@pulumi/cloudflare 5.13.0 → 5.14.0-alpha.1698199142
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/accessApplication.d.ts +0 -26
- package/accessApplication.js +0 -26
- package/accessApplication.js.map +1 -1
- package/accessCaCertificate.d.ts +0 -18
- package/accessCaCertificate.js +0 -18
- package/accessCaCertificate.js.map +1 -1
- package/accessCustomPage.d.ts +0 -14
- package/accessCustomPage.js +0 -14
- package/accessCustomPage.js.map +1 -1
- package/accessGroup.d.ts +0 -39
- package/accessGroup.js +0 -39
- package/accessGroup.js.map +1 -1
- package/accessIdentityProvider.d.ts +0 -54
- package/accessIdentityProvider.js +0 -54
- package/accessIdentityProvider.js.map +1 -1
- package/accessMutualTlsCertificate.d.ts +0 -14
- package/accessMutualTlsCertificate.js +0 -14
- package/accessMutualTlsCertificate.js.map +1 -1
- package/accessOrganization.d.ts +0 -23
- package/accessOrganization.js +0 -23
- package/accessOrganization.js.map +1 -1
- package/accessPolicy.d.ts +0 -37
- package/accessPolicy.js +0 -37
- package/accessPolicy.js.map +1 -1
- package/accessRule.d.ts +0 -46
- package/accessRule.js +0 -46
- package/accessRule.js.map +1 -1
- package/accessServiceToken.d.ts +0 -14
- package/accessServiceToken.js +0 -14
- package/accessServiceToken.js.map +1 -1
- package/account.d.ts +0 -13
- package/account.js +0 -13
- package/account.js.map +1 -1
- package/accountMember.d.ts +0 -16
- package/accountMember.js +0 -16
- package/accountMember.js.map +1 -1
- package/addressMap.d.ts +0 -32
- package/addressMap.js +0 -32
- package/addressMap.js.map +1 -1
- package/apiShield.d.ts +0 -15
- package/apiShield.js +0 -15
- package/apiShield.js.map +1 -1
- package/apiShieldOperation.d.ts +0 -14
- package/apiShieldOperation.js +0 -14
- package/apiShieldOperation.js.map +1 -1
- package/apiShieldSchema.d.ts +0 -16
- package/apiShieldSchema.js +0 -16
- package/apiShieldSchema.js.map +1 -1
- package/argo.d.ts +0 -13
- package/argo.js +0 -13
- package/argo.js.map +1 -1
- package/authenticatedOriginPulls.d.ts +0 -38
- package/authenticatedOriginPulls.js +0 -38
- package/authenticatedOriginPulls.js.map +1 -1
- package/authenticatedOriginPullsCertificate.d.ts +0 -22
- package/authenticatedOriginPullsCertificate.js +0 -22
- package/authenticatedOriginPullsCertificate.js.map +1 -1
- package/botManagement.d.ts +0 -17
- package/botManagement.js +0 -17
- package/botManagement.js.map +1 -1
- package/byoIpPrefix.d.ts +0 -14
- package/byoIpPrefix.js +0 -14
- package/byoIpPrefix.js.map +1 -1
- package/certificatePack.d.ts +0 -22
- package/certificatePack.js +0 -22
- package/certificatePack.js.map +1 -1
- package/customHostname.d.ts +0 -15
- package/customHostname.js +0 -15
- package/customHostname.js.map +1 -1
- package/customHostnameFallbackOrigin.d.ts +0 -12
- package/customHostnameFallbackOrigin.js +0 -12
- package/customHostnameFallbackOrigin.js.map +1 -1
- package/customPages.d.ts +0 -14
- package/customPages.js +0 -14
- package/customPages.js.map +1 -1
- package/customSsl.d.ts +0 -18
- package/customSsl.js +0 -18
- package/customSsl.js.map +1 -1
- package/d1database.d.ts +0 -12
- package/d1database.js +0 -12
- package/d1database.js.map +1 -1
- package/deviceDexTest.d.ts +0 -20
- package/deviceDexTest.js +0 -20
- package/deviceDexTest.js.map +1 -1
- package/deviceManagedNetworks.d.ts +0 -17
- package/deviceManagedNetworks.js +0 -17
- package/deviceManagedNetworks.js.map +1 -1
- package/devicePolicyCertificates.d.ts +0 -12
- package/devicePolicyCertificates.js +0 -12
- package/devicePolicyCertificates.js.map +1 -1
- package/devicePostureIntegration.d.ts +0 -20
- package/devicePostureIntegration.js +0 -20
- package/devicePostureIntegration.js.map +1 -1
- package/devicePostureRule.d.ts +0 -26
- package/devicePostureRule.js +0 -26
- package/devicePostureRule.js.map +1 -1
- package/deviceSettingsPolicy.d.ts +0 -28
- package/deviceSettingsPolicy.js +0 -28
- package/deviceSettingsPolicy.js.map +1 -1
- package/emailRoutingAddress.d.ts +0 -12
- package/emailRoutingAddress.js +0 -12
- package/emailRoutingAddress.js.map +1 -1
- package/emailRoutingCatchAll.d.ts +0 -20
- package/emailRoutingCatchAll.js +0 -20
- package/emailRoutingCatchAll.js.map +1 -1
- package/emailRoutingRule.d.ts +0 -22
- package/emailRoutingRule.js +0 -22
- package/emailRoutingRule.js.map +1 -1
- package/emailRoutingSettings.d.ts +0 -12
- package/emailRoutingSettings.js +0 -12
- package/emailRoutingSettings.js.map +1 -1
- package/filter.d.ts +0 -13
- package/filter.js +0 -13
- package/filter.js.map +1 -1
- package/firewallRule.d.ts +0 -19
- package/firewallRule.js +0 -19
- package/firewallRule.js.map +1 -1
- package/getAccessIdentityProvider.d.ts +0 -42
- package/getAccessIdentityProvider.js +0 -42
- package/getAccessIdentityProvider.js.map +1 -1
- package/getAccounts.d.ts +0 -22
- package/getAccounts.js +0 -22
- package/getAccounts.js.map +1 -1
- package/getApiTokenPermissionGroups.d.ts +0 -24
