@pulumi/cloudflare 4.7.0 → 4.8.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/accessApplication.d.ts +54 -80
- package/accessApplication.js +9 -5
- package/accessApplication.js.map +1 -1
- package/accessBookmark.d.ts +21 -22
- package/accessBookmark.js +9 -7
- package/accessBookmark.js.map +1 -1
- package/accessCaCertificate.d.ts +21 -11
- package/accessCaCertificate.js +15 -5
- package/accessCaCertificate.js.map +1 -1
- package/accessGroup.d.ts +14 -92
- package/accessGroup.js +8 -41
- package/accessGroup.js.map +1 -1
- package/accessIdentityProvider.d.ts +26 -28
- package/accessIdentityProvider.js +8 -10
- package/accessIdentityProvider.js.map +1 -1
- package/accessKeysConfiguration.d.ts +18 -0
- package/accessKeysConfiguration.js.map +1 -1
- package/accessMutualTlsCertificate.d.ts +20 -8
- package/accessMutualTlsCertificate.js +14 -2
- package/accessMutualTlsCertificate.js.map +1 -1
- package/accessPolicy.d.ts +53 -49
- package/accessPolicy.js +11 -7
- package/accessPolicy.js.map +1 -1
- package/accessRule.d.ts +67 -14
- package/accessRule.js +55 -5
- package/accessRule.js.map +1 -1
- package/accessServiceToken.d.ts +18 -12
- package/accessServiceToken.js +3 -6
- package/accessServiceToken.js.map +1 -1
- package/accountMember.d.ts +10 -11
- package/accountMember.js +1 -5
- package/accountMember.js.map +1 -1
- package/apiToken.d.ts +11 -122
- package/apiToken.js +1 -109
- package/apiToken.js.map +1 -1
- package/argo.d.ts +10 -14
- package/argo.js +1 -5
- package/argo.js.map +1 -1
- package/argoTunnel.d.ts +8 -0
- package/argoTunnel.js +2 -0
- package/argoTunnel.js.map +1 -1
- package/byoIpPrefix.d.ts +9 -0
- package/byoIpPrefix.js.map +1 -1
- package/config/vars.d.ts +22 -12
- package/config/vars.js.map +1 -1
- package/customPages.d.ts +1 -1
- package/customPages.js +1 -1
- package/filter.d.ts +8 -12
- package/filter.js +2 -6
- package/filter.js.map +1 -1
- package/firewallRule.d.ts +37 -22
- package/firewallRule.js +4 -7
- package/firewallRule.js.map +1 -1
- package/getAccessIdentityProvider.d.ts +0 -48
- package/getAccessIdentityProvider.js +0 -24
- package/getAccessIdentityProvider.js.map +1 -1
- package/getAccountRoles.d.ts +0 -12
- package/getAccountRoles.js +0 -3
- package/getAccountRoles.js.map +1 -1
- package/getApiTokenPermissionGroups.d.ts +0 -17
- package/getApiTokenPermissionGroups.js +0 -13
- package/getApiTokenPermissionGroups.js.map +1 -1
- package/getDevices.d.ts +0 -23
- package/getDevices.js +0 -14
- package/getDevices.js.map +1 -1
- package/getIpRanges.d.ts +0 -36
- package/getIpRanges.js +0 -21
- package/getIpRanges.js.map +1 -1
- package/getOriginCaRootCertificate.d.ts +0 -23
- package/getOriginCaRootCertificate.js +0 -14
- package/getOriginCaRootCertificate.js.map +1 -1
- package/getWafGroups.d.ts +0 -46
- package/getWafGroups.js +0 -20
- package/getWafGroups.js.map +1 -1
- package/getWafPackages.d.ts +0 -39
- package/getWafPackages.js +0 -22
- package/getWafPackages.js.map +1 -1
- package/getWafRules.d.ts +0 -49
- package/getWafRules.js +0 -23
- package/getWafRules.js.map +1 -1
- package/getZone.d.ts +0 -81
- package/getZone.js +0 -41
- package/getZone.js.map +1 -1
- package/getZoneDnssec.d.ts +0 -50
- package/getZoneDnssec.js +0 -14
- package/getZoneDnssec.js.map +1 -1
- package/getZones.d.ts +0 -81
- package/getZones.js +0 -70
- package/getZones.js.map +1 -1
- package/healthcheck.d.ts +100 -74
- package/healthcheck.js +10 -14
- package/healthcheck.js.map +1 -1
- package/index.d.ts +4 -1
- package/index.js +20 -5
- package/index.js.map +1 -1
- package/ipsecTunnel.d.ts +107 -6
- package/ipsecTunnel.js +21 -3
- package/ipsecTunnel.js.map +1 -1
- package/list.d.ts +137 -0
- package/list.js +115 -0
- package/list.js.map +1 -0
- package/loadBalancerMonitor.d.ts +2 -0
- package/loadBalancerMonitor.js +2 -0
- package/loadBalancerMonitor.js.map +1 -1
- package/logpushJob.d.ts +94 -64
- package/logpushJob.js +10 -37
- package/logpushJob.js.map +1 -1
- package/{logPushOwnershipChallenge.d.ts → logpushOwnershipChallenge.d.ts} +13 -13
- package/{logPushOwnershipChallenge.js → logpushOwnershipChallenge.js} +12 -12
- package/{logPushOwnershipChallenge.js.map → logpushOwnershipChallenge.js.map} +1 -1
- package/managedHeaders.d.ts +98 -0
- package/managedHeaders.js +81 -0
- package/managedHeaders.js.map +1 -0
- package/notificationPolicy.d.ts +59 -78
- package/notificationPolicy.js +2 -57
- package/notificationPolicy.js.map +1 -1
- package/package.json +2 -2
- package/package.json.dev +2 -2
- package/provider.d.ts +38 -19
- package/provider.js.map +1 -1
- package/record.d.ts +1 -1
- package/record.js +1 -1
- package/ruleset.d.ts +147 -24
- package/ruleset.js +111 -3
- package/ruleset.js.map +1 -1
- package/spectrumApplication.d.ts +7 -7
- package/spectrumApplication.js +1 -1
- package/tunnelRoute.d.ts +29 -17
- package/tunnelRoute.js +13 -14
- package/tunnelRoute.js.map +1 -1
- package/tunnelVirtualNetwork.d.ts +111 -0
- package/tunnelVirtualNetwork.js +85 -0
- package/tunnelVirtualNetwork.js.map +1 -0
- package/types/input.d.ts +145 -424
- package/types/output.d.ts +141 -491
- package/waitingRoom.d.ts +48 -34
- package/waitingRoom.js +5 -4
- package/waitingRoom.js.map +1 -1
- package/waitingRoomEvent.d.ts +52 -35
- package/waitingRoomEvent.js +4 -5
- package/waitingRoomEvent.js.map +1 -1
- package/workerCronTrigger.d.ts +9 -0
- package/workerCronTrigger.js.map +1 -1
- package/workerRoute.d.ts +2 -2
- package/workerRoute.js +2 -2
- package/workerScript.d.ts +2 -2
- package/workerScript.js +2 -2
- package/workersKv.d.ts +1 -1
- package/workersKv.js +1 -1
- package/zone.d.ts +5 -5
- package/zone.js +1 -1
- package/zoneDnssec.d.ts +1 -1
- package/zoneDnssec.js +1 -1
- package/zoneLockdown.d.ts +4 -4
- package/zoneLockdown.js +1 -1
- package/zoneSettingsOverride.d.ts +4 -4
package/accessServiceToken.js
CHANGED
|
@@ -6,8 +6,7 @@ exports.AccessServiceToken = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
-
* Access Service Tokens are used for service-to-service communication
|
|
10
|
-
* when an application is behind Cloudflare Access.
