@pulumi/akamai 2.5.0 → 2.6.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/appSecActivations.d.ts +31 -30
- package/appSecActivations.js +16 -3
- package/appSecActivations.js.map +1 -1
- package/appSecAdvancedSettingsLogging.d.ts +17 -13
- package/appSecAdvancedSettingsLogging.js +8 -4
- package/appSecAdvancedSettingsLogging.js.map +1 -1
- package/appSecAdvancedSettingsPrefetch.d.ts +32 -18
- package/appSecAdvancedSettingsPrefetch.js +17 -3
- package/appSecAdvancedSettingsPrefetch.js.map +1 -1
- package/appSecApiConstraintsProtection.d.ts +15 -33
- package/appSecApiConstraintsProtection.js +13 -4
- package/appSecApiConstraintsProtection.js.map +1 -1
- package/appSecApiRequestConstraints.d.ts +24 -15
- package/appSecApiRequestConstraints.js +0 -3
- package/appSecApiRequestConstraints.js.map +1 -1
- package/appSecAttackGroup.d.ts +36 -20
- package/appSecAttackGroup.js +9 -5
- package/appSecAttackGroup.js.map +1 -1
- package/appSecByPassNetworkList.d.ts +33 -12
- package/appSecByPassNetworkList.js +17 -6
- package/appSecByPassNetworkList.js.map +1 -1
- package/appSecConfiguration.d.ts +65 -28
- package/appSecConfiguration.js +44 -1
- package/appSecConfiguration.js.map +1 -1
- package/appSecConfigurationRename.d.ts +18 -12
- package/appSecConfigurationRename.js +9 -3
- package/appSecConfigurationRename.js.map +1 -1
- package/appSecCustomDeny.d.ts +17 -8
- package/appSecCustomDeny.js +11 -2
- package/appSecCustomDeny.js.map +1 -1
- package/appSecCustomRule.d.ts +11 -13
- package/appSecCustomRule.js +5 -1
- package/appSecCustomRule.js.map +1 -1
- package/appSecCustomRuleAction.d.ts +31 -15
- package/appSecCustomRuleAction.js +7 -3
- package/appSecCustomRuleAction.js.map +1 -1
- package/appSecEval.d.ts +45 -40
- package/appSecEval.js +18 -4
- package/appSecEval.js.map +1 -1
- package/appSecEvalGroup.d.ts +36 -21
- package/appSecEvalGroup.js +9 -6
- package/appSecEvalGroup.js.map +1 -1
- package/appSecEvalHostnames.d.ts +21 -10
- package/appSecEvalHostnames.js +15 -4
- package/appSecEvalHostnames.js.map +1 -1
- package/appSecEvalProtectHost.d.ts +14 -8
- package/appSecEvalProtectHost.js +8 -2
- package/appSecEvalProtectHost.js.map +1 -1
- package/appSecEvalRule.d.ts +38 -20
- package/appSecEvalRule.js +11 -5
- package/appSecEvalRule.js.map +1 -1
- package/appSecIPGeo.d.ts +33 -30
- package/appSecIPGeo.js +15 -12
- package/appSecIPGeo.js.map +1 -1
- package/appSecIPGeoProtection.d.ts +24 -15
- package/appSecIPGeoProtection.js +13 -4
- package/appSecIPGeoProtection.js.map +1 -1
- package/appSecMatchTarget.d.ts +17 -14
- package/appSecMatchTarget.js +11 -2
- package/appSecMatchTarget.js.map +1 -1
- package/appSecMatchTargetSequence.d.ts +13 -9
- package/appSecMatchTargetSequence.js +7 -3
- package/appSecMatchTargetSequence.js.map +1 -1
- package/appSecPenaltyBox.d.ts +32 -16
- package/appSecPenaltyBox.js +8 -4
- package/appSecPenaltyBox.js.map +1 -1
- package/appSecRatePolicy.d.ts +21 -10
- package/appSecRatePolicy.js +13 -2
- package/appSecRatePolicy.js.map +1 -1
- package/appSecRatePolicyAction.d.ts +42 -15
- package/appSecRatePolicyAction.js +9 -3
- package/appSecRatePolicyAction.js.map +1 -1
- package/appSecRateProtection.d.ts +24 -15
- package/appSecRateProtection.js +13 -4
- package/appSecRateProtection.js.map +1 -1
- package/appSecReputationProfile.d.ts +20 -16
- package/appSecReputationProfile.js +14 -4
- package/appSecReputationProfile.js.map +1 -1
- package/appSecReputationProfileAction.d.ts +33 -17
- package/appSecReputationProfileAction.js +9 -5
- package/appSecReputationProfileAction.js.map +1 -1
- package/appSecReputationProfileAnalysis.d.ts +27 -20
- package/appSecReputationProfileAnalysis.js +15 -8
- package/appSecReputationProfileAnalysis.js.map +1 -1
- package/appSecReputationProtection.d.ts +26 -15
- package/appSecReputationProtection.js +15 -4
- package/appSecReputationProtection.js.map +1 -1
- package/appSecRule.d.ts +37 -21
- package/appSecRule.js +9 -5
- package/appSecRule.js.map +1 -1
- package/appSecRuleUpgrade.d.ts +15 -57
- package/appSecRuleUpgrade.js +0 -24
- package/appSecRuleUpgrade.js.map +1 -1
- package/appSecSecurityPolicy.d.ts +35 -22
- package/appSecSecurityPolicy.js +18 -5
- package/appSecSecurityPolicy.js.map +1 -1
- package/appSecSecurityPolicyRename.d.ts +12 -26
- package/appSecSecurityPolicyRename.js +3 -17
- package/appSecSecurityPolicyRename.js.map +1 -1
- package/appSecSelectedHostnames.d.ts +24 -11
- package/appSecSelectedHostnames.js +6 -2
- package/appSecSelectedHostnames.js.map +1 -1
- package/appSecSiemSettings.d.ts +30 -21
- package/appSecSiemSettings.js +12 -3
- package/appSecSiemSettings.js.map +1 -1
- package/appSecSlowPost.d.ts +31 -21
- package/appSecSlowPost.js +7 -3
- package/appSecSlowPost.js.map +1 -1
- package/appSecSlowPostProtection.d.ts +24 -15
- package/appSecSlowPostProtection.js +13 -4
- package/appSecSlowPostProtection.js.map +1 -1
- package/appSecThreatIntel.d.ts +17 -14
- package/appSecThreatIntel.js +8 -5
- package/appSecThreatIntel.js.map +1 -1
- package/appSecVersionNodes.d.ts +20 -12
- package/appSecVersionNodes.js +12 -4
- package/appSecVersionNodes.js.map +1 -1
- package/appSecWafMode.d.ts +29 -39
- package/appSecWafMode.js +18 -4
- package/appSecWafMode.js.map +1 -1
- package/appSecWafProtection.d.ts +24 -15
- package/appSecWafProtection.js +13 -4
- package/appSecWafProtection.js.map +1 -1
- package/appSecWapSelectedHostnames.d.ts +6 -31
- package/appSecWapSelectedHostnames.js +0 -25
- package/appSecWapSelectedHostnames.js.map +1 -1
- package/cpCode.d.ts +1 -8
