@pulumi/cloudflare 4.7.0 → 4.8.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/accessApplication.d.ts +54 -80
- package/accessApplication.js +9 -5
- package/accessApplication.js.map +1 -1
- package/accessBookmark.d.ts +21 -22
- package/accessBookmark.js +9 -7
- package/accessBookmark.js.map +1 -1
- package/accessCaCertificate.d.ts +21 -11
- package/accessCaCertificate.js +15 -5
- package/accessCaCertificate.js.map +1 -1
- package/accessGroup.d.ts +14 -92
- package/accessGroup.js +8 -41
- package/accessGroup.js.map +1 -1
- package/accessIdentityProvider.d.ts +26 -28
- package/accessIdentityProvider.js +8 -10
- package/accessIdentityProvider.js.map +1 -1
- package/accessKeysConfiguration.d.ts +18 -0
- package/accessKeysConfiguration.js.map +1 -1
- package/accessMutualTlsCertificate.d.ts +20 -8
- package/accessMutualTlsCertificate.js +14 -2
- package/accessMutualTlsCertificate.js.map +1 -1
- package/accessPolicy.d.ts +53 -49
- package/accessPolicy.js +11 -7
- package/accessPolicy.js.map +1 -1
- package/accessRule.d.ts +67 -14
- package/accessRule.js +55 -5
- package/accessRule.js.map +1 -1
- package/accessServiceToken.d.ts +18 -12
- package/accessServiceToken.js +3 -6
- package/accessServiceToken.js.map +1 -1
- package/accountMember.d.ts +10 -11
- package/accountMember.js +1 -5
- package/accountMember.js.map +1 -1
- package/apiToken.d.ts +11 -122
- package/apiToken.js +1 -109
- package/apiToken.js.map +1 -1
- package/argo.d.ts +10 -14
- package/argo.js +1 -5
- package/argo.js.map +1 -1
- package/argoTunnel.d.ts +8 -0
- package/argoTunnel.js +2 -0
- package/argoTunnel.js.map +1 -1
- package/byoIpPrefix.d.ts +9 -0
- package/byoIpPrefix.js.map +1 -1
- package/config/vars.d.ts +22 -12
- package/config/vars.js.map +1 -1
- package/customPages.d.ts +1 -1
- package/customPages.js +1 -1
- package/filter.d.ts +8 -12
- package/filter.js +2 -6
- package/filter.js.map +1 -1
- package/firewallRule.d.ts +37 -22
- package/firewallRule.js +4 -7
- package/firewallRule.js.map +1 -1
- package/getAccessIdentityProvider.d.ts +0 -48
- package/getAccessIdentityProvider.js +0 -24
- package/getAccessIdentityProvider.js.map +1 -1
- package/getAccountRoles.d.ts +0 -12
- package/getAccountRoles.js +0 -3
- package/getAccountRoles.js.map +1 -1
- package/getApiTokenPermissionGroups.d.ts +0 -17
- package/getApiTokenPermissionGroups.js +0 -13
- package/getApiTokenPermissionGroups.js.map +1 -1
- package/getDevices.d.ts +0 -23
- package/getDevices.js +0 -14
- package/getDevices.js.map +1 -1
- package/getIpRanges.d.ts +0 -36
- package/getIpRanges.js +0 -21
- package/getIpRanges.js.map +1 -1
- package/getOriginCaRootCertificate.d.ts +0 -23
- package/getOriginCaRootCertificate.js +0 -14
- package/getOriginCaRootCertificate.js.map +1 -1
- package/getWafGroups.d.ts +0 -46
- package/getWafGroups.js +0 -20
- package/getWafGroups.js.map +1 -1
- package/getWafPackages.d.ts +0 -39
- package/getWafPackages.js +0 -22
- package/getWafPackages.js.map +1 -1
- package/getWafRules.d.ts +0 -49
- package/getWafRules.js +0 -23
- package/getWafRules.js.map +1 -1
- package/getZone.d.ts +0 -81
- package/getZone.js +0 -41
- package/getZone.js.map +1 -1
- package/getZoneDnssec.d.ts +0 -50
- package/getZoneDnssec.js +0 -14
- package/getZoneDnssec.js.map +1 -1
- package/getZones.d.ts +0 -81
- package/getZones.js +0 -70
- package/getZones.js.map +1 -1
- package/healthcheck.d.ts +100 -74
- package/healthcheck.js +10 -14
- package/healthcheck.js.map +1 -1
- package/index.d.ts +4 -1
- package/index.js +20 -5
- package/index.js.map +1 -1
- package/ipsecTunnel.d.ts +107 -6
- package/ipsecTunnel.js +21 -3
- package/ipsecTunnel.js.map +1 -1
- package/list.d.ts +137 -0
- package/list.js +115 -0
- package/list.js.map +1 -0
- package/loadBalancerMonitor.d.ts +2 -0
- package/loadBalancerMonitor.js +2 -0
- package/loadBalancerMonitor.js.map +1 -1
- package/logpushJob.d.ts +94 -64
- package/logpushJob.js +10 -37
- package/logpushJob.js.map +1 -1
- package/{logPushOwnershipChallenge.d.ts → logpushOwnershipChallenge.d.ts} +13 -13
- package/{logPushOwnershipChallenge.js → logpushOwnershipChallenge.js} +12 -12
- package/{logPushOwnershipChallenge.js.map → logpushOwnershipChallenge.js.map} +1 -1
- package/managedHeaders.d.ts +98 -0
- package/managedHeaders.js +81 -0
- package/managedHeaders.js.map +1 -0
- package/notificationPolicy.d.ts +59 -78
- package/notificationPolicy.js +2 -57
- package/notificationPolicy.js.map +1 -1
- package/package.json +2 -2
- package/package.json.dev +2 -2
- package/provider.d.ts +38 -19
- package/provider.js.map +1 -1
- package/record.d.ts +1 -1
- package/record.js +1 -1
- package/ruleset.d.ts +147 -24
- package/ruleset.js +111 -3
- package/ruleset.js.map +1 -1
- package/spectrumApplication.d.ts +7 -7
- package/spectrumApplication.js +1 -1
- package/tunnelRoute.d.ts +29 -17