|
|
9
|
+
* Access Service Tokens are used for service-to-service communication when an application is behind Cloudflare Access.
|
|
11
10
|
*
|
|
12
11
|
* ## Example Usage
|
|
13
12
|
*
|
|
@@ -25,13 +24,11 @@ const utilities = require("./utilities");
|
|
|
25
24
|
*
|
|
26
25
|
* ## Import
|
|
27
26
|
*
|
|
28
|
-
*
|
|
27
|
+
* # If you are importing an Access Service Token you will not have the # client_secret available in the state for use. The client_secret is only # available once, at creation. In most cases, it is better to just create a new # resource should you need to reference it in other resources.
|
|
29
28
|
*
|
|
30
29
|
* ```sh
|
|
31
|
-
* $ pulumi import cloudflare:index/accessServiceToken:AccessServiceToken
|
|
30
|
+
* $ pulumi import cloudflare:index/accessServiceToken:AccessServiceToken example <account_id>/<service_token_id>
|
|
32
31
|
* ```
|
|
33
|
-
*
|
|
34
|
-
* where * `cb029e245cfdd66dc8d2e570d5dd3322` - Account ID * `d41d8cd98f00b204e9800998ecf8427e` - Access Service Token ID
|
|
35
32
|
*/
|
|
36
33
|
class AccessServiceToken extends pulumi.CustomResource {
|
|
37
34
|
constructor(name, argsOrState, opts) {
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"accessServiceToken.js","sourceRoot":"","sources":["../accessServiceToken.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"accessServiceToken.js","sourceRoot":"","sources":["../accessServiceToken.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;GAwBG;AACH,MAAa,kBAAmB,SAAQ,MAAM,CAAC,cAAc;IAiEzD,YAAY,IAAY,EAAE,WAA8D,EAAE,IAAmC;QACzH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAkD,CAAC;YACjE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAAiD,CAAC;YAC/D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,UAAU,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC/C,cAAc,CAAC,cAAc,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACnD,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACnD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,kBAAkB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACvE,CAAC;IA3FD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA+B,EAAE,IAAmC;QAC7H,OAAO,IAAI,kBAAkB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACzE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,kBAAkB,CAAC,YAAY,CAAC;IACnE,CAAC;;AA1BL,gDA6FC;AA/EG,gBAAgB;AACO,+BAAY,GAAG,wDAAwD,CAAC"}
|
package/accountMember.d.ts
CHANGED
|
@@ -19,13 +19,9 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
19
19
|
*
|
|
20
20
|
* ## Import
|
|
21
21
|
*
|
|
22
|
-
* Account members can be imported using a composite ID formed of account ID and account member ID, e.g.
|
|
23
|
-
*
|
|
24
22
|
* ```sh
|
|
25
|
-
* $ pulumi import cloudflare:index/accountMember:AccountMember
|
|
23
|
+
* $ pulumi import cloudflare:index/accountMember:AccountMember example <account_id>/<member_id>
|
|
26
24
|
* ```
|
|
27
|
-
*
|
|
28
|
-
* where* `d41d8cd98f00b204e9800998ecf8427e` - account ID as returned by the [API](https://api.cloudflare.com/#accounts-account-details) * `b58c6f14d292556214bd64909bcdb118` - account member ID as returned by the [API](https://api.cloudflare.com/#account-members-member-details)
|
|
29
25
|
*/
|
|
30
26
|
export declare class AccountMember extends pulumi.CustomResource {
|
|
31
27
|
/**
|
|
@@ -44,11 +40,12 @@ export declare class AccountMember extends pulumi.CustomResource {
|
|
|
44
40
|
*/
|
|
45
41
|
static isInstance(obj: any): obj is AccountMember;
|
|
46
42
|
/**
|
|
47
|
-
* The email address of the user who you wish to manage.
|
|
43
|
+
* The email address of the user who you wish to manage. Following creation, this field becomes read only via the API and
|
|
44
|
+
* cannot be updated.
|
|
48
45
|
*/
|
|
49
46
|
readonly emailAddress: pulumi.Output<string>;
|
|
50
47
|
/**
|
|
51
|
-
*
|
|
48
|
+
* List of account role IDs that you want to assign to a member.