- package/cpCode.js +1 -8
- package/cpCode.js.map +1 -1
- package/cpsDvEnrollment.d.ts +5 -5
- package/cpsDvEnrollment.js +5 -5
- package/cpsDvValidation.d.ts +1 -1
- package/cpsDvValidation.js +1 -1
- package/dnsRecord.d.ts +4 -4
- package/dnsRecord.js +4 -4
- package/edgeHostName.d.ts +16 -1
- package/edgeHostName.js +6 -1
- package/edgeHostName.js.map +1 -1
- package/getAppSecAdvancedSettingsLogging.d.ts +23 -19
- package/getAppSecAdvancedSettingsLogging.js +19 -9
- package/getAppSecAdvancedSettingsLogging.js.map +1 -1
- package/getAppSecAdvancedSettingsPragmaHeader.d.ts +19 -13
- package/getAppSecAdvancedSettingsPragmaHeader.js +15 -3
- package/getAppSecAdvancedSettingsPragmaHeader.js.map +1 -1
- package/getAppSecAdvancedSettingsPrefetch.d.ts +15 -11
- package/getAppSecAdvancedSettingsPrefetch.js +13 -3
- package/getAppSecAdvancedSettingsPrefetch.js.map +1 -1
- package/getAppSecApiEndpoints.d.ts +20 -18
- package/getAppSecApiEndpoints.js +14 -3
- package/getAppSecApiEndpoints.js.map +1 -1
- package/getAppSecApiRequestConstraints.d.ts +21 -17
- package/getAppSecApiRequestConstraints.js +15 -5
- package/getAppSecApiRequestConstraints.js.map +1 -1
- package/getAppSecAttackGroups.d.ts +6 -46
- package/getAppSecAttackGroups.js +0 -26
- package/getAppSecAttackGroups.js.map +1 -1
- package/getAppSecBypassNetworkLists.d.ts +20 -16
- package/getAppSecBypassNetworkLists.js +16 -5
- package/getAppSecBypassNetworkLists.js.map +1 -1
- package/getAppSecConfiguration.d.ts +2 -39
- package/getAppSecConfiguration.js +0 -22
- package/getAppSecConfiguration.js.map +1 -1
- package/getAppSecConfigurationVersion.d.ts +4 -44
- package/getAppSecConfigurationVersion.js +0 -28
- package/getAppSecConfigurationVersion.js.map +1 -1
- package/getAppSecContractsGroups.d.ts +19 -25
- package/getAppSecContractsGroups.js +15 -3
- package/getAppSecContractsGroups.js.map +1 -1
- package/getAppSecCustomDeny.d.ts +17 -13
- package/getAppSecCustomDeny.js +13 -3
- package/getAppSecCustomDeny.js.map +1 -1
- package/getAppSecCustomRuleActions.d.ts +18 -12
- package/getAppSecCustomRuleActions.js +12 -3
- package/getAppSecCustomRuleActions.js.map +1 -1
- package/getAppSecCustomRules.d.ts +17 -13
- package/getAppSecCustomRules.js +13 -3
- package/getAppSecCustomRules.js.map +1 -1
- package/getAppSecEvalGroups.d.ts +6 -47
- package/getAppSecEvalGroups.js +0 -27
- package/getAppSecEvalGroups.js.map +1 -1
- package/getAppSecEvalHostnames.d.ts +19 -13
- package/getAppSecEvalHostnames.js +17 -2
- package/getAppSecEvalHostnames.js.map +1 -1
- package/getAppSecEvalRules.d.ts +30 -29
- package/getAppSecEvalRules.js +24 -9
- package/getAppSecEvalRules.js.map +1 -1
- package/getAppSecExportConfiguration.d.ts +62 -30
- package/getAppSecExportConfiguration.js +12 -2
- package/getAppSecExportConfiguration.js.map +1 -1
- package/getAppSecFailoverHostnames.d.ts +14 -13
- package/getAppSecFailoverHostnames.js +12 -2
- package/getAppSecFailoverHostnames.js.map +1 -1
- package/getAppSecHostnameCoverage.d.ts +11 -10
- package/getAppSecHostnameCoverage.js +11 -4
- package/getAppSecHostnameCoverage.js.map +1 -1
- package/getAppSecHostnameCoverageMatchTargets.d.ts +19 -18
- package/getAppSecHostnameCoverageMatchTargets.js +17 -4
- package/getAppSecHostnameCoverageMatchTargets.js.map +1 -1
- package/getAppSecHostnameCoverageOverlapping.d.ts +21 -14
- package/getAppSecHostnameCoverageOverlapping.js +17 -4
- package/getAppSecHostnameCoverageOverlapping.js.map +1 -1
- package/getAppSecIPGeo.d.ts +22 -22
- package/getAppSecIPGeo.js +18 -3
- package/getAppSecIPGeo.js.map +1 -1
- package/getAppSecMatchTargets.d.ts +17 -13
- package/getAppSecMatchTargets.js +13 -3
- package/getAppSecMatchTargets.js.map +1 -1
- package/getAppSecPenaltyBox.d.ts +22 -16
- package/getAppSecPenaltyBox.js +18 -3
- package/getAppSecPenaltyBox.js.map +1 -1
- package/getAppSecRatePolicies.d.ts +17 -13
- package/getAppSecRatePolicies.js +13 -3
- package/getAppSecRatePolicies.js.map +1 -1
- package/getAppSecRatePolicyActions.d.ts +18 -12
- package/getAppSecRatePolicyActions.js +12 -3
- package/getAppSecRatePolicyActions.js.map +1 -1
- package/getAppSecReputationProfileActions.d.ts +49 -16
- package/getAppSecReputationProfileActions.js +43 -1
- package/getAppSecReputationProfileActions.js.map +1 -1
- package/getAppSecReputationProfileAnalysis.d.ts +22 -13
- package/getAppSecReputationProfileAnalysis.js +18 -3
- package/getAppSecReputationProfileAnalysis.js.map +1 -1
- package/getAppSecReputationProfiles.d.ts +17 -13
- package/getAppSecReputationProfiles.js +13 -3
- package/getAppSecReputationProfiles.js.map +1 -1
- package/getAppSecRuleUpgradeDetails.d.ts +17 -13
- package/getAppSecRuleUpgradeDetails.js +13 -3
- package/getAppSecRuleUpgradeDetails.js.map +1 -1
- package/getAppSecRules.d.ts +6 -45
- package/getAppSecRules.js +0 -25
- package/getAppSecRules.js.map +1 -1
- package/getAppSecSecurityPolicy.d.ts +4 -43
- package/getAppSecSecurityPolicy.js +0 -26
- package/getAppSecSecurityPolicy.js.map +1 -1
- package/getAppSecSecurityPolicyProtections.d.ts +24 -34
- package/getAppSecSecurityPolicyProtections.js +20 -3
- package/getAppSecSecurityPolicyProtections.js.map +1 -1
- package/getAppSecSelectableHostnames.d.ts +21 -19
- package/getAppSecSelectableHostnames.js +15 -4
- package/getAppSecSelectableHostnames.js.map +1 -1
- package/getAppSecSelectedHostnames.d.ts +15 -13
- package/getAppSecSelectedHostnames.js +13 -2
- package/getAppSecSelectedHostnames.js.map +1 -1
- package/getAppSecSiemDefinitions.d.ts +14 -13
