@pulumi/cloudflare 4.16.0 → 5.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +1 -1
- package/accessRule.d.ts +6 -6
- package/accountMember.d.ts +2 -2
- package/accountMember.js +3 -0
- package/accountMember.js.map +1 -1
- package/config/vars.d.ts +0 -5
- package/config/vars.js +0 -6
- package/config/vars.js.map +1 -1
- package/index.d.ts +3 -30
- package/index.js +8 -47
- package/index.js.map +1 -1
- package/loadBalancer.d.ts +6 -12
- package/loadBalancerMonitor.d.ts +3 -3
- package/loadBalancerMonitor.js +3 -0
- package/loadBalancerMonitor.js.map +1 -1
- package/loadBalancerPool.d.ts +2 -2
- package/loadBalancerPool.js +3 -0
- package/loadBalancerPool.js.map +1 -1
- package/package.json +2 -2
- package/package.json.dev +2 -2
- package/provider.d.ts +0 -14
- package/provider.js +0 -1
- package/provider.js.map +1 -1
- package/spectrumApplication.d.ts +16 -21
- package/spectrumApplication.js +7 -2
- package/spectrumApplication.js.map +1 -1
- package/teamsAccount.d.ts +12 -0
- package/teamsAccount.js +2 -0
- package/teamsAccount.js.map +1 -1
- package/{argoTunnel.d.ts → tunnel.d.ts} +28 -30
- package/{argoTunnel.js → tunnel.js} +16 -18
- package/tunnel.js.map +1 -0
- package/tunnelConfig.d.ts +0 -57
- package/tunnelConfig.js +0 -57
- package/tunnelConfig.js.map +1 -1
- package/tunnelRoute.d.ts +0 -29
- package/tunnelRoute.js +0 -29
- package/tunnelRoute.js.map +1 -1
- package/types/input.d.ts +74 -98
- package/types/output.d.ts +74 -150
- package/waitingRoom.d.ts +3 -3
- package/workerScript.d.ts +2 -2
- package/workerScript.js +3 -0
- package/workerScript.js.map +1 -1
- package/workersKv.d.ts +1 -1
- package/workersKv.js +3 -0
- package/workersKv.js.map +1 -1
- package/workersKvNamespace.d.ts +1 -1
- package/workersKvNamespace.js +3 -0
- package/workersKvNamespace.js.map +1 -1
- package/zone.d.ts +2 -2
- package/zone.js +3 -0
- package/zone.js.map +1 -1
- package/accessBookmark.d.ts +0 -130
- package/accessBookmark.js +0 -87
- package/accessBookmark.js.map +0 -1
- package/argoTunnel.js.map +0 -1
- package/getWafGroups.d.ts +0 -100
- package/getWafGroups.js +0 -61
- package/getWafGroups.js.map +0 -1
- package/getWafPackages.d.ts +0 -92
- package/getWafPackages.js +0 -64
- package/getWafPackages.js.map +0 -1
- package/getWafRules.d.ts +0 -106
- package/getWafRules.js +0 -67
- package/getWafRules.js.map +0 -1
- package/ipList.d.ts +0 -125
- package/ipList.js +0 -102
- package/ipList.js.map +0 -1
- package/wafGroup.d.ts +0 -108
- package/wafGroup.js +0 -85
- package/wafGroup.js.map +0 -1
- package/wafOverride.d.ts +0 -189
- package/wafOverride.js +0 -108
- package/wafOverride.js.map +0 -1
- package/wafPackage.d.ts +0 -109
- package/wafPackage.js +0 -86
- package/wafPackage.js.map +0 -1
- package/wafRule.d.ts +0 -116
- package/wafRule.js +0 -90
- package/wafRule.js.map +0 -1
package/tunnelConfig.d.ts
CHANGED
|
@@ -5,63 +5,6 @@ import * as outputs from "./types/output";
|
|
|
5
5
|
* Provides a Cloudflare Tunnel configuration resource.
|
|
6
6
|
*
|
|
7
7
|
* !> When you delete a tunnel configuration, the tunnel will be deleted. You need to make sure that the tunnel is not in use before deleting the configuration.