|
|
52
49
|
*/
|
|
53
50
|
readonly roleIds: pulumi.Output<string[]>;
|
|
54
51
|
/**
|
|
@@ -65,11 +62,12 @@ export declare class AccountMember extends pulumi.CustomResource {
|
|
|
65
62
|
*/
|
|
66
63
|
export interface AccountMemberState {
|
|
67
64
|
/**
|
|
68
|
-
* The email address of the user who you wish to manage.
|
|
65
|
+
* The email address of the user who you wish to manage. Following creation, this field becomes read only via the API and
|
|
66
|
+
* cannot be updated.
|
|
69
67
|
*/
|
|
70
68
|
emailAddress?: pulumi.Input<string>;
|
|
71
69
|
/**
|
|
72
|
-
*
|
|
70
|
+
* List of account role IDs that you want to assign to a member.
|
|
73
71
|
*/
|
|
74
72
|
roleIds?: pulumi.Input<pulumi.Input<string>[]>;
|
|
75
73
|
}
|
|
@@ -78,11 +76,12 @@ export interface AccountMemberState {
|
|
|
78
76
|
*/
|
|
79
77
|
export interface AccountMemberArgs {
|
|
80
78
|
/**
|
|
81
|
-
* The email address of the user who you wish to manage.
|
|
79
|
+
* The email address of the user who you wish to manage. Following creation, this field becomes read only via the API and
|
|
80
|
+
* cannot be updated.
|
|
82
81
|
*/
|
|
83
82
|
emailAddress: pulumi.Input<string>;
|
|
84
83
|
/**
|
|
85
|
-
*
|
|
84
|
+
* List of account role IDs that you want to assign to a member.
|
|
86
85
|
*/
|
|
87
86
|
roleIds: pulumi.Input<pulumi.Input<string>[]>;
|
|
88
87
|
}
|
package/accountMember.js
CHANGED
|
@@ -25,13 +25,9 @@ const utilities = require("./utilities");
|
|
|
25
25
|
*
|
|
26
26
|
* ## Import
|
|
27
27
|
*
|
|
28
|
-
* Account members can be imported using a composite ID formed of account ID and account member ID, e.g.
|
|
29
|
-
*
|
|
30
28
|
* ```sh
|
|
31
|
-
* $ pulumi import cloudflare:index/accountMember:AccountMember
|
|
29
|
+
* $ pulumi import cloudflare:index/accountMember:AccountMember example <account_id>/<member_id>
|
|
32
30
|
* ```
|
|
33
|
-
*
|
|
34
|
-
* where* `d41d8cd98f00b204e9800998ecf8427e` - account ID as returned by the [API](https://api.cloudflare.com/#accounts-account-details) * `b58c6f14d292556214bd64909bcdb118` - account member ID as returned by the [API](https://api.cloudflare.com/#account-members-member-details)
|
|
35
31
|
*/
|
|
36
32
|
class AccountMember extends pulumi.CustomResource {
|
|
37
33
|
constructor(name, argsOrState, opts) {
|
package/accountMember.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"accountMember.js","sourceRoot":"","sources":["../accountMember.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"accountMember.js","sourceRoot":"","sources":["../accountMember.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;GAuBG;AACH,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;IA8CpD,YAAY,IAAY,EAAE,WAAoD,EAAE,IAAmC;QAC/G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA6C,CAAC;YAC5D,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;SACjE;aAAM;YACH,MAAM,IAAI,GAAG,WAA4C,CAAC;YAC1D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,YAAY,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACzD,MAAM,IAAI,KAAK,CAAC,0CAA0C,CAAC,CAAC;aAC/D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAClE,CAAC;IAjED;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA0B,EAAE,IAAmC;QACxH,OAAO,IAAI,aAAa,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACpE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,aAAa,CAAC,YAAY,CAAC;IAC9D,CAAC;;AA1BL,sCAmEC;AArDG,gBAAgB;AACO,0BAAY,GAAG,8CAA8C,CAAC"}
|
package/apiToken.d.ts
CHANGED
|
@@ -3,115 +3,7 @@ import { input as inputs, output as outputs } from "./types";
|
|
|
3
3
|
/**
|
|
4
4
|
* Provides a resource which manages Cloudflare API tokens.
|
|
5
5
|
*
|
|
6
|
-
* Read more about permission groups and their applicable scopes in
|
|
7
|
-
* [the official documentation](https://developers.cloudflare.com/api/tokens/create/permissions).
|
|
8
|
-
*
|
|
9
|
-
* ## Example Usage
|
|
10
|
-
* ### User Permissions
|
|
11
|
-
*
|
|
12
|
-
* ```typescript
|
|
13
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
14
|
-
* import * as cloudflare from "@pulumi/cloudflare";
|
|
15
|
-
*
|
|
16
|
-
* const all = cloudflare.getApiTokenPermissionGroups({});
|
|
17
|
-
* // Token allowed to create new tokens.
|
|
18
|
-
* // Can only be used from specific ip range.
|
|
19
|
-
* const apiTokenCreate = new cloudflare.ApiToken("apiTokenCreate", {
|
|
20
|
-
* name: "api_token_create",
|
|
21
|
-
* policies: [{
|
|
22
|
-
* permissionGroups: [all.then(all => all.permissions?["API Tokens Write"])],
|
|
23
|
-
* resources: {
|
|
24
|
-
* `com.cloudflare.api.user.${_var.user_id}`: "*",
|
|
25
|
-
* },
|
|
26
|
-
* }],
|
|
27
|
-
* condition: {
|
|
28
|
-
* requestIp: {
|
|
29
|
-
* ins: ["192.0.2.1/32"],
|
|
30
|
-
* notIns: ["198.51.100.1/32"],
|
|
31
|
-
* },
|
|
32
|
-
* },
|
|
33
|
-
* });
|
|
34
|
-
* ```
|
|
35
|
-
* ### Account permissions
|
|
36
|
-
*
|
|
37
|
-
* ```typescript
|
|
38
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
39
|
-
* import * as cloudflare from "@pulumi/cloudflare";
|
|
40
|
-
*
|
|
41
|
-
* const all = cloudflare.getApiTokenPermissionGroups({});
|
|
42
|
-
* // Token allowed to read audit logs from all accounts.
