@pulumi/ise 0.1.0-alpha.1715108131 → 0.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (418) hide show
  1. package/{allowedprotocols/tacacs.d.ts → deviceadmin/allowedProtocolsTacacs.d.ts} +13 -13
  2. package/{allowedprotocols/tacacs.js → deviceadmin/allowedProtocolsTacacs.js} +12 -12
  3. package/deviceadmin/allowedProtocolsTacacs.js.map +1 -0
  4. package/{deviceadminauthentication/rule.d.ts → deviceadmin/authenticationRule.d.ts} +16 -16
  5. package/{deviceadminauthentication/rule.js → deviceadmin/authenticationRule.js} +12 -12
  6. package/deviceadmin/authenticationRule.js.map +1 -0
  7. package/{deviceadminauthorizationexception/rule.d.ts → deviceadmin/authorizationExceptionRule.d.ts} +16 -16
  8. package/{deviceadminauthorizationexception/rule.js → deviceadmin/authorizationExceptionRule.js} +12 -12
  9. package/deviceadmin/authorizationExceptionRule.js.map +1 -0
  10. package/{deviceadminauthorizationglobalexception/rule.d.ts → deviceadmin/authorizationGlobalExceptionRule.d.ts} +16 -16
  11. package/{deviceadminauthorizationglobalexception/rule.js → deviceadmin/authorizationGlobalExceptionRule.js} +12 -12
  12. package/deviceadmin/authorizationGlobalExceptionRule.js.map +1 -0
  13. package/{deviceadminauthorization/rule.d.ts → deviceadmin/authorizationRule.d.ts} +16 -16
  14. package/{deviceadminauthorization/rule.js → deviceadmin/authorizationRule.js} +12 -12
  15. package/deviceadmin/authorizationRule.js.map +1 -0
  16. package/deviceadmin/condition.d.ts +4 -4
  17. package/deviceadmin/condition.js +2 -2
  18. package/{allowedprotocols/getTacacs.d.ts → deviceadmin/getAllowedProtocolsTacacs.d.ts} +10 -10
  19. package/{allowedprotocols/getTacacs.js → deviceadmin/getAllowedProtocolsTacacs.js} +10 -10
  20. package/deviceadmin/getAllowedProtocolsTacacs.js.map +1 -0
  21. package/{deviceadminauthentication/getRule.d.ts → deviceadmin/getAuthenticationRule.d.ts} +11 -11
  22. package/{deviceadminauthentication/getRule.js → deviceadmin/getAuthenticationRule.js} +10 -10
  23. package/deviceadmin/getAuthenticationRule.js.map +1 -0
  24. package/{deviceadminauthorizationexception/getRule.d.ts → deviceadmin/getAuthorizationExceptionRule.d.ts} +11 -11
  25. package/{deviceadminauthorizationexception/getRule.js → deviceadmin/getAuthorizationExceptionRule.js} +10 -10
  26. package/deviceadmin/getAuthorizationExceptionRule.js.map +1 -0
  27. package/{deviceadminauthorizationglobalexception/getRule.d.ts → deviceadmin/getAuthorizationGlobalExceptionRule.d.ts} +11 -11
  28. package/{deviceadminauthorizationglobalexception/getRule.js → deviceadmin/getAuthorizationGlobalExceptionRule.js} +10 -10
  29. package/deviceadmin/getAuthorizationGlobalExceptionRule.js.map +1 -0
  30. package/{deviceadminauthorization/getRule.d.ts → deviceadmin/getAuthorizationRule.d.ts} +11 -11
  31. package/{deviceadminauthorization/getRule.js → deviceadmin/getAuthorizationRule.js} +10 -10
  32. package/deviceadmin/getAuthorizationRule.js.map +1 -0
  33. package/deviceadmin/getCondition.d.ts +3 -3
  34. package/deviceadmin/getCondition.js +3 -3
  35. package/{deviceadminpolicy/getSet.d.ts → deviceadmin/getPolicySet.d.ts} +11 -11
  36. package/{deviceadminpolicy/getSet.js → deviceadmin/getPolicySet.js} +10 -10
  37. package/deviceadmin/getPolicySet.js.map +1 -0
  38. package/{tacacscommand/getSet.d.ts → deviceadmin/getTacacsCommandSet.d.ts} +11 -11
  39. package/{tacacscommand/getSet.js → deviceadmin/getTacacsCommandSet.js} +10 -10
  40. package/deviceadmin/getTacacsCommandSet.js.map +1 -0
  41. package/{tacacs/getProfile.d.ts → deviceadmin/getTacacsProfile.d.ts} +11 -11
  42. package/{tacacs/getProfile.js → deviceadmin/getTacacsProfile.js} +10 -10
  43. package/deviceadmin/getTacacsProfile.js.map +1 -0
  44. package/{deviceadmintimeanddate/getCondition.d.ts → deviceadmin/getTimeAndDateCondition.d.ts} +10 -10
  45. package/{deviceadmintimeanddate/getCondition.js → deviceadmin/getTimeAndDateCondition.js} +10 -10
  46. package/deviceadmin/getTimeAndDateCondition.js.map +1 -0
  47. package/deviceadmin/index.d.ts +54 -0
  48. package/deviceadmin/index.js +75 -3
  49. package/deviceadmin/index.js.map +1 -1
  50. package/{deviceadminpolicy/set.d.ts → deviceadmin/policySet.d.ts} +16 -16
  51. package/{deviceadminpolicy/set.js → deviceadmin/policySet.js} +12 -12
  52. package/deviceadmin/policySet.js.map +1 -0
  53. package/{tacacscommand/set.d.ts → deviceadmin/tacacsCommandSet.d.ts} +16 -16
  54. package/{tacacscommand/set.js → deviceadmin/tacacsCommandSet.js} +12 -12
  55. package/deviceadmin/tacacsCommandSet.js.map +1 -0
  56. package/{tacacs/profile.d.ts → deviceadmin/tacacsProfile.d.ts} +16 -16
  57. package/{tacacs/profile.js → deviceadmin/tacacsProfile.js} +12 -12
  58. package/deviceadmin/tacacsProfile.js.map +1 -0
  59. package/{deviceadmintimeanddate/condition.d.ts → deviceadmin/timeAndDateCondition.d.ts} +13 -13
  60. package/{deviceadmintimeanddate/condition.js → deviceadmin/timeAndDateCondition.js} +12 -12
  61. package/deviceadmin/timeAndDateCondition.js.map +1 -0
  62. package/{activedirectoryadd/groups.d.ts → identitymanagement/activeDirectoryAddGroups.d.ts} +15 -15
  63. package/{activedirectoryadd/groups.js → identitymanagement/activeDirectoryAddGroups.js} +11 -11
  64. package/identitymanagement/activeDirectoryAddGroups.js.map +1 -0
  65. package/{activedirectoryjoindomainwithall/nodes.d.ts → identitymanagement/activeDirectoryJoinDomainWithAllNodes.d.ts} +15 -15
  66. package/{activedirectoryjoindomainwithall/nodes.js → identitymanagement/activeDirectoryJoinDomainWithAllNodes.js} +11 -11
  67. package/identitymanagement/activeDirectoryJoinDomainWithAllNodes.js.map +1 -0
  68. package/{activedirectoryjoin/point.d.ts → identitymanagement/activeDirectoryJoinPoint.d.ts} +21 -21
  69. package/{activedirectoryjoin/point.js → identitymanagement/activeDirectoryJoinPoint.js} +11 -11
  70. package/identitymanagement/activeDirectoryJoinPoint.js.map +1 -0
  71. package/{certificateauthentication/profile.d.ts → identitymanagement/certificateAuthenticationProfile.d.ts} +13 -13
  72. package/{certificateauthentication/profile.js → identitymanagement/certificateAuthenticationProfile.js} +12 -12
  73. package/identitymanagement/certificateAuthenticationProfile.js.map +1 -0
  74. package/{endpoint.d.ts → identitymanagement/endpoint.d.ts} +2 -2
  75. package/{endpoint.js → identitymanagement/endpoint.js} +4 -4
  76. package/identitymanagement/endpoint.js.map +1 -0
  77. package/{endpointidentity/group.d.ts → identitymanagement/endpointIdentityGroup.d.ts} +13 -13
  78. package/{endpointidentity/group.js → identitymanagement/endpointIdentityGroup.js} +12 -12
  79. package/identitymanagement/endpointIdentityGroup.js.map +1 -0
  80. package/{activedirectorygroupsby/getDomain.d.ts → identitymanagement/getActiveDirectoryGroupsByDomain.d.ts} +11 -11
  81. package/{activedirectorygroupsby/getDomain.js → identitymanagement/getActiveDirectoryGroupsByDomain.js} +10 -10
  82. package/identitymanagement/getActiveDirectoryGroupsByDomain.js.map +1 -0
  83. package/{activedirectoryjoin/getPoint.d.ts → identitymanagement/getActiveDirectoryJoinPoint.d.ts} +13 -13
  84. package/{activedirectoryjoin/getPoint.js → identitymanagement/getActiveDirectoryJoinPoint.js} +10 -10
  85. package/identitymanagement/getActiveDirectoryJoinPoint.js.map +1 -0
  86. package/{certificateauthentication/getProfile.d.ts → identitymanagement/getCertificateAuthenticationProfile.d.ts} +10 -10