- package/getApiTokenPermissionGroups.js +0 -24
- package/getApiTokenPermissionGroups.js.map +1 -1
- package/getDevices.d.ts +0 -22
- package/getDevices.js +0 -22
- package/getDevices.js.map +1 -1
- package/getIpRanges.d.ts +0 -38
- package/getIpRanges.js +0 -38
- package/getIpRanges.js.map +1 -1
- package/getList.d.ts +0 -24
- package/getList.js +0 -24
- package/getList.js.map +1 -1
- package/getLists.d.ts +0 -22
- package/getLists.js +0 -22
- package/getLists.js.map +1 -1
- package/getLoadBalancerPools.d.ts +0 -28
- package/getLoadBalancerPools.js +0 -28
- package/getLoadBalancerPools.js.map +1 -1
- package/getOriginCaRootCertificate.d.ts +0 -22
- package/getOriginCaRootCertificate.js +0 -22
- package/getOriginCaRootCertificate.js.map +1 -1
- package/getRecord.d.ts +0 -24
- package/getRecord.js +0 -24
- package/getRecord.js.map +1 -1
- package/getRulesets.d.ts +0 -28
- package/getRulesets.js +0 -28
- package/getRulesets.js.map +1 -1
- package/getUser.d.ts +0 -38
- package/getUser.js +0 -38
- package/getUser.js.map +1 -1
- package/getZone.d.ts +0 -36
- package/getZone.js +0 -36
- package/getZone.js.map +1 -1
- package/getZoneCacheReserve.d.ts +0 -22
- package/getZoneCacheReserve.js +0 -22
- package/getZoneCacheReserve.js.map +1 -1
- package/getZoneDnssec.d.ts +0 -22
- package/getZoneDnssec.js +0 -22
- package/getZoneDnssec.js.map +1 -1
- package/getZones.d.ts +0 -28
- package/getZones.js +0 -28
- package/getZones.js.map +1 -1
- package/greTunnel.d.ts +0 -21
- package/greTunnel.js +0 -21
- package/greTunnel.js.map +1 -1
- package/healthcheck.d.ts +0 -60
- package/healthcheck.js +0 -60
- package/healthcheck.js.map +1 -1
- package/hostnameTlsSetting.d.ts +0 -14
- package/hostnameTlsSetting.js +0 -14
- package/hostnameTlsSetting.js.map +1 -1
- package/hostnameTlsSettingCiphers.d.ts +0 -13
- package/hostnameTlsSettingCiphers.js +0 -13
- package/hostnameTlsSettingCiphers.js.map +1 -1
- package/ipsecTunnel.d.ts +0 -21
- package/ipsecTunnel.js +0 -21
- package/ipsecTunnel.js.map +1 -1
- package/listItem.d.ts +0 -60
- package/listItem.js +0 -60
- package/listItem.js.map +1 -1
- package/loadBalancer.d.ts +0 -51
- package/loadBalancer.js +0 -51
- package/loadBalancer.js.map +1 -1
- package/loadBalancerMonitor.d.ts +0 -19
- package/loadBalancerMonitor.js +0 -19
- package/loadBalancerMonitor.js.map +1 -1
- package/loadBalancerPool.d.ts +0 -46
- package/loadBalancerPool.js +0 -46
- package/loadBalancerPool.js.map +1 -1
- package/logpullRetention.d.ts +0 -12
- package/logpullRetention.js +0 -12
- package/logpullRetention.js.map +1 -1
- package/logpushOwnershipChallenge.d.ts +0 -12
- package/logpushOwnershipChallenge.js +0 -12
- package/logpushOwnershipChallenge.js.map +1 -1
- package/magicFirewallRuleset.d.ts +0 -27
- package/magicFirewallRuleset.js +0 -27
- package/magicFirewallRuleset.js.map +1 -1
- package/managedHeaders.d.ts +0 -20
- package/managedHeaders.js +0 -20
- package/managedHeaders.js.map +1 -1
- package/mtlsCertificate.d.ts +0 -21
- package/mtlsCertificate.js +0 -21
- package/mtlsCertificate.js.map +1 -1
- package/notificationPolicyWebhooks.d.ts +0 -14
- package/notificationPolicyWebhooks.js +0 -14
- package/notificationPolicyWebhooks.js.map +1 -1
- package/observatoryScheduledTest.d.ts +0 -14
- package/observatoryScheduledTest.js +0 -14
- package/observatoryScheduledTest.js.map +1 -1
- package/originCaCertificate.d.ts +0 -23
- package/originCaCertificate.js +0 -23
- package/originCaCertificate.js.map +1 -1
- package/package.json +1 -1
- package/pageRule.d.ts +0 -23
- package/pageRule.js +0 -23
- package/pageRule.js.map +1 -1
- package/pagesDomain.d.ts +0 -13
- package/pagesDomain.js +0 -13
- package/pagesDomain.js.map +1 -1
- package/pagesProject.d.ts +0 -141
- package/pagesProject.js +0 -141
- package/pagesProject.js.map +1 -1
- package/queue.d.ts +0 -12
- package/queue.js +0 -12
- package/queue.js.map +1 -1
- package/r2bucket.d.ts +0 -15
- package/r2bucket.js +0 -15
- package/r2bucket.js.map +1 -1
- package/rateLimit.d.ts +0 -69
- package/rateLimit.js +0 -69
- package/rateLimit.js.map +1 -1
- package/record.d.ts +0 -31
- package/record.js +0 -31
- package/record.js.map +1 -1
- package/regionalHostname.d.ts +0 -24
- package/regionalHostname.js +0 -24
- package/regionalHostname.js.map +1 -1
- package/regionalTieredCache.d.ts +0 -12
- package/regionalTieredCache.js +0 -12
- package/regionalTieredCache.js.map +1 -1
- package/spectrumApplication.d.ts +0 -25
- package/spectrumApplication.js +0 -25
- package/spectrumApplication.js.map +1 -1
- package/splitTunnel.d.ts +0 -54
- package/splitTunnel.js +0 -54
- package/splitTunnel.js.map +1 -1
- package/staticRoute.d.ts +0 -18
- package/staticRoute.js +0 -18
- package/staticRoute.js.map +1 -1
- package/teamsAccount.d.ts +0 -50
- package/teamsAccount.js +0 -50
- package/teamsAccount.js.map +1 -1
- package/teamsList.d.ts +0 -19
- package/teamsList.js +0 -19