|
|
43
|
-
* const logsAccountAll = new cloudflare.ApiToken("logsAccountAll", {
|
|
44
|
-
* name: "logs_account_all",
|
|
45
|
-
* policies: [{
|
|
46
|
-
* permissionGroups: [all.then(all => all.permissions?["Access: Audit Logs Read"])],
|
|
47
|
-
* resources: {
|
|
48
|
-
* "com.cloudflare.api.account.*": "*",
|
|
49
|
-
* },
|
|
50
|
-
* }],
|
|
51
|
-
* });
|
|
52
|
-
* // Token allowed to read audit logs from specific account.
|
|
53
|
-
* const logsAccount = new cloudflare.ApiToken("logsAccount", {
|
|
54
|
-
* name: "logs_account",
|
|
55
|
-
* policies: [{
|
|
56
|
-
* permissionGroups: [all.then(all => all.permissions?["Access: Audit Logs Read"])],
|
|
57
|
-
* resources: {
|
|
58
|
-
* `com.cloudflare.api.account.${_var.account_id}`: "*",
|
|
59
|
-
* },
|
|
60
|
-
* }],
|
|
61
|
-
* });
|
|
62
|
-
* ```
|
|
63
|
-
* ### Zone Permissions
|
|
64
|
-
*
|
|
65
|
-
* ```typescript
|
|
66
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
67
|
-
* import * as cloudflare from "@pulumi/cloudflare";
|
|
68
|
-
*
|
|
69
|
-
* const all = cloudflare.getApiTokenPermissionGroups({});
|
|
70
|
-
* // Token allowed to edit DNS entries and TLS certs for specific zone.
|
|
71
|
-
* const dnsTlsEdit = new cloudflare.ApiToken("dnsTlsEdit", {
|
|
72
|
-
* name: "dns_tls_edit",
|
|
73
|
-
* policies: [{
|
|
74
|
-
* permissionGroups: [
|
|
75
|
-
* all.then(all => all.permissions?["DNS Write"]),
|
|
76
|
-
* all.then(all => all.permissions?["SSL and Certificates Write"]),
|
|
77
|
-
* ],
|
|
78
|
-
* resources: {
|
|
79
|
-
* `com.cloudflare.api.account.zone.${_var.zone_id}`: "*",
|
|
80
|
-
* },
|
|
81
|
-
* }],
|
|
82
|
-
* });
|
|
83
|
-
* // Token allowed to edit DNS entries for all zones except one.
|
|
84
|
-
* const dnsTlsEditAllExceptOne = new cloudflare.ApiToken("dnsTlsEditAllExceptOne", {
|
|
85
|
-
* name: "dns_tls_edit_all_except_one",
|
|
86
|
-
* policies: [
|
|
87
|
-
* {
|
|
88
|
-
* permissionGroups: [all.then(all => all.permissions?["DNS Write"])],
|
|
89
|
-
* resources: {
|
|
90
|
-
* "com.cloudflare.api.account.zone.*": "*",
|
|
91
|
-
* },
|
|
92
|
-
* },
|
|
93
|
-
* {
|
|
94
|
-
* permissionGroups: [all.then(all => all.permissions?["DNS Write"])],
|
|
95
|
-
* resources: {
|
|
96
|
-
* `com.cloudflare.api.account.zone.${_var.zone_id}`: "*",
|
|
97
|
-
* },
|
|
98
|
-
* effect: "deny",
|
|
99
|
-
* },
|
|
100
|
-
* ],
|
|
101
|
-
* });
|
|
102
|
-
* // Token allowed to edit DNS entries for all zones from specific account.
|
|
103
|
-
* const dnsEditAllAccount = new cloudflare.ApiToken("dnsEditAllAccount", {
|
|
104
|
-
* name: "dns_edit_all_account",
|
|
105
|
-
* policies: [{
|
|
106
|
-
* permissionGroups: [all.then(all => all.permissions?["DNS Write"])],
|
|
107
|
-
* resources: {
|
|
108
|
-
* `com.cloudflare.api.account.${_var.account_id}`: JSON.stringify({
|
|
109
|
-
* "com.cloudflare.api.account.zone.*": "*",
|
|
110
|
-
* }),
|
|
111
|
-
* },
|
|
112
|
-
* }],
|
|
113
|
-
* });
|
|
114
|
-
* ```
|
|
6
|
+
* Read more about permission groups and their applicable scopes in the [developer documentation](https://developers.cloudflare.com/api/tokens/create/permissions).
|
|
115
7
|
*/
|
|
116
8
|
export declare class ApiToken extends pulumi.CustomResource {
|
|
117
9
|
/**
|
|
@@ -130,24 +22,23 @@ export declare class ApiToken extends pulumi.CustomResource {
|
|
|
130
22
|
*/
|
|
131
23
|
static isInstance(obj: any): obj is ApiToken;
|
|
132
24
|
/**
|
|
133
|
-
*
|
|
25
|
+
* Conditions under which the token should be considered valid.
|
|
134
26
|
*/
|
|
135
27
|
readonly condition: pulumi.Output<outputs.ApiTokenCondition | undefined>;
|
|
136
28
|
/**
|
|
137
|
-
*
|
|
29
|
+
* Timestamp of when the token was issued.
|
|
138
30
|
*/
|
|
139
31
|
readonly issuedOn: pulumi.Output<string>;
|
|
140
32
|
/**
|
|
141
|
-
*
|
|
33
|
+
* Timestamp of when the token was last modified.
|
|
142
34
|
*/
|
|
143
35
|
readonly modifiedOn: pulumi.Output<string>;
|
|
144
36
|
/**
|
|
145
|
-
* Name of the
|
|
37
|
+
* Name of the API Token.
