@pulumi/cloudngfwaws 0.0.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +177 -0
- package/README.md +54 -0
- package/account.d.ts +148 -0
- package/account.js +73 -0
- package/account.js.map +1 -0
- package/accountOnboarding.d.ts +68 -0
- package/accountOnboarding.js +62 -0
- package/accountOnboarding.js.map +1 -0
- package/accountOnboardingStack.d.ts +233 -0
- package/accountOnboardingStack.js +103 -0
- package/accountOnboardingStack.js.map +1 -0
- package/certificate.d.ts +168 -0
- package/certificate.js +106 -0
- package/certificate.js.map +1 -0
- package/commitRulestack.d.ts +123 -0
- package/commitRulestack.js +83 -0
- package/commitRulestack.js.map +1 -0
- package/config/index.d.ts +1 -0
- package/config/index.js +21 -0
- package/config/index.js.map +1 -0
- package/config/vars.d.ts +96 -0
- package/config/vars.js +127 -0
- package/config/vars.js.map +1 -0
- package/customUrlCategory.d.ts +172 -0
- package/customUrlCategory.js +113 -0
- package/customUrlCategory.js.map +1 -0
- package/fqdnList.d.ts +159 -0
- package/fqdnList.js +110 -0
- package/fqdnList.js.map +1 -0
- package/getAccount.d.ts +138 -0
- package/getAccount.js +54 -0
- package/getAccount.js.map +1 -0
- package/getAccounts.d.ts +76 -0
- package/getAccounts.js +44 -0
- package/getAccounts.js.map +1 -0
- package/getAppIdVersion.d.ts +102 -0
- package/getAppIdVersion.js +62 -0
- package/getAppIdVersion.js.map +1 -0
- package/getAppIdVersions.d.ts +86 -0
- package/getAppIdVersions.js +58 -0
- package/getAppIdVersions.js.map +1 -0
- package/getCertificate.d.ts +148 -0
- package/getCertificate.js +86 -0
- package/getCertificate.js.map +1 -0
- package/getCountry.d.ts +88 -0
- package/getCountry.js +58 -0
- package/getCountry.js.map +1 -0
- package/getCustomUrlCategory.d.ts +148 -0
- package/getCustomUrlCategory.js +86 -0
- package/getCustomUrlCategory.js.map +1 -0
- package/getFqdnList.d.ts +144 -0
- package/getFqdnList.js +86 -0
- package/getFqdnList.js.map +1 -0
- package/getIntelligentFeed.d.ts +160 -0
- package/getIntelligentFeed.js +86 -0
- package/getIntelligentFeed.js.map +1 -0
- package/getNgfw.d.ts +146 -0
- package/getNgfw.js +60 -0
- package/getNgfw.js.map +1 -0
- package/getNgfwLogProfile.d.ts +101 -0
- package/getNgfwLogProfile.js +62 -0
- package/getNgfwLogProfile.js.map +1 -0
- package/getNgfws.d.ts +83 -0
- package/getNgfws.js +58 -0
- package/getNgfws.js.map +1 -0
- package/getPredefinedUrlCategories.d.ts +88 -0
- package/getPredefinedUrlCategories.js +60 -0
- package/getPredefinedUrlCategories.js.map +1 -0
- package/getPredefinedUrlCategoryOverride.d.ts +128 -0
- package/getPredefinedUrlCategoryOverride.js +84 -0
- package/getPredefinedUrlCategoryOverride.js.map +1 -0
- package/getPrefixList.d.ts +144 -0
- package/getPrefixList.js +86 -0
- package/getPrefixList.js.map +1 -0
- package/getRulestack.d.ts +128 -0
- package/getRulestack.js +64 -0
- package/getRulestack.js.map +1 -0
- package/getSecurityRule.d.ts +169 -0
- package/getSecurityRule.js +46 -0
- package/getSecurityRule.js.map +1 -0
- package/getValidateRulestack.d.ts +82 -0
- package/getValidateRulestack.js +40 -0
- package/getValidateRulestack.js.map +1 -0
- package/index.d.ts +102 -0
- package/index.js +158 -0
- package/index.js.map +1 -0
- package/intelligentFeed.d.ts +207 -0
- package/intelligentFeed.js +118 -0
- package/intelligentFeed.js.map +1 -0
- package/ngfw.d.ts +295 -0
- package/ngfw.js +153 -0
- package/ngfw.js.map +1 -0
- package/ngfwLogProfile.d.ts +191 -0
- package/ngfwLogProfile.js +149 -0
- package/ngfwLogProfile.js.map +1 -0
- package/package.json +32 -0
- package/predefinedUrlCategoryOverride.d.ts +130 -0
- package/predefinedUrlCategoryOverride.js +98 -0
- package/predefinedUrlCategoryOverride.js.map +1 -0
- package/prefixList.d.ts +159 -0
- package/prefixList.js +110 -0
- package/prefixList.js.map +1 -0
- package/provider.d.ts +192 -0
- package/provider.js +64 -0
- package/provider.js.map +1 -0
