@pulumi/scm 1.0.0-alpha.1762562132 → 1.0.0-alpha.1762844275

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (298) hide show
  1. package/address.d.ts +3 -3
  2. package/address.js +3 -3
  3. package/addressGroup.d.ts +2 -2
  4. package/addressGroup.js +2 -2
  5. package/{aggregateEthernetInterface.d.ts → aggregateInterface.d.ts} +26 -24
  6. package/{aggregateEthernetInterface.js → aggregateInterface.js} +13 -11
  7. package/aggregateInterface.js.map +1 -0
  8. package/antiSpywareSignature.d.ts +3 -3
  9. package/appOverrideRule.d.ts +128 -3
  10. package/appOverrideRule.js +95 -0
  11. package/appOverrideRule.js.map +1 -1
  12. package/applicationFilter.d.ts +16 -0
  13. package/applicationFilter.js +16 -0
  14. package/applicationFilter.js.map +1 -1
  15. package/authenticationRule.d.ts +123 -0
  16. package/authenticationRule.js +103 -0
  17. package/authenticationRule.js.map +1 -1
  18. package/bgpRouteMapRedistribution.d.ts +6 -6
  19. package/certificateProfile.d.ts +29 -0
  20. package/certificateProfile.js +29 -0
  21. package/certificateProfile.js.map +1 -1
  22. package/decryptionProfile.d.ts +139 -0
  23. package/decryptionProfile.js +139 -0
  24. package/decryptionProfile.js.map +1 -1
  25. package/decryptionRule.d.ts +139 -0
  26. package/decryptionRule.js +119 -0
  27. package/decryptionRule.js.map +1 -1
  28. package/dnsProxy.d.ts +6 -6
  29. package/dnsSecurityProfile.d.ts +2 -0
  30. package/dnsSecurityProfile.js +2 -0
  31. package/dnsSecurityProfile.js.map +1 -1
  32. package/dynamicUserGroup.d.ts +3 -3
  33. package/dynamicUserGroup.js +3 -3
  34. package/ethernetInterface.d.ts +13 -11
  35. package/ethernetInterface.js +2 -0
  36. package/ethernetInterface.js.map +1 -1
  37. package/externalDynamicList.d.ts +80 -0
  38. package/externalDynamicList.js +80 -0
  39. package/externalDynamicList.js.map +1 -1
  40. package/folder.d.ts +60 -0
  41. package/folder.js +60 -0
  42. package/folder.js.map +1 -1
  43. package/getAddressGroupList.d.ts +4 -4
  44. package/getAddressGroupList.js +4 -4
  45. package/getAddressList.d.ts +4 -4
  46. package/getAddressList.js +4 -4
  47. package/getAggregateInterface.d.ts +116 -0
  48. package/getAggregateInterface.js +68 -0
  49. package/getAggregateInterface.js.map +1 -0
  50. package/{getAggregateEthernetInterfaceList.d.ts → getAggregateInterfaceList.d.ts} +35 -9
  51. package/getAggregateInterfaceList.js +66 -0
  52. package/getAggregateInterfaceList.js.map +1 -0
  53. package/getAntiSpywareProfileList.d.ts +2 -2
  54. package/getAntiSpywareProfileList.js +2 -2
  55. package/getAntiSpywareSignature.d.ts +1 -1
  56. package/getAntiSpywareSignatureList.d.ts +2 -2
  57. package/getAntiSpywareSignatureList.js +2 -2
  58. package/getAppOverrideRule.d.ts +65 -1
  59. package/getAppOverrideRule.js +52 -0
  60. package/getAppOverrideRule.js.map +1 -1
  61. package/getAppOverrideRuleList.d.ts +48 -2
  62. package/getAppOverrideRuleList.js +36 -2
  63. package/getAppOverrideRuleList.js.map +1 -1
  64. package/getApplicationGroupList.d.ts +4 -4
  65. package/getApplicationGroupList.js +4 -4
  66. package/getApplicationList.d.ts +2 -2
  67. package/getApplicationList.js +2 -2
  68. package/getAuthenticationRule.d.ts +74 -0
  69. package/getAuthenticationRule.js +62 -0
  70. package/getAuthenticationRule.js.map +1 -1
  71. package/getAuthenticationRuleList.d.ts +50 -2
  72. package/getAuthenticationRuleList.js +38 -2
  73. package/getAuthenticationRuleList.js.map +1 -1
  74. package/getBgpRouteMapRedistribution.d.ts +7 -7
  75. package/getCertificateProfileList.d.ts +2 -2
  76. package/getCertificateProfileList.js +2 -2
  77. package/getDecryptionProfile.d.ts +40 -0
  78. package/getDecryptionProfile.js +40 -0
  79. package/getDecryptionProfile.js.map +1 -1
  80. package/getDecryptionProfileList.d.ts +32 -0
  81. package/getDecryptionProfileList.js +32 -0
  82. package/getDecryptionProfileList.js.map +1 -1
  83. package/getDecryptionRule.d.ts +74 -0
  84. package/getDecryptionRule.js +62 -0
  85. package/getDecryptionRule.js.map +1 -1
  86. package/getDecryptionRuleList.d.ts +48 -2
  87. package/getDecryptionRuleList.js +36 -2
  88. package/getDecryptionRuleList.js.map +1 -1
  89. package/getDnsProxy.d.ts +1 -1
  90. package/getDnsSecurityProfile.d.ts +40 -0
  91. package/getDnsSecurityProfile.js +40 -0
  92. package/getDnsSecurityProfile.js.map +1 -1
  93. package/getDnsSecurityProfileList.d.ts +32 -0
  94. package/getDnsSecurityProfileList.js +32 -0
  95. package/getDnsSecurityProfileList.js.map +1 -1
  96. package/getDynamicUserGroupList.d.ts +4 -4
