diff --git a/examples/go.mod b/examples/go.mod index 0e2cca2d..f0835cdf 100644 --- a/examples/go.mod +++ b/examples/go.mod @@ -3,8 +3,8 @@ module github.com/pulumi/pulumi-auth0/examples/v2 go 1.21 require ( - github.com/pulumi/pulumi/pkg/v3 v3.86.0 - github.com/stretchr/testify v1.8.3 + github.com/pulumi/pulumi/pkg/v3 v3.90.1 + github.com/stretchr/testify v1.8.4 ) require ( @@ -16,12 +16,7 @@ require ( cloud.google.com/go/logging v1.7.0 // indirect cloud.google.com/go/longrunning v0.5.1 // indirect cloud.google.com/go/storage v1.30.1 // indirect - github.com/AlecAivazis/survey/v2 v2.3.7 // indirect github.com/Azure/azure-sdk-for-go v66.0.0+incompatible // indirect - github.com/Azure/azure-sdk-for-go/sdk/azcore v1.1.1 // indirect - github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.0.0 // indirect - github.com/Azure/azure-sdk-for-go/sdk/internal v1.0.0 // indirect - github.com/Azure/azure-sdk-for-go/sdk/storage/azblob v0.4.1 // indirect github.com/Azure/go-autorest v14.2.0+incompatible // indirect github.com/Azure/go-autorest/autorest v0.11.28 // indirect github.com/Azure/go-autorest/autorest/adal v0.9.21 // indirect @@ -32,7 +27,6 @@ require ( github.com/Azure/go-autorest/autorest/validation v0.3.1 // indirect github.com/Azure/go-autorest/logger v0.2.1 // indirect github.com/Azure/go-autorest/tracing v0.6.0 // indirect - github.com/AzureAD/microsoft-authentication-library-for-go v0.4.0 // indirect github.com/Microsoft/go-winio v0.5.2 // indirect github.com/ProtonMail/go-crypto v0.0.0-20221026131551-cf6655e29de4 // indirect github.com/acomagu/bufpipe v1.0.3 // indirect @@ -44,21 +38,14 @@ require ( github.com/atotto/clipboard v0.1.4 // indirect github.com/aws/aws-sdk-go v1.44.298 // indirect github.com/aws/aws-sdk-go-v2 v1.17.3 // indirect - github.com/aws/aws-sdk-go-v2/aws/protocol/eventstream v1.4.3 // indirect github.com/aws/aws-sdk-go-v2/config v1.15.15 // indirect github.com/aws/aws-sdk-go-v2/credentials v1.12.10 // indirect github.com/aws/aws-sdk-go-v2/feature/ec2/imds v1.12.9 // indirect - github.com/aws/aws-sdk-go-v2/feature/s3/manager v1.11.21 // indirect github.com/aws/aws-sdk-go-v2/internal/configsources v1.1.27 // indirect github.com/aws/aws-sdk-go-v2/internal/endpoints/v2 v2.4.21 // indirect github.com/aws/aws-sdk-go-v2/internal/ini v1.3.16 // indirect - github.com/aws/aws-sdk-go-v2/internal/v4a v1.0.6 // indirect - github.com/aws/aws-sdk-go-v2/service/internal/accept-encoding v1.9.3 // indirect - github.com/aws/aws-sdk-go-v2/service/internal/checksum v1.1.10 // indirect github.com/aws/aws-sdk-go-v2/service/internal/presigned-url v1.9.9 // indirect - github.com/aws/aws-sdk-go-v2/service/internal/s3shared v1.13.9 // indirect github.com/aws/aws-sdk-go-v2/service/kms v1.18.1 // indirect - github.com/aws/aws-sdk-go-v2/service/s3 v1.27.2 // indirect github.com/aws/aws-sdk-go-v2/service/sso v1.11.13 // indirect github.com/aws/aws-sdk-go-v2/service/sts v1.16.10 // indirect github.com/aws/smithy-go v1.13.5 // indirect @@ -74,7 +61,6 @@ require ( github.com/davecgh/go-spew v1.1.1 // indirect github.com/dimchansky/utfbom v1.1.1 // indirect github.com/djherbis/times v1.5.0 // indirect - github.com/dustin/go-humanize v1.0.1 // indirect github.com/edsrzf/mmap-go v1.1.0 // indirect github.com/emirpasic/gods v1.18.1 // indirect github.com/fatih/color v1.13.0 // indirect @@ -83,7 +69,6 @@ require ( github.com/go-git/go-git/v5 v5.6.0 // indirect github.com/gofrs/uuid v4.2.0+incompatible // indirect github.com/gogo/protobuf v1.3.2 // indirect - github.com/golang-jwt/jwt v3.2.1+incompatible // indirect github.com/golang-jwt/jwt/v4 v4.4.2 // indirect github.com/golang/glog v1.1.0 // indirect github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da // indirect @@ -114,25 +99,21 @@ require ( github.com/hashicorp/go-version v1.6.0 // indirect github.com/hashicorp/golang-lru v0.5.4 // indirect github.com/hashicorp/hcl v1.0.0 // indirect - github.com/hashicorp/hcl/v2 v2.16.2 // indirect + github.com/hashicorp/hcl/v2 v2.17.0 // indirect github.com/hashicorp/vault/api v1.8.2 // indirect github.com/hashicorp/vault/sdk v0.6.1 // indirect github.com/hashicorp/yamux v0.1.1 // indirect - github.com/ijc/Gotty v0.0.0-20170406111628-a8b993ba6abd // indirect github.com/imdario/mergo v0.3.13 // indirect github.com/inconshreveable/mousetrap v1.1.0 // indirect github.com/jbenet/go-context v0.0.0-20150711004518-d14ea06fba99 // indirect github.com/jmespath/go-jmespath v0.4.0 // indirect github.com/json-iterator/go v1.1.12 // indirect - github.com/kballard/go-shellquote v0.0.0-20180428030007-95032a82bc51 // indirect github.com/kevinburke/ssh_config v1.2.0 // indirect - github.com/kylelemons/godebug v1.1.0 // indirect github.com/lucasb-eyer/go-colorful v1.2.0 // indirect github.com/mattn/go-colorable v0.1.12 // indirect github.com/mattn/go-isatty v0.0.18 // indirect github.com/mattn/go-localereader v0.0.1 // indirect github.com/mattn/go-runewidth v0.0.14 // indirect - github.com/mgutz/ansi v0.0.0-20170206155736-9520e82c474b // indirect github.com/mitchellh/copystructure v1.2.0 // indirect github.com/mitchellh/go-homedir v1.1.0 // indirect github.com/mitchellh/go-ps v1.0.0 // indirect @@ -153,13 +134,13 @@ require ( github.com/pgavlin/goldmark v1.1.33-0.20200616210433-b5eb04559386 // indirect github.com/pierrec/lz4 v2.6.1+incompatible // indirect github.com/pjbgf/sha1cd v0.3.0 // indirect - github.com/pkg/browser v0.0.0-20210115035449-ce105d075bb4 // indirect github.com/pkg/errors v0.9.1 // indirect github.com/pkg/term v1.1.0 // indirect github.com/pmezard/go-difflib v1.0.0 // indirect - github.com/pulumi/pulumi/sdk/v3 v3.86.0 // indirect + github.com/pulumi/esc v0.5.6 // indirect + github.com/pulumi/pulumi/sdk/v3 v3.90.1 // indirect github.com/rivo/uniseg v0.4.4 // indirect - github.com/rogpeppe/go-internal v1.9.0 // indirect + github.com/rogpeppe/go-internal v1.11.0 // indirect github.com/ryanuber/go-glob v1.0.0 // indirect github.com/sabhiram/go-gitignore v0.0.0-20210923224102-525f6e181f06 // indirect github.com/santhosh-tekuri/jsonschema/v5 v5.0.0 // indirect @@ -182,14 +163,15 @@ require ( go.uber.org/atomic v1.9.0 // indirect gocloud.dev v0.27.0 // indirect gocloud.dev/secrets/hashivault v0.27.0 // indirect - golang.org/x/crypto v0.9.0 // indirect - golang.org/x/mod v0.10.0 // indirect - golang.org/x/net v0.10.0 // indirect + golang.org/x/crypto v0.14.0 // indirect + golang.org/x/exp v0.0.0-20231006140011-7918f672742d // indirect + golang.org/x/mod v0.13.0 // indirect + golang.org/x/net v0.17.0 // indirect golang.org/x/oauth2 v0.8.0 // indirect golang.org/x/sync v0.2.0 // indirect - golang.org/x/sys v0.9.0 // indirect - golang.org/x/term v0.8.0 // indirect - golang.org/x/text v0.9.0 // indirect + golang.org/x/sys v0.13.0 // indirect + golang.org/x/term v0.13.0 // indirect + golang.org/x/text v0.13.0 // indirect golang.org/x/time v0.0.0-20220722155302-e5dcc9cfc0b9 // indirect golang.org/x/xerrors v0.0.0-20220907171357-04be3eba64a2 // indirect google.golang.org/api v0.126.0 // indirect diff --git a/examples/go.sum b/examples/go.sum index ab745422..350f37bf 100644 --- a/examples/go.sum +++ b/examples/go.sum @@ -93,8 +93,6 @@ contrib.go.opencensus.io/exporter/stackdriver v0.13.13/go.mod h1:5pSSGY0Bhuk7waT contrib.go.opencensus.io/integrations/ocsql v0.1.7/go.mod h1:8DsSdjz3F+APR+0z0WkU1aRorQCFfRxvqjUUPMbF3fE= dmitri.shuralyov.com/gpu/mtl v0.0.0-20190408044501-666a987793e9/go.mod h1:H6x//7gZCb22OMCxBHrMx7a5I7Hp++hsVxbQ4BYO7hU= github.com/AdaLogics/go-fuzz-headers v0.0.0-20210715213245-6c3934b029d8/go.mod h1:CzsSbkDixRphAF5hS6wbMKq0eI6ccJRb7/A0M6JBnwg= -github.com/AlecAivazis/survey/v2 v2.3.7 h1:6I/u8FvytdGsgonrYsVn2t8t4QiRnh6QSTqkkhIiSjQ= -github.com/AlecAivazis/survey/v2 v2.3.7/go.mod h1:xUTIdE4KCOIjsBAE1JYsUPoCqYdZ1reCfTwbto0Fduo= github.com/Azure/azure-amqp-common-go/v3 v3.2.3/go.mod h1:7rPmbSfszeovxGfc5fSAXE4ehlXQZHpMja2OtxC2Tas= github.com/Azure/azure-sdk-for-go v16.2.1+incompatible/go.mod h1:9XXNKU+eRnpl9moKnB4QOLf1HestfXbmab5FXxiDBjc= github.com/Azure/azure-sdk-for-go v63.0.0+incompatible/go.mod h1:9XXNKU+eRnpl9moKnB4QOLf1HestfXbmab5FXxiDBjc= @@ -103,16 +101,12 @@ github.com/Azure/azure-sdk-for-go v66.0.0+incompatible h1:bmmC38SlE8/E81nNADlgmV github.com/Azure/azure-sdk-for-go v66.0.0+incompatible/go.mod h1:9XXNKU+eRnpl9moKnB4QOLf1HestfXbmab5FXxiDBjc= github.com/Azure/azure-sdk-for-go/sdk/azcore v0.19.0/go.mod h1:h6H6c8enJmmocHUbLiiGY6sx7f9i+X3m1CHdd5c6Rdw= github.com/Azure/azure-sdk-for-go/sdk/azcore v1.0.0/go.mod h1:uGG2W01BaETf0Ozp+QxxKJdMBNRWPdstHG0Fmdwn1/U= -github.com/Azure/azure-sdk-for-go/sdk/azcore v1.1.1 h1:tz19qLF65vuu2ibfTqGVJxG/zZAI27NEIIbvAOQwYbw= github.com/Azure/azure-sdk-for-go/sdk/azcore v1.1.1/go.mod h1:uGG2W01BaETf0Ozp+QxxKJdMBNRWPdstHG0Fmdwn1/U= github.com/Azure/azure-sdk-for-go/sdk/azidentity v0.11.0/go.mod h1:HcM1YX14R7CJcghJGOYCgdezslRSVzqwLf/q+4Y2r/0= -github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.0.0 h1:Yoicul8bnVdQrhDMTHxdEckRGX01XvwXDHUT9zYZ3k0= github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.0.0/go.mod h1:+6sju8gk8FRmSajX3Oz4G5Gm7P+mbqE9FVaXXFYTkCM= github.com/Azure/azure-sdk-for-go/sdk/internal v0.7.0/go.mod h1:yqy467j36fJxcRV2TzfVZ1pCb5vxm4BtZPUdYWe/Xo8= -github.com/Azure/azure-sdk-for-go/sdk/internal v1.0.0 h1:jp0dGvZ7ZK0mgqnTSClMxa5xuRL7NZgHameVYF6BurY= github.com/Azure/azure-sdk-for-go/sdk/internal v1.0.0/go.mod h1:eWRD7oawr1Mu1sLCawqVc0CUiF43ia3qQMxLscsKQ9w= github.com/Azure/azure-sdk-for-go/sdk/messaging/azservicebus v1.0.2/go.mod h1:LH9XQnMr2ZYxQdVdCrzLO9mxeDyrDFa6wbSI3x5zCZk= -github.com/Azure/azure-sdk-for-go/sdk/storage/azblob v0.4.1 h1:QSdcrd/UFJv6Bp/CfoVf2SrENpFn9P6Yh8yb+xNhYMM= github.com/Azure/azure-sdk-for-go/sdk/storage/azblob v0.4.1/go.mod h1:eZ4g6GUvXiGulfIbbhh1Xr4XwUYaYaWMqzGD/284wCA= github.com/Azure/go-amqp v0.17.0/go.mod h1:9YJ3RhxRT1gquYnzpZO1vcYMMpAdJT+QEg6fwmw9Zlg= github.com/Azure/go-amqp v0.17.5/go.mod h1:9YJ3RhxRT1gquYnzpZO1vcYMMpAdJT+QEg6fwmw9Zlg= @@ -156,7 +150,6 @@ github.com/Azure/go-autorest/logger v0.2.1 h1:IG7i4p/mDa2Ce4TRyAO8IHnVhAVF3RFU+Z github.com/Azure/go-autorest/logger v0.2.1/go.mod h1:T9E3cAhj2VqvPOtCYAvby9aBXkZmbF5NWuPV8+WeEW8= github.com/Azure/go-autorest/tracing v0.6.0 h1:TYi4+3m5t6K48TGI9AUdb+IzbnSxvnvUMfuitfgcfuo= github.com/Azure/go-autorest/tracing v0.6.0/go.mod h1:+vhtPC754Xsa23ID7GlGsrdKBpUA79WCAKPPZVC2DeU= -github.com/AzureAD/microsoft-authentication-library-for-go v0.4.0 h1:WVsrXCnHlDDX8ls+tootqRE87/hL9S/g4ewig9RsD/c= github.com/AzureAD/microsoft-authentication-library-for-go v0.4.0/go.mod h1:Vt9sXTKwMyGcOxSmLDMnGPgqsUg7m8pe215qMLrDXw4= github.com/BurntSushi/toml v0.3.1/go.mod h1:xHWCNGjB5oqiDr8zfno3MHue2Ht5sIBksp03qcyfWMU= github.com/BurntSushi/xgb v0.0.0-20160522181843-27f122750802/go.mod h1:IVnqGOEym/WlBOVXweHU+Q+/VP0lqqI8lqeDx9IjBqo= @@ -192,8 +185,6 @@ github.com/Microsoft/hcsshim/test v0.0.0-20201218223536-d3e5debf77da/go.mod h1:5 github.com/Microsoft/hcsshim/test v0.0.0-20210227013316-43a75bb4edd3/go.mod h1:mw7qgWloBUl75W/gVH3cQszUg1+gUITj7D6NY7ywVnY= github.com/NYTimes/gziphandler v0.0.0-20170623195520-56545f4a5d46/go.mod h1:3wb06e3pkSAbeQ52E9H9iFoQsEEwGN64994WTCIhntQ= github.com/NYTimes/gziphandler v1.1.1/go.mod h1:n/CVRwUEOgIxrgPvAQhUUr9oeUtvrhMomdKFjzJNB0c= -github.com/Netflix/go-expect v0.0.0-20220104043353-73e0943537d2 h1:+vx7roKuyA63nhn5WAunQHLTznkw5W8b1Xc0dNjp83s= -github.com/Netflix/go-expect v0.0.0-20220104043353-73e0943537d2/go.mod h1:HBCaDeC1lPdgDeDbhX8XFpy1jqjK0IBG8W5K+xYqA0w= github.com/OneOfOne/xxhash v1.2.2/go.mod h1:HSdplMjZKSmBqAxg5vPj2TmRDmfkzw+cTzAElWljhcU= github.com/ProtonMail/go-crypto v0.0.0-20221026131551-cf6655e29de4 h1:ra2OtmuW0AE5csawV4YXMNGNQQXvLRps3z2Z59OPO+I= github.com/ProtonMail/go-crypto v0.0.0-20221026131551-cf6655e29de4/go.mod h1:UBYPn8k0D56RtnR8RFQMjmh4KrZzWJ5o7Z9SYjossQ8= @@ -511,8 +502,6 @@ github.com/cpuguy83/go-md2man/v2 v2.0.2/go.mod h1:tgQtvFlXSQOSOSIRvRPT7W67SCa46t github.com/creack/pty v1.1.7/go.mod h1:lj5s0c3V2DBrqTV7llrYr5NG6My20zk30Fl46Y7DoTY= github.com/creack/pty v1.1.9/go.mod h1:oKZEueFk5CKHvIhNR5MUki03XCEU+Q6VDXinZuGJ33E= github.com/creack/pty v1.1.11/go.mod h1:oKZEueFk5CKHvIhNR5MUki03XCEU+Q6VDXinZuGJ33E= -github.com/creack/pty v1.1.17 h1:QeVUsEDNrLBW4tMgZHvxy18sKtr6VI492kBhUfhDJNI= -github.com/creack/pty v1.1.17/go.mod h1:MOBLtS5ELjhRRrroQr9kyvTxUAFNvYEK993ew/Vr4O4= github.com/cyphar/filepath-securejoin v0.2.2/go.mod h1:FpkQEhXnPnOthhzymB7CGsFk2G9VLXONKD9G7QGMM+4= github.com/cyphar/filepath-securejoin v0.2.3/go.mod h1:aPGpWjXOXUn2NCNjFvBE6aRxGGx79pTxQpKOJNYHHl4= github.com/d2g/dhcp4 v0.0.0-20170904100407-a1d1b6c41b1c/go.mod h1:Ct2BUK8SB0YC1SMSibvLzxjeJLnrYEVLULFNiHY9YfQ= @@ -538,7 +527,6 @@ github.com/djherbis/times v1.5.0 h1:79myA211VwPhFTqUk8xehWrsEO+zcIZj0zT8mXPVARU= github.com/djherbis/times v1.5.0/go.mod h1:5q7FDLvbNg1L/KaBmPcWlVR9NmoKo3+ucqUA3ijQhA0= github.com/dnaeon/go-vcr v1.0.1/go.mod h1:aBB1+wY4s93YsC3HHjMBMrwTj2R9FHDzUr9KyGc8n1E= github.com/dnaeon/go-vcr v1.1.0/go.mod h1:M7tiix8f0r6mKKJ3Yq/kqU1OYf3MnfmBWVbPx/yU9ko= -github.com/dnaeon/go-vcr v1.2.0 h1:zHCHvJYTMh1N7xnV7zf1m1GPBF9Ad0Jk/whtQ1663qI= github.com/dnaeon/go-vcr v1.2.0/go.mod h1:R4UdLID7HZT3taECzJs4YgbbH6PIGXB6W/sc5OLb6RQ= github.com/docker/cli v0.0.0-20191017083524-a8ff7f821017/go.mod h1:JLrzqnKDaYBop7H2jaqPtU4hHvMKP+vjCwu2uszcLI8= github.com/docker/distribution v0.0.0-20190905152932-14b96e55d84c/go.mod h1:0+TTO4EOBfRPhZXAeF1Vu+W3hHZ8eLp8PgKVZlcvtFY= @@ -560,8 +548,6 @@ github.com/docker/spdystream v0.0.0-20160310174837-449fdfce4d96/go.mod h1:Qh8CwZ github.com/docopt/docopt-go v0.0.0-20180111231733-ee0de3bc6815/go.mod h1:WwZ+bS3ebgob9U8Nd0kOddGdZWjyMGR8Wziv+TBNwSE= github.com/dustin/go-humanize v0.0.0-20171111073723-bb3d318650d4/go.mod h1:HtrtbFcZ19U5GC7JDqmcUSB87Iq5E25KnS6fMYU6eOk= github.com/dustin/go-humanize v1.0.0/go.mod h1:HtrtbFcZ19U5GC7JDqmcUSB87Iq5E25KnS6fMYU6eOk= -github.com/dustin/go-humanize v1.0.1 h1:GzkhY7T5VNhEkwH0PVJgjz+fX1rhBrR7pRT3mDkpeCY= -github.com/dustin/go-humanize v1.0.1/go.mod h1:Mu1zIs6XwVuF/gI1OepvI0qD18qycQx+mFykh5fBlto= github.com/eapache/go-resiliency v1.1.0/go.mod h1:kFI+JgMyC7bLPUVY133qvEBtVayf5mFgVsvEsIPBvNs= github.com/eapache/go-xerial-snappy v0.0.0-20180814174437-776d5712da21/go.mod h1:+020luEh2TKB4/GOp8oxxtq0Daoen/Cii55CzbTV6DU= github.com/eapache/queue v1.1.0/go.mod h1:6eCeP0CKFpHLu8blIFXhExK/dRa7WDZfr6jVFPTqq+I= @@ -751,7 +737,6 @@ github.com/gogo/protobuf v1.3.0/go.mod h1:SlYgWuQ5SjCEi6WLHjHCa1yvBfUnHcTbrrZtXP github.com/gogo/protobuf v1.3.1/go.mod h1:SlYgWuQ5SjCEi6WLHjHCa1yvBfUnHcTbrrZtXPKa29o= github.com/gogo/protobuf v1.3.2 h1:Ov1cvc58UF3b5XjBnZv7+opcTcQFZebYjWzi34vdm4Q= github.com/gogo/protobuf v1.3.2/go.mod h1:P1XiOD3dCwIKUDQYPy72D8LYyHL2YPYrpS2s69NZV8Q= -github.com/golang-jwt/jwt v3.2.1+incompatible h1:73Z+4BJcrTC+KczS6WvTPvRGOp1WmfEP4Q1lOd9Z/+c= github.com/golang-jwt/jwt v3.2.1+incompatible/go.mod h1:8pz2t5EyA70fFQQSrl6XZXzqecmYZeUEB8OUGHkxJ+I= github.com/golang-jwt/jwt/v4 v4.0.0/go.mod h1:/xlHOz8bRuivTWchD4jCa+NbatV+wEUSzwAxVc6locg= github.com/golang-jwt/jwt/v4 v4.2.0/go.mod h1:/xlHOz8bRuivTWchD4jCa+NbatV+wEUSzwAxVc6locg= @@ -993,8 +978,8 @@ github.com/hashicorp/golang-lru v0.5.4 h1:YDjusn29QI/Das2iO9M0BHnIbxPeyuCHsjMW+l github.com/hashicorp/golang-lru v0.5.4/go.mod h1:iADmTwqILo4mZ8BN3D2Q6+9jd8WM5uGBxy+E8yxSoD4= github.com/hashicorp/hcl v1.0.0 h1:0Anlzjpi4vEasTeNFn2mLJgTSwt0+6sfsiTG8qcWGx4= github.com/hashicorp/hcl v1.0.0/go.mod h1:E5yfLk+7swimpb2L/Alb/PJmXilQ/rhwaUYs4T20WEQ= -github.com/hashicorp/hcl/v2 v2.16.2 h1:mpkHZh/Tv+xet3sy3F9Ld4FyI2tUpWe9x3XtPx9f1a0= -github.com/hashicorp/hcl/v2 v2.16.2/go.mod h1:JRmR89jycNkrrqnMmvPDMd56n1rQJ2Q6KocSLCMCXng= +github.com/hashicorp/hcl/v2 v2.17.0 h1:z1XvSUyXd1HP10U4lrLg5e0JMVz6CPaJvAgxM0KNZVY= +github.com/hashicorp/hcl/v2 v2.17.0/go.mod h1:gJyW2PTShkJqQBKpAmPO3yxMxIuoXkOF2TpqXzrQyx4= github.com/hashicorp/logutils v1.0.0/go.mod h1:QIAnNjmIWmVIIkWDTG1z5v++HQmx9WQRO+LraFDTW64= github.com/hashicorp/mdns v1.0.0/go.mod h1:tL+uN++7HEJ6SQLQ2/p+z2pH24WQKWjBPkE0mNTz8vQ= github.com/hashicorp/mdns v1.0.4/go.mod h1:mtBihi+LeNXGtG8L9dX59gAEa12BDtBQSp4v/YAJqrc= @@ -1016,9 +1001,6 @@ github.com/hashicorp/yamux v0.1.1 h1:yrQxtgseBDrq9Y652vSRDvsKCJKOUD+GzTS4Y0Y8pvE github.com/hashicorp/yamux v0.1.1/go.mod h1:CtWFDAQgb7dxtzFs4tWbplKIe2jSi3+5vKbgIO0SLnQ= github.com/hetznercloud/hcloud-go v1.33.1/go.mod h1:XX/TQub3ge0yWR2yHWmnDVIrB+MQbda1pHxkUmDlUME= github.com/hetznercloud/hcloud-go v1.35.0/go.mod h1:mepQwR6va27S3UQthaEPGS86jtzSY9xWL1e9dyxXpgA= -github.com/hinshun/vt10x v0.0.0-20220119200601-820417d04eec/go.mod h1:Q48J4R4DvxnHolD5P8pOtXigYlRuPLGl6moFx3ulM68= -github.com/hinshun/vt10x v0.0.0-20220301184237-5011da428d02 h1:AgcIVYPa6XJnU3phs104wLj8l5GEththEw6+F79YsIY= -github.com/hinshun/vt10x v0.0.0-20220301184237-5011da428d02/go.mod h1:Q48J4R4DvxnHolD5P8pOtXigYlRuPLGl6moFx3ulM68= github.com/hpcloud/tail v1.0.0/go.mod h1:ab1qPbhIpdTxEkNHXyeSf5vhxWSCs/tWer42PpOxQnU= github.com/hudl/fargo v1.3.0/go.mod h1:y3CKSmjA+wD2gak7sUSXTAoopbhU08POFhmITJgmKTg= github.com/iancoleman/strcase v0.2.0/go.mod h1:iwCmte+B7n89clKwxIoIXy/HfoL7AsD47ZCWhYzw7ho= @@ -1026,8 +1008,6 @@ github.com/ianlancetaylor/demangle v0.0.0-20181102032728-5e5cf60278f6/go.mod h1: github.com/ianlancetaylor/demangle v0.0.0-20200824232613-28f6c0f3b639/go.mod h1:aSSvb/t6k1mPoxDqO4vJh6VOCGPwU4O0C2/Eqndh1Sc= github.com/ianlancetaylor/demangle v0.0.0-20210905161508-09a460cdf81d/go.mod h1:aYm2/VgdVmcIU8iMfdMvDMsRAQjcfZSKFby6HOFvi/w= github.com/ianlancetaylor/demangle v0.0.0-20220319035150-800ac71e25c2/go.mod h1:aYm2/VgdVmcIU8iMfdMvDMsRAQjcfZSKFby6HOFvi/w= -github.com/ijc/Gotty v0.0.0-20170406111628-a8b993ba6abd h1:anPrsicrIi2ColgWTVPk+TrN42hJIWlfPHSBP9S0ZkM= -github.com/ijc/Gotty v0.0.0-20170406111628-a8b993ba6abd/go.mod h1:3LVOLeyx9XVvwPgrt2be44XgSqndprz1G18rSk8KD84= github.com/imdario/mergo v0.3.5/go.mod h1:2EnlNZ0deacrJVfApfmtdGgDfMuh/nq6Ok1EcJh5FfA= github.com/imdario/mergo v0.3.8/go.mod h1:2EnlNZ0deacrJVfApfmtdGgDfMuh/nq6Ok1EcJh5FfA= github.com/imdario/mergo v0.3.10/go.mod h1:jmQim1M+e3UYxmgPu/WyfjB3N3VflVyUjjjwH0dnCYA= @@ -1115,8 +1095,6 @@ github.com/julienschmidt/httprouter v1.2.0/go.mod h1:SYymIcj16QtmaHHD7aYtjjsJG7V github.com/julienschmidt/httprouter v1.3.0/go.mod h1:JR6WtHb+2LUe8TCKY3cZOxFyyO8IZAc4RVcycCCAKdM= github.com/karrick/godirwalk v1.8.0/go.mod h1:H5KPZjojv4lE+QYImBI8xVtrBRgYrIVsaRPx4tDPEn4= github.com/karrick/godirwalk v1.10.3/go.mod h1:RoGL9dQei4vP9ilrpETWE8CLOZ1kiN0LhBygSwrAsHA= -github.com/kballard/go-shellquote v0.0.0-20180428030007-95032a82bc51 h1:Z9n2FFNUXsshfwJMBgNA0RU6/i7WVaAegv3PtuIHPMs= -github.com/kballard/go-shellquote v0.0.0-20180428030007-95032a82bc51/go.mod h1:CzGEWj7cYgsdH8dAjBGEr58BoE7ScuLd+fwFZ44+/x8= github.com/kevinburke/ssh_config v1.2.0 h1:x584FjTGwHzMwvHx18PXxbBVzfnxogHaAReU4gf13a4= github.com/kevinburke/ssh_config v1.2.0/go.mod h1:CT57kijsi8u/K/BOFA39wgDQJ9CxiF4nAY/ojJ6r6mM= github.com/kisielk/errcheck v1.1.0/go.mod h1:EZBBE59ingxPouuu3KfxchcWSUPOHkagtvWXihfKN4Q= @@ -1137,9 +1115,8 @@ github.com/kr/logfmt v0.0.0-20140226030751-b84e30acd515/go.mod h1:+0opPa2QZZtGFB github.com/kr/pretty v0.1.0/go.mod h1:dAy3ld7l9f0ibDNOQOHHMYYIIbhfbHSm3C4ZsoJORNo= github.com/kr/pretty v0.2.0/go.mod h1:ipq/a2n7PKx3OHsz4KJII5eveXtPO4qwEXGdVfWzfnI= github.com/kr/pretty v0.2.1/go.mod h1:ipq/a2n7PKx3OHsz4KJII5eveXtPO4qwEXGdVfWzfnI= +github.com/kr/pretty v0.3.0 h1:WgNl7dwNpEZ6jJ9k1snq4pZsg7DOEN8hP9Xw0Tsjwk0= github.com/kr/pretty v0.3.0/go.mod h1:640gp4NfQd8pI5XOwp5fnNeVWj67G7CFk/SaSQn7NBk= -github.com/kr/pretty v0.3.1 h1:flRD4NNwYAUpkphVc1HcthR4KEIFJ65n8Mw5qdRn3LE= -github.com/kr/pretty v0.3.1/go.mod h1:hoEshYVHaxMs3cyo3Yncou5ZscifuDolrwPKZanG3xk= github.com/kr/pty v1.1.1/go.mod h1:pFQYn66WHrOpPYNljwOMqo10TkYh1fy3cYio2l3bCsQ= github.com/kr/pty v1.1.5/go.mod h1:9r2w37qlBe7rQ6e1fg1S/9xpWHSnaqNdHD3WcMdbPDA= github.com/kr/pty v1.1.8/go.mod h1:O1sed60cT9XZ5uDucP5qwvh+TE3NnUj51EiZO/lmSfw= @@ -1147,7 +1124,6 @@ github.com/kr/text v0.1.0/go.mod h1:4Jbv+DJW3UT/LiOwJeYQe1efqtUx/iVham/4vfdArNI= github.com/kr/text v0.2.0 h1:5Nx0Ya0ZqY2ygV366QzturHI13Jq95ApcVaJBhpS+AY= github.com/kr/text v0.2.0/go.mod h1:eLer722TekiGuMkidMxC/pM04lWEeraHUUmBw8l2grE= github.com/kylelemons/godebug v0.0.0-20170820004349-d65d576e9348/go.mod h1:B69LEHPfb2qLo0BaaOLcbitczOKLWTsrBG9LczfCD4k= -github.com/kylelemons/godebug v1.1.0 h1:RPNrshWIDI6G2gRW9EHilWtl7Z6Sb1BR0xunSBf0SNc= github.com/kylelemons/godebug v1.1.0/go.mod h1:9/0rRGxNHcop5bhtWyNeEfOS8JIWk580+fNqagV/RAw= github.com/leodido/go-urn v1.2.0/go.mod h1:+8+nEpDfqqsY+g338gtMEUOtuK+4dEMhiQEgxpxOKII= github.com/lib/pq v1.0.0/go.mod h1:5WUZQaWbwv1U+lTReE5YruASi9Al49XbQIvNi/34Woo= @@ -1179,7 +1155,6 @@ github.com/matryer/is v1.2.0 h1:92UTHpy8CDwaJ08GqLDzhhuixiBUUD1p3AU6PHddz4A= github.com/matryer/is v1.2.0/go.mod h1:2fLPjFQM9rhQ15aVEtbuwhJinnOqrmgXPNdZsdwlWXA= github.com/mattn/go-colorable v0.0.9/go.mod h1:9vuHe8Xs5qXnSaW/c/ABM9alt+Vo+STaOChaDxuIBZU= github.com/mattn/go-colorable v0.1.1/go.mod h1:FuOcm+DKB9mbwrcAfNl7/TZVBZ6rcnceauSikq3lYCQ= -github.com/mattn/go-colorable v0.1.2/go.mod h1:U0ppj6V5qS13XJ6of8GYAs25YV2eR4EVcfRqFIhoBtE= github.com/mattn/go-colorable v0.1.4/go.mod h1:U0ppj6V5qS13XJ6of8GYAs25YV2eR4EVcfRqFIhoBtE= github.com/mattn/go-colorable v0.1.6/go.mod h1:u6P/XSegPjTcexA+o6vUJrdnUu04hMope9wVRipJSqc= github.com/mattn/go-colorable v0.1.8/go.mod h1:u6P/XSegPjTcexA+o6vUJrdnUu04hMope9wVRipJSqc= @@ -1210,8 +1185,6 @@ github.com/mattn/go-shellwords v1.0.12/go.mod h1:EZzvwXDESEeg03EKmM+RmDnNOPKG4lL github.com/matttproud/golang_protobuf_extensions v1.0.1/go.mod h1:D8He9yQNgCq6Z5Ld7szi9bcBfOoFv/3dc6xSMkL2PC0= github.com/matttproud/golang_protobuf_extensions v1.0.2-0.20181231171920-c182affec369/go.mod h1:BSXmuO+STAnVfrANrmjBb36TMTDstsz7MSK+HVaYKv4= github.com/maxbrunsfeld/counterfeiter/v6 v6.2.2/go.mod h1:eD9eIE7cdwcMi9rYluz88Jz2VyhSmden33/aXg4oVIY= -github.com/mgutz/ansi v0.0.0-20170206155736-9520e82c474b h1:j7+1HpAFS1zy5+Q4qx1fWh90gTKwiN4QCGoY9TWyyO4= -github.com/mgutz/ansi v0.0.0-20170206155736-9520e82c474b/go.mod h1:01TrycV0kFyexm33Z7vhZRXopbI8J3TDReVlkTgMUxE= github.com/microsoft/ApplicationInsights-Go v0.4.4/go.mod h1:fKRUseBqkw6bDiXTs3ESTiU/4YTIHsQS4W3fP2ieF4U= github.com/miekg/dns v1.0.14/go.mod h1:W1PPwlIAgtquWBMBEV9nkV9Cazfe8ScdGz/Lj7v3Nrg= github.com/miekg/dns v1.1.26/go.mod h1:bPDLeHnStXmXAq1m/Ch/hvfNHr14JKNPMBo3VZKjuso= @@ -1390,7 +1363,6 @@ github.com/pierrec/lz4 v2.6.1+incompatible/go.mod h1:pdkljMzZIN41W+lC3N2tnIh5sFi github.com/pjbgf/sha1cd v0.3.0 h1:4D5XXmUUBUl/xQ6IjCkEAbqXskkq/4O7LmGn0AqMDs4= github.com/pjbgf/sha1cd v0.3.0/go.mod h1:nZ1rrWOcGJ5uZgEEVL1VUM9iRQiZvWdbZjkKyFzPPsI= github.com/pkg/browser v0.0.0-20180916011732-0a3d74bf9ce4/go.mod h1:4OwLy04Bl9Ef3GJJCoec+30X3LQs/0/m4HFRt/2LUSA= -github.com/pkg/browser v0.0.0-20210115035449-ce105d075bb4 h1:Qj1ukM4GlMWXNdMBuXcXfz/Kw9s1qm0CLY32QxuSImI= github.com/pkg/browser v0.0.0-20210115035449-ce105d075bb4/go.mod h1:N6UoU20jOqggOuDwUaBQpluzLNDqif3kq9z2wpdYEfQ= github.com/pkg/errors v0.8.0/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0= github.com/pkg/errors v0.8.1-0.20171018195549-f15c970de5b7/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0= @@ -1462,10 +1434,12 @@ github.com/prometheus/procfs v0.7.3/go.mod h1:cz+aTbrPOrUb4q7XlbU9ygM+/jj0fzG6c1 github.com/prometheus/prometheus v0.35.0/go.mod h1:7HaLx5kEPKJ0GDgbODG0fZgXbQ8K/XjZNJXQmbmgQlY= github.com/prometheus/prometheus v0.37.0/go.mod h1:egARUgz+K93zwqsVIAneFlLZefyGOON44WyAp4Xqbbk= github.com/prometheus/tsdb v0.7.1/go.mod h1:qhTCs0VvXwvX/y3TZrWD7rabWM+ijKTux40TwIPHuXU= -github.com/pulumi/pulumi/pkg/v3 v3.86.0 h1:G4spuT89ZN8lSxT9WkMF/JaP7n+wu7ubEly7Yy8uza0= -github.com/pulumi/pulumi/pkg/v3 v3.86.0/go.mod h1:Qs55gPhUwM/Dua3VRtHXLLlpY8uEe+llDBIZc+1pvHM= -github.com/pulumi/pulumi/sdk/v3 v3.86.0 h1:Cxg0rGdvMt9GqGvesFTj8+WaO/ihmALYlQf4zm1GzFw= -github.com/pulumi/pulumi/sdk/v3 v3.86.0/go.mod h1:vexSGJ5L834l3T7Fo/KpdywjGAgZ2CvChuqGFl+ebS0= +github.com/pulumi/esc v0.5.6 h1:4WV3X7OEVcChIwbSG+JxhZDdmq/q7lFPaSjHRYlPwmI= +github.com/pulumi/esc v0.5.6/go.mod h1:wpwNfVS5fV7Kd51j4dJ6FWYlKfxdqyppgp0gtkzqH04= +github.com/pulumi/pulumi/pkg/v3 v3.90.1 h1:RFC/eqTbDfIvfeVQL8WaPmyQr1KzZhAGIIDGr9jj9y8= +github.com/pulumi/pulumi/pkg/v3 v3.90.1/go.mod h1:J+WbfN30g3FfQifpLjQPI0UhPsC9ASEePLK8Nix06A8= +github.com/pulumi/pulumi/sdk/v3 v3.90.1 h1:iT4t57N92WGhEQtg+KVDEmYzgfEyri39eihQzcNmtrM= +github.com/pulumi/pulumi/sdk/v3 v3.90.1/go.mod h1:zYaQQibB2pYKy/uG4c4YkX7lQIBpZ0KsuMaq/3HsIBQ= github.com/rakyll/embedmd v0.0.0-20171029212350-c8060a0752a2/go.mod h1:7jOTMgqac46PZcF54q6l2hkLEG8op93fZu61KmxWDV4= github.com/rcrowley/go-metrics v0.0.0-20181016184325-3113b8401b8a/go.mod h1:bCqnVzQkZxMG4s8nGwiZ5l3QUCyqpo9Y+/ZMZ9VjZe4= github.com/rivo/uniseg v0.1.0/go.mod h1:J6wj4VEh+S6ZtnVlnTBMWIodfgj8LQOQFoIToxlJtxc= @@ -1478,8 +1452,8 @@ github.com/rogpeppe/go-internal v1.1.0/go.mod h1:M8bDsm7K2OlrFYOpmOWEs/qY81heoFR github.com/rogpeppe/go-internal v1.2.2/go.mod h1:M8bDsm7K2OlrFYOpmOWEs/qY81heoFRclV5y23lUDJ4= github.com/rogpeppe/go-internal v1.3.0/go.mod h1:M8bDsm7K2OlrFYOpmOWEs/qY81heoFRclV5y23lUDJ4= github.com/rogpeppe/go-internal v1.6.1/go.mod h1:xXDCJY+GAPziupqXw64V24skbSoqbTEfhy4qGm1nDQc= -github.com/rogpeppe/go-internal v1.9.0 h1:73kH8U+JUqXU8lRuOHeVHaa/SZPifC7BkcraZVejAe8= -github.com/rogpeppe/go-internal v1.9.0/go.mod h1:WtVeX8xhTBvf0smdhujwtBcq4Qrzq/fJaraNFVN+nFs= +github.com/rogpeppe/go-internal v1.11.0 h1:cWPaGQEPrBb5/AsnsZesgZZ9yb1OQ+GOISoDNXVBh4M= +github.com/rogpeppe/go-internal v1.11.0/go.mod h1:ddIwULY96R17DhadqLgMfk9H9tvdUzkipdSkR5nkCZA= github.com/rs/cors v1.8.2/go.mod h1:XyqrcTp5zjWr1wsJ8PIRZssZ8b/WMcMf71DJnit4EMU= github.com/rs/xid v1.2.1/go.mod h1:+uKXf+4Djp6Md1KODXJxgGQPKngRmWyn10oCKFzNHOQ= github.com/rs/zerolog v1.13.0/go.mod h1:YbFCdg8HfsridGWAh22vktObvhZbQsZXe4/zB0OKkWU= @@ -1579,8 +1553,8 @@ github.com/stretchr/testify v1.7.2/go.mod h1:R6va5+xMeoiuVRoj+gSkQ7d3FALtqAAGI1F github.com/stretchr/testify v1.7.5/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO+kdMU+MU= github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO+kdMU+MU= github.com/stretchr/testify v1.8.1/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4= -github.com/stretchr/testify v1.8.3 h1:RP3t2pwF7cMEbC1dqtB6poj3niw/9gnV4Cjg5oW5gtY= -github.com/stretchr/testify v1.8.3/go.mod h1:sz/lmYIOXD/1dqDmKjjqLyZ2RngseejIcXlSw2iwfAo= +github.com/stretchr/testify v1.8.4 h1:CcVxjf3Q8PM0mHUKJCdn+eZZtm5yQwehR5yeSVQQcUk= +github.com/stretchr/testify v1.8.4/go.mod h1:sz/lmYIOXD/1dqDmKjjqLyZ2RngseejIcXlSw2iwfAo= github.com/subosito/gotenv v1.2.0/go.mod h1:N0PQaV/YGNqwC0u51sEeR/aUtSLEXKX9iv69rRypqCw= github.com/syndtr/gocapability v0.0.0-20170704070218-db04d3cc01c8/go.mod h1:hkRG7XYTFWNJGYcbNJQlaLq0fg1yr4J4t/NcTQtrfww= github.com/syndtr/gocapability v0.0.0-20180916011248-d98352740cb2/go.mod h1:hkRG7XYTFWNJGYcbNJQlaLq0fg1yr4J4t/NcTQtrfww= @@ -1786,8 +1760,8 @@ golang.org/x/crypto v0.0.0-20220722155217-630584e8d5aa/go.mod h1:IxCIyHEi3zRg3s0 golang.org/x/crypto v0.0.0-20220826181053-bd7e27e6170d/go.mod h1:IxCIyHEi3zRg3s0A5j5BB6A9Jmi73HwBIUl50j+osU4= golang.org/x/crypto v0.1.0/go.mod h1:RecgLatLF4+eUMCP1PoPZQb+cVrJcOPbHkTkbkB9sbw= golang.org/x/crypto v0.3.0/go.mod h1:hebNnKkNXi2UzZN1eVRvBB7co0a+JxK6XbPiWVs/3J4= -golang.org/x/crypto v0.9.0 h1:LF6fAI+IutBocDJ2OT0Q1g8plpYljMZ4+lty+dsqw3g= -golang.org/x/crypto v0.9.0/go.mod h1:yrmDGqONDYtNj3tH8X9dzUun2m2lzPa9ngI6/RUPGR0= +golang.org/x/crypto v0.14.0 h1:wBqGXzWJW6m1XrIKlAH0Hs1JJ7+9KBwnIO8v66Q9cHc= +golang.org/x/crypto v0.14.0/go.mod h1:MVFd36DqK4CsrnJYDkBA3VC4m2GkXAM0PvzMCn4JQf4= golang.org/x/exp v0.0.0-20190121172915-509febef88a4/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA= golang.org/x/exp v0.0.0-20190306152737-a1d7652674e8/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA= golang.org/x/exp v0.0.0-20190510132918-efd6b22b2522/go.mod h1:ZjyILWgesfNpC6sMxTJOJm9Kp84zZh5NQWvqDGG3Qr8= @@ -1798,6 +1772,8 @@ golang.org/x/exp v0.0.0-20191227195350-da58074b4299/go.mod h1:2RIsYlXP63K8oxa1u0 golang.org/x/exp v0.0.0-20200119233911-0405dc783f0a/go.mod h1:2RIsYlXP63K8oxa1u096TMicItID8zy7Y6sNkU49FU4= golang.org/x/exp v0.0.0-20200207192155-f17229e696bd/go.mod h1:J/WKrq2StrnmMY6+EHIKF9dgMWnmCNThgcyBT1FY9mM= golang.org/x/exp v0.0.0-20200224162631-6cc2880d07d6/go.mod h1:3jZMyOhIsHpP37uCMkUooju7aAi5cS1Q23tOzKc+0MU= +golang.org/x/exp v0.0.0-20231006140011-7918f672742d h1:jtJma62tbqLibJ5sFQz8bKtEM8rJBtfilJ2qTU199MI= +golang.org/x/exp v0.0.0-20231006140011-7918f672742d/go.mod h1:ldy0pHrwJyGW56pPQzzkH36rKxoZW1tw7ZJpeKx+hdo= golang.org/x/image v0.0.0-20190227222117-0694c2d4d067/go.mod h1:kZ7UVZpmo3dzQBMxlp+ypCbDeSB+sBbTgSJuh5dn5js= golang.org/x/image v0.0.0-20190802002840-cff245a6509b/go.mod h1:FeLwcggjj3mMvU+oOTbSwawSJRM1uh48EjtB4UJZlP0= golang.org/x/lint v0.0.0-20181026193005-c67002cb31c3/go.mod h1:UVdnD1Gm6xHRNCYTkRU2/jEulfH38KcIWyp/GAMgvoE= @@ -1828,8 +1804,8 @@ golang.org/x/mod v0.5.1/go.mod h1:5OXOZSfqPIIbmVBIIKWRFfZjPR0E5r58TLhUjH0a2Ro= golang.org/x/mod v0.6.0-dev.0.20220106191415-9b9b3d81d5e3/go.mod h1:3p9vT2HGsQu2K1YbXdKPJLVgG5VJdoTa1poYQBtP1AY= golang.org/x/mod v0.6.0-dev.0.20220419223038-86c51ed26bb4/go.mod h1:jJ57K6gSWd91VN4djpZkiMVwK6gcyfeH4XE8wZrZaV4= golang.org/x/mod v0.6.0/go.mod h1:4mET923SAdbXp2ki8ey+zGs1SLqsuM2Y0uvdZR/fUNI= -golang.org/x/mod v0.10.0 h1:lFO9qtOdlre5W1jxS3r/4szv2/6iXxScdzjoBMXNhYk= -golang.org/x/mod v0.10.0/go.mod h1:iBbtSCu2XBx23ZKBPSOrRkjjQPZFPuis4dIYUhu/chs= +golang.org/x/mod v0.13.0 h1:I/DsJXRlw/8l/0c24sM9yb0T4z9liZTduXvdAWYiysY= +golang.org/x/mod v0.13.0/go.mod h1:hTbmBsO62+eylJbnUtE2MGJUyE7QWk4xUqPFrRgJ+7c= golang.org/x/net v0.0.0-20180530234432-1e491301e022/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= golang.org/x/net v0.0.0-20180724234803-3673e40ba225/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= golang.org/x/net v0.0.0-20180826012351-8a410e7b638d/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= @@ -1912,8 +1888,8 @@ golang.org/x/net v0.0.0-20220802222814-0bcc04d9c69b/go.mod h1:YDH+HFinaLZZlnHAfS golang.org/x/net v0.0.0-20220826154423-83b083e8dc8b/go.mod h1:YDH+HFinaLZZlnHAfSS6ZXJJ9M9t4Dl22yv3iI2vPwk= golang.org/x/net v0.1.0/go.mod h1:Cx3nUiGt4eDBEyega/BKRp+/AlGL8hYe7U9odMt2Cco= golang.org/x/net v0.2.0/go.mod h1:KqCZLdyyvdV855qA2rE3GC2aiw5xGR5TEjj8smXukLY= -golang.org/x/net v0.10.0 h1:X2//UzNDwYmtCLn7To6G58Wr6f5ahEAQgKNzv9Y951M= -golang.org/x/net v0.10.0/go.mod h1:0qNGK6F8kojg2nk9dLZ2mShWaEBan6FAoqfSigmmuDg= +golang.org/x/net v0.17.0 h1:pVaXccu2ozPjCXewfr1S7xza/zcXTity9cCdXQYSjIM= +golang.org/x/net v0.17.0/go.mod h1:NxSsAGuq816PNPmqtQdLE42eU2Fs7NoRIZrHJAlaCOE= golang.org/x/oauth2 v0.0.0-20180821212333-d2e6202438be/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U= golang.org/x/oauth2 v0.0.0-20190226205417-e64efc72b421/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw= golang.org/x/oauth2 v0.0.0-20190604053449-0f29369cfe45/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw= @@ -2104,8 +2080,8 @@ golang.org/x/sys v0.1.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/sys v0.2.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/sys v0.3.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= -golang.org/x/sys v0.9.0 h1:KS/R3tvhPqvJvwcKfnBHJwwthS11LRhmM5D59eEXa0s= -golang.org/x/sys v0.9.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= +golang.org/x/sys v0.13.0 h1:Af8nKPmuFypiUBjVoU9V20FiaFXOcuZI21p0ycVYYGE= +golang.org/x/sys v0.13.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/term v0.0.0-20201117132131-f5c789dd3221/go.mod h1:Nr5EML6q2oocZ2LXRh80K7BxOlk5/8JxuGnuhpl+muw= golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo= golang.org/x/term v0.0.0-20210220032956-6a3ed077a48d/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo= @@ -2114,8 +2090,8 @@ golang.org/x/term v0.0.0-20210927222741-03fcf44c2211/go.mod h1:jbD1KX2456YbFQfuX golang.org/x/term v0.0.0-20220722155259-a9ba230a4035/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8= golang.org/x/term v0.1.0/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8= golang.org/x/term v0.2.0/go.mod h1:TVmDHMZPmdnySmBfhjOoOdhjzdE1h4u1VwSiw2l1Nuc= -golang.org/x/term v0.8.0 h1:n5xxQn2i3PC0yLAbjTpNT85q/Kgzcr2gIoX9OrJUols= -golang.org/x/term v0.8.0/go.mod h1:xPskH00ivmX89bAKVGSKKtLOWNx2+17Eiy94tnKShWo= +golang.org/x/term v0.13.0 h1:bb+I9cTfFazGW51MZqBVmZy7+JEJMouUHTUSKVQLBek= +golang.org/x/term v0.13.0/go.mod h1:LTmsnFJwVN6bCy1rVCoS+qHT1HhALEFxKncY3WNNh4U= golang.org/x/text v0.0.0-20170915032832-14c0d48ead0c/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= golang.org/x/text v0.3.1-0.20180807135948-17ff2d5776d2/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= @@ -2127,8 +2103,8 @@ golang.org/x/text v0.3.6/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ= golang.org/x/text v0.3.7/go.mod h1:u+2+/6zg+i71rQMx5EYifcz6MCKuco9NR6JIITiCfzQ= golang.org/x/text v0.3.8/go.mod h1:E6s5w1FMmriuDzIBO73fBruAKo1PCIq6d2Q6DHfQ8WQ= golang.org/x/text v0.4.0/go.mod h1:mrYo+phRRbMaCq/xk9113O4dZlRixOauAjOtrjsXDZ8= -golang.org/x/text v0.9.0 h1:2sjJmO8cDvYveuX97RDLsxlyUxLl+GHoLxBiRdHllBE= -golang.org/x/text v0.9.0/go.mod h1:e1OnstbJyHTd6l/uOt8jFFHp6TRDWZR/bV3emEE/zU8= +golang.org/x/text v0.13.0 h1:ablQoSUd0tRdKxZewP80B+BaqeKJuVhuRxj/dkrun3k= +golang.org/x/text v0.13.0/go.mod h1:TvPlkZtksWOMsz7fbANvkp4WM8x/WCo/om8BMLbz+aE= golang.org/x/time v0.0.0-20180412165947-fbb02b2291d2/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ= golang.org/x/time v0.0.0-20181108054448-85acf8d2951c/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ= golang.org/x/time v0.0.0-20190308202827-9d24e82272b4/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ= diff --git a/provider/cmd/pulumi-resource-auth0/schema.json b/provider/cmd/pulumi-resource-auth0/schema.json index c1b3a278..e375f714 100644 --- a/provider/cmd/pulumi-resource-auth0/schema.json +++ b/provider/cmd/pulumi-resource-auth0/schema.json @@ -6311,7 +6311,7 @@ } }, "auth0:index/client:Client": { - "description": "With this resource, you can set up applications that use Auth0 for authentication and configure allowed callback URLs and secrets for these applications.\n\n{{% examples %}}\n## Example Usage\n{{% example %}}\n\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as auth0 from \"@pulumi/auth0\";\n\nconst myClient = new auth0.Client(\"myClient\", {\n addons: {\n samlp: {\n audience: \"https://example.com/saml\",\n createUpnClaim: false,\n issuer: \"https://example.com\",\n mapIdentities: false,\n mapUnknownClaimsAsIs: false,\n mappings: {\n email: \"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress\",\n name: \"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name\",\n },\n nameIdentifierFormat: \"urn:oasis:names:tc:SAML:2.0:nameid-format:persistent\",\n nameIdentifierProbes: [\"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress\"],\n passthroughClaimsWithNoMapping: false,\n signingCert: `-----BEGIN PUBLIC KEY-----\nMIGf...bpP/t3\n+JGNGIRMj1hF1rnb6QIDAQAB\n-----END PUBLIC KEY-----\n\n`,\n },\n },\n allowedLogoutUrls: [\"https://example.com\"],\n allowedOrigins: [\"https://example.com\"],\n appType: \"non_interactive\",\n callbacks: [\"https://example.com/callback\"],\n clientMetadata: {\n foo: \"zoo\",\n },\n customLoginPageOn: true,\n description: \"Test Applications Long Description\",\n grantTypes: [\n \"authorization_code\",\n \"http://auth0.com/oauth/grant-type/password-realm\",\n \"implicit\",\n \"password\",\n \"refresh_token\",\n ],\n isFirstParty: true,\n isTokenEndpointIpHeaderTrusted: true,\n jwtConfiguration: {\n alg: \"RS256\",\n lifetimeInSeconds: 300,\n scopes: {\n foo: \"bar\",\n },\n secretEncoded: true,\n },\n mobile: {\n ios: {\n appBundleIdentifier: \"com.my.bundle.id\",\n teamId: \"9JA89QQLNQ\",\n },\n },\n oidcConformant: false,\n refreshToken: {\n expirationType: \"expiring\",\n leeway: 0,\n rotationType: \"rotating\",\n tokenLifetime: 2592000,\n },\n webOrigins: [\"https://example.com\"],\n});\n```\n```python\nimport pulumi\nimport pulumi_auth0 as auth0\n\nmy_client = auth0.Client(\"myClient\",\n addons=auth0.ClientAddonsArgs(\n samlp=auth0.ClientAddonsSamlpArgs(\n audience=\"https://example.com/saml\",\n create_upn_claim=False,\n issuer=\"https://example.com\",\n map_identities=False,\n map_unknown_claims_as_is=False,\n mappings={\n \"email\": \"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress\",\n \"name\": \"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name\",\n },\n name_identifier_format=\"urn:oasis:names:tc:SAML:2.0:nameid-format:persistent\",\n name_identifier_probes=[\"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress\"],\n passthrough_claims_with_no_mapping=False,\n signing_cert=\"\"\"-----BEGIN PUBLIC KEY-----\nMIGf...bpP/t3\n+JGNGIRMj1hF1rnb6QIDAQAB\n-----END PUBLIC KEY-----\n\n\"\"\",\n ),\n ),\n allowed_logout_urls=[\"https://example.com\"],\n allowed_origins=[\"https://example.com\"],\n app_type=\"non_interactive\",\n callbacks=[\"https://example.com/callback\"],\n client_metadata={\n \"foo\": \"zoo\",\n },\n custom_login_page_on=True,\n description=\"Test Applications Long Description\",\n grant_types=[\n \"authorization_code\",\n \"http://auth0.com/oauth/grant-type/password-realm\",\n \"implicit\",\n \"password\",\n \"refresh_token\",\n ],\n is_first_party=True,\n is_token_endpoint_ip_header_trusted=True,\n jwt_configuration=auth0.ClientJwtConfigurationArgs(\n alg=\"RS256\",\n lifetime_in_seconds=300,\n scopes={\n \"foo\": \"bar\",\n },\n secret_encoded=True,\n ),\n mobile=auth0.ClientMobileArgs(\n ios=auth0.ClientMobileIosArgs(\n app_bundle_identifier=\"com.my.bundle.id\",\n team_id=\"9JA89QQLNQ\",\n ),\n ),\n oidc_conformant=False,\n refresh_token=auth0.ClientRefreshTokenArgs(\n expiration_type=\"expiring\",\n leeway=0,\n rotation_type=\"rotating\",\n token_lifetime=2592000,\n ),\n web_origins=[\"https://example.com\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Auth0 = Pulumi.Auth0;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var myClient = new Auth0.Client(\"myClient\", new()\n {\n Addons = new Auth0.Inputs.ClientAddonsArgs\n {\n Samlp = new Auth0.Inputs.ClientAddonsSamlpArgs\n {\n Audience = \"https://example.com/saml\",\n CreateUpnClaim = false,\n Issuer = \"https://example.com\",\n MapIdentities = false,\n MapUnknownClaimsAsIs = false,\n Mappings = \n {\n { \"email\", \"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress\" },\n { \"name\", \"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name\" },\n },\n NameIdentifierFormat = \"urn:oasis:names:tc:SAML:2.0:nameid-format:persistent\",\n NameIdentifierProbes = new[]\n {\n \"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress\",\n },\n PassthroughClaimsWithNoMapping = false,\n SigningCert = @\"-----BEGIN PUBLIC KEY-----\nMIGf...bpP/t3\n+JGNGIRMj1hF1rnb6QIDAQAB\n-----END PUBLIC KEY-----\n\n\",\n },\n },\n AllowedLogoutUrls = new[]\n {\n \"https://example.com\",\n },\n AllowedOrigins = new[]\n {\n \"https://example.com\",\n },\n AppType = \"non_interactive\",\n Callbacks = new[]\n {\n \"https://example.com/callback\",\n },\n ClientMetadata = \n {\n { \"foo\", \"zoo\" },\n },\n CustomLoginPageOn = true,\n Description = \"Test Applications Long Description\",\n GrantTypes = new[]\n {\n \"authorization_code\",\n \"http://auth0.com/oauth/grant-type/password-realm\",\n \"implicit\",\n \"password\",\n \"refresh_token\",\n },\n IsFirstParty = true,\n IsTokenEndpointIpHeaderTrusted = true,\n JwtConfiguration = new Auth0.Inputs.ClientJwtConfigurationArgs\n {\n Alg = \"RS256\",\n LifetimeInSeconds = 300,\n Scopes = \n {\n { \"foo\", \"bar\" },\n },\n SecretEncoded = true,\n },\n Mobile = new Auth0.Inputs.ClientMobileArgs\n {\n Ios = new Auth0.Inputs.ClientMobileIosArgs\n {\n AppBundleIdentifier = \"com.my.bundle.id\",\n TeamId = \"9JA89QQLNQ\",\n },\n },\n OidcConformant = false,\n RefreshToken = new Auth0.Inputs.ClientRefreshTokenArgs\n {\n ExpirationType = \"expiring\",\n Leeway = 0,\n RotationType = \"rotating\",\n TokenLifetime = 2592000,\n },\n WebOrigins = new[]\n {\n \"https://example.com\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := auth0.NewClient(ctx, \"myClient\", \u0026auth0.ClientArgs{\n\t\t\tAddons: \u0026auth0.ClientAddonsArgs{\n\t\t\t\tSamlp: \u0026auth0.ClientAddonsSamlpArgs{\n\t\t\t\t\tAudience: pulumi.String(\"https://example.com/saml\"),\n\t\t\t\t\tCreateUpnClaim: pulumi.Bool(false),\n\t\t\t\t\tIssuer: pulumi.String(\"https://example.com\"),\n\t\t\t\t\tMapIdentities: pulumi.Bool(false),\n\t\t\t\t\tMapUnknownClaimsAsIs: pulumi.Bool(false),\n\t\t\t\t\tMappings: pulumi.AnyMap{\n\t\t\t\t\t\t\"email\": pulumi.Any(\"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress\"),\n\t\t\t\t\t\t\"name\": pulumi.Any(\"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name\"),\n\t\t\t\t\t},\n\t\t\t\t\tNameIdentifierFormat: pulumi.String(\"urn:oasis:names:tc:SAML:2.0:nameid-format:persistent\"),\n\t\t\t\t\tNameIdentifierProbes: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress\"),\n\t\t\t\t\t},\n\t\t\t\t\tPassthroughClaimsWithNoMapping: pulumi.Bool(false),\n\t\t\t\t\tSigningCert: pulumi.String(`-----BEGIN PUBLIC KEY-----\nMIGf...bpP/t3\n+JGNGIRMj1hF1rnb6QIDAQAB\n-----END PUBLIC KEY-----\n\n`),\n\t\t\t\t},\n\t\t\t},\n\t\t\tAllowedLogoutUrls: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"https://example.com\"),\n\t\t\t},\n\t\t\tAllowedOrigins: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"https://example.com\"),\n\t\t\t},\n\t\t\tAppType: pulumi.String(\"non_interactive\"),\n\t\t\tCallbacks: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"https://example.com/callback\"),\n\t\t\t},\n\t\t\tClientMetadata: pulumi.AnyMap{\n\t\t\t\t\"foo\": pulumi.Any(\"zoo\"),\n\t\t\t},\n\t\t\tCustomLoginPageOn: pulumi.Bool(true),\n\t\t\tDescription: pulumi.String(\"Test Applications Long Description\"),\n\t\t\tGrantTypes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"authorization_code\"),\n\t\t\t\tpulumi.String(\"http://auth0.com/oauth/grant-type/password-realm\"),\n\t\t\t\tpulumi.String(\"implicit\"),\n\t\t\t\tpulumi.String(\"password\"),\n\t\t\t\tpulumi.String(\"refresh_token\"),\n\t\t\t},\n\t\t\tIsFirstParty: pulumi.Bool(true),\n\t\t\tIsTokenEndpointIpHeaderTrusted: pulumi.Bool(true),\n\t\t\tJwtConfiguration: \u0026auth0.ClientJwtConfigurationArgs{\n\t\t\t\tAlg: pulumi.String(\"RS256\"),\n\t\t\t\tLifetimeInSeconds: pulumi.Int(300),\n\t\t\t\tScopes: pulumi.StringMap{\n\t\t\t\t\t\"foo\": pulumi.String(\"bar\"),\n\t\t\t\t},\n\t\t\t\tSecretEncoded: pulumi.Bool(true),\n\t\t\t},\n\t\t\tMobile: \u0026auth0.ClientMobileArgs{\n\t\t\t\tIos: \u0026auth0.ClientMobileIosArgs{\n\t\t\t\t\tAppBundleIdentifier: pulumi.String(\"com.my.bundle.id\"),\n\t\t\t\t\tTeamId: pulumi.String(\"9JA89QQLNQ\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tOidcConformant: pulumi.Bool(false),\n\t\t\tRefreshToken: \u0026auth0.ClientRefreshTokenArgs{\n\t\t\t\tExpirationType: pulumi.String(\"expiring\"),\n\t\t\t\tLeeway: pulumi.Int(0),\n\t\t\t\tRotationType: pulumi.String(\"rotating\"),\n\t\t\t\tTokenLifetime: pulumi.Int(2592000),\n\t\t\t},\n\t\t\tWebOrigins: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"https://example.com\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.auth0.Client;\nimport com.pulumi.auth0.ClientArgs;\nimport com.pulumi.auth0.inputs.ClientAddonsArgs;\nimport com.pulumi.auth0.inputs.ClientAddonsSamlpArgs;\nimport com.pulumi.auth0.inputs.ClientJwtConfigurationArgs;\nimport com.pulumi.auth0.inputs.ClientMobileArgs;\nimport com.pulumi.auth0.inputs.ClientMobileIosArgs;\nimport com.pulumi.auth0.inputs.ClientRefreshTokenArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var myClient = new Client(\"myClient\", ClientArgs.builder() \n .addons(ClientAddonsArgs.builder()\n .samlp(ClientAddonsSamlpArgs.builder()\n .audience(\"https://example.com/saml\")\n .createUpnClaim(false)\n .issuer(\"https://example.com\")\n .mapIdentities(false)\n .mapUnknownClaimsAsIs(false)\n .mappings(Map.ofEntries(\n Map.entry(\"email\", \"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress\"),\n Map.entry(\"name\", \"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name\")\n ))\n .nameIdentifierFormat(\"urn:oasis:names:tc:SAML:2.0:nameid-format:persistent\")\n .nameIdentifierProbes(\"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress\")\n .passthroughClaimsWithNoMapping(false)\n .signingCert(\"\"\"\n-----BEGIN PUBLIC KEY-----\nMIGf...bpP/t3\n+JGNGIRMj1hF1rnb6QIDAQAB\n-----END PUBLIC KEY-----\n\n \"\"\")\n .build())\n .build())\n .allowedLogoutUrls(\"https://example.com\")\n .allowedOrigins(\"https://example.com\")\n .appType(\"non_interactive\")\n .callbacks(\"https://example.com/callback\")\n .clientMetadata(Map.of(\"foo\", \"zoo\"))\n .customLoginPageOn(true)\n .description(\"Test Applications Long Description\")\n .grantTypes( \n \"authorization_code\",\n \"http://auth0.com/oauth/grant-type/password-realm\",\n \"implicit\",\n \"password\",\n \"refresh_token\")\n .isFirstParty(true)\n .isTokenEndpointIpHeaderTrusted(true)\n .jwtConfiguration(ClientJwtConfigurationArgs.builder()\n .alg(\"RS256\")\n .lifetimeInSeconds(300)\n .scopes(Map.of(\"foo\", \"bar\"))\n .secretEncoded(true)\n .build())\n .mobile(ClientMobileArgs.builder()\n .ios(ClientMobileIosArgs.builder()\n .appBundleIdentifier(\"com.my.bundle.id\")\n .teamId(\"9JA89QQLNQ\")\n .build())\n .build())\n .oidcConformant(false)\n .refreshToken(ClientRefreshTokenArgs.builder()\n .expirationType(\"expiring\")\n .leeway(0)\n .rotationType(\"rotating\")\n .tokenLifetime(2592000)\n .build())\n .webOrigins(\"https://example.com\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n myClient:\n type: auth0:Client\n properties:\n addons:\n samlp:\n audience: https://example.com/saml\n createUpnClaim: false\n issuer: https://example.com\n mapIdentities: false\n mapUnknownClaimsAsIs: false\n mappings:\n email: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress\n name: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name\n nameIdentifierFormat: urn:oasis:names:tc:SAML:2.0:nameid-format:persistent\n nameIdentifierProbes:\n - http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress\n passthroughClaimsWithNoMapping: false\n signingCert: |+\n -----BEGIN PUBLIC KEY-----\n MIGf...bpP/t3\n +JGNGIRMj1hF1rnb6QIDAQAB\n -----END PUBLIC KEY-----\n\n allowedLogoutUrls:\n - https://example.com\n allowedOrigins:\n - https://example.com\n appType: non_interactive\n callbacks:\n - https://example.com/callback\n clientMetadata:\n foo: zoo\n customLoginPageOn: true\n description: Test Applications Long Description\n grantTypes:\n - authorization_code\n - http://auth0.com/oauth/grant-type/password-realm\n - implicit\n - password\n - refresh_token\n isFirstParty: true\n isTokenEndpointIpHeaderTrusted: true\n jwtConfiguration:\n alg: RS256\n lifetimeInSeconds: 300\n scopes:\n foo: bar\n secretEncoded: true\n mobile:\n ios:\n appBundleIdentifier: com.my.bundle.id\n teamId: 9JA89QQLNQ\n oidcConformant: false\n refreshToken:\n expirationType: expiring\n leeway: 0\n rotationType: rotating\n tokenLifetime: 2.592e+06\n webOrigins:\n - https://example.com\n```\n{{% /example %}}\n{{% /examples %}}\n\n## Import\n\nThis resource can be imported by specifying the client ID. # Example\n\n```sh\n $ pulumi import auth0:index/client:Client my_client \"AaiyAPdpYdesoKnqjj8HJqRn4T5titww\"\n```\n\n ", + "description": "With this resource, you can set up applications that use Auth0 for authentication and configure allowed callback URLs and secrets for these applications.\n\n{{% examples %}}\n## Example Usage\n{{% example %}}\n\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as auth0 from \"@pulumi/auth0\";\n\nconst myClient = new auth0.Client(\"myClient\", {\n addons: {\n samlp: {\n audience: \"https://example.com/saml\",\n createUpnClaim: false,\n issuer: \"https://example.com\",\n mapIdentities: false,\n mapUnknownClaimsAsIs: false,\n mappings: {\n email: \"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress\",\n name: \"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name\",\n },\n nameIdentifierFormat: \"urn:oasis:names:tc:SAML:2.0:nameid-format:persistent\",\n nameIdentifierProbes: [\"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress\"],\n passthroughClaimsWithNoMapping: false,\n signingCert: `-----BEGIN PUBLIC KEY-----\nMIGf...bpP/t3\n+JGNGIRMj1hF1rnb6QIDAQAB\n-----END PUBLIC KEY-----\n\n`,\n },\n },\n allowedLogoutUrls: [\"https://example.com\"],\n allowedOrigins: [\"https://example.com\"],\n appType: \"non_interactive\",\n callbacks: [\"https://example.com/callback\"],\n clientMetadata: {\n foo: \"zoo\",\n },\n customLoginPageOn: true,\n description: \"Test Applications Long Description\",\n grantTypes: [\n \"authorization_code\",\n \"http://auth0.com/oauth/grant-type/password-realm\",\n \"implicit\",\n \"password\",\n \"refresh_token\",\n ],\n isFirstParty: true,\n isTokenEndpointIpHeaderTrusted: true,\n jwtConfiguration: {\n alg: \"RS256\",\n lifetimeInSeconds: 300,\n scopes: {\n foo: \"bar\",\n },\n secretEncoded: true,\n },\n mobile: {\n ios: {\n appBundleIdentifier: \"com.my.bundle.id\",\n teamId: \"9JA89QQLNQ\",\n },\n },\n oidcConformant: false,\n refreshToken: {\n expirationType: \"expiring\",\n leeway: 0,\n rotationType: \"rotating\",\n tokenLifetime: 2592000,\n },\n webOrigins: [\"https://example.com\"],\n});\n```\n```python\nimport pulumi\nimport pulumi_auth0 as auth0\n\nmy_client = auth0.Client(\"myClient\",\n addons=auth0.ClientAddonsArgs(\n samlp=auth0.ClientAddonsSamlpArgs(\n audience=\"https://example.com/saml\",\n create_upn_claim=False,\n issuer=\"https://example.com\",\n map_identities=False,\n map_unknown_claims_as_is=False,\n mappings={\n \"email\": \"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress\",\n \"name\": \"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name\",\n },\n name_identifier_format=\"urn:oasis:names:tc:SAML:2.0:nameid-format:persistent\",\n name_identifier_probes=[\"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress\"],\n passthrough_claims_with_no_mapping=False,\n signing_cert=\"\"\"-----BEGIN PUBLIC KEY-----\nMIGf...bpP/t3\n+JGNGIRMj1hF1rnb6QIDAQAB\n-----END PUBLIC KEY-----\n\n\"\"\",\n ),\n ),\n allowed_logout_urls=[\"https://example.com\"],\n allowed_origins=[\"https://example.com\"],\n app_type=\"non_interactive\",\n callbacks=[\"https://example.com/callback\"],\n client_metadata={\n \"foo\": \"zoo\",\n },\n custom_login_page_on=True,\n description=\"Test Applications Long Description\",\n grant_types=[\n \"authorization_code\",\n \"http://auth0.com/oauth/grant-type/password-realm\",\n \"implicit\",\n \"password\",\n \"refresh_token\",\n ],\n is_first_party=True,\n is_token_endpoint_ip_header_trusted=True,\n jwt_configuration=auth0.ClientJwtConfigurationArgs(\n alg=\"RS256\",\n lifetime_in_seconds=300,\n scopes={\n \"foo\": \"bar\",\n },\n secret_encoded=True,\n ),\n mobile=auth0.ClientMobileArgs(\n ios=auth0.ClientMobileIosArgs(\n app_bundle_identifier=\"com.my.bundle.id\",\n team_id=\"9JA89QQLNQ\",\n ),\n ),\n oidc_conformant=False,\n refresh_token=auth0.ClientRefreshTokenArgs(\n expiration_type=\"expiring\",\n leeway=0,\n rotation_type=\"rotating\",\n token_lifetime=2592000,\n ),\n web_origins=[\"https://example.com\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Auth0 = Pulumi.Auth0;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var myClient = new Auth0.Client(\"myClient\", new()\n {\n Addons = new Auth0.Inputs.ClientAddonsArgs\n {\n Samlp = new Auth0.Inputs.ClientAddonsSamlpArgs\n {\n Audience = \"https://example.com/saml\",\n CreateUpnClaim = false,\n Issuer = \"https://example.com\",\n MapIdentities = false,\n MapUnknownClaimsAsIs = false,\n Mappings = \n {\n { \"email\", \"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress\" },\n { \"name\", \"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name\" },\n },\n NameIdentifierFormat = \"urn:oasis:names:tc:SAML:2.0:nameid-format:persistent\",\n NameIdentifierProbes = new[]\n {\n \"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress\",\n },\n PassthroughClaimsWithNoMapping = false,\n SigningCert = @\"-----BEGIN PUBLIC KEY-----\nMIGf...bpP/t3\n+JGNGIRMj1hF1rnb6QIDAQAB\n-----END PUBLIC KEY-----\n\n\",\n },\n },\n AllowedLogoutUrls = new[]\n {\n \"https://example.com\",\n },\n AllowedOrigins = new[]\n {\n \"https://example.com\",\n },\n AppType = \"non_interactive\",\n Callbacks = new[]\n {\n \"https://example.com/callback\",\n },\n ClientMetadata = \n {\n { \"foo\", \"zoo\" },\n },\n CustomLoginPageOn = true,\n Description = \"Test Applications Long Description\",\n GrantTypes = new[]\n {\n \"authorization_code\",\n \"http://auth0.com/oauth/grant-type/password-realm\",\n \"implicit\",\n \"password\",\n \"refresh_token\",\n },\n IsFirstParty = true,\n IsTokenEndpointIpHeaderTrusted = true,\n JwtConfiguration = new Auth0.Inputs.ClientJwtConfigurationArgs\n {\n Alg = \"RS256\",\n LifetimeInSeconds = 300,\n Scopes = \n {\n { \"foo\", \"bar\" },\n },\n SecretEncoded = true,\n },\n Mobile = new Auth0.Inputs.ClientMobileArgs\n {\n Ios = new Auth0.Inputs.ClientMobileIosArgs\n {\n AppBundleIdentifier = \"com.my.bundle.id\",\n TeamId = \"9JA89QQLNQ\",\n },\n },\n OidcConformant = false,\n RefreshToken = new Auth0.Inputs.ClientRefreshTokenArgs\n {\n ExpirationType = \"expiring\",\n Leeway = 0,\n RotationType = \"rotating\",\n TokenLifetime = 2592000,\n },\n WebOrigins = new[]\n {\n \"https://example.com\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := auth0.NewClient(ctx, \"myClient\", \u0026auth0.ClientArgs{\n\t\t\tAddons: \u0026auth0.ClientAddonsArgs{\n\t\t\t\tSamlp: \u0026auth0.ClientAddonsSamlpArgs{\n\t\t\t\t\tAudience: pulumi.String(\"https://example.com/saml\"),\n\t\t\t\t\tCreateUpnClaim: pulumi.Bool(false),\n\t\t\t\t\tIssuer: pulumi.String(\"https://example.com\"),\n\t\t\t\t\tMapIdentities: pulumi.Bool(false),\n\t\t\t\t\tMapUnknownClaimsAsIs: pulumi.Bool(false),\n\t\t\t\t\tMappings: pulumi.Map{\n\t\t\t\t\t\t\"email\": pulumi.Any(\"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress\"),\n\t\t\t\t\t\t\"name\": pulumi.Any(\"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name\"),\n\t\t\t\t\t},\n\t\t\t\t\tNameIdentifierFormat: pulumi.String(\"urn:oasis:names:tc:SAML:2.0:nameid-format:persistent\"),\n\t\t\t\t\tNameIdentifierProbes: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress\"),\n\t\t\t\t\t},\n\t\t\t\t\tPassthroughClaimsWithNoMapping: pulumi.Bool(false),\n\t\t\t\t\tSigningCert: pulumi.String(`-----BEGIN PUBLIC KEY-----\nMIGf...bpP/t3\n+JGNGIRMj1hF1rnb6QIDAQAB\n-----END PUBLIC KEY-----\n\n`),\n\t\t\t\t},\n\t\t\t},\n\t\t\tAllowedLogoutUrls: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"https://example.com\"),\n\t\t\t},\n\t\t\tAllowedOrigins: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"https://example.com\"),\n\t\t\t},\n\t\t\tAppType: pulumi.String(\"non_interactive\"),\n\t\t\tCallbacks: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"https://example.com/callback\"),\n\t\t\t},\n\t\t\tClientMetadata: pulumi.Map{\n\t\t\t\t\"foo\": pulumi.Any(\"zoo\"),\n\t\t\t},\n\t\t\tCustomLoginPageOn: pulumi.Bool(true),\n\t\t\tDescription: pulumi.String(\"Test Applications Long Description\"),\n\t\t\tGrantTypes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"authorization_code\"),\n\t\t\t\tpulumi.String(\"http://auth0.com/oauth/grant-type/password-realm\"),\n\t\t\t\tpulumi.String(\"implicit\"),\n\t\t\t\tpulumi.String(\"password\"),\n\t\t\t\tpulumi.String(\"refresh_token\"),\n\t\t\t},\n\t\t\tIsFirstParty: pulumi.Bool(true),\n\t\t\tIsTokenEndpointIpHeaderTrusted: pulumi.Bool(true),\n\t\t\tJwtConfiguration: \u0026auth0.ClientJwtConfigurationArgs{\n\t\t\t\tAlg: pulumi.String(\"RS256\"),\n\t\t\t\tLifetimeInSeconds: pulumi.Int(300),\n\t\t\t\tScopes: pulumi.StringMap{\n\t\t\t\t\t\"foo\": pulumi.String(\"bar\"),\n\t\t\t\t},\n\t\t\t\tSecretEncoded: pulumi.Bool(true),\n\t\t\t},\n\t\t\tMobile: \u0026auth0.ClientMobileArgs{\n\t\t\t\tIos: \u0026auth0.ClientMobileIosArgs{\n\t\t\t\t\tAppBundleIdentifier: pulumi.String(\"com.my.bundle.id\"),\n\t\t\t\t\tTeamId: pulumi.String(\"9JA89QQLNQ\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tOidcConformant: pulumi.Bool(false),\n\t\t\tRefreshToken: \u0026auth0.ClientRefreshTokenArgs{\n\t\t\t\tExpirationType: pulumi.String(\"expiring\"),\n\t\t\t\tLeeway: pulumi.Int(0),\n\t\t\t\tRotationType: pulumi.String(\"rotating\"),\n\t\t\t\tTokenLifetime: pulumi.Int(2592000),\n\t\t\t},\n\t\t\tWebOrigins: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"https://example.com\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.auth0.Client;\nimport com.pulumi.auth0.ClientArgs;\nimport com.pulumi.auth0.inputs.ClientAddonsArgs;\nimport com.pulumi.auth0.inputs.ClientAddonsSamlpArgs;\nimport com.pulumi.auth0.inputs.ClientJwtConfigurationArgs;\nimport com.pulumi.auth0.inputs.ClientMobileArgs;\nimport com.pulumi.auth0.inputs.ClientMobileIosArgs;\nimport com.pulumi.auth0.inputs.ClientRefreshTokenArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var myClient = new Client(\"myClient\", ClientArgs.builder() \n .addons(ClientAddonsArgs.builder()\n .samlp(ClientAddonsSamlpArgs.builder()\n .audience(\"https://example.com/saml\")\n .createUpnClaim(false)\n .issuer(\"https://example.com\")\n .mapIdentities(false)\n .mapUnknownClaimsAsIs(false)\n .mappings(Map.ofEntries(\n Map.entry(\"email\", \"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress\"),\n Map.entry(\"name\", \"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name\")\n ))\n .nameIdentifierFormat(\"urn:oasis:names:tc:SAML:2.0:nameid-format:persistent\")\n .nameIdentifierProbes(\"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress\")\n .passthroughClaimsWithNoMapping(false)\n .signingCert(\"\"\"\n-----BEGIN PUBLIC KEY-----\nMIGf...bpP/t3\n+JGNGIRMj1hF1rnb6QIDAQAB\n-----END PUBLIC KEY-----\n\n \"\"\")\n .build())\n .build())\n .allowedLogoutUrls(\"https://example.com\")\n .allowedOrigins(\"https://example.com\")\n .appType(\"non_interactive\")\n .callbacks(\"https://example.com/callback\")\n .clientMetadata(Map.of(\"foo\", \"zoo\"))\n .customLoginPageOn(true)\n .description(\"Test Applications Long Description\")\n .grantTypes( \n \"authorization_code\",\n \"http://auth0.com/oauth/grant-type/password-realm\",\n \"implicit\",\n \"password\",\n \"refresh_token\")\n .isFirstParty(true)\n .isTokenEndpointIpHeaderTrusted(true)\n .jwtConfiguration(ClientJwtConfigurationArgs.builder()\n .alg(\"RS256\")\n .lifetimeInSeconds(300)\n .scopes(Map.of(\"foo\", \"bar\"))\n .secretEncoded(true)\n .build())\n .mobile(ClientMobileArgs.builder()\n .ios(ClientMobileIosArgs.builder()\n .appBundleIdentifier(\"com.my.bundle.id\")\n .teamId(\"9JA89QQLNQ\")\n .build())\n .build())\n .oidcConformant(false)\n .refreshToken(ClientRefreshTokenArgs.builder()\n .expirationType(\"expiring\")\n .leeway(0)\n .rotationType(\"rotating\")\n .tokenLifetime(2592000)\n .build())\n .webOrigins(\"https://example.com\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n myClient:\n type: auth0:Client\n properties:\n addons:\n samlp:\n audience: https://example.com/saml\n createUpnClaim: false\n issuer: https://example.com\n mapIdentities: false\n mapUnknownClaimsAsIs: false\n mappings:\n email: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress\n name: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name\n nameIdentifierFormat: urn:oasis:names:tc:SAML:2.0:nameid-format:persistent\n nameIdentifierProbes:\n - http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress\n passthroughClaimsWithNoMapping: false\n signingCert: |+\n -----BEGIN PUBLIC KEY-----\n MIGf...bpP/t3\n +JGNGIRMj1hF1rnb6QIDAQAB\n -----END PUBLIC KEY-----\n\n allowedLogoutUrls:\n - https://example.com\n allowedOrigins:\n - https://example.com\n appType: non_interactive\n callbacks:\n - https://example.com/callback\n clientMetadata:\n foo: zoo\n customLoginPageOn: true\n description: Test Applications Long Description\n grantTypes:\n - authorization_code\n - http://auth0.com/oauth/grant-type/password-realm\n - implicit\n - password\n - refresh_token\n isFirstParty: true\n isTokenEndpointIpHeaderTrusted: true\n jwtConfiguration:\n alg: RS256\n lifetimeInSeconds: 300\n scopes:\n foo: bar\n secretEncoded: true\n mobile:\n ios:\n appBundleIdentifier: com.my.bundle.id\n teamId: 9JA89QQLNQ\n oidcConformant: false\n refreshToken:\n expirationType: expiring\n leeway: 0\n rotationType: rotating\n tokenLifetime: 2.592e+06\n webOrigins:\n - https://example.com\n```\n{{% /example %}}\n{{% /examples %}}\n\n## Import\n\nThis resource can be imported by specifying the client ID. # Example\n\n```sh\n $ pulumi import auth0:index/client:Client my_client \"AaiyAPdpYdesoKnqjj8HJqRn4T5titww\"\n```\n\n ", "properties": { "addons": { "$ref": "#/types/auth0:index/ClientAddons:ClientAddons", @@ -7005,7 +7005,7 @@ } }, "auth0:index/connection:Connection": { - "description": "With Auth0, you can define sources of users, otherwise known as connections, which may include identity providers (such as Google or LinkedIn), databases, or passwordless authentication methods. This resource allows you to configure and manage connections to be used with your clients and users.\n\n\u003e The Auth0 dashboard displays only one connection per social provider. Although the Auth0 Management API allows the\ncreation of multiple connections per strategy, the additional connections may not be visible in the Auth0 dashboard.\n\n\n{{% examples %}}\n## Example Usage\n{{% example %}}\n### Google OAuth2 Connection\n\n\u003e Your Auth0 account may be pre-configured with a `google-oauth2` connection.\n\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as auth0 from \"@pulumi/auth0\";\n\nconst googleOauth2 = new auth0.Connection(\"googleOauth2\", {\n options: {\n allowedAudiences: [\n \"example.com\",\n \"api.example.com\",\n ],\n clientId: \"\u003cclient-id\u003e\",\n clientSecret: \"\u003cclient-secret\u003e\",\n nonPersistentAttrs: [\n \"ethnicity\",\n \"gender\",\n ],\n scopes: [\n \"email\",\n \"profile\",\n \"gmail\",\n \"youtube\",\n ],\n setUserRootAttributes: \"on_each_login\",\n },\n strategy: \"google-oauth2\",\n});\n```\n```python\nimport pulumi\nimport pulumi_auth0 as auth0\n\ngoogle_oauth2 = auth0.Connection(\"googleOauth2\",\n options=auth0.ConnectionOptionsArgs(\n allowed_audiences=[\n \"example.com\",\n \"api.example.com\",\n ],\n client_id=\"\u003cclient-id\u003e\",\n client_secret=\"\u003cclient-secret\u003e\",\n non_persistent_attrs=[\n \"ethnicity\",\n \"gender\",\n ],\n scopes=[\n \"email\",\n \"profile\",\n \"gmail\",\n \"youtube\",\n ],\n set_user_root_attributes=\"on_each_login\",\n ),\n strategy=\"google-oauth2\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Auth0 = Pulumi.Auth0;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var googleOauth2 = new Auth0.Connection(\"googleOauth2\", new()\n {\n Options = new Auth0.Inputs.ConnectionOptionsArgs\n {\n AllowedAudiences = new[]\n {\n \"example.com\",\n \"api.example.com\",\n },\n ClientId = \"\u003cclient-id\u003e\",\n ClientSecret = \"\u003cclient-secret\u003e\",\n NonPersistentAttrs = new[]\n {\n \"ethnicity\",\n \"gender\",\n },\n Scopes = new[]\n {\n \"email\",\n \"profile\",\n \"gmail\",\n \"youtube\",\n },\n SetUserRootAttributes = \"on_each_login\",\n },\n Strategy = \"google-oauth2\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := auth0.NewConnection(ctx, \"googleOauth2\", \u0026auth0.ConnectionArgs{\n\t\t\tOptions: \u0026auth0.ConnectionOptionsArgs{\n\t\t\t\tAllowedAudiences: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"example.com\"),\n\t\t\t\t\tpulumi.String(\"api.example.com\"),\n\t\t\t\t},\n\t\t\t\tClientId: pulumi.String(\"\u003cclient-id\u003e\"),\n\t\t\t\tClientSecret: pulumi.String(\"\u003cclient-secret\u003e\"),\n\t\t\t\tNonPersistentAttrs: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"ethnicity\"),\n\t\t\t\t\tpulumi.String(\"gender\"),\n\t\t\t\t},\n\t\t\t\tScopes: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"email\"),\n\t\t\t\t\tpulumi.String(\"profile\"),\n\t\t\t\t\tpulumi.String(\"gmail\"),\n\t\t\t\t\tpulumi.String(\"youtube\"),\n\t\t\t\t},\n\t\t\t\tSetUserRootAttributes: pulumi.String(\"on_each_login\"),\n\t\t\t},\n\t\t\tStrategy: pulumi.String(\"google-oauth2\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.auth0.Connection;\nimport com.pulumi.auth0.ConnectionArgs;\nimport com.pulumi.auth0.inputs.ConnectionOptionsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var googleOauth2 = new Connection(\"googleOauth2\", ConnectionArgs.builder() \n .options(ConnectionOptionsArgs.builder()\n .allowedAudiences( \n \"example.com\",\n \"api.example.com\")\n .clientId(\"\u003cclient-id\u003e\")\n .clientSecret(\"\u003cclient-secret\u003e\")\n .nonPersistentAttrs( \n \"ethnicity\",\n \"gender\")\n .scopes( \n \"email\",\n \"profile\",\n \"gmail\",\n \"youtube\")\n .setUserRootAttributes(\"on_each_login\")\n .build())\n .strategy(\"google-oauth2\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n googleOauth2:\n type: auth0:Connection\n properties:\n options:\n allowedAudiences:\n - example.com\n - api.example.com\n clientId: \u003cclient-id\u003e\n clientSecret: \u003cclient-secret\u003e\n nonPersistentAttrs:\n - ethnicity\n - gender\n scopes:\n - email\n - profile\n - gmail\n - youtube\n setUserRootAttributes: on_each_login\n strategy: google-oauth2\n```\n{{% /example %}}\n{{% example %}}\n### Facebook Connection\n\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as auth0 from \"@pulumi/auth0\";\n\nconst facebook = new auth0.Connection(\"facebook\", {\n options: {\n clientId: \"\u003cclient-id\u003e\",\n clientSecret: \"\u003cclient-secret\u003e\",\n nonPersistentAttrs: [\n \"ethnicity\",\n \"gender\",\n ],\n scopes: [\n \"public_profile\",\n \"email\",\n \"groups_access_member_info\",\n \"user_birthday\",\n ],\n setUserRootAttributes: \"on_each_login\",\n },\n strategy: \"facebook\",\n});\n```\n```python\nimport pulumi\nimport pulumi_auth0 as auth0\n\nfacebook = auth0.Connection(\"facebook\",\n options=auth0.ConnectionOptionsArgs(\n client_id=\"\u003cclient-id\u003e\",\n client_secret=\"\u003cclient-secret\u003e\",\n non_persistent_attrs=[\n \"ethnicity\",\n \"gender\",\n ],\n scopes=[\n \"public_profile\",\n \"email\",\n \"groups_access_member_info\",\n \"user_birthday\",\n ],\n set_user_root_attributes=\"on_each_login\",\n ),\n strategy=\"facebook\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Auth0 = Pulumi.Auth0;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var facebook = new Auth0.Connection(\"facebook\", new()\n {\n Options = new Auth0.Inputs.ConnectionOptionsArgs\n {\n ClientId = \"\u003cclient-id\u003e\",\n ClientSecret = \"\u003cclient-secret\u003e\",\n NonPersistentAttrs = new[]\n {\n \"ethnicity\",\n \"gender\",\n },\n Scopes = new[]\n {\n \"public_profile\",\n \"email\",\n \"groups_access_member_info\",\n \"user_birthday\",\n },\n SetUserRootAttributes = \"on_each_login\",\n },\n Strategy = \"facebook\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := auth0.NewConnection(ctx, \"facebook\", \u0026auth0.ConnectionArgs{\n\t\t\tOptions: \u0026auth0.ConnectionOptionsArgs{\n\t\t\t\tClientId: pulumi.String(\"\u003cclient-id\u003e\"),\n\t\t\t\tClientSecret: pulumi.String(\"\u003cclient-secret\u003e\"),\n\t\t\t\tNonPersistentAttrs: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"ethnicity\"),\n\t\t\t\t\tpulumi.String(\"gender\"),\n\t\t\t\t},\n\t\t\t\tScopes: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"public_profile\"),\n\t\t\t\t\tpulumi.String(\"email\"),\n\t\t\t\t\tpulumi.String(\"groups_access_member_info\"),\n\t\t\t\t\tpulumi.String(\"user_birthday\"),\n\t\t\t\t},\n\t\t\t\tSetUserRootAttributes: pulumi.String(\"on_each_login\"),\n\t\t\t},\n\t\t\tStrategy: pulumi.String(\"facebook\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.auth0.Connection;\nimport com.pulumi.auth0.ConnectionArgs;\nimport com.pulumi.auth0.inputs.ConnectionOptionsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var facebook = new Connection(\"facebook\", ConnectionArgs.builder() \n .options(ConnectionOptionsArgs.builder()\n .clientId(\"\u003cclient-id\u003e\")\n .clientSecret(\"\u003cclient-secret\u003e\")\n .nonPersistentAttrs( \n \"ethnicity\",\n \"gender\")\n .scopes( \n \"public_profile\",\n \"email\",\n \"groups_access_member_info\",\n \"user_birthday\")\n .setUserRootAttributes(\"on_each_login\")\n .build())\n .strategy(\"facebook\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n facebook:\n type: auth0:Connection\n properties:\n options:\n clientId: \u003cclient-id\u003e\n clientSecret: \u003cclient-secret\u003e\n nonPersistentAttrs:\n - ethnicity\n - gender\n scopes:\n - public_profile\n - email\n - groups_access_member_info\n - user_birthday\n setUserRootAttributes: on_each_login\n strategy: facebook\n```\n{{% /example %}}\n{{% example %}}\n### Apple Connection\n\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as auth0 from \"@pulumi/auth0\";\n\nconst apple = new auth0.Connection(\"apple\", {\n options: {\n clientId: \"\u003cclient-id\u003e\",\n clientSecret: `-----BEGIN PRIVATE KEY-----\nMIHBAgEAMA0GCSqGSIb3DQEBAQUABIGsMIGpAgEAA\n-----END PRIVATE KEY-----\n`,\n keyId: \"\u003ckey-id\u003e\",\n nonPersistentAttrs: [\n \"ethnicity\",\n \"gender\",\n ],\n scopes: [\n \"email\",\n \"name\",\n ],\n setUserRootAttributes: \"on_first_login\",\n teamId: \"\u003cteam-id\u003e\",\n },\n strategy: \"apple\",\n});\n```\n```python\nimport pulumi\nimport pulumi_auth0 as auth0\n\napple = auth0.Connection(\"apple\",\n options=auth0.ConnectionOptionsArgs(\n client_id=\"\u003cclient-id\u003e\",\n client_secret=\"\"\"-----BEGIN PRIVATE KEY-----\nMIHBAgEAMA0GCSqGSIb3DQEBAQUABIGsMIGpAgEAA\n-----END PRIVATE KEY-----\n\"\"\",\n key_id=\"\u003ckey-id\u003e\",\n non_persistent_attrs=[\n \"ethnicity\",\n \"gender\",\n ],\n scopes=[\n \"email\",\n \"name\",\n ],\n set_user_root_attributes=\"on_first_login\",\n team_id=\"\u003cteam-id\u003e\",\n ),\n strategy=\"apple\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Auth0 = Pulumi.Auth0;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var apple = new Auth0.Connection(\"apple\", new()\n {\n Options = new Auth0.Inputs.ConnectionOptionsArgs\n {\n ClientId = \"\u003cclient-id\u003e\",\n ClientSecret = @\"-----BEGIN PRIVATE KEY-----\nMIHBAgEAMA0GCSqGSIb3DQEBAQUABIGsMIGpAgEAA\n-----END PRIVATE KEY-----\n\",\n KeyId = \"\u003ckey-id\u003e\",\n NonPersistentAttrs = new[]\n {\n \"ethnicity\",\n \"gender\",\n },\n Scopes = new[]\n {\n \"email\",\n \"name\",\n },\n SetUserRootAttributes = \"on_first_login\",\n TeamId = \"\u003cteam-id\u003e\",\n },\n Strategy = \"apple\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := auth0.NewConnection(ctx, \"apple\", \u0026auth0.ConnectionArgs{\n\t\t\tOptions: \u0026auth0.ConnectionOptionsArgs{\n\t\t\t\tClientId: pulumi.String(\"\u003cclient-id\u003e\"),\n\t\t\t\tClientSecret: pulumi.String(\"-----BEGIN PRIVATE KEY-----\\nMIHBAgEAMA0GCSqGSIb3DQEBAQUABIGsMIGpAgEAA\\n-----END PRIVATE KEY-----\\n\"),\n\t\t\t\tKeyId: pulumi.String(\"\u003ckey-id\u003e\"),\n\t\t\t\tNonPersistentAttrs: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"ethnicity\"),\n\t\t\t\t\tpulumi.String(\"gender\"),\n\t\t\t\t},\n\t\t\t\tScopes: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"email\"),\n\t\t\t\t\tpulumi.String(\"name\"),\n\t\t\t\t},\n\t\t\t\tSetUserRootAttributes: pulumi.String(\"on_first_login\"),\n\t\t\t\tTeamId: pulumi.String(\"\u003cteam-id\u003e\"),\n\t\t\t},\n\t\t\tStrategy: pulumi.String(\"apple\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.auth0.Connection;\nimport com.pulumi.auth0.ConnectionArgs;\nimport com.pulumi.auth0.inputs.ConnectionOptionsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var apple = new Connection(\"apple\", ConnectionArgs.builder() \n .options(ConnectionOptionsArgs.builder()\n .clientId(\"\u003cclient-id\u003e\")\n .clientSecret(\"\"\"\n-----BEGIN PRIVATE KEY-----\nMIHBAgEAMA0GCSqGSIb3DQEBAQUABIGsMIGpAgEAA\n-----END PRIVATE KEY-----\n \"\"\")\n .keyId(\"\u003ckey-id\u003e\")\n .nonPersistentAttrs( \n \"ethnicity\",\n \"gender\")\n .scopes( \n \"email\",\n \"name\")\n .setUserRootAttributes(\"on_first_login\")\n .teamId(\"\u003cteam-id\u003e\")\n .build())\n .strategy(\"apple\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n apple:\n type: auth0:Connection\n properties:\n options:\n clientId: \u003cclient-id\u003e\n clientSecret: |\n -----BEGIN PRIVATE KEY-----\n MIHBAgEAMA0GCSqGSIb3DQEBAQUABIGsMIGpAgEAA\n -----END PRIVATE KEY-----\n keyId: \u003ckey-id\u003e\n nonPersistentAttrs:\n - ethnicity\n - gender\n scopes:\n - email\n - name\n setUserRootAttributes: on_first_login\n teamId: \u003cteam-id\u003e\n strategy: apple\n```\n{{% /example %}}\n{{% example %}}\n### LinkedIn Connection\n\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as auth0 from \"@pulumi/auth0\";\n\nconst linkedin = new auth0.Connection(\"linkedin\", {\n options: {\n clientId: \"\u003cclient-id\u003e\",\n clientSecret: \"\u003cclient-secret\u003e\",\n nonPersistentAttrs: [\n \"ethnicity\",\n \"gender\",\n ],\n scopes: [\n \"basic_profile\",\n \"profile\",\n \"email\",\n ],\n setUserRootAttributes: \"on_each_login\",\n strategyVersion: 2,\n },\n strategy: \"linkedin\",\n});\n```\n```python\nimport pulumi\nimport pulumi_auth0 as auth0\n\nlinkedin = auth0.Connection(\"linkedin\",\n options=auth0.ConnectionOptionsArgs(\n client_id=\"\u003cclient-id\u003e\",\n client_secret=\"\u003cclient-secret\u003e\",\n non_persistent_attrs=[\n \"ethnicity\",\n \"gender\",\n ],\n scopes=[\n \"basic_profile\",\n \"profile\",\n \"email\",\n ],\n set_user_root_attributes=\"on_each_login\",\n strategy_version=2,\n ),\n strategy=\"linkedin\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Auth0 = Pulumi.Auth0;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var linkedin = new Auth0.Connection(\"linkedin\", new()\n {\n Options = new Auth0.Inputs.ConnectionOptionsArgs\n {\n ClientId = \"\u003cclient-id\u003e\",\n ClientSecret = \"\u003cclient-secret\u003e\",\n NonPersistentAttrs = new[]\n {\n \"ethnicity\",\n \"gender\",\n },\n Scopes = new[]\n {\n \"basic_profile\",\n \"profile\",\n \"email\",\n },\n SetUserRootAttributes = \"on_each_login\",\n StrategyVersion = 2,\n },\n Strategy = \"linkedin\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := auth0.NewConnection(ctx, \"linkedin\", \u0026auth0.ConnectionArgs{\n\t\t\tOptions: \u0026auth0.ConnectionOptionsArgs{\n\t\t\t\tClientId: pulumi.String(\"\u003cclient-id\u003e\"),\n\t\t\t\tClientSecret: pulumi.String(\"\u003cclient-secret\u003e\"),\n\t\t\t\tNonPersistentAttrs: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"ethnicity\"),\n\t\t\t\t\tpulumi.String(\"gender\"),\n\t\t\t\t},\n\t\t\t\tScopes: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"basic_profile\"),\n\t\t\t\t\tpulumi.String(\"profile\"),\n\t\t\t\t\tpulumi.String(\"email\"),\n\t\t\t\t},\n\t\t\t\tSetUserRootAttributes: pulumi.String(\"on_each_login\"),\n\t\t\t\tStrategyVersion: pulumi.Int(2),\n\t\t\t},\n\t\t\tStrategy: pulumi.String(\"linkedin\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.auth0.Connection;\nimport com.pulumi.auth0.ConnectionArgs;\nimport com.pulumi.auth0.inputs.ConnectionOptionsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var linkedin = new Connection(\"linkedin\", ConnectionArgs.builder() \n .options(ConnectionOptionsArgs.builder()\n .clientId(\"\u003cclient-id\u003e\")\n .clientSecret(\"\u003cclient-secret\u003e\")\n .nonPersistentAttrs( \n \"ethnicity\",\n \"gender\")\n .scopes( \n \"basic_profile\",\n \"profile\",\n \"email\")\n .setUserRootAttributes(\"on_each_login\")\n .strategyVersion(2)\n .build())\n .strategy(\"linkedin\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n linkedin:\n type: auth0:Connection\n properties:\n options:\n clientId: \u003cclient-id\u003e\n clientSecret: \u003cclient-secret\u003e\n nonPersistentAttrs:\n - ethnicity\n - gender\n scopes:\n - basic_profile\n - profile\n - email\n setUserRootAttributes: on_each_login\n strategyVersion: 2\n strategy: linkedin\n```\n{{% /example %}}\n{{% example %}}\n### GitHub Connection\n\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as auth0 from \"@pulumi/auth0\";\n\nconst github = new auth0.Connection(\"github\", {\n options: {\n clientId: \"\u003cclient-id\u003e\",\n clientSecret: \"\u003cclient-secret\u003e\",\n nonPersistentAttrs: [\n \"ethnicity\",\n \"gender\",\n ],\n scopes: [\n \"email\",\n \"profile\",\n \"public_repo\",\n \"repo\",\n ],\n setUserRootAttributes: \"on_each_login\",\n },\n strategy: \"github\",\n});\n```\n```python\nimport pulumi\nimport pulumi_auth0 as auth0\n\ngithub = auth0.Connection(\"github\",\n options=auth0.ConnectionOptionsArgs(\n client_id=\"\u003cclient-id\u003e\",\n client_secret=\"\u003cclient-secret\u003e\",\n non_persistent_attrs=[\n \"ethnicity\",\n \"gender\",\n ],\n scopes=[\n \"email\",\n \"profile\",\n \"public_repo\",\n \"repo\",\n ],\n set_user_root_attributes=\"on_each_login\",\n ),\n strategy=\"github\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Auth0 = Pulumi.Auth0;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var github = new Auth0.Connection(\"github\", new()\n {\n Options = new Auth0.Inputs.ConnectionOptionsArgs\n {\n ClientId = \"\u003cclient-id\u003e\",\n ClientSecret = \"\u003cclient-secret\u003e\",\n NonPersistentAttrs = new[]\n {\n \"ethnicity\",\n \"gender\",\n },\n Scopes = new[]\n {\n \"email\",\n \"profile\",\n \"public_repo\",\n \"repo\",\n },\n SetUserRootAttributes = \"on_each_login\",\n },\n Strategy = \"github\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := auth0.NewConnection(ctx, \"github\", \u0026auth0.ConnectionArgs{\n\t\t\tOptions: \u0026auth0.ConnectionOptionsArgs{\n\t\t\t\tClientId: pulumi.String(\"\u003cclient-id\u003e\"),\n\t\t\t\tClientSecret: pulumi.String(\"\u003cclient-secret\u003e\"),\n\t\t\t\tNonPersistentAttrs: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"ethnicity\"),\n\t\t\t\t\tpulumi.String(\"gender\"),\n\t\t\t\t},\n\t\t\t\tScopes: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"email\"),\n\t\t\t\t\tpulumi.String(\"profile\"),\n\t\t\t\t\tpulumi.String(\"public_repo\"),\n\t\t\t\t\tpulumi.String(\"repo\"),\n\t\t\t\t},\n\t\t\t\tSetUserRootAttributes: pulumi.String(\"on_each_login\"),\n\t\t\t},\n\t\t\tStrategy: pulumi.String(\"github\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.auth0.Connection;\nimport com.pulumi.auth0.ConnectionArgs;\nimport com.pulumi.auth0.inputs.ConnectionOptionsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var github = new Connection(\"github\", ConnectionArgs.builder() \n .options(ConnectionOptionsArgs.builder()\n .clientId(\"\u003cclient-id\u003e\")\n .clientSecret(\"\u003cclient-secret\u003e\")\n .nonPersistentAttrs( \n \"ethnicity\",\n \"gender\")\n .scopes( \n \"email\",\n \"profile\",\n \"public_repo\",\n \"repo\")\n .setUserRootAttributes(\"on_each_login\")\n .build())\n .strategy(\"github\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n github:\n type: auth0:Connection\n properties:\n options:\n clientId: \u003cclient-id\u003e\n clientSecret: \u003cclient-secret\u003e\n nonPersistentAttrs:\n - ethnicity\n - gender\n scopes:\n - email\n - profile\n - public_repo\n - repo\n setUserRootAttributes: on_each_login\n strategy: github\n```\n{{% /example %}}\n{{% example %}}\n### SalesForce Connection\n\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as auth0 from \"@pulumi/auth0\";\n\nconst salesforce = new auth0.Connection(\"salesforce\", {\n options: {\n clientId: \"\u003cclient-id\u003e\",\n clientSecret: \"\u003cclient-secret\u003e\",\n communityBaseUrl: \"https://salesforce.example.com\",\n nonPersistentAttrs: [\n \"ethnicity\",\n \"gender\",\n ],\n scopes: [\n \"openid\",\n \"email\",\n ],\n setUserRootAttributes: \"on_first_login\",\n },\n strategy: \"salesforce\",\n});\n```\n```python\nimport pulumi\nimport pulumi_auth0 as auth0\n\nsalesforce = auth0.Connection(\"salesforce\",\n options=auth0.ConnectionOptionsArgs(\n client_id=\"\u003cclient-id\u003e\",\n client_secret=\"\u003cclient-secret\u003e\",\n community_base_url=\"https://salesforce.example.com\",\n non_persistent_attrs=[\n \"ethnicity\",\n \"gender\",\n ],\n scopes=[\n \"openid\",\n \"email\",\n ],\n set_user_root_attributes=\"on_first_login\",\n ),\n strategy=\"salesforce\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Auth0 = Pulumi.Auth0;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var salesforce = new Auth0.Connection(\"salesforce\", new()\n {\n Options = new Auth0.Inputs.ConnectionOptionsArgs\n {\n ClientId = \"\u003cclient-id\u003e\",\n ClientSecret = \"\u003cclient-secret\u003e\",\n CommunityBaseUrl = \"https://salesforce.example.com\",\n NonPersistentAttrs = new[]\n {\n \"ethnicity\",\n \"gender\",\n },\n Scopes = new[]\n {\n \"openid\",\n \"email\",\n },\n SetUserRootAttributes = \"on_first_login\",\n },\n Strategy = \"salesforce\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := auth0.NewConnection(ctx, \"salesforce\", \u0026auth0.ConnectionArgs{\n\t\t\tOptions: \u0026auth0.ConnectionOptionsArgs{\n\t\t\t\tClientId: pulumi.String(\"\u003cclient-id\u003e\"),\n\t\t\t\tClientSecret: pulumi.String(\"\u003cclient-secret\u003e\"),\n\t\t\t\tCommunityBaseUrl: pulumi.String(\"https://salesforce.example.com\"),\n\t\t\t\tNonPersistentAttrs: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"ethnicity\"),\n\t\t\t\t\tpulumi.String(\"gender\"),\n\t\t\t\t},\n\t\t\t\tScopes: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"openid\"),\n\t\t\t\t\tpulumi.String(\"email\"),\n\t\t\t\t},\n\t\t\t\tSetUserRootAttributes: pulumi.String(\"on_first_login\"),\n\t\t\t},\n\t\t\tStrategy: pulumi.String(\"salesforce\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.auth0.Connection;\nimport com.pulumi.auth0.ConnectionArgs;\nimport com.pulumi.auth0.inputs.ConnectionOptionsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var salesforce = new Connection(\"salesforce\", ConnectionArgs.builder() \n .options(ConnectionOptionsArgs.builder()\n .clientId(\"\u003cclient-id\u003e\")\n .clientSecret(\"\u003cclient-secret\u003e\")\n .communityBaseUrl(\"https://salesforce.example.com\")\n .nonPersistentAttrs( \n \"ethnicity\",\n \"gender\")\n .scopes( \n \"openid\",\n \"email\")\n .setUserRootAttributes(\"on_first_login\")\n .build())\n .strategy(\"salesforce\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n salesforce:\n type: auth0:Connection\n properties:\n options:\n clientId: \u003cclient-id\u003e\n clientSecret: \u003cclient-secret\u003e\n communityBaseUrl: https://salesforce.example.com\n nonPersistentAttrs:\n - ethnicity\n - gender\n scopes:\n - openid\n - email\n setUserRootAttributes: on_first_login\n strategy: salesforce\n```\n{{% /example %}}\n{{% example %}}\n### OAuth2 Connection\n\nAlso applies to following connection strategies: `dropbox`, `bitbucket`, `paypal`, `twitter`, `amazon`, `yahoo`, `box`, `wordpress`, `shopify`, `custom`\n\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as auth0 from \"@pulumi/auth0\";\n\nconst oauth2 = new auth0.Connection(\"oauth2\", {\n options: {\n authorizationEndpoint: \"https://auth.example.com/oauth2/authorize\",\n clientId: \"\u003cclient-id\u003e\",\n clientSecret: \"\u003cclient-secret\u003e\",\n iconUrl: \"https://auth.example.com/assets/logo.png\",\n nonPersistentAttrs: [\n \"ethnicity\",\n \"gender\",\n ],\n pkceEnabled: true,\n scopes: [\n \"basic_profile\",\n \"profile\",\n \"email\",\n ],\n scripts: {\n fetchUserProfile: ` function fetchUserProfile(accessToken, context, callback) {\n return callback(new Error(\"Whoops!\"));\n }\n \n`,\n },\n setUserRootAttributes: \"on_each_login\",\n tokenEndpoint: \"https://auth.example.com/oauth2/token\",\n },\n strategy: \"oauth2\",\n});\n```\n```python\nimport pulumi\nimport pulumi_auth0 as auth0\n\noauth2 = auth0.Connection(\"oauth2\",\n options=auth0.ConnectionOptionsArgs(\n authorization_endpoint=\"https://auth.example.com/oauth2/authorize\",\n client_id=\"\u003cclient-id\u003e\",\n client_secret=\"\u003cclient-secret\u003e\",\n icon_url=\"https://auth.example.com/assets/logo.png\",\n non_persistent_attrs=[\n \"ethnicity\",\n \"gender\",\n ],\n pkce_enabled=True,\n scopes=[\n \"basic_profile\",\n \"profile\",\n \"email\",\n ],\n scripts={\n \"fetchUserProfile\": \"\"\" function fetchUserProfile(accessToken, context, callback) {\n return callback(new Error(\"Whoops!\"));\n }\n \n\"\"\",\n },\n set_user_root_attributes=\"on_each_login\",\n token_endpoint=\"https://auth.example.com/oauth2/token\",\n ),\n strategy=\"oauth2\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Auth0 = Pulumi.Auth0;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var oauth2 = new Auth0.Connection(\"oauth2\", new()\n {\n Options = new Auth0.Inputs.ConnectionOptionsArgs\n {\n AuthorizationEndpoint = \"https://auth.example.com/oauth2/authorize\",\n ClientId = \"\u003cclient-id\u003e\",\n ClientSecret = \"\u003cclient-secret\u003e\",\n IconUrl = \"https://auth.example.com/assets/logo.png\",\n NonPersistentAttrs = new[]\n {\n \"ethnicity\",\n \"gender\",\n },\n PkceEnabled = true,\n Scopes = new[]\n {\n \"basic_profile\",\n \"profile\",\n \"email\",\n },\n Scripts = \n {\n { \"fetchUserProfile\", @\" function fetchUserProfile(accessToken, context, callback) {\n return callback(new Error(\"\"Whoops!\"\"));\n }\n \n\" },\n },\n SetUserRootAttributes = \"on_each_login\",\n TokenEndpoint = \"https://auth.example.com/oauth2/token\",\n },\n Strategy = \"oauth2\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := auth0.NewConnection(ctx, \"oauth2\", \u0026auth0.ConnectionArgs{\n\t\t\tOptions: \u0026auth0.ConnectionOptionsArgs{\n\t\t\t\tAuthorizationEndpoint: pulumi.String(\"https://auth.example.com/oauth2/authorize\"),\n\t\t\t\tClientId: pulumi.String(\"\u003cclient-id\u003e\"),\n\t\t\t\tClientSecret: pulumi.String(\"\u003cclient-secret\u003e\"),\n\t\t\t\tIconUrl: pulumi.String(\"https://auth.example.com/assets/logo.png\"),\n\t\t\t\tNonPersistentAttrs: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"ethnicity\"),\n\t\t\t\t\tpulumi.String(\"gender\"),\n\t\t\t\t},\n\t\t\t\tPkceEnabled: pulumi.Bool(true),\n\t\t\t\tScopes: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"basic_profile\"),\n\t\t\t\t\tpulumi.String(\"profile\"),\n\t\t\t\t\tpulumi.String(\"email\"),\n\t\t\t\t},\n\t\t\t\tScripts: pulumi.StringMap{\n\t\t\t\t\t\"fetchUserProfile\": pulumi.String(\" function fetchUserProfile(accessToken, context, callback) {\\n return callback(new Error(\\\"Whoops!\\\"));\\n }\\n \\n\"),\n\t\t\t\t},\n\t\t\t\tSetUserRootAttributes: pulumi.String(\"on_each_login\"),\n\t\t\t\tTokenEndpoint: pulumi.String(\"https://auth.example.com/oauth2/token\"),\n\t\t\t},\n\t\t\tStrategy: pulumi.String(\"oauth2\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.auth0.Connection;\nimport com.pulumi.auth0.ConnectionArgs;\nimport com.pulumi.auth0.inputs.ConnectionOptionsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var oauth2 = new Connection(\"oauth2\", ConnectionArgs.builder() \n .options(ConnectionOptionsArgs.builder()\n .authorizationEndpoint(\"https://auth.example.com/oauth2/authorize\")\n .clientId(\"\u003cclient-id\u003e\")\n .clientSecret(\"\u003cclient-secret\u003e\")\n .iconUrl(\"https://auth.example.com/assets/logo.png\")\n .nonPersistentAttrs( \n \"ethnicity\",\n \"gender\")\n .pkceEnabled(true)\n .scopes( \n \"basic_profile\",\n \"profile\",\n \"email\")\n .scripts(Map.of(\"fetchUserProfile\", \"\"\"\n function fetchUserProfile(accessToken, context, callback) {\n return callback(new Error(\"Whoops!\"));\n }\n \n \"\"\"))\n .setUserRootAttributes(\"on_each_login\")\n .tokenEndpoint(\"https://auth.example.com/oauth2/token\")\n .build())\n .strategy(\"oauth2\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n oauth2:\n type: auth0:Connection\n properties:\n options:\n authorizationEndpoint: https://auth.example.com/oauth2/authorize\n clientId: \u003cclient-id\u003e\n clientSecret: \u003cclient-secret\u003e\n iconUrl: https://auth.example.com/assets/logo.png\n nonPersistentAttrs:\n - ethnicity\n - gender\n pkceEnabled: true\n scopes:\n - basic_profile\n - profile\n - email\n scripts:\n fetchUserProfile: \" function fetchUserProfile(accessToken, context, callback) {\\n return callback(new Error(\\\"Whoops!\\\"));\\n }\\n \\n\"\n setUserRootAttributes: on_each_login\n tokenEndpoint: https://auth.example.com/oauth2/token\n strategy: oauth2\n```\n{{% /example %}}\n{{% example %}}\n### SMS Connection\n\n\u003e To be able to see this in the management dashboard as well, the name of the connection must be set to \"sms\".\n\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as auth0 from \"@pulumi/auth0\";\n\nconst sms = new auth0.Connection(\"sms\", {\n isDomainConnection: false,\n options: {\n bruteForceProtection: true,\n disableSignup: false,\n forwardRequestInfo: true,\n from: \"+15555555555\",\n gatewayAuthentication: {\n audience: \"https://somewhere.com/sms-gateway\",\n method: \"bearer\",\n secret: \"4e2680bb74ec2ae24736476dd37ed6c2\",\n secretBase64Encoded: false,\n subject: \"test.us.auth0.com:sms\",\n },\n gatewayUrl: \"https://somewhere.com/sms-gateway\",\n name: \"sms\",\n provider: \"sms_gateway\",\n syntax: \"md_with_macros\",\n template: \"@@password@@\",\n totp: {\n length: 6,\n timeStep: 300,\n },\n },\n strategy: \"sms\",\n});\n```\n```python\nimport pulumi\nimport pulumi_auth0 as auth0\n\nsms = auth0.Connection(\"sms\",\n is_domain_connection=False,\n options=auth0.ConnectionOptionsArgs(\n brute_force_protection=True,\n disable_signup=False,\n forward_request_info=True,\n from_=\"+15555555555\",\n gateway_authentication=auth0.ConnectionOptionsGatewayAuthenticationArgs(\n audience=\"https://somewhere.com/sms-gateway\",\n method=\"bearer\",\n secret=\"4e2680bb74ec2ae24736476dd37ed6c2\",\n secret_base64_encoded=False,\n subject=\"test.us.auth0.com:sms\",\n ),\n gateway_url=\"https://somewhere.com/sms-gateway\",\n name=\"sms\",\n provider=\"sms_gateway\",\n syntax=\"md_with_macros\",\n template=\"@@password@@\",\n totp=auth0.ConnectionOptionsTotpArgs(\n length=6,\n time_step=300,\n ),\n ),\n strategy=\"sms\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Auth0 = Pulumi.Auth0;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var sms = new Auth0.Connection(\"sms\", new()\n {\n IsDomainConnection = false,\n Options = new Auth0.Inputs.ConnectionOptionsArgs\n {\n BruteForceProtection = true,\n DisableSignup = false,\n ForwardRequestInfo = true,\n From = \"+15555555555\",\n GatewayAuthentication = new Auth0.Inputs.ConnectionOptionsGatewayAuthenticationArgs\n {\n Audience = \"https://somewhere.com/sms-gateway\",\n Method = \"bearer\",\n Secret = \"4e2680bb74ec2ae24736476dd37ed6c2\",\n SecretBase64Encoded = false,\n Subject = \"test.us.auth0.com:sms\",\n },\n GatewayUrl = \"https://somewhere.com/sms-gateway\",\n Name = \"sms\",\n Provider = \"sms_gateway\",\n Syntax = \"md_with_macros\",\n Template = \"@@password@@\",\n Totp = new Auth0.Inputs.ConnectionOptionsTotpArgs\n {\n Length = 6,\n TimeStep = 300,\n },\n },\n Strategy = \"sms\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := auth0.NewConnection(ctx, \"sms\", \u0026auth0.ConnectionArgs{\n\t\t\tIsDomainConnection: pulumi.Bool(false),\n\t\t\tOptions: \u0026auth0.ConnectionOptionsArgs{\n\t\t\t\tBruteForceProtection: pulumi.Bool(true),\n\t\t\t\tDisableSignup: pulumi.Bool(false),\n\t\t\t\tForwardRequestInfo: pulumi.Bool(true),\n\t\t\t\tFrom: pulumi.String(\"+15555555555\"),\n\t\t\t\tGatewayAuthentication: \u0026auth0.ConnectionOptionsGatewayAuthenticationArgs{\n\t\t\t\t\tAudience: pulumi.String(\"https://somewhere.com/sms-gateway\"),\n\t\t\t\t\tMethod: pulumi.String(\"bearer\"),\n\t\t\t\t\tSecret: pulumi.String(\"4e2680bb74ec2ae24736476dd37ed6c2\"),\n\t\t\t\t\tSecretBase64Encoded: pulumi.Bool(false),\n\t\t\t\t\tSubject: pulumi.String(\"test.us.auth0.com:sms\"),\n\t\t\t\t},\n\t\t\t\tGatewayUrl: pulumi.String(\"https://somewhere.com/sms-gateway\"),\n\t\t\t\tName: pulumi.String(\"sms\"),\n\t\t\t\tProvider: pulumi.String(\"sms_gateway\"),\n\t\t\t\tSyntax: pulumi.String(\"md_with_macros\"),\n\t\t\t\tTemplate: pulumi.String(\"@@password@@\"),\n\t\t\t\tTotp: \u0026auth0.ConnectionOptionsTotpArgs{\n\t\t\t\t\tLength: pulumi.Int(6),\n\t\t\t\t\tTimeStep: pulumi.Int(300),\n\t\t\t\t},\n\t\t\t},\n\t\t\tStrategy: pulumi.String(\"sms\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.auth0.Connection;\nimport com.pulumi.auth0.ConnectionArgs;\nimport com.pulumi.auth0.inputs.ConnectionOptionsArgs;\nimport com.pulumi.auth0.inputs.ConnectionOptionsGatewayAuthenticationArgs;\nimport com.pulumi.auth0.inputs.ConnectionOptionsTotpArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var sms = new Connection(\"sms\", ConnectionArgs.builder() \n .isDomainConnection(false)\n .options(ConnectionOptionsArgs.builder()\n .bruteForceProtection(true)\n .disableSignup(false)\n .forwardRequestInfo(true)\n .from(\"+15555555555\")\n .gatewayAuthentication(ConnectionOptionsGatewayAuthenticationArgs.builder()\n .audience(\"https://somewhere.com/sms-gateway\")\n .method(\"bearer\")\n .secret(\"4e2680bb74ec2ae24736476dd37ed6c2\")\n .secretBase64Encoded(false)\n .subject(\"test.us.auth0.com:sms\")\n .build())\n .gatewayUrl(\"https://somewhere.com/sms-gateway\")\n .name(\"sms\")\n .provider(\"sms_gateway\")\n .syntax(\"md_with_macros\")\n .template(\"@@password@@\")\n .totp(ConnectionOptionsTotpArgs.builder()\n .length(6)\n .timeStep(300)\n .build())\n .build())\n .strategy(\"sms\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n sms:\n type: auth0:Connection\n properties:\n isDomainConnection: false\n options:\n bruteForceProtection: true\n disableSignup: false\n forwardRequestInfo: true\n from: '+15555555555'\n gatewayAuthentication:\n audience: https://somewhere.com/sms-gateway\n method: bearer\n secret: 4e2680bb74ec2ae24736476dd37ed6c2\n secretBase64Encoded: false\n subject: test.us.auth0.com:sms\n gatewayUrl: https://somewhere.com/sms-gateway\n name: sms\n provider: sms_gateway\n syntax: md_with_macros\n template: '@@password@@'\n totp:\n length: 6\n timeStep: 300\n strategy: sms\n```\n{{% /example %}}\n{{% example %}}\n### Email Connection\n\n\u003e To be able to see this in the management dashboard as well, the name of the connection must be set to \"email\".\n\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as auth0 from \"@pulumi/auth0\";\n\nconst passwordlessEmail = new auth0.Connection(\"passwordlessEmail\", {\n options: {\n authParams: {\n responseType: \"code\",\n scope: \"openid email profile offline_access\",\n },\n bruteForceProtection: true,\n disableSignup: false,\n from: \"{{ application.name }} \u003croot@auth0.com\u003e\",\n name: \"email\",\n nonPersistentAttrs: [],\n setUserRootAttributes: \"on_each_login\",\n subject: \"Welcome to {{ application.name }}\",\n syntax: \"liquid\",\n template: \"\u003chtml\u003eThis is the body of the email\u003c/html\u003e\",\n totp: {\n length: 6,\n timeStep: 300,\n },\n },\n strategy: \"email\",\n});\n```\n```python\nimport pulumi\nimport pulumi_auth0 as auth0\n\npasswordless_email = auth0.Connection(\"passwordlessEmail\",\n options=auth0.ConnectionOptionsArgs(\n auth_params={\n \"responseType\": \"code\",\n \"scope\": \"openid email profile offline_access\",\n },\n brute_force_protection=True,\n disable_signup=False,\n from_=\"{{ application.name }} \u003croot@auth0.com\u003e\",\n name=\"email\",\n non_persistent_attrs=[],\n set_user_root_attributes=\"on_each_login\",\n subject=\"Welcome to {{ application.name }}\",\n syntax=\"liquid\",\n template=\"\u003chtml\u003eThis is the body of the email\u003c/html\u003e\",\n totp=auth0.ConnectionOptionsTotpArgs(\n length=6,\n time_step=300,\n ),\n ),\n strategy=\"email\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Auth0 = Pulumi.Auth0;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var passwordlessEmail = new Auth0.Connection(\"passwordlessEmail\", new()\n {\n Options = new Auth0.Inputs.ConnectionOptionsArgs\n {\n AuthParams = \n {\n { \"responseType\", \"code\" },\n { \"scope\", \"openid email profile offline_access\" },\n },\n BruteForceProtection = true,\n DisableSignup = false,\n From = \"{{ application.name }} \u003croot@auth0.com\u003e\",\n Name = \"email\",\n NonPersistentAttrs = new[] {},\n SetUserRootAttributes = \"on_each_login\",\n Subject = \"Welcome to {{ application.name }}\",\n Syntax = \"liquid\",\n Template = \"\u003chtml\u003eThis is the body of the email\u003c/html\u003e\",\n Totp = new Auth0.Inputs.ConnectionOptionsTotpArgs\n {\n Length = 6,\n TimeStep = 300,\n },\n },\n Strategy = \"email\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := auth0.NewConnection(ctx, \"passwordlessEmail\", \u0026auth0.ConnectionArgs{\n\t\t\tOptions: \u0026auth0.ConnectionOptionsArgs{\n\t\t\t\tAuthParams: pulumi.StringMap{\n\t\t\t\t\t\"responseType\": pulumi.String(\"code\"),\n\t\t\t\t\t\"scope\": pulumi.String(\"openid email profile offline_access\"),\n\t\t\t\t},\n\t\t\t\tBruteForceProtection: pulumi.Bool(true),\n\t\t\t\tDisableSignup: pulumi.Bool(false),\n\t\t\t\tFrom: pulumi.String(\"{{ application.name }} \u003croot@auth0.com\u003e\"),\n\t\t\t\tName: pulumi.String(\"email\"),\n\t\t\t\tNonPersistentAttrs: pulumi.StringArray{},\n\t\t\t\tSetUserRootAttributes: pulumi.String(\"on_each_login\"),\n\t\t\t\tSubject: pulumi.String(\"Welcome to {{ application.name }}\"),\n\t\t\t\tSyntax: pulumi.String(\"liquid\"),\n\t\t\t\tTemplate: pulumi.String(\"\u003chtml\u003eThis is the body of the email\u003c/html\u003e\"),\n\t\t\t\tTotp: \u0026auth0.ConnectionOptionsTotpArgs{\n\t\t\t\t\tLength: pulumi.Int(6),\n\t\t\t\t\tTimeStep: pulumi.Int(300),\n\t\t\t\t},\n\t\t\t},\n\t\t\tStrategy: pulumi.String(\"email\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.auth0.Connection;\nimport com.pulumi.auth0.ConnectionArgs;\nimport com.pulumi.auth0.inputs.ConnectionOptionsArgs;\nimport com.pulumi.auth0.inputs.ConnectionOptionsTotpArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var passwordlessEmail = new Connection(\"passwordlessEmail\", ConnectionArgs.builder() \n .options(ConnectionOptionsArgs.builder()\n .authParams(Map.ofEntries(\n Map.entry(\"responseType\", \"code\"),\n Map.entry(\"scope\", \"openid email profile offline_access\")\n ))\n .bruteForceProtection(true)\n .disableSignup(false)\n .from(\"{{ application.name }} \u003croot@auth0.com\u003e\")\n .name(\"email\")\n .nonPersistentAttrs()\n .setUserRootAttributes(\"on_each_login\")\n .subject(\"Welcome to {{ application.name }}\")\n .syntax(\"liquid\")\n .template(\"\u003chtml\u003eThis is the body of the email\u003c/html\u003e\")\n .totp(ConnectionOptionsTotpArgs.builder()\n .length(6)\n .timeStep(300)\n .build())\n .build())\n .strategy(\"email\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n passwordlessEmail:\n type: auth0:Connection\n properties:\n options:\n authParams:\n responseType: code\n scope: openid email profile offline_access\n bruteForceProtection: true\n disableSignup: false\n from: '{{ application.name }} \u003croot@auth0.com\u003e'\n name: email\n nonPersistentAttrs: []\n setUserRootAttributes: on_each_login\n subject: Welcome to {{ application.name }}\n syntax: liquid\n template: \u003chtml\u003eThis is the body of the email\u003c/html\u003e\n totp:\n length: 6\n timeStep: 300\n strategy: email\n```\n{{% /example %}}\n{{% example %}}\n### WindowsLive Connection\n\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as auth0 from \"@pulumi/auth0\";\n\nconst windowslive = new auth0.Connection(\"windowslive\", {\n options: {\n clientId: \"\u003cclient-id\u003e\",\n clientSecret: \"\u003cclient-secret\u003e\",\n nonPersistentAttrs: [\n \"ethnicity\",\n \"gender\",\n ],\n scopes: [\n \"signin\",\n \"graph_user\",\n ],\n setUserRootAttributes: \"on_first_login\",\n strategyVersion: 2,\n },\n strategy: \"windowslive\",\n});\n```\n```python\nimport pulumi\nimport pulumi_auth0 as auth0\n\nwindowslive = auth0.Connection(\"windowslive\",\n options=auth0.ConnectionOptionsArgs(\n client_id=\"\u003cclient-id\u003e\",\n client_secret=\"\u003cclient-secret\u003e\",\n non_persistent_attrs=[\n \"ethnicity\",\n \"gender\",\n ],\n scopes=[\n \"signin\",\n \"graph_user\",\n ],\n set_user_root_attributes=\"on_first_login\",\n strategy_version=2,\n ),\n strategy=\"windowslive\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Auth0 = Pulumi.Auth0;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var windowslive = new Auth0.Connection(\"windowslive\", new()\n {\n Options = new Auth0.Inputs.ConnectionOptionsArgs\n {\n ClientId = \"\u003cclient-id\u003e\",\n ClientSecret = \"\u003cclient-secret\u003e\",\n NonPersistentAttrs = new[]\n {\n \"ethnicity\",\n \"gender\",\n },\n Scopes = new[]\n {\n \"signin\",\n \"graph_user\",\n },\n SetUserRootAttributes = \"on_first_login\",\n StrategyVersion = 2,\n },\n Strategy = \"windowslive\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := auth0.NewConnection(ctx, \"windowslive\", \u0026auth0.ConnectionArgs{\n\t\t\tOptions: \u0026auth0.ConnectionOptionsArgs{\n\t\t\t\tClientId: pulumi.String(\"\u003cclient-id\u003e\"),\n\t\t\t\tClientSecret: pulumi.String(\"\u003cclient-secret\u003e\"),\n\t\t\t\tNonPersistentAttrs: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"ethnicity\"),\n\t\t\t\t\tpulumi.String(\"gender\"),\n\t\t\t\t},\n\t\t\t\tScopes: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"signin\"),\n\t\t\t\t\tpulumi.String(\"graph_user\"),\n\t\t\t\t},\n\t\t\t\tSetUserRootAttributes: pulumi.String(\"on_first_login\"),\n\t\t\t\tStrategyVersion: pulumi.Int(2),\n\t\t\t},\n\t\t\tStrategy: pulumi.String(\"windowslive\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.auth0.Connection;\nimport com.pulumi.auth0.ConnectionArgs;\nimport com.pulumi.auth0.inputs.ConnectionOptionsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var windowslive = new Connection(\"windowslive\", ConnectionArgs.builder() \n .options(ConnectionOptionsArgs.builder()\n .clientId(\"\u003cclient-id\u003e\")\n .clientSecret(\"\u003cclient-secret\u003e\")\n .nonPersistentAttrs( \n \"ethnicity\",\n \"gender\")\n .scopes( \n \"signin\",\n \"graph_user\")\n .setUserRootAttributes(\"on_first_login\")\n .strategyVersion(2)\n .build())\n .strategy(\"windowslive\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n windowslive:\n type: auth0:Connection\n properties:\n options:\n clientId: \u003cclient-id\u003e\n clientSecret: \u003cclient-secret\u003e\n nonPersistentAttrs:\n - ethnicity\n - gender\n scopes:\n - signin\n - graph_user\n setUserRootAttributes: on_first_login\n strategyVersion: 2\n strategy: windowslive\n```\n{{% /example %}}\n{{% /examples %}}\n\n## Import\n\nThis resource can be imported by specifying the connection ID. # Example\n\n```sh\n $ pulumi import auth0:index/connection:Connection google \"con_a17f21fdb24d48a0\"\n```\n\n ", + "description": "With Auth0, you can define sources of users, otherwise known as connections, which may include identity providers (such as Google or LinkedIn), databases, or passwordless authentication methods. This resource allows you to configure and manage connections to be used with your clients and users.\n\n\u003e The Auth0 dashboard displays only one connection per social provider. Although the Auth0 Management API allows the\ncreation of multiple connections per strategy, the additional connections may not be visible in the Auth0 dashboard.\n\n\n{{% examples %}}\n## Example Usage\n{{% example %}}\n### Google OAuth2 Connection\n\n\u003e Your Auth0 account may be pre-configured with a `google-oauth2` connection.