- package/rulestack.d.ts +184 -0
- package/rulestack.js +103 -0
- package/rulestack.js.map +1 -0
- package/securityRule.d.ts +344 -0
- package/securityRule.js +162 -0
- package/securityRule.js.map +1 -0
- package/types/index.d.ts +3 -0
- package/types/index.js +11 -0
- package/types/index.js.map +1 -0
- package/types/input.d.ts +174 -0
- package/types/input.js +5 -0
- package/types/input.js.map +1 -0
- package/types/output.d.ts +313 -0
- package/types/output.js +5 -0
- package/types/output.js.map +1 -0
- package/utilities.d.ts +8 -0
- package/utilities.js +101 -0
- package/utilities.js.map +1 -0
package/rulestack.js.map
ADDED
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"rulestack.js","sourceRoot":"","sources":["../rulestack.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAgCG;AACH,MAAa,SAAU,SAAQ,MAAM,CAAC,cAAc;IAChD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAsB,EAAE,IAAmC;QACpH,OAAO,IAAI,SAAS,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAChE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,SAAS,CAAC,YAAY,CAAC;IAC1D,CAAC;IAgDD,YAAY,IAAY,EAAE,WAA4C,EAAE,IAAmC;QACvG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAyC,CAAC;YACxD,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3D;aAAM;YACH,MAAM,IAAI,GAAG,WAAwC,CAAC;YACtD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,aAAa,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1D,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;aAChE;YACD,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,OAAO,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAC/C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,SAAS,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC9D,CAAC;;AA3GL,8BA4GC;AA9FG,gBAAgB;AACO,sBAAY,GAAG,wCAAwC,CAAC"}
|
|
@@ -0,0 +1,344 @@
|
|
|
1
|
+
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
import * as inputs from "./types/input";
|
|
3
|
+
import * as outputs from "./types/output";
|
|
4
|
+
/**
|
|
5
|
+
* Resource for security rule manipulation.
|
|
6
|
+
*
|
|
7
|
+
* ## Admin Permission Type
|
|
8
|
+
*
|
|
9
|
+
* * `Rulestack` (for `scope="Local"`)
|
|
10
|
+
* * `Global Rulestack` (for `scope="Global"`)
|
|
11
|
+
*
|
|
12
|
+
* ## Example Usage
|
|
13
|
+
*
|
|
14
|
+
* ```typescript
|
|
15
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
16
|
+
* import * as cloudngfwaws from "@pulumi/cloudngfwaws";
|
|
17
|
+
*
|
|
18
|
+
* const r = new cloudngfwaws.Rulestack("r", {
|
|
19
|
+
* name: "terraform-rulestack",
|
|
20
|
+
* scope: "Local",
|
|
21
|
+
* accountId: "123456789",
|
|
22
|
+
* description: "Made by Pulumi",
|
|
23
|
+
* profileConfig: {
|
|
24
|
+
* antiSpyware: "BestPractice",
|
|
25
|
+
* },
|
|
26
|
+
* });
|
|
27
|
+
* const example = new cloudngfwaws.SecurityRule("example", {
|
|
28
|
+
* rulestack: r.name,
|
|
29
|
+
* ruleList: "LocalRule",
|
|
30
|
+
* priority: 3,
|
|
31
|
+
* name: "tf-security-rule",
|
|
32
|
+
* description: "Also configured by Terraform",
|
|
33
|
+
* source: {
|
|
34
|
+
* cidrs: ["any"],
|
|
35
|
+
* },
|
|
36
|
+
* destination: {
|
|
37
|
+
* cidrs: ["192.168.0.0/16"],
|
|
38
|
+
* },
|
|
39
|
+
* negateDestination: true,
|
|
40
|
+
* applications: ["any"],
|
|
41
|
+
* category: {},
|
|
42
|
+
* action: "Allow",
|
|
43
|
+
* logging: true,
|
|
44
|
+
* auditComment: "initial config",
|
|
45
|
+
* });
|
|
46
|
+
* ```
|
|
47
|
+
*
|
|
48
|
+
* ## Import
|
|
49
|
+
*
|
|
50
|
+
* import name is <scope>:<rulestack>:<rule_list>:<priority>
|
|
51
|
+
*
|
|
52
|
+
* ```sh
|
|
53
|
+
* $ pulumi import cloudngfwaws:index/securityRule:SecurityRule example Local:terraform-rulestack:LocalRule:3
|
|
54
|
+
* ```
|
|
55
|
+
*/
|
|
56
|
+
export declare class SecurityRule extends pulumi.CustomResource {
|
|
57
|
+
/**
|
|
58
|
+
* Get an existing SecurityRule resource's state with the given name, ID, and optional extra
|
|
59
|
+
* properties used to qualify the lookup.
