@pulumi/scm 1.0.0-alpha.1762562132 → 1.0.0-alpha.1762844275
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/address.d.ts +3 -3
- package/address.js +3 -3
- package/addressGroup.d.ts +2 -2
- package/addressGroup.js +2 -2
- package/{aggregateEthernetInterface.d.ts → aggregateInterface.d.ts} +26 -24
- package/{aggregateEthernetInterface.js → aggregateInterface.js} +13 -11
- package/aggregateInterface.js.map +1 -0
- package/antiSpywareSignature.d.ts +3 -3
- package/appOverrideRule.d.ts +128 -3
- package/appOverrideRule.js +95 -0
- package/appOverrideRule.js.map +1 -1
- package/applicationFilter.d.ts +16 -0
- package/applicationFilter.js +16 -0
- package/applicationFilter.js.map +1 -1
- package/authenticationRule.d.ts +123 -0
- package/authenticationRule.js +103 -0
- package/authenticationRule.js.map +1 -1
- package/bgpRouteMapRedistribution.d.ts +6 -6
- package/certificateProfile.d.ts +29 -0
- package/certificateProfile.js +29 -0
- package/certificateProfile.js.map +1 -1
- package/decryptionProfile.d.ts +139 -0
- package/decryptionProfile.js +139 -0
- package/decryptionProfile.js.map +1 -1
- package/decryptionRule.d.ts +139 -0
- package/decryptionRule.js +119 -0
- package/decryptionRule.js.map +1 -1
- package/dnsProxy.d.ts +6 -6
- package/dnsSecurityProfile.d.ts +2 -0
- package/dnsSecurityProfile.js +2 -0
- package/dnsSecurityProfile.js.map +1 -1
- package/dynamicUserGroup.d.ts +3 -3
- package/dynamicUserGroup.js +3 -3
- package/ethernetInterface.d.ts +13 -11
- package/ethernetInterface.js +2 -0
- package/ethernetInterface.js.map +1 -1
- package/externalDynamicList.d.ts +80 -0
- package/externalDynamicList.js +80 -0
- package/externalDynamicList.js.map +1 -1
- package/folder.d.ts +60 -0
- package/folder.js +60 -0
- package/folder.js.map +1 -1
- package/getAddressGroupList.d.ts +4 -4
- package/getAddressGroupList.js +4 -4
- package/getAddressList.d.ts +4 -4
- package/getAddressList.js +4 -4
- package/getAggregateInterface.d.ts +116 -0
- package/getAggregateInterface.js +68 -0
- package/getAggregateInterface.js.map +1 -0
- package/{getAggregateEthernetInterfaceList.d.ts → getAggregateInterfaceList.d.ts} +35 -9
- package/getAggregateInterfaceList.js +66 -0
- package/getAggregateInterfaceList.js.map +1 -0
- package/getAntiSpywareProfileList.d.ts +2 -2
- package/getAntiSpywareProfileList.js +2 -2
- package/getAntiSpywareSignature.d.ts +1 -1
- package/getAntiSpywareSignatureList.d.ts +2 -2
- package/getAntiSpywareSignatureList.js +2 -2
- package/getAppOverrideRule.d.ts +65 -1
- package/getAppOverrideRule.js +52 -0
- package/getAppOverrideRule.js.map +1 -1
- package/getAppOverrideRuleList.d.ts +48 -2
- package/getAppOverrideRuleList.js +36 -2
- package/getAppOverrideRuleList.js.map +1 -1
- package/getApplicationGroupList.d.ts +4 -4
- package/getApplicationGroupList.js +4 -4
- package/getApplicationList.d.ts +2 -2
- package/getApplicationList.js +2 -2
- package/getAuthenticationRule.d.ts +74 -0
- package/getAuthenticationRule.js +62 -0
- package/getAuthenticationRule.js.map +1 -1
- package/getAuthenticationRuleList.d.ts +50 -2
- package/getAuthenticationRuleList.js +38 -2
- package/getAuthenticationRuleList.js.map +1 -1
- package/getBgpRouteMapRedistribution.d.ts +7 -7
- package/getCertificateProfileList.d.ts +2 -2
- package/getCertificateProfileList.js +2 -2
- package/getDecryptionProfile.d.ts +40 -0
- package/getDecryptionProfile.js +40 -0
- package/getDecryptionProfile.js.map +1 -1
- package/getDecryptionProfileList.d.ts +32 -0
- package/getDecryptionProfileList.js +32 -0
- package/getDecryptionProfileList.js.map +1 -1
- package/getDecryptionRule.d.ts +74 -0
- package/getDecryptionRule.js +62 -0
- package/getDecryptionRule.js.map +1 -1
- package/getDecryptionRuleList.d.ts +48 -2
- package/getDecryptionRuleList.js +36 -2
- package/getDecryptionRuleList.js.map +1 -1
- package/getDnsProxy.d.ts +1 -1
- package/getDnsSecurityProfile.d.ts +40 -0
- package/getDnsSecurityProfile.js +40 -0
- package/getDnsSecurityProfile.js.map +1 -1
- package/getDnsSecurityProfileList.d.ts +32 -0
- package/getDnsSecurityProfileList.js +32 -0
- package/getDnsSecurityProfileList.js.map +1 -1
- package/getDynamicUserGroupList.d.ts +4 -4
- package/getDynamicUserGroupList.js +4 -4
- package/getEthernetInterface.d.ts +40 -2
- package/getEthernetInterface.js +38 -0
- package/getEthernetInterface.js.map +1 -1
- package/getEthernetInterfaceList.d.ts +26 -0
- package/getEthernetInterfaceList.js +26 -0
- package/getEthernetInterfaceList.js.map +1 -1
- package/getExternalDynamicListList.d.ts +4 -4
- package/getExternalDynamicListList.js +4 -4
- package/getFolder.d.ts +36 -0
- package/getFolder.js +36 -0
- package/getFolder.js.map +1 -1
- package/getHipObjectList.d.ts +4 -4
- package/getHipObjectList.js +4 -4
- package/getHipProfileList.d.ts +4 -4
- package/getHipProfileList.js +4 -4
- package/getInterfaceManagementProfile.d.ts +89 -8
- package/getInterfaceManagementProfile.js +80 -0
- package/getInterfaceManagementProfile.js.map +1 -1
- package/getInterfaceManagementProfileList.d.ts +42 -0
- package/getInterfaceManagementProfileList.js +42 -0
- package/getInterfaceManagementProfileList.js.map +1 -1
- package/getLayer2Subinterface.d.ts +42 -2
- package/getLayer2Subinterface.js +40 -0
- package/getLayer2Subinterface.js.map +1 -1
- package/getLayer2SubinterfaceList.d.ts +26 -0