- package/getAppSecSiemDefinitions.js +12 -5
- package/getAppSecSiemDefinitions.js.map +1 -1
- package/getAppSecSiemSettings.d.ts +14 -10
- package/getAppSecSiemSettings.js +12 -2
- package/getAppSecSiemSettings.js.map +1 -1
- package/getAppSecSlowPost.d.ts +22 -10
- package/getAppSecSlowPost.js +18 -3
- package/getAppSecSlowPost.js.map +1 -1
- package/getAppSecThreatIntel.d.ts +18 -17
- package/getAppSecThreatIntel.js +14 -4
- package/getAppSecThreatIntel.js.map +1 -1
- package/getAppSecVersionNotes.d.ts +14 -10
- package/getAppSecVersionNotes.js +12 -2
- package/getAppSecVersionNotes.js.map +1 -1
- package/getAppSecWafMode.d.ts +22 -28
- package/getAppSecWafMode.js +18 -3
- package/getAppSecWafMode.js.map +1 -1
- package/getAppSecWapSelectedHostnames.d.ts +37 -11
- package/getAppSecWapSelectedHostnames.js +33 -4
- package/getAppSecWapSelectedHostnames.js.map +1 -1
- package/getContracts.d.ts +3 -1
- package/getContracts.js +3 -1
- package/getContracts.js.map +1 -1
- package/getGroups.d.ts +3 -1
- package/getGroups.js +3 -1
- package/getGroups.js.map +1 -1
- package/getPropertyRules.d.ts +12 -1
- package/getPropertyRules.js +10 -1
- package/getPropertyRules.js.map +1 -1
- package/getPropertyRulesTemplate.d.ts +8 -5
- package/getPropertyRulesTemplate.js +2 -0
- package/getPropertyRulesTemplate.js.map +1 -1
- package/gtmCidrmap.d.ts +1 -1
- package/gtmCidrmap.js +1 -1
- package/gtmDatacenter.d.ts +3 -3
- package/gtmDatacenter.js +3 -3
- package/gtmGeomap.d.ts +1 -1
- package/gtmGeomap.js +1 -1
- package/gtmProperty.d.ts +9 -9
- package/gtmProperty.js +9 -9
- package/package.json +2 -2
- package/package.json.dev +1 -1
- package/properties/edgeHostName.d.ts +12 -0
- package/properties/edgeHostName.js +2 -0
- package/properties/edgeHostName.js.map +1 -1
- package/properties/getPropertyRules.d.ts +3 -0
- package/properties/getPropertyRules.js +1 -0
- package/properties/getPropertyRules.js.map +1 -1
- package/property.d.ts +3 -3
- package/property.js +3 -3
- package/propertyActivation.d.ts +2 -2
- package/propertyActivation.js +2 -2
- package/types/input.d.ts +8 -0
- package/types/output.d.ts +4 -0
package/appSecActivations.d.ts
CHANGED
|
@@ -1,6 +1,10 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
|
-
*
|
|
3
|
+
* **Scopes**: Security configuration
|
|
4
|
+
*
|
|
5
|
+
* Activates or deactivates a security configuration. Security configurations activated on the staging network can be used for testing and fine-tuning; security configurations activated on the production network are used to protect your actual websites.
|
|
6
|
+
*
|
|
7
|
+
* **Related API Endpoint**: [/appsec/v1/activations](https://developer.akamai.com/api/cloud_security/application_security/v1.html#postactivations)
|
|
4
8
|
*
|
|
5
9
|
* ## Example Usage
|
|
6
10
|
*
|
|
@@ -11,15 +15,24 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
11
15
|
* import * as akamai from "@pulumi/akamai";
|
|
12
16
|
*
|
|
13
17
|
* const configuration = akamai.getAppSecConfiguration({
|
|
14
|
-
* name: "
|
|
18
|
+
* name: "Documentation",
|
|
15
19
|
* });
|
|
16
20
|
* const activation = new akamai.AppSecActivations("activation", {
|
|
17
21
|
* configId: configuration.then(configuration => configuration.configId),
|
|
18
22
|
* network: "STAGING",
|
|
19
|
-
* notes: "
|
|
23
|
+
* notes: "This configuration was activated for testing purposes only.",
|
|
20
24
|
* notificationEmails: ["user@example.com"],
|
|
21
25
|
* });
|
|
22
26
|
* ```
|
|
27
|
+
* ## Output Options
|
|
28
|
+
*
|
|
29
|
+
* The following options can be used to determine the information returned, and how that returned information is formatted:
|
|
30
|
+
*
|
|
31
|
+
* - `status`. Status of the operation. Valid values are:
|
|
32
|
+
*
|
|
33
|
+
* * **ACTIVATED**
|
|
34
|
+
* * **DEACTIVATED**
|
|
35
|
+
* * **FAILED**
|
|
23
36
|
*/
|
|
24
37
|
export declare class AppSecActivations extends pulumi.CustomResource {
|
|
25
38
|
/**
|
|
@@ -38,30 +51,25 @@ export declare class AppSecActivations extends pulumi.CustomResource {
|
|
|
38
51
|
*/
|
|
39
52
|
static isInstance(obj: any): obj is AppSecActivations;
|
|
40
53
|
/**
|
|
41
|
-
*
|
|
54
|
+
* . Set to **true** to activate the specified security configuration; set to **false** to deactivate the configuration. If not included, the security configuration will be activated.
|
|
42
55
|
*/
|
|
43
56
|
readonly activate: pulumi.Output<boolean | undefined>;
|
|
44
57
|
/**
|
|
45
|
-
*
|
|
58
|
+
* . Unique identifier of the security configuration being activated.
|
|
46
59
|
*/
|
|
47
60
|
readonly configId: pulumi.Output<number>;
|
|
48
61
|
/**
|
|
49
|
-
*
|
|
62
|
+
* . Network on which activation will occur; allowed values are:
|
|
50
63
|
*/
|
|
51
64
|
readonly network: pulumi.Output<string | undefined>;
|
|
52
65
|
/**
|
|
53
|
-
*
|
|
54
|
-
* configuration was updated using the akamai.AppSecActivations resource, an activation will not occur. To ensure an activation
|
|
55
|
-
* is called, please update one of the attributes, e.g. the notes attribute.
|
|
66
|
+
* . Brief description of the activation/deactivation process. Note that, if no attributes have changed since the last time you called the akamai.AppSecActivations resource, neither activation nor deactivation takes place: that's because *something* must be different in order to trigger the activation/deactivation process. With that in mind, it's recommended that you always update the `notes` argument. That ensures that the resource will be called and that activation or deactivation will occur.