|
|
60
|
+
*
|
|
61
|
+
* @param name The _unique_ name of the resulting resource.
|
|
62
|
+
* @param id The _unique_ provider ID of the resource to lookup.
|
|
63
|
+
* @param state Any extra arguments used during the lookup.
|
|
64
|
+
* @param opts Optional settings to control the behavior of the CustomResource.
|
|
65
|
+
*/
|
|
66
|
+
static get(name: string, id: pulumi.Input<pulumi.ID>, state?: SecurityRuleState, opts?: pulumi.CustomResourceOptions): SecurityRule;
|
|
67
|
+
/**
|
|
68
|
+
* Returns true if the given object is an instance of SecurityRule. This is designed to work even
|
|
69
|
+
* when multiple copies of the Pulumi SDK have been loaded into the same process.
|
|
70
|
+
*/
|
|
71
|
+
static isInstance(obj: any): obj is SecurityRule;
|
|
72
|
+
/**
|
|
73
|
+
* The action to take. Valid values are `Allow`, `DenySilent`, `DenyResetServer`, or `DenyResetBoth`.
|
|
74
|
+
*/
|
|
75
|
+
readonly action: pulumi.Output<string>;
|
|
76
|
+
/**
|
|
77
|
+
* The list of applications.
|
|
78
|
+
*/
|
|
79
|
+
readonly applications: pulumi.Output<string[]>;
|
|
80
|
+
/**
|
|
81
|
+
* The audit comment.
|
|
82
|
+
*/
|
|
83
|
+
readonly auditComment: pulumi.Output<string | undefined>;
|
|
84
|
+
/**
|
|
85
|
+
* The category spec.
|
|
86
|
+
*/
|
|
87
|
+
readonly category: pulumi.Output<outputs.SecurityRuleCategory>;
|
|
88
|
+
/**
|
|
89
|
+
* Decryption rule type. Valid values are ``or`SSLOutboundInspection`.
|
|
90
|
+
*/
|
|
91
|
+
readonly decryptionRuleType: pulumi.Output<string | undefined>;
|
|
92
|
+
/**
|
|
93
|
+
* The description.
|
|
94
|
+
*/
|
|
95
|
+
readonly description: pulumi.Output<string | undefined>;
|
|
96
|
+
/**
|
|
97
|
+
* The destination spec.
|
|
98
|
+
*/
|
|
99
|
+
readonly destination: pulumi.Output<outputs.SecurityRuleDestination>;
|
|
100
|
+
/**
|
|
101
|
+
* Set to false to disable this rule. Defaults to `true`.
|
|
102
|
+
*/
|
|
103
|
+
readonly enabled: pulumi.Output<boolean | undefined>;
|
|
104
|
+
/**
|
|
105
|
+
* Enable logging at end. Defaults to `true`.
|
|
106
|
+
*/
|
|
107
|
+
readonly logging: pulumi.Output<boolean | undefined>;
|
|
108
|
+
/**
|
|
109
|
+
* The name.
|
|
110
|
+
*/
|
|
111
|
+
readonly name: pulumi.Output<string>;
|
|
112
|
+
/**
|
|
113
|
+
* Negate the destination definition.
|
|
114
|
+
*/
|
|
115
|
+
readonly negateDestination: pulumi.Output<boolean | undefined>;
|
|
116
|
+
/**
|
|
117
|
+
* Negate the source definition.
|
|
118
|
+
*/
|
|
119
|
+
readonly negateSource: pulumi.Output<boolean | undefined>;
|
|
120
|
+
/**
|
|
121
|
+
* The rule priority.
|
|
122
|
+
*/
|
|
123
|
+
readonly priority: pulumi.Output<number>;
|
|
124
|
+
/**
|
|
125
|
+
* Protocol port list.
|
|
126
|
+
*/
|
|
127
|
+
readonly protPortLists: pulumi.Output<string[] | undefined>;
|
|
128
|
+
/**
|
|
129
|
+
* The protocol.
|
|
130
|
+
*/
|
|
131
|
+
readonly protocol: pulumi.Output<string | undefined>;
|
|
132
|
+
/**
|
|
133
|
+
* The rulebase. Valid values are `PreRule`, `PostRule`, or `LocalRule`. Defaults to `PreRule`.