|
|
8
|
-
*
|
|
9
|
-
* ## Example Usage
|
|
10
|
-
*
|
|
11
|
-
* ```typescript
|
|
12
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
13
|
-
* import * as cloudflare from "@pulumi/cloudflare";
|
|
14
|
-
*
|
|
15
|
-
* const exampleTunnel = new cloudflare.ArgoTunnel("exampleTunnel", {
|
|
16
|
-
* accountId: "f037e56e89293a057740de681ac9abbe",
|
|
17
|
-
* name: "example_tunnel",
|
|
18
|
-
* secret: "<32 character secret>",
|
|
19
|
-
* });
|
|
20
|
-
* const exampleConfig = new cloudflare.TunnelConfig("exampleConfig", {
|
|
21
|
-
* accountId: "f037e56e89293a057740de681ac9abbe",
|
|
22
|
-
* tunnelId: exampleTunnel.id,
|
|
23
|
-
* config: {
|
|
24
|
-
* warpRouting: {
|
|
25
|
-
* enabled: true,
|
|
26
|
-
* },
|
|
27
|
-
* originRequest: {
|
|
28
|
-
* connectTimeout: "1m0s",
|
|
29
|
-
* tlsTimeout: "1m0s",
|
|
30
|
-
* tcpKeepAlive: "1m0s",
|
|
31
|
-
* noHappyEyeballs: false,
|
|
32
|
-
* keepAliveConnections: 1024,
|
|
33
|
-
* keepAliveTimeout: "1m0s",
|
|
34
|
-
* httpHostHeader: "baz",
|
|
35
|
-
* originServerName: "foobar",
|
|
36
|
-
* caPool: "/path/to/unsigned/ca/pool",
|
|
37
|
-
* noTlsVerify: false,
|
|
38
|
-
* disableChunkedEncoding: false,
|
|
39
|
-
* bastionMode: false,
|
|
40
|
-
* proxyAddress: "10.0.0.1",
|
|
41
|
-
* proxyPort: 8123,
|
|
42
|
-
* proxyType: "socks",
|
|
43
|
-
* ipRules: [{
|
|
44
|
-
* prefix: "/web",
|
|
45
|
-
* ports: [
|
|
46
|
-
* 80,
|
|
47
|
-
* 443,
|
|
48
|
-
* ],
|
|
49
|
-
* allow: false,
|
|
50
|
-
* }],
|
|
51
|
-
* },
|
|
52
|
-
* ingressRules: [
|
|
53
|
-
* {
|
|
54
|
-
* hostname: "foo",
|
|
55
|
-
* path: "/bar",
|
|
56
|
-
* service: "http://10.0.0.2:8080",
|
|
57
|
-
* },
|
|
58
|
-
* {
|
|
59
|
-
* service: "https://10.0.0.3:8081",
|
|
60
|
-
* },
|
|
61
|
-
* ],
|
|
62
|
-
* },
|
|
63
|
-
* });
|
|
64
|
-
* ```
|
|
65
8
|
*/
|
|
66
9
|
export declare class TunnelConfig extends pulumi.CustomResource {
|
|
67
10
|
/**
|
package/tunnelConfig.js
CHANGED
|
@@ -9,63 +9,6 @@ const utilities = require("./utilities");
|
|
|
9
9
|
* Provides a Cloudflare Tunnel configuration resource.
|
|
10
10
|
*
|
|
11
11
|
* !> When you delete a tunnel configuration, the tunnel will be deleted. You need to make sure that the tunnel is not in use before deleting the configuration.
