@pulumi/cloudflare 4.7.0 → 4.8.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (156) hide show
  1. package/accessApplication.d.ts +54 -80
  2. package/accessApplication.js +9 -5
  3. package/accessApplication.js.map +1 -1
  4. package/accessBookmark.d.ts +21 -22
  5. package/accessBookmark.js +9 -7
  6. package/accessBookmark.js.map +1 -1
  7. package/accessCaCertificate.d.ts +21 -11
  8. package/accessCaCertificate.js +15 -5
  9. package/accessCaCertificate.js.map +1 -1
  10. package/accessGroup.d.ts +14 -92
  11. package/accessGroup.js +8 -41
  12. package/accessGroup.js.map +1 -1
  13. package/accessIdentityProvider.d.ts +26 -28
  14. package/accessIdentityProvider.js +8 -10
  15. package/accessIdentityProvider.js.map +1 -1
  16. package/accessKeysConfiguration.d.ts +18 -0
  17. package/accessKeysConfiguration.js.map +1 -1
  18. package/accessMutualTlsCertificate.d.ts +20 -8
  19. package/accessMutualTlsCertificate.js +14 -2
  20. package/accessMutualTlsCertificate.js.map +1 -1
  21. package/accessPolicy.d.ts +53 -49
  22. package/accessPolicy.js +11 -7
  23. package/accessPolicy.js.map +1 -1
  24. package/accessRule.d.ts +67 -14
  25. package/accessRule.js +55 -5
  26. package/accessRule.js.map +1 -1
  27. package/accessServiceToken.d.ts +18 -12
  28. package/accessServiceToken.js +3 -6
  29. package/accessServiceToken.js.map +1 -1
  30. package/accountMember.d.ts +10 -11
  31. package/accountMember.js +1 -5
  32. package/accountMember.js.map +1 -1
  33. package/apiToken.d.ts +11 -122
  34. package/apiToken.js +1 -109
  35. package/apiToken.js.map +1 -1
  36. package/argo.d.ts +10 -14
  37. package/argo.js +1 -5
  38. package/argo.js.map +1 -1
  39. package/argoTunnel.d.ts +8 -0
  40. package/argoTunnel.js +2 -0
  41. package/argoTunnel.js.map +1 -1
  42. package/byoIpPrefix.d.ts +9 -0
  43. package/byoIpPrefix.js.map +1 -1
  44. package/config/vars.d.ts +22 -12
  45. package/config/vars.js.map +1 -1
  46. package/customPages.d.ts +1 -1
  47. package/customPages.js +1 -1
  48. package/filter.d.ts +8 -12
  49. package/filter.js +2 -6
  50. package/filter.js.map +1 -1
  51. package/firewallRule.d.ts +37 -22
  52. package/firewallRule.js +4 -7
  53. package/firewallRule.js.map +1 -1
  54. package/getAccessIdentityProvider.d.ts +0 -48
  55. package/getAccessIdentityProvider.js +0 -24
  56. package/getAccessIdentityProvider.js.map +1 -1
  57. package/getAccountRoles.d.ts +0 -12
  58. package/getAccountRoles.js +0 -3
  59. package/getAccountRoles.js.map +1 -1
  60. package/getApiTokenPermissionGroups.d.ts +0 -17
  61. package/getApiTokenPermissionGroups.js +0 -13
  62. package/getApiTokenPermissionGroups.js.map +1 -1
  63. package/getDevices.d.ts +0 -23
  64. package/getDevices.js +0 -14
  65. package/getDevices.js.map +1 -1
  66. package/getIpRanges.d.ts +0 -36
  67. package/getIpRanges.js +0 -21
  68. package/getIpRanges.js.map +1 -1
  69. package/getOriginCaRootCertificate.d.ts +0 -23
  70. package/getOriginCaRootCertificate.js +0 -14
  71. package/getOriginCaRootCertificate.js.map +1 -1
  72. package/getWafGroups.d.ts +0 -46
  73. package/getWafGroups.js +0 -20
  74. package/getWafGroups.js.map +1 -1
  75. package/getWafPackages.d.ts +0 -39
  76. package/getWafPackages.js +0 -22
  77. package/getWafPackages.js.map +1 -1
  78. package/getWafRules.d.ts +0 -49
  79. package/getWafRules.js +0 -23
  80. package/getWafRules.js.map +1 -1
  81. package/getZone.d.ts +0 -81
  82. package/getZone.js +0 -41
  83. package/getZone.js.map +1 -1
  84. package/getZoneDnssec.d.ts +0 -50
  85. package/getZoneDnssec.js +0 -14
  86. package/getZoneDnssec.js.map +1 -1
  87. package/getZones.d.ts +0 -81
  88. package/getZones.js +0 -70
  89. package/getZones.js.map +1 -1
  90. package/healthcheck.d.ts +100 -74
  91. package/healthcheck.js +10 -14
  92. package/healthcheck.js.map +1 -1
  93. package/index.d.ts +4 -1
  94. package/index.js +20 -5
  95. package/index.js.map +1 -1
  96. package/ipsecTunnel.d.ts +107 -6
  97. package/ipsecTunnel.js +21 -3
  98. package/ipsecTunnel.js.map +1 -1
  99. package/list.d.ts +137 -0
  100. package/list.js +115 -0
  101. package/list.js.map +1 -0
  102. package/loadBalancerMonitor.d.ts +2 -0
  103. package/loadBalancerMonitor.js +2 -0
  104. package/loadBalancerMonitor.js.map +1 -1
  105. package/logpushJob.d.ts +94 -64
  106. package/logpushJob.js +10 -37
  107. package/logpushJob.js.map +1 -1
  108. package/{logPushOwnershipChallenge.d.ts → logpushOwnershipChallenge.d.ts} +13 -13
  109. package/{logPushOwnershipChallenge.js → logpushOwnershipChallenge.js} +12 -12
  110. package/{logPushOwnershipChallenge.js.map → logpushOwnershipChallenge.js.map} +1 -1
  111. package/managedHeaders.d.ts +98 -0
  112. package/managedHeaders.js +81 -0
  113. package/managedHeaders.js.map +1 -0
  114. package/notificationPolicy.d.ts +59 -78
  115. package/notificationPolicy.js +2 -57
  116. package/notificationPolicy.js.map +1 -1
  117. package/package.json +2 -2
  118. package/package.json.dev +2 -2
  119. package/provider.d.ts +38 -19
  120. package/provider.js.map +1 -1
  121. package/record.d.ts +1 -1
  122. package/record.js +1 -1
  123. package/ruleset.d.ts +147 -24
  124. package/ruleset.js +111 -3
  125. package/ruleset.js.map +1 -1
  126. package/spectrumApplication.d.ts +7 -7
  127. package/spectrumApplication.js +1 -1
  128. package/tunnelRoute.d.ts +29 -17
  129. package/tunnelRoute.js +13 -14
  130. package/tunnelRoute.js.map +1 -1
  131. package/tunnelVirtualNetwork.d.ts +111 -0
