property
383
+ @pulumi.getter(name="requireUpperCaseChars")
384
+ def require_upper_case_chars(self) -> Optional[builtins.bool]:
385
+ """
386
+ Whether uppercase letters are required in the password.
387
+ """
388
+ return pulumi.get(self, "require_upper_case_chars")
389
+
390
+
96
391
  @pulumi.output_type
97
392
  class DirectorySamlIdentityProviderConfiguration(dict):
98
393
  @staticmethod
99
394
  def __key_warning(key: str):
100
395
  suggest = None
101
- if key == "encodedMetadataDocument":
396
+ if key == "bindingType":
397
+ suggest = "binding_type"
398
+ elif key == "certificateIds":
399
+ suggest = "certificate_ids"
400
+ elif key == "createTime":
401
+ suggest = "create_time"
402
+ elif key == "encodedMetadataDocument":
102
403
  suggest = "encoded_metadata_document"
404
+ elif key == "entityId":
405
+ suggest = "entity_id"
406
+ elif key == "loginUrl":
407
+ suggest = "login_url"
103
408
  elif key == "ssoStatus":
104
409
  suggest = "sso_status"
410
+ elif key == "updateTime":
411
+ suggest = "update_time"
412
+ elif key == "wantRequestSigned":
413
+ suggest = "want_request_signed"
105
414
 
106
415
  if suggest:
107
416
  pulumi.log.warn(f"Key '{key}' not found in DirectorySamlIdentityProviderConfiguration. Access the value via the '{suggest}' property getter instead.")
@@ -115,33 +424,273 @@ class DirectorySamlIdentityProviderConfiguration(dict):
115
424
  return super().get(key, default)
116
425
 
117
426
  def __init__(__self__, *,
427
+ binding_type: Optional[builtins.str] = None,
428
+ certificate_ids: Optional[Sequence[builtins.str]] = None,
429
+ create_time: Optional[builtins.str] = None,
118
430
  encoded_metadata_document: Optional[builtins.str] = None,
119
- sso_status: Optional[builtins.str] = None):
120
- """
121
- :param builtins.str encoded_metadata_document: Base64 encoded IdP metadata document. **NOTE:** If the IdP Metadata has been uploaded, no update will be made if this parameter is not specified, otherwise the update will be made according to the parameter content. If IdP Metadata has not been uploaded, and the parameter `sso_status` is `Enabled`, this parameter must be provided. If the IdP Metadata has not been uploaded, and the parameter `sso_status` is `Disabled`, this parameter can be omitted, and the IdP Metadata will remain empty.
122
- :param builtins.str sso_status: SAML SSO login enabled status. Valid values: `Enabled` or `Disabled`. Default to `Disabled`.
123
- """
431
+ entity_id: Optional[builtins.str] = None,
432
+ login_url: Optional[builtins.str] = None,
433
+ sso_status: Optional[builtins.str] = None,
434
+ update_time: Optional[builtins.str] = None,
435
+ want_request_signed: Optional[builtins.bool] = None):
436
+ """
437
+ :param builtins.str binding_type: The Binding method for initiating a SAML request.
438
+ :param Sequence[builtins.str] certificate_ids: Certificate ID list
439
+ :param builtins.str create_time: CreateTime
440
+ :param builtins.str encoded_metadata_document: EncodedMetadataDocument
441
+ :param builtins.str entity_id: EntityId
442
+ :param builtins.str login_url: LoginUrl
443
+ :param builtins.str sso_status: SSOStatus
444
+ :param builtins.str update_time: UpdateTime
445
+ :param builtins.bool want_request_signed: SP Request whether the signature is required
446
+ """
447
+ if binding_type is not None:
448
+ pulumi.set(__self__, "binding_type", binding_type)
449
+ if certificate_ids is not None:
450
+ pulumi.set(__self__, "certificate_ids", certificate_ids)
451
+ if create_time is not None:
452
+ pulumi.set(__self__, "create_time", create_time)
124
453
  if encoded_metadata_document is not None:
125
454
  pulumi.set(__self__, "encoded_metadata_document", encoded_metadata_document)
455
+ if entity_id is not None:
456
+ pulumi.set(__self__, "entity_id", entity_id)
457
+ if login_url is not None:
458
+ pulumi.set(__self__, "login_url", login_url)
126
459
  if sso_status is not None:
127
460
  pulumi.set(__self__, "sso_status", sso_status)
461
+ if update_time is not None:
462
+ pulumi.set(__self__, "update_time", update_time)
463
+ if want_request_signed is not None:
464
+ pulumi.set(__self__, "want_request_signed", want_request_signed)
465
+
466
+ @property
467
+ @pulumi.getter(name="bindingType")
468
+ def binding_type(self) -> Optional[builtins.str]:
469
+ """
470
+ The Binding method for initiating a SAML request.
471
+ """
472
+ return pulumi.get(self, "binding_type")
473
+
474
+ @property
475
+ @pulumi.getter(name="certificateIds")
476
+ def certificate_ids(self) -> Optional[Sequence[builtins.str]]:
477
+ """
478
+ Certificate ID list
479
+ """
480
+ return pulumi.get(self, "certificate_ids")
481
+
482
+ @property
483
+ @pulumi.getter(name="createTime")
484
+ def create_time(self) -> Optional[builtins.str]:
485
+ """
486
+ CreateTime
487
+ """
488
+ return pulumi.get(self, "create_time")
128
489
 