|
|
12
|
-
*
|
|
13
|
-
* ## Example Usage
|
|
14
|
-
*
|
|
15
|
-
* ```typescript
|
|
16
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
17
|
-
* import * as cloudflare from "@pulumi/cloudflare";
|
|
18
|
-
*
|
|
19
|
-
* const exampleTunnel = new cloudflare.ArgoTunnel("exampleTunnel", {
|
|
20
|
-
* accountId: "f037e56e89293a057740de681ac9abbe",
|
|
21
|
-
* name: "example_tunnel",
|
|
22
|
-
* secret: "<32 character secret>",
|
|
23
|
-
* });
|
|
24
|
-
* const exampleConfig = new cloudflare.TunnelConfig("exampleConfig", {
|
|
25
|
-
* accountId: "f037e56e89293a057740de681ac9abbe",
|
|
26
|
-
* tunnelId: exampleTunnel.id,
|
|
27
|
-
* config: {
|
|
28
|
-
* warpRouting: {
|
|
29
|
-
* enabled: true,
|
|
30
|
-
* },
|
|
31
|
-
* originRequest: {
|
|
32
|
-
* connectTimeout: "1m0s",
|
|
33
|
-
* tlsTimeout: "1m0s",
|
|
34
|
-
* tcpKeepAlive: "1m0s",
|
|
35
|
-
* noHappyEyeballs: false,
|
|
36
|
-
* keepAliveConnections: 1024,
|
|
37
|
-
* keepAliveTimeout: "1m0s",
|
|
38
|
-
* httpHostHeader: "baz",
|
|
39
|
-
* originServerName: "foobar",
|
|
40
|
-
* caPool: "/path/to/unsigned/ca/pool",
|
|
41
|
-
* noTlsVerify: false,
|
|
42
|
-
* disableChunkedEncoding: false,
|
|
43
|
-
* bastionMode: false,
|
|
44
|
-
* proxyAddress: "10.0.0.1",
|
|
45
|
-
* proxyPort: 8123,
|
|
46
|
-
* proxyType: "socks",
|
|
47
|
-
* ipRules: [{
|
|
48
|
-
* prefix: "/web",
|
|
49
|
-
* ports: [
|
|
50
|
-
* 80,
|
|
51
|
-
* 443,
|
|
52
|
-
* ],
|
|
53
|
-
* allow: false,
|
|
54
|
-
* }],
|
|
55
|
-
* },
|
|
56
|
-
* ingressRules: [
|
|
57
|
-
* {
|
|
58
|
-
* hostname: "foo",
|
|
59
|
-
* path: "/bar",
|
|
60
|
-
* service: "http://10.0.0.2:8080",
|
|
61
|
-
* },
|
|
62
|
-
* {
|
|
63
|
-
* service: "https://10.0.0.3:8081",
|
|
64
|
-
* },
|
|
65
|
-
* ],
|
|
66
|
-
* },
|
|
67
|
-
* });
|
|
68
|
-
* ```
|
|
69
12
|
*/
|
|
70
13
|
class TunnelConfig extends pulumi.CustomResource {
|
|
71
14
|
/**
|
package/tunnelConfig.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"tunnelConfig.js","sourceRoot":"","sources":["../tunnelConfig.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"tunnelConfig.js","sourceRoot":"","sources":["../tunnelConfig.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;GAIG;AACH,MAAa,YAAa,SAAQ,MAAM,CAAC,cAAc;IACnD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAyB,EAAE,IAAmC;QACvH,OAAO,IAAI,YAAY,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACnE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,YAAY,CAAC,YAAY,CAAC;IAC7D,CAAC;IAuBD,YAAY,IAAY,EAAE,WAAkD,EAAE,IAAmC;QAC7G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA4C,CAAC;YAC3D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SACnE;aAAM;YACH,MAAM,IAAI,GAAG,WAA2C,CAAC;YACzD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,SAAS,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACtD,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SACjE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,YAAY,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACjE,CAAC;;AA1EL,oCA2EC;AA7DG,gBAAgB;AACO,yBAAY,GAAG,4CAA4C,CAAC"}
|
package/tunnelRoute.d.ts
CHANGED
|
@@ -4,35 +4,6 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
4
4
|
* Trust. Tunnel routes are used to direct IP traffic through
|
|
5
5
|
* Cloudflare Tunnels.