- package/getLayer2SubinterfaceList.js +26 -0
- package/getLayer2SubinterfaceList.js.map +1 -1
- package/getLayer3Subinterface.d.ts +45 -3
- package/getLayer3Subinterface.js +42 -0
- package/getLayer3Subinterface.js.map +1 -1
- package/getLayer3SubinterfaceList.d.ts +26 -0
- package/getLayer3SubinterfaceList.js +26 -0
- package/getLayer3SubinterfaceList.js.map +1 -1
- package/getLogicalRouter.d.ts +38 -0
- package/getLogicalRouter.js +38 -0
- package/getLogicalRouter.js.map +1 -1
- package/getLogicalRouterList.d.ts +40 -0
- package/getLogicalRouterList.js +30 -0
- package/getLogicalRouterList.js.map +1 -1
- package/getLoopbackInterface.d.ts +49 -7
- package/getLoopbackInterface.js +38 -0
- package/getLoopbackInterface.js.map +1 -1
- package/getLoopbackInterfaceList.d.ts +26 -0
- package/getLoopbackInterfaceList.js +26 -0
- package/getLoopbackInterfaceList.js.map +1 -1
- package/getNatRule.d.ts +86 -14
- package/getNatRule.js +76 -0
- package/getNatRule.js.map +1 -1
- package/getNatRuleList.d.ts +52 -2
- package/getNatRuleList.js +40 -2
- package/getNatRuleList.js.map +1 -1
- package/getPbfRule.d.ts +88 -0
- package/getPbfRule.js +88 -0
- package/getPbfRule.js.map +1 -1
- package/getPbfRuleList.d.ts +34 -0
- package/getPbfRuleList.js +34 -0
- package/getPbfRuleList.js.map +1 -1
- package/getQosPolicyRule.d.ts +72 -0
- package/getQosPolicyRule.js +60 -0
- package/getQosPolicyRule.js.map +1 -1
- package/getQosPolicyRuleList.d.ts +48 -2
- package/getQosPolicyRuleList.js +36 -2
- package/getQosPolicyRuleList.js.map +1 -1
- package/getRadiusServerProfile.d.ts +54 -0
- package/getRadiusServerProfile.js +54 -0
- package/getRadiusServerProfile.js.map +1 -1
- package/getSdwanTrafficDistributionProfile.d.ts +1 -1
- package/getSecurityRule.d.ts +106 -0
- package/getSecurityRule.js +94 -0
- package/getSecurityRule.js.map +1 -1
- package/getSecurityRuleList.d.ts +46 -2
- package/getSecurityRuleList.js +34 -2
- package/getSecurityRuleList.js.map +1 -1
- package/getServiceConnection.d.ts +177 -1
- package/getServiceConnection.js +176 -0
- package/getServiceConnection.js.map +1 -1
- package/getServiceConnectionGroup.d.ts +208 -0
- package/getServiceConnectionGroup.js +208 -0
- package/getServiceConnectionGroup.js.map +1 -1
- package/getServiceGroupList.d.ts +2 -2
- package/getServiceGroupList.js +2 -2
- package/getServiceList.d.ts +4 -4
- package/getServiceList.js +4 -4
- package/getSnippet.d.ts +48 -0
- package/getSnippet.js +48 -0
- package/getSnippet.js.map +1 -1
- package/getSnippetList.d.ts +24 -0
- package/getSnippetList.js +24 -0
- package/getSnippetList.js.map +1 -1
- package/getTagList.d.ts +2 -2
- package/getTagList.js +2 -2
- package/getTunnelInterface.d.ts +42 -4
- package/getTunnelInterface.js +38 -0
- package/getTunnelInterface.js.map +1 -1
- package/getTunnelInterfaceList.d.ts +26 -0
- package/getTunnelInterfaceList.js +26 -0
- package/getTunnelInterfaceList.js.map +1 -1
- package/getUrlAccessProfileList.d.ts +2 -2
- package/getUrlAccessProfileList.js +2 -2
- package/getUrlCategoryList.d.ts +4 -4
- package/getUrlCategoryList.js +4 -4
- package/getVlanInterface.d.ts +46 -6
- package/getVlanInterface.js +40 -0
- package/getVlanInterface.js.map +1 -1
- package/getVlanInterfaceList.d.ts +26 -0
- package/getVlanInterfaceList.js +26 -0
- package/getVlanInterfaceList.js.map +1 -1
- package/getVulnerabilityProtectionProfileList.d.ts +2 -2
- package/getVulnerabilityProtectionProfileList.js +2 -2
- package/getVulnerabilityProtectionSignature.d.ts +41 -1
- package/getVulnerabilityProtectionSignature.js +40 -0
- package/getVulnerabilityProtectionSignature.js.map +1 -1
- package/getVulnerabilityProtectionSignatureList.d.ts +32 -0
- package/getVulnerabilityProtectionSignatureList.js +32 -0
- package/getVulnerabilityProtectionSignatureList.js.map +1 -1
- package/getZone.d.ts +44 -0
- package/getZone.js +44 -0
- package/getZone.js.map +1 -1
- package/getZoneList.d.ts +26 -0
- package/getZoneList.js +26 -0
- package/getZoneList.js.map +1 -1
- package/ikeGateway.d.ts +49 -0
- package/ikeGateway.js +49 -0
- package/ikeGateway.js.map +1 -1
- package/index.d.ts +9 -9
- package/index.js +12 -12
- package/index.js.map +1 -1
- package/interfaceManagementProfile.d.ts +56 -24
- package/interfaceManagementProfile.js +30 -0
- package/interfaceManagementProfile.js.map +1 -1
- package/ipsecCryptoProfile.d.ts +28 -0
- package/ipsecCryptoProfile.js +28 -0
- package/ipsecCryptoProfile.js.map +1 -1
- package/ipsecTunnel.d.ts +66 -0
- package/ipsecTunnel.js +66 -0
- package/ipsecTunnel.js.map +1 -1
- package/layer2Subinterface.d.ts +36 -7
- package/layer2Subinterface.js +32 -0
- package/layer2Subinterface.js.map +1 -1
- package/layer3Subinterface.d.ts +70 -11
- package/layer3Subinterface.js +59 -0
- package/layer3Subinterface.js.map +1 -1
- package/logicalRouter.d.ts +2 -0
- package/logicalRouter.js +2 -0
- package/logicalRouter.js.map +1 -1
- package/loopbackInterface.d.ts +58 -15
- package/loopbackInterface.js +35 -2
- package/loopbackInterface.js.map +1 -1
- package/natRule.d.ts +135 -42
- package/natRule.js +121 -8
- package/natRule.js.map +1 -1
- package/package.json +2 -2
- package/pbfRule.d.ts +89 -0
- package/pbfRule.js +89 -0
- package/pbfRule.js.map +1 -1
- package/qosPolicyRule.d.ts +95 -0
- package/qosPolicyRule.js +75 -0
- package/qosPolicyRule.js.map +1 -1
- package/radiusServerProfile.d.ts +38 -0
- package/radiusServerProfile.js +38 -0
- package/radiusServerProfile.js.map +1 -1
- package/remoteNetwork.d.ts +81 -0
- package/remoteNetwork.js +81 -0
- package/remoteNetwork.js.map +1 -1
- package/sdwanTrafficDistributionProfile.d.ts +4 -4
- package/securityRule.d.ts +181 -0
- package/securityRule.js +161 -0
- package/securityRule.js.map +1 -1
- package/serviceConnection.d.ts +82 -3
- package/serviceConnection.js +81 -2
- package/serviceConnection.js.map +1 -1
- package/serviceConnectionGroup.d.ts +100 -0
- package/serviceConnectionGroup.js +100 -0
- package/serviceConnectionGroup.js.map +1 -1
- package/serviceGroup.d.ts +2 -2
- package/serviceGroup.js +2 -2
- package/snippet.d.ts +23 -0
- package/snippet.js +23 -0
- package/snippet.js.map +1 -1
- package/tag.d.ts +3 -3
- package/tag.js +3 -3
- package/tunnelInterface.d.ts +42 -12
- package/tunnelInterface.js +32 -2
- package/tunnelInterface.js.map +1 -1
- package/types/input.d.ts +607 -335
- package/types/output.d.ts +1945 -1069
- package/vlanInterface.d.ts +40 -20
- package/vlanInterface.js +20 -0
- package/vlanInterface.js.map +1 -1
- package/vulnerabilityProtectionSignature.d.ts +12 -10
- package/vulnerabilityProtectionSignature.js +14 -0
- package/vulnerabilityProtectionSignature.js.map +1 -1
- package/zone.d.ts +71 -0
- package/zone.js +71 -0
- package/zone.js.map +1 -1
- package/aggregateEthernetInterface.js.map +0 -1
- package/getAggregateEthernetInterface.d.ts +0 -78
- package/getAggregateEthernetInterface.js +0 -30
- package/getAggregateEthernetInterface.js.map +0 -1
- package/getAggregateEthernetInterfaceList.js +0 -40
- package/getAggregateEthernetInterfaceList.js.map +0 -1
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getRadiusServerProfile.js","sourceRoot":"","sources":["../getRadiusServerProfile.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"getRadiusServerProfile.js","sourceRoot":"","sources":["../getRadiusServerProfile.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA6BG;AACH,SAAgB,sBAAsB,CAAC,IAAgC,EAAE,IAA2B;IAChG,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,yDAAyD,EAAE;QACpF,IAAI,EAAE,IAAI,CAAC,EAAE;QACb,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAND,wDAMC;AA0DD;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA6BG;AACH,SAAgB,4BAA4B,CAAC,IAAsC,EAAE,IAAiC;IAClH,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,YAAY,CAAC,yDAAyD,EAAE;QAC1F,IAAI,EAAE,IAAI,CAAC,EAAE;QACb,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAND,oEAMC"}
|
package/getSecurityRule.d.ts
CHANGED
|
@@ -2,6 +2,53 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
2
2
|
import * as outputs from "./types/output";
|
|
3
3
|
/**
|
|
4
4
|
* SecurityRule data source
|
|
5
|
+
*
|
|
6
|
+
* ## Example Usage
|
|
7
|
+
*
|
|
8
|
+
* ```typescript
|
|
9
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
10
|
+
* import * as scm from "@pulumi/scm";
|
|
11
|
+
*
|
|
12
|
+
* const standardWebAccess = new scm.SecurityRule("standard_web_access", {
|
|
13
|
+
* folder: "All",
|
|
14
|
+
* name: "Allow Standard Web Access DS1",
|
|
15
|
+
* description: "Allow outbound web traffic to any destination...",
|
|
16
|
+
* position: "pre",
|
|
17
|
+
* action: "allow",
|
|
18
|
+
* categories: ["any"],
|
|
19
|
+
* applications: [
|
|
20
|
+
* "web-browsing",
|
|
21
|
+
* "ssl",
|
|
22
|
+
* ],
|
|
23
|
+
* services: [
|
|
24
|
+
* "service-http",
|
|
25
|
+
* "service-https",
|
|
26
|
+
* ],
|
|
27
|
+
* froms: [
|
|
28
|
+
* "untrust",
|
|
29
|
+
* "trust",
|
|
30
|
+
* ],
|
|
31
|
+
* tos: ["trust"],
|
|
32
|
+
* sources: ["any"],
|
|
33
|
+
* destinations: ["any"],
|
|
34
|
+
* negateSource: false,
|
|
35
|
+
* negateDestination: false,
|
|
36
|
+
* sourceUsers: ["any"],
|
|
37
|
+
* sourceHips: ["any"],
|
|
38
|
+
* destinationHips: ["any"],
|
|
39
|
+
* logStart: true,
|
|
40
|
+
* logEnd: true,
|
|
41
|
+
* disabled: false,
|
|
42
|
+
* });
|
|
43
|
+
* // --- Data Source Calls to Fetch Existing Rules ---
|
|
44
|
+
* // 1. Fetch by ID (Best for direct lookup)
|
|
45
|
+
* const standardWebAccessById = scm.getSecurityRuleOutput({
|
|
46
|
+
* id: standardWebAccess.id,
|
|
47
|
+
* });
|
|
48
|
+
* export const fetchedStandardWebId = standardWebAccessById.apply(standardWebAccessById => standardWebAccessById.id);
|
|
49
|
+
* export const fetchedStandardWebName = standardWebAccessById.apply(standardWebAccessById => standardWebAccessById.name);
|
|
50
|
+
* export const fetchedStandardWebDescription = standardWebAccessById.apply(standardWebAccessById => standardWebAccessById.description);
|
|
51
|
+
* ```
|
|
5
52
|
*/
|
|
6
53
|
export declare function getSecurityRule(args: GetSecurityRuleArgs, opts?: pulumi.InvokeOptions): Promise<GetSecurityRuleResult>;
|
|
7
54
|
/**
|
|
@@ -125,10 +172,18 @@ export interface GetSecurityRuleResult {
|
|
|
125
172
|
* Policy type
|
|
126
173
|
*/
|
|
127
174
|
readonly policyType: string;
|
|
175
|
+
/**
|
|
176
|
+
* The position of a security rule
|
|
177
|
+
*/
|
|
178
|
+
readonly position: string;
|
|
128
179
|
/**
|
|
129
180
|
* The security profile object
|
|
130
181
|
*/
|
|
131
182
|
readonly profileSetting: outputs.GetSecurityRuleProfileSetting;
|
|
183
|
+
/**
|
|
184
|
+
* Relative positioning rule. String must be one of these: `"before"`, `"after"`, `"top"`, `"bottom"`. If not specified, rule is created at the bottom of the ruleset.
|
|
185
|
+
*/
|
|
186
|
+
readonly relativePosition: string;
|
|
132
187
|
/**
|
|
133
188
|
* Schedule in which this rule will be applied
|
|
134
189
|
*/
|
|
@@ -161,6 +216,10 @@ export interface GetSecurityRuleResult {
|
|
|
161
216
|
* The tags associated with the security rule
|
|
162
217
|
*/
|
|
163
218
|
readonly tags: string[];
|
|
219
|
+
/**
|
|
220
|
+
* The name or UUID of the rule to position this rule relative to. Required when `relativePosition` is `"before"` or `"after"`.
|
|
221
|
+
*/
|
|
222
|
+
readonly targetRule: string;
|
|
164
223
|
/**
|
|
165
224
|
* Tenant restrictions
|
|
166
225
|
*/
|
|
@@ -173,6 +232,53 @@ export interface GetSecurityRuleResult {
|
|
|
173
232
|
}
|
|
174
233
|
/**
|
|
175
234
|
* SecurityRule data source
|
|
235
|
+
*
|
|
236
|
+
* ## Example Usage
|
|
237
|
+
*
|
|
238
|
+
* ```typescript
|
|
239
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
240
|
+
* import * as scm from "@pulumi/scm";
|
|
241
|
+
*
|
|
242
|
+
* const standardWebAccess = new scm.SecurityRule("standard_web_access", {
|
|
243
|
+
* folder: "All",
|
|
244
|
+
* name: "Allow Standard Web Access DS1",
|
|
245
|
+
* description: "Allow outbound web traffic to any destination...",
|
|
246
|
+
* position: "pre",
|
|
247
|
+
* action: "allow",
|
|
248
|
+
* categories: ["any"],
|
|
249
|
+
* applications: [
|
|
250
|
+
* "web-browsing",
|
|
251
|
+
* "ssl",
|
|
252
|
+
* ],
|
|
253
|
+
* services: [
|
|
254
|
+
* "service-http",
|
|
255
|
+
* "service-https",
|
|
256
|
+
* ],
|
|
257
|
+
* froms: [
|
|
258
|
+
* "untrust",
|
|
259
|
+
* "trust",
|
|
260
|
+
* ],
|
|
261
|
+
* tos: ["trust"],
|
|
262
|
+
* sources: ["any"],
|
|
263
|
+
* destinations: ["any"],
|
|
264
|
+
* negateSource: false,
|
|
265
|
+
* negateDestination: false,
|
|
266
|
+
* sourceUsers: ["any"],
|
|
267
|
+
* sourceHips: ["any"],
|
|
268
|
+
* destinationHips: ["any"],
|
|
269
|
+
* logStart: true,
|
|
270
|
+
* logEnd: true,
|
|
271
|
+
* disabled: false,
|
|
272
|
+
* });
|
|
273
|
+
* // --- Data Source Calls to Fetch Existing Rules ---
|
|
274
|
+
* // 1. Fetch by ID (Best for direct lookup)
|
|
275
|
+
* const standardWebAccessById = scm.getSecurityRuleOutput({
|
|
276
|
+
* id: standardWebAccess.id,
|
|
277
|
+
* });
|
|
278
|
+
* export const fetchedStandardWebId = standardWebAccessById.apply(standardWebAccessById => standardWebAccessById.id);
|
|
279
|
+
* export const fetchedStandardWebName = standardWebAccessById.apply(standardWebAccessById => standardWebAccessById.name);
|
|
280
|
+
* export const fetchedStandardWebDescription = standardWebAccessById.apply(standardWebAccessById => standardWebAccessById.description);
|
|
281
|
+
* ```
|
|
176
282
|
*/
|
|
177
283
|
export declare function getSecurityRuleOutput(args: GetSecurityRuleOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output<GetSecurityRuleResult>;
|
|
178
284
|
/**
|
package/getSecurityRule.js
CHANGED
|
@@ -7,6 +7,53 @@ const pulumi = require("@pulumi/pulumi");
|
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
9
|
* SecurityRule data source
|
|
10
|
+
*
|
|
11
|
+
* ## Example Usage
|
|
12
|
+
*
|
|
13
|
+
* ```typescript
|
|
14
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
15
|
+
* import * as scm from "@pulumi/scm";
|
|
16
|
+
*
|
|
17
|
+
* const standardWebAccess = new scm.SecurityRule("standard_web_access", {
|
|
18
|
+
* folder: "All",
|
|
19
|
+
* name: "Allow Standard Web Access DS1",
|
|
20
|
+
* description: "Allow outbound web traffic to any destination...",
|
|
21
|
+
* position: "pre",
|
|
22
|
+
* action: "allow",
|
|
23
|
+
* categories: ["any"],
|
|
24
|
+
* applications: [
|
|
25
|
+
* "web-browsing",
|
|
26
|
+
* "ssl",
|
|
27
|
+
* ],
|
|
28
|
+
* services: [
|
|
29
|
+
* "service-http",
|
|
30
|
+
* "service-https",
|
|
31
|
+
* ],
|
|
32
|
+
* froms: [
|
|
33
|
+
* "untrust",
|
|
34
|
+
* "trust",
|
|
35
|
+
* ],
|
|
36
|
+
* tos: ["trust"],
|
|
37
|
+
* sources: ["any"],
|
|
38
|
+
* destinations: ["any"],
|
|
39
|
+
* negateSource: false,
|
|
40
|
+
* negateDestination: false,
|
|
41
|
+
* sourceUsers: ["any"],
|
|
42
|
+
* sourceHips: ["any"],
|
|
43
|
+
* destinationHips: ["any"],
|
|
44
|
+
* logStart: true,
|
|
45
|
+
* logEnd: true,
|
|
46
|
+
* disabled: false,
|
|
47
|
+
* });
|
|
48
|
+
* // --- Data Source Calls to Fetch Existing Rules ---
|
|
49
|
+
* // 1. Fetch by ID (Best for direct lookup)
|
|
50
|
+
* const standardWebAccessById = scm.getSecurityRuleOutput({
|
|
51
|
+
* id: standardWebAccess.id,
|
|
52
|
+
* });
|
|
53
|
+
* export const fetchedStandardWebId = standardWebAccessById.apply(standardWebAccessById => standardWebAccessById.id);
|
|
54
|
+
* export const fetchedStandardWebName = standardWebAccessById.apply(standardWebAccessById => standardWebAccessById.name);
|
|
55
|
+
* export const fetchedStandardWebDescription = standardWebAccessById.apply(standardWebAccessById => standardWebAccessById.description);
|
|
56
|
+
* ```
|
|
10
57
|
*/
|
|
11
58
|
function getSecurityRule(args, opts) {
|
|
12
59
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
|
|
@@ -18,6 +65,53 @@ function getSecurityRule(args, opts) {
|
|
|
18
65
|
exports.getSecurityRule = getSecurityRule;
|
|
19
66
|
/**
|
|
20
67
|
* SecurityRule data source
|
|
68
|
+
*
|
|
69
|
+
* ## Example Usage
|
|
70
|
+
*
|
|
71
|
+
* ```typescript
|
|
72
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
73
|
+
* import * as scm from "@pulumi/scm";
|
|
74
|
+
*
|
|
75
|
+
* const standardWebAccess = new scm.SecurityRule("standard_web_access", {
|
|
76
|
+
* folder: "All",
|
|
77
|
+
* name: "Allow Standard Web Access DS1",
|
|
78
|
+
* description: "Allow outbound web traffic to any destination...",
|
|
79
|
+
* position: "pre",
|
|
80
|
+
* action: "allow",
|
|
81
|
+
* categories: ["any"],
|
|
82
|
+
* applications: [
|
|
83
|
+
* "web-browsing",
|
|
84
|
+
* "ssl",
|
|
85
|
+
* ],
|
|
86
|
+
* services: [
|
|
87
|
+
* "service-http",
|
|
88
|
+
* "service-https",
|
|
89
|
+
* ],
|
|
90
|
+
* froms: [
|
|
91
|
+
* "untrust",
|
|
92
|
+
* "trust",
|
|
93
|
+
* ],
|
|
94
|
+
* tos: ["trust"],
|
|
95
|
+
* sources: ["any"],
|
|
96
|
+
* destinations: ["any"],
|
|
97
|
+
* negateSource: false,
|
|
98
|
+
* negateDestination: false,
|
|
99
|
+
* sourceUsers: ["any"],
|
|
100
|
+
* sourceHips: ["any"],
|
|
101
|
+
* destinationHips: ["any"],
|
|
102
|
+
* logStart: true,
|
|
103
|
+
* logEnd: true,
|
|
104
|
+
* disabled: false,
|
|
105
|
+
* });
|
|
106
|
+
* // --- Data Source Calls to Fetch Existing Rules ---
|
|
107
|
+
* // 1. Fetch by ID (Best for direct lookup)
|
|
108
|
+
* const standardWebAccessById = scm.getSecurityRuleOutput({
|
|
109
|
+
* id: standardWebAccess.id,
|
|
110
|
+
* });
|
|
111
|
+
* export const fetchedStandardWebId = standardWebAccessById.apply(standardWebAccessById => standardWebAccessById.id);
|
|
112
|
+
* export const fetchedStandardWebName = standardWebAccessById.apply(standardWebAccessById => standardWebAccessById.name);
|
|
113
|
+
* export const fetchedStandardWebDescription = standardWebAccessById.apply(standardWebAccessById => standardWebAccessById.description);
|
|
114
|
+
* ```
|
|
21
115
|
*/
|
|
22
116
|
function getSecurityRuleOutput(args, opts) {
|
|
23
117
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
|
package/getSecurityRule.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getSecurityRule.js","sourceRoot":"","sources":["../getSecurityRule.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"getSecurityRule.js","sourceRoot":"","sources":["../getSecurityRule.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAiDG;AACH,SAAgB,eAAe,CAAC,IAAyB,EAAE,IAA2B;IAClF,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,2CAA2C,EAAE;QACtE,IAAI,EAAE,IAAI,CAAC,EAAE;QACb,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAND,0CAMC;AAsLD;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAiDG;AACH,SAAgB,qBAAqB,CAAC,IAA+B,EAAE,IAAiC;IACpG,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,YAAY,CAAC,2CAA2C,EAAE;QAC5E,IAAI,EAAE,IAAI,CAAC,EAAE;QACb,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAND,sDAMC"}
|
package/getSecurityRuleList.d.ts
CHANGED
|
@@ -2,8 +2,24 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
2
2
|
import * as outputs from "./types/output";
|
|
3
3
|
/**
|
|
4
4
|
* Retrieves a listing of config items.
|
|
5
|
+
*
|
|
6
|
+
* ## Example Usage
|
|
7
|
+
*
|
|
8
|
+
* ```typescript
|
|
9
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
10
|
+
* import * as scm from "@pulumi/scm";
|
|
11
|
+
*
|
|
12
|
+
* const pagedRulesList = scm.getSecurityRuleList({
|
|
13
|
+
* folder: "All",
|
|
14
|
+
* position: "pre",
|
|
15
|
+
* });
|
|
16
|
+
* export const fetchedRuleListSummary = {
|
|
17
|
+
* countOfRulesFetched: pagedRulesList.then(pagedRulesList => pagedRulesList.total),
|
|
18
|
+
* firstRuleName: pagedRulesList.then(pagedRulesList => pagedRulesList.datas?.[0]?.name),
|
|
19
|
+
* };
|
|
20
|
+
* ```
|
|
5
21
|
*/
|
|
6
|
-
export declare function getSecurityRuleList(args
|
|
22
|
+
export declare function getSecurityRuleList(args: GetSecurityRuleListArgs, opts?: pulumi.InvokeOptions): Promise<GetSecurityRuleListResult>;
|
|
7
23
|
/**
|
|
8
24
|
* A collection of arguments for invoking getSecurityRuleList.
|
|
9
25
|
*/
|
|
@@ -28,6 +44,10 @@ export interface GetSecurityRuleListArgs {
|
|
|
28
44
|
* The offset of the first item to return.
|
|
29
45
|
*/
|
|
30
46
|
offset?: number;
|
|
47
|
+
/**
|
|
48
|
+
* The position of a security rule
|
|
49
|
+
*/
|
|
50
|
+
position: string;
|
|
31
51
|
/**
|
|
32
52
|
* The snippet of the item.
|
|
33
53
|
*/
|
|
@@ -65,6 +85,10 @@ export interface GetSecurityRuleListResult {
|
|
|
65
85
|
* The offset of the first item to return.
|
|
66
86
|
*/
|
|
67
87
|
readonly offset?: number;
|
|
88
|
+
/**
|
|
89
|
+
* The position of a security rule
|
|
90
|
+
*/
|
|
91
|
+
readonly position: string;
|
|
68
92
|
/**
|
|
69
93
|
* The snippet of the item.
|
|
70
94
|
*/
|
|
@@ -77,8 +101,24 @@ export interface GetSecurityRuleListResult {
|
|
|
77
101
|
}
|
|
78
102
|
/**
|
|
79
103
|
* Retrieves a listing of config items.
|
|
104
|
+
*
|
|
105
|
+
* ## Example Usage
|
|
106
|
+
*
|
|
107
|
+
* ```typescript
|
|
108
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
109
|
+
* import * as scm from "@pulumi/scm";
|
|
110
|
+
*
|
|
111
|
+
* const pagedRulesList = scm.getSecurityRuleList({
|
|
112
|
+
* folder: "All",
|
|
113
|
+
* position: "pre",
|
|
114
|
+
* });
|
|
115
|
+
* export const fetchedRuleListSummary = {
|
|
116
|
+
* countOfRulesFetched: pagedRulesList.then(pagedRulesList => pagedRulesList.total),
|
|
117
|
+
* firstRuleName: pagedRulesList.then(pagedRulesList => pagedRulesList.datas?.[0]?.name),
|
|
118
|
+
* };
|
|
119
|
+
* ```
|
|
80
120
|
*/
|
|
81
|
-
export declare function getSecurityRuleListOutput(args
|
|
121
|
+
export declare function getSecurityRuleListOutput(args: GetSecurityRuleListOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output<GetSecurityRuleListResult>;
|
|
82
122
|
/**
|
|
83
123
|
* A collection of arguments for invoking getSecurityRuleList.
|
|
84
124
|
*/
|
|
@@ -103,6 +143,10 @@ export interface GetSecurityRuleListOutputArgs {
|
|
|
103
143
|
* The offset of the first item to return.
|
|
104
144
|
*/
|
|
105
145
|
offset?: pulumi.Input<number>;
|
|
146
|
+
/**
|
|
147
|
+
* The position of a security rule
|
|
148
|
+
*/
|
|
149
|
+
position: pulumi.Input<string>;
|
|
106
150
|
/**
|
|
107
151
|
* The snippet of the item.
|
|
108
152
|
*/
|
package/getSecurityRuleList.js
CHANGED
|
@@ -7,9 +7,24 @@ const pulumi = require("@pulumi/pulumi");
|
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
9
|
* Retrieves a listing of config items.
|
|
10
|
+
*
|
|
11
|
+
* ## Example Usage
|
|
12
|
+
*
|
|
13
|
+
* ```typescript
|
|
14
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
15
|
+
* import * as scm from "@pulumi/scm";
|
|
16
|
+
*
|
|
17
|
+
* const pagedRulesList = scm.getSecurityRuleList({
|
|
18
|
+
* folder: "All",
|
|
19
|
+
* position: "pre",
|
|
20
|
+
* });
|
|
21
|
+
* export const fetchedRuleListSummary = {
|
|
22
|
+
* countOfRulesFetched: pagedRulesList.then(pagedRulesList => pagedRulesList.total),
|
|
23
|
+
* firstRuleName: pagedRulesList.then(pagedRulesList => pagedRulesList.datas?.[0]?.name),
|
|
24
|
+
* };
|
|
25
|
+
* ```
|
|
10
26
|
*/
|
|
11
27
|
function getSecurityRuleList(args, opts) {
|
|
12
|
-
args = args || {};
|
|
13
28
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
|
|
14
29
|
return pulumi.runtime.invoke("scm:index/getSecurityRuleList:getSecurityRuleList", {
|
|
15
30
|
"device": args.device,
|
|
@@ -17,15 +32,31 @@ function getSecurityRuleList(args, opts) {
|
|
|
17
32
|
"limit": args.limit,
|
|
18
33
|
"name": args.name,
|
|
19
34
|
"offset": args.offset,
|
|
35
|
+
"position": args.position,
|
|
20
36
|
"snippet": args.snippet,
|
|
21
37
|
}, opts);
|
|
22
38
|
}
|
|
23
39
|
exports.getSecurityRuleList = getSecurityRuleList;
|
|
24
40
|
/**
|
|
25
41
|
* Retrieves a listing of config items.
|
|
42
|
+
*
|
|
43
|
+
* ## Example Usage
|
|
44
|
+
*
|
|
45
|
+
* ```typescript
|
|
46
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
47
|
+
* import * as scm from "@pulumi/scm";
|
|
48
|
+
*
|
|
49
|
+
* const pagedRulesList = scm.getSecurityRuleList({
|
|
50
|
+
* folder: "All",
|
|
51
|
+
* position: "pre",
|
|
52
|
+
* });
|
|
53
|
+
* export const fetchedRuleListSummary = {
|
|
54
|
+
* countOfRulesFetched: pagedRulesList.then(pagedRulesList => pagedRulesList.total),
|
|
55
|
+
* firstRuleName: pagedRulesList.then(pagedRulesList => pagedRulesList.datas?.[0]?.name),
|
|
56
|
+
* };
|
|
57
|
+
* ```
|
|
26
58
|
*/
|
|
27
59
|
function getSecurityRuleListOutput(args, opts) {
|
|
28
|
-
args = args || {};
|
|
29
60
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
|
|
30
61
|
return pulumi.runtime.invokeOutput("scm:index/getSecurityRuleList:getSecurityRuleList", {
|
|
31
62
|
"device": args.device,
|
|
@@ -33,6 +64,7 @@ function getSecurityRuleListOutput(args, opts) {
|
|
|
33
64
|
"limit": args.limit,
|
|
34
65
|
"name": args.name,
|
|
35
66
|
"offset": args.offset,
|
|
67
|
+
"position": args.position,
|
|
36
68
|
"snippet": args.snippet,
|
|
37
69
|
}, opts);
|
|
38
70
|
}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getSecurityRuleList.js","sourceRoot":"","sources":["../getSecurityRuleList.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"getSecurityRuleList.js","sourceRoot":"","sources":["../getSecurityRuleList.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;GAkBG;AACH,SAAgB,mBAAmB,CAAC,IAA6B,EAAE,IAA2B;IAC1F,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,mDAAmD,EAAE;QAC9E,QAAQ,EAAE,IAAI,CAAC,MAAM;QACrB,QAAQ,EAAE,IAAI,CAAC,MAAM;QACrB,OAAO,EAAE,IAAI,CAAC,KAAK;QACnB,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,QAAQ,EAAE,IAAI,CAAC,MAAM;QACrB,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,SAAS,EAAE,IAAI,CAAC,OAAO;KAC1B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAXD,kDAWC;AAkFD;;;;;;;;;;;;;;;;;;GAkBG;AACH,SAAgB,yBAAyB,CAAC,IAAmC,EAAE,IAAiC;IAC5G,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,YAAY,CAAC,mDAAmD,EAAE;QACpF,QAAQ,EAAE,IAAI,CAAC,MAAM;QACrB,QAAQ,EAAE,IAAI,CAAC,MAAM;QACrB,OAAO,EAAE,IAAI,CAAC,KAAK;QACnB,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,QAAQ,EAAE,IAAI,CAAC,MAAM;QACrB,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,SAAS,EAAE,IAAI,CAAC,OAAO;KAC1B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAXD,8DAWC"}
|
|
@@ -4,6 +4,94 @@ import * as outputs from "./types/output";
|
|
|
4
4
|
* ServiceConnection data source
|
|
5
5
|
*
|
|
6
6
|
* ## Example Usage
|
|
7
|
+
*
|
|
8
|
+
* ```typescript
|
|
9
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
10
|
+
* import * as scm from "@pulumi/scm";
|
|
11
|
+
*
|
|
12
|
+
* const config = new pulumi.Config();
|
|
13
|
+
* // The folder scope for the SCM resource (e.g., 'Shared', 'Predefined', or a specific folder name).
|
|
14
|
+
* const folderScope = config.get("folderScope") || "Service Connections";
|
|
15
|
+
* //# 1. Define the IKE Crypto Profile (IKE Phase 1)
|
|
16
|
+
* // Note: The resource name is plural: "scm_ike_crypto_profile"
|
|
17
|
+
* const example = new scm.IkeCryptoProfile("example", {
|
|
18
|
+
* name: "example-ike-crypto_data",
|
|
19
|
+
* folder: folderScope,
|
|
20
|
+
* hashes: ["sha256"],
|
|
21
|
+
* dhGroups: ["group14"],
|
|
22
|
+
* encryptions: ["aes-256-cbc"],
|
|
23
|
+
* });
|
|
24
|
+
* //# 2. Define the IPsec Crypto Profile (IKE Phase 2)
|
|
25
|
+
* // Note: The resource name is plural and nested blocks now use an equals sign (=).
|
|
26
|
+
* const exampleIpsecCryptoProfile = new scm.IpsecCryptoProfile("example", {
|
|
27
|
+
* name: "panw-IPSec-Crypto_data",
|
|
28
|
+
* folder: folderScope,
|
|
29
|
+
* esp: {
|
|
30
|
+
* encryptions: ["aes-256-gcm"],
|
|
31
|
+
* authentications: ["sha256"],
|
|
32
|
+
* },
|
|
33
|
+
* dhGroup: "group14",
|
|
34
|
+
* lifetime: {
|
|
35
|
+
* hours: 8,
|
|
36
|
+
* },
|
|
37
|
+
* });
|
|
38
|
+
* //# 3. Define the IKE Gateway
|
|
39
|
+
* // Note: The resource name is plural and nested blocks now use an equals sign (=).
|
|
40
|
+
* const exampleIkeGateway = new scm.IkeGateway("example", {
|
|
41
|
+
* name: "example-gateway_data",
|
|
42
|
+
* folder: folderScope,
|
|
43
|
+
* peerAddress: {
|
|
44
|
+
* ip: "1.1.1.1",
|
|
45
|
+
* },
|
|
46
|
+
* authentication: {
|
|
47
|
+
* preSharedKey: {
|
|
48
|
+
* key: "secret",
|
|
49
|
+
* },
|
|
50
|
+
* },
|
|
51
|
+
* protocol: {
|
|
52
|
+
* ikev1: {
|
|
53
|
+
* ikeCryptoProfile: example.name,
|
|
54
|
+
* },
|
|
55
|
+
* },
|
|
56
|
+
* });
|
|
57
|
+
* //# 4. Define the IPsec Tunnel
|
|
58
|
+
* // Note: Nested 'auto_key' block uses an equals sign (=).
|
|
59
|
+
* const exampleIpsecTunnel = new scm.IpsecTunnel("example", {
|
|
60
|
+
* name: "example-tunnel_data",
|
|
61
|
+
* folder: folderScope,
|
|
62
|
+
* tunnelInterface: "tunnel",
|
|
63
|
+
* antiReplay: true,
|
|
64
|
+
* copyTos: false,
|
|
65
|
+
* enableGreEncapsulation: false,
|
|
66
|
+
* autoKey: {
|
|
67
|
+
* ikeGateways: [{
|
|
68
|
+
* name: exampleIkeGateway.name,
|
|
69
|
+
* }],
|
|
70
|
+
* ipsecCryptoProfile: exampleIpsecCryptoProfile.name,
|
|
71
|
+
* },
|
|
72
|
+
* }, {
|
|
73
|
+
* dependsOn: [exampleIkeGateway],
|
|
74
|
+
* });
|
|
75
|
+
* const siteAVpnSc = new scm.ServiceConnection("site_a_vpn_sc", {
|
|
76
|
+
* name: "creating_a_service_connection_data",
|
|
77
|
+
* region: "us-west-1",
|
|
78
|
+
* ipsecTunnel: exampleIpsecTunnel.name,
|
|
79
|
+
* subnets: [
|
|
80
|
+
* "10.1.0.0/16",
|
|
81
|
+
* "172.16.0.0/24",
|
|
82
|
+
* ],
|
|
83
|
+
* sourceNat: true,
|
|
84
|
+
* });
|
|
85
|
+
* //------------------------------------------------------
|
|
86
|
+
* // Data Soruce
|
|
87
|
+
* //------------------------------------------------------
|
|
88
|
+
* const createdConnLookup = scm.getServiceConnectionOutput({
|
|
89
|
+
* id: siteAVpnSc.id,
|
|
90
|
+
* });
|
|
91
|
+
* export const createdServiceConnectionId = createdConnLookup.apply(createdConnLookup => createdConnLookup.id);
|
|
92
|
+
* export const createdServiceConnectionRegion = createdConnLookup.apply(createdConnLookup => createdConnLookup.region);
|
|
93
|
+
* export const createdServiceConnectionSubnets = createdConnLookup.apply(createdConnLookup => createdConnLookup.subnets);
|
|
94
|
+
* ```
|
|
7
95
|
*/
|
|
8
96
|
export declare function getServiceConnection(args: GetServiceConnectionArgs, opts?: pulumi.InvokeOptions): Promise<GetServiceConnectionResult>;
|
|
9
97
|
/**
|
|
@@ -26,7 +114,7 @@ export interface GetServiceConnectionResult {
|
|
|
26
114
|
/**
|
|
27
115
|
* Backup s c
|
|
28
116
|
*/
|
|
29
|
-
readonly
|
|
117
|
+
readonly backupSc: string;
|
|
30
118
|
/**
|
|
31
119
|
* Bgp peer
|
|
32
120
|
*/
|
|
@@ -91,6 +179,94 @@ export interface GetServiceConnectionResult {
|
|
|
91
179
|
* ServiceConnection data source
|
|
92
180
|
*
|
|
93
181
|
* ## Example Usage
|
|
182
|
+
*
|
|
183
|
+
* ```typescript
|
|
184
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
185
|
+
* import * as scm from "@pulumi/scm";
|
|
186
|
+
*
|
|
187
|
+
* const config = new pulumi.Config();
|
|
188
|
+
* // The folder scope for the SCM resource (e.g., 'Shared', 'Predefined', or a specific folder name).
|
|
189
|
+
* const folderScope = config.get("folderScope") || "Service Connections";
|
|
190
|
+
* //# 1. Define the IKE Crypto Profile (IKE Phase 1)
|
|
191
|
+
* // Note: The resource name is plural: "scm_ike_crypto_profile"
|
|
192
|
+
* const example = new scm.IkeCryptoProfile("example", {
|
|
193
|
+
* name: "example-ike-crypto_data",
|
|
194
|
+
* folder: folderScope,
|
|
195
|
+
* hashes: ["sha256"],
|
|
196
|
+
* dhGroups: ["group14"],
|
|
197
|
+
* encryptions: ["aes-256-cbc"],
|
|
198
|
+
* });
|
|
199
|
+
* //# 2. Define the IPsec Crypto Profile (IKE Phase 2)
|
|
200
|
+
* // Note: The resource name is plural and nested blocks now use an equals sign (=).
|
|
201
|
+
* const exampleIpsecCryptoProfile = new scm.IpsecCryptoProfile("example", {
|
|
202
|
+
* name: "panw-IPSec-Crypto_data",
|
|
203
|
+
* folder: folderScope,
|
|
204
|
+
* esp: {
|
|
205
|
+
* encryptions: ["aes-256-gcm"],
|
|
206
|
+
* authentications: ["sha256"],
|
|
207
|
+
* },
|
|
208
|
+
* dhGroup: "group14",
|
|
209
|
+
* lifetime: {
|
|
210
|
+
* hours: 8,
|
|
211
|
+
* },
|
|
212
|
+
* });
|
|
213
|
+
* //# 3. Define the IKE Gateway
|
|
214
|
+
* // Note: The resource name is plural and nested blocks now use an equals sign (=).
|
|
215
|
+
* const exampleIkeGateway = new scm.IkeGateway("example", {
|
|
216
|
+
* name: "example-gateway_data",
|
|
217
|
+
* folder: folderScope,
|
|
218
|
+
* peerAddress: {
|
|
219
|
+
* ip: "1.1.1.1",
|
|
220
|
+
* },
|
|
221
|
+
* authentication: {
|
|
222
|
+
* preSharedKey: {
|
|
223
|
+
* key: "secret",
|
|
224
|
+
* },
|
|
225
|
+
* },
|
|
226
|
+
* protocol: {
|
|
227
|
+
* ikev1: {
|
|
228
|
+
* ikeCryptoProfile: example.name,
|
|
229
|
+
* },
|
|
230
|
+
* },
|
|
231
|
+
* });
|
|
232
|
+
* //# 4. Define the IPsec Tunnel
|
|
233
|
+
* // Note: Nested 'auto_key' block uses an equals sign (=).
|
|
234
|
+
* const exampleIpsecTunnel = new scm.IpsecTunnel("example", {
|
|
235
|
+
* name: "example-tunnel_data",
|
|
236
|
+
* folder: folderScope,
|
|
237
|
+
* tunnelInterface: "tunnel",
|
|
238
|
+
* antiReplay: true,
|
|
239
|
+
* copyTos: false,
|
|
240
|
+
* enableGreEncapsulation: false,
|
|
241
|
+
* autoKey: {
|
|
242
|
+
* ikeGateways: [{
|
|
243
|
+
* name: exampleIkeGateway.name,
|
|
244
|
+
* }],
|
|
245
|
+
* ipsecCryptoProfile: exampleIpsecCryptoProfile.name,
|
|
246
|
+
* },
|
|
247
|
+
* }, {
|
|
248
|
+
* dependsOn: [exampleIkeGateway],
|
|
249
|
+
* });
|
|
250
|
+
* const siteAVpnSc = new scm.ServiceConnection("site_a_vpn_sc", {
|
|
251
|
+
* name: "creating_a_service_connection_data",
|
|
252
|
+
* region: "us-west-1",
|
|
253
|
+
* ipsecTunnel: exampleIpsecTunnel.name,
|
|
254
|
+
* subnets: [
|
|
255
|
+
* "10.1.0.0/16",
|
|
256
|
+
* "172.16.0.0/24",
|
|
257
|
+
* ],
|
|
258
|
+
* sourceNat: true,
|
|
259
|
+
* });
|
|
260
|
+
* //------------------------------------------------------
|
|
261
|
+
* // Data Soruce
|
|
262
|
+
* //------------------------------------------------------
|
|
263
|
+
* const createdConnLookup = scm.getServiceConnectionOutput({
|
|
264
|
+
* id: siteAVpnSc.id,
|
|
265
|
+
* });
|
|
266
|
+
* export const createdServiceConnectionId = createdConnLookup.apply(createdConnLookup => createdConnLookup.id);
|
|
267
|
+
* export const createdServiceConnectionRegion = createdConnLookup.apply(createdConnLookup => createdConnLookup.region);
|
|
268
|
+
* export const createdServiceConnectionSubnets = createdConnLookup.apply(createdConnLookup => createdConnLookup.subnets);
|
|
269
|
+
* ```
|
|
94
270
|
*/
|
|
95
271
|
export declare function getServiceConnectionOutput(args: GetServiceConnectionOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output<GetServiceConnectionResult>;
|
|
96
272
|
/**
|