|
|
56
67
|
*/
|
|
57
68
|
readonly notes: pulumi.Output<string>;
|
|
58
69
|
/**
|
|
59
|
-
*
|
|
70
|
+
* . JSON array containing the email addresses of the people to be notified when activation is complete.
|
|
60
71
|
*/
|
|
61
72
|
readonly notificationEmails: pulumi.Output<string[]>;
|
|
62
|
-
/**
|
|
63
|
-
* The status of the operation. The following values are may be returned:
|
|
64
|
-
*/
|
|
65
73
|
readonly status: pulumi.Output<string>;
|
|
66
74
|
/**
|
|
67
75
|
* Create a AppSecActivations resource with the given unique name, arguments, and options.
|
|
@@ -77,30 +85,25 @@ export declare class AppSecActivations extends pulumi.CustomResource {
|
|
|
77
85
|
*/
|
|
78
86
|
export interface AppSecActivationsState {
|
|
79
87
|
/**
|
|
80
|
-
*
|
|
88
|
+
* . Set to **true** to activate the specified security configuration; set to **false** to deactivate the configuration. If not included, the security configuration will be activated.
|
|
81
89
|
*/
|
|
82
90
|
activate?: pulumi.Input<boolean>;
|
|
83
91
|
/**
|
|
84
|
-
*
|
|
92
|
+
* . Unique identifier of the security configuration being activated.
|
|
85
93
|
*/
|
|
86
94
|
configId?: pulumi.Input<number>;
|
|
87
95
|
/**
|
|
88
|
-
*
|
|
96
|
+
* . Network on which activation will occur; allowed values are:
|
|
89
97
|
*/
|
|
90
98
|
network?: pulumi.Input<string>;
|
|
91
99
|
/**
|
|
92
|
-
*
|
|
93
|
-
* configuration was updated using the akamai.AppSecActivations resource, an activation will not occur. To ensure an activation
|
|
94
|
-
* is called, please update one of the attributes, e.g. the notes attribute.
|
|
100
|
+
* . Brief description of the activation/deactivation process. Note that, if no attributes have changed since the last time you called the akamai.AppSecActivations resource, neither activation nor deactivation takes place: that's because *something* must be different in order to trigger the activation/deactivation process. With that in mind, it's recommended that you always update the `notes` argument. That ensures that the resource will be called and that activation or deactivation will occur.
|
|
95
101
|
*/
|
|
96
102
|
notes?: pulumi.Input<string>;
|
|
97
103
|
/**
|
|
98
|
-
*
|
|
104
|
+
* . JSON array containing the email addresses of the people to be notified when activation is complete.
|
|
99
105
|
*/
|
|
100
106
|
notificationEmails?: pulumi.Input<pulumi.Input<string>[]>;
|
|
101
|
-
/**
|
|
102
|
-
* The status of the operation. The following values are may be returned:
|
|
103
|
-
*/
|
|
104
107
|
status?: pulumi.Input<string>;
|
|
105
108
|
}
|
|
106
109
|
/**
|
|
@@ -108,25 +111,23 @@ export interface AppSecActivationsState {
|
|
|
108
111
|
*/
|
|
109
112
|
export interface AppSecActivationsArgs {
|
|
110
113
|
/**
|
|
111
|
-
*
|
|
114
|
+
* . Set to **true** to activate the specified security configuration; set to **false** to deactivate the configuration. If not included, the security configuration will be activated.
|
|
112
115
|
*/
|
|
113
116
|
activate?: pulumi.Input<boolean>;
|
|
114
117
|
/**
|
|
115
|
-
*
|
|
118
|
+
* . Unique identifier of the security configuration being activated.
|
|
116
119
|
*/
|
|
117
120
|
configId: pulumi.Input<number>;
|
|
118
121
|
/**
|
|
119
|
-
*
|
|
122
|
+
* . Network on which activation will occur; allowed values are:
|
|
120
123
|
*/
|
|
121
124
|
network?: pulumi.Input<string>;
|
|
122
125
|
/**
|
|
123
|
-
*
|
|
124
|
-
* configuration was updated using the akamai.AppSecActivations resource, an activation will not occur. To ensure an activation
|
|
125
|
-
* is called, please update one of the attributes, e.g. the notes attribute.
|
|
126
|
+
* . Brief description of the activation/deactivation process. Note that, if no attributes have changed since the last time you called the akamai.AppSecActivations resource, neither activation nor deactivation takes place: that's because *something* must be different in order to trigger the activation/deactivation process. With that in mind, it's recommended that you always update the `notes` argument. That ensures that the resource will be called and that activation or deactivation will occur.
|
|
126
127
|
*/
|
|
127
128
|
notes: pulumi.Input<string>;
|
|
128
129
|
/**
|
|
129
|
-
*
|
|
130
|
+
* . JSON array containing the email addresses of the people to be notified when activation is complete.
|
|
130
131
|
*/
|
|
131
132
|
notificationEmails: pulumi.Input<pulumi.Input<string>[]>;
|
|
132
133
|
}
|
package/appSecActivations.js
CHANGED
|
@@ -6,7 +6,11 @@ exports.AppSecActivations = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
-
*
|
|
9
|
+
* **Scopes**: Security configuration
|
|
10
|
+
*
|
|
11
|
+
* Activates or deactivates a security configuration. Security configurations activated on the staging network can be used for testing and fine-tuning; security configurations activated on the production network are used to protect your actual websites.