  87. package/{certificateauthentication/getProfile.js → identitymanagement/getCertificateAuthenticationProfile.js} +10 -10
  88. package/identitymanagement/getCertificateAuthenticationProfile.js.map +1 -0
  89. package/{getEndpoint.d.ts → identitymanagement/getEndpoint.d.ts} +2 -2
  90. package/{getEndpoint.js → identitymanagement/getEndpoint.js} +4 -4
  91. package/identitymanagement/getEndpoint.js.map +1 -0
  92. package/{endpointidentity/getGroup.d.ts → identitymanagement/getEndpointIdentityGroup.d.ts} +10 -10
  93. package/{endpointidentity/getGroup.js → identitymanagement/getEndpointIdentityGroup.js} +10 -10
  94. package/identitymanagement/getEndpointIdentityGroup.js.map +1 -0
  95. package/{identitysource/getSequence.d.ts → identitymanagement/getIdentitySourceSequence.d.ts} +11 -11
  96. package/{identitysource/getSequence.js → identitymanagement/getIdentitySourceSequence.js} +10 -10
  97. package/identitymanagement/getIdentitySourceSequence.js.map +1 -0
  98. package/{internal/getUser.d.ts → identitymanagement/getInternalUser.d.ts} +10 -10
  99. package/{internal/getUser.js → identitymanagement/getInternalUser.js} +10 -10
  100. package/identitymanagement/getInternalUser.js.map +1 -0
  101. package/{useridentity/getGroup.d.ts → identitymanagement/getUserIdentityGroup.d.ts} +10 -10
  102. package/{useridentity/getGroup.js → identitymanagement/getUserIdentityGroup.js} +10 -10
  103. package/identitymanagement/getUserIdentityGroup.js.map +1 -0
  104. package/{identitysource/sequence.d.ts → identitymanagement/identitySourceSequence.d.ts} +16 -16
  105. package/{identitysource/sequence.js → identitymanagement/identitySourceSequence.js} +12 -12
  106. package/identitymanagement/identitySourceSequence.js.map +1 -0
  107. package/identitymanagement/index.d.ts +51 -0
  108. package/identitymanagement/index.js +86 -0
  109. package/identitymanagement/index.js.map +1 -0
  110. package/{internal/user.d.ts → identitymanagement/internalUser.d.ts} +13 -13
  111. package/{internal/user.js → identitymanagement/internalUser.js} +12 -12
  112. package/identitymanagement/internalUser.js.map +1 -0
  113. package/{useridentity/group.d.ts → identitymanagement/userIdentityGroup.d.ts} +13 -13
  114. package/{useridentity/group.js → identitymanagement/userIdentityGroup.js} +12 -12
  115. package/identitymanagement/userIdentityGroup.js.map +1 -0
  116. package/index.d.ts +4 -47
  117. package/index.js +7 -94
  118. package/index.js.map +1 -1
  119. package/network/device.d.ts +4 -4
  120. package/network/device.js +2 -2
  121. package/{networkdevice/group.d.ts → network/deviceGroup.d.ts} +13 -13
  122. package/{networkdevice/group.js → network/deviceGroup.js} +12 -12
  123. package/network/deviceGroup.js.map +1 -0
  124. package/network/getDevice.d.ts +3 -3
  125. package/network/getDevice.js +3 -3
  126. package/{networkdevice/getGroup.d.ts → network/getDeviceGroup.d.ts} +10 -10
  127. package/{networkdevice/getGroup.js → network/getDeviceGroup.js} +10 -10
  128. package/network/getDeviceGroup.js.map +1 -0
  129. package/network/index.d.ts +6 -0
  130. package/network/index.js +11 -3
  131. package/network/index.js.map +1 -1
  132. package/{allowed/protocols.d.ts → networkaccess/allowedProtocols.d.ts} +13 -13
  133. package/{allowed/protocols.js → networkaccess/allowedProtocols.js} +12 -12
  134. package/networkaccess/allowedProtocols.js.map +1 -0
  135. package/{networkaccessauthentication/rule.d.ts → networkaccess/authenticationRule.d.ts} +16 -16
  136. package/{networkaccessauthentication/rule.js → networkaccess/authenticationRule.js} +12 -12
  137. package/networkaccess/authenticationRule.js.map +1 -0
  138. package/{networkaccessauthorizationexception/rule.d.ts → networkaccess/authorizationExceptionRule.d.ts} +16 -16
  139. package/{networkaccessauthorizationexception/rule.js → networkaccess/authorizationExceptionRule.js} +12 -12
  140. package/networkaccess/authorizationExceptionRule.js.map +1 -0
  141. package/{networkaccessauthorizationglobalexception/rule.d.ts → networkaccess/authorizationGlobalExceptionRule.d.ts} +16 -16
  142. package/{networkaccessauthorizationglobalexception/rule.js → networkaccess/authorizationGlobalExceptionRule.js} +12 -12
  143. package/networkaccess/authorizationGlobalExceptionRule.js.map +1 -0
  144. package/{authorization/profile.d.ts → networkaccess/authorizationProfile.d.ts} +15 -15
  145. package/{authorization/profile.js → networkaccess/authorizationProfile.js} +11 -11
  146. package/networkaccess/authorizationProfile.js.map +1 -0
  147. package/{networkaccessauthorization/rule.d.ts → networkaccess/authorizationRule.d.ts} +16 -16
  148. package/{networkaccessauthorization/rule.js → networkaccess/authorizationRule.js} +12 -12
  149. package/networkaccess/authorizationRule.js.map +1 -0
  150. package/networkaccess/condition.d.ts +4 -4
  151. package/networkaccess/condition.js +2 -2
  152. package/networkaccess/dictionary.d.ts +1 -1
  153. package/networkaccess/dictionary.js +2 -2
  154. package/{downloadable/acl.d.ts → networkaccess/downloadableAcl.d.ts} +13 -13
  155. package/{downloadable/acl.js → networkaccess/downloadableAcl.js} +12 -12
  156. package/networkaccess/downloadableAcl.js.map +1 -0
  157. package/{allowed/getProtocols.d.ts → networkaccess/getAllowedProtocols.d.ts} +10 -10
  158. package/{allowed/getProtocols.js → networkaccess/getAllowedProtocols.js} +10 -10
  159. package/networkaccess/getAllowedProtocols.js.map +1 -0
  160. package/{networkaccessauthentication/getRule.d.ts → networkaccess/getAuthenticationRule.d.ts} +11 -11
  161. package/{networkaccessauthentication/getRule.js → networkaccess/getAuthenticationRule.js} +10 -10
  162. package/networkaccess/getAuthenticationRule.js.map +1 -0
  163. package/{networkaccessauthorizationexception/getRule.d.ts → networkaccess/getAuthorizationExceptionRule.d.ts} +11 -11
  164. package/{networkaccessauthorizationexception/getRule.js → networkaccess/getAuthorizationExceptionRule.js} +10 -10
  165. package/networkaccess/getAuthorizationExceptionRule.js.map +1 -0
  166. package/{networkaccessauthorizationglobalexception/getRule.d.ts → networkaccess/getAuthorizationGlobalExceptionRule.d.ts} +11 -11
  167. package/{networkaccessauthorizationglobalexception/getRule.js → networkaccess/getAuthorizationGlobalExceptionRule.js} +10 -10
  168. package/networkaccess/getAuthorizationGlobalExceptionRule.js.map +1 -0
  169. package/{authorization/getProfile.d.ts → networkaccess/getAuthorizationProfile.d.ts} +11 -11
  170. package/{authorization/getProfile.js → networkaccess/getAuthorizationProfile.js} +10 -10
  171. package/networkaccess/getAuthorizationProfile.js.map +1 -0
  172. package/{networkaccessauthorization/getRule.d.ts → networkaccess/getAuthorizationRule.d.ts} +11 -11
  173. package/{networkaccessauthorization/getRule.js → networkaccess/getAuthorizationRule.js} +10 -10
  174. package/networkaccess/getAuthorizationRule.js.map +1 -0
  175. package/networkaccess/getCondition.d.ts +3 -3
  176. package/networkaccess/getCondition.js +3 -3
  177. package/networkaccess/getDictionary.d.ts +2 -2
  178. package/networkaccess/getDictionary.js +3 -3
  179. package/{downloadable/getAcl.d.ts → networkaccess/getDownloadableAcl.d.ts} +10 -10
  180. package/{downloadable/getAcl.js → networkaccess/getDownloadableAcl.js} +10 -10
  181. package/networkaccess/getDownloadableAcl.js.map +1 -0
  182. package/{networkaccesspolicy/getSet.d.ts → networkaccess/getPolicySet.d.ts} +11 -11
  183. package/{networkaccesspolicy/getSet.js → networkaccess/getPolicySet.js} +10 -10