|
|
6
6
|
*
|
|
7
|
-
* ## Example Usage
|
|
8
|
-
*
|
|
9
|
-
* ```typescript
|
|
10
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
11
|
-
* import * as cloudflare from "@pulumi/cloudflare";
|
|
12
|
-
*
|
|
13
|
-
* // Tunnel route
|
|
14
|
-
* const exampleTunnelRoute = new cloudflare.TunnelRoute("exampleTunnelRoute", {
|
|
15
|
-
* accountId: "f037e56e89293a057740de681ac9abbe",
|
|
16
|
-
* tunnelId: "f70ff985-a4ef-4643-bbbc-4a0ed4fc8415",
|
|
17
|
-
* network: "192.0.2.24/32",
|
|
18
|
-
* comment: "New tunnel route for documentation",
|
|
19
|
-
* virtualNetworkId: "bdc39a3c-3104-4c23-8ac0-9f455dda691a",
|
|
20
|
-
* });
|
|
21
|
-
* // Tunnel with tunnel route
|
|
22
|
-
* const tunnel = new cloudflare.ArgoTunnel("tunnel", {
|
|
23
|
-
* accountId: "f037e56e89293a057740de681ac9abbe",
|
|
24
|
-
* name: "my_tunnel",
|
|
25
|
-
* secret: "AQIDBAUGBwgBAgMEBQYHCAECAwQFBgcIAQIDBAUGBwg=",
|
|
26
|
-
* });
|
|
27
|
-
* const exampleIndex_tunnelRouteTunnelRoute = new cloudflare.TunnelRoute("exampleIndex/tunnelRouteTunnelRoute", {
|
|
28
|
-
* accountId: "f037e56e89293a057740de681ac9abbe",
|
|
29
|
-
* tunnelId: tunnel.id,
|
|
30
|
-
* network: "192.0.2.24/32",
|
|
31
|
-
* comment: "New tunnel route for documentation",
|
|
32
|
-
* virtualNetworkId: "bdc39a3c-3104-4c23-8ac0-9f455dda691a",
|
|
33
|
-
* });
|
|
34
|
-
* ```
|
|
35
|
-
*
|
|
36
7
|
* ## Import
|
|
37
8
|
*
|
|
38
9
|
* ```sh
|
package/tunnelRoute.js
CHANGED
|
@@ -10,35 +10,6 @@ const utilities = require("./utilities");
|
|
|
10
10
|
* Trust. Tunnel routes are used to direct IP traffic through
|
|
11
11
|
* Cloudflare Tunnels.
|
|
12
12
|
*
|
|
13
|
-
* ## Example Usage
|
|
14
|
-
*
|
|
15
|
-
* ```typescript
|
|
16
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
17
|
-
* import * as cloudflare from "@pulumi/cloudflare";
|
|
18
|
-
*
|
|
19
|
-
* // Tunnel route
|
|
20
|
-
* const exampleTunnelRoute = new cloudflare.TunnelRoute("exampleTunnelRoute", {
|
|
21
|
-
* accountId: "f037e56e89293a057740de681ac9abbe",
|
|
22
|
-
* tunnelId: "f70ff985-a4ef-4643-bbbc-4a0ed4fc8415",
|
|
23
|
-
* network: "192.0.2.24/32",
|
|
24
|
-
* comment: "New tunnel route for documentation",
|
|
25
|
-
* virtualNetworkId: "bdc39a3c-3104-4c23-8ac0-9f455dda691a",
|
|
26
|
-
* });
|
|
27
|
-
* // Tunnel with tunnel route
|
|
28
|
-
* const tunnel = new cloudflare.ArgoTunnel("tunnel", {
|
|
29
|
-
* accountId: "f037e56e89293a057740de681ac9abbe",
|
|
30
|
-
* name: "my_tunnel",
|
|
31
|
-
* secret: "AQIDBAUGBwgBAgMEBQYHCAECAwQFBgcIAQIDBAUGBwg=",
|
|
32
|
-
* });
|
|
33
|
-
* const exampleIndex_tunnelRouteTunnelRoute = new cloudflare.TunnelRoute("exampleIndex/tunnelRouteTunnelRoute", {
|
|
34
|
-
* accountId: "f037e56e89293a057740de681ac9abbe",
|
|
35
|
-
* tunnelId: tunnel.id,
|
|
36
|
-
* network: "192.0.2.24/32",
|
|
37
|
-
* comment: "New tunnel route for documentation",
|
|
38
|
-
* virtualNetworkId: "bdc39a3c-3104-4c23-8ac0-9f455dda691a",
|
|
39
|
-
* });
|
|
40
|
-
* ```
|
|
41
|
-
*
|
|
42
13
|
* ## Import
|
|
43
14
|
*
|
|
44
15
|
* ```sh
|
package/tunnelRoute.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"tunnelRoute.js","sourceRoot":"","sources":["../tunnelRoute.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"tunnelRoute.js","sourceRoot":"","sources":["../tunnelRoute.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;GAUG;AACH,MAAa,WAAY,SAAQ,MAAM,CAAC,cAAc;IAClD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwB,EAAE,IAAmC;QACtH,OAAO,IAAI,WAAW,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAClE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,WAAW,CAAC,YAAY,CAAC;IAC5D,CAAC;IA+BD,YAAY,IAAY,EAAE,WAAgD,EAAE,IAAmC;QAC3G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA2C,CAAC;YAC1D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;SACnF;aAAM;YACH,MAAM,IAAI,GAAG,WAA0C,CAAC;YACxD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,SAAS,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACtD,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;SACjF;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,WAAW,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAChE,CAAC;;AAtFL,kCAuFC;AAzEG,gBAAgB;AACO,wBAAY,GAAG,0CAA0C,CAAC"}
|
package/types/input.d.ts
CHANGED
|
@@ -966,90 +966,6 @@ export interface GetRulesetsFilterArgs {
|
|
|
966
966
|
*/
|
|
967
967
|
version?: pulumi.Input<string>;
|
|
968
968
|
}
|
|
969
|
-
export interface GetWafGroupsFilter {
|
|
970
|
-
/**
|
|
971
|
-
* Mode of the WAF Rule Groups to lookup. Valid values: on and off.