\n\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as auth0 from \"@pulumi/auth0\";\n\nconst googleOauth2 = new auth0.Connection(\"googleOauth2\", {\n options: {\n allowedAudiences: [\n \"example.com\",\n \"api.example.com\",\n ],\n clientId: \"\u003cclient-id\u003e\",\n clientSecret: \"\u003cclient-secret\u003e\",\n nonPersistentAttrs: [\n \"ethnicity\",\n \"gender\",\n ],\n scopes: [\n \"email\",\n \"profile\",\n \"gmail\",\n \"youtube\",\n ],\n setUserRootAttributes: \"on_each_login\",\n },\n strategy: \"google-oauth2\",\n});\n```\n```python\nimport pulumi\nimport pulumi_auth0 as auth0\n\ngoogle_oauth2 = auth0.Connection(\"googleOauth2\",\n options=auth0.ConnectionOptionsArgs(\n allowed_audiences=[\n \"example.com\",\n \"api.example.com\",\n ],\n client_id=\"\u003cclient-id\u003e\",\n client_secret=\"\u003cclient-secret\u003e\",\n non_persistent_attrs=[\n \"ethnicity\",\n \"gender\",\n ],\n scopes=[\n \"email\",\n \"profile\",\n \"gmail\",\n \"youtube\",\n ],\n set_user_root_attributes=\"on_each_login\",\n ),\n strategy=\"google-oauth2\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Auth0 = Pulumi.Auth0;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var googleOauth2 = new Auth0.Connection(\"googleOauth2\", new()\n {\n Options = new Auth0.Inputs.ConnectionOptionsArgs\n {\n AllowedAudiences = new[]\n {\n \"example.com\",\n \"api.example.com\",\n },\n ClientId = \"\u003cclient-id\u003e\",\n ClientSecret = \"\u003cclient-secret\u003e\",\n NonPersistentAttrs = new[]\n {\n \"ethnicity\",\n \"gender\",\n },\n Scopes = new[]\n {\n \"email\",\n \"profile\",\n \"gmail\",\n \"youtube\",\n },\n SetUserRootAttributes = \"on_each_login\",\n },\n Strategy = \"google-oauth2\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := auth0.NewConnection(ctx, \"googleOauth2\", \u0026auth0.ConnectionArgs{\n\t\t\tOptions: \u0026auth0.ConnectionOptionsArgs{\n\t\t\t\tAllowedAudiences: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"example.com\"),\n\t\t\t\t\tpulumi.String(\"api.example.com\"),\n\t\t\t\t},\n\t\t\t\tClientId: pulumi.String(\"\u003cclient-id\u003e\"),\n\t\t\t\tClientSecret: pulumi.String(\"\u003cclient-secret\u003e\"),\n\t\t\t\tNonPersistentAttrs: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"ethnicity\"),\n\t\t\t\t\tpulumi.String(\"gender\"),\n\t\t\t\t},\n\t\t\t\tScopes: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"email\"),\n\t\t\t\t\tpulumi.String(\"profile\"),\n\t\t\t\t\tpulumi.String(\"gmail\"),\n\t\t\t\t\tpulumi.String(\"youtube\"),\n\t\t\t\t},\n\t\t\t\tSetUserRootAttributes: pulumi.String(\"on_each_login\"),\n\t\t\t},\n\t\t\tStrategy: pulumi.String(\"google-oauth2\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.auth0.Connection;\nimport com.pulumi.auth0.ConnectionArgs;\nimport com.pulumi.auth0.inputs.ConnectionOptionsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var googleOauth2 = new Connection(\"googleOauth2\", ConnectionArgs.builder() \n .options(ConnectionOptionsArgs.builder()\n .allowedAudiences( \n \"example.com\",\n \"api.example.com\")\n .clientId(\"\u003cclient-id\u003e\")\n .clientSecret(\"\u003cclient-secret\u003e\")\n .nonPersistentAttrs( \n \"ethnicity\",\n \"gender\")\n .scopes( \n \"email\",\n \"profile\",\n \"gmail\",\n \"youtube\")\n .setUserRootAttributes(\"on_each_login\")\n .build())\n .strategy(\"google-oauth2\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n googleOauth2:\n type: auth0:Connection\n properties:\n options:\n allowedAudiences:\n - example.com\n - api.example.com\n clientId: \u003cclient-id\u003e\n clientSecret: \u003cclient-secret\u003e\n nonPersistentAttrs:\n - ethnicity\n - gender\n scopes:\n - email\n - profile\n - gmail\n - youtube\n setUserRootAttributes: on_each_login\n strategy: google-oauth2\n```\n{{% /example %}}\n{{% example %}}\n### Facebook Connection\n\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as auth0 from \"@pulumi/auth0\";\n\nconst facebook = new auth0.Connection(\"facebook\", {\n options: {\n clientId: \"\u003cclient-id\u003e\",\n clientSecret: \"\u003cclient-secret\u003e\",\n nonPersistentAttrs: [\n \"ethnicity\",\n \"gender\",\n ],\n scopes: [\n \"public_profile\",\n \"email\",\n \"groups_access_member_info\",\n \"user_birthday\",\n ],\n setUserRootAttributes: \"on_each_login\",\n },\n strategy: \"facebook\",\n});\n```\n```python\nimport pulumi\nimport pulumi_auth0 as auth0\n\nfacebook = auth0.Connection(\"facebook\",\n options=auth0.ConnectionOptionsArgs(\n client_id=\"\u003cclient-id\u003e\",\n client_secret=\"\u003cclient-secret\u003e\",\n non_persistent_attrs=[\n \"ethnicity\",\n \"gender\",\n ],\n scopes=[\n \"public_profile\",\n \"email\",\n \"groups_access_member_info\",\n \"user_birthday\",\n ],\n set_user_root_attributes=\"on_each_login\",\n ),\n strategy=\"facebook\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Auth0 = Pulumi.Auth0;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var facebook = new Auth0.Connection(\"facebook\", new()\n {\n Options = new Auth0.Inputs.ConnectionOptionsArgs\n {\n ClientId = \"\u003cclient-id\u003e\",\n ClientSecret = \"\u003cclient-secret\u003e\",\n NonPersistentAttrs = new[]\n {\n \"ethnicity\",\n \"gender\",\n },\n Scopes = new[]\n {\n \"public_profile\",\n \"email\",\n \"groups_access_member_info\",\n \"user_birthday\",\n },\n SetUserRootAttributes = \"on_each_login\",\n },\n Strategy = \"facebook\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := auth0.NewConnection(ctx, \"facebook\", \u0026auth0.ConnectionArgs{\n\t\t\tOptions: \u0026auth0.ConnectionOptionsArgs{\n\t\t\t\tClientId: pulumi.String(\"\u003cclient-id\u003e\"),\n\t\t\t\tClientSecret: pulumi.String(\"\u003cclient-secret\u003e\"),\n\t\t\t\tNonPersistentAttrs: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"ethnicity\"),\n\t\t\t\t\tpulumi.String(\"gender\"),\n\t\t\t\t},\n\t\t\t\tScopes: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"public_profile\"),\n\t\t\t\t\tpulumi.String(\"email\"),\n\t\t\t\t\tpulumi.String(\"groups_access_member_info\"),\n\t\t\t\t\tpulumi.String(\"user_birthday\"),\n\t\t\t\t},\n\t\t\t\tSetUserRootAttributes: pulumi.String(\"on_each_login\"),\n\t\t\t},\n\t\t\tStrategy: pulumi.String(\"facebook\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.auth0.Connection;\nimport com.pulumi.auth0.ConnectionArgs;\nimport com.pulumi.auth0.inputs.ConnectionOptionsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var facebook = new Connection(\"facebook\", ConnectionArgs.builder() \n .options(ConnectionOptionsArgs.builder()\n .clientId(\"\u003cclient-id\u003e\")\n .clientSecret(\"\u003cclient-secret\u003e\")\n .nonPersistentAttrs( \n \"ethnicity\",\n \"gender\")\n .scopes( \n \"public_profile\",\n \"email\",\n \"groups_access_member_info\",\n \"user_birthday\")\n .setUserRootAttributes(\"on_each_login\")\n .build())\n .strategy(\"facebook\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n facebook:\n type: auth0:Connection\n properties:\n options:\n clientId: \u003cclient-id\u003e\n clientSecret: \u003cclient-secret\u003e\n nonPersistentAttrs:\n - ethnicity\n - gender\n scopes:\n - public_profile\n - email\n - groups_access_member_info\n - user_birthday\n setUserRootAttributes: on_each_login\n strategy: facebook\n```\n{{% /example %}}\n{{% example %}}\n### Apple Connection\n\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as auth0 from \"@pulumi/auth0\";\n\nconst apple = new auth0.Connection(\"apple\", {\n options: {\n clientId: \"\u003cclient-id\u003e\",\n clientSecret: `-----BEGIN PRIVATE KEY-----\nMIHBAgEAMA0GCSqGSIb3DQEBAQUABIGsMIGpAgEAA\n-----END PRIVATE KEY-----\n`,\n keyId: \"\u003ckey-id\u003e\",\n nonPersistentAttrs: [\n \"ethnicity\",\n \"gender\",\n ],\n scopes: [\n \"email\",\n \"name\",\n ],\n setUserRootAttributes: \"on_first_login\",\n teamId: \"\u003cteam-id\u003e\",\n },\n strategy: \"apple\",\n});\n```\n```python\nimport pulumi\nimport pulumi_auth0 as auth0\n\napple = auth0.Connection(\"apple\",\n options=auth0.ConnectionOptionsArgs(\n client_id=\"\u003cclient-id\u003e\",\n client_secret=\"\"\"-----BEGIN PRIVATE KEY-----\nMIHBAgEAMA0GCSqGSIb3DQEBAQUABIGsMIGpAgEAA\n-----END PRIVATE KEY-----\n\"\"\",\n key_id=\"\u003ckey-id\u003e\",\n non_persistent_attrs=[\n \"ethnicity\",\n \"gender\",\n ],\n scopes=[\n \"email\",\n \"name\",\n ],\n set_user_root_attributes=\"on_first_login\",\n team_id=\"\u003cteam-id\u003e\",\n ),\n strategy=\"apple\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Auth0 = Pulumi.Auth0;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var apple = new Auth0.Connection(\"apple\", new()\n {\n Options = new Auth0.Inputs.ConnectionOptionsArgs\n {\n ClientId = \"\u003cclient-id\u003e\",\n ClientSecret = @\"-----BEGIN PRIVATE KEY-----\nMIHBAgEAMA0GCSqGSIb3DQEBAQUABIGsMIGpAgEAA\n-----END PRIVATE KEY-----\n\",\n KeyId = \"\u003ckey-id\u003e\",\n NonPersistentAttrs = new[]\n {\n \"ethnicity\",\n \"gender\",\n },\n Scopes = new[]\n {\n \"email\",\n \"name\",\n },\n SetUserRootAttributes = \"on_first_login\",\n TeamId = \"\u003cteam-id\u003e\",\n },\n Strategy = \"apple\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := auth0.NewConnection(ctx, \"apple\", \u0026auth0.ConnectionArgs{\n\t\t\tOptions: \u0026auth0.ConnectionOptionsArgs{\n\t\t\t\tClientId: pulumi.String(\"\u003cclient-id\u003e\"),\n\t\t\t\tClientSecret: pulumi.String(\"-----BEGIN PRIVATE KEY-----\\nMIHBAgEAMA0GCSqGSIb3DQEBAQUABIGsMIGpAgEAA\\n-----END PRIVATE KEY-----\\n\"),\n\t\t\t\tKeyId: pulumi.String(\"\u003ckey-id\u003e\"),\n\t\t\t\tNonPersistentAttrs: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"ethnicity\"),\n\t\t\t\t\tpulumi.String(\"gender\"),\n\t\t\t\t},\n\t\t\t\tScopes: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"email\"),\n\t\t\t\t\tpulumi.String(\"name\"),\n\t\t\t\t},\n\t\t\t\tSetUserRootAttributes: pulumi.String(\"on_first_login\"),\n\t\t\t\tTeamId: pulumi.String(\"\u003cteam-id\u003e\"),\n\t\t\t},\n\t\t\tStrategy: pulumi.String(\"apple\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.auth0.Connection;\nimport com.pulumi.auth0.ConnectionArgs;\nimport com.pulumi.auth0.inputs.ConnectionOptionsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var apple = new Connection(\"apple\", ConnectionArgs.builder() \n .options(ConnectionOptionsArgs.builder()\n .clientId(\"\u003cclient-id\u003e\")\n .clientSecret(\"\"\"\n-----BEGIN PRIVATE KEY-----\nMIHBAgEAMA0GCSqGSIb3DQEBAQUABIGsMIGpAgEAA\n-----END PRIVATE KEY-----\n \"\"\")\n .keyId(\"\u003ckey-id\u003e\")\n .nonPersistentAttrs( \n \"ethnicity\",\n \"gender\")\n .scopes( \n \"email\",\n \"name\")\n .setUserRootAttributes(\"on_first_login\")\n .teamId(\"\u003cteam-id\u003e\")\n .build())\n .strategy(\"apple\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n apple:\n type: auth0:Connection\n properties:\n options:\n clientId: \u003cclient-id\u003e\n clientSecret: |\n -----BEGIN PRIVATE KEY-----\n MIHBAgEAMA0GCSqGSIb3DQEBAQUABIGsMIGpAgEAA\n -----END PRIVATE KEY-----\n keyId: \u003ckey-id\u003e\n nonPersistentAttrs:\n - ethnicity\n - gender\n scopes:\n - email\n - name\n setUserRootAttributes: on_first_login\n teamId: \u003cteam-id\u003e\n strategy: apple\n```\n{{% /example %}}\n{{% example %}}\n### LinkedIn Connection\n\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as auth0 from \"@pulumi/auth0\";\n\nconst linkedin = new auth0.Connection(\"linkedin\", {\n options: {\n clientId: \"\u003cclient-id\u003e\",\n clientSecret: \"\u003cclient-secret\u003e\",\n nonPersistentAttrs: [\n \"ethnicity\",\n \"gender\",\n ],\n scopes: [\n \"basic_profile\",\n \"profile\",\n \"email\",\n ],\n setUserRootAttributes: \"on_each_login\",\n strategyVersion: 2,\n },\n strategy: \"linkedin\",\n});\n```\n```python\nimport pulumi\nimport pulumi_auth0 as auth0\n\nlinkedin = auth0.Connection(\"linkedin\",\n options=auth0.ConnectionOptionsArgs(\n client_id=\"\u003cclient-id\u003e\",\n client_secret=\"\u003cclient-secret\u003e\",\n non_persistent_attrs=[\n \"ethnicity\",\n \"gender\",\n ],\n scopes=[\n \"basic_profile\",\n \"profile\",\n \"email\",\n ],\n set_user_root_attributes=\"on_each_login\",\n strategy_version=2,\n ),\n strategy=\"linkedin\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Auth0 = Pulumi.Auth0;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var linkedin = new Auth0.Connection(\"linkedin\", new()\n {\n Options = new Auth0.Inputs.ConnectionOptionsArgs\n {\n ClientId = \"\u003cclient-id\u003e\",\n ClientSecret = \"\u003cclient-secret\u003e\",\n NonPersistentAttrs = new[]\n {\n \"ethnicity\",\n \"gender\",\n },\n Scopes = new[]\n {\n \"basic_profile\",\n \"profile\",\n \"email\",\n },\n SetUserRootAttributes = \"on_each_login\",\n StrategyVersion = 2,\n },\n Strategy = \"linkedin\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := auth0.NewConnection(ctx, \"linkedin\", \u0026auth0.ConnectionArgs{\n\t\t\tOptions: \u0026auth0.ConnectionOptionsArgs{\n\t\t\t\tClientId: pulumi.String(\"\u003cclient-id\u003e\"),\n\t\t\t\tClientSecret: pulumi.String(\"\u003cclient-secret\u003e\"),\n\t\t\t\tNonPersistentAttrs: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"ethnicity\"),\n\t\t\t\t\tpulumi.String(\"gender\"),\n\t\t\t\t},\n\t\t\t\tScopes: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"basic_profile\"),\n\t\t\t\t\tpulumi.String(\"profile\"),\n\t\t\t\t\tpulumi.String(\"email\"),\n\t\t\t\t},\n\t\t\t\tSetUserRootAttributes: pulumi.String(\"on_each_login\"),\n\t\t\t\tStrategyVersion: pulumi.Int(2),\n\t\t\t},\n\t\t\tStrategy: pulumi.String(\"linkedin\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.auth0.Connection;\nimport com.pulumi.auth0.ConnectionArgs;\nimport com.pulumi.auth0.inputs.ConnectionOptionsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var linkedin = new Connection(\"linkedin\", ConnectionArgs.builder() \n .options(ConnectionOptionsArgs.builder()\n .clientId(\"\u003cclient-id\u003e\")\n .clientSecret(\"\u003cclient-secret\u003e\")\n .nonPersistentAttrs( \n \"ethnicity\",\n \"gender\")\n .scopes( \n \"basic_profile\",\n \"profile\",\n \"email\")\n .setUserRootAttributes(\"on_each_login\")\n .strategyVersion(2)\n .build())\n .strategy(\"linkedin\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n linkedin:\n type: auth0:Connection\n properties:\n options:\n clientId: \u003cclient-id\u003e\n clientSecret: \u003cclient-secret\u003e\n nonPersistentAttrs:\n - ethnicity\n - gender\n scopes:\n - basic_profile\n - profile\n - email\n setUserRootAttributes: on_each_login\n strategyVersion: 2\n strategy: linkedin\n```\n{{% /example %}}\n{{% example %}}\n### GitHub Connection\n\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as auth0 from \"@pulumi/auth0\";\n\nconst github = new auth0.Connection(\"github\", {\n options: {\n clientId: \"\u003cclient-id\u003e\",\n clientSecret: \"\u003cclient-secret\u003e\",\n nonPersistentAttrs: [\n \"ethnicity\",\n \"gender\",\n ],\n scopes: [\n \"email\",\n \"profile\",\n \"public_repo\",\n \"repo\",\n ],\n setUserRootAttributes: \"on_each_login\",\n },\n strategy: \"github\",\n});\n```\n```python\nimport pulumi\nimport pulumi_auth0 as auth0\n\ngithub = auth0.Connection(\"github\",\n options=auth0.ConnectionOptionsArgs(\n client_id=\"\u003cclient-id\u003e\",\n client_secret=\"\u003cclient-secret\u003e\",\n non_persistent_attrs=[\n \"ethnicity\",\n \"gender\",\n ],\n scopes=[\n \"email\",\n \"profile\",\n \"public_repo\",\n \"repo\",\n ],\n set_user_root_attributes=\"on_each_login\",\n ),\n strategy=\"github\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Auth0 = Pulumi.Auth0;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var github = new Auth0.Connection(\"github\", new()\n {\n Options = new Auth0.Inputs.ConnectionOptionsArgs\n {\n ClientId = \"\u003cclient-id\u003e\",\n ClientSecret = \"\u003cclient-secret\u003e\",\n NonPersistentAttrs = new[]\n {\n \"ethnicity\",\n \"gender\",\n },\n Scopes = new[]\n {\n \"email\",\n \"profile\",\n \"public_repo\",\n \"repo\",\n },\n SetUserRootAttributes = \"on_each_login\",\n },\n Strategy = \"github\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := auth0.NewConnection(ctx, \"github\", \u0026auth0.ConnectionArgs{\n\t\t\tOptions: \u0026auth0.ConnectionOptionsArgs{\n\t\t\t\tClientId: pulumi.String(\"\u003cclient-id\u003e\"),\n\t\t\t\tClientSecret: pulumi.String(\"\u003cclient-secret\u003e\"),\n\t\t\t\tNonPersistentAttrs: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"ethnicity\"),\n\t\t\t\t\tpulumi.String(\"gender\"),\n\t\t\t\t},\n\t\t\t\tScopes: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"email\"),\n\t\t\t\t\tpulumi.String(\"profile\"),\n\t\t\t\t\tpulumi.String(\"public_repo\"),\n\t\t\t\t\tpulumi.String(\"repo\"),\n\t\t\t\t},\n\t\t\t\tSetUserRootAttributes: pulumi.String(\"on_each_login\"),\n\t\t\t},\n\t\t\tStrategy: pulumi.String(\"github\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.auth0.Connection;\nimport com.pulumi.auth0.ConnectionArgs;\nimport com.pulumi.auth0.inputs.ConnectionOptionsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var github = new Connection(\"github\", ConnectionArgs.builder() \n .options(ConnectionOptionsArgs.builder()\n .clientId(\"\u003cclient-id\u003e\")\n .clientSecret(\"\u003cclient-secret\u003e\")\n .nonPersistentAttrs( \n \"ethnicity\",\n \"gender\")\n .scopes( \n \"email\",\n \"profile\",\n \"public_repo\",\n \"repo\")\n .setUserRootAttributes(\"on_each_login\")\n .build())\n .strategy(\"github\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n github:\n type: auth0:Connection\n properties:\n options:\n clientId: \u003cclient-id\u003e\n clientSecret: \u003cclient-secret\u003e\n nonPersistentAttrs:\n - ethnicity\n - gender\n scopes:\n - email\n - profile\n - public_repo\n - repo\n setUserRootAttributes: on_each_login\n strategy: github\n```\n{{% /example %}}\n{{% example %}}\n### SalesForce Connection\n\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as auth0 from \"@pulumi/auth0\";\n\nconst salesforce = new auth0.Connection(\"salesforce\", {\n options: {\n clientId: \"\u003cclient-id\u003e\",\n clientSecret: \"\u003cclient-secret\u003e\",\n communityBaseUrl: \"https://salesforce.example.com\",\n nonPersistentAttrs: [\n \"ethnicity\",\n \"gender\",\n ],\n scopes: [\n \"openid\",\n \"email\",\n ],\n setUserRootAttributes: \"on_first_login\",\n },\n strategy: \"salesforce\",\n});\n```\n```python\nimport pulumi\nimport pulumi_auth0 as auth0\n\nsalesforce = auth0.Connection(\"salesforce\",\n options=auth0.ConnectionOptionsArgs(\n client_id=\"\u003cclient-id\u003e\",\n client_secret=\"\u003cclient-secret\u003e\",\n community_base_url=\"https://salesforce.example.com\",\n non_persistent_attrs=[\n \"ethnicity\",\n \"gender\",\n ],\n scopes=[\n \"openid\",\n \"email\",\n ],\n set_user_root_attributes=\"on_first_login\",\n ),\n strategy=\"salesforce\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Auth0 = Pulumi.Auth0;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var salesforce = new Auth0.Connection(\"salesforce\", new()\n {\n Options = new Auth0.Inputs.ConnectionOptionsArgs\n {\n ClientId = \"\u003cclient-id\u003e\",\n ClientSecret = \"\u003cclient-secret\u003e\",\n CommunityBaseUrl = \"https://salesforce.example.com\",\n NonPersistentAttrs = new[]\n {\n \"ethnicity\",\n \"gender\",\n },\n Scopes = new[]\n {\n \"openid\",\n \"email\",\n },\n SetUserRootAttributes = \"on_first_login\",\n },\n Strategy = \"salesforce\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := auth0.NewConnection(ctx, \"salesforce\", \u0026auth0.ConnectionArgs{\n\t\t\tOptions: \u0026auth0.ConnectionOptionsArgs{\n\t\t\t\tClientId: pulumi.String(\"\u003cclient-id\u003e\"),\n\t\t\t\tClientSecret: pulumi.String(\"\u003cclient-secret\u003e\"),\n\t\t\t\tCommunityBaseUrl: pulumi.String(\"https://salesforce.example.com\"),\n\t\t\t\tNonPersistentAttrs: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"ethnicity\"),\n\t\t\t\t\tpulumi.String(\"gender\"),\n\t\t\t\t},\n\t\t\t\tScopes: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"openid\"),\n\t\t\t\t\tpulumi.String(\"email\"),\n\t\t\t\t},\n\t\t\t\tSetUserRootAttributes: pulumi.String(\"on_first_login\"),\n\t\t\t},\n\t\t\tStrategy: pulumi.String(\"salesforce\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.auth0.Connection;\nimport com.pulumi.auth0.ConnectionArgs;\nimport com.pulumi.auth0.inputs.ConnectionOptionsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var salesforce = new Connection(\"salesforce\", ConnectionArgs.builder() \n .options(ConnectionOptionsArgs.builder()\n .clientId(\"\u003cclient-id\u003e\")\n .clientSecret(\"\u003cclient-secret\u003e\")\n .communityBaseUrl(\"https://salesforce.example.com\")\n .nonPersistentAttrs( \n \"ethnicity\",\n \"gender\")\n .scopes( \n \"openid\",\n \"email\")\n .setUserRootAttributes(\"on_first_login\")\n .build())\n .strategy(\"salesforce\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n salesforce:\n type: auth0:Connection\n properties:\n options:\n clientId: \u003cclient-id\u003e\n clientSecret: \u003cclient-secret\u003e\n communityBaseUrl: https://salesforce.example.com\n nonPersistentAttrs:\n - ethnicity\n - gender\n scopes:\n - openid\n - email\n setUserRootAttributes: on_first_login\n strategy: salesforce\n```\n{{% /example %}}\n{{% example %}}\n### OAuth2 Connection\n\nAlso applies to following connection strategies: `dropbox`, `bitbucket`, `paypal`, `twitter`, `amazon`, `yahoo`, `box`, `wordpress`, `shopify`, `custom`\n\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as auth0 from \"@pulumi/auth0\";\n\nconst oauth2 = new auth0.Connection(\"oauth2\", {\n options: {\n authorizationEndpoint: \"https://auth.example.com/oauth2/authorize\",\n clientId: \"\u003cclient-id\u003e\",\n clientSecret: \"\u003cclient-secret\u003e\",\n iconUrl: \"https://auth.example.com/assets/logo.png\",\n nonPersistentAttrs: [\n \"ethnicity\",\n \"gender\",\n ],\n pkceEnabled: true,\n scopes: [\n \"basic_profile\",\n \"profile\",\n \"email\",\n ],\n scripts: {\n fetchUserProfile: ` function fetchUserProfile(accessToken, context, callback) {\n return callback(new Error(\"Whoops!\"));\n }\n \n`,\n },\n setUserRootAttributes: \"on_each_login\",\n tokenEndpoint: \"https://auth.example.com/oauth2/token\",\n },\n strategy: \"oauth2\",\n});\n```\n```python\nimport pulumi\nimport pulumi_auth0 as auth0\n\noauth2 = auth0.Connection(\"oauth2\",\n options=auth0.ConnectionOptionsArgs(\n authorization_endpoint=\"https://auth.example.com/oauth2/authorize\",\n client_id=\"\u003cclient-id\u003e\",\n client_secret=\"\u003cclient-secret\u003e\",\n icon_url=\"https://auth.example.com/assets/logo.png\",\n non_persistent_attrs=[\n \"ethnicity\",\n \"gender\",\n ],\n pkce_enabled=True,\n scopes=[\n \"basic_profile\",\n \"profile\",\n \"email\",\n ],\n scripts={\n \"fetchUserProfile\": \"\"\" function fetchUserProfile(accessToken, context, callback) {\n return callback(new Error(\"Whoops!\"));\n }\n \n\"\"\",\n },\n set_user_root_attributes=\"on_each_login\",\n token_endpoint=\"https://auth.example.com/oauth2/token\",\n ),\n strategy=\"oauth2\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Auth0 = Pulumi.Auth0;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var oauth2 = new Auth0.Connection(\"oauth2\", new()\n {\n Options = new Auth0.Inputs.ConnectionOptionsArgs\n {\n AuthorizationEndpoint = \"https://auth.example.com/oauth2/authorize\",\n ClientId = \"\u003cclient-id\u003e\",\n ClientSecret = \"\u003cclient-secret\u003e\",\n IconUrl = \"https://auth.example.com/assets/logo.png\",\n NonPersistentAttrs = new[]\n {\n \"ethnicity\",\n \"gender\",\n },\n PkceEnabled = true,\n Scopes = new[]\n {\n \"basic_profile\",\n \"profile\",\n \"email\",\n },\n Scripts = \n {\n { \"fetchUserProfile\", @\" function fetchUserProfile(accessToken, context, callback) {\n return callback(new Error(\"\"Whoops!\"\"));\n }\n \n\" },\n },\n SetUserRootAttributes = \"on_each_login\",\n TokenEndpoint = \"https://auth.example.com/oauth2/token\",\n },\n Strategy = \"oauth2\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := auth0.NewConnection(ctx, \"oauth2\", \u0026auth0.ConnectionArgs{\n\t\t\tOptions: \u0026auth0.ConnectionOptionsArgs{\n\t\t\t\tAuthorizationEndpoint: pulumi.String(\"https://auth.example.com/oauth2/authorize\"),\n\t\t\t\tClientId: pulumi.String(\"\u003cclient-id\u003e\"),\n\t\t\t\tClientSecret: pulumi.String(\"\u003cclient-secret\u003e\"),\n\t\t\t\tIconUrl: pulumi.String(\"https://auth.example.com/assets/logo.png\"),\n\t\t\t\tNonPersistentAttrs: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"ethnicity\"),\n\t\t\t\t\tpulumi.String(\"gender\"),\n\t\t\t\t},\n\t\t\t\tPkceEnabled: pulumi.Bool(true),\n\t\t\t\tScopes: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"basic_profile\"),\n\t\t\t\t\tpulumi.String(\"profile\"),\n\t\t\t\t\tpulumi.String(\"email\"),\n\t\t\t\t},\n\t\t\t\tScripts: pulumi.StringMap{\n\t\t\t\t\t\"fetchUserProfile\": pulumi.String(\" function fetchUserProfile(accessToken, context, callback) {\\n return callback(new Error(\\\"Whoops!\\\"));\\n }\\n \\n\"),\n\t\t\t\t},\n\t\t\t\tSetUserRootAttributes: pulumi.String(\"on_each_login\"),\n\t\t\t\tTokenEndpoint: pulumi.String(\"https://auth.example.com/oauth2/token\"),\n\t\t\t},\n\t\t\tStrategy: pulumi.String(\"oauth2\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.auth0.Connection;\nimport com.pulumi.auth0.ConnectionArgs;\nimport com.pulumi.auth0.inputs.ConnectionOptionsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var oauth2 = new Connection(\"oauth2\", ConnectionArgs.builder() \n .options(ConnectionOptionsArgs.builder()\n .authorizationEndpoint(\"https://auth.example.com/oauth2/authorize\")\n .clientId(\"\u003cclient-id\u003e\")\n .clientSecret(\"\u003cclient-secret\u003e\")\n .iconUrl(\"https://auth.example.com/assets/logo.png\")\n .nonPersistentAttrs( \n \"ethnicity\",\n \"gender\")\n .pkceEnabled(true)\n .scopes( \n \"basic_profile\",\n \"profile\",\n \"email\")\n .scripts(Map.of(\"fetchUserProfile\", \"\"\"\n function fetchUserProfile(accessToken, context, callback) {\n return callback(new Error(\"Whoops!\"));\n }\n \n \"\"\"))\n .setUserRootAttributes(\"on_each_login\")\n .tokenEndpoint(\"https://auth.example.com/oauth2/token\")\n .build())\n .strategy(\"oauth2\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n oauth2:\n type: auth0:Connection\n properties:\n options:\n authorizationEndpoint: https://auth.example.com/oauth2/authorize\n clientId: \u003cclient-id\u003e\n clientSecret: \u003cclient-secret\u003e\n iconUrl: https://auth.example.com/assets/logo.png\n nonPersistentAttrs:\n - ethnicity\n - gender\n pkceEnabled: true\n scopes:\n - basic_profile\n - profile\n - email\n scripts:\n fetchUserProfile: \" function fetchUserProfile(accessToken, context, callback) {\\n return callback(new Error(\\\"Whoops!\\\"));\\n }\\n \\n\"\n setUserRootAttributes: on_each_login\n tokenEndpoint: https://auth.example.com/oauth2/token\n strategy: oauth2\n```\n{{% /example %}}\n{{% example %}}\n### SMS Connection\n\n\u003e To be able to see this in the management dashboard as well, the name of the connection must be set to \"sms\".\n\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as auth0 from \"@pulumi/auth0\";\n\nconst sms = new auth0.Connection(\"sms\", {\n isDomainConnection: false,\n options: {\n bruteForceProtection: true,\n disableSignup: false,\n forwardRequestInfo: true,\n from: \"+15555555555\",\n gatewayAuthentication: {\n audience: \"https://somewhere.com/sms-gateway\",\n method: \"bearer\",\n secret: \"4e2680bb74ec2ae24736476dd37ed6c2\",\n secretBase64Encoded: false,\n subject: \"test.us.auth0.com:sms\",\n },\n gatewayUrl: \"https://somewhere.com/sms-gateway\",\n name: \"sms\",\n provider: \"sms_gateway\",\n syntax: \"md_with_macros\",\n template: \"@@password@@\",\n totp: {\n length: 6,\n timeStep: 300,\n },\n },\n strategy: \"sms\",\n});\n```\n```python\nimport pulumi\nimport pulumi_auth0 as auth0\n\nsms = auth0.Connection(\"sms\",\n is_domain_connection=False,\n options=auth0.ConnectionOptionsArgs(\n brute_force_protection=True,\n disable_signup=False,\n forward_request_info=True,\n from_=\"+15555555555\",\n gateway_authentication=auth0.ConnectionOptionsGatewayAuthenticationArgs(\n audience=\"https://somewhere.com/sms-gateway\",\n method=\"bearer\",\n secret=\"4e2680bb74ec2ae24736476dd37ed6c2\",\n secret_base64_encoded=False,\n subject=\"test.us.auth0.com:sms\",\n ),\n gateway_url=\"https://somewhere.com/sms-gateway\",\n name=\"sms\",\n provider=\"sms_gateway\",\n syntax=\"md_with_macros\",\n template=\"@@password@@\",\n totp=auth0.ConnectionOptionsTotpArgs(\n length=6,\n time_step=300,\n ),\n ),\n strategy=\"sms\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Auth0 = Pulumi.Auth0;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var sms = new Auth0.Connection(\"sms\", new()\n {\n IsDomainConnection = false,\n Options = new Auth0.Inputs.ConnectionOptionsArgs\n {\n BruteForceProtection = true,\n DisableSignup = false,\n ForwardRequestInfo = true,\n From = \"+15555555555\",\n GatewayAuthentication = new Auth0.Inputs.ConnectionOptionsGatewayAuthenticationArgs\n {\n Audience = \"https://somewhere.com/sms-gateway\",\n Method = \"bearer\",\n Secret = \"4e2680bb74ec2ae24736476dd37ed6c2\",\n SecretBase64Encoded = false,\n Subject = \"test.us.auth0.com:sms\",\n },\n GatewayUrl = \"https://somewhere.com/sms-gateway\",\n Name = \"sms\",\n Provider = \"sms_gateway\",\n Syntax = \"md_with_macros\",\n Template = \"@@password@@\",\n Totp = new Auth0.Inputs.ConnectionOptionsTotpArgs\n {\n Length = 6,\n TimeStep = 300,\n },\n },\n Strategy = \"sms\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := auth0.NewConnection(ctx, \"sms\", \u0026auth0.ConnectionArgs{\n\t\t\tIsDomainConnection: pulumi.Bool(false),\n\t\t\tOptions: \u0026auth0.ConnectionOptionsArgs{\n\t\t\t\tBruteForceProtection: pulumi.Bool(true),\n\t\t\t\tDisableSignup: pulumi.Bool(false),\n\t\t\t\tForwardRequestInfo: pulumi.Bool(true),\n\t\t\t\tFrom: pulumi.String(\"+15555555555\"),\n\t\t\t\tGatewayAuthentication: \u0026auth0.ConnectionOptionsGatewayAuthenticationArgs{\n\t\t\t\t\tAudience: pulumi.String(\"https://somewhere.com/sms-gateway\"),\n\t\t\t\t\tMethod: pulumi.String(\"bearer\"),\n\t\t\t\t\tSecret: pulumi.String(\"4e2680bb74ec2ae24736476dd37ed6c2\"),\n\t\t\t\t\tSecretBase64Encoded: pulumi.Bool(false),\n\t\t\t\t\tSubject: pulumi.String(\"test.us.auth0.com:sms\"),\n\t\t\t\t},\n\t\t\t\tGatewayUrl: pulumi.String(\"https://somewhere.com/sms-gateway\"),\n\t\t\t\tName: pulumi.String(\"sms\"),\n\t\t\t\tProvider: pulumi.String(\"sms_gateway\"),\n\t\t\t\tSyntax: pulumi.String(\"md_with_macros\"),\n\t\t\t\tTemplate: pulumi.String(\"@@password@@\"),\n\t\t\t\tTotp: \u0026auth0.ConnectionOptionsTotpArgs{\n\t\t\t\t\tLength: pulumi.Int(6),\n\t\t\t\t\tTimeStep: pulumi.Int(300),\n\t\t\t\t},\n\t\t\t},\n\t\t\tStrategy: pulumi.String(\"sms\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.auth0.Connection;\nimport com.pulumi.auth0.ConnectionArgs;\nimport com.pulumi.auth0.inputs.ConnectionOptionsArgs;\nimport com.pulumi.auth0.inputs.ConnectionOptionsGatewayAuthenticationArgs;\nimport com.pulumi.auth0.inputs.ConnectionOptionsTotpArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var sms = new Connection(\"sms\", ConnectionArgs.builder() \n .isDomainConnection(false)\n .options(ConnectionOptionsArgs.builder()\n .bruteForceProtection(true)\n .disableSignup(false)\n .forwardRequestInfo(true)\n .from(\"+15555555555\")\n .gatewayAuthentication(ConnectionOptionsGatewayAuthenticationArgs.builder()\n .audience(\"https://somewhere.com/sms-gateway\")\n .method(\"bearer\")\n .secret(\"4e2680bb74ec2ae24736476dd37ed6c2\")\n .secretBase64Encoded(false)\n .subject(\"test.us.auth0.com:sms\")\n .build())\n .gatewayUrl(\"https://somewhere.com/sms-gateway\")\n .name(\"sms\")\n .provider(\"sms_gateway\")\n .syntax(\"md_with_macros\")\n .template(\"@@password@@\")\n .totp(ConnectionOptionsTotpArgs.builder()\n .length(6)\n .timeStep(300)\n .build())\n .build())\n .strategy(\"sms\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n sms:\n type: auth0:Connection\n properties:\n isDomainConnection: false\n options:\n bruteForceProtection: true\n disableSignup: false\n forwardRequestInfo: true\n from: '+15555555555'\n gatewayAuthentication:\n audience: https://somewhere.com/sms-gateway\n method: bearer\n secret: 4e2680bb74ec2ae24736476dd37ed6c2\n secretBase64Encoded: false\n subject: test.us.auth0.com:sms\n gatewayUrl: https://somewhere.com/sms-gateway\n name: sms\n provider: sms_gateway\n syntax: md_with_macros\n template: '@@password@@'\n totp:\n length: 6\n timeStep: 300\n strategy: sms\n```\n{{% /example %}}\n{{% example %}}\n### Email Connection\n\n\u003e To be able to see this in the management dashboard as well, the name of the connection must be set to \"email\".\n\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as auth0 from \"@pulumi/auth0\";\n\nconst passwordlessEmail = new auth0.Connection(\"passwordlessEmail\", {\n options: {\n authParams: {\n responseType: \"code\",\n scope: \"openid email profile offline_access\",\n },\n bruteForceProtection: true,\n disableSignup: false,\n from: \"{{ application.name }} \u003croot@auth0.com\u003e\",\n name: \"email\",\n nonPersistentAttrs: [],\n setUserRootAttributes: \"on_each_login\",\n subject: \"Welcome to {{ application.name }}\",\n syntax: \"liquid\",\n template: \"\u003chtml\u003eThis is the body of the email\u003c/html\u003e\",\n totp: {\n length: 6,\n timeStep: 300,\n },\n },\n strategy: \"email\",\n});\n```\n```python\nimport pulumi\nimport pulumi_auth0 as auth0\n\npasswordless_email = auth0.Connection(\"passwordlessEmail\",\n options=auth0.ConnectionOptionsArgs(\n auth_params={\n \"responseType\": \"code\",\n \"scope\": \"openid email profile offline_access\",\n },\n brute_force_protection=True,\n disable_signup=False,\n from_=\"{{ application.name }} \u003croot@auth0.com\u003e\",\n name=\"email\",\n non_persistent_attrs=[],\n set_user_root_attributes=\"on_each_login\",\n subject=\"Welcome to {{ application.name }}\",\n syntax=\"liquid\",\n template=\"\u003chtml\u003eThis is the body of the email\u003c/html\u003e\",\n totp=auth0.ConnectionOptionsTotpArgs(\n length=6,\n time_step=300,\n ),\n ),\n strategy=\"email\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Auth0 = Pulumi.Auth0;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var passwordlessEmail = new Auth0.Connection(\"passwordlessEmail\", new()\n {\n Options = new Auth0.Inputs.ConnectionOptionsArgs\n {\n AuthParams = \n {\n { \"responseType\", \"code\" },\n { \"scope\", \"openid email profile offline_access\" },\n },\n BruteForceProtection = true,\n DisableSignup = false,\n From = \"{{ application.name }} \u003croot@auth0.com\u003e\",\n Name = \"email\",\n NonPersistentAttrs = new() { },\n SetUserRootAttributes = \"on_each_login\",\n Subject = \"Welcome to {{ application.name }}\",\n Syntax = \"liquid\",\n Template = \"\u003chtml\u003eThis is the body of the email\u003c/html\u003e\",\n Totp = new Auth0.Inputs.ConnectionOptionsTotpArgs\n {\n Length = 6,\n TimeStep = 300,\n },\n },\n Strategy = \"email\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := auth0.NewConnection(ctx, \"passwordlessEmail\", \u0026auth0.ConnectionArgs{\n\t\t\tOptions: \u0026auth0.ConnectionOptionsArgs{\n\t\t\t\tAuthParams: pulumi.StringMap{\n\t\t\t\t\t\"responseType\": pulumi.String(\"code\"),\n\t\t\t\t\t\"scope\": pulumi.String(\"openid email profile offline_access\"),\n\t\t\t\t},\n\t\t\t\tBruteForceProtection: pulumi.Bool(true),\n\t\t\t\tDisableSignup: pulumi.Bool(false),\n\t\t\t\tFrom: pulumi.String(\"{{ application.name }} \u003croot@auth0.com\u003e\"),\n\t\t\t\tName: pulumi.String(\"email\"),\n\t\t\t\tNonPersistentAttrs: pulumi.StringArray{},\n\t\t\t\tSetUserRootAttributes: pulumi.String(\"on_each_login\"),\n\t\t\t\tSubject: pulumi.String(\"Welcome to {{ application.name }}\"),\n\t\t\t\tSyntax: pulumi.String(\"liquid\"),\n\t\t\t\tTemplate: pulumi.String(\"\u003chtml\u003eThis is the body of the email\u003c/html\u003e\"),\n\t\t\t\tTotp: \u0026auth0.ConnectionOptionsTotpArgs{\n\t\t\t\t\tLength: pulumi.Int(6),\n\t\t\t\t\tTimeStep: pulumi.Int(300),\n\t\t\t\t},\n\t\t\t},\n\t\t\tStrategy: pulumi.String(\"email\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.auth0.Connection;\nimport com.pulumi.auth0.ConnectionArgs;\nimport com.pulumi.auth0.inputs.ConnectionOptionsArgs;\nimport com.pulumi.auth0.inputs.ConnectionOptionsTotpArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var passwordlessEmail = new Connection(\"passwordlessEmail\", ConnectionArgs.builder() \n .options(ConnectionOptionsArgs.builder()\n .authParams(Map.ofEntries(\n Map.entry(\"responseType\", \"code\"),\n Map.entry(\"scope\", \"openid email profile offline_access\")\n ))\n .bruteForceProtection(true)\n .disableSignup(false)\n .from(\"{{ application.name }} \u003croot@auth0.com\u003e\")\n .name(\"email\")\n .nonPersistentAttrs()\n .setUserRootAttributes(\"on_each_login\")\n .subject(\"Welcome to {{ application.name }}\")\n .syntax(\"liquid\")\n .template(\"\u003chtml\u003eThis is the body of the email\u003c/html\u003e\")\n .totp(ConnectionOptionsTotpArgs.builder()\n .length(6)\n .timeStep(300)\n .build())\n .build())\n .strategy(\"email\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n passwordlessEmail:\n type: auth0:Connection\n properties:\n options:\n authParams:\n responseType: code\n scope: openid email profile offline_access\n bruteForceProtection: true\n disableSignup: false\n from: '{{ application.name }} \u003croot@auth0.com\u003e'\n name: email\n nonPersistentAttrs: []\n setUserRootAttributes: on_each_login\n subject: Welcome to {{ application.name }}\n syntax: liquid\n template: \u003chtml\u003eThis is the body of the email\u003c/html\u003e\n totp:\n length: 6\n timeStep: 300\n strategy: email\n```\n{{% /example %}}\n{{% example %}}\n### WindowsLive Connection\n\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as auth0 from \"@pulumi/auth0\";\n\nconst windowslive = new auth0.Connection(\"windowslive\", {\n options: {\n clientId: \"\u003cclient-id\u003e\",\n clientSecret: \"\u003cclient-secret\u003e\",\n nonPersistentAttrs: [\n \"ethnicity\",\n \"gender\",\n ],\n scopes: [\n \"signin\",\n \"graph_user\",\n ],\n setUserRootAttributes: \"on_first_login\",\n strategyVersion: 2,\n },\n strategy: \"windowslive\",\n});\n```\n```python\nimport pulumi\nimport pulumi_auth0 as auth0\n\nwindowslive = auth0.Connection(\"windowslive\",\n options=auth0.ConnectionOptionsArgs(\n client_id=\"\u003cclient-id\u003e\",\n client_secret=\"\u003cclient-secret\u003e\",\n non_persistent_attrs=[\n \"ethnicity\",\n \"gender\",\n ],\n scopes=[\n \"signin\",\n \"graph_user\",\n ],\n set_user_root_attributes=\"on_first_login\",\n strategy_version=2,\n ),\n strategy=\"windowslive\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Auth0 = Pulumi.Auth0;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var windowslive = new Auth0.Connection(\"windowslive\", new()\n {\n Options = new Auth0.Inputs.ConnectionOptionsArgs\n {\n ClientId = \"\u003cclient-id\u003e\",\n ClientSecret = \"\u003cclient-secret\u003e\",\n NonPersistentAttrs = new[]\n {\n \"ethnicity\",\n \"gender\",\n },\n Scopes = new[]\n {\n \"signin\",\n \"graph_user\",\n },\n SetUserRootAttributes = \"on_first_login\",\n StrategyVersion = 2,\n },\n Strategy = \"windowslive\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := auth0.NewConnection(ctx, \"windowslive\", \u0026auth0.ConnectionArgs{\n\t\t\tOptions: \u0026auth0.ConnectionOptionsArgs{\n\t\t\t\tClientId: pulumi.String(\"\u003cclient-id\u003e\"),\n\t\t\t\tClientSecret: pulumi.String(\"\u003cclient-secret\u003e\"),\n\t\t\t\tNonPersistentAttrs: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"ethnicity\"),\n\t\t\t\t\tpulumi.String(\"gender\"),\n\t\t\t\t},\n\t\t\t\tScopes: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"signin\"),\n\t\t\t\t\tpulumi.String(\"graph_user\"),\n\t\t\t\t},\n\t\t\t\tSetUserRootAttributes: pulumi.String(\"on_first_login\"),\n\t\t\t\tStrategyVersion: pulumi.Int(2),\n\t\t\t},\n\t\t\tStrategy: pulumi.String(\"windowslive\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.auth0.Connection;\nimport com.pulumi.auth0.ConnectionArgs;\nimport com.pulumi.auth0.inputs.ConnectionOptionsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var windowslive = new Connection(\"windowslive\", ConnectionArgs.builder() \n .options(ConnectionOptionsArgs.builder()\n .clientId(\"\u003cclient-id\u003e\")\n .clientSecret(\"\u003cclient-secret\u003e\")\n .nonPersistentAttrs( \n \"ethnicity\",\n \"gender\")\n .scopes( \n \"signin\",\n \"graph_user\")\n .setUserRootAttributes(\"on_first_login\")\n .strategyVersion(2)\n .build())\n .strategy(\"windowslive\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n windowslive:\n type: auth0:Connection\n properties:\n options:\n clientId: \u003cclient-id\u003e\n clientSecret: \u003cclient-secret\u003e\n nonPersistentAttrs:\n - ethnicity\n - gender\n scopes:\n - signin\n - graph_user\n setUserRootAttributes: on_first_login\n strategyVersion: 2\n strategy: windowslive\n```\n{{% /example %}}\n{{% /examples %}}\n\n## Import\n\nThis resource can be imported by specifying the connection ID. # Example\n\n```sh\n $ pulumi import auth0:index/connection:Connection google \"con_a17f21fdb24d48a0\"\n```\n\n ", "properties": { "displayName": { "type": "string", @@ -7809,7 +7809,7 @@ } }, "auth0:index/hook:Hook": { - "description": "Hooks are secure, self-contained functions that allow you to customize the behavior of Auth0 when executed for selected extensibility points of the Auth0 platform. Auth0 invokes Hooks during runtime to execute your custom Node.js code. Depending on the extensibility point, you can use hooks with Database Connections and/or Passwordless Connections.\n\n!\u003e This resource is deprecated. Refer to the [guide on how to migrate from hooks to actions](https://auth0.com/docs/customize/actions/migrate/migrate-from-hooks-to-actions) and manage your actions using the `auth0.Action` resource.\n\n{{% examples %}}\n## Example Usage\n{{% example %}}\n\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as auth0 from \"@pulumi/auth0\";\n\nconst myHook = new auth0.Hook(\"myHook\", {\n dependencies: {\n auth0: \"2.30.0\",\n },\n enabled: true,\n script: ` function (user, context, callback) {\n callback(null, { user });\n }\n \n`,\n secrets: {\n foo: \"bar\",\n },\n triggerId: \"pre-user-registration\",\n});\n```\n```python\nimport pulumi\nimport pulumi_auth0 as auth0\n\nmy_hook = auth0.Hook(\"myHook\",\n dependencies={\n \"auth0\": \"2.30.0\",\n },\n enabled=True,\n script=\"\"\" function (user, context, callback) {\n callback(null, { user });\n }\n \n\"\"\",\n secrets={\n \"foo\": \"bar\",\n },\n trigger_id=\"pre-user-registration\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Auth0 = Pulumi.Auth0;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var myHook = new Auth0.Hook(\"myHook\", new()\n {\n Dependencies = \n {\n { \"auth0\", \"2.30.0\" },\n },\n Enabled = true,\n Script = @\" function (user, context, callback) {\n callback(null, { user });\n }\n \n\",\n Secrets = \n {\n { \"foo\", \"bar\" },\n },\n TriggerId = \"pre-user-registration\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := auth0.NewHook(ctx, \"myHook\", \u0026auth0.HookArgs{\n\t\t\tDependencies: pulumi.AnyMap{\n\t\t\t\t\"auth0\": pulumi.Any(\"2.30.0\"),\n\t\t\t},\n\t\t\tEnabled: pulumi.Bool(true),\n\t\t\tScript: pulumi.String(\" function (user, context, callback) {\\n callback(null, { user });\\n }\\n \\n\"),\n\t\t\tSecrets: pulumi.AnyMap{\n\t\t\t\t\"foo\": pulumi.Any(\"bar\"),\n\t\t\t},\n\t\t\tTriggerId: pulumi.String(\"pre-user-registration\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.auth0.Hook;\nimport com.pulumi.auth0.HookArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var myHook = new Hook(\"myHook\", HookArgs.builder() \n .dependencies(Map.of(\"auth0\", \"2.30.0\"))\n .enabled(true)\n .script(\"\"\"\n function (user, context, callback) {\n callback(null, { user });\n }\n \n \"\"\")\n .secrets(Map.of(\"foo\", \"bar\"))\n .triggerId(\"pre-user-registration\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n myHook:\n type: auth0:Hook\n properties:\n dependencies:\n auth0: 2.30.0\n enabled: true\n script: \" function (user, context, callback) {\\n callback(null, { user });\\n }\\n \\n\"\n secrets:\n foo: bar\n triggerId: pre-user-registration\n```\n{{% /example %}}\n{{% /examples %}}\n\n## Import\n\nThis resource can be imported by specifying the hook ID. # Example\n\n```sh\n $ pulumi import auth0:index/hook:Hook my_hook \"00001\"\n```\n\n ", + "description": "Hooks are secure, self-contained functions that allow you to customize the behavior of Auth0 when executed for selected extensibility points of the Auth0 platform. Auth0 invokes Hooks during runtime to execute your custom Node.js code. Depending on the extensibility point, you can use hooks with Database Connections and/or Passwordless Connections.\n\n!\u003e This resource is deprecated. Refer to the [guide on how to migrate from hooks to actions](https://auth0.com/docs/customize/actions/migrate/migrate-from-hooks-to-actions) and manage your actions using the `auth0.Action` resource.\n\n{{% examples %}}\n## Example Usage\n{{% example %}}\n\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as auth0 from \"@pulumi/auth0\";\n\nconst myHook = new auth0.Hook(\"myHook\", {\n dependencies: {\n auth0: \"2.30.0\",\n },\n enabled: true,\n script: ` function (user, context, callback) {\n callback(null, { user });\n }\n \n`,\n secrets: {\n foo: \"bar\",\n },\n triggerId: \"pre-user-registration\",\n});\n```\n```python\nimport pulumi\nimport pulumi_auth0 as auth0\n\nmy_hook = auth0.Hook(\"myHook\",\n dependencies={\n \"auth0\": \"2.30.0\",\n },\n enabled=True,\n script=\"\"\" function (user, context, callback) {\n callback(null, { user });\n }\n \n\"\"\",\n secrets={\n \"foo\": \"bar\",\n },\n trigger_id=\"pre-user-registration\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Auth0 = Pulumi.Auth0;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var myHook = new Auth0.Hook(\"myHook\", new()\n {\n Dependencies = \n {\n { \"auth0\", \"2.30.0\" },\n },\n Enabled = true,\n Script = @\" function (user, context, callback) {\n callback(null, { user });\n }\n \n\",\n Secrets = \n {\n { \"foo\", \"bar\" },\n },\n TriggerId = \"pre-user-registration\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := auth0.NewHook(ctx, \"myHook\", \u0026auth0.HookArgs{\n\t\t\tDependencies: pulumi.Map{\n\t\t\t\t\"auth0\": pulumi.Any(\"2.30.0\"),\n\t\t\t},\n\t\t\tEnabled: pulumi.Bool(true),\n\t\t\tScript: pulumi.String(\" function (user, context, callback) {\\n callback(null, { user });\\n }\\n \\n\"),\n\t\t\tSecrets: pulumi.Map{\n\t\t\t\t\"foo\": pulumi.Any(\"bar\"),\n\t\t\t},\n\t\t\tTriggerId: pulumi.String(\"pre-user-registration\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.auth0.Hook;\nimport com.pulumi.auth0.HookArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var myHook = new Hook(\"myHook\", HookArgs.builder() \n .dependencies(Map.of(\"auth0\", \"2.30.0\"))\n .enabled(true)\n .script(\"\"\"\n function (user, context, callback) {\n callback(null, { user });\n }\n \n \"\"\")\n .secrets(Map.of(\"foo\", \"bar\"))\n .triggerId(\"pre-user-registration\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n myHook:\n type: auth0:Hook\n properties:\n dependencies:\n auth0: 2.30.0\n enabled: true\n script: \" function (user, context, callback) {\\n callback(null, { user });\\n }\\n \\n\"\n secrets:\n foo: bar\n triggerId: pre-user-registration\n```\n{{% /example %}}\n{{% /examples %}}\n\n## Import\n\nThis resource can be imported by specifying the hook ID. # Example\n\n```sh\n $ pulumi import auth0:index/hook:Hook my_hook \"00001\"\n```\n\n ", "properties": { "dependencies": { "type": "object", diff --git a/provider/go.mod b/provider/go.mod index 35fd48e9..f7d4c324 100644 --- a/provider/go.mod +++ b/provider/go.mod @@ -10,8 +10,8 @@ replace ( require ( github.com/auth0/terraform-provider-auth0 v0.50.2 - github.com/pulumi/pulumi-terraform-bridge/v3 v3.61.0 - github.com/pulumi/pulumi/sdk/v3 v3.86.0 + github.com/pulumi/pulumi-terraform-bridge/v3 v3.63.0 + github.com/pulumi/pulumi/sdk/v3 v3.90.1 ) require ( @@ -24,12 +24,7 @@ require ( cloud.google.com/go/longrunning v0.5.1 // indirect cloud.google.com/go/storage v1.30.1 // indirect dario.cat/mergo v1.0.0 // indirect - github.com/AlecAivazis/survey/v2 v2.3.7 // indirect github.com/Azure/azure-sdk-for-go v66.0.0+incompatible // indirect - github.com/Azure/azure-sdk-for-go/sdk/azcore v1.1.1 // indirect - github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.0.0 // indirect - github.com/Azure/azure-sdk-for-go/sdk/internal v1.0.0 // indirect - github.com/Azure/azure-sdk-for-go/sdk/storage/azblob v0.4.1 // indirect github.com/Azure/go-autorest v14.2.0+incompatible // indirect github.com/Azure/go-autorest/autorest v0.11.28 // indirect github.com/Azure/go-autorest/autorest/adal v0.9.21 // indirect @@ -40,7 +35,6 @@ require ( github.com/Azure/go-autorest/autorest/validation v0.3.1 // indirect github.com/Azure/go-autorest/logger v0.2.1 // indirect github.com/Azure/go-autorest/tracing v0.6.0 // indirect - github.com/AzureAD/microsoft-authentication-library-for-go v0.4.0 // indirect github.com/BurntSushi/toml v1.2.1 // indirect github.com/Masterminds/goutils v1.1.1 // indirect github.com/Masterminds/semver v1.5.0 // indirect @@ -60,21 +54,14 @@ require ( github.com/auth0/go-auth0 v1.1.0 // indirect github.com/aws/aws-sdk-go v1.44.298 // indirect github.com/aws/aws-sdk-go-v2 v1.17.3 // indirect - github.com/aws/aws-sdk-go-v2/aws/protocol/eventstream v1.4.3 // indirect github.com/aws/aws-sdk-go-v2/config v1.15.15 // indirect github.com/aws/aws-sdk-go-v2/credentials v1.12.10 // indirect github.com/aws/aws-sdk-go-v2/feature/ec2/imds v1.12.9 // indirect - github.com/aws/aws-sdk-go-v2/feature/s3/manager v1.11.21 // indirect github.com/aws/aws-sdk-go-v2/internal/configsources v1.1.27 // indirect github.com/aws/aws-sdk-go-v2/internal/endpoints/v2 v2.4.21 // indirect github.com/aws/aws-sdk-go-v2/internal/ini v1.3.16 // indirect - github.com/aws/aws-sdk-go-v2/internal/v4a v1.0.6 // indirect - github.com/aws/aws-sdk-go-v2/service/internal/accept-encoding v1.9.3 // indirect - github.com/aws/aws-sdk-go-v2/service/internal/checksum v1.1.10 // indirect github.com/aws/aws-sdk-go-v2/service/internal/presigned-url v1.9.9 // indirect - github.com/aws/aws-sdk-go-v2/service/internal/s3shared v1.13.9 // indirect github.com/aws/aws-sdk-go-v2/service/kms v1.18.1 // indirect - github.com/aws/aws-sdk-go-v2/service/s3 v1.27.2 // indirect github.com/aws/aws-sdk-go-v2/service/sso v1.11.13 // indirect github.com/aws/aws-sdk-go-v2/service/sts v1.16.10 // indirect github.com/aws/smithy-go v1.13.5 // indirect @@ -92,7 +79,6 @@ require ( github.com/davecgh/go-spew v1.1.1 // indirect github.com/dimchansky/utfbom v1.1.1 // indirect github.com/djherbis/times v1.5.0 // indirect - github.com/dustin/go-humanize v1.0.1 // indirect github.com/edsrzf/mmap-go v1.1.0 // indirect github.com/emirpasic/gods v1.18.1 // indirect github.com/ettle/strcase v0.1.1 // indirect @@ -103,13 +89,12 @@ require ( github.com/go-git/go-git/v5 v5.8.1 // indirect github.com/gofrs/uuid v4.2.0+incompatible // indirect github.com/gogo/protobuf v1.3.2 // indirect - github.com/golang-jwt/jwt v3.2.1+incompatible // indirect github.com/golang-jwt/jwt/v4 v4.4.2 // indirect github.com/golang/glog v1.1.0 // indirect github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da // indirect github.com/golang/protobuf v1.5.3 // indirect github.com/golang/snappy v0.0.4 // indirect - github.com/google/go-cmp v0.5.9 // indirect + github.com/google/go-cmp v0.6.0 // indirect github.com/google/go-querystring v1.1.0 // indirect github.com/google/s2a-go v0.1.4 // indirect github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510 // indirect @@ -143,29 +128,25 @@ require ( github.com/hashicorp/logutils v1.0.0 // indirect github.com/hashicorp/terraform-plugin-go v0.19.0 // indirect github.com/hashicorp/terraform-plugin-log v0.9.0 // indirect - github.com/hashicorp/terraform-plugin-sdk/v2 v2.28.0 // indirect + github.com/hashicorp/terraform-plugin-sdk/v2 v2.29.0 // indirect github.com/hashicorp/terraform-svchost v0.1.1 // indirect github.com/hashicorp/vault/api v1.8.2 // indirect github.com/hashicorp/vault/sdk v0.6.1 // indirect github.com/hashicorp/yamux v0.1.1 // indirect github.com/huandu/xstrings v1.3.2 // indirect github.com/iancoleman/strcase v0.2.0 // indirect - github.com/ijc/Gotty v0.0.0-20170406111628-a8b993ba6abd // indirect github.com/imdario/mergo v0.3.15 // indirect github.com/inconshreveable/mousetrap v1.1.0 // indirect github.com/jbenet/go-context v0.0.0-20150711004518-d14ea06fba99 // indirect github.com/jmespath/go-jmespath v0.4.0 // indirect github.com/json-iterator/go v1.1.12 // indirect - github.com/kballard/go-shellquote v0.0.0-20180428030007-95032a82bc51 // indirect github.com/kevinburke/ssh_config v1.2.0 // indirect github.com/klauspost/compress v1.16.0 // indirect - github.com/kylelemons/godebug v1.1.0 // indirect github.com/lucasb-eyer/go-colorful v1.2.0 // indirect github.com/mattn/go-colorable v0.1.13 // indirect github.com/mattn/go-isatty v0.0.18 // indirect github.com/mattn/go-localereader v0.0.1 // indirect github.com/mattn/go-runewidth v0.0.14 // indirect - github.com/mgutz/ansi v0.0.0-20170206155736-9520e82c474b // indirect github.com/mitchellh/cli v1.1.5 // indirect github.com/mitchellh/copystructure v1.2.0 // indirect github.com/mitchellh/go-homedir v1.1.0 // indirect @@ -188,19 +169,19 @@ require ( github.com/pgavlin/goldmark v1.1.33-0.20200616210433-b5eb04559386 // indirect github.com/pierrec/lz4 v2.6.1+incompatible // indirect github.com/pjbgf/sha1cd v0.3.0 // indirect - github.com/pkg/browser v0.0.0-20210115035449-ce105d075bb4 // indirect github.com/pkg/errors v0.9.1 // indirect github.com/pkg/term v1.1.0 // indirect github.com/pmezard/go-difflib v1.0.0 // indirect github.com/posener/complete v1.2.3 // indirect - github.com/pulumi/pulumi-java/pkg v0.9.6 // indirect + github.com/pulumi/esc v0.5.6 // indirect + github.com/pulumi/pulumi-java/pkg v0.9.8 // indirect github.com/pulumi/pulumi-terraform-bridge/x/muxer v0.0.4 // indirect github.com/pulumi/pulumi-yaml v1.2.2 // indirect - github.com/pulumi/pulumi/pkg/v3 v3.86.0 // indirect + github.com/pulumi/pulumi/pkg/v3 v3.90.1 // indirect github.com/pulumi/schema-tools v0.1.2 // indirect github.com/pulumi/terraform-diff-reader v0.0.2 // indirect github.com/rivo/uniseg v0.4.4 // indirect - github.com/rogpeppe/go-internal v1.9.0 // indirect + github.com/rogpeppe/go-internal v1.11.0 // indirect github.com/russross/blackfriday/v2 v2.1.0 // indirect github.com/ryanuber/go-glob v1.0.0 // indirect github.com/sabhiram/go-gitignore v0.0.0-20210923224102-525f6e181f06 // indirect @@ -232,16 +213,17 @@ require ( go.uber.org/atomic v1.9.0 // indirect gocloud.dev v0.27.0 // indirect gocloud.dev/secrets/hashivault v0.27.0 // indirect - golang.org/x/crypto v0.13.0 // indirect - golang.org/x/mod v0.12.0 // indirect - golang.org/x/net v0.15.0 // indirect + golang.org/x/crypto v0.14.0 // indirect + golang.org/x/exp v0.0.0-20231006140011-7918f672742d // indirect + golang.org/x/mod v0.13.0 // indirect + golang.org/x/net v0.17.0 // indirect golang.org/x/oauth2 v0.12.0 // indirect - golang.org/x/sync v0.2.0 // indirect - golang.org/x/sys v0.12.0 // indirect - golang.org/x/term v0.12.0 // indirect + golang.org/x/sync v0.4.0 // indirect + golang.org/x/sys v0.13.0 // indirect + golang.org/x/term v0.13.0 // indirect golang.org/x/text v0.13.0 // indirect golang.org/x/time v0.3.0 // indirect - golang.org/x/tools v0.9.3 // indirect + golang.org/x/tools v0.14.0 // indirect golang.org/x/xerrors v0.0.0-20220907171357-04be3eba64a2 // indirect google.golang.org/api v0.126.0 // indirect google.golang.org/appengine v1.6.7 // indirect diff --git a/provider/go.sum b/provider/go.sum index 235cc8e0..dcb6e246 100644 --- a/provider/go.sum +++ b/provider/go.sum @@ -629,8 +629,6 @@ dmitri.shuralyov.com/gpu/mtl v0.0.0-20190408044501-666a987793e9/go.mod h1:H6x//7 gioui.org v0.0.0-20210308172011-57750fc8a0a6/go.mod h1:RSH6KIUZ0p2xy5zHDxgAM4zumjgTw83q2ge/PI+yyw8= git.sr.ht/~sbinet/gg v0.3.1/go.mod h1:KGYtlADtqsqANL9ueOFkWymvzUvLMQllU5Ixo+8v3pc= github.com/AdaLogics/go-fuzz-headers v0.0.0-20210715213245-6c3934b029d8/go.mod h1:CzsSbkDixRphAF5hS6wbMKq0eI6ccJRb7/A0M6JBnwg= -github.com/AlecAivazis/survey/v2 v2.3.7 h1:6I/u8FvytdGsgonrYsVn2t8t4QiRnh6QSTqkkhIiSjQ= -github.com/AlecAivazis/survey/v2 v2.3.7/go.mod h1:xUTIdE4KCOIjsBAE1JYsUPoCqYdZ1reCfTwbto0Fduo= github.com/Azure/azure-amqp-common-go/v3 v3.2.3/go.mod h1:7rPmbSfszeovxGfc5fSAXE4ehlXQZHpMja2OtxC2Tas= github.com/Azure/azure-sdk-for-go v16.2.1+incompatible/go.mod h1:9XXNKU+eRnpl9moKnB4QOLf1HestfXbmab5FXxiDBjc= github.com/Azure/azure-sdk-for-go v63.0.0+incompatible/go.mod h1:9XXNKU+eRnpl9moKnB4QOLf1HestfXbmab5FXxiDBjc= @@ -639,16 +637,12 @@ github.com/Azure/azure-sdk-for-go v66.0.0+incompatible h1:bmmC38SlE8/E81nNADlgmV github.com/Azure/azure-sdk-for-go v66.0.0+incompatible/go.mod h1:9XXNKU+eRnpl9moKnB4QOLf1HestfXbmab5FXxiDBjc= github.com/Azure/azure-sdk-for-go/sdk/azcore v0.19.0/go.mod h1:h6H6c8enJmmocHUbLiiGY6sx7f9i+X3m1CHdd5c6Rdw= github.com/Azure/azure-sdk-for-go/sdk/azcore v1.0.0/go.mod h1:uGG2W01BaETf0Ozp+QxxKJdMBNRWPdstHG0Fmdwn1/U= -github.com/Azure/azure-sdk-for-go/sdk/azcore v1.1.1 h1:tz19qLF65vuu2ibfTqGVJxG/zZAI27NEIIbvAOQwYbw= github.com/Azure/azure-sdk-for-go/sdk/azcore v1.1.1/go.mod h1:uGG2W01BaETf0Ozp+QxxKJdMBNRWPdstHG0Fmdwn1/U= github.com/Azure/azure-sdk-for-go/sdk/azidentity v0.11.0/go.mod h1:HcM1YX14R7CJcghJGOYCgdezslRSVzqwLf/q+4Y2r/0= -github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.0.0 h1:Yoicul8bnVdQrhDMTHxdEckRGX01XvwXDHUT9zYZ3k0= github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.0.0/go.mod h1:+6sju8gk8FRmSajX3Oz4G5Gm7P+mbqE9FVaXXFYTkCM= github.com/Azure/azure-sdk-for-go/sdk/internal v0.7.0/go.mod h1:yqy467j36fJxcRV2TzfVZ1pCb5vxm4BtZPUdYWe/Xo8= -github.com/Azure/azure-sdk-for-go/sdk/internal v1.0.0 h1:jp0dGvZ7ZK0mgqnTSClMxa5xuRL7NZgHameVYF6BurY= github.com/Azure/azure-sdk-for-go/sdk/internal v1.0.0/go.mod h1:eWRD7oawr1Mu1sLCawqVc0CUiF43ia3qQMxLscsKQ9w= github.com/Azure/azure-sdk-for-go/sdk/messaging/azservicebus v1.0.2/go.mod h1:LH9XQnMr2ZYxQdVdCrzLO9mxeDyrDFa6wbSI3x5zCZk= -github.com/Azure/azure-sdk-for-go/sdk/storage/azblob v0.4.1 h1:QSdcrd/UFJv6Bp/CfoVf2SrENpFn9P6Yh8yb+xNhYMM= github.com/Azure/azure-sdk-for-go/sdk/storage/azblob v0.4.1/go.mod h1:eZ4g6GUvXiGulfIbbhh1Xr4XwUYaYaWMqzGD/284wCA= github.com/Azure/go-amqp v0.17.0/go.mod h1:9YJ3RhxRT1gquYnzpZO1vcYMMpAdJT+QEg6fwmw9Zlg= github.com/Azure/go-amqp v0.17.5/go.mod h1:9YJ3RhxRT1gquYnzpZO1vcYMMpAdJT+QEg6fwmw9Zlg= @@ -692,7 +686,6 @@ github.com/Azure/go-autorest/logger v0.2.1 h1:IG7i4p/mDa2Ce4TRyAO8IHnVhAVF3RFU+Z github.com/Azure/go-autorest/logger v0.2.1/go.mod h1:T9E3cAhj2VqvPOtCYAvby9aBXkZmbF5NWuPV8+WeEW8= github.com/Azure/go-autorest/tracing v0.6.0 h1:TYi4+3m5t6K48TGI9AUdb+IzbnSxvnvUMfuitfgcfuo= github.com/Azure/go-autorest/tracing v0.6.0/go.mod h1:+vhtPC754Xsa23ID7GlGsrdKBpUA79WCAKPPZVC2DeU= -github.com/AzureAD/microsoft-authentication-library-for-go v0.4.0 h1:WVsrXCnHlDDX8ls+tootqRE87/hL9S/g4ewig9RsD/c= github.com/AzureAD/microsoft-authentication-library-for-go v0.4.0/go.mod h1:Vt9sXTKwMyGcOxSmLDMnGPgqsUg7m8pe215qMLrDXw4= github.com/BurntSushi/toml v0.3.1/go.mod h1:xHWCNGjB5oqiDr8zfno3MHue2Ht5sIBksp03qcyfWMU= github.com/BurntSushi/toml v1.2.1 h1:9F2/+DoOYIOksmaJFPw1tGFy1eDnIJXg+UHjuD8lTak= @@ -740,8 +733,6 @@ github.com/Microsoft/hcsshim/test v0.0.0-20201218223536-d3e5debf77da/go.mod h1:5 github.com/Microsoft/hcsshim/test v0.0.0-20210227013316-43a75bb4edd3/go.mod h1:mw7qgWloBUl75W/gVH3cQszUg1+gUITj7D6NY7ywVnY= github.com/NYTimes/gziphandler v0.0.0-20170623195520-56545f4a5d46/go.mod h1:3wb06e3pkSAbeQ52E9H9iFoQsEEwGN64994WTCIhntQ= github.com/NYTimes/gziphandler v1.1.1/go.mod h1:n/CVRwUEOgIxrgPvAQhUUr9oeUtvrhMomdKFjzJNB0c= -github.com/Netflix/go-expect v0.0.0-20220104043353-73e0943537d2 h1:+vx7roKuyA63nhn5WAunQHLTznkw5W8b1Xc0dNjp83s= -github.com/Netflix/go-expect v0.0.0-20220104043353-73e0943537d2/go.mod h1:HBCaDeC1lPdgDeDbhX8XFpy1jqjK0IBG8W5K+xYqA0w= github.com/OneOfOne/xxhash v1.2.2/go.mod h1:HSdplMjZKSmBqAxg5vPj2TmRDmfkzw+cTzAElWljhcU= github.com/ProtonMail/go-crypto v0.0.0-20230717121422-5aa5874ade95 h1:KLq8BE0KwCL+mmXnjLWEAOYO+2l2AE4YMmqG1ZpZHBs= github.com/ProtonMail/go-crypto v0.0.0-20230717121422-5aa5874ade95/go.mod h1:EjAoLdwvbIOoOQr3ihjnSoLZRtE8azugULFRteWMNc0= @@ -1101,8 +1092,6 @@ github.com/cpuguy83/go-md2man/v2 v2.0.2/go.mod h1:tgQtvFlXSQOSOSIRvRPT7W67SCa46t github.com/creack/pty v1.1.7/go.mod h1:lj5s0c3V2DBrqTV7llrYr5NG6My20zk30Fl46Y7DoTY= github.com/creack/pty v1.1.9/go.mod h1:oKZEueFk5CKHvIhNR5MUki03XCEU+Q6VDXinZuGJ33E= github.com/creack/pty v1.1.11/go.mod h1:oKZEueFk5CKHvIhNR5MUki03XCEU+Q6VDXinZuGJ33E= -github.com/creack/pty v1.1.17 h1:QeVUsEDNrLBW4tMgZHvxy18sKtr6VI492kBhUfhDJNI= -github.com/creack/pty v1.1.17/go.mod h1:MOBLtS5ELjhRRrroQr9kyvTxUAFNvYEK993ew/Vr4O4= github.com/cyphar/filepath-securejoin v0.2.2/go.mod h1:FpkQEhXnPnOthhzymB7CGsFk2G9VLXONKD9G7QGMM+4= github.com/cyphar/filepath-securejoin v0.2.3/go.mod h1:aPGpWjXOXUn2NCNjFvBE6aRxGGx79pTxQpKOJNYHHl4= github.com/d2g/dhcp4 v0.0.0-20170904100407-a1d1b6c41b1c/go.mod h1:Ct2BUK8SB0YC1SMSibvLzxjeJLnrYEVLULFNiHY9YfQ= @@ -1128,7 +1117,6 @@ github.com/djherbis/times v1.5.0 h1:79myA211VwPhFTqUk8xehWrsEO+zcIZj0zT8mXPVARU= github.com/djherbis/times v1.5.0/go.mod h1:5q7FDLvbNg1L/KaBmPcWlVR9NmoKo3+ucqUA3ijQhA0= github.com/dnaeon/go-vcr v1.0.1/go.mod h1:aBB1+wY4s93YsC3HHjMBMrwTj2R9FHDzUr9KyGc8n1E= github.com/dnaeon/go-vcr v1.1.0/go.mod h1:M7tiix8f0r6mKKJ3Yq/kqU1OYf3MnfmBWVbPx/yU9ko= -github.com/dnaeon/go-vcr v1.2.0 h1:zHCHvJYTMh1N7xnV7zf1m1GPBF9Ad0Jk/whtQ1663qI= github.com/dnaeon/go-vcr v1.2.0/go.mod h1:R4UdLID7HZT3taECzJs4YgbbH6PIGXB6W/sc5OLb6RQ= github.com/docker/cli v0.0.0-20191017083524-a8ff7f821017/go.mod h1:JLrzqnKDaYBop7H2jaqPtU4hHvMKP+vjCwu2uszcLI8= github.com/docker/distribution v0.0.0-20190905152932-14b96e55d84c/go.mod h1:0+TTO4EOBfRPhZXAeF1Vu+W3hHZ8eLp8PgKVZlcvtFY= @@ -1150,8 +1138,6 @@ github.com/docker/spdystream v0.0.0-20160310174837-449fdfce4d96/go.mod h1:Qh8CwZ github.com/docopt/docopt-go v0.0.0-20180111231733-ee0de3bc6815/go.mod h1:WwZ+bS3ebgob9U8Nd0kOddGdZWjyMGR8Wziv+TBNwSE= github.com/dustin/go-humanize v0.0.0-20171111073723-bb3d318650d4/go.mod h1:HtrtbFcZ19U5GC7JDqmcUSB87Iq5E25KnS6fMYU6eOk= github.com/dustin/go-humanize v1.0.0/go.mod h1:HtrtbFcZ19U5GC7JDqmcUSB87Iq5E25KnS6fMYU6eOk= -github.com/dustin/go-humanize v1.0.1 h1:GzkhY7T5VNhEkwH0PVJgjz+fX1rhBrR7pRT3mDkpeCY= -github.com/dustin/go-humanize v1.0.1/go.mod h1:Mu1zIs6XwVuF/gI1OepvI0qD18qycQx+mFykh5fBlto= github.com/eapache/go-resiliency v1.1.0/go.mod h1:kFI+JgMyC7bLPUVY133qvEBtVayf5mFgVsvEsIPBvNs= github.com/eapache/go-xerial-snappy v0.0.0-20180814174437-776d5712da21/go.mod h1:+020luEh2TKB4/GOp8oxxtq0Daoen/Cii55CzbTV6DU= github.com/eapache/queue v1.1.0/go.mod h1:6eCeP0CKFpHLu8blIFXhExK/dRa7WDZfr6jVFPTqq+I= @@ -1364,7 +1350,6 @@ github.com/gogo/protobuf v1.3.0/go.mod h1:SlYgWuQ5SjCEi6WLHjHCa1yvBfUnHcTbrrZtXP github.com/gogo/protobuf v1.3.1/go.mod h1:SlYgWuQ5SjCEi6WLHjHCa1yvBfUnHcTbrrZtXPKa29o= github.com/gogo/protobuf v1.3.2 h1:Ov1cvc58UF3b5XjBnZv7+opcTcQFZebYjWzi34vdm4Q= github.com/gogo/protobuf v1.3.2/go.mod h1:P1XiOD3dCwIKUDQYPy72D8LYyHL2YPYrpS2s69NZV8Q= -github.com/golang-jwt/jwt v3.2.1+incompatible h1:73Z+4BJcrTC+KczS6WvTPvRGOp1WmfEP4Q1lOd9Z/+c= github.com/golang-jwt/jwt v3.2.1+incompatible/go.mod h1:8pz2t5EyA70fFQQSrl6XZXzqecmYZeUEB8OUGHkxJ+I= github.com/golang-jwt/jwt/v4 v4.0.0/go.mod h1:/xlHOz8bRuivTWchD4jCa+NbatV+wEUSzwAxVc6locg= github.com/golang-jwt/jwt/v4 v4.2.0/go.mod h1:/xlHOz8bRuivTWchD4jCa+NbatV+wEUSzwAxVc6locg= @@ -1437,8 +1422,9 @@ github.com/google/go-cmp v0.5.5/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/ github.com/google/go-cmp v0.5.6/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE= github.com/google/go-cmp v0.5.7/go.mod h1:n+brtR0CgQNWTVd5ZUFpTBC8YFBDLK/h/bpaJ8/DtOE= github.com/google/go-cmp v0.5.8/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY= -github.com/google/go-cmp v0.5.9 h1:O2Tfq5qg4qc4AmwVlvv0oLiVAGB7enBSJ2x2DqQFi38= github.com/google/go-cmp v0.5.9/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY= +github.com/google/go-cmp v0.6.0 h1:ofyhxvXcZhMsU5ulbFiLKl/XBFqE1GSq7atu8tAmTRI= +github.com/google/go-cmp v0.6.0/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY= github.com/google/go-containerregistry v0.5.1/go.mod h1:Ct15B4yir3PLOP5jsy0GNeYVaIZs/MK/Jz5any1wFW0= github.com/google/go-querystring v1.0.0/go.mod h1:odCYkC5MyYFN7vkCjXpyrEuKhc/BUO6wN/zVPAxq5ck= github.com/google/go-querystring v1.1.0 h1:AnCroh3fv4ZBgVIf1Iwtovgjaw/GiKJo8M8yD/fhyJ8= @@ -1691,9 +1677,6 @@ github.com/hexops/gotextdiff v1.0.3 h1:gitA9+qJrrTCsiCl7+kh75nPqQt1cx4ZkudSTLoUq github.com/hexops/gotextdiff v1.0.3/go.mod h1:pSWU5MAI3yDq+fZBTazCSJysOMbxWL1BSow5/V2vxeg= github.com/hexops/valast v1.4.0 h1:sFzyxPDP0riFQUzSBXTCCrAbbIndHPWMndxuEjXdZlc= github.com/hexops/valast v1.4.0/go.mod h1:uVjKZ0smVuYlgCSPz9NRi5A04sl7lp6GtFWsROKDgEs= -github.com/hinshun/vt10x v0.0.0-20220119200601-820417d04eec/go.mod h1:Q48J4R4DvxnHolD5P8pOtXigYlRuPLGl6moFx3ulM68= -github.com/hinshun/vt10x v0.0.0-20220301184237-5011da428d02 h1:AgcIVYPa6XJnU3phs104wLj8l5GEththEw6+F79YsIY= -github.com/hinshun/vt10x v0.0.0-20220301184237-5011da428d02/go.mod h1:Q48J4R4DvxnHolD5P8pOtXigYlRuPLGl6moFx3ulM68= github.com/hpcloud/tail v1.0.0/go.mod h1:ab1qPbhIpdTxEkNHXyeSf5vhxWSCs/tWer42PpOxQnU= github.com/huandu/xstrings v1.3.1/go.mod h1:y5/lhBue+AyNmUVz9RLU9xbLR0o4KIIExikq4ovT0aE= github.com/huandu/xstrings v1.3.2 h1:L18LIDzqlW6xN2rEkpdV8+oL/IXWJ1APd+vsdYy4Wdw= @@ -1705,8 +1688,6 @@ github.com/ianlancetaylor/demangle v0.0.0-20181102032728-5e5cf60278f6/go.mod h1: github.com/ianlancetaylor/demangle v0.0.0-20200824232613-28f6c0f3b639/go.mod h1:aSSvb/t6k1mPoxDqO4vJh6VOCGPwU4O0C2/Eqndh1Sc= github.com/ianlancetaylor/demangle v0.0.0-20210905161508-09a460cdf81d/go.mod h1:aYm2/VgdVmcIU8iMfdMvDMsRAQjcfZSKFby6HOFvi/w= github.com/ianlancetaylor/demangle v0.0.0-20220319035150-800ac71e25c2/go.mod h1:aYm2/VgdVmcIU8iMfdMvDMsRAQjcfZSKFby6HOFvi/w= -github.com/ijc/Gotty v0.0.0-20170406111628-a8b993ba6abd h1:anPrsicrIi2ColgWTVPk+TrN42hJIWlfPHSBP9S0ZkM= -github.com/ijc/Gotty v0.0.0-20170406111628-a8b993ba6abd/go.mod h1:3LVOLeyx9XVvwPgrt2be44XgSqndprz1G18rSk8KD84= github.com/imdario/mergo v0.3.5/go.mod h1:2EnlNZ0deacrJVfApfmtdGgDfMuh/nq6Ok1EcJh5FfA= github.com/imdario/mergo v0.3.8/go.mod h1:2EnlNZ0deacrJVfApfmtdGgDfMuh/nq6Ok1EcJh5FfA= github.com/imdario/mergo v0.3.10/go.mod h1:jmQim1M+e3UYxmgPu/WyfjB3N3VflVyUjjjwH0dnCYA= @@ -1803,7 +1784,6 @@ github.com/jung-kurt/gofpdf v1.0.0/go.mod h1:7Id9E/uU8ce6rXgefFLlgrJj/GYY22cpxn+ github.com/jung-kurt/gofpdf v1.0.3-0.20190309125859-24315acbbda5/go.mod h1:7Id9E/uU8ce6rXgefFLlgrJj/GYY22cpxn+r32jIOes= github.com/karrick/godirwalk v1.8.0/go.mod h1:H5KPZjojv4lE+QYImBI8xVtrBRgYrIVsaRPx4tDPEn4= github.com/karrick/godirwalk v1.10.3/go.mod h1:RoGL9dQei4vP9ilrpETWE8CLOZ1kiN0LhBygSwrAsHA= -github.com/kballard/go-shellquote v0.0.0-20180428030007-95032a82bc51 h1:Z9n2FFNUXsshfwJMBgNA0RU6/i7WVaAegv3PtuIHPMs= github.com/kballard/go-shellquote v0.0.0-20180428030007-95032a82bc51/go.mod h1:CzGEWj7cYgsdH8dAjBGEr58BoE7ScuLd+fwFZ44+/x8= github.com/kevinburke/ssh_config v1.2.0 h1:x584FjTGwHzMwvHx18PXxbBVzfnxogHaAReU4gf13a4= github.com/kevinburke/ssh_config v1.2.0/go.mod h1:CT57kijsi8u/K/BOFA39wgDQJ9CxiF4nAY/ojJ6r6mM= @@ -1876,7 +1856,6 @@ github.com/matryer/is v1.2.0 h1:92UTHpy8CDwaJ08GqLDzhhuixiBUUD1p3AU6PHddz4A= github.com/matryer/is v1.2.0/go.mod h1:2fLPjFQM9rhQ15aVEtbuwhJinnOqrmgXPNdZsdwlWXA= github.com/mattn/go-colorable v0.0.9/go.mod h1:9vuHe8Xs5qXnSaW/c/ABM9alt+Vo+STaOChaDxuIBZU= github.com/mattn/go-colorable v0.1.1/go.mod h1:FuOcm+DKB9mbwrcAfNl7/TZVBZ6rcnceauSikq3lYCQ= -github.com/mattn/go-colorable v0.1.2/go.mod h1:U0ppj6V5qS13XJ6of8GYAs25YV2eR4EVcfRqFIhoBtE= github.com/mattn/go-colorable v0.1.4/go.mod h1:U0ppj6V5qS13XJ6of8GYAs25YV2eR4EVcfRqFIhoBtE= github.com/mattn/go-colorable v0.1.6/go.mod h1:u6P/XSegPjTcexA+o6vUJrdnUu04hMope9wVRipJSqc= github.com/mattn/go-colorable v0.1.8/go.mod h1:u6P/XSegPjTcexA+o6vUJrdnUu04hMope9wVRipJSqc= @@ -1910,8 +1889,6 @@ github.com/mattn/go-sqlite3 v1.14.14/go.mod h1:NyWgC/yNuGj7Q9rpYnZvas74GogHl5/Z4 github.com/matttproud/golang_protobuf_extensions v1.0.1/go.mod h1:D8He9yQNgCq6Z5Ld7szi9bcBfOoFv/3dc6xSMkL2PC0= github.com/matttproud/golang_protobuf_extensions v1.0.2-0.20181231171920-c182affec369/go.mod h1:BSXmuO+STAnVfrANrmjBb36TMTDstsz7MSK+HVaYKv4= github.com/maxbrunsfeld/counterfeiter/v6 v6.2.2/go.mod h1:eD9eIE7cdwcMi9rYluz88Jz2VyhSmden33/aXg4oVIY= -github.com/mgutz/ansi v0.0.0-20170206155736-9520e82c474b h1:j7+1HpAFS1zy5+Q4qx1fWh90gTKwiN4QCGoY9TWyyO4= -github.com/mgutz/ansi v0.0.0-20170206155736-9520e82c474b/go.mod h1:01TrycV0kFyexm33Z7vhZRXopbI8J3TDReVlkTgMUxE= github.com/microsoft/ApplicationInsights-Go v0.4.4/go.mod h1:fKRUseBqkw6bDiXTs3ESTiU/4YTIHsQS4W3fP2ieF4U= github.com/miekg/dns v1.0.14/go.mod h1:W1PPwlIAgtquWBMBEV9nkV9Cazfe8ScdGz/Lj7v3Nrg= github.com/miekg/dns v1.1.26/go.mod h1:bPDLeHnStXmXAq1m/Ch/hvfNHr14JKNPMBo3VZKjuso= @@ -2106,7 +2083,6 @@ github.com/pierrec/lz4/v4 v4.1.15/go.mod h1:gZWDp/Ze/IJXGXf23ltt2EXimqmTUXEy0GFu github.com/pjbgf/sha1cd v0.3.0 h1:4D5XXmUUBUl/xQ6IjCkEAbqXskkq/4O7LmGn0AqMDs4= github.com/pjbgf/sha1cd v0.3.0/go.mod h1:nZ1rrWOcGJ5uZgEEVL1VUM9iRQiZvWdbZjkKyFzPPsI= github.com/pkg/browser v0.0.0-20180916011732-0a3d74bf9ce4/go.mod h1:4OwLy04Bl9Ef3GJJCoec+30X3LQs/0/m4HFRt/2LUSA= -github.com/pkg/browser v0.0.0-20210115035449-ce105d075bb4 h1:Qj1ukM4GlMWXNdMBuXcXfz/Kw9s1qm0CLY32QxuSImI= github.com/pkg/browser v0.0.0-20210115035449-ce105d075bb4/go.mod h1:N6UoU20jOqggOuDwUaBQpluzLNDqif3kq9z2wpdYEfQ= github.com/pkg/diff v0.0.0-20210226163009-20ebb0f2a09e/go.mod h1:pJLUxLENpZxwdsKMEsNbx1VGcRFpLqf3715MtcvvzbA= github.com/pkg/errors v0.8.0/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0= @@ -2183,20 +2159,22 @@ github.com/prometheus/procfs v0.7.3/go.mod h1:cz+aTbrPOrUb4q7XlbU9ygM+/jj0fzG6c1 github.com/prometheus/prometheus v0.35.0/go.mod h1:7HaLx5kEPKJ0GDgbODG0fZgXbQ8K/XjZNJXQmbmgQlY= github.com/prometheus/prometheus v0.37.0/go.mod h1:egARUgz+K93zwqsVIAneFlLZefyGOON44WyAp4Xqbbk= github.com/prometheus/tsdb v0.7.1/go.mod h1:qhTCs0VvXwvX/y3TZrWD7rabWM+ijKTux40TwIPHuXU= -github.com/pulumi/pulumi-java/pkg v0.9.6 h1:UJrOAsYHRchwb4QlfI9Q224qg1TOI3rIsI6DDTUnn30= -github.com/pulumi/pulumi-java/pkg v0.9.6/go.mod h1:c6rSw/+q4O0IImgJ9axxoC6QesbPYWBaG5gimbHouUQ= +github.com/pulumi/esc v0.5.6 h1:4WV3X7OEVcChIwbSG+JxhZDdmq/q7lFPaSjHRYlPwmI= +github.com/pulumi/esc v0.5.6/go.mod h1:wpwNfVS5fV7Kd51j4dJ6FWYlKfxdqyppgp0gtkzqH04= +github.com/pulumi/pulumi-java/pkg v0.9.8 h1:c8mYsalnRXA2Ibgvv6scefOn6mW1Vb0UT0mcDqjsivQ= +github.com/pulumi/pulumi-java/pkg v0.9.8/go.mod h1:c6rSw/+q4O0IImgJ9axxoC6QesbPYWBaG5gimbHouUQ= github.com/pulumi/pulumi-terraform-bridge/testing v0.0.1 h1:SCg1gjfY9N4yn8U8peIUYATifjoDABkyR7H9lmefsfc= github.com/pulumi/pulumi-terraform-bridge/testing v0.0.1/go.mod h1:7OeUPH8rpt5ipyj9EFcnXpuzQ8SHL0dyqdfa8nOacdk= -github.com/pulumi/pulumi-terraform-bridge/v3 v3.61.0 h1:ryRfPhwm78Ni+U1uaAsITAI6dD2tLtb3suhJXGWb9cM= -github.com/pulumi/pulumi-terraform-bridge/v3 v3.61.0/go.mod h1:k6iVhOWqTkMWxMdd7njoSkPXBJC/T2Rs44Iif3yDgXw= +github.com/pulumi/pulumi-terraform-bridge/v3 v3.63.0 h1:otdmkNsMGyZ+proUZClznZo+cEchkSSkmaGcq+Gf+6s= +github.com/pulumi/pulumi-terraform-bridge/v3 v3.63.0/go.mod h1:6YVbDo019OeHkQWo9MnUbBy6cCgCQeoXZDjmR9SYmUA= github.com/pulumi/pulumi-terraform-bridge/x/muxer v0.0.4 h1:rIzMmtcVpPX8ynaz6/nW5AHNY63DiNfCohqmxWvMpM4= github.com/pulumi/pulumi-terraform-bridge/x/muxer v0.0.4/go.mod h1:Kt8RIZWa/N8rW3+0g6NrqCBmF3o+HuIhFaZpssEkG6w= github.com/pulumi/pulumi-yaml v1.2.2 h1:W6BeUBLhDrJ2GSU0em1AUVelG9PBI4ABY61DdhJOO3E= github.com/pulumi/pulumi-yaml v1.2.2/go.mod h1:EgakC7b/4+VBNnlgM1RZIea2gUstV8s/7bdFJZt0P64= -github.com/pulumi/pulumi/pkg/v3 v3.86.0 h1:G4spuT89ZN8lSxT9WkMF/JaP7n+wu7ubEly7Yy8uza0= -github.com/pulumi/pulumi/pkg/v3 v3.86.0/go.mod h1:Qs55gPhUwM/Dua3VRtHXLLlpY8uEe+llDBIZc+1pvHM= -github.com/pulumi/pulumi/sdk/v3 v3.86.0 h1:Cxg0rGdvMt9GqGvesFTj8+WaO/ihmALYlQf4zm1GzFw= -github.com/pulumi/pulumi/sdk/v3 v3.86.0/go.mod h1:vexSGJ5L834l3T7Fo/KpdywjGAgZ2CvChuqGFl+ebS0= +github.com/pulumi/pulumi/pkg/v3 v3.90.1 h1:RFC/eqTbDfIvfeVQL8WaPmyQr1KzZhAGIIDGr9jj9y8= +github.com/pulumi/pulumi/pkg/v3 v3.90.1/go.mod h1:J+WbfN30g3FfQifpLjQPI0UhPsC9ASEePLK8Nix06A8= +github.com/pulumi/pulumi/sdk/v3 v3.90.1 h1:iT4t57N92WGhEQtg+KVDEmYzgfEyri39eihQzcNmtrM= +github.com/pulumi/pulumi/sdk/v3 v3.90.1/go.mod h1:zYaQQibB2pYKy/uG4c4YkX7lQIBpZ0KsuMaq/3HsIBQ= github.com/pulumi/schema-tools v0.1.2 h1:Fd9xvUjgck4NA+7/jSk7InqCUT4Kj940+EcnbQKpfZo= github.com/pulumi/schema-tools v0.1.2/go.mod h1:62lgj52Tzq11eqWTIaKd+EVyYAu5dEcDJxMhTjvMO/k= github.com/pulumi/terraform-diff-reader v0.0.2 h1:kTE4nEXU3/SYXESvAIem+wyHMI3abqkI3OhJ0G04LLI= @@ -2217,8 +2195,9 @@ github.com/rogpeppe/go-internal v1.1.0/go.mod h1:M8bDsm7K2OlrFYOpmOWEs/qY81heoFR github.com/rogpeppe/go-internal v1.2.2/go.mod h1:M8bDsm7K2OlrFYOpmOWEs/qY81heoFRclV5y23lUDJ4= github.com/rogpeppe/go-internal v1.3.0/go.mod h1:M8bDsm7K2OlrFYOpmOWEs/qY81heoFRclV5y23lUDJ4= github.com/rogpeppe/go-internal v1.6.1/go.mod h1:xXDCJY+GAPziupqXw64V24skbSoqbTEfhy4qGm1nDQc= -github.com/rogpeppe/go-internal v1.9.0 h1:73kH8U+JUqXU8lRuOHeVHaa/SZPifC7BkcraZVejAe8= github.com/rogpeppe/go-internal v1.9.0/go.mod h1:WtVeX8xhTBvf0smdhujwtBcq4Qrzq/fJaraNFVN+nFs= +github.com/rogpeppe/go-internal v1.11.0 h1:cWPaGQEPrBb5/AsnsZesgZZ9yb1OQ+GOISoDNXVBh4M= +github.com/rogpeppe/go-internal v1.11.0/go.mod h1:ddIwULY96R17DhadqLgMfk9H9tvdUzkipdSkR5nkCZA= github.com/rs/cors v1.8.2/go.mod h1:XyqrcTp5zjWr1wsJ8PIRZssZ8b/WMcMf71DJnit4EMU= github.com/rs/xid v1.2.1/go.mod h1:+uKXf+4Djp6Md1KODXJxgGQPKngRmWyn10oCKFzNHOQ= github.com/rs/zerolog v1.13.0/go.mod h1:YbFCdg8HfsridGWAh22vktObvhZbQsZXe4/zB0OKkWU= @@ -2578,8 +2557,9 @@ golang.org/x/crypto v0.3.1-0.20221117191849-2c476679df9a/go.mod h1:hebNnKkNXi2Uz golang.org/x/crypto v0.7.0/go.mod h1:pYwdfH91IfpZVANVyUOhSIPZaFoJGxTFbZhFTx+dXZU= golang.org/x/crypto v0.8.0/go.mod h1:mRqEX+O9/h5TFCrQhkgjo2yKi0yYA+9ecGkdQoHrywE= golang.org/x/crypto v0.11.0/go.mod h1:xgJhtzW8F9jGdVFWZESrid1U1bjeNy4zgy5cRr/CIio= -golang.org/x/crypto v0.13.0 h1:mvySKfSWJ+UKUii46M40LOvyWfN0s2U+46/jDd0e6Ck= golang.org/x/crypto v0.13.0/go.mod h1:y6Z2r+Rw4iayiXXAIxJIDAJ1zMW4yaTpebo8fPOliYc= +golang.org/x/crypto v0.14.0 h1:wBqGXzWJW6m1XrIKlAH0Hs1JJ7+9KBwnIO8v66Q9cHc= +golang.org/x/crypto v0.14.0/go.mod h1:MVFd36DqK4CsrnJYDkBA3VC4m2GkXAM0PvzMCn4JQf4= golang.org/x/exp v0.0.0-20180321215751-8460e604b9de/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA= golang.org/x/exp v0.0.0-20180807140117-3d87b88a115f/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA= golang.org/x/exp v0.0.0-20190121172915-509febef88a4/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA= @@ -2595,8 +2575,8 @@ golang.org/x/exp v0.0.0-20200119233911-0405dc783f0a/go.mod h1:2RIsYlXP63K8oxa1u0 golang.org/x/exp v0.0.0-20200207192155-f17229e696bd/go.mod h1:J/WKrq2StrnmMY6+EHIKF9dgMWnmCNThgcyBT1FY9mM= golang.org/x/exp v0.0.0-20200224162631-6cc2880d07d6/go.mod h1:3jZMyOhIsHpP37uCMkUooju7aAi5cS1Q23tOzKc+0MU= golang.org/x/exp v0.0.0-20220827204233-334a2380cb91/go.mod h1:cyybsKvd6eL0RnXn6p/Grxp8F5bW7iYuBgsNCOHpMYE= -golang.org/x/exp v0.0.0-20230809150735-7b3493d9a819 h1:EDuYyU/MkFXllv9QF9819VlI9a4tzGuCbhG0ExK9o1U= -golang.org/x/exp v0.0.0-20230809150735-7b3493d9a819/go.mod h1:FXUEEKJgO7OQYeo8N01OfiKP8RXMtf6e8aTskBGqWdc= +golang.org/x/exp v0.0.0-20231006140011-7918f672742d h1:jtJma62tbqLibJ5sFQz8bKtEM8rJBtfilJ2qTU199MI= +golang.org/x/exp v0.0.0-20231006140011-7918f672742d/go.mod h1:ldy0pHrwJyGW56pPQzzkH36rKxoZW1tw7ZJpeKx+hdo= golang.org/x/image v0.0.0-20180708004352-c73c2afc3b81/go.mod h1:ux5Hcp/YLpHSI86hEcLt0YII63i6oz57MZXIpbrjZUs= golang.org/x/image v0.0.0-20190227222117-0694c2d4d067/go.mod h1:kZ7UVZpmo3dzQBMxlp+ypCbDeSB+sBbTgSJuh5dn5js= golang.org/x/image v0.0.0-20190802002840-cff245a6509b/go.mod h1:FeLwcggjj3mMvU+oOTbSwawSJRM1uh48EjtB4UJZlP0= @@ -2641,8 +2621,9 @@ golang.org/x/mod v0.6.0/go.mod h1:4mET923SAdbXp2ki8ey+zGs1SLqsuM2Y0uvdZR/fUNI= golang.org/x/mod v0.7.0/go.mod h1:iBbtSCu2XBx23ZKBPSOrRkjjQPZFPuis4dIYUhu/chs= golang.org/x/mod v0.8.0/go.mod h1:iBbtSCu2XBx23ZKBPSOrRkjjQPZFPuis4dIYUhu/chs= golang.org/x/mod v0.9.0/go.mod h1:iBbtSCu2XBx23ZKBPSOrRkjjQPZFPuis4dIYUhu/chs= -golang.org/x/mod v0.12.0 h1:rmsUpXtvNzj340zd98LZ4KntptpfRHwpFOHG188oHXc= golang.org/x/mod v0.12.0/go.mod h1:iBbtSCu2XBx23ZKBPSOrRkjjQPZFPuis4dIYUhu/chs= +golang.org/x/mod v0.13.0 h1:I/DsJXRlw/8l/0c24sM9yb0T4z9liZTduXvdAWYiysY= +golang.org/x/mod v0.13.0/go.mod h1:hTbmBsO62+eylJbnUtE2MGJUyE7QWk4xUqPFrRgJ+7c= golang.org/x/net v0.0.0-20180530234432-1e491301e022/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= golang.org/x/net v0.0.0-20180724234803-3673e40ba225/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= golang.org/x/net v0.0.0-20180811021610-c39426892332/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= @@ -2740,8 +2721,8 @@ golang.org/x/net v0.9.0/go.mod h1:d48xBJpPfHeWQsugry2m+kC02ZBRGRgulfHnEXEuWns= golang.org/x/net v0.10.0/go.mod h1:0qNGK6F8kojg2nk9dLZ2mShWaEBan6FAoqfSigmmuDg= golang.org/x/net v0.12.0/go.mod h1:zEVYFnQC7m/vmpQFELhcD1EWkZlX69l4oqgmer6hfKA= golang.org/x/net v0.13.0/go.mod h1:zEVYFnQC7m/vmpQFELhcD1EWkZlX69l4oqgmer6hfKA= -golang.org/x/net v0.15.0 h1:ugBLEUaxABaB5AJqW9enI0ACdci2RUd4eP51NTBvuJ8= -golang.org/x/net v0.15.0/go.mod h1:idbUs1IY1+zTqbi8yxTbhexhEEk5ur9LInksu6HrEpk= +golang.org/x/net v0.17.0 h1:pVaXccu2ozPjCXewfr1S7xza/zcXTity9cCdXQYSjIM= +golang.org/x/net v0.17.0/go.mod h1:NxSsAGuq816PNPmqtQdLE42eU2Fs7NoRIZrHJAlaCOE= golang.org/x/oauth2 v0.0.0-20180821212333-d2e6202438be/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U= golang.org/x/oauth2 v0.0.0-20190226205417-e64efc72b421/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw= golang.org/x/oauth2 v0.0.0-20190604053449-0f29369cfe45/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw= @@ -2795,8 +2776,8 @@ golang.org/x/sync v0.0.0-20220722155255-886fb9371eb4/go.mod h1:RxMgew5VJxzue5/jJ golang.org/x/sync v0.0.0-20220819030929-7fc1605a5dde/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= golang.org/x/sync v0.0.0-20220929204114-8fcdb60fdcc0/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= golang.org/x/sync v0.1.0/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= -golang.org/x/sync v0.2.0 h1:PUR+T4wwASmuSTYdKjYHI5TD22Wy5ogLU5qZCOLxBrI= -golang.org/x/sync v0.2.0/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= +golang.org/x/sync v0.4.0 h1:zxkM55ReGkDlKSM+Fu41A+zmbZuaPVbGMzvvdUPznYQ= +golang.org/x/sync v0.4.0/go.mod h1:FU7BRWz2tNW+3quACPkgCx/L+uEAv1htQ0V83Z9Rj+Y= golang.org/x/sys v0.0.0-20180823144017-11551d06cbcc/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= golang.org/x/sys v0.0.0-20180830151530-49385e6e1522/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= golang.org/x/sys v0.0.0-20180905080454-ebe1bf3edb33/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= @@ -2956,8 +2937,9 @@ golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/sys v0.7.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/sys v0.8.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/sys v0.10.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= -golang.org/x/sys v0.12.0 h1:CM0HF96J0hcLAwsHPJZjfdNzs0gftsLfgKt57wWHJ0o= golang.org/x/sys v0.12.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= +golang.org/x/sys v0.13.0 h1:Af8nKPmuFypiUBjVoU9V20FiaFXOcuZI21p0ycVYYGE= +golang.org/x/sys v0.13.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/term v0.0.0-20201117132131-f5c789dd3221/go.mod h1:Nr5EML6q2oocZ2LXRh80K7BxOlk5/8JxuGnuhpl+muw= golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo= golang.org/x/term v0.0.0-20210220032956-6a3ed077a48d/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo= @@ -2973,8 +2955,9 @@ golang.org/x/term v0.6.0/go.mod h1:m6U89DPEgQRMq3DNkDClhWw02AUbt2daBVO4cn4Hv9U= golang.org/x/term v0.7.0/go.mod h1:P32HKFT3hSsZrRxla30E9HqToFYAQPCMs/zFMBUFqPY= golang.org/x/term v0.8.0/go.mod h1:xPskH00ivmX89bAKVGSKKtLOWNx2+17Eiy94tnKShWo= golang.org/x/term v0.10.0/go.mod h1:lpqdcUyK/oCiQxvxVrppt5ggO2KCZ5QblwqPnfZ6d5o= -golang.org/x/term v0.12.0 h1:/ZfYdc3zq+q02Rv9vGqTeSItdzZTSNDmfTi0mBAuidU= golang.org/x/term v0.12.0/go.mod h1:owVbMEjm3cBLCHdkQu9b1opXd4ETQWc3BhuQGKgXgvU= +golang.org/x/term v0.13.0 h1:bb+I9cTfFazGW51MZqBVmZy7+JEJMouUHTUSKVQLBek= +golang.org/x/term v0.13.0/go.mod h1:LTmsnFJwVN6bCy1rVCoS+qHT1HhALEFxKncY3WNNh4U= golang.org/x/text v0.0.0-20170915032832-14c0d48ead0c/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= golang.org/x/text v0.3.1-0.20180807135948-17ff2d5776d2/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= @@ -3102,8 +3085,8 @@ golang.org/x/tools v0.2.0/go.mod h1:y4OqIKeOV/fWJetJ8bXPU1sEVniLMIyDAZWeHdV+NTA= golang.org/x/tools v0.3.0/go.mod h1:/rWhSS2+zyEVwoJf8YAX6L2f0ntZ7Kn/mGgAWcipA5k= golang.org/x/tools v0.6.0/go.mod h1:Xwgl3UAJ/d3gWutnCtw505GrjyAbvKui8lOU390QaIU= golang.org/x/tools v0.7.0/go.mod h1:4pg6aUX35JBAogB10C9AtvVL+qowtN4pT3CGSQex14s= -golang.org/x/tools v0.9.3 h1:Gn1I8+64MsuTb/HpH+LmQtNas23LhUVr3rYZ0eKuaMM= -golang.org/x/tools v0.9.3/go.mod h1:owI94Op576fPu3cIGQeHs3joujW/2Oc6MtlxbF5dfNc= +golang.org/x/tools v0.14.0 h1:jvNa2pY0M4r62jkRQ6RwEZZyPcymeL9XZMLBbV7U2nc= +golang.org/x/tools v0.14.0/go.mod h1:uYBEerGOWcJyEORxN+Ek8+TT266gXkNlHdJBwexUsBg= golang.org/x/xerrors v0.0.0-20190410155217-1f06c39b4373/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= golang.org/x/xerrors v0.0.0-20190513163551-3ee3066db522/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= diff --git a/sdk/dotnet/AttackProtection.cs b/sdk/dotnet/AttackProtection.cs index f2a7e993..9988a6d0 100644 --- a/sdk/dotnet/AttackProtection.cs +++ b/sdk/dotnet/AttackProtection.cs @@ -12,82 +12,6 @@ namespace Pulumi.Auth0 /// /// Auth0 can detect attacks and stop malicious attempts to access your application such as blocking traffic from certain IPs and displaying CAPTCHAs. /// - /// ## Example Usage - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var myProtection = new Auth0.AttackProtection("myProtection", new() - /// { - /// BreachedPasswordDetection = new Auth0.Inputs.AttackProtectionBreachedPasswordDetectionArgs - /// { - /// AdminNotificationFrequencies = new[] - /// { - /// "daily", - /// }, - /// Enabled = true, - /// Method = "standard", - /// PreUserRegistration = new Auth0.Inputs.AttackProtectionBreachedPasswordDetectionPreUserRegistrationArgs - /// { - /// Shields = new[] - /// { - /// "block", - /// }, - /// }, - /// Shields = new[] - /// { - /// "admin_notification", - /// "block", - /// }, - /// }, - /// BruteForceProtection = new Auth0.Inputs.AttackProtectionBruteForceProtectionArgs - /// { - /// Allowlists = new[] - /// { - /// "127.0.0.1", - /// }, - /// Enabled = true, - /// MaxAttempts = 5, - /// Mode = "count_per_identifier_and_ip", - /// Shields = new[] - /// { - /// "block", - /// "user_notification", - /// }, - /// }, - /// SuspiciousIpThrottling = new Auth0.Inputs.AttackProtectionSuspiciousIpThrottlingArgs - /// { - /// Allowlists = new[] - /// { - /// "192.168.1.1", - /// }, - /// Enabled = true, - /// PreLogin = new Auth0.Inputs.AttackProtectionSuspiciousIpThrottlingPreLoginArgs - /// { - /// MaxAttempts = 100, - /// Rate = 864000, - /// }, - /// PreUserRegistration = new Auth0.Inputs.AttackProtectionSuspiciousIpThrottlingPreUserRegistrationArgs - /// { - /// MaxAttempts = 50, - /// Rate = 1200, - /// }, - /// Shields = new[] - /// { - /// "admin_notification", - /// "block", - /// }, - /// }, - /// }); - /// - /// }); - /// ``` - /// /// ## Import /// /// As this is not a resource identifiable by an ID within the Auth0 Management API, attack_protection can be imported using a random string. # We recommend [Version 4 UUID](https://www.uuidgenerator.net/version4) # Example diff --git a/sdk/dotnet/Branding.cs b/sdk/dotnet/Branding.cs index 53631c5f..3adc6f50 100644 --- a/sdk/dotnet/Branding.cs +++ b/sdk/dotnet/Branding.cs @@ -12,34 +12,6 @@ namespace Pulumi.Auth0 /// /// This resource allows you to manage branding within your Auth0 tenant. Auth0 can be customized with a look and feel that aligns with your organization's brand requirements and user expectations. /// - /// ## Example Usage - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.IO; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var myBrand = new Auth0.Branding("myBrand", new() - /// { - /// LogoUrl = "https://mycompany.org/logo.png", - /// Colors = new Auth0.Inputs.BrandingColorsArgs - /// { - /// Primary = "#0059d6", - /// PageBackground = "#000000", - /// }, - /// UniversalLogin = new Auth0.Inputs.BrandingUniversalLoginArgs - /// { - /// Body = File.ReadAllText("universal_login_body.html"), - /// }, - /// }); - /// - /// }); - /// ``` - /// /// ## Import /// /// As this is not a resource identifiable by an ID within the Auth0 Management API, branding can be imported using a random string. # We recommend [Version 4 UUID](https://www.uuidgenerator.net/version4) # Example diff --git a/sdk/dotnet/BrandingTheme.cs b/sdk/dotnet/BrandingTheme.cs index 2e8769e3..0842127d 100644 --- a/sdk/dotnet/BrandingTheme.cs +++ b/sdk/dotnet/BrandingTheme.cs @@ -12,105 +12,6 @@ namespace Pulumi.Auth0 /// /// This resource allows you to manage branding themes for your Universal Login page within your Auth0 tenant. /// - /// ## Example Usage - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// // An example of a fully configured auth0_branding_theme. - /// var myTheme = new Auth0.BrandingTheme("myTheme", new() - /// { - /// Borders = new Auth0.Inputs.BrandingThemeBordersArgs - /// { - /// ButtonBorderRadius = 1, - /// ButtonBorderWeight = 1, - /// ButtonsStyle = "pill", - /// InputBorderRadius = 3, - /// InputBorderWeight = 1, - /// InputsStyle = "pill", - /// ShowWidgetShadow = false, - /// WidgetBorderWeight = 1, - /// WidgetCornerRadius = 3, - /// }, - /// Colors = new Auth0.Inputs.BrandingThemeColorsArgs - /// { - /// BodyText = "#FF00CC", - /// Error = "#FF00CC", - /// Header = "#FF00CC", - /// Icons = "#FF00CC", - /// InputBackground = "#FF00CC", - /// InputBorder = "#FF00CC", - /// InputFilledText = "#FF00CC", - /// InputLabelsPlaceholders = "#FF00CC", - /// LinksFocusedComponents = "#FF00CC", - /// PrimaryButton = "#FF00CC", - /// PrimaryButtonLabel = "#FF00CC", - /// SecondaryButtonBorder = "#FF00CC", - /// SecondaryButtonLabel = "#FF00CC", - /// Success = "#FF00CC", - /// WidgetBackground = "#FF00CC", - /// WidgetBorder = "#FF00CC", - /// }, - /// Fonts = new Auth0.Inputs.BrandingThemeFontsArgs - /// { - /// BodyText = new Auth0.Inputs.BrandingThemeFontsBodyTextArgs - /// { - /// Bold = false, - /// Size = 100, - /// }, - /// ButtonsText = new Auth0.Inputs.BrandingThemeFontsButtonsTextArgs - /// { - /// Bold = false, - /// Size = 100, - /// }, - /// FontUrl = "https://google.com/font.woff", - /// InputLabels = new Auth0.Inputs.BrandingThemeFontsInputLabelsArgs - /// { - /// Bold = false, - /// Size = 100, - /// }, - /// Links = new Auth0.Inputs.BrandingThemeFontsLinksArgs - /// { - /// Bold = false, - /// Size = 100, - /// }, - /// LinksStyle = "normal", - /// ReferenceTextSize = 12, - /// Subtitle = new Auth0.Inputs.BrandingThemeFontsSubtitleArgs - /// { - /// Bold = false, - /// Size = 100, - /// }, - /// Title = new Auth0.Inputs.BrandingThemeFontsTitleArgs - /// { - /// Bold = false, - /// Size = 100, - /// }, - /// }, - /// PageBackground = new Auth0.Inputs.BrandingThemePageBackgroundArgs - /// { - /// BackgroundColor = "#000000", - /// BackgroundImageUrl = "https://google.com/background.png", - /// PageLayout = "center", - /// }, - /// Widget = new Auth0.Inputs.BrandingThemeWidgetArgs - /// { - /// HeaderTextAlignment = "center", - /// LogoHeight = 55, - /// LogoPosition = "center", - /// LogoUrl = "https://google.com/logo.png", - /// SocialButtonsLayout = "top", - /// }, - /// }); - /// - /// }); - /// ``` - /// /// ## Import /// /// This resource can be imported by specifying the Branding Theme ID. # Example diff --git a/sdk/dotnet/Client.cs b/sdk/dotnet/Client.cs index dd1a1ed6..18ef09ee 100644 --- a/sdk/dotnet/Client.cs +++ b/sdk/dotnet/Client.cs @@ -12,110 +12,6 @@ namespace Pulumi.Auth0 /// /// With this resource, you can set up applications that use Auth0 for authentication and configure allowed callback URLs and secrets for these applications. /// - /// ## Example Usage - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var myClient = new Auth0.Client("myClient", new() - /// { - /// Addons = new Auth0.Inputs.ClientAddonsArgs - /// { - /// Samlp = new Auth0.Inputs.ClientAddonsSamlpArgs - /// { - /// Audience = "https://example.com/saml", - /// CreateUpnClaim = false, - /// Issuer = "https://example.com", - /// MapIdentities = false, - /// MapUnknownClaimsAsIs = false, - /// Mappings = - /// { - /// { "email", "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress" }, - /// { "name", "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name" }, - /// }, - /// NameIdentifierFormat = "urn:oasis:names:tc:SAML:2.0:nameid-format:persistent", - /// NameIdentifierProbes = new[] - /// { - /// "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress", - /// }, - /// PassthroughClaimsWithNoMapping = false, - /// SigningCert = @"-----BEGIN PUBLIC KEY----- - /// MIGf...bpP/t3 - /// +JGNGIRMj1hF1rnb6QIDAQAB - /// -----END PUBLIC KEY----- - /// - /// ", - /// }, - /// }, - /// AllowedLogoutUrls = new[] - /// { - /// "https://example.com", - /// }, - /// AllowedOrigins = new[] - /// { - /// "https://example.com", - /// }, - /// AppType = "non_interactive", - /// Callbacks = new[] - /// { - /// "https://example.com/callback", - /// }, - /// ClientMetadata = - /// { - /// { "foo", "zoo" }, - /// }, - /// CustomLoginPageOn = true, - /// Description = "Test Applications Long Description", - /// GrantTypes = new[] - /// { - /// "authorization_code", - /// "http://auth0.com/oauth/grant-type/password-realm", - /// "implicit", - /// "password", - /// "refresh_token", - /// }, - /// IsFirstParty = true, - /// IsTokenEndpointIpHeaderTrusted = true, - /// JwtConfiguration = new Auth0.Inputs.ClientJwtConfigurationArgs - /// { - /// Alg = "RS256", - /// LifetimeInSeconds = 300, - /// Scopes = - /// { - /// { "foo", "bar" }, - /// }, - /// SecretEncoded = true, - /// }, - /// Mobile = new Auth0.Inputs.ClientMobileArgs - /// { - /// Ios = new Auth0.Inputs.ClientMobileIosArgs - /// { - /// AppBundleIdentifier = "com.my.bundle.id", - /// TeamId = "9JA89QQLNQ", - /// }, - /// }, - /// OidcConformant = false, - /// RefreshToken = new Auth0.Inputs.ClientRefreshTokenArgs - /// { - /// ExpirationType = "expiring", - /// Leeway = 0, - /// RotationType = "rotating", - /// TokenLifetime = 2592000, - /// }, - /// WebOrigins = new[] - /// { - /// "https://example.com", - /// }, - /// }); - /// - /// }); - /// ``` - /// /// ## Import /// /// This resource can be imported by specifying the client ID. # Example diff --git a/sdk/dotnet/ClientCredentials.cs b/sdk/dotnet/ClientCredentials.cs index 23805992..4dcbd986 100644 --- a/sdk/dotnet/ClientCredentials.cs +++ b/sdk/dotnet/ClientCredentials.cs @@ -15,81 +15,6 @@ namespace Pulumi.Auth0 /// > Refer to the client secret rotation guide /// for instructions on how to rotate client secrets with zero downtime. /// - /// ## Example Usage - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var myClient = new Auth0.Client("myClient", new() - /// { - /// AppType = "non_interactive", - /// JwtConfiguration = new Auth0.Inputs.ClientJwtConfigurationArgs - /// { - /// Alg = "RS256", - /// }, - /// }); - /// - /// // Configuring client_secret_post as an authentication method. - /// var testClientCredentials = new Auth0.ClientCredentials("testClientCredentials", new() - /// { - /// ClientId = myClient.Id, - /// AuthenticationMethod = "client_secret_post", - /// }); - /// - /// // Configuring client_secret_basic as an authentication method. - /// var testIndex_clientCredentialsClientCredentials = new Auth0.ClientCredentials("testIndex/clientCredentialsClientCredentials", new() - /// { - /// ClientId = myClient.Id, - /// AuthenticationMethod = "client_secret_basic", - /// }); - /// - /// // Configuring none as an authentication method. - /// var testAuth0Index_clientCredentialsClientCredentials = new Auth0.ClientCredentials("testAuth0Index/clientCredentialsClientCredentials", new() - /// { - /// ClientId = myClient.Id, - /// AuthenticationMethod = "none", - /// }); - /// - /// // Configuring private_key_jwt as an authentication method. - /// var testAuth0Index_clientCredentialsClientCredentials1 = new Auth0.ClientCredentials("testAuth0Index/clientCredentialsClientCredentials1", new() - /// { - /// ClientId = myClient.Id, - /// AuthenticationMethod = "private_key_jwt", - /// PrivateKeyJwt = new Auth0.Inputs.ClientCredentialsPrivateKeyJwtArgs - /// { - /// Credentials = new[] - /// { - /// new Auth0.Inputs.ClientCredentialsPrivateKeyJwtCredentialArgs - /// { - /// Name = "Testing Credentials 1", - /// CredentialType = "public_key", - /// Algorithm = "RS256", - /// ParseExpiryFromCert = true, - /// Pem = @"-----BEGIN CERTIFICATE----- - /// MIIFWDCCA0ACCQDXqpBo3R...G9w0BAQsFADBuMQswCQYDVQQGEwJl - /// -----END CERTIFICATE----- - /// ", - /// }, - /// }, - /// }, - /// }); - /// - /// // Configuring the client_secret. - /// var testAuth0Index_clientCredentialsClientCredentials2 = new Auth0.ClientCredentials("testAuth0Index/clientCredentialsClientCredentials2", new() - /// { - /// ClientId = myClient.Id, - /// AuthenticationMethod = "client_secret_basic", - /// ClientSecret = "LUFqPx+sRLjbL7peYRPFmFu-bbvE7u7og4YUNe_C345=683341", - /// }); - /// - /// }); - /// ``` - /// /// ## Import /// /// This resource can be imported by specifying the client ID. # Example diff --git a/sdk/dotnet/Connection.cs b/sdk/dotnet/Connection.cs index 00df89fe..6af416e3 100644 --- a/sdk/dotnet/Connection.cs +++ b/sdk/dotnet/Connection.cs @@ -16,393 +16,6 @@ namespace Pulumi.Auth0 /// creation of multiple connections per strategy, the additional connections may not be visible in the Auth0 dashboard. /// /// ## Example Usage - /// ### Google OAuth2 Connection - /// - /// > Your Auth0 account may be pre-configured with a `google-oauth2` connection. - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var googleOauth2 = new Auth0.Connection("googleOauth2", new() - /// { - /// Options = new Auth0.Inputs.ConnectionOptionsArgs - /// { - /// AllowedAudiences = new[] - /// { - /// "example.com", - /// "api.example.com", - /// }, - /// ClientId = "<client-id>", - /// ClientSecret = "<client-secret>", - /// NonPersistentAttrs = new[] - /// { - /// "ethnicity", - /// "gender", - /// }, - /// Scopes = new[] - /// { - /// "email", - /// "profile", - /// "gmail", - /// "youtube", - /// }, - /// SetUserRootAttributes = "on_each_login", - /// }, - /// Strategy = "google-oauth2", - /// }); - /// - /// }); - /// ``` - /// ### Facebook Connection - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var facebook = new Auth0.Connection("facebook", new() - /// { - /// Options = new Auth0.Inputs.ConnectionOptionsArgs - /// { - /// ClientId = "<client-id>", - /// ClientSecret = "<client-secret>", - /// NonPersistentAttrs = new[] - /// { - /// "ethnicity", - /// "gender", - /// }, - /// Scopes = new[] - /// { - /// "public_profile", - /// "email", - /// "groups_access_member_info", - /// "user_birthday", - /// }, - /// SetUserRootAttributes = "on_each_login", - /// }, - /// Strategy = "facebook", - /// }); - /// - /// }); - /// ``` - /// ### Apple Connection - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var apple = new Auth0.Connection("apple", new() - /// { - /// Options = new Auth0.Inputs.ConnectionOptionsArgs - /// { - /// ClientId = "<client-id>", - /// ClientSecret = @"-----BEGIN PRIVATE KEY----- - /// MIHBAgEAMA0GCSqGSIb3DQEBAQUABIGsMIGpAgEAA - /// -----END PRIVATE KEY----- - /// ", - /// KeyId = "<key-id>", - /// NonPersistentAttrs = new[] - /// { - /// "ethnicity", - /// "gender", - /// }, - /// Scopes = new[] - /// { - /// "email", - /// "name", - /// }, - /// SetUserRootAttributes = "on_first_login", - /// TeamId = "<team-id>", - /// }, - /// Strategy = "apple", - /// }); - /// - /// }); - /// ``` - /// ### LinkedIn Connection - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var linkedin = new Auth0.Connection("linkedin", new() - /// { - /// Options = new Auth0.Inputs.ConnectionOptionsArgs - /// { - /// ClientId = "<client-id>", - /// ClientSecret = "<client-secret>", - /// NonPersistentAttrs = new[] - /// { - /// "ethnicity", - /// "gender", - /// }, - /// Scopes = new[] - /// { - /// "basic_profile", - /// "profile", - /// "email", - /// }, - /// SetUserRootAttributes = "on_each_login", - /// StrategyVersion = 2, - /// }, - /// Strategy = "linkedin", - /// }); - /// - /// }); - /// ``` - /// ### GitHub Connection - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var github = new Auth0.Connection("github", new() - /// { - /// Options = new Auth0.Inputs.ConnectionOptionsArgs - /// { - /// ClientId = "<client-id>", - /// ClientSecret = "<client-secret>", - /// NonPersistentAttrs = new[] - /// { - /// "ethnicity", - /// "gender", - /// }, - /// Scopes = new[] - /// { - /// "email", - /// "profile", - /// "public_repo", - /// "repo", - /// }, - /// SetUserRootAttributes = "on_each_login", - /// }, - /// Strategy = "github", - /// }); - /// - /// }); - /// ``` - /// ### SalesForce Connection - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var salesforce = new Auth0.Connection("salesforce", new() - /// { - /// Options = new Auth0.Inputs.ConnectionOptionsArgs - /// { - /// ClientId = "<client-id>", - /// ClientSecret = "<client-secret>", - /// CommunityBaseUrl = "https://salesforce.example.com", - /// NonPersistentAttrs = new[] - /// { - /// "ethnicity", - /// "gender", - /// }, - /// Scopes = new[] - /// { - /// "openid", - /// "email", - /// }, - /// SetUserRootAttributes = "on_first_login", - /// }, - /// Strategy = "salesforce", - /// }); - /// - /// }); - /// ``` - /// ### OAuth2 Connection - /// - /// Also applies to following connection strategies: `dropbox`, `bitbucket`, `paypal`, `twitter`, `amazon`, `yahoo`, `box`, `wordpress`, `shopify`, `custom` - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var oauth2 = new Auth0.Connection("oauth2", new() - /// { - /// Options = new Auth0.Inputs.ConnectionOptionsArgs - /// { - /// AuthorizationEndpoint = "https://auth.example.com/oauth2/authorize", - /// ClientId = "<client-id>", - /// ClientSecret = "<client-secret>", - /// IconUrl = "https://auth.example.com/assets/logo.png", - /// NonPersistentAttrs = new[] - /// { - /// "ethnicity", - /// "gender", - /// }, - /// PkceEnabled = true, - /// Scopes = new[] - /// { - /// "basic_profile", - /// "profile", - /// "email", - /// }, - /// Scripts = - /// { - /// { "fetchUserProfile", @" function fetchUserProfile(accessToken, context, callback) { - /// return callback(new Error(""Whoops!"")); - /// } - /// - /// " }, - /// }, - /// SetUserRootAttributes = "on_each_login", - /// TokenEndpoint = "https://auth.example.com/oauth2/token", - /// }, - /// Strategy = "oauth2", - /// }); - /// - /// }); - /// ``` - /// ### SMS Connection - /// - /// > To be able to see this in the management dashboard as well, the name of the connection must be set to "sms". - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var sms = new Auth0.Connection("sms", new() - /// { - /// IsDomainConnection = false, - /// Options = new Auth0.Inputs.ConnectionOptionsArgs - /// { - /// BruteForceProtection = true, - /// DisableSignup = false, - /// ForwardRequestInfo = true, - /// From = "+15555555555", - /// GatewayAuthentication = new Auth0.Inputs.ConnectionOptionsGatewayAuthenticationArgs - /// { - /// Audience = "https://somewhere.com/sms-gateway", - /// Method = "bearer", - /// Secret = "4e2680bb74ec2ae24736476dd37ed6c2", - /// SecretBase64Encoded = false, - /// Subject = "test.us.auth0.com:sms", - /// }, - /// GatewayUrl = "https://somewhere.com/sms-gateway", - /// Name = "sms", - /// Provider = "sms_gateway", - /// Syntax = "md_with_macros", - /// Template = "@@password@@", - /// Totp = new Auth0.Inputs.ConnectionOptionsTotpArgs - /// { - /// Length = 6, - /// TimeStep = 300, - /// }, - /// }, - /// Strategy = "sms", - /// }); - /// - /// }); - /// ``` - /// ### Email Connection - /// - /// > To be able to see this in the management dashboard as well, the name of the connection must be set to "email". - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var passwordlessEmail = new Auth0.Connection("passwordlessEmail", new() - /// { - /// Options = new Auth0.Inputs.ConnectionOptionsArgs - /// { - /// AuthParams = - /// { - /// { "responseType", "code" }, - /// { "scope", "openid email profile offline_access" }, - /// }, - /// BruteForceProtection = true, - /// DisableSignup = false, - /// From = "{{ application.name }} <root@auth0.com>", - /// Name = "email", - /// NonPersistentAttrs = new[] {}, - /// SetUserRootAttributes = "on_each_login", - /// Subject = "Welcome to {{ application.name }}", - /// Syntax = "liquid", - /// Template = "<html>This is the body of the email</html>", - /// Totp = new Auth0.Inputs.ConnectionOptionsTotpArgs - /// { - /// Length = 6, - /// TimeStep = 300, - /// }, - /// }, - /// Strategy = "email", - /// }); - /// - /// }); - /// ``` - /// ### WindowsLive Connection - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var windowslive = new Auth0.Connection("windowslive", new() - /// { - /// Options = new Auth0.Inputs.ConnectionOptionsArgs - /// { - /// ClientId = "<client-id>", - /// ClientSecret = "<client-secret>", - /// NonPersistentAttrs = new[] - /// { - /// "ethnicity", - /// "gender", - /// }, - /// Scopes = new[] - /// { - /// "signin", - /// "graph_user", - /// }, - /// SetUserRootAttributes = "on_first_login", - /// StrategyVersion = 2, - /// }, - /// Strategy = "windowslive", - /// }); - /// - /// }); - /// ``` /// /// ## Import /// diff --git a/sdk/dotnet/ConnectionClient.cs b/sdk/dotnet/ConnectionClient.cs index 5be0b3ef..b71ce95c 100644 --- a/sdk/dotnet/ConnectionClient.cs +++ b/sdk/dotnet/ConnectionClient.cs @@ -17,34 +17,6 @@ namespace Pulumi.Auth0 /// resource in conjunction with the `auth0.ConnectionClients` resource when managing enabled clients for the /// same connection id. /// - /// ## Example Usage - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var myConn = new Auth0.Connection("myConn", new() - /// { - /// Strategy = "auth0", - /// }); - /// - /// var myClient = new Auth0.Client("myClient"); - /// - /// // One connection to one client association. - /// // To prevent issues, avoid using this resource together with the `auth0_connection_clients` resource. - /// var myConnClientAssoc = new Auth0.ConnectionClient("myConnClientAssoc", new() - /// { - /// ConnectionId = myConn.Id, - /// ClientId = myClient.Id, - /// }); - /// - /// }); - /// ``` - /// /// ## Import /// /// This resource can be imported by specifying the connection ID and client ID separated by "::" (note the double colon) <connectionID>::<clientID> # Example diff --git a/sdk/dotnet/ConnectionClients.cs b/sdk/dotnet/ConnectionClients.cs index 7291d142..224a0fc5 100644 --- a/sdk/dotnet/ConnectionClients.cs +++ b/sdk/dotnet/ConnectionClients.cs @@ -17,40 +17,6 @@ namespace Pulumi.Auth0 /// resource in conjunction with the `auth0.ConnectionClient` resource when managing enabled clients for the same /// connection id. /// - /// ## Example Usage - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var myConn = new Auth0.Connection("myConn", new() - /// { - /// Strategy = "auth0", - /// }); - /// - /// var myFirstClient = new Auth0.Client("myFirstClient"); - /// - /// var mySecondClient = new Auth0.Client("mySecondClient"); - /// - /// // One connection to many clients association. - /// // To prevent issues, avoid using this resource together with the `auth0_connection_client` resource. - /// var myConnClientsAssoc = new Auth0.ConnectionClients("myConnClientsAssoc", new() - /// { - /// ConnectionId = myConn.Id, - /// EnabledClients = new[] - /// { - /// myFirstClient.Id, - /// mySecondClient.Id, - /// }, - /// }); - /// - /// }); - /// ``` - /// /// ## Import /// /// This resource can be imported by specifying the Connection ID. # Example diff --git a/sdk/dotnet/CustomDomain.cs b/sdk/dotnet/CustomDomain.cs index 0b18e92d..452faee4 100644 --- a/sdk/dotnet/CustomDomain.cs +++ b/sdk/dotnet/CustomDomain.cs @@ -12,25 +12,6 @@ namespace Pulumi.Auth0 /// /// With Auth0, you can use a custom domain to maintain a consistent user experience. This resource allows you to create and manage a custom domain within your Auth0 tenant. /// - /// ## Example Usage - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var myCustomDomain = new Auth0.CustomDomain("myCustomDomain", new() - /// { - /// Domain = "auth.example.com", - /// Type = "auth0_managed_certs", - /// }); - /// - /// }); - /// ``` - /// /// ## Import /// /// Custom domains can be imported using their ID. # You can find existing custom domain IDs using the Auth0 Management API. https://auth0.com/docs/api/management/v2#!