- package/tunnelRoute.js +13 -14
- package/tunnelRoute.js.map +1 -1
- package/tunnelVirtualNetwork.d.ts +111 -0
- package/tunnelVirtualNetwork.js +85 -0
- package/tunnelVirtualNetwork.js.map +1 -0
- package/types/input.d.ts +145 -424
- package/types/output.d.ts +141 -491
- package/waitingRoom.d.ts +48 -34
- package/waitingRoom.js +5 -4
- package/waitingRoom.js.map +1 -1
- package/waitingRoomEvent.d.ts +52 -35
- package/waitingRoomEvent.js +4 -5
- package/waitingRoomEvent.js.map +1 -1
- package/workerCronTrigger.d.ts +9 -0
- package/workerCronTrigger.js.map +1 -1
- package/workerRoute.d.ts +2 -2
- package/workerRoute.js +2 -2
- package/workerScript.d.ts +2 -2
- package/workerScript.js +2 -2
- package/workersKv.d.ts +1 -1
- package/workersKv.js +1 -1
- package/zone.d.ts +5 -5
- package/zone.js +1 -1
- package/zoneDnssec.d.ts +1 -1
- package/zoneDnssec.js +1 -1
- package/zoneLockdown.d.ts +4 -4
- package/zoneLockdown.js +1 -1
- package/zoneSettingsOverride.d.ts +4 -4
package/accessCaCertificate.js
CHANGED
|
@@ -6,9 +6,13 @@ exports.AccessCaCertificate = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
-
* Cloudflare Access can replace traditional SSH key models with short-lived
|
|
10
|
-
*
|
|
11
|
-
*
|
|
9
|
+
* Cloudflare Access can replace traditional SSH key models with short-lived certificates issued to your users based on the token generated by their Access login.
|
|
10
|
+
*
|
|
11
|
+
* > It's required that an `accountId` or `zoneId` is provided and in
|
|
12
|
+
* most cases using either is fine. However, if you're using a scoped
|
|
13
|
+
* access token, you must provide the argument that matches the token's
|
|
14
|
+
* scope. For example, an access token that is scoped to the "example.com"
|
|
15
|
+
* zone needs to use the `zoneId` argument.
|
|
12
16
|
*
|
|
13
17
|
* ## Example Usage
|
|
14
18
|
*
|
|
@@ -30,10 +34,16 @@ const utilities = require("./utilities");
|
|
|
30
34
|
*
|
|
31
35
|
* ## Import
|
|
32
36
|
*
|
|
33
|
-
*
|
|
37
|
+
* # Account level CA certificate import.
|
|
38
|
+
*
|
|
39
|
+
* ```sh
|
|
40
|
+
* $ pulumi import cloudflare:index/accessCaCertificate:AccessCaCertificate example account/<account_id>/<certificate_id>
|
|
41
|
+
* ```
|
|
42
|
+
*
|
|
43
|
+
* # Zone level CA certificate import.
|
|
34
44
|
*
|
|
35
45
|
* ```sh
|
|
36
|
-
* $ pulumi import cloudflare:index/accessCaCertificate:AccessCaCertificate example account
|
|
46
|
+
* $ pulumi import cloudflare:index/accessCaCertificate:AccessCaCertificate example account/<zone_id>/<certificate_id>
|
|
37
47
|
* ```
|
|
38
48
|
*/
|
|
39
49
|
class AccessCaCertificate extends pulumi.CustomResource {
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"accessCaCertificate.js","sourceRoot":"","sources":["../accessCaCertificate.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"accessCaCertificate.js","sourceRoot":"","sources":["../accessCaCertificate.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAwCG;AACH,MAAa,mBAAoB,SAAQ,MAAM,CAAC,cAAc;IAyD1D,YAAY,IAAY,EAAE,WAAgE,EAAE,IAAmC;QAC3H,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAmD,CAAC;YAClE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAAkD,CAAC;YAChE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,aAAa,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1D,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;aAChE;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,KAAK,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC1C,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACnD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,mBAAmB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACxE,CAAC;IA/ED;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAgC,EAAE,IAAmC;QAC9H,OAAO,IAAI,mBAAmB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC1E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,mBAAmB,CAAC,YAAY,CAAC;IACpE,CAAC;;AA1BL,kDAiFC;AAnEG,gBAAgB;AACO,gCAAY,GAAG,0DAA0D,CAAC"}
|
package/accessGroup.d.ts
CHANGED
|
@@ -1,9 +1,13 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
import { input as inputs, output as outputs } from "./types";
|
|
3
3
|
/**
|
|
4
|
-
* Provides a Cloudflare Access Group resource. Access Groups are used
|
|
5
|
-
*
|
|
6
|
-
*
|
|
4
|
+
* Provides a Cloudflare Access Group resource. Access Groups are used in conjunction with Access Policies to restrict access to a particular resource based on group membership.
|
|
5
|
+
*
|
|
6
|
+
* > It's required that an `accountId` or `zoneId` is provided and in
|
|
7
|
+
* most cases using either is fine. However, if you're using a scoped
|
|
8
|
+
* access token, you must provide the argument that matches the token's
|
|
9
|
+
* scope. For example, an access token that is scoped to the "example.com"
|
|
10
|
+
* zone needs to use the `zoneId` argument.