|
|
12
|
+
*
|
|
13
|
+
* **Related API Endpoint**: [/appsec/v1/activations](https://developer.akamai.com/api/cloud_security/application_security/v1.html#postactivations)
|
|
10
14
|
*
|
|
11
15
|
* ## Example Usage
|
|
12
16
|
*
|
|
@@ -17,15 +21,24 @@ const utilities = require("./utilities");
|
|
|
17
21
|
* import * as akamai from "@pulumi/akamai";
|
|
18
22
|
*
|
|
19
23
|
* const configuration = akamai.getAppSecConfiguration({
|
|
20
|
-
* name: "
|
|
24
|
+
* name: "Documentation",
|
|
21
25
|
* });
|
|
22
26
|
* const activation = new akamai.AppSecActivations("activation", {
|
|
23
27
|
* configId: configuration.then(configuration => configuration.configId),
|
|
24
28
|
* network: "STAGING",
|
|
25
|
-
* notes: "
|
|
29
|
+
* notes: "This configuration was activated for testing purposes only.",
|
|
26
30
|
* notificationEmails: ["user@example.com"],
|
|
27
31
|
* });
|
|
28
32
|
* ```
|
|
33
|
+
* ## Output Options
|
|
34
|
+
*
|
|
35
|
+
* The following options can be used to determine the information returned, and how that returned information is formatted:
|
|
36
|
+
*
|
|
37
|
+
* - `status`. Status of the operation. Valid values are:
|
|
38
|
+
*
|
|
39
|
+
* * **ACTIVATED**
|
|
40
|
+
* * **DEACTIVATED**
|
|
41
|
+
* * **FAILED**
|
|
29
42
|
*/
|
|
30
43
|
class AppSecActivations extends pulumi.CustomResource {
|
|
31
44
|
constructor(name, argsOrState, opts) {
|
package/appSecActivations.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"appSecActivations.js","sourceRoot":"","sources":["../appSecActivations.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"appSecActivations.js","sourceRoot":"","sources":["../appSecActivations.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAkCG;AACH,MAAa,iBAAkB,SAAQ,MAAM,CAAC,cAAc;IA0DxD,YAAY,IAAY,EAAE,WAA4D,EAAE,IAAmC;QACvH,IAAI,MAAM,GAAkB,EAAE,CAAC;QAC/B,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAiD,CAAC;YAChE,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SACvD;aAAM;YACH,MAAM,IAAI,GAAG,WAAgD,CAAC;YAC9D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,kBAAkB,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC/D,MAAM,IAAI,KAAK,CAAC,gDAAgD,CAAC,CAAC;aACrE;YACD,MAAM,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,MAAM,CAAC,QAAQ,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACxC;QACD,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;YACf,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE,EAAC,CAAC,CAAC;SACxE;QACD,KAAK,CAAC,iBAAiB,CAAC,YAAY,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,CAAC,CAAC;IAC9D,CAAC;IA1FD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA8B,EAAE,IAAmC;QAC5H,OAAO,IAAI,iBAAiB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACxE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,iBAAiB,CAAC,YAAY,CAAC;IAClE,CAAC;;AA1BL,8CA4FC;AA9EG,gBAAgB;AACO,8BAAY,GAAG,kDAAkD,CAAC"}
|
|
@@ -1,6 +1,10 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
|
-
*
|
|
3
|
+
* **Scopes**: Security configuration; security policy
|
|
4
|
+
*
|
|
5
|
+
* Enables, disables, or updates HTTP header logging settings. By default, this operation applies at the configuration level, which means that it applies to all the security policies within that configuration. However, by using the `securityPolicyId` parameter you can specify custom settings for an individual security policy.
|
|
6
|
+
*
|
|
7
|
+
* **Related API Endpoint**: [/appsec/v1/configs/{configId}/versions/{versionNumber}/advanced-settings/logging](https://developer.akamai.com/api/cloud_security/application_security/v1.html#puthttpheaderlogging)
|
|
4
8
|
*
|
|
5
9
|
* ## Example Usage
|
|
6
10
|
*
|
|
@@ -12,16 +16,16 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
12
16
|
* import * from "fs";
|
|
13
17
|
*
|
|
14
18
|
* const configuration = akamai.getAppSecConfiguration({
|
|
15
|
-
* name:
|
|
19
|
+
* name: "Documentation",
|
|
16
20
|
* });
|
|
17
21
|
* const logging = new akamai.AppSecAdvancedSettingsLogging("logging", {
|
|
18
22
|
* configId: configuration.then(configuration => configuration.configId),
|
|
19
23
|
* logging: fs.readFileSync(`${path.module}/logging.json`),
|
|
20
24
|
* });
|
|
21
|
-
* // USE CASE:
|
|
25
|
+
* // USE CASE: User wants to configure logging settings for a security policy.
|
|
22
26
|
* const policyLogging = new akamai.AppSecAdvancedSettingsLogging("policyLogging", {
|
|
23
27
|
* configId: configuration.then(configuration => configuration.configId),
|
|
24
|
-
* securityPolicyId:
|
|
28
|
+
* securityPolicyId: "gms1_134637",
|
|
25
29
|
* logging: fs.readFileSync(`${path.module}/logging.json`),
|
|
26
30
|
* });
|
|
27
31
|
* ```
|
|
@@ -43,15 +47,15 @@ export declare class AppSecAdvancedSettingsLogging extends pulumi.CustomResource
|
|
|
43
47
|
*/
|
|
44
48
|
static isInstance(obj: any): obj is AppSecAdvancedSettingsLogging;
|
|
45
49
|
/**
|
|
46
|
-
*
|
|
50
|
+
* . Unique identifier of the security configuration containing the logging settings being modified.
|
|
47
51
|
*/
|
|
48
52
|
readonly configId: pulumi.Output<number>;
|
|
49
53
|
/**
|
|
50
|
-
*
|
|
54
|
+
* . Path to a JSON file containing the logging settings to be configured. A sample JSON file can be found in the [Modify HTTP header log settings for a configuration](https://developer.akamai.com/api/cloud_security/application_security/v1.html#puthttpheaderloggingforaconfiguration) section of the Application Security API documentation.
|
|
51
55
|
*/
|
|
52
56
|
readonly logging: pulumi.Output<string>;
|
|
53
57
|
/**
|
|
54
|
-
*
|
|
58
|
+
* . Unique identifier of the security policies whose settings are being modified. If not included, the logging settings are modified at the configuration scope and, as a result, apply to all the security policies associated with the configuration.
|
|
55
59
|
*/
|
|
56
60
|
readonly securityPolicyId: pulumi.Output<string | undefined>;
|
|
57
61
|
/**
|
|
@@ -68,15 +72,15 @@ export declare class AppSecAdvancedSettingsLogging extends pulumi.CustomResource
|
|
|
68
72
|
*/
|
|
69
73
|
export interface AppSecAdvancedSettingsLoggingState {
|
|
70
74
|
/**
|
|
71
|
-
*
|
|
75
|
+
* . Unique identifier of the security configuration containing the logging settings being modified.
|
|
72
76
|
*/
|
|
73
77
|
configId?: pulumi.Input<number>;
|
|
74
78
|
/**
|
|
75
|
-
*
|
|
79
|
+
* . Path to a JSON file containing the logging settings to be configured. A sample JSON file can be found in the [Modify HTTP header log settings for a configuration](https://developer.akamai.com/api/cloud_security/application_security/v1.html#puthttpheaderloggingforaconfiguration) section of the Application Security API documentation.
|
|
76
80
|
*/
|
|
77
81
|
logging?: pulumi.Input<string>;
|
|
78
82
|
/**
|
|
79
|
-
*
|
|
83
|
+
* . Unique identifier of the security policies whose settings are being modified. If not included, the logging settings are modified at the configuration scope and, as a result, apply to all the security policies associated with the configuration.
|
|
80
84
|
*/
|
|
81
85
|
securityPolicyId?: pulumi.Input<string>;
|
|
82
86
|
}
|
|
@@ -85,15 +89,15 @@ export interface AppSecAdvancedSettingsLoggingState {
|
|
|
85
89
|
*/
|
|
86
90
|
export interface AppSecAdvancedSettingsLoggingArgs {
|
|
87
91
|
/**
|
|
88
|
-
*
|
|
92
|
+
* . Unique identifier of the security configuration containing the logging settings being modified.
|
|
89
93
|
*/
|
|
90
94
|
configId: pulumi.Input<number>;
|
|
91
95
|
/**
|
|
92
|
-
*
|
|
96
|
+
* . Path to a JSON file containing the logging settings to be configured. A sample JSON file can be found in the [Modify HTTP header log settings for a configuration](https://developer.akamai.com/api/cloud_security/application_security/v1.html#puthttpheaderloggingforaconfiguration) section of the Application Security API documentation.
