@pulumi/cloudflare 4.16.0 → 5.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (81) hide show
  1. package/README.md +1 -1
  2. package/accessRule.d.ts +6 -6
  3. package/accountMember.d.ts +2 -2
  4. package/accountMember.js +3 -0
  5. package/accountMember.js.map +1 -1
  6. package/config/vars.d.ts +0 -5
  7. package/config/vars.js +0 -6
  8. package/config/vars.js.map +1 -1
  9. package/index.d.ts +3 -30
  10. package/index.js +8 -47
  11. package/index.js.map +1 -1
  12. package/loadBalancer.d.ts +6 -12
  13. package/loadBalancerMonitor.d.ts +3 -3
  14. package/loadBalancerMonitor.js +3 -0
  15. package/loadBalancerMonitor.js.map +1 -1
  16. package/loadBalancerPool.d.ts +2 -2
  17. package/loadBalancerPool.js +3 -0
  18. package/loadBalancerPool.js.map +1 -1
  19. package/package.json +2 -2
  20. package/package.json.dev +2 -2
  21. package/provider.d.ts +0 -14
  22. package/provider.js +0 -1
  23. package/provider.js.map +1 -1
  24. package/spectrumApplication.d.ts +16 -21
  25. package/spectrumApplication.js +7 -2
  26. package/spectrumApplication.js.map +1 -1
  27. package/teamsAccount.d.ts +12 -0
  28. package/teamsAccount.js +2 -0
  29. package/teamsAccount.js.map +1 -1
  30. package/{argoTunnel.d.ts → tunnel.d.ts} +28 -30
  31. package/{argoTunnel.js → tunnel.js} +16 -18
  32. package/tunnel.js.map +1 -0
  33. package/tunnelConfig.d.ts +0 -57
  34. package/tunnelConfig.js +0 -57
  35. package/tunnelConfig.js.map +1 -1
  36. package/tunnelRoute.d.ts +0 -29
  37. package/tunnelRoute.js +0 -29
  38. package/tunnelRoute.js.map +1 -1
  39. package/types/input.d.ts +74 -98
  40. package/types/output.d.ts +74 -150
  41. package/waitingRoom.d.ts +3 -3
  42. package/workerScript.d.ts +2 -2
  43. package/workerScript.js +3 -0
  44. package/workerScript.js.map +1 -1
  45. package/workersKv.d.ts +1 -1
  46. package/workersKv.js +3 -0
  47. package/workersKv.js.map +1 -1
  48. package/workersKvNamespace.d.ts +1 -1
  49. package/workersKvNamespace.js +3 -0
  50. package/workersKvNamespace.js.map +1 -1
  51. package/zone.d.ts +2 -2
  52. package/zone.js +3 -0
  53. package/zone.js.map +1 -1
  54. package/accessBookmark.d.ts +0 -130
  55. package/accessBookmark.js +0 -87
  56. package/accessBookmark.js.map +0 -1
  57. package/argoTunnel.js.map +0 -1
  58. package/getWafGroups.d.ts +0 -100
  59. package/getWafGroups.js +0 -61
  60. package/getWafGroups.js.map +0 -1
  61. package/getWafPackages.d.ts +0 -92
  62. package/getWafPackages.js +0 -64
  63. package/getWafPackages.js.map +0 -1
  64. package/getWafRules.d.ts +0 -106
  65. package/getWafRules.js +0 -67
  66. package/getWafRules.js.map +0 -1
  67. package/ipList.d.ts +0 -125
  68. package/ipList.js +0 -102
  69. package/ipList.js.map +0 -1
  70. package/wafGroup.d.ts +0 -108
  71. package/wafGroup.js +0 -85
  72. package/wafGroup.js.map +0 -1
  73. package/wafOverride.d.ts +0 -189
  74. package/wafOverride.js +0 -108
  75. package/wafOverride.js.map +0 -1
  76. package/wafPackage.d.ts +0 -109
  77. package/wafPackage.js +0 -86
  78. package/wafPackage.js.map +0 -1
  79. package/wafRule.d.ts +0 -116
  80. package/wafRule.js +0 -90
  81. package/wafRule.js.map +0 -1
package/tunnelConfig.d.ts CHANGED
@@ -5,63 +5,6 @@ import * as outputs from "./types/output";
5
5
  * Provides a Cloudflare Tunnel configuration resource.