|
|
134
|
+
*/
|
|
135
|
+
readonly ruleList: pulumi.Output<string | undefined>;
|
|
136
|
+
/**
|
|
137
|
+
* The rulestack.
|
|
138
|
+
*/
|
|
139
|
+
readonly rulestack: pulumi.Output<string>;
|
|
140
|
+
/**
|
|
141
|
+
* The rulestack's scope. A local rulestack will require that you've retrieved a LRA JWT. A global rulestack will require that you've retrieved a GRA JWT. Valid values are `Local` or `Global`. Defaults to `Local`.
|
|
142
|
+
*/
|
|
143
|
+
readonly scope: pulumi.Output<string | undefined>;
|
|
144
|
+
/**
|
|
145
|
+
* The source spec.
|
|
146
|
+
*/
|
|
147
|
+
readonly source: pulumi.Output<outputs.SecurityRuleSource>;
|
|
148
|
+
/**
|
|
149
|
+
* The tags.
|
|
150
|
+
*/
|
|
151
|
+
readonly tags: pulumi.Output<{
|
|
152
|
+
[key: string]: string;
|
|
153
|
+
} | undefined>;
|
|
154
|
+
/**
|
|
155
|
+
* The update token.
|
|
156
|
+
*/
|
|
157
|
+
readonly updateToken: pulumi.Output<string>;
|
|
158
|
+
/**
|
|
159
|
+
* Create a SecurityRule resource with the given unique name, arguments, and options.
|
|
160
|
+
*
|
|
161
|
+
* @param name The _unique_ name of the resource.
|
|
162
|
+
* @param args The arguments to use to populate this resource's properties.
|
|
163
|
+
* @param opts A bag of options that control this resource's behavior.
|
|
164
|
+
*/
|
|
165
|
+
constructor(name: string, args: SecurityRuleArgs, opts?: pulumi.CustomResourceOptions);
|
|
166
|
+
}
|
|
167
|
+
/**
|
|
168
|
+
* Input properties used for looking up and filtering SecurityRule resources.
|
|
169
|
+
*/
|
|
170
|
+
export interface SecurityRuleState {
|
|
171
|
+
/**
|
|
172
|
+
* The action to take. Valid values are `Allow`, `DenySilent`, `DenyResetServer`, or `DenyResetBoth`.
|
|
173
|
+
*/
|
|
174
|
+
action?: pulumi.Input<string>;
|
|
175
|
+
/**
|
|
176
|
+
* The list of applications.
|
|
177
|
+
*/
|
|
178
|
+
applications?: pulumi.Input<pulumi.Input<string>[]>;
|
|
179
|
+
/**
|
|
180
|
+
* The audit comment.
|
|
181
|
+
*/
|
|
182
|
+
auditComment?: pulumi.Input<string>;
|
|
183
|
+
/**
|
|
184
|
+
* The category spec.
|
|
185
|
+
*/
|
|
186
|
+
category?: pulumi.Input<inputs.SecurityRuleCategory>;
|
|
187
|
+
/**
|
|
188
|
+
* Decryption rule type. Valid values are ``or`SSLOutboundInspection`.
|
|
189
|
+
*/
|
|
190
|
+
decryptionRuleType?: pulumi.Input<string>;
|
|
191
|
+
/**
|
|
192
|
+
* The description.
|
|
193
|
+
*/
|
|
194
|
+
description?: pulumi.Input<string>;
|
|
195
|
+
/**
|
|
196
|
+
* The destination spec.
|
|
197
|
+
*/
|
|
198
|
+
destination?: pulumi.Input<inputs.SecurityRuleDestination>;
|
|
199
|
+
/**
|
|
200
|
+
* Set to false to disable this rule. Defaults to `true`.
|
|
201
|
+
*/
|
|
202
|
+
enabled?: pulumi.Input<boolean>;
|
|
203
|
+
/**
|
|
204
|
+
* Enable logging at end. Defaults to `true`.
|
|
205
|
+
*/
|
|
206
|
+
logging?: pulumi.Input<boolean>;
|
|
207
|
+
/**
|
|
208
|
+
* The name.
|
|
209
|
+
*/
|
|
210
|
+
name?: pulumi.Input<string>;
|
|
211
|
+
/**
|
|
212
|
+
* Negate the destination definition.
|
|
213
|
+
*/
|
|
214
|
+
negateDestination?: pulumi.Input<boolean>;
|
|
215
|
+
/**
|
|
216
|
+
* Negate the source definition.
|
|
217
|
+
*/
|
|
218
|
+
negateSource?: pulumi.Input<boolean>;
|
|
219
|
+
/**
|
|
220
|
+
* The rule priority.