- package/teamsList.js.map +1 -1
- package/teamsLocation.d.ts +0 -21
- package/teamsLocation.js +0 -21
- package/teamsLocation.js.map +1 -1
- package/teamsProxyEndpoint.d.ts +0 -13
- package/teamsProxyEndpoint.js +0 -13
- package/teamsProxyEndpoint.js.map +1 -1
- package/teamsRule.d.ts +0 -21
- package/teamsRule.js +0 -21
- package/teamsRule.js.map +1 -1
- package/tieredCache.d.ts +0 -12
- package/tieredCache.js +0 -12
- package/tieredCache.js.map +1 -1
- package/totalTls.d.ts +0 -13
- package/totalTls.js +0 -13
- package/totalTls.js.map +1 -1
- package/tunnel.d.ts +0 -13
- package/tunnel.js +0 -13
- package/tunnel.js.map +1 -1
- package/tunnelConfig.d.ts +0 -65
- package/tunnelConfig.js +0 -65
- package/tunnelConfig.js.map +1 -1
- package/tunnelRoute.d.ts +0 -29
- package/tunnelRoute.js +0 -29
- package/tunnelRoute.js.map +1 -1
- package/tunnelVirtualNetwork.d.ts +0 -13
- package/tunnelVirtualNetwork.js +0 -13
- package/tunnelVirtualNetwork.js.map +1 -1
- package/turnstileWidget.d.ts +0 -16
- package/turnstileWidget.js +0 -16
- package/turnstileWidget.js.map +1 -1
- package/types/input.d.ts +0 -38
- package/types/output.d.ts +0 -38
- package/urlNormalizationSettings.d.ts +0 -13
- package/urlNormalizationSettings.js +0 -13
- package/urlNormalizationSettings.js.map +1 -1
- package/userAgentBlockingRule.d.ts +0 -28
- package/userAgentBlockingRule.js +0 -28
- package/userAgentBlockingRule.js.map +1 -1
- package/waitingRoom.d.ts +0 -28
- package/waitingRoom.js +0 -28
- package/waitingRoom.js.map +1 -1
- package/waitingRoomEvent.d.ts +0 -16
- package/waitingRoomEvent.js +0 -16
- package/waitingRoomEvent.js.map +1 -1
- package/waitingRoomRules.d.ts +0 -26
- package/waitingRoomRules.js +0 -26
- package/waitingRoomRules.js.map +1 -1
- package/waitingRoomSettings.d.ts +0 -12
- package/waitingRoomSettings.js +0 -12
- package/waitingRoomSettings.js.map +1 -1
- package/webAnalyticsRule.d.ts +0 -23
- package/webAnalyticsRule.js +0 -23
- package/webAnalyticsRule.js.map +1 -1
- package/webAnalyticsSite.d.ts +0 -13
- package/webAnalyticsSite.js +0 -13
- package/webAnalyticsSite.js.map +1 -1
- package/workerCronTrigger.d.ts +0 -22
- package/workerCronTrigger.js +0 -22
- package/workerCronTrigger.js.map +1 -1
- package/workerDomain.d.ts +0 -14
- package/workerDomain.js +0 -14
- package/workerDomain.js.map +1 -1
- package/workerRoute.d.ts +0 -16
- package/workerRoute.js +0 -16
- package/workerRoute.js.map +1 -1
- package/workerScript.d.ts +0 -48
- package/workerScript.js +0 -48
- package/workerScript.js.map +1 -1
- package/workersKv.d.ts +0 -18
- package/workersKv.js +0 -18
- package/workersKv.js.map +1 -1
- package/workersKvNamespace.d.ts +0 -12
- package/workersKvNamespace.js +0 -12
- package/workersKvNamespace.js.map +1 -1
- package/zone.d.ts +0 -12
- package/zone.js +0 -12
- package/zone.js.map +1 -1
- package/zoneCacheReserve.d.ts +0 -12
- package/zoneCacheReserve.js +0 -12
- package/zoneCacheReserve.js.map +1 -1
- package/zoneCacheVariants.d.ts +0 -55
- package/zoneCacheVariants.js +0 -55
- package/zoneCacheVariants.js.map +1 -1
- package/zoneDnssec.d.ts +0 -10
- package/zoneDnssec.js +0 -10
- package/zoneDnssec.js.map +1 -1
- package/zoneHold.d.ts +0 -12
- package/zoneHold.js +0 -12
- package/zoneHold.js.map +1 -1
- package/zoneLockdown.d.ts +0 -19
- package/zoneLockdown.js +0 -19
- package/zoneLockdown.js.map +1 -1
- package/zoneSettingsOverride.d.ts +0 -28
- package/zoneSettingsOverride.js +0 -28
- package/zoneSettingsOverride.js.map +1 -1
package/accessApplication.d.ts
CHANGED
|
@@ -12,32 +12,6 @@ import * as outputs from "./types/output";
|
|
|
12
12
|
* scope. For example, an access token that is scoped to the "example.com"
|
|
13
13
|
* zone needs to use the `zoneId` argument.
|
|
14
14
|
*
|
|
15
|
-
* ## Example Usage
|
|
16
|
-
*
|
|
17
|
-
* ```typescript
|
|
18
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
19
|
-
* import * as cloudflare from "@pulumi/cloudflare";
|
|
20
|
-
*
|
|
21
|
-
* // With CORS configuration
|
|
22
|
-
* const stagingApp = new cloudflare.AccessApplication("stagingApp", {
|
|
23
|
-
* corsHeaders: [{
|
|
24
|
-
* allowCredentials: true,
|
|
25
|
-
* allowedMethods: [
|
|
26
|
-
* "GET",
|
|
27
|
-
* "POST",
|
|
28
|
-
* "OPTIONS",
|
|
29
|
-
* ],
|
|
30
|
-
* allowedOrigins: ["https://example.com"],
|
|
31
|
-
* maxAge: 10,
|
|
32
|
-
* }],
|
|
33
|
-
* domain: "staging.example.com",
|
|
34
|
-
* name: "staging application",
|
|
35
|
-
* sessionDuration: "24h",
|
|
36
|
-
* type: "self_hosted",
|
|
37
|
-
* zoneId: "0da42c8d2132a9ddaf714f9e7c920711",
|
|
38
|
-
* });
|
|
39
|
-
* ```
|
|
40
|
-
*
|
|
41
15
|
* ## Import
|
|
42
16
|
*
|
|
43
17
|
* ```sh
|
package/accessApplication.js
CHANGED
|
@@ -16,32 +16,6 @@ const utilities = require("./utilities");
|
|
|
16
16
|
* scope. For example, an access token that is scoped to the "example.com"
|
|
17
17
|
* zone needs to use the `zoneId` argument.