|
|
93
97
|
*/
|
|
94
98
|
logging: pulumi.Input<string>;
|
|
95
99
|
/**
|
|
96
|
-
*
|
|
100
|
+
* . Unique identifier of the security policies whose settings are being modified. If not included, the logging settings are modified at the configuration scope and, as a result, apply to all the security policies associated with the configuration.
|
|
97
101
|
*/
|
|
98
102
|
securityPolicyId?: pulumi.Input<string>;
|
|
99
103
|
}
|
|
@@ -6,7 +6,11 @@ exports.AppSecAdvancedSettingsLogging = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
-
*
|
|
9
|
+
* **Scopes**: Security configuration; security policy
|
|
10
|
+
*
|
|
11
|
+
* Enables, disables, or updates HTTP header logging settings. By default, this operation applies at the configuration level, which means that it applies to all the security policies within that configuration. However, by using the `securityPolicyId` parameter you can specify custom settings for an individual security policy.
|
|
12
|
+
*
|
|
13
|
+
* **Related API Endpoint**: [/appsec/v1/configs/{configId}/versions/{versionNumber}/advanced-settings/logging](https://developer.akamai.com/api/cloud_security/application_security/v1.html#puthttpheaderlogging)
|
|
10
14
|
*
|
|
11
15
|
* ## Example Usage
|
|
12
16
|
*
|
|
@@ -18,16 +22,16 @@ const utilities = require("./utilities");
|
|
|
18
22
|
* import * from "fs";
|
|
19
23
|
*
|
|
20
24
|
* const configuration = akamai.getAppSecConfiguration({
|
|
21
|
-
* name:
|
|
25
|
+
* name: "Documentation",
|
|
22
26
|
* });
|
|
23
27
|
* const logging = new akamai.AppSecAdvancedSettingsLogging("logging", {
|
|
24
28
|
* configId: configuration.then(configuration => configuration.configId),
|
|
25
29
|
* logging: fs.readFileSync(`${path.module}/logging.json`),
|
|
26
30
|
* });
|
|
27
|
-
* // USE CASE:
|
|
31
|
+
* // USE CASE: User wants to configure logging settings for a security policy.
|
|
28
32
|
* const policyLogging = new akamai.AppSecAdvancedSettingsLogging("policyLogging", {
|
|
29
33
|
* configId: configuration.then(configuration => configuration.configId),
|
|
30
|
-
* securityPolicyId:
|
|
34
|
+
* securityPolicyId: "gms1_134637",
|
|
31
35
|
* logging: fs.readFileSync(`${path.module}/logging.json`),
|
|
32
36
|
* });
|
|
33
37
|
* ```
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"appSecAdvancedSettingsLogging.js","sourceRoot":"","sources":["../appSecAdvancedSettingsLogging.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"appSecAdvancedSettingsLogging.js","sourceRoot":"","sources":["../appSecAdvancedSettingsLogging.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA8BG;AACH,MAAa,6BAA8B,SAAQ,MAAM,CAAC,cAAc;IAiDpE,YAAY,IAAY,EAAE,WAAoF,EAAE,IAAmC;QAC/I,IAAI,MAAM,GAAkB,EAAE,CAAC;QAC/B,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA6D,CAAC;YAC5E,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3E;aAAM;YACH,MAAM,IAAI,GAAG,WAA4D,CAAC;YAC1E,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,MAAM,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;SACzE;QACD,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;YACf,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE,EAAC,CAAC,CAAC;SACxE;QACD,KAAK,CAAC,6BAA6B,CAAC,YAAY,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,CAAC,CAAC;IAC1E,CAAC;IAxED;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA0C,EAAE,IAAmC;QACxI,OAAO,IAAI,6BAA6B,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACpF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,6BAA6B,CAAC,YAAY,CAAC;IAC9E,CAAC;;AA1BL,sEA0EC;AA5DG,gBAAgB;AACO,0CAAY,GAAG,0EAA0E,CAAC"}
|
|
@@ -1,6 +1,14 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
|
-
*
|
|
3
|
+
* **Scopes**: Security configuration
|
|
4
|
+
*
|
|
5
|
+
* Enables inspection of internal requests (that is, requests between your origin servers and Akamai's edge servers).
|
|
6
|
+
* You can also use this resource to apply rate controls to prefetch requests.
|
|
7
|
+
* When prefetch is enabled, internal requests are inspected by your firewall the same way that external requests (requests that originate outside the firewall and outside Akamai's edge servers) are inspected.
|
|
8
|
+
*
|
|
9
|
+
* This operation applies at the security configuration level, meaning that the settings affect all the security policies in that configuration.
|
|
10
|
+
*
|
|
11
|
+
* **Related API Endpoint**: [/appsec/v1/configs/{configId}/versions/{versionNumber}/advanced-settings/prefetch](https://developer.akamai.com/api/cloud_security/application_security/v1.html#putprefetchrequestsforaconfiguration)
|
|
4
12
|
*
|
|
5
13
|
* ## Example Usage
|
|
6
14
|
*
|
|
@@ -11,14 +19,20 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
11
19
|
* import * as akamai from "@pulumi/akamai";
|
|
12
20
|
*
|
|
13
21
|
* const configuration = akamai.getAppSecConfiguration({
|
|
14
|
-
* name:
|
|
22
|
+
* name: "Documentation",
|
|
15
23
|
* });
|
|
16
24
|
* const prefetch = new akamai.AppSecAdvancedSettingsPrefetch("prefetch", {
|
|
17
25
|
* configId: configuration.then(configuration => configuration.configId),
|
|
18
26
|
* enableAppLayer: false,
|
|
19
27
|
* allExtensions: true,
|
|
20
28
|
* enableRateControls: false,
|
|
21
|
-
* extensions:
|
|
29
|
+
* extensions: [
|
|
30
|
+
* ".tiff",
|
|
31
|
+
* ".bmp",
|
|
32
|
+
* ".jpg",
|
|
33
|
+
* ".gif",
|
|
34
|
+
* ".png",
|
|
35
|
+
* ],
|
|
22
36
|
* });
|
|
23
37
|
* ```
|
|
24
38
|
*/
|
|
@@ -39,23 +53,23 @@ export declare class AppSecAdvancedSettingsPrefetch extends pulumi.CustomResourc
|
|
|
39
53
|
*/
|
|
40
54
|
static isInstance(obj: any): obj is AppSecAdvancedSettingsPrefetch;
|
|
41
55
|
/**
|
|
42
|
-
*
|
|
56
|
+
* . Set to **true** to enable prefetch requests for all file extensions; set to **false** to enable prefetch requests on only a specified set of file extensions. If set to false you must include the `extensions` argument.
|
|
43
57
|
*/
|
|
44
58
|
readonly allExtensions: pulumi.Output<boolean>;
|
|
45
59
|
/**
|
|
46
|
-
*
|
|
60
|
+
* . Unique identifier of the security configuration associated with the prefetch settings being modified.
|
|
47
61
|
*/
|
|
48
62
|
readonly configId: pulumi.Output<number>;
|
|
49
63
|
/**
|
|
50
|
-
*
|
|
64
|
+
* . Set to **true** to enable prefetch requests; set to **false** to disable prefetch requests.