  184. package/networkaccess/getPolicySet.js.map +1 -0
  185. package/{networkaccesstimeanddate/getCondition.d.ts → networkaccess/getTimeAndDateCondition.d.ts} +10 -10
  186. package/{networkaccesstimeanddate/getCondition.js → networkaccess/getTimeAndDateCondition.js} +10 -10
  187. package/networkaccess/getTimeAndDateCondition.js.map +1 -0
  188. package/networkaccess/index.d.ts +54 -0
  189. package/networkaccess/index.js +77 -5
  190. package/networkaccess/index.js.map +1 -1
  191. package/{networkaccesspolicy/set.d.ts → networkaccess/policySet.d.ts} +16 -16
  192. package/{networkaccesspolicy/set.js → networkaccess/policySet.js} +12 -12
  193. package/networkaccess/policySet.js.map +1 -0
  194. package/{networkaccesstimeanddate/condition.d.ts → networkaccess/timeAndDateCondition.d.ts} +13 -13
  195. package/{networkaccesstimeanddate/condition.js → networkaccess/timeAndDateCondition.js} +12 -12
  196. package/networkaccess/timeAndDateCondition.js.map +1 -0
  197. package/package.json +1 -1
  198. package/{licensetier/getState.d.ts → system/getLicenseTierState.d.ts} +11 -11
  199. package/{licensetier/getState.js → system/getLicenseTierState.js} +10 -10
  200. package/system/getLicenseTierState.js.map +1 -0
  201. package/{getRepository.d.ts → system/getRepository.d.ts} +2 -2
  202. package/{getRepository.js → system/getRepository.js} +4 -4
  203. package/system/getRepository.js.map +1 -0
  204. package/system/index.d.ts +12 -0
  205. package/system/index.js +33 -0
  206. package/system/index.js.map +1 -0
  207. package/{licensetier/state.d.ts → system/licenseTierState.d.ts} +16 -16
  208. package/{licensetier/state.js → system/licenseTierState.js} +12 -12
  209. package/system/licenseTierState.js.map +1 -0
  210. package/{repository.d.ts → system/repository.d.ts} +2 -2
  211. package/{repository.js → system/repository.js} +4 -4
  212. package/system/repository.js.map +1 -0
  213. package/{trustsecegressmatrix/cell.d.ts → trustsec/egressMatrixCell.d.ts} +13 -13
  214. package/{trustsecegressmatrix/cell.js → trustsec/egressMatrixCell.js} +12 -12
  215. package/trustsec/egressMatrixCell.js.map +1 -0
  216. package/{trustsecegressmatrix/getCell.d.ts → trustsec/getEgressMatrixCell.d.ts} +10 -10
  217. package/{trustsecegressmatrix/getCell.js → trustsec/getEgressMatrixCell.js} +10 -10
  218. package/trustsec/getEgressMatrixCell.js.map +1 -0
  219. package/{trustseciptosgt/getMapping.d.ts → trustsec/getIpToSgtMapping.d.ts} +10 -10
  220. package/{trustseciptosgt/getMapping.js → trustsec/getIpToSgtMapping.js} +10 -10
  221. package/trustsec/getIpToSgtMapping.js.map +1 -0
  222. package/{trustseciptosgtmapping/getGroup.d.ts → trustsec/getIpToSgtMappingGroup.d.ts} +10 -10
  223. package/{trustseciptosgtmapping/getGroup.js → trustsec/getIpToSgtMappingGroup.js} +10 -10
  224. package/trustsec/getIpToSgtMappingGroup.js.map +1 -0
  225. package/{trustsecsecurity/getGroup.d.ts → trustsec/getSecurityGroup.d.ts} +10 -10
  226. package/{trustsecsecurity/getGroup.js → trustsec/getSecurityGroup.js} +10 -10
  227. package/trustsec/getSecurityGroup.js.map +1 -0
  228. package/{trustsecsecuritygroup/getAcl.d.ts → trustsec/getSecurityGroupAcl.d.ts} +10 -10
  229. package/{trustsecsecuritygroup/getAcl.js → trustsec/getSecurityGroupAcl.js} +10 -10
  230. package/trustsec/getSecurityGroupAcl.js.map +1 -0
  231. package/trustsec/index.d.ts +30 -0
  232. package/trustsec/index.js +57 -0
  233. package/trustsec/index.js.map +1 -0
  234. package/{trustseciptosgt/mapping.d.ts → trustsec/ipToSgtMapping.d.ts} +13 -13
  235. package/{trustseciptosgt/mapping.js → trustsec/ipToSgtMapping.js} +12 -12
  236. package/trustsec/ipToSgtMapping.js.map +1 -0
  237. package/{trustseciptosgtmapping/group.d.ts → trustsec/ipToSgtMappingGroup.d.ts} +13 -13
  238. package/{trustseciptosgtmapping/group.js → trustsec/ipToSgtMappingGroup.js} +12 -12
  239. package/trustsec/ipToSgtMappingGroup.js.map +1 -0
  240. package/{trustsecsecurity/group.d.ts → trustsec/securityGroup.d.ts} +13 -13
  241. package/{trustsecsecurity/group.js → trustsec/securityGroup.js} +12 -12
  242. package/trustsec/securityGroup.js.map +1 -0
  243. package/{trustsecsecuritygroup/acl.d.ts → trustsec/securityGroupAcl.d.ts} +13 -13
  244. package/{trustsecsecuritygroup/acl.js → trustsec/securityGroupAcl.js} +12 -12
  245. package/trustsec/securityGroupAcl.js.map +1 -0
  246. package/types/input.d.ts +199 -233
  247. package/types/output.d.ts +617 -651
  248. package/activedirectoryadd/groups.js.map +0 -1
  249. package/activedirectoryadd/index.d.ts +0 -3
  250. package/activedirectoryadd/index.js +0 -22
  251. package/activedirectoryadd/index.js.map +0 -1
  252. package/activedirectorygroupsby/getDomain.js.map +0 -1
  253. package/activedirectorygroupsby/index.d.ts +0 -3
  254. package/activedirectorygroupsby/index.js +0 -10
  255. package/activedirectorygroupsby/index.js.map +0 -1
  256. package/activedirectoryjoin/getPoint.js.map +0 -1
  257. package/activedirectoryjoin/index.d.ts +0 -6
  258. package/activedirectoryjoin/index.js +0 -25
  259. package/activedirectoryjoin/index.js.map +0 -1
  260. package/activedirectoryjoin/point.js.map +0 -1
  261. package/activedirectoryjoindomainwithall/index.d.ts +0 -3
  262. package/activedirectoryjoindomainwithall/index.js +0 -22
  263. package/activedirectoryjoindomainwithall/index.js.map +0 -1
  264. package/activedirectoryjoindomainwithall/nodes.js.map +0 -1
  265. package/allowed/getProtocols.js.map +0 -1
  266. package/allowed/index.d.ts +0 -6
  267. package/allowed/index.js +0 -25
  268. package/allowed/index.js.map +0 -1
  269. package/allowed/protocols.js.map +0 -1
  270. package/allowedprotocols/getTacacs.js.map +0 -1
  271. package/allowedprotocols/index.d.ts +0 -6
  272. package/allowedprotocols/index.js +0 -25
  273. package/allowedprotocols/index.js.map +0 -1
  274. package/allowedprotocols/tacacs.js.map +0 -1
  275. package/authorization/getProfile.js.map +0 -1
  276. package/authorization/index.d.ts +0 -6
  277. package/authorization/index.js +0 -25
  278. package/authorization/index.js.map +0 -1
  279. package/authorization/profile.js.map +0 -1
  280. package/certificateauthentication/getProfile.js.map +0 -1
  281. package/certificateauthentication/index.d.ts +0 -6
  282. package/certificateauthentication/index.js +0 -25
  283. package/certificateauthentication/index.js.map +0 -1
  284. package/certificateauthentication/profile.js.map +0 -1
  285. package/deviceadminauthentication/getRule.js.map +0 -1
  286. package/deviceadminauthentication/index.d.ts +0 -6
  287. package/deviceadminauthentication/index.js +0 -25
  288. package/deviceadminauthentication/index.js.map +0 -1
  289. package/deviceadminauthentication/rule.js.map +0 -1
  290. package/deviceadminauthorization/getRule.js.map +0 -1
  291. package/deviceadminauthorization/index.d.ts +0 -6
  292. package/deviceadminauthorization/index.js +0 -25
  293. package/deviceadminauthorization/index.js.map +0 -1
  294. package/deviceadminauthorization/rule.js.map +0 -1
  295. package/deviceadminauthorizationexception/getRule.js.map +0 -1
  296. package/deviceadminauthorizationexception/index.d.ts +0 -6
  297. package/deviceadminauthorizationexception/index.js +0 -25
  298. package/deviceadminauthorizationexception/index.js.map +0 -1
  299. package/deviceadminauthorizationexception/rule.js.map +0 -1
  300. package/deviceadminauthorizationglobalexception/getRule.js.map +0 -1