  97. package/getDynamicUserGroupList.js +4 -4
  98. package/getEthernetInterface.d.ts +40 -2
  99. package/getEthernetInterface.js +38 -0
  100. package/getEthernetInterface.js.map +1 -1
  101. package/getEthernetInterfaceList.d.ts +26 -0
  102. package/getEthernetInterfaceList.js +26 -0
  103. package/getEthernetInterfaceList.js.map +1 -1
  104. package/getExternalDynamicListList.d.ts +4 -4
  105. package/getExternalDynamicListList.js +4 -4
  106. package/getFolder.d.ts +36 -0
  107. package/getFolder.js +36 -0
  108. package/getFolder.js.map +1 -1
  109. package/getHipObjectList.d.ts +4 -4
  110. package/getHipObjectList.js +4 -4
  111. package/getHipProfileList.d.ts +4 -4
  112. package/getHipProfileList.js +4 -4
  113. package/getInterfaceManagementProfile.d.ts +89 -8
  114. package/getInterfaceManagementProfile.js +80 -0
  115. package/getInterfaceManagementProfile.js.map +1 -1
  116. package/getInterfaceManagementProfileList.d.ts +42 -0
  117. package/getInterfaceManagementProfileList.js +42 -0
  118. package/getInterfaceManagementProfileList.js.map +1 -1
  119. package/getLayer2Subinterface.d.ts +42 -2
  120. package/getLayer2Subinterface.js +40 -0
  121. package/getLayer2Subinterface.js.map +1 -1
  122. package/getLayer2SubinterfaceList.d.ts +26 -0
  123. package/getLayer2SubinterfaceList.js +26 -0
  124. package/getLayer2SubinterfaceList.js.map +1 -1
  125. package/getLayer3Subinterface.d.ts +45 -3
  126. package/getLayer3Subinterface.js +42 -0
  127. package/getLayer3Subinterface.js.map +1 -1
  128. package/getLayer3SubinterfaceList.d.ts +26 -0
  129. package/getLayer3SubinterfaceList.js +26 -0
  130. package/getLayer3SubinterfaceList.js.map +1 -1
  131. package/getLogicalRouter.d.ts +38 -0
  132. package/getLogicalRouter.js +38 -0
  133. package/getLogicalRouter.js.map +1 -1
  134. package/getLogicalRouterList.d.ts +40 -0
  135. package/getLogicalRouterList.js +30 -0
  136. package/getLogicalRouterList.js.map +1 -1
  137. package/getLoopbackInterface.d.ts +49 -7
  138. package/getLoopbackInterface.js +38 -0
  139. package/getLoopbackInterface.js.map +1 -1
  140. package/getLoopbackInterfaceList.d.ts +26 -0
  141. package/getLoopbackInterfaceList.js +26 -0
  142. package/getLoopbackInterfaceList.js.map +1 -1
  143. package/getNatRule.d.ts +86 -14
  144. package/getNatRule.js +76 -0
  145. package/getNatRule.js.map +1 -1
  146. package/getNatRuleList.d.ts +52 -2
  147. package/getNatRuleList.js +40 -2
  148. package/getNatRuleList.js.map +1 -1
  149. package/getPbfRule.d.ts +88 -0
  150. package/getPbfRule.js +88 -0
  151. package/getPbfRule.js.map +1 -1
  152. package/getPbfRuleList.d.ts +34 -0
  153. package/getPbfRuleList.js +34 -0
  154. package/getPbfRuleList.js.map +1 -1
  155. package/getQosPolicyRule.d.ts +72 -0
  156. package/getQosPolicyRule.js +60 -0
  157. package/getQosPolicyRule.js.map +1 -1
  158. package/getQosPolicyRuleList.d.ts +48 -2
  159. package/getQosPolicyRuleList.js +36 -2
  160. package/getQosPolicyRuleList.js.map +1 -1
  161. package/getRadiusServerProfile.d.ts +54 -0
  162. package/getRadiusServerProfile.js +54 -0
  163. package/getRadiusServerProfile.js.map +1 -1
  164. package/getSdwanTrafficDistributionProfile.d.ts +1 -1
  165. package/getSecurityRule.d.ts +106 -0
  166. package/getSecurityRule.js +94 -0
  167. package/getSecurityRule.js.map +1 -1
  168. package/getSecurityRuleList.d.ts +46 -2
  169. package/getSecurityRuleList.js +34 -2
  170. package/getSecurityRuleList.js.map +1 -1
  171. package/getServiceConnection.d.ts +177 -1
  172. package/getServiceConnection.js +176 -0
  173. package/getServiceConnection.js.map +1 -1
  174. package/getServiceConnectionGroup.d.ts +208 -0
  175. package/getServiceConnectionGroup.js +208 -0
  176. package/getServiceConnectionGroup.js.map +1 -1
  177. package/getServiceGroupList.d.ts +2 -2
  178. package/getServiceGroupList.js +2 -2
  179. package/getServiceList.d.ts +4 -4
  180. package/getServiceList.js +4 -4
  181. package/getSnippet.d.ts +48 -0
  182. package/getSnippet.js +48 -0
  183. package/getSnippet.js.map +1 -1
  184. package/getSnippetList.d.ts +24 -0
  185. package/getSnippetList.js +24 -0
  186. package/getSnippetList.js.map +1 -1
  187. package/getTagList.d.ts +2 -2
  188. package/getTagList.js +2 -2
  189. package/getTunnelInterface.d.ts +42 -4
  190. package/getTunnelInterface.js +38 -0
  191. package/getTunnelInterface.js.map +1 -1
  192. package/getTunnelInterfaceList.d.ts +26 -0
  193. package/getTunnelInterfaceList.js +26 -0
  194. package/getTunnelInterfaceList.js.map +1 -1