/Custom_Domains/get_custom_domains # Example diff --git a/sdk/dotnet/EmailProvider.cs b/sdk/dotnet/EmailProvider.cs index 4dc18633..a52fd6eb 100644 --- a/sdk/dotnet/EmailProvider.cs +++ b/sdk/dotnet/EmailProvider.cs @@ -12,56 +12,6 @@ namespace Pulumi.Auth0 /// /// With Auth0, you can have standard welcome, password reset, and account verification email-based workflows built right into Auth0. This resource allows you to configure email providers, so you can route all emails that are part of Auth0's authentication workflows through the supported high-volume email service of your choice. /// - /// ## Example Usage - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// // This is an example on how to set up the email provider with Amazon SES. - /// var amazonSesEmailProvider = new Auth0.EmailProvider("amazonSesEmailProvider", new() - /// { - /// Credentials = new Auth0.Inputs.EmailProviderCredentialsArgs - /// { - /// AccessKeyId = "AKIAXXXXXXXXXXXXXXXX", - /// Region = "us-east-1", - /// SecretAccessKey = "7e8c2148xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx", - /// }, - /// DefaultFromAddress = "accounts@example.com", - /// Enabled = true, - /// }); - /// - /// // This is an example on how to set up the email provider with Sendgrid. - /// var sendgridEmailProvider = new Auth0.EmailProvider("sendgridEmailProvider", new() - /// { - /// Credentials = new Auth0.Inputs.EmailProviderCredentialsArgs - /// { - /// ApiKey = "secretAPIKey", - /// }, - /// DefaultFromAddress = "accounts@example.com", - /// Enabled = true, - /// }); - /// - /// // This is an example on how to set up the email provider with MS365. - /// var smtpEmailProvider = new Auth0.EmailProvider("smtpEmailProvider", new() - /// { - /// Credentials = new Auth0.Inputs.EmailProviderCredentialsArgs - /// { - /// Ms365ClientId = "ms365_client_id", - /// Ms365ClientSecret = "ms365_client_secret", - /// Ms365TenantId = "ms365_tenant_id", - /// }, - /// DefaultFromAddress = "accounts@example.com", - /// Enabled = true, - /// }); - /// - /// }); - /// ``` - /// /// ## Import /// /// As this is not a resource identifiable by an ID within the Auth0 Management API, email can be imported using a random string. # We recommend [Version 4 UUID](https://www.uuidgenerator.net/version4) # Example diff --git a/sdk/dotnet/GetAttackProtection.cs b/sdk/dotnet/GetAttackProtection.cs index 3c167439..9067c46b 100644 --- a/sdk/dotnet/GetAttackProtection.cs +++ b/sdk/dotnet/GetAttackProtection.cs @@ -13,50 +13,12 @@ public static class GetAttackProtection { /// /// Use this data source to access information about the tenant's attack protection settings. - /// - /// {{% examples %}} - /// ## Example Usage - /// {{% example %}} - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var myProtection = Auth0.GetAttackProtection.Invoke(); - /// - /// }); - /// ``` - /// {{% /example %}} - /// {{% /examples %}} /// public static Task InvokeAsync(InvokeOptions? options = null) => global::Pulumi.Deployment.Instance.InvokeAsync("auth0:index/getAttackProtection:getAttackProtection", InvokeArgs.Empty, options.WithDefaults()); /// /// Use this data source to access information about the tenant's attack protection settings. - /// - /// {{% examples %}} - /// ## Example Usage - /// {{% example %}} - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var myProtection = Auth0.GetAttackProtection.Invoke(); - /// - /// }); - /// ``` - /// {{% /example %}} - /// {{% /examples %}} /// public static Output Invoke(InvokeOptions? options = null) => global::Pulumi.Deployment.Instance.Invoke("auth0:index/getAttackProtection:getAttackProtection", InvokeArgs.Empty, options.WithDefaults()); diff --git a/sdk/dotnet/GetBranding.cs b/sdk/dotnet/GetBranding.cs index 501642f4..7a81d6a7 100644 --- a/sdk/dotnet/GetBranding.cs +++ b/sdk/dotnet/GetBranding.cs @@ -13,50 +13,12 @@ public static class GetBranding { /// /// Use this data source to access information about the tenant's branding settings. - /// - /// {{% examples %}} - /// ## Example Usage - /// {{% example %}} - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var myBranding = Auth0.GetBranding.Invoke(); - /// - /// }); - /// ``` - /// {{% /example %}} - /// {{% /examples %}} /// public static Task InvokeAsync(InvokeOptions? options = null) => global::Pulumi.Deployment.Instance.InvokeAsync("auth0:index/getBranding:getBranding", InvokeArgs.Empty, options.WithDefaults()); /// /// Use this data source to access information about the tenant's branding settings. - /// - /// {{% examples %}} - /// ## Example Usage - /// {{% example %}} - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var myBranding = Auth0.GetBranding.Invoke(); - /// - /// }); - /// ``` - /// {{% /example %}} - /// {{% /examples %}} /// public static Output Invoke(InvokeOptions? options = null) => global::Pulumi.Deployment.Instance.Invoke("auth0:index/getBranding:getBranding", InvokeArgs.Empty, options.WithDefaults()); diff --git a/sdk/dotnet/GetBrandingTheme.cs b/sdk/dotnet/GetBrandingTheme.cs index 6656f9f7..2a5a27e0 100644 --- a/sdk/dotnet/GetBrandingTheme.cs +++ b/sdk/dotnet/GetBrandingTheme.cs @@ -13,50 +13,12 @@ public static class GetBrandingTheme { /// /// Use this data source to access information about the tenant's branding theme settings. - /// - /// {{% examples %}} - /// ## Example Usage - /// {{% example %}} - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var myBrandingTheme = Auth0.GetBrandingTheme.Invoke(); - /// - /// }); - /// ``` - /// {{% /example %}} - /// {{% /examples %}} /// public static Task InvokeAsync(InvokeOptions? options = null) => global::Pulumi.Deployment.Instance.InvokeAsync("auth0:index/getBrandingTheme:getBrandingTheme", InvokeArgs.Empty, options.WithDefaults()); /// /// Use this data source to access information about the tenant's branding theme settings. - /// - /// {{% examples %}} - /// ## Example Usage - /// {{% example %}} - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var myBrandingTheme = Auth0.GetBrandingTheme.Invoke(); - /// - /// }); - /// ``` - /// {{% /example %}} - /// {{% /examples %}} /// public static Output Invoke(InvokeOptions? options = null) => global::Pulumi.Deployment.Instance.Invoke("auth0:index/getBrandingTheme:getBrandingTheme", InvokeArgs.Empty, options.WithDefaults()); diff --git a/sdk/dotnet/GetClient.cs b/sdk/dotnet/GetClient.cs index c1a535d3..e576488a 100644 --- a/sdk/dotnet/GetClient.cs +++ b/sdk/dotnet/GetClient.cs @@ -13,66 +13,12 @@ public static class GetClient { /// /// Data source to retrieve a specific Auth0 application client by `client_id` or `name`. - /// - /// {{% examples %}} - /// ## Example Usage - /// {{% example %}} - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var some_client_by_name = Auth0.GetClient.Invoke(new() - /// { - /// Name = "Name of my Application", - /// }); - /// - /// var some_client_by_id = Auth0.GetClient.Invoke(new() - /// { - /// ClientId = "abcdefghkijklmnopqrstuvwxyz0123456789", - /// }); - /// - /// }); - /// ``` - /// {{% /example %}} - /// {{% /examples %}} /// public static Task InvokeAsync(GetClientArgs? args = null, InvokeOptions? options = null) => global::Pulumi.Deployment.Instance.InvokeAsync("auth0:index/getClient:getClient", args ?? new GetClientArgs(), options.WithDefaults()); /// /// Data source to retrieve a specific Auth0 application client by `client_id` or `name`. - /// - /// {{% examples %}} - /// ## Example Usage - /// {{% example %}} - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var some_client_by_name = Auth0.GetClient.Invoke(new() - /// { - /// Name = "Name of my Application", - /// }); - /// - /// var some_client_by_id = Auth0.GetClient.Invoke(new() - /// { - /// ClientId = "abcdefghkijklmnopqrstuvwxyz0123456789", - /// }); - /// - /// }); - /// ``` - /// {{% /example %}} - /// {{% /examples %}} /// public static Output Invoke(GetClientInvokeArgs? args = null, InvokeOptions? options = null) => global::Pulumi.Deployment.Instance.Invoke("auth0:index/getClient:getClient", args ?? new GetClientInvokeArgs(), options.WithDefaults()); diff --git a/sdk/dotnet/GetConnection.cs b/sdk/dotnet/GetConnection.cs index 7da8194b..caa56cb2 100644 --- a/sdk/dotnet/GetConnection.cs +++ b/sdk/dotnet/GetConnection.cs @@ -13,66 +13,12 @@ public static class GetConnection { /// /// Data source to retrieve a specific Auth0 connection by `connection_id` or `name`. - /// - /// {{% examples %}} - /// ## Example Usage - /// {{% example %}} - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var some_connection_by_name = Auth0.GetConnection.Invoke(new() - /// { - /// Name = "Acceptance-Test-Connection-{{.testName}}", - /// }); - /// - /// var some_connection_by_id = Auth0.GetConnection.Invoke(new() - /// { - /// ConnectionId = "con_abcdefghkijklmnopqrstuvwxyz0123456789", - /// }); - /// - /// }); - /// ``` - /// {{% /example %}} - /// {{% /examples %}} /// public static Task InvokeAsync(GetConnectionArgs? args = null, InvokeOptions? options = null) => global::Pulumi.Deployment.Instance.InvokeAsync("auth0:index/getConnection:getConnection", args ?? new GetConnectionArgs(), options.WithDefaults()); /// /// Data source to retrieve a specific Auth0 connection by `connection_id` or `name`. - /// - /// {{% examples %}} - /// ## Example Usage - /// {{% example %}} - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var some_connection_by_name = Auth0.GetConnection.Invoke(new() - /// { - /// Name = "Acceptance-Test-Connection-{{.testName}}", - /// }); - /// - /// var some_connection_by_id = Auth0.GetConnection.Invoke(new() - /// { - /// ConnectionId = "con_abcdefghkijklmnopqrstuvwxyz0123456789", - /// }); - /// - /// }); - /// ``` - /// {{% /example %}} - /// {{% /examples %}} /// public static Output Invoke(GetConnectionInvokeArgs? args = null, InvokeOptions? options = null) => global::Pulumi.Deployment.Instance.Invoke("auth0:index/getConnection:getConnection", args ?? new GetConnectionInvokeArgs(), options.WithDefaults()); diff --git a/sdk/dotnet/GetOrganization.cs b/sdk/dotnet/GetOrganization.cs index 1f320555..131d4e4c 100644 --- a/sdk/dotnet/GetOrganization.cs +++ b/sdk/dotnet/GetOrganization.cs @@ -13,66 +13,12 @@ public static class GetOrganization { /// /// Data source to retrieve a specific Auth0 organization by `organization_id` or `name`. - /// - /// {{% examples %}} - /// ## Example Usage - /// {{% example %}} - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var some_organization_by_name = Auth0.GetOrganization.Invoke(new() - /// { - /// Name = "my-org", - /// }); - /// - /// var some_organization_by_id = Auth0.GetOrganization.Invoke(new() - /// { - /// OrganizationId = "org_abcdefghkijklmnopqrstuvwxyz0123456789", - /// }); - /// - /// }); - /// ``` - /// {{% /example %}} - /// {{% /examples %}} /// public static Task InvokeAsync(GetOrganizationArgs? args = null, InvokeOptions? options = null) => global::Pulumi.Deployment.Instance.InvokeAsync("auth0:index/getOrganization:getOrganization", args ?? new GetOrganizationArgs(), options.WithDefaults()); /// /// Data source to retrieve a specific Auth0 organization by `organization_id` or `name`. - /// - /// {{% examples %}} - /// ## Example Usage - /// {{% example %}} - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var some_organization_by_name = Auth0.GetOrganization.Invoke(new() - /// { - /// Name = "my-org", - /// }); - /// - /// var some_organization_by_id = Auth0.GetOrganization.Invoke(new() - /// { - /// OrganizationId = "org_abcdefghkijklmnopqrstuvwxyz0123456789", - /// }); - /// - /// }); - /// ``` - /// {{% /example %}} - /// {{% /examples %}} /// public static Output Invoke(GetOrganizationInvokeArgs? args = null, InvokeOptions? options = null) => global::Pulumi.Deployment.Instance.Invoke("auth0:index/getOrganization:getOrganization", args ?? new GetOrganizationInvokeArgs(), options.WithDefaults()); diff --git a/sdk/dotnet/GetPages.cs b/sdk/dotnet/GetPages.cs index b6f64e04..5a30b42f 100644 --- a/sdk/dotnet/GetPages.cs +++ b/sdk/dotnet/GetPages.cs @@ -13,50 +13,12 @@ public static class GetPages { /// /// Use this data source to access the HTML for the login, reset password, multi-factor authentication and error pages. - /// - /// {{% examples %}} - /// ## Example Usage - /// {{% example %}} - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var myPages = Auth0.GetPages.Invoke(); - /// - /// }); - /// ``` - /// {{% /example %}} - /// {{% /examples %}} /// public static Task InvokeAsync(InvokeOptions? options = null) => global::Pulumi.Deployment.Instance.InvokeAsync("auth0:index/getPages:getPages", InvokeArgs.Empty, options.WithDefaults()); /// /// Use this data source to access the HTML for the login, reset password, multi-factor authentication and error pages. - /// - /// {{% examples %}} - /// ## Example Usage - /// {{% example %}} - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var myPages = Auth0.GetPages.Invoke(); - /// - /// }); - /// ``` - /// {{% /example %}} - /// {{% /examples %}} /// public static Output Invoke(InvokeOptions? options = null) => global::Pulumi.Deployment.Instance.Invoke("auth0:index/getPages:getPages", InvokeArgs.Empty, options.WithDefaults()); diff --git a/sdk/dotnet/GetResourceServer.cs b/sdk/dotnet/GetResourceServer.cs index 97156bd7..15ae6192 100644 --- a/sdk/dotnet/GetResourceServer.cs +++ b/sdk/dotnet/GetResourceServer.cs @@ -13,66 +13,12 @@ public static class GetResourceServer { /// /// Data source to retrieve a specific Auth0 resource server by `resource_server_id` or `identifier`. - /// - /// {{% examples %}} - /// ## Example Usage - /// {{% example %}} - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var some_resource_server_by_identifier = Auth0.GetResourceServer.Invoke(new() - /// { - /// Identifier = "https://my-api.com/v1", - /// }); - /// - /// var some_resource_server_by_id = Auth0.GetResourceServer.Invoke(new() - /// { - /// ResourceServerId = "abcdefghkijklmnopqrstuvwxyz0123456789", - /// }); - /// - /// }); - /// ``` - /// {{% /example %}} - /// {{% /examples %}} /// public static Task InvokeAsync(GetResourceServerArgs? args = null, InvokeOptions? options = null) => global::Pulumi.Deployment.Instance.InvokeAsync("auth0:index/getResourceServer:getResourceServer", args ?? new GetResourceServerArgs(), options.WithDefaults()); /// /// Data source to retrieve a specific Auth0 resource server by `resource_server_id` or `identifier`. - /// - /// {{% examples %}} - /// ## Example Usage - /// {{% example %}} - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var some_resource_server_by_identifier = Auth0.GetResourceServer.Invoke(new() - /// { - /// Identifier = "https://my-api.com/v1", - /// }); - /// - /// var some_resource_server_by_id = Auth0.GetResourceServer.Invoke(new() - /// { - /// ResourceServerId = "abcdefghkijklmnopqrstuvwxyz0123456789", - /// }); - /// - /// }); - /// ``` - /// {{% /example %}} - /// {{% /examples %}} /// public static Output Invoke(GetResourceServerInvokeArgs? args = null, InvokeOptions? options = null) => global::Pulumi.Deployment.Instance.Invoke("auth0:index/getResourceServer:getResourceServer", args ?? new GetResourceServerInvokeArgs(), options.WithDefaults()); diff --git a/sdk/dotnet/GetRole.cs b/sdk/dotnet/GetRole.cs index 9c6b4fac..0bda7c26 100644 --- a/sdk/dotnet/GetRole.cs +++ b/sdk/dotnet/GetRole.cs @@ -13,66 +13,12 @@ public static class GetRole { /// /// Data source to retrieve a specific Auth0 role by `role_id` or `name`. - /// - /// {{% examples %}} - /// ## Example Usage - /// {{% example %}} - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var some_role_by_name = Auth0.GetRole.Invoke(new() - /// { - /// Name = "my-role", - /// }); - /// - /// var some_role_by_id = Auth0.GetRole.Invoke(new() - /// { - /// RoleId = "abcdefghkijklmnopqrstuvwxyz0123456789", - /// }); - /// - /// }); - /// ``` - /// {{% /example %}} - /// {{% /examples %}} /// public static Task InvokeAsync(GetRoleArgs? args = null, InvokeOptions? options = null) => global::Pulumi.Deployment.Instance.InvokeAsync("auth0:index/getRole:getRole", args ?? new GetRoleArgs(), options.WithDefaults()); /// /// Data source to retrieve a specific Auth0 role by `role_id` or `name`. - /// - /// {{% examples %}} - /// ## Example Usage - /// {{% example %}} - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var some_role_by_name = Auth0.GetRole.Invoke(new() - /// { - /// Name = "my-role", - /// }); - /// - /// var some_role_by_id = Auth0.GetRole.Invoke(new() - /// { - /// RoleId = "abcdefghkijklmnopqrstuvwxyz0123456789", - /// }); - /// - /// }); - /// ``` - /// {{% /example %}} - /// {{% /examples %}} /// public static Output Invoke(GetRoleInvokeArgs? args = null, InvokeOptions? options = null) => global::Pulumi.Deployment.Instance.Invoke("auth0:index/getRole:getRole", args ?? new GetRoleInvokeArgs(), options.WithDefaults()); diff --git a/sdk/dotnet/GetTenant.cs b/sdk/dotnet/GetTenant.cs index 988a0034..dbdc134f 100644 --- a/sdk/dotnet/GetTenant.cs +++ b/sdk/dotnet/GetTenant.cs @@ -13,50 +13,12 @@ public static class GetTenant { /// /// Use this data source to access information about the tenant this provider is configured to access. - /// - /// {{% examples %}} - /// ## Example Usage - /// {{% example %}} - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var myTenant = Auth0.GetTenant.Invoke(); - /// - /// }); - /// ``` - /// {{% /example %}} - /// {{% /examples %}} /// public static Task InvokeAsync(InvokeOptions? options = null) => global::Pulumi.Deployment.Instance.InvokeAsync("auth0:index/getTenant:getTenant", InvokeArgs.Empty, options.WithDefaults()); /// /// Use this data source to access information about the tenant this provider is configured to access. - /// - /// {{% examples %}} - /// ## Example Usage - /// {{% example %}} - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var myTenant = Auth0.GetTenant.Invoke(); - /// - /// }); - /// ``` - /// {{% /example %}} - /// {{% /examples %}} /// public static Output Invoke(InvokeOptions? options = null) => global::Pulumi.Deployment.Instance.Invoke("auth0:index/getTenant:getTenant", InvokeArgs.Empty, options.WithDefaults()); diff --git a/sdk/dotnet/GetUser.cs b/sdk/dotnet/GetUser.cs index a0a81232..a53873ec 100644 --- a/sdk/dotnet/GetUser.cs +++ b/sdk/dotnet/GetUser.cs @@ -13,56 +13,12 @@ public static class GetUser { /// /// Data source to retrieve a specific Auth0 user by `user_id`. - /// - /// {{% examples %}} - /// ## Example Usage - /// {{% example %}} - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var myUser = Auth0.GetUser.Invoke(new() - /// { - /// UserId = "auth0|34fdr23fdsfdfsf", - /// }); - /// - /// }); - /// ``` - /// {{% /example %}} - /// {{% /examples %}} /// public static Task InvokeAsync(GetUserArgs args, InvokeOptions? options = null) => global::Pulumi.Deployment.Instance.InvokeAsync("auth0:index/getUser:getUser", args ?? new GetUserArgs(), options.WithDefaults()); /// /// Data source to retrieve a specific Auth0 user by `user_id`. - /// - /// {{% examples %}} - /// ## Example Usage - /// {{% example %}} - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var myUser = Auth0.GetUser.Invoke(new() - /// { - /// UserId = "auth0|34fdr23fdsfdfsf", - /// }); - /// - /// }); - /// ``` - /// {{% /example %}} - /// {{% /examples %}} /// public static Output Invoke(GetUserInvokeArgs args, InvokeOptions? options = null) => global::Pulumi.Deployment.Instance.Invoke("auth0:index/getUser:getUser", args ?? new GetUserInvokeArgs(), options.WithDefaults()); diff --git a/sdk/dotnet/Guardian.cs b/sdk/dotnet/Guardian.cs index 464c2e00..bf81e57a 100644 --- a/sdk/dotnet/Guardian.cs +++ b/sdk/dotnet/Guardian.cs @@ -12,77 +12,6 @@ namespace Pulumi.Auth0 /// /// Multi-Factor Authentication works by requiring additional factors during the login process to prevent unauthorized access. With this resource you can configure some options available for MFA. /// - /// ## Example Usage - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var myGuardian = new Auth0.Guardian("myGuardian", new() - /// { - /// Duo = new Auth0.Inputs.GuardianDuoArgs - /// { - /// Enabled = true, - /// Hostname = "api-hostname", - /// IntegrationKey = "someKey", - /// SecretKey = "someSecret", - /// }, - /// Email = true, - /// Otp = true, - /// Phone = new Auth0.Inputs.GuardianPhoneArgs - /// { - /// Enabled = true, - /// MessageTypes = new[] - /// { - /// "sms", - /// "voice", - /// }, - /// Options = new Auth0.Inputs.GuardianPhoneOptionsArgs - /// { - /// EnrollmentMessage = "{{code}} is your verification code for {{tenant.friendly_name}}. Please enter this code to verify your enrollment.", - /// VerificationMessage = "{{code}} is your verification code for {{tenant.friendly_name}}.", - /// }, - /// Provider = "auth0", - /// }, - /// Policy = "all-applications", - /// Push = new Auth0.Inputs.GuardianPushArgs - /// { - /// AmazonSns = new Auth0.Inputs.GuardianPushAmazonSnsArgs - /// { - /// AwsAccessKeyId = "test1", - /// AwsRegion = "us-west-1", - /// AwsSecretAccessKey = "secretKey", - /// SnsApnsPlatformApplicationArn = "test_arn", - /// SnsGcmPlatformApplicationArn = "test_arn", - /// }, - /// CustomApp = new Auth0.Inputs.GuardianPushCustomAppArgs - /// { - /// AppName = "CustomApp", - /// AppleAppLink = "https://itunes.apple.com/us/app/my-app/id123121", - /// GoogleAppLink = "https://play.google.com/store/apps/details?id=com.my.app", - /// }, - /// Enabled = true, - /// Provider = "sns", - /// }, - /// RecoveryCode = true, - /// WebauthnPlatform = new Auth0.Inputs.GuardianWebauthnPlatformArgs - /// { - /// Enabled = true, - /// }, - /// WebauthnRoaming = new Auth0.Inputs.GuardianWebauthnRoamingArgs - /// { - /// Enabled = true, - /// UserVerification = "required", - /// }, - /// }); - /// - /// }); - /// ``` - /// /// ## Import /// /// As this is not a resource identifiable by an ID within the Auth0 Management API, guardian can be imported using a random string. # We recommend [Version 4 UUID](https://www.uuidgenerator.net/version4) # Example diff --git a/sdk/dotnet/Hook.cs b/sdk/dotnet/Hook.cs index 9508fa2e..eb5631c9 100644 --- a/sdk/dotnet/Hook.cs +++ b/sdk/dotnet/Hook.cs @@ -14,38 +14,6 @@ namespace Pulumi.Auth0 /// /// !> This resource is deprecated. Refer to the [guide on how to migrate from hooks to actions](https://auth0.com/docs/customize/actions/migrate/migrate-from-hooks-to-actions) and manage your actions using the `auth0.Action` resource. /// - /// ## Example Usage - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var myHook = new Auth0.Hook("myHook", new() - /// { - /// Dependencies = - /// { - /// { "auth0", "2.30.0" }, - /// }, - /// Enabled = true, - /// Script = @" function (user, context, callback) { - /// callback(null, { user }); - /// } - /// - /// ", - /// Secrets = - /// { - /// { "foo", "bar" }, - /// }, - /// TriggerId = "pre-user-registration", - /// }); - /// - /// }); - /// ``` - /// /// ## Import /// /// This resource can be imported by specifying the hook ID. # Example diff --git a/sdk/dotnet/LogStream.cs b/sdk/dotnet/LogStream.cs index 9837c5d4..8bc90b65 100644 --- a/sdk/dotnet/LogStream.cs +++ b/sdk/dotnet/LogStream.cs @@ -12,65 +12,6 @@ namespace Pulumi.Auth0 /// /// With this resource, you can manage your Auth0 log streams. /// - /// ## Example Usage - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// // This is an example of an http log stream. - /// var myWebhook = new Auth0.LogStream("myWebhook", new() - /// { - /// Filters = new[] - /// { - /// - /// { - /// { "name", "auth.login.fail" }, - /// { "type", "category" }, - /// }, - /// - /// { - /// { "name", "auth.signup.fail" }, - /// { "type", "category" }, - /// }, - /// }, - /// Sink = new Auth0.Inputs.LogStreamSinkArgs - /// { - /// HttpAuthorization = "AKIAXXXXXXXXXXXXXXXX", - /// HttpContentFormat = "JSONOBJECT", - /// HttpContentType = "application/json", - /// HttpCustomHeaders = new[] - /// { - /// - /// { - /// { "header", "foo" }, - /// { "value", "bar" }, - /// }, - /// }, - /// HttpEndpoint = "https://example.com/logs", - /// }, - /// Type = "http", - /// }); - /// - /// // This is an example of an Amazon EventBridge log stream. - /// var exampleAws = new Auth0.LogStream("exampleAws", new() - /// { - /// Sink = new Auth0.Inputs.LogStreamSinkArgs - /// { - /// AwsAccountId = "my_account_id", - /// AwsRegion = "us-east-2", - /// }, - /// Status = "active", - /// Type = "eventbridge", - /// }); - /// - /// }); - /// ``` - /// /// ## Import /// /// This resource can be imported by specifying the log stream ID. # Example diff --git a/sdk/dotnet/Organization.cs b/sdk/dotnet/Organization.cs index f19dc291..772256b0 100644 --- a/sdk/dotnet/Organization.cs +++ b/sdk/dotnet/Organization.cs @@ -18,33 +18,6 @@ namespace Pulumi.Auth0 /// - Build administration capabilities into their products, using Organizations /// APIs, so that those businesses can manage their own organizations. /// - /// ## Example Usage - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var myOrganization = new Auth0.Organization("myOrganization", new() - /// { - /// Branding = new Auth0.Inputs.OrganizationBrandingArgs - /// { - /// Colors = - /// { - /// { "pageBackground", "#e1e1e1" }, - /// { "primary", "#f2f2f2" }, - /// }, - /// LogoUrl = "https://example.com/assets/icons/icon.png", - /// }, - /// DisplayName = "Auth0 Inc.", - /// }); - /// - /// }); - /// ``` - /// /// ## Import /// /// This resource can be imported by specifying the organization ID. # Example diff --git a/sdk/dotnet/OrganizationConnection.cs b/sdk/dotnet/OrganizationConnection.cs index f981cc87..2972a666 100644 --- a/sdk/dotnet/OrganizationConnection.cs +++ b/sdk/dotnet/OrganizationConnection.cs @@ -17,36 +17,6 @@ namespace Pulumi.Auth0 /// resource in conjunction with the `auth0.OrganizationConnections` resource when managing enabled connections for the /// same organization id. /// - /// ## Example Usage - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var myConnection = new Auth0.Connection("myConnection", new() - /// { - /// Strategy = "auth0", - /// }); - /// - /// var myOrganization = new Auth0.Organization("myOrganization", new() - /// { - /// DisplayName = "My Organization", - /// }); - /// - /// var myOrgConn = new Auth0.OrganizationConnection("myOrgConn", new() - /// { - /// OrganizationId = myOrganization.Id, - /// ConnectionId = myConnection.Id, - /// AssignMembershipOnLogin = true, - /// }); - /// - /// }); - /// ``` - /// /// ## Import /// /// This resource can be imported by specifying the organization ID and connection ID separated by "::" (note the double colon) <organizationID>::<connectionID> # Example diff --git a/sdk/dotnet/OrganizationConnections.cs b/sdk/dotnet/OrganizationConnections.cs index 757b7fc3..3cf98095 100644 --- a/sdk/dotnet/OrganizationConnections.cs +++ b/sdk/dotnet/OrganizationConnections.cs @@ -17,52 +17,6 @@ namespace Pulumi.Auth0 /// resource in conjunction with the `auth0.OrganizationConnection` resource when managing connections for the same /// organization id. /// - /// ## Example Usage - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var myConnection_1 = new Auth0.Connection("myConnection-1", new() - /// { - /// Strategy = "auth0", - /// }); - /// - /// var myConnection_2 = new Auth0.Connection("myConnection-2", new() - /// { - /// Strategy = "auth0", - /// }); - /// - /// var myOrganization = new Auth0.Organization("myOrganization", new() - /// { - /// DisplayName = "My Organization", - /// }); - /// - /// var one_to_many = new Auth0.OrganizationConnections("one-to-many", new() - /// { - /// OrganizationId = myOrganization.Id, - /// EnabledConnections = new[] - /// { - /// new Auth0.Inputs.OrganizationConnectionsEnabledConnectionArgs - /// { - /// ConnectionId = myConnection_1.Id, - /// AssignMembershipOnLogin = true, - /// }, - /// new Auth0.Inputs.OrganizationConnectionsEnabledConnectionArgs - /// { - /// ConnectionId = myConnection_2.Id, - /// AssignMembershipOnLogin = true, - /// }, - /// }, - /// }); - /// - /// }); - /// ``` - /// /// ## Import /// /// This resource can be imported by specifying the organization ID. # Example diff --git a/sdk/dotnet/OrganizationMember.cs b/sdk/dotnet/OrganizationMember.cs index cd79f5a2..c8e334dd 100644 --- a/sdk/dotnet/OrganizationMember.cs +++ b/sdk/dotnet/OrganizationMember.cs @@ -16,38 +16,6 @@ namespace Pulumi.Auth0 /// all the members assigned to an organization. To avoid potential issues, it is recommended not to use this resource in /// conjunction with the `auth0.OrganizationMembers` resource when managing members for the same organization id. /// - /// ## Example Usage - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var user = new Auth0.User("user", new() - /// { - /// Email = "test-user@auth0.com", - /// ConnectionName = "Username-Password-Authentication", - /// EmailVerified = true, - /// Password = "MyPass123$", - /// }); - /// - /// var myOrg = new Auth0.Organization("myOrg", new() - /// { - /// DisplayName = "Admin", - /// }); - /// - /// var myOrgMember = new Auth0.OrganizationMember("myOrgMember", new() - /// { - /// OrganizationId = myOrg.Id, - /// UserId = user.Id, - /// }); - /// - /// }); - /// ``` - /// /// ## Import /// /// This resource can be imported by specifying the organization ID and user ID separated by "::" (note the double colon) <organizationID>::<userID> # Example diff --git a/sdk/dotnet/OrganizationMemberRole.cs b/sdk/dotnet/OrganizationMemberRole.cs index 7ae82b2a..d7c974a2 100644 --- a/sdk/dotnet/OrganizationMemberRole.cs +++ b/sdk/dotnet/OrganizationMemberRole.cs @@ -12,55 +12,6 @@ namespace Pulumi.Auth0 /// /// This resource is used to manage the roles assigned to an organization member. /// - /// ## Example Usage - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var reader = new Auth0.Role("reader"); - /// - /// var writer = new Auth0.Role("writer"); - /// - /// var user = new Auth0.User("user", new() - /// { - /// ConnectionName = "Username-Password-Authentication", - /// Email = "test-user@auth0.com", - /// Password = "MyPass123$", - /// }); - /// - /// var myOrg = new Auth0.Organization("myOrg", new() - /// { - /// DisplayName = "Some Org", - /// }); - /// - /// var myOrgMember = new Auth0.OrganizationMember("myOrgMember", new() - /// { - /// OrganizationId = myOrg.Id, - /// UserId = user.Id, - /// }); - /// - /// var role1 = new Auth0.OrganizationMemberRole("role1", new() - /// { - /// OrganizationId = myOrg.Id, - /// UserId = user.Id, - /// RoleId = reader.Id, - /// }); - /// - /// var role2 = new Auth0.OrganizationMemberRole("role2", new() - /// { - /// OrganizationId = myOrg.Id, - /// UserId = user.Id, - /// RoleId = writer.Id, - /// }); - /// - /// }); - /// ``` - /// /// ## Import /// /// This resource can be imported by specifying the organization ID, user ID and role ID separated by "::" (note the double colon) <organizationID>::<userID>::<roleID> # Example diff --git a/sdk/dotnet/OrganizationMemberRoles.cs b/sdk/dotnet/OrganizationMemberRoles.cs index c5afcceb..3add6007 100644 --- a/sdk/dotnet/OrganizationMemberRoles.cs +++ b/sdk/dotnet/OrganizationMemberRoles.cs @@ -12,52 +12,6 @@ namespace Pulumi.Auth0 /// /// This resource is used to manage the roles assigned to an organization member. /// - /// ## Example Usage - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var reader = new Auth0.Role("reader"); - /// - /// var writer = new Auth0.Role("writer"); - /// - /// var user = new Auth0.User("user", new() - /// { - /// ConnectionName = "Username-Password-Authentication", - /// Email = "test-user@auth0.com", - /// Password = "MyPass123$", - /// }); - /// - /// var myOrg = new Auth0.Organization("myOrg", new() - /// { - /// DisplayName = "Some Org", - /// }); - /// - /// var myOrgMember = new Auth0.OrganizationMember("myOrgMember", new() - /// { - /// OrganizationId = myOrg.Id, - /// UserId = user.Id, - /// }); - /// - /// var myOrgMemberRoles = new Auth0.OrganizationMemberRoles("myOrgMemberRoles", new() - /// { - /// OrganizationId = myOrg.Id, - /// UserId = user.Id, - /// Roles = new[] - /// { - /// reader.Id, - /// writer.Id, - /// }, - /// }); - /// - /// }); - /// ``` - /// /// ## Import /// /// This resource can be imported by specifying the organization ID and user ID separated by "::" (note the double colon) <organizationID>::<userID> # Example diff --git a/sdk/dotnet/OrganizationMembers.cs b/sdk/dotnet/OrganizationMembers.cs index 8ab3ee5d..a2d9db5f 100644 --- a/sdk/dotnet/OrganizationMembers.cs +++ b/sdk/dotnet/OrganizationMembers.cs @@ -17,48 +17,6 @@ namespace Pulumi.Auth0 /// resource in conjunction with the `auth0.OrganizationMember` resource when managing members for the same organization /// id. /// - /// ## Example Usage - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var user1 = new Auth0.User("user1", new() - /// { - /// ConnectionName = "Username-Password-Authentication", - /// Email = "myuser1@auth0.com", - /// Password = "MyPass123$", - /// }); - /// - /// var user2 = new Auth0.User("user2", new() - /// { - /// ConnectionName = "Username-Password-Authentication", - /// Email = "myuser2@auth0.com", - /// Password = "MyPass123$", - /// }); - /// - /// var myOrg = new Auth0.Organization("myOrg", new() - /// { - /// DisplayName = "Some Organization", - /// }); - /// - /// var myMembers = new Auth0.OrganizationMembers("myMembers", new() - /// { - /// OrganizationId = myOrg.Id, - /// Members = new[] - /// { - /// user1.Id, - /// user2.Id, - /// }, - /// }); - /// - /// }); - /// ``` - /// /// ## Import /// /// This resource can be imported by specifying the organization ID. # Example diff --git a/sdk/dotnet/Pages.cs b/sdk/dotnet/Pages.cs index 4dee650c..3e8bb3dd 100644 --- a/sdk/dotnet/Pages.cs +++ b/sdk/dotnet/Pages.cs @@ -12,44 +12,6 @@ namespace Pulumi.Auth0 /// /// With this resource you can manage custom HTML for the Login, Reset Password, Multi-Factor Authentication and Error pages. /// - /// ## Example Usage - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var myPages = new Auth0.Pages("myPages", new() - /// { - /// ChangePassword = new Auth0.Inputs.PagesChangePasswordArgs - /// { - /// Enabled = true, - /// Html = "<html><body>My Custom Reset Password Page</body></html>", - /// }, - /// Error = new Auth0.Inputs.PagesErrorArgs - /// { - /// Html = "<html><body>My Custom Error Page</body></html>", - /// ShowLogLink = true, - /// Url = "https://example.com", - /// }, - /// GuardianMfa = new Auth0.Inputs.PagesGuardianMfaArgs - /// { - /// Enabled = true, - /// Html = "<html><body>My Custom MFA Page</body></html>", - /// }, - /// Login = new Auth0.Inputs.PagesLoginArgs - /// { - /// Enabled = true, - /// Html = "<html><body>My Custom Login Page</body></html>", - /// }, - /// }); - /// - /// }); - /// ``` - /// /// ## Import /// /// As this is not a resource identifiable by an ID within the Auth0 Management API, pages can be imported using a random string. # We recommend [Version 4 UUID](https://www.uuidgenerator.net/version4) # Example diff --git a/sdk/dotnet/Prompt.cs b/sdk/dotnet/Prompt.cs index 5cb2a3aa..f85ec888 100644 --- a/sdk/dotnet/Prompt.cs +++ b/sdk/dotnet/Prompt.cs @@ -12,26 +12,6 @@ namespace Pulumi.Auth0 /// /// With this resource, you can manage your Auth0 prompts, including choosing the login experience version. /// - /// ## Example Usage - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var myPrompt = new Auth0.Prompt("myPrompt", new() - /// { - /// IdentifierFirst = false, - /// UniversalLoginExperience = "new", - /// WebauthnPlatformFirstFactor = true, - /// }); - /// - /// }); - /// ``` - /// /// ## Import /// /// As this is not a resource identifiable by an ID within the Auth0 Management API, prompts can be imported using a random string. # We recommend [Version 4 UUID](https://www.uuidgenerator.net/version4) # Example diff --git a/sdk/dotnet/PromptCustomText.cs b/sdk/dotnet/PromptCustomText.cs index 5892b799..907e70ad 100644 --- a/sdk/dotnet/PromptCustomText.cs +++ b/sdk/dotnet/PromptCustomText.cs @@ -12,51 +12,6 @@ namespace Pulumi.Auth0 /// /// With this resource, you can manage custom text on your Auth0 prompts. You can read more about custom texts [here](https://auth0.com/docs/customize/universal-login-pages/customize-login-text-prompts). /// - /// ## Example Usage - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using System.Text.Json; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var example = new Auth0.PromptCustomText("example", new() - /// { - /// Prompt = "login", - /// Language = "en", - /// Body = JsonSerializer.Serialize(new Dictionary<string, object?> - /// { - /// ["login"] = new Dictionary<string, object?> - /// { - /// ["alertListTitle"] = "Alerts", - /// ["buttonText"] = "Continue", - /// ["description"] = "Login to", - /// ["editEmailText"] = "Edit", - /// ["emailPlaceholder"] = "Email address", - /// ["federatedConnectionButtonText"] = "Continue with ${connectionName}", - /// ["footerLinkText"] = "Sign up", - /// ["footerText"] = "Don't have an account?", - /// ["forgotPasswordText"] = "Forgot password?", - /// ["invitationDescription"] = "Log in to accept ${inviterName}'s invitation to join ${companyName} on ${clientName}.", - /// ["invitationTitle"] = "You've Been Invited!", - /// ["logoAltText"] = "${companyName}", - /// ["pageTitle"] = "Log in | ${clientName}", - /// ["passwordPlaceholder"] = "Password", - /// ["separatorText"] = "Or", - /// ["signupActionLinkText"] = "${footerLinkText}", - /// ["signupActionText"] = "${footerText}", - /// ["title"] = "Welcome", - /// ["usernamePlaceholder"] = "Username or email address", - /// }, - /// }), - /// }); - /// - /// }); - /// ``` - /// /// ## Import /// /// This resource can be imported by specifying the prompt and language separated by "::" (note the double colon) <prompt>::<language> # Example diff --git a/sdk/dotnet/ResourceServer.cs b/sdk/dotnet/ResourceServer.cs index c5e75714..31300967 100644 --- a/sdk/dotnet/ResourceServer.cs +++ b/sdk/dotnet/ResourceServer.cs @@ -12,28 +12,6 @@ namespace Pulumi.Auth0 /// /// With this resource, you can set up APIs that can be consumed from your authorized applications. /// - /// ## Example Usage - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var myResourceServer = new Auth0.ResourceServer("myResourceServer", new() - /// { - /// AllowOfflineAccess = true, - /// Identifier = "https://api.example.com", - /// SigningAlg = "RS256", - /// SkipConsentForVerifiableFirstPartyClients = true, - /// TokenLifetime = 8600, - /// }); - /// - /// }); - /// ``` - /// /// ## Import /// /// Existing resource servers can be imported using their ID. # Example diff --git a/sdk/dotnet/ResourceServerScope.cs b/sdk/dotnet/ResourceServerScope.cs index 24e8d285..61edeabc 100644 --- a/sdk/dotnet/ResourceServerScope.cs +++ b/sdk/dotnet/ResourceServerScope.cs @@ -16,36 +16,6 @@ namespace Pulumi.Auth0 /// all the scopes assigned to a resource server. To avoid potential issues, it is recommended not to use this resource in /// conjunction with the `auth0.ResourceServerScopes` resource when managing scopes for the same resource server id. /// - /// ## Example Usage - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var resourceServer = new Auth0.ResourceServer("resourceServer", new() - /// { - /// Identifier = "https://api.example.com", - /// }); - /// - /// var readPosts = new Auth0.ResourceServerScope("readPosts", new() - /// { - /// ResourceServerIdentifier = resourceServer.Identifier, - /// Scope = "read:posts", - /// }); - /// - /// var writePosts = new Auth0.ResourceServerScope("writePosts", new() - /// { - /// ResourceServerIdentifier = resourceServer.Identifier, - /// Scope = "write:posts", - /// }); - /// - /// }); - /// ``` - /// /// ## Import /// /// This resource can be imported by specifying the resource identifier and scope name separated by "::" (note the double colon) <resourceServerIdentifier>::<scope> # Example diff --git a/sdk/dotnet/ResourceServerScopes.cs b/sdk/dotnet/ResourceServerScopes.cs index 61e5eee1..9e04ef63 100644 --- a/sdk/dotnet/ResourceServerScopes.cs +++ b/sdk/dotnet/ResourceServerScopes.cs @@ -17,42 +17,6 @@ namespace Pulumi.Auth0 /// resource in conjunction with the `auth0.ResourceServerScope` resource when managing scopes for the same resource /// server id. /// - /// ## Example Usage - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var myApi = new Auth0.ResourceServer("myApi", new() - /// { - /// Identifier = "https://api.example.com", - /// }); - /// - /// var myApiScopes = new Auth0.ResourceServerScopes("myApiScopes", new() - /// { - /// ResourceServerIdentifier = myApi.Identifier, - /// Scopes = new[] - /// { - /// new Auth0.Inputs.ResourceServerScopesScopeArgs - /// { - /// Name = "create:appointments", - /// Description = "Ability to create appointments", - /// }, - /// new Auth0.Inputs.ResourceServerScopesScopeArgs - /// { - /// Name = "read:appointments", - /// Description = "Ability to read appointments", - /// }, - /// }, - /// }); - /// - /// }); - /// ``` - /// /// ## Import /// /// This resource can be imported by specifying the resource server identifier. # Example diff --git a/sdk/dotnet/Role.cs b/sdk/dotnet/Role.cs index 50405072..0d902a35 100644 --- a/sdk/dotnet/Role.cs +++ b/sdk/dotnet/Role.cs @@ -12,24 +12,6 @@ namespace Pulumi.Auth0 /// /// With this resource, you can create and manage collections of permissions that can be assigned to users, which are otherwise known as roles. Permissions (scopes) are created on `auth0.ResourceServer`, then associated with roles and optionally, users using this resource. /// - /// ## Example Usage - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var myRole = new Auth0.Role("myRole", new() - /// { - /// Description = "Role Description...", - /// }); - /// - /// }); - /// ``` - /// /// ## Import /// /// Existing roles can be imported using their ID. # Example diff --git a/sdk/dotnet/Rule.cs b/sdk/dotnet/Rule.cs index b8cfd388..a38cee70 100644 --- a/sdk/dotnet/Rule.cs +++ b/sdk/dotnet/Rule.cs @@ -14,29 +14,6 @@ namespace Pulumi.Auth0 /// /// !> This resource is deprecated. Refer to the [guide on how to migrate from rules to actions](https://auth0.com/docs/customize/actions/migrate/migrate-from-rules-to-actions) and manage your actions using the `auth0.Action` resource. /// - /// ## Example Usage - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var myRule = new Auth0.Rule("myRule", new() - /// { - /// Enabled = true, - /// Script = @" function (user, context, callback) { - /// callback(null, user, context); - /// } - /// - /// ", - /// }); - /// - /// }); - /// ``` - /// /// ## Import /// /// Existing rules can be imported using their ID. # Example diff --git a/sdk/dotnet/RuleConfig.cs b/sdk/dotnet/RuleConfig.cs index 3d2cabc4..0c961fb4 100644 --- a/sdk/dotnet/RuleConfig.cs +++ b/sdk/dotnet/RuleConfig.cs @@ -12,35 +12,6 @@ namespace Pulumi.Auth0 /// /// With Auth0, you can create custom Javascript snippets that run in a secure, isolated sandbox as part of your authentication pipeline, which are otherwise known as rules. This resource allows you to create and manage variables that are available to all rules via Auth0's global configuration object. Used in conjunction with configured rules. /// - /// ## Example Usage - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var myRule = new Auth0.Rule("myRule", new() - /// { - /// Enabled = true, - /// Script = @" function (user, context, callback) { - /// callback(null, user, context); - /// } - /// - /// ", - /// }); - /// - /// var myRuleConfig = new Auth0.RuleConfig("myRuleConfig", new() - /// { - /// Key = "foo", - /// Value = "bar", - /// }); - /// - /// }); - /// ``` - /// /// ## Import /// /// Existing rule configs can be imported using their key name. # Example diff --git a/sdk/dotnet/Tenant.cs b/sdk/dotnet/Tenant.cs index 88503c51..7d095940 100644 --- a/sdk/dotnet/Tenant.cs +++ b/sdk/dotnet/Tenant.cs @@ -15,55 +15,6 @@ namespace Pulumi.Auth0 /// > Creating tenants through the Management API is not currently supported. Therefore, this resource can only /// manage an existing tenant created through the Auth0 dashboard. /// - /// ## Example Usage - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var myTenant = new Auth0.Tenant("myTenant", new() - /// { - /// AllowedLogoutUrls = new[] - /// { - /// "http://example.com/logout", - /// }, - /// DefaultRedirectionUri = "https://example.com/login", - /// EnabledLocales = new[] - /// { - /// "en", - /// }, - /// Flags = new Auth0.Inputs.TenantFlagsArgs - /// { - /// DisableClickjackProtectionHeaders = true, - /// DisableFieldsMapFix = false, - /// DisableManagementApiSmsObfuscation = false, - /// EnablePublicSignupUserExistsError = true, - /// NoDiscloseEnterpriseConnections = false, - /// UseScopeDescriptionsForConsent = true, - /// }, - /// FriendlyName = "Tenant Name", - /// PictureUrl = "http://example.com/logo.png", - /// SandboxVersion = "12", - /// SessionCookie = new Auth0.Inputs.TenantSessionCookieArgs - /// { - /// Mode = "non-persistent", - /// }, - /// SessionLifetime = 8760, - /// Sessions = new Auth0.Inputs.TenantSessionsArgs - /// { - /// OidcLogoutPromptEnabled = false, - /// }, - /// SupportEmail = "support@example.com", - /// SupportUrl = "http://example.com/support", - /// }); - /// - /// }); - /// ``` - /// /// ## Import /// /// As this is not a resource identifiable by an ID within the Auth0 Management API, tenant can be imported using a random string. # We recommend [Version 4 UUID](https://www.uuidgenerator.net/version4) # Example diff --git a/sdk/dotnet/TriggerAction.cs b/sdk/dotnet/TriggerAction.cs index 4708b383..4b6e2035 100644 --- a/sdk/dotnet/TriggerAction.cs +++ b/sdk/dotnet/TriggerAction.cs @@ -18,39 +18,6 @@ namespace Pulumi.Auth0 /// the action bindings to a trigger. To avoid potential issues, it is recommended not to use this resource in conjunction /// with the `auth0.TriggerAction` resource when binding actions to the same trigger. /// - /// ## Example Usage - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var loginAlert = new Auth0.Action("loginAlert", new() - /// { - /// Code = @"exports.onContinuePostLogin = async (event, api) => { - /// console.log(""foo""); - /// };"" - /// ", - /// Deploy = true, - /// SupportedTriggers = new Auth0.Inputs.ActionSupportedTriggersArgs - /// { - /// Id = "post-login", - /// Version = "v3", - /// }, - /// }); - /// - /// var postLoginAlertAction = new Auth0.TriggerAction("postLoginAlertAction", new() - /// { - /// Trigger = "post-login", - /// ActionId = loginAlert.Id, - /// }); - /// - /// }); - /// ``` - /// /// ## Import /// /// This resource can be imported by specifying the trigger and action ID separated by "::" (note the double colon) <trigger>::<actionID> # Example diff --git a/sdk/dotnet/TriggerActions.cs b/sdk/dotnet/TriggerActions.cs index 25937070..9dd0ed7d 100644 --- a/sdk/dotnet/TriggerActions.cs +++ b/sdk/dotnet/TriggerActions.cs @@ -16,65 +16,6 @@ namespace Pulumi.Auth0 /// appends an action to the trigger binding. To avoid potential issues, it is recommended not to use this resource in /// conjunction with the `auth0.TriggerAction` resource when binding actions to the same trigger. /// - /// ## Example Usage - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var actionFoo = new Auth0.Action("actionFoo", new() - /// { - /// Code = @"exports.onContinuePostLogin = async (event, api) => { - /// console.log(""foo""); - /// };"" - /// ", - /// Deploy = true, - /// SupportedTriggers = new Auth0.Inputs.ActionSupportedTriggersArgs - /// { - /// Id = "post-login", - /// Version = "v3", - /// }, - /// }); - /// - /// var actionBar = new Auth0.Action("actionBar", new() - /// { - /// Code = @"exports.onContinuePostLogin = async (event, api) => { - /// console.log(""bar""); - /// };"" - /// ", - /// Deploy = true, - /// SupportedTriggers = new Auth0.Inputs.ActionSupportedTriggersArgs - /// { - /// Id = "post-login", - /// Version = "v3", - /// }, - /// }); - /// - /// var loginFlow = new Auth0.TriggerActions("loginFlow", new() - /// { - /// Trigger = "post-login", - /// Actions = new[] - /// { - /// new Auth0.Inputs.TriggerActionsActionArgs - /// { - /// Id = actionFoo.Id, - /// DisplayName = actionFoo.Name, - /// }, - /// new Auth0.Inputs.TriggerActionsActionArgs - /// { - /// Id = actionBar.Id, - /// DisplayName = actionBar.Name, - /// }, - /// }, - /// }); - /// - /// }); - /// ``` - /// /// ## Import /// /// This resource can be imported using the bindings trigger ID. # Example diff --git a/sdk/dotnet/User.cs b/sdk/dotnet/User.cs index 95228044..111c79d0 100644 --- a/sdk/dotnet/User.cs +++ b/sdk/dotnet/User.cs @@ -12,31 +12,6 @@ namespace Pulumi.Auth0 /// /// With this resource, you can manage user identities, including resetting passwords, and creating, provisioning, blocking, and deleting users. /// - /// ## Example Usage - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// var user = new Auth0.User("user", new() - /// { - /// ConnectionName = "Username-Password-Authentication", - /// Email = "test@test.com", - /// EmailVerified = true, - /// Nickname = "some.nickname", - /// Password = "passpass$12$12", - /// Picture = "https://www.example.com/a-valid-picture-url.jpg", - /// UserId = "12345", - /// Username = "unique_username", - /// }); - /// - /// }); - /// ``` - /// /// ## Import /// /// This resource can be imported using the user ID. # Example diff --git a/sdk/dotnet/UserRole.cs b/sdk/dotnet/UserRole.cs index bd9d26f2..5b673471 100644 --- a/sdk/dotnet/UserRole.cs +++ b/sdk/dotnet/UserRole.cs @@ -16,39 +16,6 @@ namespace Pulumi.Auth0 /// to a user. To avoid potential issues, it is recommended not to use this resource in conjunction with the /// `auth0.UserRoles` resource when managing roles for the same user id. /// - /// ## Example Usage - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// // Example: - /// var admin = new Auth0.Role("admin", new() - /// { - /// Description = "Administrator", - /// }); - /// - /// var user = new Auth0.User("user", new() - /// { - /// ConnectionName = "Username-Password-Authentication", - /// Username = "unique_username", - /// Email = "test@test.com", - /// Password = "passpass$12$12", - /// }); - /// - /// var userRoles = new Auth0.UserRole("userRoles", new() - /// { - /// UserId = user.Id, - /// RoleId = admin.Id, - /// }); - /// - /// }); - /// ``` - /// /// ## Import /// /// This resource can be imported by specifying the user ID and role ID separated by "::" (note the double colon) <userID>::<roleID> # Example diff --git a/sdk/dotnet/UserRoles.cs b/sdk/dotnet/UserRoles.cs index aa1d6f08..1f8b2eea 100644 --- a/sdk/dotnet/UserRoles.cs +++ b/sdk/dotnet/UserRoles.cs @@ -16,42 +16,6 @@ namespace Pulumi.Auth0 /// role to a user. To avoid potential issues, it is recommended not to use this resource in conjunction with the /// `auth0.UserRole` resource when managing roles for the same user id. /// - /// ## Example Usage - /// - /// ```csharp - /// using System.Collections.Generic; - /// using System.Linq; - /// using Pulumi; - /// using Auth0 = Pulumi.Auth0; - /// - /// return await Deployment.RunAsync(() => - /// { - /// // Example: - /// var admin = new Auth0.Role("admin", new() - /// { - /// Description = "Administrator", - /// }); - /// - /// var user = new Auth0.User("user", new() - /// { - /// ConnectionName = "Username-Password-Authentication", - /// Username = "unique_username", - /// Email = "test@test.com", - /// Password = "passpass$12$12", - /// }); - /// - /// var userRoles = new Auth0.UserRoles("userRoles", new() - /// { - /// UserId = user.Id, - /// Roles = new[] - /// { - /// admin.Id, - /// }, - /// }); - /// - /// }); - /// ``` - /// /// ## Import /// /// This resource can be imported using the user ID. # Example diff --git a/sdk/go.mod b/sdk/go.mod index 21a3e87c..ac091ffe 100644 --- a/sdk/go.mod +++ b/sdk/go.mod @@ -4,7 +4,7 @@ go 1.21 require ( github.com/blang/semver v3.5.1+incompatible - github.com/pulumi/pulumi/sdk/v3 v3.86.0 + github.com/pulumi/pulumi/sdk/v3 v3.90.1 ) require ( @@ -33,7 +33,7 @@ require ( github.com/grpc-ecosystem/grpc-opentracing v0.0.0-20180507213350-8e809c8a8645 // indirect github.com/hashicorp/errwrap v1.1.0 // indirect github.com/hashicorp/go-multierror v1.1.1 // indirect - github.com/hashicorp/hcl/v2 v2.16.2 // indirect + github.com/hashicorp/hcl/v2 v2.17.0 // indirect github.com/imdario/mergo v0.3.13 // indirect github.com/inconshreveable/mousetrap v1.1.0 // indirect github.com/jbenet/go-context v0.0.0-20150711004518-d14ea06fba99 // indirect @@ -53,8 +53,9 @@ require ( github.com/pjbgf/sha1cd v0.3.0 // indirect github.com/pkg/errors v0.9.1 // indirect github.com/pkg/term v1.1.0 // indirect + github.com/pulumi/esc v0.5.6 // indirect github.com/rivo/uniseg v0.4.4 // indirect - github.com/rogpeppe/go-internal v1.9.0 // indirect + github.com/rogpeppe/go-internal v1.11.0 // indirect github.com/sabhiram/go-gitignore v0.0.0-20210923224102-525f6e181f06 // indirect github.com/santhosh-tekuri/jsonschema/v5 v5.0.0 // indirect github.com/sergi/go-diff v1.3.1 // indirect @@ -62,7 +63,7 @@ require ( github.com/spf13/cast v1.4.1 // indirect github.com/spf13/cobra v1.7.0 // indirect github.com/spf13/pflag v1.0.5 // indirect - github.com/stretchr/testify v1.8.3 // indirect + github.com/stretchr/objx v0.5.0 // indirect github.com/texttheater/golang-levenshtein v1.0.1 // indirect github.com/tweekmonster/luser v0.0.0-20161003172636-3fa38070dbd7 // indirect github.com/uber/jaeger-client-go v2.30.0+incompatible // indirect @@ -70,12 +71,13 @@ require ( github.com/xanzy/ssh-agent v0.3.3 // indirect github.com/zclconf/go-cty v1.13.2 // indirect go.uber.org/atomic v1.9.0 // indirect - golang.org/x/crypto v0.9.0 // indirect - golang.org/x/net v0.10.0 // indirect + golang.org/x/crypto v0.14.0 // indirect + golang.org/x/exp v0.0.0-20231006140011-7918f672742d // indirect + golang.org/x/net v0.17.0 // indirect golang.org/x/sync v0.2.0 // indirect - golang.org/x/sys v0.9.0 // indirect - golang.org/x/term v0.8.0 // indirect - golang.org/x/text v0.9.0 // indirect + golang.org/x/sys v0.13.0 // indirect + golang.org/x/term v0.13.0 // indirect + golang.org/x/text v0.13.0 // indirect google.golang.org/genproto/googleapis/rpc v0.0.0-20230706204954-ccb25ca9f130 // indirect google.golang.org/grpc v1.57.0 // indirect google.golang.org/protobuf v1.31.0 // indirect diff --git a/sdk/go.sum b/sdk/go.sum index ed80228b..53534be4 100644 --- a/sdk/go.sum +++ b/sdk/go.sum @@ -77,8 +77,8 @@ github.com/hashicorp/errwrap v1.1.0 h1:OxrOeh75EUXMY8TBjag2fzXGZ40LB6IKw45YeGUDY github.com/hashicorp/errwrap v1.1.0/go.mod h1:YH+1FKiLXxHSkmPseP+kNlulaMuP3n2brvKWEqk/Jc4= github.com/hashicorp/go-multierror v1.1.1 h1:H5DkEtf6CXdFp0N0Em5UCwQpXMWke8IA0+lD48awMYo= github.com/hashicorp/go-multierror v1.1.1/go.mod h1:iw975J/qwKPdAO1clOe2L8331t/9/fmwbPZ6JB6eMoM= -github.com/hashicorp/hcl/v2 v2.16.2 h1:mpkHZh/Tv+xet3sy3F9Ld4FyI2tUpWe9x3XtPx9f1a0= -github.com/hashicorp/hcl/v2 v2.16.2/go.mod h1:JRmR89jycNkrrqnMmvPDMd56n1rQJ2Q6KocSLCMCXng= +github.com/hashicorp/hcl/v2 v2.17.0 h1:z1XvSUyXd1HP10U4lrLg5e0JMVz6CPaJvAgxM0KNZVY= +github.com/hashicorp/hcl/v2 v2.17.0/go.mod h1:gJyW2PTShkJqQBKpAmPO3yxMxIuoXkOF2TpqXzrQyx4= github.com/imdario/mergo v0.3.13 h1:lFzP57bqS/wsqKssCGmtLAb8A0wKjLGrve2q3PPVcBk= github.com/imdario/mergo v0.3.13/go.mod h1:4lJ1jqUDcsbIECGy0RUJAXNIhg+6ocWgb1ALK2O4oXg= github.com/inconshreveable/mousetrap v1.1.0 h1:wN+x4NVGpMsO7ErUn/mUI3vEoE6Jt13X2s0bqwp9tc8= @@ -92,9 +92,8 @@ github.com/kisielk/errcheck v1.2.0/go.mod h1:/BMXB+zMLi60iA8Vv6Ksmxu/1UDYcXs4uQL github.com/kisielk/errcheck v1.5.0/go.mod h1:pFxgyoBC7bSaBwPgfKdkLd5X25qrDl4LWUI2bnpBCr8= github.com/kisielk/gotool v1.0.0/go.mod h1:XhKaO+MFFWcvkIS/tQcRk01m1F5IRFswLeQ+oQHNcck= github.com/kr/pretty v0.1.0/go.mod h1:dAy3ld7l9f0ibDNOQOHHMYYIIbhfbHSm3C4ZsoJORNo= +github.com/kr/pretty v0.2.1 h1:Fmg33tUaq4/8ym9TJN1x7sLJnHVwhP33CNkpYV/7rwI= github.com/kr/pretty v0.2.1/go.mod h1:ipq/a2n7PKx3OHsz4KJII5eveXtPO4qwEXGdVfWzfnI= -github.com/kr/pretty v0.3.1 h1:flRD4NNwYAUpkphVc1HcthR4KEIFJ65n8Mw5qdRn3LE= -github.com/kr/pretty v0.3.1/go.mod h1:hoEshYVHaxMs3cyo3Yncou5ZscifuDolrwPKZanG3xk= github.com/kr/pty v1.1.1/go.mod h1:pFQYn66WHrOpPYNljwOMqo10TkYh1fy3cYio2l3bCsQ= github.com/kr/text v0.1.0/go.mod h1:4Jbv+DJW3UT/LiOwJeYQe1efqtUx/iVham/4vfdArNI= github.com/kr/text v0.2.0 h1:5Nx0Ya0ZqY2ygV366QzturHI13Jq95ApcVaJBhpS+AY= @@ -143,14 +142,16 @@ github.com/pkg/term v1.1.0 h1:xIAAdCMh3QIAy+5FrE8Ad8XoDhEU4ufwbaSozViP9kk= github.com/pkg/term v1.1.0/go.mod h1:E25nymQcrSllhX42Ok8MRm1+hyBdHY0dCeiKZ9jpNGw= github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM= github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4= -github.com/pulumi/pulumi/sdk/v3 v3.86.0 h1:Cxg0rGdvMt9GqGvesFTj8+WaO/ihmALYlQf4zm1GzFw= -github.com/pulumi/pulumi/sdk/v3 v3.86.0/go.mod h1:vexSGJ5L834l3T7Fo/KpdywjGAgZ2CvChuqGFl+ebS0= +github.com/pulumi/esc v0.5.6 h1:4WV3X7OEVcChIwbSG+JxhZDdmq/q7lFPaSjHRYlPwmI= +github.com/pulumi/esc v0.5.6/go.mod h1:wpwNfVS5fV7Kd51j4dJ6FWYlKfxdqyppgp0gtkzqH04= +github.com/pulumi/pulumi/sdk/v3 v3.90.1 h1:iT4t57N92WGhEQtg+KVDEmYzgfEyri39eihQzcNmtrM= +github.com/pulumi/pulumi/sdk/v3 v3.90.1/go.mod h1:zYaQQibB2pYKy/uG4c4YkX7lQIBpZ0KsuMaq/3HsIBQ= github.com/rivo/uniseg v0.1.0/go.mod h1:J6wj4VEh+S6ZtnVlnTBMWIodfgj8LQOQFoIToxlJtxc= github.com/rivo/uniseg v0.2.0/go.mod h1:J6wj4VEh+S6ZtnVlnTBMWIodfgj8LQOQFoIToxlJtxc= github.com/rivo/uniseg v0.4.4 h1:8TfxU8dW6PdqD27gjM8MVNuicgxIjxpm4K7x4jp8sis= github.com/rivo/uniseg v0.4.4/go.mod h1:FN3SvrM+Zdj16jyLfmOkMNblXMcoc8DfTHruCPUcx88= -github.com/rogpeppe/go-internal v1.9.0 h1:73kH8U+JUqXU8lRuOHeVHaa/SZPifC7BkcraZVejAe8= -github.com/rogpeppe/go-internal v1.9.0/go.mod h1:WtVeX8xhTBvf0smdhujwtBcq4Qrzq/fJaraNFVN+nFs= +github.com/rogpeppe/go-internal v1.11.0 h1:cWPaGQEPrBb5/AsnsZesgZZ9yb1OQ+GOISoDNXVBh4M= +github.com/rogpeppe/go-internal v1.11.0/go.mod h1:ddIwULY96R17DhadqLgMfk9H9tvdUzkipdSkR5nkCZA= github.com/russross/blackfriday/v2 v2.1.0/go.mod h1:+Rmxgy9KzJVeS9/2gXHxylqXiyQDYRxCVz55jmeOWTM= github.com/sabhiram/go-gitignore v0.0.0-20210923224102-525f6e181f06 h1:OkMGxebDjyw0ULyrTYWeN0UNCCkmCWfjPnIA2W6oviI= github.com/sabhiram/go-gitignore v0.0.0-20210923224102-525f6e181f06/go.mod h1:+ePHsJ1keEjQtpvf9HHw0f4ZeJ0TLRsxhunSI2hYJSs= @@ -169,6 +170,7 @@ github.com/spf13/cobra v1.7.0/go.mod h1:uLxZILRyS/50WlhOIKD7W6V5bgeIt+4sICxh6uRM github.com/spf13/pflag v1.0.5 h1:iy+VFUOCP1a+8yFto/drg2CJ5u0yRoB7fZw3DKv/JXA= github.com/spf13/pflag v1.0.5/go.mod h1:McXfInJRrz4CZXVZOBLb0bTZqETkiAhM9Iw0y3An2Bg= github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME= +github.com/stretchr/objx v0.4.0/go.mod h1:YvHI0jy2hoMjB+UWwv71VJQ9isScKT/TqJzVSSt89Yw= github.com/stretchr/objx v0.5.0 h1:1zr/of2m5FGMsad5YfcqgdqdWrIhu+EBEJRhR1U7z/c= github.com/stretchr/objx v0.5.0/go.mod h1:Yh+to48EsGEfYuaHDzXPcE3xhTkx73EhmCGUpEOglKo= github.com/stretchr/testify v1.2.2/go.mod h1:a8OnRcib4nhh0OaRAV+Yts87kKdq0PP7pXfy6kDkUVs= @@ -177,8 +179,10 @@ github.com/stretchr/testify v1.4.0/go.mod h1:j7eGeouHqKxXV5pUuKE4zz7dFj8WfuZ+81P github.com/stretchr/testify v1.5.1/go.mod h1:5W2xD1RspED5o8YsWQXVCued0rvSQ+mT+I5cxcmMvtA= github.com/stretchr/testify v1.6.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg= github.com/stretchr/testify v1.7.0/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg= -github.com/stretchr/testify v1.8.3 h1:RP3t2pwF7cMEbC1dqtB6poj3niw/9gnV4Cjg5oW5gtY= -github.com/stretchr/testify v1.8.3/go.mod h1:sz/lmYIOXD/1dqDmKjjqLyZ2RngseejIcXlSw2iwfAo= +github.com/stretchr/testify v1.7.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg= +github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO+kdMU+MU= +github.com/stretchr/testify v1.8.4 h1:CcVxjf3Q8PM0mHUKJCdn+eZZtm5yQwehR5yeSVQQcUk= +github.com/stretchr/testify v1.8.4/go.mod h1:sz/lmYIOXD/1dqDmKjjqLyZ2RngseejIcXlSw2iwfAo= github.com/texttheater/golang-levenshtein v1.0.1 h1:+cRNoVrfiwufQPhoMzB6N0Yf/Mqajr6t1lOv8GyGE2U= github.com/texttheater/golang-levenshtein v1.0.1/go.mod h1:PYAKrbF5sAiq9wd+H82hs7gNaen0CplQ9uvm6+enD/8= github.com/tweekmonster/luser v0.0.0-20161003172636-3fa38070dbd7 h1:X9dsIWPuuEJlPX//UmRKophhOKCGXc46RVIGuttks68= @@ -206,8 +210,10 @@ golang.org/x/crypto v0.0.0-20220622213112-05595931fe9d/go.mod h1:IxCIyHEi3zRg3s0 golang.org/x/crypto v0.0.0-20220826181053-bd7e27e6170d/go.mod h1:IxCIyHEi3zRg3s0A5j5BB6A9Jmi73HwBIUl50j+osU4= golang.org/x/crypto v0.1.0/go.mod h1:RecgLatLF4+eUMCP1PoPZQb+cVrJcOPbHkTkbkB9sbw= golang.org/x/crypto v0.3.0/go.mod h1:hebNnKkNXi2UzZN1eVRvBB7co0a+JxK6XbPiWVs/3J4= -golang.org/x/crypto v0.9.0 h1:LF6fAI+IutBocDJ2OT0Q1g8plpYljMZ4+lty+dsqw3g= -golang.org/x/crypto v0.9.0/go.mod h1:yrmDGqONDYtNj3tH8X9dzUun2m2lzPa9ngI6/RUPGR0= +golang.org/x/crypto v0.14.0 h1:wBqGXzWJW6m1XrIKlAH0Hs1JJ7+9KBwnIO8v66Q9cHc= +golang.org/x/crypto v0.14.0/go.mod h1:MVFd36DqK4CsrnJYDkBA3VC4m2GkXAM0PvzMCn4JQf4= +golang.org/x/exp v0.0.0-20231006140011-7918f672742d h1:jtJma62tbqLibJ5sFQz8bKtEM8rJBtfilJ2qTU199MI= +golang.org/x/exp v0.0.0-20231006140011-7918f672742d/go.mod h1:ldy0pHrwJyGW56pPQzzkH36rKxoZW1tw7ZJpeKx+hdo= golang.org/x/lint v0.0.0-20200302205851-738671d3881b/go.mod h1:3xt1FjdF8hUf6vQPIChWIBhFzV8gjjsPE/fR3IyQdNY= golang.org/x/mod v0.1.1-0.20191105210325-c90efee705ee/go.mod h1:QqPTAvyqsEbceGzBzNggFXnrqF1CaUcvgkdR5Ot7KZg= golang.org/x/mod v0.2.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA= @@ -225,8 +231,8 @@ golang.org/x/net v0.0.0-20220722155237-a158d28d115b/go.mod h1:XRhObCWvk6IyKnWLug golang.org/x/net v0.0.0-20220826154423-83b083e8dc8b/go.mod h1:YDH+HFinaLZZlnHAfSS6ZXJJ9M9t4Dl22yv3iI2vPwk= golang.org/x/net v0.1.0/go.mod h1:Cx3nUiGt4eDBEyega/BKRp+/AlGL8hYe7U9odMt2Cco= golang.org/x/net v0.2.0/go.mod h1:KqCZLdyyvdV855qA2rE3GC2aiw5xGR5TEjj8smXukLY= -golang.org/x/net v0.10.0 h1:X2//UzNDwYmtCLn7To6G58Wr6f5ahEAQgKNzv9Y951M= -golang.org/x/net v0.10.0/go.mod h1:0qNGK6F8kojg2nk9dLZ2mShWaEBan6FAoqfSigmmuDg= +golang.org/x/net v0.17.0 h1:pVaXccu2ozPjCXewfr1S7xza/zcXTity9cCdXQYSjIM= +golang.org/x/net v0.17.0/go.mod h1:NxSsAGuq816PNPmqtQdLE42eU2Fs7NoRIZrHJAlaCOE= golang.org/x/sync v0.0.0-20190423024810-112230192c58/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= golang.org/x/sync v0.0.0-20190911185100-cd5d95a43a6e/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= golang.org/x/sync v0.0.0-20201020160332-67f06af15bc9/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= @@ -257,22 +263,22 @@ golang.org/x/sys v0.1.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/sys v0.2.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/sys v0.3.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= -golang.org/x/sys v0.9.0 h1:KS/R3tvhPqvJvwcKfnBHJwwthS11LRhmM5D59eEXa0s= -golang.org/x/sys v0.9.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= +golang.org/x/sys v0.13.0 h1:Af8nKPmuFypiUBjVoU9V20FiaFXOcuZI21p0ycVYYGE= +golang.org/x/sys v0.13.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo= golang.org/x/term v0.0.0-20210927222741-03fcf44c2211/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8= golang.org/x/term v0.0.0-20220722155259-a9ba230a4035/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8= golang.org/x/term v0.1.0/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8= golang.org/x/term v0.2.0/go.mod h1:TVmDHMZPmdnySmBfhjOoOdhjzdE1h4u1VwSiw2l1Nuc= -golang.org/x/term v0.8.0 h1:n5xxQn2i3PC0yLAbjTpNT85q/Kgzcr2gIoX9OrJUols= -golang.org/x/term v0.8.0/go.mod h1:xPskH00ivmX89bAKVGSKKtLOWNx2+17Eiy94tnKShWo= +golang.org/x/term v0.13.0 h1:bb+I9cTfFazGW51MZqBVmZy7+JEJMouUHTUSKVQLBek= +golang.org/x/term v0.13.0/go.mod h1:LTmsnFJwVN6bCy1rVCoS+qHT1HhALEFxKncY3WNNh4U= golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= golang.org/x/text v0.3.3/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ= golang.org/x/text v0.3.6/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ= golang.org/x/text v0.3.7/go.mod h1:u+2+/6zg+i71rQMx5EYifcz6MCKuco9NR6JIITiCfzQ= golang.org/x/text v0.4.0/go.mod h1:mrYo+phRRbMaCq/xk9113O4dZlRixOauAjOtrjsXDZ8= -golang.org/x/text v0.9.0 h1:2sjJmO8cDvYveuX97RDLsxlyUxLl+GHoLxBiRdHllBE= -golang.org/x/text v0.9.0/go.mod h1:e1OnstbJyHTd6l/uOt8jFFHp6TRDWZR/bV3emEE/zU8= +golang.org/x/text v0.13.0 h1:ablQoSUd0tRdKxZewP80B+BaqeKJuVhuRxj/dkrun3k= +golang.org/x/text v0.13.0/go.mod h1:TvPlkZtksWOMsz7fbANvkp4WM8x/WCo/om8BMLbz+aE= golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ= golang.org/x/tools v0.0.0-20181030221726-6c7e314b6563/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ= golang.org/x/tools v0.0.0-20191119224855-298f0cb1881e/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= diff --git a/sdk/go/auth0/attackProtection.go b/sdk/go/auth0/attackProtection.go index 918a5abb..2af15d44 100644 --- a/sdk/go/auth0/attackProtection.go +++ b/sdk/go/auth0/attackProtection.go @@ -14,77 +14,6 @@ import ( // Auth0 can detect attacks and stop malicious attempts to access your application such as blocking traffic from certain IPs and displaying CAPTCHAs. // -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := auth0.NewAttackProtection(ctx, "myProtection", &auth0.AttackProtectionArgs{ -// BreachedPasswordDetection: &auth0.AttackProtectionBreachedPasswordDetectionArgs{ -// AdminNotificationFrequencies: pulumi.StringArray{ -// pulumi.String("daily"), -// }, -// Enabled: pulumi.Bool(true), -// Method: pulumi.String("standard"), -// PreUserRegistration: &auth0.AttackProtectionBreachedPasswordDetectionPreUserRegistrationArgs{ -// Shields: pulumi.StringArray{ -// pulumi.String("block"), -// }, -// }, -// Shields: pulumi.StringArray{ -// pulumi.String("admin_notification"), -// pulumi.String("block"), -// }, -// }, -// BruteForceProtection: &auth0.AttackProtectionBruteForceProtectionArgs{ -// Allowlists: pulumi.StringArray{ -// pulumi.String("127.0.0.1"), -// }, -// Enabled: pulumi.Bool(true), -// MaxAttempts: pulumi.Int(5), -// Mode: pulumi.String("count_per_identifier_and_ip"), -// Shields: pulumi.StringArray{ -// pulumi.String("block"), -// pulumi.String("user_notification"), -// }, -// }, -// SuspiciousIpThrottling: &auth0.AttackProtectionSuspiciousIpThrottlingArgs{ -// Allowlists: pulumi.StringArray{ -// pulumi.String("192.168.1.1"), -// }, -// Enabled: pulumi.Bool(true), -// PreLogin: &auth0.AttackProtectionSuspiciousIpThrottlingPreLoginArgs{ -// MaxAttempts: pulumi.Int(100), -// Rate: pulumi.Int(864000), -// }, -// PreUserRegistration: &auth0.AttackProtectionSuspiciousIpThrottlingPreUserRegistrationArgs{ -// MaxAttempts: pulumi.Int(50), -// Rate: pulumi.Int(1200), -// }, -// Shields: pulumi.StringArray{ -// pulumi.String("admin_notification"), -// pulumi.String("block"), -// }, -// }, -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// // ## Import // // As this is not a resource identifiable by an ID within the Auth0 Management API, attack_protection can be imported using a random string. # We recommend [Version 4 UUID](https://www.uuidgenerator.net/version4) # Example diff --git a/sdk/go/auth0/branding.go b/sdk/go/auth0/branding.go index 2092ea93..f809561b 100644 --- a/sdk/go/auth0/branding.go +++ b/sdk/go/auth0/branding.go @@ -14,49 +14,6 @@ import ( // This resource allows you to manage branding within your Auth0 tenant. Auth0 can be customized with a look and feel that aligns with your organization's brand requirements and user expectations. // -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "os" -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func readFileOrPanic(path string) pulumi.StringPtrInput { -// data, err := os.ReadFile(path) -// if err != nil { -// panic(err.Error()) -// } -// return pulumi.String(string(data)) -// } -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := auth0.NewBranding(ctx, "myBrand", &auth0.BrandingArgs{ -// LogoUrl: pulumi.String("https://mycompany.org/logo.png"), -// Colors: &auth0.BrandingColorsArgs{ -// Primary: pulumi.String("#0059d6"), -// PageBackground: pulumi.String("#000000"), -// }, -// UniversalLogin: &auth0.BrandingUniversalLoginArgs{ -// Body: readFileOrPanic("universal_login_body.html"), -// }, -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// // ## Import // // As this is not a resource identifiable by an ID within the Auth0 Management API, branding can be imported using a random string. # We recommend [Version 4 UUID](https://www.uuidgenerator.net/version4) # Example diff --git a/sdk/go/auth0/brandingTheme.go b/sdk/go/auth0/brandingTheme.go index ea03f6ad..ce440b86 100644 --- a/sdk/go/auth0/brandingTheme.go +++ b/sdk/go/auth0/brandingTheme.go @@ -15,101 +15,6 @@ import ( // This resource allows you to manage branding themes for your Universal Login page within your Auth0 tenant. // -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := auth0.NewBrandingTheme(ctx, "myTheme", &auth0.BrandingThemeArgs{ -// Borders: &auth0.BrandingThemeBordersArgs{ -// ButtonBorderRadius: pulumi.Float64(1), -// ButtonBorderWeight: pulumi.Float64(1), -// ButtonsStyle: pulumi.String("pill"), -// InputBorderRadius: pulumi.Float64(3), -// InputBorderWeight: pulumi.Float64(1), -// InputsStyle: pulumi.String("pill"), -// ShowWidgetShadow: pulumi.Bool(false), -// WidgetBorderWeight: pulumi.Float64(1), -// WidgetCornerRadius: pulumi.Float64(3), -// }, -// Colors: &auth0.BrandingThemeColorsArgs{ -// BodyText: pulumi.String("#FF00CC"), -// Error: pulumi.String("#FF00CC"), -// Header: pulumi.String("#FF00CC"), -// Icons: pulumi.String("#FF00CC"), -// InputBackground: pulumi.String("#FF00CC"), -// InputBorder: pulumi.String("#FF00CC"), -// InputFilledText: pulumi.String("#FF00CC"), -// InputLabelsPlaceholders: pulumi.String("#FF00CC"), -// LinksFocusedComponents: pulumi.String("#FF00CC"), -// PrimaryButton: pulumi.String("#FF00CC"), -// PrimaryButtonLabel: pulumi.String("#FF00CC"), -// SecondaryButtonBorder: pulumi.String("#FF00CC"), -// SecondaryButtonLabel: pulumi.String("#FF00CC"), -// Success: pulumi.String("#FF00CC"), -// WidgetBackground: pulumi.String("#FF00CC"), -// WidgetBorder: pulumi.String("#FF00CC"), -// }, -// Fonts: &auth0.BrandingThemeFontsArgs{ -// BodyText: &auth0.BrandingThemeFontsBodyTextArgs{ -// Bold: pulumi.Bool(false), -// Size: pulumi.Float64(100), -// }, -// ButtonsText: &auth0.BrandingThemeFontsButtonsTextArgs{ -// Bold: pulumi.Bool(false), -// Size: pulumi.Float64(100), -// }, -// FontUrl: pulumi.String("https://google.com/font.woff"), -// InputLabels: &auth0.BrandingThemeFontsInputLabelsArgs{ -// Bold: pulumi.Bool(false), -// Size: pulumi.Float64(100), -// }, -// Links: &auth0.BrandingThemeFontsLinksArgs{ -// Bold: pulumi.Bool(false), -// Size: pulumi.Float64(100), -// }, -// LinksStyle: pulumi.String("normal"), -// ReferenceTextSize: pulumi.Float64(12), -// Subtitle: &auth0.BrandingThemeFontsSubtitleArgs{ -// Bold: pulumi.Bool(false), -// Size: pulumi.Float64(100), -// }, -// Title: &auth0.BrandingThemeFontsTitleArgs{ -// Bold: pulumi.Bool(false), -// Size: pulumi.Float64(100), -// }, -// }, -// PageBackground: &auth0.BrandingThemePageBackgroundArgs{ -// BackgroundColor: pulumi.String("#000000"), -// BackgroundImageUrl: pulumi.String("https://google.com/background.png"), -// PageLayout: pulumi.String("center"), -// }, -// Widget: &auth0.BrandingThemeWidgetArgs{ -// HeaderTextAlignment: pulumi.String("center"), -// LogoHeight: pulumi.Float64(55), -// LogoPosition: pulumi.String("center"), -// LogoUrl: pulumi.String("https://google.com/logo.png"), -// SocialButtonsLayout: pulumi.String("top"), -// }, -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// // ## Import // // This resource can be imported by specifying the Branding Theme ID. # Example diff --git a/sdk/go/auth0/client.go b/sdk/go/auth0/client.go index 98153ddf..c69428d1 100644 --- a/sdk/go/auth0/client.go +++ b/sdk/go/auth0/client.go @@ -14,105 +14,6 @@ import ( // With this resource, you can set up applications that use Auth0 for authentication and configure allowed callback URLs and secrets for these applications. // -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := auth0.NewClient(ctx, "myClient", &auth0.ClientArgs{ -// Addons: &auth0.ClientAddonsArgs{ -// Samlp: &auth0.ClientAddonsSamlpArgs{ -// Audience: pulumi.String("https://example.com/saml"), -// CreateUpnClaim: pulumi.Bool(false), -// Issuer: pulumi.String("https://example.com"), -// MapIdentities: pulumi.Bool(false), -// MapUnknownClaimsAsIs: pulumi.Bool(false), -// Mappings: pulumi.AnyMap{ -// "email": pulumi.Any("http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress"), -// "name": pulumi.Any("http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name"), -// }, -// NameIdentifierFormat: pulumi.String("urn:oasis:names:tc:SAML:2.0:nameid-format:persistent"), -// NameIdentifierProbes: pulumi.StringArray{ -// pulumi.String("http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress"), -// }, -// PassthroughClaimsWithNoMapping: pulumi.Bool(false), -// SigningCert: pulumi.String(`-----BEGIN PUBLIC KEY----- -// -// MIGf...bpP/t3 -// +JGNGIRMj1hF1rnb6QIDAQAB -// -----END PUBLIC KEY----- -// -// `), -// -// }, -// }, -// AllowedLogoutUrls: pulumi.StringArray{ -// pulumi.String("https://example.com"), -// }, -// AllowedOrigins: pulumi.StringArray{ -// pulumi.String("https://example.com"), -// }, -// AppType: pulumi.String("non_interactive"), -// Callbacks: pulumi.StringArray{ -// pulumi.String("https://example.com/callback"), -// }, -// ClientMetadata: pulumi.AnyMap{ -// "foo": pulumi.Any("zoo"), -// }, -// CustomLoginPageOn: pulumi.Bool(true), -// Description: pulumi.String("Test Applications Long Description"), -// GrantTypes: pulumi.StringArray{ -// pulumi.String("authorization_code"), -// pulumi.String("http://auth0.com/oauth/grant-type/password-realm"), -// pulumi.String("implicit"), -// pulumi.String("password"), -// pulumi.String("refresh_token"), -// }, -// IsFirstParty: pulumi.Bool(true), -// IsTokenEndpointIpHeaderTrusted: pulumi.Bool(true), -// JwtConfiguration: &auth0.ClientJwtConfigurationArgs{ -// Alg: pulumi.String("RS256"), -// LifetimeInSeconds: pulumi.Int(300), -// Scopes: pulumi.StringMap{ -// "foo": pulumi.String("bar"), -// }, -// SecretEncoded: pulumi.Bool(true), -// }, -// Mobile: &auth0.ClientMobileArgs{ -// Ios: &auth0.ClientMobileIosArgs{ -// AppBundleIdentifier: pulumi.String("com.my.bundle.id"), -// TeamId: pulumi.String("9JA89QQLNQ"), -// }, -// }, -// OidcConformant: pulumi.Bool(false), -// RefreshToken: &auth0.ClientRefreshTokenArgs{ -// ExpirationType: pulumi.String("expiring"), -// Leeway: pulumi.Int(0), -// RotationType: pulumi.String("rotating"), -// TokenLifetime: pulumi.Int(2592000), -// }, -// WebOrigins: pulumi.StringArray{ -// pulumi.String("https://example.com"), -// }, -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// // ## Import // // This resource can be imported by specifying the client ID. # Example diff --git a/sdk/go/auth0/clientCredentials.go b/sdk/go/auth0/clientCredentials.go index 5416d999..0524a705 100644 --- a/sdk/go/auth0/clientCredentials.go +++ b/sdk/go/auth0/clientCredentials.go @@ -18,82 +18,6 @@ import ( // > Refer to the client secret rotation guide // for instructions on how to rotate client secrets with zero downtime. // -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// myClient, err := auth0.NewClient(ctx, "myClient", &auth0.ClientArgs{ -// AppType: pulumi.String("non_interactive"), -// JwtConfiguration: &auth0.ClientJwtConfigurationArgs{ -// Alg: pulumi.String("RS256"), -// }, -// }) -// if err != nil { -// return err -// } -// _, err = auth0.NewClientCredentials(ctx, "testClientCredentials", &auth0.ClientCredentialsArgs{ -// ClientId: myClient.ID(), -// AuthenticationMethod: pulumi.String("client_secret_post"), -// }) -// if err != nil { -// return err -// } -// _, err = auth0.NewClientCredentials(ctx, "testIndex/clientCredentialsClientCredentials", &auth0.ClientCredentialsArgs{ -// ClientId: myClient.ID(), -// AuthenticationMethod: pulumi.String("client_secret_basic"), -// }) -// if err != nil { -// return err -// } -// _, err = auth0.NewClientCredentials(ctx, "testAuth0Index/clientCredentialsClientCredentials", &auth0.ClientCredentialsArgs{ -// ClientId: myClient.ID(), -// AuthenticationMethod: pulumi.String("none"), -// }) -// if err != nil { -// return err -// } -// _, err = auth0.NewClientCredentials(ctx, "testAuth0Index/clientCredentialsClientCredentials1", &auth0.ClientCredentialsArgs{ -// ClientId: myClient.ID(), -// AuthenticationMethod: pulumi.String("private_key_jwt"), -// PrivateKeyJwt: &auth0.ClientCredentialsPrivateKeyJwtArgs{ -// Credentials: auth0.ClientCredentialsPrivateKeyJwtCredentialArray{ -// &auth0.ClientCredentialsPrivateKeyJwtCredentialArgs{ -// Name: pulumi.String("Testing Credentials 1"), -// CredentialType: pulumi.String("public_key"), -// Algorithm: pulumi.String("RS256"), -// ParseExpiryFromCert: pulumi.Bool(true), -// Pem: pulumi.String("-----BEGIN CERTIFICATE-----\nMIIFWDCCA0ACCQDXqpBo3R...G9w0BAQsFADBuMQswCQYDVQQGEwJl\n-----END CERTIFICATE-----\n"), -// }, -// }, -// }, -// }) -// if err != nil { -// return err -// } -// _, err = auth0.NewClientCredentials(ctx, "testAuth0Index/clientCredentialsClientCredentials2", &auth0.ClientCredentialsArgs{ -// ClientId: myClient.ID(), -// AuthenticationMethod: pulumi.String("client_secret_basic"), -// ClientSecret: pulumi.String("LUFqPx+sRLjbL7peYRPFmFu-bbvE7u7og4YUNe_C345=683341"), -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// // ## Import // // This resource can be imported by specifying the client ID. # Example diff --git a/sdk/go/auth0/connection.go b/sdk/go/auth0/connection.go index 0d34ca85..c58c0b0a 100644 --- a/sdk/go/auth0/connection.go +++ b/sdk/go/auth0/connection.go @@ -19,434 +19,6 @@ import ( // creation of multiple connections per strategy, the additional connections may not be visible in the Auth0 dashboard. // // ## Example Usage -// ### Google OAuth2 Connection -// -// > Your Auth0 account may be pre-configured with a `google-oauth2` connection. -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := auth0.NewConnection(ctx, "googleOauth2", &auth0.ConnectionArgs{ -// Options: &auth0.ConnectionOptionsArgs{ -// AllowedAudiences: pulumi.StringArray{ -// pulumi.String("example.com"), -// pulumi.String("api.example.com"), -// }, -// ClientId: pulumi.String(""), -// ClientSecret: pulumi.String(""), -// NonPersistentAttrs: pulumi.StringArray{ -// pulumi.String("ethnicity"), -// pulumi.String("gender"), -// }, -// Scopes: pulumi.StringArray{ -// pulumi.String("email"), -// pulumi.String("profile"), -// pulumi.String("gmail"), -// pulumi.String("youtube"), -// }, -// SetUserRootAttributes: pulumi.String("on_each_login"), -// }, -// Strategy: pulumi.String("google-oauth2"), -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// ### Facebook Connection -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := auth0.NewConnection(ctx, "facebook", &auth0.ConnectionArgs{ -// Options: &auth0.ConnectionOptionsArgs{ -// ClientId: pulumi.String(""), -// ClientSecret: pulumi.String(""), -// NonPersistentAttrs: pulumi.StringArray{ -// pulumi.String("ethnicity"), -// pulumi.String("gender"), -// }, -// Scopes: pulumi.StringArray{ -// pulumi.String("public_profile"), -// pulumi.String("email"), -// pulumi.String("groups_access_member_info"), -// pulumi.String("user_birthday"), -// }, -// SetUserRootAttributes: pulumi.String("on_each_login"), -// }, -// Strategy: pulumi.String("facebook"), -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// ### Apple Connection -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := auth0.NewConnection(ctx, "apple", &auth0.ConnectionArgs{ -// Options: &auth0.ConnectionOptionsArgs{ -// ClientId: pulumi.String(""), -// ClientSecret: pulumi.String("-----BEGIN PRIVATE KEY-----\nMIHBAgEAMA0GCSqGSIb3DQEBAQUABIGsMIGpAgEAA\n-----END PRIVATE KEY-----\n"), -// KeyId: pulumi.String(""), -// NonPersistentAttrs: pulumi.StringArray{ -// pulumi.String("ethnicity"), -// pulumi.String("gender"), -// }, -// Scopes: pulumi.StringArray{ -// pulumi.String("email"), -// pulumi.String("name"), -// }, -// SetUserRootAttributes: pulumi.String("on_first_login"), -// TeamId: pulumi.String(""), -// }, -// Strategy: pulumi.String("apple"), -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// ### LinkedIn Connection -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := auth0.NewConnection(ctx, "linkedin", &auth0.ConnectionArgs{ -// Options: &auth0.ConnectionOptionsArgs{ -// ClientId: pulumi.String(""), -// ClientSecret: pulumi.String(""), -// NonPersistentAttrs: pulumi.StringArray{ -// pulumi.String("ethnicity"), -// pulumi.String("gender"), -// }, -// Scopes: pulumi.StringArray{ -// pulumi.String("basic_profile"), -// pulumi.String("profile"), -// pulumi.String("email"), -// }, -// SetUserRootAttributes: pulumi.String("on_each_login"), -// StrategyVersion: pulumi.Int(2), -// }, -// Strategy: pulumi.String("linkedin"), -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// ### GitHub Connection -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := auth0.NewConnection(ctx, "github", &auth0.ConnectionArgs{ -// Options: &auth0.ConnectionOptionsArgs{ -// ClientId: pulumi.String(""), -// ClientSecret: pulumi.String(""), -// NonPersistentAttrs: pulumi.StringArray{ -// pulumi.String("ethnicity"), -// pulumi.String("gender"), -// }, -// Scopes: pulumi.StringArray{ -// pulumi.String("email"), -// pulumi.String("profile"), -// pulumi.String("public_repo"), -// pulumi.String("repo"), -// }, -// SetUserRootAttributes: pulumi.String("on_each_login"), -// }, -// Strategy: pulumi.String("github"), -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// ### SalesForce Connection -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := auth0.NewConnection(ctx, "salesforce", &auth0.ConnectionArgs{ -// Options: &auth0.ConnectionOptionsArgs{ -// ClientId: pulumi.String(""), -// ClientSecret: pulumi.String(""), -// CommunityBaseUrl: pulumi.String("https://salesforce.example.com"), -// NonPersistentAttrs: pulumi.StringArray{ -// pulumi.String("ethnicity"), -// pulumi.String("gender"), -// }, -// Scopes: pulumi.StringArray{ -// pulumi.String("openid"), -// pulumi.String("email"), -// }, -// SetUserRootAttributes: pulumi.String("on_first_login"), -// }, -// Strategy: pulumi.String("salesforce"), -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// ### OAuth2 Connection -// -// Also applies to following connection strategies: `dropbox`, `bitbucket`, `paypal`, `twitter`, `amazon`, `yahoo`, `box`, `wordpress`, `shopify`, `custom` -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := auth0.NewConnection(ctx, "oauth2", &auth0.ConnectionArgs{ -// Options: &auth0.ConnectionOptionsArgs{ -// AuthorizationEndpoint: pulumi.String("https://auth.example.com/oauth2/authorize"), -// ClientId: pulumi.String(""), -// ClientSecret: pulumi.String(""), -// IconUrl: pulumi.String("https://auth.example.com/assets/logo.png"), -// NonPersistentAttrs: pulumi.StringArray{ -// pulumi.String("ethnicity"), -// pulumi.String("gender"), -// }, -// PkceEnabled: pulumi.Bool(true), -// Scopes: pulumi.StringArray{ -// pulumi.String("basic_profile"), -// pulumi.String("profile"), -// pulumi.String("email"), -// }, -// Scripts: pulumi.StringMap{ -// "fetchUserProfile": pulumi.String(" function fetchUserProfile(accessToken, context, callback) {\n return callback(new Error(\"Whoops!\"));\n }\n \n"), -// }, -// SetUserRootAttributes: pulumi.String("on_each_login"), -// TokenEndpoint: pulumi.String("https://auth.example.com/oauth2/token"), -// }, -// Strategy: pulumi.String("oauth2"), -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// ### SMS Connection -// -// > To be able to see this in the management dashboard as well, the name of the connection must be set to "sms". -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := auth0.NewConnection(ctx, "sms", &auth0.ConnectionArgs{ -// IsDomainConnection: pulumi.Bool(false), -// Options: &auth0.ConnectionOptionsArgs{ -// BruteForceProtection: pulumi.Bool(true), -// DisableSignup: pulumi.Bool(false), -// ForwardRequestInfo: pulumi.Bool(true), -// From: pulumi.String("+15555555555"), -// GatewayAuthentication: &auth0.ConnectionOptionsGatewayAuthenticationArgs{ -// Audience: pulumi.String("https://somewhere.com/sms-gateway"), -// Method: pulumi.String("bearer"), -// Secret: pulumi.String("4e2680bb74ec2ae24736476dd37ed6c2"), -// SecretBase64Encoded: pulumi.Bool(false), -// Subject: pulumi.String("test.us.auth0.com:sms"), -// }, -// GatewayUrl: pulumi.String("https://somewhere.com/sms-gateway"), -// Name: pulumi.String("sms"), -// Provider: pulumi.String("sms_gateway"), -// Syntax: pulumi.String("md_with_macros"), -// Template: pulumi.String("@@password@@"), -// Totp: &auth0.ConnectionOptionsTotpArgs{ -// Length: pulumi.Int(6), -// TimeStep: pulumi.Int(300), -// }, -// }, -// Strategy: pulumi.String("sms"), -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// ### Email Connection -// -// > To be able to see this in the management dashboard as well, the name of the connection must be set to "email". -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := auth0.NewConnection(ctx, "passwordlessEmail", &auth0.ConnectionArgs{ -// Options: &auth0.ConnectionOptionsArgs{ -// AuthParams: pulumi.StringMap{ -// "responseType": pulumi.String("code"), -// "scope": pulumi.String("openid email profile offline_access"), -// }, -// BruteForceProtection: pulumi.Bool(true), -// DisableSignup: pulumi.Bool(false), -// From: pulumi.String("{{ application.name }} "), -// Name: pulumi.String("email"), -// NonPersistentAttrs: pulumi.StringArray{}, -// SetUserRootAttributes: pulumi.String("on_each_login"), -// Subject: pulumi.String("Welcome to {{ application.name }}"), -// Syntax: pulumi.String("liquid"), -// Template: pulumi.String("This is the body of the email"), -// Totp: &auth0.ConnectionOptionsTotpArgs{ -// Length: pulumi.Int(6), -// TimeStep: pulumi.Int(300), -// }, -// }, -// Strategy: pulumi.String("email"), -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// ### WindowsLive Connection -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := auth0.NewConnection(ctx, "windowslive", &auth0.ConnectionArgs{ -// Options: &auth0.ConnectionOptionsArgs{ -// ClientId: pulumi.String(""), -// ClientSecret: pulumi.String(""), -// NonPersistentAttrs: pulumi.StringArray{ -// pulumi.String("ethnicity"), -// pulumi.String("gender"), -// }, -// Scopes: pulumi.StringArray{ -// pulumi.String("signin"), -// pulumi.String("graph_user"), -// }, -// SetUserRootAttributes: pulumi.String("on_first_login"), -// StrategyVersion: pulumi.Int(2), -// }, -// Strategy: pulumi.String("windowslive"), -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` // // ## Import // diff --git a/sdk/go/auth0/connectionClient.go b/sdk/go/auth0/connectionClient.go index c8f36990..5aef94fa 100644 --- a/sdk/go/auth0/connectionClient.go +++ b/sdk/go/auth0/connectionClient.go @@ -20,43 +20,6 @@ import ( // resource in conjunction with the `ConnectionClients` resource when managing enabled clients for the // same connection id. // -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// myConn, err := auth0.NewConnection(ctx, "myConn", &auth0.ConnectionArgs{ -// Strategy: pulumi.String("auth0"), -// }) -// if err != nil { -// return err -// } -// myClient, err := auth0.NewClient(ctx, "myClient", nil) -// if err != nil { -// return err -// } -// _, err = auth0.NewConnectionClient(ctx, "myConnClientAssoc", &auth0.ConnectionClientArgs{ -// ConnectionId: myConn.ID(), -// ClientId: myClient.ID(), -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// // ## Import // // This resource can be imported by specifying the connection ID and client ID separated by "::" (note the double colon) :: # Example diff --git a/sdk/go/auth0/connectionClients.go b/sdk/go/auth0/connectionClients.go index 5b5282b7..df7215ec 100644 --- a/sdk/go/auth0/connectionClients.go +++ b/sdk/go/auth0/connectionClients.go @@ -20,50 +20,6 @@ import ( // resource in conjunction with the `ConnectionClient` resource when managing enabled clients for the same // connection id. // -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// myConn, err := auth0.NewConnection(ctx, "myConn", &auth0.ConnectionArgs{ -// Strategy: pulumi.String("auth0"), -// }) -// if err != nil { -// return err -// } -// myFirstClient, err := auth0.NewClient(ctx, "myFirstClient", nil) -// if err != nil { -// return err -// } -// mySecondClient, err := auth0.NewClient(ctx, "mySecondClient", nil) -// if err != nil { -// return err -// } -// _, err = auth0.NewConnectionClients(ctx, "myConnClientsAssoc", &auth0.ConnectionClientsArgs{ -// ConnectionId: myConn.ID(), -// EnabledClients: pulumi.StringArray{ -// myFirstClient.ID(), -// mySecondClient.ID(), -// }, -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// // ## Import // // This resource can be imported by specifying the Connection ID. # Example diff --git a/sdk/go/auth0/customDomain.go b/sdk/go/auth0/customDomain.go index 73996725..b4071ead 100644 --- a/sdk/go/auth0/customDomain.go +++ b/sdk/go/auth0/customDomain.go @@ -15,33 +15,6 @@ import ( // With Auth0, you can use a custom domain to maintain a consistent user experience. This resource allows you to create and manage a custom domain within your Auth0 tenant. // -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := auth0.NewCustomDomain(ctx, "myCustomDomain", &auth0.CustomDomainArgs{ -// Domain: pulumi.String("auth.example.com"), -// Type: pulumi.String("auth0_managed_certs"), -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// // ## Import // // Custom domains can be imported using their ID. # You can find existing custom domain IDs using the Auth0 Management API. https://auth0.com/docs/api/management/v2#!/Custom_Domains/get_custom_domains # Example diff --git a/sdk/go/auth0/emailProvider.go b/sdk/go/auth0/emailProvider.go index 34273e00..13c8da84 100644 --- a/sdk/go/auth0/emailProvider.go +++ b/sdk/go/auth0/emailProvider.go @@ -15,60 +15,6 @@ import ( // With Auth0, you can have standard welcome, password reset, and account verification email-based workflows built right into Auth0. This resource allows you to configure email providers, so you can route all emails that are part of Auth0's authentication workflows through the supported high-volume email service of your choice. // -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := auth0.NewEmailProvider(ctx, "amazonSesEmailProvider", &auth0.EmailProviderArgs{ -// Credentials: &auth0.EmailProviderCredentialsArgs{ -// AccessKeyId: pulumi.String("AKIAXXXXXXXXXXXXXXXX"), -// Region: pulumi.String("us-east-1"), -// SecretAccessKey: pulumi.String("7e8c2148xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx"), -// }, -// DefaultFromAddress: pulumi.String("accounts@example.com"), -// Enabled: pulumi.Bool(true), -// }) -// if err != nil { -// return err -// } -// _, err = auth0.NewEmailProvider(ctx, "sendgridEmailProvider", &auth0.EmailProviderArgs{ -// Credentials: &auth0.EmailProviderCredentialsArgs{ -// ApiKey: pulumi.String("secretAPIKey"), -// }, -// DefaultFromAddress: pulumi.String("accounts@example.com"), -// Enabled: pulumi.Bool(true), -// }) -// if err != nil { -// return err -// } -// _, err = auth0.NewEmailProvider(ctx, "smtpEmailProvider", &auth0.EmailProviderArgs{ -// Credentials: &auth0.EmailProviderCredentialsArgs{ -// Ms365ClientId: pulumi.String("ms365_client_id"), -// Ms365ClientSecret: pulumi.String("ms365_client_secret"), -// Ms365TenantId: pulumi.String("ms365_tenant_id"), -// }, -// DefaultFromAddress: pulumi.String("accounts@example.com"), -// Enabled: pulumi.Bool(true), -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// // ## Import // // As this is not a resource identifiable by an ID within the Auth0 Management API, email can be imported using a random string. # We recommend [Version 4 UUID](https://www.uuidgenerator.net/version4) # Example diff --git a/sdk/go/auth0/getAttackProtection.go b/sdk/go/auth0/getAttackProtection.go index 03c9f07e..3f382f9e 100644 --- a/sdk/go/auth0/getAttackProtection.go +++ b/sdk/go/auth0/getAttackProtection.go @@ -4,35 +4,15 @@ package auth0 import ( + "context" + "reflect" + "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0/internal" "github.com/pulumi/pulumi/sdk/v3/go/pulumi" + "github.com/pulumi/pulumi/sdk/v3/go/pulumix" ) // Use this data source to access information about the tenant's attack protection settings. -// -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := auth0.LookupAttackProtection(ctx, nil, nil) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` func LookupAttackProtection(ctx *pulumi.Context, opts ...pulumi.InvokeOption) (*LookupAttackProtectionResult, error) { opts = internal.PkgInvokeDefaultOpts(opts) var rv LookupAttackProtectionResult @@ -54,3 +34,65 @@ type LookupAttackProtectionResult struct { // Suspicious IP throttling blocks traffic from any IP address that rapidly attempts too many logins or signups. SuspiciousIpThrottlings []GetAttackProtectionSuspiciousIpThrottling `pulumi:"suspiciousIpThrottlings"` } + +func LookupAttackProtectionOutput(ctx *pulumi.Context, opts ...pulumi.InvokeOption) LookupAttackProtectionResultOutput { + return pulumi.ToOutput(0).ApplyT(func(int) (LookupAttackProtectionResult, error) { + r, err := LookupAttackProtection(ctx, opts...) + var s LookupAttackProtectionResult + if r != nil { + s = *r + } + return s, err + }).(LookupAttackProtectionResultOutput) +} + +// A collection of values returned by getAttackProtection. +type LookupAttackProtectionResultOutput struct{ *pulumi.OutputState } + +func (LookupAttackProtectionResultOutput) ElementType() reflect.Type { + return reflect.TypeOf((*LookupAttackProtectionResult)(nil)).Elem() +} + +func (o LookupAttackProtectionResultOutput) ToLookupAttackProtectionResultOutput() LookupAttackProtectionResultOutput { + return o +} + +func (o LookupAttackProtectionResultOutput) ToLookupAttackProtectionResultOutputWithContext(ctx context.Context) LookupAttackProtectionResultOutput { + return o +} + +func (o LookupAttackProtectionResultOutput) ToOutput(ctx context.Context) pulumix.Output[LookupAttackProtectionResult] { + return pulumix.Output[LookupAttackProtectionResult]{ + OutputState: o.OutputState, + } +} + +// Breached password detection protects your applications from bad actors logging in with stolen credentials. +func (o LookupAttackProtectionResultOutput) BreachedPasswordDetections() GetAttackProtectionBreachedPasswordDetectionArrayOutput { + return o.ApplyT(func(v LookupAttackProtectionResult) []GetAttackProtectionBreachedPasswordDetection { + return v.BreachedPasswordDetections + }).(GetAttackProtectionBreachedPasswordDetectionArrayOutput) +} + +// Brute-force protection safeguards against a single IP address attacking a single user account. +func (o LookupAttackProtectionResultOutput) BruteForceProtections() GetAttackProtectionBruteForceProtectionArrayOutput { + return o.ApplyT(func(v LookupAttackProtectionResult) []GetAttackProtectionBruteForceProtection { + return v.BruteForceProtections + }).(GetAttackProtectionBruteForceProtectionArrayOutput) +} + +// The provider-assigned unique ID for this managed resource. +func (o LookupAttackProtectionResultOutput) Id() pulumi.StringOutput { + return o.ApplyT(func(v LookupAttackProtectionResult) string { return v.Id }).(pulumi.StringOutput) +} + +// Suspicious IP throttling blocks traffic from any IP address that rapidly attempts too many logins or signups. +func (o LookupAttackProtectionResultOutput) SuspiciousIpThrottlings() GetAttackProtectionSuspiciousIpThrottlingArrayOutput { + return o.ApplyT(func(v LookupAttackProtectionResult) []GetAttackProtectionSuspiciousIpThrottling { + return v.SuspiciousIpThrottlings + }).(GetAttackProtectionSuspiciousIpThrottlingArrayOutput) +} + +func init() { + pulumi.RegisterOutputType(LookupAttackProtectionResultOutput{}) +} diff --git a/sdk/go/auth0/getBranding.go b/sdk/go/auth0/getBranding.go index 5a8033ff..2d7746da 100644 --- a/sdk/go/auth0/getBranding.go +++ b/sdk/go/auth0/getBranding.go @@ -4,35 +4,15 @@ package auth0 import ( + "context" + "reflect" + "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0/internal" "github.com/pulumi/pulumi/sdk/v3/go/pulumi" + "github.com/pulumi/pulumi/sdk/v3/go/pulumix" ) // Use this data source to access information about the tenant's branding settings. -// -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := auth0.LookupBranding(ctx, nil, nil) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` func LookupBranding(ctx *pulumi.Context, opts ...pulumi.InvokeOption) (*LookupBrandingResult, error) { opts = internal.PkgInvokeDefaultOpts(opts) var rv LookupBrandingResult @@ -58,3 +38,69 @@ type LookupBrandingResult struct { // Configuration settings for Universal Login. UniversalLogins []GetBrandingUniversalLogin `pulumi:"universalLogins"` } + +func LookupBrandingOutput(ctx *pulumi.Context, opts ...pulumi.InvokeOption) LookupBrandingResultOutput { + return pulumi.ToOutput(0).ApplyT(func(int) (LookupBrandingResult, error) { + r, err := LookupBranding(ctx, opts...) + var s LookupBrandingResult + if r != nil { + s = *r + } + return s, err + }).(LookupBrandingResultOutput) +} + +// A collection of values returned by getBranding. +type LookupBrandingResultOutput struct{ *pulumi.OutputState } + +func (LookupBrandingResultOutput) ElementType() reflect.Type { + return reflect.TypeOf((*LookupBrandingResult)(nil)).Elem() +} + +func (o LookupBrandingResultOutput) ToLookupBrandingResultOutput() LookupBrandingResultOutput { + return o +} + +func (o LookupBrandingResultOutput) ToLookupBrandingResultOutputWithContext(ctx context.Context) LookupBrandingResultOutput { + return o +} + +func (o LookupBrandingResultOutput) ToOutput(ctx context.Context) pulumix.Output[LookupBrandingResult] { + return pulumix.Output[LookupBrandingResult]{ + OutputState: o.OutputState, + } +} + +// Configuration settings for colors for branding. +func (o LookupBrandingResultOutput) Colors() GetBrandingColorArrayOutput { + return o.ApplyT(func(v LookupBrandingResult) []GetBrandingColor { return v.Colors }).(GetBrandingColorArrayOutput) +} + +// URL for the favicon. +func (o LookupBrandingResultOutput) FaviconUrl() pulumi.StringOutput { + return o.ApplyT(func(v LookupBrandingResult) string { return v.FaviconUrl }).(pulumi.StringOutput) +} + +// Configuration settings to customize the font. +func (o LookupBrandingResultOutput) Fonts() GetBrandingFontArrayOutput { + return o.ApplyT(func(v LookupBrandingResult) []GetBrandingFont { return v.Fonts }).(GetBrandingFontArrayOutput) +} + +// The provider-assigned unique ID for this managed resource. +func (o LookupBrandingResultOutput) Id() pulumi.StringOutput { + return o.ApplyT(func(v LookupBrandingResult) string { return v.Id }).(pulumi.StringOutput) +} + +// URL of logo for branding. +func (o LookupBrandingResultOutput) LogoUrl() pulumi.StringOutput { + return o.ApplyT(func(v LookupBrandingResult) string { return v.LogoUrl }).(pulumi.StringOutput) +} + +// Configuration settings for Universal Login. +func (o LookupBrandingResultOutput) UniversalLogins() GetBrandingUniversalLoginArrayOutput { + return o.ApplyT(func(v LookupBrandingResult) []GetBrandingUniversalLogin { return v.UniversalLogins }).(GetBrandingUniversalLoginArrayOutput) +} + +func init() { + pulumi.RegisterOutputType(LookupBrandingResultOutput{}) +} diff --git a/sdk/go/auth0/getBrandingTheme.go b/sdk/go/auth0/getBrandingTheme.go index 171cbc1f..4e686a4d 100644 --- a/sdk/go/auth0/getBrandingTheme.go +++ b/sdk/go/auth0/getBrandingTheme.go @@ -4,35 +4,15 @@ package auth0 import ( + "context" + "reflect" + "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0/internal" "github.com/pulumi/pulumi/sdk/v3/go/pulumi" + "github.com/pulumi/pulumi/sdk/v3/go/pulumix" ) // Use this data source to access information about the tenant's branding theme settings. -// -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := auth0.LookupBrandingTheme(ctx, nil, nil) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` func LookupBrandingTheme(ctx *pulumi.Context, opts ...pulumi.InvokeOption) (*LookupBrandingThemeResult, error) { opts = internal.PkgInvokeDefaultOpts(opts) var rv LookupBrandingThemeResult @@ -55,3 +35,69 @@ type LookupBrandingThemeResult struct { PageBackgrounds []GetBrandingThemePageBackground `pulumi:"pageBackgrounds"` Widgets []GetBrandingThemeWidget `pulumi:"widgets"` } + +func LookupBrandingThemeOutput(ctx *pulumi.Context, opts ...pulumi.InvokeOption) LookupBrandingThemeResultOutput { + return pulumi.ToOutput(0).ApplyT(func(int) (LookupBrandingThemeResult, error) { + r, err := LookupBrandingTheme(ctx, opts...) + var s LookupBrandingThemeResult + if r != nil { + s = *r + } + return s, err + }).(LookupBrandingThemeResultOutput) +} + +// A collection of values returned by getBrandingTheme. +type LookupBrandingThemeResultOutput struct{ *pulumi.OutputState } + +func (LookupBrandingThemeResultOutput) ElementType() reflect.Type { + return reflect.TypeOf((*LookupBrandingThemeResult)(nil)).Elem() +} + +func (o LookupBrandingThemeResultOutput) ToLookupBrandingThemeResultOutput() LookupBrandingThemeResultOutput { + return o +} + +func (o LookupBrandingThemeResultOutput) ToLookupBrandingThemeResultOutputWithContext(ctx context.Context) LookupBrandingThemeResultOutput { + return o +} + +func (o LookupBrandingThemeResultOutput) ToOutput(ctx context.Context) pulumix.Output[LookupBrandingThemeResult] { + return pulumix.Output[LookupBrandingThemeResult]{ + OutputState: o.OutputState, + } +} + +func (o LookupBrandingThemeResultOutput) Borders() GetBrandingThemeBorderArrayOutput { + return o.ApplyT(func(v LookupBrandingThemeResult) []GetBrandingThemeBorder { return v.Borders }).(GetBrandingThemeBorderArrayOutput) +} + +func (o LookupBrandingThemeResultOutput) Colors() GetBrandingThemeColorArrayOutput { + return o.ApplyT(func(v LookupBrandingThemeResult) []GetBrandingThemeColor { return v.Colors }).(GetBrandingThemeColorArrayOutput) +} + +// The display name for the branding theme. +func (o LookupBrandingThemeResultOutput) DisplayName() pulumi.StringOutput { + return o.ApplyT(func(v LookupBrandingThemeResult) string { return v.DisplayName }).(pulumi.StringOutput) +} + +func (o LookupBrandingThemeResultOutput) Fonts() GetBrandingThemeFontArrayOutput { + return o.ApplyT(func(v LookupBrandingThemeResult) []GetBrandingThemeFont { return v.Fonts }).(GetBrandingThemeFontArrayOutput) +} + +// The provider-assigned unique ID for this managed resource. +func (o LookupBrandingThemeResultOutput) Id() pulumi.StringOutput { + return o.ApplyT(func(v LookupBrandingThemeResult) string { return v.Id }).(pulumi.StringOutput) +} + +func (o LookupBrandingThemeResultOutput) PageBackgrounds() GetBrandingThemePageBackgroundArrayOutput { + return o.ApplyT(func(v LookupBrandingThemeResult) []GetBrandingThemePageBackground { return v.PageBackgrounds }).(GetBrandingThemePageBackgroundArrayOutput) +} + +func (o LookupBrandingThemeResultOutput) Widgets() GetBrandingThemeWidgetArrayOutput { + return o.ApplyT(func(v LookupBrandingThemeResult) []GetBrandingThemeWidget { return v.Widgets }).(GetBrandingThemeWidgetArrayOutput) +} + +func init() { + pulumi.RegisterOutputType(LookupBrandingThemeResultOutput{}) +} diff --git a/sdk/go/auth0/getClient.go b/sdk/go/auth0/getClient.go index 758923c4..ac3d4a55 100644 --- a/sdk/go/auth0/getClient.go +++ b/sdk/go/auth0/getClient.go @@ -13,38 +13,6 @@ import ( ) // Data source to retrieve a specific Auth0 application client by `clientId` or `name`. -// -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := auth0.LookupClient(ctx, &auth0.LookupClientArgs{ -// Name: pulumi.StringRef("Name of my Application"), -// }, nil) -// if err != nil { -// return err -// } -// _, err = auth0.LookupClient(ctx, &auth0.LookupClientArgs{ -// ClientId: pulumi.StringRef("abcdefghkijklmnopqrstuvwxyz0123456789"), -// }, nil) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` func LookupClient(ctx *pulumi.Context, args *LookupClientArgs, opts ...pulumi.InvokeOption) (*LookupClientResult, error) { opts = internal.PkgInvokeDefaultOpts(opts) var rv LookupClientResult diff --git a/sdk/go/auth0/getConnection.go b/sdk/go/auth0/getConnection.go index 04ff0218..6041d15e 100644 --- a/sdk/go/auth0/getConnection.go +++ b/sdk/go/auth0/getConnection.go @@ -13,38 +13,6 @@ import ( ) // Data source to retrieve a specific Auth0 connection by `connectionId` or `name`. -// -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := auth0.LookupConnection(ctx, &auth0.LookupConnectionArgs{ -// Name: pulumi.StringRef("Acceptance-Test-Connection-{{.testName}}"), -// }, nil) -// if err != nil { -// return err -// } -// _, err = auth0.LookupConnection(ctx, &auth0.LookupConnectionArgs{ -// ConnectionId: pulumi.StringRef("con_abcdefghkijklmnopqrstuvwxyz0123456789"), -// }, nil) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` func LookupConnection(ctx *pulumi.Context, args *LookupConnectionArgs, opts ...pulumi.InvokeOption) (*LookupConnectionResult, error) { opts = internal.PkgInvokeDefaultOpts(opts) var rv LookupConnectionResult diff --git a/sdk/go/auth0/getCustomDomain.go b/sdk/go/auth0/getCustomDomain.go index 2cec9870..120a0d67 100644 --- a/sdk/go/auth0/getCustomDomain.go +++ b/sdk/go/auth0/getCustomDomain.go @@ -4,8 +4,12 @@ package auth0 import ( + "context" + "reflect" + "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0/internal" "github.com/pulumi/pulumi/sdk/v3/go/pulumi" + "github.com/pulumi/pulumi/sdk/v3/go/pulumix" ) // Data source to retrieve the custom domain configuration. @@ -40,3 +44,84 @@ type LookupCustomDomainResult struct { // Configuration settings for verification. Verifications []GetCustomDomainVerificationType `pulumi:"verifications"` } + +func LookupCustomDomainOutput(ctx *pulumi.Context, opts ...pulumi.InvokeOption) LookupCustomDomainResultOutput { + return pulumi.ToOutput(0).ApplyT(func(int) (LookupCustomDomainResult, error) { + r, err := LookupCustomDomain(ctx, opts...) + var s LookupCustomDomainResult + if r != nil { + s = *r + } + return s, err + }).(LookupCustomDomainResultOutput) +} + +// A collection of values returned by getCustomDomain. +type LookupCustomDomainResultOutput struct{ *pulumi.OutputState } + +func (LookupCustomDomainResultOutput) ElementType() reflect.Type { + return reflect.TypeOf((*LookupCustomDomainResult)(nil)).Elem() +} + +func (o LookupCustomDomainResultOutput) ToLookupCustomDomainResultOutput() LookupCustomDomainResultOutput { + return o +} + +func (o LookupCustomDomainResultOutput) ToLookupCustomDomainResultOutputWithContext(ctx context.Context) LookupCustomDomainResultOutput { + return o +} + +func (o LookupCustomDomainResultOutput) ToOutput(ctx context.Context) pulumix.Output[LookupCustomDomainResult] { + return pulumix.Output[LookupCustomDomainResult]{ + OutputState: o.OutputState, + } +} + +// The HTTP header to fetch the client's IP address. Cannot be set on auth0Managed domains. +func (o LookupCustomDomainResultOutput) CustomClientIpHeader() pulumi.StringOutput { + return o.ApplyT(func(v LookupCustomDomainResult) string { return v.CustomClientIpHeader }).(pulumi.StringOutput) +} + +// Name of the custom domain. +func (o LookupCustomDomainResultOutput) Domain() pulumi.StringOutput { + return o.ApplyT(func(v LookupCustomDomainResult) string { return v.Domain }).(pulumi.StringOutput) +} + +// The provider-assigned unique ID for this managed resource. +func (o LookupCustomDomainResultOutput) Id() pulumi.StringOutput { + return o.ApplyT(func(v LookupCustomDomainResult) string { return v.Id }).(pulumi.StringOutput) +} + +// Once the configuration status is `ready`, the DNS name of the Auth0 origin server that handles traffic for the custom domain. +func (o LookupCustomDomainResultOutput) OriginDomainName() pulumi.StringOutput { + return o.ApplyT(func(v LookupCustomDomainResult) string { return v.OriginDomainName }).(pulumi.StringOutput) +} + +// Indicates whether this is a primary domain. +func (o LookupCustomDomainResultOutput) Primary() pulumi.BoolOutput { + return o.ApplyT(func(v LookupCustomDomainResult) bool { return v.Primary }).(pulumi.BoolOutput) +} + +// Configuration status for the custom domain. Options include `disabled`, `pending`, `pendingVerification`, and `ready`. +func (o LookupCustomDomainResultOutput) Status() pulumi.StringOutput { + return o.ApplyT(func(v LookupCustomDomainResult) string { return v.Status }).(pulumi.StringOutput) +} + +// TLS policy for the custom domain. Available options are: `compatible` or `recommended`. Compatible includes TLS 1.0, 1.1, 1.2, and recommended only includes TLS 1.2. Cannot be set on selfManaged domains. +func (o LookupCustomDomainResultOutput) TlsPolicy() pulumi.StringOutput { + return o.ApplyT(func(v LookupCustomDomainResult) string { return v.TlsPolicy }).(pulumi.StringOutput) +} + +// Provisioning type for the custom domain. Options include `auth0ManagedCerts` and `selfManagedCerts`. +func (o LookupCustomDomainResultOutput) Type() pulumi.StringOutput { + return o.ApplyT(func(v LookupCustomDomainResult) string { return v.Type }).(pulumi.StringOutput) +} + +// Configuration settings for verification. +func (o LookupCustomDomainResultOutput) Verifications() GetCustomDomainVerificationTypeArrayOutput { + return o.ApplyT(func(v LookupCustomDomainResult) []GetCustomDomainVerificationType { return v.Verifications }).(GetCustomDomainVerificationTypeArrayOutput) +} + +func init() { + pulumi.RegisterOutputType(LookupCustomDomainResultOutput{}) +} diff --git a/sdk/go/auth0/getOrganization.go b/sdk/go/auth0/getOrganization.go index 260413c4..5b00141b 100644 --- a/sdk/go/auth0/getOrganization.go +++ b/sdk/go/auth0/getOrganization.go @@ -13,38 +13,6 @@ import ( ) // Data source to retrieve a specific Auth0 organization by `organizationId` or `name`. -// -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := auth0.LookupOrganization(ctx, &auth0.LookupOrganizationArgs{ -// Name: pulumi.StringRef("my-org"), -// }, nil) -// if err != nil { -// return err -// } -// _, err = auth0.LookupOrganization(ctx, &auth0.LookupOrganizationArgs{ -// OrganizationId: pulumi.StringRef("org_abcdefghkijklmnopqrstuvwxyz0123456789"), -// }, nil) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` func LookupOrganization(ctx *pulumi.Context, args *LookupOrganizationArgs, opts ...pulumi.InvokeOption) (*LookupOrganizationResult, error) { opts = internal.PkgInvokeDefaultOpts(opts) var rv LookupOrganizationResult diff --git a/sdk/go/auth0/getPages.go b/sdk/go/auth0/getPages.go index 251b70c1..6dd98ded 100644 --- a/sdk/go/auth0/getPages.go +++ b/sdk/go/auth0/getPages.go @@ -4,35 +4,15 @@ package auth0 import ( + "context" + "reflect" + "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0/internal" "github.com/pulumi/pulumi/sdk/v3/go/pulumi" + "github.com/pulumi/pulumi/sdk/v3/go/pulumix" ) // Use this data source to access the HTML for the login, reset password, multi-factor authentication and error pages. -// -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := auth0.LookupPages(ctx, nil, nil) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` func LookupPages(ctx *pulumi.Context, opts ...pulumi.InvokeOption) (*LookupPagesResult, error) { opts = internal.PkgInvokeDefaultOpts(opts) var rv LookupPagesResult @@ -56,3 +36,64 @@ type LookupPagesResult struct { // Configuration settings for customizing the Login page. Logins []GetPagesLogin `pulumi:"logins"` } + +func LookupPagesOutput(ctx *pulumi.Context, opts ...pulumi.InvokeOption) LookupPagesResultOutput { + return pulumi.ToOutput(0).ApplyT(func(int) (LookupPagesResult, error) { + r, err := LookupPages(ctx, opts...) + var s LookupPagesResult + if r != nil { + s = *r + } + return s, err + }).(LookupPagesResultOutput) +} + +// A collection of values returned by getPages. +type LookupPagesResultOutput struct{ *pulumi.OutputState } + +func (LookupPagesResultOutput) ElementType() reflect.Type { + return reflect.TypeOf((*LookupPagesResult)(nil)).Elem() +} + +func (o LookupPagesResultOutput) ToLookupPagesResultOutput() LookupPagesResultOutput { + return o +} + +func (o LookupPagesResultOutput) ToLookupPagesResultOutputWithContext(ctx context.Context) LookupPagesResultOutput { + return o +} + +func (o LookupPagesResultOutput) ToOutput(ctx context.Context) pulumix.Output[LookupPagesResult] { + return pulumix.Output[LookupPagesResult]{ + OutputState: o.OutputState, + } +} + +// Configuration settings for customizing the Password Reset page. +func (o LookupPagesResultOutput) ChangePasswords() GetPagesChangePasswordArrayOutput { + return o.ApplyT(func(v LookupPagesResult) []GetPagesChangePassword { return v.ChangePasswords }).(GetPagesChangePasswordArrayOutput) +} + +// Configuration settings for the Error pages. +func (o LookupPagesResultOutput) Errors() GetPagesErrorArrayOutput { + return o.ApplyT(func(v LookupPagesResult) []GetPagesError { return v.Errors }).(GetPagesErrorArrayOutput) +} + +// Configuration settings for customizing the Guardian Multi-Factor Authentication page. +func (o LookupPagesResultOutput) GuardianMfas() GetPagesGuardianMfaArrayOutput { + return o.ApplyT(func(v LookupPagesResult) []GetPagesGuardianMfa { return v.GuardianMfas }).(GetPagesGuardianMfaArrayOutput) +} + +// The provider-assigned unique ID for this managed resource. +func (o LookupPagesResultOutput) Id() pulumi.StringOutput { + return o.ApplyT(func(v LookupPagesResult) string { return v.Id }).(pulumi.StringOutput) +} + +// Configuration settings for customizing the Login page. +func (o LookupPagesResultOutput) Logins() GetPagesLoginArrayOutput { + return o.ApplyT(func(v LookupPagesResult) []GetPagesLogin { return v.Logins }).(GetPagesLoginArrayOutput) +} + +func init() { + pulumi.RegisterOutputType(LookupPagesResultOutput{}) +} diff --git a/sdk/go/auth0/getResourceServer.go b/sdk/go/auth0/getResourceServer.go index 0d05a3c6..7e46c9d9 100644 --- a/sdk/go/auth0/getResourceServer.go +++ b/sdk/go/auth0/getResourceServer.go @@ -13,38 +13,6 @@ import ( ) // Data source to retrieve a specific Auth0 resource server by `resourceServerId` or `identifier`. -// -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := auth0.LookupResourceServer(ctx, &auth0.LookupResourceServerArgs{ -// Identifier: pulumi.StringRef("https://my-api.com/v1"), -// }, nil) -// if err != nil { -// return err -// } -// _, err = auth0.LookupResourceServer(ctx, &auth0.LookupResourceServerArgs{ -// ResourceServerId: pulumi.StringRef("abcdefghkijklmnopqrstuvwxyz0123456789"), -// }, nil) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` func LookupResourceServer(ctx *pulumi.Context, args *LookupResourceServerArgs, opts ...pulumi.InvokeOption) (*LookupResourceServerResult, error) { opts = internal.PkgInvokeDefaultOpts(opts) var rv LookupResourceServerResult diff --git a/sdk/go/auth0/getRole.go b/sdk/go/auth0/getRole.go index 768e64b6..f9c99c03 100644 --- a/sdk/go/auth0/getRole.go +++ b/sdk/go/auth0/getRole.go @@ -13,38 +13,6 @@ import ( ) // Data source to retrieve a specific Auth0 role by `roleId` or `name`. -// -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := auth0.LookupRole(ctx, &auth0.LookupRoleArgs{ -// Name: pulumi.StringRef("my-role"), -// }, nil) -// if err != nil { -// return err -// } -// _, err = auth0.LookupRole(ctx, &auth0.LookupRoleArgs{ -// RoleId: pulumi.StringRef("abcdefghkijklmnopqrstuvwxyz0123456789"), -// }, nil) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` func LookupRole(ctx *pulumi.Context, args *LookupRoleArgs, opts ...pulumi.InvokeOption) (*LookupRoleResult, error) { opts = internal.PkgInvokeDefaultOpts(opts) var rv LookupRoleResult diff --git a/sdk/go/auth0/getSigningKeys.go b/sdk/go/auth0/getSigningKeys.go index d2cc82f7..5489e620 100644 --- a/sdk/go/auth0/getSigningKeys.go +++ b/sdk/go/auth0/getSigningKeys.go @@ -4,8 +4,12 @@ package auth0 import ( + "context" + "reflect" + "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0/internal" "github.com/pulumi/pulumi/sdk/v3/go/pulumi" + "github.com/pulumi/pulumi/sdk/v3/go/pulumix" ) // Data source to retrieve signing keys used by the applications in your tenant. [Learn more](https://auth0.com/docs/get-started/tenant-settings/signing-keys). @@ -26,3 +30,49 @@ type GetSigningKeysResult struct { // All application signing keys. SigningKeys []GetSigningKeysSigningKey `pulumi:"signingKeys"` } + +func GetSigningKeysOutput(ctx *pulumi.Context, opts ...pulumi.InvokeOption) GetSigningKeysResultOutput { + return pulumi.ToOutput(0).ApplyT(func(int) (GetSigningKeysResult, error) { + r, err := GetSigningKeys(ctx, opts...) + var s GetSigningKeysResult + if r != nil { + s = *r + } + return s, err + }).(GetSigningKeysResultOutput) +} + +// A collection of values returned by getSigningKeys. +type GetSigningKeysResultOutput struct{ *pulumi.OutputState } + +func (GetSigningKeysResultOutput) ElementType() reflect.Type { + return reflect.TypeOf((*GetSigningKeysResult)(nil)).Elem() +} + +func (o GetSigningKeysResultOutput) ToGetSigningKeysResultOutput() GetSigningKeysResultOutput { + return o +} + +func (o GetSigningKeysResultOutput) ToGetSigningKeysResultOutputWithContext(ctx context.Context) GetSigningKeysResultOutput { + return o +} + +func (o GetSigningKeysResultOutput) ToOutput(ctx context.Context) pulumix.Output[GetSigningKeysResult] { + return pulumix.Output[GetSigningKeysResult]{ + OutputState: o.OutputState, + } +} + +// The provider-assigned unique ID for this managed resource. +func (o GetSigningKeysResultOutput) Id() pulumi.StringOutput { + return o.ApplyT(func(v GetSigningKeysResult) string { return v.Id }).(pulumi.StringOutput) +} + +// All application signing keys. +func (o GetSigningKeysResultOutput) SigningKeys() GetSigningKeysSigningKeyArrayOutput { + return o.ApplyT(func(v GetSigningKeysResult) []GetSigningKeysSigningKey { return v.SigningKeys }).(GetSigningKeysSigningKeyArrayOutput) +} + +func init() { + pulumi.RegisterOutputType(GetSigningKeysResultOutput{}) +} diff --git a/sdk/go/auth0/getTenant.go b/sdk/go/auth0/getTenant.go index 7f1ceb6f..0817001c 100644 --- a/sdk/go/auth0/getTenant.go +++ b/sdk/go/auth0/getTenant.go @@ -4,35 +4,15 @@ package auth0 import ( + "context" + "reflect" + "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0/internal" "github.com/pulumi/pulumi/sdk/v3/go/pulumi" + "github.com/pulumi/pulumi/sdk/v3/go/pulumix" ) // Use this data source to access information about the tenant this provider is configured to access. -// -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := auth0.LookupTenant(ctx, nil, nil) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` func LookupTenant(ctx *pulumi.Context, opts ...pulumi.InvokeOption) (*LookupTenantResult, error) { opts = internal.PkgInvokeDefaultOpts(opts) var rv LookupTenantResult @@ -84,3 +64,134 @@ type LookupTenantResult struct { // Support URL for authenticating users. SupportUrl string `pulumi:"supportUrl"` } + +func LookupTenantOutput(ctx *pulumi.Context, opts ...pulumi.InvokeOption) LookupTenantResultOutput { + return pulumi.ToOutput(0).ApplyT(func(int) (LookupTenantResult, error) { + r, err := LookupTenant(ctx, opts...) + var s LookupTenantResult + if r != nil { + s = *r + } + return s, err + }).(LookupTenantResultOutput) +} + +// A collection of values returned by getTenant. +type LookupTenantResultOutput struct{ *pulumi.OutputState } + +func (LookupTenantResultOutput) ElementType() reflect.Type { + return reflect.TypeOf((*LookupTenantResult)(nil)).Elem() +} + +func (o LookupTenantResultOutput) ToLookupTenantResultOutput() LookupTenantResultOutput { + return o +} + +func (o LookupTenantResultOutput) ToLookupTenantResultOutputWithContext(ctx context.Context) LookupTenantResultOutput { + return o +} + +func (o LookupTenantResultOutput) ToOutput(ctx context.Context) pulumix.Output[LookupTenantResult] { + return pulumix.Output[LookupTenantResult]{ + OutputState: o.OutputState, + } +} + +// Whether to accept an organization name instead of an ID on auth endpoints. +func (o LookupTenantResultOutput) AllowOrganizationNameInAuthenticationApi() pulumi.BoolOutput { + return o.ApplyT(func(v LookupTenantResult) bool { return v.AllowOrganizationNameInAuthenticationApi }).(pulumi.BoolOutput) +} + +// URLs that Auth0 may redirect to after logout. +func (o LookupTenantResultOutput) AllowedLogoutUrls() pulumi.StringArrayOutput { + return o.ApplyT(func(v LookupTenantResult) []string { return v.AllowedLogoutUrls }).