129
490
  @property
130
491
  @pulumi.getter(name="encodedMetadataDocument")
131
492
  def encoded_metadata_document(self) -> Optional[builtins.str]:
132
493
  """
133
- Base64 encoded IdP metadata document. **NOTE:** If the IdP Metadata has been uploaded, no update will be made if this parameter is not specified, otherwise the update will be made according to the parameter content. If IdP Metadata has not been uploaded, and the parameter `sso_status` is `Enabled`, this parameter must be provided. If the IdP Metadata has not been uploaded, and the parameter `sso_status` is `Disabled`, this parameter can be omitted, and the IdP Metadata will remain empty.
494
+ EncodedMetadataDocument
134
495
  """
135
496
  return pulumi.get(self, "encoded_metadata_document")
136
497
 
498
+ @property
499
+ @pulumi.getter(name="entityId")
500
+ def entity_id(self) -> Optional[builtins.str]:
501
+ """
502
+ EntityId
503
+ """
504
+ return pulumi.get(self, "entity_id")
505
+
506
+ @property
507
+ @pulumi.getter(name="loginUrl")
508
+ def login_url(self) -> Optional[builtins.str]:
509
+ """
510
+ LoginUrl
511
+ """
512
+ return pulumi.get(self, "login_url")
513
+
137
514
  @property
138
515
  @pulumi.getter(name="ssoStatus")
139
516
  def sso_status(self) -> Optional[builtins.str]:
140
517
  """
141
- SAML SSO login enabled status. Valid values: `Enabled` or `Disabled`. Default to `Disabled`.
518
+ SSOStatus
142
519
  """
143
520
  return pulumi.get(self, "sso_status")
144
521
 