|
|
146
38
|
*/
|
|
147
39
|
readonly name: pulumi.Output<string>;
|
|
148
40
|
/**
|
|
149
41
|
* Permissions policy. Multiple policy blocks can be defined.
|
|
150
|
-
* See the definition below.
|
|
151
42
|
*/
|
|
152
43
|
readonly policies: pulumi.Output<outputs.ApiTokenPolicy[]>;
|
|
153
44
|
readonly status: pulumi.Output<string>;
|
|
@@ -169,24 +60,23 @@ export declare class ApiToken extends pulumi.CustomResource {
|
|
|
169
60
|
*/
|
|
170
61
|
export interface ApiTokenState {
|
|
171
62
|
/**
|
|
172
|
-
*
|
|
63
|
+
* Conditions under which the token should be considered valid.
|
|
173
64
|
*/
|
|
174
65
|
condition?: pulumi.Input<inputs.ApiTokenCondition>;
|
|
175
66
|
/**
|
|
176
|
-
*
|
|
67
|
+
* Timestamp of when the token was issued.
|
|
177
68
|
*/
|
|
178
69
|
issuedOn?: pulumi.Input<string>;
|
|
179
70
|
/**
|
|
180
|
-
*
|
|
71
|
+
* Timestamp of when the token was last modified.
|
|
181
72
|
*/
|
|
182
73
|
modifiedOn?: pulumi.Input<string>;
|
|
183
74
|
/**
|
|
184
|
-
* Name of the
|
|
75
|
+
* Name of the API Token.
|
|
185
76
|
*/
|
|
186
77
|
name?: pulumi.Input<string>;
|
|
187
78
|
/**
|
|
188
79
|
* Permissions policy. Multiple policy blocks can be defined.
|
|
189
|
-
* See the definition below.
|
|
190
80
|
*/
|
|
191
81
|
policies?: pulumi.Input<pulumi.Input<inputs.ApiTokenPolicy>[]>;
|
|
192
82
|
status?: pulumi.Input<string>;
|
|
@@ -200,16 +90,15 @@ export interface ApiTokenState {
|
|
|
200
90
|
*/
|
|
201
91
|
export interface ApiTokenArgs {
|
|
202
92
|
/**
|
|
203
|
-
*
|
|
93
|
+
* Conditions under which the token should be considered valid.
|
|
204
94
|
*/
|
|
205
95
|
condition?: pulumi.Input<inputs.ApiTokenCondition>;
|
|
206
96
|
/**
|
|
207
|
-
* Name of the
|
|
97
|
+
* Name of the API Token.
|
|
208
98
|
*/
|
|
209
99
|
name: pulumi.Input<string>;
|
|
210
100
|
/**
|
|
211
101
|
* Permissions policy. Multiple policy blocks can be defined.
|
|
212
|
-
* See the definition below.
|
|
213
102
|
*/
|
|
214
103
|
policies: pulumi.Input<pulumi.Input<inputs.ApiTokenPolicy>[]>;
|
|
215
104
|
}
|
package/apiToken.js
CHANGED
|
@@ -8,115 +8,7 @@ const utilities = require("./utilities");
|
|
|
8
8
|
/**
|
|
9
9
|
* Provides a resource which manages Cloudflare API tokens.
|
|
10
10
|
*
|
|
11
|
-
* Read more about permission groups and their applicable scopes in
|
|
12
|
-
* [the official documentation](https://developers.cloudflare.com/api/tokens/create/permissions).
|
|
13
|
-
*
|
|
14
|
-
* ## Example Usage
|
|
15
|
-
* ### User Permissions
|
|
16
|
-
*
|
|
17
|
-
* ```typescript
|
|
18
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
19
|
-
* import * as cloudflare from "@pulumi/cloudflare";
|
|
20
|
-
*
|
|
21
|
-
* const all = cloudflare.getApiTokenPermissionGroups({});
|
|
22
|
-
* // Token allowed to create new tokens.
|
|
23
|
-
* // Can only be used from specific ip range.
|
|
24
|
-
* const apiTokenCreate = new cloudflare.ApiToken("apiTokenCreate", {
|
|
25
|
-
* name: "api_token_create",
|
|
26
|
-
* policies: [{
|
|
27
|
-
* permissionGroups: [all.then(all => all.permissions?["API Tokens Write"])],
|
|
28
|
-
* resources: {
|
|
29
|
-
* `com.cloudflare.api.user.${_var.user_id}`: "*",
|
|
30
|
-
* },
|
|
31
|
-
* }],
|
|
32
|
-
* condition: {
|
|
33
|
-
* requestIp: {
|
|
34
|
-
* ins: ["192.0.2.1/32"],
|
|
35
|
-
* notIns: ["198.51.100.1/32"],
|
|
36
|
-
* },
|
|
37
|
-
* },
|
|
38
|
-
* });
|
|
39
|
-
* ```
|
|
40
|
-
* ### Account permissions
|
|
41
|
-
*
|
|
42
|
-
* ```typescript
|
|
43
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
44
|
-
* import * as cloudflare from "@pulumi/cloudflare";
|
|
45
|
-
*
|
|
46
|
-
* const all = cloudflare.getApiTokenPermissionGroups({});
|
|
47
|
-
* // Token allowed to read audit logs from all accounts.
|
|
48
|
-
* const logsAccountAll = new cloudflare.ApiToken("logsAccountAll", {
|
|
49
|
-
* name: "logs_account_all",
|
|
50
|
-
* policies: [{
|
|
51
|
-
* permissionGroups: [all.then(all => all.permissions?["Access: Audit Logs Read"])],
|
|
52
|
-
* resources: {
|
|
53
|
-
* "com.cloudflare.api.account.*": "*",
|
|
54
|
-
* },
|
|
55
|
-
* }],
|
|
56
|
-
* });
|
|
57
|
-
* // Token allowed to read audit logs from specific account.