6
6
  *
7
7
  * !> When you delete a tunnel configuration, the tunnel will be deleted. You need to make sure that the tunnel is not in use before deleting the configuration.
8
- *
9
- * ## Example Usage
10
- *
11
- * ```typescript
12
- * import * as pulumi from "@pulumi/pulumi";
13
- * import * as cloudflare from "@pulumi/cloudflare";
14
- *
15
- * const exampleTunnel = new cloudflare.ArgoTunnel("exampleTunnel", {
16
- * accountId: "f037e56e89293a057740de681ac9abbe",
17
- * name: "example_tunnel",
18
- * secret: "<32 character secret>",
19
- * });
20
- * const exampleConfig = new cloudflare.TunnelConfig("exampleConfig", {
21
- * accountId: "f037e56e89293a057740de681ac9abbe",
22
- * tunnelId: exampleTunnel.id,
23
- * config: {
24
- * warpRouting: {
25
- * enabled: true,
26
- * },
27
- * originRequest: {
28
- * connectTimeout: "1m0s",
29
- * tlsTimeout: "1m0s",
30
- * tcpKeepAlive: "1m0s",
31
- * noHappyEyeballs: false,
32
- * keepAliveConnections: 1024,
33
- * keepAliveTimeout: "1m0s",
34
- * httpHostHeader: "baz",
35
- * originServerName: "foobar",
36
- * caPool: "/path/to/unsigned/ca/pool",
37
- * noTlsVerify: false,
38
- * disableChunkedEncoding: false,
39
- * bastionMode: false,
40
- * proxyAddress: "10.0.0.1",
41
- * proxyPort: 8123,
42
- * proxyType: "socks",
43
- * ipRules: [{
44
- * prefix: "/web",
45
- * ports: [
46
- * 80,
47
- * 443,
48
- * ],
49
- * allow: false,
50
- * }],
51
- * },
52
- * ingressRules: [
53
- * {
54
- * hostname: "foo",
55
- * path: "/bar",
56
- * service: "http://10.0.0.2:8080",
57
- * },
58
- * {
59
- * service: "https://10.0.0.3:8081",
60
- * },
61
- * ],
62
- * },
63
- * });
64
- * ```
65
8
  */
66
9
  export declare class TunnelConfig extends pulumi.CustomResource {
67
10
  /**
package/tunnelConfig.js CHANGED
@@ -9,63 +9,6 @@ const utilities = require("./utilities");
9
9
  * Provides a Cloudflare Tunnel configuration resource.
10
10
  *
11
11
  * !> When you delete a tunnel configuration, the tunnel will be deleted. You need to make sure that the tunnel is not in use before deleting the configuration.
12
- *
13
- * ## Example Usage
14
- *
15
- * ```typescript
16
- * import * as pulumi from "@pulumi/pulumi";
17
- * import * as cloudflare from "@pulumi/cloudflare";
18
- *
19
- * const exampleTunnel = new cloudflare.ArgoTunnel("exampleTunnel", {
20
- * accountId: "f037e56e89293a057740de681ac9abbe",
21
- * name: "example_tunnel",
22
- * secret: "<32 character secret>",
23
- * });
24
- * const exampleConfig = new cloudflare.TunnelConfig("exampleConfig", {
25
- * accountId: "f037e56e89293a057740de681ac9abbe",
26
- * tunnelId: exampleTunnel.id,
27
- * config: {
28
- * warpRouting: {
29
- * enabled: true,
30
- * },
31
- * originRequest: {
32
- * connectTimeout: "1m0s",
33
- * tlsTimeout: "1m0s",
34
- * tcpKeepAlive: "1m0s",
35
- * noHappyEyeballs: false,
36
- * keepAliveConnections: 1024,
37
- * keepAliveTimeout: "1m0s",
38
- * httpHostHeader: "baz",
39
- * originServerName: "foobar",
40
- * caPool: "/path/to/unsigned/ca/pool",
41
- * noTlsVerify: false,
42
- * disableChunkedEncoding: false,
43
- * bastionMode: false,
44
- * proxyAddress: "10.0.0.1",
45
- * proxyPort: 8123,
46
- * proxyType: "socks",
47
- * ipRules: [{
48
- * prefix: "/web",
49
- * ports: [
50
- * 80,
51
- * 443,
52
- * ],
53
- * allow: false,
54
- * }],
55
- * },
56
- * ingressRules: [
57
- * {
58
- * hostname: "foo",
59
- * path: "/bar",
60
- * service: "http://10.0.0.2:8080",
61
- * },
62
- * {
63
- * service: "https://10.0.0.3:8081",
64
- * },
65
- * ],
66
- * },
67
- * });
68
- * ```
69
12
  */
70
13
  class TunnelConfig extends pulumi.CustomResource {