  132. package/tunnelVirtualNetwork.js +85 -0
  133. package/tunnelVirtualNetwork.js.map +1 -0
  134. package/types/input.d.ts +145 -424
  135. package/types/output.d.ts +141 -491
  136. package/waitingRoom.d.ts +48 -34
  137. package/waitingRoom.js +5 -4
  138. package/waitingRoom.js.map +1 -1
  139. package/waitingRoomEvent.d.ts +52 -35
  140. package/waitingRoomEvent.js +4 -5
  141. package/waitingRoomEvent.js.map +1 -1
  142. package/workerCronTrigger.d.ts +9 -0
  143. package/workerCronTrigger.js.map +1 -1
  144. package/workerRoute.d.ts +2 -2
  145. package/workerRoute.js +2 -2
  146. package/workerScript.d.ts +2 -2
  147. package/workerScript.js +2 -2
  148. package/workersKv.d.ts +1 -1
  149. package/workersKv.js +1 -1
  150. package/zone.d.ts +5 -5
  151. package/zone.js +1 -1
  152. package/zoneDnssec.d.ts +1 -1
  153. package/zoneDnssec.js +1 -1
  154. package/zoneLockdown.d.ts +4 -4
  155. package/zoneLockdown.js +1 -1
  156. package/zoneSettingsOverride.d.ts +4 -4
@@ -6,9 +6,13 @@ exports.AccessCaCertificate = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("./utilities");
8
8
  /**
9
- * Cloudflare Access can replace traditional SSH key models with short-lived
10
- * certificates issued to your users based on the token generated by their Access
11
- * login.
9
+ * Cloudflare Access can replace traditional SSH key models with short-lived certificates issued to your users based on the token generated by their Access login.
10
+ *
11
+ * > It's required that an `accountId` or `zoneId` is provided and in
12
+ * most cases using either is fine. However, if you're using a scoped
13
+ * access token, you must provide the argument that matches the token's
14
+ * scope. For example, an access token that is scoped to the "example.com"
15
+ * zone needs to use the `zoneId` argument.
12
16
  *
13
17
  * ## Example Usage
14
18
  *
@@ -30,10 +34,16 @@ const utilities = require("./utilities");
30
34
  *
31
35
  * ## Import
32
36
  *
33
- * Access CA certificates can be imported using a composite ID formed of identifer ("account" or "zone"), identifier ID and the CA certificate ID.
37
+ * # Account level CA certificate import.
38
+ *
39
+ * ```sh
40
+ * $ pulumi import cloudflare:index/accessCaCertificate:AccessCaCertificate example account/<account_id>/<certificate_id>
41
+ * ```
42
+ *
43
+ * # Zone level CA certificate import.
34
44
  *
35
45
  * ```sh
36
- * $ pulumi import cloudflare:index/accessCaCertificate:AccessCaCertificate example account/1d5fdc9e88c8a8c4518b068cd94331fe/edc1e4e24567217764b4322669c44df985dddffdf03ac781
46
+ * $ pulumi import cloudflare:index/accessCaCertificate:AccessCaCertificate example account/<zone_id>/<certificate_id>
37
47
  * ```
38
48
  */
39
49
  class AccessCaCertificate extends pulumi.CustomResource {
@@ -1 +1 @@
1
- {"version":3,"file":"accessCaCertificate.js","sourceRoot":"","sources":["../accessCaCertificate.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA8BG;AACH,MAAa,mBAAoB,SAAQ,MAAM,CAAC,cAAc;IAyD1D,YAAY,IAAY,EAAE,WAAgE,EAAE,IAAmC;QAC3H,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAmD,CAAC;YAClE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAAkD,CAAC;YAChE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,aAAa,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1D,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;aAChE;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,KAAK,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC1C,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACnD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,mBAAmB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACxE,CAAC;IA/ED;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAgC,EAAE,IAAmC;QAC9H,OAAO,IAAI,mBAAmB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC1E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,mBAAmB,CAAC,YAAY,CAAC;IACpE,CAAC;;AA1BL,kDAiFC;AAnEG,gBAAgB;AACO,gCAAY,GAAG,0DAA0D,CAAC"}
1
+ {"version":3,"file":"accessCaCertificate.js","sourceRoot":"","sources":["../accessCaCertificate.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAwCG;AACH,MAAa,mBAAoB,SAAQ,MAAM,CAAC,cAAc;IAyD1D,YAAY,IAAY,EAAE,WAAgE,EAAE,IAAmC;QAC3H,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAmD,CAAC;YAClE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAAkD,CAAC;YAChE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,aAAa,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1D,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;aAChE;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,KAAK,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC1C,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACnD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,mBAAmB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACxE,CAAC;IA/ED;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAgC,EAAE,IAAmC;QAC9H,OAAO,IAAI,mBAAmB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC1E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,mBAAmB,CAAC,YAAY,CAAC;IACpE,CAAC;;AA1BL,kDAiFC;AAnEG,gBAAgB;AACO,gCAAY,GAAG,0DAA0D,CAAC"}
package/accessGroup.d.ts CHANGED
@@ -1,9 +1,13 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
2
  import { input as inputs, output as outputs } from "./types";
3
3
  /**
4
- * Provides a Cloudflare Access Group resource. Access Groups are used
5
- * in conjunction with Access Policies to restrict access to a
6
- * particular resource based on group membership.