(pulumi.StringArrayOutput) +} + +// API Audience to use by default for API Authorization flows. This setting is equivalent to appending the audience to every authorization request made to the tenant for every application. +func (o LookupTenantResultOutput) DefaultAudience() pulumi.StringOutput { + return o.ApplyT(func(v LookupTenantResult) string { return v.DefaultAudience }).(pulumi.StringOutput) +} + +// Name of the connection to be used for Password Grant exchanges. Options include `auth0-adldap`, `ad`, `auth0`, `email`, `sms`, `waad`, and `adfs`. +func (o LookupTenantResultOutput) DefaultDirectory() pulumi.StringOutput { + return o.ApplyT(func(v LookupTenantResult) string { return v.DefaultDirectory }).(pulumi.StringOutput) +} + +// The default absolute redirection URI. Must be HTTPS or an empty string. +func (o LookupTenantResultOutput) DefaultRedirectionUri() pulumi.StringOutput { + return o.ApplyT(func(v LookupTenantResult) string { return v.DefaultRedirectionUri }).(pulumi.StringOutput) +} + +// Your Auth0 domain name. +func (o LookupTenantResultOutput) Domain() pulumi.StringOutput { + return o.ApplyT(func(v LookupTenantResult) string { return v.Domain }).(pulumi.StringOutput) +} + +// Supported locales for the user interface. The first locale in the list will be used to set the default locale. +func (o LookupTenantResultOutput) EnabledLocales() pulumi.StringArrayOutput { + return o.ApplyT(func(v LookupTenantResult) []string { return v.EnabledLocales }).(pulumi.StringArrayOutput) +} + +// Configuration settings for tenant flags. +func (o LookupTenantResultOutput) Flags() GetTenantFlagArrayOutput { + return o.ApplyT(func(v LookupTenantResult) []GetTenantFlag { return v.Flags }).(GetTenantFlagArrayOutput) +} + +// Friendly name for the tenant. +func (o LookupTenantResultOutput) FriendlyName() pulumi.StringOutput { + return o.ApplyT(func(v LookupTenantResult) string { return v.FriendlyName }).(pulumi.StringOutput) +} + +// The provider-assigned unique ID for this managed resource. +func (o LookupTenantResultOutput) Id() pulumi.StringOutput { + return o.ApplyT(func(v LookupTenantResult) string { return v.Id }).(pulumi.StringOutput) +} + +// Number of hours during which a session can be inactive before the user must log in again. +func (o LookupTenantResultOutput) IdleSessionLifetime() pulumi.Float64Output { + return o.ApplyT(func(v LookupTenantResult) float64 { return v.IdleSessionLifetime }).(pulumi.Float64Output) +} + +// The identifier value of the built-in Management API resource server, which can be used as an audience when configuring client grants. +func (o LookupTenantResultOutput) ManagementApiIdentifier() pulumi.StringOutput { + return o.ApplyT(func(v LookupTenantResult) string { return v.ManagementApiIdentifier }).(pulumi.StringOutput) +} + +// URL of logo to be shown for the tenant. Recommended size is 150px x 150px. If no URL is provided, the Auth0 logo will be used. +func (o LookupTenantResultOutput) PictureUrl() pulumi.StringOutput { + return o.ApplyT(func(v LookupTenantResult) string { return v.PictureUrl }).(pulumi.StringOutput) +} + +// Selected sandbox version for the extensibility environment, which allows you to use custom scripts to extend parts of Auth0's functionality. +func (o LookupTenantResultOutput) SandboxVersion() pulumi.StringOutput { + return o.ApplyT(func(v LookupTenantResult) string { return v.SandboxVersion }).(pulumi.StringOutput) +} + +// Alters behavior of tenant's session cookie. Contains a single `mode` property. +func (o LookupTenantResultOutput) SessionCookies() GetTenantSessionCookyArrayOutput { + return o.ApplyT(func(v LookupTenantResult) []GetTenantSessionCooky { return v.SessionCookies }).(GetTenantSessionCookyArrayOutput) +} + +// Number of hours during which a session will stay valid. +func (o LookupTenantResultOutput) SessionLifetime() pulumi.Float64Output { + return o.ApplyT(func(v LookupTenantResult) float64 { return v.SessionLifetime }).(pulumi.Float64Output) +} + +// Sessions related settings for the tenant. +func (o LookupTenantResultOutput) Sessions() GetTenantSessionArrayOutput { + return o.ApplyT(func(v LookupTenantResult) []GetTenantSession { return v.Sessions }).(GetTenantSessionArrayOutput) +} + +// Support email address for authenticating users. +func (o LookupTenantResultOutput) SupportEmail() pulumi.StringOutput { + return o.ApplyT(func(v LookupTenantResult) string { return v.SupportEmail }).(pulumi.StringOutput) +} + +// Support URL for authenticating users. +func (o LookupTenantResultOutput) SupportUrl() pulumi.StringOutput { + return o.ApplyT(func(v LookupTenantResult) string { return v.SupportUrl }).(pulumi.StringOutput) +} + +func init() { + pulumi.RegisterOutputType(LookupTenantResultOutput{}) +} diff --git a/sdk/go/auth0/getUser.go b/sdk/go/auth0/getUser.go index 752532ff..c330cc9c 100644 --- a/sdk/go/auth0/getUser.go +++ b/sdk/go/auth0/getUser.go @@ -13,32 +13,6 @@ import ( ) // Data source to retrieve a specific Auth0 user by `userId`. -// -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := auth0.LookupUser(ctx, &auth0.LookupUserArgs{ -// UserId: "auth0|34fdr23fdsfdfsf", -// }, nil) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` func LookupUser(ctx *pulumi.Context, args *LookupUserArgs, opts ...pulumi.InvokeOption) (*LookupUserResult, error) { opts = internal.PkgInvokeDefaultOpts(opts) var rv LookupUserResult diff --git a/sdk/go/auth0/guardian.go b/sdk/go/auth0/guardian.go index be7e9edc..aefc004d 100644 --- a/sdk/go/auth0/guardian.go +++ b/sdk/go/auth0/guardian.go @@ -15,76 +15,6 @@ import ( // Multi-Factor Authentication works by requiring additional factors during the login process to prevent unauthorized access. With this resource you can configure some options available for MFA. // -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := auth0.NewGuardian(ctx, "myGuardian", &auth0.GuardianArgs{ -// Duo: &auth0.GuardianDuoArgs{ -// Enabled: pulumi.Bool(true), -// Hostname: pulumi.String("api-hostname"), -// IntegrationKey: pulumi.String("someKey"), -// SecretKey: pulumi.String("someSecret"), -// }, -// Email: pulumi.Bool(true), -// Otp: pulumi.Bool(true), -// Phone: &auth0.GuardianPhoneArgs{ -// Enabled: pulumi.Bool(true), -// MessageTypes: pulumi.StringArray{ -// pulumi.String("sms"), -// pulumi.String("voice"), -// }, -// Options: &auth0.GuardianPhoneOptionsArgs{ -// EnrollmentMessage: pulumi.String("{{code}} is your verification code for {{tenant.friendly_name}}. Please enter this code to verify your enrollment."), -// VerificationMessage: pulumi.String("{{code}} is your verification code for {{tenant.friendly_name}}."), -// }, -// Provider: pulumi.String("auth0"), -// }, -// Policy: pulumi.String("all-applications"), -// Push: &auth0.GuardianPushArgs{ -// AmazonSns: &auth0.GuardianPushAmazonSnsArgs{ -// AwsAccessKeyId: pulumi.String("test1"), -// AwsRegion: pulumi.String("us-west-1"), -// AwsSecretAccessKey: pulumi.String("secretKey"), -// SnsApnsPlatformApplicationArn: pulumi.String("test_arn"), -// SnsGcmPlatformApplicationArn: pulumi.String("test_arn"), -// }, -// CustomApp: &auth0.GuardianPushCustomAppArgs{ -// AppName: pulumi.String("CustomApp"), -// AppleAppLink: pulumi.String("https://itunes.apple.com/us/app/my-app/id123121"), -// GoogleAppLink: pulumi.String("https://play.google.com/store/apps/details?id=com.my.app"), -// }, -// Enabled: pulumi.Bool(true), -// Provider: pulumi.String("sns"), -// }, -// RecoveryCode: pulumi.Bool(true), -// WebauthnPlatform: &auth0.GuardianWebauthnPlatformArgs{ -// Enabled: pulumi.Bool(true), -// }, -// WebauthnRoaming: &auth0.GuardianWebauthnRoamingArgs{ -// Enabled: pulumi.Bool(true), -// UserVerification: pulumi.String("required"), -// }, -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// // ## Import // // As this is not a resource identifiable by an ID within the Auth0 Management API, guardian can be imported using a random string. # We recommend [Version 4 UUID](https://www.uuidgenerator.net/version4) # Example diff --git a/sdk/go/auth0/hook.go b/sdk/go/auth0/hook.go index d5dd5a7f..4b652250 100644 --- a/sdk/go/auth0/hook.go +++ b/sdk/go/auth0/hook.go @@ -17,40 +17,6 @@ import ( // // !> This resource is deprecated. Refer to the [guide on how to migrate from hooks to actions](https://auth0.com/docs/customize/actions/migrate/migrate-from-hooks-to-actions) and manage your actions using the `Action` resource. // -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := auth0.NewHook(ctx, "myHook", &auth0.HookArgs{ -// Dependencies: pulumi.AnyMap{ -// "auth0": pulumi.Any("2.30.0"), -// }, -// Enabled: pulumi.Bool(true), -// Script: pulumi.String(" function (user, context, callback) {\n callback(null, { user });\n }\n \n"), -// Secrets: pulumi.AnyMap{ -// "foo": pulumi.Any("bar"), -// }, -// TriggerId: pulumi.String("pre-user-registration"), -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// // ## Import // // This resource can be imported by specifying the hook ID. # Example diff --git a/sdk/go/auth0/logStream.go b/sdk/go/auth0/logStream.go index bf1dfa26..49a20ae5 100644 --- a/sdk/go/auth0/logStream.go +++ b/sdk/go/auth0/logStream.go @@ -15,65 +15,6 @@ import ( // With this resource, you can manage your Auth0 log streams. // -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := auth0.NewLogStream(ctx, "myWebhook", &auth0.LogStreamArgs{ -// Filters: pulumi.StringMapArray{ -// pulumi.StringMap{ -// "name": pulumi.String("auth.login.fail"), -// "type": pulumi.String("category"), -// }, -// pulumi.StringMap{ -// "name": pulumi.String("auth.signup.fail"), -// "type": pulumi.String("category"), -// }, -// }, -// Sink: &auth0.LogStreamSinkArgs{ -// HttpAuthorization: pulumi.String("AKIAXXXXXXXXXXXXXXXX"), -// HttpContentFormat: pulumi.String("JSONOBJECT"), -// HttpContentType: pulumi.String("application/json"), -// HttpCustomHeaders: pulumi.StringMapArray{ -// pulumi.StringMap{ -// "header": pulumi.String("foo"), -// "value": pulumi.String("bar"), -// }, -// }, -// HttpEndpoint: pulumi.String("https://example.com/logs"), -// }, -// Type: pulumi.String("http"), -// }) -// if err != nil { -// return err -// } -// _, err = auth0.NewLogStream(ctx, "exampleAws", &auth0.LogStreamArgs{ -// Sink: &auth0.LogStreamSinkArgs{ -// AwsAccountId: pulumi.String("my_account_id"), -// AwsRegion: pulumi.String("us-east-2"), -// }, -// Status: pulumi.String("active"), -// Type: pulumi.String("eventbridge"), -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// // ## Import // // This resource can be imported by specifying the log stream ID. # Example diff --git a/sdk/go/auth0/organization.go b/sdk/go/auth0/organization.go index 261472dd..081fe529 100644 --- a/sdk/go/auth0/organization.go +++ b/sdk/go/auth0/organization.go @@ -20,39 +20,6 @@ import ( // - Build administration capabilities into their products, using Organizations // APIs, so that those businesses can manage their own organizations. // -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := auth0.NewOrganization(ctx, "myOrganization", &auth0.OrganizationArgs{ -// Branding: &auth0.OrganizationBrandingArgs{ -// Colors: pulumi.StringMap{ -// "pageBackground": pulumi.String("#e1e1e1"), -// "primary": pulumi.String("#f2f2f2"), -// }, -// LogoUrl: pulumi.String("https://example.com/assets/icons/icon.png"), -// }, -// DisplayName: pulumi.String("Auth0 Inc."), -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// // ## Import // // This resource can be imported by specifying the organization ID. # Example diff --git a/sdk/go/auth0/organizationConnection.go b/sdk/go/auth0/organizationConnection.go index b2e0be72..4aff1b97 100644 --- a/sdk/go/auth0/organizationConnection.go +++ b/sdk/go/auth0/organizationConnection.go @@ -20,46 +20,6 @@ import ( // resource in conjunction with the `OrganizationConnections` resource when managing enabled connections for the // same organization id. // -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// myConnection, err := auth0.NewConnection(ctx, "myConnection", &auth0.ConnectionArgs{ -// Strategy: pulumi.String("auth0"), -// }) -// if err != nil { -// return err -// } -// myOrganization, err := auth0.NewOrganization(ctx, "myOrganization", &auth0.OrganizationArgs{ -// DisplayName: pulumi.String("My Organization"), -// }) -// if err != nil { -// return err -// } -// _, err = auth0.NewOrganizationConnection(ctx, "myOrgConn", &auth0.OrganizationConnectionArgs{ -// OrganizationId: myOrganization.ID(), -// ConnectionId: myConnection.ID(), -// AssignMembershipOnLogin: pulumi.Bool(true), -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// // ## Import // // This resource can be imported by specifying the organization ID and connection ID separated by "::" (note the double colon) :: # Example diff --git a/sdk/go/auth0/organizationConnections.go b/sdk/go/auth0/organizationConnections.go index c19e72ed..d82e6683 100644 --- a/sdk/go/auth0/organizationConnections.go +++ b/sdk/go/auth0/organizationConnections.go @@ -20,60 +20,6 @@ import ( // resource in conjunction with the `OrganizationConnection` resource when managing connections for the same // organization id. // -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := auth0.NewConnection(ctx, "myConnection-1", &auth0.ConnectionArgs{ -// Strategy: pulumi.String("auth0"), -// }) -// if err != nil { -// return err -// } -// _, err = auth0.NewConnection(ctx, "myConnection-2", &auth0.ConnectionArgs{ -// Strategy: pulumi.String("auth0"), -// }) -// if err != nil { -// return err -// } -// myOrganization, err := auth0.NewOrganization(ctx, "myOrganization", &auth0.OrganizationArgs{ -// DisplayName: pulumi.String("My Organization"), -// }) -// if err != nil { -// return err -// } -// _, err = auth0.NewOrganizationConnections(ctx, "one-to-many", &auth0.OrganizationConnectionsArgs{ -// OrganizationId: myOrganization.ID(), -// EnabledConnections: auth0.OrganizationConnectionsEnabledConnectionArray{ -// &auth0.OrganizationConnectionsEnabledConnectionArgs{ -// ConnectionId: myConnection_1.ID(), -// AssignMembershipOnLogin: pulumi.Bool(true), -// }, -// &auth0.OrganizationConnectionsEnabledConnectionArgs{ -// ConnectionId: myConnection_2.ID(), -// AssignMembershipOnLogin: pulumi.Bool(true), -// }, -// }, -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// // ## Import // // This resource can be imported by specifying the organization ID. # Example diff --git a/sdk/go/auth0/organizationMember.go b/sdk/go/auth0/organizationMember.go index 4be2a63d..5115a576 100644 --- a/sdk/go/auth0/organizationMember.go +++ b/sdk/go/auth0/organizationMember.go @@ -19,48 +19,6 @@ import ( // all the members assigned to an organization. To avoid potential issues, it is recommended not to use this resource in // conjunction with the `OrganizationMembers` resource when managing members for the same organization id. // -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// user, err := auth0.NewUser(ctx, "user", &auth0.UserArgs{ -// Email: pulumi.String("test-user@auth0.com"), -// ConnectionName: pulumi.String("Username-Password-Authentication"), -// EmailVerified: pulumi.Bool(true), -// Password: pulumi.String("MyPass123$"), -// }) -// if err != nil { -// return err -// } -// myOrg, err := auth0.NewOrganization(ctx, "myOrg", &auth0.OrganizationArgs{ -// DisplayName: pulumi.String("Admin"), -// }) -// if err != nil { -// return err -// } -// _, err = auth0.NewOrganizationMember(ctx, "myOrgMember", &auth0.OrganizationMemberArgs{ -// OrganizationId: myOrg.ID(), -// UserId: user.ID(), -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// // ## Import // // This resource can be imported by specifying the organization ID and user ID separated by "::" (note the double colon) :: # Example diff --git a/sdk/go/auth0/organizationMemberRole.go b/sdk/go/auth0/organizationMemberRole.go index 7bacf869..ec524248 100644 --- a/sdk/go/auth0/organizationMemberRole.go +++ b/sdk/go/auth0/organizationMemberRole.go @@ -15,71 +15,6 @@ import ( // This resource is used to manage the roles assigned to an organization member. // -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// reader, err := auth0.NewRole(ctx, "reader", nil) -// if err != nil { -// return err -// } -// writer, err := auth0.NewRole(ctx, "writer", nil) -// if err != nil { -// return err -// } -// user, err := auth0.NewUser(ctx, "user", &auth0.UserArgs{ -// ConnectionName: pulumi.String("Username-Password-Authentication"), -// Email: pulumi.String("test-user@auth0.com"), -// Password: pulumi.String("MyPass123$"), -// }) -// if err != nil { -// return err -// } -// myOrg, err := auth0.NewOrganization(ctx, "myOrg", &auth0.OrganizationArgs{ -// DisplayName: pulumi.String("Some Org"), -// }) -// if err != nil { -// return err -// } -// _, err = auth0.NewOrganizationMember(ctx, "myOrgMember", &auth0.OrganizationMemberArgs{ -// OrganizationId: myOrg.ID(), -// UserId: user.ID(), -// }) -// if err != nil { -// return err -// } -// _, err = auth0.NewOrganizationMemberRole(ctx, "role1", &auth0.OrganizationMemberRoleArgs{ -// OrganizationId: myOrg.ID(), -// UserId: user.ID(), -// RoleId: reader.ID(), -// }) -// if err != nil { -// return err -// } -// _, err = auth0.NewOrganizationMemberRole(ctx, "role2", &auth0.OrganizationMemberRoleArgs{ -// OrganizationId: myOrg.ID(), -// UserId: user.ID(), -// RoleId: writer.ID(), -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// // ## Import // // This resource can be imported by specifying the organization ID, user ID and role ID separated by "::" (note the double colon) :::: # Example diff --git a/sdk/go/auth0/organizationMemberRoles.go b/sdk/go/auth0/organizationMemberRoles.go index a94d4164..26e41fb7 100644 --- a/sdk/go/auth0/organizationMemberRoles.go +++ b/sdk/go/auth0/organizationMemberRoles.go @@ -15,66 +15,6 @@ import ( // This resource is used to manage the roles assigned to an organization member. // -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// reader, err := auth0.NewRole(ctx, "reader", nil) -// if err != nil { -// return err -// } -// writer, err := auth0.NewRole(ctx, "writer", nil) -// if err != nil { -// return err -// } -// user, err := auth0.NewUser(ctx, "user", &auth0.UserArgs{ -// ConnectionName: pulumi.String("Username-Password-Authentication"), -// Email: pulumi.String("test-user@auth0.com"), -// Password: pulumi.String("MyPass123$"), -// }) -// if err != nil { -// return err -// } -// myOrg, err := auth0.NewOrganization(ctx, "myOrg", &auth0.OrganizationArgs{ -// DisplayName: pulumi.String("Some Org"), -// }) -// if err != nil { -// return err -// } -// _, err = auth0.NewOrganizationMember(ctx, "myOrgMember", &auth0.OrganizationMemberArgs{ -// OrganizationId: myOrg.ID(), -// UserId: user.ID(), -// }) -// if err != nil { -// return err -// } -// _, err = auth0.NewOrganizationMemberRoles(ctx, "myOrgMemberRoles", &auth0.OrganizationMemberRolesArgs{ -// OrganizationId: myOrg.ID(), -// UserId: user.ID(), -// Roles: pulumi.StringArray{ -// reader.ID(), -// writer.ID(), -// }, -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// // ## Import // // This resource can be imported by specifying the organization ID and user ID separated by "::" (note the double colon) :: # Example diff --git a/sdk/go/auth0/organizationMembers.go b/sdk/go/auth0/organizationMembers.go index 68247085..6c53c2a0 100644 --- a/sdk/go/auth0/organizationMembers.go +++ b/sdk/go/auth0/organizationMembers.go @@ -20,58 +20,6 @@ import ( // resource in conjunction with the `OrganizationMember` resource when managing members for the same organization // id. // -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// user1, err := auth0.NewUser(ctx, "user1", &auth0.UserArgs{ -// ConnectionName: pulumi.String("Username-Password-Authentication"), -// Email: pulumi.String("myuser1@auth0.com"), -// Password: pulumi.String("MyPass123$"), -// }) -// if err != nil { -// return err -// } -// user2, err := auth0.NewUser(ctx, "user2", &auth0.UserArgs{ -// ConnectionName: pulumi.String("Username-Password-Authentication"), -// Email: pulumi.String("myuser2@auth0.com"), -// Password: pulumi.String("MyPass123$"), -// }) -// if err != nil { -// return err -// } -// myOrg, err := auth0.NewOrganization(ctx, "myOrg", &auth0.OrganizationArgs{ -// DisplayName: pulumi.String("Some Organization"), -// }) -// if err != nil { -// return err -// } -// _, err = auth0.NewOrganizationMembers(ctx, "myMembers", &auth0.OrganizationMembersArgs{ -// OrganizationId: myOrg.ID(), -// Members: pulumi.StringArray{ -// user1.ID(), -// user2.ID(), -// }, -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// // ## Import // // This resource can be imported by specifying the organization ID. # Example diff --git a/sdk/go/auth0/pages.go b/sdk/go/auth0/pages.go index c9f6198d..c1c0d589 100644 --- a/sdk/go/auth0/pages.go +++ b/sdk/go/auth0/pages.go @@ -14,48 +14,6 @@ import ( // With this resource you can manage custom HTML for the Login, Reset Password, Multi-Factor Authentication and Error pages. // -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := auth0.NewPages(ctx, "myPages", &auth0.PagesArgs{ -// ChangePassword: &auth0.PagesChangePasswordArgs{ -// Enabled: pulumi.Bool(true), -// Html: pulumi.String("My Custom Reset Password Page"), -// }, -// Error: &auth0.PagesErrorArgs{ -// Html: pulumi.String("My Custom Error Page"), -// ShowLogLink: pulumi.Bool(true), -// Url: pulumi.String("https://example.com"), -// }, -// GuardianMfa: &auth0.PagesGuardianMfaArgs{ -// Enabled: pulumi.Bool(true), -// Html: pulumi.String("My Custom MFA Page"), -// }, -// Login: &auth0.PagesLoginArgs{ -// Enabled: pulumi.Bool(true), -// Html: pulumi.String("My Custom Login Page"), -// }, -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// // ## Import // // As this is not a resource identifiable by an ID within the Auth0 Management API, pages can be imported using a random string. # We recommend [Version 4 UUID](https://www.uuidgenerator.net/version4) # Example diff --git a/sdk/go/auth0/prompt.go b/sdk/go/auth0/prompt.go index c7a0c83b..834c30db 100644 --- a/sdk/go/auth0/prompt.go +++ b/sdk/go/auth0/prompt.go @@ -14,34 +14,6 @@ import ( // With this resource, you can manage your Auth0 prompts, including choosing the login experience version. // -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := auth0.NewPrompt(ctx, "myPrompt", &auth0.PromptArgs{ -// IdentifierFirst: pulumi.Bool(false), -// UniversalLoginExperience: pulumi.String("new"), -// WebauthnPlatformFirstFactor: pulumi.Bool(true), -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// // ## Import // // As this is not a resource identifiable by an ID within the Auth0 Management API, prompts can be imported using a random string. # We recommend [Version 4 UUID](https://www.uuidgenerator.net/version4) # Example diff --git a/sdk/go/auth0/promptCustomText.go b/sdk/go/auth0/promptCustomText.go index d0f06698..5d7ec194 100644 --- a/sdk/go/auth0/promptCustomText.go +++ b/sdk/go/auth0/promptCustomText.go @@ -15,63 +15,6 @@ import ( // With this resource, you can manage custom text on your Auth0 prompts. You can read more about custom texts [here](https://auth0.com/docs/customize/universal-login-pages/customize-login-text-prompts). // -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "encoding/json" -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// tmpJSON0, err := json.Marshal(map[string]interface{}{ -// "login": map[string]interface{}{ -// "alertListTitle": "Alerts", -// "buttonText": "Continue", -// "description": "Login to", -// "editEmailText": "Edit", -// "emailPlaceholder": "Email address", -// "federatedConnectionButtonText": "Continue with ${connectionName}", -// "footerLinkText": "Sign up", -// "footerText": "Don't have an account?", -// "forgotPasswordText": "Forgot password?", -// "invitationDescription": "Log in to accept ${inviterName}'s invitation to join ${companyName} on ${clientName}.", -// "invitationTitle": "You've Been Invited!", -// "logoAltText": "${companyName}", -// "pageTitle": "Log in | ${clientName}", -// "passwordPlaceholder": "Password", -// "separatorText": "Or", -// "signupActionLinkText": "${footerLinkText}", -// "signupActionText": "${footerText}", -// "title": "Welcome", -// "usernamePlaceholder": "Username or email address", -// }, -// }) -// if err != nil { -// return err -// } -// json0 := string(tmpJSON0) -// _, err = auth0.NewPromptCustomText(ctx, "example", &auth0.PromptCustomTextArgs{ -// Prompt: pulumi.String("login"), -// Language: pulumi.String("en"), -// Body: pulumi.String(json0), -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// // ## Import // // This resource can be imported by specifying the prompt and language separated by "::" (note the double colon) :: # Example diff --git a/sdk/go/auth0/resourceServer.go b/sdk/go/auth0/resourceServer.go index 3c1c5cee..c7e605c4 100644 --- a/sdk/go/auth0/resourceServer.go +++ b/sdk/go/auth0/resourceServer.go @@ -15,36 +15,6 @@ import ( // With this resource, you can set up APIs that can be consumed from your authorized applications. // -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := auth0.NewResourceServer(ctx, "myResourceServer", &auth0.ResourceServerArgs{ -// AllowOfflineAccess: pulumi.Bool(true), -// Identifier: pulumi.String("https://api.example.com"), -// SigningAlg: pulumi.String("RS256"), -// SkipConsentForVerifiableFirstPartyClients: pulumi.Bool(true), -// TokenLifetime: pulumi.Int(8600), -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// // ## Import // // Existing resource servers can be imported using their ID. # Example diff --git a/sdk/go/auth0/resourceServerScope.go b/sdk/go/auth0/resourceServerScope.go index 756c2f06..f21856b3 100644 --- a/sdk/go/auth0/resourceServerScope.go +++ b/sdk/go/auth0/resourceServerScope.go @@ -19,46 +19,6 @@ import ( // all the scopes assigned to a resource server. To avoid potential issues, it is recommended not to use this resource in // conjunction with the `ResourceServerScopes` resource when managing scopes for the same resource server id. // -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// resourceServer, err := auth0.NewResourceServer(ctx, "resourceServer", &auth0.ResourceServerArgs{ -// Identifier: pulumi.String("https://api.example.com"), -// }) -// if err != nil { -// return err -// } -// _, err = auth0.NewResourceServerScope(ctx, "readPosts", &auth0.ResourceServerScopeArgs{ -// ResourceServerIdentifier: resourceServer.Identifier, -// Scope: pulumi.String("read:posts"), -// }) -// if err != nil { -// return err -// } -// _, err = auth0.NewResourceServerScope(ctx, "writePosts", &auth0.ResourceServerScopeArgs{ -// ResourceServerIdentifier: resourceServer.Identifier, -// Scope: pulumi.String("write:posts"), -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// // ## Import // // This resource can be imported by specifying the resource identifier and scope name separated by "::" (note the double colon) :: # Example diff --git a/sdk/go/auth0/resourceServerScopes.go b/sdk/go/auth0/resourceServerScopes.go index b6f17cb3..ed7ec39e 100644 --- a/sdk/go/auth0/resourceServerScopes.go +++ b/sdk/go/auth0/resourceServerScopes.go @@ -20,48 +20,6 @@ import ( // resource in conjunction with the `ResourceServerScope` resource when managing scopes for the same resource // server id. // -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// myApi, err := auth0.NewResourceServer(ctx, "myApi", &auth0.ResourceServerArgs{ -// Identifier: pulumi.String("https://api.example.com"), -// }) -// if err != nil { -// return err -// } -// _, err = auth0.NewResourceServerScopes(ctx, "myApiScopes", &auth0.ResourceServerScopesArgs{ -// ResourceServerIdentifier: myApi.Identifier, -// Scopes: auth0.ResourceServerScopesScopeArray{ -// &auth0.ResourceServerScopesScopeArgs{ -// Name: pulumi.String("create:appointments"), -// Description: pulumi.String("Ability to create appointments"), -// }, -// &auth0.ResourceServerScopesScopeArgs{ -// Name: pulumi.String("read:appointments"), -// Description: pulumi.String("Ability to read appointments"), -// }, -// }, -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// // ## Import // // This resource can be imported by specifying the resource server identifier. # Example diff --git a/sdk/go/auth0/role.go b/sdk/go/auth0/role.go index 2d2a1366..e1d5660f 100644 --- a/sdk/go/auth0/role.go +++ b/sdk/go/auth0/role.go @@ -14,32 +14,6 @@ import ( // With this resource, you can create and manage collections of permissions that can be assigned to users, which are otherwise known as roles. Permissions (scopes) are created on `ResourceServer`, then associated with roles and optionally, users using this resource. // -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := auth0.NewRole(ctx, "myRole", &auth0.RoleArgs{ -// Description: pulumi.String("Role Description..."), -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// // ## Import // // Existing roles can be imported using their ID. # Example diff --git a/sdk/go/auth0/rule.go b/sdk/go/auth0/rule.go index 98ddd324..b808c912 100644 --- a/sdk/go/auth0/rule.go +++ b/sdk/go/auth0/rule.go @@ -17,33 +17,6 @@ import ( // // !> This resource is deprecated. Refer to the [guide on how to migrate from rules to actions](https://auth0.com/docs/customize/actions/migrate/migrate-from-rules-to-actions) and manage your actions using the `Action` resource. // -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := auth0.NewRule(ctx, "myRule", &auth0.RuleArgs{ -// Enabled: pulumi.Bool(true), -// Script: pulumi.String(" function (user, context, callback) {\n callback(null, user, context);\n }\n \n"), -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// // ## Import // // Existing rules can be imported using their ID. # Example diff --git a/sdk/go/auth0/ruleConfig.go b/sdk/go/auth0/ruleConfig.go index 5cc56086..bb0ab0b9 100644 --- a/sdk/go/auth0/ruleConfig.go +++ b/sdk/go/auth0/ruleConfig.go @@ -15,40 +15,6 @@ import ( // With Auth0, you can create custom Javascript snippets that run in a secure, isolated sandbox as part of your authentication pipeline, which are otherwise known as rules. This resource allows you to create and manage variables that are available to all rules via Auth0's global configuration object. Used in conjunction with configured rules. // -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := auth0.NewRule(ctx, "myRule", &auth0.RuleArgs{ -// Enabled: pulumi.Bool(true), -// Script: pulumi.String(" function (user, context, callback) {\n callback(null, user, context);\n }\n \n"), -// }) -// if err != nil { -// return err -// } -// _, err = auth0.NewRuleConfig(ctx, "myRuleConfig", &auth0.RuleConfigArgs{ -// Key: pulumi.String("foo"), -// Value: pulumi.String("bar"), -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// // ## Import // // Existing rule configs can be imported using their key name. # Example diff --git a/sdk/go/auth0/tenant.go b/sdk/go/auth0/tenant.go index e99f04f2..c7ec629e 100644 --- a/sdk/go/auth0/tenant.go +++ b/sdk/go/auth0/tenant.go @@ -17,58 +17,6 @@ import ( // > Creating tenants through the Management API is not currently supported. Therefore, this resource can only // manage an existing tenant created through the Auth0 dashboard. // -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := auth0.NewTenant(ctx, "myTenant", &auth0.TenantArgs{ -// AllowedLogoutUrls: pulumi.StringArray{ -// pulumi.String("http://example.com/logout"), -// }, -// DefaultRedirectionUri: pulumi.String("https://example.com/login"), -// EnabledLocales: pulumi.StringArray{ -// pulumi.String("en"), -// }, -// Flags: &auth0.TenantFlagsArgs{ -// DisableClickjackProtectionHeaders: pulumi.Bool(true), -// DisableFieldsMapFix: pulumi.Bool(false), -// DisableManagementApiSmsObfuscation: pulumi.Bool(false), -// EnablePublicSignupUserExistsError: pulumi.Bool(true), -// NoDiscloseEnterpriseConnections: pulumi.Bool(false), -// UseScopeDescriptionsForConsent: pulumi.Bool(true), -// }, -// FriendlyName: pulumi.String("Tenant Name"), -// PictureUrl: pulumi.String("http://example.com/logo.png"), -// SandboxVersion: pulumi.String("12"), -// SessionCookie: &auth0.TenantSessionCookieArgs{ -// Mode: pulumi.String("non-persistent"), -// }, -// SessionLifetime: pulumi.Float64(8760), -// Sessions: &auth0.TenantSessionsArgs{ -// OidcLogoutPromptEnabled: pulumi.Bool(false), -// }, -// SupportEmail: pulumi.String("support@example.com"), -// SupportUrl: pulumi.String("http://example.com/support"), -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// // ## Import // // As this is not a resource identifiable by an ID within the Auth0 Management API, tenant can be imported using a random string. # We recommend [Version 4 UUID](https://www.uuidgenerator.net/version4) # Example diff --git a/sdk/go/auth0/triggerAction.go b/sdk/go/auth0/triggerAction.go index 77af9690..33e503e8 100644 --- a/sdk/go/auth0/triggerAction.go +++ b/sdk/go/auth0/triggerAction.go @@ -21,44 +21,6 @@ import ( // the action bindings to a trigger. To avoid potential issues, it is recommended not to use this resource in conjunction // with the `TriggerAction` resource when binding actions to the same trigger. // -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// loginAlert, err := auth0.NewAction(ctx, "loginAlert", &auth0.ActionArgs{ -// Code: pulumi.String("exports.onContinuePostLogin = async (event, api) => {\n console.log(\"foo\");\n};\"\n"), -// Deploy: pulumi.Bool(true), -// SupportedTriggers: &auth0.ActionSupportedTriggersArgs{ -// Id: pulumi.String("post-login"), -// Version: pulumi.String("v3"), -// }, -// }) -// if err != nil { -// return err -// } -// _, err = auth0.NewTriggerAction(ctx, "postLoginAlertAction", &auth0.TriggerActionArgs{ -// Trigger: pulumi.String("post-login"), -// ActionId: loginAlert.ID(), -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// // ## Import // // This resource can be imported by specifying the trigger and action ID separated by "::" (note the double colon) :: # Example diff --git a/sdk/go/auth0/triggerActions.go b/sdk/go/auth0/triggerActions.go index 15a60474..aab6bfb2 100644 --- a/sdk/go/auth0/triggerActions.go +++ b/sdk/go/auth0/triggerActions.go @@ -19,64 +19,6 @@ import ( // appends an action to the trigger binding. To avoid potential issues, it is recommended not to use this resource in // conjunction with the `TriggerAction` resource when binding actions to the same trigger. // -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// actionFoo, err := auth0.NewAction(ctx, "actionFoo", &auth0.ActionArgs{ -// Code: pulumi.String("exports.onContinuePostLogin = async (event, api) => {\n console.log(\"foo\");\n};\"\n"), -// Deploy: pulumi.Bool(true), -// SupportedTriggers: &auth0.ActionSupportedTriggersArgs{ -// Id: pulumi.String("post-login"), -// Version: pulumi.String("v3"), -// }, -// }) -// if err != nil { -// return err -// } -// actionBar, err := auth0.NewAction(ctx, "actionBar", &auth0.ActionArgs{ -// Code: pulumi.String("exports.onContinuePostLogin = async (event, api) => {\n console.log(\"bar\");\n};\"\n"), -// Deploy: pulumi.Bool(true), -// SupportedTriggers: &auth0.ActionSupportedTriggersArgs{ -// Id: pulumi.String("post-login"), -// Version: pulumi.String("v3"), -// }, -// }) -// if err != nil { -// return err -// } -// _, err = auth0.NewTriggerActions(ctx, "loginFlow", &auth0.TriggerActionsArgs{ -// Trigger: pulumi.String("post-login"), -// Actions: auth0.TriggerActionsActionArray{ -// &auth0.TriggerActionsActionArgs{ -// Id: actionFoo.ID(), -// DisplayName: actionFoo.Name, -// }, -// &auth0.TriggerActionsActionArgs{ -// Id: actionBar.ID(), -// DisplayName: actionBar.Name, -// }, -// }, -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// // ## Import // // This resource can be imported using the bindings trigger ID. # Example diff --git a/sdk/go/auth0/user.go b/sdk/go/auth0/user.go index 615801b2..949970d2 100644 --- a/sdk/go/auth0/user.go +++ b/sdk/go/auth0/user.go @@ -15,39 +15,6 @@ import ( // With this resource, you can manage user identities, including resetting passwords, and creating, provisioning, blocking, and deleting users. // -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := auth0.NewUser(ctx, "user", &auth0.UserArgs{ -// ConnectionName: pulumi.String("Username-Password-Authentication"), -// Email: pulumi.String("test@test.com"), -// EmailVerified: pulumi.Bool(true), -// Nickname: pulumi.String("some.nickname"), -// Password: pulumi.String("passpass$12$12"), -// Picture: pulumi.String("https://www.example.com/a-valid-picture-url.jpg"), -// UserId: pulumi.String("12345"), -// Username: pulumi.String("unique_username"), -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// // ## Import // // This resource can be imported using the user ID. # Example diff --git a/sdk/go/auth0/userRole.go b/sdk/go/auth0/userRole.go index d9b12ec3..d33acbfb 100644 --- a/sdk/go/auth0/userRole.go +++ b/sdk/go/auth0/userRole.go @@ -19,48 +19,6 @@ import ( // to a user. To avoid potential issues, it is recommended not to use this resource in conjunction with the // `UserRoles` resource when managing roles for the same user id. // -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// admin, err := auth0.NewRole(ctx, "admin", &auth0.RoleArgs{ -// Description: pulumi.String("Administrator"), -// }) -// if err != nil { -// return err -// } -// user, err := auth0.NewUser(ctx, "user", &auth0.UserArgs{ -// ConnectionName: pulumi.String("Username-Password-Authentication"), -// Username: pulumi.String("unique_username"), -// Email: pulumi.String("test@test.com"), -// Password: pulumi.String("passpass$12$12"), -// }) -// if err != nil { -// return err -// } -// _, err = auth0.NewUserRole(ctx, "userRoles", &auth0.UserRoleArgs{ -// UserId: user.ID(), -// RoleId: admin.ID(), -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// // ## Import // // This resource can be imported by specifying the user ID and role ID separated by "::" (note the double colon) :: # Example diff --git a/sdk/go/auth0/userRoles.go b/sdk/go/auth0/userRoles.go index 515bf044..762b09f6 100644 --- a/sdk/go/auth0/userRoles.go +++ b/sdk/go/auth0/userRoles.go @@ -19,50 +19,6 @@ import ( // role to a user. To avoid potential issues, it is recommended not to use this resource in conjunction with the // `UserRole` resource when managing roles for the same user id. // -// ## Example Usage -// -// ```go -// package main -// -// import ( -// -// "github.com/pulumi/pulumi-auth0/sdk/v3/go/auth0" -// "github.com/pulumi/pulumi/sdk/v3/go/pulumi" -// -// ) -// -// func main() { -// pulumi.Run(func(ctx *pulumi.Context) error { -// admin, err := auth0.NewRole(ctx, "admin", &auth0.RoleArgs{ -// Description: pulumi.String("Administrator"), -// }) -// if err != nil { -// return err -// } -// user, err := auth0.NewUser(ctx, "user", &auth0.UserArgs{ -// ConnectionName: pulumi.String("Username-Password-Authentication"), -// Username: pulumi.String("unique_username"), -// Email: pulumi.String("test@test.com"), -// Password: pulumi.String("passpass$12$12"), -// }) -// if err != nil { -// return err -// } -// _, err = auth0.NewUserRoles(ctx, "userRoles", &auth0.UserRolesArgs{ -// UserId: user.ID(), -// Roles: pulumi.StringArray{ -// admin.ID(), -// }, -// }) -// if err != nil { -// return err -// } -// return nil -// }) -// } -// -// ``` -// // ## Import // // This resource can be imported using the user ID. # Example diff --git a/sdk/nodejs/attackProtection.ts b/sdk/nodejs/attackProtection.ts index 63bce0ac..f3169f69 100644 --- a/sdk/nodejs/attackProtection.ts +++ b/sdk/nodejs/attackProtection.ts @@ -9,54 +9,6 @@ import * as utilities from "./utilities"; /** * Auth0 can detect attacks and stop malicious attempts to access your application such as blocking traffic from certain IPs and displaying CAPTCHAs. * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const myProtection = new auth0.AttackProtection("myProtection", { - * breachedPasswordDetection: { - * adminNotificationFrequencies: ["daily"], - * enabled: true, - * method: "standard", - * preUserRegistration: { - * shields: ["block"], - * }, - * shields: [ - * "admin_notification", - * "block", - * ], - * }, - * bruteForceProtection: { - * allowlists: ["127.0.0.1"], - * enabled: true, - * maxAttempts: 5, - * mode: "count_per_identifier_and_ip", - * shields: [ - * "block", - * "user_notification", - * ], - * }, - * suspiciousIpThrottling: { - * allowlists: ["192.168.1.1"], - * enabled: true, - * preLogin: { - * maxAttempts: 100, - * rate: 864000, - * }, - * preUserRegistration: { - * maxAttempts: 50, - * rate: 1200, - * }, - * shields: [ - * "admin_notification", - * "block", - * ], - * }, - * }); - * ``` - * * ## Import * * As this is not a resource identifiable by an ID within the Auth0 Management API, attack_protection can be imported using a random string. # We recommend [Version 4 UUID](https://www.uuidgenerator.net/version4) # Example diff --git a/sdk/nodejs/branding.ts b/sdk/nodejs/branding.ts index 4883b8c1..db8e8f20 100644 --- a/sdk/nodejs/branding.ts +++ b/sdk/nodejs/branding.ts @@ -9,25 +9,6 @@ import * as utilities from "./utilities"; /** * This resource allows you to manage branding within your Auth0 tenant. Auth0 can be customized with a look and feel that aligns with your organization's brand requirements and user expectations. * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * import * as fs from "fs"; - * - * const myBrand = new auth0.Branding("myBrand", { - * logoUrl: "https://mycompany.org/logo.png", - * colors: { - * primary: "#0059d6", - * pageBackground: "#000000", - * }, - * universalLogin: { - * body: fs.readFileSync("universal_login_body.html"), - * }, - * }); - * ``` - * * ## Import * * As this is not a resource identifiable by an ID within the Auth0 Management API, branding can be imported using a random string. # We recommend [Version 4 UUID](https://www.uuidgenerator.net/version4) # Example diff --git a/sdk/nodejs/brandingTheme.ts b/sdk/nodejs/brandingTheme.ts index f0364d92..aadcde92 100644 --- a/sdk/nodejs/brandingTheme.ts +++ b/sdk/nodejs/brandingTheme.ts @@ -9,87 +9,6 @@ import * as utilities from "./utilities"; /** * This resource allows you to manage branding themes for your Universal Login page within your Auth0 tenant. * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * // An example of a fully configured auth0_branding_theme. - * const myTheme = new auth0.BrandingTheme("myTheme", { - * borders: { - * buttonBorderRadius: 1, - * buttonBorderWeight: 1, - * buttonsStyle: "pill", - * inputBorderRadius: 3, - * inputBorderWeight: 1, - * inputsStyle: "pill", - * showWidgetShadow: false, - * widgetBorderWeight: 1, - * widgetCornerRadius: 3, - * }, - * colors: { - * bodyText: "#FF00CC", - * error: "#FF00CC", - * header: "#FF00CC", - * icons: "#FF00CC", - * inputBackground: "#FF00CC", - * inputBorder: "#FF00CC", - * inputFilledText: "#FF00CC", - * inputLabelsPlaceholders: "#FF00CC", - * linksFocusedComponents: "#FF00CC", - * primaryButton: "#FF00CC", - * primaryButtonLabel: "#FF00CC", - * secondaryButtonBorder: "#FF00CC", - * secondaryButtonLabel: "#FF00CC", - * success: "#FF00CC", - * widgetBackground: "#FF00CC", - * widgetBorder: "#FF00CC", - * }, - * fonts: { - * bodyText: { - * bold: false, - * size: 100, - * }, - * buttonsText: { - * bold: false, - * size: 100, - * }, - * fontUrl: "https://google.com/font.woff", - * inputLabels: { - * bold: false, - * size: 100, - * }, - * links: { - * bold: false, - * size: 100, - * }, - * linksStyle: "normal", - * referenceTextSize: 12, - * subtitle: { - * bold: false, - * size: 100, - * }, - * title: { - * bold: false, - * size: 100, - * }, - * }, - * pageBackground: { - * backgroundColor: "#000000", - * backgroundImageUrl: "https://google.com/background.png", - * pageLayout: "center", - * }, - * widget: { - * headerTextAlignment: "center", - * logoHeight: 55, - * logoPosition: "center", - * logoUrl: "https://google.com/logo.png", - * socialButtonsLayout: "top", - * }, - * }); - * ``` - * * ## Import * * This resource can be imported by specifying the Branding Theme ID. # Example diff --git a/sdk/nodejs/client.ts b/sdk/nodejs/client.ts index ab8fd3dd..d7b18705 100644 --- a/sdk/nodejs/client.ts +++ b/sdk/nodejs/client.ts @@ -9,78 +9,6 @@ import * as utilities from "./utilities"; /** * With this resource, you can set up applications that use Auth0 for authentication and configure allowed callback URLs and secrets for these applications. * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const myClient = new auth0.Client("myClient", { - * addons: { - * samlp: { - * audience: "https://example.com/saml", - * createUpnClaim: false, - * issuer: "https://example.com", - * mapIdentities: false, - * mapUnknownClaimsAsIs: false, - * mappings: { - * email: "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress", - * name: "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name", - * }, - * nameIdentifierFormat: "urn:oasis:names:tc:SAML:2.0:nameid-format:persistent", - * nameIdentifierProbes: ["http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress"], - * passthroughClaimsWithNoMapping: false, - * signingCert: `-----BEGIN PUBLIC KEY----- - * MIGf...bpP/t3 - * +JGNGIRMj1hF1rnb6QIDAQAB - * -----END PUBLIC KEY----- - * - * `, - * }, - * }, - * allowedLogoutUrls: ["https://example.com"], - * allowedOrigins: ["https://example.com"], - * appType: "non_interactive", - * callbacks: ["https://example.com/callback"], - * clientMetadata: { - * foo: "zoo", - * }, - * customLoginPageOn: true, - * description: "Test Applications Long Description", - * grantTypes: [ - * "authorization_code", - * "http://auth0.com/oauth/grant-type/password-realm", - * "implicit", - * "password", - * "refresh_token", - * ], - * isFirstParty: true, - * isTokenEndpointIpHeaderTrusted: true, - * jwtConfiguration: { - * alg: "RS256", - * lifetimeInSeconds: 300, - * scopes: { - * foo: "bar", - * }, - * secretEncoded: true, - * }, - * mobile: { - * ios: { - * appBundleIdentifier: "com.my.bundle.id", - * teamId: "9JA89QQLNQ", - * }, - * }, - * oidcConformant: false, - * refreshToken: { - * expirationType: "expiring", - * leeway: 0, - * rotationType: "rotating", - * tokenLifetime: 2592000, - * }, - * webOrigins: ["https://example.com"], - * }); - * ``` - * * ## Import * * This resource can be imported by specifying the client ID. # Example diff --git a/sdk/nodejs/clientCredentials.ts b/sdk/nodejs/clientCredentials.ts index 9b5c6e58..2c690d0d 100644 --- a/sdk/nodejs/clientCredentials.ts +++ b/sdk/nodejs/clientCredentials.ts @@ -12,58 +12,6 @@ import * as utilities from "./utilities"; * > Refer to the client secret rotation guide * for instructions on how to rotate client secrets with zero downtime. * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const myClient = new auth0.Client("myClient", { - * appType: "non_interactive", - * jwtConfiguration: { - * alg: "RS256", - * }, - * }); - * // Configuring client_secret_post as an authentication method. - * const testClientCredentials = new auth0.ClientCredentials("testClientCredentials", { - * clientId: myClient.id, - * authenticationMethod: "client_secret_post", - * }); - * // Configuring client_secret_basic as an authentication method. - * const testIndex_clientCredentialsClientCredentials = new auth0.ClientCredentials("testIndex/clientCredentialsClientCredentials", { - * clientId: myClient.id, - * authenticationMethod: "client_secret_basic", - * }); - * // Configuring none as an authentication method. - * const testAuth0Index_clientCredentialsClientCredentials = new auth0.ClientCredentials("testAuth0Index/clientCredentialsClientCredentials", { - * clientId: myClient.id, - * authenticationMethod: "none", - * }); - * // Configuring private_key_jwt as an authentication method. - * const testAuth0Index_clientCredentialsClientCredentials1 = new auth0.ClientCredentials("testAuth0Index/clientCredentialsClientCredentials1", { - * clientId: myClient.id, - * authenticationMethod: "private_key_jwt", - * privateKeyJwt: { - * credentials: [{ - * name: "Testing Credentials 1", - * credentialType: "public_key", - * algorithm: "RS256", - * parseExpiryFromCert: true, - * pem: `-----BEGIN CERTIFICATE----- - * MIIFWDCCA0ACCQDXqpBo3R...G9w0BAQsFADBuMQswCQYDVQQGEwJl - * -----END CERTIFICATE----- - * `, - * }], - * }, - * }); - * // Configuring the client_secret. - * const testAuth0Index_clientCredentialsClientCredentials2 = new auth0.ClientCredentials("testAuth0Index/clientCredentialsClientCredentials2", { - * clientId: myClient.id, - * authenticationMethod: "client_secret_basic", - * clientSecret: "LUFqPx+sRLjbL7peYRPFmFu-bbvE7u7og4YUNe_C345=683341", - * }); - * ``` - * * ## Import * * This resource can be imported by specifying the client ID. # Example diff --git a/sdk/nodejs/connection.ts b/sdk/nodejs/connection.ts index 1a82a8d1..ecb8ccbd 100644 --- a/sdk/nodejs/connection.ts +++ b/sdk/nodejs/connection.ts @@ -13,291 +13,6 @@ import * as utilities from "./utilities"; * creation of multiple connections per strategy, the additional connections may not be visible in the Auth0 dashboard. * * ## Example Usage - * ### Google OAuth2 Connection - * - * > Your Auth0 account may be pre-configured with a `google-oauth2` connection. - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const googleOauth2 = new auth0.Connection("googleOauth2", { - * options: { - * allowedAudiences: [ - * "example.com", - * "api.example.com", - * ], - * clientId: "", - * clientSecret: "", - * nonPersistentAttrs: [ - * "ethnicity", - * "gender", - * ], - * scopes: [ - * "email", - * "profile", - * "gmail", - * "youtube", - * ], - * setUserRootAttributes: "on_each_login", - * }, - * strategy: "google-oauth2", - * }); - * ``` - * ### Facebook Connection - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const facebook = new auth0.Connection("facebook", { - * options: { - * clientId: "", - * clientSecret: "", - * nonPersistentAttrs: [ - * "ethnicity", - * "gender", - * ], - * scopes: [ - * "public_profile", - * "email", - * "groups_access_member_info", - * "user_birthday", - * ], - * setUserRootAttributes: "on_each_login", - * }, - * strategy: "facebook", - * }); - * ``` - * ### Apple Connection - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const apple = new auth0.Connection("apple", { - * options: { - * clientId: "", - * clientSecret: `-----BEGIN PRIVATE KEY----- - * MIHBAgEAMA0GCSqGSIb3DQEBAQUABIGsMIGpAgEAA - * -----END PRIVATE KEY----- - * `, - * keyId: "", - * nonPersistentAttrs: [ - * "ethnicity", - * "gender", - * ], - * scopes: [ - * "email", - * "name", - * ], - * setUserRootAttributes: "on_first_login", - * teamId: "", - * }, - * strategy: "apple", - * }); - * ``` - * ### LinkedIn Connection - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const linkedin = new auth0.Connection("linkedin", { - * options: { - * clientId: "", - * clientSecret: "", - * nonPersistentAttrs: [ - * "ethnicity", - * "gender", - * ], - * scopes: [ - * "basic_profile", - * "profile", - * "email", - * ], - * setUserRootAttributes: "on_each_login", - * strategyVersion: 2, - * }, - * strategy: "linkedin", - * }); - * ``` - * ### GitHub Connection - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const github = new auth0.Connection("github", { - * options: { - * clientId: "", - * clientSecret: "", - * nonPersistentAttrs: [ - * "ethnicity", - * "gender", - * ], - * scopes: [ - * "email", - * "profile", - * "public_repo", - * "repo", - * ], - * setUserRootAttributes: "on_each_login", - * }, - * strategy: "github", - * }); - * ``` - * ### SalesForce Connection - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const salesforce = new auth0.Connection("salesforce", { - * options: { - * clientId: "", - * clientSecret: "", - * communityBaseUrl: "https://salesforce.example.com", - * nonPersistentAttrs: [ - * "ethnicity", - * "gender", - * ], - * scopes: [ - * "openid", - * "email", - * ], - * setUserRootAttributes: "on_first_login", - * }, - * strategy: "salesforce", - * }); - * ``` - * ### OAuth2 Connection - * - * Also applies to following connection strategies: `dropbox`, `bitbucket`, `paypal`, `twitter`, `amazon`, `yahoo`, `box`, `wordpress`, `shopify`, `custom` - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const oauth2 = new auth0.Connection("oauth2", { - * options: { - * authorizationEndpoint: "https://auth.example.com/oauth2/authorize", - * clientId: "", - * clientSecret: "", - * iconUrl: "https://auth.example.com/assets/logo.png", - * nonPersistentAttrs: [ - * "ethnicity", - * "gender", - * ], - * pkceEnabled: true, - * scopes: [ - * "basic_profile", - * "profile", - * "email", - * ], - * scripts: { - * fetchUserProfile: ` function fetchUserProfile(accessToken, context, callback) { - * return callback(new Error("Whoops!")); - * } - * - * `, - * }, - * setUserRootAttributes: "on_each_login", - * tokenEndpoint: "https://auth.example.com/oauth2/token", - * }, - * strategy: "oauth2", - * }); - * ``` - * ### SMS Connection - * - * > To be able to see this in the management dashboard as well, the name of the connection must be set to "sms". - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const sms = new auth0.Connection("sms", { - * isDomainConnection: false, - * options: { - * bruteForceProtection: true, - * disableSignup: false, - * forwardRequestInfo: true, - * from: "+15555555555", - * gatewayAuthentication: { - * audience: "https://somewhere.com/sms-gateway", - * method: "bearer", - * secret: "4e2680bb74ec2ae24736476dd37ed6c2", - * secretBase64Encoded: false, - * subject: "test.us.auth0.com:sms", - * }, - * gatewayUrl: "https://somewhere.com/sms-gateway", - * name: "sms", - * provider: "sms_gateway", - * syntax: "md_with_macros", - * template: "@@password@@", - * totp: { - * length: 6, - * timeStep: 300, - * }, - * }, - * strategy: "sms", - * }); - * ``` - * ### Email Connection - * - * > To be able to see this in the management dashboard as well, the name of the connection must be set to "email". - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const passwordlessEmail = new auth0.Connection("passwordlessEmail", { - * options: { - * authParams: { - * responseType: "code", - * scope: "openid email profile offline_access", - * }, - * bruteForceProtection: true, - * disableSignup: false, - * from: "{{ application.name }} ", - * name: "email", - * nonPersistentAttrs: [], - * setUserRootAttributes: "on_each_login", - * subject: "Welcome to {{ application.name }}", - * syntax: "liquid", - * template: "This is the body of the email", - * totp: { - * length: 6, - * timeStep: 300, - * }, - * }, - * strategy: "email", - * }); - * ``` - * ### WindowsLive Connection - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const windowslive = new auth0.Connection("windowslive", { - * options: { - * clientId: "", - * clientSecret: "", - * nonPersistentAttrs: [ - * "ethnicity", - * "gender", - * ], - * scopes: [ - * "signin", - * "graph_user", - * ], - * setUserRootAttributes: "on_first_login", - * strategyVersion: 2, - * }, - * strategy: "windowslive", - * }); - * ``` * * ## Import * diff --git a/sdk/nodejs/connectionClient.ts b/sdk/nodejs/connectionClient.ts index 526cf772..74892ada 100644 --- a/sdk/nodejs/connectionClient.ts +++ b/sdk/nodejs/connectionClient.ts @@ -12,22 +12,6 @@ import * as utilities from "./utilities"; * resource in conjunction with the `auth0.ConnectionClients` resource when managing enabled clients for the * same connection id. * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const myConn = new auth0.Connection("myConn", {strategy: "auth0"}); - * const myClient = new auth0.Client("myClient", {}); - * // One connection to one client association. - * // To prevent issues, avoid using this resource together with the `auth0_connection_clients` resource. - * const myConnClientAssoc = new auth0.ConnectionClient("myConnClientAssoc", { - * connectionId: myConn.id, - * clientId: myClient.id, - * }); - * ``` - * * ## Import * * This resource can be imported by specifying the connection ID and client ID separated by "::" (note the double colon) :: # Example diff --git a/sdk/nodejs/connectionClients.ts b/sdk/nodejs/connectionClients.ts index 5d48fe0e..4ef9e739 100644 --- a/sdk/nodejs/connectionClients.ts +++ b/sdk/nodejs/connectionClients.ts @@ -12,26 +12,6 @@ import * as utilities from "./utilities"; * resource in conjunction with the `auth0.ConnectionClient` resource when managing enabled clients for the same * connection id. * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const myConn = new auth0.Connection("myConn", {strategy: "auth0"}); - * const myFirstClient = new auth0.Client("myFirstClient", {}); - * const mySecondClient = new auth0.Client("mySecondClient", {}); - * // One connection to many clients association. - * // To prevent issues, avoid using this resource together with the `auth0_connection_client` resource. - * const myConnClientsAssoc = new auth0.ConnectionClients("myConnClientsAssoc", { - * connectionId: myConn.id, - * enabledClients: [ - * myFirstClient.id, - * mySecondClient.id, - * ], - * }); - * ``` - * * ## Import * * This resource can be imported by specifying the Connection ID. # Example diff --git a/sdk/nodejs/customDomain.ts b/sdk/nodejs/customDomain.ts index 7a3678b5..f5239e6a 100644 --- a/sdk/nodejs/customDomain.ts +++ b/sdk/nodejs/customDomain.ts @@ -9,18 +9,6 @@ import * as utilities from "./utilities"; /** * With Auth0, you can use a custom domain to maintain a consistent user experience. This resource allows you to create and manage a custom domain within your Auth0 tenant. * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const myCustomDomain = new auth0.CustomDomain("myCustomDomain", { - * domain: "auth.example.com", - * type: "auth0_managed_certs", - * }); - * ``` - * * ## Import * * Custom domains can be imported using their ID. # You can find existing custom domain IDs using the Auth0 Management API. https://auth0.com/docs/api/management/v2#!/Custom_Domains/get_custom_domains # Example diff --git a/sdk/nodejs/emailProvider.ts b/sdk/nodejs/emailProvider.ts index 1a75feb8..2c31308e 100644 --- a/sdk/nodejs/emailProvider.ts +++ b/sdk/nodejs/emailProvider.ts @@ -9,42 +9,6 @@ import * as utilities from "./utilities"; /** * With Auth0, you can have standard welcome, password reset, and account verification email-based workflows built right into Auth0. This resource allows you to configure email providers, so you can route all emails that are part of Auth0's authentication workflows through the supported high-volume email service of your choice. * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * // This is an example on how to set up the email provider with Amazon SES. - * const amazonSesEmailProvider = new auth0.EmailProvider("amazonSesEmailProvider", { - * credentials: { - * accessKeyId: "AKIAXXXXXXXXXXXXXXXX", - * region: "us-east-1", - * secretAccessKey: "7e8c2148xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx", - * }, - * defaultFromAddress: "accounts@example.com", - * enabled: true, - * }); - * // This is an example on how to set up the email provider with Sendgrid. - * const sendgridEmailProvider = new auth0.EmailProvider("sendgridEmailProvider", { - * credentials: { - * apiKey: "secretAPIKey", - * }, - * defaultFromAddress: "accounts@example.com", - * enabled: true, - * }); - * // This is an example on how to set up the email provider with MS365. - * const smtpEmailProvider = new auth0.EmailProvider("smtpEmailProvider", { - * credentials: { - * ms365ClientId: "ms365_client_id", - * ms365ClientSecret: "ms365_client_secret", - * ms365TenantId: "ms365_tenant_id", - * }, - * defaultFromAddress: "accounts@example.com", - * enabled: true, - * }); - * ``` - * * ## Import * * As this is not a resource identifiable by an ID within the Auth0 Management API, email can be imported using a random string. # We recommend [Version 4 UUID](https://www.uuidgenerator.net/version4) # Example diff --git a/sdk/nodejs/getAttackProtection.ts b/sdk/nodejs/getAttackProtection.ts index 1af3bd28..fb5ffae2 100644 --- a/sdk/nodejs/getAttackProtection.ts +++ b/sdk/nodejs/getAttackProtection.ts @@ -8,15 +8,6 @@ import * as utilities from "./utilities"; /** * Use this data source to access information about the tenant's attack protection settings. - * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const myProtection = auth0.getAttackProtection({}); - * ``` */ export function getAttackProtection(opts?: pulumi.InvokeOptions): Promise { @@ -48,15 +39,6 @@ export interface GetAttackProtectionResult { } /** * Use this data source to access information about the tenant's attack protection settings. - * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const myProtection = auth0.getAttackProtection({}); - * ``` */ export function getAttackProtectionOutput(opts?: pulumi.InvokeOptions): pulumi.Output { return pulumi.output(getAttackProtection(opts)) diff --git a/sdk/nodejs/getBranding.ts b/sdk/nodejs/getBranding.ts index 355feb79..109b00b3 100644 --- a/sdk/nodejs/getBranding.ts +++ b/sdk/nodejs/getBranding.ts @@ -8,15 +8,6 @@ import * as utilities from "./utilities"; /** * Use this data source to access information about the tenant's branding settings. - * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const myBranding = auth0.getBranding({}); - * ``` */ export function getBranding(opts?: pulumi.InvokeOptions): Promise { @@ -56,15 +47,6 @@ export interface GetBrandingResult { } /** * Use this data source to access information about the tenant's branding settings. - * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const myBranding = auth0.getBranding({}); - * ``` */ export function getBrandingOutput(opts?: pulumi.InvokeOptions): pulumi.Output { return pulumi.output(getBranding(opts)) diff --git a/sdk/nodejs/getBrandingTheme.ts b/sdk/nodejs/getBrandingTheme.ts index 1d575fa8..aed8d5af 100644 --- a/sdk/nodejs/getBrandingTheme.ts +++ b/sdk/nodejs/getBrandingTheme.ts @@ -8,15 +8,6 @@ import * as utilities from "./utilities"; /** * Use this data source to access information about the tenant's branding theme settings. - * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const myBrandingTheme = auth0.getBrandingTheme({}); - * ``` */ export function getBrandingTheme(opts?: pulumi.InvokeOptions): Promise { @@ -45,15 +36,6 @@ export interface GetBrandingThemeResult { } /** * Use this data source to access information about the tenant's branding theme settings. - * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const myBrandingTheme = auth0.getBrandingTheme({}); - * ``` */ export function getBrandingThemeOutput(opts?: pulumi.InvokeOptions): pulumi.Output { return pulumi.output(getBrandingTheme(opts)) diff --git a/sdk/nodejs/getClient.ts b/sdk/nodejs/getClient.ts index ce6d1a3a..fe97b2af 100644 --- a/sdk/nodejs/getClient.ts +++ b/sdk/nodejs/getClient.ts @@ -8,20 +8,6 @@ import * as utilities from "./utilities"; /** * Data source to retrieve a specific Auth0 application client by `clientId` or `name`. - * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const some-client-by-name = auth0.getClient({ - * name: "Name of my Application", - * }); - * const some-client-by-id = auth0.getClient({ - * clientId: "abcdefghkijklmnopqrstuvwxyz0123456789", - * }); - * ``` */ export function getClient(args?: GetClientArgs, opts?: pulumi.InvokeOptions): Promise { args = args || {}; @@ -197,20 +183,6 @@ export interface GetClientResult { } /** * Data source to retrieve a specific Auth0 application client by `clientId` or `name`. - * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const some-client-by-name = auth0.getClient({ - * name: "Name of my Application", - * }); - * const some-client-by-id = auth0.getClient({ - * clientId: "abcdefghkijklmnopqrstuvwxyz0123456789", - * }); - * ``` */ export function getClientOutput(args?: GetClientOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { return pulumi.output(args).apply((a: any) => getClient(a, opts)) diff --git a/sdk/nodejs/getConnection.ts b/sdk/nodejs/getConnection.ts index 9149a259..55933e7f 100644 --- a/sdk/nodejs/getConnection.ts +++ b/sdk/nodejs/getConnection.ts @@ -8,20 +8,6 @@ import * as utilities from "./utilities"; /** * Data source to retrieve a specific Auth0 connection by `connectionId` or `name`. - * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const some-connection-by-name = auth0.getConnection({ - * name: "Acceptance-Test-Connection-{{.testName}}", - * }); - * const some-connection-by-id = auth0.getConnection({ - * connectionId: "con_abcdefghkijklmnopqrstuvwxyz0123456789", - * }); - * ``` */ export function getConnection(args?: GetConnectionArgs, opts?: pulumi.InvokeOptions): Promise { args = args || {}; @@ -95,20 +81,6 @@ export interface GetConnectionResult { } /** * Data source to retrieve a specific Auth0 connection by `connectionId` or `name`. - * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const some-connection-by-name = auth0.getConnection({ - * name: "Acceptance-Test-Connection-{{.testName}}", - * }); - * const some-connection-by-id = auth0.getConnection({ - * connectionId: "con_abcdefghkijklmnopqrstuvwxyz0123456789", - * }); - * ``` */ export function getConnectionOutput(args?: GetConnectionOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { return pulumi.output(args).apply((a: any) => getConnection(a, opts)) diff --git a/sdk/nodejs/getOrganization.ts b/sdk/nodejs/getOrganization.ts index 97329b8c..50d4caa0 100644 --- a/sdk/nodejs/getOrganization.ts +++ b/sdk/nodejs/getOrganization.ts @@ -8,20 +8,6 @@ import * as utilities from "./utilities"; /** * Data source to retrieve a specific Auth0 organization by `organizationId` or `name`. - * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const some-organization-by-name = auth0.getOrganization({ - * name: "my-org", - * }); - * const some-organization-by-id = auth0.getOrganization({ - * organizationId: "org_abcdefghkijklmnopqrstuvwxyz0123456789", - * }); - * ``` */ export function getOrganization(args?: GetOrganizationArgs, opts?: pulumi.InvokeOptions): Promise { args = args || {}; @@ -83,20 +69,6 @@ export interface GetOrganizationResult { } /** * Data source to retrieve a specific Auth0 organization by `organizationId` or `name`. - * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const some-organization-by-name = auth0.getOrganization({ - * name: "my-org", - * }); - * const some-organization-by-id = auth0.getOrganization({ - * organizationId: "org_abcdefghkijklmnopqrstuvwxyz0123456789", - * }); - * ``` */ export function getOrganizationOutput(args?: GetOrganizationOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { return pulumi.output(args).apply((a: any) => getOrganization(a, opts)) diff --git a/sdk/nodejs/getPages.ts b/sdk/nodejs/getPages.ts index 5e9dfcdf..bc0859c9 100644 --- a/sdk/nodejs/getPages.ts +++ b/sdk/nodejs/getPages.ts @@ -8,15 +8,6 @@ import * as utilities from "./utilities"; /** * Use this data source to access the HTML for the login, reset password, multi-factor authentication and error pages. - * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const myPages = auth0.getPages({}); - * ``` */ export function getPages(opts?: pulumi.InvokeOptions): Promise { @@ -52,15 +43,6 @@ export interface GetPagesResult { } /** * Use this data source to access the HTML for the login, reset password, multi-factor authentication and error pages. - * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const myPages = auth0.getPages({}); - * ``` */ export function getPagesOutput(opts?: pulumi.InvokeOptions): pulumi.Output { return pulumi.output(getPages(opts)) diff --git a/sdk/nodejs/getResourceServer.ts b/sdk/nodejs/getResourceServer.ts index 03b1253e..dfff615f 100644 --- a/sdk/nodejs/getResourceServer.ts +++ b/sdk/nodejs/getResourceServer.ts @@ -8,20 +8,6 @@ import * as utilities from "./utilities"; /** * Data source to retrieve a specific Auth0 resource server by `resourceServerId` or `identifier`. - * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const some-resource-server-by-identifier = auth0.getResourceServer({ - * identifier: "https://my-api.com/v1", - * }); - * const some-resource-server-by-id = auth0.getResourceServer({ - * resourceServerId: "abcdefghkijklmnopqrstuvwxyz0123456789", - * }); - * ``` */ export function getResourceServer(args?: GetResourceServerArgs, opts?: pulumi.InvokeOptions): Promise { args = args || {}; @@ -110,20 +96,6 @@ export interface GetResourceServerResult { } /** * Data source to retrieve a specific Auth0 resource server by `resourceServerId` or `identifier`. - * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const some-resource-server-by-identifier = auth0.getResourceServer({ - * identifier: "https://my-api.com/v1", - * }); - * const some-resource-server-by-id = auth0.getResourceServer({ - * resourceServerId: "abcdefghkijklmnopqrstuvwxyz0123456789", - * }); - * ``` */ export function getResourceServerOutput(args?: GetResourceServerOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { return pulumi.output(args).apply((a: any) => getResourceServer(a, opts)) diff --git a/sdk/nodejs/getRole.ts b/sdk/nodejs/getRole.ts index bb45468d..7e48d080 100644 --- a/sdk/nodejs/getRole.ts +++ b/sdk/nodejs/getRole.ts @@ -8,20 +8,6 @@ import * as utilities from "./utilities"; /** * Data source to retrieve a specific Auth0 role by `roleId` or `name`. - * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const some-role-by-name = auth0.getRole({ - * name: "my-role", - * }); - * const some-role-by-id = auth0.getRole({ - * roleId: "abcdefghkijklmnopqrstuvwxyz0123456789", - * }); - * ``` */ export function getRole(args?: GetRoleArgs, opts?: pulumi.InvokeOptions): Promise { args = args || {}; @@ -75,20 +61,6 @@ export interface GetRoleResult { } /** * Data source to retrieve a specific Auth0 role by `roleId` or `name`. - * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const some-role-by-name = auth0.getRole({ - * name: "my-role", - * }); - * const some-role-by-id = auth0.getRole({ - * roleId: "abcdefghkijklmnopqrstuvwxyz0123456789", - * }); - * ``` */ export function getRoleOutput(args?: GetRoleOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { return pulumi.output(args).apply((a: any) => getRole(a, opts)) diff --git a/sdk/nodejs/getTenant.ts b/sdk/nodejs/getTenant.ts index baa50af8..ff3191bf 100644 --- a/sdk/nodejs/getTenant.ts +++ b/sdk/nodejs/getTenant.ts @@ -8,15 +8,6 @@ import * as utilities from "./utilities"; /** * Use this data source to access information about the tenant this provider is configured to access. - * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const myTenant = auth0.getTenant({}); - * ``` */ export function getTenant(opts?: pulumi.InvokeOptions): Promise { @@ -108,15 +99,6 @@ export interface GetTenantResult { } /** * Use this data source to access information about the tenant this provider is configured to access. - * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const myTenant = auth0.getTenant({}); - * ``` */ export function getTenantOutput(opts?: pulumi.InvokeOptions): pulumi.Output { return pulumi.output(getTenant(opts)) diff --git a/sdk/nodejs/getUser.ts b/sdk/nodejs/getUser.ts index fc1fb587..034fbb8d 100644 --- a/sdk/nodejs/getUser.ts +++ b/sdk/nodejs/getUser.ts @@ -8,17 +8,6 @@ import * as utilities from "./utilities"; /** * Data source to retrieve a specific Auth0 user by `userId`. - * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const myUser = auth0.getUser({ - * userId: "auth0|34fdr23fdsfdfsf", - * }); - * ``` */ export function getUser(args: GetUserArgs, opts?: pulumi.InvokeOptions): Promise { @@ -125,17 +114,6 @@ export interface GetUserResult { } /** * Data source to retrieve a specific Auth0 user by `userId`. - * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const myUser = auth0.getUser({ - * userId: "auth0|34fdr23fdsfdfsf", - * }); - * ``` */ export function getUserOutput(args: GetUserOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { return pulumi.output(args).apply((a: any) => getUser(a, opts)) diff --git a/sdk/nodejs/guardian.ts b/sdk/nodejs/guardian.ts index 44788565..6b8717ce 100644 --- a/sdk/nodejs/guardian.ts +++ b/sdk/nodejs/guardian.ts @@ -9,61 +9,6 @@ import * as utilities from "./utilities"; /** * Multi-Factor Authentication works by requiring additional factors during the login process to prevent unauthorized access. With this resource you can configure some options available for MFA. * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const myGuardian = new auth0.Guardian("myGuardian", { - * duo: { - * enabled: true, - * hostname: "api-hostname", - * integrationKey: "someKey", - * secretKey: "someSecret", - * }, - * email: true, - * otp: true, - * phone: { - * enabled: true, - * messageTypes: [ - * "sms", - * "voice", - * ], - * options: { - * enrollmentMessage: "{{code}} is your verification code for {{tenant.friendly_name}}. Please enter this code to verify your enrollment.", - * verificationMessage: "{{code}} is your verification code for {{tenant.friendly_name}}.", - * }, - * provider: "auth0", - * }, - * policy: "all-applications", - * push: { - * amazonSns: { - * awsAccessKeyId: "test1", - * awsRegion: "us-west-1", - * awsSecretAccessKey: "secretKey", - * snsApnsPlatformApplicationArn: "test_arn", - * snsGcmPlatformApplicationArn: "test_arn", - * }, - * customApp: { - * appName: "CustomApp", - * appleAppLink: "https://itunes.apple.com/us/app/my-app/id123121", - * googleAppLink: "https://play.google.com/store/apps/details?id=com.my.app", - * }, - * enabled: true, - * provider: "sns", - * }, - * recoveryCode: true, - * webauthnPlatform: { - * enabled: true, - * }, - * webauthnRoaming: { - * enabled: true, - * userVerification: "required", - * }, - * }); - * ``` - * * ## Import * * As this is not a resource identifiable by an ID within the Auth0 Management API, guardian can be imported using a random string. # We recommend [Version 4 UUID](https://www.uuidgenerator.net/version4) # Example diff --git a/sdk/nodejs/hook.ts b/sdk/nodejs/hook.ts index b16800d7..cbaa5796 100644 --- a/sdk/nodejs/hook.ts +++ b/sdk/nodejs/hook.ts @@ -9,29 +9,6 @@ import * as utilities from "./utilities"; * * !> This resource is deprecated. Refer to the [guide on how to migrate from hooks to actions](https://auth0.com/docs/customize/actions/migrate/migrate-from-hooks-to-actions) and manage your actions using the `auth0.Action` resource. * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const myHook = new auth0.Hook("myHook", { - * dependencies: { - * auth0: "2.30.0", - * }, - * enabled: true, - * script: ` function (user, context, callback) { - * callback(null, { user }); - * } - * - * `, - * secrets: { - * foo: "bar", - * }, - * triggerId: "pre-user-registration", - * }); - * ``` - * * ## Import * * This resource can be imported by specifying the hook ID. # Example diff --git a/sdk/nodejs/logStream.ts b/sdk/nodejs/logStream.ts index e75b48f3..d7e11676 100644 --- a/sdk/nodejs/logStream.ts +++ b/sdk/nodejs/logStream.ts @@ -9,47 +9,6 @@ import * as utilities from "./utilities"; /** * With this resource, you can manage your Auth0 log streams. * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * // This is an example of an http log stream. - * const myWebhook = new auth0.LogStream("myWebhook", { - * filters: [ - * { - * name: "auth.login.fail", - * type: "category", - * }, - * { - * name: "auth.signup.fail", - * type: "category", - * }, - * ], - * sink: { - * httpAuthorization: "AKIAXXXXXXXXXXXXXXXX", - * httpContentFormat: "JSONOBJECT", - * httpContentType: "application/json", - * httpCustomHeaders: [{ - * header: "foo", - * value: "bar", - * }], - * httpEndpoint: "https://example.com/logs", - * }, - * type: "http", - * }); - * // This is an example of an Amazon EventBridge log stream. - * const exampleAws = new auth0.LogStream("exampleAws", { - * sink: { - * awsAccountId: "my_account_id", - * awsRegion: "us-east-2", - * }, - * status: "active", - * type: "eventbridge", - * }); - * ``` - * * ## Import * * This resource can be imported by specifying the log stream ID. # Example diff --git a/sdk/nodejs/organization.ts b/sdk/nodejs/organization.ts index c63f56c4..1dc9607f 100644 --- a/sdk/nodejs/organization.ts +++ b/sdk/nodejs/organization.ts @@ -15,24 +15,6 @@ import * as utilities from "./utilities"; * - Build administration capabilities into their products, using Organizations * APIs, so that those businesses can manage their own organizations. * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const myOrganization = new auth0.Organization("myOrganization", { - * branding: { - * colors: { - * pageBackground: "#e1e1e1", - * primary: "#f2f2f2", - * }, - * logoUrl: "https://example.com/assets/icons/icon.png", - * }, - * displayName: "Auth0 Inc.", - * }); - * ``` - * * ## Import * * This resource can be imported by specifying the organization ID. # Example diff --git a/sdk/nodejs/organizationConnection.ts b/sdk/nodejs/organizationConnection.ts index 895812bb..5a7a4224 100644 --- a/sdk/nodejs/organizationConnection.ts +++ b/sdk/nodejs/organizationConnection.ts @@ -12,21 +12,6 @@ import * as utilities from "./utilities"; * resource in conjunction with the `auth0.OrganizationConnections` resource when managing enabled connections for the * same organization id. * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const myConnection = new auth0.Connection("myConnection", {strategy: "auth0"}); - * const myOrganization = new auth0.Organization("myOrganization", {displayName: "My Organization"}); - * const myOrgConn = new auth0.OrganizationConnection("myOrgConn", { - * organizationId: myOrganization.id, - * connectionId: myConnection.id, - * assignMembershipOnLogin: true, - * }); - * ``` - * * ## Import * * This resource can be imported by specifying the organization ID and connection ID separated by "::" (note the double colon) :: # Example diff --git a/sdk/nodejs/organizationConnections.ts b/sdk/nodejs/organizationConnections.ts index ff131180..bf1a088c 100644 --- a/sdk/nodejs/organizationConnections.ts +++ b/sdk/nodejs/organizationConnections.ts @@ -14,30 +14,6 @@ import * as utilities from "./utilities"; * resource in conjunction with the `auth0.OrganizationConnection` resource when managing connections for the same * organization id. * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const myConnection_1 = new auth0.Connection("myConnection-1", {strategy: "auth0"}); - * const myConnection_2 = new auth0.Connection("myConnection-2", {strategy: "auth0"}); - * const myOrganization = new auth0.Organization("myOrganization", {displayName: "My Organization"}); - * const one_to_many = new auth0.OrganizationConnections("one-to-many", { - * organizationId: myOrganization.id, - * enabledConnections: [ - * { - * connectionId: myConnection_1.id, - * assignMembershipOnLogin: true, - * }, - * { - * connectionId: myConnection_2.id, - * assignMembershipOnLogin: true, - * }, - * ], - * }); - * ``` - * * ## Import * * This resource can be imported by specifying the organization ID. # Example diff --git a/sdk/nodejs/organizationMember.ts b/sdk/nodejs/organizationMember.ts index be90d53c..2e7c5a9e 100644 --- a/sdk/nodejs/organizationMember.ts +++ b/sdk/nodejs/organizationMember.ts @@ -11,25 +11,6 @@ import * as utilities from "./utilities"; * all the members assigned to an organization. To avoid potential issues, it is recommended not to use this resource in * conjunction with the `auth0.OrganizationMembers` resource when managing members for the same organization id. * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const user = new auth0.User("user", { - * email: "test-user@auth0.com", - * connectionName: "Username-Password-Authentication", - * emailVerified: true, - * password: "MyPass123$", - * }); - * const myOrg = new auth0.Organization("myOrg", {displayName: "Admin"}); - * const myOrgMember = new auth0.OrganizationMember("myOrgMember", { - * organizationId: myOrg.id, - * userId: user.id, - * }); - * ``` - * * ## Import * * This resource can be imported by specifying the organization ID and user ID separated by "::" (note the double colon) :: # Example diff --git a/sdk/nodejs/organizationMemberRole.ts b/sdk/nodejs/organizationMemberRole.ts index 9b2c11ad..78373b86 100644 --- a/sdk/nodejs/organizationMemberRole.ts +++ b/sdk/nodejs/organizationMemberRole.ts @@ -7,36 +7,6 @@ import * as utilities from "./utilities"; /** * This resource is used to manage the roles assigned to an organization member. * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const reader = new auth0.Role("reader", {}); - * const writer = new auth0.Role("writer", {}); - * const user = new auth0.User("user", { - * connectionName: "Username-Password-Authentication", - * email: "test-user@auth0.com", - * password: "MyPass123$", - * }); - * const myOrg = new auth0.Organization("myOrg", {displayName: "Some Org"}); - * const myOrgMember = new auth0.OrganizationMember("myOrgMember", { - * organizationId: myOrg.id, - * userId: user.id, - * }); - * const role1 = new auth0.OrganizationMemberRole("role1", { - * organizationId: myOrg.id, - * userId: user.id, - * roleId: reader.id, - * }); - * const role2 = new auth0.OrganizationMemberRole("role2", { - * organizationId: myOrg.id, - * userId: user.id, - * roleId: writer.id, - * }); - * ``` - * * ## Import * * This resource can be imported by specifying the organization ID, user ID and role ID separated by "::" (note the double colon) :::: # Example diff --git a/sdk/nodejs/organizationMemberRoles.ts b/sdk/nodejs/organizationMemberRoles.ts index d11e113f..b58092f5 100644 --- a/sdk/nodejs/organizationMemberRoles.ts +++ b/sdk/nodejs/organizationMemberRoles.ts @@ -7,34 +7,6 @@ import * as utilities from "./utilities"; /** * This resource is used to manage the roles assigned to an organization member. * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const reader = new auth0.Role("reader", {}); - * const writer = new auth0.Role("writer", {}); - * const user = new auth0.User("user", { - * connectionName: "Username-Password-Authentication", - * email: "test-user@auth0.com", - * password: "MyPass123$", - * }); - * const myOrg = new auth0.Organization("myOrg", {displayName: "Some Org"}); - * const myOrgMember = new auth0.OrganizationMember("myOrgMember", { - * organizationId: myOrg.id, - * userId: user.id, - * }); - * const myOrgMemberRoles = new auth0.OrganizationMemberRoles("myOrgMemberRoles", { - * organizationId: myOrg.id, - * userId: user.id, - * roles: [ - * reader.id, - * writer.id, - * ], - * }); - * ``` - * * ## Import * * This resource can be imported by specifying the organization ID and user ID separated by "::" (note the double colon) :: # Example diff --git a/sdk/nodejs/organizationMembers.ts b/sdk/nodejs/organizationMembers.ts index 08708a00..9e8509ea 100644 --- a/sdk/nodejs/organizationMembers.ts +++ b/sdk/nodejs/organizationMembers.ts @@ -12,32 +12,6 @@ import * as utilities from "./utilities"; * resource in conjunction with the `auth0.OrganizationMember` resource when managing members for the same organization * id. * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const user1 = new auth0.User("user1", { - * connectionName: "Username-Password-Authentication", - * email: "myuser1@auth0.com", - * password: "MyPass123$", - * }); - * const user2 = new auth0.User("user2", { - * connectionName: "Username-Password-Authentication", - * email: "myuser2@auth0.com", - * password: "MyPass123$", - * }); - * const myOrg = new auth0.Organization("myOrg", {displayName: "Some Organization"}); - * const myMembers = new auth0.OrganizationMembers("myMembers", { - * organizationId: myOrg.id, - * members: [ - * user1.id, - * user2.id, - * ], - * }); - * ``` - * * ## Import * * This resource can be imported by specifying the organization ID. # Example diff --git a/sdk/nodejs/pages.ts b/sdk/nodejs/pages.ts index 1043a3d1..63c84aea 100644 --- a/sdk/nodejs/pages.ts +++ b/sdk/nodejs/pages.ts @@ -9,33 +9,6 @@ import * as utilities from "./utilities"; /** * With this resource you can manage custom HTML for the Login, Reset Password, Multi-Factor Authentication and Error pages. * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const myPages = new auth0.Pages("myPages", { - * changePassword: { - * enabled: true, - * html: "My Custom Reset Password Page", - * }, - * error: { - * html: "My Custom Error Page", - * showLogLink: true, - * url: "https://example.com", - * }, - * guardianMfa: { - * enabled: true, - * html: "My Custom MFA Page", - * }, - * login: { - * enabled: true, - * html: "My Custom Login Page", - * }, - * }); - * ``` - * * ## Import * * As this is not a resource identifiable by an ID within the Auth0 Management API, pages can be imported using a random string. # We recommend [Version 4 UUID](https://www.uuidgenerator.net/version4) # Example diff --git a/sdk/nodejs/prompt.ts b/sdk/nodejs/prompt.ts index f4d3ef4b..ed349b9c 100644 --- a/sdk/nodejs/prompt.ts +++ b/sdk/nodejs/prompt.ts @@ -7,19 +7,6 @@ import * as utilities from "./utilities"; /** * With this resource, you can manage your Auth0 prompts, including choosing the login experience version. * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const myPrompt = new auth0.Prompt("myPrompt", { - * identifierFirst: false, - * universalLoginExperience: "new", - * webauthnPlatformFirstFactor: true, - * }); - * ``` - * * ## Import * * As this is not a resource identifiable by an ID within the Auth0 Management API, prompts can be imported using a random string. # We recommend [Version 4 UUID](https://www.uuidgenerator.net/version4) # Example diff --git a/sdk/nodejs/promptCustomText.ts b/sdk/nodejs/promptCustomText.ts index f3248bd1..23fa5969 100644 --- a/sdk/nodejs/promptCustomText.ts +++ b/sdk/nodejs/promptCustomText.ts @@ -7,41 +7,6 @@ import * as utilities from "./utilities"; /** * With this resource, you can manage custom text on your Auth0 prompts. You can read more about custom texts [here](https://auth0.com/docs/customize/universal-login-pages/customize-login-text-prompts). * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const example = new auth0.PromptCustomText("example", { - * prompt: "login", - * language: "en", - * body: JSON.stringify({ - * login: { - * alertListTitle: "Alerts", - * buttonText: "Continue", - * description: "Login to", - * editEmailText: "Edit", - * emailPlaceholder: "Email address", - * federatedConnectionButtonText: "Continue with ${connectionName}", - * footerLinkText: "Sign up", - * footerText: "Don't have an account?", - * forgotPasswordText: "Forgot password?", - * invitationDescription: "Log in to accept ${inviterName}'s invitation to join ${companyName} on ${clientName}.", - * invitationTitle: "You've Been Invited!", - * logoAltText: "${companyName}", - * pageTitle: "Log in | ${clientName}", - * passwordPlaceholder: "Password", - * separatorText: "Or", - * signupActionLinkText: "${footerLinkText}", - * signupActionText: "${footerText}", - * title: "Welcome", - * usernamePlaceholder: "Username or email address", - * }, - * }), - * }); - * ``` - * * ## Import * * This resource can be imported by specifying the prompt and language separated by "::" (note the double colon) :: # Example diff --git a/sdk/nodejs/resourceServer.ts b/sdk/nodejs/resourceServer.ts index 3a065465..a3d42671 100644 --- a/sdk/nodejs/resourceServer.ts +++ b/sdk/nodejs/resourceServer.ts @@ -7,21 +7,6 @@ import * as utilities from "./utilities"; /** * With this resource, you can set up APIs that can be consumed from your authorized applications. * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const myResourceServer = new auth0.ResourceServer("myResourceServer", { - * allowOfflineAccess: true, - * identifier: "https://api.example.com", - * signingAlg: "RS256", - * skipConsentForVerifiableFirstPartyClients: true, - * tokenLifetime: 8600, - * }); - * ``` - * * ## Import * * Existing resource servers can be imported using their ID. # Example diff --git a/sdk/nodejs/resourceServerScope.ts b/sdk/nodejs/resourceServerScope.ts index 2f79f13c..8908af92 100644 --- a/sdk/nodejs/resourceServerScope.ts +++ b/sdk/nodejs/resourceServerScope.ts @@ -11,23 +11,6 @@ import * as utilities from "./utilities"; * all the scopes assigned to a resource server. To avoid potential issues, it is recommended not to use this resource in * conjunction with the `auth0.ResourceServerScopes` resource when managing scopes for the same resource server id. * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const resourceServer = new auth0.ResourceServer("resourceServer", {identifier: "https://api.example.com"}); - * const readPosts = new auth0.ResourceServerScope("readPosts", { - * resourceServerIdentifier: resourceServer.identifier, - * scope: "read:posts", - * }); - * const writePosts = new auth0.ResourceServerScope("writePosts", { - * resourceServerIdentifier: resourceServer.identifier, - * scope: "write:posts", - * }); - * ``` - * * ## Import * * This resource can be imported by specifying the resource identifier and scope name separated by "::" (note the double colon) :: # Example diff --git a/sdk/nodejs/resourceServerScopes.ts b/sdk/nodejs/resourceServerScopes.ts index b85b3195..33867d92 100644 --- a/sdk/nodejs/resourceServerScopes.ts +++ b/sdk/nodejs/resourceServerScopes.ts @@ -14,28 +14,6 @@ import * as utilities from "./utilities"; * resource in conjunction with the `auth0.ResourceServerScope` resource when managing scopes for the same resource * server id. * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const myApi = new auth0.ResourceServer("myApi", {identifier: "https://api.example.com"}); - * const myApiScopes = new auth0.ResourceServerScopes("myApiScopes", { - * resourceServerIdentifier: myApi.identifier, - * scopes: [ - * { - * name: "create:appointments", - * description: "Ability to create appointments", - * }, - * { - * name: "read:appointments", - * description: "Ability to read appointments", - * }, - * ], - * }); - * ``` - * * ## Import * * This resource can be imported by specifying the resource server identifier. # Example diff --git a/sdk/nodejs/role.ts b/sdk/nodejs/role.ts index 33bdc09a..1934ca3c 100644 --- a/sdk/nodejs/role.ts +++ b/sdk/nodejs/role.ts @@ -7,15 +7,6 @@ import * as utilities from "./utilities"; /** * With this resource, you can create and manage collections of permissions that can be assigned to users, which are otherwise known as roles. Permissions (scopes) are created on `auth0.ResourceServer`, then associated with roles and optionally, users using this resource. * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const myRole = new auth0.Role("myRole", {description: "Role Description..."}); - * ``` - * * ## Import * * Existing roles can be imported using their ID. # Example diff --git a/sdk/nodejs/rule.ts b/sdk/nodejs/rule.ts index 6bf80a87..572aca6c 100644 --- a/sdk/nodejs/rule.ts +++ b/sdk/nodejs/rule.ts @@ -9,22 +9,6 @@ import * as utilities from "./utilities"; * * !> This resource is deprecated. Refer to the [guide on how to migrate from rules to actions](https://auth0.com/docs/customize/actions/migrate/migrate-from-rules-to-actions) and manage your actions using the `auth0.Action` resource. * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const myRule = new auth0.Rule("myRule", { - * enabled: true, - * script: ` function (user, context, callback) { - * callback(null, user, context); - * } - * - * `, - * }); - * ``` - * * ## Import * * Existing rules can be imported using their ID. # Example diff --git a/sdk/nodejs/ruleConfig.ts b/sdk/nodejs/ruleConfig.ts index 59c88cdf..371e334b 100644 --- a/sdk/nodejs/ruleConfig.ts +++ b/sdk/nodejs/ruleConfig.ts @@ -7,26 +7,6 @@ import * as utilities from "./utilities"; /** * With Auth0, you can create custom Javascript snippets that run in a secure, isolated sandbox as part of your authentication pipeline, which are otherwise known as rules. This resource allows you to create and manage variables that are available to all rules via Auth0's global configuration object. Used in conjunction with configured rules. * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const myRule = new auth0.Rule("myRule", { - * enabled: true, - * script: ` function (user, context, callback) { - * callback(null, user, context); - * } - * - * `, - * }); - * const myRuleConfig = new auth0.RuleConfig("myRuleConfig", { - * key: "foo", - * value: "bar", - * }); - * ``` - * * ## Import * * Existing rule configs can be imported using their key name. # Example diff --git a/sdk/nodejs/tenant.ts b/sdk/nodejs/tenant.ts index 2da40fc4..b58da2ed 100644 --- a/sdk/nodejs/tenant.ts +++ b/sdk/nodejs/tenant.ts @@ -12,39 +12,6 @@ import * as utilities from "./utilities"; * > Creating tenants through the Management API is not currently supported. Therefore, this resource can only * manage an existing tenant created through the Auth0 dashboard. * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const myTenant = new auth0.Tenant("myTenant", { - * allowedLogoutUrls: ["http://example.com/logout"], - * defaultRedirectionUri: "https://example.com/login", - * enabledLocales: ["en"], - * flags: { - * disableClickjackProtectionHeaders: true, - * disableFieldsMapFix: false, - * disableManagementApiSmsObfuscation: false, - * enablePublicSignupUserExistsError: true, - * noDiscloseEnterpriseConnections: false, - * useScopeDescriptionsForConsent: true, - * }, - * friendlyName: "Tenant Name", - * pictureUrl: "http://example.com/logo.png", - * sandboxVersion: "12", - * sessionCookie: { - * mode: "non-persistent", - * }, - * sessionLifetime: 8760, - * sessions: { - * oidcLogoutPromptEnabled: false, - * }, - * supportEmail: "support@example.com", - * supportUrl: "http://example.com/support", - * }); - * ``` - * * ## Import * * As this is not a resource identifiable by an ID within the Auth0 Management API, tenant can be imported using a random string. # We recommend [Version 4 UUID](https://www.uuidgenerator.net/version4) # Example diff --git a/sdk/nodejs/triggerAction.ts b/sdk/nodejs/triggerAction.ts index 9b859d27..c7543966 100644 --- a/sdk/nodejs/triggerAction.ts +++ b/sdk/nodejs/triggerAction.ts @@ -13,29 +13,6 @@ import * as utilities from "./utilities"; * the action bindings to a trigger. To avoid potential issues, it is recommended not to use this resource in conjunction * with the `auth0.TriggerAction` resource when binding actions to the same trigger. * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const loginAlert = new auth0.Action("loginAlert", { - * code: `exports.onContinuePostLogin = async (event, api) => { - * console.log("foo"); - * };" - * `, - * deploy: true, - * supportedTriggers: { - * id: "post-login", - * version: "v3", - * }, - * }); - * const postLoginAlertAction = new auth0.TriggerAction("postLoginAlertAction", { - * trigger: "post-login", - * actionId: loginAlert.id, - * }); - * ``` - * * ## Import * * This resource can be imported by specifying the trigger and action ID separated by "::" (note the double colon) :: # Example diff --git a/sdk/nodejs/triggerActions.ts b/sdk/nodejs/triggerActions.ts index e90dd97e..ddc6619f 100644 --- a/sdk/nodejs/triggerActions.ts +++ b/sdk/nodejs/triggerActions.ts @@ -13,49 +13,6 @@ import * as utilities from "./utilities"; * appends an action to the trigger binding. To avoid potential issues, it is recommended not to use this resource in * conjunction with the `auth0.TriggerAction` resource when binding actions to the same trigger. * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const actionFoo = new auth0.Action("actionFoo", { - * code: `exports.onContinuePostLogin = async (event, api) => { - * console.log("foo"); - * };" - * `, - * deploy: true, - * supportedTriggers: { - * id: "post-login", - * version: "v3", - * }, - * }); - * const actionBar = new auth0.Action("actionBar", { - * code: `exports.onContinuePostLogin = async (event, api) => { - * console.log("bar"); - * };" - * `, - * deploy: true, - * supportedTriggers: { - * id: "post-login", - * version: "v3", - * }, - * }); - * const loginFlow = new auth0.TriggerActions("loginFlow", { - * trigger: "post-login", - * actions: [ - * { - * id: actionFoo.id, - * displayName: actionFoo.name, - * }, - * { - * id: actionBar.id, - * displayName: actionBar.name, - * }, - * ], - * }); - * ``` - * * ## Import * * This resource can be imported using the bindings trigger ID. # Example diff --git a/sdk/nodejs/user.ts b/sdk/nodejs/user.ts index c52d78ad..51c47c83 100644 --- a/sdk/nodejs/user.ts +++ b/sdk/nodejs/user.ts @@ -7,24 +7,6 @@ import * as utilities from "./utilities"; /** * With this resource, you can manage user identities, including resetting passwords, and creating, provisioning, blocking, and deleting users. * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * const user = new auth0.User("user", { - * connectionName: "Username-Password-Authentication", - * email: "test@test.com", - * emailVerified: true, - * nickname: "some.nickname", - * password: "passpass$12$12", - * picture: "https://www.example.com/a-valid-picture-url.jpg", - * userId: "12345", - * username: "unique_username", - * }); - * ``` - * * ## Import * * This resource can be imported using the user ID. # Example diff --git a/sdk/nodejs/userRole.ts b/sdk/nodejs/userRole.ts index 9fd80967..70d39d56 100644 --- a/sdk/nodejs/userRole.ts +++ b/sdk/nodejs/userRole.ts @@ -11,26 +11,6 @@ import * as utilities from "./utilities"; * to a user. To avoid potential issues, it is recommended not to use this resource in conjunction with the * `auth0.UserRoles` resource when managing roles for the same user id. * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * // Example: - * const admin = new auth0.Role("admin", {description: "Administrator"}); - * const user = new auth0.User("user", { - * connectionName: "Username-Password-Authentication", - * username: "unique_username", - * email: "test@test.com", - * password: "passpass$12$12", - * }); - * const userRoles = new auth0.UserRole("userRoles", { - * userId: user.id, - * roleId: admin.id, - * }); - * ``` - * * ## Import * * This resource can be imported by specifying the user ID and role ID separated by "::" (note the double colon) :: # Example diff --git a/sdk/nodejs/userRoles.ts b/sdk/nodejs/userRoles.ts index 3d0585d8..573fc1f4 100644 --- a/sdk/nodejs/userRoles.ts +++ b/sdk/nodejs/userRoles.ts @@ -11,26 +11,6 @@ import * as utilities from "./utilities"; * role to a user. To avoid potential issues, it is recommended not to use this resource in conjunction with the * `auth0.UserRole` resource when managing roles for the same user id. * - * ## Example Usage - * - * ```typescript - * import * as pulumi from "@pulumi/pulumi"; - * import * as auth0 from "@pulumi/auth0"; - * - * // Example: - * const admin = new auth0.Role("admin", {description: "Administrator"}); - * const user = new auth0.User("user", { - * connectionName: "Username-Password-Authentication", - * username: "unique_username", - * email: "test@test.com", - * password: "passpass$12$12", - * }); - * const userRoles = new auth0.UserRoles("userRoles", { - * userId: user.id, - * roles: [admin.id], - * }); - * ``` - * * ## Import * * This resource can be imported using the user ID. # Example diff --git a/sdk/python/pulumi_auth0/_inputs.py b/sdk/python/pulumi_auth0/_inputs.py index 95dd1992..f154f12e 100644 --- a/sdk/python/pulumi_auth0/_inputs.py +++ b/sdk/python/pulumi_auth0/_inputs.py @@ -137,9 +137,15 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - name: pulumi.Input[str], - version: pulumi.Input[str], - opts: Optional[pulumi.ResourceOptions]=None): + name: Optional[pulumi.Input[str]] = None, + version: Optional[pulumi.Input[str]] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if name is None: + raise TypeError("Missing 'name' argument") + if version is None: + raise TypeError("Missing 'version' argument") + _setter("name", name) _setter("version", version) @@ -185,9 +191,15 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - name: pulumi.Input[str], - value: pulumi.Input[str], - opts: Optional[pulumi.ResourceOptions]=None): + name: Optional[pulumi.Input[str]] = None, + value: Optional[pulumi.Input[str]] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if name is None: + raise TypeError("Missing 'name' argument") + if value is None: + raise TypeError("Missing 'value' argument") + _setter("name", name) _setter("value", value) @@ -233,9 +245,15 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - id: pulumi.Input[str], - version: pulumi.Input[str], - opts: Optional[pulumi.ResourceOptions]=None): + id: Optional[pulumi.Input[str]] = None, + version: Optional[pulumi.Input[str]] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if id is None: + raise TypeError("Missing 'id' argument") + if version is None: + raise TypeError("Missing 'version' argument") + _setter("id", id) _setter("version", version) @@ -290,12 +308,20 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - enabled: pulumi.Input[bool], + enabled: Optional[pulumi.Input[bool]] = None, admin_notification_frequencies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, method: Optional[pulumi.Input[str]] = None, pre_user_registration: Optional[pulumi.Input['AttackProtectionBreachedPasswordDetectionPreUserRegistrationArgs']] = None, shields: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if enabled is None: + raise TypeError("Missing 'enabled' argument") + if admin_notification_frequencies is None and 'adminNotificationFrequencies' in kwargs: + admin_notification_frequencies = kwargs['adminNotificationFrequencies'] + if pre_user_registration is None and 'preUserRegistration' in kwargs: + pre_user_registration = kwargs['preUserRegistration'] + _setter("enabled", enabled) if admin_notification_frequencies is not None: _setter("admin_notification_frequencies", admin_notification_frequencies) @@ -382,7 +408,9 @@ def __init__(__self__, *, def _configure( _setter: Callable[[Any, Any], None], shields: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if shields is not None: _setter("shields", shields) @@ -425,12 +453,18 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - enabled: pulumi.Input[bool], + enabled: Optional[pulumi.Input[bool]] = None, allowlists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, max_attempts: Optional[pulumi.Input[int]] = None, mode: Optional[pulumi.Input[str]] = None, shields: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if enabled is None: + raise TypeError("Missing 'enabled' argument") + if max_attempts is None and 'maxAttempts' in kwargs: + max_attempts = kwargs['maxAttempts'] + _setter("enabled", enabled) if allowlists is not None: _setter("allowlists", allowlists) @@ -528,12 +562,20 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - enabled: pulumi.Input[bool], + enabled: Optional[pulumi.Input[bool]] = None, allowlists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, pre_login: Optional[pulumi.Input['AttackProtectionSuspiciousIpThrottlingPreLoginArgs']] = None, pre_user_registration: Optional[pulumi.Input['AttackProtectionSuspiciousIpThrottlingPreUserRegistrationArgs']] = None, shields: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if enabled is None: + raise TypeError("Missing 'enabled' argument") + if pre_login is None and 'preLogin' in kwargs: + pre_login = kwargs['preLogin'] + if pre_user_registration is None and 'preUserRegistration' in kwargs: + pre_user_registration = kwargs['preUserRegistration'] + _setter("enabled", enabled) if allowlists is not None: _setter("allowlists", allowlists) @@ -624,7 +666,11 @@ def _configure( _setter: Callable[[Any, Any], None], max_attempts: Optional[pulumi.Input[int]] = None, rate: Optional[pulumi.Input[int]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if max_attempts is None and 'maxAttempts' in kwargs: + max_attempts = kwargs['maxAttempts'] + if max_attempts is not None: _setter("max_attempts", max_attempts) if rate is not None: @@ -674,7 +720,11 @@ def _configure( _setter: Callable[[Any, Any], None], max_attempts: Optional[pulumi.Input[int]] = None, rate: Optional[pulumi.Input[int]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if max_attempts is None and 'maxAttempts' in kwargs: + max_attempts = kwargs['maxAttempts'] + if max_attempts is not None: _setter("max_attempts", max_attempts) if rate is not None: @@ -724,7 +774,11 @@ def _configure( _setter: Callable[[Any, Any], None], page_background: Optional[pulumi.Input[str]] = None, primary: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if page_background is None and 'pageBackground' in kwargs: + page_background = kwargs['pageBackground'] + if page_background is not None: _setter("page_background", page_background) if primary is not None: @@ -770,7 +824,9 @@ def __init__(__self__, *, def _configure( _setter: Callable[[Any, Any], None], url: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if url is not None: _setter("url", url) @@ -834,7 +890,27 @@ def _configure( show_widget_shadow: Optional[pulumi.Input[bool]] = None, widget_border_weight: Optional[pulumi.Input[float]] = None, widget_corner_radius: Optional[pulumi.Input[float]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if button_border_radius is None and 'buttonBorderRadius' in kwargs: + button_border_radius = kwargs['buttonBorderRadius'] + if button_border_weight is None and 'buttonBorderWeight' in kwargs: + button_border_weight = kwargs['buttonBorderWeight'] + if buttons_style is None and 'buttonsStyle' in kwargs: + buttons_style = kwargs['buttonsStyle'] + if input_border_radius is None and 'inputBorderRadius' in kwargs: + input_border_radius = kwargs['inputBorderRadius'] + if input_border_weight is None and 'inputBorderWeight' in kwargs: + input_border_weight = kwargs['inputBorderWeight'] + if inputs_style is None and 'inputsStyle' in kwargs: + inputs_style = kwargs['inputsStyle'] + if show_widget_shadow is None and 'showWidgetShadow' in kwargs: + show_widget_shadow = kwargs['showWidgetShadow'] + if widget_border_weight is None and 'widgetBorderWeight' in kwargs: + widget_border_weight = kwargs['widgetBorderWeight'] + if widget_corner_radius is None and 'widgetCornerRadius' in kwargs: + widget_corner_radius = kwargs['widgetCornerRadius'] + if button_border_radius is not None: _setter("button_border_radius", button_border_radius) if button_border_weight is not None: @@ -1046,7 +1122,37 @@ def _configure( success: Optional[pulumi.Input[str]] = None, widget_background: Optional[pulumi.Input[str]] = None, widget_border: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if base_focus_color is None and 'baseFocusColor' in kwargs: + base_focus_color = kwargs['baseFocusColor'] + if base_hover_color is None and 'baseHoverColor' in kwargs: + base_hover_color = kwargs['baseHoverColor'] + if body_text is None and 'bodyText' in kwargs: + body_text = kwargs['bodyText'] + if input_background is None and 'inputBackground' in kwargs: + input_background = kwargs['inputBackground'] + if input_border is None and 'inputBorder' in kwargs: + input_border = kwargs['inputBorder'] + if input_filled_text is None and 'inputFilledText' in kwargs: + input_filled_text = kwargs['inputFilledText'] + if input_labels_placeholders is None and 'inputLabelsPlaceholders' in kwargs: + input_labels_placeholders = kwargs['inputLabelsPlaceholders'] + if links_focused_components is None and 'linksFocusedComponents' in kwargs: + links_focused_components = kwargs['linksFocusedComponents'] + if primary_button is None and 'primaryButton' in kwargs: + primary_button = kwargs['primaryButton'] + if primary_button_label is None and 'primaryButtonLabel' in kwargs: + primary_button_label = kwargs['primaryButtonLabel'] + if secondary_button_border is None and 'secondaryButtonBorder' in kwargs: + secondary_button_border = kwargs['secondaryButtonBorder'] + if secondary_button_label is None and 'secondaryButtonLabel' in kwargs: + secondary_button_label = kwargs['secondaryButtonLabel'] + if widget_background is None and 'widgetBackground' in kwargs: + widget_background = kwargs['widgetBackground'] + if widget_border is None and 'widgetBorder' in kwargs: + widget_border = kwargs['widgetBorder'] + if base_focus_color is not None: _setter("base_focus_color", base_focus_color) if base_hover_color is not None: @@ -1339,16 +1445,42 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - body_text: pulumi.Input['BrandingThemeFontsBodyTextArgs'], - buttons_text: pulumi.Input['BrandingThemeFontsButtonsTextArgs'], - input_labels: pulumi.Input['BrandingThemeFontsInputLabelsArgs'], - links: pulumi.Input['BrandingThemeFontsLinksArgs'], - subtitle: pulumi.Input['BrandingThemeFontsSubtitleArgs'], - title: pulumi.Input['BrandingThemeFontsTitleArgs'], + body_text: Optional[pulumi.Input['BrandingThemeFontsBodyTextArgs']] = None, + buttons_text: Optional[pulumi.Input['BrandingThemeFontsButtonsTextArgs']] = None, + input_labels: Optional[pulumi.Input['BrandingThemeFontsInputLabelsArgs']] = None, + links: Optional[pulumi.Input['BrandingThemeFontsLinksArgs']] = None, + subtitle: Optional[pulumi.Input['BrandingThemeFontsSubtitleArgs']] = None, + title: Optional[pulumi.Input['BrandingThemeFontsTitleArgs']] = None, font_url: Optional[pulumi.Input[str]] = None, links_style: Optional[pulumi.Input[str]] = None, reference_text_size: Optional[pulumi.Input[float]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if body_text is None and 'bodyText' in kwargs: + body_text = kwargs['bodyText'] + if body_text is None: + raise TypeError("Missing 'body_text' argument") + if buttons_text