71
14
  /**
@@ -1 +1 @@
1
- {"version":3,"file":"tunnelConfig.js","sourceRoot":"","sources":["../tunnelConfig.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA6DG;AACH,MAAa,YAAa,SAAQ,MAAM,CAAC,cAAc;IACnD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAyB,EAAE,IAAmC;QACvH,OAAO,IAAI,YAAY,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACnE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,YAAY,CAAC,YAAY,CAAC;IAC7D,CAAC;IAuBD,YAAY,IAAY,EAAE,WAAkD,EAAE,IAAmC;QAC7G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA4C,CAAC;YAC3D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SACnE;aAAM;YACH,MAAM,IAAI,GAAG,WAA2C,CAAC;YACzD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,SAAS,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACtD,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SACjE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,YAAY,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACjE,CAAC;;AA1EL,oCA2EC;AA7DG,gBAAgB;AACO,yBAAY,GAAG,4CAA4C,CAAC"}
1
+ {"version":3,"file":"tunnelConfig.js","sourceRoot":"","sources":["../tunnelConfig.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;GAIG;AACH,MAAa,YAAa,SAAQ,MAAM,CAAC,cAAc;IACnD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAyB,EAAE,IAAmC;QACvH,OAAO,IAAI,YAAY,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACnE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,YAAY,CAAC,YAAY,CAAC;IAC7D,CAAC;IAuBD,YAAY,IAAY,EAAE,WAAkD,EAAE,IAAmC;QAC7G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA4C,CAAC;YAC3D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SACnE;aAAM;YACH,MAAM,IAAI,GAAG,WAA2C,CAAC;YACzD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,SAAS,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACtD,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SACjE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,YAAY,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACjE,CAAC;;AA1EL,oCA2EC;AA7DG,gBAAgB;AACO,yBAAY,GAAG,4CAA4C,CAAC"}
package/tunnelRoute.d.ts CHANGED
@@ -4,35 +4,6 @@ import * as pulumi from "@pulumi/pulumi";
4
4
  * Trust. Tunnel routes are used to direct IP traffic through
5
5
  * Cloudflare Tunnels.
6
6
  *
7
- * ## Example Usage
8
- *
9
- * ```typescript
10
- * import * as pulumi from "@pulumi/pulumi";
11
- * import * as cloudflare from "@pulumi/cloudflare";
12
- *
13
- * // Tunnel route
14
- * const exampleTunnelRoute = new cloudflare.TunnelRoute("exampleTunnelRoute", {
15
- * accountId: "f037e56e89293a057740de681ac9abbe",
16
- * tunnelId: "f70ff985-a4ef-4643-bbbc-4a0ed4fc8415",
17
- * network: "192.0.2.24/32",
18
- * comment: "New tunnel route for documentation",
19
- * virtualNetworkId: "bdc39a3c-3104-4c23-8ac0-9f455dda691a",
20
- * });
21
- * // Tunnel with tunnel route
22
- * const tunnel = new cloudflare.ArgoTunnel("tunnel", {
23
- * accountId: "f037e56e89293a057740de681ac9abbe",
24
- * name: "my_tunnel",
25
- * secret: "AQIDBAUGBwgBAgMEBQYHCAECAwQFBgcIAQIDBAUGBwg=",
26
- * });
27
- * const exampleIndex_tunnelRouteTunnelRoute = new cloudflare.TunnelRoute("exampleIndex/tunnelRouteTunnelRoute", {
28
- * accountId: "f037e56e89293a057740de681ac9abbe",
29
- * tunnelId: tunnel.id,
30
- * network: "192.0.2.24/32",
31
- * comment: "New tunnel route for documentation",
32
- * virtualNetworkId: "bdc39a3c-3104-4c23-8ac0-9f455dda691a",
33
- * });
34
- * ```
35
- *
36
7
  * ## Import
37
8
  *
38
9
  * ```sh
package/tunnelRoute.js CHANGED
@@ -10,35 +10,6 @@ const utilities = require("./utilities");
10
10
  * Trust. Tunnel routes are used to direct IP traffic through
11
11
  * Cloudflare Tunnels.