4
+ * Provides a Cloudflare Access Group resource. Access Groups are used in conjunction with Access Policies to restrict access to a particular resource based on group membership.
5
+ *
6
+ * > It's required that an `accountId` or `zoneId` is provided and in
7
+ * most cases using either is fine. However, if you're using a scoped
8
+ * access token, you must provide the argument that matches the token's
9
+ * scope. For example, an access token that is scoped to the "example.com"
10
+ * zone needs to use the `zoneId` argument.
7
11
  *
8
12
  * ## Example Usage
9
13
  *
@@ -32,49 +36,12 @@ import { input as inputs, output as outputs } from "./types";
32
36
  * },
33
37
  * });
34
38
  * ```
35
- * ## Conditions
36
- *
37
- * `require`, `exclude` and `include` arguments share the available
38
- * conditions which can be applied. The conditions are:
39
- *
40
- * * `ip` - (Optional) A list of IP addresses or ranges. Example:
41
- * `ip = ["1.2.3.4", "10.0.0.0/2"]`
42
- * * `email` - (Optional) A list of email addresses. Example:
43
- * `email = ["test@example.com"]`
44
- * * `emailDomain` - (Optional) A list of email domains. Example:
45
- * `emailDomain = ["example.com"]`
46
- * * `serviceToken` - (Optional) A list of service token ids. Example:
47
- * `serviceToken = [cloudflare_access_service_token.demo.id]`
48
- * * `anyValidServiceToken` - (Optional) Boolean indicating if allow
49
- * all tokens to be granted. Example: `anyValidServiceToken = true`
50
- * * `group` - (Optional) A list of access group ids. Example:
51
- * `group = [cloudflare_access_group.demo.id]`
52
- * * `everyone` - (Optional) Boolean indicating permitting access for all
53
- * requests. Example: `everyone = true`
54
- * * `certificate` - (Optional) Whether to use mTLS certificate authentication.
55
- * * `commonName` - (Optional) Use a certificate common name to authenticate with.
56
- * * `authMethod` - (Optional) A string identifying the authentication
57
- * method code. The list of codes are listed here: https://tools.ietf.org/html/rfc8176#section-2.
58
- * Custom values are also supported. Example: `authMethod = ["swk"]`
59
- * * `geo` - (Optional) A list of country codes. Example: `geo = ["US"]`
60
- * * `loginMethod` - (Optional) A list of identity provider ids. Example: `loginMethod = [cloudflare_access_identity_provider.my_idp.id]`
61
- * * `devicePosture` - (Optional) A list of devicePosture integration_uids. Example: `devicePosture = [cloudflare_device_posture_rule.my_posture_rule.id]`
62
- * * `gsuite` - (Optional) Use GSuite as the authentication mechanism. Example:
63
- * * `github` - (Optional) Use a GitHub organization as the `include` condition. Example:
64
- * * `azure` - (Optional) Use Azure AD as the `include` condition. Example:
65
- * * `okta` - (Optional) Use Okta as the `include` condition. Example:
66
- * * `saml` - (Optional) Use an external SAML setup as the `include` condition.
67
- * Example:
68
39
  *
69
40
  * ## Import
70
41
  *
71
- * Access Groups can be imported using a composite ID formed of account ID and group ID.
72
- *
73
42
  * ```sh
74
- * $ pulumi import cloudflare:index/accessGroup:AccessGroup staging 975ecf5a45e3bcb680dba0722a420ad9/67ea780ce4982c1cfbe6b7293afc765d
43
+ * $ pulumi import cloudflare:index/accessGroup:AccessGroup example <account_id>/<group_id>
75
44
  * ```
76
- *
77
- * where * `975ecf5a45e3bcb680dba0722a420ad9` - Account ID * `67ea780ce4982c1cfbe6b7293afc765d` - Access Group ID
78
45
  */
79
46
  export declare class AccessGroup extends pulumi.CustomResource {
80
47
  /**
@@ -93,30 +60,15 @@ export declare class AccessGroup extends pulumi.CustomResource {
93
60
  */
94
61
  static isInstance(obj: any): obj is AccessGroup;
95
62
  /**
96
- * The ID of the account the group is associated with. Conflicts with `zoneId`.
63
+ * The account identifier to target for the resource.
97
64
  */
98
65
  readonly accountId: pulumi.Output<string | undefined>;
99
- /**
100
- * A series of access conditions, see below for
101
- * full list.
102
- */
103
66
  readonly excludes: pulumi.Output<outputs.AccessGroupExclude[] | undefined>;
104
- /**
105
- * A series of access conditions, see below for
106
- * full list.
107
- */
108
67
  readonly includes: pulumi.Output<outputs.AccessGroupInclude[]>;
109
- /**
110
- * Friendly name of the Access Group.
111
- */
112
68
  readonly name: pulumi.Output<string>;
113
- /**
114
- * A series of access conditions, see below for
115
- * full list.
116
- */
117
69
  readonly requires: pulumi.Output<outputs.AccessGroupRequire[] | undefined>;
118
70
  /**
119
- * The ID of the zone the group is associated with. Conflicts with `accountId`.
71
+ * The zone identifier to target for the resource.
120
72
  */
121
73
  readonly zoneId: pulumi.Output<string>;
122
74
  /**
@@ -133,30 +85,15 @@ export declare class AccessGroup extends pulumi.CustomResource {
133
85
  */
134
86
  export interface AccessGroupState {
135
87
  /**
136
- * The ID of the account the group is associated with. Conflicts with `zoneId`.