  195. package/getUrlAccessProfileList.d.ts +2 -2
  196. package/getUrlAccessProfileList.js +2 -2
  197. package/getUrlCategoryList.d.ts +4 -4
  198. package/getUrlCategoryList.js +4 -4
  199. package/getVlanInterface.d.ts +46 -6
  200. package/getVlanInterface.js +40 -0
  201. package/getVlanInterface.js.map +1 -1
  202. package/getVlanInterfaceList.d.ts +26 -0
  203. package/getVlanInterfaceList.js +26 -0
  204. package/getVlanInterfaceList.js.map +1 -1
  205. package/getVulnerabilityProtectionProfileList.d.ts +2 -2
  206. package/getVulnerabilityProtectionProfileList.js +2 -2
  207. package/getVulnerabilityProtectionSignature.d.ts +41 -1
  208. package/getVulnerabilityProtectionSignature.js +40 -0
  209. package/getVulnerabilityProtectionSignature.js.map +1 -1
  210. package/getVulnerabilityProtectionSignatureList.d.ts +32 -0
  211. package/getVulnerabilityProtectionSignatureList.js +32 -0
  212. package/getVulnerabilityProtectionSignatureList.js.map +1 -1
  213. package/getZone.d.ts +44 -0
  214. package/getZone.js +44 -0
  215. package/getZone.js.map +1 -1
  216. package/getZoneList.d.ts +26 -0
  217. package/getZoneList.js +26 -0
  218. package/getZoneList.js.map +1 -1
  219. package/ikeGateway.d.ts +49 -0
  220. package/ikeGateway.js +49 -0
  221. package/ikeGateway.js.map +1 -1
  222. package/index.d.ts +9 -9
  223. package/index.js +12 -12
  224. package/index.js.map +1 -1
  225. package/interfaceManagementProfile.d.ts +56 -24
  226. package/interfaceManagementProfile.js +30 -0
  227. package/interfaceManagementProfile.js.map +1 -1
  228. package/ipsecCryptoProfile.d.ts +28 -0
  229. package/ipsecCryptoProfile.js +28 -0
  230. package/ipsecCryptoProfile.js.map +1 -1
  231. package/ipsecTunnel.d.ts +66 -0
  232. package/ipsecTunnel.js +66 -0
  233. package/ipsecTunnel.js.map +1 -1
  234. package/layer2Subinterface.d.ts +36 -7
  235. package/layer2Subinterface.js +32 -0
  236. package/layer2Subinterface.js.map +1 -1
  237. package/layer3Subinterface.d.ts +70 -11
  238. package/layer3Subinterface.js +59 -0
  239. package/layer3Subinterface.js.map +1 -1
  240. package/logicalRouter.d.ts +2 -0
  241. package/logicalRouter.js +2 -0
  242. package/logicalRouter.js.map +1 -1
  243. package/loopbackInterface.d.ts +58 -15
  244. package/loopbackInterface.js +35 -2
  245. package/loopbackInterface.js.map +1 -1
  246. package/natRule.d.ts +135 -42
  247. package/natRule.js +121 -8
  248. package/natRule.js.map +1 -1
  249. package/package.json +2 -2
  250. package/pbfRule.d.ts +89 -0
  251. package/pbfRule.js +89 -0
  252. package/pbfRule.js.map +1 -1
  253. package/qosPolicyRule.d.ts +95 -0
  254. package/qosPolicyRule.js +75 -0
  255. package/qosPolicyRule.js.map +1 -1
  256. package/radiusServerProfile.d.ts +38 -0
  257. package/radiusServerProfile.js +38 -0
  258. package/radiusServerProfile.js.map +1 -1
  259. package/remoteNetwork.d.ts +81 -0
  260. package/remoteNetwork.js +81 -0
  261. package/remoteNetwork.js.map +1 -1
  262. package/sdwanTrafficDistributionProfile.d.ts +4 -4
  263. package/securityRule.d.ts +181 -0
  264. package/securityRule.js +161 -0
  265. package/securityRule.js.map +1 -1
  266. package/serviceConnection.d.ts +82 -3
  267. package/serviceConnection.js +81 -2
  268. package/serviceConnection.js.map +1 -1
  269. package/serviceConnectionGroup.d.ts +100 -0
  270. package/serviceConnectionGroup.js +100 -0
  271. package/serviceConnectionGroup.js.map +1 -1
  272. package/serviceGroup.d.ts +2 -2
  273. package/serviceGroup.js +2 -2
  274. package/snippet.d.ts +23 -0
  275. package/snippet.js +23 -0
  276. package/snippet.js.map +1 -1
  277. package/tag.d.ts +3 -3
  278. package/tag.js +3 -3
  279. package/tunnelInterface.d.ts +42 -12
  280. package/tunnelInterface.js +32 -2
  281. package/tunnelInterface.js.map +1 -1
  282. package/types/input.d.ts +607 -335
  283. package/types/output.d.ts +1945 -1069
  284. package/vlanInterface.d.ts +40 -20
  285. package/vlanInterface.js +20 -0
  286. package/vlanInterface.js.map +1 -1
  287. package/vulnerabilityProtectionSignature.d.ts +12 -10
  288. package/vulnerabilityProtectionSignature.js +14 -0
  289. package/vulnerabilityProtectionSignature.js.map +1 -1
  290. package/zone.d.ts +71 -0
  291. package/zone.js +71 -0
  292. package/zone.js.map +1 -1
  293. package/aggregateEthernetInterface.js.map +0 -1
  294. package/getAggregateEthernetInterface.d.ts +0 -78
  295. package/getAggregateEthernetInterface.js +0 -30
  296. package/getAggregateEthernetInterface.js.map +0 -1
  297. package/getAggregateEthernetInterfaceList.js +0 -40