12
12
  *
13
- * ## Example Usage
14
- *
15
- * ```typescript
16
- * import * as pulumi from "@pulumi/pulumi";
17
- * import * as cloudflare from "@pulumi/cloudflare";
18
- *
19
- * // Tunnel route
20
- * const exampleTunnelRoute = new cloudflare.TunnelRoute("exampleTunnelRoute", {
21
- * accountId: "f037e56e89293a057740de681ac9abbe",
22
- * tunnelId: "f70ff985-a4ef-4643-bbbc-4a0ed4fc8415",
23
- * network: "192.0.2.24/32",
24
- * comment: "New tunnel route for documentation",
25
- * virtualNetworkId: "bdc39a3c-3104-4c23-8ac0-9f455dda691a",
26
- * });
27
- * // Tunnel with tunnel route
28
- * const tunnel = new cloudflare.ArgoTunnel("tunnel", {
29
- * accountId: "f037e56e89293a057740de681ac9abbe",
30
- * name: "my_tunnel",
31
- * secret: "AQIDBAUGBwgBAgMEBQYHCAECAwQFBgcIAQIDBAUGBwg=",
32
- * });
33
- * const exampleIndex_tunnelRouteTunnelRoute = new cloudflare.TunnelRoute("exampleIndex/tunnelRouteTunnelRoute", {
34
- * accountId: "f037e56e89293a057740de681ac9abbe",
35
- * tunnelId: tunnel.id,
36
- * network: "192.0.2.24/32",
37
- * comment: "New tunnel route for documentation",
38
- * virtualNetworkId: "bdc39a3c-3104-4c23-8ac0-9f455dda691a",
39
- * });
40
- * ```
41
- *
42
13
  * ## Import
43
14
  *
44
15
  * ```sh
@@ -1 +1 @@
1
- {"version":3,"file":"tunnelRoute.js","sourceRoot":"","sources":["../tunnelRoute.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAuCG;AACH,MAAa,WAAY,SAAQ,MAAM,CAAC,cAAc;IAClD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwB,EAAE,IAAmC;QACtH,OAAO,IAAI,WAAW,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAClE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,WAAW,CAAC,YAAY,CAAC;IAC5D,CAAC;IA+BD,YAAY,IAAY,EAAE,WAAgD,EAAE,IAAmC;QAC3G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA2C,CAAC;YAC1D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;SACnF;aAAM;YACH,MAAM,IAAI,GAAG,WAA0C,CAAC;YACxD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,SAAS,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACtD,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;SACjF;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,WAAW,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAChE,CAAC;;AAtFL,kCAuFC;AAzEG,gBAAgB;AACO,wBAAY,GAAG,0CAA0C,CAAC"}
1
+ {"version":3,"file":"tunnelRoute.js","sourceRoot":"","sources":["../tunnelRoute.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;GAUG;AACH,MAAa,WAAY,SAAQ,MAAM,CAAC,cAAc;IAClD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwB,EAAE,IAAmC;QACtH,OAAO,IAAI,WAAW,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAClE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,WAAW,CAAC,YAAY,CAAC;IAC5D,CAAC;IA+BD,YAAY,IAAY,EAAE,WAAgD,EAAE,IAAmC;QAC3G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA2C,CAAC;YAC1D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;SACnF;aAAM;YACH,MAAM,IAAI,GAAG,WAA0C,CAAC;YACxD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,SAAS,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACtD,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;SACjF;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,WAAW,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAChE,CAAC;;AAtFL,kCAuFC;AAzEG,gBAAgB;AACO,wBAAY,GAAG,0CAA0C,CAAC"}
package/types/input.d.ts CHANGED
@@ -966,90 +966,6 @@ export interface GetRulesetsFilterArgs {
966
966
  */
967
967
  version?: pulumi.Input<string>;
968
968
  }
969
- export interface GetWafGroupsFilter {
970
- /**
971
- * Mode of the WAF Rule Groups to lookup. Valid values: on and off.
