-
Notifications
You must be signed in to change notification settings - Fork 156
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #990 from hashicorp/prep-release
Prep release
- Loading branch information
Showing
33 changed files
with
1,436 additions
and
44 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,67 @@ | ||
--- | ||
layout: "tfe" | ||
page_title: "Terraform Enterprise: tfe_saml_settings" | ||
description: |- | ||
Get information on SAML Settings. | ||
--- | ||
|
||
|
||
<!-- Please do not edit this file, it is generated. --> | ||
# Data Source: tfe_saml_settings | ||
|
||
Use this data source to get information about SAML Settings. It applies only to Terraform Enterprise and requires admin token configuration. See example usage for incorporating an admin token in your provider config. | ||
|
||
|
||
## Example Usage | ||
|
||
Basic usage: | ||
|
||
```hcl | ||
provider "tfe" { | ||
hostname = var.hostname | ||
token = var.token | ||
} | ||
provider "tfe" { | ||
alias = "admin" | ||
hostname = var.hostname | ||
token = var.admin_token | ||
} | ||
data "tfe_saml_settings" "foo" { | ||
provider = tfe.admin | ||
} | ||
``` | ||
|
||
## Argument Reference | ||
|
||
No arguments are required for this data source. | ||
|
||
## Attributes Reference | ||
|
||
The following attributes are exported: | ||
|
||
* `Id` - It is always `Saml`. | ||
* `Enabled` - Whether SAML single sign-on is enabled. | ||
* `Debug` - Whether debug mode is enabled, which means that the SAMLResponse XML will be displayed on the login page. | ||
* `TeamManagementEnabled` - Whether Terraform Enterprise is set to manage team membership. | ||
* `AuthnRequestsSigned` - Whether `<samlp:AuthnRequest>` messages are signed. | ||
* `WantAssertionsSigned` - Whether `<saml:Assertion>` elements are signed. | ||
* `IdpCert` - PEM encoded X.509 Certificate as provided by the IdP configuration. | ||
* `OldIdpCert` - Previous version of the PEM encoded X.509 Certificate as provided by the IdP configuration. | ||
* `SloEndpointUrl` - Single Log Out URL. | ||
* `SsoEndpointUrl` - Single Sign On URL. | ||
* `AttrUsername` - Name of the SAML attribute that determines the user's username. | ||
* `AttrGroups` - Name of the SAML attribute that determines team membership. | ||
* `AttrSiteAdmin` - Site admin access role. | ||
* `SiteAdminRole` - Site admin access role. | ||
* `SsoApiTokenSessionTimeout` - Single Sign On session timeout in seconds. | ||
* `AcsConsumerUrl` - ACS Consumer (Recipient) URL. | ||
* `MetadataUrl` - Metadata (Audience) URL. | ||
* `Certificate` - Request and assertion signing certificate. | ||
* `Certificate` - Request and assertion signing certificate. | ||
* `PrivateKey` - The private key used for request and assertion signing. | ||
* `SignatureSigningMethod` - Signature Signing Method. | ||
* `SignatureDigestMethod` - Signature Digest Method. | ||
|
||
<!-- cache-key: cdktf-0.17.0-pre.15 input-2995e79c51b29afd8d8b89c5d98dae47701709e1502f993d5be8b2b681de4895 --> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
60 changes: 60 additions & 0 deletions
60
website/docs/cdktf/csharp/r/project_policy_set.html.markdown
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,60 @@ | ||
--- | ||
layout: "tfe" | ||
page_title: "Terraform Enterprise: tfe_project_policy_set" | ||
description: |- | ||
Add a policy set to a project | ||
--- | ||
|
||
|
||
<!-- Please do not edit this file, it is generated. --> | ||
# tfe_project_policy_set | ||
|
||
Adds and removes policy sets from a project | ||
|
||
## Example Usage | ||
|
||
Basic usage: | ||
|
||
```hcl | ||
resource "tfe_organization" "test" { | ||
name = "my-org-name" | ||
email = "[email protected]" | ||
} | ||
resource "tfe_project" "test" { | ||
name = "my-project-name" | ||
organization = tfe_organization.test.name | ||
} | ||
resource "tfe_policy_set" "test" { | ||
name = "my-policy-set" | ||
description = "Some description." | ||
organization = tfe_organization.test.name | ||
} | ||
resource "tfe_project_policy_set" "test" { | ||
policy_set_id = tfe_policy_set.test.id | ||
project_id = tfe_project.test.id | ||
} | ||
``` | ||
|
||
## Argument Reference | ||
|
||
The following arguments are supported: | ||
|
||