522
+ @property
523
+ @pulumi.getter(name="updateTime")
524
+ def update_time(self) -> Optional[builtins.str]:
525
+ """
526
+ UpdateTime
527
+ """
528
+ return pulumi.get(self, "update_time")
529
+
530
+ @property
531
+ @pulumi.getter(name="wantRequestSigned")
532
+ def want_request_signed(self) -> Optional[builtins.bool]:
533
+ """
534
+ SP Request whether the signature is required
535
+ """
536
+ return pulumi.get(self, "want_request_signed")
537
+
538
+
539
+ @pulumi.output_type
540
+ class DirectorySamlServiceProvider(dict):
541
+ @staticmethod
542
+ def __key_warning(key: str):
543
+ suggest = None
544
+ if key == "acsUrl":
545
+ suggest = "acs_url"
546
+ elif key == "authnSignAlgo":
547
+ suggest = "authn_sign_algo"
548
+ elif key == "certificateType":
549
+ suggest = "certificate_type"
550
+ elif key == "encodedMetadataDocument":
551
+ suggest = "encoded_metadata_document"
552
+ elif key == "entityId":
553
+ suggest = "entity_id"
554
+ elif key == "supportEncryptedAssertion":
555
+ suggest = "support_encrypted_assertion"
556
+
557
+ if suggest:
558
+ pulumi.log.warn(f"Key '{key}' not found in DirectorySamlServiceProvider. Access the value via the '{suggest}' property getter instead.")
559
+
560
+ def __getitem__(self, key: str) -> Any:
561
+ DirectorySamlServiceProvider.__key_warning(key)
562
+ return super().__getitem__(key)
563
+
564
+ def get(self, key: str, default = None) -> Any:
565
+ DirectorySamlServiceProvider.__key_warning(key)
566
+ return super().get(key, default)
567
+
568
+ def __init__(__self__, *,
569
+ acs_url: Optional[builtins.str] = None,
570
+ authn_sign_algo: Optional[builtins.str] = None,
571
+ certificate_type: Optional[builtins.str] = None,
572
+ encoded_metadata_document: Optional[builtins.str] = None,
573
+ entity_id: Optional[builtins.str] = None,
574
+ support_encrypted_assertion: Optional[builtins.bool] = None):
575
+ """
576
+ :param builtins.str acs_url: ACS URL of SP.
577
+ :param builtins.str authn_sign_algo: Signature algorithms supported by AuthNRequest
578
+ :param builtins.str certificate_type: Type of certificate used for signing in the SSO process
579
+ :param builtins.str encoded_metadata_document: SP metadata document (Base64 encoding).
580
+ :param builtins.str entity_id: SP identity.
581
+ :param builtins.bool support_encrypted_assertion: Whether IdP-side encryption of Assertion is supported.
582
+ """
583
+ if acs_url is not None:
584
+ pulumi.set(__self__, "acs_url", acs_url)
585
+ if authn_sign_algo is not None:
586
+ pulumi.set(__self__, "authn_sign_algo", authn_sign_algo)
587
+ if certificate_type is not None:
588
+ pulumi.set(__self__, "certificate_type", certificate_type)
589
+ if encoded_metadata_document is not None:
590
+ pulumi.set(__self__, "encoded_metadata_document", encoded_metadata_document)
591
+ if entity_id is not None:
592
+ pulumi.set(__self__, "entity_id", entity_id)
593
+ if support_encrypted_assertion is not None:
594
+ pulumi.set(__self__, "support_encrypted_assertion", support_encrypted_assertion)
595
+
596
+ @property
597
+ @pulumi.getter(name="acsUrl")
598
+ def acs_url(self) -> Optional[builtins.str]:
599
+ """
600
+ ACS URL of SP.
601
+ """
602
+ return pulumi.get(self, "acs_url")
603
+
604
+ @property
605
+ @pulumi.getter(name="authnSignAlgo")
606
+ def authn_sign_algo(self) -> Optional[builtins.str]:
607
+ """
608
+ Signature algorithms supported by AuthNRequest
609
+ """
610
+ return pulumi.get(self, "authn_sign_algo")
611
+
612
+ @property
613
+ @pulumi.getter(name="certificateType")
614
+ def certificate_type(self) -> Optional[builtins.str]:
615
+ """
616
+ Type of certificate used for signing in the SSO process
617
+ """
618
+ return pulumi.get(self, "certificate_type")
619
+
620
+ @property
621
+ @pulumi.getter(name="encodedMetadataDocument")
622
+ def encoded_metadata_document(self) -> Optional[builtins.str]:
623
+ """
624
+ SP metadata document (Base64 encoding).
625
+ """
626
+ return pulumi.get(self, "encoded_metadata_document")
627
+
628
+ @property
629
+ @pulumi.getter(name="entityId")
630
+ def entity_id(self) -> Optional[builtins.str]:
631
+ """
632
+ SP identity.
633
+ """
634
+ return pulumi.get(self, "entity_id")
635
+
636
+ @property
637
+ @pulumi.getter(name="supportEncryptedAssertion")
638
+ def support_encrypted_assertion(self) -> Optional[builtins.bool]:
639
+ """
640
+ Whether IdP-side encryption of Assertion is supported.
641
+ """
642
+ return pulumi.get(self, "support_encrypted_assertion")
643
+
644
+
645
+ @pulumi.output_type
646
+ class DirectoryUserProvisioningConfiguration(dict):
647
+ @staticmethod
648
+ def __key_warning(key: str):
649
+ suggest = None
650
+ if key == "defaultLandingPage":
651
+ suggest = "default_landing_page"
652
+ elif key == "sessionDuration":
653
+ suggest = "session_duration"
654
+
655
+ if suggest:
656
+ pulumi.log.warn(f"Key '{key}' not found in DirectoryUserProvisioningConfiguration. Access the value via the '{suggest}' property getter instead.")
657
+
658
+ def __getitem__(self, key: str) -> Any:
659
+ DirectoryUserProvisioningConfiguration.__key_warning(key)
660
+ return super().__getitem__(key)
661
+
662
+ def get(self, key: str, default = None) -> Any:
663
+ DirectoryUserProvisioningConfiguration.__key_warning(key)
664
+ return super().get(key, default)
665
+
666
+ def __init__(__self__, *,
667
+ default_landing_page: Optional[builtins.str] = None,
668
+ session_duration: Optional[builtins.str] = None):
669
+ """
670
+ :param builtins.str default_landing_page: The duration of the Session after the user logs in.
671
+ :param builtins.str session_duration: The duration of the Session after the user logs in.
672
+ """
673
+ if default_landing_page is not None:
674
+ pulumi.set(__self__, "default_landing_page", default_landing_page)
675
+ if session_duration is not None:
676
+ pulumi.set(__self__, "session_duration", session_duration)
677
+
678
+ @property
679
+ @pulumi.getter(name="defaultLandingPage")
680
+ def default_landing_page(self) -> Optional[builtins.str]:
681
+ """
682
+ The duration of the Session after the user logs in.
683
+ """
684
+ return pulumi.get(self, "default_landing_page")
685
+
686
+ @property
687
+ @pulumi.getter(name="sessionDuration")
688
+ def session_duration(self) -> Optional[builtins.str]:
689
+ """
690
+ The duration of the Session after the user logs in.
691
+ """
692
+ return pulumi.get(self, "session_duration")
693
+
145
694
 