|
|
221
|
+
*/
|
|
222
|
+
priority?: pulumi.Input<number>;
|
|
223
|
+
/**
|
|
224
|
+
* Protocol port list.
|
|
225
|
+
*/
|
|
226
|
+
protPortLists?: pulumi.Input<pulumi.Input<string>[]>;
|
|
227
|
+
/**
|
|
228
|
+
* The protocol.
|
|
229
|
+
*/
|
|
230
|
+
protocol?: pulumi.Input<string>;
|
|
231
|
+
/**
|
|
232
|
+
* The rulebase. Valid values are `PreRule`, `PostRule`, or `LocalRule`. Defaults to `PreRule`.
|
|
233
|
+
*/
|
|
234
|
+
ruleList?: pulumi.Input<string>;
|
|
235
|
+
/**
|
|
236
|
+
* The rulestack.
|
|
237
|
+
*/
|
|
238
|
+
rulestack?: pulumi.Input<string>;
|
|
239
|
+
/**
|
|
240
|
+
* The rulestack's scope. A local rulestack will require that you've retrieved a LRA JWT. A global rulestack will require that you've retrieved a GRA JWT. Valid values are `Local` or `Global`. Defaults to `Local`.
|
|
241
|
+
*/
|
|
242
|
+
scope?: pulumi.Input<string>;
|
|
243
|
+
/**
|
|
244
|
+
* The source spec.
|
|
245
|
+
*/
|
|
246
|
+
source?: pulumi.Input<inputs.SecurityRuleSource>;
|
|
247
|
+
/**
|
|
248
|
+
* The tags.
|
|
249
|
+
*/
|
|
250
|
+
tags?: pulumi.Input<{
|
|
251
|
+
[key: string]: pulumi.Input<string>;
|
|
252
|
+
}>;
|
|
253
|
+
/**
|
|
254
|
+
* The update token.
|
|
255
|
+
*/
|
|
256
|
+
updateToken?: pulumi.Input<string>;
|
|
257
|
+
}
|
|
258
|
+
/**
|
|
259
|
+
* The set of arguments for constructing a SecurityRule resource.
|
|
260
|
+
*/
|
|
261
|
+
export interface SecurityRuleArgs {
|
|
262
|
+
/**
|
|
263
|
+
* The action to take. Valid values are `Allow`, `DenySilent`, `DenyResetServer`, or `DenyResetBoth`.
|
|
264
|
+
*/
|
|
265
|
+
action: pulumi.Input<string>;
|
|
266
|
+
/**
|
|
267
|
+
* The list of applications.
|
|
268
|
+
*/
|
|
269
|
+
applications: pulumi.Input<pulumi.Input<string>[]>;
|
|
270
|
+
/**
|
|
271
|
+
* The audit comment.
|
|
272
|
+
*/
|
|
273
|
+
auditComment?: pulumi.Input<string>;
|
|
274
|
+
/**
|
|
275
|
+
* The category spec.
|
|
276
|
+
*/
|
|
277
|
+
category: pulumi.Input<inputs.SecurityRuleCategory>;
|
|
278
|
+
/**
|
|
279
|
+
* Decryption rule type. Valid values are ``or`SSLOutboundInspection`.
|
|
280
|
+
*/
|
|
281
|
+
decryptionRuleType?: pulumi.Input<string>;
|
|
282
|
+
/**
|
|
283
|
+
* The description.
|
|
284
|
+
*/
|
|
285
|
+
description?: pulumi.Input<string>;
|
|
286
|
+
/**
|
|
287
|
+
* The destination spec.
|
|
288
|
+
*/
|
|
289
|
+
destination: pulumi.Input<inputs.SecurityRuleDestination>;
|
|
290
|
+
/**
|
|
291
|
+
* Set to false to disable this rule. Defaults to `true`.
|
|
292
|
+
*/
|
|
293
|
+
enabled?: pulumi.Input<boolean>;
|
|
294
|
+
/**
|
|
295
|
+
* Enable logging at end. Defaults to `true`.
|
|
296
|
+
*/
|
|
297
|
+
logging?: pulumi.Input<boolean>;
|
|
298
|
+
/**
|
|
299
|
+
* The name.
|
|
300
|
+
*/
|
|
301
|
+
name?: pulumi.Input<string>;
|
|
302
|
+
/**
|
|
303
|
+
* Negate the destination definition.
|
|
304
|
+
*/
|
|
305
|
+
negateDestination?: pulumi.Input<boolean>;
|
|
306
|
+
/**
|
|
307
|
+
* Negate the source definition.