is None and 'buttonsText' in kwargs: + buttons_text = kwargs['buttonsText'] + if buttons_text is None: + raise TypeError("Missing 'buttons_text' argument") + if input_labels is None and 'inputLabels' in kwargs: + input_labels = kwargs['inputLabels'] + if input_labels is None: + raise TypeError("Missing 'input_labels' argument") + if links is None: + raise TypeError("Missing 'links' argument") + if subtitle is None: + raise TypeError("Missing 'subtitle' argument") + if title is None: + raise TypeError("Missing 'title' argument") + if font_url is None and 'fontUrl' in kwargs: + font_url = kwargs['fontUrl'] + if links_style is None and 'linksStyle' in kwargs: + links_style = kwargs['linksStyle'] + if reference_text_size is None and 'referenceTextSize' in kwargs: + reference_text_size = kwargs['referenceTextSize'] + _setter("body_text", body_text) _setter("buttons_text", buttons_text) _setter("input_labels", input_labels) @@ -1490,7 +1622,9 @@ def _configure( _setter: Callable[[Any, Any], None], bold: Optional[pulumi.Input[bool]] = None, size: Optional[pulumi.Input[float]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if bold is not None: _setter("bold", bold) if size is not None: @@ -1540,7 +1674,9 @@ def _configure( _setter: Callable[[Any, Any], None], bold: Optional[pulumi.Input[bool]] = None, size: Optional[pulumi.Input[float]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if bold is not None: _setter("bold", bold) if size is not None: @@ -1590,7 +1726,9 @@ def _configure( _setter: Callable[[Any, Any], None], bold: Optional[pulumi.Input[bool]] = None, size: Optional[pulumi.Input[float]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if bold is not None: _setter("bold", bold) if size is not None: @@ -1640,7 +1778,9 @@ def _configure( _setter: Callable[[Any, Any], None], bold: Optional[pulumi.Input[bool]] = None, size: Optional[pulumi.Input[float]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if bold is not None: _setter("bold", bold) if size is not None: @@ -1690,7 +1830,9 @@ def _configure( _setter: Callable[[Any, Any], None], bold: Optional[pulumi.Input[bool]] = None, size: Optional[pulumi.Input[float]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if bold is not None: _setter("bold", bold) if size is not None: @@ -1740,7 +1882,9 @@ def _configure( _setter: Callable[[Any, Any], None], bold: Optional[pulumi.Input[bool]] = None, size: Optional[pulumi.Input[float]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if bold is not None: _setter("bold", bold) if size is not None: @@ -1794,7 +1938,15 @@ def _configure( background_color: Optional[pulumi.Input[str]] = None, background_image_url: Optional[pulumi.Input[str]] = None, page_layout: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if background_color is None and 'backgroundColor' in kwargs: + background_color = kwargs['backgroundColor'] + if background_image_url is None and 'backgroundImageUrl' in kwargs: + background_image_url = kwargs['backgroundImageUrl'] + if page_layout is None and 'pageLayout' in kwargs: + page_layout = kwargs['pageLayout'] + if background_color is not None: _setter("background_color", background_color) if background_image_url is not None: @@ -1870,7 +2022,19 @@ def _configure( logo_position: Optional[pulumi.Input[str]] = None, logo_url: Optional[pulumi.Input[str]] = None, social_buttons_layout: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if header_text_alignment is None and 'headerTextAlignment' in kwargs: + header_text_alignment = kwargs['headerTextAlignment'] + if logo_height is None and 'logoHeight' in kwargs: + logo_height = kwargs['logoHeight'] + if logo_position is None and 'logoPosition' in kwargs: + logo_position = kwargs['logoPosition'] + if logo_url is None and 'logoUrl' in kwargs: + logo_url = kwargs['logoUrl'] + if social_buttons_layout is None and 'socialButtonsLayout' in kwargs: + social_buttons_layout = kwargs['socialButtonsLayout'] + if header_text_alignment is not None: _setter("header_text_alignment", header_text_alignment) if logo_height is not None: @@ -1957,8 +2121,12 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - body: pulumi.Input[str], - opts: Optional[pulumi.ResourceOptions]=None): + body: Optional[pulumi.Input[str]] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if body is None: + raise TypeError("Missing 'body' argument") + _setter("body", body) @property @@ -2101,7 +2269,21 @@ def _configure( wsfed: Optional[pulumi.Input['ClientAddonsWsfedArgs']] = None, zendesk: Optional[pulumi.Input['ClientAddonsZendeskArgs']] = None, zoom: Optional[pulumi.Input['ClientAddonsZoomArgs']] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if azure_blob is None and 'azureBlob' in kwargs: + azure_blob = kwargs['azureBlob'] + if azure_sb is None and 'azureSb' in kwargs: + azure_sb = kwargs['azureSb'] + if salesforce_api is None and 'salesforceApi' in kwargs: + salesforce_api = kwargs['salesforceApi'] + if salesforce_sandbox_api is None and 'salesforceSandboxApi' in kwargs: + salesforce_sandbox_api = kwargs['salesforceSandboxApi'] + if sap_api is None and 'sapApi' in kwargs: + sap_api = kwargs['sapApi'] + if sso_integration is None and 'ssoIntegration' in kwargs: + sso_integration = kwargs['ssoIntegration'] + if aws is not None: _setter("aws", aws) if azure_blob is not None: @@ -2533,7 +2715,11 @@ def _configure( lifetime_in_seconds: Optional[pulumi.Input[int]] = None, principal: Optional[pulumi.Input[str]] = None, role: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if lifetime_in_seconds is None and 'lifetimeInSeconds' in kwargs: + lifetime_in_seconds = kwargs['lifetimeInSeconds'] + if lifetime_in_seconds is not None: _setter("lifetime_in_seconds", lifetime_in_seconds) if principal is not None: @@ -2641,7 +2827,33 @@ def _configure( expiration: Optional[pulumi.Input[int]] = None, signed_identifier: Optional[pulumi.Input[str]] = None, storage_access_key: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if account_name is None and 'accountName' in kwargs: + account_name = kwargs['accountName'] + if blob_delete is None and 'blobDelete' in kwargs: + blob_delete = kwargs['blobDelete'] + if blob_name is None and 'blobName' in kwargs: + blob_name = kwargs['blobName'] + if blob_read is None and 'blobRead' in kwargs: + blob_read = kwargs['blobRead'] + if blob_write is None and 'blobWrite' in kwargs: + blob_write = kwargs['blobWrite'] + if container_delete is None and 'containerDelete' in kwargs: + container_delete = kwargs['containerDelete'] + if container_list is None and 'containerList' in kwargs: + container_list = kwargs['containerList'] + if container_name is None and 'containerName' in kwargs: + container_name = kwargs['containerName'] + if container_read is None and 'containerRead' in kwargs: + container_read = kwargs['containerRead'] + if container_write is None and 'containerWrite' in kwargs: + container_write = kwargs['containerWrite'] + if signed_identifier is None and 'signedIdentifier' in kwargs: + signed_identifier = kwargs['signedIdentifier'] + if storage_access_key is None and 'storageAccessKey' in kwargs: + storage_access_key = kwargs['storageAccessKey'] + if account_name is not None: _setter("account_name", account_name) if blob_delete is not None: @@ -2857,7 +3069,15 @@ def _configure( namespace: Optional[pulumi.Input[str]] = None, sas_key: Optional[pulumi.Input[str]] = None, sas_key_name: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if entity_path is None and 'entityPath' in kwargs: + entity_path = kwargs['entityPath'] + if sas_key is None and 'sasKey' in kwargs: + sas_key = kwargs['sasKey'] + if sas_key_name is None and 'sasKeyName' in kwargs: + sas_key_name = kwargs['sasKeyName'] + if entity_path is not None: _setter("entity_path", entity_path) if expiration is not None: @@ -2937,10 +3157,12 @@ def __init__(__self__): @staticmethod def _configure( _setter: Callable[[Any, Any], None], - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): pass + @pulumi.input_type class ClientAddonsCloudbeesArgs: def __init__(__self__): @@ -2948,10 +3170,12 @@ def __init__(__self__): @staticmethod def _configure( _setter: Callable[[Any, Any], None], - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): pass + @pulumi.input_type class ClientAddonsConcurArgs: def __init__(__self__): @@ -2959,10 +3183,12 @@ def __init__(__self__): @staticmethod def _configure( _setter: Callable[[Any, Any], None], - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): pass + @pulumi.input_type class ClientAddonsDropboxArgs: def __init__(__self__): @@ -2970,10 +3196,12 @@ def __init__(__self__): @staticmethod def _configure( _setter: Callable[[Any, Any], None], - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): pass + @pulumi.input_type class ClientAddonsEchosignArgs: def __init__(__self__, *, @@ -2989,7 +3217,9 @@ def __init__(__self__, *, def _configure( _setter: Callable[[Any, Any], None], domain: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if domain is not None: _setter("domain", domain) @@ -3021,7 +3251,9 @@ def __init__(__self__, *, def _configure( _setter: Callable[[Any, Any], None], domain: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if domain is not None: _setter("domain", domain) @@ -3069,7 +3301,17 @@ def _configure( private_key: Optional[pulumi.Input[str]] = None, private_key_id: Optional[pulumi.Input[str]] = None, secret: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if client_email is None and 'clientEmail' in kwargs: + client_email = kwargs['clientEmail'] + if lifetime_in_seconds is None and 'lifetimeInSeconds' in kwargs: + lifetime_in_seconds = kwargs['lifetimeInSeconds'] + if private_key is None and 'privateKey' in kwargs: + private_key = kwargs['privateKey'] + if private_key_id is None and 'privateKeyId' in kwargs: + private_key_id = kwargs['privateKeyId'] + if client_email is not None: _setter("client_email", client_email) if lifetime_in_seconds is not None: @@ -3168,12 +3410,26 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - key_id: pulumi.Input[str], - private_key: pulumi.Input[str], - provider_id: pulumi.Input[str], + key_id: Optional[pulumi.Input[str]] = None, + private_key: Optional[pulumi.Input[str]] = None, + provider_id: Optional[pulumi.Input[str]] = None, expiration: Optional[pulumi.Input[int]] = None, principal: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if key_id is None and 'keyId' in kwargs: + key_id = kwargs['keyId'] + if key_id is None: + raise TypeError("Missing 'key_id' argument") + if private_key is None and 'privateKey' in kwargs: + private_key = kwargs['privateKey'] + if private_key is None: + raise TypeError("Missing 'private_key' argument") + if provider_id is None and 'providerId' in kwargs: + provider_id = kwargs['providerId'] + if provider_id is None: + raise TypeError("Missing 'provider_id' argument") + _setter("key_id", key_id) _setter("private_key", private_key) _setter("provider_id", provider_id) @@ -3258,7 +3514,9 @@ def __init__(__self__, *, def _configure( _setter: Callable[[Any, Any], None], url: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if url is not None: _setter("url", url) @@ -3290,7 +3548,9 @@ def __init__(__self__, *, def _configure( _setter: Callable[[Any, Any], None], account: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if account is not None: _setter("account", account) @@ -3326,7 +3586,9 @@ def _configure( _setter: Callable[[Any, Any], None], connection: Optional[pulumi.Input[str]] = None, domain: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if connection is not None: _setter("connection", connection) if domain is not None: @@ -3372,7 +3634,9 @@ def __init__(__self__, *, def _configure( _setter: Callable[[Any, Any], None], url: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if url is not None: _setter("url", url) @@ -3404,7 +3668,11 @@ def __init__(__self__, *, def _configure( _setter: Callable[[Any, Any], None], entity_id: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if entity_id is None and 'entityId' in kwargs: + entity_id = kwargs['entityId'] + if entity_id is not None: _setter("entity_id", entity_id) @@ -3448,7 +3716,15 @@ def _configure( community_name: Optional[pulumi.Input[str]] = None, community_url_section: Optional[pulumi.Input[str]] = None, principal: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if client_id is None and 'clientId' in kwargs: + client_id = kwargs['clientId'] + if community_name is None and 'communityName' in kwargs: + community_name = kwargs['communityName'] + if community_url_section is None and 'communityUrlSection' in kwargs: + community_url_section = kwargs['communityUrlSection'] + if client_id is not None: _setter("client_id", client_id) if community_name is not None: @@ -3534,7 +3810,15 @@ def _configure( community_name: Optional[pulumi.Input[str]] = None, community_url_section: Optional[pulumi.Input[str]] = None, principal: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if client_id is None and 'clientId' in kwargs: + client_id = kwargs['clientId'] + if community_name is None and 'communityName' in kwargs: + community_name = kwargs['communityName'] + if community_url_section is None and 'communityUrlSection' in kwargs: + community_url_section = kwargs['communityUrlSection'] + if client_id is not None: _setter("client_id", client_id) if community_name is not None: @@ -3688,7 +3972,37 @@ def _configure( signature_algorithm: Optional[pulumi.Input[str]] = None, signing_cert: Optional[pulumi.Input[str]] = None, typed_attributes: Optional[pulumi.Input[bool]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if authn_context_class_ref is None and 'authnContextClassRef' in kwargs: + authn_context_class_ref = kwargs['authnContextClassRef'] + if create_upn_claim is None and 'createUpnClaim' in kwargs: + create_upn_claim = kwargs['createUpnClaim'] + if digest_algorithm is None and 'digestAlgorithm' in kwargs: + digest_algorithm = kwargs['digestAlgorithm'] + if include_attribute_name_format is None and 'includeAttributeNameFormat' in kwargs: + include_attribute_name_format = kwargs['includeAttributeNameFormat'] + if lifetime_in_seconds is None and 'lifetimeInSeconds' in kwargs: + lifetime_in_seconds = kwargs['lifetimeInSeconds'] + if map_identities is None and 'mapIdentities' in kwargs: + map_identities = kwargs['mapIdentities'] + if map_unknown_claims_as_is is None and 'mapUnknownClaimsAsIs' in kwargs: + map_unknown_claims_as_is = kwargs['mapUnknownClaimsAsIs'] + if name_identifier_format is None and 'nameIdentifierFormat' in kwargs: + name_identifier_format = kwargs['nameIdentifierFormat'] + if name_identifier_probes is None and 'nameIdentifierProbes' in kwargs: + name_identifier_probes = kwargs['nameIdentifierProbes'] + if passthrough_claims_with_no_mapping is None and 'passthroughClaimsWithNoMapping' in kwargs: + passthrough_claims_with_no_mapping = kwargs['passthroughClaimsWithNoMapping'] + if sign_response is None and 'signResponse' in kwargs: + sign_response = kwargs['signResponse'] + if signature_algorithm is None and 'signatureAlgorithm' in kwargs: + signature_algorithm = kwargs['signatureAlgorithm'] + if signing_cert is None and 'signingCert' in kwargs: + signing_cert = kwargs['signingCert'] + if typed_attributes is None and 'typedAttributes' in kwargs: + typed_attributes = kwargs['typedAttributes'] + if audience is not None: _setter("audience", audience) if authn_context_class_ref is not None: @@ -4004,7 +4318,11 @@ def _configure( _setter: Callable[[Any, Any], None], callback: Optional[pulumi.Input[str]] = None, slo_enabled: Optional[pulumi.Input[bool]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if slo_enabled is None and 'sloEnabled' in kwargs: + slo_enabled = kwargs['sloEnabled'] + if callback is not None: _setter("callback", callback) if slo_enabled is not None: @@ -4070,7 +4388,19 @@ def _configure( service_password: Optional[pulumi.Input[str]] = None, token_endpoint_url: Optional[pulumi.Input[str]] = None, username_attribute: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if client_id is None and 'clientId' in kwargs: + client_id = kwargs['clientId'] + if name_identifier_format is None and 'nameIdentifierFormat' in kwargs: + name_identifier_format = kwargs['nameIdentifierFormat'] + if service_password is None and 'servicePassword' in kwargs: + service_password = kwargs['servicePassword'] + if token_endpoint_url is None and 'tokenEndpointUrl' in kwargs: + token_endpoint_url = kwargs['tokenEndpointUrl'] + if username_attribute is None and 'usernameAttribute' in kwargs: + username_attribute = kwargs['usernameAttribute'] + if client_id is not None: _setter("client_id", client_id) if name_identifier_format is not None: @@ -4176,7 +4506,13 @@ def _configure( _setter: Callable[[Any, Any], None], base_url: Optional[pulumi.Input[str]] = None, org_slug: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if base_url is None and 'baseUrl' in kwargs: + base_url = kwargs['baseUrl'] + if org_slug is None and 'orgSlug' in kwargs: + org_slug = kwargs['orgSlug'] + if base_url is not None: _setter("base_url", base_url) if org_slug is not None: @@ -4226,7 +4562,11 @@ def _configure( _setter: Callable[[Any, Any], None], external_urls: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, url: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if external_urls is None and 'externalUrls' in kwargs: + external_urls = kwargs['externalUrls'] + if external_urls is not None: _setter("external_urls", external_urls) if url is not None: @@ -4272,7 +4612,9 @@ def __init__(__self__, *, def _configure( _setter: Callable[[Any, Any], None], team: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if team is not None: _setter("team", team) @@ -4304,7 +4646,11 @@ def __init__(__self__, *, def _configure( _setter: Callable[[Any, Any], None], acs_url: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if acs_url is None and 'acsUrl' in kwargs: + acs_url = kwargs['acsUrl'] + if acs_url is not None: _setter("acs_url", acs_url) @@ -4340,7 +4686,9 @@ def _configure( _setter: Callable[[Any, Any], None], name: Optional[pulumi.Input[str]] = None, version: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if name is not None: _setter("name", name) if version is not None: @@ -4386,7 +4734,11 @@ def __init__(__self__, *, def _configure( _setter: Callable[[Any, Any], None], master_key: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if master_key is None and 'masterKey' in kwargs: + master_key = kwargs['masterKey'] + if master_key is not None: _setter("master_key", master_key) @@ -4410,10 +4762,12 @@ def __init__(__self__): @staticmethod def _configure( _setter: Callable[[Any, Any], None], - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): pass + @pulumi.input_type class ClientAddonsZendeskArgs: def __init__(__self__, *, @@ -4429,7 +4783,11 @@ def __init__(__self__, *, def _configure( _setter: Callable[[Any, Any], None], account_name: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if account_name is None and 'accountName' in kwargs: + account_name = kwargs['accountName'] + if account_name is not None: _setter("account_name", account_name) @@ -4461,7 +4819,9 @@ def __init__(__self__, *, def _configure( _setter: Callable[[Any, Any], None], account: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if account is not None: _setter("account", account) @@ -4492,8 +4852,12 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - credentials: pulumi.Input[Sequence[pulumi.Input['ClientCredentialsPrivateKeyJwtCredentialArgs']]], - opts: Optional[pulumi.ResourceOptions]=None): + credentials: Optional[pulumi.Input[Sequence[pulumi.Input['ClientCredentialsPrivateKeyJwtCredentialArgs']]]] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if credentials is None: + raise TypeError("Missing 'credentials' argument") + _setter("credentials", credentials) @property @@ -4550,8 +4914,8 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - credential_type: pulumi.Input[str], - pem: pulumi.Input[str], + credential_type: Optional[pulumi.Input[str]] = None, + pem: Optional[pulumi.Input[str]] = None, algorithm: Optional[pulumi.Input[str]] = None, created_at: Optional[pulumi.Input[str]] = None, expires_at: Optional[pulumi.Input[str]] = None, @@ -4560,7 +4924,25 @@ def _configure( name: Optional[pulumi.Input[str]] = None, parse_expiry_from_cert: Optional[pulumi.Input[bool]] = None, updated_at: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if credential_type is None and 'credentialType' in kwargs: + credential_type = kwargs['credentialType'] + if credential_type is None: + raise TypeError("Missing 'credential_type' argument") + if pem is None: + raise TypeError("Missing 'pem' argument") + if created_at is None and 'createdAt' in kwargs: + created_at = kwargs['createdAt'] + if expires_at is None and 'expiresAt' in kwargs: + expires_at = kwargs['expiresAt'] + if key_id is None and 'keyId' in kwargs: + key_id = kwargs['keyId'] + if parse_expiry_from_cert is None and 'parseExpiryFromCert' in kwargs: + parse_expiry_from_cert = kwargs['parseExpiryFromCert'] + if updated_at is None and 'updatedAt' in kwargs: + updated_at = kwargs['updatedAt'] + _setter("credential_type", credential_type) _setter("pem", pem) if algorithm is not None: @@ -4728,7 +5110,13 @@ def _configure( lifetime_in_seconds: Optional[pulumi.Input[int]] = None, scopes: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None, secret_encoded: Optional[pulumi.Input[bool]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if lifetime_in_seconds is None and 'lifetimeInSeconds' in kwargs: + lifetime_in_seconds = kwargs['lifetimeInSeconds'] + if secret_encoded is None and 'secretEncoded' in kwargs: + secret_encoded = kwargs['secretEncoded'] + if alg is not None: _setter("alg", alg) if lifetime_in_seconds is not None: @@ -4806,7 +5194,9 @@ def _configure( _setter: Callable[[Any, Any], None], android: Optional[pulumi.Input['ClientMobileAndroidArgs']] = None, ios: Optional[pulumi.Input['ClientMobileIosArgs']] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if android is not None: _setter("android", android) if ios is not None: @@ -4852,7 +5242,13 @@ def _configure( _setter: Callable[[Any, Any], None], app_package_name: Optional[pulumi.Input[str]] = None, sha256_cert_fingerprints: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if app_package_name is None and 'appPackageName' in kwargs: + app_package_name = kwargs['appPackageName'] + if sha256_cert_fingerprints is None and 'sha256CertFingerprints' in kwargs: + sha256_cert_fingerprints = kwargs['sha256CertFingerprints'] + if app_package_name is not None: _setter("app_package_name", app_package_name) if sha256_cert_fingerprints is not None: @@ -4892,7 +5288,13 @@ def _configure( _setter: Callable[[Any, Any], None], app_bundle_identifier: Optional[pulumi.Input[str]] = None, team_id: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if app_bundle_identifier is None and 'appBundleIdentifier' in kwargs: + app_bundle_identifier = kwargs['appBundleIdentifier'] + if team_id is None and 'teamId' in kwargs: + team_id = kwargs['teamId'] + if app_bundle_identifier is not None: _setter("app_bundle_identifier", app_bundle_identifier) if team_id is not None: @@ -4932,7 +5334,9 @@ def _configure( _setter: Callable[[Any, Any], None], apple: Optional[pulumi.Input['ClientNativeSocialLoginAppleArgs']] = None, facebook: Optional[pulumi.Input['ClientNativeSocialLoginFacebookArgs']] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if apple is not None: _setter("apple", apple) if facebook is not None: @@ -4969,7 +5373,9 @@ def __init__(__self__, *, def _configure( _setter: Callable[[Any, Any], None], enabled: Optional[pulumi.Input[bool]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if enabled is not None: _setter("enabled", enabled) @@ -4995,7 +5401,9 @@ def __init__(__self__, *, def _configure( _setter: Callable[[Any, Any], None], enabled: Optional[pulumi.Input[bool]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if enabled is not None: _setter("enabled", enabled) @@ -5041,14 +5449,32 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - expiration_type: pulumi.Input[str], - rotation_type: pulumi.Input[str], + expiration_type: Optional[pulumi.Input[str]] = None, + rotation_type: Optional[pulumi.Input[str]] = None, idle_token_lifetime: Optional[pulumi.Input[int]] = None, infinite_idle_token_lifetime: Optional[pulumi.Input[bool]] = None, infinite_token_lifetime: Optional[pulumi.Input[bool]] = None, leeway: Optional[pulumi.Input[int]] = None, token_lifetime: Optional[pulumi.Input[int]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if expiration_type is None and 'expirationType' in kwargs: + expiration_type = kwargs['expirationType'] + if expiration_type is None: + raise TypeError("Missing 'expiration_type' argument") + if rotation_type is None and 'rotationType' in kwargs: + rotation_type = kwargs['rotationType'] + if rotation_type is None: + raise TypeError("Missing 'rotation_type' argument") + if idle_token_lifetime is None and 'idleTokenLifetime' in kwargs: + idle_token_lifetime = kwargs['idleTokenLifetime'] + if infinite_idle_token_lifetime is None and 'infiniteIdleTokenLifetime' in kwargs: + infinite_idle_token_lifetime = kwargs['infiniteIdleTokenLifetime'] + if infinite_token_lifetime is None and 'infiniteTokenLifetime' in kwargs: + infinite_token_lifetime = kwargs['infiniteTokenLifetime'] + if token_lifetime is None and 'tokenLifetime' in kwargs: + token_lifetime = kwargs['tokenLifetime'] + _setter("expiration_type", expiration_type) _setter("rotation_type", rotation_type) if idle_token_lifetime is not None: @@ -5518,7 +5944,157 @@ def _configure( validation: Optional[pulumi.Input['ConnectionOptionsValidationArgs']] = None, waad_common_endpoint: Optional[pulumi.Input[bool]] = None, waad_protocol: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if adfs_server is None and 'adfsServer' in kwargs: + adfs_server = kwargs['adfsServer'] + if allowed_audiences is None and 'allowedAudiences' in kwargs: + allowed_audiences = kwargs['allowedAudiences'] + if api_enable_users is None and 'apiEnableUsers' in kwargs: + api_enable_users = kwargs['apiEnableUsers'] + if app_id is None and 'appId' in kwargs: + app_id = kwargs['appId'] + if attribute_map is None and 'attributeMap' in kwargs: + attribute_map = kwargs['attributeMap'] + if auth_params is None and 'authParams' in kwargs: + auth_params = kwargs['authParams'] + if authorization_endpoint is None and 'authorizationEndpoint' in kwargs: + authorization_endpoint = kwargs['authorizationEndpoint'] + if brute_force_protection is None and 'bruteForceProtection' in kwargs: + brute_force_protection = kwargs['bruteForceProtection'] + if client_id is None and 'clientId' in kwargs: + client_id = kwargs['clientId'] + if client_secret is None and 'clientSecret' in kwargs: + client_secret = kwargs['clientSecret'] + if community_base_url is None and 'communityBaseUrl' in kwargs: + community_base_url = kwargs['communityBaseUrl'] + if connection_settings is None and 'connectionSettings' in kwargs: + connection_settings = kwargs['connectionSettings'] + if custom_scripts is None and 'customScripts' in kwargs: + custom_scripts = kwargs['customScripts'] + if decryption_key is None and 'decryptionKey' in kwargs: + decryption_key = kwargs['decryptionKey'] + if digest_algorithm is None and 'digestAlgorithm' in kwargs: + digest_algorithm = kwargs['digestAlgorithm'] + if disable_cache is None and 'disableCache' in kwargs: + disable_cache = kwargs['disableCache'] + if disable_self_service_change_password is None and 'disableSelfServiceChangePassword' in kwargs: + disable_self_service_change_password = kwargs['disableSelfServiceChangePassword'] + if disable_sign_out is None and 'disableSignOut' in kwargs: + disable_sign_out = kwargs['disableSignOut'] + if disable_signup is None and 'disableSignup' in kwargs: + disable_signup = kwargs['disableSignup'] + if discovery_url is None and 'discoveryUrl' in kwargs: + discovery_url = kwargs['discoveryUrl'] + if domain_aliases is None and 'domainAliases' in kwargs: + domain_aliases = kwargs['domainAliases'] + if enable_script_context is None and 'enableScriptContext' in kwargs: + enable_script_context = kwargs['enableScriptContext'] + if enabled_database_customization is None and 'enabledDatabaseCustomization' in kwargs: + enabled_database_customization = kwargs['enabledDatabaseCustomization'] + if entity_id is None and 'entityId' in kwargs: + entity_id = kwargs['entityId'] + if fed_metadata_xml is None and 'fedMetadataXml' in kwargs: + fed_metadata_xml = kwargs['fedMetadataXml'] + if fields_map is None and 'fieldsMap' in kwargs: + fields_map = kwargs['fieldsMap'] + if forward_request_info is None and 'forwardRequestInfo' in kwargs: + forward_request_info = kwargs['forwardRequestInfo'] + if from_ is None and 'from' in kwargs: + from_ = kwargs['from'] + if gateway_authentication is None and 'gatewayAuthentication' in kwargs: + gateway_authentication = kwargs['gatewayAuthentication'] + if gateway_url is None and 'gatewayUrl' in kwargs: + gateway_url = kwargs['gatewayUrl'] + if icon_url is None and 'iconUrl' in kwargs: + icon_url = kwargs['iconUrl'] + if identity_api is None and 'identityApi' in kwargs: + identity_api = kwargs['identityApi'] + if idp_initiated is None and 'idpInitiated' in kwargs: + idp_initiated = kwargs['idpInitiated'] + if import_mode is None and 'importMode' in kwargs: + import_mode = kwargs['importMode'] + if jwks_uri is None and 'jwksUri' in kwargs: + jwks_uri = kwargs['jwksUri'] + if key_id is None and 'keyId' in kwargs: + key_id = kwargs['keyId'] + if map_user_id_to_id is None and 'mapUserIdToId' in kwargs: + map_user_id_to_id = kwargs['mapUserIdToId'] + if max_groups_to_retrieve is None and 'maxGroupsToRetrieve' in kwargs: + max_groups_to_retrieve = kwargs['maxGroupsToRetrieve'] + if messaging_service_sid is None and 'messagingServiceSid' in kwargs: + messaging_service_sid = kwargs['messagingServiceSid'] + if metadata_url is None and 'metadataUrl' in kwargs: + metadata_url = kwargs['metadataUrl'] + if metadata_xml is None and 'metadataXml' in kwargs: + metadata_xml = kwargs['metadataXml'] + if non_persistent_attrs is None and 'nonPersistentAttrs' in kwargs: + non_persistent_attrs = kwargs['nonPersistentAttrs'] + if password_complexity_options is None and 'passwordComplexityOptions' in kwargs: + password_complexity_options = kwargs['passwordComplexityOptions'] + if password_dictionary is None and 'passwordDictionary' in kwargs: + password_dictionary = kwargs['passwordDictionary'] + if password_histories is None and 'passwordHistories' in kwargs: + password_histories = kwargs['passwordHistories'] + if password_no_personal_info is None and 'passwordNoPersonalInfo' in kwargs: + password_no_personal_info = kwargs['passwordNoPersonalInfo'] + if password_policy is None and 'passwordPolicy' in kwargs: + password_policy = kwargs['passwordPolicy'] + if ping_federate_base_url is None and 'pingFederateBaseUrl' in kwargs: + ping_federate_base_url = kwargs['pingFederateBaseUrl'] + if pkce_enabled is None and 'pkceEnabled' in kwargs: + pkce_enabled = kwargs['pkceEnabled'] + if protocol_binding is None and 'protocolBinding' in kwargs: + protocol_binding = kwargs['protocolBinding'] + if request_template is None and 'requestTemplate' in kwargs: + request_template = kwargs['requestTemplate'] + if requires_username is None and 'requiresUsername' in kwargs: + requires_username = kwargs['requiresUsername'] + if set_user_root_attributes is None and 'setUserRootAttributes' in kwargs: + set_user_root_attributes = kwargs['setUserRootAttributes'] + if should_trust_email_verified_connection is None and 'shouldTrustEmailVerifiedConnection' in kwargs: + should_trust_email_verified_connection = kwargs['shouldTrustEmailVerifiedConnection'] + if sign_in_endpoint is None and 'signInEndpoint' in kwargs: + sign_in_endpoint = kwargs['signInEndpoint'] + if sign_out_endpoint is None and 'signOutEndpoint' in kwargs: + sign_out_endpoint = kwargs['signOutEndpoint'] + if sign_saml_request is None and 'signSamlRequest' in kwargs: + sign_saml_request = kwargs['signSamlRequest'] + if signature_algorithm is None and 'signatureAlgorithm' in kwargs: + signature_algorithm = kwargs['signatureAlgorithm'] + if signing_cert is None and 'signingCert' in kwargs: + signing_cert = kwargs['signingCert'] + if signing_key is None and 'signingKey' in kwargs: + signing_key = kwargs['signingKey'] + if strategy_version is None and 'strategyVersion' in kwargs: + strategy_version = kwargs['strategyVersion'] + if team_id is None and 'teamId' in kwargs: + team_id = kwargs['teamId'] + if tenant_domain is None and 'tenantDomain' in kwargs: + tenant_domain = kwargs['tenantDomain'] + if token_endpoint is None and 'tokenEndpoint' in kwargs: + token_endpoint = kwargs['tokenEndpoint'] + if twilio_sid is None and 'twilioSid' in kwargs: + twilio_sid = kwargs['twilioSid'] + if twilio_token is None and 'twilioToken' in kwargs: + twilio_token = kwargs['twilioToken'] + if upstream_params is None and 'upstreamParams' in kwargs: + upstream_params = kwargs['upstreamParams'] + if use_cert_auth is None and 'useCertAuth' in kwargs: + use_cert_auth = kwargs['useCertAuth'] + if use_kerberos is None and 'useKerberos' in kwargs: + use_kerberos = kwargs['useKerberos'] + if use_wsfed is None and 'useWsfed' in kwargs: + use_wsfed = kwargs['useWsfed'] + if user_id_attribute is None and 'userIdAttribute' in kwargs: + user_id_attribute = kwargs['userIdAttribute'] + if userinfo_endpoint is None and 'userinfoEndpoint' in kwargs: + userinfo_endpoint = kwargs['userinfoEndpoint'] + if waad_common_endpoint is None and 'waadCommonEndpoint' in kwargs: + waad_common_endpoint = kwargs['waadCommonEndpoint'] + if waad_protocol is None and 'waadProtocol' in kwargs: + waad_protocol = kwargs['waadProtocol'] + if adfs_server is not None: _setter("adfs_server", adfs_server) if allowed_audiences is not None: @@ -6801,10 +7377,18 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - mapping_mode: pulumi.Input[str], + mapping_mode: Optional[pulumi.Input[str]] = None, attributes: Optional[pulumi.Input[str]] = None, userinfo_scope: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if mapping_mode is None and 'mappingMode' in kwargs: + mapping_mode = kwargs['mappingMode'] + if mapping_mode is None: + raise TypeError("Missing 'mapping_mode' argument") + if userinfo_scope is None and 'userinfoScope' in kwargs: + userinfo_scope = kwargs['userinfoScope'] + _setter("mapping_mode", mapping_mode) if attributes is not None: _setter("attributes", attributes) @@ -6862,8 +7446,12 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - pkce: pulumi.Input[str], - opts: Optional[pulumi.ResourceOptions]=None): + pkce: Optional[pulumi.Input[str]] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if pkce is None: + raise TypeError("Missing 'pkce' argument") + _setter("pkce", pkce) @property @@ -6892,9 +7480,15 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - cert: pulumi.Input[str], - key: pulumi.Input[str], - opts: Optional[pulumi.ResourceOptions]=None): + cert: Optional[pulumi.Input[str]] = None, + key: Optional[pulumi.Input[str]] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if cert is None: + raise TypeError("Missing 'cert' argument") + if key is None: + raise TypeError("Missing 'key' argument") + _setter("cert", cert) _setter("key", key) @@ -6948,7 +7542,11 @@ def _configure( secret: Optional[pulumi.Input[str]] = None, secret_base64_encoded: Optional[pulumi.Input[bool]] = None, subject: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if secret_base64_encoded is None and 'secretBase64Encoded' in kwargs: + secret_base64_encoded = kwargs['secretBase64Encoded'] + if audience is not None: _setter("audience", audience) if method is not None: @@ -7042,7 +7640,15 @@ def _configure( client_authorize_query: Optional[pulumi.Input[str]] = None, client_id: Optional[pulumi.Input[str]] = None, client_protocol: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if client_authorize_query is None and 'clientAuthorizeQuery' in kwargs: + client_authorize_query = kwargs['clientAuthorizeQuery'] + if client_id is None and 'clientId' in kwargs: + client_id = kwargs['clientId'] + if client_protocol is None and 'clientProtocol' in kwargs: + client_protocol = kwargs['clientProtocol'] + if client_authorize_query is not None: _setter("client_authorize_query", client_authorize_query) if client_id is not None: @@ -7100,7 +7706,11 @@ def _configure( _setter: Callable[[Any, Any], None], active: Optional[pulumi.Input[bool]] = None, return_enroll_settings: Optional[pulumi.Input[bool]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if return_enroll_settings is None and 'returnEnrollSettings' in kwargs: + return_enroll_settings = kwargs['returnEnrollSettings'] + if active is not None: _setter("active", active) if return_enroll_settings is not None: @@ -7146,7 +7756,11 @@ def __init__(__self__, *, def _configure( _setter: Callable[[Any, Any], None], min_length: Optional[pulumi.Input[int]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if min_length is None and 'minLength' in kwargs: + min_length = kwargs['minLength'] + if min_length is not None: _setter("min_length", min_length) @@ -7182,7 +7796,9 @@ def _configure( _setter: Callable[[Any, Any], None], dictionaries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, enable: Optional[pulumi.Input[bool]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if dictionaries is not None: _setter("dictionaries", dictionaries) if enable is not None: @@ -7231,7 +7847,9 @@ def _configure( _setter: Callable[[Any, Any], None], enable: Optional[pulumi.Input[bool]] = None, size: Optional[pulumi.Input[int]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if enable is not None: _setter("enable", enable) if size is not None: @@ -7274,7 +7892,9 @@ def __init__(__self__, *, def _configure( _setter: Callable[[Any, Any], None], enable: Optional[pulumi.Input[bool]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if enable is not None: _setter("enable", enable) @@ -7304,9 +7924,15 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - cert: pulumi.Input[str], - key: pulumi.Input[str], - opts: Optional[pulumi.ResourceOptions]=None): + cert: Optional[pulumi.Input[str]] = None, + key: Optional[pulumi.Input[str]] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if cert is None: + raise TypeError("Missing 'cert' argument") + if key is None: + raise TypeError("Missing 'key' argument") + _setter("cert", cert) _setter("key", key) @@ -7348,7 +7974,11 @@ def _configure( _setter: Callable[[Any, Any], None], length: Optional[pulumi.Input[int]] = None, time_step: Optional[pulumi.Input[int]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if time_step is None and 'timeStep' in kwargs: + time_step = kwargs['timeStep'] + if length is not None: _setter("length", length) if time_step is not None: @@ -7394,7 +8024,9 @@ def __init__(__self__, *, def _configure( _setter: Callable[[Any, Any], None], username: Optional[pulumi.Input['ConnectionOptionsValidationUsernameArgs']] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if username is not None: _setter("username", username) @@ -7426,7 +8058,9 @@ def _configure( _setter: Callable[[Any, Any], None], max: Optional[pulumi.Input[int]] = None, min: Optional[pulumi.Input[int]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if max is not None: _setter("max", max) if min is not None: @@ -7463,7 +8097,9 @@ def __init__(__self__, *, def _configure( _setter: Callable[[Any, Any], None], methods: Optional[pulumi.Input[Sequence[Any]]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if methods is not None: _setter("methods", methods) @@ -7540,7 +8176,31 @@ def _configure( smtp_pass: Optional[pulumi.Input[str]] = None, smtp_port: Optional[pulumi.Input[int]] = None, smtp_user: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if access_key_id is None and 'accessKeyId' in kwargs: + access_key_id = kwargs['accessKeyId'] + if api_key is None and 'apiKey' in kwargs: + api_key = kwargs['apiKey'] + if azure_cs_connection_string is None and 'azureCsConnectionString' in kwargs: + azure_cs_connection_string = kwargs['azureCsConnectionString'] + if ms365_client_id is None and 'ms365ClientId' in kwargs: + ms365_client_id = kwargs['ms365ClientId'] + if ms365_client_secret is None and 'ms365ClientSecret' in kwargs: + ms365_client_secret = kwargs['ms365ClientSecret'] + if ms365_tenant_id is None and 'ms365TenantId' in kwargs: + ms365_tenant_id = kwargs['ms365TenantId'] + if secret_access_key is None and 'secretAccessKey' in kwargs: + secret_access_key = kwargs['secretAccessKey'] + if smtp_host is None and 'smtpHost' in kwargs: + smtp_host = kwargs['smtpHost'] + if smtp_pass is None and 'smtpPass' in kwargs: + smtp_pass = kwargs['smtpPass'] + if smtp_port is None and 'smtpPort' in kwargs: + smtp_port = kwargs['smtpPort'] + if smtp_user is None and 'smtpUser' in kwargs: + smtp_user = kwargs['smtpUser'] + if access_key_id is not None: _setter("access_key_id", access_key_id) if api_key is not None: @@ -7744,7 +8404,9 @@ def _configure( _setter: Callable[[Any, Any], None], headers: Optional[pulumi.Input['EmailProviderSettingsHeadersArgs']] = None, message: Optional[pulumi.Input['EmailProviderSettingsMessageArgs']] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if headers is not None: _setter("headers", headers) if message is not None: @@ -7794,7 +8456,13 @@ def _configure( _setter: Callable[[Any, Any], None], x_mc_view_content_link: Optional[pulumi.Input[str]] = None, x_ses_configuration_set: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if x_mc_view_content_link is None and 'xMcViewContentLink' in kwargs: + x_mc_view_content_link = kwargs['xMcViewContentLink'] + if x_ses_configuration_set is None and 'xSesConfigurationSet' in kwargs: + x_ses_configuration_set = kwargs['xSesConfigurationSet'] + if x_mc_view_content_link is not None: _setter("x_mc_view_content_link", x_mc_view_content_link) if x_ses_configuration_set is not None: @@ -7844,7 +8512,13 @@ def _configure( _setter: Callable[[Any, Any], None], configuration_set_name: Optional[pulumi.Input[str]] = None, view_content_link: Optional[pulumi.Input[bool]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if configuration_set_name is None and 'configurationSetName' in kwargs: + configuration_set_name = kwargs['configurationSetName'] + if view_content_link is None and 'viewContentLink' in kwargs: + view_content_link = kwargs['viewContentLink'] + if configuration_set_name is not None: _setter("configuration_set_name", configuration_set_name) if view_content_link is not None: @@ -7898,11 +8572,19 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - enabled: pulumi.Input[bool], + enabled: Optional[pulumi.Input[bool]] = None, hostname: Optional[pulumi.Input[str]] = None, integration_key: Optional[pulumi.Input[str]] = None, secret_key: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if enabled is None: + raise TypeError("Missing 'enabled' argument") + if integration_key is None and 'integrationKey' in kwargs: + integration_key = kwargs['integrationKey'] + if secret_key is None and 'secretKey' in kwargs: + secret_key = kwargs['secretKey'] + _setter("enabled", enabled) if hostname is not None: _setter("hostname", hostname) @@ -7983,11 +8665,17 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - enabled: pulumi.Input[bool], + enabled: Optional[pulumi.Input[bool]] = None, message_types: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, options: Optional[pulumi.Input['GuardianPhoneOptionsArgs']] = None, provider: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if enabled is None: + raise TypeError("Missing 'enabled' argument") + if message_types is None and 'messageTypes' in kwargs: + message_types = kwargs['messageTypes'] + _setter("enabled", enabled) if message_types is not None: _setter("message_types", message_types) @@ -8080,7 +8768,19 @@ def _configure( messaging_service_sid: Optional[pulumi.Input[str]] = None, sid: Optional[pulumi.Input[str]] = None, verification_message: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if auth_token is None and 'authToken' in kwargs: + auth_token = kwargs['authToken'] + if enrollment_message is None and 'enrollmentMessage' in kwargs: + enrollment_message = kwargs['enrollmentMessage'] + if from_ is None and 'from' in kwargs: + from_ = kwargs['from'] + if messaging_service_sid is None and 'messagingServiceSid' in kwargs: + messaging_service_sid = kwargs['messagingServiceSid'] + if verification_message is None and 'verificationMessage' in kwargs: + verification_message = kwargs['verificationMessage'] + if auth_token is not None: _setter("auth_token", auth_token) if enrollment_message is not None: @@ -8196,13 +8896,25 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - enabled: pulumi.Input[bool], + enabled: Optional[pulumi.Input[bool]] = None, amazon_sns: Optional[pulumi.Input['GuardianPushAmazonSnsArgs']] = None, custom_app: Optional[pulumi.Input['GuardianPushCustomAppArgs']] = None, direct_apns: Optional[pulumi.Input['GuardianPushDirectApnsArgs']] = None, direct_fcm: Optional[pulumi.Input['GuardianPushDirectFcmArgs']] = None, provider: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if enabled is None: + raise TypeError("Missing 'enabled' argument") + if amazon_sns is None and 'amazonSns' in kwargs: + amazon_sns = kwargs['amazonSns'] + if custom_app is None and 'customApp' in kwargs: + custom_app = kwargs['customApp'] + if direct_apns is None and 'directApns' in kwargs: + direct_apns = kwargs['directApns'] + if direct_fcm is None and 'directFcm' in kwargs: + direct_fcm = kwargs['directFcm'] + _setter("enabled", enabled) if amazon_sns is not None: _setter("amazon_sns", amazon_sns) @@ -8314,12 +9026,34 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - aws_access_key_id: pulumi.Input[str], - aws_region: pulumi.Input[str], - aws_secret_access_key: pulumi.Input[str], - sns_apns_platform_application_arn: pulumi.Input[str], - sns_gcm_platform_application_arn: pulumi.Input[str], - opts: Optional[pulumi.ResourceOptions]=None): + aws_access_key_id: Optional[pulumi.Input[str]] = None, + aws_region: Optional[pulumi.Input[str]] = None, + aws_secret_access_key: Optional[pulumi.Input[str]] = None, + sns_apns_platform_application_arn: Optional[pulumi.Input[str]] = None, + sns_gcm_platform_application_arn: Optional[pulumi.Input[str]] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if aws_access_key_id is None and 'awsAccessKeyId' in kwargs: + aws_access_key_id = kwargs['awsAccessKeyId'] + if aws_access_key_id is None: + raise TypeError("Missing 'aws_access_key_id' argument") + if aws_region is None and 'awsRegion' in kwargs: + aws_region = kwargs['awsRegion'] + if aws_region is None: + raise TypeError("Missing 'aws_region' argument") + if aws_secret_access_key is None and 'awsSecretAccessKey' in kwargs: + aws_secret_access_key = kwargs['awsSecretAccessKey'] + if aws_secret_access_key is None: + raise TypeError("Missing 'aws_secret_access_key' argument") + if sns_apns_platform_application_arn is None and 'snsApnsPlatformApplicationArn' in kwargs: + sns_apns_platform_application_arn = kwargs['snsApnsPlatformApplicationArn'] + if sns_apns_platform_application_arn is None: + raise TypeError("Missing 'sns_apns_platform_application_arn' argument") + if sns_gcm_platform_application_arn is None and 'snsGcmPlatformApplicationArn' in kwargs: + sns_gcm_platform_application_arn = kwargs['snsGcmPlatformApplicationArn'] + if sns_gcm_platform_application_arn is None: + raise TypeError("Missing 'sns_gcm_platform_application_arn' argument") + _setter("aws_access_key_id", aws_access_key_id) _setter("aws_region", aws_region) _setter("aws_secret_access_key", aws_secret_access_key) @@ -8410,7 +9144,15 @@ def _configure( app_name: Optional[pulumi.Input[str]] = None, apple_app_link: Optional[pulumi.Input[str]] = None, google_app_link: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if app_name is None and 'appName' in kwargs: + app_name = kwargs['appName'] + if apple_app_link is None and 'appleAppLink' in kwargs: + apple_app_link = kwargs['appleAppLink'] + if google_app_link is None and 'googleAppLink' in kwargs: + google_app_link = kwargs['googleAppLink'] + if app_name is not None: _setter("app_name", app_name) if apple_app_link is not None: @@ -8478,11 +9220,21 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - bundle_id: pulumi.Input[str], - p12: pulumi.Input[str], - sandbox: pulumi.Input[bool], + bundle_id: Optional[pulumi.Input[str]] = None, + p12: Optional[pulumi.Input[str]] = None, + sandbox: Optional[pulumi.Input[bool]] = None, enabled: Optional[pulumi.Input[bool]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if bundle_id is None and 'bundleId' in kwargs: + bundle_id = kwargs['bundleId'] + if bundle_id is None: + raise TypeError("Missing 'bundle_id' argument") + if p12 is None: + raise TypeError("Missing 'p12' argument") + if sandbox is None: + raise TypeError("Missing 'sandbox' argument") + _setter("bundle_id", bundle_id) _setter("p12", p12) _setter("sandbox", sandbox) @@ -8552,8 +9304,14 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - server_key: pulumi.Input[str], - opts: Optional[pulumi.ResourceOptions]=None): + server_key: Optional[pulumi.Input[str]] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if server_key is None and 'serverKey' in kwargs: + server_key = kwargs['serverKey'] + if server_key is None: + raise TypeError("Missing 'server_key' argument") + _setter("server_key", server_key) @property @@ -8589,10 +9347,18 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - enabled: pulumi.Input[bool], + enabled: Optional[pulumi.Input[bool]] = None, override_relying_party: Optional[pulumi.Input[bool]] = None, relying_party_identifier: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if enabled is None: + raise TypeError("Missing 'enabled' argument") + if override_relying_party is None and 'overrideRelyingParty' in kwargs: + override_relying_party = kwargs['overrideRelyingParty'] + if relying_party_identifier is None and 'relyingPartyIdentifier' in kwargs: + relying_party_identifier = kwargs['relyingPartyIdentifier'] + _setter("enabled", enabled) if override_relying_party is not None: _setter("override_relying_party", override_relying_party) @@ -8659,11 +9425,21 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - enabled: pulumi.Input[bool], + enabled: Optional[pulumi.Input[bool]] = None, override_relying_party: Optional[pulumi.Input[bool]] = None, relying_party_identifier: Optional[pulumi.Input[str]] = None, user_verification: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if enabled is None: + raise TypeError("Missing 'enabled' argument") + if override_relying_party is None and 'overrideRelyingParty' in kwargs: + override_relying_party = kwargs['overrideRelyingParty'] + if relying_party_identifier is None and 'relyingPartyIdentifier' in kwargs: + relying_party_identifier = kwargs['relyingPartyIdentifier'] + if user_verification is None and 'userVerification' in kwargs: + user_verification = kwargs['userVerification'] + _setter("enabled", enabled) if override_relying_party is not None: _setter("override_relying_party", override_relying_party) @@ -8828,7 +9604,57 @@ def _configure( splunk_secure: Optional[pulumi.Input[bool]] = None, splunk_token: Optional[pulumi.Input[str]] = None, sumo_source_address: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if aws_account_id is None and 'awsAccountId' in kwargs: + aws_account_id = kwargs['awsAccountId'] + if aws_partner_event_source is None and 'awsPartnerEventSource' in kwargs: + aws_partner_event_source = kwargs['awsPartnerEventSource'] + if aws_region is None and 'awsRegion' in kwargs: + aws_region = kwargs['awsRegion'] + if azure_partner_topic is None and 'azurePartnerTopic' in kwargs: + azure_partner_topic = kwargs['azurePartnerTopic'] + if azure_region is None and 'azureRegion' in kwargs: + azure_region = kwargs['azureRegion'] + if azure_resource_group is None and 'azureResourceGroup' in kwargs: + azure_resource_group = kwargs['azureResourceGroup'] + if azure_subscription_id is None and 'azureSubscriptionId' in kwargs: + azure_subscription_id = kwargs['azureSubscriptionId'] + if datadog_api_key is None and 'datadogApiKey' in kwargs: + datadog_api_key = kwargs['datadogApiKey'] + if datadog_region is None and 'datadogRegion' in kwargs: + datadog_region = kwargs['datadogRegion'] + if http_authorization is None and 'httpAuthorization' in kwargs: + http_authorization = kwargs['httpAuthorization'] + if http_content_format is None and 'httpContentFormat' in kwargs: + http_content_format = kwargs['httpContentFormat'] + if http_content_type is None and 'httpContentType' in kwargs: + http_content_type = kwargs['httpContentType'] + if http_custom_headers is None and 'httpCustomHeaders' in kwargs: + http_custom_headers = kwargs['httpCustomHeaders'] + if http_endpoint is None and 'httpEndpoint' in kwargs: + http_endpoint = kwargs['httpEndpoint'] + if mixpanel_project_id is None and 'mixpanelProjectId' in kwargs: + mixpanel_project_id = kwargs['mixpanelProjectId'] + if mixpanel_region is None and 'mixpanelRegion' in kwargs: + mixpanel_region = kwargs['mixpanelRegion'] + if mixpanel_service_account_password is None and 'mixpanelServiceAccountPassword' in kwargs: + mixpanel_service_account_password = kwargs['mixpanelServiceAccountPassword'] + if mixpanel_service_account_username is None and 'mixpanelServiceAccountUsername' in kwargs: + mixpanel_service_account_username = kwargs['mixpanelServiceAccountUsername'] + if segment_write_key is None and 'segmentWriteKey' in kwargs: + segment_write_key = kwargs['segmentWriteKey'] + if splunk_domain is None and 'splunkDomain' in kwargs: + splunk_domain = kwargs['splunkDomain'] + if splunk_port is None and 'splunkPort' in kwargs: + splunk_port = kwargs['splunkPort'] + if splunk_secure is None and 'splunkSecure' in kwargs: + splunk_secure = kwargs['splunkSecure'] + if splunk_token is None and 'splunkToken' in kwargs: + splunk_token = kwargs['splunkToken'] + if sumo_source_address is None and 'sumoSourceAddress' in kwargs: + sumo_source_address = kwargs['sumoSourceAddress'] + if aws_account_id is not None: _setter("aws_account_id", aws_account_id) if aws_partner_event_source is not None: @@ -9186,7 +10012,11 @@ def _configure( _setter: Callable[[Any, Any], None], colors: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None, logo_url: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if logo_url is None and 'logoUrl' in kwargs: + logo_url = kwargs['logoUrl'] + if colors is not None: _setter("colors", colors) if logo_url is not None: @@ -9234,9 +10064,17 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - connection_id: pulumi.Input[str], + connection_id: Optional[pulumi.Input[str]] = None, assign_membership_on_login: Optional[pulumi.Input[bool]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if connection_id is None and 'connectionId' in kwargs: + connection_id = kwargs['connectionId'] + if connection_id is None: + raise TypeError("Missing 'connection_id' argument") + if assign_membership_on_login is None and 'assignMembershipOnLogin' in kwargs: + assign_membership_on_login = kwargs['assignMembershipOnLogin'] + _setter("connection_id", connection_id) if assign_membership_on_login is not None: _setter("assign_membership_on_login", assign_membership_on_login) @@ -9283,9 +10121,15 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - enabled: pulumi.Input[bool], - html: pulumi.Input[str], - opts: Optional[pulumi.ResourceOptions]=None): + enabled: Optional[pulumi.Input[bool]] = None, + html: Optional[pulumi.Input[str]] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if enabled is None: + raise TypeError("Missing 'enabled' argument") + if html is None: + raise TypeError("Missing 'html' argument") + _setter("enabled", enabled) _setter("html", html) @@ -9334,10 +10178,16 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - show_log_link: pulumi.Input[bool], + show_log_link: Optional[pulumi.Input[bool]] = None, html: Optional[pulumi.Input[str]] = None, url: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if show_log_link is None and 'showLogLink' in kwargs: + show_log_link = kwargs['showLogLink'] + if show_log_link is None: + raise TypeError("Missing 'show_log_link' argument") + _setter("show_log_link", show_log_link) if html is not None: _setter("html", html) @@ -9398,9 +10248,15 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - enabled: pulumi.Input[bool], - html: pulumi.Input[str], - opts: Optional[pulumi.ResourceOptions]=None): + enabled: Optional[pulumi.Input[bool]] = None, + html: Optional[pulumi.Input[str]] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if enabled is None: + raise TypeError("Missing 'enabled' argument") + if html is None: + raise TypeError("Missing 'html' argument") + _setter("enabled", enabled) _setter("html", html) @@ -9446,9 +10302,15 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - enabled: pulumi.Input[bool], - html: pulumi.Input[str], - opts: Optional[pulumi.ResourceOptions]=None): + enabled: Optional[pulumi.Input[bool]] = None, + html: Optional[pulumi.Input[str]] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if enabled is None: + raise TypeError("Missing 'enabled' argument") + if html is None: + raise TypeError("Missing 'html' argument") + _setter("enabled", enabled) _setter("html", html) @@ -9494,9 +10356,13 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - name: pulumi.Input[str], + name: Optional[pulumi.Input[str]] = None, description: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if name is None: + raise TypeError("Missing 'name' argument") + _setter("name", name) if description is not None: _setter("description", description) @@ -9549,11 +10415,21 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - name: pulumi.Input[str], - resource_server_identifier: pulumi.Input[str], + name: Optional[pulumi.Input[str]] = None, + resource_server_identifier: Optional[pulumi.Input[str]] = None, description: Optional[pulumi.Input[str]] = None, resource_server_name: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if name is None: + raise TypeError("Missing 'name' argument") + if resource_server_identifier is None and 'resourceServerIdentifier' in kwargs: + resource_server_identifier = kwargs['resourceServerIdentifier'] + if resource_server_identifier is None: + raise TypeError("Missing 'resource_server_identifier' argument") + if resource_server_name is None and 'resourceServerName' in kwargs: + resource_server_name = kwargs['resourceServerName'] + _setter("name", name) _setter("resource_server_identifier", resource_server_identifier) if description is not None: @@ -9713,7 +10589,55 @@ def _configure( require_pushed_authorization_requests: Optional[pulumi.Input[bool]] = None, revoke_refresh_token_grant: Optional[pulumi.Input[bool]] = None, use_scope_descriptions_for_consent: Optional[pulumi.Input[bool]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if allow_legacy_delegation_grant_types is None and 'allowLegacyDelegationGrantTypes' in kwargs: + allow_legacy_delegation_grant_types = kwargs['allowLegacyDelegationGrantTypes'] + if allow_legacy_ro_grant_types is None and 'allowLegacyRoGrantTypes' in kwargs: + allow_legacy_ro_grant_types = kwargs['allowLegacyRoGrantTypes'] + if allow_legacy_tokeninfo_endpoint is None and 'allowLegacyTokeninfoEndpoint' in kwargs: + allow_legacy_tokeninfo_endpoint = kwargs['allowLegacyTokeninfoEndpoint'] + if dashboard_insights_view is None and 'dashboardInsightsView' in kwargs: + dashboard_insights_view = kwargs['dashboardInsightsView'] + if dashboard_log_streams_next is None and 'dashboardLogStreamsNext' in kwargs: + dashboard_log_streams_next = kwargs['dashboardLogStreamsNext'] + if disable_clickjack_protection_headers is None and 'disableClickjackProtectionHeaders' in kwargs: + disable_clickjack_protection_headers = kwargs['disableClickjackProtectionHeaders'] + if disable_fields_map_fix is None and 'disableFieldsMapFix' in kwargs: + disable_fields_map_fix = kwargs['disableFieldsMapFix'] + if disable_management_api_sms_obfuscation is None and 'disableManagementApiSmsObfuscation' in kwargs: + disable_management_api_sms_obfuscation = kwargs['disableManagementApiSmsObfuscation'] + if enable_adfs_waad_email_verification is None and 'enableAdfsWaadEmailVerification' in kwargs: + enable_adfs_waad_email_verification = kwargs['enableAdfsWaadEmailVerification'] + if enable_apis_section is None and 'enableApisSection' in kwargs: + enable_apis_section = kwargs['enableApisSection'] + if enable_client_connections is None and 'enableClientConnections' in kwargs: + enable_client_connections = kwargs['enableClientConnections'] + if enable_custom_domain_in_emails is None and 'enableCustomDomainInEmails' in kwargs: + enable_custom_domain_in_emails = kwargs['enableCustomDomainInEmails'] + if enable_dynamic_client_registration is None and 'enableDynamicClientRegistration' in kwargs: + enable_dynamic_client_registration = kwargs['enableDynamicClientRegistration'] + if enable_idtoken_api2 is None and 'enableIdtokenApi2' in kwargs: + enable_idtoken_api2 = kwargs['enableIdtokenApi2'] + if enable_legacy_logs_search_v2 is None and 'enableLegacyLogsSearchV2' in kwargs: + enable_legacy_logs_search_v2 = kwargs['enableLegacyLogsSearchV2'] + if enable_legacy_profile is None and 'enableLegacyProfile' in kwargs: + enable_legacy_profile = kwargs['enableLegacyProfile'] + if enable_pipeline2 is None and 'enablePipeline2' in kwargs: + enable_pipeline2 = kwargs['enablePipeline2'] + if enable_public_signup_user_exists_error is None and 'enablePublicSignupUserExistsError' in kwargs: + enable_public_signup_user_exists_error = kwargs['enablePublicSignupUserExistsError'] + if mfa_show_factor_list_on_enrollment is None and 'mfaShowFactorListOnEnrollment' in kwargs: + mfa_show_factor_list_on_enrollment = kwargs['mfaShowFactorListOnEnrollment'] + if no_disclose_enterprise_connections is None and 'noDiscloseEnterpriseConnections' in kwargs: + no_disclose_enterprise_connections = kwargs['noDiscloseEnterpriseConnections'] + if require_pushed_authorization_requests is None and 'requirePushedAuthorizationRequests' in kwargs: + require_pushed_authorization_requests = kwargs['requirePushedAuthorizationRequests'] + if revoke_refresh_token_grant is None and 'revokeRefreshTokenGrant' in kwargs: + revoke_refresh_token_grant = kwargs['revokeRefreshTokenGrant'] + if use_scope_descriptions_for_consent is None and 'useScopeDescriptionsForConsent' in kwargs: + use_scope_descriptions_for_consent = kwargs['useScopeDescriptionsForConsent'] + if allow_legacy_delegation_grant_types is not None: _setter("allow_legacy_delegation_grant_types", allow_legacy_delegation_grant_types) if allow_legacy_ro_grant_types is not None: @@ -10053,7 +10977,9 @@ def __init__(__self__, *, def _configure( _setter: Callable[[Any, Any], None], mode: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if mode is not None: _setter("mode", mode) @@ -10084,8 +11010,14 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - oidc_logout_prompt_enabled: pulumi.Input[bool], - opts: Optional[pulumi.ResourceOptions]=None): + oidc_logout_prompt_enabled: Optional[pulumi.Input[bool]] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if oidc_logout_prompt_enabled is None and 'oidcLogoutPromptEnabled' in kwargs: + oidc_logout_prompt_enabled = kwargs['oidcLogoutPromptEnabled'] + if oidc_logout_prompt_enabled is None: + raise TypeError("Missing 'oidc_logout_prompt_enabled' argument") + _setter("oidc_logout_prompt_enabled", oidc_logout_prompt_enabled) @property @@ -10118,9 +11050,17 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - display_name: pulumi.Input[str], - id: pulumi.Input[str], - opts: Optional[pulumi.ResourceOptions]=None): + display_name: Optional[pulumi.Input[str]] = None, + id: Optional[pulumi.Input[str]] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if display_name is None and 'displayName' in kwargs: + display_name = kwargs['displayName'] + if display_name is None: + raise TypeError("Missing 'display_name' argument") + if id is None: + raise TypeError("Missing 'id' argument") + _setter("display_name", display_name) _setter("id", id) @@ -10172,11 +11112,21 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - name: pulumi.Input[str], - resource_server_identifier: pulumi.Input[str], + name: Optional[pulumi.Input[str]] = None, + resource_server_identifier: Optional[pulumi.Input[str]] = None, description: Optional[pulumi.Input[str]] = None, resource_server_name: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if name is None: + raise TypeError("Missing 'name' argument") + if resource_server_identifier is None and 'resourceServerIdentifier' in kwargs: + resource_server_identifier = kwargs['resourceServerIdentifier'] + if resource_server_identifier is None: + raise TypeError("Missing 'resource_server_identifier' argument") + if resource_server_name is None and 'resourceServerName' in kwargs: + resource_server_name = kwargs['resourceServerName'] + _setter("name", name) _setter("resource_server_identifier", resource_server_identifier) if description is not None: diff --git a/sdk/python/pulumi_auth0/_utilities.py b/sdk/python/pulumi_auth0/_utilities.py index 2d9a3c84..2936b65a 100644 --- a/sdk/python/pulumi_auth0/_utilities.py +++ b/sdk/python/pulumi_auth0/_utilities.py @@ -246,5 +246,24 @@ def lifted_func(*args, opts=None, **kwargs): return (lambda _: lifted_func) + +def configure(val, cls: type, input: bool): + def _apply(v): + if isinstance(v, typing.Mapping): + def _setter(key, value): + v[key] = value + cls._configure(_setter, **v) + return v + + # Check that cls has a static _configure method. External classes may + # not have it if it was generated with older codegen. + if hasattr(cls, "_configure"): + if isinstance(val, typing.Mapping): + return _apply(val) + elif input and val is not None and not isinstance(val, cls): + return pulumi.Output.from_input(val).apply(_apply) + + return val + def get_plugin_download_url(): return None diff --git a/sdk/python/pulumi_auth0/action.py b/sdk/python/pulumi_auth0/action.py index 82eb98af..bb0f95e3 100644 --- a/sdk/python/pulumi_auth0/action.py +++ b/sdk/python/pulumi_auth0/action.py @@ -46,14 +46,22 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - code: pulumi.Input[str], - supported_triggers: pulumi.Input['ActionSupportedTriggersArgs'], + code: Optional[pulumi.Input[str]] = None, + supported_triggers: Optional[pulumi.Input['ActionSupportedTriggersArgs']] = None, dependencies: Optional[pulumi.Input[Sequence[pulumi.Input['ActionDependencyArgs']]]] = None, deploy: Optional[pulumi.Input[bool]] = None, name: Optional[pulumi.Input[str]] = None, runtime: Optional[pulumi.Input[str]] = None, secrets: Optional[pulumi.Input[Sequence[pulumi.Input['ActionSecretArgs']]]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if code is None: + raise TypeError("Missing 'code' argument") + if supported_triggers is None and 'supportedTriggers' in kwargs: + supported_triggers = kwargs['supportedTriggers'] + if supported_triggers is None: + raise TypeError("Missing 'supported_triggers' argument") + _setter("code", code) _setter("supported_triggers", supported_triggers) if dependencies is not None: @@ -196,7 +204,13 @@ def _configure( secrets: Optional[pulumi.Input[Sequence[pulumi.Input['ActionSecretArgs']]]] = None, supported_triggers: Optional[pulumi.Input['ActionSupportedTriggersArgs']] = None, version_id: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if supported_triggers is None and 'supportedTriggers' in kwargs: + supported_triggers = kwargs['supportedTriggers'] + if version_id is None and 'versionId' in kwargs: + version_id = kwargs['versionId'] + if code is not None: _setter("code", code) if dependencies is not None: @@ -409,11 +423,7 @@ def _internal_init(__self__, __props__.__dict__["name"] = name __props__.__dict__["runtime"] = runtime __props__.__dict__["secrets"] = secrets - if supported_triggers is not None and not isinstance(supported_triggers, ActionSupportedTriggersArgs): - supported_triggers = supported_triggers or {} - def _setter(key, value): - supported_triggers[key] = value - ActionSupportedTriggersArgs._configure(_setter, **supported_triggers) + supported_triggers = _utilities.configure(supported_triggers, ActionSupportedTriggersArgs, True) if supported_triggers is None and not opts.urn: raise TypeError("Missing required property 'supported_triggers'") __props__.__dict__["supported_triggers"] = supported_triggers diff --git a/sdk/python/pulumi_auth0/attack_protection.py b/sdk/python/pulumi_auth0/attack_protection.py index 92a2efc7..2f6aa119 100644 --- a/sdk/python/pulumi_auth0/attack_protection.py +++ b/sdk/python/pulumi_auth0/attack_protection.py @@ -37,7 +37,15 @@ def _configure( breached_password_detection: Optional[pulumi.Input['AttackProtectionBreachedPasswordDetectionArgs']] = None, brute_force_protection: Optional[pulumi.Input['AttackProtectionBruteForceProtectionArgs']] = None, suspicious_ip_throttling: Optional[pulumi.Input['AttackProtectionSuspiciousIpThrottlingArgs']] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if breached_password_detection is None and 'breachedPasswordDetection' in kwargs: + breached_password_detection = kwargs['breachedPasswordDetection'] + if brute_force_protection is None and 'bruteForceProtection' in kwargs: + brute_force_protection = kwargs['bruteForceProtection'] + if suspicious_ip_throttling is None and 'suspiciousIpThrottling' in kwargs: + suspicious_ip_throttling = kwargs['suspiciousIpThrottling'] + if breached_password_detection is not None: _setter("breached_password_detection", breached_password_detection) if brute_force_protection is not None: @@ -106,7 +114,15 @@ def _configure( breached_password_detection: Optional[pulumi.Input['AttackProtectionBreachedPasswordDetectionArgs']] = None, brute_force_protection: Optional[pulumi.Input['AttackProtectionBruteForceProtectionArgs']] = None, suspicious_ip_throttling: Optional[pulumi.Input['AttackProtectionSuspiciousIpThrottlingArgs']] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if breached_password_detection is None and 'breachedPasswordDetection' in kwargs: + breached_password_detection = kwargs['breachedPasswordDetection'] + if brute_force_protection is None and 'bruteForceProtection' in kwargs: + brute_force_protection = kwargs['bruteForceProtection'] + if suspicious_ip_throttling is None and 'suspiciousIpThrottling' in kwargs: + suspicious_ip_throttling = kwargs['suspiciousIpThrottling'] + if breached_password_detection is not None: _setter("breached_password_detection", breached_password_detection) if brute_force_protection is not None: @@ -163,53 +179,6 @@ def __init__(__self__, """ Auth0 can detect attacks and stop malicious attempts to access your application such as blocking traffic from certain IPs and displaying CAPTCHAs. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_protection = auth0.AttackProtection("myProtection", - breached_password_detection=auth0.AttackProtectionBreachedPasswordDetectionArgs( - admin_notification_frequencies=["daily"], - enabled=True, - method="standard", - pre_user_registration=auth0.AttackProtectionBreachedPasswordDetectionPreUserRegistrationArgs( - shields=["block"], - ), - shields=[ - "admin_notification", - "block", - ], - ), - brute_force_protection=auth0.AttackProtectionBruteForceProtectionArgs( - allowlists=["127.0.0.1"], - enabled=True, - max_attempts=5, - mode="count_per_identifier_and_ip", - shields=[ - "block", - "user_notification", - ], - ), - suspicious_ip_throttling=auth0.AttackProtectionSuspiciousIpThrottlingArgs( - allowlists=["192.168.1.1"], - enabled=True, - pre_login=auth0.AttackProtectionSuspiciousIpThrottlingPreLoginArgs( - max_attempts=100, - rate=864000, - ), - pre_user_registration=auth0.AttackProtectionSuspiciousIpThrottlingPreUserRegistrationArgs( - max_attempts=50, - rate=1200, - ), - shields=[ - "admin_notification", - "block", - ], - )) - ``` - ## Import As this is not a resource identifiable by an ID within the Auth0 Management API, attack_protection can be imported using a random string. # We recommend [Version 4 UUID](https://www.uuidgenerator.net/version4) # Example @@ -233,53 +202,6 @@ def __init__(__self__, """ Auth0 can detect attacks and stop malicious attempts to access your application such as blocking traffic from certain IPs and displaying CAPTCHAs. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_protection = auth0.AttackProtection("myProtection", - breached_password_detection=auth0.AttackProtectionBreachedPasswordDetectionArgs( - admin_notification_frequencies=["daily"], - enabled=True, - method="standard", - pre_user_registration=auth0.AttackProtectionBreachedPasswordDetectionPreUserRegistrationArgs( - shields=["block"], - ), - shields=[ - "admin_notification", - "block", - ], - ), - brute_force_protection=auth0.AttackProtectionBruteForceProtectionArgs( - allowlists=["127.0.0.1"], - enabled=True, - max_attempts=5, - mode="count_per_identifier_and_ip", - shields=[ - "block", - "user_notification", - ], - ), - suspicious_ip_throttling=auth0.AttackProtectionSuspiciousIpThrottlingArgs( - allowlists=["192.168.1.1"], - enabled=True, - pre_login=auth0.AttackProtectionSuspiciousIpThrottlingPreLoginArgs( - max_attempts=100, - rate=864000, - ), - pre_user_registration=auth0.AttackProtectionSuspiciousIpThrottlingPreUserRegistrationArgs( - max_attempts=50, - rate=1200, - ), - shields=[ - "admin_notification", - "block", - ], - )) - ``` - ## Import As this is not a resource identifiable by an ID within the Auth0 Management API, attack_protection can be imported using a random string. # We recommend [Version 4 UUID](https://www.uuidgenerator.net/version4) # Example @@ -319,23 +241,11 @@ def _internal_init(__self__, raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource') __props__ = AttackProtectionArgs.__new__(AttackProtectionArgs) - if breached_password_detection is not None and not isinstance(breached_password_detection, AttackProtectionBreachedPasswordDetectionArgs): - breached_password_detection = breached_password_detection or {} - def _setter(key, value): - breached_password_detection[key] = value - AttackProtectionBreachedPasswordDetectionArgs._configure(_setter, **breached_password_detection) + breached_password_detection = _utilities.configure(breached_password_detection, AttackProtectionBreachedPasswordDetectionArgs, True) __props__.__dict__["breached_password_detection"] = breached_password_detection - if brute_force_protection is not None and not isinstance(brute_force_protection, AttackProtectionBruteForceProtectionArgs): - brute_force_protection = brute_force_protection or {} - def _setter(key, value): - brute_force_protection[key] = value - AttackProtectionBruteForceProtectionArgs._configure(_setter, **brute_force_protection) + brute_force_protection = _utilities.configure(brute_force_protection, AttackProtectionBruteForceProtectionArgs, True) __props__.__dict__["brute_force_protection"] = brute_force_protection - if suspicious_ip_throttling is not None and not isinstance(suspicious_ip_throttling, AttackProtectionSuspiciousIpThrottlingArgs): - suspicious_ip_throttling = suspicious_ip_throttling or {} - def _setter(key, value): - suspicious_ip_throttling[key] = value - AttackProtectionSuspiciousIpThrottlingArgs._configure(_setter, **suspicious_ip_throttling) + suspicious_ip_throttling = _utilities.configure(suspicious_ip_throttling, AttackProtectionSuspiciousIpThrottlingArgs, True) __props__.__dict__["suspicious_ip_throttling"] = suspicious_ip_throttling super(AttackProtection, __self__).__init__( 'auth0:index/attackProtection:AttackProtection', diff --git a/sdk/python/pulumi_auth0/branding.py b/sdk/python/pulumi_auth0/branding.py index 908e7c1b..ba68baf0 100644 --- a/sdk/python/pulumi_auth0/branding.py +++ b/sdk/python/pulumi_auth0/branding.py @@ -45,7 +45,15 @@ def _configure( font: Optional[pulumi.Input['BrandingFontArgs']] = None, logo_url: Optional[pulumi.Input[str]] = None, universal_login: Optional[pulumi.Input['BrandingUniversalLoginArgs']] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if favicon_url is None and 'faviconUrl' in kwargs: + favicon_url = kwargs['faviconUrl'] + if logo_url is None and 'logoUrl' in kwargs: + logo_url = kwargs['logoUrl'] + if universal_login is None and 'universalLogin' in kwargs: + universal_login = kwargs['universalLogin'] + if colors is not None: _setter("colors", colors) if favicon_url is not None: @@ -150,7 +158,15 @@ def _configure( font: Optional[pulumi.Input['BrandingFontArgs']] = None, logo_url: Optional[pulumi.Input[str]] = None, universal_login: Optional[pulumi.Input['BrandingUniversalLoginArgs']] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if favicon_url is None and 'faviconUrl' in kwargs: + favicon_url = kwargs['faviconUrl'] + if logo_url is None and 'logoUrl' in kwargs: + logo_url = kwargs['logoUrl'] + if universal_login is None and 'universalLogin' in kwargs: + universal_login = kwargs['universalLogin'] + if colors is not None: _setter("colors", colors) if favicon_url is not None: @@ -237,23 +253,6 @@ def __init__(__self__, """ This resource allows you to manage branding within your Auth0 tenant. Auth0 can be customized with a look and feel that aligns with your organization's brand requirements and user expectations. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_brand = auth0.Branding("myBrand", - logo_url="https://mycompany.org/logo.png", - colors=auth0.BrandingColorsArgs( - primary="#0059d6", - page_background="#000000", - ), - universal_login=auth0.BrandingUniversalLoginArgs( - body=(lambda path: open(path).read())("universal_login_body.html"), - )) - ``` - ## Import As this is not a resource identifiable by an ID within the Auth0 Management API, branding can be imported using a random string. # We recommend [Version 4 UUID](https://www.uuidgenerator.net/version4) # Example @@ -279,23 +278,6 @@ def __init__(__self__, """ This resource allows you to manage branding within your Auth0 tenant. Auth0 can be customized with a look and feel that aligns with your organization's brand requirements and user expectations. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_brand = auth0.Branding("myBrand", - logo_url="https://mycompany.org/logo.png", - colors=auth0.BrandingColorsArgs( - primary="#0059d6", - page_background="#000000", - ), - universal_login=auth0.BrandingUniversalLoginArgs( - body=(lambda path: open(path).read())("universal_login_body.html"), - )) - ``` - ## Import As this is not a resource identifiable by an ID within the Auth0 Management API, branding can be imported using a random string. # We recommend [Version 4 UUID](https://www.uuidgenerator.net/version4) # Example @@ -337,25 +319,13 @@ def _internal_init(__self__, raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource') __props__ = BrandingArgs.__new__(BrandingArgs) - if colors is not None and not isinstance(colors, BrandingColorsArgs): - colors = colors or {} - def _setter(key, value): - colors[key] = value - BrandingColorsArgs._configure(_setter, **colors) + colors = _utilities.configure(colors, BrandingColorsArgs, True) __props__.__dict__["colors"] = colors __props__.__dict__["favicon_url"] = favicon_url - if font is not None and not isinstance(font, BrandingFontArgs): - font = font or {} - def _setter(key, value): - font[key] = value - BrandingFontArgs._configure(_setter, **font) + font = _utilities.configure(font, BrandingFontArgs, True) __props__.__dict__["font"] = font __props__.__dict__["logo_url"] = logo_url - if universal_login is not None and not isinstance(universal_login, BrandingUniversalLoginArgs): - universal_login = universal_login or {} - def _setter(key, value): - universal_login[key] = value - BrandingUniversalLoginArgs._configure(_setter, **universal_login) + universal_login = _utilities.configure(universal_login, BrandingUniversalLoginArgs, True) __props__.__dict__["universal_login"] = universal_login super(Branding, __self__).__init__( 'auth0:index/branding:Branding', diff --git a/sdk/python/pulumi_auth0/branding_theme.py b/sdk/python/pulumi_auth0/branding_theme.py index 1f55e0cd..0ad6de79 100644 --- a/sdk/python/pulumi_auth0/branding_theme.py +++ b/sdk/python/pulumi_auth0/branding_theme.py @@ -38,13 +38,29 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - borders: pulumi.Input['BrandingThemeBordersArgs'], - colors: pulumi.Input['BrandingThemeColorsArgs'], - fonts: pulumi.Input['BrandingThemeFontsArgs'], - page_background: pulumi.Input['BrandingThemePageBackgroundArgs'], - widget: pulumi.Input['BrandingThemeWidgetArgs'], + borders: Optional[pulumi.Input['BrandingThemeBordersArgs']] = None, + colors: Optional[pulumi.Input['BrandingThemeColorsArgs']] = None, + fonts: Optional[pulumi.Input['BrandingThemeFontsArgs']] = None, + page_background: Optional[pulumi.Input['BrandingThemePageBackgroundArgs']] = None, + widget: Optional[pulumi.Input['BrandingThemeWidgetArgs']] = None, display_name: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if borders is None: + raise TypeError("Missing 'borders' argument") + if colors is None: + raise TypeError("Missing 'colors' argument") + if fonts is None: + raise TypeError("Missing 'fonts' argument") + if page_background is None and 'pageBackground' in kwargs: + page_background = kwargs['pageBackground'] + if page_background is None: + raise TypeError("Missing 'page_background' argument") + if widget is None: + raise TypeError("Missing 'widget' argument") + if display_name is None and 'displayName' in kwargs: + display_name = kwargs['displayName'] + _setter("borders", borders) _setter("colors", colors) _setter("fonts", fonts) @@ -142,7 +158,13 @@ def _configure( fonts: Optional[pulumi.Input['BrandingThemeFontsArgs']] = None, page_background: Optional[pulumi.Input['BrandingThemePageBackgroundArgs']] = None, widget: Optional[pulumi.Input['BrandingThemeWidgetArgs']] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if display_name is None and 'displayName' in kwargs: + display_name = kwargs['displayName'] + if page_background is None and 'pageBackground' in kwargs: + page_background = kwargs['pageBackground'] + if borders is not None: _setter("borders", borders) if colors is not None: @@ -229,86 +251,6 @@ def __init__(__self__, """ This resource allows you to manage branding themes for your Universal Login page within your Auth0 tenant. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - # An example of a fully configured auth0_branding_theme. - my_theme = auth0.BrandingTheme("myTheme", - borders=auth0.BrandingThemeBordersArgs( - button_border_radius=1, - button_border_weight=1, - buttons_style="pill", - input_border_radius=3, - input_border_weight=1, - inputs_style="pill", - show_widget_shadow=False, - widget_border_weight=1, - widget_corner_radius=3, - ), - colors=auth0.BrandingThemeColorsArgs( - body_text="#FF00CC", - error="#FF00CC", - header="#FF00CC", - icons="#FF00CC", - input_background="#FF00CC", - input_border="#FF00CC", - input_filled_text="#FF00CC", - input_labels_placeholders="#FF00CC", - links_focused_components="#FF00CC", - primary_button="#FF00CC", - primary_button_label="#FF00CC", - secondary_button_border="#FF00CC", - secondary_button_label="#FF00CC", - success="#FF00CC", - widget_background="#FF00CC", - widget_border="#FF00CC", - ), - fonts=auth0.BrandingThemeFontsArgs( - body_text=auth0.BrandingThemeFontsBodyTextArgs( - bold=False, - size=100, - ), - buttons_text=auth0.BrandingThemeFontsButtonsTextArgs( - bold=False, - size=100, - ), - font_url="https://google.com/font.woff", - input_labels=auth0.BrandingThemeFontsInputLabelsArgs( - bold=False, - size=100, - ), - links=auth0.BrandingThemeFontsLinksArgs( - bold=False, - size=100, - ), - links_style="normal", - reference_text_size=12, - subtitle=auth0.BrandingThemeFontsSubtitleArgs( - bold=False, - size=100, - ), - title=auth0.BrandingThemeFontsTitleArgs( - bold=False, - size=100, - ), - ), - page_background=auth0.BrandingThemePageBackgroundArgs( - background_color="#000000", - background_image_url="https://google.com/background.png", - page_layout="center", - ), - widget=auth0.BrandingThemeWidgetArgs( - header_text_alignment="center", - logo_height=55, - logo_position="center", - logo_url="https://google.com/logo.png", - social_buttons_layout="top", - )) - ``` - ## Import This resource can be imported by specifying the Branding Theme ID. # Example @@ -330,86 +272,6 @@ def __init__(__self__, """ This resource allows you to manage branding themes for your Universal Login page within your Auth0 tenant. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - # An example of a fully configured auth0_branding_theme. - my_theme = auth0.BrandingTheme("myTheme", - borders=auth0.BrandingThemeBordersArgs( - button_border_radius=1, - button_border_weight=1, - buttons_style="pill", - input_border_radius=3, - input_border_weight=1, - inputs_style="pill", - show_widget_shadow=False, - widget_border_weight=1, - widget_corner_radius=3, - ), - colors=auth0.BrandingThemeColorsArgs( - body_text="#FF00CC", - error="#FF00CC", - header="#FF00CC", - icons="#FF00CC", - input_background="#FF00CC", - input_border="#FF00CC", - input_filled_text="#FF00CC", - input_labels_placeholders="#FF00CC", - links_focused_components="#FF00CC", - primary_button="#FF00CC", - primary_button_label="#FF00CC", - secondary_button_border="#FF00CC", - secondary_button_label="#FF00CC", - success="#FF00CC", - widget_background="#FF00CC", - widget_border="#FF00CC", - ), - fonts=auth0.BrandingThemeFontsArgs( - body_text=auth0.BrandingThemeFontsBodyTextArgs( - bold=False, - size=100, - ), - buttons_text=auth0.BrandingThemeFontsButtonsTextArgs( - bold=False, - size=100, - ), - font_url="https://google.com/font.woff", - input_labels=auth0.BrandingThemeFontsInputLabelsArgs( - bold=False, - size=100, - ), - links=auth0.BrandingThemeFontsLinksArgs( - bold=False, - size=100, - ), - links_style="normal", - reference_text_size=12, - subtitle=auth0.BrandingThemeFontsSubtitleArgs( - bold=False, - size=100, - ), - title=auth0.BrandingThemeFontsTitleArgs( - bold=False, - size=100, - ), - ), - page_background=auth0.BrandingThemePageBackgroundArgs( - background_color="#000000", - background_image_url="https://google.com/background.png", - page_layout="center", - ), - widget=auth0.BrandingThemeWidgetArgs( - header_text_alignment="center", - logo_height=55, - logo_position="center", - logo_url="https://google.com/logo.png", - social_buttons_layout="top", - )) - ``` - ## Import This resource can be imported by specifying the Branding Theme ID. # Example @@ -452,44 +314,24 @@ def _internal_init(__self__, raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource') __props__ = BrandingThemeArgs.__new__(BrandingThemeArgs) - if borders is not None and not isinstance(borders, BrandingThemeBordersArgs): - borders = borders or {} - def _setter(key, value): - borders[key] = value - BrandingThemeBordersArgs._configure(_setter, **borders) + borders = _utilities.configure(borders, BrandingThemeBordersArgs, True) if borders is None and not opts.urn: raise TypeError("Missing required property 'borders'") __props__.__dict__["borders"] = borders - if colors is not None and not isinstance(colors, BrandingThemeColorsArgs): - colors = colors or {} - def _setter(key, value): - colors[key] = value - BrandingThemeColorsArgs._configure(_setter, **colors) + colors = _utilities.configure(colors, BrandingThemeColorsArgs, True) if colors is None and not opts.urn: raise TypeError("Missing required property 'colors'") __props__.__dict__["colors"] = colors __props__.__dict__["display_name"] = display_name - if fonts is not None and not isinstance(fonts, BrandingThemeFontsArgs): - fonts = fonts or {} - def _setter(key, value): - fonts[key] = value - BrandingThemeFontsArgs._configure(_setter, **fonts) + fonts = _utilities.configure(fonts, BrandingThemeFontsArgs, True) if fonts is None and not opts.urn: raise TypeError("Missing required property 'fonts'") __props__.__dict__["fonts"] = fonts - if page_background is not None and not isinstance(page_background, BrandingThemePageBackgroundArgs): - page_background = page_background or {} - def _setter(key, value): - page_background[key] = value - BrandingThemePageBackgroundArgs._configure(_setter, **page_background) + page_background = _utilities.configure(page_background, BrandingThemePageBackgroundArgs, True) if page_background is None and not opts.urn: raise TypeError("Missing required property 'page_background'") __props__.__dict__["page_background"] = page_background - if widget is not None and not isinstance(widget, BrandingThemeWidgetArgs): - widget = widget or {} - def _setter(key, value): - widget[key] = value - BrandingThemeWidgetArgs._configure(_setter, **widget) + widget = _utilities.configure(widget, BrandingThemeWidgetArgs, True) if widget is None and not opts.urn: raise TypeError("Missing required property 'widget'") __props__.__dict__["widget"] = widget diff --git a/sdk/python/pulumi_auth0/client.py b/sdk/python/pulumi_auth0/client.py index 72af2027..e0ec73a0 100644 --- a/sdk/python/pulumi_auth0/client.py +++ b/sdk/python/pulumi_auth0/client.py @@ -157,7 +157,63 @@ def _configure( sso: Optional[pulumi.Input[bool]] = None, sso_disabled: Optional[pulumi.Input[bool]] = None, web_origins: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if allowed_clients is None and 'allowedClients' in kwargs: + allowed_clients = kwargs['allowedClients'] + if allowed_logout_urls is None and 'allowedLogoutUrls' in kwargs: + allowed_logout_urls = kwargs['allowedLogoutUrls'] + if allowed_origins is None and 'allowedOrigins' in kwargs: + allowed_origins = kwargs['allowedOrigins'] + if app_type is None and 'appType' in kwargs: + app_type = kwargs['appType'] + if client_aliases is None and 'clientAliases' in kwargs: + client_aliases = kwargs['clientAliases'] + if client_metadata is None and 'clientMetadata' in kwargs: + client_metadata = kwargs['clientMetadata'] + if cross_origin_auth is None and 'crossOriginAuth' in kwargs: + cross_origin_auth = kwargs['crossOriginAuth'] + if cross_origin_loc is None and 'crossOriginLoc' in kwargs: + cross_origin_loc = kwargs['crossOriginLoc'] + if custom_login_page is None and 'customLoginPage' in kwargs: + custom_login_page = kwargs['customLoginPage'] + if custom_login_page_on is None and 'customLoginPageOn' in kwargs: + custom_login_page_on = kwargs['customLoginPageOn'] + if encryption_key is None and 'encryptionKey' in kwargs: + encryption_key = kwargs['encryptionKey'] + if form_template is None and 'formTemplate' in kwargs: + form_template = kwargs['formTemplate'] + if grant_types is None and 'grantTypes' in kwargs: + grant_types = kwargs['grantTypes'] + if initiate_login_uri is None and 'initiateLoginUri' in kwargs: + initiate_login_uri = kwargs['initiateLoginUri'] + if is_first_party is None and 'isFirstParty' in kwargs: + is_first_party = kwargs['isFirstParty'] + if is_token_endpoint_ip_header_trusted is None and 'isTokenEndpointIpHeaderTrusted' in kwargs: + is_token_endpoint_ip_header_trusted = kwargs['isTokenEndpointIpHeaderTrusted'] + if jwt_configuration is None and 'jwtConfiguration' in kwargs: + jwt_configuration = kwargs['jwtConfiguration'] + if logo_uri is None and 'logoUri' in kwargs: + logo_uri = kwargs['logoUri'] + if native_social_login is None and 'nativeSocialLogin' in kwargs: + native_social_login = kwargs['nativeSocialLogin'] + if oidc_backchannel_logout_urls is None and 'oidcBackchannelLogoutUrls' in kwargs: + oidc_backchannel_logout_urls = kwargs['oidcBackchannelLogoutUrls'] + if oidc_conformant is None and 'oidcConformant' in kwargs: + oidc_conformant = kwargs['oidcConformant'] + if organization_require_behavior is None and 'organizationRequireBehavior' in kwargs: + organization_require_behavior = kwargs['organizationRequireBehavior'] + if organization_usage is None and 'organizationUsage' in kwargs: + organization_usage = kwargs['organizationUsage'] + if refresh_token is None and 'refreshToken' in kwargs: + refresh_token = kwargs['refreshToken'] + if require_pushed_authorization_requests is None and 'requirePushedAuthorizationRequests' in kwargs: + require_pushed_authorization_requests = kwargs['requirePushedAuthorizationRequests'] + if sso_disabled is None and 'ssoDisabled' in kwargs: + sso_disabled = kwargs['ssoDisabled'] + if web_origins is None and 'webOrigins' in kwargs: + web_origins = kwargs['webOrigins'] + if addons is not None: _setter("addons", addons) if allowed_clients is not None: @@ -776,7 +832,67 @@ def _configure( sso: Optional[pulumi.Input[bool]] = None, sso_disabled: Optional[pulumi.Input[bool]] = None, web_origins: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if allowed_clients is None and 'allowedClients' in kwargs: + allowed_clients = kwargs['allowedClients'] + if allowed_logout_urls is None and 'allowedLogoutUrls' in kwargs: + allowed_logout_urls = kwargs['allowedLogoutUrls'] + if allowed_origins is None and 'allowedOrigins' in kwargs: + allowed_origins = kwargs['allowedOrigins'] + if app_type is None and 'appType' in kwargs: + app_type = kwargs['appType'] + if client_aliases is None and 'clientAliases' in kwargs: + client_aliases = kwargs['clientAliases'] + if client_id is None and 'clientId' in kwargs: + client_id = kwargs['clientId'] + if client_metadata is None and 'clientMetadata' in kwargs: + client_metadata = kwargs['clientMetadata'] + if cross_origin_auth is None and 'crossOriginAuth' in kwargs: + cross_origin_auth = kwargs['crossOriginAuth'] + if cross_origin_loc is None and 'crossOriginLoc' in kwargs: + cross_origin_loc = kwargs['crossOriginLoc'] + if custom_login_page is None and 'customLoginPage' in kwargs: + custom_login_page = kwargs['customLoginPage'] + if custom_login_page_on is None and 'customLoginPageOn' in kwargs: + custom_login_page_on = kwargs['customLoginPageOn'] + if encryption_key is None and 'encryptionKey' in kwargs: + encryption_key = kwargs['encryptionKey'] + if form_template is None and 'formTemplate' in kwargs: + form_template = kwargs['formTemplate'] + if grant_types is None and 'grantTypes' in kwargs: + grant_types = kwargs['grantTypes'] + if initiate_login_uri is None and 'initiateLoginUri' in kwargs: + initiate_login_uri = kwargs['initiateLoginUri'] + if is_first_party is None and 'isFirstParty' in kwargs: + is_first_party = kwargs['isFirstParty'] + if is_token_endpoint_ip_header_trusted is None and 'isTokenEndpointIpHeaderTrusted' in kwargs: + is_token_endpoint_ip_header_trusted = kwargs['isTokenEndpointIpHeaderTrusted'] + if jwt_configuration is None and 'jwtConfiguration' in kwargs: + jwt_configuration = kwargs['jwtConfiguration'] + if logo_uri is None and 'logoUri' in kwargs: + logo_uri = kwargs['logoUri'] + if native_social_login is None and 'nativeSocialLogin' in kwargs: + native_social_login = kwargs['nativeSocialLogin'] + if oidc_backchannel_logout_urls is None and 'oidcBackchannelLogoutUrls' in kwargs: + oidc_backchannel_logout_urls = kwargs['oidcBackchannelLogoutUrls'] + if oidc_conformant is None and 'oidcConformant' in kwargs: + oidc_conformant = kwargs['oidcConformant'] + if organization_require_behavior is None and 'organizationRequireBehavior' in kwargs: + organization_require_behavior = kwargs['organizationRequireBehavior'] + if organization_usage is None and 'organizationUsage' in kwargs: + organization_usage = kwargs['organizationUsage'] + if refresh_token is None and 'refreshToken' in kwargs: + refresh_token = kwargs['refreshToken'] + if require_pushed_authorization_requests is None and 'requirePushedAuthorizationRequests' in kwargs: + require_pushed_authorization_requests = kwargs['requirePushedAuthorizationRequests'] + if signing_keys is None and 'signingKeys' in kwargs: + signing_keys = kwargs['signingKeys'] + if sso_disabled is None and 'ssoDisabled' in kwargs: + sso_disabled = kwargs['ssoDisabled'] + if web_origins is None and 'webOrigins' in kwargs: + web_origins = kwargs['webOrigins'] + if addons is not None: _setter("addons", addons) if allowed_clients is not None: @@ -1313,77 +1429,6 @@ def __init__(__self__, """ With this resource, you can set up applications that use Auth0 for authentication and configure allowed callback URLs and secrets for these applications. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_client = auth0.Client("myClient", - addons=auth0.ClientAddonsArgs( - samlp=auth0.ClientAddonsSamlpArgs( - audience="https://example.com/saml", - create_upn_claim=False, - issuer="https://example.com", - map_identities=False, - map_unknown_claims_as_is=False, - mappings={ - "email": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress", - "name": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name", - }, - name_identifier_format="urn:oasis:names:tc:SAML:2.0:nameid-format:persistent", - name_identifier_probes=["http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress"], - passthrough_claims_with_no_mapping=False, - signing_cert=\"\"\"-----BEGIN PUBLIC KEY----- - MIGf...bpP/t3 - +JGNGIRMj1hF1rnb6QIDAQAB - -----END PUBLIC KEY----- - - \"\"\", - ), - ), - allowed_logout_urls=["https://example.com"], - allowed_origins=["https://example.com"], - app_type="non_interactive", - callbacks=["https://example.com/callback"], - client_metadata={ - "foo": "zoo", - }, - custom_login_page_on=True, - description="Test Applications Long Description", - grant_types=[ - "authorization_code", - "http://auth0.com/oauth/grant-type/password-realm", - "implicit", - "password", - "refresh_token", - ], - is_first_party=True, - is_token_endpoint_ip_header_trusted=True, - jwt_configuration=auth0.ClientJwtConfigurationArgs( - alg="RS256", - lifetime_in_seconds=300, - scopes={ - "foo": "bar", - }, - secret_encoded=True, - ), - mobile=auth0.ClientMobileArgs( - ios=auth0.ClientMobileIosArgs( - app_bundle_identifier="com.my.bundle.id", - team_id="9JA89QQLNQ", - ), - ), - oidc_conformant=False, - refresh_token=auth0.ClientRefreshTokenArgs( - expiration_type="expiring", - leeway=0, - rotation_type="rotating", - token_lifetime=2592000, - ), - web_origins=["https://example.com"]) - ``` - ## Import This resource can be imported by specifying the client ID. # Example @@ -1437,77 +1482,6 @@ def __init__(__self__, """ With this resource, you can set up applications that use Auth0 for authentication and configure allowed callback URLs and secrets for these applications. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_client = auth0.Client("myClient", - addons=auth0.ClientAddonsArgs( - samlp=auth0.ClientAddonsSamlpArgs( - audience="https://example.com/saml", - create_upn_claim=False, - issuer="https://example.com", - map_identities=False, - map_unknown_claims_as_is=False, - mappings={ - "email": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress", - "name": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name", - }, - name_identifier_format="urn:oasis:names:tc:SAML:2.0:nameid-format:persistent", - name_identifier_probes=["http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress"], - passthrough_claims_with_no_mapping=False, - signing_cert=\"\"\"-----BEGIN PUBLIC KEY----- - MIGf...bpP/t3 - +JGNGIRMj1hF1rnb6QIDAQAB - -----END PUBLIC KEY----- - - \"\"\", - ), - ), - allowed_logout_urls=["https://example.com"], - allowed_origins=["https://example.com"], - app_type="non_interactive", - callbacks=["https://example.com/callback"], - client_metadata={ - "foo": "zoo", - }, - custom_login_page_on=True, - description="Test Applications Long Description", - grant_types=[ - "authorization_code", - "http://auth0.com/oauth/grant-type/password-realm", - "implicit", - "password", - "refresh_token", - ], - is_first_party=True, - is_token_endpoint_ip_header_trusted=True, - jwt_configuration=auth0.ClientJwtConfigurationArgs( - alg="RS256", - lifetime_in_seconds=300, - scopes={ - "foo": "bar", - }, - secret_encoded=True, - ), - mobile=auth0.ClientMobileArgs( - ios=auth0.ClientMobileIosArgs( - app_bundle_identifier="com.my.bundle.id", - team_id="9JA89QQLNQ", - ), - ), - oidc_conformant=False, - refresh_token=auth0.ClientRefreshTokenArgs( - expiration_type="expiring", - leeway=0, - rotation_type="rotating", - token_lifetime=2592000, - ), - web_origins=["https://example.com"]) - ``` - ## Import This resource can be imported by specifying the client ID. # Example @@ -1577,11 +1551,7 @@ def _internal_init(__self__, raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource') __props__ = ClientArgs.__new__(ClientArgs) - if addons is not None and not isinstance(addons, ClientAddonsArgs): - addons = addons or {} - def _setter(key, value): - addons[key] = value - ClientAddonsArgs._configure(_setter, **addons) + addons = _utilities.configure(addons, ClientAddonsArgs, True) __props__.__dict__["addons"] = addons __props__.__dict__["allowed_clients"] = allowed_clients __props__.__dict__["allowed_logout_urls"] = allowed_logout_urls @@ -1603,35 +1573,19 @@ def _setter(key, value): __props__.__dict__["initiate_login_uri"] = initiate_login_uri __props__.__dict__["is_first_party"] = is_first_party __props__.__dict__["is_token_endpoint_ip_header_trusted"] = is_token_endpoint_ip_header_trusted - if jwt_configuration is not None and not isinstance(jwt_configuration, ClientJwtConfigurationArgs): - jwt_configuration = jwt_configuration or {} - def _setter(key, value): - jwt_configuration[key] = value - ClientJwtConfigurationArgs._configure(_setter, **jwt_configuration) + jwt_configuration = _utilities.configure(jwt_configuration, ClientJwtConfigurationArgs, True) __props__.__dict__["jwt_configuration"] = jwt_configuration __props__.__dict__["logo_uri"] = logo_uri - if mobile is not None and not isinstance(mobile, ClientMobileArgs): - mobile = mobile or {} - def _setter(key, value): - mobile[key] = value - ClientMobileArgs._configure(_setter, **mobile) + mobile = _utilities.configure(mobile, ClientMobileArgs, True) __props__.__dict__["mobile"] = mobile __props__.__dict__["name"] = name - if native_social_login is not None and not isinstance(native_social_login, ClientNativeSocialLoginArgs): - native_social_login = native_social_login or {} - def _setter(key, value): - native_social_login[key] = value - ClientNativeSocialLoginArgs._configure(_setter, **native_social_login) + native_social_login = _utilities.configure(native_social_login, ClientNativeSocialLoginArgs, True) __props__.__dict__["native_social_login"] = native_social_login __props__.__dict__["oidc_backchannel_logout_urls"] = oidc_backchannel_logout_urls __props__.__dict__["oidc_conformant"] = oidc_conformant __props__.__dict__["organization_require_behavior"] = organization_require_behavior __props__.__dict__["organization_usage"] = organization_usage - if refresh_token is not None and not isinstance(refresh_token, ClientRefreshTokenArgs): - refresh_token = refresh_token or {} - def _setter(key, value): - refresh_token[key] = value - ClientRefreshTokenArgs._configure(_setter, **refresh_token) + refresh_token = _utilities.configure(refresh_token, ClientRefreshTokenArgs, True) __props__.__dict__["refresh_token"] = refresh_token __props__.__dict__["require_pushed_authorization_requests"] = require_pushed_authorization_requests __props__.__dict__["sso"] = sso diff --git a/sdk/python/pulumi_auth0/client_credentials.py b/sdk/python/pulumi_auth0/client_credentials.py index c630a511..13a472a7 100644 --- a/sdk/python/pulumi_auth0/client_credentials.py +++ b/sdk/python/pulumi_auth0/client_credentials.py @@ -40,11 +40,25 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - authentication_method: pulumi.Input[str], - client_id: pulumi.Input[str], + authentication_method: Optional[pulumi.Input[str]] = None, + client_id: Optional[pulumi.Input[str]] = None, client_secret: Optional[pulumi.Input[str]] = None, private_key_jwt: Optional[pulumi.Input['ClientCredentialsPrivateKeyJwtArgs']] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if authentication_method is None and 'authenticationMethod' in kwargs: + authentication_method = kwargs['authenticationMethod'] + if authentication_method is None: + raise TypeError("Missing 'authentication_method' argument") + if client_id is None and 'clientId' in kwargs: + client_id = kwargs['clientId'] + if client_id is None: + raise TypeError("Missing 'client_id' argument") + if client_secret is None and 'clientSecret' in kwargs: + client_secret = kwargs['clientSecret'] + if private_key_jwt is None and 'privateKeyJwt' in kwargs: + private_key_jwt = kwargs['privateKeyJwt'] + _setter("authentication_method", authentication_method) _setter("client_id", client_id) if client_secret is not None: @@ -135,7 +149,17 @@ def _configure( client_id: Optional[pulumi.Input[str]] = None, client_secret: Optional[pulumi.Input[str]] = None, private_key_jwt: Optional[pulumi.Input['ClientCredentialsPrivateKeyJwtArgs']] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if authentication_method is None and 'authenticationMethod' in kwargs: + authentication_method = kwargs['authenticationMethod'] + if client_id is None and 'clientId' in kwargs: + client_id = kwargs['clientId'] + if client_secret is None and 'clientSecret' in kwargs: + client_secret = kwargs['clientSecret'] + if private_key_jwt is None and 'privateKeyJwt' in kwargs: + private_key_jwt = kwargs['privateKeyJwt'] + if authentication_method is not None: _setter("authentication_method", authentication_method) if client_id is not None: @@ -213,52 +237,6 @@ def __init__(__self__, > Refer to the client secret rotation guide for instructions on how to rotate client secrets with zero downtime. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_client = auth0.Client("myClient", - app_type="non_interactive", - jwt_configuration=auth0.ClientJwtConfigurationArgs( - alg="RS256", - )) - # Configuring client_secret_post as an authentication method. - test_client_credentials = auth0.ClientCredentials("testClientCredentials", - client_id=my_client.id, - authentication_method="client_secret_post") - # Configuring client_secret_basic as an authentication method. - test_index_client_credentials_client_credentials = auth0.ClientCredentials("testIndex/clientCredentialsClientCredentials", - client_id=my_client.id, - authentication_method="client_secret_basic") - # Configuring none as an authentication method. - test_auth0_index_client_credentials_client_credentials = auth0.ClientCredentials("testAuth0Index/clientCredentialsClientCredentials", - client_id=my_client.id, - authentication_method="none") - # Configuring private_key_jwt as an authentication method. - test_auth0_index_client_credentials_client_credentials1 = auth0.ClientCredentials("testAuth0Index/clientCredentialsClientCredentials1", - client_id=my_client.id, - authentication_method="private_key_jwt", - private_key_jwt=auth0.ClientCredentialsPrivateKeyJwtArgs( - credentials=[auth0.ClientCredentialsPrivateKeyJwtCredentialArgs( - name="Testing Credentials 1", - credential_type="public_key", - algorithm="RS256", - parse_expiry_from_cert=True, - pem=\"\"\"-----BEGIN CERTIFICATE----- - MIIFWDCCA0ACCQDXqpBo3R...G9w0BAQsFADBuMQswCQYDVQQGEwJl - -----END CERTIFICATE----- - \"\"\", - )], - )) - # Configuring the client_secret. - test_auth0_index_client_credentials_client_credentials2 = auth0.ClientCredentials("testAuth0Index/clientCredentialsClientCredentials2", - client_id=my_client.id, - authentication_method="client_secret_basic", - client_secret="LUFqPx+sRLjbL7peYRPFmFu-bbvE7u7og4YUNe_C345=683341") - ``` - ## Import This resource can be imported by specifying the client ID. # Example @@ -291,52 +269,6 @@ def __init__(__self__, > Refer to the client secret rotation guide for instructions on how to rotate client secrets with zero downtime. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_client = auth0.Client("myClient", - app_type="non_interactive", - jwt_configuration=auth0.ClientJwtConfigurationArgs( - alg="RS256", - )) - # Configuring client_secret_post as an authentication method. - test_client_credentials = auth0.ClientCredentials("testClientCredentials", - client_id=my_client.id, - authentication_method="client_secret_post") - # Configuring client_secret_basic as an authentication method. - test_index_client_credentials_client_credentials = auth0.ClientCredentials("testIndex/clientCredentialsClientCredentials", - client_id=my_client.id, - authentication_method="client_secret_basic") - # Configuring none as an authentication method. - test_auth0_index_client_credentials_client_credentials = auth0.ClientCredentials("testAuth0Index/clientCredentialsClientCredentials", - client_id=my_client.id, - authentication_method="none") - # Configuring private_key_jwt as an authentication method. - test_auth0_index_client_credentials_client_credentials1 = auth0.ClientCredentials("testAuth0Index/clientCredentialsClientCredentials1", - client_id=my_client.id, - authentication_method="private_key_jwt", - private_key_jwt=auth0.ClientCredentialsPrivateKeyJwtArgs( - credentials=[auth0.ClientCredentialsPrivateKeyJwtCredentialArgs( - name="Testing Credentials 1", - credential_type="public_key", - algorithm="RS256", - parse_expiry_from_cert=True, - pem=\"\"\"-----BEGIN CERTIFICATE----- - MIIFWDCCA0ACCQDXqpBo3R...G9w0BAQsFADBuMQswCQYDVQQGEwJl - -----END CERTIFICATE----- - \"\"\", - )], - )) - # Configuring the client_secret. - test_auth0_index_client_credentials_client_credentials2 = auth0.ClientCredentials("testAuth0Index/clientCredentialsClientCredentials2", - client_id=my_client.id, - authentication_method="client_secret_basic", - client_secret="LUFqPx+sRLjbL7peYRPFmFu-bbvE7u7og4YUNe_C345=683341") - ``` - ## Import This resource can be imported by specifying the client ID. # Example @@ -386,11 +318,7 @@ def _internal_init(__self__, raise TypeError("Missing required property 'client_id'") __props__.