|
|
972
|
-
*/
|
|
973
|
-
mode?: string;
|
|
974
|
-
/**
|
|
975
|
-
* A regular expression matching the name of the WAF Rule Groups to lookup.
|
|
976
|
-
*/
|
|
977
|
-
name?: string;
|
|
978
|
-
}
|
|
979
|
-
export interface GetWafGroupsFilterArgs {
|
|
980
|
-
/**
|
|
981
|
-
* Mode of the WAF Rule Groups to lookup. Valid values: on and off.
|
|
982
|
-
*/
|
|
983
|
-
mode?: pulumi.Input<string>;
|
|
984
|
-
/**
|
|
985
|
-
* A regular expression matching the name of the WAF Rule Groups to lookup.
|
|
986
|
-
*/
|
|
987
|
-
name?: pulumi.Input<string>;
|
|
988
|
-
}
|
|
989
|
-
export interface GetWafPackagesFilter {
|
|
990
|
-
/**
|
|
991
|
-
* Action mode of the WAF Rule Packages to lookup. Valid values: simulate, block and challenge.
|
|
992
|
-
*/
|
|
993
|
-
actionMode?: string;
|
|
994
|
-
/**
|
|
995
|
-
* Detection mode of the WAF Rule Packages to lookup.
|
|
996
|
-
*/
|
|
997
|
-
detectionMode?: string;
|
|
998
|
-
/**
|
|
999
|
-
* A regular expression matching the name of the WAF Rule Packages to lookup.
|
|
1000
|
-
*/
|
|
1001
|
-
name?: string;
|
|
1002
|
-
/**
|
|
1003
|
-
* Sensitivity of the WAF Rule Packages to lookup. Valid values: high, medium, low and off.
|
|
1004
|
-
*/
|
|
1005
|
-
sensitivity?: string;
|
|
1006
|
-
}
|
|
1007
|
-
export interface GetWafPackagesFilterArgs {
|
|
1008
|
-
/**
|
|
1009
|
-
* Action mode of the WAF Rule Packages to lookup. Valid values: simulate, block and challenge.
|
|
1010
|
-
*/
|
|
1011
|
-
actionMode?: pulumi.Input<string>;
|
|
1012
|
-
/**
|
|
1013
|
-
* Detection mode of the WAF Rule Packages to lookup.
|
|
1014
|
-
*/
|
|
1015
|
-
detectionMode?: pulumi.Input<string>;
|
|
1016
|
-
/**
|
|
1017
|
-
* A regular expression matching the name of the WAF Rule Packages to lookup.
|
|
1018
|
-
*/
|
|
1019
|
-
name?: pulumi.Input<string>;
|
|
1020
|
-
/**
|
|
1021
|
-
* Sensitivity of the WAF Rule Packages to lookup. Valid values: high, medium, low and off.
|
|
1022
|
-
*/
|
|
1023
|
-
sensitivity?: pulumi.Input<string>;
|
|
1024
|
-
}
|
|
1025
|
-
export interface GetWafRulesFilter {
|
|
1026
|
-
/**
|
|
1027
|
-
* A regular expression matching the description of the WAF Rules to lookup.
|
|
1028
|
-
*/
|
|
1029
|
-
description?: string;
|
|
1030
|
-
/**
|
|
1031
|
-
* The ID of the WAF Rule Group in which the WAF Rules to lookup have to be.