|
|
7
11
|
*
|
|
8
12
|
* ## Example Usage
|
|
9
13
|
*
|
|
@@ -32,49 +36,12 @@ import { input as inputs, output as outputs } from "./types";
|
|
|
32
36
|
* },
|
|
33
37
|
* });
|
|
34
38
|
* ```
|
|
35
|
-
* ## Conditions
|
|
36
|
-
*
|
|
37
|
-
* `require`, `exclude` and `include` arguments share the available
|
|
38
|
-
* conditions which can be applied. The conditions are:
|
|
39
|
-
*
|
|
40
|
-
* * `ip` - (Optional) A list of IP addresses or ranges. Example:
|
|
41
|
-
* `ip = ["1.2.3.4", "10.0.0.0/2"]`
|
|
42
|
-
* * `email` - (Optional) A list of email addresses. Example:
|
|
43
|
-
* `email = ["test@example.com"]`
|
|
44
|
-
* * `emailDomain` - (Optional) A list of email domains. Example:
|
|
45
|
-
* `emailDomain = ["example.com"]`
|
|
46
|
-
* * `serviceToken` - (Optional) A list of service token ids. Example:
|
|
47
|
-
* `serviceToken = [cloudflare_access_service_token.demo.id]`
|
|
48
|
-
* * `anyValidServiceToken` - (Optional) Boolean indicating if allow
|
|
49
|
-
* all tokens to be granted. Example: `anyValidServiceToken = true`
|
|
50
|
-
* * `group` - (Optional) A list of access group ids. Example:
|
|
51
|
-
* `group = [cloudflare_access_group.demo.id]`
|
|
52
|
-
* * `everyone` - (Optional) Boolean indicating permitting access for all
|
|
53
|
-
* requests. Example: `everyone = true`
|
|
54
|
-
* * `certificate` - (Optional) Whether to use mTLS certificate authentication.
|
|
55
|
-
* * `commonName` - (Optional) Use a certificate common name to authenticate with.
|
|
56
|
-
* * `authMethod` - (Optional) A string identifying the authentication
|
|
57
|
-
* method code. The list of codes are listed here: https://tools.ietf.org/html/rfc8176#section-2.
|
|
58
|
-
* Custom values are also supported. Example: `authMethod = ["swk"]`
|
|
59
|
-
* * `geo` - (Optional) A list of country codes. Example: `geo = ["US"]`
|
|
60
|
-
* * `loginMethod` - (Optional) A list of identity provider ids. Example: `loginMethod = [cloudflare_access_identity_provider.my_idp.id]`
|
|
61
|
-
* * `devicePosture` - (Optional) A list of devicePosture integration_uids. Example: `devicePosture = [cloudflare_device_posture_rule.my_posture_rule.id]`
|
|
62
|
-
* * `gsuite` - (Optional) Use GSuite as the authentication mechanism. Example:
|
|
63
|
-
* * `github` - (Optional) Use a GitHub organization as the `include` condition. Example:
|
|
64
|
-
* * `azure` - (Optional) Use Azure AD as the `include` condition. Example:
|
|
65
|
-
* * `okta` - (Optional) Use Okta as the `include` condition. Example:
|
|
66
|
-
* * `saml` - (Optional) Use an external SAML setup as the `include` condition.
|
|
67
|
-
* Example:
|
|
68
39
|
*
|
|
69
40
|
* ## Import
|
|
70
41
|
*
|
|
71
|
-
* Access Groups can be imported using a composite ID formed of account ID and group ID.
|
|
72
|
-
*
|
|
73
42
|
* ```sh
|
|
74
|
-
* $ pulumi import cloudflare:index/accessGroup:AccessGroup
|
|
43
|
+
* $ pulumi import cloudflare:index/accessGroup:AccessGroup example <account_id>/<group_id>
|
|
75
44
|
* ```
|
|
76
|
-
*
|
|
77
|
-
* where * `975ecf5a45e3bcb680dba0722a420ad9` - Account ID * `67ea780ce4982c1cfbe6b7293afc765d` - Access Group ID
|
|
78
45
|
*/
|
|
79
46
|
export declare class AccessGroup extends pulumi.CustomResource {
|
|
80
47
|
/**
|
|
@@ -93,30 +60,15 @@ export declare class AccessGroup extends pulumi.CustomResource {
|
|
|
93
60
|
*/
|
|
94
61
|
static isInstance(obj: any): obj is AccessGroup;
|
|
95
62
|
/**
|
|
96
|
-
* The
|
|
63
|
+
* The account identifier to target for the resource.
|
|
97
64
|
*/
|
|
98
65
|
readonly accountId: pulumi.Output<string | undefined>;
|
|
99
|
-
/**
|
|
100
|
-
* A series of access conditions, see below for
|
|
101
|
-
* full list.
|
|
102
|
-
*/
|
|
103
66
|
readonly excludes: pulumi.Output<outputs.AccessGroupExclude[] | undefined>;
|
|
104
|
-
/**
|
|
105
|
-
* A series of access conditions, see below for
|
|
106
|
-
* full list.
|
|
107
|
-
*/
|
|
108
67
|
readonly includes: pulumi.Output<outputs.AccessGroupInclude[]>;
|
|
109
|
-
/**
|
|
110
|
-
* Friendly name of the Access Group.
|
|
111
|
-
*/
|
|
112
68
|
readonly name: pulumi.Output<string>;
|
|
113
|
-
/**
|
|
114
|
-
* A series of access conditions, see below for
|
|
115
|
-
* full list.
|
|
116
|
-
*/
|
|
117
69
|
readonly requires: pulumi.Output<outputs.AccessGroupRequire[] | undefined>;
|
|
118
70
|
/**
|
|
119
|
-
* The
|
|
71
|
+
* The zone identifier to target for the resource.
|
|
120
72
|
*/
|
|
121
73
|
readonly zoneId: pulumi.Output<string>;
|
|
122
74
|
/**
|
|
@@ -133,30 +85,15 @@ export declare class AccessGroup extends pulumi.CustomResource {
|
|
|
133
85
|
*/
|
|
134
86
|
export interface AccessGroupState {
|
|
135
87
|
/**
|
|
136
|
-
* The
|
|
88
|
+
* The account identifier to target for the resource.
|
|
137
89
|
*/
|
|
138
90
|
accountId?: pulumi.Input<string>;
|
|
139
|
-
/**
|
|
140
|
-
* A series of access conditions, see below for
|
|
141
|
-
* full list.
|
|
142
|
-
*/
|
|
143
91
|
excludes?: pulumi.Input<pulumi.Input<inputs.AccessGroupExclude>[]>;
|
|
144
|
-
/**
|
|
145
|
-
* A series of access conditions, see below for
|
|
146
|
-
* full list.