* `PolicySetId` - (Required) ID of the policy set. | ||
* `ProjectId` - (Required) Project ID to add the policy set to. | ||
|
||
## Attributes Reference | ||
|
||
* `Id` - The ID of the policy set attachment. ID format: `<project-id>_<policy-set-id>` | ||
|
||
## Import | ||
|
||
Project Policy Sets can be imported; use `<ORGANIZATION>/<PROJECT ID>/<POLICY SET NAME>`. For example: | ||
|
||
```shell | ||
terraform import tfe_project_policy_set.test 'my-org-name/project/policy-set-name' | ||
``` | ||
|
||
<!-- cache-key: cdktf-0.17.0-pre.15 input-a94d4f5e615194b94eca988f334f60e46c27baa01749b25710f047ee6a038864 --> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,67 @@ | ||
--- | ||
layout: "tfe" | ||
page_title: "Terraform Enterprise: tfe_saml_settings" | ||
description: |- | ||
Manages SAML Settings. | ||
--- | ||
|
||
|
||
<!-- Please do not edit this file, it is generated. --> | ||
# tfe_saml_settings | ||
|
||
Use this resource to create, update and destroy SAML Settings. It applies only to Terraform Enterprise and requires admin token configuration. See example usage for incorporating an admin token in your provider config. | ||
|
||
## Example Usage | ||
|
||
Basic usage for SAML Settings: | ||
|
||
```hcl | ||
provider "tfe" { | ||
hostname = var.hostname | ||
token = var.admin_token | ||
} | ||
resource "tfe_saml_settings" "this" { | ||
idp_cert = "foobarCertificate" | ||
slo_endpoint_url = "https://example.com/slo_endpoint_url" | ||
sso_endpoint_url = "https://example.com/sso_endpoint_url" | ||
} | ||
``` | ||
|
||
## Argument Reference | ||
|
||
The following arguments are supported: | ||
|
||
* `IdpCert` - (Required) Identity Provider Certificate specifies the PEM encoded X.509 Certificate as provided by the IdP configuration. | ||
* `SloEndpointUrl` - (Required) Single Log Out URL specifies the HTTPS endpoint on your IdP for single logout requests. This value is provided by the IdP configuration. | ||
* `SsoEndpointUrl` - (Required) Single Sign On URL specifies the HTTPS endpoint on your IdP for single sign-on requests. This value is provided by the IdP configuration. | ||
* `Debug` - (Optional) When sign-on fails and this is enabled, the SAMLResponse XML will be displayed on the login page. | ||
* `AuthnRequestsSigned` - (Optional) Whether to ensure that `<samlp:AuthnRequest>` messages are signed. | ||
* `WantAssertionsSigned` - (Optional) Whether to ensure that `<samlp:Assertion>` elements are signed. | ||
* `TeamManagementEnabled` - (Optional) Set it to false if you would rather use Terraform Enterprise to manage team membership. | ||
* `AttrUsername` - (Optional) Username Attribute Name specifies the name of the SAML attribute that determines the user's username. | ||
* `AttrSiteAdmin` - (Optional) Specifies the role for site admin access. Overrides the `Site Admin Role` method. | ||
* `AttrGroups` - (Optional) Team Attribute Name specifies the name of the SAML attribute that determines team membership. | ||
* `SiteAdminRole` - (Optional) Specifies the role for site admin access, provided in the list of roles sent in the Team Attribute Name attribute. | ||
* `SsoApiTokenSessionTimeout` - (Optional) Specifies the Single Sign On session timeout in seconds. Defaults to 14 days. | ||
* `Certificate` - (Optional) The certificate used for request and assertion signing. | ||
* `PrivateKey` - (Optional) The private key used for request and assertion signing. | ||
* `SignatureSigningMethod` - (Optional) Signature Signing Method. Must be either `Sha1` or `Sha256`. Defaults to `Sha256`. | ||
* `SignatureDigestMethod` - (Optional) Signature Digest Method. Must be either `Sha1` or `Sha256`. Defaults to `Sha256`. | ||
|
||
## Attributes Reference | ||
|
||
* `Id` - The ID of the SAML Settings. Always `Saml`. | ||
* `AcsConsumerUrl` - ACS Consumer (Recipient) URL. | ||
* `MetadataUrl` - Metadata (Audience) URL. | ||
* `OldIdpCert` - Value of the old IDP Certificate. | ||
|
||
## Import | ||
|
||
SAML Settings can be imported. | ||
|
||
```shell | ||
terraform import tfe_saml_settings.this saml | ||
``` | ||
|
||
<!-- cache-key: cdktf-0.17.0-pre.15 input-638ff2b3454a9c98199c9259ef06e339ead03786f80128a77130cb8fde31700e --> |
Oops, something went wrong.