|
|
1032
|
-
*/
|
|
1033
|
-
groupId?: string;
|
|
1034
|
-
/**
|
|
1035
|
-
* Mode of the WAF Rules to lookup. Valid values: one of ["block", "challenge", "default", "disable", "simulate"] or ["on", "off"] depending on the WAF Rule type.
|
|
1036
|
-
*/
|
|
1037
|
-
mode?: string;
|
|
1038
|
-
}
|
|
1039
|
-
export interface GetWafRulesFilterArgs {
|
|
1040
|
-
/**
|
|
1041
|
-
* A regular expression matching the description of the WAF Rules to lookup.
|
|
1042
|
-
*/
|
|
1043
|
-
description?: pulumi.Input<string>;
|
|
1044
|
-
/**
|
|
1045
|
-
* The ID of the WAF Rule Group in which the WAF Rules to lookup have to be.
|
|
1046
|
-
*/
|
|
1047
|
-
groupId?: pulumi.Input<string>;
|
|
1048
|
-
/**
|
|
1049
|
-
* Mode of the WAF Rules to lookup. Valid values: one of ["block", "challenge", "default", "disable", "simulate"] or ["on", "off"] depending on the WAF Rule type.
|
|
1050
|
-
*/
|
|
1051
|
-
mode?: pulumi.Input<string>;
|
|
1052
|
-
}
|
|
1053
969
|
export interface GetZonesFilter {
|
|
1054
970
|
/**
|
|
1055
971
|
* The account identifier to target for the resource.
|
|
@@ -1112,16 +1028,6 @@ export interface HealthcheckHeader {
|
|
|
1112
1028
|
*/
|
|
1113
1029
|
values: pulumi.Input<pulumi.Input<string>[]>;
|
|
1114
1030
|
}
|
|
1115
|
-
export interface IpListItem {
|
|
1116
|
-
/**
|
|
1117
|
-
* A note that can be used to annotate the item.
|
|
1118
|
-
*/
|
|
1119
|
-
comment?: pulumi.Input<string>;
|
|
1120
|
-
/**
|
|
1121
|
-
* The IPv4 address, IPv4 CIDR or IPv6 CIDR. IPv6 CIDRs are limited to a maximum of /64.
|
|
1122
|
-
*/
|
|
1123
|
-
value: pulumi.Input<string>;
|
|
1124
|
-
}
|
|
1125
1031
|
export interface ListItem {
|
|
1126
1032
|
/**
|
|
1127
1033
|
* An optional comment for the item.
|
|
@@ -1328,11 +1234,9 @@ export interface LoadBalancerRuleOverride {
|
|
|
1328
1234
|
*/
|
|
1329
1235
|
sessionAffinity?: pulumi.Input<string>;
|
|
1330
1236
|
/**
|
|
1331
|
-
*
|
|
1237
|
+
* Configure cookie attributes for session affinity cookie.
|
|
1332
1238
|
*/
|
|
1333
|
-
sessionAffinityAttributes?: pulumi.Input<
|
|
1334
|
-
[key: string]: pulumi.Input<string>;
|
|
1335
|
-
}>;
|
|
1239
|
+
sessionAffinityAttributes?: pulumi.Input<pulumi.Input<inputs.LoadBalancerRuleOverrideSessionAffinityAttribute>[]>;
|
|
1336
1240
|
/**
|
|
1337
1241
|
* Time, in seconds, until this load balancer's session affinity cookie expires after being created. This parameter is ignored unless a supported session affinity policy is set. The current default of `82800` (23 hours) will be used unless `sessionAffinityTtl` is explicitly set. Once the expiry time has been reached, subsequent requests may get sent to a different origin server. Valid values are between `1800` and `604800`.
|
|
1338
1242
|
*/
|
|
@@ -1404,6 +1308,38 @@ export interface LoadBalancerRuleOverrideRegionPool {
|
|
|
1404
1308
|
*/
|
|
1405
1309
|
region: pulumi.Input<string>;
|
|
1406
1310
|
}
|
|
1311
|
+
export interface LoadBalancerRuleOverrideSessionAffinityAttribute {
|
|
1312
|
+
/**
|
|
1313
|
+
* Configures the SameSite attribute on session affinity cookie. Value `Auto` will be translated to `Lax` or `None` depending if Always Use HTTPS is enabled. Note: when using value `None`, then you can not set `secure="Never"`. Available values: `Auto`, `Lax`, `None`, `Strict`. Defaults to `Auto`.