  301. package/deviceadminauthorizationglobalexception/index.d.ts +0 -6
  302. package/deviceadminauthorizationglobalexception/index.js +0 -25
  303. package/deviceadminauthorizationglobalexception/index.js.map +0 -1
  304. package/deviceadminauthorizationglobalexception/rule.js.map +0 -1
  305. package/deviceadminpolicy/getSet.js.map +0 -1
  306. package/deviceadminpolicy/index.d.ts +0 -6
  307. package/deviceadminpolicy/index.js +0 -25
  308. package/deviceadminpolicy/index.js.map +0 -1
  309. package/deviceadminpolicy/set.js.map +0 -1
  310. package/deviceadmintimeanddate/condition.js.map +0 -1
  311. package/deviceadmintimeanddate/getCondition.js.map +0 -1
  312. package/deviceadmintimeanddate/index.d.ts +0 -6
  313. package/deviceadmintimeanddate/index.js +0 -25
  314. package/deviceadmintimeanddate/index.js.map +0 -1
  315. package/downloadable/acl.js.map +0 -1
  316. package/downloadable/getAcl.js.map +0 -1
  317. package/downloadable/index.d.ts +0 -6
  318. package/downloadable/index.js +0 -25
  319. package/downloadable/index.js.map +0 -1
  320. package/endpoint.js.map +0 -1
  321. package/endpointidentity/getGroup.js.map +0 -1
  322. package/endpointidentity/group.js.map +0 -1
  323. package/endpointidentity/index.d.ts +0 -6
  324. package/endpointidentity/index.js +0 -25
  325. package/endpointidentity/index.js.map +0 -1
  326. package/getEndpoint.js.map +0 -1
  327. package/getRepository.js.map +0 -1
  328. package/identitysource/getSequence.js.map +0 -1
  329. package/identitysource/index.d.ts +0 -6
  330. package/identitysource/index.js +0 -25
  331. package/identitysource/index.js.map +0 -1
  332. package/identitysource/sequence.js.map +0 -1
  333. package/internal/getUser.js.map +0 -1
  334. package/internal/index.d.ts +0 -6
  335. package/internal/index.js +0 -25
  336. package/internal/index.js.map +0 -1
  337. package/internal/user.js.map +0 -1
  338. package/licensetier/getState.js.map +0 -1
  339. package/licensetier/index.d.ts +0 -6
  340. package/licensetier/index.js +0 -25
  341. package/licensetier/index.js.map +0 -1
  342. package/licensetier/state.js.map +0 -1
  343. package/networkaccessauthentication/getRule.js.map +0 -1
  344. package/networkaccessauthentication/index.d.ts +0 -6
  345. package/networkaccessauthentication/index.js +0 -25
  346. package/networkaccessauthentication/index.js.map +0 -1
  347. package/networkaccessauthentication/rule.js.map +0 -1
  348. package/networkaccessauthorization/getRule.js.map +0 -1
  349. package/networkaccessauthorization/index.d.ts +0 -6
  350. package/networkaccessauthorization/index.js +0 -25
  351. package/networkaccessauthorization/index.js.map +0 -1
  352. package/networkaccessauthorization/rule.js.map +0 -1
  353. package/networkaccessauthorizationexception/getRule.js.map +0 -1
  354. package/networkaccessauthorizationexception/index.d.ts +0 -6
  355. package/networkaccessauthorizationexception/index.js +0 -25
  356. package/networkaccessauthorizationexception/index.js.map +0 -1
  357. package/networkaccessauthorizationexception/rule.js.map +0 -1
  358. package/networkaccessauthorizationglobalexception/getRule.js.map +0 -1
  359. package/networkaccessauthorizationglobalexception/index.d.ts +0 -6
  360. package/networkaccessauthorizationglobalexception/index.js +0 -25
  361. package/networkaccessauthorizationglobalexception/index.js.map +0 -1
  362. package/networkaccessauthorizationglobalexception/rule.js.map +0 -1
  363. package/networkaccesspolicy/getSet.js.map +0 -1
  364. package/networkaccesspolicy/index.d.ts +0 -6
  365. package/networkaccesspolicy/index.js +0 -25
  366. package/networkaccesspolicy/index.js.map +0 -1
  367. package/networkaccesspolicy/set.js.map +0 -1
  368. package/networkaccesstimeanddate/condition.js.map +0 -1
  369. package/networkaccesstimeanddate/getCondition.js.map +0 -1
  370. package/networkaccesstimeanddate/index.d.ts +0 -6
  371. package/networkaccesstimeanddate/index.js +0 -25
  372. package/networkaccesstimeanddate/index.js.map +0 -1
  373. package/networkdevice/getGroup.js.map +0 -1
  374. package/networkdevice/group.js.map +0 -1
  375. package/networkdevice/index.d.ts +0 -6
  376. package/networkdevice/index.js +0 -25
  377. package/networkdevice/index.js.map +0 -1
  378. package/repository.js.map +0 -1
  379. package/tacacs/getProfile.js.map +0 -1
  380. package/tacacs/index.d.ts +0 -6
  381. package/tacacs/index.js +0 -25
  382. package/tacacs/index.js.map +0 -1
  383. package/tacacs/profile.js.map +0 -1
  384. package/tacacscommand/getSet.js.map +0 -1
  385. package/tacacscommand/index.d.ts +0 -6
  386. package/tacacscommand/index.js +0 -25
  387. package/tacacscommand/index.js.map +0 -1
  388. package/tacacscommand/set.js.map +0 -1
  389. package/trustsecegressmatrix/cell.js.map +0 -1
  390. package/trustsecegressmatrix/getCell.js.map +0 -1
  391. package/trustsecegressmatrix/index.d.ts +0 -6
  392. package/trustsecegressmatrix/index.js +0 -25
  393. package/trustsecegressmatrix/index.js.map +0 -1
  394. package/trustseciptosgt/getMapping.js.map +0 -1
  395. package/trustseciptosgt/index.d.ts +0 -6
  396. package/trustseciptosgt/index.js +0 -25
  397. package/trustseciptosgt/index.js.map +0 -1
  398. package/trustseciptosgt/mapping.js.map +0 -1
  399. package/trustseciptosgtmapping/getGroup.js.map +0 -1
  400. package/trustseciptosgtmapping/group.js.map +0 -1
  401. package/trustseciptosgtmapping/index.d.ts +0 -6
  402. package/trustseciptosgtmapping/index.js +0 -25
  403. package/trustseciptosgtmapping/index.js.map +0 -1
  404. package/trustsecsecurity/getGroup.js.map +0 -1
  405. package/trustsecsecurity/group.js.map +0 -1
  406. package/trustsecsecurity/index.d.ts +0 -6
  407. package/trustsecsecurity/index.js +0 -25
  408. package/trustsecsecurity/index.js.map +0 -1
  409. package/trustsecsecuritygroup/acl.js.map +0 -1
  410. package/trustsecsecuritygroup/getAcl.js.map +0 -1
  411. package/trustsecsecuritygroup/index.d.ts +0 -6
  412. package/trustsecsecuritygroup/index.js +0 -25
  413. package/trustsecsecuritygroup/index.js.map +0 -1
  414. package/useridentity/getGroup.js.map +0 -1
  415. package/useridentity/group.js.map +0 -1
  416. package/useridentity/index.d.ts +0 -6
  417. package/useridentity/index.js +0 -25
  418. package/useridentity/index.js.map +0 -1
@@ -8,7 +8,7 @@ import * as pulumi from "@pulumi/pulumi";
8
8
  * import * as pulumi from "@pulumi/pulumi";
9
9
  * import * as ise from "@pulumi/ise";
10
10
  *
11
- * const example = new ise.allowedprotocols.Tacacs("example", {
11
+ * const example = new ise.deviceadmin.AllowedProtocolsTacacs("example", {
12
12
  * name: "Protocols1",
13
13
  * description: "My allowed TACACS protocols",
14
14
  * allowPapAscii: true,
@@ -20,12 +20,12 @@ import * as pulumi from "@pulumi/pulumi";
20
20
  * ## Import
21
21
  *
22
22
  * ```sh
23
- * $ pulumi import ise:AllowedProtocols/tacacs:Tacacs example "76d24097-41c4-4558-a4d0-a8c07ac08470"
23
+ * $ pulumi import ise:deviceadmin/allowedProtocolsTacacs:AllowedProtocolsTacacs example "76d24097-41c4-4558-a4d0-a8c07ac08470"
24
24
  * ```
25
25
  */
26
- export declare class Tacacs extends pulumi.CustomResource {
26
+ export declare class AllowedProtocolsTacacs extends pulumi.CustomResource {
27
27
  /**
28
- * Get an existing Tacacs resource's state with the given name, ID, and optional extra
28
+ * Get an existing AllowedProtocolsTacacs resource's state with the given name, ID, and optional extra
29
29
  * properties used to qualify the lookup.