  298. package/getAggregateEthernetInterfaceList.js.map +0 -1
@@ -1 +1 @@
1
- {"version":3,"file":"getRadiusServerProfile.js","sourceRoot":"","sources":["../getRadiusServerProfile.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;GAEG;AACH,SAAgB,sBAAsB,CAAC,IAAgC,EAAE,IAA2B;IAChG,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,yDAAyD,EAAE;QACpF,IAAI,EAAE,IAAI,CAAC,EAAE;QACb,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAND,wDAMC;AA0DD;;GAEG;AACH,SAAgB,4BAA4B,CAAC,IAAsC,EAAE,IAAiC;IAClH,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,YAAY,CAAC,yDAAyD,EAAE;QAC1F,IAAI,EAAE,IAAI,CAAC,EAAE;QACb,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAND,oEAMC"}
1
+ {"version":3,"file":"getRadiusServerProfile.js","sourceRoot":"","sources":["../getRadiusServerProfile.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA6BG;AACH,SAAgB,sBAAsB,CAAC,IAAgC,EAAE,IAA2B;IAChG,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,yDAAyD,EAAE;QACpF,IAAI,EAAE,IAAI,CAAC,EAAE;QACb,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAND,wDAMC;AA0DD;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA6BG;AACH,SAAgB,4BAA4B,CAAC,IAAsC,EAAE,IAAiC;IAClH,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,YAAY,CAAC,yDAAyD,EAAE;QAC1F,IAAI,EAAE,IAAI,CAAC,EAAE;QACb,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAND,oEAMC"}
@@ -34,7 +34,7 @@ export interface GetSdwanTrafficDistributionProfileResult {
34
34
  */
35
35
  readonly id: string;
36
36
  /**
37
- * Link tags
37
+ * Link-Tags for interfaces identified by defined tags
38
38
  */
39
39
  readonly linkTags: outputs.GetSdwanTrafficDistributionProfileLinkTag[];
40
40
  /**
@@ -2,6 +2,53 @@ import * as pulumi from "@pulumi/pulumi";
2
2
  import * as outputs from "./types/output";
3
3
  /**
4
4
  * SecurityRule data source
5
+ *
6
+ * ## Example Usage
7
+ *
8
+ * ```typescript
9
+ * import * as pulumi from "@pulumi/pulumi";
10
+ * import * as scm from "@pulumi/scm";
11
+ *
12
+ * const standardWebAccess = new scm.SecurityRule("standard_web_access", {
13
+ * folder: "All",
14
+ * name: "Allow Standard Web Access DS1",
15
+ * description: "Allow outbound web traffic to any destination...",
16
+ * position: "pre",
17
+ * action: "allow",
18
+ * categories: ["any"],
19
+ * applications: [
20
+ * "web-browsing",
21
+ * "ssl",
22
+ * ],
23
+ * services: [
24
+ * "service-http",
25
+ * "service-https",
26
+ * ],
27
+ * froms: [
28
+ * "untrust",
29
+ * "trust",
30
+ * ],
31
+ * tos: ["trust"],
32
+ * sources: ["any"],
33
+ * destinations: ["any"],
34
+ * negateSource: false,
35
+ * negateDestination: false,
36
+ * sourceUsers: ["any"],
37
+ * sourceHips: ["any"],
38
+ * destinationHips: ["any"],
39
+ * logStart: true,
40
+ * logEnd: true,
41
+ * disabled: false,
42
+ * });
43
+ * // --- Data Source Calls to Fetch Existing Rules ---
44
+ * // 1. Fetch by ID (Best for direct lookup)
45
+ * const standardWebAccessById = scm.getSecurityRuleOutput({
46
+ * id: standardWebAccess.id,
47
+ * });
48
+ * export const fetchedStandardWebId = standardWebAccessById.apply(standardWebAccessById => standardWebAccessById.id);
49
+ * export const fetchedStandardWebName = standardWebAccessById.apply(standardWebAccessById => standardWebAccessById.name);
50
+ * export const fetchedStandardWebDescription = standardWebAccessById.apply(standardWebAccessById => standardWebAccessById.description);
51
+ * ```
5
52
  */
6
53
  export declare function getSecurityRule(args: GetSecurityRuleArgs, opts?: pulumi.InvokeOptions): Promise<GetSecurityRuleResult>;
7
54
  /**
@@ -125,10 +172,18 @@ export interface GetSecurityRuleResult {
125
172
  * Policy type
126
173
  */
127
174
  readonly policyType: string;
175
+ /**
176
+ * The position of a security rule
177
+ */
178
+ readonly position: string;
128
179
  /**
129
180
  * The security profile object
130
181
  */
131
182
  readonly profileSetting: outputs.GetSecurityRuleProfileSetting;
183
+ /**
184
+ * Relative positioning rule. String must be one of these: `"before"`, `"after"`, `"top"`, `"bottom"`. If not specified, rule is created at the bottom of the ruleset.
185
+ */
186
+ readonly relativePosition: string;
132
187
  /**
133
188
  * Schedule in which this rule will be applied
134
189
  */
@@ -161,6 +216,10 @@ export interface GetSecurityRuleResult {
161
216
  * The tags associated with the security rule
162
217
  */
163
218
  readonly tags: string[];
219
+ /**
220
+ * The name or UUID of the rule to position this rule relative to. Required when `relativePosition` is `"before"` or `"after"`.