|
|
1314
|
+
*/
|
|
1315
|
+
samesite?: pulumi.Input<string>;
|
|
1316
|
+
/**
|
|
1317
|
+
* Configures the Secure attribute on session affinity cookie. Value `Always` indicates the Secure attribute will be set in the Set-Cookie header, `Never` indicates the Secure attribute will not be set, and `Auto` will set the Secure attribute depending if Always Use HTTPS is enabled. Available values: `Auto`, `Always`, `Never`. Defaults to `Auto`.
|
|
1318
|
+
*/
|
|
1319
|
+
secure?: pulumi.Input<string>;
|
|
1320
|
+
/**
|
|
1321
|
+
* Configures the zero-downtime failover between origins within a pool when session affinity is enabled. Value `none` means no failover takes place for sessions pinned to the origin. Value `temporary` means traffic will be sent to another other healthy origin until the originally pinned origin is available; note that this can potentially result in heavy origin flapping. Value `sticky` means the session affinity cookie is updated and subsequent requests are sent to the new origin. This feature is currently incompatible with Argo, Tiered Cache, and Bandwidth Alliance. Available values: `none`, `temporary`, `sticky`. Defaults to `none`.
|
|
1322
|
+
*/
|
|
1323
|
+
zeroDowntimeFailover?: pulumi.Input<string>;
|
|
1324
|
+
}
|
|
1325
|
+
export interface LoadBalancerSessionAffinityAttribute {
|
|
1326
|
+
/**
|
|
1327
|
+
* Configures the drain duration in seconds. This field is only used when session affinity is enabled on the load balancer. Defaults to `0`.
|
|
1328
|
+
*/
|
|
1329
|
+
drainDuration?: pulumi.Input<number>;
|
|
1330
|
+
/**
|
|
1331
|
+
* Configures the SameSite attribute on session affinity cookie. Value `Auto` will be translated to `Lax` or `None` depending if Always Use HTTPS is enabled. Note: when using value `None`, then you can not set `secure="Never"`. Available values: `Auto`, `Lax`, `None`, `Strict`. Defaults to `Auto`.
|
|
1332
|
+
*/
|
|
1333
|
+
samesite?: pulumi.Input<string>;
|
|
1334
|
+
/**
|
|
1335
|
+
* Configures the Secure attribute on session affinity cookie. Value `Always` indicates the Secure attribute will be set in the Set-Cookie header, `Never` indicates the Secure attribute will not be set, and `Auto` will set the Secure attribute depending if Always Use HTTPS is enabled. Available values: `Auto`, `Always`, `Never`. Defaults to `Auto`.
|
|
1336
|
+
*/
|
|
1337
|
+
secure?: pulumi.Input<string>;
|
|
1338
|
+
/**
|
|
1339
|
+
* Configures the zero-downtime failover between origins within a pool when session affinity is enabled. Value `none` means no failover takes place for sessions pinned to the origin. Value `temporary` means traffic will be sent to another other healthy origin until the originally pinned origin is available; note that this can potentially result in heavy origin flapping. Value `sticky` means the session affinity cookie is updated and subsequent requests are sent to the new origin. This feature is currently incompatible with Argo, Tiered Cache, and Bandwidth Alliance. Available values: `none`, `temporary`, `sticky`. Defaults to `none`.
|
|
1340
|
+
*/
|
|
1341
|
+
zeroDowntimeFailover?: pulumi.Input<string>;
|
|
1342
|
+
}
|
|
1407
1343
|
export interface ManagedHeadersManagedRequestHeader {
|
|
1408
1344
|
/**
|
|
1409
1345
|
* Whether the headers rule is active.
|
|
@@ -2300,6 +2236,20 @@ export interface SpectrumApplicationDns {
|
|
|
2300
2236
|
*/
|
|
2301
2237
|
type: pulumi.Input<string>;
|
|
2302
2238
|
}
|
|
2239
|
+
export interface SpectrumApplicationEdgeIps {
|
|
2240
|
+
/**
|
|
2241
|
+
* The IP versions supported for inbound connections on Spectrum anycast IPs. Required when `type` is not `static`. Available values: `all`, `ipv4`, `ipv6`.