30
30
  *
31
31
  * @param name The _unique_ name of the resulting resource.
@@ -33,12 +33,12 @@ export declare class Tacacs extends pulumi.CustomResource {
33
33
  * @param state Any extra arguments used during the lookup.
34
34
  * @param opts Optional settings to control the behavior of the CustomResource.
35
35
  */
36
- static get(name: string, id: pulumi.Input<pulumi.ID>, state?: TacacsState, opts?: pulumi.CustomResourceOptions): Tacacs;
36
+ static get(name: string, id: pulumi.Input<pulumi.ID>, state?: AllowedProtocolsTacacsState, opts?: pulumi.CustomResourceOptions): AllowedProtocolsTacacs;
37
37
  /**
38
- * Returns true if the given object is an instance of Tacacs. This is designed to work even
38
+ * Returns true if the given object is an instance of AllowedProtocolsTacacs. This is designed to work even
39
39
  * when multiple copies of the Pulumi SDK have been loaded into the same process.
40
40
  */
41
- static isInstance(obj: any): obj is Tacacs;
41
+ static isInstance(obj: any): obj is AllowedProtocolsTacacs;
42
42
  /**
43
43
  * Allow CHAP
44
44
  */
@@ -60,18 +60,18 @@ export declare class Tacacs extends pulumi.CustomResource {
60
60
  */
61
61
  readonly name: pulumi.Output<string>;
62
62
  /**
63
- * Create a Tacacs resource with the given unique name, arguments, and options.
63
+ * Create a AllowedProtocolsTacacs resource with the given unique name, arguments, and options.
64
64
  *
65
65
  * @param name The _unique_ name of the resource.
66
66
  * @param args The arguments to use to populate this resource's properties.
67
67
  * @param opts A bag of options that control this resource's behavior.
68
68
  */
69
- constructor(name: string, args: TacacsArgs, opts?: pulumi.CustomResourceOptions);
69
+ constructor(name: string, args: AllowedProtocolsTacacsArgs, opts?: pulumi.CustomResourceOptions);
70
70
  }
71
71
  /**
72
- * Input properties used for looking up and filtering Tacacs resources.
72
+ * Input properties used for looking up and filtering AllowedProtocolsTacacs resources.
73
73
  */
74
- export interface TacacsState {
74
+ export interface AllowedProtocolsTacacsState {
75
75
  /**
76
76
  * Allow CHAP
77
77
  */
@@ -94,9 +94,9 @@ export interface TacacsState {
94
94
  name?: pulumi.Input<string>;
95
95
  }
96
96
  /**
97
- * The set of arguments for constructing a Tacacs resource.
97
+ * The set of arguments for constructing a AllowedProtocolsTacacs resource.
98
98
  */
99
- export interface TacacsArgs {
99
+ export interface AllowedProtocolsTacacsArgs {
100
100
  /**
101
101
  * Allow CHAP
102
102
  */
@@ -2,7 +2,7 @@
2
2
  // *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  // *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
  Object.defineProperty(exports, "__esModule", { value: true });
5
- exports.Tacacs = void 0;
5
+ exports.AllowedProtocolsTacacs = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("../utilities");
8
8
  /**
@@ -14,7 +14,7 @@ const utilities = require("../utilities");
14
14
  * import * as pulumi from "@pulumi/pulumi";
15
15
  * import * as ise from "@pulumi/ise";
16
16
  *
17
- * const example = new ise.allowedprotocols.Tacacs("example", {
17
+ * const example = new ise.deviceadmin.AllowedProtocolsTacacs("example", {
18
18
  * name: "Protocols1",
19
19
  * description: "My allowed TACACS protocols",
20
20
  * allowPapAscii: true,
@@ -26,12 +26,12 @@ const utilities = require("../utilities");
26
26
  * ## Import
27
27
  *
28
28
  * ```sh
29
- * $ pulumi import ise:AllowedProtocols/tacacs:Tacacs example "76d24097-41c4-4558-a4d0-a8c07ac08470"
29
+ * $ pulumi import ise:deviceadmin/allowedProtocolsTacacs:AllowedProtocolsTacacs example "76d24097-41c4-4558-a4d0-a8c07ac08470"
30
30
  * ```
31
31
  */
32
- class Tacacs extends pulumi.CustomResource {
32
+ class AllowedProtocolsTacacs extends pulumi.CustomResource {
33
33
  /**
34
- * Get an existing Tacacs resource's state with the given name, ID, and optional extra
34
+ * Get an existing AllowedProtocolsTacacs resource's state with the given name, ID, and optional extra
35
35
  * properties used to qualify the lookup.
36
36
  *
37
37
  * @param name The _unique_ name of the resulting resource.
@@ -40,17 +40,17 @@ class Tacacs extends pulumi.CustomResource {
40
40
  * @param opts Optional settings to control the behavior of the CustomResource.
41
41
  */
42
42
  static get(name, id, state, opts) {
43
- return new Tacacs(name, state, Object.assign(Object.assign({}, opts), { id: id }));
43
+ return new AllowedProtocolsTacacs(name, state, Object.assign(Object.assign({}, opts), { id: id }));
44
44
  }
45
45
  /**
46
- * Returns true if the given object is an instance of Tacacs. This is designed to work even
46
+ * Returns true if the given object is an instance of AllowedProtocolsTacacs. This is designed to work even
47
47
  * when multiple copies of the Pulumi SDK have been loaded into the same process.
48
48
  */
49
49
  static isInstance(obj) {
50
50
  if (obj === undefined || obj === null) {
51
51
  return false;
52
52
  }
53
- return obj['__pulumiType'] === Tacacs.__pulumiType;
53
+ return obj['__pulumiType'] === AllowedProtocolsTacacs.__pulumiType;
54
54
  }
55
55
  constructor(name, argsOrState, opts) {
56
56
  let resourceInputs = {};
@@ -81,10 +81,10 @@ class Tacacs extends pulumi.CustomResource {
81
81
  resourceInputs["name"] = args ? args.name : undefined;
82
82
  }
83
83
  opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
84
- super(Tacacs.__pulumiType, name, resourceInputs, opts);
84
+ super(AllowedProtocolsTacacs.__pulumiType, name, resourceInputs, opts);
85
85
  }
86
86
  }
87
- exports.Tacacs = Tacacs;
87
+ exports.AllowedProtocolsTacacs = AllowedProtocolsTacacs;
88
88
  /** @internal */
89
- Tacacs.__pulumiType = 'ise:AllowedProtocols/tacacs:Tacacs';
90
- //# sourceMappingURL=tacacs.js.map
89
+ AllowedProtocolsTacacs.__pulumiType = 'ise:deviceadmin/allowedProtocolsTacacs:AllowedProtocolsTacacs';
90
+ //# sourceMappingURL=allowedProtocolsTacacs.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"allowedProtocolsTacacs.js","sourceRoot":"","sources":["../../deviceadmin/allowedProtocolsTacacs.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;GAuBG;AACH,MAAa,sBAAuB,SAAQ,MAAM,CAAC,cAAc;IAC7D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAmC,EAAE,IAAmC;QACjI,OAAO,IAAI,sBAAsB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC7E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,sBAAsB,CAAC,YAAY,CAAC;IACvE,CAAC;IA+BD,YAAY,IAAY,EAAE,WAAsE,EAAE,IAAmC;QACjI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAsD,CAAC;YACrE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3D;aAAM;YACH,MAAM,IAAI,GAAG,WAAqD,CAAC;YACnE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,SAAS,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACtD,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,aAAa,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1D,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;aAChE;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,aAAa,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1D,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;aAChE;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;SACzD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,sBAAsB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC3E,CAAC;;AAtFL,wDAuFC;AAzEG,gBAAgB;AACO,mCAAY,GAAG,+DAA+D,CAAC"}
@@ -10,7 +10,7 @@ import * as outputs from "../types/output";
10
10
  * import * as pulumi from "@pulumi/pulumi";
11
11
  * import * as ise from "@pulumi/ise";
12
12
  *
13
- * const example = new ise.deviceadminauthentication.Rule("example", {
13
+ * const example = new ise.deviceadmin.AuthenticationRule("example", {
14
14
  * policySetId: "d82952cb-b901-4b09-b363-5ebf39bdbaf9",
15
15
  * name: "Rule1",
16
16
  * "default": false,
@@ -32,12 +32,12 @@ import * as outputs from "../types/output";
32
32
  * ## Import
33
33
  *
34
34
  * ```sh
35
- * $ pulumi import ise:DeviceAdminAuthentication/rule:Rule example "76d24097-41c4-4558-a4d0-a8c07ac08470,76d24097-41c4-4558-a4d0-a8c07ac08470"
35
+ * $ pulumi import ise:deviceadmin/authenticationRule:AuthenticationRule example "76d24097-41c4-4558-a4d0-a8c07ac08470,76d24097-41c4-4558-a4d0-a8c07ac08470"
36
36
  * ```
37
37
  */
38
- export declare class Rule extends pulumi.CustomResource {
38
+ export declare class AuthenticationRule extends pulumi.CustomResource {
39
39
  /**
40
- * Get an existing Rule resource's state with the given name, ID, and optional extra
40
+ * Get an existing AuthenticationRule resource's state with the given name, ID, and optional extra
41
41
  * properties used to qualify the lookup.