|
|
18
18
|
*
|
|
19
|
-
* ## Example Usage
|
|
20
|
-
*
|
|
21
|
-
* ```typescript
|
|
22
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
23
|
-
* import * as cloudflare from "@pulumi/cloudflare";
|
|
24
|
-
*
|
|
25
|
-
* // With CORS configuration
|
|
26
|
-
* const stagingApp = new cloudflare.AccessApplication("stagingApp", {
|
|
27
|
-
* corsHeaders: [{
|
|
28
|
-
* allowCredentials: true,
|
|
29
|
-
* allowedMethods: [
|
|
30
|
-
* "GET",
|
|
31
|
-
* "POST",
|
|
32
|
-
* "OPTIONS",
|
|
33
|
-
* ],
|
|
34
|
-
* allowedOrigins: ["https://example.com"],
|
|
35
|
-
* maxAge: 10,
|
|
36
|
-
* }],
|
|
37
|
-
* domain: "staging.example.com",
|
|
38
|
-
* name: "staging application",
|
|
39
|
-
* sessionDuration: "24h",
|
|
40
|
-
* type: "self_hosted",
|
|
41
|
-
* zoneId: "0da42c8d2132a9ddaf714f9e7c920711",
|
|
42
|
-
* });
|
|
43
|
-
* ```
|
|
44
|
-
*
|
|
45
19
|
* ## Import
|
|
46
20
|
*
|
|
47
21
|
* ```sh
|
package/accessApplication.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"accessApplication.js","sourceRoot":"","sources":["../accessApplication.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"accessApplication.js","sourceRoot":"","sources":["../accessApplication.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;GAgBG;AACH,MAAa,iBAAkB,SAAQ,MAAM,CAAC,cAAc;IACxD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA8B,EAAE,IAAmC;QAC5H,OAAO,IAAI,iBAAiB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACxE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,iBAAiB,CAAC,YAAY,CAAC;IAClE,CAAC;IA2GD,YAAY,IAAY,EAAE,WAA4D,EAAE,IAAmC;QACvH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAiD,CAAC;YAChE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,0BAA0B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,yBAAyB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,yBAAyB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAAgD,CAAC;YAC9D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,0BAA0B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,yBAAyB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,yBAAyB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,KAAK,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAC7C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,iBAAiB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACtE,CAAC;;AAlML,8CAmMC;AArLG,gBAAgB;AACO,8BAAY,GAAG,sDAAsD,CAAC"}
|
package/accessCaCertificate.d.ts
CHANGED
|
@@ -10,24 +10,6 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
10
10
|
* scope. For example, an access token that is scoped to the "example.com"
|
|
11
11
|
* zone needs to use the `zoneId` argument.
|
|
12
12
|
*
|
|
13
|
-
* ## Example Usage
|
|
14
|
-
*
|
|
15
|
-
* ```typescript
|
|
16
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
17
|
-
* import * as cloudflare from "@pulumi/cloudflare";
|
|
18
|
-
*
|
|
19
|
-
* // account level
|
|
20
|
-
* const example = new cloudflare.AccessCaCertificate("example", {
|
|
21
|
-
* accountId: "f037e56e89293a057740de681ac9abbe",
|
|
22
|
-
* applicationId: "6cd6cea3-3ef2-4542-9aea-85a0bbcd5414",
|
|
23
|
-
* });
|
|
24
|
-
* // zone level
|
|
25
|
-
* const anotherExample = new cloudflare.AccessCaCertificate("anotherExample", {
|
|
26
|
-
* applicationId: "fe2be0ff-7f13-4350-8c8e-a9b9795fe3c2",
|
|
27
|
-
* zoneId: "0da42c8d2132a9ddaf714f9e7c920711",
|
|
28
|
-
* });
|
|
29
|
-
* ```
|
|
30
|
-
*
|
|
31
13
|
* ## Import
|
|
32
14
|
*
|
|
33
15
|
* Account level CA certificate import.
|
package/accessCaCertificate.js
CHANGED
|
@@ -16,24 +16,6 @@ const utilities = require("./utilities");
|
|
|
16
16
|
* scope. For example, an access token that is scoped to the "example.com"
|
|
17
17
|
* zone needs to use the `zoneId` argument.
|
|
18
18
|
*
|
|
19
|
-
* ## Example Usage
|
|
20
|
-
*
|
|
21
|
-
* ```typescript
|
|
22
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
23
|
-
* import * as cloudflare from "@pulumi/cloudflare";
|
|
24
|
-
*
|
|
25
|
-
* // account level
|
|
26
|
-
* const example = new cloudflare.AccessCaCertificate("example", {
|
|
27
|
-
* accountId: "f037e56e89293a057740de681ac9abbe",
|
|
28
|
-
* applicationId: "6cd6cea3-3ef2-4542-9aea-85a0bbcd5414",
|
|
29
|
-
* });
|
|
30
|
-
* // zone level
|
|
31
|
-
* const anotherExample = new cloudflare.AccessCaCertificate("anotherExample", {
|
|
32
|
-
* applicationId: "fe2be0ff-7f13-4350-8c8e-a9b9795fe3c2",
|
|
33
|
-
* zoneId: "0da42c8d2132a9ddaf714f9e7c920711",
|
|
34
|
-
* });
|
|
35
|
-
* ```
|
|
36
|
-
*
|
|
37
19
|
* ## Import
|
|
38
20
|
*
|
|
39
21
|
* Account level CA certificate import.
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"accessCaCertificate.js","sourceRoot":"","sources":["../accessCaCertificate.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"accessCaCertificate.js","sourceRoot":"","sources":["../accessCaCertificate.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;GAwBG;AACH,MAAa,mBAAoB,SAAQ,MAAM,CAAC,cAAc;IAC1D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAgC,EAAE,IAAmC;QAC9H,OAAO,IAAI,mBAAmB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC1E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,mBAAmB,CAAC,YAAY,CAAC;IACpE,CAAC;IA+BD,YAAY,IAAY,EAAE,WAAgE,EAAE,IAAmC;QAC3H,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAmD,CAAC;YAClE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAAkD,CAAC;YAChE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,aAAa,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1D,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;aAChE;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,KAAK,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC1C,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACnD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,mBAAmB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACxE,CAAC;;AAhFL,kDAiFC;AAnEG,gBAAgB;AACO,gCAAY,GAAG,0DAA0D,CAAC"}
|
package/accessCustomPage.d.ts
CHANGED
|
@@ -2,20 +2,6 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
2
2
|
/**
|
|
3
3
|
* Provides a resource to customize the pages your end users will see
|
|
4
4
|
* when trying to reach applications behind Cloudflare Access.
|
|
5
|
-
*
|
|
6
|
-
* ## Example Usage
|
|
7
|
-
*
|
|
8
|
-
* ```typescript
|
|
9
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
10
|
-
* import * as cloudflare from "@pulumi/cloudflare";
|
|
11
|
-
*
|
|
12
|
-
* const example = new cloudflare.AccessCustomPage("example", {
|
|
13
|
-
* customHtml: "<html><body><h1>Forbidden</h1></body></html>",
|
|
14
|
-
* name: "example",
|
|
15
|
-
* type: "forbidden",
|
|
16
|
-
* zoneId: "0da42c8d2132a9ddaf714f9e7c920711",
|
|
17
|
-
* });
|
|
18
|
-
* ```
|
|
19
5
|
*/
|
|
20
6
|
export declare class AccessCustomPage extends pulumi.CustomResource {
|
|
21
7
|
/**
|
package/accessCustomPage.js
CHANGED
|
@@ -8,20 +8,6 @@ const utilities = require("./utilities");
|
|
|
8
8
|
/**
|
|
9
9
|
* Provides a resource to customize the pages your end users will see
|
|
10
10
|
* when trying to reach applications behind Cloudflare Access.