|
|
51
65
|
*/
|
|
52
66
|
readonly enableAppLayer: pulumi.Output<boolean>;
|
|
53
67
|
/**
|
|
54
|
-
*
|
|
68
|
+
* . Set to **true** to enable prefetch requests for rate controls; set to **false** to disable prefetch requests for rate controls.
|
|
55
69
|
*/
|
|
56
70
|
readonly enableRateControls: pulumi.Output<boolean>;
|
|
57
71
|
/**
|
|
58
|
-
*
|
|
72
|
+
* . If `allExtensions` is **false**, this must be a JSON array of all the file extensions for which prefetch requests are enabled: prefetch requests won't be used with any file extensions not included in the array. If `allExtensions` is **true**, then this argument must be set to an empty array: **[]**.
|
|
59
73
|
*/
|
|
60
74
|
readonly extensions: pulumi.Output<string[]>;
|
|
61
75
|
/**
|
|
@@ -72,23 +86,23 @@ export declare class AppSecAdvancedSettingsPrefetch extends pulumi.CustomResourc
|
|
|
72
86
|
*/
|
|
73
87
|
export interface AppSecAdvancedSettingsPrefetchState {
|
|
74
88
|
/**
|
|
75
|
-
*
|
|
89
|
+
* . Set to **true** to enable prefetch requests for all file extensions; set to **false** to enable prefetch requests on only a specified set of file extensions. If set to false you must include the `extensions` argument.
|
|
76
90
|
*/
|
|
77
91
|
allExtensions?: pulumi.Input<boolean>;
|
|
78
92
|
/**
|
|
79
|
-
*
|
|
93
|
+
* . Unique identifier of the security configuration associated with the prefetch settings being modified.
|
|
80
94
|
*/
|
|
81
95
|
configId?: pulumi.Input<number>;
|
|
82
96
|
/**
|
|
83
|
-
*
|
|
97
|
+
* . Set to **true** to enable prefetch requests; set to **false** to disable prefetch requests.
|
|
84
98
|
*/
|
|
85
99
|
enableAppLayer?: pulumi.Input<boolean>;
|
|
86
100
|
/**
|
|
87
|
-
*
|
|
101
|
+
* . Set to **true** to enable prefetch requests for rate controls; set to **false** to disable prefetch requests for rate controls.
|
|
88
102
|
*/
|
|
89
103
|
enableRateControls?: pulumi.Input<boolean>;
|
|
90
104
|
/**
|
|
91
|
-
*
|
|
105
|
+
* . If `allExtensions` is **false**, this must be a JSON array of all the file extensions for which prefetch requests are enabled: prefetch requests won't be used with any file extensions not included in the array. If `allExtensions` is **true**, then this argument must be set to an empty array: **[]**.
|
|
92
106
|
*/
|
|
93
107
|
extensions?: pulumi.Input<pulumi.Input<string>[]>;
|
|
94
108
|
}
|
|
@@ -97,23 +111,23 @@ export interface AppSecAdvancedSettingsPrefetchState {
|
|
|
97
111
|
*/
|
|
98
112
|
export interface AppSecAdvancedSettingsPrefetchArgs {
|
|
99
113
|
/**
|
|
100
|
-
*
|
|
114
|
+
* . Set to **true** to enable prefetch requests for all file extensions; set to **false** to enable prefetch requests on only a specified set of file extensions. If set to false you must include the `extensions` argument.
|
|
101
115
|
*/
|
|
102
116
|
allExtensions: pulumi.Input<boolean>;
|
|
103
117
|
/**
|
|
104
|
-
*
|
|
118
|
+
* . Unique identifier of the security configuration associated with the prefetch settings being modified.
|
|
105
119
|
*/
|
|
106
120
|
configId: pulumi.Input<number>;
|
|
107
121
|
/**
|
|
108
|
-
*
|
|
122
|
+
* . Set to **true** to enable prefetch requests; set to **false** to disable prefetch requests.
|
|
109
123
|
*/
|
|
110
124
|
enableAppLayer: pulumi.Input<boolean>;
|
|
111
125
|
/**
|
|
112
|
-
*
|
|
126
|
+
* . Set to **true** to enable prefetch requests for rate controls; set to **false** to disable prefetch requests for rate controls.
|
|
113
127
|
*/
|
|
114
128
|
enableRateControls: pulumi.Input<boolean>;
|
|
115
129
|
/**
|
|
116
|
-
*
|
|
130
|
+
* . If `allExtensions` is **false**, this must be a JSON array of all the file extensions for which prefetch requests are enabled: prefetch requests won't be used with any file extensions not included in the array. If `allExtensions` is **true**, then this argument must be set to an empty array: **[]**.
|
|
117
131
|
*/
|
|
118
132
|
extensions: pulumi.Input<pulumi.Input<string>[]>;
|
|
119
133
|
}
|
|
@@ -6,7 +6,15 @@ exports.AppSecAdvancedSettingsPrefetch = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
-
*
|
|
9
|
+
* **Scopes**: Security configuration
|
|
10
|
+
*
|
|
11
|
+
* Enables inspection of internal requests (that is, requests between your origin servers and Akamai's edge servers).
|
|
12
|
+
* You can also use this resource to apply rate controls to prefetch requests.
|
|
13
|
+
* When prefetch is enabled, internal requests are inspected by your firewall the same way that external requests (requests that originate outside the firewall and outside Akamai's edge servers) are inspected.
|
|
14
|
+
*
|
|
15
|
+
* This operation applies at the security configuration level, meaning that the settings affect all the security policies in that configuration.