42
42
  *
43
43
  * @param name The _unique_ name of the resulting resource.
@@ -45,16 +45,16 @@ export declare class Rule extends pulumi.CustomResource {
45
45
  * @param state Any extra arguments used during the lookup.
46
46
  * @param opts Optional settings to control the behavior of the CustomResource.
47
47
  */
48
- static get(name: string, id: pulumi.Input<pulumi.ID>, state?: RuleState, opts?: pulumi.CustomResourceOptions): Rule;
48
+ static get(name: string, id: pulumi.Input<pulumi.ID>, state?: AuthenticationRuleState, opts?: pulumi.CustomResourceOptions): AuthenticationRule;
49
49
  /**
50
- * Returns true if the given object is an instance of Rule. This is designed to work even
50
+ * Returns true if the given object is an instance of AuthenticationRule. This is designed to work even
51
51
  * when multiple copies of the Pulumi SDK have been loaded into the same process.
52
52
  */
53
- static isInstance(obj: any): obj is Rule;
53
+ static isInstance(obj: any): obj is AuthenticationRule;
54
54
  /**
55
55
  * List of child conditions. `condition_type` must be one of `ConditionAndBlock` or `ConditionOrBlock`.
56
56
  */
57
- readonly childrens: pulumi.Output<outputs.DeviceAdminAuthentication.RuleChildren[] | undefined>;
57
+ readonly childrens: pulumi.Output<outputs.deviceadmin.AuthenticationRuleChildren[] | undefined>;
58
58
  /**
59
59
  * Dictionary attribute name
60
60
  */
@@ -129,22 +129,22 @@ export declare class Rule extends pulumi.CustomResource {
129
129
  */
130
130
  readonly state: pulumi.Output<string | undefined>;
131
131
  /**
132
- * Create a Rule resource with the given unique name, arguments, and options.
132
+ * Create a AuthenticationRule resource with the given unique name, arguments, and options.
133
133
  *
134
134
  * @param name The _unique_ name of the resource.
135
135
  * @param args The arguments to use to populate this resource's properties.
136
136
  * @param opts A bag of options that control this resource's behavior.
137
137
  */
138
- constructor(name: string, args: RuleArgs, opts?: pulumi.CustomResourceOptions);
138
+ constructor(name: string, args: AuthenticationRuleArgs, opts?: pulumi.CustomResourceOptions);
139
139
  }
140
140
  /**
141
- * Input properties used for looking up and filtering Rule resources.
141
+ * Input properties used for looking up and filtering AuthenticationRule resources.
142
142
  */
143
- export interface RuleState {
143
+ export interface AuthenticationRuleState {
144
144
  /**
145
145
  * List of child conditions. `condition_type` must be one of `ConditionAndBlock` or `ConditionOrBlock`.
146
146
  */
147
- childrens?: pulumi.Input<pulumi.Input<inputs.DeviceAdminAuthentication.RuleChildren>[]>;
147
+ childrens?: pulumi.Input<pulumi.Input<inputs.deviceadmin.AuthenticationRuleChildren>[]>;
148
148
  /**
149
149
  * Dictionary attribute name
150
150
  */
@@ -220,13 +220,13 @@ export interface RuleState {
220
220
  state?: pulumi.Input<string>;
221
221
  }
222
222
  /**
223
- * The set of arguments for constructing a Rule resource.
223
+ * The set of arguments for constructing a AuthenticationRule resource.
224
224
  */
225
- export interface RuleArgs {
225
+ export interface AuthenticationRuleArgs {
226
226
  /**
227
227
  * List of child conditions. `condition_type` must be one of `ConditionAndBlock` or `ConditionOrBlock`.
228
228
  */
229
- childrens?: pulumi.Input<pulumi.Input<inputs.DeviceAdminAuthentication.RuleChildren>[]>;
229
+ childrens?: pulumi.Input<pulumi.Input<inputs.deviceadmin.AuthenticationRuleChildren>[]>;
230
230
  /**
231
231
  * Dictionary attribute name
232
232
  */
@@ -2,7 +2,7 @@
2
2
  // *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  // *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
  Object.defineProperty(exports, "__esModule", { value: true });
5
- exports.Rule = void 0;
5
+ exports.AuthenticationRule = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("../utilities");
8
8
  /**
@@ -14,7 +14,7 @@ const utilities = require("../utilities");
14
14
  * import * as pulumi from "@pulumi/pulumi";
15
15
  * import * as ise from "@pulumi/ise";
16
16
  *
17
- * const example = new ise.deviceadminauthentication.Rule("example", {
17
+ * const example = new ise.deviceadmin.AuthenticationRule("example", {
18
18
  * policySetId: "d82952cb-b901-4b09-b363-5ebf39bdbaf9",
19
19
  * name: "Rule1",
20
20
  * "default": false,
@@ -36,12 +36,12 @@ const utilities = require("../utilities");
36
36
  * ## Import
37
37
  *
38
38
  * ```sh
39
- * $ pulumi import ise:DeviceAdminAuthentication/rule:Rule example "76d24097-41c4-4558-a4d0-a8c07ac08470,76d24097-41c4-4558-a4d0-a8c07ac08470"
39
+ * $ pulumi import ise:deviceadmin/authenticationRule:AuthenticationRule example "76d24097-41c4-4558-a4d0-a8c07ac08470,76d24097-41c4-4558-a4d0-a8c07ac08470"
40
40
  * ```
41
41
  */
42
- class Rule extends pulumi.CustomResource {
42
+ class AuthenticationRule extends pulumi.CustomResource {
43
43
  /**
44
- * Get an existing Rule resource's state with the given name, ID, and optional extra
44
+ * Get an existing AuthenticationRule resource's state with the given name, ID, and optional extra
45
45
  * properties used to qualify the lookup.
46
46
  *
47
47
  * @param name The _unique_ name of the resulting resource.
@@ -50,17 +50,17 @@ class Rule extends pulumi.CustomResource {
50
50
  * @param opts Optional settings to control the behavior of the CustomResource.
51
51
  */
52
52
  static get(name, id, state, opts) {
53
- return new Rule(name, state, Object.assign(Object.assign({}, opts), { id: id }));
53
+ return new AuthenticationRule(name, state, Object.assign(Object.assign({}, opts), { id: id }));
54
54
  }
55
55
  /**
56
- * Returns true if the given object is an instance of Rule. This is designed to work even
56
+ * Returns true if the given object is an instance of AuthenticationRule. This is designed to work even
57
57
  * when multiple copies of the Pulumi SDK have been loaded into the same process.