|
|
147
|
-
*/
|
|
148
92
|
includes?: pulumi.Input<pulumi.Input<inputs.AccessGroupInclude>[]>;
|
|
149
|
-
/**
|
|
150
|
-
* Friendly name of the Access Group.
|
|
151
|
-
*/
|
|
152
93
|
name?: pulumi.Input<string>;
|
|
153
|
-
/**
|
|
154
|
-
* A series of access conditions, see below for
|
|
155
|
-
* full list.
|
|
156
|
-
*/
|
|
157
94
|
requires?: pulumi.Input<pulumi.Input<inputs.AccessGroupRequire>[]>;
|
|
158
95
|
/**
|
|
159
|
-
* The
|
|
96
|
+
* The zone identifier to target for the resource.
|
|
160
97
|
*/
|
|
161
98
|
zoneId?: pulumi.Input<string>;
|
|
162
99
|
}
|
|
@@ -165,30 +102,15 @@ export interface AccessGroupState {
|
|
|
165
102
|
*/
|
|
166
103
|
export interface AccessGroupArgs {
|
|
167
104
|
/**
|
|
168
|
-
* The
|
|
105
|
+
* The account identifier to target for the resource.
|
|
169
106
|
*/
|
|
170
107
|
accountId?: pulumi.Input<string>;
|
|
171
|
-
/**
|
|
172
|
-
* A series of access conditions, see below for
|
|
173
|
-
* full list.
|
|
174
|
-
*/
|
|
175
108
|
excludes?: pulumi.Input<pulumi.Input<inputs.AccessGroupExclude>[]>;
|
|
176
|
-
/**
|
|
177
|
-
* A series of access conditions, see below for
|
|
178
|
-
* full list.
|
|
179
|
-
*/
|
|
180
109
|
includes: pulumi.Input<pulumi.Input<inputs.AccessGroupInclude>[]>;
|
|
181
|
-
/**
|
|
182
|
-
* Friendly name of the Access Group.
|
|
183
|
-
*/
|
|
184
110
|
name: pulumi.Input<string>;
|
|
185
|
-
/**
|
|
186
|
-
* A series of access conditions, see below for
|
|
187
|
-
* full list.
|
|
188
|
-
*/
|
|
189
111
|
requires?: pulumi.Input<pulumi.Input<inputs.AccessGroupRequire>[]>;
|
|
190
112
|
/**
|
|
191
|
-
* The
|
|
113
|
+
* The zone identifier to target for the resource.
|
|
192
114
|
*/
|
|
193
115
|
zoneId?: pulumi.Input<string>;
|
|
194
116
|
}
|
package/accessGroup.js
CHANGED
|
@@ -6,9 +6,13 @@ exports.AccessGroup = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
-
* Provides a Cloudflare Access Group resource. Access Groups are used
|
|
10
|
-
*
|
|
11
|
-
*
|
|
9
|
+
* Provides a Cloudflare Access Group resource. Access Groups are used in conjunction with Access Policies to restrict access to a particular resource based on group membership.
|
|
10
|
+
*
|
|
11
|
+
* > It's required that an `accountId` or `zoneId` is provided and in
|
|
12
|
+
* most cases using either is fine. However, if you're using a scoped
|
|
13
|
+
* access token, you must provide the argument that matches the token's
|
|
14
|
+
* scope. For example, an access token that is scoped to the "example.com"
|
|
15
|
+
* zone needs to use the `zoneId` argument.
|
|
12
16
|
*
|
|
13
17
|
* ## Example Usage
|
|
14
18
|
*
|
|
@@ -37,49 +41,12 @@ const utilities = require("./utilities");
|
|
|
37
41
|
* },
|
|
38
42
|
* });
|
|
39
43
|
* ```
|
|
40
|
-
* ## Conditions
|
|
41
|
-
*
|
|
42
|
-
* `require`, `exclude` and `include` arguments share the available
|
|
43
|
-
* conditions which can be applied. The conditions are:
|
|
44
|
-
*
|
|
45
|
-
* * `ip` - (Optional) A list of IP addresses or ranges. Example:
|
|
46
|
-
* `ip = ["1.2.3.4", "10.0.0.0/2"]`
|
|
47
|
-
* * `email` - (Optional) A list of email addresses. Example:
|
|
48
|
-
* `email = ["test@example.com"]`
|
|
49
|
-
* * `emailDomain` - (Optional) A list of email domains. Example:
|
|
50
|
-
* `emailDomain = ["example.com"]`
|
|
51
|
-
* * `serviceToken` - (Optional) A list of service token ids. Example:
|
|
52
|
-
* `serviceToken = [cloudflare_access_service_token.demo.id]`
|
|
53
|
-
* * `anyValidServiceToken` - (Optional) Boolean indicating if allow
|
|
54
|
-
* all tokens to be granted. Example: `anyValidServiceToken = true`
|
|
55
|
-
* * `group` - (Optional) A list of access group ids. Example:
|
|
56
|
-
* `group = [cloudflare_access_group.demo.id]`
|
|
57
|
-
* * `everyone` - (Optional) Boolean indicating permitting access for all
|
|
58
|
-
* requests. Example: `everyone = true`
|
|
59
|
-
* * `certificate` - (Optional) Whether to use mTLS certificate authentication.
|
|
60
|
-
* * `commonName` - (Optional) Use a certificate common name to authenticate with.
|
|
61
|
-
* * `authMethod` - (Optional) A string identifying the authentication
|
|
62
|
-
* method code. The list of codes are listed here: https://tools.ietf.org/html/rfc8176#section-2.
|
|
63
|
-
* Custom values are also supported. Example: `authMethod = ["swk"]`
|
|
64
|
-
* * `geo` - (Optional) A list of country codes. Example: `geo = ["US"]`
|
|
65
|
-
* * `loginMethod` - (Optional) A list of identity provider ids. Example: `loginMethod = [cloudflare_access_identity_provider.my_idp.id]`
|
|
66
|
-
* * `devicePosture` - (Optional) A list of devicePosture integration_uids. Example: `devicePosture = [cloudflare_device_posture_rule.my_posture_rule.id]`
|
|
67
|
-
* * `gsuite` - (Optional) Use GSuite as the authentication mechanism. Example:
|
|
68
|
-
* * `github` - (Optional) Use a GitHub organization as the `include` condition. Example:
|
|
69
|
-
* * `azure` - (Optional) Use Azure AD as the `include` condition. Example:
|
|
70
|
-
* * `okta` - (Optional) Use Okta as the `include` condition. Example:
|
|
71
|
-
* * `saml` - (Optional) Use an external SAML setup as the `include` condition.