146
695
  @pulumi.output_type
147
696
  class GetAccessAssignmentsAssignmentResult(dict):
@@ -239,6 +239,7 @@ class Endpoints(dict):
239
239
  eds_user: Optional[builtins.str] = None,
240
240
  edsuser: Optional[builtins.str] = None,
241
241
  eflo: Optional[builtins.str] = None,
242
+ eflo_cnp: Optional[builtins.str] = None,
242
243
  eflo_controller: Optional[builtins.str] = None,
243
244
  ehpc: Optional[builtins.str] = None,
244
245
  ehs: Optional[builtins.str] = None,
@@ -621,6 +622,8 @@ class Endpoints(dict):
621
622
  pulumi.set(__self__, "edsuser", edsuser)
622
623
  if eflo is not None:
623
624
  pulumi.set(__self__, "eflo", eflo)
625
+ if eflo_cnp is not None:
626
+ pulumi.set(__self__, "eflo_cnp", eflo_cnp)
624
627
  if eflo_controller is not None:
625
628
  pulumi.set(__self__, "eflo_controller", eflo_controller)
626
629
  if ehpc is not None:
@@ -1354,6 +1357,11 @@ class Endpoints(dict):
1354
1357
  """
1355
1358
  return pulumi.get(self, "eflo")
1356
1359
 
1360
+ @property
1361
+ @pulumi.getter(name="efloCnp")
1362
+ def eflo_cnp(self) -> Optional[builtins.str]:
1363
+ return pulumi.get(self, "eflo_cnp")
1364
+
1357
1365
  @property
1358
1366
  @pulumi.getter(name="efloController")
1359
1367
  def eflo_controller(self) -> Optional[builtins.str]: