@pulumi/scm 1.0.0-alpha.1762562132 → 1.0.0-alpha.1762572739
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/address.d.ts +3 -3
- package/address.js +3 -3
- package/addressGroup.d.ts +2 -2
- package/addressGroup.js +2 -2
- package/{aggregateEthernetInterface.d.ts → aggregateInterface.d.ts} +26 -24
- package/{aggregateEthernetInterface.js → aggregateInterface.js} +13 -11
- package/aggregateInterface.js.map +1 -0
- package/antiSpywareSignature.d.ts +3 -3
- package/appOverrideRule.d.ts +128 -3
- package/appOverrideRule.js +95 -0
- package/appOverrideRule.js.map +1 -1
- package/applicationFilter.d.ts +16 -0
- package/applicationFilter.js +16 -0
- package/applicationFilter.js.map +1 -1
- package/authenticationRule.d.ts +123 -0
- package/authenticationRule.js +103 -0
- package/authenticationRule.js.map +1 -1
- package/bgpRouteMapRedistribution.d.ts +6 -6
- package/certificateProfile.d.ts +29 -0
- package/certificateProfile.js +29 -0
- package/certificateProfile.js.map +1 -1
- package/decryptionProfile.d.ts +139 -0
- package/decryptionProfile.js +139 -0
- package/decryptionProfile.js.map +1 -1
- package/decryptionRule.d.ts +139 -0
- package/decryptionRule.js +119 -0
- package/decryptionRule.js.map +1 -1
- package/dnsProxy.d.ts +6 -6
- package/dnsSecurityProfile.d.ts +2 -0
- package/dnsSecurityProfile.js +2 -0
- package/dnsSecurityProfile.js.map +1 -1
- package/dynamicUserGroup.d.ts +3 -3
- package/dynamicUserGroup.js +3 -3
- package/ethernetInterface.d.ts +13 -11
- package/ethernetInterface.js +2 -0
- package/ethernetInterface.js.map +1 -1
- package/externalDynamicList.d.ts +80 -0
- package/externalDynamicList.js +80 -0
- package/externalDynamicList.js.map +1 -1
- package/folder.d.ts +60 -0
- package/folder.js +60 -0
- package/folder.js.map +1 -1
- package/getAddressGroupList.d.ts +4 -4
- package/getAddressGroupList.js +4 -4
- package/getAddressList.d.ts +4 -4
- package/getAddressList.js +4 -4
- package/getAggregateInterface.d.ts +116 -0
- package/getAggregateInterface.js +68 -0
- package/getAggregateInterface.js.map +1 -0
- package/{getAggregateEthernetInterfaceList.d.ts → getAggregateInterfaceList.d.ts} +35 -9
- package/getAggregateInterfaceList.js +66 -0
- package/getAggregateInterfaceList.js.map +1 -0
- package/getAntiSpywareProfileList.d.ts +2 -2
- package/getAntiSpywareProfileList.js +2 -2
- package/getAntiSpywareSignature.d.ts +1 -1
- package/getAntiSpywareSignatureList.d.ts +2 -2
- package/getAntiSpywareSignatureList.js +2 -2
- package/getAppOverrideRule.d.ts +65 -1
- package/getAppOverrideRule.js +52 -0
- package/getAppOverrideRule.js.map +1 -1
- package/getAppOverrideRuleList.d.ts +48 -2
- package/getAppOverrideRuleList.js +36 -2
- package/getAppOverrideRuleList.js.map +1 -1
- package/getApplicationGroupList.d.ts +4 -4
- package/getApplicationGroupList.js +4 -4
- package/getApplicationList.d.ts +2 -2
- package/getApplicationList.js +2 -2
- package/getAuthenticationRule.d.ts +74 -0
- package/getAuthenticationRule.js +62 -0
- package/getAuthenticationRule.js.map +1 -1
- package/getAuthenticationRuleList.d.ts +50 -2
- package/getAuthenticationRuleList.js +38 -2
- package/getAuthenticationRuleList.js.map +1 -1
- package/getBgpRouteMapRedistribution.d.ts +7 -7
- package/getCertificateProfileList.d.ts +2 -2
- package/getCertificateProfileList.js +2 -2
- package/getDecryptionProfile.d.ts +40 -0
- package/getDecryptionProfile.js +40 -0
- package/getDecryptionProfile.js.map +1 -1
- package/getDecryptionProfileList.d.ts +32 -0
- package/getDecryptionProfileList.js +32 -0
- package/getDecryptionProfileList.js.map +1 -1
- package/getDecryptionRule.d.ts +74 -0
- package/getDecryptionRule.js +62 -0
- package/getDecryptionRule.js.map +1 -1
- package/getDecryptionRuleList.d.ts +48 -2
- package/getDecryptionRuleList.js +36 -2
- package/getDecryptionRuleList.js.map +1 -1
- package/getDnsProxy.d.ts +1 -1
- package/getDnsSecurityProfile.d.ts +40 -0
- package/getDnsSecurityProfile.js +40 -0
- package/getDnsSecurityProfile.js.map +1 -1
- package/getDnsSecurityProfileList.d.ts +32 -0
- package/getDnsSecurityProfileList.js +32 -0
- package/getDnsSecurityProfileList.js.map +1 -1
- package/getDynamicUserGroupList.d.ts +4 -4
- package/getDynamicUserGroupList.js +4 -4
- package/getEthernetInterface.d.ts +40 -2
- package/getEthernetInterface.js +38 -0
- package/getEthernetInterface.js.map +1 -1
- package/getEthernetInterfaceList.d.ts +26 -0
- package/getEthernetInterfaceList.js +26 -0
- package/getEthernetInterfaceList.js.map +1 -1
- package/getExternalDynamicListList.d.ts +4 -4
- package/getExternalDynamicListList.js +4 -4
- package/getFolder.d.ts +36 -0
- package/getFolder.js +36 -0
- package/getFolder.js.map +1 -1
- package/getHipObjectList.d.ts +4 -4
- package/getHipObjectList.js +4 -4
- package/getHipProfileList.d.ts +4 -4
- package/getHipProfileList.js +4 -4
- package/getInterfaceManagementProfile.d.ts +89 -8
- package/getInterfaceManagementProfile.js +80 -0
- package/getInterfaceManagementProfile.js.map +1 -1
- package/getInterfaceManagementProfileList.d.ts +42 -0
- package/getInterfaceManagementProfileList.js +42 -0
- package/getInterfaceManagementProfileList.js.map +1 -1
- package/getLayer2Subinterface.d.ts +42 -2
- package/getLayer2Subinterface.js +40 -0
- package/getLayer2Subinterface.js.map +1 -1
- package/getLayer2SubinterfaceList.d.ts +26 -0
- package/getLayer2SubinterfaceList.js +26 -0
- package/getLayer2SubinterfaceList.js.map +1 -1
- package/getLayer3Subinterface.d.ts +45 -3
- package/getLayer3Subinterface.js +42 -0
- package/getLayer3Subinterface.js.map +1 -1
- package/getLayer3SubinterfaceList.d.ts +26 -0
- package/getLayer3SubinterfaceList.js +26 -0
- package/getLayer3SubinterfaceList.js.map +1 -1
- package/getLogicalRouter.d.ts +38 -0
- package/getLogicalRouter.js +38 -0
- package/getLogicalRouter.js.map +1 -1
- package/getLogicalRouterList.d.ts +40 -0
- package/getLogicalRouterList.js +30 -0
- package/getLogicalRouterList.js.map +1 -1
- package/getLoopbackInterface.d.ts +49 -7
- package/getLoopbackInterface.js +38 -0
- package/getLoopbackInterface.js.map +1 -1
- package/getLoopbackInterfaceList.d.ts +26 -0
- package/getLoopbackInterfaceList.js +26 -0
- package/getLoopbackInterfaceList.js.map +1 -1
- package/getNatRule.d.ts +86 -14
- package/getNatRule.js +76 -0
- package/getNatRule.js.map +1 -1
- package/getNatRuleList.d.ts +52 -2
- package/getNatRuleList.js +40 -2
- package/getNatRuleList.js.map +1 -1
- package/getPbfRule.d.ts +88 -0
- package/getPbfRule.js +88 -0
- package/getPbfRule.js.map +1 -1
- package/getPbfRuleList.d.ts +34 -0
- package/getPbfRuleList.js +34 -0
- package/getPbfRuleList.js.map +1 -1
- package/getQosPolicyRule.d.ts +72 -0
- package/getQosPolicyRule.js +60 -0
- package/getQosPolicyRule.js.map +1 -1
- package/getQosPolicyRuleList.d.ts +48 -2
- package/getQosPolicyRuleList.js +36 -2
- package/getQosPolicyRuleList.js.map +1 -1
- package/getRadiusServerProfile.d.ts +54 -0
- package/getRadiusServerProfile.js +54 -0
- package/getRadiusServerProfile.js.map +1 -1
- package/getSdwanTrafficDistributionProfile.d.ts +1 -1
- package/getSecurityRule.d.ts +106 -0
- package/getSecurityRule.js +94 -0
- package/getSecurityRule.js.map +1 -1
- package/getSecurityRuleList.d.ts +46 -2
- package/getSecurityRuleList.js +34 -2
- package/getSecurityRuleList.js.map +1 -1
- package/getServiceConnection.d.ts +177 -1
- package/getServiceConnection.js +176 -0
- package/getServiceConnection.js.map +1 -1
- package/getServiceConnectionGroup.d.ts +208 -0
- package/getServiceConnectionGroup.js +208 -0
- package/getServiceConnectionGroup.js.map +1 -1
- package/getServiceGroupList.d.ts +2 -2
- package/getServiceGroupList.js +2 -2
- package/getServiceList.d.ts +4 -4
- package/getServiceList.js +4 -4
- package/getSnippet.d.ts +48 -0
- package/getSnippet.js +48 -0
- package/getSnippet.js.map +1 -1
- package/getSnippetList.d.ts +24 -0
- package/getSnippetList.js +24 -0
- package/getSnippetList.js.map +1 -1
- package/getTagList.d.ts +2 -2
- package/getTagList.js +2 -2
- package/getTunnelInterface.d.ts +42 -4
- package/getTunnelInterface.js +38 -0
- package/getTunnelInterface.js.map +1 -1
- package/getTunnelInterfaceList.d.ts +26 -0
- package/getTunnelInterfaceList.js +26 -0
- package/getTunnelInterfaceList.js.map +1 -1
- package/getUrlAccessProfileList.d.ts +2 -2
- package/getUrlAccessProfileList.js +2 -2
- package/getUrlCategoryList.d.ts +4 -4
- package/getUrlCategoryList.js +4 -4
- package/getVlanInterface.d.ts +46 -6
- package/getVlanInterface.js +40 -0
- package/getVlanInterface.js.map +1 -1
- package/getVlanInterfaceList.d.ts +26 -0
- package/getVlanInterfaceList.js +26 -0
- package/getVlanInterfaceList.js.map +1 -1
- package/getVulnerabilityProtectionProfileList.d.ts +2 -2
- package/getVulnerabilityProtectionProfileList.js +2 -2
- package/getVulnerabilityProtectionSignature.d.ts +41 -1
- package/getVulnerabilityProtectionSignature.js +40 -0
- package/getVulnerabilityProtectionSignature.js.map +1 -1
- package/getVulnerabilityProtectionSignatureList.d.ts +32 -0
- package/getVulnerabilityProtectionSignatureList.js +32 -0
- package/getVulnerabilityProtectionSignatureList.js.map +1 -1
- package/getZone.d.ts +44 -0
- package/getZone.js +44 -0
- package/getZone.js.map +1 -1
- package/getZoneList.d.ts +26 -0
- package/getZoneList.js +26 -0
- package/getZoneList.js.map +1 -1
- package/ikeGateway.d.ts +49 -0
- package/ikeGateway.js +49 -0
- package/ikeGateway.js.map +1 -1
- package/index.d.ts +9 -9
- package/index.js +12 -12
- package/index.js.map +1 -1
- package/interfaceManagementProfile.d.ts +56 -24
- package/interfaceManagementProfile.js +30 -0
- package/interfaceManagementProfile.js.map +1 -1
- package/ipsecCryptoProfile.d.ts +28 -0
- package/ipsecCryptoProfile.js +28 -0
- package/ipsecCryptoProfile.js.map +1 -1
- package/ipsecTunnel.d.ts +66 -0
- package/ipsecTunnel.js +66 -0
- package/ipsecTunnel.js.map +1 -1
- package/layer2Subinterface.d.ts +36 -7
- package/layer2Subinterface.js +32 -0
- package/layer2Subinterface.js.map +1 -1
- package/layer3Subinterface.d.ts +70 -11
- package/layer3Subinterface.js +59 -0
- package/layer3Subinterface.js.map +1 -1
- package/logicalRouter.d.ts +2 -0
- package/logicalRouter.js +2 -0
- package/logicalRouter.js.map +1 -1
- package/loopbackInterface.d.ts +58 -15
- package/loopbackInterface.js +35 -2
- package/loopbackInterface.js.map +1 -1
- package/natRule.d.ts +135 -42
- package/natRule.js +121 -8
- package/natRule.js.map +1 -1
- package/package.json +2 -2
- package/pbfRule.d.ts +89 -0
- package/pbfRule.js +89 -0
- package/pbfRule.js.map +1 -1
- package/qosPolicyRule.d.ts +95 -0
- package/qosPolicyRule.js +75 -0
- package/qosPolicyRule.js.map +1 -1
- package/radiusServerProfile.d.ts +38 -0
- package/radiusServerProfile.js +38 -0
- package/radiusServerProfile.js.map +1 -1
- package/remoteNetwork.d.ts +81 -0
- package/remoteNetwork.js +81 -0
- package/remoteNetwork.js.map +1 -1
- package/sdwanTrafficDistributionProfile.d.ts +4 -4
- package/securityRule.d.ts +181 -0
- package/securityRule.js +161 -0
- package/securityRule.js.map +1 -1
- package/serviceConnection.d.ts +82 -3
- package/serviceConnection.js +81 -2
- package/serviceConnection.js.map +1 -1
- package/serviceConnectionGroup.d.ts +100 -0
- package/serviceConnectionGroup.js +100 -0
- package/serviceConnectionGroup.js.map +1 -1
- package/serviceGroup.d.ts +2 -2
- package/serviceGroup.js +2 -2
- package/snippet.d.ts +23 -0
- package/snippet.js +23 -0
- package/snippet.js.map +1 -1
- package/tag.d.ts +3 -3
- package/tag.js +3 -3
- package/tunnelInterface.d.ts +42 -12
- package/tunnelInterface.js +32 -2
- package/tunnelInterface.js.map +1 -1
- package/types/input.d.ts +607 -335
- package/types/output.d.ts +1945 -1069
- package/vlanInterface.d.ts +40 -20
- package/vlanInterface.js +20 -0
- package/vlanInterface.js.map +1 -1
- package/vulnerabilityProtectionSignature.d.ts +12 -10
- package/vulnerabilityProtectionSignature.js +14 -0
- package/vulnerabilityProtectionSignature.js.map +1 -1
- package/zone.d.ts +71 -0
- package/zone.js +71 -0
- package/zone.js.map +1 -1
- package/aggregateEthernetInterface.js.map +0 -1
- package/getAggregateEthernetInterface.d.ts +0 -78
- package/getAggregateEthernetInterface.js +0 -30
- package/getAggregateEthernetInterface.js.map +0 -1
- package/getAggregateEthernetInterfaceList.js +0 -40
- package/getAggregateEthernetInterfaceList.js.map +0 -1
package/getServiceConnection.js
CHANGED
|
@@ -9,6 +9,94 @@ const utilities = require("./utilities");
|
|
|
9
9
|
* ServiceConnection data source
|
|
10
10
|
*
|
|
11
11
|
* ## Example Usage
|
|
12
|
+
*
|
|
13
|
+
* ```typescript
|
|
14
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
15
|
+
* import * as scm from "@pulumi/scm";
|
|
16
|
+
*
|
|
17
|
+
* const config = new pulumi.Config();
|
|
18
|
+
* // The folder scope for the SCM resource (e.g., 'Shared', 'Predefined', or a specific folder name).
|
|
19
|
+
* const folderScope = config.get("folderScope") || "Service Connections";
|
|
20
|
+
* //# 1. Define the IKE Crypto Profile (IKE Phase 1)
|
|
21
|
+
* // Note: The resource name is plural: "scm_ike_crypto_profile"
|
|
22
|
+
* const example = new scm.IkeCryptoProfile("example", {
|
|
23
|
+
* name: "example-ike-crypto_data",
|
|
24
|
+
* folder: folderScope,
|
|
25
|
+
* hashes: ["sha256"],
|
|
26
|
+
* dhGroups: ["group14"],
|
|
27
|
+
* encryptions: ["aes-256-cbc"],
|
|
28
|
+
* });
|
|
29
|
+
* //# 2. Define the IPsec Crypto Profile (IKE Phase 2)
|
|
30
|
+
* // Note: The resource name is plural and nested blocks now use an equals sign (=).
|
|
31
|
+
* const exampleIpsecCryptoProfile = new scm.IpsecCryptoProfile("example", {
|
|
32
|
+
* name: "panw-IPSec-Crypto_data",
|
|
33
|
+
* folder: folderScope,
|
|
34
|
+
* esp: {
|
|
35
|
+
* encryptions: ["aes-256-gcm"],
|
|
36
|
+
* authentications: ["sha256"],
|
|
37
|
+
* },
|
|
38
|
+
* dhGroup: "group14",
|
|
39
|
+
* lifetime: {
|
|
40
|
+
* hours: 8,
|
|
41
|
+
* },
|
|
42
|
+
* });
|
|
43
|
+
* //# 3. Define the IKE Gateway
|
|
44
|
+
* // Note: The resource name is plural and nested blocks now use an equals sign (=).
|
|
45
|
+
* const exampleIkeGateway = new scm.IkeGateway("example", {
|
|
46
|
+
* name: "example-gateway_data",
|
|
47
|
+
* folder: folderScope,
|
|
48
|
+
* peerAddress: {
|
|
49
|
+
* ip: "1.1.1.1",
|
|
50
|
+
* },
|
|
51
|
+
* authentication: {
|
|
52
|
+
* preSharedKey: {
|
|
53
|
+
* key: "secret",
|
|
54
|
+
* },
|
|
55
|
+
* },
|
|
56
|
+
* protocol: {
|
|
57
|
+
* ikev1: {
|
|
58
|
+
* ikeCryptoProfile: example.name,
|
|
59
|
+
* },
|
|
60
|
+
* },
|
|
61
|
+
* });
|
|
62
|
+
* //# 4. Define the IPsec Tunnel
|
|
63
|
+
* // Note: Nested 'auto_key' block uses an equals sign (=).
|
|
64
|
+
* const exampleIpsecTunnel = new scm.IpsecTunnel("example", {
|
|
65
|
+
* name: "example-tunnel_data",
|
|
66
|
+
* folder: folderScope,
|
|
67
|
+
* tunnelInterface: "tunnel",
|
|
68
|
+
* antiReplay: true,
|
|
69
|
+
* copyTos: false,
|
|
70
|
+
* enableGreEncapsulation: false,
|
|
71
|
+
* autoKey: {
|
|
72
|
+
* ikeGateways: [{
|
|
73
|
+
* name: exampleIkeGateway.name,
|
|
74
|
+
* }],
|
|
75
|
+
* ipsecCryptoProfile: exampleIpsecCryptoProfile.name,
|
|
76
|
+
* },
|
|
77
|
+
* }, {
|
|
78
|
+
* dependsOn: [exampleIkeGateway],
|
|
79
|
+
* });
|
|
80
|
+
* const siteAVpnSc = new scm.ServiceConnection("site_a_vpn_sc", {
|
|
81
|
+
* name: "creating_a_service_connection_data",
|
|
82
|
+
* region: "us-west-1",
|
|
83
|
+
* ipsecTunnel: exampleIpsecTunnel.name,
|
|
84
|
+
* subnets: [
|
|
85
|
+
* "10.1.0.0/16",
|
|
86
|
+
* "172.16.0.0/24",
|
|
87
|
+
* ],
|
|
88
|
+
* sourceNat: true,
|
|
89
|
+
* });
|
|
90
|
+
* //------------------------------------------------------
|
|
91
|
+
* // Data Soruce
|
|
92
|
+
* //------------------------------------------------------
|
|
93
|
+
* const createdConnLookup = scm.getServiceConnectionOutput({
|
|
94
|
+
* id: siteAVpnSc.id,
|
|
95
|
+
* });
|
|
96
|
+
* export const createdServiceConnectionId = createdConnLookup.apply(createdConnLookup => createdConnLookup.id);
|
|
97
|
+
* export const createdServiceConnectionRegion = createdConnLookup.apply(createdConnLookup => createdConnLookup.region);
|
|
98
|
+
* export const createdServiceConnectionSubnets = createdConnLookup.apply(createdConnLookup => createdConnLookup.subnets);
|
|
99
|
+
* ```
|
|
12
100
|
*/
|
|
13
101
|
function getServiceConnection(args, opts) {
|
|
14
102
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
|
|
@@ -22,6 +110,94 @@ exports.getServiceConnection = getServiceConnection;
|
|
|
22
110
|
* ServiceConnection data source
|
|
23
111
|
*
|
|
24
112
|
* ## Example Usage
|
|
113
|
+
*
|
|
114
|
+
* ```typescript
|
|
115
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
116
|
+
* import * as scm from "@pulumi/scm";
|
|
117
|
+
*
|
|
118
|
+
* const config = new pulumi.Config();
|
|
119
|
+
* // The folder scope for the SCM resource (e.g., 'Shared', 'Predefined', or a specific folder name).
|
|
120
|
+
* const folderScope = config.get("folderScope") || "Service Connections";
|
|
121
|
+
* //# 1. Define the IKE Crypto Profile (IKE Phase 1)
|
|
122
|
+
* // Note: The resource name is plural: "scm_ike_crypto_profile"
|
|
123
|
+
* const example = new scm.IkeCryptoProfile("example", {
|
|
124
|
+
* name: "example-ike-crypto_data",
|
|
125
|
+
* folder: folderScope,
|
|
126
|
+
* hashes: ["sha256"],
|
|
127
|
+
* dhGroups: ["group14"],
|
|
128
|
+
* encryptions: ["aes-256-cbc"],
|
|
129
|
+
* });
|
|
130
|
+
* //# 2. Define the IPsec Crypto Profile (IKE Phase 2)
|
|
131
|
+
* // Note: The resource name is plural and nested blocks now use an equals sign (=).
|
|
132
|
+
* const exampleIpsecCryptoProfile = new scm.IpsecCryptoProfile("example", {
|
|
133
|
+
* name: "panw-IPSec-Crypto_data",
|
|
134
|
+
* folder: folderScope,
|
|
135
|
+
* esp: {
|
|
136
|
+
* encryptions: ["aes-256-gcm"],
|
|
137
|
+
* authentications: ["sha256"],
|
|
138
|
+
* },
|
|
139
|
+
* dhGroup: "group14",
|
|
140
|
+
* lifetime: {
|
|
141
|
+
* hours: 8,
|
|
142
|
+
* },
|
|
143
|
+
* });
|
|
144
|
+
* //# 3. Define the IKE Gateway
|
|
145
|
+
* // Note: The resource name is plural and nested blocks now use an equals sign (=).
|
|
146
|
+
* const exampleIkeGateway = new scm.IkeGateway("example", {
|
|
147
|
+
* name: "example-gateway_data",
|
|
148
|
+
* folder: folderScope,
|
|
149
|
+
* peerAddress: {
|
|
150
|
+
* ip: "1.1.1.1",
|
|
151
|
+
* },
|
|
152
|
+
* authentication: {
|
|
153
|
+
* preSharedKey: {
|
|
154
|
+
* key: "secret",
|
|
155
|
+
* },
|
|
156
|
+
* },
|
|
157
|
+
* protocol: {
|
|
158
|
+
* ikev1: {
|
|
159
|
+
* ikeCryptoProfile: example.name,
|
|
160
|
+
* },
|
|
161
|
+
* },
|
|
162
|
+
* });
|
|
163
|
+
* //# 4. Define the IPsec Tunnel
|
|
164
|
+
* // Note: Nested 'auto_key' block uses an equals sign (=).
|
|
165
|
+
* const exampleIpsecTunnel = new scm.IpsecTunnel("example", {
|
|
166
|
+
* name: "example-tunnel_data",
|
|
167
|
+
* folder: folderScope,
|
|
168
|
+
* tunnelInterface: "tunnel",
|
|
169
|
+
* antiReplay: true,
|
|
170
|
+
* copyTos: false,
|
|
171
|
+
* enableGreEncapsulation: false,
|
|
172
|
+
* autoKey: {
|
|
173
|
+
* ikeGateways: [{
|
|
174
|
+
* name: exampleIkeGateway.name,
|
|
175
|
+
* }],
|
|
176
|
+
* ipsecCryptoProfile: exampleIpsecCryptoProfile.name,
|
|
177
|
+
* },
|
|
178
|
+
* }, {
|
|
179
|
+
* dependsOn: [exampleIkeGateway],
|
|
180
|
+
* });
|
|
181
|
+
* const siteAVpnSc = new scm.ServiceConnection("site_a_vpn_sc", {
|
|
182
|
+
* name: "creating_a_service_connection_data",
|
|
183
|
+
* region: "us-west-1",
|
|
184
|
+
* ipsecTunnel: exampleIpsecTunnel.name,
|
|
185
|
+
* subnets: [
|
|
186
|
+
* "10.1.0.0/16",
|
|
187
|
+
* "172.16.0.0/24",
|
|
188
|
+
* ],
|
|
189
|
+
* sourceNat: true,
|
|
190
|
+
* });
|
|
191
|
+
* //------------------------------------------------------
|
|
192
|
+
* // Data Soruce
|
|
193
|
+
* //------------------------------------------------------
|
|
194
|
+
* const createdConnLookup = scm.getServiceConnectionOutput({
|
|
195
|
+
* id: siteAVpnSc.id,
|
|
196
|
+
* });
|
|
197
|
+
* export const createdServiceConnectionId = createdConnLookup.apply(createdConnLookup => createdConnLookup.id);
|
|
198
|
+
* export const createdServiceConnectionRegion = createdConnLookup.apply(createdConnLookup => createdConnLookup.region);
|
|
199
|
+
* export const createdServiceConnectionSubnets = createdConnLookup.apply(createdConnLookup => createdConnLookup.subnets);
|
|
200
|
+
* ```
|
|
25
201
|
*/
|
|
26
202
|
function getServiceConnectionOutput(args, opts) {
|
|
27
203
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getServiceConnection.js","sourceRoot":"","sources":["../getServiceConnection.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"getServiceConnection.js","sourceRoot":"","sources":["../getServiceConnection.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA4FG;AACH,SAAgB,oBAAoB,CAAC,IAA8B,EAAE,IAA2B;IAC5F,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,qDAAqD,EAAE;QAChF,IAAI,EAAE,IAAI,CAAC,EAAE;QACb,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAND,oDAMC;AAkFD;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA4FG;AACH,SAAgB,0BAA0B,CAAC,IAAoC,EAAE,IAAiC;IAC9G,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,YAAY,CAAC,qDAAqD,EAAE;QACtF,IAAI,EAAE,IAAI,CAAC,EAAE;QACb,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAND,gEAMC"}
|
|
@@ -3,6 +3,110 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
3
3
|
* ServiceConnectionGroup data source
|
|
4
4
|
*
|
|
5
5
|
* ## Example Usage
|
|
6
|
+
*
|
|
7
|
+
* ```typescript
|
|
8
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
9
|
+
* import * as scm from "@pulumi/scm";
|
|
10
|
+
*
|
|
11
|
+
* const config = new pulumi.Config();
|
|
12
|
+
* // The folder scope for the SCM resource (e.g., 'Shared', 'Predefined', or a specific folder name).
|
|
13
|
+
* const folderScope = config.get("folderScope") || "Service Connections";
|
|
14
|
+
* //# 1. IKE Crypto Profile (IKE Phase 1)
|
|
15
|
+
* const example = new scm.IkeCryptoProfile("example", {
|
|
16
|
+
* name: "example-ike-crypto_sc_grp",
|
|
17
|
+
* folder: folderScope,
|
|
18
|
+
* hashes: ["sha256"],
|
|
19
|
+
* dhGroups: ["group14"],
|
|
20
|
+
* encryptions: ["aes-256-cbc"],
|
|
21
|
+
* });
|
|
22
|
+
* //# 2. IPsec Crypto Profile (IKE Phase 2)
|
|
23
|
+
* const exampleIpsecCryptoProfile = new scm.IpsecCryptoProfile("example", {
|
|
24
|
+
* name: "panw-IPSec-Crypto_sc_grp",
|
|
25
|
+
* folder: folderScope,
|
|
26
|
+
* esp: {
|
|
27
|
+
* encryptions: ["aes-256-gcm"],
|
|
28
|
+
* authentications: ["sha256"],
|
|
29
|
+
* },
|
|
30
|
+
* dhGroup: "group14",
|
|
31
|
+
* lifetime: {
|
|
32
|
+
* hours: 8,
|
|
33
|
+
* },
|
|
34
|
+
* });
|
|
35
|
+
* //# 3. IKE Gateway
|
|
36
|
+
* const exampleIkeGateway = new scm.IkeGateway("example", {
|
|
37
|
+
* name: "example-gateway_sc_grp",
|
|
38
|
+
* folder: folderScope,
|
|
39
|
+
* peerAddress: {
|
|
40
|
+
* ip: "1.1.1.1",
|
|
41
|
+
* },
|
|
42
|
+
* authentication: {
|
|
43
|
+
* preSharedKey: {
|
|
44
|
+
* key: "secret",
|
|
45
|
+
* },
|
|
46
|
+
* },
|
|
47
|
+
* protocol: {
|
|
48
|
+
* ikev1: {
|
|
49
|
+
* ikeCryptoProfile: example.name,
|
|
50
|
+
* },
|
|
51
|
+
* },
|
|
52
|
+
* });
|
|
53
|
+
* //# 4. IPsec Tunnel
|
|
54
|
+
* const exampleIpsecTunnel = new scm.IpsecTunnel("example", {
|
|
55
|
+
* name: "example-tunnel_sc_grp",
|
|
56
|
+
* folder: folderScope,
|
|
57
|
+
* tunnelInterface: "tunnel",
|
|
58
|
+
* antiReplay: true,
|
|
59
|
+
* copyTos: false,
|
|
60
|
+
* enableGreEncapsulation: false,
|
|
61
|
+
* autoKey: {
|
|
62
|
+
* ikeGateways: [{
|
|
63
|
+
* name: exampleIkeGateway.name,
|
|
64
|
+
* }],
|
|
65
|
+
* ipsecCryptoProfile: exampleIpsecCryptoProfile.name,
|
|
66
|
+
* },
|
|
67
|
+
* }, {
|
|
68
|
+
* dependsOn: [exampleIkeGateway],
|
|
69
|
+
* });
|
|
70
|
+
* //# 5. Service Connection (The target for the group)
|
|
71
|
+
* const siteAVpnSc = new scm.ServiceConnection("site_a_vpn_sc", {
|
|
72
|
+
* name: "creating_a_service_connection_sc_grp",
|
|
73
|
+
* region: "us-west-1a",
|
|
74
|
+
* ipsecTunnel: exampleIpsecTunnel.name,
|
|
75
|
+
* subnets: [
|
|
76
|
+
* "10.1.0.0/16",
|
|
77
|
+
* "172.16.0.0/24",
|
|
78
|
+
* ],
|
|
79
|
+
* sourceNat: false,
|
|
80
|
+
* });
|
|
81
|
+
* //# 5. Service Connection (The target for the group)
|
|
82
|
+
* const siteAVpnSc2 = new scm.ServiceConnection("site_a_vpn_sc_2", {
|
|
83
|
+
* name: "creating_a_service_connection_sc_grp_2",
|
|
84
|
+
* region: "us-west-1a",
|
|
85
|
+
* ipsecTunnel: exampleIpsecTunnel.name,
|
|
86
|
+
* subnets: [
|
|
87
|
+
* "10.1.0.0/16",
|
|
88
|
+
* "172.16.0.0/24",
|
|
89
|
+
* ],
|
|
90
|
+
* sourceNat: false,
|
|
91
|
+
* });
|
|
92
|
+
* //# 6. Service Connection Group (Groups the Service Connection created above)
|
|
93
|
+
* const exampleGroup = new scm.ServiceConnectionGroup("example_group", {
|
|
94
|
+
* name: "service-connection-group-app_sc_grp",
|
|
95
|
+
* targets: [
|
|
96
|
+
* siteAVpnSc.name,
|
|
97
|
+
* siteAVpnSc2.name,
|
|
98
|
+
* ],
|
|
99
|
+
* disableSnat: false,
|
|
100
|
+
* pbfOnly: true,
|
|
101
|
+
* });
|
|
102
|
+
* // ------------------------------------------------------------------
|
|
103
|
+
* // Data Source: SCM Service Connection Group (Single Lookup)
|
|
104
|
+
* // ------------------------------------------------------------------
|
|
105
|
+
* const groupLookup = scm.getServiceConnectionGroupOutput({
|
|
106
|
+
* id: exampleGroup.id,
|
|
107
|
+
* });
|
|
108
|
+
* export const lookedUpServiceConnectionGroupDetails = groupLookup;
|
|
109
|
+
* ```
|
|
6
110
|
*/
|
|
7
111
|
export declare function getServiceConnectionGroup(args: GetServiceConnectionGroupArgs, opts?: pulumi.InvokeOptions): Promise<GetServiceConnectionGroupResult>;
|
|
8
112
|
/**
|
|
@@ -48,6 +152,110 @@ export interface GetServiceConnectionGroupResult {
|
|
|
48
152
|
* ServiceConnectionGroup data source
|
|
49
153
|
*
|
|
50
154
|
* ## Example Usage
|
|
155
|
+
*
|
|
156
|
+
* ```typescript
|
|
157
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
158
|
+
* import * as scm from "@pulumi/scm";
|
|
159
|
+
*
|
|
160
|
+
* const config = new pulumi.Config();
|
|
161
|
+
* // The folder scope for the SCM resource (e.g., 'Shared', 'Predefined', or a specific folder name).
|
|
162
|
+
* const folderScope = config.get("folderScope") || "Service Connections";
|
|
163
|
+
* //# 1. IKE Crypto Profile (IKE Phase 1)
|
|
164
|
+
* const example = new scm.IkeCryptoProfile("example", {
|
|
165
|
+
* name: "example-ike-crypto_sc_grp",
|
|
166
|
+
* folder: folderScope,
|
|
167
|
+
* hashes: ["sha256"],
|
|
168
|
+
* dhGroups: ["group14"],
|
|
169
|
+
* encryptions: ["aes-256-cbc"],
|
|
170
|
+
* });
|
|
171
|
+
* //# 2. IPsec Crypto Profile (IKE Phase 2)
|
|
172
|
+
* const exampleIpsecCryptoProfile = new scm.IpsecCryptoProfile("example", {
|
|
173
|
+
* name: "panw-IPSec-Crypto_sc_grp",
|
|
174
|
+
* folder: folderScope,
|
|
175
|
+
* esp: {
|
|
176
|
+
* encryptions: ["aes-256-gcm"],
|
|
177
|
+
* authentications: ["sha256"],
|
|
178
|
+
* },
|
|
179
|
+
* dhGroup: "group14",
|
|
180
|
+
* lifetime: {
|
|
181
|
+
* hours: 8,
|
|
182
|
+
* },
|
|
183
|
+
* });
|
|
184
|
+
* //# 3. IKE Gateway
|
|
185
|
+
* const exampleIkeGateway = new scm.IkeGateway("example", {
|
|
186
|
+
* name: "example-gateway_sc_grp",
|
|
187
|
+
* folder: folderScope,
|
|
188
|
+
* peerAddress: {
|
|
189
|
+
* ip: "1.1.1.1",
|
|
190
|
+
* },
|
|
191
|
+
* authentication: {
|
|
192
|
+
* preSharedKey: {
|
|
193
|
+
* key: "secret",
|
|
194
|
+
* },
|
|
195
|
+
* },
|
|
196
|
+
* protocol: {
|
|
197
|
+
* ikev1: {
|
|
198
|
+
* ikeCryptoProfile: example.name,
|
|
199
|
+
* },
|
|
200
|
+
* },
|
|
201
|
+
* });
|
|
202
|
+
* //# 4. IPsec Tunnel
|
|
203
|
+
* const exampleIpsecTunnel = new scm.IpsecTunnel("example", {
|
|
204
|
+
* name: "example-tunnel_sc_grp",
|
|
205
|
+
* folder: folderScope,
|
|
206
|
+
* tunnelInterface: "tunnel",
|
|
207
|
+
* antiReplay: true,
|
|
208
|
+
* copyTos: false,
|
|
209
|
+
* enableGreEncapsulation: false,
|
|
210
|
+
* autoKey: {
|
|
211
|
+
* ikeGateways: [{
|
|
212
|
+
* name: exampleIkeGateway.name,
|
|
213
|
+
* }],
|
|
214
|
+
* ipsecCryptoProfile: exampleIpsecCryptoProfile.name,
|
|
215
|
+
* },
|
|
216
|
+
* }, {
|
|
217
|
+
* dependsOn: [exampleIkeGateway],
|
|
218
|
+
* });
|
|
219
|
+
* //# 5. Service Connection (The target for the group)
|
|
220
|
+
* const siteAVpnSc = new scm.ServiceConnection("site_a_vpn_sc", {
|
|
221
|
+
* name: "creating_a_service_connection_sc_grp",
|
|
222
|
+
* region: "us-west-1a",
|
|
223
|
+
* ipsecTunnel: exampleIpsecTunnel.name,
|
|
224
|
+
* subnets: [
|
|
225
|
+
* "10.1.0.0/16",
|
|
226
|
+
* "172.16.0.0/24",
|
|
227
|
+
* ],
|
|
228
|
+
* sourceNat: false,
|
|
229
|
+
* });
|
|
230
|
+
* //# 5. Service Connection (The target for the group)
|
|
231
|
+
* const siteAVpnSc2 = new scm.ServiceConnection("site_a_vpn_sc_2", {
|
|
232
|
+
* name: "creating_a_service_connection_sc_grp_2",
|
|
233
|
+
* region: "us-west-1a",
|
|
234
|
+
* ipsecTunnel: exampleIpsecTunnel.name,
|
|
235
|
+
* subnets: [
|
|
236
|
+
* "10.1.0.0/16",
|
|
237
|
+
* "172.16.0.0/24",
|
|
238
|
+
* ],
|
|
239
|
+
* sourceNat: false,
|
|
240
|
+
* });
|
|
241
|
+
* //# 6. Service Connection Group (Groups the Service Connection created above)
|
|
242
|
+
* const exampleGroup = new scm.ServiceConnectionGroup("example_group", {
|
|
243
|
+
* name: "service-connection-group-app_sc_grp",
|
|
244
|
+
* targets: [
|
|
245
|
+
* siteAVpnSc.name,
|
|
246
|
+
* siteAVpnSc2.name,
|
|
247
|
+
* ],
|
|
248
|
+
* disableSnat: false,
|
|
249
|
+
* pbfOnly: true,
|
|
250
|
+
* });
|
|
251
|
+
* // ------------------------------------------------------------------
|
|
252
|
+
* // Data Source: SCM Service Connection Group (Single Lookup)
|
|
253
|
+
* // ------------------------------------------------------------------
|
|
254
|
+
* const groupLookup = scm.getServiceConnectionGroupOutput({
|
|
255
|
+
* id: exampleGroup.id,
|
|
256
|
+
* });
|
|
257
|
+
* export const lookedUpServiceConnectionGroupDetails = groupLookup;
|
|
258
|
+
* ```
|
|
51
259
|
*/
|
|
52
260
|
export declare function getServiceConnectionGroupOutput(args: GetServiceConnectionGroupOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output<GetServiceConnectionGroupResult>;
|
|
53
261
|
/**
|
|
@@ -9,6 +9,110 @@ const utilities = require("./utilities");
|
|
|
9
9
|
* ServiceConnectionGroup data source
|
|
10
10
|
*
|
|
11
11
|
* ## Example Usage
|
|
12
|
+
*
|
|
13
|
+
* ```typescript
|
|
14
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
15
|
+
* import * as scm from "@pulumi/scm";
|
|
16
|
+
*
|
|
17
|
+
* const config = new pulumi.Config();
|
|
18
|
+
* // The folder scope for the SCM resource (e.g., 'Shared', 'Predefined', or a specific folder name).
|
|
19
|
+
* const folderScope = config.get("folderScope") || "Service Connections";
|
|
20
|
+
* //# 1. IKE Crypto Profile (IKE Phase 1)
|
|
21
|
+
* const example = new scm.IkeCryptoProfile("example", {
|
|
22
|
+
* name: "example-ike-crypto_sc_grp",
|
|
23
|
+
* folder: folderScope,
|
|
24
|
+
* hashes: ["sha256"],
|
|
25
|
+
* dhGroups: ["group14"],
|
|
26
|
+
* encryptions: ["aes-256-cbc"],
|
|
27
|
+
* });
|
|
28
|
+
* //# 2. IPsec Crypto Profile (IKE Phase 2)
|
|
29
|
+
* const exampleIpsecCryptoProfile = new scm.IpsecCryptoProfile("example", {
|
|
30
|
+
* name: "panw-IPSec-Crypto_sc_grp",
|
|
31
|
+
* folder: folderScope,
|
|
32
|
+
* esp: {
|
|
33
|
+
* encryptions: ["aes-256-gcm"],
|
|
34
|
+
* authentications: ["sha256"],
|
|
35
|
+
* },
|
|
36
|
+
* dhGroup: "group14",
|
|
37
|
+
* lifetime: {
|
|
38
|
+
* hours: 8,
|
|
39
|
+
* },
|
|
40
|
+
* });
|
|
41
|
+
* //# 3. IKE Gateway
|
|
42
|
+
* const exampleIkeGateway = new scm.IkeGateway("example", {
|
|
43
|
+
* name: "example-gateway_sc_grp",
|
|
44
|
+
* folder: folderScope,
|
|
45
|
+
* peerAddress: {
|
|
46
|
+
* ip: "1.1.1.1",
|
|
47
|
+
* },
|
|
48
|
+
* authentication: {
|
|
49
|
+
* preSharedKey: {
|
|
50
|
+
* key: "secret",
|
|
51
|
+
* },
|
|
52
|
+
* },
|
|
53
|
+
* protocol: {
|
|
54
|
+
* ikev1: {
|
|
55
|
+
* ikeCryptoProfile: example.name,
|
|
56
|
+
* },
|
|
57
|
+
* },
|
|
58
|
+
* });
|
|
59
|
+
* //# 4. IPsec Tunnel
|
|
60
|
+
* const exampleIpsecTunnel = new scm.IpsecTunnel("example", {
|
|
61
|
+
* name: "example-tunnel_sc_grp",
|
|
62
|
+
* folder: folderScope,
|
|
63
|
+
* tunnelInterface: "tunnel",
|
|
64
|
+
* antiReplay: true,
|
|
65
|
+
* copyTos: false,
|
|
66
|
+
* enableGreEncapsulation: false,
|
|
67
|
+
* autoKey: {
|
|
68
|
+
* ikeGateways: [{
|
|
69
|
+
* name: exampleIkeGateway.name,
|
|
70
|
+
* }],
|
|
71
|
+
* ipsecCryptoProfile: exampleIpsecCryptoProfile.name,
|
|
72
|
+
* },
|
|
73
|
+
* }, {
|
|
74
|
+
* dependsOn: [exampleIkeGateway],
|
|
75
|
+
* });
|
|
76
|
+
* //# 5. Service Connection (The target for the group)
|
|
77
|
+
* const siteAVpnSc = new scm.ServiceConnection("site_a_vpn_sc", {
|
|
78
|
+
* name: "creating_a_service_connection_sc_grp",
|
|
79
|
+
* region: "us-west-1a",
|
|
80
|
+
* ipsecTunnel: exampleIpsecTunnel.name,
|
|
81
|
+
* subnets: [
|
|
82
|
+
* "10.1.0.0/16",
|
|
83
|
+
* "172.16.0.0/24",
|
|
84
|
+
* ],
|
|
85
|
+
* sourceNat: false,
|
|
86
|
+
* });
|
|
87
|
+
* //# 5. Service Connection (The target for the group)
|
|
88
|
+
* const siteAVpnSc2 = new scm.ServiceConnection("site_a_vpn_sc_2", {
|
|
89
|
+
* name: "creating_a_service_connection_sc_grp_2",
|
|
90
|
+
* region: "us-west-1a",
|
|
91
|
+
* ipsecTunnel: exampleIpsecTunnel.name,
|
|
92
|
+
* subnets: [
|
|
93
|
+
* "10.1.0.0/16",
|
|
94
|
+
* "172.16.0.0/24",
|
|
95
|
+
* ],
|
|
96
|
+
* sourceNat: false,
|
|
97
|
+
* });
|
|
98
|
+
* //# 6. Service Connection Group (Groups the Service Connection created above)
|
|
99
|
+
* const exampleGroup = new scm.ServiceConnectionGroup("example_group", {
|
|
100
|
+
* name: "service-connection-group-app_sc_grp",
|
|
101
|
+
* targets: [
|
|
102
|
+
* siteAVpnSc.name,
|
|
103
|
+
* siteAVpnSc2.name,
|
|
104
|
+
* ],
|
|
105
|
+
* disableSnat: false,
|
|
106
|
+
* pbfOnly: true,
|
|
107
|
+
* });
|
|
108
|
+
* // ------------------------------------------------------------------
|
|
109
|
+
* // Data Source: SCM Service Connection Group (Single Lookup)
|
|
110
|
+
* // ------------------------------------------------------------------
|
|
111
|
+
* const groupLookup = scm.getServiceConnectionGroupOutput({
|
|
112
|
+
* id: exampleGroup.id,
|
|
113
|
+
* });
|
|
114
|
+
* export const lookedUpServiceConnectionGroupDetails = groupLookup;
|
|
115
|
+
* ```
|
|
12
116
|
*/
|
|
13
117
|
function getServiceConnectionGroup(args, opts) {
|
|
14
118
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
|
|
@@ -22,6 +126,110 @@ exports.getServiceConnectionGroup = getServiceConnectionGroup;
|
|
|
22
126
|
* ServiceConnectionGroup data source
|
|
23
127
|
*
|
|
24
128
|
* ## Example Usage
|
|
129
|
+
*
|
|
130
|
+
* ```typescript
|
|
131
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
132
|
+
* import * as scm from "@pulumi/scm";
|
|
133
|
+
*
|
|
134
|
+
* const config = new pulumi.Config();
|
|
135
|
+
* // The folder scope for the SCM resource (e.g., 'Shared', 'Predefined', or a specific folder name).
|
|
136
|
+
* const folderScope = config.get("folderScope") || "Service Connections";
|
|
137
|
+
* //# 1. IKE Crypto Profile (IKE Phase 1)
|
|
138
|
+
* const example = new scm.IkeCryptoProfile("example", {
|
|
139
|
+
* name: "example-ike-crypto_sc_grp",
|
|
140
|
+
* folder: folderScope,
|
|
141
|
+
* hashes: ["sha256"],
|
|
142
|
+
* dhGroups: ["group14"],
|
|
143
|
+
* encryptions: ["aes-256-cbc"],
|
|
144
|
+
* });
|
|
145
|
+
* //# 2. IPsec Crypto Profile (IKE Phase 2)
|
|
146
|
+
* const exampleIpsecCryptoProfile = new scm.IpsecCryptoProfile("example", {
|
|
147
|
+
* name: "panw-IPSec-Crypto_sc_grp",
|
|
148
|
+
* folder: folderScope,
|
|
149
|
+
* esp: {
|
|
150
|
+
* encryptions: ["aes-256-gcm"],
|
|
151
|
+
* authentications: ["sha256"],
|
|
152
|
+
* },
|
|
153
|
+
* dhGroup: "group14",
|
|
154
|
+
* lifetime: {
|
|
155
|
+
* hours: 8,
|
|
156
|
+
* },
|
|
157
|
+
* });
|
|
158
|
+
* //# 3. IKE Gateway
|
|
159
|
+
* const exampleIkeGateway = new scm.IkeGateway("example", {
|
|
160
|
+
* name: "example-gateway_sc_grp",
|
|
161
|
+
* folder: folderScope,
|
|
162
|
+
* peerAddress: {
|
|
163
|
+
* ip: "1.1.1.1",
|
|
164
|
+
* },
|
|
165
|
+
* authentication: {
|
|
166
|
+
* preSharedKey: {
|
|
167
|
+
* key: "secret",
|
|
168
|
+
* },
|
|
169
|
+
* },
|
|
170
|
+
* protocol: {
|
|
171
|
+
* ikev1: {
|
|
172
|
+
* ikeCryptoProfile: example.name,
|
|
173
|
+
* },
|
|
174
|
+
* },
|
|
175
|
+
* });
|
|
176
|
+
* //# 4. IPsec Tunnel
|
|
177
|
+
* const exampleIpsecTunnel = new scm.IpsecTunnel("example", {
|
|
178
|
+
* name: "example-tunnel_sc_grp",
|
|
179
|
+
* folder: folderScope,
|
|
180
|
+
* tunnelInterface: "tunnel",
|
|
181
|
+
* antiReplay: true,
|
|
182
|
+
* copyTos: false,
|
|
183
|
+
* enableGreEncapsulation: false,
|
|
184
|
+
* autoKey: {
|
|
185
|
+
* ikeGateways: [{
|
|
186
|
+
* name: exampleIkeGateway.name,
|
|
187
|
+
* }],
|
|
188
|
+
* ipsecCryptoProfile: exampleIpsecCryptoProfile.name,
|
|
189
|
+
* },
|
|
190
|
+
* }, {
|
|
191
|
+
* dependsOn: [exampleIkeGateway],
|
|
192
|
+
* });
|
|
193
|
+
* //# 5. Service Connection (The target for the group)
|
|
194
|
+
* const siteAVpnSc = new scm.ServiceConnection("site_a_vpn_sc", {
|
|
195
|
+
* name: "creating_a_service_connection_sc_grp",
|
|
196
|
+
* region: "us-west-1a",
|
|
197
|
+
* ipsecTunnel: exampleIpsecTunnel.name,
|
|
198
|
+
* subnets: [
|
|
199
|
+
* "10.1.0.0/16",
|
|
200
|
+
* "172.16.0.0/24",
|
|
201
|
+
* ],
|
|
202
|
+
* sourceNat: false,
|
|
203
|
+
* });
|
|
204
|
+
* //# 5. Service Connection (The target for the group)
|
|
205
|
+
* const siteAVpnSc2 = new scm.ServiceConnection("site_a_vpn_sc_2", {
|
|
206
|
+
* name: "creating_a_service_connection_sc_grp_2",
|
|
207
|
+
* region: "us-west-1a",
|
|
208
|
+
* ipsecTunnel: exampleIpsecTunnel.name,
|
|
209
|
+
* subnets: [
|
|
210
|
+
* "10.1.0.0/16",
|
|
211
|
+
* "172.16.0.0/24",
|
|
212
|
+
* ],
|
|
213
|
+
* sourceNat: false,
|
|
214
|
+
* });
|
|
215
|
+
* //# 6. Service Connection Group (Groups the Service Connection created above)
|
|
216
|
+
* const exampleGroup = new scm.ServiceConnectionGroup("example_group", {
|
|
217
|
+
* name: "service-connection-group-app_sc_grp",
|
|
218
|
+
* targets: [
|
|
219
|
+
* siteAVpnSc.name,
|
|
220
|
+
* siteAVpnSc2.name,
|
|
221
|
+
* ],
|
|
222
|
+
* disableSnat: false,
|
|
223
|
+
* pbfOnly: true,
|
|
224
|
+
* });
|
|
225
|
+
* // ------------------------------------------------------------------
|
|
226
|
+
* // Data Source: SCM Service Connection Group (Single Lookup)
|
|
227
|
+
* // ------------------------------------------------------------------
|
|
228
|
+
* const groupLookup = scm.getServiceConnectionGroupOutput({
|
|
229
|
+
* id: exampleGroup.id,
|
|
230
|
+
* });
|
|
231
|
+
* export const lookedUpServiceConnectionGroupDetails = groupLookup;
|
|
232
|
+
* ```
|
|
25
233
|
*/
|
|
26
234
|
function getServiceConnectionGroupOutput(args, opts) {
|
|
27
235
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getServiceConnectionGroup.js","sourceRoot":"","sources":["../getServiceConnectionGroup.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"getServiceConnectionGroup.js","sourceRoot":"","sources":["../getServiceConnectionGroup.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA4GG;AACH,SAAgB,yBAAyB,CAAC,IAAmC,EAAE,IAA2B;IACtG,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,+DAA+D,EAAE;QAC1F,IAAI,EAAE,IAAI,CAAC,EAAE;QACb,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAND,8DAMC;AA0CD;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA4GG;AACH,SAAgB,+BAA+B,CAAC,IAAyC,EAAE,IAAiC;IACxH,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,YAAY,CAAC,+DAA+D,EAAE;QAChG,IAAI,EAAE,IAAI,CAAC,EAAE;QACb,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAND,0EAMC"}
|
package/getServiceGroupList.d.ts
CHANGED
|
@@ -12,7 +12,7 @@ import * as outputs from "./types/output";
|
|
|
12
12
|
* // Fetch a list of all service group objects.
|
|
13
13
|
* // This data source will call the "List" API endpoint.
|
|
14
14
|
* const allServiceGroups = scm.getServiceGroupList({
|
|
15
|
-
* folder: "
|
|
15
|
+
* folder: "All",
|
|
16
16
|
* });
|
|
17
17
|
* export const serviceGroupsListRaw = allServiceGroups.then(allServiceGroups => allServiceGroups.datas);
|
|
18
18
|
* ```
|
|
@@ -101,7 +101,7 @@ export interface GetServiceGroupListResult {
|
|
|
101
101
|
* // Fetch a list of all service group objects.
|
|
102
102
|
* // This data source will call the "List" API endpoint.
|
|
103
103
|
* const allServiceGroups = scm.getServiceGroupList({
|
|
104
|
-
* folder: "
|
|
104
|
+
* folder: "All",
|
|
105
105
|
* });
|
|
106
106
|
* export const serviceGroupsListRaw = allServiceGroups.then(allServiceGroups => allServiceGroups.datas);
|
|
107
107
|
* ```
|
package/getServiceGroupList.js
CHANGED
|
@@ -17,7 +17,7 @@ const utilities = require("./utilities");
|
|
|
17
17
|
* // Fetch a list of all service group objects.
|
|
18
18
|
* // This data source will call the "List" API endpoint.
|
|
19
19
|
* const allServiceGroups = scm.getServiceGroupList({
|
|
20
|
-
* folder: "
|
|
20
|
+
* folder: "All",
|
|
21
21
|
* });
|
|
22
22
|
* export const serviceGroupsListRaw = allServiceGroups.then(allServiceGroups => allServiceGroups.datas);
|
|
23
23
|
* ```
|
|
@@ -47,7 +47,7 @@ exports.getServiceGroupList = getServiceGroupList;
|
|
|
47
47
|
* // Fetch a list of all service group objects.
|
|
48
48
|
* // This data source will call the "List" API endpoint.
|
|
49
49
|
* const allServiceGroups = scm.getServiceGroupList({
|
|
50
|
-
* folder: "
|
|
50
|
+
* folder: "All",
|
|
51
51
|
* });
|
|
52
52
|
* export const serviceGroupsListRaw = allServiceGroups.then(allServiceGroups => allServiceGroups.datas);
|
|
53
53
|
* ```
|