|
|
72
|
-
* Example:
|
|
73
44
|
*
|
|
74
45
|
* ## Import
|
|
75
46
|
*
|
|
76
|
-
* Access Groups can be imported using a composite ID formed of account ID and group ID.
|
|
77
|
-
*
|
|
78
47
|
* ```sh
|
|
79
|
-
* $ pulumi import cloudflare:index/accessGroup:AccessGroup
|
|
48
|
+
* $ pulumi import cloudflare:index/accessGroup:AccessGroup example <account_id>/<group_id>
|
|
80
49
|
* ```
|
|
81
|
-
*
|
|
82
|
-
* where * `975ecf5a45e3bcb680dba0722a420ad9` - Account ID * `67ea780ce4982c1cfbe6b7293afc765d` - Access Group ID
|
|
83
50
|
*/
|
|
84
51
|
class AccessGroup extends pulumi.CustomResource {
|
|
85
52
|
constructor(name, argsOrState, opts) {
|
package/accessGroup.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"accessGroup.js","sourceRoot":"","sources":["../accessGroup.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAEzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"accessGroup.js","sourceRoot":"","sources":["../accessGroup.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAEzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA0CG;AACH,MAAa,WAAY,SAAQ,MAAM,CAAC,cAAc;IAiDlD,YAAY,IAAY,EAAE,WAAgD,EAAE,IAAmC;QAC3G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA2C,CAAC;YAC1D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAA0C,CAAC;YACxD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,WAAW,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAChE,CAAC;IA5ED;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwB,EAAE,IAAmC;QACtH,OAAO,IAAI,WAAW,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAClE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,WAAW,CAAC,YAAY,CAAC;IAC5D,CAAC;;AA1BL,kCA8EC;AAhEG,gBAAgB;AACO,wBAAY,GAAG,0CAA0C,CAAC"}
|
|
@@ -1,8 +1,13 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
import { input as inputs, output as outputs } from "./types";
|
|
3
3
|
/**
|
|
4
|
-
* Provides a Cloudflare Access Identity Provider resource. Identity Providers are
|
|
5
|
-
*
|
|
4
|
+
* Provides a Cloudflare Access Identity Provider resource. Identity Providers are used as an authentication or authorisation source within Access.
|
|
5
|
+
*
|
|
6
|
+
* > It's required that an `accountId` or `zoneId` is provided and in
|
|
7
|
+
* most cases using either is fine. However, if you're using a scoped
|
|
8
|
+
* access token, you must provide the argument that matches the token's
|
|
9
|
+
* scope. For example, an access token that is scoped to the "example.com"
|
|
10
|
+
* zone needs to use the `zoneId` argument.
|
|
6
11
|
*
|
|
7
12
|
* ## Example Usage
|
|
8
13
|
*
|
|
@@ -56,18 +61,11 @@ import { input as inputs, output as outputs } from "./types";
|
|
|
56
61
|
* });
|
|
57
62
|
* ```
|
|
58
63
|
*
|
|
59
|
-
* Please refer to the [developers.cloudflare.com Access documentation][accessIdentityProviderGuide]
|
|
60
|
-
* for full reference on what is available and how to configure your provider.
|
|
61
|
-
*
|
|
62
64
|
* ## Import
|
|
63
65
|
*
|
|
64
|
-
* Access Identity Providers can be imported using a composite ID formed of account ID and Access Identity Provider ID.
|
|
65
|
-
*
|
|
66
66
|
* ```sh
|
|
67
|
-
* $ pulumi import cloudflare:index/accessIdentityProvider:AccessIdentityProvider
|
|
67
|
+
* $ pulumi import cloudflare:index/accessIdentityProvider:AccessIdentityProvider example <account_id>/<identity_provider_id>
|
|
68
68
|
* ```
|
|
69
|
-
*
|
|
70
|
-
* [access_identity_provider_guide]https://developers.cloudflare.com/access/configuring-identity-providers/
|
|
71
69
|
*/
|
|
72
70
|
export declare class AccessIdentityProvider extends pulumi.CustomResource {
|
|
73
71
|
/**
|
|
@@ -86,11 +84,12 @@ export declare class AccessIdentityProvider extends pulumi.CustomResource {
|
|
|
86
84
|
*/
|
|
87
85
|
static isInstance(obj: any): obj is AccessIdentityProvider;
|
|
88
86
|
/**
|
|
89
|
-
* The account
|
|
87
|
+
* The account identifier to target for the resource.
|
|
90
88
|
*/
|
|
91
89
|
readonly accountId: pulumi.Output<string | undefined>;
|
|
92
90
|
/**
|
|
93
|
-
* Provider configuration from the [developer
|
|
91
|
+
* Provider configuration from the [developer
|
|
92
|
+
* documentation](https://developers.cloudflare.com/access/configuring-identity-providers/).
|
|
94
93
|
*/
|
|
95
94
|
readonly configs: pulumi.Output<outputs.AccessIdentityProviderConfig[] | undefined>;
|
|
96
95
|
/**
|
|
@@ -98,13 +97,12 @@ export declare class AccessIdentityProvider extends pulumi.CustomResource {
|
|
|
98
97
|
*/
|
|
99
98
|
readonly name: pulumi.Output<string>;
|
|
100
99
|
/**
|
|
101
|
-
* The provider type to use.
|
|
102
|
-
* `
|
|
103
|
-
* `"linkedin"`, `"azureAD"`, `"okta"`, `"onetimepin"`, `"onelogin"`, `"yandex"`.