88
+ * The account identifier to target for the resource.
137
89
  */
138
90
  accountId?: pulumi.Input<string>;
139
- /**
140
- * A series of access conditions, see below for
141
- * full list.
142
- */
143
91
  excludes?: pulumi.Input<pulumi.Input<inputs.AccessGroupExclude>[]>;
144
- /**
145
- * A series of access conditions, see below for
146
- * full list.
147
- */
148
92
  includes?: pulumi.Input<pulumi.Input<inputs.AccessGroupInclude>[]>;
149
- /**
150
- * Friendly name of the Access Group.
151
- */
152
93
  name?: pulumi.Input<string>;
153
- /**
154
- * A series of access conditions, see below for
155
- * full list.
156
- */
157
94
  requires?: pulumi.Input<pulumi.Input<inputs.AccessGroupRequire>[]>;
158
95
  /**
159
- * The ID of the zone the group is associated with. Conflicts with `accountId`.
96
+ * The zone identifier to target for the resource.
160
97
  */
161
98
  zoneId?: pulumi.Input<string>;
162
99
  }
@@ -165,30 +102,15 @@ export interface AccessGroupState {
165
102
  */
166
103
  export interface AccessGroupArgs {
167
104
  /**
168
- * The ID of the account the group is associated with. Conflicts with `zoneId`.
105
+ * The account identifier to target for the resource.
169
106
  */
170
107
  accountId?: pulumi.Input<string>;
171
- /**
172
- * A series of access conditions, see below for
173
- * full list.
174
- */
175
108
  excludes?: pulumi.Input<pulumi.Input<inputs.AccessGroupExclude>[]>;
176
- /**
177
- * A series of access conditions, see below for
178
- * full list.
179
- */
180
109
  includes: pulumi.Input<pulumi.Input<inputs.AccessGroupInclude>[]>;
181
- /**
182
- * Friendly name of the Access Group.
183
- */
184
110
  name: pulumi.Input<string>;
185
- /**
186
- * A series of access conditions, see below for
187
- * full list.
188
- */
189
111
  requires?: pulumi.Input<pulumi.Input<inputs.AccessGroupRequire>[]>;
190
112
  /**
191
- * The ID of the zone the group is associated with. Conflicts with `accountId`.
113
+ * The zone identifier to target for the resource.
192
114
  */
193
115
  zoneId?: pulumi.Input<string>;
194
116
  }
package/accessGroup.js CHANGED
@@ -6,9 +6,13 @@ exports.AccessGroup = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("./utilities");
8
8
  /**
9
- * Provides a Cloudflare Access Group resource. Access Groups are used
10
- * in conjunction with Access Policies to restrict access to a
11
- * particular resource based on group membership.
9
+ * Provides a Cloudflare Access Group resource. Access Groups are used in conjunction with Access Policies to restrict access to a particular resource based on group membership.
10
+ *
11
+ * > It's required that an `accountId` or `zoneId` is provided and in
12
+ * most cases using either is fine. However, if you're using a scoped
13
+ * access token, you must provide the argument that matches the token's
14
+ * scope. For example, an access token that is scoped to the "example.com"
15
+ * zone needs to use the `zoneId` argument.
12
16
  *
13
17
  * ## Example Usage
14
18
  *
@@ -37,49 +41,12 @@ const utilities = require("./utilities");
37
41
  * },
38
42
  * });
39
43
  * ```
40
- * ## Conditions
41
- *
42
- * `require`, `exclude` and `include` arguments share the available
43
- * conditions which can be applied. The conditions are:
44
- *
45
- * * `ip` - (Optional) A list of IP addresses or ranges. Example:
46
- * `ip = ["1.2.3.4", "10.0.0.0/2"]`
47
- * * `email` - (Optional) A list of email addresses. Example:
48
- * `email = ["test@example.com"]`
49
- * * `emailDomain` - (Optional) A list of email domains. Example:
50
- * `emailDomain = ["example.com"]`
51
- * * `serviceToken` - (Optional) A list of service token ids. Example:
52
- * `serviceToken = [cloudflare_access_service_token.demo.id]`
53
- * * `anyValidServiceToken` - (Optional) Boolean indicating if allow
54
- * all tokens to be granted. Example: `anyValidServiceToken = true`
55
- * * `group` - (Optional) A list of access group ids. Example:
56
- * `group = [cloudflare_access_group.demo.id]`
57
- * * `everyone` - (Optional) Boolean indicating permitting access for all
58
- * requests. Example: `everyone = true`
59
- * * `certificate` - (Optional) Whether to use mTLS certificate authentication.
60
- * * `commonName` - (Optional) Use a certificate common name to authenticate with.
61
- * * `authMethod` - (Optional) A string identifying the authentication
62
- * method code. The list of codes are listed here: https://tools.ietf.org/html/rfc8176#section-2.
63
- * Custom values are also supported. Example: `authMethod = ["swk"]`
64
- * * `geo` - (Optional) A list of country codes. Example: `geo = ["US"]`
65
- * * `loginMethod` - (Optional) A list of identity provider ids. Example: `loginMethod = [cloudflare_access_identity_provider.my_idp.id]`
66
- * * `devicePosture` - (Optional) A list of devicePosture integration_uids. Example: `devicePosture = [cloudflare_device_posture_rule.my_posture_rule.id]`
67
- * * `gsuite` - (Optional) Use GSuite as the authentication mechanism. Example:
68
- * * `github` - (Optional) Use a GitHub organization as the `include` condition. Example:
69
- * * `azure` - (Optional) Use Azure AD as the `include` condition. Example:
70
- * * `okta` - (Optional) Use Okta as the `include` condition. Example:
71
- * * `saml` - (Optional) Use an external SAML setup as the `include` condition.
72
- * Example:
73
44
  *
74
45
  * ## Import
75
46
  *
76
- * Access Groups can be imported using a composite ID formed of account ID and group ID.