|
|
2242
|
+
*/
|
|
2243
|
+
connectivity?: pulumi.Input<string>;
|
|
2244
|
+
/**
|
|
2245
|
+
* The collection of customer owned IPs to broadcast via anycast for this hostname and application. Requires [Bring Your Own IP](https://developers.cloudflare.com/spectrum/getting-started/byoip/) provisioned.
|
|
2246
|
+
*/
|
|
2247
|
+
ips?: pulumi.Input<pulumi.Input<string>[]>;
|
|
2248
|
+
/**
|
|
2249
|
+
* The type of edge IP configuration specified. Available values: `dynamic`, `static`.
|
|
2250
|
+
*/
|
|
2251
|
+
type: pulumi.Input<string>;
|
|
2252
|
+
}
|
|
2303
2253
|
export interface SpectrumApplicationOriginDns {
|
|
2304
2254
|
/**
|
|
2305
2255
|
* Fully qualified domain name of the origin.
|
|
@@ -2411,6 +2361,12 @@ export interface TeamsAccountLoggingSettingsByRuleTypeL4 {
|
|
|
2411
2361
|
logAll: pulumi.Input<boolean>;
|
|
2412
2362
|
logBlocks: pulumi.Input<boolean>;
|
|
2413
2363
|
}
|
|
2364
|
+
export interface TeamsAccountPayloadLog {
|
|
2365
|
+
/**
|
|
2366
|
+
* Public key used to encrypt matched payloads.
|
|
2367
|
+
*/
|
|
2368
|
+
publicKey: pulumi.Input<string>;
|
|
2369
|
+
}
|
|
2414
2370
|
export interface TeamsAccountProxy {
|
|
2415
2371
|
/**
|
|
2416
2372
|
* Whether gateway proxy is enabled on gateway devices for TCP traffic.
|
|
@@ -2474,6 +2430,14 @@ export interface TeamsRuleRuleSettings {
|
|
|
2474
2430
|
* The IPs to override matching DNS queries with.
|
|
2475
2431
|
*/
|
|
2476
2432
|
overrideIps?: pulumi.Input<pulumi.Input<string>[]>;
|
|
2433
|
+
/**
|
|
2434
|
+
* Configure DLP Payload Logging settings for this rule.
|
|
2435
|
+
*/
|
|
2436
|
+
payloadLog?: pulumi.Input<inputs.TeamsRuleRuleSettingsPayloadLog>;
|
|
2437
|
+
/**
|
|
2438
|
+
* Configure untrusted certificate settings for this rule.
|
|
2439
|
+
*/
|
|
2440
|
+
untrustedCert?: pulumi.Input<inputs.TeamsRuleRuleSettingsUntrustedCert>;
|
|
2477
2441
|
}
|
|
2478
2442
|
export interface TeamsRuleRuleSettingsBisoAdminControls {
|
|
2479
2443
|
disableCopyPaste?: pulumi.Input<boolean>;
|
|
@@ -2495,6 +2459,18 @@ export interface TeamsRuleRuleSettingsL4override {
|
|
|
2495
2459
|
ip: pulumi.Input<string>;
|
|
2496
2460
|
port: pulumi.Input<number>;
|
|
2497
2461
|
}
|
|
2462
|
+
export interface TeamsRuleRuleSettingsPayloadLog {
|
|
2463
|
+
/**
|
|
2464
|
+
* Indicator of rule enablement.
|
|
2465
|
+
*/
|
|
2466
|
+
enabled: pulumi.Input<boolean>;
|
|
2467
|
+
}
|
|
2468
|
+
export interface TeamsRuleRuleSettingsUntrustedCert {
|
|
2469
|
+
/**
|
|
2470
|
+
* The action executed by matched teams rule. Available values: `allow`, `block`, `safesearch`, `ytrestricted`, `on`, `off`, `scan`, `noscan`, `isolate`, `noisolate`, `override`, `l4Override`, `egress`.
|
|
2471
|
+
*/
|
|
2472
|
+
action?: pulumi.Input<string>;
|
|
2473
|
+
}
|
|
2498
2474
|
export interface TunnelConfigConfig {
|
|
2499
2475
|
/**
|
|
2500
2476
|
* Each incoming request received by cloudflared causes cloudflared to send a request to a local service. This section configures the rules that determine which requests are sent to which local services. [Read more](https://developers.cloudflare.com/cloudflare-one/connections/connect-apps/install-and-setup/tunnel-guide/local/local-management/ingress/).
|