|
|
58
|
-
* const logsAccount = new cloudflare.ApiToken("logsAccount", {
|
|
59
|
-
* name: "logs_account",
|
|
60
|
-
* policies: [{
|
|
61
|
-
* permissionGroups: [all.then(all => all.permissions?["Access: Audit Logs Read"])],
|
|
62
|
-
* resources: {
|
|
63
|
-
* `com.cloudflare.api.account.${_var.account_id}`: "*",
|
|
64
|
-
* },
|
|
65
|
-
* }],
|
|
66
|
-
* });
|
|
67
|
-
* ```
|
|
68
|
-
* ### Zone Permissions
|
|
69
|
-
*
|
|
70
|
-
* ```typescript
|
|
71
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
72
|
-
* import * as cloudflare from "@pulumi/cloudflare";
|
|
73
|
-
*
|
|
74
|
-
* const all = cloudflare.getApiTokenPermissionGroups({});
|
|
75
|
-
* // Token allowed to edit DNS entries and TLS certs for specific zone.
|
|
76
|
-
* const dnsTlsEdit = new cloudflare.ApiToken("dnsTlsEdit", {
|
|
77
|
-
* name: "dns_tls_edit",
|
|
78
|
-
* policies: [{
|
|
79
|
-
* permissionGroups: [
|
|
80
|
-
* all.then(all => all.permissions?["DNS Write"]),
|
|
81
|
-
* all.then(all => all.permissions?["SSL and Certificates Write"]),
|
|
82
|
-
* ],
|
|
83
|
-
* resources: {
|
|
84
|
-
* `com.cloudflare.api.account.zone.${_var.zone_id}`: "*",
|
|
85
|
-
* },
|
|
86
|
-
* }],
|
|
87
|
-
* });
|
|
88
|
-
* // Token allowed to edit DNS entries for all zones except one.
|
|
89
|
-
* const dnsTlsEditAllExceptOne = new cloudflare.ApiToken("dnsTlsEditAllExceptOne", {
|
|
90
|
-
* name: "dns_tls_edit_all_except_one",
|
|
91
|
-
* policies: [
|
|
92
|
-
* {
|
|
93
|
-
* permissionGroups: [all.then(all => all.permissions?["DNS Write"])],
|
|
94
|
-
* resources: {
|
|
95
|
-
* "com.cloudflare.api.account.zone.*": "*",
|
|
96
|
-
* },
|
|
97
|
-
* },
|
|
98
|
-
* {
|
|
99
|
-
* permissionGroups: [all.then(all => all.permissions?["DNS Write"])],
|
|
100
|
-
* resources: {
|
|
101
|
-
* `com.cloudflare.api.account.zone.${_var.zone_id}`: "*",
|
|
102
|
-
* },
|
|
103
|
-
* effect: "deny",
|
|
104
|
-
* },
|
|
105
|
-
* ],
|
|
106
|
-
* });
|
|
107
|
-
* // Token allowed to edit DNS entries for all zones from specific account.
|
|
108
|
-
* const dnsEditAllAccount = new cloudflare.ApiToken("dnsEditAllAccount", {
|
|
109
|
-
* name: "dns_edit_all_account",
|
|
110
|
-
* policies: [{
|
|
111
|
-
* permissionGroups: [all.then(all => all.permissions?["DNS Write"])],
|
|
112
|
-
* resources: {
|
|
113
|
-
* `com.cloudflare.api.account.${_var.account_id}`: JSON.stringify({
|
|
114
|
-
* "com.cloudflare.api.account.zone.*": "*",
|
|
115
|
-
* }),
|
|
116
|
-
* },
|
|
117
|
-
* }],
|
|
118
|
-
* });
|
|
119
|
-
* ```
|
|
11
|
+
* Read more about permission groups and their applicable scopes in the [developer documentation](https://developers.cloudflare.com/api/tokens/create/permissions).
|
|
120
12
|
*/
|
|
121
13
|
class ApiToken extends pulumi.CustomResource {
|
|
122
14
|
constructor(name, argsOrState, opts) {
|
package/apiToken.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"apiToken.js","sourceRoot":"","sources":["../apiToken.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAEzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"apiToken.js","sourceRoot":"","sources":["../apiToken.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAEzC,yCAAyC;AAEzC;;;;GAIG;AACH,MAAa,QAAS,SAAQ,MAAM,CAAC,cAAc;IA8D/C,YAAY,IAAY,EAAE,WAA0C,EAAE,IAAmC;QACrG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAwC,CAAC;YACvD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7D;aAAM;YACH,MAAM,IAAI,GAAG,WAAuC,CAAC;YACrD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,UAAU,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC/C,cAAc,CAAC,YAAY,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACjD,cAAc,CAAC,QAAQ,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC7C,cAAc,CAAC,OAAO,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAC/C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,QAAQ,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC7D,CAAC;IA3FD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAqB,EAAE,IAAmC;QACnH,OAAO,IAAI,QAAQ,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC/D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,QAAQ,CAAC,YAAY,CAAC;IACzD,CAAC;;AA1BL,4BA6FC;AA/EG,gBAAgB;AACO,qBAAY,GAAG,oCAAoC,CAAC"}
|
package/argo.d.ts
CHANGED
|
@@ -17,13 +17,9 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
17
17
|
*
|
|
18
18
|
* ## Import
|
|
19
19
|
*
|
|
20
|
-
* Argo settings can be imported the zone ID.
|
|
21
|
-
*
|
|
22
20
|
* ```sh
|
|
23
|
-
* $ pulumi import cloudflare:index/argo:Argo example
|
|
21
|
+
* $ pulumi import cloudflare:index/argo:Argo example <zone_id>
|
|
24
22
|
* ```
|
|
25
|
-
*
|
|
26
|
-
* where `d41d8cd98f00b204e9800998ecf8427e` is the zone ID.
|
|
27
23
|
*/
|
|
28
24
|
export declare class Argo extends pulumi.CustomResource {
|
|
29
25
|
/**
|
|
@@ -42,15 +38,15 @@ export declare class Argo extends pulumi.CustomResource {
|
|
|
42
38
|
*/
|
|
43
39
|
static isInstance(obj: any): obj is Argo;
|
|
44
40
|
/**
|
|
45
|
-
* Whether smart routing is enabled.