__dict__["client_id"] = client_id __props__.__dict__["client_secret"] = None if client_secret is None else pulumi.Output.secret(client_secret) - if private_key_jwt is not None and not isinstance(private_key_jwt, ClientCredentialsPrivateKeyJwtArgs): - private_key_jwt = private_key_jwt or {} - def _setter(key, value): - private_key_jwt[key] = value - ClientCredentialsPrivateKeyJwtArgs._configure(_setter, **private_key_jwt) + private_key_jwt = _utilities.configure(private_key_jwt, ClientCredentialsPrivateKeyJwtArgs, True) __props__.__dict__["private_key_jwt"] = private_key_jwt secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["clientSecret"]) opts = pulumi.ResourceOptions.merge(opts, secret_opts) diff --git a/sdk/python/pulumi_auth0/client_grant.py b/sdk/python/pulumi_auth0/client_grant.py index fbd4cf59..8ddb7bf0 100644 --- a/sdk/python/pulumi_auth0/client_grant.py +++ b/sdk/python/pulumi_auth0/client_grant.py @@ -32,10 +32,20 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - audience: pulumi.Input[str], - client_id: pulumi.Input[str], - scopes: pulumi.Input[Sequence[pulumi.Input[str]]], - opts: Optional[pulumi.ResourceOptions]=None): + audience: Optional[pulumi.Input[str]] = None, + client_id: Optional[pulumi.Input[str]] = None, + scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if audience is None: + raise TypeError("Missing 'audience' argument") + if client_id is None and 'clientId' in kwargs: + client_id = kwargs['clientId'] + if client_id is None: + raise TypeError("Missing 'client_id' argument") + if scopes is None: + raise TypeError("Missing 'scopes' argument") + _setter("audience", audience) _setter("client_id", client_id) _setter("scopes", scopes) @@ -101,7 +111,11 @@ def _configure( audience: Optional[pulumi.Input[str]] = None, client_id: Optional[pulumi.Input[str]] = None, scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if client_id is None and 'clientId' in kwargs: + client_id = kwargs['clientId'] + if audience is not None: _setter("audience", audience) if client_id is not None: diff --git a/sdk/python/pulumi_auth0/connection.py b/sdk/python/pulumi_auth0/connection.py index f121a761..abb1623a 100644 --- a/sdk/python/pulumi_auth0/connection.py +++ b/sdk/python/pulumi_auth0/connection.py @@ -49,7 +49,7 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - strategy: pulumi.Input[str], + strategy: Optional[pulumi.Input[str]] = None, display_name: Optional[pulumi.Input[str]] = None, is_domain_connection: Optional[pulumi.Input[bool]] = None, metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None, @@ -57,7 +57,17 @@ def _configure( options: Optional[pulumi.Input['ConnectionOptionsArgs']] = None, realms: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, show_as_button: Optional[pulumi.Input[bool]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if strategy is None: + raise TypeError("Missing 'strategy' argument") + if display_name is None and 'displayName' in kwargs: + display_name = kwargs['displayName'] + if is_domain_connection is None and 'isDomainConnection' in kwargs: + is_domain_connection = kwargs['isDomainConnection'] + if show_as_button is None and 'showAsButton' in kwargs: + show_as_button = kwargs['showAsButton'] + _setter("strategy", strategy) if display_name is not None: _setter("display_name", display_name) @@ -215,7 +225,15 @@ def _configure( realms: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, show_as_button: Optional[pulumi.Input[bool]] = None, strategy: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if display_name is None and 'displayName' in kwargs: + display_name = kwargs['displayName'] + if is_domain_connection is None and 'isDomainConnection' in kwargs: + is_domain_connection = kwargs['isDomainConnection'] + if show_as_button is None and 'showAsButton' in kwargs: + show_as_button = kwargs['showAsButton'] + if display_name is not None: _setter("display_name", display_name) if is_domain_connection is not None: @@ -351,281 +369,6 @@ def __init__(__self__, creation of multiple connections per strategy, the additional connections may not be visible in the Auth0 dashboard. ## Example Usage - ### Google OAuth2 Connection - - > Your Auth0 account may be pre-configured with a `google-oauth2` connection. - - ```python - import pulumi - import pulumi_auth0 as auth0 - - google_oauth2 = auth0.Connection("googleOauth2", - options=auth0.ConnectionOptionsArgs( - allowed_audiences=[ - "example.com", - "api.example.com", - ], - client_id="", - client_secret="", - non_persistent_attrs=[ - "ethnicity", - "gender", - ], - scopes=[ - "email", - "profile", - "gmail", - "youtube", - ], - set_user_root_attributes="on_each_login", - ), - strategy="google-oauth2") - ``` - ### Facebook Connection - - ```python - import pulumi - import pulumi_auth0 as auth0 - - facebook = auth0.Connection("facebook", - options=auth0.ConnectionOptionsArgs( - client_id="", - client_secret="", - non_persistent_attrs=[ - "ethnicity", - "gender", - ], - scopes=[ - "public_profile", - "email", - "groups_access_member_info", - "user_birthday", - ], - set_user_root_attributes="on_each_login", - ), - strategy="facebook") - ``` - ### Apple Connection - - ```python - import pulumi - import pulumi_auth0 as auth0 - - apple = auth0.Connection("apple", - options=auth0.ConnectionOptionsArgs( - client_id="", - client_secret=\"\"\"-----BEGIN PRIVATE KEY----- - MIHBAgEAMA0GCSqGSIb3DQEBAQUABIGsMIGpAgEAA - -----END PRIVATE KEY----- - \"\"\", - key_id="", - non_persistent_attrs=[ - "ethnicity", - "gender", - ], - scopes=[ - "email", - "name", - ], - set_user_root_attributes="on_first_login", - team_id="", - ), - strategy="apple") - ``` - ### LinkedIn Connection - - ```python - import pulumi - import pulumi_auth0 as auth0 - - linkedin = auth0.Connection("linkedin", - options=auth0.ConnectionOptionsArgs( - client_id="", - client_secret="", - non_persistent_attrs=[ - "ethnicity", - "gender", - ], - scopes=[ - "basic_profile", - "profile", - "email", - ], - set_user_root_attributes="on_each_login", - strategy_version=2, - ), - strategy="linkedin") - ``` - ### GitHub Connection - - ```python - import pulumi - import pulumi_auth0 as auth0 - - github = auth0.Connection("github", - options=auth0.ConnectionOptionsArgs( - client_id="", - client_secret="", - non_persistent_attrs=[ - "ethnicity", - "gender", - ], - scopes=[ - "email", - "profile", - "public_repo", - "repo", - ], - set_user_root_attributes="on_each_login", - ), - strategy="github") - ``` - ### SalesForce Connection - - ```python - import pulumi - import pulumi_auth0 as auth0 - - salesforce = auth0.Connection("salesforce", - options=auth0.ConnectionOptionsArgs( - client_id="", - client_secret="", - community_base_url="https://salesforce.example.com", - non_persistent_attrs=[ - "ethnicity", - "gender", - ], - scopes=[ - "openid", - "email", - ], - set_user_root_attributes="on_first_login", - ), - strategy="salesforce") - ``` - ### OAuth2 Connection - - Also applies to following connection strategies: `dropbox`, `bitbucket`, `paypal`, `twitter`, `amazon`, `yahoo`, `box`, `wordpress`, `shopify`, `custom` - - ```python - import pulumi - import pulumi_auth0 as auth0 - - oauth2 = auth0.Connection("oauth2", - options=auth0.ConnectionOptionsArgs( - authorization_endpoint="https://auth.example.com/oauth2/authorize", - client_id="", - client_secret="", - icon_url="https://auth.example.com/assets/logo.png", - non_persistent_attrs=[ - "ethnicity", - "gender", - ], - pkce_enabled=True, - scopes=[ - "basic_profile", - "profile", - "email", - ], - scripts={ - "fetchUserProfile": \"\"\" function fetchUserProfile(accessToken, context, callback) { - return callback(new Error("Whoops!")); - } - - \"\"\", - }, - set_user_root_attributes="on_each_login", - token_endpoint="https://auth.example.com/oauth2/token", - ), - strategy="oauth2") - ``` - ### SMS Connection - - > To be able to see this in the management dashboard as well, the name of the connection must be set to "sms". - - ```python - import pulumi - import pulumi_auth0 as auth0 - - sms = auth0.Connection("sms", - is_domain_connection=False, - options=auth0.ConnectionOptionsArgs( - brute_force_protection=True, - disable_signup=False, - forward_request_info=True, - from_="+15555555555", - gateway_authentication=auth0.ConnectionOptionsGatewayAuthenticationArgs( - audience="https://somewhere.com/sms-gateway", - method="bearer", - secret="4e2680bb74ec2ae24736476dd37ed6c2", - secret_base64_encoded=False, - subject="test.us.auth0.com:sms", - ), - gateway_url="https://somewhere.com/sms-gateway", - name="sms", - provider="sms_gateway", - syntax="md_with_macros", - template="@@password@@", - totp=auth0.ConnectionOptionsTotpArgs( - length=6, - time_step=300, - ), - ), - strategy="sms") - ``` - ### Email Connection - - > To be able to see this in the management dashboard as well, the name of the connection must be set to "email". - - ```python - import pulumi - import pulumi_auth0 as auth0 - - passwordless_email = auth0.Connection("passwordlessEmail", - options=auth0.ConnectionOptionsArgs( - auth_params={ - "responseType": "code", - "scope": "openid email profile offline_access", - }, - brute_force_protection=True, - disable_signup=False, - from_="{{ application.name }} ", - name="email", - non_persistent_attrs=[], - set_user_root_attributes="on_each_login", - subject="Welcome to {{ application.name }}", - syntax="liquid", - template="This is the body of the email", - totp=auth0.ConnectionOptionsTotpArgs( - length=6, - time_step=300, - ), - ), - strategy="email") - ``` - ### WindowsLive Connection - - ```python - import pulumi - import pulumi_auth0 as auth0 - - windowslive = auth0.Connection("windowslive", - options=auth0.ConnectionOptionsArgs( - client_id="", - client_secret="", - non_persistent_attrs=[ - "ethnicity", - "gender", - ], - scopes=[ - "signin", - "graph_user", - ], - set_user_root_attributes="on_first_login", - strategy_version=2, - ), - strategy="windowslive") - ``` ## Import @@ -659,281 +402,6 @@ def __init__(__self__, creation of multiple connections per strategy, the additional connections may not be visible in the Auth0 dashboard. ## Example Usage - ### Google OAuth2 Connection - - > Your Auth0 account may be pre-configured with a `google-oauth2` connection. - - ```python - import pulumi - import pulumi_auth0 as auth0 - - google_oauth2 = auth0.Connection("googleOauth2", - options=auth0.ConnectionOptionsArgs( - allowed_audiences=[ - "example.com", - "api.example.com", - ], - client_id="", - client_secret="", - non_persistent_attrs=[ - "ethnicity", - "gender", - ], - scopes=[ - "email", - "profile", - "gmail", - "youtube", - ], - set_user_root_attributes="on_each_login", - ), - strategy="google-oauth2") - ``` - ### Facebook Connection - - ```python - import pulumi - import pulumi_auth0 as auth0 - - facebook = auth0.Connection("facebook", - options=auth0.ConnectionOptionsArgs( - client_id="", - client_secret="", - non_persistent_attrs=[ - "ethnicity", - "gender", - ], - scopes=[ - "public_profile", - "email", - "groups_access_member_info", - "user_birthday", - ], - set_user_root_attributes="on_each_login", - ), - strategy="facebook") - ``` - ### Apple Connection - - ```python - import pulumi - import pulumi_auth0 as auth0 - - apple = auth0.Connection("apple", - options=auth0.ConnectionOptionsArgs( - client_id="", - client_secret=\"\"\"-----BEGIN PRIVATE KEY----- - MIHBAgEAMA0GCSqGSIb3DQEBAQUABIGsMIGpAgEAA - -----END PRIVATE KEY----- - \"\"\", - key_id="", - non_persistent_attrs=[ - "ethnicity", - "gender", - ], - scopes=[ - "email", - "name", - ], - set_user_root_attributes="on_first_login", - team_id="", - ), - strategy="apple") - ``` - ### LinkedIn Connection - - ```python - import pulumi - import pulumi_auth0 as auth0 - - linkedin = auth0.Connection("linkedin", - options=auth0.ConnectionOptionsArgs( - client_id="", - client_secret="", - non_persistent_attrs=[ - "ethnicity", - "gender", - ], - scopes=[ - "basic_profile", - "profile", - "email", - ], - set_user_root_attributes="on_each_login", - strategy_version=2, - ), - strategy="linkedin") - ``` - ### GitHub Connection - - ```python - import pulumi - import pulumi_auth0 as auth0 - - github = auth0.Connection("github", - options=auth0.ConnectionOptionsArgs( - client_id="", - client_secret="", - non_persistent_attrs=[ - "ethnicity", - "gender", - ], - scopes=[ - "email", - "profile", - "public_repo", - "repo", - ], - set_user_root_attributes="on_each_login", - ), - strategy="github") - ``` - ### SalesForce Connection - - ```python - import pulumi - import pulumi_auth0 as auth0 - - salesforce = auth0.Connection("salesforce", - options=auth0.ConnectionOptionsArgs( - client_id="", - client_secret="", - community_base_url="https://salesforce.example.com", - non_persistent_attrs=[ - "ethnicity", - "gender", - ], - scopes=[ - "openid", - "email", - ], - set_user_root_attributes="on_first_login", - ), - strategy="salesforce") - ``` - ### OAuth2 Connection - - Also applies to following connection strategies: `dropbox`, `bitbucket`, `paypal`, `twitter`, `amazon`, `yahoo`, `box`, `wordpress`, `shopify`, `custom` - - ```python - import pulumi - import pulumi_auth0 as auth0 - - oauth2 = auth0.Connection("oauth2", - options=auth0.ConnectionOptionsArgs( - authorization_endpoint="https://auth.example.com/oauth2/authorize", - client_id="", - client_secret="", - icon_url="https://auth.example.com/assets/logo.png", - non_persistent_attrs=[ - "ethnicity", - "gender", - ], - pkce_enabled=True, - scopes=[ - "basic_profile", - "profile", - "email", - ], - scripts={ - "fetchUserProfile": \"\"\" function fetchUserProfile(accessToken, context, callback) { - return callback(new Error("Whoops!")); - } - - \"\"\", - }, - set_user_root_attributes="on_each_login", - token_endpoint="https://auth.example.com/oauth2/token", - ), - strategy="oauth2") - ``` - ### SMS Connection - - > To be able to see this in the management dashboard as well, the name of the connection must be set to "sms". - - ```python - import pulumi - import pulumi_auth0 as auth0 - - sms = auth0.Connection("sms", - is_domain_connection=False, - options=auth0.ConnectionOptionsArgs( - brute_force_protection=True, - disable_signup=False, - forward_request_info=True, - from_="+15555555555", - gateway_authentication=auth0.ConnectionOptionsGatewayAuthenticationArgs( - audience="https://somewhere.com/sms-gateway", - method="bearer", - secret="4e2680bb74ec2ae24736476dd37ed6c2", - secret_base64_encoded=False, - subject="test.us.auth0.com:sms", - ), - gateway_url="https://somewhere.com/sms-gateway", - name="sms", - provider="sms_gateway", - syntax="md_with_macros", - template="@@password@@", - totp=auth0.ConnectionOptionsTotpArgs( - length=6, - time_step=300, - ), - ), - strategy="sms") - ``` - ### Email Connection - - > To be able to see this in the management dashboard as well, the name of the connection must be set to "email". - - ```python - import pulumi - import pulumi_auth0 as auth0 - - passwordless_email = auth0.Connection("passwordlessEmail", - options=auth0.ConnectionOptionsArgs( - auth_params={ - "responseType": "code", - "scope": "openid email profile offline_access", - }, - brute_force_protection=True, - disable_signup=False, - from_="{{ application.name }} ", - name="email", - non_persistent_attrs=[], - set_user_root_attributes="on_each_login", - subject="Welcome to {{ application.name }}", - syntax="liquid", - template="This is the body of the email", - totp=auth0.ConnectionOptionsTotpArgs( - length=6, - time_step=300, - ), - ), - strategy="email") - ``` - ### WindowsLive Connection - - ```python - import pulumi - import pulumi_auth0 as auth0 - - windowslive = auth0.Connection("windowslive", - options=auth0.ConnectionOptionsArgs( - client_id="", - client_secret="", - non_persistent_attrs=[ - "ethnicity", - "gender", - ], - scopes=[ - "signin", - "graph_user", - ], - set_user_root_attributes="on_first_login", - strategy_version=2, - ), - strategy="windowslive") - ``` ## Import @@ -983,11 +451,7 @@ def _internal_init(__self__, __props__.__dict__["is_domain_connection"] = is_domain_connection __props__.__dict__["metadata"] = metadata __props__.__dict__["name"] = name - if options is not None and not isinstance(options, ConnectionOptionsArgs): - options = options or {} - def _setter(key, value): - options[key] = value - ConnectionOptionsArgs._configure(_setter, **options) + options = _utilities.configure(options, ConnectionOptionsArgs, True) __props__.__dict__["options"] = options __props__.__dict__["realms"] = realms __props__.__dict__["show_as_button"] = show_as_button diff --git a/sdk/python/pulumi_auth0/connection_client.py b/sdk/python/pulumi_auth0/connection_client.py index 0a4437be..0997a39c 100644 --- a/sdk/python/pulumi_auth0/connection_client.py +++ b/sdk/python/pulumi_auth0/connection_client.py @@ -29,9 +29,19 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - client_id: pulumi.Input[str], - connection_id: pulumi.Input[str], - opts: Optional[pulumi.ResourceOptions]=None): + client_id: Optional[pulumi.Input[str]] = None, + connection_id: Optional[pulumi.Input[str]] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if client_id is None and 'clientId' in kwargs: + client_id = kwargs['clientId'] + if client_id is None: + raise TypeError("Missing 'client_id' argument") + if connection_id is None and 'connectionId' in kwargs: + connection_id = kwargs['connectionId'] + if connection_id is None: + raise TypeError("Missing 'connection_id' argument") + _setter("client_id", client_id) _setter("connection_id", connection_id) @@ -88,7 +98,13 @@ def _configure( connection_id: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, strategy: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if client_id is None and 'clientId' in kwargs: + client_id = kwargs['clientId'] + if connection_id is None and 'connectionId' in kwargs: + connection_id = kwargs['connectionId'] + if client_id is not None: _setter("client_id", client_id) if connection_id is not None: @@ -163,21 +179,6 @@ def __init__(__self__, resource in conjunction with the `ConnectionClients` resource when managing enabled clients for the same connection id. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_conn = auth0.Connection("myConn", strategy="auth0") - my_client = auth0.Client("myClient") - # One connection to one client association. - # To prevent issues, avoid using this resource together with the `auth0_connection_clients` resource. - my_conn_client_assoc = auth0.ConnectionClient("myConnClientAssoc", - connection_id=my_conn.id, - client_id=my_client.id) - ``` - ## Import This resource can be imported by specifying the connection ID and client ID separated by "::" (note the double colon) :: # Example @@ -205,21 +206,6 @@ def __init__(__self__, resource in conjunction with the `ConnectionClients` resource when managing enabled clients for the same connection id. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_conn = auth0.Connection("myConn", strategy="auth0") - my_client = auth0.Client("myClient") - # One connection to one client association. - # To prevent issues, avoid using this resource together with the `auth0_connection_clients` resource. - my_conn_client_assoc = auth0.ConnectionClient("myConnClientAssoc", - connection_id=my_conn.id, - client_id=my_client.id) - ``` - ## Import This resource can be imported by specifying the connection ID and client ID separated by "::" (note the double colon) :: # Example diff --git a/sdk/python/pulumi_auth0/connection_clients.py b/sdk/python/pulumi_auth0/connection_clients.py index da5228d6..4100ef73 100644 --- a/sdk/python/pulumi_auth0/connection_clients.py +++ b/sdk/python/pulumi_auth0/connection_clients.py @@ -29,9 +29,19 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - connection_id: pulumi.Input[str], - enabled_clients: pulumi.Input[Sequence[pulumi.Input[str]]], - opts: Optional[pulumi.ResourceOptions]=None): + connection_id: Optional[pulumi.Input[str]] = None, + enabled_clients: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if connection_id is None and 'connectionId' in kwargs: + connection_id = kwargs['connectionId'] + if connection_id is None: + raise TypeError("Missing 'connection_id' argument") + if enabled_clients is None and 'enabledClients' in kwargs: + enabled_clients = kwargs['enabledClients'] + if enabled_clients is None: + raise TypeError("Missing 'enabled_clients' argument") + _setter("connection_id", connection_id) _setter("enabled_clients", enabled_clients) @@ -88,7 +98,13 @@ def _configure( enabled_clients: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, name: Optional[pulumi.Input[str]] = None, strategy: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if connection_id is None and 'connectionId' in kwargs: + connection_id = kwargs['connectionId'] + if enabled_clients is None and 'enabledClients' in kwargs: + enabled_clients = kwargs['enabledClients'] + if connection_id is not None: _setter("connection_id", connection_id) if enabled_clients is not None: @@ -163,25 +179,6 @@ def __init__(__self__, resource in conjunction with the `ConnectionClient` resource when managing enabled clients for the same connection id. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_conn = auth0.Connection("myConn", strategy="auth0") - my_first_client = auth0.Client("myFirstClient") - my_second_client = auth0.Client("mySecondClient") - # One connection to many clients association. - # To prevent issues, avoid using this resource together with the `auth0_connection_client` resource. - my_conn_clients_assoc = auth0.ConnectionClients("myConnClientsAssoc", - connection_id=my_conn.id, - enabled_clients=[ - my_first_client.id, - my_second_client.id, - ]) - ``` - ## Import This resource can be imported by specifying the Connection ID. # Example @@ -209,25 +206,6 @@ def __init__(__self__, resource in conjunction with the `ConnectionClient` resource when managing enabled clients for the same connection id. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_conn = auth0.Connection("myConn", strategy="auth0") - my_first_client = auth0.Client("myFirstClient") - my_second_client = auth0.Client("mySecondClient") - # One connection to many clients association. - # To prevent issues, avoid using this resource together with the `auth0_connection_client` resource. - my_conn_clients_assoc = auth0.ConnectionClients("myConnClientsAssoc", - connection_id=my_conn.id, - enabled_clients=[ - my_first_client.id, - my_second_client.id, - ]) - ``` - ## Import This resource can be imported by specifying the Connection ID. # Example diff --git a/sdk/python/pulumi_auth0/custom_domain.py b/sdk/python/pulumi_auth0/custom_domain.py index 03ce1b02..68c462fa 100644 --- a/sdk/python/pulumi_auth0/custom_domain.py +++ b/sdk/python/pulumi_auth0/custom_domain.py @@ -37,11 +37,21 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - domain: pulumi.Input[str], - type: pulumi.Input[str], + domain: Optional[pulumi.Input[str]] = None, + type: Optional[pulumi.Input[str]] = None, custom_client_ip_header: Optional[pulumi.Input[str]] = None, tls_policy: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if domain is None: + raise TypeError("Missing 'domain' argument") + if type is None: + raise TypeError("Missing 'type' argument") + if custom_client_ip_header is None and 'customClientIpHeader' in kwargs: + custom_client_ip_header = kwargs['customClientIpHeader'] + if tls_policy is None and 'tlsPolicy' in kwargs: + tls_policy = kwargs['tlsPolicy'] + _setter("domain", domain) _setter("type", type) if custom_client_ip_header is not None: @@ -142,7 +152,15 @@ def _configure( tls_policy: Optional[pulumi.Input[str]] = None, type: Optional[pulumi.Input[str]] = None, verifications: Optional[pulumi.Input[Sequence[pulumi.Input['CustomDomainVerificationArgs']]]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if custom_client_ip_header is None and 'customClientIpHeader' in kwargs: + custom_client_ip_header = kwargs['customClientIpHeader'] + if origin_domain_name is None and 'originDomainName' in kwargs: + origin_domain_name = kwargs['originDomainName'] + if tls_policy is None and 'tlsPolicy' in kwargs: + tls_policy = kwargs['tlsPolicy'] + if custom_client_ip_header is not None: _setter("custom_client_ip_header", custom_client_ip_header) if domain is not None: @@ -270,17 +288,6 @@ def __init__(__self__, """ With Auth0, you can use a custom domain to maintain a consistent user experience. This resource allows you to create and manage a custom domain within your Auth0 tenant. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_custom_domain = auth0.CustomDomain("myCustomDomain", - domain="auth.example.com", - type="auth0_managed_certs") - ``` - ## Import Custom domains can be imported using their ID. # You can find existing custom domain IDs using the Auth0 Management API. https://auth0.com/docs/api/management/v2#!/Custom_Domains/get_custom_domains # Example @@ -305,17 +312,6 @@ def __init__(__self__, """ With Auth0, you can use a custom domain to maintain a consistent user experience. This resource allows you to create and manage a custom domain within your Auth0 tenant. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_custom_domain = auth0.CustomDomain("myCustomDomain", - domain="auth.example.com", - type="auth0_managed_certs") - ``` - ## Import Custom domains can be imported using their ID. # You can find existing custom domain IDs using the Auth0 Management API. https://auth0.com/docs/api/management/v2#!/Custom_Domains/get_custom_domains # Example diff --git a/sdk/python/pulumi_auth0/custom_domain_verification.py b/sdk/python/pulumi_auth0/custom_domain_verification.py index 116f0a67..8045d0bc 100644 --- a/sdk/python/pulumi_auth0/custom_domain_verification.py +++ b/sdk/python/pulumi_auth0/custom_domain_verification.py @@ -26,8 +26,14 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - custom_domain_id: pulumi.Input[str], - opts: Optional[pulumi.ResourceOptions]=None): + custom_domain_id: Optional[pulumi.Input[str]] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if custom_domain_id is None and 'customDomainId' in kwargs: + custom_domain_id = kwargs['customDomainId'] + if custom_domain_id is None: + raise TypeError("Missing 'custom_domain_id' argument") + _setter("custom_domain_id", custom_domain_id) @property @@ -68,7 +74,15 @@ def _configure( cname_api_key: Optional[pulumi.Input[str]] = None, custom_domain_id: Optional[pulumi.Input[str]] = None, origin_domain_name: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if cname_api_key is None and 'cnameApiKey' in kwargs: + cname_api_key = kwargs['cnameApiKey'] + if custom_domain_id is None and 'customDomainId' in kwargs: + custom_domain_id = kwargs['customDomainId'] + if origin_domain_name is None and 'originDomainName' in kwargs: + origin_domain_name = kwargs['originDomainName'] + if cname_api_key is not None: _setter("cname_api_key", cname_api_key) if custom_domain_id is not None: diff --git a/sdk/python/pulumi_auth0/email_provider.py b/sdk/python/pulumi_auth0/email_provider.py index b8269268..0b94dbfb 100644 --- a/sdk/python/pulumi_auth0/email_provider.py +++ b/sdk/python/pulumi_auth0/email_provider.py @@ -40,12 +40,20 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - credentials: pulumi.Input['EmailProviderCredentialsArgs'], - default_from_address: pulumi.Input[str], + credentials: Optional[pulumi.Input['EmailProviderCredentialsArgs']] = None, + default_from_address: Optional[pulumi.Input[str]] = None, enabled: Optional[pulumi.Input[bool]] = None, name: Optional[pulumi.Input[str]] = None, settings: Optional[pulumi.Input['EmailProviderSettingsArgs']] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if credentials is None: + raise TypeError("Missing 'credentials' argument") + if default_from_address is None and 'defaultFromAddress' in kwargs: + default_from_address = kwargs['defaultFromAddress'] + if default_from_address is None: + raise TypeError("Missing 'default_from_address' argument") + _setter("credentials", credentials) _setter("default_from_address", default_from_address) if enabled is not None: @@ -148,7 +156,11 @@ def _configure( enabled: Optional[pulumi.Input[bool]] = None, name: Optional[pulumi.Input[str]] = None, settings: Optional[pulumi.Input['EmailProviderSettingsArgs']] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if default_from_address is None and 'defaultFromAddress' in kwargs: + default_from_address = kwargs['defaultFromAddress'] + if credentials is not None: _setter("credentials", credentials) if default_from_address is not None: @@ -235,39 +247,6 @@ def __init__(__self__, """ With Auth0, you can have standard welcome, password reset, and account verification email-based workflows built right into Auth0. This resource allows you to configure email providers, so you can route all emails that are part of Auth0's authentication workflows through the supported high-volume email service of your choice. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - # This is an example on how to set up the email provider with Amazon SES. - amazon_ses_email_provider = auth0.EmailProvider("amazonSesEmailProvider", - credentials=auth0.EmailProviderCredentialsArgs( - access_key_id="AKIAXXXXXXXXXXXXXXXX", - region="us-east-1", - secret_access_key="7e8c2148xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx", - ), - default_from_address="accounts@example.com", - enabled=True) - # This is an example on how to set up the email provider with Sendgrid. - sendgrid_email_provider = auth0.EmailProvider("sendgridEmailProvider", - credentials=auth0.EmailProviderCredentialsArgs( - api_key="secretAPIKey", - ), - default_from_address="accounts@example.com", - enabled=True) - # This is an example on how to set up the email provider with MS365. - smtp_email_provider = auth0.EmailProvider("smtpEmailProvider", - credentials=auth0.EmailProviderCredentialsArgs( - ms365_client_id="ms365_client_id", - ms365_client_secret="ms365_client_secret", - ms365_tenant_id="ms365_tenant_id", - ), - default_from_address="accounts@example.com", - enabled=True) - ``` - ## Import As this is not a resource identifiable by an ID within the Auth0 Management API, email can be imported using a random string. # We recommend [Version 4 UUID](https://www.uuidgenerator.net/version4) # Example @@ -293,39 +272,6 @@ def __init__(__self__, """ With Auth0, you can have standard welcome, password reset, and account verification email-based workflows built right into Auth0. This resource allows you to configure email providers, so you can route all emails that are part of Auth0's authentication workflows through the supported high-volume email service of your choice. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - # This is an example on how to set up the email provider with Amazon SES. - amazon_ses_email_provider = auth0.EmailProvider("amazonSesEmailProvider", - credentials=auth0.EmailProviderCredentialsArgs( - access_key_id="AKIAXXXXXXXXXXXXXXXX", - region="us-east-1", - secret_access_key="7e8c2148xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx", - ), - default_from_address="accounts@example.com", - enabled=True) - # This is an example on how to set up the email provider with Sendgrid. - sendgrid_email_provider = auth0.EmailProvider("sendgridEmailProvider", - credentials=auth0.EmailProviderCredentialsArgs( - api_key="secretAPIKey", - ), - default_from_address="accounts@example.com", - enabled=True) - # This is an example on how to set up the email provider with MS365. - smtp_email_provider = auth0.EmailProvider("smtpEmailProvider", - credentials=auth0.EmailProviderCredentialsArgs( - ms365_client_id="ms365_client_id", - ms365_client_secret="ms365_client_secret", - ms365_tenant_id="ms365_tenant_id", - ), - default_from_address="accounts@example.com", - enabled=True) - ``` - ## Import As this is not a resource identifiable by an ID within the Auth0 Management API, email can be imported using a random string. # We recommend [Version 4 UUID](https://www.uuidgenerator.net/version4) # Example @@ -367,11 +313,7 @@ def _internal_init(__self__, raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource') __props__ = EmailProviderArgs.__new__(EmailProviderArgs) - if credentials is not None and not isinstance(credentials, EmailProviderCredentialsArgs): - credentials = credentials or {} - def _setter(key, value): - credentials[key] = value - EmailProviderCredentialsArgs._configure(_setter, **credentials) + credentials = _utilities.configure(credentials, EmailProviderCredentialsArgs, True) if credentials is None and not opts.urn: raise TypeError("Missing required property 'credentials'") __props__.__dict__["credentials"] = credentials @@ -380,11 +322,7 @@ def _setter(key, value): __props__.__dict__["default_from_address"] = default_from_address __props__.__dict__["enabled"] = enabled __props__.__dict__["name"] = name - if settings is not None and not isinstance(settings, EmailProviderSettingsArgs): - settings = settings or {} - def _setter(key, value): - settings[key] = value - EmailProviderSettingsArgs._configure(_setter, **settings) + settings = _utilities.configure(settings, EmailProviderSettingsArgs, True) __props__.__dict__["settings"] = settings super(EmailProvider, __self__).__init__( 'auth0:index/emailProvider:EmailProvider', diff --git a/sdk/python/pulumi_auth0/email_template.py b/sdk/python/pulumi_auth0/email_template.py index baa36bbe..05a8e0a2 100644 --- a/sdk/python/pulumi_auth0/email_template.py +++ b/sdk/python/pulumi_auth0/email_template.py @@ -50,16 +50,38 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - body: pulumi.Input[str], - enabled: pulumi.Input[bool], - from_: pulumi.Input[str], - subject: pulumi.Input[str], - syntax: pulumi.Input[str], - template: pulumi.Input[str], + body: Optional[pulumi.Input[str]] = None, + enabled: Optional[pulumi.Input[bool]] = None, + from_: Optional[pulumi.Input[str]] = None, + subject: Optional[pulumi.Input[str]] = None, + syntax: Optional[pulumi.Input[str]] = None, + template: Optional[pulumi.Input[str]] = None, include_email_in_redirect: Optional[pulumi.Input[bool]] = None, result_url: Optional[pulumi.Input[str]] = None, url_lifetime_in_seconds: Optional[pulumi.Input[int]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if body is None: + raise TypeError("Missing 'body' argument") + if enabled is None: + raise TypeError("Missing 'enabled' argument") + if from_ is None and 'from' in kwargs: + from_ = kwargs['from'] + if from_ is None: + raise TypeError("Missing 'from_' argument") + if subject is None: + raise TypeError("Missing 'subject' argument") + if syntax is None: + raise TypeError("Missing 'syntax' argument") + if template is None: + raise TypeError("Missing 'template' argument") + if include_email_in_redirect is None and 'includeEmailInRedirect' in kwargs: + include_email_in_redirect = kwargs['includeEmailInRedirect'] + if result_url is None and 'resultUrl' in kwargs: + result_url = kwargs['resultUrl'] + if url_lifetime_in_seconds is None and 'urlLifetimeInSeconds' in kwargs: + url_lifetime_in_seconds = kwargs['urlLifetimeInSeconds'] + _setter("body", body) _setter("enabled", enabled) _setter("from_", from_) @@ -230,7 +252,17 @@ def _configure( syntax: Optional[pulumi.Input[str]] = None, template: Optional[pulumi.Input[str]] = None, url_lifetime_in_seconds: Optional[pulumi.Input[int]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if from_ is None and 'from' in kwargs: + from_ = kwargs['from'] + if include_email_in_redirect is None and 'includeEmailInRedirect' in kwargs: + include_email_in_redirect = kwargs['includeEmailInRedirect'] + if result_url is None and 'resultUrl' in kwargs: + result_url = kwargs['resultUrl'] + if url_lifetime_in_seconds is None and 'urlLifetimeInSeconds' in kwargs: + url_lifetime_in_seconds = kwargs['urlLifetimeInSeconds'] + if body is not None: _setter("body", body) if enabled is not None: diff --git a/sdk/python/pulumi_auth0/get_attack_protection.py b/sdk/python/pulumi_auth0/get_attack_protection.py index 2f952656..0600f4a4 100644 --- a/sdk/python/pulumi_auth0/get_attack_protection.py +++ b/sdk/python/pulumi_auth0/get_attack_protection.py @@ -84,15 +84,6 @@ def __await__(self): def get_attack_protection(opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetAttackProtectionResult: """ Use this data source to access information about the tenant's attack protection settings. - - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_protection = auth0.get_attack_protection() - ``` """ __args__ = dict() opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) @@ -109,14 +100,5 @@ def get_attack_protection(opts: Optional[pulumi.InvokeOptions] = None) -> Awaita def get_attack_protection_output(opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAttackProtectionResult]: """ Use this data source to access information about the tenant's attack protection settings. - - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_protection = auth0.get_attack_protection() - ``` """ ... diff --git a/sdk/python/pulumi_auth0/get_branding.py b/sdk/python/pulumi_auth0/get_branding.py index 4c60e638..5baae2de 100644 --- a/sdk/python/pulumi_auth0/get_branding.py +++ b/sdk/python/pulumi_auth0/get_branding.py @@ -108,15 +108,6 @@ def __await__(self): def get_branding(opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBrandingResult: """ Use this data source to access information about the tenant's branding settings. - - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_branding = auth0.get_branding() - ``` """ __args__ = dict() opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) @@ -135,14 +126,5 @@ def get_branding(opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBra def get_branding_output(opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBrandingResult]: """ Use this data source to access information about the tenant's branding settings. - - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_branding = auth0.get_branding() - ``` """ ... diff --git a/sdk/python/pulumi_auth0/get_branding_theme.py b/sdk/python/pulumi_auth0/get_branding_theme.py index b8b63ee2..0ca15d2c 100644 --- a/sdk/python/pulumi_auth0/get_branding_theme.py +++ b/sdk/python/pulumi_auth0/get_branding_theme.py @@ -105,15 +105,6 @@ def __await__(self): def get_branding_theme(opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBrandingThemeResult: """ Use this data source to access information about the tenant's branding theme settings. - - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_branding_theme = auth0.get_branding_theme() - ``` """ __args__ = dict() opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) @@ -133,14 +124,5 @@ def get_branding_theme(opts: Optional[pulumi.InvokeOptions] = None) -> Awaitable def get_branding_theme_output(opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBrandingThemeResult]: """ Use this data source to access information about the tenant's branding theme settings. - - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_branding_theme = auth0.get_branding_theme() - ``` """ ... diff --git a/sdk/python/pulumi_auth0/get_client.py b/sdk/python/pulumi_auth0/get_client.py index fba94d25..ec2115d4 100644 --- a/sdk/python/pulumi_auth0/get_client.py +++ b/sdk/python/pulumi_auth0/get_client.py @@ -491,16 +491,6 @@ def get_client(client_id: Optional[str] = None, opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetClientResult: """ Data source to retrieve a specific Auth0 application client by `client_id` or `name`. - - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - some_client_by_name = auth0.get_client(name="Name of my Application") - some_client_by_id = auth0.get_client(client_id="abcdefghkijklmnopqrstuvwxyz0123456789") - ``` """ __args__ = dict() __args__['clientId'] = client_id @@ -555,15 +545,5 @@ def get_client_output(client_id: Optional[pulumi.Input[Optional[str]]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetClientResult]: """ Data source to retrieve a specific Auth0 application client by `client_id` or `name`. - - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - some_client_by_name = auth0.get_client(name="Name of my Application") - some_client_by_id = auth0.get_client(client_id="abcdefghkijklmnopqrstuvwxyz0123456789") - ``` """ ... diff --git a/sdk/python/pulumi_auth0/get_connection.py b/sdk/python/pulumi_auth0/get_connection.py index b2db7ed6..e57d5fa1 100644 --- a/sdk/python/pulumi_auth0/get_connection.py +++ b/sdk/python/pulumi_auth0/get_connection.py @@ -171,16 +171,6 @@ def get_connection(connection_id: Optional[str] = None, """ Data source to retrieve a specific Auth0 connection by `connection_id` or `name`. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - some_connection_by_name = auth0.get_connection(name="Acceptance-Test-Connection-{{.testName}}") - some_connection_by_id = auth0.get_connection(connection_id="con_abcdefghkijklmnopqrstuvwxyz0123456789") - ``` - :param str connection_id: The ID of the connection. If not provided, `name` must be set. """ @@ -211,16 +201,6 @@ def get_connection_output(connection_id: Optional[pulumi.Input[Optional[str]]] = """ Data source to retrieve a specific Auth0 connection by `connection_id` or `name`. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - some_connection_by_name = auth0.get_connection(name="Acceptance-Test-Connection-{{.testName}}") - some_connection_by_id = auth0.get_connection(connection_id="con_abcdefghkijklmnopqrstuvwxyz0123456789") - ``` - :param str connection_id: The ID of the connection. If not provided, `name` must be set. """ diff --git a/sdk/python/pulumi_auth0/get_organization.py b/sdk/python/pulumi_auth0/get_organization.py index cd75ce5e..c2e35f90 100644 --- a/sdk/python/pulumi_auth0/get_organization.py +++ b/sdk/python/pulumi_auth0/get_organization.py @@ -132,16 +132,6 @@ def get_organization(name: Optional[str] = None, """ Data source to retrieve a specific Auth0 organization by `organization_id` or `name`. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - some_organization_by_name = auth0.get_organization(name="my-org") - some_organization_by_id = auth0.get_organization(organization_id="org_abcdefghkijklmnopqrstuvwxyz0123456789") - ``` - :param str name: The name of the organization. If not provided, `organization_id` must be set. For performance, it is advised to use the `organization_id` as a lookup if possible. :param str organization_id: The ID of the organization. If not provided, `name` must be set. @@ -170,16 +160,6 @@ def get_organization_output(name: Optional[pulumi.Input[Optional[str]]] = None, """ Data source to retrieve a specific Auth0 organization by `organization_id` or `name`. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - some_organization_by_name = auth0.get_organization(name="my-org") - some_organization_by_id = auth0.get_organization(organization_id="org_abcdefghkijklmnopqrstuvwxyz0123456789") - ``` - :param str name: The name of the organization. If not provided, `organization_id` must be set. For performance, it is advised to use the `organization_id` as a lookup if possible. :param str organization_id: The ID of the organization. If not provided, `name` must be set. diff --git a/sdk/python/pulumi_auth0/get_pages.py b/sdk/python/pulumi_auth0/get_pages.py index 6cdfcac6..3298ede6 100644 --- a/sdk/python/pulumi_auth0/get_pages.py +++ b/sdk/python/pulumi_auth0/get_pages.py @@ -96,15 +96,6 @@ def __await__(self): def get_pages(opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetPagesResult: """ Use this data source to access the HTML for the login, reset password, multi-factor authentication and error pages. - - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_pages = auth0.get_pages() - ``` """ __args__ = dict() opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) @@ -122,14 +113,5 @@ def get_pages(opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetPagesR def get_pages_output(opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetPagesResult]: """ Use this data source to access the HTML for the login, reset password, multi-factor authentication and error pages. - - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_pages = auth0.get_pages() - ``` """ ... diff --git a/sdk/python/pulumi_auth0/get_resource_server.py b/sdk/python/pulumi_auth0/get_resource_server.py index 408731b9..a56eb2f8 100644 --- a/sdk/python/pulumi_auth0/get_resource_server.py +++ b/sdk/python/pulumi_auth0/get_resource_server.py @@ -207,16 +207,6 @@ def get_resource_server(identifier: Optional[str] = None, """ Data source to retrieve a specific Auth0 resource server by `resource_server_id` or `identifier`. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - some_resource_server_by_identifier = auth0.get_resource_server(identifier="https://my-api.com/v1") - some_resource_server_by_id = auth0.get_resource_server(resource_server_id="abcdefghkijklmnopqrstuvwxyz0123456789") - ``` - :param str identifier: Unique identifier for the resource server. Used as the audience parameter for authorization calls. If not provided, `resource_server_id` must be set. :param str resource_server_id: The ID of the resource server. If not provided, `identifier` must be set. @@ -251,16 +241,6 @@ def get_resource_server_output(identifier: Optional[pulumi.Input[Optional[str]]] """ Data source to retrieve a specific Auth0 resource server by `resource_server_id` or `identifier`. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - some_resource_server_by_identifier = auth0.get_resource_server(identifier="https://my-api.com/v1") - some_resource_server_by_id = auth0.get_resource_server(resource_server_id="abcdefghkijklmnopqrstuvwxyz0123456789") - ``` - :param str identifier: Unique identifier for the resource server. Used as the audience parameter for authorization calls. If not provided, `resource_server_id` must be set. :param str resource_server_id: The ID of the resource server. If not provided, `identifier` must be set. diff --git a/sdk/python/pulumi_auth0/get_role.py b/sdk/python/pulumi_auth0/get_role.py index 436a1464..412314c0 100644 --- a/sdk/python/pulumi_auth0/get_role.py +++ b/sdk/python/pulumi_auth0/get_role.py @@ -111,16 +111,6 @@ def get_role(name: Optional[str] = None, """ Data source to retrieve a specific Auth0 role by `role_id` or `name`. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - some_role_by_name = auth0.get_role(name="my-role") - some_role_by_id = auth0.get_role(role_id="abcdefghkijklmnopqrstuvwxyz0123456789") - ``` - :param str role_id: The ID of the role. If not provided, `name` must be set. """ @@ -146,16 +136,6 @@ def get_role_output(name: Optional[pulumi.Input[Optional[str]]] = None, """ Data source to retrieve a specific Auth0 role by `role_id` or `name`. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - some_role_by_name = auth0.get_role(name="my-role") - some_role_by_id = auth0.get_role(role_id="abcdefghkijklmnopqrstuvwxyz0123456789") - ``` - :param str role_id: The ID of the role. If not provided, `name` must be set. """ diff --git a/sdk/python/pulumi_auth0/get_tenant.py b/sdk/python/pulumi_auth0/get_tenant.py index b3d797d7..e40262a3 100644 --- a/sdk/python/pulumi_auth0/get_tenant.py +++ b/sdk/python/pulumi_auth0/get_tenant.py @@ -264,15 +264,6 @@ def __await__(self): def get_tenant(opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetTenantResult: """ Use this data source to access information about the tenant this provider is configured to access. - - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_tenant = auth0.get_tenant() - ``` """ __args__ = dict() opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) @@ -304,14 +295,5 @@ def get_tenant(opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetTenan def get_tenant_output(opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetTenantResult]: """ Use this data source to access information about the tenant this provider is configured to access. - - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_tenant = auth0.get_tenant() - ``` """ ... diff --git a/sdk/python/pulumi_auth0/get_user.py b/sdk/python/pulumi_auth0/get_user.py index 57802f06..29f88e71 100644 --- a/sdk/python/pulumi_auth0/get_user.py +++ b/sdk/python/pulumi_auth0/get_user.py @@ -278,15 +278,6 @@ def get_user(user_id: Optional[str] = None, """ Data source to retrieve a specific Auth0 user by `user_id`. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_user = auth0.get_user(user_id="auth0|34fdr23fdsfdfsf") - ``` - :param str user_id: ID of the user. """ @@ -324,15 +315,6 @@ def get_user_output(user_id: Optional[pulumi.Input[str]] = None, """ Data source to retrieve a specific Auth0 user by `user_id`. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_user = auth0.get_user(user_id="auth0|34fdr23fdsfdfsf") - ``` - :param str user_id: ID of the user. """ diff --git a/sdk/python/pulumi_auth0/guardian.py b/sdk/python/pulumi_auth0/guardian.py index 6ac8e499..3015187d 100644 --- a/sdk/python/pulumi_auth0/guardian.py +++ b/sdk/python/pulumi_auth0/guardian.py @@ -52,7 +52,7 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - policy: pulumi.Input[str], + policy: Optional[pulumi.Input[str]] = None, duo: Optional[pulumi.Input['GuardianDuoArgs']] = None, email: Optional[pulumi.Input[bool]] = None, otp: Optional[pulumi.Input[bool]] = None, @@ -61,7 +61,17 @@ def _configure( recovery_code: Optional[pulumi.Input[bool]] = None, webauthn_platform: Optional[pulumi.Input['GuardianWebauthnPlatformArgs']] = None, webauthn_roaming: Optional[pulumi.Input['GuardianWebauthnRoamingArgs']] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if policy is None: + raise TypeError("Missing 'policy' argument") + if recovery_code is None and 'recoveryCode' in kwargs: + recovery_code = kwargs['recoveryCode'] + if webauthn_platform is None and 'webauthnPlatform' in kwargs: + webauthn_platform = kwargs['webauthnPlatform'] + if webauthn_roaming is None and 'webauthnRoaming' in kwargs: + webauthn_roaming = kwargs['webauthnRoaming'] + _setter("policy", policy) if duo is not None: _setter("duo", duo) @@ -237,7 +247,15 @@ def _configure( recovery_code: Optional[pulumi.Input[bool]] = None, webauthn_platform: Optional[pulumi.Input['GuardianWebauthnPlatformArgs']] = None, webauthn_roaming: Optional[pulumi.Input['GuardianWebauthnRoamingArgs']] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if recovery_code is None and 'recoveryCode' in kwargs: + recovery_code = kwargs['recoveryCode'] + if webauthn_platform is None and 'webauthnPlatform' in kwargs: + webauthn_platform = kwargs['webauthnPlatform'] + if webauthn_roaming is None and 'webauthnRoaming' in kwargs: + webauthn_roaming = kwargs['webauthnRoaming'] + if duo is not None: _setter("duo", duo) if email is not None: @@ -384,60 +402,6 @@ def __init__(__self__, """ Multi-Factor Authentication works by requiring additional factors during the login process to prevent unauthorized access. With this resource you can configure some options available for MFA. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_guardian = auth0.Guardian("myGuardian", - duo=auth0.GuardianDuoArgs( - enabled=True, - hostname="api-hostname", - integration_key="someKey", - secret_key="someSecret", - ), - email=True, - otp=True, - phone=auth0.GuardianPhoneArgs( - enabled=True, - message_types=[ - "sms", - "voice", - ], - options=auth0.GuardianPhoneOptionsArgs( - enrollment_message="{{code}} is your verification code for {{tenant.friendly_name}}. Please enter this code to verify your enrollment.", - verification_message="{{code}} is your verification code for {{tenant.friendly_name}}.", - ), - provider="auth0", - ), - policy="all-applications", - push=auth0.GuardianPushArgs( - amazon_sns=auth0.GuardianPushAmazonSnsArgs( - aws_access_key_id="test1", - aws_region="us-west-1", - aws_secret_access_key="secretKey", - sns_apns_platform_application_arn="test_arn", - sns_gcm_platform_application_arn="test_arn", - ), - custom_app=auth0.GuardianPushCustomAppArgs( - app_name="CustomApp", - apple_app_link="https://itunes.apple.com/us/app/my-app/id123121", - google_app_link="https://play.google.com/store/apps/details?id=com.my.app", - ), - enabled=True, - provider="sns", - ), - recovery_code=True, - webauthn_platform=auth0.GuardianWebauthnPlatformArgs( - enabled=True, - ), - webauthn_roaming=auth0.GuardianWebauthnRoamingArgs( - enabled=True, - user_verification="required", - )) - ``` - ## Import As this is not a resource identifiable by an ID within the Auth0 Management API, guardian can be imported using a random string. # We recommend [Version 4 UUID](https://www.uuidgenerator.net/version4) # Example @@ -467,60 +431,6 @@ def __init__(__self__, """ Multi-Factor Authentication works by requiring additional factors during the login process to prevent unauthorized access. With this resource you can configure some options available for MFA. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_guardian = auth0.Guardian("myGuardian", - duo=auth0.GuardianDuoArgs( - enabled=True, - hostname="api-hostname", - integration_key="someKey", - secret_key="someSecret", - ), - email=True, - otp=True, - phone=auth0.GuardianPhoneArgs( - enabled=True, - message_types=[ - "sms", - "voice", - ], - options=auth0.GuardianPhoneOptionsArgs( - enrollment_message="{{code}} is your verification code for {{tenant.friendly_name}}. Please enter this code to verify your enrollment.", - verification_message="{{code}} is your verification code for {{tenant.friendly_name}}.", - ), - provider="auth0", - ), - policy="all-applications", - push=auth0.GuardianPushArgs( - amazon_sns=auth0.GuardianPushAmazonSnsArgs( - aws_access_key_id="test1", - aws_region="us-west-1", - aws_secret_access_key="secretKey", - sns_apns_platform_application_arn="test_arn", - sns_gcm_platform_application_arn="test_arn", - ), - custom_app=auth0.GuardianPushCustomAppArgs( - app_name="CustomApp", - apple_app_link="https://itunes.apple.com/us/app/my-app/id123121", - google_app_link="https://play.google.com/store/apps/details?id=com.my.app", - ), - enabled=True, - provider="sns", - ), - recovery_code=True, - webauthn_platform=auth0.GuardianWebauthnPlatformArgs( - enabled=True, - ), - webauthn_roaming=auth0.GuardianWebauthnRoamingArgs( - enabled=True, - user_verification="required", - )) - ``` - ## Import As this is not a resource identifiable by an ID within the Auth0 Management API, guardian can be imported using a random string. # We recommend [Version 4 UUID](https://www.uuidgenerator.net/version4) # Example @@ -566,41 +476,21 @@ def _internal_init(__self__, raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource') __props__ = GuardianArgs.__new__(GuardianArgs) - if duo is not None and not isinstance(duo, GuardianDuoArgs): - duo = duo or {} - def _setter(key, value): - duo[key] = value - GuardianDuoArgs._configure(_setter, **duo) + duo = _utilities.configure(duo, GuardianDuoArgs, True) __props__.__dict__["duo"] = duo __props__.__dict__["email"] = email __props__.__dict__["otp"] = otp - if phone is not None and not isinstance(phone, GuardianPhoneArgs): - phone = phone or {} - def _setter(key, value): - phone[key] = value - GuardianPhoneArgs._configure(_setter, **phone) + phone = _utilities.configure(phone, GuardianPhoneArgs, True) __props__.__dict__["phone"] = phone if policy is None and not opts.urn: raise TypeError("Missing required property 'policy'") __props__.__dict__["policy"] = policy - if push is not None and not isinstance(push, GuardianPushArgs): - push = push or {} - def _setter(key, value): - push[key] = value - GuardianPushArgs._configure(_setter, **push) + push = _utilities.configure(push, GuardianPushArgs, True) __props__.__dict__["push"] = push __props__.__dict__["recovery_code"] = recovery_code - if webauthn_platform is not None and not isinstance(webauthn_platform, GuardianWebauthnPlatformArgs): - webauthn_platform = webauthn_platform or {} - def _setter(key, value): - webauthn_platform[key] = value - GuardianWebauthnPlatformArgs._configure(_setter, **webauthn_platform) + webauthn_platform = _utilities.configure(webauthn_platform, GuardianWebauthnPlatformArgs, True) __props__.__dict__["webauthn_platform"] = webauthn_platform - if webauthn_roaming is not None and not isinstance(webauthn_roaming, GuardianWebauthnRoamingArgs): - webauthn_roaming = webauthn_roaming or {} - def _setter(key, value): - webauthn_roaming[key] = value - GuardianWebauthnRoamingArgs._configure(_setter, **webauthn_roaming) + webauthn_roaming = _utilities.configure(webauthn_roaming, GuardianWebauthnRoamingArgs, True) __props__.__dict__["webauthn_roaming"] = webauthn_roaming super(Guardian, __self__).__init__( 'auth0:index/guardian:Guardian', diff --git a/sdk/python/pulumi_auth0/hook.py b/sdk/python/pulumi_auth0/hook.py index 3d75d0c7..0eedcba9 100644 --- a/sdk/python/pulumi_auth0/hook.py +++ b/sdk/python/pulumi_auth0/hook.py @@ -41,13 +41,21 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - script: pulumi.Input[str], - trigger_id: pulumi.Input[str], + script: Optional[pulumi.Input[str]] = None, + trigger_id: Optional[pulumi.Input[str]] = None, dependencies: Optional[pulumi.Input[Mapping[str, Any]]] = None, enabled: Optional[pulumi.Input[bool]] = None, name: Optional[pulumi.Input[str]] = None, secrets: Optional[pulumi.Input[Mapping[str, Any]]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if script is None: + raise TypeError("Missing 'script' argument") + if trigger_id is None and 'triggerId' in kwargs: + trigger_id = kwargs['triggerId'] + if trigger_id is None: + raise TypeError("Missing 'trigger_id' argument") + _setter("script", script) _setter("trigger_id", trigger_id) if dependencies is not None: @@ -168,7 +176,11 @@ def _configure( script: Optional[pulumi.Input[str]] = None, secrets: Optional[pulumi.Input[Mapping[str, Any]]] = None, trigger_id: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if trigger_id is None and 'triggerId' in kwargs: + trigger_id = kwargs['triggerId'] + if dependencies is not None: _setter("dependencies", dependencies) if enabled is not None: @@ -272,28 +284,6 @@ def __init__(__self__, !> This resource is deprecated. Refer to the [guide on how to migrate from hooks to actions](https://auth0.com/docs/customize/actions/migrate/migrate-from-hooks-to-actions) and manage your actions using the `Action` resource. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_hook = auth0.Hook("myHook", - dependencies={ - "auth0": "2.30.0", - }, - enabled=True, - script=\"\"\" function (user, context, callback) { - callback(null, { user }); - } - - \"\"\", - secrets={ - "foo": "bar", - }, - trigger_id="pre-user-registration") - ``` - ## Import This resource can be imported by specifying the hook ID. # Example @@ -322,28 +312,6 @@ def __init__(__self__, !> This resource is deprecated. Refer to the [guide on how to migrate from hooks to actions](https://auth0.com/docs/customize/actions/migrate/migrate-from-hooks-to-actions) and manage your actions using the `Action` resource. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_hook = auth0.Hook("myHook", - dependencies={ - "auth0": "2.30.0", - }, - enabled=True, - script=\"\"\" function (user, context, callback) { - callback(null, { user }); - } - - \"\"\", - secrets={ - "foo": "bar", - }, - trigger_id="pre-user-registration") - ``` - ## Import This resource can be imported by specifying the hook ID. # Example diff --git a/sdk/python/pulumi_auth0/log_stream.py b/sdk/python/pulumi_auth0/log_stream.py index cb2ef364..bfe6e646 100644 --- a/sdk/python/pulumi_auth0/log_stream.py +++ b/sdk/python/pulumi_auth0/log_stream.py @@ -40,12 +40,18 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - sink: pulumi.Input['LogStreamSinkArgs'], - type: pulumi.Input[str], + sink: Optional[pulumi.Input['LogStreamSinkArgs']] = None, + type: Optional[pulumi.Input[str]] = None, filters: Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[str]]]]]] = None, name: Optional[pulumi.Input[str]] = None, status: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if sink is None: + raise TypeError("Missing 'sink' argument") + if type is None: + raise TypeError("Missing 'type' argument") + _setter("sink", sink) _setter("type", type) if filters is not None: @@ -148,7 +154,9 @@ def _configure( sink: Optional[pulumi.Input['LogStreamSinkArgs']] = None, status: Optional[pulumi.Input[str]] = None, type: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if filters is not None: _setter("filters", filters) if name is not None: @@ -235,45 +243,6 @@ def __init__(__self__, """ With this resource, you can manage your Auth0 log streams. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - # This is an example of an http log stream. - my_webhook = auth0.LogStream("myWebhook", - filters=[ - { - "name": "auth.login.fail", - "type": "category", - }, - { - "name": "auth.signup.fail", - "type": "category", - }, - ], - sink=auth0.LogStreamSinkArgs( - http_authorization="AKIAXXXXXXXXXXXXXXXX", - http_content_format="JSONOBJECT", - http_content_type="application/json", - http_custom_headers=[{ - "header": "foo", - "value": "bar", - }], - http_endpoint="https://example.com/logs", - ), - type="http") - # This is an example of an Amazon EventBridge log stream. - example_aws = auth0.LogStream("exampleAws", - sink=auth0.LogStreamSinkArgs( - aws_account_id="my_account_id", - aws_region="us-east-2", - ), - status="active", - type="eventbridge") - ``` - ## Import This resource can be imported by specifying the log stream ID. # Example @@ -299,45 +268,6 @@ def __init__(__self__, """ With this resource, you can manage your Auth0 log streams. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - # This is an example of an http log stream. - my_webhook = auth0.LogStream("myWebhook", - filters=[ - { - "name": "auth.login.fail", - "type": "category", - }, - { - "name": "auth.signup.fail", - "type": "category", - }, - ], - sink=auth0.LogStreamSinkArgs( - http_authorization="AKIAXXXXXXXXXXXXXXXX", - http_content_format="JSONOBJECT", - http_content_type="application/json", - http_custom_headers=[{ - "header": "foo", - "value": "bar", - }], - http_endpoint="https://example.com/logs", - ), - type="http") - # This is an example of an Amazon EventBridge log stream. - example_aws = auth0.LogStream("exampleAws", - sink=auth0.LogStreamSinkArgs( - aws_account_id="my_account_id", - aws_region="us-east-2", - ), - status="active", - type="eventbridge") - ``` - ## Import This resource can be imported by specifying the log stream ID. # Example @@ -381,11 +311,7 @@ def _internal_init(__self__, __props__.__dict__["filters"] = filters __props__.__dict__["name"] = name - if sink is not None and not isinstance(sink, LogStreamSinkArgs): - sink = sink or {} - def _setter(key, value): - sink[key] = value - LogStreamSinkArgs._configure(_setter, **sink) + sink = _utilities.configure(sink, LogStreamSinkArgs, True) if sink is None and not opts.urn: raise TypeError("Missing required property 'sink'") __props__.__dict__["sink"] = sink diff --git a/sdk/python/pulumi_auth0/organization.py b/sdk/python/pulumi_auth0/organization.py index dd371902..8a3529e0 100644 --- a/sdk/python/pulumi_auth0/organization.py +++ b/sdk/python/pulumi_auth0/organization.py @@ -41,7 +41,11 @@ def _configure( display_name: Optional[pulumi.Input[str]] = None, metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None, name: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if display_name is None and 'displayName' in kwargs: + display_name = kwargs['displayName'] + if branding is not None: _setter("branding", branding) if display_name is not None: @@ -128,7 +132,11 @@ def _configure( display_name: Optional[pulumi.Input[str]] = None, metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None, name: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if display_name is None and 'displayName' in kwargs: + display_name = kwargs['displayName'] + if branding is not None: _setter("branding", branding) if display_name is not None: @@ -206,23 +214,6 @@ def __init__(__self__, - Build administration capabilities into their products, using Organizations APIs, so that those businesses can manage their own organizations. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_organization = auth0.Organization("myOrganization", - branding=auth0.OrganizationBrandingArgs( - colors={ - "pageBackground": "#e1e1e1", - "primary": "#f2f2f2", - }, - logo_url="https://example.com/assets/icons/icon.png", - ), - display_name="Auth0 Inc.") - ``` - ## Import This resource can be imported by specifying the organization ID. # Example @@ -253,23 +244,6 @@ def __init__(__self__, - Build administration capabilities into their products, using Organizations APIs, so that those businesses can manage their own organizations. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_organization = auth0.Organization("myOrganization", - branding=auth0.OrganizationBrandingArgs( - colors={ - "pageBackground": "#e1e1e1", - "primary": "#f2f2f2", - }, - logo_url="https://example.com/assets/icons/icon.png", - ), - display_name="Auth0 Inc.") - ``` - ## Import This resource can be imported by specifying the organization ID. # Example @@ -310,11 +284,7 @@ def _internal_init(__self__, raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource') __props__ = OrganizationArgs.__new__(OrganizationArgs) - if branding is not None and not isinstance(branding, OrganizationBrandingArgs): - branding = branding or {} - def _setter(key, value): - branding[key] = value - OrganizationBrandingArgs._configure(_setter, **branding) + branding = _utilities.configure(branding, OrganizationBrandingArgs, True) __props__.__dict__["branding"] = branding __props__.__dict__["display_name"] = display_name __props__.__dict__["metadata"] = metadata diff --git a/sdk/python/pulumi_auth0/organization_connection.py b/sdk/python/pulumi_auth0/organization_connection.py index 99a98742..98f55c14 100644 --- a/sdk/python/pulumi_auth0/organization_connection.py +++ b/sdk/python/pulumi_auth0/organization_connection.py @@ -32,10 +32,22 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - connection_id: pulumi.Input[str], - organization_id: pulumi.Input[str], + connection_id: Optional[pulumi.Input[str]] = None, + organization_id: Optional[pulumi.Input[str]] = None, assign_membership_on_login: Optional[pulumi.Input[bool]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if connection_id is None and 'connectionId' in kwargs: + connection_id = kwargs['connectionId'] + if connection_id is None: + raise TypeError("Missing 'connection_id' argument") + if organization_id is None and 'organizationId' in kwargs: + organization_id = kwargs['organizationId'] + if organization_id is None: + raise TypeError("Missing 'organization_id' argument") + if assign_membership_on_login is None and 'assignMembershipOnLogin' in kwargs: + assign_membership_on_login = kwargs['assignMembershipOnLogin'] + _setter("connection_id", connection_id) _setter("organization_id", organization_id) if assign_membership_on_login is not None: @@ -110,7 +122,15 @@ def _configure( name: Optional[pulumi.Input[str]] = None, organization_id: Optional[pulumi.Input[str]] = None, strategy: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if assign_membership_on_login is None and 'assignMembershipOnLogin' in kwargs: + assign_membership_on_login = kwargs['assignMembershipOnLogin'] + if connection_id is None and 'connectionId' in kwargs: + connection_id = kwargs['connectionId'] + if organization_id is None and 'organizationId' in kwargs: + organization_id = kwargs['organizationId'] + if assign_membership_on_login is not None: _setter("assign_membership_on_login", assign_membership_on_login) if connection_id is not None: @@ -200,20 +220,6 @@ def __init__(__self__, resource in conjunction with the `OrganizationConnections` resource when managing enabled connections for the same organization id. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_connection = auth0.Connection("myConnection", strategy="auth0") - my_organization = auth0.Organization("myOrganization", display_name="My Organization") - my_org_conn = auth0.OrganizationConnection("myOrgConn", - organization_id=my_organization.id, - connection_id=my_connection.id, - assign_membership_on_login=True) - ``` - ## Import This resource can be imported by specifying the organization ID and connection ID separated by "::" (note the double colon) :: # Example @@ -242,20 +248,6 @@ def __init__(__self__, resource in conjunction with the `OrganizationConnections` resource when managing enabled connections for the same organization id. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_connection = auth0.Connection("myConnection", strategy="auth0") - my_organization = auth0.Organization("myOrganization", display_name="My Organization") - my_org_conn = auth0.OrganizationConnection("myOrgConn", - organization_id=my_organization.id, - connection_id=my_connection.id, - assign_membership_on_login=True) - ``` - ## Import This resource can be imported by specifying the organization ID and connection ID separated by "::" (note the double colon) :: # Example diff --git a/sdk/python/pulumi_auth0/organization_connections.py b/sdk/python/pulumi_auth0/organization_connections.py index e5e51821..bbc054f7 100644 --- a/sdk/python/pulumi_auth0/organization_connections.py +++ b/sdk/python/pulumi_auth0/organization_connections.py @@ -31,9 +31,19 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - enabled_connections: pulumi.Input[Sequence[pulumi.Input['OrganizationConnectionsEnabledConnectionArgs']]], - organization_id: pulumi.Input[str], - opts: Optional[pulumi.ResourceOptions]=None): + enabled_connections: Optional[pulumi.Input[Sequence[pulumi.Input['OrganizationConnectionsEnabledConnectionArgs']]]] = None, + organization_id: Optional[pulumi.Input[str]] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if enabled_connections is None and 'enabledConnections' in kwargs: + enabled_connections = kwargs['enabledConnections'] + if enabled_connections is None: + raise TypeError("Missing 'enabled_connections' argument") + if organization_id is None and 'organizationId' in kwargs: + organization_id = kwargs['organizationId'] + if organization_id is None: + raise TypeError("Missing 'organization_id' argument") + _setter("enabled_connections", enabled_connections) _setter("organization_id", organization_id) @@ -82,7 +92,13 @@ def _configure( _setter: Callable[[Any, Any], None], enabled_connections: Optional[pulumi.Input[Sequence[pulumi.Input['OrganizationConnectionsEnabledConnectionArgs']]]] = None, organization_id: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if enabled_connections is None and 'enabledConnections' in kwargs: + enabled_connections = kwargs['enabledConnections'] + if organization_id is None and 'organizationId' in kwargs: + organization_id = kwargs['organizationId'] + if enabled_connections is not None: _setter("enabled_connections", enabled_connections) if organization_id is not None: @@ -129,29 +145,6 @@ def __init__(__self__, resource in conjunction with the `OrganizationConnection` resource when managing connections for the same organization id. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_connection_1 = auth0.Connection("myConnection-1", strategy="auth0") - my_connection_2 = auth0.Connection("myConnection-2", strategy="auth0") - my_organization = auth0.Organization("myOrganization", display_name="My Organization") - one_to_many = auth0.OrganizationConnections("one-to-many", - organization_id=my_organization.id, - enabled_connections=[ - auth0.OrganizationConnectionsEnabledConnectionArgs( - connection_id=my_connection_1.id, - assign_membership_on_login=True, - ), - auth0.OrganizationConnectionsEnabledConnectionArgs( - connection_id=my_connection_2.id, - assign_membership_on_login=True, - ), - ]) - ``` - ## Import This resource can be imported by specifying the organization ID. # Example @@ -179,29 +172,6 @@ def __init__(__self__, resource in conjunction with the `OrganizationConnection` resource when managing connections for the same organization id. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_connection_1 = auth0.Connection("myConnection-1", strategy="auth0") - my_connection_2 = auth0.Connection("myConnection-2", strategy="auth0") - my_organization = auth0.Organization("myOrganization", display_name="My Organization") - one_to_many = auth0.OrganizationConnections("one-to-many", - organization_id=my_organization.id, - enabled_connections=[ - auth0.OrganizationConnectionsEnabledConnectionArgs( - connection_id=my_connection_1.id, - assign_membership_on_login=True, - ), - auth0.OrganizationConnectionsEnabledConnectionArgs( - connection_id=my_connection_2.id, - assign_membership_on_login=True, - ), - ]) - ``` - ## Import This resource can be imported by specifying the organization ID. # Example diff --git a/sdk/python/pulumi_auth0/organization_member.py b/sdk/python/pulumi_auth0/organization_member.py index 375392eb..592fc345 100644 --- a/sdk/python/pulumi_auth0/organization_member.py +++ b/sdk/python/pulumi_auth0/organization_member.py @@ -29,9 +29,19 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - organization_id: pulumi.Input[str], - user_id: pulumi.Input[str], - opts: Optional[pulumi.ResourceOptions]=None): + organization_id: Optional[pulumi.Input[str]] = None, + user_id: Optional[pulumi.Input[str]] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if organization_id is None and 'organizationId' in kwargs: + organization_id = kwargs['organizationId'] + if organization_id is None: + raise TypeError("Missing 'organization_id' argument") + if user_id is None and 'userId' in kwargs: + user_id = kwargs['userId'] + if user_id is None: + raise TypeError("Missing 'user_id' argument") + _setter("organization_id", organization_id) _setter("user_id", user_id) @@ -80,7 +90,13 @@ def _configure( _setter: Callable[[Any, Any], None], organization_id: Optional[pulumi.Input[str]] = None, user_id: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if organization_id is None and 'organizationId' in kwargs: + organization_id = kwargs['organizationId'] + if user_id is None and 'userId' in kwargs: + user_id = kwargs['userId'] + if organization_id is not None: _setter("organization_id", organization_id) if user_id is not None: @@ -126,23 +142,6 @@ def __init__(__self__, all the members assigned to an organization. To avoid potential issues, it is recommended not to use this resource in conjunction with the `OrganizationMembers` resource when managing members for the same organization id. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - user = auth0.User("user", - email="test-user@auth0.com", - connection_name="Username-Password-Authentication", - email_verified=True, - password="MyPass123$") - my_org = auth0.Organization("myOrg", display_name="Admin") - my_org_member = auth0.OrganizationMember("myOrgMember", - organization_id=my_org.id, - user_id=user.id) - ``` - ## Import This resource can be imported by specifying the organization ID and user ID separated by "::" (note the double colon) :: # Example @@ -169,23 +168,6 @@ def __init__(__self__, all the members assigned to an organization. To avoid potential issues, it is recommended not to use this resource in conjunction with the `OrganizationMembers` resource when managing members for the same organization id. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - user = auth0.User("user", - email="test-user@auth0.com", - connection_name="Username-Password-Authentication", - email_verified=True, - password="MyPass123$") - my_org = auth0.Organization("myOrg", display_name="Admin") - my_org_member = auth0.OrganizationMember("myOrgMember", - organization_id=my_org.id, - user_id=user.id) - ``` - ## Import This resource can be imported by specifying the organization ID and user ID separated by "::" (note the double colon) :: # Example diff --git a/sdk/python/pulumi_auth0/organization_member_role.py b/sdk/python/pulumi_auth0/organization_member_role.py index 8d22c427..11c8dc80 100644 --- a/sdk/python/pulumi_auth0/organization_member_role.py +++ b/sdk/python/pulumi_auth0/organization_member_role.py @@ -32,10 +32,24 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - organization_id: pulumi.Input[str], - role_id: pulumi.Input[str], - user_id: pulumi.Input[str], - opts: Optional[pulumi.ResourceOptions]=None): + organization_id: Optional[pulumi.Input[str]] = None, + role_id: Optional[pulumi.Input[str]] = None, + user_id: Optional[pulumi.Input[str]] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if organization_id is None and 'organizationId' in kwargs: + organization_id = kwargs['organizationId'] + if organization_id is None: + raise TypeError("Missing 'organization_id' argument") + if role_id is None and 'roleId' in kwargs: + role_id = kwargs['roleId'] + if role_id is None: + raise TypeError("Missing 'role_id' argument") + if user_id is None and 'userId' in kwargs: + user_id = kwargs['userId'] + if user_id is None: + raise TypeError("Missing 'user_id' argument") + _setter("organization_id", organization_id) _setter("role_id", role_id) _setter("user_id", user_id) @@ -109,7 +123,19 @@ def _configure( role_id: Optional[pulumi.Input[str]] = None, role_name: Optional[pulumi.Input[str]] = None, user_id: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if organization_id is None and 'organizationId' in kwargs: + organization_id = kwargs['organizationId'] + if role_description is None and 'roleDescription' in kwargs: + role_description = kwargs['roleDescription'] + if role_id is None and 'roleId' in kwargs: + role_id = kwargs['roleId'] + if role_name is None and 'roleName' in kwargs: + role_name = kwargs['roleName'] + if user_id is None and 'userId' in kwargs: + user_id = kwargs['userId'] + if organization_id is not None: _setter("organization_id", organization_id) if role_description is not None: @@ -194,32 +220,6 @@ def __init__(__self__, """ This resource is used to manage the roles assigned to an organization member. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - reader = auth0.Role("reader") - writer = auth0.Role("writer") - user = auth0.User("user", - connection_name="Username-Password-Authentication", - email="test-user@auth0.com", - password="MyPass123$") - my_org = auth0.Organization("myOrg", display_name="Some Org") - my_org_member = auth0.OrganizationMember("myOrgMember", - organization_id=my_org.id, - user_id=user.id) - role1 = auth0.OrganizationMemberRole("role1", - organization_id=my_org.id, - user_id=user.id, - role_id=reader.id) - role2 = auth0.OrganizationMemberRole("role2", - organization_id=my_org.id, - user_id=user.id, - role_id=writer.id) - ``` - ## Import This resource can be imported by specifying the organization ID, user ID and role ID separated by "::" (note the double colon) :::: # Example @@ -243,32 +243,6 @@ def __init__(__self__, """ This resource is used to manage the roles assigned to an organization member. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - reader = auth0.Role("reader") - writer = auth0.Role("writer") - user = auth0.User("user", - connection_name="Username-Password-Authentication", - email="test-user@auth0.com", - password="MyPass123$") - my_org = auth0.Organization("myOrg", display_name="Some Org") - my_org_member = auth0.OrganizationMember("myOrgMember", - organization_id=my_org.id, - user_id=user.id) - role1 = auth0.OrganizationMemberRole("role1", - organization_id=my_org.id, - user_id=user.id, - role_id=reader.id) - role2 = auth0.OrganizationMemberRole("role2", - organization_id=my_org.id, - user_id=user.id, - role_id=writer.id) - ``` - ## Import This resource can be imported by specifying the organization ID, user ID and role ID separated by "::" (note the double colon) :::: # Example diff --git a/sdk/python/pulumi_auth0/organization_member_roles.py b/sdk/python/pulumi_auth0/organization_member_roles.py index ffa3e771..8aaeebd8 100644 --- a/sdk/python/pulumi_auth0/organization_member_roles.py +++ b/sdk/python/pulumi_auth0/organization_member_roles.py @@ -32,10 +32,22 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - organization_id: pulumi.Input[str], - roles: pulumi.Input[Sequence[pulumi.Input[str]]], - user_id: pulumi.Input[str], - opts: Optional[pulumi.ResourceOptions]=None): + organization_id: Optional[pulumi.Input[str]] = None, + roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, + user_id: Optional[pulumi.Input[str]] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if organization_id is None and 'organizationId' in kwargs: + organization_id = kwargs['organizationId'] + if organization_id is None: + raise TypeError("Missing 'organization_id' argument") + if roles is None: + raise TypeError("Missing 'roles' argument") + if user_id is None and 'userId' in kwargs: + user_id = kwargs['userId'] + if user_id is None: + raise TypeError("Missing 'user_id' argument") + _setter("organization_id", organization_id) _setter("roles", roles) _setter("user_id", user_id) @@ -101,7 +113,13 @@ def _configure( organization_id: Optional[pulumi.Input[str]] = None, roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, user_id: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if organization_id is None and 'organizationId' in kwargs: + organization_id = kwargs['organizationId'] + if user_id is None and 'userId' in kwargs: + user_id = kwargs['userId'] + if organization_id is not None: _setter("organization_id", organization_id) if roles is not None: @@ -158,31 +176,6 @@ def __init__(__self__, """ This resource is used to manage the roles assigned to an organization member. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - reader = auth0.Role("reader") - writer = auth0.Role("writer") - user = auth0.User("user", - connection_name="Username-Password-Authentication", - email="test-user@auth0.com", - password="MyPass123$") - my_org = auth0.Organization("myOrg", display_name="Some Org") - my_org_member = auth0.OrganizationMember("myOrgMember", - organization_id=my_org.id, - user_id=user.id) - my_org_member_roles = auth0.OrganizationMemberRoles("myOrgMemberRoles", - organization_id=my_org.id, - user_id=user.id, - roles=[ - reader.id, - writer.id, - ]) - ``` - ## Import This resource can be imported by specifying the organization ID and user ID separated by "::" (note the double colon) :: # Example @@ -206,31 +199,6 @@ def __init__(__self__, """ This resource is used to manage the roles assigned to an organization member. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - reader = auth0.Role("reader") - writer = auth0.Role("writer") - user = auth0.User("user", - connection_name="Username-Password-Authentication", - email="test-user@auth0.com", - password="MyPass123$") - my_org = auth0.Organization("myOrg", display_name="Some Org") - my_org_member = auth0.OrganizationMember("myOrgMember", - organization_id=my_org.id, - user_id=user.id) - my_org_member_roles = auth0.OrganizationMemberRoles("myOrgMemberRoles", - organization_id=my_org.id, - user_id=user.id, - roles=[ - reader.id, - writer.id, - ]) - ``` - ## Import This resource can be imported by specifying the organization ID and user ID separated by "::" (note the double colon) :: # Example diff --git a/sdk/python/pulumi_auth0/organization_members.py b/sdk/python/pulumi_auth0/organization_members.py index e9cd66e4..42bbf11b 100644 --- a/sdk/python/pulumi_auth0/organization_members.py +++ b/sdk/python/pulumi_auth0/organization_members.py @@ -29,9 +29,17 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - members: pulumi.Input[Sequence[pulumi.Input[str]]], - organization_id: pulumi.Input[str], - opts: Optional[pulumi.ResourceOptions]=None): + members: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, + organization_id: Optional[pulumi.Input[str]] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if members is None: + raise TypeError("Missing 'members' argument") + if organization_id is None and 'organizationId' in kwargs: + organization_id = kwargs['organizationId'] + if organization_id is None: + raise TypeError("Missing 'organization_id' argument") + _setter("members", members) _setter("organization_id", organization_id) @@ -80,7 +88,11 @@ def _configure( _setter: Callable[[Any, Any], None], members: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, organization_id: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if organization_id is None and 'organizationId' in kwargs: + organization_id = kwargs['organizationId'] + if members is not None: _setter("members", members) if organization_id is not None: @@ -127,29 +139,6 @@ def __init__(__self__, resource in conjunction with the `OrganizationMember` resource when managing members for the same organization id. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - user1 = auth0.User("user1", - connection_name="Username-Password-Authentication", - email="myuser1@auth0.com", - password="MyPass123$") - user2 = auth0.User("user2", - connection_name="Username-Password-Authentication", - email="myuser2@auth0.com", - password="MyPass123$") - my_org = auth0.Organization("myOrg", display_name="Some Organization") - my_members = auth0.OrganizationMembers("myMembers", - organization_id=my_org.id, - members=[ - user1.id, - user2.id, - ]) - ``` - ## Import This resource can be imported by specifying the organization ID. # Example @@ -177,29 +166,6 @@ def __init__(__self__, resource in conjunction with the `OrganizationMember` resource when managing members for the same organization id. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - user1 = auth0.User("user1", - connection_name="Username-Password-Authentication", - email="myuser1@auth0.com", - password="MyPass123$") - user2 = auth0.User("user2", - connection_name="Username-Password-Authentication", - email="myuser2@auth0.com", - password="MyPass123$") - my_org = auth0.Organization("myOrg", display_name="Some Organization") - my_members = auth0.OrganizationMembers("myMembers", - organization_id=my_org.id, - members=[ - user1.id, - user2.id, - ]) - ``` - ## Import This resource can be imported by specifying the organization ID. # Example diff --git a/sdk/python/pulumi_auth0/outputs.py b/sdk/python/pulumi_auth0/outputs.py index 85d5a662..8ecebc60 100644 --- a/sdk/python/pulumi_auth0/outputs.py +++ b/sdk/python/pulumi_auth0/outputs.py @@ -226,9 +226,15 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - name: str, - version: str, - opts: Optional[pulumi.ResourceOptions]=None): + name: Optional[str] = None, + version: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if name is None: + raise TypeError("Missing 'name' argument") + if version is None: + raise TypeError("Missing 'version' argument") + _setter("name", name) _setter("version", version) @@ -266,9 +272,15 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - name: str, - value: str, - opts: Optional[pulumi.ResourceOptions]=None): + name: Optional[str] = None, + value: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if name is None: + raise TypeError("Missing 'name' argument") + if value is None: + raise TypeError("Missing 'value' argument") + _setter("name", name) _setter("value", value) @@ -306,9 +318,15 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - id: str, - version: str, - opts: Optional[pulumi.ResourceOptions]=None): + id: Optional[str] = None, + version: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if id is None: + raise TypeError("Missing 'id' argument") + if version is None: + raise TypeError("Missing 'version' argument") + _setter("id", id) _setter("version", version) @@ -374,12 +392,20 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - enabled: bool, + enabled: Optional[bool] = None, admin_notification_frequencies: Optional[Sequence[str]] = None, method: Optional[str] = None, pre_user_registration: Optional['outputs.AttackProtectionBreachedPasswordDetectionPreUserRegistration'] = None, shields: Optional[Sequence[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if enabled is None: + raise TypeError("Missing 'enabled' argument") + if admin_notification_frequencies is None and 'adminNotificationFrequencies' in kwargs: + admin_notification_frequencies = kwargs['adminNotificationFrequencies'] + if pre_user_registration is None and 'preUserRegistration' in kwargs: + pre_user_registration = kwargs['preUserRegistration'] + _setter("enabled", enabled) if admin_notification_frequencies is not None: _setter("admin_notification_frequencies", admin_notification_frequencies) @@ -446,7 +472,9 @@ def __init__(__self__, *, def _configure( _setter: Callable[[Any, Any], None], shields: Optional[Sequence[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if shields is not None: _setter("shields", shields) @@ -502,12 +530,18 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - enabled: bool, + enabled: Optional[bool] = None, allowlists: Optional[Sequence[str]] = None, max_attempts: Optional[int] = None, mode: Optional[str] = None, shields: Optional[Sequence[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if enabled is None: + raise TypeError("Missing 'enabled' argument") + if max_attempts is None and 'maxAttempts' in kwargs: + max_attempts = kwargs['maxAttempts'] + _setter("enabled", enabled) if allowlists is not None: _setter("allowlists", allowlists) @@ -604,12 +638,20 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - enabled: bool, + enabled: Optional[bool] = None, allowlists: Optional[Sequence[str]] = None, pre_login: Optional['outputs.AttackProtectionSuspiciousIpThrottlingPreLogin'] = None, pre_user_registration: Optional['outputs.AttackProtectionSuspiciousIpThrottlingPreUserRegistration'] = None, shields: Optional[Sequence[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if enabled is None: + raise TypeError("Missing 'enabled' argument") + if pre_login is None and 'preLogin' in kwargs: + pre_login = kwargs['preLogin'] + if pre_user_registration is None and 'preUserRegistration' in kwargs: + pre_user_registration = kwargs['preUserRegistration'] + _setter("enabled", enabled) if allowlists is not None: _setter("allowlists", allowlists) @@ -697,7 +739,11 @@ def _configure( _setter: Callable[[Any, Any], None], max_attempts: Optional[int] = None, rate: Optional[int] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if max_attempts is None and 'maxAttempts' in kwargs: + max_attempts = kwargs['maxAttempts'] + if max_attempts is not None: _setter("max_attempts", max_attempts) if rate is not None: @@ -756,7 +802,11 @@ def _configure( _setter: Callable[[Any, Any], None], max_attempts: Optional[int] = None, rate: Optional[int] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if max_attempts is None and 'maxAttempts' in kwargs: + max_attempts = kwargs['maxAttempts'] + if max_attempts is not None: _setter("max_attempts", max_attempts) if rate is not None: @@ -815,7 +865,11 @@ def _configure( _setter: Callable[[Any, Any], None], page_background: Optional[str] = None, primary: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if page_background is None and 'pageBackground' in kwargs: + page_background = kwargs['pageBackground'] + if page_background is not None: _setter("page_background", page_background) if primary is not None: @@ -853,7 +907,9 @@ def __init__(__self__, *, def _configure( _setter: Callable[[Any, Any], None], url: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if url is not None: _setter("url", url) @@ -946,7 +1002,27 @@ def _configure( show_widget_shadow: Optional[bool] = None, widget_border_weight: Optional[float] = None, widget_corner_radius: Optional[float] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if button_border_radius is None and 'buttonBorderRadius' in kwargs: + button_border_radius = kwargs['buttonBorderRadius'] + if button_border_weight is None and 'buttonBorderWeight' in kwargs: + button_border_weight = kwargs['buttonBorderWeight'] + if buttons_style is None and 'buttonsStyle' in kwargs: + buttons_style = kwargs['buttonsStyle'] + if input_border_radius is None and 'inputBorderRadius' in kwargs: + input_border_radius = kwargs['inputBorderRadius'] + if input_border_weight is None and 'inputBorderWeight' in kwargs: + input_border_weight = kwargs['inputBorderWeight'] + if inputs_style is None and 'inputsStyle' in kwargs: + inputs_style = kwargs['inputsStyle'] + if show_widget_shadow is None and 'showWidgetShadow' in kwargs: + show_widget_shadow = kwargs['showWidgetShadow'] + if widget_border_weight is None and 'widgetBorderWeight' in kwargs: + widget_border_weight = kwargs['widgetBorderWeight'] + if widget_corner_radius is None and 'widgetCornerRadius' in kwargs: + widget_corner_radius = kwargs['widgetCornerRadius'] + if button_border_radius is not None: _setter("button_border_radius", button_border_radius) if button_border_weight is not None: @@ -1165,7 +1241,37 @@ def _configure( success: Optional[str] = None, widget_background: Optional[str] = None, widget_border: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if base_focus_color is None and 'baseFocusColor' in kwargs: + base_focus_color = kwargs['baseFocusColor'] + if base_hover_color is None and 'baseHoverColor' in kwargs: + base_hover_color = kwargs['baseHoverColor'] + if body_text is None and 'bodyText' in kwargs: + body_text = kwargs['bodyText'] + if input_background is None and 'inputBackground' in kwargs: + input_background = kwargs['inputBackground'] + if input_border is None and 'inputBorder' in kwargs: + input_border = kwargs['inputBorder'] + if input_filled_text is None and 'inputFilledText' in kwargs: + input_filled_text = kwargs['inputFilledText'] + if input_labels_placeholders is None and 'inputLabelsPlaceholders' in kwargs: + input_labels_placeholders = kwargs['inputLabelsPlaceholders'] + if links_focused_components is None and 'linksFocusedComponents' in kwargs: + links_focused_components = kwargs['linksFocusedComponents'] + if primary_button is None and 'primaryButton' in kwargs: + primary_button = kwargs['primaryButton'] + if primary_button_label is None and 'primaryButtonLabel' in kwargs: + primary_button_label = kwargs['primaryButtonLabel'] + if secondary_button_border is None and 'secondaryButtonBorder' in kwargs: + secondary_button_border = kwargs['secondaryButtonBorder'] + if secondary_button_label is None and 'secondaryButtonLabel' in kwargs: + secondary_button_label = kwargs['secondaryButtonLabel'] + if widget_background is None and 'widgetBackground' in kwargs: + widget_background = kwargs['widgetBackground'] + if widget_border is None and 'widgetBorder' in kwargs: + widget_border = kwargs['widgetBorder'] + if base_focus_color is not None: _setter("base_focus_color", base_focus_color) if base_hover_color is not None: @@ -1413,16 +1519,42 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - body_text: 'outputs.BrandingThemeFontsBodyText', - buttons_text: 'outputs.BrandingThemeFontsButtonsText', - input_labels: 'outputs.BrandingThemeFontsInputLabels', - links: 'outputs.BrandingThemeFontsLinks', - subtitle: 'outputs.BrandingThemeFontsSubtitle', - title: 'outputs.BrandingThemeFontsTitle', + body_text: Optional['outputs.BrandingThemeFontsBodyText'] = None, + buttons_text: Optional['outputs.BrandingThemeFontsButtonsText'] = None, + input_labels: Optional['outputs.BrandingThemeFontsInputLabels'] = None, + links: Optional['outputs.BrandingThemeFontsLinks'] = None, + subtitle: Optional['outputs.BrandingThemeFontsSubtitle'] = None, + title: Optional['outputs.BrandingThemeFontsTitle'] = None, font_url: Optional[str] = None, links_style: Optional[str] = None, reference_text_size: Optional[float] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if body_text is None and 'bodyText' in kwargs: + body_text = kwargs['bodyText'] + if body_text is None: + raise TypeError("Missing 'body_text' argument") + if buttons_text is None and 'buttonsText' in kwargs: + buttons_text = kwargs['buttonsText'] + if buttons_text is None: + raise TypeError("Missing 'buttons_text' argument") + if input_labels is None and 'inputLabels' in kwargs: + input_labels = kwargs['inputLabels'] + if input_labels is None: + raise TypeError("Missing 'input_labels' argument") + if links is None: + raise TypeError("Missing 'links' argument") + if subtitle is None: + raise TypeError("Missing 'subtitle' argument") + if title is None: + raise TypeError("Missing 'title' argument") + if font_url is None and 'fontUrl' in kwargs: + font_url = kwargs['fontUrl'] + if links_style is None and 'linksStyle' in kwargs: + links_style = kwargs['linksStyle'] + if reference_text_size is None and 'referenceTextSize' in kwargs: + reference_text_size = kwargs['referenceTextSize'] + _setter("body_text", body_text) _setter("buttons_text", buttons_text) _setter("input_labels", input_labels) @@ -1528,7 +1660,9 @@ def _configure( _setter: Callable[[Any, Any], None], bold: Optional[bool] = None, size: Optional[float] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if bold is not None: _setter("bold", bold) if size is not None: @@ -1570,7 +1704,9 @@ def _configure( _setter: Callable[[Any, Any], None], bold: Optional[bool] = None, size: Optional[float] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if bold is not None: _setter("bold", bold) if size is not None: @@ -1612,7 +1748,9 @@ def _configure( _setter: Callable[[Any, Any], None], bold: Optional[bool] = None, size: Optional[float] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if bold is not None: _setter("bold", bold) if size is not None: @@ -1654,7 +1792,9 @@ def _configure( _setter: Callable[[Any, Any], None], bold: Optional[bool] = None, size: Optional[float] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if bold is not None: _setter("bold", bold) if size is not None: @@ -1696,7 +1836,9 @@ def _configure( _setter: Callable[[Any, Any], None], bold: Optional[bool] = None, size: Optional[float] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if bold is not None: _setter("bold", bold) if size is not None: @@ -1738,7 +1880,9 @@ def _configure( _setter: Callable[[Any, Any], None], bold: Optional[bool] = None, size: Optional[float] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if bold is not None: _setter("bold", bold) if size is not None: @@ -1805,7 +1949,15 @@ def _configure( background_color: Optional[str] = None, background_image_url: Optional[str] = None, page_layout: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if background_color is None and 'backgroundColor' in kwargs: + background_color = kwargs['backgroundColor'] + if background_image_url is None and 'backgroundImageUrl' in kwargs: + background_image_url = kwargs['backgroundImageUrl'] + if page_layout is None and 'pageLayout' in kwargs: + page_layout = kwargs['pageLayout'] + if background_color is not None: _setter("background_color", background_color) if background_image_url is not None: @@ -1894,7 +2046,19 @@ def _configure( logo_position: Optional[str] = None, logo_url: Optional[str] = None, social_buttons_layout: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if header_text_alignment is None and 'headerTextAlignment' in kwargs: + header_text_alignment = kwargs['headerTextAlignment'] + if logo_height is None and 'logoHeight' in kwargs: + logo_height = kwargs['logoHeight'] + if logo_position is None and 'logoPosition' in kwargs: + logo_position = kwargs['logoPosition'] + if logo_url is None and 'logoUrl' in kwargs: + logo_url = kwargs['logoUrl'] + if social_buttons_layout is None and 'socialButtonsLayout' in kwargs: + social_buttons_layout = kwargs['socialButtonsLayout'] + if header_text_alignment is not None: _setter("header_text_alignment", header_text_alignment) if logo_height is not None: @@ -1961,8 +2125,12 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - body: str, - opts: Optional[pulumi.ResourceOptions]=None): + body: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if body is None: + raise TypeError("Missing 'body' argument") + _setter("body", body) @property @@ -2128,7 +2296,21 @@ def _configure( wsfed: Optional['outputs.ClientAddonsWsfed'] = None, zendesk: Optional['outputs.ClientAddonsZendesk'] = None, zoom: Optional['outputs.ClientAddonsZoom'] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if azure_blob is None and 'azureBlob' in kwargs: + azure_blob = kwargs['azureBlob'] + if azure_sb is None and 'azureSb' in kwargs: + azure_sb = kwargs['azureSb'] + if salesforce_api is None and 'salesforceApi' in kwargs: + salesforce_api = kwargs['salesforceApi'] + if salesforce_sandbox_api is None and 'salesforceSandboxApi' in kwargs: + salesforce_sandbox_api = kwargs['salesforceSandboxApi'] + if sap_api is None and 'sapApi' in kwargs: + sap_api = kwargs['sapApi'] + if sso_integration is None and 'ssoIntegration' in kwargs: + sso_integration = kwargs['ssoIntegration'] + if aws is not None: _setter("aws", aws) if azure_blob is not None: @@ -2461,7 +2643,11 @@ def _configure( lifetime_in_seconds: Optional[int] = None, principal: Optional[str] = None, role: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if lifetime_in_seconds is None and 'lifetimeInSeconds' in kwargs: + lifetime_in_seconds = kwargs['lifetimeInSeconds'] + if lifetime_in_seconds is not None: _setter("lifetime_in_seconds", lifetime_in_seconds) if principal is not None: @@ -2596,7 +2782,33 @@ def _configure( expiration: Optional[int] = None, signed_identifier: Optional[str] = None, storage_access_key: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if account_name is None and 'accountName' in kwargs: + account_name = kwargs['accountName'] + if blob_delete is None and 'blobDelete' in kwargs: + blob_delete = kwargs['blobDelete'] + if blob_name is None and 'blobName' in kwargs: + blob_name = kwargs['blobName'] + if blob_read is None and 'blobRead' in kwargs: + blob_read = kwargs['blobRead'] + if blob_write is None and 'blobWrite' in kwargs: + blob_write = kwargs['blobWrite'] + if container_delete is None and 'containerDelete' in kwargs: + container_delete = kwargs['containerDelete'] + if container_list is None and 'containerList' in kwargs: + container_list = kwargs['containerList'] + if container_name is None and 'containerName' in kwargs: + container_name = kwargs['containerName'] + if container_read is None and 'containerRead' in kwargs: + container_read = kwargs['containerRead'] + if container_write is None and 'containerWrite' in kwargs: + container_write = kwargs['containerWrite'] + if signed_identifier is None and 'signedIdentifier' in kwargs: + signed_identifier = kwargs['signedIdentifier'] + if storage_access_key is None and 'storageAccessKey' in kwargs: + storage_access_key = kwargs['storageAccessKey'] + if account_name is not None: _setter("account_name", account_name) if blob_delete is not None: @@ -2781,7 +2993,15 @@ def _configure( namespace: Optional[str] = None, sas_key: Optional[str] = None, sas_key_name: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if entity_path is None and 'entityPath' in kwargs: + entity_path = kwargs['entityPath'] + if sas_key is None and 'sasKey' in kwargs: + sas_key = kwargs['sasKey'] + if sas_key_name is None and 'sasKeyName' in kwargs: + sas_key_name = kwargs['sasKeyName'] + if entity_path is not None: _setter("entity_path", entity_path) if expiration is not None: @@ -2841,10 +3061,12 @@ def __init__(__self__): @staticmethod def _configure( _setter: Callable[[Any, Any], None], - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): pass + @pulumi.output_type class ClientAddonsCloudbees(dict): def __init__(__self__): @@ -2852,10 +3074,12 @@ def __init__(__self__): @staticmethod def _configure( _setter: Callable[[Any, Any], None], - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): pass + @pulumi.output_type class ClientAddonsConcur(dict): def __init__(__self__): @@ -2863,10 +3087,12 @@ def __init__(__self__): @staticmethod def _configure( _setter: Callable[[Any, Any], None], - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): pass + @pulumi.output_type class ClientAddonsDropbox(dict): def __init__(__self__): @@ -2874,10 +3100,12 @@ def __init__(__self__): @staticmethod def _configure( _setter: Callable[[Any, Any], None], - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): pass + @pulumi.output_type class ClientAddonsEchosign(dict): def __init__(__self__, *, @@ -2893,7 +3121,9 @@ def __init__(__self__, *, def _configure( _setter: Callable[[Any, Any], None], domain: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if domain is not None: _setter("domain", domain) @@ -2921,7 +3151,9 @@ def __init__(__self__, *, def _configure( _setter: Callable[[Any, Any], None], domain: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if domain is not None: _setter("domain", domain) @@ -2988,7 +3220,17 @@ def _configure( private_key: Optional[str] = None, private_key_id: Optional[str] = None, secret: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if client_email is None and 'clientEmail' in kwargs: + client_email = kwargs['clientEmail'] + if lifetime_in_seconds is None and 'lifetimeInSeconds' in kwargs: + lifetime_in_seconds = kwargs['lifetimeInSeconds'] + if private_key is None and 'privateKey' in kwargs: + private_key = kwargs['privateKey'] + if private_key_id is None and 'privateKeyId' in kwargs: + private_key_id = kwargs['privateKeyId'] + if client_email is not None: _setter("client_email", client_email) if lifetime_in_seconds is not None: @@ -3088,12 +3330,26 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - key_id: str, - private_key: str, - provider_id: str, + key_id: Optional[str] = None, + private_key: Optional[str] = None, + provider_id: Optional[str] = None, expiration: Optional[int] = None, principal: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if key_id is None and 'keyId' in kwargs: + key_id = kwargs['keyId'] + if key_id is None: + raise TypeError("Missing 'key_id' argument") + if private_key is None and 'privateKey' in kwargs: + private_key = kwargs['privateKey'] + if private_key is None: + raise TypeError("Missing 'private_key' argument") + if provider_id is None and 'providerId' in kwargs: + provider_id = kwargs['providerId'] + if provider_id is None: + raise TypeError("Missing 'provider_id' argument") + _setter("key_id", key_id) _setter("private_key", private_key) _setter("provider_id", provider_id) @@ -3158,7 +3414,9 @@ def __init__(__self__, *, def _configure( _setter: Callable[[Any, Any], None], url: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if url is not None: _setter("url", url) @@ -3186,7 +3444,9 @@ def __init__(__self__, *, def _configure( _setter: Callable[[Any, Any], None], account: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if account is not None: _setter("account", account) @@ -3218,7 +3478,9 @@ def _configure( _setter: Callable[[Any, Any], None], connection: Optional[str] = None, domain: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if connection is not None: _setter("connection", connection) if domain is not None: @@ -3256,7 +3518,9 @@ def __init__(__self__, *, def _configure( _setter: Callable[[Any, Any], None], url: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if url is not None: _setter("url", url) @@ -3301,7 +3565,11 @@ def __init__(__self__, *, def _configure( _setter: Callable[[Any, Any], None], entity_id: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if entity_id is None and 'entityId' in kwargs: + entity_id = kwargs['entityId'] + if entity_id is not None: _setter("entity_id", entity_id) @@ -3362,7 +3630,15 @@ def _configure( community_name: Optional[str] = None, community_url_section: Optional[str] = None, principal: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if client_id is None and 'clientId' in kwargs: + client_id = kwargs['clientId'] + if community_name is None and 'communityName' in kwargs: + community_name = kwargs['communityName'] + if community_url_section is None and 'communityUrlSection' in kwargs: + community_url_section = kwargs['communityUrlSection'] + if client_id is not None: _setter("client_id", client_id) if community_name is not None: @@ -3453,7 +3729,15 @@ def _configure( community_name: Optional[str] = None, community_url_section: Optional[str] = None, principal: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if client_id is None and 'clientId' in kwargs: + client_id = kwargs['clientId'] + if community_name is None and 'communityName' in kwargs: + community_name = kwargs['communityName'] + if community_url_section is None and 'communityUrlSection' in kwargs: + community_url_section = kwargs['communityUrlSection'] + if client_id is not None: _setter("client_id", client_id) if community_name is not None: @@ -3634,7 +3918,37 @@ def _configure( signature_algorithm: Optional[str] = None, signing_cert: Optional[str] = None, typed_attributes: Optional[bool] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if authn_context_class_ref is None and 'authnContextClassRef' in kwargs: + authn_context_class_ref = kwargs['authnContextClassRef'] + if create_upn_claim is None and 'createUpnClaim' in kwargs: + create_upn_claim = kwargs['createUpnClaim'] + if digest_algorithm is None and 'digestAlgorithm' in kwargs: + digest_algorithm = kwargs['digestAlgorithm'] + if include_attribute_name_format is None and 'includeAttributeNameFormat' in kwargs: + include_attribute_name_format = kwargs['includeAttributeNameFormat'] + if lifetime_in_seconds