|
|
100
|
+
* The provider type to use. Available values: `centrify`, `facebook`, `google-apps`, `oidc`, `github`, `google`, `saml`,
|
|
101
|
+
* `linkedin`, `azureAD`, `okta`, `onetimepin`, `onelogin`, `yandex`
|
|
104
102
|
*/
|
|
105
103
|
readonly type: pulumi.Output<string>;
|
|
106
104
|
/**
|
|
107
|
-
* The zone
|
|
105
|
+
* The zone identifier to target for the resource.
|
|
108
106
|
*/
|
|
109
107
|
readonly zoneId: pulumi.Output<string | undefined>;
|
|
110
108
|
/**
|
|
@@ -121,11 +119,12 @@ export declare class AccessIdentityProvider extends pulumi.CustomResource {
|
|
|
121
119
|
*/
|
|
122
120
|
export interface AccessIdentityProviderState {
|
|
123
121
|
/**
|
|
124
|
-
* The account
|
|
122
|
+
* The account identifier to target for the resource.
|
|
125
123
|
*/
|
|
126
124
|
accountId?: pulumi.Input<string>;
|
|
127
125
|
/**
|
|
128
|
-
* Provider configuration from the [developer
|
|
126
|
+
* Provider configuration from the [developer
|
|
127
|
+
* documentation](https://developers.cloudflare.com/access/configuring-identity-providers/).
|
|
129
128
|
*/
|
|
130
129
|
configs?: pulumi.Input<pulumi.Input<inputs.AccessIdentityProviderConfig>[]>;
|
|
131
130
|
/**
|
|
@@ -133,13 +132,12 @@ export interface AccessIdentityProviderState {
|
|
|
133
132
|
*/
|
|
134
133
|
name?: pulumi.Input<string>;
|
|
135
134
|
/**
|
|
136
|
-
* The provider type to use.
|
|
137
|
-
* `
|
|
138
|
-
* `"linkedin"`, `"azureAD"`, `"okta"`, `"onetimepin"`, `"onelogin"`, `"yandex"`.
|
|
135
|
+
* The provider type to use. Available values: `centrify`, `facebook`, `google-apps`, `oidc`, `github`, `google`, `saml`,
|
|
136
|
+
* `linkedin`, `azureAD`, `okta`, `onetimepin`, `onelogin`, `yandex`
|
|
139
137
|
*/
|
|
140
138
|
type?: pulumi.Input<string>;
|
|
141
139
|
/**
|
|
142
|
-
* The zone
|
|
140
|
+
* The zone identifier to target for the resource.
|
|
143
141
|
*/
|
|
144
142
|
zoneId?: pulumi.Input<string>;
|
|
145
143
|
}
|
|
@@ -148,11 +146,12 @@ export interface AccessIdentityProviderState {
|
|
|
148
146
|
*/
|
|
149
147
|
export interface AccessIdentityProviderArgs {
|
|
150
148
|
/**
|
|
151
|
-
* The account
|
|
149
|
+
* The account identifier to target for the resource.
|
|
152
150
|
*/
|
|
153
151
|
accountId?: pulumi.Input<string>;
|
|
154
152
|
/**
|
|
155
|
-
* Provider configuration from the [developer
|
|
153
|
+
* Provider configuration from the [developer
|
|
154
|
+
* documentation](https://developers.cloudflare.com/access/configuring-identity-providers/).
|
|
156
155
|
*/
|
|
157
156
|
configs?: pulumi.Input<pulumi.Input<inputs.AccessIdentityProviderConfig>[]>;
|
|
158
157
|
/**
|
|
@@ -160,13 +159,12 @@ export interface AccessIdentityProviderArgs {
|
|
|
160
159
|
*/
|
|
161
160
|
name: pulumi.Input<string>;
|
|
162
161
|
/**
|
|
163
|
-
* The provider type to use.
|
|
164
|
-
* `
|
|
165
|
-
* `"linkedin"`, `"azureAD"`, `"okta"`, `"onetimepin"`, `"onelogin"`, `"yandex"`.
|
|
162
|
+
* The provider type to use. Available values: `centrify`, `facebook`, `google-apps`, `oidc`, `github`, `google`, `saml`,
|
|
163
|
+
* `linkedin`, `azureAD`, `okta`, `onetimepin`, `onelogin`, `yandex`
|
|
166
164
|
*/
|
|
167
165
|
type: pulumi.Input<string>;
|
|
168
166
|
/**
|
|
169
|
-
* The zone
|
|
167
|
+
* The zone identifier to target for the resource.
|
|
170
168
|
*/
|
|
171
169
|
zoneId?: pulumi.Input<string>;
|
|
172
170
|
}
|
|
@@ -6,8 +6,13 @@ exports.AccessIdentityProvider = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
-
* Provides a Cloudflare Access Identity Provider resource. Identity Providers are
|
|
10
|
-
*
|
|
9
|
+
* Provides a Cloudflare Access Identity Provider resource. Identity Providers are used as an authentication or authorisation source within Access.
|
|
10
|
+
*
|
|
11
|
+
* > It's required that an `accountId` or `zoneId` is provided and in
|
|
12
|
+
* most cases using either is fine. However, if you're using a scoped
|
|
13
|
+
* access token, you must provide the argument that matches the token's
|
|
14
|
+
* scope. For example, an access token that is scoped to the "example.com"
|
|
15
|
+
* zone needs to use the `zoneId` argument.
|
|
11
16
|
*
|
|
12
17
|
* ## Example Usage
|
|
13
18
|
*
|
|
@@ -61,18 +66,11 @@ const utilities = require("./utilities");
|
|
|
61
66
|
* });
|
|
62
67
|
* ```
|
|
63
68
|
*
|
|
64
|
-
* Please refer to the [developers.cloudflare.com Access documentation][accessIdentityProviderGuide]
|
|
65
|
-
* for full reference on what is available and how to configure your provider.
|
|
66
|
-
*
|
|
67
69
|
* ## Import
|
|
68
70
|
*
|
|
69
|
-
* Access Identity Providers can be imported using a composite ID formed of account ID and Access Identity Provider ID.