77
- *
78
47
  * ```sh
79
- * $ pulumi import cloudflare:index/accessGroup:AccessGroup staging 975ecf5a45e3bcb680dba0722a420ad9/67ea780ce4982c1cfbe6b7293afc765d
48
+ * $ pulumi import cloudflare:index/accessGroup:AccessGroup example <account_id>/<group_id>
80
49
  * ```
81
- *
82
- * where * `975ecf5a45e3bcb680dba0722a420ad9` - Account ID * `67ea780ce4982c1cfbe6b7293afc765d` - Access Group ID
83
50
  */
84
51
  class AccessGroup extends pulumi.CustomResource {
85
52
  constructor(name, argsOrState, opts) {
@@ -1 +1 @@
1
- {"version":3,"file":"accessGroup.js","sourceRoot":"","sources":["../accessGroup.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAEzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2EG;AACH,MAAa,WAAY,SAAQ,MAAM,CAAC,cAAc;IAgElD,YAAY,IAAY,EAAE,WAAgD,EAAE,IAAmC;QAC3G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA2C,CAAC;YAC1D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAA0C,CAAC;YACxD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,WAAW,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAChE,CAAC;IA3FD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwB,EAAE,IAAmC;QACtH,OAAO,IAAI,WAAW,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAClE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,WAAW,CAAC,YAAY,CAAC;IAC5D,CAAC;;AA1BL,kCA6FC;AA/EG,gBAAgB;AACO,wBAAY,GAAG,0CAA0C,CAAC"}
1
+ {"version":3,"file":"accessGroup.js","sourceRoot":"","sources":["../accessGroup.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAEzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA0CG;AACH,MAAa,WAAY,SAAQ,MAAM,CAAC,cAAc;IAiDlD,YAAY,IAAY,EAAE,WAAgD,EAAE,IAAmC;QAC3G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA2C,CAAC;YAC1D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAA0C,CAAC;YACxD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,WAAW,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAChE,CAAC;IA5ED;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwB,EAAE,IAAmC;QACtH,OAAO,IAAI,WAAW,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAClE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,WAAW,CAAC,YAAY,CAAC;IAC5D,CAAC;;AA1BL,kCA8EC;AAhEG,gBAAgB;AACO,wBAAY,GAAG,0CAA0C,CAAC"}
@@ -1,8 +1,13 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
2
  import { input as inputs, output as outputs } from "./types";
3
3
  /**
4
- * Provides a Cloudflare Access Identity Provider resource. Identity Providers are
5
- * used as an authentication or authorisation source within Access.
4
+ * Provides a Cloudflare Access Identity Provider resource. Identity Providers are used as an authentication or authorisation source within Access.
5
+ *
6
+ * > It's required that an `accountId` or `zoneId` is provided and in
7
+ * most cases using either is fine. However, if you're using a scoped
8
+ * access token, you must provide the argument that matches the token's
9
+ * scope. For example, an access token that is scoped to the "example.com"
10
+ * zone needs to use the `zoneId` argument.
6
11
  *
7
12
  * ## Example Usage
8
13
  *
@@ -56,18 +61,11 @@ import { input as inputs, output as outputs } from "./types";
56
61
  * });
57
62
  * ```
58
63
  *
59
- * Please refer to the [developers.cloudflare.com Access documentation][accessIdentityProviderGuide]
60
- * for full reference on what is available and how to configure your provider.
61
- *
62
64
  * ## Import
63
65
  *
64
- * Access Identity Providers can be imported using a composite ID formed of account ID and Access Identity Provider ID.
65
- *
66
66
  * ```sh
67
- * $ pulumi import cloudflare:index/accessIdentityProvider:AccessIdentityProvider my_idp cb029e245cfdd66dc8d2e570d5dd3322/e00e1c13-e350-44fe-96c5-fb75c954871c
67
+ * $ pulumi import cloudflare:index/accessIdentityProvider:AccessIdentityProvider example <account_id>/<identity_provider_id>
68
68
  * ```
69
- *
70
- * [access_identity_provider_guide]https://developers.cloudflare.com/access/configuring-identity-providers/
71
69
  */
72
70
  export declare class AccessIdentityProvider extends pulumi.CustomResource {
73
71
  /**
@@ -86,11 +84,12 @@ export declare class AccessIdentityProvider extends pulumi.CustomResource {
86
84
  */
87
85
  static isInstance(obj: any): obj is AccessIdentityProvider;
88
86
  /**
89
- * The account ID the provider should be associated with. Conflicts with `zoneId`.
87
+ * The account identifier to target for the resource.
90
88
  */
91
89
  readonly accountId: pulumi.Output<string | undefined>;
92
90
  /**
93
- * Provider configuration from the [developer documentation][accessIdentityProviderGuide].
91
+ * Provider configuration from the [developer
92
+ * documentation](https://developers.cloudflare.com/access/configuring-identity-providers/).
94
93
  */
95
94
  readonly configs: pulumi.Output<outputs.AccessIdentityProviderConfig[] | undefined>;
96
95
  /**
@@ -98,13 +97,12 @@ export declare class AccessIdentityProvider extends pulumi.CustomResource {
98
97
  */
99
98
  readonly name: pulumi.Output<string>;
100
99
  /**
101
- * The provider type to use. Must be one of: `"centrify"`,
102
- * `"facebook"`, `"google-apps"`, `"oidc"`, `"github"`, `"google"`, `"saml"`,
103
- * `"linkedin"`, `"azureAD"`, `"okta"`, `"onetimepin"`, `"onelogin"`, `"yandex"`.
100
+ * The provider type to use. Available values: `centrify`, `facebook`, `google-apps`, `oidc`, `github`, `google`, `saml`,
101
+ * `linkedin`, `azureAD`, `okta`, `onetimepin`, `onelogin`, `yandex`
104
102
  */
105
103
  readonly type: pulumi.Output<string>;
106
104
  /**
107
- * The zone ID the provider should be associated with. Conflicts with `accountId`.
105
+ * The zone identifier to target for the resource.