221
+ */
222
+ readonly targetRule: string;
164
223
  /**
165
224
  * Tenant restrictions
166
225
  */
@@ -173,6 +232,53 @@ export interface GetSecurityRuleResult {
173
232
  }
174
233
  /**
175
234
  * SecurityRule data source
235
+ *
236
+ * ## Example Usage
237
+ *
238
+ * ```typescript
239
+ * import * as pulumi from "@pulumi/pulumi";
240
+ * import * as scm from "@pulumi/scm";
241
+ *
242
+ * const standardWebAccess = new scm.SecurityRule("standard_web_access", {
243
+ * folder: "All",
244
+ * name: "Allow Standard Web Access DS1",
245
+ * description: "Allow outbound web traffic to any destination...",
246
+ * position: "pre",
247
+ * action: "allow",
248
+ * categories: ["any"],
249
+ * applications: [
250
+ * "web-browsing",
251
+ * "ssl",
252
+ * ],
253
+ * services: [
254
+ * "service-http",
255
+ * "service-https",
256
+ * ],
257
+ * froms: [
258
+ * "untrust",
259
+ * "trust",
260
+ * ],
261
+ * tos: ["trust"],
262
+ * sources: ["any"],
263
+ * destinations: ["any"],
264
+ * negateSource: false,
265
+ * negateDestination: false,
266
+ * sourceUsers: ["any"],
267
+ * sourceHips: ["any"],
268
+ * destinationHips: ["any"],
269
+ * logStart: true,
270
+ * logEnd: true,
271
+ * disabled: false,
272
+ * });
273
+ * // --- Data Source Calls to Fetch Existing Rules ---
274
+ * // 1. Fetch by ID (Best for direct lookup)
275
+ * const standardWebAccessById = scm.getSecurityRuleOutput({
276
+ * id: standardWebAccess.id,
277
+ * });
278
+ * export const fetchedStandardWebId = standardWebAccessById.apply(standardWebAccessById => standardWebAccessById.id);
279
+ * export const fetchedStandardWebName = standardWebAccessById.apply(standardWebAccessById => standardWebAccessById.name);
280
+ * export const fetchedStandardWebDescription = standardWebAccessById.apply(standardWebAccessById => standardWebAccessById.description);
281
+ * ```
176
282
  */
177
283
  export declare function getSecurityRuleOutput(args: GetSecurityRuleOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output<GetSecurityRuleResult>;
178
284
  /**
@@ -7,6 +7,53 @@ const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("./utilities");
8
8
  /**
9
9
  * SecurityRule data source
10
+ *
11
+ * ## Example Usage
12
+ *
13
+ * ```typescript
14
+ * import * as pulumi from "@pulumi/pulumi";
15
+ * import * as scm from "@pulumi/scm";
16
+ *
17
+ * const standardWebAccess = new scm.SecurityRule("standard_web_access", {
18
+ * folder: "All",
19
+ * name: "Allow Standard Web Access DS1",
20
+ * description: "Allow outbound web traffic to any destination...",
21
+ * position: "pre",
22
+ * action: "allow",
23
+ * categories: ["any"],
24
+ * applications: [
25
+ * "web-browsing",
26
+ * "ssl",
27
+ * ],
28
+ * services: [
29
+ * "service-http",
30
+ * "service-https",
31
+ * ],
32
+ * froms: [
33
+ * "untrust",
34
+ * "trust",
35
+ * ],
36
+ * tos: ["trust"],
37
+ * sources: ["any"],
38
+ * destinations: ["any"],
39
+ * negateSource: false,
40
+ * negateDestination: false,
41
+ * sourceUsers: ["any"],
42
+ * sourceHips: ["any"],
43
+ * destinationHips: ["any"],
44
+ * logStart: true,
45
+ * logEnd: true,
46
+ * disabled: false,
47
+ * });
48
+ * // --- Data Source Calls to Fetch Existing Rules ---
49
+ * // 1. Fetch by ID (Best for direct lookup)
50
+ * const standardWebAccessById = scm.getSecurityRuleOutput({
51
+ * id: standardWebAccess.id,
52
+ * });
53
+ * export const fetchedStandardWebId = standardWebAccessById.apply(standardWebAccessById => standardWebAccessById.id);
54
+ * export const fetchedStandardWebName = standardWebAccessById.apply(standardWebAccessById => standardWebAccessById.name);
55
+ * export const fetchedStandardWebDescription = standardWebAccessById.apply(standardWebAccessById => standardWebAccessById.description);
56
+ * ```
10
57
  */
11
58
  function getSecurityRule(args, opts) {
12
59
  opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
@@ -18,6 +65,53 @@ function getSecurityRule(args, opts) {
18
65
  exports.getSecurityRule = getSecurityRule;
19
66
  /**
20
67
  * SecurityRule data source
68
+ *
69
+ * ## Example Usage
70
+ *
71
+ * ```typescript
72
+ * import * as pulumi from "@pulumi/pulumi";
73
+ * import * as scm from "@pulumi/scm";
74
+ *
75
+ * const standardWebAccess = new scm.SecurityRule("standard_web_access", {
76
+ * folder: "All",
77
+ * name: "Allow Standard Web Access DS1",
78
+ * description: "Allow outbound web traffic to any destination...",
79
+ * position: "pre",
80
+ * action: "allow",
81
+ * categories: ["any"],
82
+ * applications: [
83
+ * "web-browsing",
84
+ * "ssl",
85
+ * ],
86
+ * services: [
87
+ * "service-http",
88
+ * "service-https",
89
+ * ],
90
+ * froms: [
91
+ * "untrust",
92
+ * "trust",
93
+ * ],
94
+ * tos: ["trust"],
95
+ * sources: ["any"],
96
+ * destinations: ["any"],
97
+ * negateSource: false,
98
+ * negateDestination: false,
99
+ * sourceUsers: ["any"],
100
+ * sourceHips: ["any"],
101
+ * destinationHips: ["any"],
102
+ * logStart: true,
103
+ * logEnd: true,
104
+ * disabled: false,
105
+ * });
106
+ * // --- Data Source Calls to Fetch Existing Rules ---
107
+ * // 1. Fetch by ID (Best for direct lookup)
108
+ * const standardWebAccessById = scm.getSecurityRuleOutput({
109
+ * id: standardWebAccess.id,
110
+ * });
111
+ * export const fetchedStandardWebId = standardWebAccessById.apply(standardWebAccessById => standardWebAccessById.id);
112
+ * export const fetchedStandardWebName = standardWebAccessById.apply(standardWebAccessById => standardWebAccessById.name);
113
+ * export const fetchedStandardWebDescription = standardWebAccessById.apply(standardWebAccessById => standardWebAccessById.description);
114
+ * ```
21
115
  */
22
116
  function getSecurityRuleOutput(args, opts) {
23
117
  opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
@@ -1 +1 @@
1
- {"version":3,"file":"getSecurityRule.js","sourceRoot":"","sources":["../getSecurityRule.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;GAEG;AACH,SAAgB,eAAe,CAAC,IAAyB,EAAE,IAA2B;IAClF,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,2CAA2C,EAAE;QACtE,IAAI,EAAE,IAAI,CAAC,EAAE;QACb,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAND,0CAMC;AA0KD;;GAEG;AACH,SAAgB,qBAAqB,CAAC,IAA+B,EAAE,IAAiC;IACpG,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,YAAY,CAAC,2CAA2C,EAAE;QAC5E,IAAI,EAAE,IAAI,CAAC,EAAE;QACb,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAND,sDAMC"}
1
+ {"version":3,"file":"getSecurityRule.js","sourceRoot":"","sources":["../getSecurityRule.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAiDG;AACH,SAAgB,eAAe,CAAC,IAAyB,EAAE,IAA2B;IAClF,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,2CAA2C,EAAE;QACtE,IAAI,EAAE,IAAI,CAAC,EAAE;QACb,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAND,0CAMC;AAsLD;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAiDG;AACH,SAAgB,qBAAqB,CAAC,IAA+B,EAAE,IAAiC;IACpG,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,YAAY,CAAC,2CAA2C,EAAE;QAC5E,IAAI,EAAE,IAAI,CAAC,EAAE;QACb,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAND,sDAMC"}
@@ -2,8 +2,24 @@ import * as pulumi from "@pulumi/pulumi";
2
2
  import * as outputs from "./types/output";
3
3
  /**
4
4
  * Retrieves a listing of config items.
5
+ *
6
+ * ## Example Usage
7
+ *
8
+ * ```typescript
9
+ * import * as pulumi from "@pulumi/pulumi";
10
+ * import * as scm from "@pulumi/scm";
11
+ *
12
+ * const pagedRulesList = scm.getSecurityRuleList({
13
+ * folder: "All",
14
+ * position: "pre",
15
+ * });
16
+ * export const fetchedRuleListSummary = {
17
+ * countOfRulesFetched: pagedRulesList.then(pagedRulesList => pagedRulesList.total),
18
+ * firstRuleName: pagedRulesList.then(pagedRulesList => pagedRulesList.datas?.[0]?.name),
19
+ * };
20
+ * ```
5
21
  */
6
- export declare function getSecurityRuleList(args?: GetSecurityRuleListArgs, opts?: pulumi.InvokeOptions): Promise<GetSecurityRuleListResult>;
22
+ export declare function getSecurityRuleList(args: GetSecurityRuleListArgs, opts?: pulumi.InvokeOptions): Promise<GetSecurityRuleListResult>;
7
23
  /**
8
24
  * A collection of arguments for invoking getSecurityRuleList.
9
25
  */
@@ -28,6 +44,10 @@ export interface GetSecurityRuleListArgs {
28
44
  * The offset of the first item to return.
29
45
  */
30
46
  offset?: number;
47
+ /**
48
+ * The position of a security rule
49
+ */
50
+ position: string;
31
51
  /**
32
52
  * The snippet of the item.
33
53
  */
@@ -65,6 +85,10 @@ export interface GetSecurityRuleListResult {
65
85
  * The offset of the first item to return.
66
86
  */
67
87
  readonly offset?: number;
88
+ /**
89
+ * The position of a security rule
90
+ */
91
+ readonly position: string;
68
92
  /**
69
93
  * The snippet of the item.
70
94
  */
@@ -77,8 +101,24 @@ export interface GetSecurityRuleListResult {
77
101
  }
78
102
  /**
79
103
  * Retrieves a listing of config items.
104
+ *
105
+ * ## Example Usage
106
+ *
107
+ * ```typescript
108
+ * import * as pulumi from "@pulumi/pulumi";
109
+ * import * as scm from "@pulumi/scm";
110
+ *
111
+ * const pagedRulesList = scm.getSecurityRuleList({
112
+ * folder: "All",
113
+ * position: "pre",
114
+ * });
115
+ * export const fetchedRuleListSummary = {
116
+ * countOfRulesFetched: pagedRulesList.then(pagedRulesList => pagedRulesList.total),
117
+ * firstRuleName: pagedRulesList.then(pagedRulesList => pagedRulesList.datas?.[0]?.name),
118
+ * };
119
+ * ```
80
120
  */
81
- export declare function getSecurityRuleListOutput(args?: GetSecurityRuleListOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output<GetSecurityRuleListResult>;
121
+ export declare function getSecurityRuleListOutput(args: GetSecurityRuleListOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output<GetSecurityRuleListResult>;
82
122
  /**
83
123
  * A collection of arguments for invoking getSecurityRuleList.