|
|
11
|
-
*
|
|
12
|
-
* ## Example Usage
|
|
13
|
-
*
|
|
14
|
-
* ```typescript
|
|
15
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
16
|
-
* import * as cloudflare from "@pulumi/cloudflare";
|
|
17
|
-
*
|
|
18
|
-
* const example = new cloudflare.AccessCustomPage("example", {
|
|
19
|
-
* customHtml: "<html><body><h1>Forbidden</h1></body></html>",
|
|
20
|
-
* name: "example",
|
|
21
|
-
* type: "forbidden",
|
|
22
|
-
* zoneId: "0da42c8d2132a9ddaf714f9e7c920711",
|
|
23
|
-
* });
|
|
24
|
-
* ```
|
|
25
11
|
*/
|
|
26
12
|
class AccessCustomPage extends pulumi.CustomResource {
|
|
27
13
|
/**
|
package/accessCustomPage.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"accessCustomPage.js","sourceRoot":"","sources":["../accessCustomPage.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"accessCustomPage.js","sourceRoot":"","sources":["../accessCustomPage.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;GAGG;AACH,MAAa,gBAAiB,SAAQ,MAAM,CAAC,cAAc;IACvD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA6B,EAAE,IAAmC;QAC3H,OAAO,IAAI,gBAAgB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACvE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,gBAAgB,CAAC,YAAY,CAAC;IACjE,CAAC;IAmCD,YAAY,IAAY,EAAE,WAA0D,EAAE,IAAmC;QACrH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAgD,CAAC;YAC/D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAA+C,CAAC;YAC7D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,gBAAgB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACrE,CAAC;;AAzFL,4CA0FC;AA5EG,gBAAgB;AACO,6BAAY,GAAG,oDAAoD,CAAC"}
|
package/accessGroup.d.ts
CHANGED
|
@@ -12,45 +12,6 @@ import * as outputs from "./types/output";
|
|
|
12
12
|
* scope. For example, an access token that is scoped to the "example.com"
|
|
13
13
|
* zone needs to use the `zoneId` argument.
|
|
14
14
|
*
|
|
15
|
-
* ## Example Usage
|
|
16
|
-
*
|
|
17
|
-
* ```typescript
|
|
18
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
19
|
-
* import * as cloudflare from "@pulumi/cloudflare";
|
|
20
|
-
*
|
|
21
|
-
* // Allowing access to `test@example.com` email address only
|
|
22
|
-
* const exampleAccessGroup = new cloudflare.AccessGroup("exampleAccessGroup", {
|
|
23
|
-
* accountId: "f037e56e89293a057740de681ac9abbe",
|
|
24
|
-
* name: "staging group",
|
|
25
|
-
* includes: [{
|
|
26
|
-
* emails: ["test@example.com"],
|
|
27
|
-
* }],
|
|
28
|
-
* });
|
|
29
|
-
* // Allowing `test@example.com` to access but only when coming from a
|
|
30
|
-
* // specific IP.
|
|
31
|
-
* const exampleIndex_accessGroupAccessGroup = new cloudflare.AccessGroup("exampleIndex/accessGroupAccessGroup", {
|
|
32
|
-
* accountId: "f037e56e89293a057740de681ac9abbe",
|
|
33
|
-
* name: "staging group",
|
|
34
|
-
* includes: [{
|
|
35
|
-
* emails: ["test@example.com"],
|
|
36
|
-
* }],
|
|
37
|
-
* requires: [{
|
|
38
|
-
* ips: [_var.office_ip],
|
|
39
|
-
* }],
|
|
40
|
-
* });
|
|
41
|
-
* // Allow members of an Azure Group. The ID is the group UUID (id) in Azure.
|
|
42
|
-
* const exampleCloudflareIndex_accessGroupAccessGroup = new cloudflare.AccessGroup("exampleCloudflareIndex/accessGroupAccessGroup", {
|
|
43
|
-
* accountId: "f037e56e89293a057740de681ac9abbe",
|
|
44
|
-
* name: "test_group",
|
|
45
|
-
* includes: [{
|
|
46
|
-
* azures: [{
|
|
47
|
-
* identityProviderId: "ca298b82-93b5-41bf-bc2d-10493f09b761",
|
|
48
|
-
* ids: ["86773093-5feb-48dd-814b-7ccd3676ff50"],
|
|
49
|
-
* }],
|
|
50
|
-
* }],
|
|
51
|
-
* });
|
|
52
|
-
* ```
|
|
53
|
-
*
|
|
54
15
|
* ## Import
|
|
55
16
|
*
|
|
56
17
|
* ```sh
|
package/accessGroup.js
CHANGED
|
@@ -16,45 +16,6 @@ const utilities = require("./utilities");
|
|
|
16
16
|
* scope. For example, an access token that is scoped to the "example.com"
|
|
17
17
|
* zone needs to use the `zoneId` argument.
|
|
18
18
|
*
|
|
19
|
-
* ## Example Usage
|
|
20
|
-
*
|
|
21
|
-
* ```typescript
|
|
22
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
23
|
-
* import * as cloudflare from "@pulumi/cloudflare";
|
|
24
|
-
*
|
|
25
|
-
* // Allowing access to `test@example.com` email address only
|
|
26
|
-
* const exampleAccessGroup = new cloudflare.AccessGroup("exampleAccessGroup", {
|
|
27
|
-
* accountId: "f037e56e89293a057740de681ac9abbe",
|
|
28
|
-
* name: "staging group",
|
|
29
|
-
* includes: [{
|
|
30
|
-
* emails: ["test@example.com"],
|
|
31
|
-
* }],
|
|
32
|
-
* });
|
|
33
|
-
* // Allowing `test@example.com` to access but only when coming from a
|
|
34
|
-
* // specific IP.
|
|
35
|
-
* const exampleIndex_accessGroupAccessGroup = new cloudflare.AccessGroup("exampleIndex/accessGroupAccessGroup", {
|
|
36
|
-
* accountId: "f037e56e89293a057740de681ac9abbe",
|
|
37
|
-
* name: "staging group",
|
|
38
|
-
* includes: [{
|
|
39
|
-
* emails: ["test@example.com"],
|
|
40
|
-
* }],
|
|
41
|
-
* requires: [{
|
|
42
|
-
* ips: [_var.office_ip],
|
|
43
|
-
* }],
|
|
44
|
-
* });
|
|
45
|
-
* // Allow members of an Azure Group. The ID is the group UUID (id) in Azure.