972
- */
973
- mode?: string;
974
- /**
975
- * A regular expression matching the name of the WAF Rule Groups to lookup.
976
- */
977
- name?: string;
978
- }
979
- export interface GetWafGroupsFilterArgs {
980
- /**
981
- * Mode of the WAF Rule Groups to lookup. Valid values: on and off.
982
- */
983
- mode?: pulumi.Input<string>;
984
- /**
985
- * A regular expression matching the name of the WAF Rule Groups to lookup.
986
- */
987
- name?: pulumi.Input<string>;
988
- }
989
- export interface GetWafPackagesFilter {
990
- /**
991
- * Action mode of the WAF Rule Packages to lookup. Valid values: simulate, block and challenge.
992
- */
993
- actionMode?: string;
994
- /**
995
- * Detection mode of the WAF Rule Packages to lookup.
996
- */
997
- detectionMode?: string;
998
- /**
999
- * A regular expression matching the name of the WAF Rule Packages to lookup.
1000
- */
1001
- name?: string;
1002
- /**
1003
- * Sensitivity of the WAF Rule Packages to lookup. Valid values: high, medium, low and off.
1004
- */
1005
- sensitivity?: string;
1006
- }
1007
- export interface GetWafPackagesFilterArgs {
1008
- /**
1009
- * Action mode of the WAF Rule Packages to lookup. Valid values: simulate, block and challenge.
1010
- */
1011
- actionMode?: pulumi.Input<string>;
1012
- /**
1013
- * Detection mode of the WAF Rule Packages to lookup.
1014
- */
1015
- detectionMode?: pulumi.Input<string>;
1016
- /**
1017
- * A regular expression matching the name of the WAF Rule Packages to lookup.
1018
- */
1019
- name?: pulumi.Input<string>;
1020
- /**
1021
- * Sensitivity of the WAF Rule Packages to lookup. Valid values: high, medium, low and off.
1022
- */
1023
- sensitivity?: pulumi.Input<string>;
1024
- }
1025
- export interface GetWafRulesFilter {
1026
- /**
1027
- * A regular expression matching the description of the WAF Rules to lookup.
1028
- */
1029
- description?: string;
1030
- /**
1031
- * The ID of the WAF Rule Group in which the WAF Rules to lookup have to be.
1032
- */
1033
- groupId?: string;
1034
- /**
1035
- * Mode of the WAF Rules to lookup. Valid values: one of ["block", "challenge", "default", "disable", "simulate"] or ["on", "off"] depending on the WAF Rule type.
1036
- */
1037
- mode?: string;
1038
- }
1039
- export interface GetWafRulesFilterArgs {
1040
- /**
1041
- * A regular expression matching the description of the WAF Rules to lookup.
1042
- */
1043
- description?: pulumi.Input<string>;
1044
- /**
1045
- * The ID of the WAF Rule Group in which the WAF Rules to lookup have to be.
1046
- */
1047
- groupId?: pulumi.Input<string>;
1048
- /**
1049
- * Mode of the WAF Rules to lookup. Valid values: one of ["block", "challenge", "default", "disable", "simulate"] or ["on", "off"] depending on the WAF Rule type.
1050
- */
1051
- mode?: pulumi.Input<string>;
1052
- }
1053
969
  export interface GetZonesFilter {
1054
970
  /**
1055
971
  * The account identifier to target for the resource.
@@ -1112,16 +1028,6 @@ export interface HealthcheckHeader {
1112
1028
  */
1113
1029
  values: pulumi.Input<pulumi.Input<string>[]>;
1114
1030
  }
1115
- export interface IpListItem {
1116
- /**
1117
- * A note that can be used to annotate the item.
1118
- */
1119
- comment?: pulumi.Input<string>;
1120
- /**
1121
- * The IPv4 address, IPv4 CIDR or IPv6 CIDR. IPv6 CIDRs are limited to a maximum of /64.
1122
- */
1123
- value: pulumi.Input<string>;
1124
- }
1125
1031
  export interface ListItem {
1126
1032
  /**
1127
1033
  * An optional comment for the item.
@@ -1328,11 +1234,9 @@ export interface LoadBalancerRuleOverride {
1328
1234
  */
1329
1235
  sessionAffinity?: pulumi.Input<string>;
1330
1236
  /**
1331
- * See `sessionAffinityAttributes`.