84
124
  */
@@ -103,6 +143,10 @@ export interface GetSecurityRuleListOutputArgs {
103
143
  * The offset of the first item to return.
104
144
  */
105
145
  offset?: pulumi.Input<number>;
146
+ /**
147
+ * The position of a security rule
148
+ */
149
+ position: pulumi.Input<string>;
106
150
  /**
107
151
  * The snippet of the item.
108
152
  */
@@ -7,9 +7,24 @@ const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("./utilities");
8
8
  /**
9
9
  * Retrieves a listing of config items.
10
+ *
11
+ * ## Example Usage
12
+ *
13
+ * ```typescript
14
+ * import * as pulumi from "@pulumi/pulumi";
15
+ * import * as scm from "@pulumi/scm";
16
+ *
17
+ * const pagedRulesList = scm.getSecurityRuleList({
18
+ * folder: "All",
19
+ * position: "pre",
20
+ * });
21
+ * export const fetchedRuleListSummary = {
22
+ * countOfRulesFetched: pagedRulesList.then(pagedRulesList => pagedRulesList.total),
23
+ * firstRuleName: pagedRulesList.then(pagedRulesList => pagedRulesList.datas?.[0]?.name),
24
+ * };
25
+ * ```
10
26
  */
11
27
  function getSecurityRuleList(args, opts) {
12
- args = args || {};
13
28
  opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
14
29
  return pulumi.runtime.invoke("scm:index/getSecurityRuleList:getSecurityRuleList", {
15
30
  "device": args.device,
@@ -17,15 +32,31 @@ function getSecurityRuleList(args, opts) {
17
32
  "limit": args.limit,
18
33
  "name": args.name,
19
34
  "offset": args.offset,
35
+ "position": args.position,
20
36
  "snippet": args.snippet,
21
37
  }, opts);
22
38
  }
23
39
  exports.getSecurityRuleList = getSecurityRuleList;
24
40
  /**
25
41
  * Retrieves a listing of config items.
42
+ *
43
+ * ## Example Usage
44
+ *
45
+ * ```typescript
46
+ * import * as pulumi from "@pulumi/pulumi";
47
+ * import * as scm from "@pulumi/scm";
48
+ *
49
+ * const pagedRulesList = scm.getSecurityRuleList({
50
+ * folder: "All",
51
+ * position: "pre",
52
+ * });
53
+ * export const fetchedRuleListSummary = {
54
+ * countOfRulesFetched: pagedRulesList.then(pagedRulesList => pagedRulesList.total),
55
+ * firstRuleName: pagedRulesList.then(pagedRulesList => pagedRulesList.datas?.[0]?.name),
56
+ * };
57
+ * ```
26
58
  */
27
59
  function getSecurityRuleListOutput(args, opts) {
28
- args = args || {};
29
60
  opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
30
61
  return pulumi.runtime.invokeOutput("scm:index/getSecurityRuleList:getSecurityRuleList", {
31
62
  "device": args.device,
@@ -33,6 +64,7 @@ function getSecurityRuleListOutput(args, opts) {
33
64
  "limit": args.limit,
34
65
  "name": args.name,
35
66
  "offset": args.offset,
67
+ "position": args.position,
36
68
  "snippet": args.snippet,
37
69
  }, opts);
38
70
  }
@@ -1 +1 @@
1
- {"version":3,"file":"getSecurityRuleList.js","sourceRoot":"","sources":["../getSecurityRuleList.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;GAEG;AACH,SAAgB,mBAAmB,CAAC,IAA8B,EAAE,IAA2B;IAC3F,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;IAClB,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,mDAAmD,EAAE;QAC9E,QAAQ,EAAE,IAAI,CAAC,MAAM;QACrB,QAAQ,EAAE,IAAI,CAAC,MAAM;QACrB,OAAO,EAAE,IAAI,CAAC,KAAK;QACnB,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,QAAQ,EAAE,IAAI,CAAC,MAAM;QACrB,SAAS,EAAE,IAAI,CAAC,OAAO;KAC1B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAXD,kDAWC;AA0ED;;GAEG;AACH,SAAgB,yBAAyB,CAAC,IAAoC,EAAE,IAAiC;IAC7G,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;IAClB,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,YAAY,CAAC,mDAAmD,EAAE;QACpF,QAAQ,EAAE,IAAI,CAAC,MAAM;QACrB,QAAQ,EAAE,IAAI,CAAC,MAAM;QACrB,OAAO,EAAE,IAAI,CAAC,KAAK;QACnB,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,QAAQ,EAAE,IAAI,CAAC,MAAM;QACrB,SAAS,EAAE,IAAI,CAAC,OAAO;KAC1B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAXD,8DAWC"}
1
+ {"version":3,"file":"getSecurityRuleList.js","sourceRoot":"","sources":["../getSecurityRuleList.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;GAkBG;AACH,SAAgB,mBAAmB,CAAC,IAA6B,EAAE,IAA2B;IAC1F,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,mDAAmD,EAAE;QAC9E,QAAQ,EAAE,IAAI,CAAC,MAAM;QACrB,QAAQ,EAAE,IAAI,CAAC,MAAM;QACrB,OAAO,EAAE,IAAI,CAAC,KAAK;QACnB,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,QAAQ,EAAE,IAAI,CAAC,MAAM;QACrB,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,SAAS,EAAE,IAAI,CAAC,OAAO;KAC1B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAXD,kDAWC;AAkFD;;;;;;;;;;;;;;;;;;GAkBG;AACH,SAAgB,yBAAyB,CAAC,IAAmC,EAAE,IAAiC;IAC5G,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,YAAY,CAAC,mDAAmD,EAAE;QACpF,QAAQ,EAAE,IAAI,CAAC,MAAM;QACrB,QAAQ,EAAE,IAAI,CAAC,MAAM;QACrB,OAAO,EAAE,IAAI,CAAC,KAAK;QACnB,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,QAAQ,EAAE,IAAI,CAAC,MAAM;QACrB,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,SAAS,EAAE,IAAI,CAAC,OAAO;KAC1B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAXD,8DAWC"}
@@ -4,6 +4,94 @@ import * as outputs from "./types/output";
4
4
  * ServiceConnection data source
5
5
  *
6
6
  * ## Example Usage
7
+ *
8
+ * ```typescript
9
+ * import * as pulumi from "@pulumi/pulumi";
10
+ * import * as scm from "@pulumi/scm";
11
+ *
12
+ * const config = new pulumi.Config();
13
+ * // The folder scope for the SCM resource (e.g., 'Shared', 'Predefined', or a specific folder name).