|
|
46
|
-
* const exampleCloudflareIndex_accessGroupAccessGroup = new cloudflare.AccessGroup("exampleCloudflareIndex/accessGroupAccessGroup", {
|
|
47
|
-
* accountId: "f037e56e89293a057740de681ac9abbe",
|
|
48
|
-
* name: "test_group",
|
|
49
|
-
* includes: [{
|
|
50
|
-
* azures: [{
|
|
51
|
-
* identityProviderId: "ca298b82-93b5-41bf-bc2d-10493f09b761",
|
|
52
|
-
* ids: ["86773093-5feb-48dd-814b-7ccd3676ff50"],
|
|
53
|
-
* }],
|
|
54
|
-
* }],
|
|
55
|
-
* });
|
|
56
|
-
* ```
|
|
57
|
-
*
|
|
58
19
|
* ## Import
|
|
59
20
|
*
|
|
60
21
|
* ```sh
|
package/accessGroup.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"accessGroup.js","sourceRoot":"","sources":["../accessGroup.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"accessGroup.js","sourceRoot":"","sources":["../accessGroup.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;GAgBG;AACH,MAAa,WAAY,SAAQ,MAAM,CAAC,cAAc;IAClD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwB,EAAE,IAAmC;QACtH,OAAO,IAAI,WAAW,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAClE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,WAAW,CAAC,YAAY,CAAC;IAC5D,CAAC;IAuBD,YAAY,IAAY,EAAE,WAAgD,EAAE,IAAmC;QAC3G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA2C,CAAC;YAC1D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAA0C,CAAC;YACxD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,WAAW,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAChE,CAAC;;AA7EL,kCA8EC;AAhEG,gBAAgB;AACO,wBAAY,GAAG,0CAA0C,CAAC"}
|
|
@@ -12,60 +12,6 @@ import * as outputs from "./types/output";
|
|
|
12
12
|
* scope. For example, an access token that is scoped to the "example.com"
|
|
13
13
|
* zone needs to use the `zoneId` argument.
|
|
14
14
|
*
|
|
15
|
-
* ## Example Usage
|
|
16
|
-
*
|
|
17
|
-
* ```typescript
|
|
18
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
19
|
-
* import * as cloudflare from "@pulumi/cloudflare";
|
|
20
|
-
*
|
|
21
|
-
* // one time pin
|
|
22
|
-
* const pinLogin = new cloudflare.AccessIdentityProvider("pinLogin", {
|
|
23
|
-
* accountId: "f037e56e89293a057740de681ac9abbe",
|
|
24
|
-
* name: "PIN login",
|
|
25
|
-
* type: "onetimepin",
|
|
26
|
-
* });
|
|
27
|
-
* // oauth
|
|
28
|
-
* const githubOauth = new cloudflare.AccessIdentityProvider("githubOauth", {
|
|
29
|
-
* accountId: "f037e56e89293a057740de681ac9abbe",
|
|
30
|
-
* configs: [{
|
|
31
|
-
* clientId: "example",
|
|
32
|
-
* clientSecret: "secret_key",
|
|
33
|
-
* }],
|
|
34
|
-
* name: "GitHub OAuth",
|
|
35
|
-
* type: "github",
|
|
36
|
-
* });
|
|
37
|
-
* // saml
|
|
38
|
-
* const jumpcloudSaml = new cloudflare.AccessIdentityProvider("jumpcloudSaml", {
|
|
39
|
-
* accountId: "f037e56e89293a057740de681ac9abbe",
|
|
40
|
-
* configs: [{
|
|
41
|
-
* attributes: [
|
|
42
|
-
* "email",
|
|
43
|
-
* "username",
|
|
44
|
-
* ],
|
|
45
|
-
* idpPublicCert: `MIIDpDCCAoygAwIBAgIGAV2ka+55MA0GCSqGSIb3DQEBCwUAMIGSMQswCQ...GF/Q2/MHadws97cZg
|
|
46
|
-
* uTnQyuOqPuHbnN83d/2l1NSYKCbHt24o
|
|
47
|
-
* `,
|
|
48
|
-
* issuerUrl: "jumpcloud",
|
|
49
|
-
* signRequest: false,
|
|
50
|
-
* ssoTargetUrl: "https://sso.myexample.jumpcloud.com/saml2/cloudflareaccess",
|
|
51
|
-
* }],
|
|
52
|
-
* name: "JumpCloud SAML",
|
|
53
|
-
* type: "saml",
|
|
54
|
-
* });
|
|
55
|
-
* // okta
|
|
56
|
-
* const okta = new cloudflare.AccessIdentityProvider("okta", {
|
|
57
|
-
* accountId: "f037e56e89293a057740de681ac9abbe",
|
|
58
|
-
* configs: [{
|
|
59
|
-
* apiToken: "okta_api_token",
|
|
60
|
-
* clientId: "example",
|
|
61
|
-
* clientSecret: "secret_key",
|
|
62
|
-
* oktaAccount: "https://example.com",
|
|
63
|
-
* }],
|
|
64
|
-
* name: "Okta",
|
|
65
|
-
* type: "okta",
|
|
66
|
-
* });
|
|
67
|
-
* ```
|
|
68
|
-
*
|
|
69
15
|
* ## Import
|
|
70
16
|
*
|
|
71
17
|
* ```sh
|
|
@@ -16,60 +16,6 @@ const utilities = require("./utilities");
|
|
|
16
16
|
* scope. For example, an access token that is scoped to the "example.com"
|
|
17
17
|
* zone needs to use the `zoneId` argument.