|
|
16
|
+
*
|
|
17
|
+
* **Related API Endpoint**: [/appsec/v1/configs/{configId}/versions/{versionNumber}/advanced-settings/prefetch](https://developer.akamai.com/api/cloud_security/application_security/v1.html#putprefetchrequestsforaconfiguration)
|
|
10
18
|
*
|
|
11
19
|
* ## Example Usage
|
|
12
20
|
*
|
|
@@ -17,14 +25,20 @@ const utilities = require("./utilities");
|
|
|
17
25
|
* import * as akamai from "@pulumi/akamai";
|
|
18
26
|
*
|
|
19
27
|
* const configuration = akamai.getAppSecConfiguration({
|
|
20
|
-
* name:
|
|
28
|
+
* name: "Documentation",
|
|
21
29
|
* });
|
|
22
30
|
* const prefetch = new akamai.AppSecAdvancedSettingsPrefetch("prefetch", {
|
|
23
31
|
* configId: configuration.then(configuration => configuration.configId),
|
|
24
32
|
* enableAppLayer: false,
|
|
25
33
|
* allExtensions: true,
|
|
26
34
|
* enableRateControls: false,
|
|
27
|
-
* extensions:
|
|
35
|
+
* extensions: [
|
|
36
|
+
* ".tiff",
|
|
37
|
+
* ".bmp",
|
|
38
|
+
* ".jpg",
|
|
39
|
+
* ".gif",
|
|
40
|
+
* ".png",
|
|
41
|
+
* ],
|
|
28
42
|
* });
|
|
29
43
|
* ```
|
|
30
44
|
*/
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"appSecAdvancedSettingsPrefetch.js","sourceRoot":"","sources":["../appSecAdvancedSettingsPrefetch.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"appSecAdvancedSettingsPrefetch.js","sourceRoot":"","sources":["../appSecAdvancedSettingsPrefetch.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAoCG;AACH,MAAa,8BAA+B,SAAQ,MAAM,CAAC,cAAc;IAyDrE,YAAY,IAAY,EAAE,WAAsF,EAAE,IAAmC;QACjJ,IAAI,MAAM,GAAkB,EAAE,CAAC;QAC/B,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA8D,CAAC;YAC7E,MAAM,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,MAAM,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,MAAM,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAA6D,CAAC;YAC3E,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,aAAa,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1D,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;aAChE;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,cAAc,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC3D,MAAM,IAAI,KAAK,CAAC,4CAA4C,CAAC,CAAC;aACjE;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,kBAAkB,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC/D,MAAM,IAAI,KAAK,CAAC,gDAAgD,CAAC,CAAC;aACrE;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,UAAU,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACvD,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,MAAM,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,MAAM,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,MAAM,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7D;QACD,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;YACf,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE,EAAC,CAAC,CAAC;SACxE;QACD,KAAK,CAAC,8BAA8B,CAAC,YAAY,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,CAAC,CAAC;IAC3E,CAAC;IA7FD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA2C,EAAE,IAAmC;QACzI,OAAO,IAAI,8BAA8B,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACrF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,8BAA8B,CAAC,YAAY,CAAC;IAC/E,CAAC;;AA1BL,wEA+FC;AAjFG,gBAAgB;AACO,2CAAY,GAAG,4EAA4E,CAAC"}
|
|
@@ -1,6 +1,10 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
|
-
*
|
|
3
|
+
* **Scopes**: Security policy
|
|
4
|
+
*
|
|
5
|
+
* Enables or disables API constraints protection. These constraints specify the action to be taken when designated API endpoints are invoked.
|
|
6
|
+
*
|
|
7
|
+
* **Related API Endpoint**: [/appsec/v1/configs/{configId}/versions/{versionNumber}/security-policies/{policyId}/protections](https://developer.akamai.com/api/cloud_security/application_security/v1.html#putprotections)
|
|
4
8
|
*
|
|
5
9
|
* ## Example Usage
|
|
6
10
|
*
|
|
@@ -11,14 +15,19 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
11
15
|
* import * as akamai from "@pulumi/akamai";
|
|
12
16
|
*
|
|
13
17
|
* const configuration = akamai.getAppSecConfiguration({
|
|
14
|
-
* name:
|
|
18
|
+
* name: "Documentation",
|
|
15
19
|
* });
|
|
16
20
|
* const protection = new akamai.AppSecApiConstraintsProtection("protection", {
|
|
17
21
|
* configId: configuration.then(configuration => configuration.configId),
|
|
18
|
-
* securityPolicyId:
|
|
19
|
-
* enabled:
|
|
22
|
+
* securityPolicyId: "gms1_134637",
|
|
23
|
+
* enabled: true,
|
|
20
24
|
* });
|
|
21
25
|
* ```
|
|
26
|
+
* ## Output Options
|
|
27
|
+
*
|
|
28
|
+
* The following options can be used to determine the information returned, and how that returned information is formatted:
|
|
29
|
+
*
|
|
30
|
+
* - `outputText`. Tabular report showing the current protection settings.
|
|
22
31
|
*/
|
|
23
32
|
export declare class AppSecApiConstraintsProtection extends pulumi.CustomResource {
|
|
24
33
|
/**
|
|
@@ -36,21 +45,12 @@ export declare class AppSecApiConstraintsProtection extends pulumi.CustomResourc
|
|
|
36
45
|
* when multiple copies of the Pulumi SDK have been loaded into the same process.
|
|
37
46
|
*/
|
|
38
47
|
static isInstance(obj: any): obj is AppSecApiConstraintsProtection;
|
|
39
|
-
/**
|
|
40
|
-
* The ID of the security configuration to use.
|
|
41
|
-
*/
|
|
42
48
|
readonly configId: pulumi.Output<number>;
|
|
43
|
-
/**
|
|
44
|
-
* Whether to enable API constraints protection: either `true` or `false`.
|
|
45
|
-
*/
|
|
46
49
|
readonly enabled: pulumi.Output<boolean>;
|
|
47
50
|
/**
|
|
48
|
-
*
|
|
51
|
+
* Text Export representation
|
|
49
52
|
*/
|
|
50
53
|
readonly outputText: pulumi.Output<string>;
|
|
51
|
-
/**
|
|
52
|
-
* The ID of the security policy to use.
|
|
53
|
-
*/
|
|
54
54
|
readonly securityPolicyId: pulumi.Output<string>;
|
|
55
55
|
/**
|
|
56
56
|
* Create a AppSecApiConstraintsProtection resource with the given unique name, arguments, and options.
|
|
@@ -65,37 +65,19 @@ export declare class AppSecApiConstraintsProtection extends pulumi.CustomResourc
|
|
|
65
65
|
* Input properties used for looking up and filtering AppSecApiConstraintsProtection resources.
|
|
66
66
|
*/
|
|
67
67
|
export interface AppSecApiConstraintsProtectionState {
|
|
68
|
-
/**
|
|
69
|
-
* The ID of the security configuration to use.
|
|
70
|
-
*/
|
|
71
68
|
configId?: pulumi.Input<number>;
|
|
72
|
-
/**
|
|
73
|
-
* Whether to enable API constraints protection: either `true` or `false`.
|
|
74
|
-
*/
|
|
75
69
|
enabled?: pulumi.Input<boolean>;
|
|
76
70
|
/**
|
|
77
|
-
*
|
|
71
|
+
* Text Export representation
|
|
78
72
|
*/
|
|
79
73
|
outputText?: pulumi.Input<string>;
|
|
80
|
-
/**
|
|
81
|
-
* The ID of the security policy to use.
|
|
82
|
-
*/
|
|
83
74
|
securityPolicyId?: pulumi.Input<string>;
|
|
84
75
|
}
|
|
85
76
|
/**
|
|
86
77
|
* The set of arguments for constructing a AppSecApiConstraintsProtection resource.
|
|
87
78
|
*/
|
|
88
79
|
export interface AppSecApiConstraintsProtectionArgs {
|
|
89
|
-
/**
|
|
90
|
-
* The ID of the security configuration to use.
|
|
91
|
-
*/
|
|
92
80
|
configId: pulumi.Input<number>;
|
|
93
|
-
/**
|
|
94
|
-
* Whether to enable API constraints protection: either `true` or `false`.
|
|
95
|
-
*/
|
|
96
81
|
enabled: pulumi.Input<boolean>;
|
|
97
|
-
/**
|
|
98
|
-
* The ID of the security policy to use.
|
|
99
|
-
*/
|
|
100
82
|
securityPolicyId: pulumi.Input<string>;
|
|
101
83
|
}
|