|
|
41
|
+
* Whether smart routing is enabled. Available values: `on`, `off`
|
|
46
42
|
*/
|
|
47
43
|
readonly smartRouting: pulumi.Output<string | undefined>;
|
|
48
44
|
/**
|
|
49
|
-
* Whether tiered caching is enabled.
|
|
45
|
+
* Whether tiered caching is enabled. Available values: `on`, `off`
|
|
50
46
|
*/
|
|
51
47
|
readonly tieredCaching: pulumi.Output<string | undefined>;
|
|
52
48
|
/**
|
|
53
|
-
* The
|
|
49
|
+
* The zone identifier to target for the resource.
|
|
54
50
|
*/
|
|
55
51
|
readonly zoneId: pulumi.Output<string>;
|
|
56
52
|
/**
|
|
@@ -67,15 +63,15 @@ export declare class Argo extends pulumi.CustomResource {
|
|
|
67
63
|
*/
|
|
68
64
|
export interface ArgoState {
|
|
69
65
|
/**
|
|
70
|
-
* Whether smart routing is enabled.
|
|
66
|
+
* Whether smart routing is enabled. Available values: `on`, `off`
|
|
71
67
|
*/
|
|
72
68
|
smartRouting?: pulumi.Input<string>;
|
|
73
69
|
/**
|
|
74
|
-
* Whether tiered caching is enabled.
|
|
70
|
+
* Whether tiered caching is enabled. Available values: `on`, `off`
|
|
75
71
|
*/
|
|
76
72
|
tieredCaching?: pulumi.Input<string>;
|
|
77
73
|
/**
|
|
78
|
-
* The
|
|
74
|
+
* The zone identifier to target for the resource.
|
|
79
75
|
*/
|
|
80
76
|
zoneId?: pulumi.Input<string>;
|
|
81
77
|
}
|
|
@@ -84,15 +80,15 @@ export interface ArgoState {
|
|
|
84
80
|
*/
|
|
85
81
|
export interface ArgoArgs {
|
|
86
82
|
/**
|
|
87
|
-
* Whether smart routing is enabled.
|
|
83
|
+
* Whether smart routing is enabled. Available values: `on`, `off`
|
|
88
84
|
*/
|
|
89
85
|
smartRouting?: pulumi.Input<string>;
|
|
90
86
|
/**
|
|
91
|
-
* Whether tiered caching is enabled.
|
|
87
|
+
* Whether tiered caching is enabled. Available values: `on`, `off`
|
|
92
88
|
*/
|
|
93
89
|
tieredCaching?: pulumi.Input<string>;
|
|
94
90
|
/**
|
|
95
|
-
* The
|
|
91
|
+
* The zone identifier to target for the resource.
|
|
96
92
|
*/
|
|
97
93
|
zoneId: pulumi.Input<string>;
|
|
98
94
|
}
|
package/argo.js
CHANGED
|
@@ -23,13 +23,9 @@ const utilities = require("./utilities");
|
|
|
23
23
|
*
|
|
24
24
|
* ## Import
|
|
25
25
|
*
|
|
26
|
-
* Argo settings can be imported the zone ID.
|
|
27
|
-
*
|
|
28
26
|
* ```sh
|
|
29
|
-
* $ pulumi import cloudflare:index/argo:Argo example
|
|
27
|
+
* $ pulumi import cloudflare:index/argo:Argo example <zone_id>
|
|
30
28
|
* ```
|
|
31
|
-
*
|
|
32
|
-
* where `d41d8cd98f00b204e9800998ecf8427e` is the zone ID.
|
|
33
29
|
*/
|
|
34
30
|
class Argo extends pulumi.CustomResource {
|
|
35
31
|
constructor(name, argsOrState, opts) {
|
package/argo.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"argo.js","sourceRoot":"","sources":["../argo.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"argo.js","sourceRoot":"","sources":["../argo.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;GAqBG;AACH,MAAa,IAAK,SAAQ,MAAM,CAAC,cAAc;IAiD3C,YAAY,IAAY,EAAE,WAAkC,EAAE,IAAmC;QAC7F,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAoC,CAAC;YACnD,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAAmC,CAAC;YACjD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,IAAI,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACzD,CAAC;IAnED;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAiB,EAAE,IAAmC;QAC/G,OAAO,IAAI,IAAI,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC3D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,IAAI,CAAC,YAAY,CAAC;IACrD,CAAC;;AA1BL,oBAqEC;AAvDG,gBAAgB;AACO,iBAAY,GAAG,4BAA4B,CAAC"}
|
package/argoTunnel.d.ts
CHANGED
|
@@ -57,6 +57,10 @@ export declare class ArgoTunnel extends pulumi.CustomResource {
|
|
|
57
57
|
* 32 or more bytes, encoded as a base64 string. The Create Argo Tunnel endpoint sets this as the tunnel's password. Anyone wishing to run the tunnel needs this password.
|
|
58
58
|
*/
|
|
59
59
|
readonly secret: pulumi.Output<string>;
|
|
60
|
+
/**
|
|
61
|
+
* Token used by a connector to authenticate and run the tunnel.
|
|
62
|
+
*/
|
|
63
|
+
readonly tunnelToken: pulumi.Output<string>;
|
|
60
64
|
/**
|
|
61
65
|
* Create a ArgoTunnel resource with the given unique name, arguments, and options.
|
|
62
66
|
*
|
|
@@ -86,6 +90,10 @@ export interface ArgoTunnelState {
|
|
|
86
90
|
* 32 or more bytes, encoded as a base64 string. The Create Argo Tunnel endpoint sets this as the tunnel's password. Anyone wishing to run the tunnel needs this password.
|
|
87
91
|
*/
|
|
88
92
|
secret?: pulumi.Input<string>;
|
|
93
|
+
/**
|
|
94
|
+
* Token used by a connector to authenticate and run the tunnel.