|
|
70
|
-
*
|
|
71
71
|
* ```sh
|
|
72
|
-
* $ pulumi import cloudflare:index/accessIdentityProvider:AccessIdentityProvider
|
|
72
|
+
* $ pulumi import cloudflare:index/accessIdentityProvider:AccessIdentityProvider example <account_id>/<identity_provider_id>
|
|
73
73
|
* ```
|
|
74
|
-
*
|
|
75
|
-
* [access_identity_provider_guide]https://developers.cloudflare.com/access/configuring-identity-providers/
|
|
76
74
|
*/
|
|
77
75
|
class AccessIdentityProvider extends pulumi.CustomResource {
|
|
78
76
|
constructor(name, argsOrState, opts) {
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"accessIdentityProvider.js","sourceRoot":"","sources":["../accessIdentityProvider.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAEzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"accessIdentityProvider.js","sourceRoot":"","sources":["../accessIdentityProvider.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAEzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAkEG;AACH,MAAa,sBAAuB,SAAQ,MAAM,CAAC,cAAc;IA2D7D,YAAY,IAAY,EAAE,WAAsE,EAAE,IAAmC;QACjI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAsD,CAAC;YACrE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAAqD,CAAC;YACnE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,sBAAsB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC3E,CAAC;IApFD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAmC,EAAE,IAAmC;QACjI,OAAO,IAAI,sBAAsB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC7E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,sBAAsB,CAAC,YAAY,CAAC;IACvE,CAAC;;AA1BL,wDAsFC;AAxEG,gBAAgB;AACO,mCAAY,GAAG,gEAAgE,CAAC"}
|
|
@@ -15,7 +15,13 @@ export declare class AccessKeysConfiguration extends pulumi.CustomResource {
|
|
|
15
15
|
* when multiple copies of the Pulumi SDK have been loaded into the same process.
|
|
16
16
|
*/
|
|
17
17
|
static isInstance(obj: any): obj is AccessKeysConfiguration;
|
|
18
|
+
/**
|
|
19
|
+
* The account identifier to target for the resource.
|
|
20
|
+
*/
|
|
18
21
|
readonly accountId: pulumi.Output<string>;
|
|
22
|
+
/**
|
|
23
|
+
* Number of days to trigger a rotation of the keys.
|
|
24
|
+
*/
|
|
19
25
|
readonly keyRotationIntervalDays: pulumi.Output<number>;
|
|
20
26
|
/**
|
|
21
27
|
* Create a AccessKeysConfiguration resource with the given unique name, arguments, and options.
|
|
@@ -30,13 +36,25 @@ export declare class AccessKeysConfiguration extends pulumi.CustomResource {
|
|
|
30
36
|
* Input properties used for looking up and filtering AccessKeysConfiguration resources.
|
|
31
37
|
*/
|
|
32
38
|
export interface AccessKeysConfigurationState {
|
|
39
|
+
/**
|
|
40
|
+
* The account identifier to target for the resource.
|
|
41
|
+
*/
|
|
33
42
|
accountId?: pulumi.Input<string>;
|
|
43
|
+
/**
|
|
44
|
+
* Number of days to trigger a rotation of the keys.
|
|
45
|
+
*/
|
|
34
46
|
keyRotationIntervalDays?: pulumi.Input<number>;
|
|
35
47
|
}
|
|
36
48
|
/**
|
|
37
49
|
* The set of arguments for constructing a AccessKeysConfiguration resource.
|
|
38
50
|
*/
|
|
39
51
|
export interface AccessKeysConfigurationArgs {
|
|
52
|
+
/**
|
|
53
|
+
* The account identifier to target for the resource.
|
|
54
|
+
*/
|
|
40
55
|
accountId: pulumi.Input<string>;
|
|
56
|
+
/**
|
|
57
|
+
* Number of days to trigger a rotation of the keys.
|
|
58
|
+
*/
|
|
41
59
|
keyRotationIntervalDays?: pulumi.Input<number>;
|
|
42
60
|
}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"accessKeysConfiguration.js","sourceRoot":"","sources":["../accessKeysConfiguration.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC,MAAa,uBAAwB,SAAQ,MAAM,CAAC,cAAc;
|
|
1
|
+
{"version":3,"file":"accessKeysConfiguration.js","sourceRoot":"","sources":["../accessKeysConfiguration.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC,MAAa,uBAAwB,SAAQ,MAAM,CAAC,cAAc;IA6C9D,YAAY,IAAY,EAAE,WAAwE,EAAE,IAAmC;QACnI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAuD,CAAC;YACtE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,yBAAyB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;SACjG;aAAM;YACH,MAAM,IAAI,GAAG,WAAsD,CAAC;YACpE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,SAAS,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACtD,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,yBAAyB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/F;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,uBAAuB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC5E,CAAC;IA7DD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAoC,EAAE,IAAmC;QAClI,OAAO,IAAI,uBAAuB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC9E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,uBAAuB,CAAC,YAAY,CAAC;IACxE,CAAC;;AA1BL,0DA+DC;AAjDG,gBAAgB;AACO,oCAAY,GAAG,kEAAkE,CAAC"}
|
|
@@ -2,6 +2,12 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
2
2
|
/**
|
|
3
3
|
* Provides a Cloudflare Access Mutual TLS Certificate resource. Mutual TLS authentication ensures that the traffic is secure and trusted in both directions between a client and server and can be used with Access to only allows requests from devices with a corresponding client certificate.
|
|
4
4
|
*
|
|
5
|
+
* > It's required that an `accountId` or `zoneId` is provided and in
|
|
6
|
+
* most cases using either is fine. However, if you're using a scoped
|
|
7
|
+
* access token, you must provide the argument that matches the token's
|
|
8
|
+
* scope. For example, an access token that is scoped to the "example.com"
|
|
9
|
+
* zone needs to use the `zoneId` argument.
|
|
10
|
+
*
|
|
5
11
|
* ## Example Usage
|
|
6
12
|
*
|
|
7
13
|
* ```typescript
|
|
@@ -18,10 +24,16 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
18
24
|
*
|
|
19
25
|
* ## Import
|
|
20
26
|
*
|
|
21
|
-
*
|
|
27
|
+
* # Account level import.