108
106
  */
109
107
  readonly zoneId: pulumi.Output<string | undefined>;
110
108
  /**
@@ -121,11 +119,12 @@ export declare class AccessIdentityProvider extends pulumi.CustomResource {
121
119
  */
122
120
  export interface AccessIdentityProviderState {
123
121
  /**
124
- * The account ID the provider should be associated with. Conflicts with `zoneId`.
122
+ * The account identifier to target for the resource.
125
123
  */
126
124
  accountId?: pulumi.Input<string>;
127
125
  /**
128
- * Provider configuration from the [developer documentation][accessIdentityProviderGuide].
126
+ * Provider configuration from the [developer
127
+ * documentation](https://developers.cloudflare.com/access/configuring-identity-providers/).
129
128
  */
130
129
  configs?: pulumi.Input<pulumi.Input<inputs.AccessIdentityProviderConfig>[]>;
131
130
  /**
@@ -133,13 +132,12 @@ export interface AccessIdentityProviderState {
133
132
  */
134
133
  name?: pulumi.Input<string>;
135
134
  /**
136
- * The provider type to use. Must be one of: `"centrify"`,
137
- * `"facebook"`, `"google-apps"`, `"oidc"`, `"github"`, `"google"`, `"saml"`,
138
- * `"linkedin"`, `"azureAD"`, `"okta"`, `"onetimepin"`, `"onelogin"`, `"yandex"`.
135
+ * The provider type to use. Available values: `centrify`, `facebook`, `google-apps`, `oidc`, `github`, `google`, `saml`,
136
+ * `linkedin`, `azureAD`, `okta`, `onetimepin`, `onelogin`, `yandex`
139
137
  */
140
138
  type?: pulumi.Input<string>;
141
139
  /**
142
- * The zone ID the provider should be associated with. Conflicts with `accountId`.
140
+ * The zone identifier to target for the resource.
143
141
  */
144
142
  zoneId?: pulumi.Input<string>;
145
143
  }
@@ -148,11 +146,12 @@ export interface AccessIdentityProviderState {
148
146
  */
149
147
  export interface AccessIdentityProviderArgs {
150
148
  /**
151
- * The account ID the provider should be associated with. Conflicts with `zoneId`.
149
+ * The account identifier to target for the resource.
152
150
  */
153
151
  accountId?: pulumi.Input<string>;
154
152
  /**
155
- * Provider configuration from the [developer documentation][accessIdentityProviderGuide].
153
+ * Provider configuration from the [developer
154
+ * documentation](https://developers.cloudflare.com/access/configuring-identity-providers/).
156
155
  */
157
156
  configs?: pulumi.Input<pulumi.Input<inputs.AccessIdentityProviderConfig>[]>;
158
157
  /**
@@ -160,13 +159,12 @@ export interface AccessIdentityProviderArgs {
160
159
  */
161
160
  name: pulumi.Input<string>;
162
161
  /**
163
- * The provider type to use. Must be one of: `"centrify"`,
164
- * `"facebook"`, `"google-apps"`, `"oidc"`, `"github"`, `"google"`, `"saml"`,
165
- * `"linkedin"`, `"azureAD"`, `"okta"`, `"onetimepin"`, `"onelogin"`, `"yandex"`.
162
+ * The provider type to use. Available values: `centrify`, `facebook`, `google-apps`, `oidc`, `github`, `google`, `saml`,
163
+ * `linkedin`, `azureAD`, `okta`, `onetimepin`, `onelogin`, `yandex`
166
164
  */
167
165
  type: pulumi.Input<string>;
168
166
  /**
169
- * The zone ID the provider should be associated with. Conflicts with `accountId`.
167
+ * The zone identifier to target for the resource.
170
168
  */
171
169
  zoneId?: pulumi.Input<string>;
172
170
  }
@@ -6,8 +6,13 @@ exports.AccessIdentityProvider = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("./utilities");
8
8
  /**
9
- * Provides a Cloudflare Access Identity Provider resource. Identity Providers are
10
- * used as an authentication or authorisation source within Access.
9
+ * Provides a Cloudflare Access Identity Provider resource. Identity Providers are used as an authentication or authorisation source within Access.
10
+ *
11
+ * > It's required that an `accountId` or `zoneId` is provided and in
12
+ * most cases using either is fine. However, if you're using a scoped
13
+ * access token, you must provide the argument that matches the token's
14
+ * scope. For example, an access token that is scoped to the "example.com"
15
+ * zone needs to use the `zoneId` argument.
11
16
  *
12
17
  * ## Example Usage
13
18
  *
@@ -61,18 +66,11 @@ const utilities = require("./utilities");
61
66
  * });
62
67
  * ```
63
68
  *
64
- * Please refer to the [developers.cloudflare.com Access documentation][accessIdentityProviderGuide]
65
- * for full reference on what is available and how to configure your provider.
66
- *
67
69
  * ## Import
68
70
  *
69
- * Access Identity Providers can be imported using a composite ID formed of account ID and Access Identity Provider ID.