58
58
  */
59
59
  static isInstance(obj) {
60
60
  if (obj === undefined || obj === null) {
61
61
  return false;
62
62
  }
63
- return obj['__pulumiType'] === Rule.__pulumiType;
63
+ return obj['__pulumiType'] === AuthenticationRule.__pulumiType;
64
64
  }
65
65
  constructor(name, argsOrState, opts) {
66
66
  let resourceInputs = {};
@@ -120,10 +120,10 @@ class Rule extends pulumi.CustomResource {
120
120
  resourceInputs["state"] = args ? args.state : undefined;
121
121
  }
122
122
  opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
123
- super(Rule.__pulumiType, name, resourceInputs, opts);
123
+ super(AuthenticationRule.__pulumiType, name, resourceInputs, opts);
124
124
  }
125
125
  }
126
- exports.Rule = Rule;
126
+ exports.AuthenticationRule = AuthenticationRule;
127
127
  /** @internal */
128
- Rule.__pulumiType = 'ise:DeviceAdminAuthentication/rule:Rule';
129
- //# sourceMappingURL=rule.js.map
128
+ AuthenticationRule.__pulumiType = 'ise:deviceadmin/authenticationRule:AuthenticationRule';
129
+ //# sourceMappingURL=authenticationRule.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"authenticationRule.js","sourceRoot":"","sources":["../../deviceadmin/authenticationRule.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAiCG;AACH,MAAa,kBAAmB,SAAQ,MAAM,CAAC,cAAc;IACzD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA+B,EAAE,IAAmC;QAC7H,OAAO,IAAI,kBAAkB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACzE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,kBAAkB,CAAC,YAAY,CAAC;IACnE,CAAC;IAwFD,YAAY,IAAY,EAAE,WAA8D,EAAE,IAAmC;QACzH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAkD,CAAC;YACjE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,yBAAyB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,yBAAyB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,0BAA0B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7D;aAAM;YACH,MAAM,IAAI,GAAG,WAAiD,CAAC;YAC/D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,UAAU,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACvD,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,aAAa,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1D,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;aAChE;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,cAAc,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC3D,MAAM,IAAI,KAAK,CAAC,4CAA4C,CAAC,CAAC;aACjE;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,WAAW,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACxD,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,yBAAyB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,yBAAyB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,0BAA0B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,kBAAkB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACvE,CAAC;;AA5KL,gDA6KC;AA/JG,gBAAgB;AACO,+BAAY,GAAG,uDAAuD,CAAC"}
@@ -10,7 +10,7 @@ import * as outputs from "../types/output";
10
10
  * import * as pulumi from "@pulumi/pulumi";
11
11
  * import * as ise from "@pulumi/ise";
12
12
  *
13
- * const example = new ise.deviceadminauthorizationexception.Rule("example", {
13
+ * const example = new ise.deviceadmin.AuthorizationExceptionRule("example", {
14
14
  * policySetId: "d82952cb-b901-4b09-b363-5ebf39bdbaf9",
15
15
  * name: "Rule1",
16
16
  * "default": false,
@@ -30,12 +30,12 @@ import * as outputs from "../types/output";
30
30
  * ## Import
31
31
  *
32
32
  * ```sh
33
- * $ pulumi import ise:DeviceAdminAuthorizationException/rule:Rule example "76d24097-41c4-4558-a4d0-a8c07ac08470,76d24097-41c4-4558-a4d0-a8c07ac08470"
33
+ * $ pulumi import ise:deviceadmin/authorizationExceptionRule:AuthorizationExceptionRule example "76d24097-41c4-4558-a4d0-a8c07ac08470,76d24097-41c4-4558-a4d0-a8c07ac08470"
34
34
  * ```
35
35
  */
36
- export declare class Rule extends pulumi.CustomResource {
36
+ export declare class AuthorizationExceptionRule extends pulumi.CustomResource {
37
37
  /**
38
- * Get an existing Rule resource's state with the given name, ID, and optional extra
38
+ * Get an existing AuthorizationExceptionRule resource's state with the given name, ID, and optional extra
39
39
  * properties used to qualify the lookup.
40
40
  *
41
41
  * @param name The _unique_ name of the resulting resource.
@@ -43,16 +43,16 @@ export declare class Rule extends pulumi.CustomResource {
43
43
  * @param state Any extra arguments used during the lookup.
44
44
  * @param opts Optional settings to control the behavior of the CustomResource.
45
45
  */
46
- static get(name: string, id: pulumi.Input<pulumi.ID>, state?: RuleState, opts?: pulumi.CustomResourceOptions): Rule;
46
+ static get(name: string, id: pulumi.Input<pulumi.ID>, state?: AuthorizationExceptionRuleState, opts?: pulumi.CustomResourceOptions): AuthorizationExceptionRule;
47
47
  /**
48
- * Returns true if the given object is an instance of Rule. This is designed to work even
48
+ * Returns true if the given object is an instance of AuthorizationExceptionRule. This is designed to work even
49
49
  * when multiple copies of the Pulumi SDK have been loaded into the same process.
50
50
  */
51
- static isInstance(obj: any): obj is Rule;
51
+ static isInstance(obj: any): obj is AuthorizationExceptionRule;
52
52
  /**
53
53
  * List of child conditions. `condition_type` must be one of `ConditionAndBlock` or `ConditionOrBlock`.
54
54
  */
55
- readonly childrens: pulumi.Output<outputs.DeviceAdminAuthorizationException.RuleChildren[] | undefined>;
55
+ readonly childrens: pulumi.Output<outputs.deviceadmin.AuthorizationExceptionRuleChildren[] | undefined>;
56
56
  /**
57
57
  * Command sets enforce the specified list of commands that can be executed by a device administrator
58
58
  */
@@ -118,22 +118,22 @@ export declare class Rule extends pulumi.CustomResource {
118
118
  */
119
119
  readonly state: pulumi.Output<string | undefined>;
120
120
  /**
121
- * Create a Rule resource with the given unique name, arguments, and options.
121
+ * Create a AuthorizationExceptionRule resource with the given unique name, arguments, and options.
122
122
  *
123
123
  * @param name The _unique_ name of the resource.
124
124
  * @param args The arguments to use to populate this resource's properties.
125
125
  * @param opts A bag of options that control this resource's behavior.
126
126
  */
127
- constructor(name: string, args: RuleArgs, opts?: pulumi.CustomResourceOptions);
127
+ constructor(name: string, args: AuthorizationExceptionRuleArgs, opts?: pulumi.CustomResourceOptions);
128
128
  }
129
129
  /**
130
- * Input properties used for looking up and filtering Rule resources.
130
+ * Input properties used for looking up and filtering AuthorizationExceptionRule resources.
131
131
  */
132
- export interface RuleState {
132
+ export interface AuthorizationExceptionRuleState {
133
133
  /**
134
134
  * List of child conditions. `condition_type` must be one of `ConditionAndBlock` or `ConditionOrBlock`.
135
135
  */
136
- childrens?: pulumi.Input<pulumi.Input<inputs.DeviceAdminAuthorizationException.RuleChildren>[]>;
136
+ childrens?: pulumi.Input<pulumi.Input<inputs.deviceadmin.AuthorizationExceptionRuleChildren>[]>;
137
137
  /**
138
138
  * Command sets enforce the specified list of commands that can be executed by a device administrator
139
139
  */
@@ -200,13 +200,13 @@ export interface RuleState {
200
200
  state?: pulumi.Input<string>;
201
201
  }
202
202
  /**
203
- * The set of arguments for constructing a Rule resource.
203
+ * The set of arguments for constructing a AuthorizationExceptionRule resource.
204
204
  */
205
- export interface RuleArgs {
205
+ export interface AuthorizationExceptionRuleArgs {
206
206
  /**
207
207
  * List of child conditions. `condition_type` must be one of `ConditionAndBlock` or `ConditionOrBlock`.
208
208
  */
209
- childrens?: pulumi.Input<pulumi.Input<inputs.DeviceAdminAuthorizationException.RuleChildren>[]>;
209
+ childrens?: pulumi.Input<pulumi.Input<inputs.deviceadmin.AuthorizationExceptionRuleChildren>[]>;
210
210
  /**
211
211
  * Command sets enforce the specified list of commands that can be executed by a device administrator
212
212
  */
@@ -2,7 +2,7 @@
2
2
  // *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  // *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
  Object.defineProperty(exports, "__esModule", { value: true });
5
- exports.Rule = void 0;
5
+ exports.AuthorizationExceptionRule = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("../utilities");
8
8
  /**
@@ -14,7 +14,7 @@ const utilities = require("../utilities");
14
14
  * import * as pulumi from "@pulumi/pulumi";
15
15
  * import * as ise from "@pulumi/ise";
16
16
  *
17
- * const example = new ise.deviceadminauthorizationexception.Rule("example", {
17
+ * const example = new ise.deviceadmin.AuthorizationExceptionRule("example", {
18
18
  * policySetId: "d82952cb-b901-4b09-b363-5ebf39bdbaf9",
19
19
  * name: "Rule1",
20
20
  * "default": false,
@@ -34,12 +34,12 @@ const utilities = require("../utilities");
34
34
  * ## Import
35
35
  *
36
36
  * ```sh
37
- * $ pulumi import ise:DeviceAdminAuthorizationException/rule:Rule example "76d24097-41c4-4558-a4d0-a8c07ac08470,76d24097-41c4-4558-a4d0-a8c07ac08470"
37
+ * $ pulumi import ise:deviceadmin/authorizationExceptionRule:AuthorizationExceptionRule example "76d24097-41c4-4558-a4d0-a8c07ac08470,76d24097-41c4-4558-a4d0-a8c07ac08470"
38
38
  * ```
39
39
  */
40
- class Rule extends pulumi.CustomResource {
40
+ class AuthorizationExceptionRule extends pulumi.CustomResource {
41
41
  /**
42
- * Get an existing Rule resource's state with the given name, ID, and optional extra
42
+ * Get an existing AuthorizationExceptionRule resource's state with the given name, ID, and optional extra
43
43
  * properties used to qualify the lookup.
44
44
  *
45
45
  * @param name The _unique_ name of the resulting resource.