1237
+ * Configure cookie attributes for session affinity cookie.
1332
1238
  */
1333
- sessionAffinityAttributes?: pulumi.Input<{
1334
- [key: string]: pulumi.Input<string>;
1335
- }>;
1239
+ sessionAffinityAttributes?: pulumi.Input<pulumi.Input<inputs.LoadBalancerRuleOverrideSessionAffinityAttribute>[]>;
1336
1240
  /**
1337
1241
  * Time, in seconds, until this load balancer's session affinity cookie expires after being created. This parameter is ignored unless a supported session affinity policy is set. The current default of `82800` (23 hours) will be used unless `sessionAffinityTtl` is explicitly set. Once the expiry time has been reached, subsequent requests may get sent to a different origin server. Valid values are between `1800` and `604800`.
1338
1242
  */
@@ -1404,6 +1308,38 @@ export interface LoadBalancerRuleOverrideRegionPool {
1404
1308
  */
1405
1309
  region: pulumi.Input<string>;
1406
1310
  }
1311
+ export interface LoadBalancerRuleOverrideSessionAffinityAttribute {
1312
+ /**
1313
+ * Configures the SameSite attribute on session affinity cookie. Value `Auto` will be translated to `Lax` or `None` depending if Always Use HTTPS is enabled. Note: when using value `None`, then you can not set `secure="Never"`. Available values: `Auto`, `Lax`, `None`, `Strict`. Defaults to `Auto`.
1314
+ */
1315
+ samesite?: pulumi.Input<string>;
1316
+ /**
1317
+ * Configures the Secure attribute on session affinity cookie. Value `Always` indicates the Secure attribute will be set in the Set-Cookie header, `Never` indicates the Secure attribute will not be set, and `Auto` will set the Secure attribute depending if Always Use HTTPS is enabled. Available values: `Auto`, `Always`, `Never`. Defaults to `Auto`.
1318
+ */
1319
+ secure?: pulumi.Input<string>;
1320
+ /**
1321
+ * Configures the zero-downtime failover between origins within a pool when session affinity is enabled. Value `none` means no failover takes place for sessions pinned to the origin. Value `temporary` means traffic will be sent to another other healthy origin until the originally pinned origin is available; note that this can potentially result in heavy origin flapping. Value `sticky` means the session affinity cookie is updated and subsequent requests are sent to the new origin. This feature is currently incompatible with Argo, Tiered Cache, and Bandwidth Alliance. Available values: `none`, `temporary`, `sticky`. Defaults to `none`.
1322
+ */
1323
+ zeroDowntimeFailover?: pulumi.Input<string>;
1324
+ }
1325
+ export interface LoadBalancerSessionAffinityAttribute {
1326
+ /**
1327
+ * Configures the drain duration in seconds. This field is only used when session affinity is enabled on the load balancer. Defaults to `0`.
1328
+ */
1329
+ drainDuration?: pulumi.Input<number>;
1330
+ /**
1331
+ * Configures the SameSite attribute on session affinity cookie. Value `Auto` will be translated to `Lax` or `None` depending if Always Use HTTPS is enabled. Note: when using value `None`, then you can not set `secure="Never"`. Available values: `Auto`, `Lax`, `None`, `Strict`. Defaults to `Auto`.
1332
+ */
1333
+ samesite?: pulumi.Input<string>;
1334
+ /**
1335
+ * Configures the Secure attribute on session affinity cookie. Value `Always` indicates the Secure attribute will be set in the Set-Cookie header, `Never` indicates the Secure attribute will not be set, and `Auto` will set the Secure attribute depending if Always Use HTTPS is enabled. Available values: `Auto`, `Always`, `Never`. Defaults to `Auto`.
1336
+ */
1337
+ secure?: pulumi.Input<string>;
1338
+ /**
1339
+ * Configures the zero-downtime failover between origins within a pool when session affinity is enabled. Value `none` means no failover takes place for sessions pinned to the origin. Value `temporary` means traffic will be sent to another other healthy origin until the originally pinned origin is available; note that this can potentially result in heavy origin flapping. Value `sticky` means the session affinity cookie is updated and subsequent requests are sent to the new origin. This feature is currently incompatible with Argo, Tiered Cache, and Bandwidth Alliance. Available values: `none`, `temporary`, `sticky`. Defaults to `none`.