70
- *
71
71
  * ```sh
72
- * $ pulumi import cloudflare:index/accessIdentityProvider:AccessIdentityProvider my_idp cb029e245cfdd66dc8d2e570d5dd3322/e00e1c13-e350-44fe-96c5-fb75c954871c
72
+ * $ pulumi import cloudflare:index/accessIdentityProvider:AccessIdentityProvider example <account_id>/<identity_provider_id>
73
73
  * ```
74
- *
75
- * [access_identity_provider_guide]https://developers.cloudflare.com/access/configuring-identity-providers/
76
74
  */
77
75
  class AccessIdentityProvider extends pulumi.CustomResource {
78
76
  constructor(name, argsOrState, opts) {
@@ -1 +1 @@
1
- {"version":3,"file":"accessIdentityProvider.js","sourceRoot":"","sources":["../accessIdentityProvider.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAEzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAoEG;AACH,MAAa,sBAAuB,SAAQ,MAAM,CAAC,cAAc;IA2D7D,YAAY,IAAY,EAAE,WAAsE,EAAE,IAAmC;QACjI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAsD,CAAC;YACrE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAAqD,CAAC;YACnE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,sBAAsB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC3E,CAAC;IApFD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAmC,EAAE,IAAmC;QACjI,OAAO,IAAI,sBAAsB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC7E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,sBAAsB,CAAC,YAAY,CAAC;IACvE,CAAC;;AA1BL,wDAsFC;AAxEG,gBAAgB;AACO,mCAAY,GAAG,gEAAgE,CAAC"}
1
+ {"version":3,"file":"accessIdentityProvider.js","sourceRoot":"","sources":["../accessIdentityProvider.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAEzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAkEG;AACH,MAAa,sBAAuB,SAAQ,MAAM,CAAC,cAAc;IA2D7D,YAAY,IAAY,EAAE,WAAsE,EAAE,IAAmC;QACjI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAsD,CAAC;YACrE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAAqD,CAAC;YACnE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,sBAAsB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC3E,CAAC;IApFD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAmC,EAAE,IAAmC;QACjI,OAAO,IAAI,sBAAsB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC7E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,sBAAsB,CAAC,YAAY,CAAC;IACvE,CAAC;;AA1BL,wDAsFC;AAxEG,gBAAgB;AACO,mCAAY,GAAG,gEAAgE,CAAC"}
@@ -15,7 +15,13 @@ export declare class AccessKeysConfiguration extends pulumi.CustomResource {
15
15
  * when multiple copies of the Pulumi SDK have been loaded into the same process.
16
16
  */
17
17
  static isInstance(obj: any): obj is AccessKeysConfiguration;
18
+ /**
19
+ * The account identifier to target for the resource.
20
+ */
18
21
  readonly accountId: pulumi.Output<string>;
22
+ /**
23
+ * Number of days to trigger a rotation of the keys.
24
+ */
19
25
  readonly keyRotationIntervalDays: pulumi.Output<number>;
20
26
  /**
21
27
  * Create a AccessKeysConfiguration resource with the given unique name, arguments, and options.
@@ -30,13 +36,25 @@ export declare class AccessKeysConfiguration extends pulumi.CustomResource {
30
36
  * Input properties used for looking up and filtering AccessKeysConfiguration resources.
31
37
  */
32
38
  export interface AccessKeysConfigurationState {
39
+ /**
40
+ * The account identifier to target for the resource.
41
+ */
33
42
  accountId?: pulumi.Input<string>;
43
+ /**
44
+ * Number of days to trigger a rotation of the keys.
45
+ */
34
46
  keyRotationIntervalDays?: pulumi.Input<number>;
35
47
  }
36
48
  /**
37
49
  * The set of arguments for constructing a AccessKeysConfiguration resource.
38
50
  */
39
51
  export interface AccessKeysConfigurationArgs {
52
+ /**
53
+ * The account identifier to target for the resource.
54
+ */
40
55
  accountId: pulumi.Input<string>;
56
+ /**
57
+ * Number of days to trigger a rotation of the keys.
58
+ */
41
59
  keyRotationIntervalDays?: pulumi.Input<number>;
42
60
  }
@@ -1 +1 @@
1
- {"version":3,"file":"accessKeysConfiguration.js","sourceRoot":"","sources":["../accessKeysConfiguration.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC,MAAa,uBAAwB,SAAQ,MAAM,CAAC,cAAc;IAuC9D,YAAY,IAAY,EAAE,WAAwE,EAAE,IAAmC;QACnI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAuD,CAAC;YACtE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,yBAAyB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;SACjG;aAAM;YACH,MAAM,IAAI,GAAG,WAAsD,CAAC;YACpE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,SAAS,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACtD,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,yBAAyB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/F;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,uBAAuB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC5E,CAAC;IAvDD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAoC,EAAE,IAAmC;QAClI,OAAO,IAAI,uBAAuB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC9E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,uBAAuB,CAAC,YAAY,CAAC;IACxE,CAAC;;AA1BL,0DAyDC;AA3CG,gBAAgB;AACO,oCAAY,GAAG,kEAAkE,CAAC"}
1
+ {"version":3,"file":"accessKeysConfiguration.js","sourceRoot":"","sources":["../accessKeysConfiguration.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC,MAAa,uBAAwB,SAAQ,MAAM,CAAC,cAAc;IA6C9D,YAAY,IAAY,EAAE,WAAwE,EAAE,IAAmC;QACnI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAuD,CAAC;YACtE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,yBAAyB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;SACjG;aAAM;YACH,MAAM,IAAI,GAAG,WAAsD,CAAC;YACpE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,SAAS,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACtD,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,yBAAyB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/F;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,uBAAuB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC5E,CAAC;IA7DD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAoC,EAAE,IAAmC;QAClI,OAAO,IAAI,uBAAuB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC9E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,uBAAuB,CAAC,YAAY,CAAC;IACxE,CAAC;;AA1BL,0DA+DC;AAjDG,gBAAgB;AACO,oCAAY,GAAG,kEAAkE,CAAC"}
@@ -2,6 +2,12 @@ import * as pulumi from "@pulumi/pulumi";
2
2
  /**
3
3
  * Provides a Cloudflare Access Mutual TLS Certificate resource. Mutual TLS authentication ensures that the traffic is secure and trusted in both directions between a client and server and can be used with Access to only allows requests from devices with a corresponding client certificate.
4
4
  *
5
+ * > It's required that an `accountId` or `zoneId` is provided and in
6
+ * most cases using either is fine. However, if you're using a scoped
7
+ * access token, you must provide the argument that matches the token's
8
+ * scope. For example, an access token that is scoped to the "example.com"
9
+ * zone needs to use the `zoneId` argument.