is None and 'lifetimeInSeconds' in kwargs: + lifetime_in_seconds = kwargs['lifetimeInSeconds'] + if map_identities is None and 'mapIdentities' in kwargs: + map_identities = kwargs['mapIdentities'] + if map_unknown_claims_as_is is None and 'mapUnknownClaimsAsIs' in kwargs: + map_unknown_claims_as_is = kwargs['mapUnknownClaimsAsIs'] + if name_identifier_format is None and 'nameIdentifierFormat' in kwargs: + name_identifier_format = kwargs['nameIdentifierFormat'] + if name_identifier_probes is None and 'nameIdentifierProbes' in kwargs: + name_identifier_probes = kwargs['nameIdentifierProbes'] + if passthrough_claims_with_no_mapping is None and 'passthroughClaimsWithNoMapping' in kwargs: + passthrough_claims_with_no_mapping = kwargs['passthroughClaimsWithNoMapping'] + if sign_response is None and 'signResponse' in kwargs: + sign_response = kwargs['signResponse'] + if signature_algorithm is None and 'signatureAlgorithm' in kwargs: + signature_algorithm = kwargs['signatureAlgorithm'] + if signing_cert is None and 'signingCert' in kwargs: + signing_cert = kwargs['signingCert'] + if typed_attributes is None and 'typedAttributes' in kwargs: + typed_attributes = kwargs['typedAttributes'] + if audience is not None: _setter("audience", audience) if authn_context_class_ref is not None: @@ -3883,7 +4197,11 @@ def _configure( _setter: Callable[[Any, Any], None], callback: Optional[str] = None, slo_enabled: Optional[bool] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if slo_enabled is None and 'sloEnabled' in kwargs: + slo_enabled = kwargs['sloEnabled'] + if callback is not None: _setter("callback", callback) if slo_enabled is not None: @@ -3966,7 +4284,19 @@ def _configure( service_password: Optional[str] = None, token_endpoint_url: Optional[str] = None, username_attribute: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if client_id is None and 'clientId' in kwargs: + client_id = kwargs['clientId'] + if name_identifier_format is None and 'nameIdentifierFormat' in kwargs: + name_identifier_format = kwargs['nameIdentifierFormat'] + if service_password is None and 'servicePassword' in kwargs: + service_password = kwargs['servicePassword'] + if token_endpoint_url is None and 'tokenEndpointUrl' in kwargs: + token_endpoint_url = kwargs['tokenEndpointUrl'] + if username_attribute is None and 'usernameAttribute' in kwargs: + username_attribute = kwargs['usernameAttribute'] + if client_id is not None: _setter("client_id", client_id) if name_identifier_format is not None: @@ -4067,7 +4397,13 @@ def _configure( _setter: Callable[[Any, Any], None], base_url: Optional[str] = None, org_slug: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if base_url is None and 'baseUrl' in kwargs: + base_url = kwargs['baseUrl'] + if org_slug is None and 'orgSlug' in kwargs: + org_slug = kwargs['orgSlug'] + if base_url is not None: _setter("base_url", base_url) if org_slug is not None: @@ -4126,7 +4462,11 @@ def _configure( _setter: Callable[[Any, Any], None], external_urls: Optional[Sequence[str]] = None, url: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if external_urls is None and 'externalUrls' in kwargs: + external_urls = kwargs['externalUrls'] + if external_urls is not None: _setter("external_urls", external_urls) if url is not None: @@ -4164,7 +4504,9 @@ def __init__(__self__, *, def _configure( _setter: Callable[[Any, Any], None], team: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if team is not None: _setter("team", team) @@ -4209,7 +4551,11 @@ def __init__(__self__, *, def _configure( _setter: Callable[[Any, Any], None], acs_url: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if acs_url is None and 'acsUrl' in kwargs: + acs_url = kwargs['acsUrl'] + if acs_url is not None: _setter("acs_url", acs_url) @@ -4241,7 +4587,9 @@ def _configure( _setter: Callable[[Any, Any], None], name: Optional[str] = None, version: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if name is not None: _setter("name", name) if version is not None: @@ -4296,7 +4644,11 @@ def __init__(__self__, *, def _configure( _setter: Callable[[Any, Any], None], master_key: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if master_key is None and 'masterKey' in kwargs: + master_key = kwargs['masterKey'] + if master_key is not None: _setter("master_key", master_key) @@ -4316,10 +4668,12 @@ def __init__(__self__): @staticmethod def _configure( _setter: Callable[[Any, Any], None], - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): pass + @pulumi.output_type class ClientAddonsZendesk(dict): @staticmethod @@ -4352,7 +4706,11 @@ def __init__(__self__, *, def _configure( _setter: Callable[[Any, Any], None], account_name: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if account_name is None and 'accountName' in kwargs: + account_name = kwargs['accountName'] + if account_name is not None: _setter("account_name", account_name) @@ -4380,7 +4738,9 @@ def __init__(__self__, *, def _configure( _setter: Callable[[Any, Any], None], account: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if account is not None: _setter("account", account) @@ -4407,8 +4767,12 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - credentials: Sequence['outputs.ClientCredentialsPrivateKeyJwtCredential'], - opts: Optional[pulumi.ResourceOptions]=None): + credentials: Optional[Sequence['outputs.ClientCredentialsPrivateKeyJwtCredential']] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if credentials is None: + raise TypeError("Missing 'credentials' argument") + _setter("credentials", credentials) @property @@ -4488,8 +4852,8 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - credential_type: str, - pem: str, + credential_type: Optional[str] = None, + pem: Optional[str] = None, algorithm: Optional[str] = None, created_at: Optional[str] = None, expires_at: Optional[str] = None, @@ -4498,7 +4862,25 @@ def _configure( name: Optional[str] = None, parse_expiry_from_cert: Optional[bool] = None, updated_at: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if credential_type is None and 'credentialType' in kwargs: + credential_type = kwargs['credentialType'] + if credential_type is None: + raise TypeError("Missing 'credential_type' argument") + if pem is None: + raise TypeError("Missing 'pem' argument") + if created_at is None and 'createdAt' in kwargs: + created_at = kwargs['createdAt'] + if expires_at is None and 'expiresAt' in kwargs: + expires_at = kwargs['expiresAt'] + if key_id is None and 'keyId' in kwargs: + key_id = kwargs['keyId'] + if parse_expiry_from_cert is None and 'parseExpiryFromCert' in kwargs: + parse_expiry_from_cert = kwargs['parseExpiryFromCert'] + if updated_at is None and 'updatedAt' in kwargs: + updated_at = kwargs['updatedAt'] + _setter("credential_type", credential_type) _setter("pem", pem) if algorithm is not None: @@ -4645,7 +5027,13 @@ def _configure( lifetime_in_seconds: Optional[int] = None, scopes: Optional[Mapping[str, str]] = None, secret_encoded: Optional[bool] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if lifetime_in_seconds is None and 'lifetimeInSeconds' in kwargs: + lifetime_in_seconds = kwargs['lifetimeInSeconds'] + if secret_encoded is None and 'secretEncoded' in kwargs: + secret_encoded = kwargs['secretEncoded'] + if alg is not None: _setter("alg", alg) if lifetime_in_seconds is not None: @@ -4707,7 +5095,9 @@ def _configure( _setter: Callable[[Any, Any], None], android: Optional['outputs.ClientMobileAndroid'] = None, ios: Optional['outputs.ClientMobileIos'] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if android is not None: _setter("android", android) if ios is not None: @@ -4764,7 +5154,13 @@ def _configure( _setter: Callable[[Any, Any], None], app_package_name: Optional[str] = None, sha256_cert_fingerprints: Optional[Sequence[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if app_package_name is None and 'appPackageName' in kwargs: + app_package_name = kwargs['appPackageName'] + if sha256_cert_fingerprints is None and 'sha256CertFingerprints' in kwargs: + sha256_cert_fingerprints = kwargs['sha256CertFingerprints'] + if app_package_name is not None: _setter("app_package_name", app_package_name) if sha256_cert_fingerprints is not None: @@ -4815,7 +5211,13 @@ def _configure( _setter: Callable[[Any, Any], None], app_bundle_identifier: Optional[str] = None, team_id: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if app_bundle_identifier is None and 'appBundleIdentifier' in kwargs: + app_bundle_identifier = kwargs['appBundleIdentifier'] + if team_id is None and 'teamId' in kwargs: + team_id = kwargs['teamId'] + if app_bundle_identifier is not None: _setter("app_bundle_identifier", app_bundle_identifier) if team_id is not None: @@ -4847,7 +5249,9 @@ def _configure( _setter: Callable[[Any, Any], None], apple: Optional['outputs.ClientNativeSocialLoginApple'] = None, facebook: Optional['outputs.ClientNativeSocialLoginFacebook'] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if apple is not None: _setter("apple", apple) if facebook is not None: @@ -4876,7 +5280,9 @@ def __init__(__self__, *, def _configure( _setter: Callable[[Any, Any], None], enabled: Optional[bool] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if enabled is not None: _setter("enabled", enabled) @@ -4898,7 +5304,9 @@ def __init__(__self__, *, def _configure( _setter: Callable[[Any, Any], None], enabled: Optional[bool] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if enabled is not None: _setter("enabled", enabled) @@ -4967,14 +5375,32 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - expiration_type: str, - rotation_type: str, + expiration_type: Optional[str] = None, + rotation_type: Optional[str] = None, idle_token_lifetime: Optional[int] = None, infinite_idle_token_lifetime: Optional[bool] = None, infinite_token_lifetime: Optional[bool] = None, leeway: Optional[int] = None, token_lifetime: Optional[int] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if expiration_type is None and 'expirationType' in kwargs: + expiration_type = kwargs['expirationType'] + if expiration_type is None: + raise TypeError("Missing 'expiration_type' argument") + if rotation_type is None and 'rotationType' in kwargs: + rotation_type = kwargs['rotationType'] + if rotation_type is None: + raise TypeError("Missing 'rotation_type' argument") + if idle_token_lifetime is None and 'idleTokenLifetime' in kwargs: + idle_token_lifetime = kwargs['idleTokenLifetime'] + if infinite_idle_token_lifetime is None and 'infiniteIdleTokenLifetime' in kwargs: + infinite_idle_token_lifetime = kwargs['infiniteIdleTokenLifetime'] + if infinite_token_lifetime is None and 'infiniteTokenLifetime' in kwargs: + infinite_token_lifetime = kwargs['infiniteTokenLifetime'] + if token_lifetime is None and 'tokenLifetime' in kwargs: + token_lifetime = kwargs['tokenLifetime'] + _setter("expiration_type", expiration_type) _setter("rotation_type", rotation_type) if idle_token_lifetime is not None: @@ -5579,7 +6005,157 @@ def _configure( validation: Optional['outputs.ConnectionOptionsValidation'] = None, waad_common_endpoint: Optional[bool] = None, waad_protocol: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if adfs_server is None and 'adfsServer' in kwargs: + adfs_server = kwargs['adfsServer'] + if allowed_audiences is None and 'allowedAudiences' in kwargs: + allowed_audiences = kwargs['allowedAudiences'] + if api_enable_users is None and 'apiEnableUsers' in kwargs: + api_enable_users = kwargs['apiEnableUsers'] + if app_id is None and 'appId' in kwargs: + app_id = kwargs['appId'] + if attribute_map is None and 'attributeMap' in kwargs: + attribute_map = kwargs['attributeMap'] + if auth_params is None and 'authParams' in kwargs: + auth_params = kwargs['authParams'] + if authorization_endpoint is None and 'authorizationEndpoint' in kwargs: + authorization_endpoint = kwargs['authorizationEndpoint'] + if brute_force_protection is None and 'bruteForceProtection' in kwargs: + brute_force_protection = kwargs['bruteForceProtection'] + if client_id is None and 'clientId' in kwargs: + client_id = kwargs['clientId'] + if client_secret is None and 'clientSecret' in kwargs: + client_secret = kwargs['clientSecret'] + if community_base_url is None and 'communityBaseUrl' in kwargs: + community_base_url = kwargs['communityBaseUrl'] + if connection_settings is None and 'connectionSettings' in kwargs: + connection_settings = kwargs['connectionSettings'] + if custom_scripts is None and 'customScripts' in kwargs: + custom_scripts = kwargs['customScripts'] + if decryption_key is None and 'decryptionKey' in kwargs: + decryption_key = kwargs['decryptionKey'] + if digest_algorithm is None and 'digestAlgorithm' in kwargs: + digest_algorithm = kwargs['digestAlgorithm'] + if disable_cache is None and 'disableCache' in kwargs: + disable_cache = kwargs['disableCache'] + if disable_self_service_change_password is None and 'disableSelfServiceChangePassword' in kwargs: + disable_self_service_change_password = kwargs['disableSelfServiceChangePassword'] + if disable_sign_out is None and 'disableSignOut' in kwargs: + disable_sign_out = kwargs['disableSignOut'] + if disable_signup is None and 'disableSignup' in kwargs: + disable_signup = kwargs['disableSignup'] + if discovery_url is None and 'discoveryUrl' in kwargs: + discovery_url = kwargs['discoveryUrl'] + if domain_aliases is None and 'domainAliases' in kwargs: + domain_aliases = kwargs['domainAliases'] + if enable_script_context is None and 'enableScriptContext' in kwargs: + enable_script_context = kwargs['enableScriptContext'] + if enabled_database_customization is None and 'enabledDatabaseCustomization' in kwargs: + enabled_database_customization = kwargs['enabledDatabaseCustomization'] + if entity_id is None and 'entityId' in kwargs: + entity_id = kwargs['entityId'] + if fed_metadata_xml is None and 'fedMetadataXml' in kwargs: + fed_metadata_xml = kwargs['fedMetadataXml'] + if fields_map is None and 'fieldsMap' in kwargs: + fields_map = kwargs['fieldsMap'] + if forward_request_info is None and 'forwardRequestInfo' in kwargs: + forward_request_info = kwargs['forwardRequestInfo'] + if from_ is None and 'from' in kwargs: + from_ = kwargs['from'] + if gateway_authentication is None and 'gatewayAuthentication' in kwargs: + gateway_authentication = kwargs['gatewayAuthentication'] + if gateway_url is None and 'gatewayUrl' in kwargs: + gateway_url = kwargs['gatewayUrl'] + if icon_url is None and 'iconUrl' in kwargs: + icon_url = kwargs['iconUrl'] + if identity_api is None and 'identityApi' in kwargs: + identity_api = kwargs['identityApi'] + if idp_initiated is None and 'idpInitiated' in kwargs: + idp_initiated = kwargs['idpInitiated'] + if import_mode is None and 'importMode' in kwargs: + import_mode = kwargs['importMode'] + if jwks_uri is None and 'jwksUri' in kwargs: + jwks_uri = kwargs['jwksUri'] + if key_id is None and 'keyId' in kwargs: + key_id = kwargs['keyId'] + if map_user_id_to_id is None and 'mapUserIdToId' in kwargs: + map_user_id_to_id = kwargs['mapUserIdToId'] + if max_groups_to_retrieve is None and 'maxGroupsToRetrieve' in kwargs: + max_groups_to_retrieve = kwargs['maxGroupsToRetrieve'] + if messaging_service_sid is None and 'messagingServiceSid' in kwargs: + messaging_service_sid = kwargs['messagingServiceSid'] + if metadata_url is None and 'metadataUrl' in kwargs: + metadata_url = kwargs['metadataUrl'] + if metadata_xml is None and 'metadataXml' in kwargs: + metadata_xml = kwargs['metadataXml'] + if non_persistent_attrs is None and 'nonPersistentAttrs' in kwargs: + non_persistent_attrs = kwargs['nonPersistentAttrs'] + if password_complexity_options is None and 'passwordComplexityOptions' in kwargs: + password_complexity_options = kwargs['passwordComplexityOptions'] + if password_dictionary is None and 'passwordDictionary' in kwargs: + password_dictionary = kwargs['passwordDictionary'] + if password_histories is None and 'passwordHistories' in kwargs: + password_histories = kwargs['passwordHistories'] + if password_no_personal_info is None and 'passwordNoPersonalInfo' in kwargs: + password_no_personal_info = kwargs['passwordNoPersonalInfo'] + if password_policy is None and 'passwordPolicy' in kwargs: + password_policy = kwargs['passwordPolicy'] + if ping_federate_base_url is None and 'pingFederateBaseUrl' in kwargs: + ping_federate_base_url = kwargs['pingFederateBaseUrl'] + if pkce_enabled is None and 'pkceEnabled' in kwargs: + pkce_enabled = kwargs['pkceEnabled'] + if protocol_binding is None and 'protocolBinding' in kwargs: + protocol_binding = kwargs['protocolBinding'] + if request_template is None and 'requestTemplate' in kwargs: + request_template = kwargs['requestTemplate'] + if requires_username is None and 'requiresUsername' in kwargs: + requires_username = kwargs['requiresUsername'] + if set_user_root_attributes is None and 'setUserRootAttributes' in kwargs: + set_user_root_attributes = kwargs['setUserRootAttributes'] + if should_trust_email_verified_connection is None and 'shouldTrustEmailVerifiedConnection' in kwargs: + should_trust_email_verified_connection = kwargs['shouldTrustEmailVerifiedConnection'] + if sign_in_endpoint is None and 'signInEndpoint' in kwargs: + sign_in_endpoint = kwargs['signInEndpoint'] + if sign_out_endpoint is None and 'signOutEndpoint' in kwargs: + sign_out_endpoint = kwargs['signOutEndpoint'] + if sign_saml_request is None and 'signSamlRequest' in kwargs: + sign_saml_request = kwargs['signSamlRequest'] + if signature_algorithm is None and 'signatureAlgorithm' in kwargs: + signature_algorithm = kwargs['signatureAlgorithm'] + if signing_cert is None and 'signingCert' in kwargs: + signing_cert = kwargs['signingCert'] + if signing_key is None and 'signingKey' in kwargs: + signing_key = kwargs['signingKey'] + if strategy_version is None and 'strategyVersion' in kwargs: + strategy_version = kwargs['strategyVersion'] + if team_id is None and 'teamId' in kwargs: + team_id = kwargs['teamId'] + if tenant_domain is None and 'tenantDomain' in kwargs: + tenant_domain = kwargs['tenantDomain'] + if token_endpoint is None and 'tokenEndpoint' in kwargs: + token_endpoint = kwargs['tokenEndpoint'] + if twilio_sid is None and 'twilioSid' in kwargs: + twilio_sid = kwargs['twilioSid'] + if twilio_token is None and 'twilioToken' in kwargs: + twilio_token = kwargs['twilioToken'] + if upstream_params is None and 'upstreamParams' in kwargs: + upstream_params = kwargs['upstreamParams'] + if use_cert_auth is None and 'useCertAuth' in kwargs: + use_cert_auth = kwargs['useCertAuth'] + if use_kerberos is None and 'useKerberos' in kwargs: + use_kerberos = kwargs['useKerberos'] + if use_wsfed is None and 'useWsfed' in kwargs: + use_wsfed = kwargs['useWsfed'] + if user_id_attribute is None and 'userIdAttribute' in kwargs: + user_id_attribute = kwargs['userIdAttribute'] + if userinfo_endpoint is None and 'userinfoEndpoint' in kwargs: + userinfo_endpoint = kwargs['userinfoEndpoint'] + if waad_common_endpoint is None and 'waadCommonEndpoint' in kwargs: + waad_common_endpoint = kwargs['waadCommonEndpoint'] + if waad_protocol is None and 'waadProtocol' in kwargs: + waad_protocol = kwargs['waadProtocol'] + if adfs_server is not None: _setter("adfs_server", adfs_server) if allowed_audiences is not None: @@ -6521,10 +7097,18 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - mapping_mode: str, + mapping_mode: Optional[str] = None, attributes: Optional[str] = None, userinfo_scope: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if mapping_mode is None and 'mappingMode' in kwargs: + mapping_mode = kwargs['mappingMode'] + if mapping_mode is None: + raise TypeError("Missing 'mapping_mode' argument") + if userinfo_scope is None and 'userinfoScope' in kwargs: + userinfo_scope = kwargs['userinfoScope'] + _setter("mapping_mode", mapping_mode) if attributes is not None: _setter("attributes", attributes) @@ -6570,8 +7154,12 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - pkce: str, - opts: Optional[pulumi.ResourceOptions]=None): + pkce: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if pkce is None: + raise TypeError("Missing 'pkce' argument") + _setter("pkce", pkce) @property @@ -6596,9 +7184,15 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - cert: str, - key: str, - opts: Optional[pulumi.ResourceOptions]=None): + cert: Optional[str] = None, + key: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if cert is None: + raise TypeError("Missing 'cert' argument") + if key is None: + raise TypeError("Missing 'key' argument") + _setter("cert", cert) _setter("key", key) @@ -6661,7 +7255,11 @@ def _configure( secret: Optional[str] = None, secret_base64_encoded: Optional[bool] = None, subject: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if secret_base64_encoded is None and 'secretBase64Encoded' in kwargs: + secret_base64_encoded = kwargs['secretBase64Encoded'] + if audience is not None: _setter("audience", audience) if method is not None: @@ -6756,7 +7354,15 @@ def _configure( client_authorize_query: Optional[str] = None, client_id: Optional[str] = None, client_protocol: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if client_authorize_query is None and 'clientAuthorizeQuery' in kwargs: + client_authorize_query = kwargs['clientAuthorizeQuery'] + if client_id is None and 'clientId' in kwargs: + client_id = kwargs['clientId'] + if client_protocol is None and 'clientProtocol' in kwargs: + client_protocol = kwargs['clientProtocol'] + if client_authorize_query is not None: _setter("client_authorize_query", client_authorize_query) if client_id is not None: @@ -6819,7 +7425,11 @@ def _configure( _setter: Callable[[Any, Any], None], active: Optional[bool] = None, return_enroll_settings: Optional[bool] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if return_enroll_settings is None and 'returnEnrollSettings' in kwargs: + return_enroll_settings = kwargs['returnEnrollSettings'] + if active is not None: _setter("active", active) if return_enroll_settings is not None: @@ -6874,7 +7484,11 @@ def __init__(__self__, *, def _configure( _setter: Callable[[Any, Any], None], min_length: Optional[int] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if min_length is None and 'minLength' in kwargs: + min_length = kwargs['minLength'] + if min_length is not None: _setter("min_length", min_length) @@ -6906,7 +7520,9 @@ def _configure( _setter: Callable[[Any, Any], None], dictionaries: Optional[Sequence[str]] = None, enable: Optional[bool] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if dictionaries is not None: _setter("dictionaries", dictionaries) if enable is not None: @@ -6947,7 +7563,9 @@ def _configure( _setter: Callable[[Any, Any], None], enable: Optional[bool] = None, size: Optional[int] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if enable is not None: _setter("enable", enable) if size is not None: @@ -6982,7 +7600,9 @@ def __init__(__self__, *, def _configure( _setter: Callable[[Any, Any], None], enable: Optional[bool] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if enable is not None: _setter("enable", enable) @@ -7008,9 +7628,15 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - cert: str, - key: str, - opts: Optional[pulumi.ResourceOptions]=None): + cert: Optional[str] = None, + key: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if cert is None: + raise TypeError("Missing 'cert' argument") + if key is None: + raise TypeError("Missing 'key' argument") + _setter("cert", cert) _setter("key", key) @@ -7061,7 +7687,11 @@ def _configure( _setter: Callable[[Any, Any], None], length: Optional[int] = None, time_step: Optional[int] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if time_step is None and 'timeStep' in kwargs: + time_step = kwargs['timeStep'] + if length is not None: _setter("length", length) if time_step is not None: @@ -7099,7 +7729,9 @@ def __init__(__self__, *, def _configure( _setter: Callable[[Any, Any], None], username: Optional['outputs.ConnectionOptionsValidationUsername'] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if username is not None: _setter("username", username) @@ -7127,7 +7759,9 @@ def _configure( _setter: Callable[[Any, Any], None], max: Optional[int] = None, min: Optional[int] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if max is not None: _setter("max", max) if min is not None: @@ -7156,7 +7790,9 @@ def __init__(__self__, *, def _configure( _setter: Callable[[Any, Any], None], methods: Optional[Sequence[Any]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if methods is not None: _setter("methods", methods) @@ -7266,7 +7902,31 @@ def _configure( smtp_pass: Optional[str] = None, smtp_port: Optional[int] = None, smtp_user: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if access_key_id is None and 'accessKeyId' in kwargs: + access_key_id = kwargs['accessKeyId'] + if api_key is None and 'apiKey' in kwargs: + api_key = kwargs['apiKey'] + if azure_cs_connection_string is None and 'azureCsConnectionString' in kwargs: + azure_cs_connection_string = kwargs['azureCsConnectionString'] + if ms365_client_id is None and 'ms365ClientId' in kwargs: + ms365_client_id = kwargs['ms365ClientId'] + if ms365_client_secret is None and 'ms365ClientSecret' in kwargs: + ms365_client_secret = kwargs['ms365ClientSecret'] + if ms365_tenant_id is None and 'ms365TenantId' in kwargs: + ms365_tenant_id = kwargs['ms365TenantId'] + if secret_access_key is None and 'secretAccessKey' in kwargs: + secret_access_key = kwargs['secretAccessKey'] + if smtp_host is None and 'smtpHost' in kwargs: + smtp_host = kwargs['smtpHost'] + if smtp_pass is None and 'smtpPass' in kwargs: + smtp_pass = kwargs['smtpPass'] + if smtp_port is None and 'smtpPort' in kwargs: + smtp_port = kwargs['smtpPort'] + if smtp_user is None and 'smtpUser' in kwargs: + smtp_user = kwargs['smtpUser'] + if access_key_id is not None: _setter("access_key_id", access_key_id) if api_key is not None: @@ -7418,7 +8078,9 @@ def _configure( _setter: Callable[[Any, Any], None], headers: Optional['outputs.EmailProviderSettingsHeaders'] = None, message: Optional['outputs.EmailProviderSettingsMessage'] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if headers is not None: _setter("headers", headers) if message is not None: @@ -7479,7 +8141,13 @@ def _configure( _setter: Callable[[Any, Any], None], x_mc_view_content_link: Optional[str] = None, x_ses_configuration_set: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if x_mc_view_content_link is None and 'xMcViewContentLink' in kwargs: + x_mc_view_content_link = kwargs['xMcViewContentLink'] + if x_ses_configuration_set is None and 'xSesConfigurationSet' in kwargs: + x_ses_configuration_set = kwargs['xSesConfigurationSet'] + if x_mc_view_content_link is not None: _setter("x_mc_view_content_link", x_mc_view_content_link) if x_ses_configuration_set is not None: @@ -7540,7 +8208,13 @@ def _configure( _setter: Callable[[Any, Any], None], configuration_set_name: Optional[str] = None, view_content_link: Optional[bool] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if configuration_set_name is None and 'configurationSetName' in kwargs: + configuration_set_name = kwargs['configurationSetName'] + if view_content_link is None and 'viewContentLink' in kwargs: + view_content_link = kwargs['viewContentLink'] + if configuration_set_name is not None: _setter("configuration_set_name", configuration_set_name) if view_content_link is not None: @@ -7605,11 +8279,19 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - enabled: bool, + enabled: Optional[bool] = None, hostname: Optional[str] = None, integration_key: Optional[str] = None, secret_key: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if enabled is None: + raise TypeError("Missing 'enabled' argument") + if integration_key is None and 'integrationKey' in kwargs: + integration_key = kwargs['integrationKey'] + if secret_key is None and 'secretKey' in kwargs: + secret_key = kwargs['secretKey'] + _setter("enabled", enabled) if hostname is not None: _setter("hostname", hostname) @@ -7691,11 +8373,17 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - enabled: bool, + enabled: Optional[bool] = None, message_types: Optional[Sequence[str]] = None, options: Optional['outputs.GuardianPhoneOptions'] = None, provider: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if enabled is None: + raise TypeError("Missing 'enabled' argument") + if message_types is None and 'messageTypes' in kwargs: + message_types = kwargs['messageTypes'] + _setter("enabled", enabled) if message_types is not None: _setter("message_types", message_types) @@ -7797,7 +8485,19 @@ def _configure( messaging_service_sid: Optional[str] = None, sid: Optional[str] = None, verification_message: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if auth_token is None and 'authToken' in kwargs: + auth_token = kwargs['authToken'] + if enrollment_message is None and 'enrollmentMessage' in kwargs: + enrollment_message = kwargs['enrollmentMessage'] + if from_ is None and 'from' in kwargs: + from_ = kwargs['from'] + if messaging_service_sid is None and 'messagingServiceSid' in kwargs: + messaging_service_sid = kwargs['messagingServiceSid'] + if verification_message is None and 'verificationMessage' in kwargs: + verification_message = kwargs['verificationMessage'] + if auth_token is not None: _setter("auth_token", auth_token) if enrollment_message is not None: @@ -7912,13 +8612,25 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - enabled: bool, + enabled: Optional[bool] = None, amazon_sns: Optional['outputs.GuardianPushAmazonSns'] = None, custom_app: Optional['outputs.GuardianPushCustomApp'] = None, direct_apns: Optional['outputs.GuardianPushDirectApns'] = None, direct_fcm: Optional['outputs.GuardianPushDirectFcm'] = None, provider: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if enabled is None: + raise TypeError("Missing 'enabled' argument") + if amazon_sns is None and 'amazonSns' in kwargs: + amazon_sns = kwargs['amazonSns'] + if custom_app is None and 'customApp' in kwargs: + custom_app = kwargs['customApp'] + if direct_apns is None and 'directApns' in kwargs: + direct_apns = kwargs['directApns'] + if direct_fcm is None and 'directFcm' in kwargs: + direct_fcm = kwargs['directFcm'] + _setter("enabled", enabled) if amazon_sns is not None: _setter("amazon_sns", amazon_sns) @@ -8031,12 +8743,34 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - aws_access_key_id: str, - aws_region: str, - aws_secret_access_key: str, - sns_apns_platform_application_arn: str, - sns_gcm_platform_application_arn: str, - opts: Optional[pulumi.ResourceOptions]=None): + aws_access_key_id: Optional[str] = None, + aws_region: Optional[str] = None, + aws_secret_access_key: Optional[str] = None, + sns_apns_platform_application_arn: Optional[str] = None, + sns_gcm_platform_application_arn: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if aws_access_key_id is None and 'awsAccessKeyId' in kwargs: + aws_access_key_id = kwargs['awsAccessKeyId'] + if aws_access_key_id is None: + raise TypeError("Missing 'aws_access_key_id' argument") + if aws_region is None and 'awsRegion' in kwargs: + aws_region = kwargs['awsRegion'] + if aws_region is None: + raise TypeError("Missing 'aws_region' argument") + if aws_secret_access_key is None and 'awsSecretAccessKey' in kwargs: + aws_secret_access_key = kwargs['awsSecretAccessKey'] + if aws_secret_access_key is None: + raise TypeError("Missing 'aws_secret_access_key' argument") + if sns_apns_platform_application_arn is None and 'snsApnsPlatformApplicationArn' in kwargs: + sns_apns_platform_application_arn = kwargs['snsApnsPlatformApplicationArn'] + if sns_apns_platform_application_arn is None: + raise TypeError("Missing 'sns_apns_platform_application_arn' argument") + if sns_gcm_platform_application_arn is None and 'snsGcmPlatformApplicationArn' in kwargs: + sns_gcm_platform_application_arn = kwargs['snsGcmPlatformApplicationArn'] + if sns_gcm_platform_application_arn is None: + raise TypeError("Missing 'sns_gcm_platform_application_arn' argument") + _setter("aws_access_key_id", aws_access_key_id) _setter("aws_region", aws_region) _setter("aws_secret_access_key", aws_secret_access_key) @@ -8128,7 +8862,15 @@ def _configure( app_name: Optional[str] = None, apple_app_link: Optional[str] = None, google_app_link: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if app_name is None and 'appName' in kwargs: + app_name = kwargs['appName'] + if apple_app_link is None and 'appleAppLink' in kwargs: + apple_app_link = kwargs['appleAppLink'] + if google_app_link is None and 'googleAppLink' in kwargs: + google_app_link = kwargs['googleAppLink'] + if app_name is not None: _setter("app_name", app_name) if apple_app_link is not None: @@ -8201,11 +8943,21 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - bundle_id: str, - p12: str, - sandbox: bool, + bundle_id: Optional[str] = None, + p12: Optional[str] = None, + sandbox: Optional[bool] = None, enabled: Optional[bool] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if bundle_id is None and 'bundleId' in kwargs: + bundle_id = kwargs['bundleId'] + if bundle_id is None: + raise TypeError("Missing 'bundle_id' argument") + if p12 is None: + raise TypeError("Missing 'p12' argument") + if sandbox is None: + raise TypeError("Missing 'sandbox' argument") + _setter("bundle_id", bundle_id) _setter("p12", p12) _setter("sandbox", sandbox) @@ -8276,8 +9028,14 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - server_key: str, - opts: Optional[pulumi.ResourceOptions]=None): + server_key: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if server_key is None and 'serverKey' in kwargs: + server_key = kwargs['serverKey'] + if server_key is None: + raise TypeError("Missing 'server_key' argument") + _setter("server_key", server_key) @property @@ -8328,10 +9086,18 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - enabled: bool, + enabled: Optional[bool] = None, override_relying_party: Optional[bool] = None, relying_party_identifier: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if enabled is None: + raise TypeError("Missing 'enabled' argument") + if override_relying_party is None and 'overrideRelyingParty' in kwargs: + override_relying_party = kwargs['overrideRelyingParty'] + if relying_party_identifier is None and 'relyingPartyIdentifier' in kwargs: + relying_party_identifier = kwargs['relyingPartyIdentifier'] + _setter("enabled", enabled) if override_relying_party is not None: _setter("override_relying_party", override_relying_party) @@ -8407,11 +9173,21 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - enabled: bool, + enabled: Optional[bool] = None, override_relying_party: Optional[bool] = None, relying_party_identifier: Optional[str] = None, user_verification: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if enabled is None: + raise TypeError("Missing 'enabled' argument") + if override_relying_party is None and 'overrideRelyingParty' in kwargs: + override_relying_party = kwargs['overrideRelyingParty'] + if relying_party_identifier is None and 'relyingPartyIdentifier' in kwargs: + relying_party_identifier = kwargs['relyingPartyIdentifier'] + if user_verification is None and 'userVerification' in kwargs: + user_verification = kwargs['userVerification'] + _setter("enabled", enabled) if override_relying_party is not None: _setter("override_relying_party", override_relying_party) @@ -8623,7 +9399,57 @@ def _configure( splunk_secure: Optional[bool] = None, splunk_token: Optional[str] = None, sumo_source_address: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if aws_account_id is None and 'awsAccountId' in kwargs: + aws_account_id = kwargs['awsAccountId'] + if aws_partner_event_source is None and 'awsPartnerEventSource' in kwargs: + aws_partner_event_source = kwargs['awsPartnerEventSource'] + if aws_region is None and 'awsRegion' in kwargs: + aws_region = kwargs['awsRegion'] + if azure_partner_topic is None and 'azurePartnerTopic' in kwargs: + azure_partner_topic = kwargs['azurePartnerTopic'] + if azure_region is None and 'azureRegion' in kwargs: + azure_region = kwargs['azureRegion'] + if azure_resource_group is None and 'azureResourceGroup' in kwargs: + azure_resource_group = kwargs['azureResourceGroup'] + if azure_subscription_id is None and 'azureSubscriptionId' in kwargs: + azure_subscription_id = kwargs['azureSubscriptionId'] + if datadog_api_key is None and 'datadogApiKey' in kwargs: + datadog_api_key = kwargs['datadogApiKey'] + if datadog_region is None and 'datadogRegion' in kwargs: + datadog_region = kwargs['datadogRegion'] + if http_authorization is None and 'httpAuthorization' in kwargs: + http_authorization = kwargs['httpAuthorization'] + if http_content_format is None and 'httpContentFormat' in kwargs: + http_content_format = kwargs['httpContentFormat'] + if http_content_type is None and 'httpContentType' in kwargs: + http_content_type = kwargs['httpContentType'] + if http_custom_headers is None and 'httpCustomHeaders' in kwargs: + http_custom_headers = kwargs['httpCustomHeaders'] + if http_endpoint is None and 'httpEndpoint' in kwargs: + http_endpoint = kwargs['httpEndpoint'] + if mixpanel_project_id is None and 'mixpanelProjectId' in kwargs: + mixpanel_project_id = kwargs['mixpanelProjectId'] + if mixpanel_region is None and 'mixpanelRegion' in kwargs: + mixpanel_region = kwargs['mixpanelRegion'] + if mixpanel_service_account_password is None and 'mixpanelServiceAccountPassword' in kwargs: + mixpanel_service_account_password = kwargs['mixpanelServiceAccountPassword'] + if mixpanel_service_account_username is None and 'mixpanelServiceAccountUsername' in kwargs: + mixpanel_service_account_username = kwargs['mixpanelServiceAccountUsername'] + if segment_write_key is None and 'segmentWriteKey' in kwargs: + segment_write_key = kwargs['segmentWriteKey'] + if splunk_domain is None and 'splunkDomain' in kwargs: + splunk_domain = kwargs['splunkDomain'] + if splunk_port is None and 'splunkPort' in kwargs: + splunk_port = kwargs['splunkPort'] + if splunk_secure is None and 'splunkSecure' in kwargs: + splunk_secure = kwargs['splunkSecure'] + if splunk_token is None and 'splunkToken' in kwargs: + splunk_token = kwargs['splunkToken'] + if sumo_source_address is None and 'sumoSourceAddress' in kwargs: + sumo_source_address = kwargs['sumoSourceAddress'] + if aws_account_id is not None: _setter("aws_account_id", aws_account_id) if aws_partner_event_source is not None: @@ -8902,7 +9728,11 @@ def _configure( _setter: Callable[[Any, Any], None], colors: Optional[Mapping[str, str]] = None, logo_url: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if logo_url is None and 'logoUrl' in kwargs: + logo_url = kwargs['logoUrl'] + if colors is not None: _setter("colors", colors) if logo_url is not None: @@ -8961,9 +9791,17 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - connection_id: str, + connection_id: Optional[str] = None, assign_membership_on_login: Optional[bool] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if connection_id is None and 'connectionId' in kwargs: + connection_id = kwargs['connectionId'] + if connection_id is None: + raise TypeError("Missing 'connection_id' argument") + if assign_membership_on_login is None and 'assignMembershipOnLogin' in kwargs: + assign_membership_on_login = kwargs['assignMembershipOnLogin'] + _setter("connection_id", connection_id) if assign_membership_on_login is not None: _setter("assign_membership_on_login", assign_membership_on_login) @@ -9002,9 +9840,15 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - enabled: bool, - html: str, - opts: Optional[pulumi.ResourceOptions]=None): + enabled: Optional[bool] = None, + html: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if enabled is None: + raise TypeError("Missing 'enabled' argument") + if html is None: + raise TypeError("Missing 'html' argument") + _setter("enabled", enabled) _setter("html", html) @@ -9062,10 +9906,16 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - show_log_link: bool, + show_log_link: Optional[bool] = None, html: Optional[str] = None, url: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if show_log_link is None and 'showLogLink' in kwargs: + show_log_link = kwargs['showLogLink'] + if show_log_link is None: + raise TypeError("Missing 'show_log_link' argument") + _setter("show_log_link", show_log_link) if html is not None: _setter("html", html) @@ -9114,9 +9964,15 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - enabled: bool, - html: str, - opts: Optional[pulumi.ResourceOptions]=None): + enabled: Optional[bool] = None, + html: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if enabled is None: + raise TypeError("Missing 'enabled' argument") + if html is None: + raise TypeError("Missing 'html' argument") + _setter("enabled", enabled) _setter("html", html) @@ -9154,9 +10010,15 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - enabled: bool, - html: str, - opts: Optional[pulumi.ResourceOptions]=None): + enabled: Optional[bool] = None, + html: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if enabled is None: + raise TypeError("Missing 'enabled' argument") + if html is None: + raise TypeError("Missing 'html' argument") + _setter("enabled", enabled) _setter("html", html) @@ -9194,9 +10056,13 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - name: str, + name: Optional[str] = None, description: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if name is None: + raise TypeError("Missing 'name' argument") + _setter("name", name) if description is not None: _setter("description", description) @@ -9260,11 +10126,21 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - name: str, - resource_server_identifier: str, + name: Optional[str] = None, + resource_server_identifier: Optional[str] = None, description: Optional[str] = None, resource_server_name: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if name is None: + raise TypeError("Missing 'name' argument") + if resource_server_identifier is None and 'resourceServerIdentifier' in kwargs: + resource_server_identifier = kwargs['resourceServerIdentifier'] + if resource_server_identifier is None: + raise TypeError("Missing 'resource_server_identifier' argument") + if resource_server_name is None and 'resourceServerName' in kwargs: + resource_server_name = kwargs['resourceServerName'] + _setter("name", name) _setter("resource_server_identifier", resource_server_identifier) if description is not None: @@ -9469,7 +10345,55 @@ def _configure( require_pushed_authorization_requests: Optional[bool] = None, revoke_refresh_token_grant: Optional[bool] = None, use_scope_descriptions_for_consent: Optional[bool] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if allow_legacy_delegation_grant_types is None and 'allowLegacyDelegationGrantTypes' in kwargs: + allow_legacy_delegation_grant_types = kwargs['allowLegacyDelegationGrantTypes'] + if allow_legacy_ro_grant_types is None and 'allowLegacyRoGrantTypes' in kwargs: + allow_legacy_ro_grant_types = kwargs['allowLegacyRoGrantTypes'] + if allow_legacy_tokeninfo_endpoint is None and 'allowLegacyTokeninfoEndpoint' in kwargs: + allow_legacy_tokeninfo_endpoint = kwargs['allowLegacyTokeninfoEndpoint'] + if dashboard_insights_view is None and 'dashboardInsightsView' in kwargs: + dashboard_insights_view = kwargs['dashboardInsightsView'] + if dashboard_log_streams_next is None and 'dashboardLogStreamsNext' in kwargs: + dashboard_log_streams_next = kwargs['dashboardLogStreamsNext'] + if disable_clickjack_protection_headers is None and 'disableClickjackProtectionHeaders' in kwargs: + disable_clickjack_protection_headers = kwargs['disableClickjackProtectionHeaders'] + if disable_fields_map_fix is None and 'disableFieldsMapFix' in kwargs: + disable_fields_map_fix = kwargs['disableFieldsMapFix'] + if disable_management_api_sms_obfuscation is None and 'disableManagementApiSmsObfuscation' in kwargs: + disable_management_api_sms_obfuscation = kwargs['disableManagementApiSmsObfuscation'] + if enable_adfs_waad_email_verification is None and 'enableAdfsWaadEmailVerification' in kwargs: + enable_adfs_waad_email_verification = kwargs['enableAdfsWaadEmailVerification'] + if enable_apis_section is None and 'enableApisSection' in kwargs: + enable_apis_section = kwargs['enableApisSection'] + if enable_client_connections is None and 'enableClientConnections' in kwargs: + enable_client_connections = kwargs['enableClientConnections'] + if enable_custom_domain_in_emails is None and 'enableCustomDomainInEmails' in kwargs: + enable_custom_domain_in_emails = kwargs['enableCustomDomainInEmails'] + if enable_dynamic_client_registration is None and 'enableDynamicClientRegistration' in kwargs: + enable_dynamic_client_registration = kwargs['enableDynamicClientRegistration'] + if enable_idtoken_api2 is None and 'enableIdtokenApi2' in kwargs: + enable_idtoken_api2 = kwargs['enableIdtokenApi2'] + if enable_legacy_logs_search_v2 is None and 'enableLegacyLogsSearchV2' in kwargs: + enable_legacy_logs_search_v2 = kwargs['enableLegacyLogsSearchV2'] + if enable_legacy_profile is None and 'enableLegacyProfile' in kwargs: + enable_legacy_profile = kwargs['enableLegacyProfile'] + if enable_pipeline2 is None and 'enablePipeline2' in kwargs: + enable_pipeline2 = kwargs['enablePipeline2'] + if enable_public_signup_user_exists_error is None and 'enablePublicSignupUserExistsError' in kwargs: + enable_public_signup_user_exists_error = kwargs['enablePublicSignupUserExistsError'] + if mfa_show_factor_list_on_enrollment is None and 'mfaShowFactorListOnEnrollment' in kwargs: + mfa_show_factor_list_on_enrollment = kwargs['mfaShowFactorListOnEnrollment'] + if no_disclose_enterprise_connections is None and 'noDiscloseEnterpriseConnections' in kwargs: + no_disclose_enterprise_connections = kwargs['noDiscloseEnterpriseConnections'] + if require_pushed_authorization_requests is None and 'requirePushedAuthorizationRequests' in kwargs: + require_pushed_authorization_requests = kwargs['requirePushedAuthorizationRequests'] + if revoke_refresh_token_grant is None and 'revokeRefreshTokenGrant' in kwargs: + revoke_refresh_token_grant = kwargs['revokeRefreshTokenGrant'] + if use_scope_descriptions_for_consent is None and 'useScopeDescriptionsForConsent' in kwargs: + use_scope_descriptions_for_consent = kwargs['useScopeDescriptionsForConsent'] + if allow_legacy_delegation_grant_types is not None: _setter("allow_legacy_delegation_grant_types", allow_legacy_delegation_grant_types) if allow_legacy_ro_grant_types is not None: @@ -9717,7 +10641,9 @@ def __init__(__self__, *, def _configure( _setter: Callable[[Any, Any], None], mode: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if mode is not None: _setter("mode", mode) @@ -9761,8 +10687,14 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - oidc_logout_prompt_enabled: bool, - opts: Optional[pulumi.ResourceOptions]=None): + oidc_logout_prompt_enabled: Optional[bool] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if oidc_logout_prompt_enabled is None and 'oidcLogoutPromptEnabled' in kwargs: + oidc_logout_prompt_enabled = kwargs['oidcLogoutPromptEnabled'] + if oidc_logout_prompt_enabled is None: + raise TypeError("Missing 'oidc_logout_prompt_enabled' argument") + _setter("oidc_logout_prompt_enabled", oidc_logout_prompt_enabled) @property @@ -9808,9 +10740,17 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - display_name: str, - id: str, - opts: Optional[pulumi.ResourceOptions]=None): + display_name: Optional[str] = None, + id: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if display_name is None and 'displayName' in kwargs: + display_name = kwargs['displayName'] + if display_name is None: + raise TypeError("Missing 'display_name' argument") + if id is None: + raise TypeError("Missing 'id' argument") + _setter("display_name", display_name) _setter("id", id) @@ -9873,11 +10813,21 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - name: str, - resource_server_identifier: str, + name: Optional[str] = None, + resource_server_identifier: Optional[str] = None, description: Optional[str] = None, resource_server_name: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if name is None: + raise TypeError("Missing 'name' argument") + if resource_server_identifier is None and 'resourceServerIdentifier' in kwargs: + resource_server_identifier = kwargs['resourceServerIdentifier'] + if resource_server_identifier is None: + raise TypeError("Missing 'resource_server_identifier' argument") + if resource_server_name is None and 'resourceServerName' in kwargs: + resource_server_name = kwargs['resourceServerName'] + _setter("name", name) _setter("resource_server_identifier", resource_server_identifier) if description is not None: @@ -9937,12 +10887,28 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - admin_notification_frequencies: Sequence[str], - enabled: bool, - method: str, - pre_user_registrations: Sequence['outputs.GetAttackProtectionBreachedPasswordDetectionPreUserRegistrationResult'], - shields: Sequence[str], - opts: Optional[pulumi.ResourceOptions]=None): + admin_notification_frequencies: Optional[Sequence[str]] = None, + enabled: Optional[bool] = None, + method: Optional[str] = None, + pre_user_registrations: Optional[Sequence['outputs.GetAttackProtectionBreachedPasswordDetectionPreUserRegistrationResult']] = None, + shields: Optional[Sequence[str]] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if admin_notification_frequencies is None and 'adminNotificationFrequencies' in kwargs: + admin_notification_frequencies = kwargs['adminNotificationFrequencies'] + if admin_notification_frequencies is None: + raise TypeError("Missing 'admin_notification_frequencies' argument") + if enabled is None: + raise TypeError("Missing 'enabled' argument") + if method is None: + raise TypeError("Missing 'method' argument") + if pre_user_registrations is None and 'preUserRegistrations' in kwargs: + pre_user_registrations = kwargs['preUserRegistrations'] + if pre_user_registrations is None: + raise TypeError("Missing 'pre_user_registrations' argument") + if shields is None: + raise TypeError("Missing 'shields' argument") + _setter("admin_notification_frequencies", admin_notification_frequencies) _setter("enabled", enabled) _setter("method", method) @@ -9986,8 +10952,12 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - shields: Sequence[str], - opts: Optional[pulumi.ResourceOptions]=None): + shields: Optional[Sequence[str]] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if shields is None: + raise TypeError("Missing 'shields' argument") + _setter("shields", shields) @property @@ -10015,12 +10985,26 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - allowlists: Sequence[str], - enabled: bool, - max_attempts: int, - mode: str, - shields: Sequence[str], - opts: Optional[pulumi.ResourceOptions]=None): + allowlists: Optional[Sequence[str]] = None, + enabled: Optional[bool] = None, + max_attempts: Optional[int] = None, + mode: Optional[str] = None, + shields: Optional[Sequence[str]] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if allowlists is None: + raise TypeError("Missing 'allowlists' argument") + if enabled is None: + raise TypeError("Missing 'enabled' argument") + if max_attempts is None and 'maxAttempts' in kwargs: + max_attempts = kwargs['maxAttempts'] + if max_attempts is None: + raise TypeError("Missing 'max_attempts' argument") + if mode is None: + raise TypeError("Missing 'mode' argument") + if shields is None: + raise TypeError("Missing 'shields' argument") + _setter("allowlists", allowlists) _setter("enabled", enabled) _setter("max_attempts", max_attempts) @@ -10072,12 +11056,28 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - allowlists: Sequence[str], - enabled: bool, - pre_logins: Sequence['outputs.GetAttackProtectionSuspiciousIpThrottlingPreLoginResult'], - pre_user_registrations: Sequence['outputs.GetAttackProtectionSuspiciousIpThrottlingPreUserRegistrationResult'], - shields: Sequence[str], - opts: Optional[pulumi.ResourceOptions]=None): + allowlists: Optional[Sequence[str]] = None, + enabled: Optional[bool] = None, + pre_logins: Optional[Sequence['outputs.GetAttackProtectionSuspiciousIpThrottlingPreLoginResult']] = None, + pre_user_registrations: Optional[Sequence['outputs.GetAttackProtectionSuspiciousIpThrottlingPreUserRegistrationResult']] = None, + shields: Optional[Sequence[str]] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if allowlists is None: + raise TypeError("Missing 'allowlists' argument") + if enabled is None: + raise TypeError("Missing 'enabled' argument") + if pre_logins is None and 'preLogins' in kwargs: + pre_logins = kwargs['preLogins'] + if pre_logins is None: + raise TypeError("Missing 'pre_logins' argument") + if pre_user_registrations is None and 'preUserRegistrations' in kwargs: + pre_user_registrations = kwargs['preUserRegistrations'] + if pre_user_registrations is None: + raise TypeError("Missing 'pre_user_registrations' argument") + if shields is None: + raise TypeError("Missing 'shields' argument") + _setter("allowlists", allowlists) _setter("enabled", enabled) _setter("pre_logins", pre_logins) @@ -10123,9 +11123,17 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - max_attempts: int, - rate: int, - opts: Optional[pulumi.ResourceOptions]=None): + max_attempts: Optional[int] = None, + rate: Optional[int] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if max_attempts is None and 'maxAttempts' in kwargs: + max_attempts = kwargs['maxAttempts'] + if max_attempts is None: + raise TypeError("Missing 'max_attempts' argument") + if rate is None: + raise TypeError("Missing 'rate' argument") + _setter("max_attempts", max_attempts) _setter("rate", rate) @@ -10153,9 +11161,17 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - max_attempts: int, - rate: int, - opts: Optional[pulumi.ResourceOptions]=None): + max_attempts: Optional[int] = None, + rate: Optional[int] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if max_attempts is None and 'maxAttempts' in kwargs: + max_attempts = kwargs['maxAttempts'] + if max_attempts is None: + raise TypeError("Missing 'max_attempts' argument") + if rate is None: + raise TypeError("Missing 'rate' argument") + _setter("max_attempts", max_attempts) _setter("rate", rate) @@ -10183,9 +11199,17 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - page_background: str, - primary: str, - opts: Optional[pulumi.ResourceOptions]=None): + page_background: Optional[str] = None, + primary: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if page_background is None and 'pageBackground' in kwargs: + page_background = kwargs['pageBackground'] + if page_background is None: + raise TypeError("Missing 'page_background' argument") + if primary is None: + raise TypeError("Missing 'primary' argument") + _setter("page_background", page_background) _setter("primary", primary) @@ -10211,8 +11235,12 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - url: str, - opts: Optional[pulumi.ResourceOptions]=None): + url: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if url is None: + raise TypeError("Missing 'url' argument") + _setter("url", url) @property @@ -10248,16 +11276,54 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - button_border_radius: float, - button_border_weight: float, - buttons_style: str, - input_border_radius: float, - input_border_weight: float, - inputs_style: str, - show_widget_shadow: bool, - widget_border_weight: float, - widget_corner_radius: float, - opts: Optional[pulumi.ResourceOptions]=None): + button_border_radius: Optional[float] = None, + button_border_weight: Optional[float] = None, + buttons_style: Optional[str] = None, + input_border_radius: Optional[float] = None, + input_border_weight: Optional[float] = None, + inputs_style: Optional[str] = None, + show_widget_shadow: Optional[bool] = None, + widget_border_weight: Optional[float] = None, + widget_corner_radius: Optional[float] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if button_border_radius is None and 'buttonBorderRadius' in kwargs: + button_border_radius = kwargs['buttonBorderRadius'] + if button_border_radius is None: + raise TypeError("Missing 'button_border_radius' argument") + if button_border_weight is None and 'buttonBorderWeight' in kwargs: + button_border_weight = kwargs['buttonBorderWeight'] + if button_border_weight is None: + raise TypeError("Missing 'button_border_weight' argument") + if buttons_style is None and 'buttonsStyle' in kwargs: + buttons_style = kwargs['buttonsStyle'] + if buttons_style is None: + raise TypeError("Missing 'buttons_style' argument") + if input_border_radius is None and 'inputBorderRadius' in kwargs: + input_border_radius = kwargs['inputBorderRadius'] + if input_border_radius is None: + raise TypeError("Missing 'input_border_radius' argument") + if input_border_weight is None and 'inputBorderWeight' in kwargs: + input_border_weight = kwargs['inputBorderWeight'] + if input_border_weight is None: + raise TypeError("Missing 'input_border_weight' argument") + if inputs_style is None and 'inputsStyle' in kwargs: + inputs_style = kwargs['inputsStyle'] + if inputs_style is None: + raise TypeError("Missing 'inputs_style' argument") + if show_widget_shadow is None and 'showWidgetShadow' in kwargs: + show_widget_shadow = kwargs['showWidgetShadow'] + if show_widget_shadow is None: + raise TypeError("Missing 'show_widget_shadow' argument") + if widget_border_weight is None and 'widgetBorderWeight' in kwargs: + widget_border_weight = kwargs['widgetBorderWeight'] + if widget_border_weight is None: + raise TypeError("Missing 'widget_border_weight' argument") + if widget_corner_radius is None and 'widgetCornerRadius' in kwargs: + widget_corner_radius = kwargs['widgetCornerRadius'] + if widget_corner_radius is None: + raise TypeError("Missing 'widget_corner_radius' argument") + _setter("button_border_radius", button_border_radius) _setter("button_border_weight", button_border_weight) _setter("buttons_style", buttons_style) @@ -10359,25 +11425,91 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - base_focus_color: str, - base_hover_color: str, - body_text: str, - error: str, - header: str, - icons: str, - input_background: str, - input_border: str, - input_filled_text: str, - input_labels_placeholders: str, - links_focused_components: str, - primary_button: str, - primary_button_label: str, - secondary_button_border: str, - secondary_button_label: str, - success: str, - widget_background: str, - widget_border: str, - opts: Optional[pulumi.ResourceOptions]=None): + base_focus_color: Optional[str] = None, + base_hover_color: Optional[str] = None, + body_text: Optional[str] = None, + error: Optional[str] = None, + header: Optional[str] = None, + icons: Optional[str] = None, + input_background: Optional[str] = None, + input_border: Optional[str] = None, + input_filled_text: Optional[str] = None, + input_labels_placeholders: Optional[str] = None, + links_focused_components: Optional[str] = None, + primary_button: Optional[str] = None, + primary_button_label: Optional[str] = None, + secondary_button_border: Optional[str] = None, + secondary_button_label: Optional[str] = None, + success: Optional[str] = None, + widget_background: Optional[str] = None, + widget_border: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if base_focus_color is None and 'baseFocusColor' in kwargs: + base_focus_color = kwargs['baseFocusColor'] + if base_focus_color is None: + raise TypeError("Missing 'base_focus_color' argument") + if base_hover_color is None and 'baseHoverColor' in kwargs: + base_hover_color = kwargs['baseHoverColor'] + if base_hover_color is None: + raise TypeError("Missing 'base_hover_color' argument") + if body_text is None and 'bodyText' in kwargs: + body_text = kwargs['bodyText'] + if body_text is None: + raise TypeError("Missing 'body_text' argument") + if error is None: + raise TypeError("Missing 'error' argument") + if header is None: + raise TypeError("Missing 'header' argument") + if icons is None: + raise TypeError("Missing 'icons' argument") + if input_background is None and 'inputBackground' in kwargs: + input_background = kwargs['inputBackground'] + if input_background is None: + raise TypeError("Missing 'input_background' argument") + if input_border is None and 'inputBorder' in kwargs: + input_border = kwargs['inputBorder'] + if input_border is None: + raise TypeError("Missing 'input_border' argument") + if input_filled_text is None and 'inputFilledText' in kwargs: + input_filled_text = kwargs['inputFilledText'] + if input_filled_text is None: + raise TypeError("Missing 'input_filled_text' argument") + if input_labels_placeholders is None and 'inputLabelsPlaceholders' in kwargs: + input_labels_placeholders = kwargs['inputLabelsPlaceholders'] + if input_labels_placeholders is None: + raise TypeError("Missing 'input_labels_placeholders' argument") + if links_focused_components is None and 'linksFocusedComponents' in kwargs: + links_focused_components = kwargs['linksFocusedComponents'] + if links_focused_components is None: + raise TypeError("Missing 'links_focused_components' argument") + if primary_button is None and 'primaryButton' in kwargs: + primary_button = kwargs['primaryButton'] + if primary_button is None: + raise TypeError("Missing 'primary_button' argument") + if primary_button_label is None and 'primaryButtonLabel' in kwargs: + primary_button_label = kwargs['primaryButtonLabel'] + if primary_button_label is None: + raise TypeError("Missing 'primary_button_label' argument") + if secondary_button_border is None and 'secondaryButtonBorder' in kwargs: + secondary_button_border = kwargs['secondaryButtonBorder'] + if secondary_button_border is None: + raise TypeError("Missing 'secondary_button_border' argument") + if secondary_button_label is None and 'secondaryButtonLabel' in kwargs: + secondary_button_label = kwargs['secondaryButtonLabel'] + if secondary_button_label is None: + raise TypeError("Missing 'secondary_button_label' argument") + if success is None: + raise TypeError("Missing 'success' argument") + if widget_background is None and 'widgetBackground' in kwargs: + widget_background = kwargs['widgetBackground'] + if widget_background is None: + raise TypeError("Missing 'widget_background' argument") + if widget_border is None and 'widgetBorder' in kwargs: + widget_border = kwargs['widgetBorder'] + if widget_border is None: + raise TypeError("Missing 'widget_border' argument") + _setter("base_focus_color", base_focus_color) _setter("base_hover_color", base_hover_color) _setter("body_text", body_text) @@ -10515,16 +11647,48 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - body_texts: Sequence['outputs.GetBrandingThemeFontBodyTextResult'], - buttons_texts: Sequence['outputs.GetBrandingThemeFontButtonsTextResult'], - font_url: str, - input_labels: Sequence['outputs.GetBrandingThemeFontInputLabelResult'], - links: Sequence['outputs.GetBrandingThemeFontLinkResult'], - links_style: str, - reference_text_size: float, - subtitles: Sequence['outputs.GetBrandingThemeFontSubtitleResult'], - titles: Sequence['outputs.GetBrandingThemeFontTitleResult'], - opts: Optional[pulumi.ResourceOptions]=None): + body_texts: Optional[Sequence['outputs.GetBrandingThemeFontBodyTextResult']] = None, + buttons_texts: Optional[Sequence['outputs.GetBrandingThemeFontButtonsTextResult']] = None, + font_url: Optional[str] = None, + input_labels: Optional[Sequence['outputs.GetBrandingThemeFontInputLabelResult']] = None, + links: Optional[Sequence['outputs.GetBrandingThemeFontLinkResult']] = None, + links_style: Optional[str] = None, + reference_text_size: Optional[float] = None, + subtitles: Optional[Sequence['outputs.GetBrandingThemeFontSubtitleResult']] = None, + titles: Optional[Sequence['outputs.GetBrandingThemeFontTitleResult']] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if body_texts is None and 'bodyTexts' in kwargs: + body_texts = kwargs['bodyTexts'] + if body_texts is None: + raise TypeError("Missing 'body_texts' argument") + if buttons_texts is None and 'buttonsTexts' in kwargs: + buttons_texts = kwargs['buttonsTexts'] + if buttons_texts is None: + raise TypeError("Missing 'buttons_texts' argument") + if font_url is None and 'fontUrl' in kwargs: + font_url = kwargs['fontUrl'] + if font_url is None: + raise TypeError("Missing 'font_url' argument") + if input_labels is None and 'inputLabels' in kwargs: + input_labels = kwargs['inputLabels'] + if input_labels is None: + raise TypeError("Missing 'input_labels' argument") + if links is None: + raise TypeError("Missing 'links' argument") + if links_style is None and 'linksStyle' in kwargs: + links_style = kwargs['linksStyle'] + if links_style is None: + raise TypeError("Missing 'links_style' argument") + if reference_text_size is None and 'referenceTextSize' in kwargs: + reference_text_size = kwargs['referenceTextSize'] + if reference_text_size is None: + raise TypeError("Missing 'reference_text_size' argument") + if subtitles is None: + raise TypeError("Missing 'subtitles' argument") + if titles is None: + raise TypeError("Missing 'titles' argument") + _setter("body_texts", body_texts) _setter("buttons_texts", buttons_texts) _setter("font_url", font_url) @@ -10594,9 +11758,15 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - bold: bool, - size: float, - opts: Optional[pulumi.ResourceOptions]=None): + bold: Optional[bool] = None, + size: Optional[float] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if bold is None: + raise TypeError("Missing 'bold' argument") + if size is None: + raise TypeError("Missing 'size' argument") + _setter("bold", bold) _setter("size", size) @@ -10624,9 +11794,15 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - bold: bool, - size: float, - opts: Optional[pulumi.ResourceOptions]=None): + bold: Optional[bool] = None, + size: Optional[float] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if bold is None: + raise TypeError("Missing 'bold' argument") + if size is None: + raise TypeError("Missing 'size' argument") + _setter("bold", bold) _setter("size", size) @@ -10654,9 +11830,15 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - bold: bool, - size: float, - opts: Optional[pulumi.ResourceOptions]=None): + bold: Optional[bool] = None, + size: Optional[float] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if bold is None: + raise TypeError("Missing 'bold' argument") + if size is None: + raise TypeError("Missing 'size' argument") + _setter("bold", bold) _setter("size", size) @@ -10684,9 +11866,15 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - bold: bool, - size: float, - opts: Optional[pulumi.ResourceOptions]=None): + bold: Optional[bool] = None, + size: Optional[float] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if bold is None: + raise TypeError("Missing 'bold' argument") + if size is None: + raise TypeError("Missing 'size' argument") + _setter("bold", bold) _setter("size", size) @@ -10714,9 +11902,15 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - bold: bool, - size: float, - opts: Optional[pulumi.ResourceOptions]=None): + bold: Optional[bool] = None, + size: Optional[float] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if bold is None: + raise TypeError("Missing 'bold' argument") + if size is None: + raise TypeError("Missing 'size' argument") + _setter("bold", bold) _setter("size", size) @@ -10744,9 +11938,15 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - bold: bool, - size: float, - opts: Optional[pulumi.ResourceOptions]=None): + bold: Optional[bool] = None, + size: Optional[float] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if bold is None: + raise TypeError("Missing 'bold' argument") + if size is None: + raise TypeError("Missing 'size' argument") + _setter("bold", bold) _setter("size", size) @@ -10776,10 +11976,24 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - background_color: str, - background_image_url: str, - page_layout: str, - opts: Optional[pulumi.ResourceOptions]=None): + background_color: Optional[str] = None, + background_image_url: Optional[str] = None, + page_layout: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if background_color is None and 'backgroundColor' in kwargs: + background_color = kwargs['backgroundColor'] + if background_color is None: + raise TypeError("Missing 'background_color' argument") + if background_image_url is None and 'backgroundImageUrl' in kwargs: + background_image_url = kwargs['backgroundImageUrl'] + if background_image_url is None: + raise TypeError("Missing 'background_image_url' argument") + if page_layout is None and 'pageLayout' in kwargs: + page_layout = kwargs['pageLayout'] + if page_layout is None: + raise TypeError("Missing 'page_layout' argument") + _setter("background_color", background_color) _setter("background_image_url", background_image_url) _setter("page_layout", page_layout) @@ -10819,12 +12033,34 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - header_text_alignment: str, - logo_height: float, - logo_position: str, - logo_url: str, - social_buttons_layout: str, - opts: Optional[pulumi.ResourceOptions]=None): + header_text_alignment: Optional[str] = None, + logo_height: Optional[float] = None, + logo_position: Optional[str] = None, + logo_url: Optional[str] = None, + social_buttons_layout: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if header_text_alignment is None and 'headerTextAlignment' in kwargs: + header_text_alignment = kwargs['headerTextAlignment'] + if header_text_alignment is None: + raise TypeError("Missing 'header_text_alignment' argument") + if logo_height is None and 'logoHeight' in kwargs: + logo_height = kwargs['logoHeight'] + if logo_height is None: + raise TypeError("Missing 'logo_height' argument") + if logo_position is None and 'logoPosition' in kwargs: + logo_position = kwargs['logoPosition'] + if logo_position is None: + raise TypeError("Missing 'logo_position' argument") + if logo_url is None and 'logoUrl' in kwargs: + logo_url = kwargs['logoUrl'] + if logo_url is None: + raise TypeError("Missing 'logo_url' argument") + if social_buttons_layout is None and 'socialButtonsLayout' in kwargs: + social_buttons_layout = kwargs['socialButtonsLayout'] + if social_buttons_layout is None: + raise TypeError("Missing 'social_buttons_layout' argument") + _setter("header_text_alignment", header_text_alignment) _setter("logo_height", logo_height) _setter("logo_position", logo_position) @@ -10868,8 +12104,12 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - body: str, - opts: Optional[pulumi.ResourceOptions]=None): + body: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if body is None: + raise TypeError("Missing 'body' argument") + _setter("body", body) @property @@ -10945,36 +12185,108 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - aws: Sequence['outputs.GetClientAddonAwResult'], - azure_blobs: Sequence['outputs.GetClientAddonAzureBlobResult'], - azure_sbs: Sequence['outputs.GetClientAddonAzureSbResult'], - boxes: Sequence['outputs.GetClientAddonBoxResult'], - cloudbees: Sequence['outputs.GetClientAddonCloudbeeResult'], - concurs: Sequence['outputs.GetClientAddonConcurResult'], - dropboxes: Sequence['outputs.GetClientAddonDropboxResult'], - echosigns: Sequence['outputs.GetClientAddonEchosignResult'], - egnytes: Sequence['outputs.GetClientAddonEgnyteResult'], - firebases: Sequence['outputs.GetClientAddonFirebaseResult'], - layers: Sequence['outputs.GetClientAddonLayerResult'], - mscrms: Sequence['outputs.GetClientAddonMscrmResult'], - newrelics: Sequence['outputs.GetClientAddonNewrelicResult'], - office365s: Sequence['outputs.GetClientAddonOffice365Result'], - rms: Sequence['outputs.GetClientAddonRmResult'], - salesforce_apis: Sequence['outputs.GetClientAddonSalesforceApiResult'], - salesforce_sandbox_apis: Sequence['outputs.GetClientAddonSalesforceSandboxApiResult'], - salesforces: Sequence['outputs.GetClientAddonSalesforceResult'], - samlps: Sequence['outputs.GetClientAddonSamlpResult'], - sap_apis: Sequence['outputs.GetClientAddonSapApiResult'], - sentries: Sequence['outputs.GetClientAddonSentryResult'], - sharepoints: Sequence['outputs.GetClientAddonSharepointResult'], - slacks: Sequence['outputs.GetClientAddonSlackResult'], - springcms: Sequence['outputs.GetClientAddonSpringcmResult'], - sso_integrations: Sequence['outputs.GetClientAddonSsoIntegrationResult'], - wams: Sequence['outputs.GetClientAddonWamResult'], - wsfeds: Sequence['outputs.GetClientAddonWsfedResult'], - zendesks: Sequence['outputs.GetClientAddonZendeskResult'], - zooms: Sequence['outputs.GetClientAddonZoomResult'], - opts: Optional[pulumi.ResourceOptions]=None): + aws: Optional[Sequence['outputs.GetClientAddonAwResult']] = None, + azure_blobs: Optional[Sequence['outputs.GetClientAddonAzureBlobResult']] = None, + azure_sbs: Optional[Sequence['outputs.GetClientAddonAzureSbResult']] = None, + boxes: Optional[Sequence['outputs.GetClientAddonBoxResult']] = None, + cloudbees: Optional[Sequence['outputs.GetClientAddonCloudbeeResult']] = None, + concurs: Optional[Sequence['outputs.GetClientAddonConcurResult']] = None, + dropboxes: Optional[Sequence['outputs.GetClientAddonDropboxResult']] = None, + echosigns: Optional[Sequence['outputs.GetClientAddonEchosignResult']] = None, + egnytes: Optional[Sequence['outputs.GetClientAddonEgnyteResult']] = None, + firebases: Optional[Sequence['outputs.GetClientAddonFirebaseResult']] = None, + layers: Optional[Sequence['outputs.GetClientAddonLayerResult']] = None, + mscrms: Optional[Sequence['outputs.GetClientAddonMscrmResult']] = None, + newrelics: Optional[Sequence['outputs.GetClientAddonNewrelicResult']] = None, + office365s: Optional[Sequence['outputs.GetClientAddonOffice365Result']] = None, + rms: Optional[Sequence['outputs.GetClientAddonRmResult']] = None, + salesforce_apis: Optional[Sequence['outputs.GetClientAddonSalesforceApiResult']] = None, + salesforce_sandbox_apis: Optional[Sequence['outputs.GetClientAddonSalesforceSandboxApiResult']] = None, + salesforces: Optional[Sequence['outputs.GetClientAddonSalesforceResult']] = None, + samlps: Optional[Sequence['outputs.GetClientAddonSamlpResult']] = None, + sap_apis: Optional[Sequence['outputs.GetClientAddonSapApiResult']] = None, + sentries: Optional[Sequence['outputs.GetClientAddonSentryResult']] = None, + sharepoints: Optional[Sequence['outputs.GetClientAddonSharepointResult']] = None, + slacks: Optional[Sequence['outputs.GetClientAddonSlackResult']] = None, + springcms: Optional[Sequence['outputs.GetClientAddonSpringcmResult']] = None, + sso_integrations: Optional[Sequence['outputs.GetClientAddonSsoIntegrationResult']] = None, + wams: Optional[Sequence['outputs.GetClientAddonWamResult']] = None, + wsfeds: Optional[Sequence['outputs.GetClientAddonWsfedResult']] = None, + zendesks: Optional[Sequence['outputs.GetClientAddonZendeskResult']] = None, + zooms: Optional[Sequence['outputs.GetClientAddonZoomResult']] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if aws is None: + raise TypeError("Missing 'aws' argument") + if azure_blobs is None and 'azureBlobs' in kwargs: + azure_blobs = kwargs['azureBlobs'] + if azure_blobs is None: + raise TypeError("Missing 'azure_blobs' argument") + if azure_sbs is None and 'azureSbs' in kwargs: + azure_sbs = kwargs['azureSbs'] + if azure_sbs is None: + raise TypeError("Missing 'azure_sbs' argument") + if boxes is None: + raise TypeError("Missing 'boxes' argument") + if cloudbees is None: + raise TypeError("Missing 'cloudbees' argument") + if concurs is None: + raise TypeError("Missing 'concurs' argument") + if dropboxes is None: + raise TypeError("Missing 'dropboxes' argument") + if echosigns is None: + raise TypeError("Missing 'echosigns' argument") + if egnytes is None: + raise TypeError("Missing 'egnytes' argument") + if firebases is None: + raise TypeError("Missing 'firebases' argument") + if layers is None: + raise TypeError("Missing 'layers' argument") + if mscrms is None: + raise TypeError("Missing 'mscrms' argument") + if newrelics is None: + raise TypeError("Missing 'newrelics' argument") + if office365s is None: + raise TypeError("Missing 'office365s' argument") + if rms is None: + raise TypeError("Missing 'rms' argument") + if salesforce_apis is None and 'salesforceApis' in kwargs: + salesforce_apis = kwargs['salesforceApis'] + if salesforce_apis is None: + raise TypeError("Missing 'salesforce_apis' argument") + if salesforce_sandbox_apis is None and 'salesforceSandboxApis' in kwargs: + salesforce_sandbox_apis = kwargs['salesforceSandboxApis'] + if salesforce_sandbox_apis is None: + raise TypeError("Missing 'salesforce_sandbox_apis' argument") + if salesforces is None: + raise TypeError("Missing 'salesforces' argument") + if samlps is None: + raise TypeError("Missing 'samlps' argument") + if sap_apis is None and 'sapApis' in kwargs: + sap_apis = kwargs['sapApis'] + if sap_apis is None: + raise TypeError("Missing 'sap_apis' argument") + if sentries is None: + raise TypeError("Missing 'sentries' argument") + if sharepoints is None: + raise TypeError("Missing 'sharepoints' argument") + if slacks is None: + raise TypeError("Missing 'slacks' argument") + if springcms is None: + raise TypeError("Missing 'springcms' argument") + if sso_integrations is None and 'ssoIntegrations' in kwargs: + sso_integrations = kwargs['ssoIntegrations'] + if sso_integrations is None: + raise TypeError("Missing 'sso_integrations' argument") + if wams is None: + raise TypeError("Missing 'wams' argument") + if wsfeds is None: + raise TypeError("Missing 'wsfeds' argument") + if zendesks is None: + raise TypeError("Missing 'zendesks' argument") + if zooms is None: + raise TypeError("Missing 'zooms' argument") + _setter("aws", aws) _setter("azure_blobs", azure_blobs) _setter("azure_sbs", azure_sbs) @@ -11166,10 +12478,20 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - lifetime_in_seconds: int, - principal: str, - role: str, - opts: Optional[pulumi.ResourceOptions]=None): + lifetime_in_seconds: Optional[int] = None, + principal: Optional[str] = None, + role: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if lifetime_in_seconds is None and 'lifetimeInSeconds' in kwargs: + lifetime_in_seconds = kwargs['lifetimeInSeconds'] + if lifetime_in_seconds is None: + raise TypeError("Missing 'lifetime_in_seconds' argument") + if principal is None: + raise TypeError("Missing 'principal' argument") + if role is None: + raise TypeError("Missing 'role' argument") + _setter("lifetime_in_seconds", lifetime_in_seconds) _setter("principal", principal) _setter("role", role) @@ -11225,20 +12547,72 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - account_name: str, - blob_delete: bool, - blob_name: str, - blob_read: bool, - blob_write: bool, - container_delete: bool, - container_list: bool, - container_name: str, - container_read: bool, - container_write: bool, - expiration: int, - signed_identifier: str, - storage_access_key: str, - opts: Optional[pulumi.ResourceOptions]=None): + account_name: Optional[str] = None, + blob_delete: Optional[bool] = None, + blob_name: Optional[str] = None, + blob_read: Optional[bool] = None, + blob_write: Optional[bool] = None, + container_delete: Optional[bool] = None, + container_list: Optional[bool] = None, + container_name: Optional[str] = None, + container_read: Optional[bool] = None, + container_write: Optional[bool] = None, + expiration: Optional[int] = None, + signed_identifier: Optional[str] = None, + storage_access_key: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if account_name is None and 'accountName' in kwargs: + account_name = kwargs['accountName'] + if account_name is None: + raise TypeError("Missing 'account_name' argument") + if blob_delete is None and 'blobDelete' in kwargs: + blob_delete = kwargs['blobDelete'] + if blob_delete is None: + raise TypeError("Missing 'blob_delete' argument") + if blob_name is None and 'blobName' in kwargs: + blob_name = kwargs['blobName'] + if blob_name is None: + raise TypeError("Missing 'blob_name' argument") + if blob_read is None and 'blobRead' in kwargs: + blob_read = kwargs['blobRead'] + if blob_read is None: + raise TypeError("Missing 'blob_read' argument") + if blob_write is None and 'blobWrite' in kwargs: + blob_write = kwargs['blobWrite'] + if blob_write is None: + raise TypeError("Missing 'blob_write' argument") + if container_delete is None and 'containerDelete' in kwargs: + container_delete = kwargs['containerDelete'] + if container_delete is None: + raise TypeError("Missing 'container_delete' argument") + if container_list is None and 'containerList' in kwargs: + container_list = kwargs['containerList'] + if container_list is None: + raise TypeError("Missing 'container_list' argument") + if container_name is None and 'containerName' in kwargs: + container_name = kwargs['containerName'] + if container_name is None: + raise TypeError("Missing 'container_name' argument") + if container_read is None and 'containerRead' in kwargs: + container_read = kwargs['containerRead'] + if container_read is None: + raise TypeError("Missing 'container_read' argument") + if container_write is None and 'containerWrite' in kwargs: + container_write = kwargs['containerWrite'] + if container_write is None: + raise TypeError("Missing 'container_write' argument") + if expiration is None: + raise TypeError("Missing 'expiration' argument") + if signed_identifier is None and 'signedIdentifier' in kwargs: + signed_identifier = kwargs['signedIdentifier'] + if signed_identifier is None: + raise TypeError("Missing 'signed_identifier' argument") + if storage_access_key is None and 'storageAccessKey' in kwargs: + storage_access_key = kwargs['storageAccessKey'] + if storage_access_key is None: + raise TypeError("Missing 'storage_access_key' argument") + _setter("account_name", account_name) _setter("blob_delete", blob_delete) _setter("blob_name", blob_name) @@ -11338,12 +12712,30 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - entity_path: str, - expiration: int, - namespace: str, - sas_key: str, - sas_key_name: str, - opts: Optional[pulumi.ResourceOptions]=None): + entity_path: Optional[str] = None, + expiration: Optional[int] = None, + namespace: Optional[str] = None, + sas_key: Optional[str] = None, + sas_key_name: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if entity_path is None and 'entityPath' in kwargs: + entity_path = kwargs['entityPath'] + if entity_path is None: + raise TypeError("Missing 'entity_path' argument") + if expiration is None: + raise TypeError("Missing 'expiration' argument") + if namespace is None: + raise TypeError("Missing 'namespace' argument") + if sas_key is None and 'sasKey' in kwargs: + sas_key = kwargs['sasKey'] + if sas_key is None: + raise TypeError("Missing 'sas_key' argument") + if sas_key_name is None and 'sasKeyName' in kwargs: + sas_key_name = kwargs['sasKeyName'] + if sas_key_name is None: + raise TypeError("Missing 'sas_key_name' argument") + _setter("entity_path", entity_path) _setter("expiration", expiration) _setter("namespace", namespace) @@ -11383,10 +12775,12 @@ def __init__(__self__): @staticmethod def _configure( _setter: Callable[[Any, Any], None], - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): pass + @pulumi.output_type class GetClientAddonCloudbeeResult(dict): def __init__(__self__): @@ -11394,10 +12788,12 @@ def __init__(__self__): @staticmethod def _configure( _setter: Callable[[Any, Any], None], - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): pass + @pulumi.output_type class GetClientAddonConcurResult(dict): def __init__(__self__): @@ -11405,10 +12801,12 @@ def __init__(__self__): @staticmethod def _configure( _setter: Callable[[Any, Any], None], - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): pass + @pulumi.output_type class GetClientAddonDropboxResult(dict): def __init__(__self__): @@ -11416,10 +12814,12 @@ def __init__(__self__): @staticmethod def _configure( _setter: Callable[[Any, Any], None], - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): pass + @pulumi.output_type class GetClientAddonEchosignResult(dict): def __init__(__self__, *, @@ -11431,8 +12831,12 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - domain: str, - opts: Optional[pulumi.ResourceOptions]=None): + domain: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if domain is None: + raise TypeError("Missing 'domain' argument") + _setter("domain", domain) @property @@ -11452,9 +12856,13 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - domain: str, - opts: Optional[pulumi.ResourceOptions]=None): - _setter("domain", domain) + domain: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if domain is None: + raise TypeError("Missing 'domain' argument") + + _setter("domain", domain) @property @pulumi.getter @@ -11481,12 +12889,32 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - client_email: str, - lifetime_in_seconds: int, - private_key: str, - private_key_id: str, - secret: str, - opts: Optional[pulumi.ResourceOptions]=None): + client_email: Optional[str] = None, + lifetime_in_seconds: Optional[int] = None, + private_key: Optional[str] = None, + private_key_id: Optional[str] = None, + secret: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if client_email is None and 'clientEmail' in kwargs: + client_email = kwargs['clientEmail'] + if client_email is None: + raise TypeError("Missing 'client_email' argument") + if lifetime_in_seconds is None and 'lifetimeInSeconds' in kwargs: + lifetime_in_seconds = kwargs['lifetimeInSeconds'] + if lifetime_in_seconds is None: + raise TypeError("Missing 'lifetime_in_seconds' argument") + if private_key is None and 'privateKey' in kwargs: + private_key = kwargs['privateKey'] + if private_key is None: + raise TypeError("Missing 'private_key' argument") + if private_key_id is None and 'privateKeyId' in kwargs: + private_key_id = kwargs['privateKeyId'] + if private_key_id is None: + raise TypeError("Missing 'private_key_id' argument") + if secret is None: + raise TypeError("Missing 'secret' argument") + _setter("client_email", client_email) _setter("lifetime_in_seconds", lifetime_in_seconds) _setter("private_key", private_key) @@ -11538,12 +12966,30 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - expiration: int, - key_id: str, - principal: str, - private_key: str, - provider_id: str, - opts: Optional[pulumi.ResourceOptions]=None): + expiration: Optional[int] = None, + key_id: Optional[str] = None, + principal: Optional[str] = None, + private_key: Optional[str] = None, + provider_id: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if expiration is None: + raise TypeError("Missing 'expiration' argument") + if key_id is None and 'keyId' in kwargs: + key_id = kwargs['keyId'] + if key_id is None: + raise TypeError("Missing 'key_id' argument") + if principal is None: + raise TypeError("Missing 'principal' argument") + if private_key is None and 'privateKey' in kwargs: + private_key = kwargs['privateKey'] + if private_key is None: + raise TypeError("Missing 'private_key' argument") + if provider_id is None and 'providerId' in kwargs: + provider_id = kwargs['providerId'] + if provider_id is None: + raise TypeError("Missing 'provider_id' argument") + _setter("expiration", expiration) _setter("key_id", key_id) _setter("principal", principal) @@ -11587,8 +13033,12 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - url: str, - opts: Optional[pulumi.ResourceOptions]=None): + url: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if url is None: + raise TypeError("Missing 'url' argument") + _setter("url", url) @property @@ -11608,8 +13058,12 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - account: str, - opts: Optional[pulumi.ResourceOptions]=None): + account: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if account is None: + raise TypeError("Missing 'account' argument") + _setter("account", account) @property @@ -11631,9 +13085,15 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - connection: str, - domain: str, - opts: Optional[pulumi.ResourceOptions]=None): + connection: Optional[str] = None, + domain: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if connection is None: + raise TypeError("Missing 'connection' argument") + if domain is None: + raise TypeError("Missing 'domain' argument") + _setter("connection", connection) _setter("domain", domain) @@ -11659,8 +13119,12 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - url: str, - opts: Optional[pulumi.ResourceOptions]=None): + url: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if url is None: + raise TypeError("Missing 'url' argument") + _setter("url", url) @property @@ -11680,8 +13144,14 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - entity_id: str, - opts: Optional[pulumi.ResourceOptions]=None): + entity_id: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if entity_id is None and 'entityId' in kwargs: + entity_id = kwargs['entityId'] + if entity_id is None: + raise TypeError("Missing 'entity_id' argument") + _setter("entity_id", entity_id) @property @@ -11707,11 +13177,27 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - client_id: str, - community_name: str, - community_url_section: str, - principal: str, - opts: Optional[pulumi.ResourceOptions]=None): + client_id: Optional[str] = None, + community_name: Optional[str] = None, + community_url_section: Optional[str] = None, + principal: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if client_id is None and 'clientId' in kwargs: + client_id = kwargs['clientId'] + if client_id is None: + raise TypeError("Missing 'client_id' argument") + if community_name is None and 'communityName' in kwargs: + community_name = kwargs['communityName'] + if community_name is None: + raise TypeError("Missing 'community_name' argument") + if community_url_section is None and 'communityUrlSection' in kwargs: + community_url_section = kwargs['communityUrlSection'] + if community_url_section is None: + raise TypeError("Missing 'community_url_section' argument") + if principal is None: + raise TypeError("Missing 'principal' argument") + _setter("client_id", client_id) _setter("community_name", community_name) _setter("community_url_section", community_url_section) @@ -11755,11 +13241,27 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - client_id: str, - community_name: str, - community_url_section: str, - principal: str, - opts: Optional[pulumi.ResourceOptions]=None): + client_id: Optional[str] = None, + community_name: Optional[str] = None, + community_url_section: Optional[str] = None, + principal: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if client_id is None and 'clientId' in kwargs: + client_id = kwargs['clientId'] + if client_id is None: + raise TypeError("Missing 'client_id' argument") + if community_name is None and 'communityName' in kwargs: + community_name = kwargs['communityName'] + if community_name is None: + raise TypeError("Missing 'community_name' argument") + if community_url_section is None and 'communityUrlSection' in kwargs: + community_url_section = kwargs['communityUrlSection'] + if community_url_section is None: + raise TypeError("Missing 'community_url_section' argument") + if principal is None: + raise TypeError("Missing 'principal' argument") + _setter("client_id", client_id) _setter("community_name", community_name) _setter("community_url_section", community_url_section) @@ -11837,28 +13339,100 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - audience: str, - authn_context_class_ref: str, - binding: str, - create_upn_claim: bool, - destination: str, - digest_algorithm: str, - include_attribute_name_format: bool, - issuer: str, - lifetime_in_seconds: int, - logouts: Sequence['outputs.GetClientAddonSamlpLogoutResult'], - map_identities: bool, - map_unknown_claims_as_is: bool, - mappings: Mapping[str, Any], - name_identifier_format: str, - name_identifier_probes: Sequence[str], - passthrough_claims_with_no_mapping: bool, - recipient: str, - sign_response: bool, - signature_algorithm: str, - signing_cert: str, - typed_attributes: bool, - opts: Optional[pulumi.ResourceOptions]=None): + audience: Optional[str] = None, + authn_context_class_ref: Optional[str] = None, + binding: Optional[str] = None, + create_upn_claim: Optional[bool] = None, + destination: Optional[str] = None, + digest_algorithm: Optional[str] = None, + include_attribute_name_format: Optional[bool] = None, + issuer: Optional[str] = None, + lifetime_in_seconds: Optional[int] = None, + logouts: Optional[Sequence['outputs.GetClientAddonSamlpLogoutResult']] = None, + map_identities: Optional[bool] = None, + map_unknown_claims_as_is: Optional[bool] = None, + mappings: Optional[Mapping[str, Any]] = None, + name_identifier_format: Optional[str] = None, + name_identifier_probes: Optional[Sequence[str]] = None, + passthrough_claims_with_no_mapping: Optional[bool] = None, + recipient: Optional[str] = None, + sign_response: Optional[bool] = None, + signature_algorithm: Optional[str] = None, + signing_cert: Optional[str] = None, + typed_attributes: Optional[bool] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if audience is None: + raise TypeError("Missing 'audience' argument") + if authn_context_class_ref is None and 'authnContextClassRef' in kwargs: + authn_context_class_ref = kwargs['authnContextClassRef'] + if authn_context_class_ref is None: + raise TypeError("Missing 'authn_context_class_ref' argument") + if binding is None: + raise TypeError("Missing 'binding' argument") + if create_upn_claim is None and 'createUpnClaim' in kwargs: + create_upn_claim = kwargs['createUpnClaim'] + if create_upn_claim is None: + raise TypeError("Missing 'create_upn_claim' argument") + if destination is None: + raise TypeError("Missing 'destination' argument") + if digest_algorithm is None and 'digestAlgorithm' in kwargs: + digest_algorithm = kwargs['digestAlgorithm'] + if digest_algorithm is None: + raise TypeError("Missing 'digest_algorithm' argument") + if include_attribute_name_format is None and 'includeAttributeNameFormat' in kwargs: + include_attribute_name_format = kwargs['includeAttributeNameFormat'] + if include_attribute_name_format is None: + raise TypeError("Missing 'include_attribute_name_format' argument") + if issuer is None: + raise TypeError("Missing 'issuer' argument") + if lifetime_in_seconds is None and 'lifetimeInSeconds' in kwargs: + lifetime_in_seconds = kwargs['lifetimeInSeconds'] + if lifetime_in_seconds is None: + raise TypeError("Missing 'lifetime_in_seconds' argument") + if logouts is None: + raise TypeError("Missing 'logouts' argument") + if map_identities is None and 'mapIdentities' in kwargs: + map_identities = kwargs['mapIdentities'] + if map_identities is None: + raise TypeError("Missing 'map_identities' argument") + if map_unknown_claims_as_is is None and 'mapUnknownClaimsAsIs' in kwargs: + map_unknown_claims_as_is = kwargs['mapUnknownClaimsAsIs'] + if map_unknown_claims_as_is is None: + raise TypeError("Missing 'map_unknown_claims_as_is' argument") + if mappings is None: + raise TypeError("Missing 'mappings' argument") + if name_identifier_format is None and 'nameIdentifierFormat' in kwargs: + name_identifier_format = kwargs['nameIdentifierFormat'] + if name_identifier_format is None: + raise TypeError("Missing 'name_identifier_format' argument") + if name_identifier_probes is None and 'nameIdentifierProbes' in kwargs: + name_identifier_probes = kwargs['nameIdentifierProbes'] + if name_identifier_probes is None: + raise TypeError("Missing 'name_identifier_probes' argument") + if passthrough_claims_with_no_mapping is None and 'passthroughClaimsWithNoMapping' in kwargs: + passthrough_claims_with_no_mapping = kwargs['passthroughClaimsWithNoMapping'] + if passthrough_claims_with_no_mapping is None: + raise TypeError("Missing 'passthrough_claims_with_no_mapping' argument") + if recipient is None: + raise TypeError("Missing 'recipient' argument") + if sign_response is None and 'signResponse' in kwargs: + sign_response = kwargs['signResponse'] + if sign_response is None: + raise TypeError("Missing 'sign_response' argument") + if signature_algorithm is None and 'signatureAlgorithm' in kwargs: + signature_algorithm = kwargs['signatureAlgorithm'] + if signature_algorithm is None: + raise TypeError("Missing 'signature_algorithm' argument") + if signing_cert is None and 'signingCert' in kwargs: + signing_cert = kwargs['signingCert'] + if signing_cert is None: + raise TypeError("Missing 'signing_cert' argument") + if typed_attributes is None and 'typedAttributes' in kwargs: + typed_attributes = kwargs['typedAttributes'] + if typed_attributes is None: + raise TypeError("Missing 'typed_attributes' argument") + _setter("audience", audience) _setter("authn_context_class_ref", authn_context_class_ref) _setter("binding", binding) @@ -12000,9 +13574,17 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - callback: str, - slo_enabled: bool, - opts: Optional[pulumi.ResourceOptions]=None): + callback: Optional[str] = None, + slo_enabled: Optional[bool] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if callback is None: + raise TypeError("Missing 'callback' argument") + if slo_enabled is None and 'sloEnabled' in kwargs: + slo_enabled = kwargs['sloEnabled'] + if slo_enabled is None: + raise TypeError("Missing 'slo_enabled' argument") + _setter("callback", callback) _setter("slo_enabled", slo_enabled) @@ -12038,13 +13620,37 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - client_id: str, - name_identifier_format: str, - scope: str, - service_password: str, - token_endpoint_url: str, - username_attribute: str, - opts: Optional[pulumi.ResourceOptions]=None): + client_id: Optional[str] = None, + name_identifier_format: Optional[str] = None, + scope: Optional[str] = None, + service_password: Optional[str] = None, + token_endpoint_url: Optional[str] = None, + username_attribute: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if client_id is None and 'clientId' in kwargs: + client_id = kwargs['clientId'] + if client_id is None: + raise TypeError("Missing 'client_id' argument") + if name_identifier_format is None and 'nameIdentifierFormat' in kwargs: + name_identifier_format = kwargs['nameIdentifierFormat'] + if name_identifier_format is None: + raise TypeError("Missing 'name_identifier_format' argument") + if scope is None: + raise TypeError("Missing 'scope' argument") + if service_password is None and 'servicePassword' in kwargs: + service_password = kwargs['servicePassword'] + if service_password is None: + raise TypeError("Missing 'service_password' argument") + if token_endpoint_url is None and 'tokenEndpointUrl' in kwargs: + token_endpoint_url = kwargs['tokenEndpointUrl'] + if token_endpoint_url is None: + raise TypeError("Missing 'token_endpoint_url' argument") + if username_attribute is None and 'usernameAttribute' in kwargs: + username_attribute = kwargs['usernameAttribute'] + if username_attribute is None: + raise TypeError("Missing 'username_attribute' argument") + _setter("client_id", client_id) _setter("name_identifier_format", name_identifier_format) _setter("scope", scope) @@ -12096,9 +13702,19 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - base_url: str, - org_slug: str, - opts: Optional[pulumi.ResourceOptions]=None): + base_url: Optional[str] = None, + org_slug: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if base_url is None and 'baseUrl' in kwargs: + base_url = kwargs['baseUrl'] + if base_url is None: + raise TypeError("Missing 'base_url' argument") + if org_slug is None and 'orgSlug' in kwargs: + org_slug = kwargs['orgSlug'] + if org_slug is None: + raise TypeError("Missing 'org_slug' argument") + _setter("base_url", base_url) _setter("org_slug", org_slug) @@ -12126,9 +13742,17 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - external_urls: Sequence[str], - url: str, - opts: Optional[pulumi.ResourceOptions]=None): + external_urls: Optional[Sequence[str]] = None, + url: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if external_urls is None and 'externalUrls' in kwargs: + external_urls = kwargs['externalUrls'] + if external_urls is None: + raise TypeError("Missing 'external_urls' argument") + if url is None: + raise TypeError("Missing 'url' argument") + _setter("external_urls", external_urls) _setter("url", url) @@ -12154,8 +13778,12 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - team: str, - opts: Optional[pulumi.ResourceOptions]=None): + team: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if team is None: + raise TypeError("Missing 'team' argument") + _setter("team", team) @property @@ -12175,8 +13803,14 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - acs_url: str, - opts: Optional[pulumi.ResourceOptions]=None): + acs_url: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if acs_url is None and 'acsUrl' in kwargs: + acs_url = kwargs['acsUrl'] + if acs_url is None: + raise TypeError("Missing 'acs_url' argument") + _setter("acs_url", acs_url) @property @@ -12198,9 +13832,15 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - name: str, - version: str, - opts: Optional[pulumi.ResourceOptions]=None): + name: Optional[str] = None, + version: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if name is None: + raise TypeError("Missing 'name' argument") + if version is None: + raise TypeError("Missing 'version' argument") + _setter("name", name) _setter("version", version) @@ -12226,8 +13866,14 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - master_key: str, - opts: Optional[pulumi.ResourceOptions]=None): + master_key: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if master_key is None and 'masterKey' in kwargs: + master_key = kwargs['masterKey'] + if master_key is None: + raise TypeError("Missing 'master_key' argument") + _setter("master_key", master_key) @property @@ -12243,10 +13889,12 @@ def __init__(__self__): @staticmethod def _configure( _setter: Callable[[Any, Any], None], - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): pass + @pulumi.output_type class GetClientAddonZendeskResult(dict): def __init__(__self__, *, @@ -12258,8 +13906,14 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - account_name: str, - opts: Optional[pulumi.ResourceOptions]=None): + account_name: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if account_name is None and 'accountName' in kwargs: + account_name = kwargs['accountName'] + if account_name is None: + raise TypeError("Missing 'account_name' argument") + _setter("account_name", account_name) @property @@ -12279,8 +13933,12 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - account: str, - opts: Optional[pulumi.ResourceOptions]=None): + account: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if account is None: + raise TypeError("Missing 'account' argument") + _setter("account", account) @property @@ -12306,11 +13964,25 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - alg: str, - lifetime_in_seconds: int, - scopes: Mapping[str, str], - secret_encoded: bool, - opts: Optional[pulumi.ResourceOptions]=None): + alg: Optional[str] = None, + lifetime_in_seconds: Optional[int] = None, + scopes: Optional[Mapping[str, str]] = None, + secret_encoded: Optional[bool] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if alg is None: + raise TypeError("Missing 'alg' argument") + if lifetime_in_seconds is None and 'lifetimeInSeconds' in kwargs: + lifetime_in_seconds = kwargs['lifetimeInSeconds'] + if lifetime_in_seconds is None: + raise TypeError("Missing 'lifetime_in_seconds' argument") + if scopes is None: + raise TypeError("Missing 'scopes' argument") + if secret_encoded is None and 'secretEncoded' in kwargs: + secret_encoded = kwargs['secretEncoded'] + if secret_encoded is None: + raise TypeError("Missing 'secret_encoded' argument") + _setter("alg", alg) _setter("lifetime_in_seconds", lifetime_in_seconds) _setter("scopes", scopes) @@ -12350,9 +14022,15 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - androids: Sequence['outputs.GetClientMobileAndroidResult'], - ios: Sequence['outputs.GetClientMobileIoResult'], - opts: Optional[pulumi.ResourceOptions]=None): + androids: Optional[Sequence['outputs.GetClientMobileAndroidResult']] = None, + ios: Optional[Sequence['outputs.GetClientMobileIoResult']] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if androids is None: + raise TypeError("Missing 'androids' argument") + if ios is None: + raise TypeError("Missing 'ios' argument") + _setter("androids", androids) _setter("ios", ios) @@ -12380,9 +14058,19 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - app_package_name: str, - sha256_cert_fingerprints: Sequence[str], - opts: Optional[pulumi.ResourceOptions]=None): + app_package_name: Optional[str] = None, + sha256_cert_fingerprints: Optional[Sequence[str]] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if app_package_name is None and 'appPackageName' in kwargs: + app_package_name = kwargs['appPackageName'] + if app_package_name is None: + raise TypeError("Missing 'app_package_name' argument") + if sha256_cert_fingerprints is None and 'sha256CertFingerprints' in kwargs: + sha256_cert_fingerprints = kwargs['sha256CertFingerprints'] + if sha256_cert_fingerprints is None: + raise TypeError("Missing 'sha256_cert_fingerprints' argument") + _setter("app_package_name", app_package_name) _setter("sha256_cert_fingerprints", sha256_cert_fingerprints) @@ -12410,9 +14098,19 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - app_bundle_identifier: str, - team_id: str, - opts: Optional[pulumi.ResourceOptions]=None): + app_bundle_identifier: Optional[str] = None, + team_id: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if app_bundle_identifier is None and 'appBundleIdentifier' in kwargs: + app_bundle_identifier = kwargs['appBundleIdentifier'] + if app_bundle_identifier is None: + raise TypeError("Missing 'app_bundle_identifier' argument") + if team_id is None and 'teamId' in kwargs: + team_id = kwargs['teamId'] + if team_id is None: + raise TypeError("Missing 'team_id' argument") + _setter("app_bundle_identifier", app_bundle_identifier) _setter("team_id", team_id) @@ -12440,9 +14138,15 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - apples: Sequence['outputs.GetClientNativeSocialLoginAppleResult'], - facebooks: Sequence['outputs.GetClientNativeSocialLoginFacebookResult'], - opts: Optional[pulumi.ResourceOptions]=None): + apples: Optional[Sequence['outputs.GetClientNativeSocialLoginAppleResult']] = None, + facebooks: Optional[Sequence['outputs.GetClientNativeSocialLoginFacebookResult']] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if apples is None: + raise TypeError("Missing 'apples' argument") + if facebooks is None: + raise TypeError("Missing 'facebooks' argument") + _setter("apples", apples) _setter("facebooks", facebooks) @@ -12468,8 +14172,12 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - enabled: bool, - opts: Optional[pulumi.ResourceOptions]=None): + enabled: Optional[bool] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if enabled is None: + raise TypeError("Missing 'enabled' argument") + _setter("enabled", enabled) @property @@ -12489,8 +14197,12 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - enabled: bool, - opts: Optional[pulumi.ResourceOptions]=None): + enabled: Optional[bool] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if enabled is None: + raise TypeError("Missing 'enabled' argument") + _setter("enabled", enabled) @property @@ -12522,14 +14234,42 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - expiration_type: str, - idle_token_lifetime: int, - infinite_idle_token_lifetime: bool, - infinite_token_lifetime: bool, - leeway: int, - rotation_type: str, - token_lifetime: int, - opts: Optional[pulumi.ResourceOptions]=None): + expiration_type: Optional[str] = None, + idle_token_lifetime: Optional[int] = None, + infinite_idle_token_lifetime: Optional[bool] = None, + infinite_token_lifetime: Optional[bool] = None, + leeway: Optional[int] = None, + rotation_type: Optional[str] = None, + token_lifetime: Optional[int] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if expiration_type is None and 'expirationType' in kwargs: + expiration_type = kwargs['expirationType'] + if expiration_type is None: + raise TypeError("Missing 'expiration_type' argument") + if idle_token_lifetime is None and 'idleTokenLifetime' in kwargs: + idle_token_lifetime = kwargs['idleTokenLifetime'] + if idle_token_lifetime is None: + raise TypeError("Missing 'idle_token_lifetime' argument") + if infinite_idle_token_lifetime is None and 'infiniteIdleTokenLifetime' in kwargs: + infinite_idle_token_lifetime = kwargs['infiniteIdleTokenLifetime'] + if infinite_idle_token_lifetime is None: + raise TypeError("Missing 'infinite_idle_token_lifetime' argument") + if infinite_token_lifetime is None and 'infiniteTokenLifetime' in kwargs: + infinite_token_lifetime = kwargs['infiniteTokenLifetime'] + if infinite_token_lifetime is None: + raise TypeError("Missing 'infinite_token_lifetime' argument") + if leeway is None: + raise TypeError("Missing 'leeway' argument") + if rotation_type is None and 'rotationType' in kwargs: + rotation_type = kwargs['rotationType'] + if rotation_type is None: + raise TypeError("Missing 'rotation_type' argument") + if token_lifetime is None and 'tokenLifetime' in kwargs: + token_lifetime = kwargs['tokenLifetime'] + if token_lifetime is None: + raise TypeError("Missing 'token_lifetime' argument") + _setter("expiration_type", expiration_type) _setter("idle_token_lifetime", idle_token_lifetime) _setter("infinite_idle_token_lifetime", infinite_idle_token_lifetime) @@ -12763,97 +14503,427 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - adfs_server: str, - allowed_audiences: Sequence[str], - api_enable_users: bool, - app_id: str, - attribute_maps: Sequence['outputs.GetConnectionOptionAttributeMapResult'], - auth_params: Mapping[str, str], - authorization_endpoint: str, - brute_force_protection: bool, - client_id: str, - client_secret: str, - community_base_url: str, - configuration: Mapping[str, Any], - connection_settings: Sequence['outputs.GetConnectionOptionConnectionSettingResult'], - custom_scripts: Mapping[str, str], - debug: bool, - decryption_keys: Sequence['outputs.GetConnectionOptionDecryptionKeyResult'], - digest_algorithm: str, - disable_cache: bool, - disable_self_service_change_password: bool, - disable_sign_out: bool, - disable_signup: bool, - discovery_url: str, - domain: str, - domain_aliases: Sequence[str], - enable_script_context: bool, - enabled_database_customization: bool, - entity_id: str, - fed_metadata_xml: str, - fields_map: str, - forward_request_info: bool, - from_: str, - gateway_authentications: Sequence['outputs.GetConnectionOptionGatewayAuthenticationResult'], - gateway_url: str, - icon_url: str, - identity_api: str, - idp_initiateds: Sequence['outputs.GetConnectionOptionIdpInitiatedResult'], - import_mode: bool, - ips: Sequence[str], - issuer: str, - jwks_uri: str, - key_id: str, - map_user_id_to_id: bool, - max_groups_to_retrieve: str, - messaging_service_sid: str, - metadata_url: str, - metadata_xml: str, - mfas: Sequence['outputs.GetConnectionOptionMfaResult'], - name: str, - non_persistent_attrs: Sequence[str], - password_complexity_options: Sequence['outputs.GetConnectionOptionPasswordComplexityOptionResult'], - password_dictionaries: Sequence['outputs.GetConnectionOptionPasswordDictionaryResult'], - password_histories: Sequence['outputs.GetConnectionOptionPasswordHistoryResult'], - password_no_personal_infos: Sequence['outputs.GetConnectionOptionPasswordNoPersonalInfoResult'], - password_policy: str, - ping_federate_base_url: str, - pkce_enabled: bool, - protocol_binding: str, - provider: str, - request_template: str, - requires_username: bool, - scopes: Sequence[str], - scripts: Mapping[str, str], - set_user_root_attributes: str, - should_trust_email_verified_connection: str, - sign_in_endpoint: str, - sign_out_endpoint: str, - sign_saml_request: bool, - signature_algorithm: str, - signing_cert: str, - signing_keys: Sequence['outputs.GetConnectionOptionSigningKeyResult'], - strategy_version: int, - subject: str, - syntax: str, - team_id: str, - template: str, - tenant_domain: str, - token_endpoint: str, - totps: Sequence['outputs.GetConnectionOptionTotpResult'], - twilio_sid: str, - twilio_token: str, - type: str, - upstream_params: str, - use_cert_auth: bool, - use_kerberos: bool, - use_wsfed: bool, - user_id_attribute: str, - userinfo_endpoint: str, - validations: Sequence['outputs.GetConnectionOptionValidationResult'], - waad_common_endpoint: bool, - waad_protocol: str, - opts: Optional[pulumi.ResourceOptions]=None): + adfs_server: Optional[str] = None, + allowed_audiences: Optional[Sequence[str]] = None, + api_enable_users: Optional[bool] = None, + app_id: Optional[str] = None, + attribute_maps: Optional[Sequence['outputs.GetConnectionOptionAttributeMapResult']] = None, + auth_params: Optional[Mapping[str, str]] = None, + authorization_endpoint: Optional[str] = None, + brute_force_protection: Optional[bool] = None, + client_id: Optional[str] = None, + client_secret: Optional[str] = None, + community_base_url: Optional[str] = None, + configuration: Optional[Mapping[str, Any]] = None, + connection_settings: Optional[Sequence['outputs.GetConnectionOptionConnectionSettingResult']] = None, + custom_scripts: Optional[Mapping[str, str]] = None, + debug: Optional[bool] = None, + decryption_keys: Optional[Sequence['outputs.GetConnectionOptionDecryptionKeyResult']] = None, + digest_algorithm: Optional[str] = None, + disable_cache: Optional[bool] = None, + disable_self_service_change_password: Optional[bool] = None, + disable_sign_out: Optional[bool] = None, + disable_signup: Optional[bool] = None, + discovery_url: Optional[str] = None, + domain: Optional[str] = None, + domain_aliases: Optional[Sequence[str]] = None, + enable_script_context: Optional[bool] = None, + enabled_database_customization: Optional[bool] = None, + entity_id: Optional[str] = None, + fed_metadata_xml: Optional[str] = None, + fields_map: Optional[str] = None, + forward_request_info: Optional[bool] = None, + from_: Optional[str] = None, + gateway_authentications: Optional[Sequence['outputs.GetConnectionOptionGatewayAuthenticationResult']] = None, + gateway_url: Optional[str] = None, + icon_url: Optional[str] = None, + identity_api: Optional[str] = None, + idp_initiateds: Optional[Sequence['outputs.GetConnectionOptionIdpInitiatedResult']] = None, + import_mode: Optional[bool] = None, + ips: Optional[Sequence[str]] = None, + issuer: Optional[str] = None, + jwks_uri: Optional[str] = None, + key_id: Optional[str] = None, + map_user_id_to_id: Optional[bool] = None, + max_groups_to_retrieve: Optional[str] = None, + messaging_service_sid: Optional[str] = None, + metadata_url: Optional[str] = None, + metadata_xml: Optional[str] = None, + mfas: Optional[Sequence['outputs.GetConnectionOptionMfaResult']] = None, + name: Optional[str] = None, + non_persistent_attrs: Optional[Sequence[str]] = None, + password_complexity_options: Optional[Sequence['outputs.GetConnectionOptionPasswordComplexityOptionResult']] = None, + password_dictionaries: Optional[Sequence['outputs.GetConnectionOptionPasswordDictionaryResult']] = None, + password_histories: Optional[Sequence['outputs.GetConnectionOptionPasswordHistoryResult']] = None, + password_no_personal_infos: Optional[Sequence['outputs.GetConnectionOptionPasswordNoPersonalInfoResult']] = None, + password_policy: Optional[str] = None, + ping_federate_base_url: Optional[str] = None, + pkce_enabled: Optional[bool] = None, + protocol_binding: Optional[str] = None, + provider: Optional[str] = None, + request_template: Optional[str] = None, + requires_username: Optional[bool] = None, + scopes: Optional[Sequence[str]] = None, + scripts: Optional[Mapping[str, str]] = None, + set_user_root_attributes: Optional[str] = None, + should_trust_email_verified_connection: Optional[str] = None, + sign_in_endpoint: Optional[str] = None, + sign_out_endpoint: Optional[str] = None, + sign_saml_request: Optional[bool] = None, + signature_algorithm: Optional[str] = None, + signing_cert: Optional[str] = None, + signing_keys: Optional[Sequence['outputs.GetConnectionOptionSigningKeyResult']] = None, + strategy_version: Optional[int] = None, + subject: Optional[str] = None, + syntax: Optional[str] = None, + team_id: Optional[str] = None, + template: Optional[str] = None, + tenant_domain: Optional[str] = None, + token_endpoint: Optional[str] = None, + totps: Optional[Sequence['outputs.GetConnectionOptionTotpResult']] = None, + twilio_sid: Optional[str] = None, + twilio_token: Optional[str] = None, + type: Optional[str] = None, + upstream_params: Optional[str] = None, + use_cert_auth: Optional[bool] = None, + use_kerberos: Optional[bool] = None, + use_wsfed: Optional[bool] = None, + user_id_attribute: Optional[str] = None, + userinfo_endpoint: Optional[str] = None, + validations: Optional[Sequence['outputs.GetConnectionOptionValidationResult']] = None, + waad_common_endpoint: Optional[bool] = None, + waad_protocol: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if adfs_server is None and 'adfsServer' in kwargs: + adfs_server = kwargs['adfsServer'] + if adfs_server is None: + raise TypeError("Missing 'adfs_server' argument") + if allowed_audiences is None and 'allowedAudiences' in kwargs: + allowed_audiences = kwargs['allowedAudiences'] + if allowed_audiences is None: + raise TypeError("Missing 'allowed_audiences' argument") + if api_enable_users is None and 'apiEnableUsers' in kwargs: + api_enable_users = kwargs['apiEnableUsers'] + if api_enable_users is None: + raise TypeError("Missing 'api_enable_users' argument") + if app_id is None and 'appId' in kwargs: + app_id = kwargs['appId'] + if app_id is None: + raise TypeError("Missing 'app_id' argument") + if attribute_maps is None and 'attributeMaps' in kwargs: + attribute_maps = kwargs['attributeMaps'] + if attribute_maps is None: + raise TypeError("Missing 'attribute_maps' argument") + if auth_params is None and 'authParams' in kwargs: + auth_params = kwargs['authParams'] + if auth_params is None: + raise TypeError("Missing 'auth_params' argument") + if authorization_endpoint is None and 'authorizationEndpoint' in kwargs: + authorization_endpoint = kwargs['authorizationEndpoint'] + if authorization_endpoint is None: + raise TypeError("Missing 'authorization_endpoint' argument") + if brute_force_protection is None and 'bruteForceProtection' in kwargs: + brute_force_protection = kwargs['bruteForceProtection'] + if brute_force_protection is None: + raise TypeError("Missing 'brute_force_protection' argument") + if client_id is None and 'clientId' in kwargs: + client_id = kwargs['clientId'] + if client_id is None: + raise TypeError("Missing 'client_id' argument") + if client_secret is None and 'clientSecret' in kwargs: + client_secret = kwargs['clientSecret'] + if client_secret is None: + raise TypeError("Missing 'client_secret' argument") + if community_base_url is None and 'communityBaseUrl' in kwargs: + community_base_url = kwargs['communityBaseUrl'] + if community_base_url is None: + raise TypeError("Missing 'community_base_url' argument") + if configuration is None: + raise TypeError("Missing 'configuration' argument") + if connection_settings is None and 'connectionSettings' in kwargs: + connection_settings = kwargs['connectionSettings'] + if connection_settings is None: + raise TypeError("Missing 'connection_settings' argument") + if custom_scripts is None and 'customScripts' in kwargs: + custom_scripts = kwargs['customScripts'] + if custom_scripts is None: + raise TypeError("Missing 'custom_scripts' argument") + if debug is None: + raise TypeError("Missing 'debug' argument") + if decryption_keys is None and 'decryptionKeys' in kwargs: + decryption_keys = kwargs['decryptionKeys'] + if decryption_keys is None: + raise TypeError("Missing 'decryption_keys' argument") + if digest_algorithm is None and 'digestAlgorithm' in kwargs: + digest_algorithm = kwargs['digestAlgorithm'] + if digest_algorithm is None: + raise TypeError("Missing 'digest_algorithm' argument") + if disable_cache is None and 'disableCache' in kwargs: + disable_cache = kwargs['disableCache'] + if disable_cache is None: + raise TypeError("Missing 'disable_cache' argument") + if disable_self_service_change_password is None and 'disableSelfServiceChangePassword' in kwargs: + disable_self_service_change_password = kwargs['disableSelfServiceChangePassword'] + if disable_self_service_change_password is None: + raise TypeError("Missing 'disable_self_service_change_password' argument") + if disable_sign_out is None and 'disableSignOut' in kwargs: + disable_sign_out = kwargs['disableSignOut'] + if disable_sign_out is None: + raise TypeError("Missing 'disable_sign_out' argument") + if disable_signup is None and 'disableSignup' in kwargs: + disable_signup = kwargs['disableSignup'] + if disable_signup is None: + raise TypeError("Missing 'disable_signup' argument") + if discovery_url is None and 'discoveryUrl' in kwargs: + discovery_url = kwargs['discoveryUrl'] + if discovery_url is None: + raise TypeError("Missing 'discovery_url' argument") + if domain is None: + raise TypeError("Missing 'domain' argument") + if domain_aliases is None and 'domainAliases' in kwargs: + domain_aliases = kwargs['domainAliases'] + if domain_aliases is None: + raise TypeError("Missing 'domain_aliases' argument") + if enable_script_context is None and 'enableScriptContext' in kwargs: + enable_script_context = kwargs['enableScriptContext'] + if enable_script_context is None: + raise TypeError("Missing 'enable_script_context' argument") + if enabled_database_customization is None and 'enabledDatabaseCustomization' in kwargs: + enabled_database_customization = kwargs['enabledDatabaseCustomization'] + if enabled_database_customization is None: + raise TypeError("Missing 'enabled_database_customization' argument") + if entity_id is None and 'entityId' in kwargs: + entity_id = kwargs['entityId'] + if entity_id is None: + raise TypeError("Missing 'entity_id' argument") + if fed_metadata_xml is None and 'fedMetadataXml' in kwargs: + fed_metadata_xml = kwargs['fedMetadataXml'] + if fed_metadata_xml is None: + raise TypeError("Missing 'fed_metadata_xml' argument") + if fields_map is None and 'fieldsMap' in kwargs: + fields_map = kwargs['fieldsMap'] + if fields_map is None: + raise TypeError("Missing 'fields_map' argument") + if forward_request_info is None and 'forwardRequestInfo' in kwargs: + forward_request_info = kwargs['forwardRequestInfo'] + if forward_request_info is None: + raise TypeError("Missing 'forward_request_info' argument") + if from_ is None and 'from' in kwargs: + from_ = kwargs['from'] + if from_ is None: + raise TypeError("Missing 'from_' argument") + if gateway_authentications is None and 'gatewayAuthentications' in kwargs: + gateway_authentications = kwargs['gatewayAuthentications'] + if gateway_authentications is None: + raise TypeError("Missing 'gateway_authentications' argument") + if gateway_url is None and 'gatewayUrl' in kwargs: + gateway_url = kwargs['gatewayUrl'] + if gateway_url is None: + raise TypeError("Missing 'gateway_url' argument") + if icon_url is None and 'iconUrl' in kwargs: + icon_url = kwargs['iconUrl'] + if icon_url is None: + raise TypeError("Missing 'icon_url' argument") + if identity_api is None and 'identityApi' in kwargs: + identity_api = kwargs['identityApi'] + if identity_api is None: + raise TypeError("Missing 'identity_api' argument") + if idp_initiateds is None and 'idpInitiateds' in kwargs: + idp_initiateds = kwargs['idpInitiateds'] + if idp_initiateds is None: + raise TypeError("Missing 'idp_initiateds' argument") + if import_mode is None and 'importMode' in kwargs: + import_mode = kwargs['importMode'] + if import_mode is None: + raise TypeError("Missing 'import_mode' argument") + if ips is None: + raise TypeError("Missing 'ips' argument") + if issuer is None: + raise TypeError("Missing 'issuer' argument") + if jwks_uri is None and 'jwksUri' in kwargs: + jwks_uri = kwargs['jwksUri'] + if jwks_uri is None: + raise TypeError("Missing 'jwks_uri' argument") + if key_id is None and 'keyId' in kwargs: + key_id = kwargs['keyId'] + if key_id is None: + raise TypeError("Missing 'key_id' argument") + if map_user_id_to_id is None and 'mapUserIdToId' in kwargs: + map_user_id_to_id = kwargs['mapUserIdToId'] + if map_user_id_to_id is None: + raise TypeError("Missing 'map_user_id_to_id' argument") + if max_groups_to_retrieve is None and 'maxGroupsToRetrieve' in kwargs: + max_groups_to_retrieve = kwargs['maxGroupsToRetrieve'] + if max_groups_to_retrieve is None: + raise TypeError("Missing 'max_groups_to_retrieve' argument") + if messaging_service_sid is None and 'messagingServiceSid' in kwargs: + messaging_service_sid = kwargs['messagingServiceSid'] + if messaging_service_sid is None: + raise TypeError("Missing 'messaging_service_sid' argument") + if metadata_url is None and 'metadataUrl' in kwargs: + metadata_url = kwargs['metadataUrl'] + if metadata_url is None: + raise TypeError("Missing 'metadata_url' argument") + if metadata_xml is None and 'metadataXml' in kwargs: + metadata_xml = kwargs['metadataXml'] + if metadata_xml is None: + raise TypeError("Missing 'metadata_xml' argument") + if mfas is None: + raise TypeError("Missing 'mfas' argument") + if name is None: + raise TypeError("Missing 'name' argument") + if non_persistent_attrs is None and 'nonPersistentAttrs' in kwargs: + non_persistent_attrs = kwargs['nonPersistentAttrs'] + if non_persistent_attrs is None: + raise TypeError("Missing 'non_persistent_attrs' argument") + if password_complexity_options is None and 'passwordComplexityOptions' in kwargs: + password_complexity_options = kwargs['passwordComplexityOptions'] + if password_complexity_options is None: + raise TypeError("Missing 'password_complexity_options' argument") + if password_dictionaries is None and 'passwordDictionaries' in kwargs: + password_dictionaries = kwargs['passwordDictionaries'] + if password_dictionaries is None: + raise TypeError("Missing 'password_dictionaries' argument") + if password_histories is None and 'passwordHistories' in kwargs: + password_histories = kwargs['passwordHistories'] + if password_histories is None: + raise TypeError("Missing 'password_histories' argument") + if password_no_personal_infos is None and 'passwordNoPersonalInfos' in kwargs: + password_no_personal_infos = kwargs['passwordNoPersonalInfos'] + if password_no_personal_infos is None: + raise TypeError("Missing 'password_no_personal_infos' argument") + if password_policy is None and 'passwordPolicy' in kwargs: + password_policy = kwargs['passwordPolicy'] + if password_policy is None: + raise TypeError("Missing 'password_policy' argument") + if ping_federate_base_url is None and 'pingFederateBaseUrl' in kwargs: + ping_federate_base_url = kwargs['pingFederateBaseUrl'] + if ping_federate_base_url is None: + raise TypeError("Missing 'ping_federate_base_url' argument") + if pkce_enabled is None and 'pkceEnabled' in kwargs: + pkce_enabled = kwargs['pkceEnabled'] + if pkce_enabled is None: + raise TypeError("Missing 'pkce_enabled' argument") + if protocol_binding is None and 'protocolBinding' in kwargs: + protocol_binding = kwargs['protocolBinding'] + if protocol_binding is None: + raise TypeError("Missing 'protocol_binding' argument") + if provider is None: + raise TypeError("Missing 'provider' argument") + if request_template is None and 'requestTemplate' in kwargs: + request_template = kwargs['requestTemplate'] + if request_template is None: + raise TypeError("Missing 'request_template' argument") + if requires_username is None and 'requiresUsername' in kwargs: + requires_username = kwargs['requiresUsername'] + if requires_username is None: + raise TypeError("Missing 'requires_username' argument") + if scopes is None: + raise TypeError("Missing 'scopes' argument") + if scripts is None: + raise TypeError("Missing 'scripts' argument") + if set_user_root_attributes is None and 'setUserRootAttributes' in kwargs: + set_user_root_attributes = kwargs['setUserRootAttributes'] + if set_user_root_attributes is None: + raise TypeError("Missing 'set_user_root_attributes' argument") + if should_trust_email_verified_connection is None and 'shouldTrustEmailVerifiedConnection' in kwargs: + should_trust_email_verified_connection = kwargs['shouldTrustEmailVerifiedConnection'] + if should_trust_email_verified_connection is None: + raise TypeError("Missing 'should_trust_email_verified_connection' argument") + if sign_in_endpoint is None and 'signInEndpoint' in kwargs: + sign_in_endpoint = kwargs['signInEndpoint'] + if sign_in_endpoint is None: + raise TypeError("Missing 'sign_in_endpoint' argument") + if sign_out_endpoint is None and 'signOutEndpoint' in kwargs: + sign_out_endpoint = kwargs['signOutEndpoint'] + if sign_out_endpoint is None: + raise TypeError("Missing 'sign_out_endpoint' argument") + if sign_saml_request is None and 'signSamlRequest' in kwargs: + sign_saml_request = kwargs['signSamlRequest'] + if sign_saml_request is None: + raise TypeError("Missing 'sign_saml_request' argument") + if signature_algorithm is None and 'signatureAlgorithm' in kwargs: + signature_algorithm = kwargs['signatureAlgorithm'] + if signature_algorithm is None: + raise TypeError("Missing 'signature_algorithm' argument") + if signing_cert is None and 'signingCert' in kwargs: + signing_cert = kwargs['signingCert'] + if signing_cert is None: + raise TypeError("Missing 'signing_cert' argument") + if signing_keys is None and 'signingKeys' in kwargs: + signing_keys = kwargs['signingKeys'] + if signing_keys is None: + raise TypeError("Missing 'signing_keys' argument") + if strategy_version is None and 'strategyVersion' in kwargs: + strategy_version = kwargs['strategyVersion'] + if strategy_version is None: + raise TypeError("Missing 'strategy_version' argument") + if subject is None: + raise TypeError("Missing 'subject' argument") + if syntax is None: + raise TypeError("Missing 'syntax' argument") + if team_id is None and 'teamId' in kwargs: + team_id = kwargs['teamId'] + if team_id is None: + raise TypeError("Missing 'team_id' argument") + if template is None: + raise TypeError("Missing 'template' argument") + if tenant_domain is None and 'tenantDomain' in kwargs: + tenant_domain = kwargs['tenantDomain'] + if tenant_domain is None: + raise TypeError("Missing 'tenant_domain' argument") + if token_endpoint is None and 'tokenEndpoint' in kwargs: + token_endpoint = kwargs['tokenEndpoint'] + if token_endpoint is None: + raise TypeError("Missing 'token_endpoint' argument") + if totps is None: + raise TypeError("Missing 'totps' argument") + if twilio_sid is None and 'twilioSid' in kwargs: + twilio_sid = kwargs['twilioSid'] + if twilio_sid is None: + raise TypeError("Missing 'twilio_sid' argument") + if twilio_token is None and 'twilioToken' in kwargs: + twilio_token = kwargs['twilioToken'] + if twilio_token is None: + raise TypeError("Missing 'twilio_token' argument") + if type is None: + raise TypeError("Missing 'type' argument") + if upstream_params is None and 'upstreamParams' in kwargs: + upstream_params = kwargs['upstreamParams'] + if upstream_params is None: + raise TypeError("Missing 'upstream_params' argument") + if use_cert_auth is None and 'useCertAuth' in kwargs: + use_cert_auth = kwargs['useCertAuth'] + if use_cert_auth is None: + raise TypeError("Missing 'use_cert_auth' argument") + if use_kerberos is None and 'useKerberos' in kwargs: + use_kerberos = kwargs['useKerberos'] + if use_kerberos is None: + raise TypeError("Missing 'use_kerberos' argument") + if use_wsfed is None and 'useWsfed' in kwargs: + use_wsfed = kwargs['useWsfed'] + if use_wsfed is None: + raise TypeError("Missing 'use_wsfed' argument") + if user_id_attribute is None and 'userIdAttribute' in kwargs: + user_id_attribute = kwargs['userIdAttribute'] + if user_id_attribute is None: + raise TypeError("Missing 'user_id_attribute' argument") + if userinfo_endpoint is None and 'userinfoEndpoint' in kwargs: + userinfo_endpoint = kwargs['userinfoEndpoint'] + if userinfo_endpoint is None: + raise TypeError("Missing 'userinfo_endpoint' argument") + if validations is None: + raise TypeError("Missing 'validations' argument") + if waad_common_endpoint is None and 'waadCommonEndpoint' in kwargs: + waad_common_endpoint = kwargs['waadCommonEndpoint'] + if waad_common_endpoint is None: + raise TypeError("Missing 'waad_common_endpoint' argument") + if waad_protocol is None and 'waadProtocol' in kwargs: + waad_protocol = kwargs['waadProtocol'] + if waad_protocol is None: + raise TypeError("Missing 'waad_protocol' argument") + _setter("adfs_server", adfs_server) _setter("allowed_audiences", allowed_audiences) _setter("api_enable_users", api_enable_users) @@ -13411,10 +15481,22 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - attributes: str, - mapping_mode: str, - userinfo_scope: str, - opts: Optional[pulumi.ResourceOptions]=None): + attributes: Optional[str] = None, + mapping_mode: Optional[str] = None, + userinfo_scope: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if attributes is None: + raise TypeError("Missing 'attributes' argument") + if mapping_mode is None and 'mappingMode' in kwargs: + mapping_mode = kwargs['mappingMode'] + if mapping_mode is None: + raise TypeError("Missing 'mapping_mode' argument") + if userinfo_scope is None and 'userinfoScope' in kwargs: + userinfo_scope = kwargs['userinfoScope'] + if userinfo_scope is None: + raise TypeError("Missing 'userinfo_scope' argument") + _setter("attributes", attributes) _setter("mapping_mode", mapping_mode) _setter("userinfo_scope", userinfo_scope) @@ -13446,8 +15528,12 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - pkce: str, - opts: Optional[pulumi.ResourceOptions]=None): + pkce: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if pkce is None: + raise TypeError("Missing 'pkce' argument") + _setter("pkce", pkce) @property @@ -13469,9 +15555,15 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - cert: str, - key: str, - opts: Optional[pulumi.ResourceOptions]=None): + cert: Optional[str] = None, + key: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if cert is None: + raise TypeError("Missing 'cert' argument") + if key is None: + raise TypeError("Missing 'key' argument") + _setter("cert", cert) _setter("key", key) @@ -13505,12 +15597,26 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - audience: str, - method: str, - secret: str, - secret_base64_encoded: bool, - subject: str, - opts: Optional[pulumi.ResourceOptions]=None): + audience: Optional[str] = None, + method: Optional[str] = None, + secret: Optional[str] = None, + secret_base64_encoded: Optional[bool] = None, + subject: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if audience is None: + raise TypeError("Missing 'audience' argument") + if method is None: + raise TypeError("Missing 'method' argument") + if secret is None: + raise TypeError("Missing 'secret' argument") + if secret_base64_encoded is None and 'secretBase64Encoded' in kwargs: + secret_base64_encoded = kwargs['secretBase64Encoded'] + if secret_base64_encoded is None: + raise TypeError("Missing 'secret_base64_encoded' argument") + if subject is None: + raise TypeError("Missing 'subject' argument") + _setter("audience", audience) _setter("method", method) _setter("secret", secret) @@ -13558,10 +15664,24 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - client_authorize_query: str, - client_id: str, - client_protocol: str, - opts: Optional[pulumi.ResourceOptions]=None): + client_authorize_query: Optional[str] = None, + client_id: Optional[str] = None, + client_protocol: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if client_authorize_query is None and 'clientAuthorizeQuery' in kwargs: + client_authorize_query = kwargs['clientAuthorizeQuery'] + if client_authorize_query is None: + raise TypeError("Missing 'client_authorize_query' argument") + if client_id is None and 'clientId' in kwargs: + client_id = kwargs['clientId'] + if client_id is None: + raise TypeError("Missing 'client_id' argument") + if client_protocol is None and 'clientProtocol' in kwargs: + client_protocol = kwargs['clientProtocol'] + if client_protocol is None: + raise TypeError("Missing 'client_protocol' argument") + _setter("client_authorize_query", client_authorize_query) _setter("client_id", client_id) _setter("client_protocol", client_protocol) @@ -13595,9 +15715,17 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - active: bool, - return_enroll_settings: bool, - opts: Optional[pulumi.ResourceOptions]=None): + active: Optional[bool] = None, + return_enroll_settings: Optional[bool] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if active is None: + raise TypeError("Missing 'active' argument") + if return_enroll_settings is None and 'returnEnrollSettings' in kwargs: + return_enroll_settings = kwargs['returnEnrollSettings'] + if return_enroll_settings is None: + raise TypeError("Missing 'return_enroll_settings' argument") + _setter("active", active) _setter("return_enroll_settings", return_enroll_settings) @@ -13623,8 +15751,14 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - min_length: int, - opts: Optional[pulumi.ResourceOptions]=None): + min_length: Optional[int] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if min_length is None and 'minLength' in kwargs: + min_length = kwargs['minLength'] + if min_length is None: + raise TypeError("Missing 'min_length' argument") + _setter("min_length", min_length) @property @@ -13646,9 +15780,15 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - dictionaries: Sequence[str], - enable: bool, - opts: Optional[pulumi.ResourceOptions]=None): + dictionaries: Optional[Sequence[str]] = None, + enable: Optional[bool] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if dictionaries is None: + raise TypeError("Missing 'dictionaries' argument") + if enable is None: + raise TypeError("Missing 'enable' argument") + _setter("dictionaries", dictionaries) _setter("enable", enable) @@ -13676,9 +15816,15 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - enable: bool, - size: int, - opts: Optional[pulumi.ResourceOptions]=None): + enable: Optional[bool] = None, + size: Optional[int] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if enable is None: + raise TypeError("Missing 'enable' argument") + if size is None: + raise TypeError("Missing 'size' argument") + _setter("enable", enable) _setter("size", size) @@ -13704,8 +15850,12 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - enable: bool, - opts: Optional[pulumi.ResourceOptions]=None): + enable: Optional[bool] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if enable is None: + raise TypeError("Missing 'enable' argument") + _setter("enable", enable) @property @@ -13727,9 +15877,15 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - cert: str, - key: str, - opts: Optional[pulumi.ResourceOptions]=None): + cert: Optional[str] = None, + key: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if cert is None: + raise TypeError("Missing 'cert' argument") + if key is None: + raise TypeError("Missing 'key' argument") + _setter("cert", cert) _setter("key", key) @@ -13757,9 +15913,17 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - length: int, - time_step: int, - opts: Optional[pulumi.ResourceOptions]=None): + length: Optional[int] = None, + time_step: Optional[int] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if length is None: + raise TypeError("Missing 'length' argument") + if time_step is None and 'timeStep' in kwargs: + time_step = kwargs['timeStep'] + if time_step is None: + raise TypeError("Missing 'time_step' argument") + _setter("length", length) _setter("time_step", time_step) @@ -13785,8 +15949,12 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - usernames: Sequence['outputs.GetConnectionOptionValidationUsernameResult'], - opts: Optional[pulumi.ResourceOptions]=None): + usernames: Optional[Sequence['outputs.GetConnectionOptionValidationUsernameResult']] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if usernames is None: + raise TypeError("Missing 'usernames' argument") + _setter("usernames", usernames) @property @@ -13808,9 +15976,15 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - max: int, - min: int, - opts: Optional[pulumi.ResourceOptions]=None): + max: Optional[int] = None, + min: Optional[int] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if max is None: + raise TypeError("Missing 'max' argument") + if min is None: + raise TypeError("Missing 'min' argument") + _setter("max", max) _setter("min", min) @@ -13836,8 +16010,12 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - methods: Sequence[Any], - opts: Optional[pulumi.ResourceOptions]=None): + methods: Optional[Sequence[Any]] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if methods is None: + raise TypeError("Missing 'methods' argument") + _setter("methods", methods) @property @@ -13859,9 +16037,17 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - colors: Mapping[str, str], - logo_url: str, - opts: Optional[pulumi.ResourceOptions]=None): + colors: Optional[Mapping[str, str]] = None, + logo_url: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if colors is None: + raise TypeError("Missing 'colors' argument") + if logo_url is None and 'logoUrl' in kwargs: + logo_url = kwargs['logoUrl'] + if logo_url is None: + raise TypeError("Missing 'logo_url' argument") + _setter("colors", colors) _setter("logo_url", logo_url) @@ -13889,9 +16075,19 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - assign_membership_on_login: bool, - connection_id: str, - opts: Optional[pulumi.ResourceOptions]=None): + assign_membership_on_login: Optional[bool] = None, + connection_id: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if assign_membership_on_login is None and 'assignMembershipOnLogin' in kwargs: + assign_membership_on_login = kwargs['assignMembershipOnLogin'] + if assign_membership_on_login is None: + raise TypeError("Missing 'assign_membership_on_login' argument") + if connection_id is None and 'connectionId' in kwargs: + connection_id = kwargs['connectionId'] + if connection_id is None: + raise TypeError("Missing 'connection_id' argument") + _setter("assign_membership_on_login", assign_membership_on_login) _setter("connection_id", connection_id) @@ -13919,9 +16115,15 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - enabled: bool, - html: str, - opts: Optional[pulumi.ResourceOptions]=None): + enabled: Optional[bool] = None, + html: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if enabled is None: + raise TypeError("Missing 'enabled' argument") + if html is None: + raise TypeError("Missing 'html' argument") + _setter("enabled", enabled) _setter("html", html) @@ -13951,10 +16153,20 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - html: str, - show_log_link: bool, - url: str, - opts: Optional[pulumi.ResourceOptions]=None): + html: Optional[str] = None, + show_log_link: Optional[bool] = None, + url: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if html is None: + raise TypeError("Missing 'html' argument") + if show_log_link is None and 'showLogLink' in kwargs: + show_log_link = kwargs['showLogLink'] + if show_log_link is None: + raise TypeError("Missing 'show_log_link' argument") + if url is None: + raise TypeError("Missing 'url' argument") + _setter("html", html) _setter("show_log_link", show_log_link) _setter("url", url) @@ -13988,9 +16200,15 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - enabled: bool, - html: str, - opts: Optional[pulumi.ResourceOptions]=None): + enabled: Optional[bool] = None, + html: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if enabled is None: + raise TypeError("Missing 'enabled' argument") + if html is None: + raise TypeError("Missing 'html' argument") + _setter("enabled", enabled) _setter("html", html) @@ -14018,9 +16236,15 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - enabled: bool, - html: str, - opts: Optional[pulumi.ResourceOptions]=None): + enabled: Optional[bool] = None, + html: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if enabled is None: + raise TypeError("Missing 'enabled' argument") + if html is None: + raise TypeError("Missing 'html' argument") + _setter("enabled", enabled) _setter("html", html) @@ -14048,9 +16272,15 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - description: str, - name: str, - opts: Optional[pulumi.ResourceOptions]=None): + description: Optional[str] = None, + name: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if description is None: + raise TypeError("Missing 'description' argument") + if name is None: + raise TypeError("Missing 'name' argument") + _setter("description", description) _setter("name", name) @@ -14082,11 +16312,25 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - description: str, - name: str, - resource_server_identifier: str, - resource_server_name: str, - opts: Optional[pulumi.ResourceOptions]=None): + description: Optional[str] = None, + name: Optional[str] = None, + resource_server_identifier: Optional[str] = None, + resource_server_name: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if description is None: + raise TypeError("Missing 'description' argument") + if name is None: + raise TypeError("Missing 'name' argument") + if resource_server_identifier is None and 'resourceServerIdentifier' in kwargs: + resource_server_identifier = kwargs['resourceServerIdentifier'] + if resource_server_identifier is None: + raise TypeError("Missing 'resource_server_identifier' argument") + if resource_server_name is None and 'resourceServerName' in kwargs: + resource_server_name = kwargs['resourceServerName'] + if resource_server_name is None: + raise TypeError("Missing 'resource_server_name' argument") + _setter("description", description) _setter("name", name) _setter("resource_server_identifier", resource_server_identifier) @@ -14140,16 +16384,36 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - cert: str, - current: bool, - fingerprint: str, - kid: str, - next: bool, - pkcs7: str, - previous: bool, - revoked: bool, - thumbprint: str, - opts: Optional[pulumi.ResourceOptions]=None): + cert: Optional[str] = None, + current: Optional[bool] = None, + fingerprint: Optional[str] = None, + kid: Optional[str] = None, + next: Optional[bool] = None, + pkcs7: Optional[str] = None, + previous: Optional[bool] = None, + revoked: Optional[bool] = None, + thumbprint: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if cert is None: + raise TypeError("Missing 'cert' argument") + if current is None: + raise TypeError("Missing 'current' argument") + if fingerprint is None: + raise TypeError("Missing 'fingerprint' argument") + if kid is None: + raise TypeError("Missing 'kid' argument") + if next is None: + raise TypeError("Missing 'next' argument") + if pkcs7 is None: + raise TypeError("Missing 'pkcs7' argument") + if previous is None: + raise TypeError("Missing 'previous' argument") + if revoked is None: + raise TypeError("Missing 'revoked' argument") + if thumbprint is None: + raise TypeError("Missing 'thumbprint' argument") + _setter("cert", cert) _setter("current", current) _setter("fingerprint", fingerprint) @@ -14261,30 +16525,124 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - allow_legacy_delegation_grant_types: bool, - allow_legacy_ro_grant_types: bool, - allow_legacy_tokeninfo_endpoint: bool, - dashboard_insights_view: bool, - dashboard_log_streams_next: bool, - disable_clickjack_protection_headers: bool, - disable_fields_map_fix: bool, - disable_management_api_sms_obfuscation: bool, - enable_adfs_waad_email_verification: bool, - enable_apis_section: bool, - enable_client_connections: bool, - enable_custom_domain_in_emails: bool, - enable_dynamic_client_registration: bool, - enable_idtoken_api2: bool, - enable_legacy_logs_search_v2: bool, - enable_legacy_profile: bool, - enable_pipeline2: bool, - enable_public_signup_user_exists_error: bool, - mfa_show_factor_list_on_enrollment: bool, - no_disclose_enterprise_connections: bool, - require_pushed_authorization_requests: bool, - revoke_refresh_token_grant: bool, - use_scope_descriptions_for_consent: bool, - opts: Optional[pulumi.ResourceOptions]=None): + allow_legacy_delegation_grant_types: Optional[bool] = None, + allow_legacy_ro_grant_types: Optional[bool] = None, + allow_legacy_tokeninfo_endpoint: Optional[bool] = None, + dashboard_insights_view: Optional[bool] = None, + dashboard_log_streams_next: Optional[bool] = None, + disable_clickjack_protection_headers: Optional[bool] = None, + disable_fields_map_fix: Optional[bool] = None, + disable_management_api_sms_obfuscation: Optional[bool] = None, + enable_adfs_waad_email_verification: Optional[bool] = None, + enable_apis_section: Optional[bool] = None, + enable_client_connections: Optional[bool] = None, + enable_custom_domain_in_emails: Optional[bool] = None, + enable_dynamic_client_registration: Optional[bool] = None, + enable_idtoken_api2: Optional[bool] = None, + enable_legacy_logs_search_v2: Optional[bool] = None, + enable_legacy_profile: Optional[bool] = None, + enable_pipeline2: Optional[bool] = None, + enable_public_signup_user_exists_error: Optional[bool] = None, + mfa_show_factor_list_on_enrollment: Optional[bool] = None, + no_disclose_enterprise_connections: Optional[bool] = None, + require_pushed_authorization_requests: Optional[bool] = None, + revoke_refresh_token_grant: Optional[bool] = None, + use_scope_descriptions_for_consent: Optional[bool] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if allow_legacy_delegation_grant_types is None and 'allowLegacyDelegationGrantTypes' in kwargs: + allow_legacy_delegation_grant_types = kwargs['allowLegacyDelegationGrantTypes'] + if allow_legacy_delegation_grant_types is None: + raise TypeError("Missing 'allow_legacy_delegation_grant_types' argument") + if allow_legacy_ro_grant_types is None and 'allowLegacyRoGrantTypes' in kwargs: + allow_legacy_ro_grant_types = kwargs['allowLegacyRoGrantTypes'] + if allow_legacy_ro_grant_types is None: + raise TypeError("Missing 'allow_legacy_ro_grant_types' argument") + if allow_legacy_tokeninfo_endpoint is None and 'allowLegacyTokeninfoEndpoint' in kwargs: + allow_legacy_tokeninfo_endpoint = kwargs['allowLegacyTokeninfoEndpoint'] + if allow_legacy_tokeninfo_endpoint is None: + raise TypeError("Missing 'allow_legacy_tokeninfo_endpoint' argument") + if dashboard_insights_view is None and 'dashboardInsightsView' in kwargs: + dashboard_insights_view = kwargs['dashboardInsightsView'] + if dashboard_insights_view is None: + raise TypeError("Missing 'dashboard_insights_view' argument") + if dashboard_log_streams_next is None and 'dashboardLogStreamsNext' in kwargs: + dashboard_log_streams_next = kwargs['dashboardLogStreamsNext'] + if dashboard_log_streams_next is None: + raise TypeError("Missing 'dashboard_log_streams_next' argument") + if disable_clickjack_protection_headers is None and 'disableClickjackProtectionHeaders' in kwargs: + disable_clickjack_protection_headers = kwargs['disableClickjackProtectionHeaders'] + if disable_clickjack_protection_headers is None: + raise TypeError("Missing 'disable_clickjack_protection_headers' argument") + if disable_fields_map_fix is None and 'disableFieldsMapFix' in kwargs: + disable_fields_map_fix = kwargs['disableFieldsMapFix'] + if disable_fields_map_fix is None: + raise TypeError("Missing 'disable_fields_map_fix' argument") + if disable_management_api_sms_obfuscation is None and 'disableManagementApiSmsObfuscation' in kwargs: + disable_management_api_sms_obfuscation = kwargs['disableManagementApiSmsObfuscation'] + if disable_management_api_sms_obfuscation is None: + raise TypeError("Missing 'disable_management_api_sms_obfuscation' argument") + if enable_adfs_waad_email_verification is None and 'enableAdfsWaadEmailVerification' in kwargs: + enable_adfs_waad_email_verification = kwargs['enableAdfsWaadEmailVerification'] + if enable_adfs_waad_email_verification is None: + raise TypeError("Missing 'enable_adfs_waad_email_verification' argument") + if enable_apis_section is None and 'enableApisSection' in kwargs: + enable_apis_section = kwargs['enableApisSection'] + if enable_apis_section is None: + raise TypeError("Missing 'enable_apis_section' argument") + if enable_client_connections is None and 'enableClientConnections' in kwargs: + enable_client_connections = kwargs['enableClientConnections'] + if enable_client_connections is None: + raise TypeError("Missing 'enable_client_connections' argument") + if enable_custom_domain_in_emails is None and 'enableCustomDomainInEmails' in kwargs: + enable_custom_domain_in_emails = kwargs['enableCustomDomainInEmails'] + if enable_custom_domain_in_emails is None: + raise TypeError("Missing 'enable_custom_domain_in_emails' argument") + if enable_dynamic_client_registration is None and 'enableDynamicClientRegistration' in kwargs: + enable_dynamic_client_registration = kwargs['enableDynamicClientRegistration'] + if enable_dynamic_client_registration is None: + raise TypeError("Missing 'enable_dynamic_client_registration' argument") + if enable_idtoken_api2 is None and 'enableIdtokenApi2' in kwargs: + enable_idtoken_api2 = kwargs['enableIdtokenApi2'] + if enable_idtoken_api2 is None: + raise TypeError("Missing 'enable_idtoken_api2' argument") + if enable_legacy_logs_search_v2 is None and 'enableLegacyLogsSearchV2' in kwargs: + enable_legacy_logs_search_v2 = kwargs['enableLegacyLogsSearchV2'] + if enable_legacy_logs_search_v2 is None: + raise TypeError("Missing 'enable_legacy_logs_search_v2' argument") + if enable_legacy_profile is None and 'enableLegacyProfile' in kwargs: + enable_legacy_profile = kwargs['enableLegacyProfile'] + if enable_legacy_profile is None: + raise TypeError("Missing 'enable_legacy_profile' argument") + if enable_pipeline2 is None and 'enablePipeline2' in kwargs: + enable_pipeline2 = kwargs['enablePipeline2'] + if enable_pipeline2 is None: + raise TypeError("Missing 'enable_pipeline2' argument") + if enable_public_signup_user_exists_error is None and 'enablePublicSignupUserExistsError' in kwargs: + enable_public_signup_user_exists_error = kwargs['enablePublicSignupUserExistsError'] + if enable_public_signup_user_exists_error is None: + raise TypeError("Missing 'enable_public_signup_user_exists_error' argument") + if mfa_show_factor_list_on_enrollment is None and 'mfaShowFactorListOnEnrollment' in kwargs: + mfa_show_factor_list_on_enrollment = kwargs['mfaShowFactorListOnEnrollment'] + if mfa_show_factor_list_on_enrollment is None: + raise TypeError("Missing 'mfa_show_factor_list_on_enrollment' argument") + if no_disclose_enterprise_connections is None and 'noDiscloseEnterpriseConnections' in kwargs: + no_disclose_enterprise_connections = kwargs['noDiscloseEnterpriseConnections'] + if no_disclose_enterprise_connections is None: + raise TypeError("Missing 'no_disclose_enterprise_connections' argument") + if require_pushed_authorization_requests is None and 'requirePushedAuthorizationRequests' in kwargs: + require_pushed_authorization_requests = kwargs['requirePushedAuthorizationRequests'] + if require_pushed_authorization_requests is None: + raise TypeError("Missing 'require_pushed_authorization_requests' argument") + if revoke_refresh_token_grant is None and 'revokeRefreshTokenGrant' in kwargs: + revoke_refresh_token_grant = kwargs['revokeRefreshTokenGrant'] + if revoke_refresh_token_grant is None: + raise TypeError("Missing 'revoke_refresh_token_grant' argument") + if use_scope_descriptions_for_consent is None and 'useScopeDescriptionsForConsent' in kwargs: + use_scope_descriptions_for_consent = kwargs['useScopeDescriptionsForConsent'] + if use_scope_descriptions_for_consent is None: + raise TypeError("Missing 'use_scope_descriptions_for_consent' argument") + _setter("allow_legacy_delegation_grant_types", allow_legacy_delegation_grant_types) _setter("allow_legacy_ro_grant_types", allow_legacy_ro_grant_types) _setter("allow_legacy_tokeninfo_endpoint", allow_legacy_tokeninfo_endpoint) @@ -14436,8 +16794,14 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - oidc_logout_prompt_enabled: bool, - opts: Optional[pulumi.ResourceOptions]=None): + oidc_logout_prompt_enabled: Optional[bool] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if oidc_logout_prompt_enabled is None and 'oidcLogoutPromptEnabled' in kwargs: + oidc_logout_prompt_enabled = kwargs['oidcLogoutPromptEnabled'] + if oidc_logout_prompt_enabled is None: + raise TypeError("Missing 'oidc_logout_prompt_enabled' argument") + _setter("oidc_logout_prompt_enabled", oidc_logout_prompt_enabled) @property @@ -14457,8 +16821,12 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - mode: str, - opts: Optional[pulumi.ResourceOptions]=None): + mode: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if mode is None: + raise TypeError("Missing 'mode' argument") + _setter("mode", mode) @property @@ -14484,11 +16852,25 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - description: str, - name: str, - resource_server_identifier: str, - resource_server_name: str, - opts: Optional[pulumi.ResourceOptions]=None): + description: Optional[str] = None, + name: Optional[str] = None, + resource_server_identifier: Optional[str] = None, + resource_server_name: Optional[str] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if description is None: + raise TypeError("Missing 'description' argument") + if name is None: + raise TypeError("Missing 'name' argument") + if resource_server_identifier is None and 'resourceServerIdentifier' in kwargs: + resource_server_identifier = kwargs['resourceServerIdentifier'] + if resource_server_identifier is None: + raise TypeError("Missing 'resource_server_identifier' argument") + if resource_server_name is None and 'resourceServerName' in kwargs: + resource_server_name = kwargs['resourceServerName'] + if resource_server_name is None: + raise TypeError("Missing 'resource_server_name' argument") + _setter("description", description) _setter("name", name) _setter("resource_server_identifier", resource_server_identifier) diff --git a/sdk/python/pulumi_auth0/pages.py b/sdk/python/pulumi_auth0/pages.py index e973e6bc..8a427f5a 100644 --- a/sdk/python/pulumi_auth0/pages.py +++ b/sdk/python/pulumi_auth0/pages.py @@ -41,7 +41,13 @@ def _configure( error: Optional[pulumi.Input['PagesErrorArgs']] = None, guardian_mfa: Optional[pulumi.Input['PagesGuardianMfaArgs']] = None, login: Optional[pulumi.Input['PagesLoginArgs']] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if change_password is None and 'changePassword' in kwargs: + change_password = kwargs['changePassword'] + if guardian_mfa is None and 'guardianMfa' in kwargs: + guardian_mfa = kwargs['guardianMfa'] + if change_password is not None: _setter("change_password", change_password) if error is not None: @@ -128,7 +134,13 @@ def _configure( error: Optional[pulumi.Input['PagesErrorArgs']] = None, guardian_mfa: Optional[pulumi.Input['PagesGuardianMfaArgs']] = None, login: Optional[pulumi.Input['PagesLoginArgs']] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if change_password is None and 'changePassword' in kwargs: + change_password = kwargs['changePassword'] + if guardian_mfa is None and 'guardianMfa' in kwargs: + guardian_mfa = kwargs['guardianMfa'] + if change_password is not None: _setter("change_password", change_password) if error is not None: @@ -200,32 +212,6 @@ def __init__(__self__, """ With this resource you can manage custom HTML for the Login, Reset Password, Multi-Factor Authentication and Error pages. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_pages = auth0.Pages("myPages", - change_password=auth0.PagesChangePasswordArgs( - enabled=True, - html="My Custom Reset Password Page", - ), - error=auth0.PagesErrorArgs( - html="My Custom Error Page", - show_log_link=True, - url="https://example.com", - ), - guardian_mfa=auth0.PagesGuardianMfaArgs( - enabled=True, - html="My Custom MFA Page", - ), - login=auth0.PagesLoginArgs( - enabled=True, - html="My Custom Login Page", - )) - ``` - ## Import As this is not a resource identifiable by an ID within the Auth0 Management API, pages can be imported using a random string. # We recommend [Version 4 UUID](https://www.uuidgenerator.net/version4) # Example @@ -250,32 +236,6 @@ def __init__(__self__, """ With this resource you can manage custom HTML for the Login, Reset Password, Multi-Factor Authentication and Error pages. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_pages = auth0.Pages("myPages", - change_password=auth0.PagesChangePasswordArgs( - enabled=True, - html="My Custom Reset Password Page", - ), - error=auth0.PagesErrorArgs( - html="My Custom Error Page", - show_log_link=True, - url="https://example.com", - ), - guardian_mfa=auth0.PagesGuardianMfaArgs( - enabled=True, - html="My Custom MFA Page", - ), - login=auth0.PagesLoginArgs( - enabled=True, - html="My Custom Login Page", - )) - ``` - ## Import As this is not a resource identifiable by an ID within the Auth0 Management API, pages can be imported using a random string. # We recommend [Version 4 UUID](https://www.uuidgenerator.net/version4) # Example @@ -316,29 +276,13 @@ def _internal_init(__self__, raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource') __props__ = PagesArgs.__new__(PagesArgs) - if change_password is not None and not isinstance(change_password, PagesChangePasswordArgs): - change_password = change_password or {} - def _setter(key, value): - change_password[key] = value - PagesChangePasswordArgs._configure(_setter, **change_password) + change_password = _utilities.configure(change_password, PagesChangePasswordArgs, True) __props__.__dict__["change_password"] = change_password - if error is not None and not isinstance(error, PagesErrorArgs): - error = error or {} - def _setter(key, value): - error[key] = value - PagesErrorArgs._configure(_setter, **error) + error = _utilities.configure(error, PagesErrorArgs, True) __props__.__dict__["error"] = error - if guardian_mfa is not None and not isinstance(guardian_mfa, PagesGuardianMfaArgs): - guardian_mfa = guardian_mfa or {} - def _setter(key, value): - guardian_mfa[key] = value - PagesGuardianMfaArgs._configure(_setter, **guardian_mfa) + guardian_mfa = _utilities.configure(guardian_mfa, PagesGuardianMfaArgs, True) __props__.__dict__["guardian_mfa"] = guardian_mfa - if login is not None and not isinstance(login, PagesLoginArgs): - login = login or {} - def _setter(key, value): - login[key] = value - PagesLoginArgs._configure(_setter, **login) + login = _utilities.configure(login, PagesLoginArgs, True) __props__.__dict__["login"] = login super(Pages, __self__).__init__( 'auth0:index/pages:Pages', diff --git a/sdk/python/pulumi_auth0/prompt.py b/sdk/python/pulumi_auth0/prompt.py index 946785e8..f23af63a 100644 --- a/sdk/python/pulumi_auth0/prompt.py +++ b/sdk/python/pulumi_auth0/prompt.py @@ -35,7 +35,15 @@ def _configure( identifier_first: Optional[pulumi.Input[bool]] = None, universal_login_experience: Optional[pulumi.Input[str]] = None, webauthn_platform_first_factor: Optional[pulumi.Input[bool]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if identifier_first is None and 'identifierFirst' in kwargs: + identifier_first = kwargs['identifierFirst'] + if universal_login_experience is None and 'universalLoginExperience' in kwargs: + universal_login_experience = kwargs['universalLoginExperience'] + if webauthn_platform_first_factor is None and 'webauthnPlatformFirstFactor' in kwargs: + webauthn_platform_first_factor = kwargs['webauthnPlatformFirstFactor'] + if identifier_first is not None: _setter("identifier_first", identifier_first) if universal_login_experience is not None: @@ -104,7 +112,15 @@ def _configure( identifier_first: Optional[pulumi.Input[bool]] = None, universal_login_experience: Optional[pulumi.Input[str]] = None, webauthn_platform_first_factor: Optional[pulumi.Input[bool]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if identifier_first is None and 'identifierFirst' in kwargs: + identifier_first = kwargs['identifierFirst'] + if universal_login_experience is None and 'universalLoginExperience' in kwargs: + universal_login_experience = kwargs['universalLoginExperience'] + if webauthn_platform_first_factor is None and 'webauthnPlatformFirstFactor' in kwargs: + webauthn_platform_first_factor = kwargs['webauthnPlatformFirstFactor'] + if identifier_first is not None: _setter("identifier_first", identifier_first) if universal_login_experience is not None: @@ -161,18 +177,6 @@ def __init__(__self__, """ With this resource, you can manage your Auth0 prompts, including choosing the login experience version. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_prompt = auth0.Prompt("myPrompt", - identifier_first=False, - universal_login_experience="new", - webauthn_platform_first_factor=True) - ``` - ## Import As this is not a resource identifiable by an ID within the Auth0 Management API, prompts can be imported using a random string. # We recommend [Version 4 UUID](https://www.uuidgenerator.net/version4) # Example @@ -196,18 +200,6 @@ def __init__(__self__, """ With this resource, you can manage your Auth0 prompts, including choosing the login experience version. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_prompt = auth0.Prompt("myPrompt", - identifier_first=False, - universal_login_experience="new", - webauthn_platform_first_factor=True) - ``` - ## Import As this is not a resource identifiable by an ID within the Auth0 Management API, prompts can be imported using a random string. # We recommend [Version 4 UUID](https://www.uuidgenerator.net/version4) # Example diff --git a/sdk/python/pulumi_auth0/prompt_custom_text.py b/sdk/python/pulumi_auth0/prompt_custom_text.py index fa730295..f9a0423b 100644 --- a/sdk/python/pulumi_auth0/prompt_custom_text.py +++ b/sdk/python/pulumi_auth0/prompt_custom_text.py @@ -32,10 +32,18 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - body: pulumi.Input[str], - language: pulumi.Input[str], - prompt: pulumi.Input[str], - opts: Optional[pulumi.ResourceOptions]=None): + body: Optional[pulumi.Input[str]] = None, + language: Optional[pulumi.Input[str]] = None, + prompt: Optional[pulumi.Input[str]] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if body is None: + raise TypeError("Missing 'body' argument") + if language is None: + raise TypeError("Missing 'language' argument") + if prompt is None: + raise TypeError("Missing 'prompt' argument") + _setter("body", body) _setter("language", language) _setter("prompt", prompt) @@ -101,7 +109,9 @@ def _configure( body: Optional[pulumi.Input[str]] = None, language: Optional[pulumi.Input[str]] = None, prompt: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if body is not None: _setter("body", body) if language is not None: @@ -158,41 +168,6 @@ def __init__(__self__, """ With this resource, you can manage custom text on your Auth0 prompts. You can read more about custom texts [here](https://auth0.com/docs/customize/universal-login-pages/customize-login-text-prompts). - ## Example Usage - - ```python - import pulumi - import json - import pulumi_auth0 as auth0 - - example = auth0.PromptCustomText("example", - prompt="login", - language="en", - body=json.dumps({ - "login": { - "alertListTitle": "Alerts", - "buttonText": "Continue", - "description": "Login to", - "editEmailText": "Edit", - "emailPlaceholder": "Email address", - "federatedConnectionButtonText": "Continue with ${connectionName}", - "footerLinkText": "Sign up", - "footerText": "Don't have an account?", - "forgotPasswordText": "Forgot password?", - "invitationDescription": "Log in to accept ${inviterName}'s invitation to join ${companyName} on ${clientName}.", - "invitationTitle": "You've Been Invited!", - "logoAltText": "${companyName}", - "pageTitle": "Log in | ${clientName}", - "passwordPlaceholder": "Password", - "separatorText": "Or", - "signupActionLinkText": "${footerLinkText}", - "signupActionText": "${footerText}", - "title": "Welcome", - "usernamePlaceholder": "Username or email address", - }, - })) - ``` - ## Import This resource can be imported by specifying the prompt and language separated by "::" (note the double colon) :: # Example @@ -216,41 +191,6 @@ def __init__(__self__, """ With this resource, you can manage custom text on your Auth0 prompts. You can read more about custom texts [here](https://auth0.com/docs/customize/universal-login-pages/customize-login-text-prompts). - ## Example Usage - - ```python - import pulumi - import json - import pulumi_auth0 as auth0 - - example = auth0.PromptCustomText("example", - prompt="login", - language="en", - body=json.dumps({ - "login": { - "alertListTitle": "Alerts", - "buttonText": "Continue", - "description": "Login to", - "editEmailText": "Edit", - "emailPlaceholder": "Email address", - "federatedConnectionButtonText": "Continue with ${connectionName}", - "footerLinkText": "Sign up", - "footerText": "Don't have an account?", - "forgotPasswordText": "Forgot password?", - "invitationDescription": "Log in to accept ${inviterName}'s invitation to join ${companyName} on ${clientName}.", - "invitationTitle": "You've Been Invited!", - "logoAltText": "${companyName}", - "pageTitle": "Log in | ${clientName}", - "passwordPlaceholder": "Password", - "separatorText": "Or", - "signupActionLinkText": "${footerLinkText}", - "signupActionText": "${footerText}", - "title": "Welcome", - "usernamePlaceholder": "Username or email address", - }, - })) - ``` - ## Import This resource can be imported by specifying the prompt and language separated by "::" (note the double colon) :: # Example diff --git a/sdk/python/pulumi_auth0/provider.py b/sdk/python/pulumi_auth0/provider.py index 09b6f756..ad9cc55f 100644 --- a/sdk/python/pulumi_auth0/provider.py +++ b/sdk/python/pulumi_auth0/provider.py @@ -50,7 +50,15 @@ def _configure( client_secret: Optional[pulumi.Input[str]] = None, debug: Optional[pulumi.Input[bool]] = None, domain: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if api_token is None and 'apiToken' in kwargs: + api_token = kwargs['apiToken'] + if client_id is None and 'clientId' in kwargs: + client_id = kwargs['clientId'] + if client_secret is None and 'clientSecret' in kwargs: + client_secret = kwargs['clientSecret'] + if api_token is not None: _setter("api_token", api_token) if audience is not None: diff --git a/sdk/python/pulumi_auth0/resource_server.py b/sdk/python/pulumi_auth0/resource_server.py index 2a31b43f..e5d721b1 100644 --- a/sdk/python/pulumi_auth0/resource_server.py +++ b/sdk/python/pulumi_auth0/resource_server.py @@ -56,7 +56,7 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - identifier: pulumi.Input[str], + identifier: Optional[pulumi.Input[str]] = None, allow_offline_access: Optional[pulumi.Input[bool]] = None, enforce_policies: Optional[pulumi.Input[bool]] = None, name: Optional[pulumi.Input[str]] = None, @@ -67,7 +67,29 @@ def _configure( token_lifetime: Optional[pulumi.Input[int]] = None, token_lifetime_for_web: Optional[pulumi.Input[int]] = None, verification_location: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if identifier is None: + raise TypeError("Missing 'identifier' argument") + if allow_offline_access is None and 'allowOfflineAccess' in kwargs: + allow_offline_access = kwargs['allowOfflineAccess'] + if enforce_policies is None and 'enforcePolicies' in kwargs: + enforce_policies = kwargs['enforcePolicies'] + if signing_alg is None and 'signingAlg' in kwargs: + signing_alg = kwargs['signingAlg'] + if signing_secret is None and 'signingSecret' in kwargs: + signing_secret = kwargs['signingSecret'] + if skip_consent_for_verifiable_first_party_clients is None and 'skipConsentForVerifiableFirstPartyClients' in kwargs: + skip_consent_for_verifiable_first_party_clients = kwargs['skipConsentForVerifiableFirstPartyClients'] + if token_dialect is None and 'tokenDialect' in kwargs: + token_dialect = kwargs['tokenDialect'] + if token_lifetime is None and 'tokenLifetime' in kwargs: + token_lifetime = kwargs['tokenLifetime'] + if token_lifetime_for_web is None and 'tokenLifetimeForWeb' in kwargs: + token_lifetime_for_web = kwargs['tokenLifetimeForWeb'] + if verification_location is None and 'verificationLocation' in kwargs: + verification_location = kwargs['verificationLocation'] + _setter("identifier", identifier) if allow_offline_access is not None: _setter("allow_offline_access", allow_offline_access) @@ -279,7 +301,27 @@ def _configure( token_lifetime: Optional[pulumi.Input[int]] = None, token_lifetime_for_web: Optional[pulumi.Input[int]] = None, verification_location: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if allow_offline_access is None and 'allowOfflineAccess' in kwargs: + allow_offline_access = kwargs['allowOfflineAccess'] + if enforce_policies is None and 'enforcePolicies' in kwargs: + enforce_policies = kwargs['enforcePolicies'] + if signing_alg is None and 'signingAlg' in kwargs: + signing_alg = kwargs['signingAlg'] + if signing_secret is None and 'signingSecret' in kwargs: + signing_secret = kwargs['signingSecret'] + if skip_consent_for_verifiable_first_party_clients is None and 'skipConsentForVerifiableFirstPartyClients' in kwargs: + skip_consent_for_verifiable_first_party_clients = kwargs['skipConsentForVerifiableFirstPartyClients'] + if token_dialect is None and 'tokenDialect' in kwargs: + token_dialect = kwargs['tokenDialect'] + if token_lifetime is None and 'tokenLifetime' in kwargs: + token_lifetime = kwargs['tokenLifetime'] + if token_lifetime_for_web is None and 'tokenLifetimeForWeb' in kwargs: + token_lifetime_for_web = kwargs['tokenLifetimeForWeb'] + if verification_location is None and 'verificationLocation' in kwargs: + verification_location = kwargs['verificationLocation'] + if allow_offline_access is not None: _setter("allow_offline_access", allow_offline_access) if enforce_policies is not None: @@ -456,20 +498,6 @@ def __init__(__self__, """ With this resource, you can set up APIs that can be consumed from your authorized applications. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_resource_server = auth0.ResourceServer("myResourceServer", - allow_offline_access=True, - identifier="https://api.example.com", - signing_alg="RS256", - skip_consent_for_verifiable_first_party_clients=True, - token_lifetime=8600) - ``` - ## Import Existing resource servers can be imported using their ID. # Example @@ -501,20 +529,6 @@ def __init__(__self__, """ With this resource, you can set up APIs that can be consumed from your authorized applications. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_resource_server = auth0.ResourceServer("myResourceServer", - allow_offline_access=True, - identifier="https://api.example.com", - signing_alg="RS256", - skip_consent_for_verifiable_first_party_clients=True, - token_lifetime=8600) - ``` - ## Import Existing resource servers can be imported using their ID. # Example diff --git a/sdk/python/pulumi_auth0/resource_server_scope.py b/sdk/python/pulumi_auth0/resource_server_scope.py index 4e916ae4..ba983c59 100644 --- a/sdk/python/pulumi_auth0/resource_server_scope.py +++ b/sdk/python/pulumi_auth0/resource_server_scope.py @@ -32,10 +32,18 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - resource_server_identifier: pulumi.Input[str], - scope: pulumi.Input[str], + resource_server_identifier: Optional[pulumi.Input[str]] = None, + scope: Optional[pulumi.Input[str]] = None, description: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if resource_server_identifier is None and 'resourceServerIdentifier' in kwargs: + resource_server_identifier = kwargs['resourceServerIdentifier'] + if resource_server_identifier is None: + raise TypeError("Missing 'resource_server_identifier' argument") + if scope is None: + raise TypeError("Missing 'scope' argument") + _setter("resource_server_identifier", resource_server_identifier) _setter("scope", scope) if description is not None: @@ -102,7 +110,11 @@ def _configure( description: Optional[pulumi.Input[str]] = None, resource_server_identifier: Optional[pulumi.Input[str]] = None, scope: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if resource_server_identifier is None and 'resourceServerIdentifier' in kwargs: + resource_server_identifier = kwargs['resourceServerIdentifier'] + if description is not None: _setter("description", description) if resource_server_identifier is not None: @@ -163,21 +175,6 @@ def __init__(__self__, all the scopes assigned to a resource server. To avoid potential issues, it is recommended not to use this resource in conjunction with the `ResourceServerScopes` resource when managing scopes for the same resource server id. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - resource_server = auth0.ResourceServer("resourceServer", identifier="https://api.example.com") - read_posts = auth0.ResourceServerScope("readPosts", - resource_server_identifier=resource_server.identifier, - scope="read:posts") - write_posts = auth0.ResourceServerScope("writePosts", - resource_server_identifier=resource_server.identifier, - scope="write:posts") - ``` - ## Import This resource can be imported by specifying the resource identifier and scope name separated by "::" (note the double colon) :: # Example @@ -205,21 +202,6 @@ def __init__(__self__, all the scopes assigned to a resource server. To avoid potential issues, it is recommended not to use this resource in conjunction with the `ResourceServerScopes` resource when managing scopes for the same resource server id. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - resource_server = auth0.ResourceServer("resourceServer", identifier="https://api.example.com") - read_posts = auth0.ResourceServerScope("readPosts", - resource_server_identifier=resource_server.identifier, - scope="read:posts") - write_posts = auth0.ResourceServerScope("writePosts", - resource_server_identifier=resource_server.identifier, - scope="write:posts") - ``` - ## Import This resource can be imported by specifying the resource identifier and scope name separated by "::" (note the double colon) :: # Example diff --git a/sdk/python/pulumi_auth0/resource_server_scopes.py b/sdk/python/pulumi_auth0/resource_server_scopes.py index c8812f9d..818aa6e6 100644 --- a/sdk/python/pulumi_auth0/resource_server_scopes.py +++ b/sdk/python/pulumi_auth0/resource_server_scopes.py @@ -30,9 +30,17 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - resource_server_identifier: pulumi.Input[str], - scopes: pulumi.Input[Sequence[pulumi.Input['ResourceServerScopesScopeArgs']]], - opts: Optional[pulumi.ResourceOptions]=None): + resource_server_identifier: Optional[pulumi.Input[str]] = None, + scopes: Optional[pulumi.Input[Sequence[pulumi.Input['ResourceServerScopesScopeArgs']]]] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if resource_server_identifier is None and 'resourceServerIdentifier' in kwargs: + resource_server_identifier = kwargs['resourceServerIdentifier'] + if resource_server_identifier is None: + raise TypeError("Missing 'resource_server_identifier' argument") + if scopes is None: + raise TypeError("Missing 'scopes' argument") + _setter("resource_server_identifier", resource_server_identifier) _setter("scopes", scopes) @@ -77,7 +85,11 @@ def _configure( _setter: Callable[[Any, Any], None], resource_server_identifier: Optional[pulumi.Input[str]] = None, scopes: Optional[pulumi.Input[Sequence[pulumi.Input['ResourceServerScopesScopeArgs']]]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if resource_server_identifier is None and 'resourceServerIdentifier' in kwargs: + resource_server_identifier = kwargs['resourceServerIdentifier'] + if resource_server_identifier is not None: _setter("resource_server_identifier", resource_server_identifier) if scopes is not None: @@ -121,27 +133,6 @@ def __init__(__self__, resource in conjunction with the `ResourceServerScope` resource when managing scopes for the same resource server id. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_api = auth0.ResourceServer("myApi", identifier="https://api.example.com") - my_api_scopes = auth0.ResourceServerScopes("myApiScopes", - resource_server_identifier=my_api.identifier, - scopes=[ - auth0.ResourceServerScopesScopeArgs( - name="create:appointments", - description="Ability to create appointments", - ), - auth0.ResourceServerScopesScopeArgs( - name="read:appointments", - description="Ability to read appointments", - ), - ]) - ``` - ## Import This resource can be imported by specifying the resource server identifier. # Example @@ -168,27 +159,6 @@ def __init__(__self__, resource in conjunction with the `ResourceServerScope` resource when managing scopes for the same resource server id. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_api = auth0.ResourceServer("myApi", identifier="https://api.example.com") - my_api_scopes = auth0.ResourceServerScopes("myApiScopes", - resource_server_identifier=my_api.identifier, - scopes=[ - auth0.ResourceServerScopesScopeArgs( - name="create:appointments", - description="Ability to create appointments", - ), - auth0.ResourceServerScopesScopeArgs( - name="read:appointments", - description="Ability to read appointments", - ), - ]) - ``` - ## Import This resource can be imported by specifying the resource server identifier. # Example diff --git a/sdk/python/pulumi_auth0/role.py b/sdk/python/pulumi_auth0/role.py index a2c56946..72e03221 100644 --- a/sdk/python/pulumi_auth0/role.py +++ b/sdk/python/pulumi_auth0/role.py @@ -31,7 +31,9 @@ def _configure( _setter: Callable[[Any, Any], None], description: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if description is None: description = 'Managed by Pulumi' if description is not None: @@ -84,7 +86,9 @@ def _configure( _setter: Callable[[Any, Any], None], description: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if description is None: description = 'Managed by Pulumi' if description is not None: @@ -128,15 +132,6 @@ def __init__(__self__, """ With this resource, you can create and manage collections of permissions that can be assigned to users, which are otherwise known as roles. Permissions (scopes) are created on `ResourceServer`, then associated with roles and optionally, users using this resource. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_role = auth0.Role("myRole", description="Role Description...") - ``` - ## Import Existing roles can be imported using their ID. # Example @@ -159,15 +154,6 @@ def __init__(__self__, """ With this resource, you can create and manage collections of permissions that can be assigned to users, which are otherwise known as roles. Permissions (scopes) are created on `ResourceServer`, then associated with roles and optionally, users using this resource. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_role = auth0.Role("myRole", description="Role Description...") - ``` - ## Import Existing roles can be imported using their ID. # Example diff --git a/sdk/python/pulumi_auth0/role_permission.py b/sdk/python/pulumi_auth0/role_permission.py index d54bb14d..9d77f5ac 100644 --- a/sdk/python/pulumi_auth0/role_permission.py +++ b/sdk/python/pulumi_auth0/role_permission.py @@ -32,10 +32,22 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - permission: pulumi.Input[str], - resource_server_identifier: pulumi.Input[str], - role_id: pulumi.Input[str], - opts: Optional[pulumi.ResourceOptions]=None): + permission: Optional[pulumi.Input[str]] = None, + resource_server_identifier: Optional[pulumi.Input[str]] = None, + role_id: Optional[pulumi.Input[str]] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if permission is None: + raise TypeError("Missing 'permission' argument") + if resource_server_identifier is None and 'resourceServerIdentifier' in kwargs: + resource_server_identifier = kwargs['resourceServerIdentifier'] + if resource_server_identifier is None: + raise TypeError("Missing 'resource_server_identifier' argument") + if role_id is None and 'roleId' in kwargs: + role_id = kwargs['roleId'] + if role_id is None: + raise TypeError("Missing 'role_id' argument") + _setter("permission", permission) _setter("resource_server_identifier", resource_server_identifier) _setter("role_id", role_id) @@ -109,7 +121,15 @@ def _configure( resource_server_identifier: Optional[pulumi.Input[str]] = None, resource_server_name: Optional[pulumi.Input[str]] = None, role_id: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if resource_server_identifier is None and 'resourceServerIdentifier' in kwargs: + resource_server_identifier = kwargs['resourceServerIdentifier'] + if resource_server_name is None and 'resourceServerName' in kwargs: + resource_server_name = kwargs['resourceServerName'] + if role_id is None and 'roleId' in kwargs: + role_id = kwargs['roleId'] + if description is not None: _setter("description", description) if permission is not None: diff --git a/sdk/python/pulumi_auth0/role_permissions.py b/sdk/python/pulumi_auth0/role_permissions.py index 4030215f..400f2c23 100644 --- a/sdk/python/pulumi_auth0/role_permissions.py +++ b/sdk/python/pulumi_auth0/role_permissions.py @@ -31,9 +31,17 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - permissions: pulumi.Input[Sequence[pulumi.Input['RolePermissionsPermissionArgs']]], - role_id: pulumi.Input[str], - opts: Optional[pulumi.ResourceOptions]=None): + permissions: Optional[pulumi.Input[Sequence[pulumi.Input['RolePermissionsPermissionArgs']]]] = None, + role_id: Optional[pulumi.Input[str]] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if permissions is None: + raise TypeError("Missing 'permissions' argument") + if role_id is None and 'roleId' in kwargs: + role_id = kwargs['roleId'] + if role_id is None: + raise TypeError("Missing 'role_id' argument") + _setter("permissions", permissions) _setter("role_id", role_id) @@ -82,7 +90,11 @@ def _configure( _setter: Callable[[Any, Any], None], permissions: Optional[pulumi.Input[Sequence[pulumi.Input['RolePermissionsPermissionArgs']]]] = None, role_id: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if role_id is None and 'roleId' in kwargs: + role_id = kwargs['roleId'] + if permissions is not None: _setter("permissions", permissions) if role_id is not None: diff --git a/sdk/python/pulumi_auth0/rule.py b/sdk/python/pulumi_auth0/rule.py index a5368898..a55c0005 100644 --- a/sdk/python/pulumi_auth0/rule.py +++ b/sdk/python/pulumi_auth0/rule.py @@ -35,11 +35,15 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - script: pulumi.Input[str], + script: Optional[pulumi.Input[str]] = None, enabled: Optional[pulumi.Input[bool]] = None, name: Optional[pulumi.Input[str]] = None, order: Optional[pulumi.Input[int]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if script is None: + raise TypeError("Missing 'script' argument") + _setter("script", script) if enabled is not None: _setter("enabled", enabled) @@ -125,7 +129,9 @@ def _configure( name: Optional[pulumi.Input[str]] = None, order: Optional[pulumi.Input[int]] = None, script: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if enabled is not None: _setter("enabled", enabled) if name is not None: @@ -199,21 +205,6 @@ def __init__(__self__, !> This resource is deprecated. Refer to the [guide on how to migrate from rules to actions](https://auth0.com/docs/customize/actions/migrate/migrate-from-rules-to-actions) and manage your actions using the `Action` resource. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_rule = auth0.Rule("myRule", - enabled=True, - script=\"\"\" function (user, context, callback) { - callback(null, user, context); - } - - \"\"\") - ``` - ## Import Existing rules can be imported using their ID. # Example @@ -240,21 +231,6 @@ def __init__(__self__, !> This resource is deprecated. Refer to the [guide on how to migrate from rules to actions](https://auth0.com/docs/customize/actions/migrate/migrate-from-rules-to-actions) and manage your actions using the `Action` resource. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_rule = auth0.Rule("myRule", - enabled=True, - script=\"\"\" function (user, context, callback) { - callback(null, user, context); - } - - \"\"\") - ``` - ## Import Existing rules can be imported using their ID. # Example diff --git a/sdk/python/pulumi_auth0/rule_config.py b/sdk/python/pulumi_auth0/rule_config.py index 7b154b63..df16b021 100644 --- a/sdk/python/pulumi_auth0/rule_config.py +++ b/sdk/python/pulumi_auth0/rule_config.py @@ -29,9 +29,15 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - key: pulumi.Input[str], - value: pulumi.Input[str], - opts: Optional[pulumi.ResourceOptions]=None): + key: Optional[pulumi.Input[str]] = None, + value: Optional[pulumi.Input[str]] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if key is None: + raise TypeError("Missing 'key' argument") + if value is None: + raise TypeError("Missing 'value' argument") + _setter("key", key) _setter("value", value) @@ -80,7 +86,9 @@ def _configure( _setter: Callable[[Any, Any], None], key: Optional[pulumi.Input[str]] = None, value: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if key is not None: _setter("key", key) if value is not None: @@ -122,24 +130,6 @@ def __init__(__self__, """ With Auth0, you can create custom Javascript snippets that run in a secure, isolated sandbox as part of your authentication pipeline, which are otherwise known as rules. This resource allows you to create and manage variables that are available to all rules via Auth0's global configuration object. Used in conjunction with configured rules. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_rule = auth0.Rule("myRule", - enabled=True, - script=\"\"\" function (user, context, callback) { - callback(null, user, context); - } - - \"\"\") - my_rule_config = auth0.RuleConfig("myRuleConfig", - key="foo", - value="bar") - ``` - ## Import Existing rule configs can be imported using their key name. # Example @@ -162,24 +152,6 @@ def __init__(__self__, """ With Auth0, you can create custom Javascript snippets that run in a secure, isolated sandbox as part of your authentication pipeline, which are otherwise known as rules. This resource allows you to create and manage variables that are available to all rules via Auth0's global configuration object. Used in conjunction with configured rules. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_rule = auth0.Rule("myRule", - enabled=True, - script=\"\"\" function (user, context, callback) { - callback(null, user, context); - } - - \"\"\") - my_rule_config = auth0.RuleConfig("myRuleConfig", - key="foo", - value="bar") - ``` - ## Import Existing rule configs can be imported using their key name. # Example diff --git a/sdk/python/pulumi_auth0/tenant.py b/sdk/python/pulumi_auth0/tenant.py index 01e19ed5..4e3c9f21 100644 --- a/sdk/python/pulumi_auth0/tenant.py +++ b/sdk/python/pulumi_auth0/tenant.py @@ -89,7 +89,37 @@ def _configure( sessions: Optional[pulumi.Input['TenantSessionsArgs']] = None, support_email: Optional[pulumi.Input[str]] = None, support_url: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if allow_organization_name_in_authentication_api is None and 'allowOrganizationNameInAuthenticationApi' in kwargs: + allow_organization_name_in_authentication_api = kwargs['allowOrganizationNameInAuthenticationApi'] + if allowed_logout_urls is None and 'allowedLogoutUrls' in kwargs: + allowed_logout_urls = kwargs['allowedLogoutUrls'] + if default_audience is None and 'defaultAudience' in kwargs: + default_audience = kwargs['defaultAudience'] + if default_directory is None and 'defaultDirectory' in kwargs: + default_directory = kwargs['defaultDirectory'] + if default_redirection_uri is None and 'defaultRedirectionUri' in kwargs: + default_redirection_uri = kwargs['defaultRedirectionUri'] + if enabled_locales is None and 'enabledLocales' in kwargs: + enabled_locales = kwargs['enabledLocales'] + if friendly_name is None and 'friendlyName' in kwargs: + friendly_name = kwargs['friendlyName'] + if idle_session_lifetime is None and 'idleSessionLifetime' in kwargs: + idle_session_lifetime = kwargs['idleSessionLifetime'] + if picture_url is None and 'pictureUrl' in kwargs: + picture_url = kwargs['pictureUrl'] + if sandbox_version is None and 'sandboxVersion' in kwargs: + sandbox_version = kwargs['sandboxVersion'] + if session_cookie is None and 'sessionCookie' in kwargs: + session_cookie = kwargs['sessionCookie'] + if session_lifetime is None and 'sessionLifetime' in kwargs: + session_lifetime = kwargs['sessionLifetime'] + if support_email is None and 'supportEmail' in kwargs: + support_email = kwargs['supportEmail'] + if support_url is None and 'supportUrl' in kwargs: + support_url = kwargs['supportUrl'] + if allow_organization_name_in_authentication_api is not None: _setter("allow_organization_name_in_authentication_api", allow_organization_name_in_authentication_api) if allowed_logout_urls is not None: @@ -392,7 +422,37 @@ def _configure( sessions: Optional[pulumi.Input['TenantSessionsArgs']] = None, support_email: Optional[pulumi.Input[str]] = None, support_url: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if allow_organization_name_in_authentication_api is None and 'allowOrganizationNameInAuthenticationApi' in kwargs: + allow_organization_name_in_authentication_api = kwargs['allowOrganizationNameInAuthenticationApi'] + if allowed_logout_urls is None and 'allowedLogoutUrls' in kwargs: + allowed_logout_urls = kwargs['allowedLogoutUrls'] + if default_audience is None and 'defaultAudience' in kwargs: + default_audience = kwargs['defaultAudience'] + if default_directory is None and 'defaultDirectory' in kwargs: + default_directory = kwargs['defaultDirectory'] + if default_redirection_uri is None and 'defaultRedirectionUri' in kwargs: + default_redirection_uri = kwargs['defaultRedirectionUri'] + if enabled_locales is None and 'enabledLocales' in kwargs: + enabled_locales = kwargs['enabledLocales'] + if friendly_name is None and 'friendlyName' in kwargs: + friendly_name = kwargs['friendlyName'] + if idle_session_lifetime is None and 'idleSessionLifetime' in kwargs: + idle_session_lifetime = kwargs['idleSessionLifetime'] + if picture_url is None and 'pictureUrl' in kwargs: + picture_url = kwargs['pictureUrl'] + if sandbox_version is None and 'sandboxVersion' in kwargs: + sandbox_version = kwargs['sandboxVersion'] + if session_cookie is None and 'sessionCookie' in kwargs: + session_cookie = kwargs['sessionCookie'] + if session_lifetime is None and 'sessionLifetime' in kwargs: + session_lifetime = kwargs['sessionLifetime'] + if support_email is None and 'supportEmail' in kwargs: + support_email = kwargs['supportEmail'] + if support_url is None and 'supportUrl' in kwargs: + support_url = kwargs['supportUrl'] + if allow_organization_name_in_authentication_api is not None: _setter("allow_organization_name_in_authentication_api", allow_organization_name_in_authentication_api) if allowed_logout_urls is not None: @@ -647,38 +707,6 @@ def __init__(__self__, > Creating tenants through the Management API is not currently supported. Therefore, this resource can only manage an existing tenant created through the Auth0 dashboard. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_tenant = auth0.Tenant("myTenant", - allowed_logout_urls=["http://example.com/logout"], - default_redirection_uri="https://example.com/login", - enabled_locales=["en"], - flags=auth0.TenantFlagsArgs( - disable_clickjack_protection_headers=True, - disable_fields_map_fix=False, - disable_management_api_sms_obfuscation=False, - enable_public_signup_user_exists_error=True, - no_disclose_enterprise_connections=False, - use_scope_descriptions_for_consent=True, - ), - friendly_name="Tenant Name", - picture_url="http://example.com/logo.png", - sandbox_version="12", - session_cookie=auth0.TenantSessionCookieArgs( - mode="non-persistent", - ), - session_lifetime=8760, - sessions=auth0.TenantSessionsArgs( - oidc_logout_prompt_enabled=False, - ), - support_email="support@example.com", - support_url="http://example.com/support") - ``` - ## Import As this is not a resource identifiable by an ID within the Auth0 Management API, tenant can be imported using a random string. # We recommend [Version 4 UUID](https://www.uuidgenerator.net/version4) # Example @@ -718,38 +746,6 @@ def __init__(__self__, > Creating tenants through the Management API is not currently supported. Therefore, this resource can only manage an existing tenant created through the Auth0 dashboard. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - my_tenant = auth0.Tenant("myTenant", - allowed_logout_urls=["http://example.com/logout"], - default_redirection_uri="https://example.com/login", - enabled_locales=["en"], - flags=auth0.TenantFlagsArgs( - disable_clickjack_protection_headers=True, - disable_fields_map_fix=False, - disable_management_api_sms_obfuscation=False, - enable_public_signup_user_exists_error=True, - no_disclose_enterprise_connections=False, - use_scope_descriptions_for_consent=True, - ), - friendly_name="Tenant Name", - picture_url="http://example.com/logo.png", - sandbox_version="12", - session_cookie=auth0.TenantSessionCookieArgs( - mode="non-persistent", - ), - session_lifetime=8760, - sessions=auth0.TenantSessionsArgs( - oidc_logout_prompt_enabled=False, - ), - support_email="support@example.com", - support_url="http://example.com/support") - ``` - ## Import As this is not a resource identifiable by an ID within the Auth0 Management API, tenant can be imported using a random string. # We recommend [Version 4 UUID](https://www.uuidgenerator.net/version4) # Example @@ -808,28 +804,16 @@ def _internal_init(__self__, __props__.__dict__["default_directory"] = default_directory __props__.__dict__["default_redirection_uri"] = default_redirection_uri __props__.__dict__["enabled_locales"] = enabled_locales - if flags is not None and not isinstance(flags, TenantFlagsArgs): - flags = flags or {} - def _setter(key, value): - flags[key] = value - TenantFlagsArgs._configure(_setter, **flags) + flags = _utilities.configure(flags, TenantFlagsArgs, True) __props__.__dict__["flags"] = flags __props__.__dict__["friendly_name"] = friendly_name __props__.__dict__["idle_session_lifetime"] = idle_session_lifetime __props__.__dict__["picture_url"] = picture_url __props__.__dict__["sandbox_version"] = sandbox_version - if session_cookie is not None and not isinstance(session_cookie, TenantSessionCookieArgs): - session_cookie = session_cookie or {} - def _setter(key, value): - session_cookie[key] = value - TenantSessionCookieArgs._configure(_setter, **session_cookie) + session_cookie = _utilities.configure(session_cookie, TenantSessionCookieArgs, True) __props__.__dict__["session_cookie"] = session_cookie __props__.__dict__["session_lifetime"] = session_lifetime - if sessions is not None and not isinstance(sessions, TenantSessionsArgs): - sessions = sessions or {} - def _setter(key, value): - sessions[key] = value - TenantSessionsArgs._configure(_setter, **sessions) + sessions = _utilities.configure(sessions, TenantSessionsArgs, True) __props__.__dict__["sessions"] = sessions __props__.__dict__["support_email"] = support_email __props__.__dict__["support_url"] = support_url diff --git a/sdk/python/pulumi_auth0/trigger_action.py b/sdk/python/pulumi_auth0/trigger_action.py index 5d950b18..a547c859 100644 --- a/sdk/python/pulumi_auth0/trigger_action.py +++ b/sdk/python/pulumi_auth0/trigger_action.py @@ -32,10 +32,20 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - action_id: pulumi.Input[str], - trigger: pulumi.Input[str], + action_id: Optional[pulumi.Input[str]] = None, + trigger: Optional[pulumi.Input[str]] = None, display_name: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if action_id is None and 'actionId' in kwargs: + action_id = kwargs['actionId'] + if action_id is None: + raise TypeError("Missing 'action_id' argument") + if trigger is None: + raise TypeError("Missing 'trigger' argument") + if display_name is None and 'displayName' in kwargs: + display_name = kwargs['displayName'] + _setter("action_id", action_id) _setter("trigger", trigger) if display_name is not None: @@ -102,7 +112,13 @@ def _configure( action_id: Optional[pulumi.Input[str]] = None, display_name: Optional[pulumi.Input[str]] = None, trigger: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if action_id is None and 'actionId' in kwargs: + action_id = kwargs['actionId'] + if display_name is None and 'displayName' in kwargs: + display_name = kwargs['displayName'] + if action_id is not None: _setter("action_id", action_id) if display_name is not None: @@ -165,27 +181,6 @@ def __init__(__self__, the action bindings to a trigger. To avoid potential issues, it is recommended not to use this resource in conjunction with the `TriggerAction` resource when binding actions to the same trigger. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - login_alert = auth0.Action("loginAlert", - code=\"\"\"exports.onContinuePostLogin = async (event, api) => { - console.log("foo"); - };" - \"\"\", - deploy=True, - supported_triggers=auth0.ActionSupportedTriggersArgs( - id="post-login", - version="v3", - )) - post_login_alert_action = auth0.TriggerAction("postLoginAlertAction", - trigger="post-login", - action_id=login_alert.id) - ``` - ## Import This resource can be imported by specifying the trigger and action ID separated by "::" (note the double colon) :: # Example @@ -215,27 +210,6 @@ def __init__(__self__, the action bindings to a trigger. To avoid potential issues, it is recommended not to use this resource in conjunction with the `TriggerAction` resource when binding actions to the same trigger. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - login_alert = auth0.Action("loginAlert", - code=\"\"\"exports.onContinuePostLogin = async (event, api) => { - console.log("foo"); - };" - \"\"\", - deploy=True, - supported_triggers=auth0.ActionSupportedTriggersArgs( - id="post-login", - version="v3", - )) - post_login_alert_action = auth0.TriggerAction("postLoginAlertAction", - trigger="post-login", - action_id=login_alert.id) - ``` - ## Import This resource can be imported by specifying the trigger and action ID separated by "::" (note the double colon) :: # Example diff --git a/sdk/python/pulumi_auth0/trigger_actions.py b/sdk/python/pulumi_auth0/trigger_actions.py index 14b28268..8619c633 100644 --- a/sdk/python/pulumi_auth0/trigger_actions.py +++ b/sdk/python/pulumi_auth0/trigger_actions.py @@ -31,9 +31,15 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - actions: pulumi.Input[Sequence[pulumi.Input['TriggerActionsActionArgs']]], - trigger: pulumi.Input[str], - opts: Optional[pulumi.ResourceOptions]=None): + actions: Optional[pulumi.Input[Sequence[pulumi.Input['TriggerActionsActionArgs']]]] = None, + trigger: Optional[pulumi.Input[str]] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if actions is None: + raise TypeError("Missing 'actions' argument") + if trigger is None: + raise TypeError("Missing 'trigger' argument") + _setter("actions", actions) _setter("trigger", trigger) @@ -82,7 +88,9 @@ def _configure( _setter: Callable[[Any, Any], None], actions: Optional[pulumi.Input[Sequence[pulumi.Input['TriggerActionsActionArgs']]]] = None, trigger: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if actions is not None: _setter("actions", actions) if trigger is not None: @@ -128,46 +136,6 @@ def __init__(__self__, appends an action to the trigger binding. To avoid potential issues, it is recommended not to use this resource in conjunction with the `TriggerAction` resource when binding actions to the same trigger. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - action_foo = auth0.Action("actionFoo", - code=\"\"\"exports.onContinuePostLogin = async (event, api) => { - console.log("foo"); - };" - \"\"\", - deploy=True, - supported_triggers=auth0.ActionSupportedTriggersArgs( - id="post-login", - version="v3", - )) - action_bar = auth0.Action("actionBar", - code=\"\"\"exports.onContinuePostLogin = async (event, api) => { - console.log("bar"); - };" - \"\"\", - deploy=True, - supported_triggers=auth0.ActionSupportedTriggersArgs( - id="post-login", - version="v3", - )) - login_flow = auth0.TriggerActions("loginFlow", - trigger="post-login", - actions=[ - auth0.TriggerActionsActionArgs( - id=action_foo.id, - display_name=action_foo.name, - ), - auth0.TriggerActionsActionArgs( - id=action_bar.id, - display_name=action_bar.name, - ), - ]) - ``` - ## Import This resource can be imported using the bindings trigger ID. # Example @@ -194,46 +162,6 @@ def __init__(__self__, appends an action to the trigger binding. To avoid potential issues, it is recommended not to use this resource in conjunction with the `TriggerAction` resource when binding actions to the same trigger. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - action_foo = auth0.Action("actionFoo", - code=\"\"\"exports.onContinuePostLogin = async (event, api) => { - console.log("foo"); - };" - \"\"\", - deploy=True, - supported_triggers=auth0.ActionSupportedTriggersArgs( - id="post-login", - version="v3", - )) - action_bar = auth0.Action("actionBar", - code=\"\"\"exports.onContinuePostLogin = async (event, api) => { - console.log("bar"); - };" - \"\"\", - deploy=True, - supported_triggers=auth0.ActionSupportedTriggersArgs( - id="post-login", - version="v3", - )) - login_flow = auth0.TriggerActions("loginFlow", - trigger="post-login", - actions=[ - auth0.TriggerActionsActionArgs( - id=action_foo.id, - display_name=action_foo.name, - ), - auth0.TriggerActionsActionArgs( - id=action_bar.id, - display_name=action_bar.name, - ), - ]) - ``` - ## Import This resource can be imported using the bindings trigger ID. # Example diff --git a/sdk/python/pulumi_auth0/user.py b/sdk/python/pulumi_auth0/user.py index 495c9ebd..02ea33e7 100644 --- a/sdk/python/pulumi_auth0/user.py +++ b/sdk/python/pulumi_auth0/user.py @@ -74,7 +74,7 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - connection_name: pulumi.Input[str], + connection_name: Optional[pulumi.Input[str]] = None, app_metadata: Optional[pulumi.Input[str]] = None, blocked: Optional[pulumi.Input[bool]] = None, email: Optional[pulumi.Input[str]] = None, @@ -91,7 +91,31 @@ def _configure( user_metadata: Optional[pulumi.Input[str]] = None, username: Optional[pulumi.Input[str]] = None, verify_email: Optional[pulumi.Input[bool]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if connection_name is None and 'connectionName' in kwargs: + connection_name = kwargs['connectionName'] + if connection_name is None: + raise TypeError("Missing 'connection_name' argument") + if app_metadata is None and 'appMetadata' in kwargs: + app_metadata = kwargs['appMetadata'] + if email_verified is None and 'emailVerified' in kwargs: + email_verified = kwargs['emailVerified'] + if family_name is None and 'familyName' in kwargs: + family_name = kwargs['familyName'] + if given_name is None and 'givenName' in kwargs: + given_name = kwargs['givenName'] + if phone_number is None and 'phoneNumber' in kwargs: + phone_number = kwargs['phoneNumber'] + if phone_verified is None and 'phoneVerified' in kwargs: + phone_verified = kwargs['phoneVerified'] + if user_id is None and 'userId' in kwargs: + user_id = kwargs['userId'] + if user_metadata is None and 'userMetadata' in kwargs: + user_metadata = kwargs['userMetadata'] + if verify_email is None and 'verifyEmail' in kwargs: + verify_email = kwargs['verifyEmail'] + _setter("connection_name", connection_name) if app_metadata is not None: _setter("app_metadata", app_metadata) @@ -411,7 +435,29 @@ def _configure( user_metadata: Optional[pulumi.Input[str]] = None, username: Optional[pulumi.Input[str]] = None, verify_email: Optional[pulumi.Input[bool]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if app_metadata is None and 'appMetadata' in kwargs: + app_metadata = kwargs['appMetadata'] + if connection_name is None and 'connectionName' in kwargs: + connection_name = kwargs['connectionName'] + if email_verified is None and 'emailVerified' in kwargs: + email_verified = kwargs['emailVerified'] + if family_name is None and 'familyName' in kwargs: + family_name = kwargs['familyName'] + if given_name is None and 'givenName' in kwargs: + given_name = kwargs['givenName'] + if phone_number is None and 'phoneNumber' in kwargs: + phone_number = kwargs['phoneNumber'] + if phone_verified is None and 'phoneVerified' in kwargs: + phone_verified = kwargs['phoneVerified'] + if user_id is None and 'userId' in kwargs: + user_id = kwargs['userId'] + if user_metadata is None and 'userMetadata' in kwargs: + user_metadata = kwargs['userMetadata'] + if verify_email is None and 'verifyEmail' in kwargs: + verify_email = kwargs['verifyEmail'] + if app_metadata is not None: _setter("app_metadata", app_metadata) if blocked is not None: @@ -678,23 +724,6 @@ def __init__(__self__, """ With this resource, you can manage user identities, including resetting passwords, and creating, provisioning, blocking, and deleting users. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - user = auth0.User("user", - connection_name="Username-Password-Authentication", - email="test@test.com", - email_verified=True, - nickname="some.nickname", - password="passpass$12$12", - picture="https://www.example.com/a-valid-picture-url.jpg", - user_id="12345", - username="unique_username") - ``` - ## Import This resource can be imported using the user ID. # Example @@ -732,23 +761,6 @@ def __init__(__self__, """ With this resource, you can manage user identities, including resetting passwords, and creating, provisioning, blocking, and deleting users. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - user = auth0.User("user", - connection_name="Username-Password-Authentication", - email="test@test.com", - email_verified=True, - nickname="some.nickname", - password="passpass$12$12", - picture="https://www.example.com/a-valid-picture-url.jpg", - user_id="12345", - username="unique_username") - ``` - ## Import This resource can be imported using the user ID. # Example diff --git a/sdk/python/pulumi_auth0/user_permission.py b/sdk/python/pulumi_auth0/user_permission.py index 9df64a3f..cb6c550d 100644 --- a/sdk/python/pulumi_auth0/user_permission.py +++ b/sdk/python/pulumi_auth0/user_permission.py @@ -32,10 +32,22 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - permission: pulumi.Input[str], - resource_server_identifier: pulumi.Input[str], - user_id: pulumi.Input[str], - opts: Optional[pulumi.ResourceOptions]=None): + permission: Optional[pulumi.Input[str]] = None, + resource_server_identifier: Optional[pulumi.Input[str]] = None, + user_id: Optional[pulumi.Input[str]] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if permission is None: + raise TypeError("Missing 'permission' argument") + if resource_server_identifier is None and 'resourceServerIdentifier' in kwargs: + resource_server_identifier = kwargs['resourceServerIdentifier'] + if resource_server_identifier is None: + raise TypeError("Missing 'resource_server_identifier' argument") + if user_id is None and 'userId' in kwargs: + user_id = kwargs['userId'] + if user_id is None: + raise TypeError("Missing 'user_id' argument") + _setter("permission", permission) _setter("resource_server_identifier", resource_server_identifier) _setter("user_id", user_id) @@ -109,7 +121,15 @@ def _configure( resource_server_identifier: Optional[pulumi.Input[str]] = None, resource_server_name: Optional[pulumi.Input[str]] = None, user_id: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if resource_server_identifier is None and 'resourceServerIdentifier' in kwargs: + resource_server_identifier = kwargs['resourceServerIdentifier'] + if resource_server_name is None and 'resourceServerName' in kwargs: + resource_server_name = kwargs['resourceServerName'] + if user_id is None and 'userId' in kwargs: + user_id = kwargs['userId'] + if description is not None: _setter("description", description) if permission is not None: diff --git a/sdk/python/pulumi_auth0/user_permissions.py b/sdk/python/pulumi_auth0/user_permissions.py index 5799b32c..4f5f95aa 100644 --- a/sdk/python/pulumi_auth0/user_permissions.py +++ b/sdk/python/pulumi_auth0/user_permissions.py @@ -31,9 +31,17 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - permissions: pulumi.Input[Sequence[pulumi.Input['UserPermissionsPermissionArgs']]], - user_id: pulumi.Input[str], - opts: Optional[pulumi.ResourceOptions]=None): + permissions: Optional[pulumi.Input[Sequence[pulumi.Input['UserPermissionsPermissionArgs']]]] = None, + user_id: Optional[pulumi.Input[str]] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if permissions is None: + raise TypeError("Missing 'permissions' argument") + if user_id is None and 'userId' in kwargs: + user_id = kwargs['userId'] + if user_id is None: + raise TypeError("Missing 'user_id' argument") + _setter("permissions", permissions) _setter("user_id", user_id) @@ -82,7 +90,11 @@ def _configure( _setter: Callable[[Any, Any], None], permissions: Optional[pulumi.Input[Sequence[pulumi.Input['UserPermissionsPermissionArgs']]]] = None, user_id: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if user_id is None and 'userId' in kwargs: + user_id = kwargs['userId'] + if permissions is not None: _setter("permissions", permissions) if user_id is not None: diff --git a/sdk/python/pulumi_auth0/user_role.py b/sdk/python/pulumi_auth0/user_role.py index c2cfaaf2..28d0f2b6 100644 --- a/sdk/python/pulumi_auth0/user_role.py +++ b/sdk/python/pulumi_auth0/user_role.py @@ -29,9 +29,19 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - role_id: pulumi.Input[str], - user_id: pulumi.Input[str], - opts: Optional[pulumi.ResourceOptions]=None): + role_id: Optional[pulumi.Input[str]] = None, + user_id: Optional[pulumi.Input[str]] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if role_id is None and 'roleId' in kwargs: + role_id = kwargs['roleId'] + if role_id is None: + raise TypeError("Missing 'role_id' argument") + if user_id is None and 'userId' in kwargs: + user_id = kwargs['userId'] + if user_id is None: + raise TypeError("Missing 'user_id' argument") + _setter("role_id", role_id) _setter("user_id", user_id) @@ -88,7 +98,17 @@ def _configure( role_id: Optional[pulumi.Input[str]] = None, role_name: Optional[pulumi.Input[str]] = None, user_id: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if role_description is None and 'roleDescription' in kwargs: + role_description = kwargs['roleDescription'] + if role_id is None and 'roleId' in kwargs: + role_id = kwargs['roleId'] + if role_name is None and 'roleName' in kwargs: + role_name = kwargs['roleName'] + if user_id is None and 'userId' in kwargs: + user_id = kwargs['userId'] + if role_description is not None: _setter("role_description", role_description) if role_id is not None: @@ -162,24 +182,6 @@ def __init__(__self__, to a user. To avoid potential issues, it is recommended not to use this resource in conjunction with the `UserRoles` resource when managing roles for the same user id. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - # Example: - admin = auth0.Role("admin", description="Administrator") - user = auth0.User("user", - connection_name="Username-Password-Authentication", - username="unique_username", - email="test@test.com", - password="passpass$12$12") - user_roles = auth0.UserRole("userRoles", - user_id=user.id, - role_id=admin.id) - ``` - ## Import This resource can be imported by specifying the user ID and role ID separated by "::" (note the double colon) :: # Example @@ -206,24 +208,6 @@ def __init__(__self__, to a user. To avoid potential issues, it is recommended not to use this resource in conjunction with the `UserRoles` resource when managing roles for the same user id. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - # Example: - admin = auth0.Role("admin", description="Administrator") - user = auth0.User("user", - connection_name="Username-Password-Authentication", - username="unique_username", - email="test@test.com", - password="passpass$12$12") - user_roles = auth0.UserRole("userRoles", - user_id=user.id, - role_id=admin.id) - ``` - ## Import This resource can be imported by specifying the user ID and role ID separated by "::" (note the double colon) :: # Example diff --git a/sdk/python/pulumi_auth0/user_roles.py b/sdk/python/pulumi_auth0/user_roles.py index 9a54ca7c..f9b6cf87 100644 --- a/sdk/python/pulumi_auth0/user_roles.py +++ b/sdk/python/pulumi_auth0/user_roles.py @@ -29,9 +29,17 @@ def __init__(__self__, *, @staticmethod def _configure( _setter: Callable[[Any, Any], None], - roles: pulumi.Input[Sequence[pulumi.Input[str]]], - user_id: pulumi.Input[str], - opts: Optional[pulumi.ResourceOptions]=None): + roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, + user_id: Optional[pulumi.Input[str]] = None, + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if roles is None: + raise TypeError("Missing 'roles' argument") + if user_id is None and 'userId' in kwargs: + user_id = kwargs['userId'] + if user_id is None: + raise TypeError("Missing 'user_id' argument") + _setter("roles", roles) _setter("user_id", user_id) @@ -80,7 +88,11 @@ def _configure( _setter: Callable[[Any, Any], None], roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, user_id: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions]=None): + opts: Optional[pulumi.ResourceOptions] = None, + **kwargs): + if user_id is None and 'userId' in kwargs: + user_id = kwargs['userId'] + if roles is not None: _setter("roles", roles) if user_id is not None: @@ -126,24 +138,6 @@ def __init__(__self__, role to a user. To avoid potential issues, it is recommended not to use this resource in conjunction with the `UserRole` resource when managing roles for the same user id. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - # Example: - admin = auth0.Role("admin", description="Administrator") - user = auth0.User("user", - connection_name="Username-Password-Authentication", - username="unique_username", - email="test@test.com", - password="passpass$12$12") - user_roles = auth0.UserRoles("userRoles", - user_id=user.id, - roles=[admin.id]) - ``` - ## Import This resource can be imported using the user ID. # Example @@ -170,24 +164,6 @@ def __init__(__self__, role to a user. To avoid potential issues, it is recommended not to use this resource in conjunction with the `UserRole` resource when managing roles for the same user id. - ## Example Usage - - ```python - import pulumi - import pulumi_auth0 as auth0 - - # Example: - admin = auth0.Role("admin", description="Administrator") - user = auth0.User("user", - connection_name="Username-Password-Authentication", - username="unique_username", - email="test@test.com", - password="passpass$12$12") - user_roles = auth0.UserRoles("userRoles", - user_id=user.id, - roles=[admin.id]) - ``` - ## Import This resource can be imported using the user ID. # Example