@@ -48,17 +48,17 @@ class Rule extends pulumi.CustomResource {
48
48
  * @param opts Optional settings to control the behavior of the CustomResource.
49
49
  */
50
50
  static get(name, id, state, opts) {
51
- return new Rule(name, state, Object.assign(Object.assign({}, opts), { id: id }));
51
+ return new AuthorizationExceptionRule(name, state, Object.assign(Object.assign({}, opts), { id: id }));
52
52
  }
53
53
  /**
54
- * Returns true if the given object is an instance of Rule. This is designed to work even
54
+ * Returns true if the given object is an instance of AuthorizationExceptionRule. This is designed to work even
55
55
  * when multiple copies of the Pulumi SDK have been loaded into the same process.
56
56
  */
57
57
  static isInstance(obj) {
58
58
  if (obj === undefined || obj === null) {
59
59
  return false;
60
60
  }
61
- return obj['__pulumiType'] === Rule.__pulumiType;
61
+ return obj['__pulumiType'] === AuthorizationExceptionRule.__pulumiType;
62
62
  }
63
63
  constructor(name, argsOrState, opts) {
64
64
  let resourceInputs = {};
@@ -105,10 +105,10 @@ class Rule extends pulumi.CustomResource {
105
105
  resourceInputs["state"] = args ? args.state : undefined;
106
106
  }
107
107
  opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
108
- super(Rule.__pulumiType, name, resourceInputs, opts);
108
+ super(AuthorizationExceptionRule.__pulumiType, name, resourceInputs, opts);
109
109
  }
110
110
  }
111
- exports.Rule = Rule;
111
+ exports.AuthorizationExceptionRule = AuthorizationExceptionRule;
112
112
  /** @internal */
113
- Rule.__pulumiType = 'ise:DeviceAdminAuthorizationException/rule:Rule';
114
- //# sourceMappingURL=rule.js.map
113
+ AuthorizationExceptionRule.__pulumiType = 'ise:deviceadmin/authorizationExceptionRule:AuthorizationExceptionRule';
114
+ //# sourceMappingURL=authorizationExceptionRule.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"authorizationExceptionRule.js","sourceRoot":"","sources":["../../deviceadmin/authorizationExceptionRule.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA+BG;AACH,MAAa,0BAA2B,SAAQ,MAAM,CAAC,cAAc;IACjE;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAuC,EAAE,IAAmC;QACrI,OAAO,IAAI,0BAA0B,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACjF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,0BAA0B,CAAC,YAAY,CAAC;IAC3E,CAAC;IA+ED,YAAY,IAAY,EAAE,WAA8E,EAAE,IAAmC;QACzI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA0D,CAAC;YACzE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,yBAAyB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,yBAAyB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,0BAA0B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7D;aAAM;YACH,MAAM,IAAI,GAAG,WAAyD,CAAC;YACvE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,WAAW,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACxD,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,yBAAyB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,yBAAyB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,0BAA0B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,0BAA0B,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC/E,CAAC;;AAtJL,gEAuJC;AAzIG,gBAAgB;AACO,uCAAY,GAAG,uEAAuE,CAAC"}
@@ -10,7 +10,7 @@ import * as outputs from "../types/output";
10
10
  * import * as pulumi from "@pulumi/pulumi";
11
11
  * import * as ise from "@pulumi/ise";
12
12
  *
13
- * const example = new ise.deviceadminauthorizationglobalexception.Rule("example", {
13
+ * const example = new ise.deviceadmin.AuthorizationGlobalExceptionRule("example", {
14
14
  * name: "Rule1",
15
15
  * "default": false,
16
16
  * rank: 0,
@@ -29,12 +29,12 @@ import * as outputs from "../types/output";
29
29
  * ## Import
30
30
  *
31
31
  * ```sh
32
- * $ pulumi import ise:DeviceAdminAuthorizationGlobalException/rule:Rule example "76d24097-41c4-4558-a4d0-a8c07ac08470"
32
+ * $ pulumi import ise:deviceadmin/authorizationGlobalExceptionRule:AuthorizationGlobalExceptionRule example "76d24097-41c4-4558-a4d0-a8c07ac08470"
33
33
  * ```
34
34
  */
35
- export declare class Rule extends pulumi.CustomResource {
35
+ export declare class AuthorizationGlobalExceptionRule extends pulumi.CustomResource {
36
36
  /**
37
- * Get an existing Rule resource's state with the given name, ID, and optional extra
37
+ * Get an existing AuthorizationGlobalExceptionRule resource's state with the given name, ID, and optional extra
38
38
  * properties used to qualify the lookup.
39
39
  *
40
40
  * @param name The _unique_ name of the resulting resource.
@@ -42,16 +42,16 @@ export declare class Rule extends pulumi.CustomResource {
42
42
  * @param state Any extra arguments used during the lookup.
43
43
  * @param opts Optional settings to control the behavior of the CustomResource.
44
44
  */
45
- static get(name: string, id: pulumi.Input<pulumi.ID>, state?: RuleState, opts?: pulumi.CustomResourceOptions): Rule;
45
+ static get(name: string, id: pulumi.Input<pulumi.ID>, state?: AuthorizationGlobalExceptionRuleState, opts?: pulumi.CustomResourceOptions): AuthorizationGlobalExceptionRule;
46
46
  /**
47
- * Returns true if the given object is an instance of Rule. This is designed to work even
47
+ * Returns true if the given object is an instance of AuthorizationGlobalExceptionRule. This is designed to work even
48
48
  * when multiple copies of the Pulumi SDK have been loaded into the same process.
49
49
  */
50
- static isInstance(obj: any): obj is Rule;
50
+ static isInstance(obj: any): obj is AuthorizationGlobalExceptionRule;
51
51
  /**
52
52
  * List of child conditions. `condition_type` must be one of `ConditionAndBlock` or `ConditionOrBlock`.
53
53
  */
54
- readonly childrens: pulumi.Output<outputs.DeviceAdminAuthorizationGlobalException.RuleChildren[] | undefined>;
54
+ readonly childrens: pulumi.Output<outputs.deviceadmin.AuthorizationGlobalExceptionRuleChildren[] | undefined>;
55
55
  /**
56
56
  * Command sets enforce the specified list of commands that can be executed by a device administrator
57
57
  */
@@ -113,22 +113,22 @@ export declare class Rule extends pulumi.CustomResource {
113
113
  */
114
114
  readonly state: pulumi.Output<string | undefined>;
115
115
  /**
116
- * Create a Rule resource with the given unique name, arguments, and options.
116
+ * Create a AuthorizationGlobalExceptionRule resource with the given unique name, arguments, and options.
117
117
  *
118
118
  * @param name The _unique_ name of the resource.
119
119
  * @param args The arguments to use to populate this resource's properties.
120
120
  * @param opts A bag of options that control this resource's behavior.
121
121
  */
122
- constructor(name: string, args?: RuleArgs, opts?: pulumi.CustomResourceOptions);
122
+ constructor(name: string, args?: AuthorizationGlobalExceptionRuleArgs, opts?: pulumi.CustomResourceOptions);
123
123
  }
124
124
  /**
125
- * Input properties used for looking up and filtering Rule resources.
125
+ * Input properties used for looking up and filtering AuthorizationGlobalExceptionRule resources.
126
126
  */
127
- export interface RuleState {
127
+ export interface AuthorizationGlobalExceptionRuleState {
128
128
  /**
129
129
  * List of child conditions. `condition_type` must be one of `ConditionAndBlock` or `ConditionOrBlock`.
130
130
  */
131
- childrens?: pulumi.Input<pulumi.Input<inputs.DeviceAdminAuthorizationGlobalException.RuleChildren>[]>;
131
+ childrens?: pulumi.Input<pulumi.Input<inputs.deviceadmin.AuthorizationGlobalExceptionRuleChildren>[]>;
132
132
  /**
133
133
  * Command sets enforce the specified list of commands that can be executed by a device administrator
134
134
  */
@@ -191,13 +191,13 @@ export interface RuleState {
191
191
  state?: pulumi.Input<string>;
192
192
  }
193
193
  /**
194
- * The set of arguments for constructing a Rule resource.
194
+ * The set of arguments for constructing a AuthorizationGlobalExceptionRule resource.
195
195
  */
196
- export interface RuleArgs {
196
+ export interface AuthorizationGlobalExceptionRuleArgs {
197
197
  /**
198
198
  * List of child conditions. `condition_type` must be one of `ConditionAndBlock` or `ConditionOrBlock`.
199
199
  */
200
- childrens?: pulumi.Input<pulumi.Input<inputs.DeviceAdminAuthorizationGlobalException.RuleChildren>[]>;
200
+ childrens?: pulumi.Input<pulumi.Input<inputs.deviceadmin.AuthorizationGlobalExceptionRuleChildren>[]>;
201
201
  /**
202
202
  * Command sets enforce the specified list of commands that can be executed by a device administrator
203
203
  */