10
+ *
5
11
  * ## Example Usage
6
12
  *
7
13
  * ```typescript
@@ -18,10 +24,16 @@ import * as pulumi from "@pulumi/pulumi";
18
24
  *
19
25
  * ## Import
20
26
  *
21
- * Access Mutual TLS Certificate can be imported using a composite ID composed of the account or zone and the mutual TLS certificate ID in the form of`account/ACCOUNT_ID/MUTUAL_TLS_CERTIFICATE_ID` or `zone/ZONE_ID/MUTUAL_TLS_CERTIFICATE_ID`.
27
+ * # Account level import.
28
+ *
29
+ * ```sh
30
+ * $ pulumi import cloudflare:index/accessMutualTlsCertificate:AccessMutualTlsCertificate example account/<account_id>/<mutual_tls_certificate_id>
31
+ * ```
32
+ *
33
+ * # Zone level import.
22
34
  *
23
35
  * ```sh
24
- * $ pulumi import cloudflare:index/accessMutualTlsCertificate:AccessMutualTlsCertificate staging account/cb029e245cfdd66dc8d2e570d5dd3322/d41d8cd98f00b204e9800998ecf8427e
36
+ * $ pulumi import cloudflare:index/accessMutualTlsCertificate:AccessMutualTlsCertificate example zone/<zone_id>/<mutual_tls_certificate_id>
25
37
  * ```
26
38
  */
27
39
  export declare class AccessMutualTlsCertificate extends pulumi.CustomResource {
@@ -41,7 +53,7 @@ export declare class AccessMutualTlsCertificate extends pulumi.CustomResource {
41
53
  */
42
54
  static isInstance(obj: any): obj is AccessMutualTlsCertificate;
43
55
  /**
44
- * The account to which the certificate should be added. Conflicts with `zoneId`.
56
+ * The account identifier to target for the resource.
45
57
  */
46
58
  readonly accountId: pulumi.Output<string>;
47
59
  /**
@@ -58,7 +70,7 @@ export declare class AccessMutualTlsCertificate extends pulumi.CustomResource {
58
70
  */
59
71
  readonly name: pulumi.Output<string>;
60
72
  /**
61
- * The DNS zone to which the certificate should be added. Conflicts with `accountId`.
73
+ * The zone identifier to target for the resource.
62
74
  */
63
75
  readonly zoneId: pulumi.Output<string>;
64
76
  /**
@@ -75,7 +87,7 @@ export declare class AccessMutualTlsCertificate extends pulumi.CustomResource {
75
87
  */
76
88
  export interface AccessMutualTlsCertificateState {
77
89
  /**
78
- * The account to which the certificate should be added. Conflicts with `zoneId`.
90
+ * The account identifier to target for the resource.
79
91
  */
80
92
  accountId?: pulumi.Input<string>;
81
93
  /**
@@ -92,7 +104,7 @@ export interface AccessMutualTlsCertificateState {
92
104
  */
93
105
  name?: pulumi.Input<string>;
94
106
  /**
95
- * The DNS zone to which the certificate should be added. Conflicts with `accountId`.
107
+ * The zone identifier to target for the resource.
96
108
  */
97
109
  zoneId?: pulumi.Input<string>;
98
110
  }
@@ -101,7 +113,7 @@ export interface AccessMutualTlsCertificateState {
101
113
  */
102
114
  export interface AccessMutualTlsCertificateArgs {
103
115
  /**
104
- * The account to which the certificate should be added. Conflicts with `zoneId`.
116
+ * The account identifier to target for the resource.
105
117
  */
106
118
  accountId?: pulumi.Input<string>;
107
119
  /**
@@ -117,7 +129,7 @@ export interface AccessMutualTlsCertificateArgs {
117
129
  */
118
130
  name: pulumi.Input<string>;
119
131
  /**
120
- * The DNS zone to which the certificate should be added. Conflicts with `accountId`.
132
+ * The zone identifier to target for the resource.
121
133
  */
122
134
  zoneId?: pulumi.Input<string>;
123
135
  }
@@ -8,6 +8,12 @@ const utilities = require("./utilities");
8
8
  /**
9
9
  * Provides a Cloudflare Access Mutual TLS Certificate resource. Mutual TLS authentication ensures that the traffic is secure and trusted in both directions between a client and server and can be used with Access to only allows requests from devices with a corresponding client certificate.
10
10
  *
11
+ * > It's required that an `accountId` or `zoneId` is provided and in
12
+ * most cases using either is fine. However, if you're using a scoped
13
+ * access token, you must provide the argument that matches the token's
14
+ * scope. For example, an access token that is scoped to the "example.com"
15
+ * zone needs to use the `zoneId` argument.
16
+ *
11
17
  * ## Example Usage
12
18
  *
13
19
  * ```typescript
@@ -24,10 +30,16 @@ const utilities = require("./utilities");
24
30
  *
25
31
  * ## Import
26
32
  *
27
- * Access Mutual TLS Certificate can be imported using a composite ID composed of the account or zone and the mutual TLS certificate ID in the form of`account/ACCOUNT_ID/MUTUAL_TLS_CERTIFICATE_ID` or `zone/ZONE_ID/MUTUAL_TLS_CERTIFICATE_ID`.
33
+ * # Account level import.
34
+ *
35
+ * ```sh
36
+ * $ pulumi import cloudflare:index/accessMutualTlsCertificate:AccessMutualTlsCertificate example account/<account_id>/<mutual_tls_certificate_id>
37
+ * ```
38
+ *
39
+ * # Zone level import.
28
40
  *
29
41
  * ```sh
30
- * $ pulumi import cloudflare:index/accessMutualTlsCertificate:AccessMutualTlsCertificate staging account/cb029e245cfdd66dc8d2e570d5dd3322/d41d8cd98f00b204e9800998ecf8427e
42
+ * $ pulumi import cloudflare:index/accessMutualTlsCertificate:AccessMutualTlsCertificate example zone/<zone_id>/<mutual_tls_certificate_id>
31
43
  * ```
32
44
  */
33
45
  class AccessMutualTlsCertificate extends pulumi.CustomResource {