|
|
95
|
+
*/
|
|
96
|
+
tunnelToken?: pulumi.Input<string>;
|
|
89
97
|
}
|
|
90
98
|
/**
|
|
91
99
|
* The set of arguments for constructing a ArgoTunnel resource.
|
package/argoTunnel.js
CHANGED
|
@@ -41,6 +41,7 @@ class ArgoTunnel extends pulumi.CustomResource {
|
|
|
41
41
|
resourceInputs["cname"] = state ? state.cname : undefined;
|
|
42
42
|
resourceInputs["name"] = state ? state.name : undefined;
|
|
43
43
|
resourceInputs["secret"] = state ? state.secret : undefined;
|
|
44
|
+
resourceInputs["tunnelToken"] = state ? state.tunnelToken : undefined;
|
|
44
45
|
}
|
|
45
46
|
else {
|
|
46
47
|
const args = argsOrState;
|
|
@@ -57,6 +58,7 @@ class ArgoTunnel extends pulumi.CustomResource {
|
|
|
57
58
|
resourceInputs["name"] = args ? args.name : undefined;
|
|
58
59
|
resourceInputs["secret"] = args ? args.secret : undefined;
|
|
59
60
|
resourceInputs["cname"] = undefined /*out*/;
|
|
61
|
+
resourceInputs["tunnelToken"] = undefined /*out*/;
|
|
60
62
|
}
|
|
61
63
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
62
64
|
super(ArgoTunnel.__pulumiType, name, resourceInputs, opts);
|
package/argoTunnel.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"argoTunnel.js","sourceRoot":"","sources":["../argoTunnel.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;GAyBG;AACH,MAAa,UAAW,SAAQ,MAAM,CAAC,cAAc;
|
|
1
|
+
{"version":3,"file":"argoTunnel.js","sourceRoot":"","sources":["../argoTunnel.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;GAyBG;AACH,MAAa,UAAW,SAAQ,MAAM,CAAC,cAAc;IAyDjD,YAAY,IAAY,EAAE,WAA8C,EAAE,IAAmC;QACzG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA0C,CAAC;YACzD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;SACzE;aAAM;YACH,MAAM,IAAI,GAAG,WAAyC,CAAC;YACvD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,SAAS,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACtD,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,OAAO,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC5C,cAAc,CAAC,aAAa,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACrD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,UAAU,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC/D,CAAC;IArFD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAuB,EAAE,IAAmC;QACrH,OAAO,IAAI,UAAU,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACjE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,UAAU,CAAC,YAAY,CAAC;IAC3D,CAAC;;AA1BL,gCAuFC;AAzEG,gBAAgB;AACO,uBAAY,GAAG,wCAAwC,CAAC"}
|
package/byoIpPrefix.d.ts
CHANGED
|
@@ -39,6 +39,9 @@ export declare class ByoIpPrefix extends pulumi.CustomResource {
|
|
|
39
39
|
* when multiple copies of the Pulumi SDK have been loaded into the same process.
|
|
40
40
|
*/
|
|
41
41
|
static isInstance(obj: any): obj is ByoIpPrefix;
|
|
42
|
+
/**
|
|
43
|
+
* The account identifier to target for the resource.
|
|
44
|
+
*/
|
|
42
45
|
readonly accountId: pulumi.Output<string>;
|
|
43
46
|
/**
|
|
44
47
|
* Whether or not the prefix shall be announced. A prefix can be activated or deactivated once every 15 minutes (attempting more regular updates will trigger rate limiting). Valid values: `on` or `off`.
|
|
@@ -65,6 +68,9 @@ export declare class ByoIpPrefix extends pulumi.CustomResource {
|
|
|
65
68
|
* Input properties used for looking up and filtering ByoIpPrefix resources.
|
|
66
69
|
*/
|
|
67
70
|
export interface ByoIpPrefixState {
|
|
71
|
+
/**
|
|
72
|
+
* The account identifier to target for the resource.
|
|
73
|
+
*/
|
|
68
74
|
accountId?: pulumi.Input<string>;
|
|
69
75
|
/**
|
|
70
76
|
* Whether or not the prefix shall be announced. A prefix can be activated or deactivated once every 15 minutes (attempting more regular updates will trigger rate limiting). Valid values: `on` or `off`.
|
|
@@ -83,6 +89,9 @@ export interface ByoIpPrefixState {
|
|
|
83
89
|
* The set of arguments for constructing a ByoIpPrefix resource.
|
|
84
90
|
*/
|
|
85
91
|
export interface ByoIpPrefixArgs {
|
|
92
|
+
/**
|
|
93
|
+
* The account identifier to target for the resource.
|
|
94
|
+
*/
|
|
86
95
|
accountId: pulumi.Input<string>;
|
|
87
96
|
/**
|
|
88
97
|
* Whether or not the prefix shall be announced. A prefix can be activated or deactivated once every 15 minutes (attempting more regular updates will trigger rate limiting). Valid values: `on` or `off`.
|
package/byoIpPrefix.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"byoIpPrefix.js","sourceRoot":"","sources":["../byoIpPrefix.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;GAuBG;AACH,MAAa,WAAY,SAAQ,MAAM,CAAC,cAAc;
|
|
1
|
+
{"version":3,"file":"byoIpPrefix.js","sourceRoot":"","sources":["../byoIpPrefix.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;GAuBG;AACH,MAAa,WAAY,SAAQ,MAAM,CAAC,cAAc;IAqDlD,YAAY,IAAY,EAAE,WAAgD,EAAE,IAAmC;QAC3G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA2C,CAAC;YAC1D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SACnE;aAAM;YACH,MAAM,IAAI,GAAG,WAA0C,CAAC;YACxD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,SAAS,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACtD,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SACjE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,WAAW,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAChE,CAAC;IA5ED;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwB,EAAE,IAAmC;QACtH,OAAO,IAAI,WAAW,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAClE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,WAAW,CAAC,YAAY,CAAC;IAC5D,CAAC;;AA1BL,kCA8EC;AAhEG,gBAAgB;AACO,wBAAY,GAAG,0CAA0C,CAAC"}
|