|
|
308
|
+
*/
|
|
309
|
+
negateSource?: pulumi.Input<boolean>;
|
|
310
|
+
/**
|
|
311
|
+
* The rule priority.
|
|
312
|
+
*/
|
|
313
|
+
priority: pulumi.Input<number>;
|
|
314
|
+
/**
|
|
315
|
+
* Protocol port list.
|
|
316
|
+
*/
|
|
317
|
+
protPortLists?: pulumi.Input<pulumi.Input<string>[]>;
|
|
318
|
+
/**
|
|
319
|
+
* The protocol.
|
|
320
|
+
*/
|
|
321
|
+
protocol?: pulumi.Input<string>;
|
|
322
|
+
/**
|
|
323
|
+
* The rulebase. Valid values are `PreRule`, `PostRule`, or `LocalRule`. Defaults to `PreRule`.
|
|
324
|
+
*/
|
|
325
|
+
ruleList?: pulumi.Input<string>;
|
|
326
|
+
/**
|
|
327
|
+
* The rulestack.
|
|
328
|
+
*/
|
|
329
|
+
rulestack: pulumi.Input<string>;
|
|
330
|
+
/**
|
|
331
|
+
* The rulestack's scope. A local rulestack will require that you've retrieved a LRA JWT. A global rulestack will require that you've retrieved a GRA JWT. Valid values are `Local` or `Global`. Defaults to `Local`.
|
|
332
|
+
*/
|
|
333
|
+
scope?: pulumi.Input<string>;
|
|
334
|
+
/**
|
|
335
|
+
* The source spec.
|
|
336
|
+
*/
|
|
337
|
+
source: pulumi.Input<inputs.SecurityRuleSource>;
|
|
338
|
+
/**
|
|
339
|
+
* The tags.
|
|
340
|
+
*/
|
|
341
|
+
tags?: pulumi.Input<{
|
|
342
|
+
[key: string]: pulumi.Input<string>;
|
|
343
|
+
}>;
|
|
344
|
+
}
|
package/securityRule.js
ADDED
|
@@ -0,0 +1,162 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
|
+
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.SecurityRule = void 0;
|
|
6
|
+
const pulumi = require("@pulumi/pulumi");
|
|
7
|
+
const utilities = require("./utilities");
|
|
8
|
+
/**
|
|
9
|
+
* Resource for security rule manipulation.
|
|
10
|
+
*
|
|
11
|
+
* ## Admin Permission Type
|
|
12
|
+
*
|
|
13
|
+
* * `Rulestack` (for `scope="Local"`)
|
|
14
|
+
* * `Global Rulestack` (for `scope="Global"`)
|
|
15
|
+
*
|
|
16
|
+
* ## Example Usage
|
|
17
|
+
*
|
|
18
|
+
* ```typescript
|
|
19
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
20
|
+
* import * as cloudngfwaws from "@pulumi/cloudngfwaws";
|
|
21
|
+
*
|
|
22
|
+
* const r = new cloudngfwaws.Rulestack("r", {
|
|
23
|
+
* name: "terraform-rulestack",
|
|
24
|
+
* scope: "Local",
|
|
25
|
+
* accountId: "123456789",
|
|
26
|
+
* description: "Made by Pulumi",
|
|
27
|
+
* profileConfig: {
|
|
28
|
+
* antiSpyware: "BestPractice",
|
|
29
|
+
* },
|
|
30
|
+
* });
|
|
31
|
+
* const example = new cloudngfwaws.SecurityRule("example", {
|
|
32
|
+
* rulestack: r.name,
|
|
33
|
+
* ruleList: "LocalRule",
|
|
34
|
+
* priority: 3,
|
|
35
|
+
* name: "tf-security-rule",
|
|
36
|
+
* description: "Also configured by Terraform",
|
|
37
|
+
* source: {
|
|
38
|
+
* cidrs: ["any"],
|
|
39
|
+
* },
|
|
40
|
+
* destination: {
|
|
41
|
+
* cidrs: ["192.168.0.0/16"],
|
|
42
|
+
* },
|
|
43
|
+
* negateDestination: true,
|
|
44
|
+
* applications: ["any"],
|
|
45
|
+
* category: {},
|
|
46
|
+
* action: "Allow",
|
|
47
|
+
* logging: true,
|
|
48
|
+
* auditComment: "initial config",
|
|
49
|
+
* });
|
|
50
|
+
* ```
|
|
51
|
+
*
|
|
52
|
+
* ## Import
|
|
53
|
+
*
|
|
54
|
+
* import name is <scope>:<rulestack>:<rule_list>:<priority>
|
|
55
|
+
*
|
|
56
|
+
* ```sh
|
|
57
|
+
* $ pulumi import cloudngfwaws:index/securityRule:SecurityRule example Local:terraform-rulestack:LocalRule:3
|
|
58
|
+
* ```
|
|
59
|
+
*/
|
|
60
|
+
class SecurityRule extends pulumi.CustomResource {
|
|
61
|
+
/**
|
|
62
|
+
* Get an existing SecurityRule resource's state with the given name, ID, and optional extra
|
|
63
|
+
* properties used to qualify the lookup.