1340
+ */
1341
+ zeroDowntimeFailover?: pulumi.Input<string>;
1342
+ }
1407
1343
  export interface ManagedHeadersManagedRequestHeader {
1408
1344
  /**
1409
1345
  * Whether the headers rule is active.
@@ -2300,6 +2236,20 @@ export interface SpectrumApplicationDns {
2300
2236
  */
2301
2237
  type: pulumi.Input<string>;
2302
2238
  }
2239
+ export interface SpectrumApplicationEdgeIps {
2240
+ /**
2241
+ * The IP versions supported for inbound connections on Spectrum anycast IPs. Required when `type` is not `static`. Available values: `all`, `ipv4`, `ipv6`.
2242
+ */
2243
+ connectivity?: pulumi.Input<string>;
2244
+ /**
2245
+ * The collection of customer owned IPs to broadcast via anycast for this hostname and application. Requires [Bring Your Own IP](https://developers.cloudflare.com/spectrum/getting-started/byoip/) provisioned.
2246
+ */
2247
+ ips?: pulumi.Input<pulumi.Input<string>[]>;
2248
+ /**
2249
+ * The type of edge IP configuration specified. Available values: `dynamic`, `static`.
2250
+ */
2251
+ type: pulumi.Input<string>;
2252
+ }
2303
2253
  export interface SpectrumApplicationOriginDns {
2304
2254
  /**
2305
2255
  * Fully qualified domain name of the origin.
@@ -2411,6 +2361,12 @@ export interface TeamsAccountLoggingSettingsByRuleTypeL4 {
2411
2361
  logAll: pulumi.Input<boolean>;
2412
2362
  logBlocks: pulumi.Input<boolean>;
2413
2363
  }
2364
+ export interface TeamsAccountPayloadLog {
2365
+ /**
2366
+ * Public key used to encrypt matched payloads.
2367
+ */
2368
+ publicKey: pulumi.Input<string>;
2369
+ }
2414
2370
  export interface TeamsAccountProxy {
2415
2371
  /**
2416
2372
  * Whether gateway proxy is enabled on gateway devices for TCP traffic.
@@ -2474,6 +2430,14 @@ export interface TeamsRuleRuleSettings {
2474
2430
  * The IPs to override matching DNS queries with.
2475
2431
  */
2476
2432
  overrideIps?: pulumi.Input<pulumi.Input<string>[]>;
2433
+ /**
2434
+ * Configure DLP Payload Logging settings for this rule.
2435
+ */
2436
+ payloadLog?: pulumi.Input<inputs.TeamsRuleRuleSettingsPayloadLog>;
2437
+ /**
2438
+ * Configure untrusted certificate settings for this rule.
2439
+ */
2440
+ untrustedCert?: pulumi.Input<inputs.TeamsRuleRuleSettingsUntrustedCert>;
2477
2441
  }
2478
2442
  export interface TeamsRuleRuleSettingsBisoAdminControls {
2479
2443
  disableCopyPaste?: pulumi.Input<boolean>;
@@ -2495,6 +2459,18 @@ export interface TeamsRuleRuleSettingsL4override {
2495
2459
  ip: pulumi.Input<string>;
2496
2460
  port: pulumi.Input<number>;
2497
2461
  }
2462
+ export interface TeamsRuleRuleSettingsPayloadLog {
2463
+ /**
2464
+ * Indicator of rule enablement.
2465
+ */
2466
+ enabled: pulumi.Input<boolean>;
2467
+ }
2468
+ export interface TeamsRuleRuleSettingsUntrustedCert {
2469
+ /**
2470
+ * The action executed by matched teams rule. Available values: `allow`, `block`, `safesearch`, `ytrestricted`, `on`, `off`, `scan`, `noscan`, `isolate`, `noisolate`, `override`, `l4Override`, `egress`.
2471
+ */
2472
+ action?: pulumi.Input<string>;
2473
+ }
2498
2474
  export interface TunnelConfigConfig {
2499
2475
  /**
2500
2476
  * Each incoming request received by cloudflared causes cloudflared to send a request to a local service. This section configures the rules that determine which requests are sent to which local services. [Read more](https://developers.cloudflare.com/cloudflare-one/connections/connect-apps/install-and-setup/tunnel-guide/local/local-management/ingress/).