|
|
18
18
|
*
|
|
19
|
-
* ## Example Usage
|
|
20
|
-
*
|
|
21
|
-
* ```typescript
|
|
22
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
23
|
-
* import * as cloudflare from "@pulumi/cloudflare";
|
|
24
|
-
*
|
|
25
|
-
* // one time pin
|
|
26
|
-
* const pinLogin = new cloudflare.AccessIdentityProvider("pinLogin", {
|
|
27
|
-
* accountId: "f037e56e89293a057740de681ac9abbe",
|
|
28
|
-
* name: "PIN login",
|
|
29
|
-
* type: "onetimepin",
|
|
30
|
-
* });
|
|
31
|
-
* // oauth
|
|
32
|
-
* const githubOauth = new cloudflare.AccessIdentityProvider("githubOauth", {
|
|
33
|
-
* accountId: "f037e56e89293a057740de681ac9abbe",
|
|
34
|
-
* configs: [{
|
|
35
|
-
* clientId: "example",
|
|
36
|
-
* clientSecret: "secret_key",
|
|
37
|
-
* }],
|
|
38
|
-
* name: "GitHub OAuth",
|
|
39
|
-
* type: "github",
|
|
40
|
-
* });
|
|
41
|
-
* // saml
|
|
42
|
-
* const jumpcloudSaml = new cloudflare.AccessIdentityProvider("jumpcloudSaml", {
|
|
43
|
-
* accountId: "f037e56e89293a057740de681ac9abbe",
|
|
44
|
-
* configs: [{
|
|
45
|
-
* attributes: [
|
|
46
|
-
* "email",
|
|
47
|
-
* "username",
|
|
48
|
-
* ],
|
|
49
|
-
* idpPublicCert: `MIIDpDCCAoygAwIBAgIGAV2ka+55MA0GCSqGSIb3DQEBCwUAMIGSMQswCQ...GF/Q2/MHadws97cZg
|
|
50
|
-
* uTnQyuOqPuHbnN83d/2l1NSYKCbHt24o
|
|
51
|
-
* `,
|
|
52
|
-
* issuerUrl: "jumpcloud",
|
|
53
|
-
* signRequest: false,
|
|
54
|
-
* ssoTargetUrl: "https://sso.myexample.jumpcloud.com/saml2/cloudflareaccess",
|
|
55
|
-
* }],
|
|
56
|
-
* name: "JumpCloud SAML",
|
|
57
|
-
* type: "saml",
|
|
58
|
-
* });
|
|
59
|
-
* // okta
|
|
60
|
-
* const okta = new cloudflare.AccessIdentityProvider("okta", {
|
|
61
|
-
* accountId: "f037e56e89293a057740de681ac9abbe",
|
|
62
|
-
* configs: [{
|
|
63
|
-
* apiToken: "okta_api_token",
|
|
64
|
-
* clientId: "example",
|
|
65
|
-
* clientSecret: "secret_key",
|
|
66
|
-
* oktaAccount: "https://example.com",
|
|
67
|
-
* }],
|
|
68
|
-
* name: "Okta",
|
|
69
|
-
* type: "okta",
|
|
70
|
-
* });
|
|
71
|
-
* ```
|
|
72
|
-
*
|
|
73
19
|
* ## Import
|
|
74
20
|
*
|
|
75
21
|
* ```sh
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"accessIdentityProvider.js","sourceRoot":"","sources":["../accessIdentityProvider.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"accessIdentityProvider.js","sourceRoot":"","sources":["../accessIdentityProvider.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;GAgBG;AACH,MAAa,sBAAuB,SAAQ,MAAM,CAAC,cAAc;IAC7D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAmC,EAAE,IAAmC;QACjI,OAAO,IAAI,sBAAsB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC7E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,sBAAsB,CAAC,YAAY,CAAC;IACvE,CAAC;IAmCD,YAAY,IAAY,EAAE,WAAsE,EAAE,IAAmC;QACjI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAsD,CAAC;YACrE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAAqD,CAAC;YACnE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,sBAAsB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC3E,CAAC;;AAzFL,wDA0FC;AA5EG,gBAAgB;AACO,mCAAY,GAAG,gEAAgE,CAAC"}
|
|
@@ -12,20 +12,6 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
12
12
|
* scope. For example, an access token that is scoped to the "example.com"
|
|
13
13
|
* zone needs to use the `zoneId` argument.
|
|
14
14
|
*
|
|
15
|
-
* ## Example Usage
|
|
16
|
-
*
|
|
17
|
-
* ```typescript
|
|
18
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
19
|
-
* import * as cloudflare from "@pulumi/cloudflare";
|
|
20
|
-
*
|
|
21
|
-
* const myCert = new cloudflare.AccessMutualTlsCertificate("myCert", {
|
|
22
|
-
* zoneId: "0da42c8d2132a9ddaf714f9e7c920711",
|
|
23
|
-
* name: "My Root Cert",
|
|
24
|
-
* certificate: _var.ca_pem,
|
|
25
|
-
* associatedHostnames: ["staging.example.com"],
|
|
26
|
-
* });
|
|
27
|
-
* ```
|
|
28
|
-
*
|
|
29
15
|
* ## Import
|
|
30
16
|
*
|
|
31
17
|
* Account level import.
|
|
@@ -18,20 +18,6 @@ const utilities = require("./utilities");
|
|
|
18
18
|
* scope. For example, an access token that is scoped to the "example.com"
|
|
19
19
|
* zone needs to use the `zoneId` argument.
|
|
20
20
|
*
|
|
21
|
-
* ## Example Usage
|
|
22
|
-
*
|
|
23
|
-
* ```typescript
|
|
24
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
25
|
-
* import * as cloudflare from "@pulumi/cloudflare";
|
|
26
|
-
*
|
|
27
|
-
* const myCert = new cloudflare.AccessMutualTlsCertificate("myCert", {
|
|
28
|
-
* zoneId: "0da42c8d2132a9ddaf714f9e7c920711",
|
|
29
|
-
* name: "My Root Cert",
|
|
30
|
-
* certificate: _var.ca_pem,
|
|
31
|
-
* associatedHostnames: ["staging.example.com"],
|
|
32
|
-
* });
|
|
33
|
-
* ```
|
|
34
|
-
*
|
|
35
21
|
* ## Import
|
|
36
22
|
*
|
|
37
23
|
* Account level import.
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"accessMutualTlsCertificate.js","sourceRoot":"","sources":["../accessMutualTlsCertificate.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"accessMutualTlsCertificate.js","sourceRoot":"","sources":["../accessMutualTlsCertificate.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;GA0BG;AACH,MAAa,0BAA2B,SAAQ,MAAM,CAAC,cAAc;IACjE;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAuC,EAAE,IAAmC;QACrI,OAAO,IAAI,0BAA0B,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACjF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,0BAA0B,CAAC,YAAY,CAAC;IAC3E,CAAC;IAgCD,YAAY,IAAY,EAAE,WAA8E,EAAE,IAAmC;QACzI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA0D,CAAC;YACzE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAAyD,CAAC;YACvE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,aAAa,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACrD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,0BAA0B,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC/E,CAAC;;AAnFL,gEAoFC;AAtEG,gBAAgB;AACO,uCAAY,GAAG,wEAAwE,CAAC"}
|
package/accessOrganization.d.ts
CHANGED
|
@@ -4,29 +4,6 @@ import * as outputs from "./types/output";
|
|
|
4
4
|
/**
|
|
5
5
|
* A Zero Trust organization defines the user login experience.