|
|
64
|
+
*
|
|
65
|
+
* @param name The _unique_ name of the resulting resource.
|
|
66
|
+
* @param id The _unique_ provider ID of the resource to lookup.
|
|
67
|
+
* @param state Any extra arguments used during the lookup.
|
|
68
|
+
* @param opts Optional settings to control the behavior of the CustomResource.
|
|
69
|
+
*/
|
|
70
|
+
static get(name, id, state, opts) {
|
|
71
|
+
return new SecurityRule(name, state, Object.assign(Object.assign({}, opts), { id: id }));
|
|
72
|
+
}
|
|
73
|
+
/**
|
|
74
|
+
* Returns true if the given object is an instance of SecurityRule. This is designed to work even
|
|
75
|
+
* when multiple copies of the Pulumi SDK have been loaded into the same process.
|
|
76
|
+
*/
|
|
77
|
+
static isInstance(obj) {
|
|
78
|
+
if (obj === undefined || obj === null) {
|
|
79
|
+
return false;
|
|
80
|
+
}
|
|
81
|
+
return obj['__pulumiType'] === SecurityRule.__pulumiType;
|
|
82
|
+
}
|
|
83
|
+
constructor(name, argsOrState, opts) {
|
|
84
|
+
let resourceInputs = {};
|
|
85
|
+
opts = opts || {};
|
|
86
|
+
if (opts.id) {
|
|
87
|
+
const state = argsOrState;
|
|
88
|
+
resourceInputs["action"] = state ? state.action : undefined;
|
|
89
|
+
resourceInputs["applications"] = state ? state.applications : undefined;
|
|
90
|
+
resourceInputs["auditComment"] = state ? state.auditComment : undefined;
|
|
91
|
+
resourceInputs["category"] = state ? state.category : undefined;
|
|
92
|
+
resourceInputs["decryptionRuleType"] = state ? state.decryptionRuleType : undefined;
|
|
93
|
+
resourceInputs["description"] = state ? state.description : undefined;
|
|
94
|
+
resourceInputs["destination"] = state ? state.destination : undefined;
|
|
95
|
+
resourceInputs["enabled"] = state ? state.enabled : undefined;
|
|
96
|
+
resourceInputs["logging"] = state ? state.logging : undefined;
|
|
97
|
+
resourceInputs["name"] = state ? state.name : undefined;
|
|
98
|
+
resourceInputs["negateDestination"] = state ? state.negateDestination : undefined;
|
|
99
|
+
resourceInputs["negateSource"] = state ? state.negateSource : undefined;
|
|
100
|
+
resourceInputs["priority"] = state ? state.priority : undefined;
|
|
101
|
+
resourceInputs["protPortLists"] = state ? state.protPortLists : undefined;
|
|
102
|
+
resourceInputs["protocol"] = state ? state.protocol : undefined;
|
|
103
|
+
resourceInputs["ruleList"] = state ? state.ruleList : undefined;
|
|
104
|
+
resourceInputs["rulestack"] = state ? state.rulestack : undefined;
|
|
105
|
+
resourceInputs["scope"] = state ? state.scope : undefined;
|
|
106
|
+
resourceInputs["source"] = state ? state.source : undefined;
|
|
107
|
+
resourceInputs["tags"] = state ? state.tags : undefined;
|
|
108
|
+
resourceInputs["updateToken"] = state ? state.updateToken : undefined;
|
|
109
|
+
}
|
|
110
|
+
else {
|
|
111
|
+
const args = argsOrState;
|
|
112
|
+
if ((!args || args.action === undefined) && !opts.urn) {
|
|
113
|
+
throw new Error("Missing required property 'action'");
|
|
114
|
+
}
|
|
115
|
+
if ((!args || args.applications === undefined) && !opts.urn) {
|
|
116
|
+
throw new Error("Missing required property 'applications'");
|
|
117
|
+
}
|
|
118
|
+
if ((!args || args.category === undefined) && !opts.urn) {
|
|
119
|
+
throw new Error("Missing required property 'category'");
|
|
120
|
+
}
|
|
121
|
+
if ((!args || args.destination === undefined) && !opts.urn) {
|
|
122
|
+
throw new Error("Missing required property 'destination'");
|
|
123
|
+
}
|
|
124
|
+
if ((!args || args.priority === undefined) && !opts.urn) {
|
|
125
|
+
throw new Error("Missing required property 'priority'");
|
|
126
|
+
}
|
|
127
|
+
if ((!args || args.rulestack === undefined) && !opts.urn) {
|
|
128
|
+
throw new Error("Missing required property 'rulestack'");
|
|
129
|
+
}
|
|
130
|
+
if ((!args || args.source === undefined) && !opts.urn) {
|
|
131
|
+
throw new Error("Missing required property 'source'");
|
|
132
|
+
}
|
|
133
|
+