|
|
28
|
+
*
|
|
29
|
+
* ```sh
|
|
30
|
+
* $ pulumi import cloudflare:index/accessMutualTlsCertificate:AccessMutualTlsCertificate example account/<account_id>/<mutual_tls_certificate_id>
|
|
31
|
+
* ```
|
|
32
|
+
*
|
|
33
|
+
* # Zone level import.
|
|
22
34
|
*
|
|
23
35
|
* ```sh
|
|
24
|
-
* $ pulumi import cloudflare:index/accessMutualTlsCertificate:AccessMutualTlsCertificate
|
|
36
|
+
* $ pulumi import cloudflare:index/accessMutualTlsCertificate:AccessMutualTlsCertificate example zone/<zone_id>/<mutual_tls_certificate_id>
|
|
25
37
|
* ```
|
|
26
38
|
*/
|
|
27
39
|
export declare class AccessMutualTlsCertificate extends pulumi.CustomResource {
|
|
@@ -41,7 +53,7 @@ export declare class AccessMutualTlsCertificate extends pulumi.CustomResource {
|
|
|
41
53
|
*/
|
|
42
54
|
static isInstance(obj: any): obj is AccessMutualTlsCertificate;
|
|
43
55
|
/**
|
|
44
|
-
* The account to
|
|
56
|
+
* The account identifier to target for the resource.
|
|
45
57
|
*/
|
|
46
58
|
readonly accountId: pulumi.Output<string>;
|
|
47
59
|
/**
|
|
@@ -58,7 +70,7 @@ export declare class AccessMutualTlsCertificate extends pulumi.CustomResource {
|
|
|
58
70
|
*/
|
|
59
71
|
readonly name: pulumi.Output<string>;
|
|
60
72
|
/**
|
|
61
|
-
* The
|
|
73
|
+
* The zone identifier to target for the resource.
|
|
62
74
|
*/
|
|
63
75
|
readonly zoneId: pulumi.Output<string>;
|
|
64
76
|
/**
|
|
@@ -75,7 +87,7 @@ export declare class AccessMutualTlsCertificate extends pulumi.CustomResource {
|
|
|
75
87
|
*/
|
|
76
88
|
export interface AccessMutualTlsCertificateState {
|
|
77
89
|
/**
|
|
78
|
-
* The account to
|
|
90
|
+
* The account identifier to target for the resource.
|
|
79
91
|
*/
|
|
80
92
|
accountId?: pulumi.Input<string>;
|
|
81
93
|
/**
|
|
@@ -92,7 +104,7 @@ export interface AccessMutualTlsCertificateState {
|
|
|
92
104
|
*/
|
|
93
105
|
name?: pulumi.Input<string>;
|
|
94
106
|
/**
|
|
95
|
-
* The
|
|
107
|
+
* The zone identifier to target for the resource.
|
|
96
108
|
*/
|
|
97
109
|
zoneId?: pulumi.Input<string>;
|
|
98
110
|
}
|
|
@@ -101,7 +113,7 @@ export interface AccessMutualTlsCertificateState {
|
|
|
101
113
|
*/
|
|
102
114
|
export interface AccessMutualTlsCertificateArgs {
|
|
103
115
|
/**
|
|
104
|
-
* The account to
|
|
116
|
+
* The account identifier to target for the resource.
|
|
105
117
|
*/
|
|
106
118
|
accountId?: pulumi.Input<string>;
|
|
107
119
|
/**
|
|
@@ -117,7 +129,7 @@ export interface AccessMutualTlsCertificateArgs {
|
|
|
117
129
|
*/
|
|
118
130
|
name: pulumi.Input<string>;
|
|
119
131
|
/**
|
|
120
|
-
* The
|
|
132
|
+
* The zone identifier to target for the resource.
|
|
121
133
|
*/
|
|
122
134
|
zoneId?: pulumi.Input<string>;
|
|
123
135
|
}
|
|
@@ -8,6 +8,12 @@ const utilities = require("./utilities");
|
|
|
8
8
|
/**
|
|
9
9
|
* Provides a Cloudflare Access Mutual TLS Certificate resource. Mutual TLS authentication ensures that the traffic is secure and trusted in both directions between a client and server and can be used with Access to only allows requests from devices with a corresponding client certificate.
|
|
10
10
|
*
|
|
11
|
+
* > It's required that an `accountId` or `zoneId` is provided and in
|
|
12
|
+
* most cases using either is fine. However, if you're using a scoped
|
|
13
|
+
* access token, you must provide the argument that matches the token's
|
|
14
|
+
* scope. For example, an access token that is scoped to the "example.com"
|
|
15
|
+
* zone needs to use the `zoneId` argument.
|
|
16
|
+
*
|
|
11
17
|
* ## Example Usage
|
|
12
18
|
*
|
|
13
19
|
* ```typescript
|
|
@@ -24,10 +30,16 @@ const utilities = require("./utilities");
|
|
|
24
30
|
*
|
|
25
31
|
* ## Import
|
|
26
32
|
*
|
|
27
|
-
*
|
|
33
|
+
* # Account level import.
|
|
34
|
+
*
|
|
35
|
+
* ```sh
|
|
36
|
+
* $ pulumi import cloudflare:index/accessMutualTlsCertificate:AccessMutualTlsCertificate example account/<account_id>/<mutual_tls_certificate_id>
|
|
37
|
+
* ```
|
|
38
|
+
*
|
|
39
|
+
* # Zone level import.
|
|
28
40
|
*
|
|
29
41
|
* ```sh
|
|
30
|
-
* $ pulumi import cloudflare:index/accessMutualTlsCertificate:AccessMutualTlsCertificate
|
|
42
|
+
* $ pulumi import cloudflare:index/accessMutualTlsCertificate:AccessMutualTlsCertificate example zone/<zone_id>/<mutual_tls_certificate_id>
|
|
31
43
|
* ```
|
|
32
44
|
*/
|
|
33
45
|
class AccessMutualTlsCertificate extends pulumi.CustomResource {
|