|
|
6
6
|
*
|
|
7
|
-
* ## Example Usage
|
|
8
|
-
*
|
|
9
|
-
* ```typescript
|
|
10
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
11
|
-
* import * as cloudflare from "@pulumi/cloudflare";
|
|
12
|
-
*
|
|
13
|
-
* const example = new cloudflare.AccessOrganization("example", {
|
|
14
|
-
* accountId: "f037e56e89293a057740de681ac9abbe",
|
|
15
|
-
* authDomain: "example.cloudflareaccess.com",
|
|
16
|
-
* autoRedirectToIdentity: false,
|
|
17
|
-
* isUiReadOnly: false,
|
|
18
|
-
* loginDesigns: [{
|
|
19
|
-
* backgroundColor: "#ffffff",
|
|
20
|
-
* footerText: "My footer text",
|
|
21
|
-
* headerText: "My header text",
|
|
22
|
-
* logoPath: "https://example.com/logo.png",
|
|
23
|
-
* textColor: "#000000",
|
|
24
|
-
* }],
|
|
25
|
-
* name: "example.cloudflareaccess.com",
|
|
26
|
-
* userSeatExpirationInactiveTime: "720h",
|
|
27
|
-
* });
|
|
28
|
-
* ```
|
|
29
|
-
*
|
|
30
7
|
* ## Import
|
|
31
8
|
*
|
|
32
9
|
* ```sh
|
package/accessOrganization.js
CHANGED
|
@@ -8,29 +8,6 @@ const utilities = require("./utilities");
|
|
|
8
8
|
/**
|
|
9
9
|
* A Zero Trust organization defines the user login experience.
|
|
10
10
|
*
|
|
11
|
-
* ## Example Usage
|
|
12
|
-
*
|
|
13
|
-
* ```typescript
|
|
14
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
15
|
-
* import * as cloudflare from "@pulumi/cloudflare";
|
|
16
|
-
*
|
|
17
|
-
* const example = new cloudflare.AccessOrganization("example", {
|
|
18
|
-
* accountId: "f037e56e89293a057740de681ac9abbe",
|
|
19
|
-
* authDomain: "example.cloudflareaccess.com",
|
|
20
|
-
* autoRedirectToIdentity: false,
|
|
21
|
-
* isUiReadOnly: false,
|
|
22
|
-
* loginDesigns: [{
|
|
23
|
-
* backgroundColor: "#ffffff",
|
|
24
|
-
* footerText: "My footer text",
|
|
25
|
-
* headerText: "My header text",
|
|
26
|
-
* logoPath: "https://example.com/logo.png",
|
|
27
|
-
* textColor: "#000000",
|
|
28
|
-
* }],
|
|
29
|
-
* name: "example.cloudflareaccess.com",
|
|
30
|
-
* userSeatExpirationInactiveTime: "720h",
|
|
31
|
-
* });
|
|
32
|
-
* ```
|
|
33
|
-
*
|
|
34
11
|
* ## Import
|
|
35
12
|
*
|
|
36
13
|
* ```sh
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"accessOrganization.js","sourceRoot":"","sources":["../accessOrganization.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"accessOrganization.js","sourceRoot":"","sources":["../accessOrganization.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;GAQG;AACH,MAAa,kBAAmB,SAAQ,MAAM,CAAC,cAAc;IACzD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA+B,EAAE,IAAmC;QAC7H,OAAO,IAAI,kBAAkB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACzE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,kBAAkB,CAAC,YAAY,CAAC;IACnE,CAAC;IAoDD,YAAY,IAAY,EAAE,WAA8D,EAAE,IAAmC;QACzH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAkD,CAAC;YACjE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,gCAAgC,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,8BAA8B,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5G,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAAiD,CAAC;YAC/D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,UAAU,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACvD,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,gCAAgC,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,8BAA8B,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1G,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,kBAAkB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACvE,CAAC;;AAjHL,gDAkHC;AApGG,gBAAgB;AACO,+BAAY,GAAG,wDAAwD,CAAC"}
|
package/accessPolicy.d.ts
CHANGED
|
@@ -12,43 +12,6 @@ import * as outputs from "./types/output";
|
|
|
12
12
|
* scope. For example, an access token that is scoped to the "example.com"
|
|
13
13
|
* zone needs to use the `zoneId` argument.
|
|
14
14
|
*
|
|
15
|
-
* ## Example Usage
|
|
16
|
-
*
|
|
17
|
-
* ```typescript
|
|
18
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
19
|
-
* import * as cloudflare from "@pulumi/cloudflare";
|
|
20
|
-
*
|
|
21
|
-
* // Allowing access to `test@example.com` email address only
|
|
22
|
-
* const testPolicyAccessPolicy = new cloudflare.AccessPolicy("testPolicyAccessPolicy", {
|
|
23
|
-
* applicationId: "cb029e245cfdd66dc8d2e570d5dd3322",
|
|
24
|
-
* zoneId: "0da42c8d2132a9ddaf714f9e7c920711",
|
|
25
|
-
* name: "staging policy",
|
|
26
|
-
* precedence: 1,
|
|
27
|
-
* decision: "allow",
|
|
28
|
-
* includes: [{
|
|
29
|
-
* emails: ["test@example.com"],
|
|
30
|
-
* }],
|
|
31
|
-
* requires: [{
|
|
32
|
-
* emails: ["test@example.com"],
|
|
33
|
-
* }],
|
|
34
|
-
* });
|
|
35
|
-
* // Allowing `test@example.com` to access but only when coming from a
|
|
36
|
-
* // specific IP.
|
|
37
|
-
* const testPolicyIndex_accessPolicyAccessPolicy = new cloudflare.AccessPolicy("testPolicyIndex/accessPolicyAccessPolicy", {
|
|
38
|
-
* applicationId: "cb029e245cfdd66dc8d2e570d5dd3322",
|
|
39
|
-
* zoneId: "0da42c8d2132a9ddaf714f9e7c920711",
|
|
40
|
-
* name: "staging policy",
|
|
41
|
-
* precedence: 1,
|
|
42
|
-
* decision: "allow",
|
|
43
|
-
* includes: [{
|
|
44
|
-
* emails: ["test@example.com"],
|
|
45
|
-
* }],
|
|
46
|
-
* requires: [{
|
|
47
|
-
* ips: [_var.office_ip],
|
|
48
|
-
* }],
|
|
49
|
-
* });
|
|
50
|
-
* ```
|
|
51
|
-
*
|
|
52
15
|
* ## Import
|
|
53
16
|
*
|
|
54
17
|
* Account level import.
|