resourceInputs["action"] = args ? args.action : undefined;
|
|
134
|
+
resourceInputs["applications"] = args ? args.applications : undefined;
|
|
135
|
+
resourceInputs["auditComment"] = args ? args.auditComment : undefined;
|
|
136
|
+
resourceInputs["category"] = args ? args.category : undefined;
|
|
137
|
+
resourceInputs["decryptionRuleType"] = args ? args.decryptionRuleType : undefined;
|
|
138
|
+
resourceInputs["description"] = args ? args.description : undefined;
|
|
139
|
+
resourceInputs["destination"] = args ? args.destination : undefined;
|
|
140
|
+
resourceInputs["enabled"] = args ? args.enabled : undefined;
|
|
141
|
+
resourceInputs["logging"] = args ? args.logging : undefined;
|
|
142
|
+
resourceInputs["name"] = args ? args.name : undefined;
|
|
143
|
+
resourceInputs["negateDestination"] = args ? args.negateDestination : undefined;
|
|
144
|
+
resourceInputs["negateSource"] = args ? args.negateSource : undefined;
|
|
145
|
+
resourceInputs["priority"] = args ? args.priority : undefined;
|
|
146
|
+
resourceInputs["protPortLists"] = args ? args.protPortLists : undefined;
|
|
147
|
+
resourceInputs["protocol"] = args ? args.protocol : undefined;
|
|
148
|
+
resourceInputs["ruleList"] = args ? args.ruleList : undefined;
|
|
149
|
+
resourceInputs["rulestack"] = args ? args.rulestack : undefined;
|
|
150
|
+
resourceInputs["scope"] = args ? args.scope : undefined;
|
|
151
|
+
resourceInputs["source"] = args ? args.source : undefined;
|
|
152
|
+
resourceInputs["tags"] = args ? args.tags : undefined;
|
|
153
|
+
resourceInputs["updateToken"] = undefined /*out*/;
|
|
154
|
+
}
|
|
155
|
+
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
156
|
+
super(SecurityRule.__pulumiType, name, resourceInputs, opts);
|
|
157
|
+
}
|
|
158
|
+
}
|
|
159
|
+
exports.SecurityRule = SecurityRule;
|
|
160
|
+
/** @internal */
|
|
161
|
+
SecurityRule.__pulumiType = 'cloudngfwaws:index/securityRule:SecurityRule';
|
|
162
|
+
//# sourceMappingURL=securityRule.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"securityRule.js","sourceRoot":"","sources":["../securityRule.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAmDG;AACH,MAAa,YAAa,SAAQ,MAAM,CAAC,cAAc;IACnD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAyB,EAAE,IAAmC;QACvH,OAAO,IAAI,YAAY,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACnE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,YAAY,CAAC,YAAY,CAAC;IAC7D,CAAC;IA+FD,YAAY,IAAY,EAAE,WAAkD,EAAE,IAAmC;QAC7G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA4C,CAAC;YAC3D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;SACzE;aAAM;YACH,MAAM,IAAI,GAAG,WAA2C,CAAC;YACzD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,YAAY,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACzD,MAAM,IAAI,KAAK,CAAC,0CAA0C,CAAC,CAAC;aAC/D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,WAAW,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACxD,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,SAAS,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACtD,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,aAAa,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACrD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,YAAY,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACjE,CAAC;;AAlML,oCAmMC;AArLG,gBAAgB;AACO,yBAAY,GAAG,8CAA8C,CAAC"}
|
package/types/index.d.ts
ADDED
package/types/index.js
ADDED
|
@@ -0,0 +1,11 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
|
+
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.output = exports.input = void 0;
|
|
6
|
+
// Export sub-modules:
|
|
7
|
+
const input = require("./input");
|
|
8
|
+
exports.input = input;
|
|
9
|
+
const output = require("./output");
|
|
10
|
+
exports.output = output;
|
|
11
|
+
//# sourceMappingURL=index.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../types/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAIjF,sBAAsB;AACtB,iCAAiC;AAI7B,sBAAK;AAHT,mCAAmC;AAI/B,wBAAM"}
|