14
+ * const folderScope = config.get("folderScope") || "Service Connections";
15
+ * //# 1. Define the IKE Crypto Profile (IKE Phase 1)
16
+ * // Note: The resource name is plural: "scm_ike_crypto_profile"
17
+ * const example = new scm.IkeCryptoProfile("example", {
18
+ * name: "example-ike-crypto_data",
19
+ * folder: folderScope,
20
+ * hashes: ["sha256"],
21
+ * dhGroups: ["group14"],
22
+ * encryptions: ["aes-256-cbc"],
23
+ * });
24
+ * //# 2. Define the IPsec Crypto Profile (IKE Phase 2)
25
+ * // Note: The resource name is plural and nested blocks now use an equals sign (=).
26
+ * const exampleIpsecCryptoProfile = new scm.IpsecCryptoProfile("example", {
27
+ * name: "panw-IPSec-Crypto_data",
28
+ * folder: folderScope,
29
+ * esp: {
30
+ * encryptions: ["aes-256-gcm"],
31
+ * authentications: ["sha256"],
32
+ * },
33
+ * dhGroup: "group14",
34
+ * lifetime: {
35
+ * hours: 8,
36
+ * },
37
+ * });
38
+ * //# 3. Define the IKE Gateway
39
+ * // Note: The resource name is plural and nested blocks now use an equals sign (=).
40
+ * const exampleIkeGateway = new scm.IkeGateway("example", {
41
+ * name: "example-gateway_data",
42
+ * folder: folderScope,
43
+ * peerAddress: {
44
+ * ip: "1.1.1.1",
45
+ * },
46
+ * authentication: {
47
+ * preSharedKey: {
48
+ * key: "secret",
49
+ * },
50
+ * },
51
+ * protocol: {
52
+ * ikev1: {
53
+ * ikeCryptoProfile: example.name,
54
+ * },
55
+ * },
56
+ * });
57
+ * //# 4. Define the IPsec Tunnel
58
+ * // Note: Nested 'auto_key' block uses an equals sign (=).
59
+ * const exampleIpsecTunnel = new scm.IpsecTunnel("example", {
60
+ * name: "example-tunnel_data",
61
+ * folder: folderScope,
62
+ * tunnelInterface: "tunnel",
63
+ * antiReplay: true,
64
+ * copyTos: false,
65
+ * enableGreEncapsulation: false,
66
+ * autoKey: {
67
+ * ikeGateways: [{
68
+ * name: exampleIkeGateway.name,
69
+ * }],
70
+ * ipsecCryptoProfile: exampleIpsecCryptoProfile.name,
71
+ * },
72
+ * }, {
73
+ * dependsOn: [exampleIkeGateway],
74
+ * });
75
+ * const siteAVpnSc = new scm.ServiceConnection("site_a_vpn_sc", {
76
+ * name: "creating_a_service_connection_data",
77
+ * region: "us-west-1",
78
+ * ipsecTunnel: exampleIpsecTunnel.name,
79
+ * subnets: [
80
+ * "10.1.0.0/16",
81
+ * "172.16.0.0/24",
82
+ * ],
83
+ * sourceNat: true,
84
+ * });
85
+ * //------------------------------------------------------
86
+ * // Data Soruce
87
+ * //------------------------------------------------------
88
+ * const createdConnLookup = scm.getServiceConnectionOutput({
89
+ * id: siteAVpnSc.id,
90
+ * });
91
+ * export const createdServiceConnectionId = createdConnLookup.apply(createdConnLookup => createdConnLookup.id);
92
+ * export const createdServiceConnectionRegion = createdConnLookup.apply(createdConnLookup => createdConnLookup.region);
93
+ * export const createdServiceConnectionSubnets = createdConnLookup.apply(createdConnLookup => createdConnLookup.subnets);
94
+ * ```
7
95
  */
8
96
  export declare function getServiceConnection(args: GetServiceConnectionArgs, opts?: pulumi.InvokeOptions): Promise<GetServiceConnectionResult>;
9
97
  /**
@@ -26,7 +114,7 @@ export interface GetServiceConnectionResult {
26
114
  /**
27
115
  * Backup s c
28
116
  */
29
- readonly backupSC: string;
117
+ readonly backupSc: string;
30
118
  /**
31
119
  * Bgp peer
32
120
  */
@@ -91,6 +179,94 @@ export interface GetServiceConnectionResult {
91
179
  * ServiceConnection data source
92
180
  *
93
181
  * ## Example Usage
182
+ *
183
+ * ```typescript
184
+ * import * as pulumi from "@pulumi/pulumi";
185
+ * import * as scm from "@pulumi/scm";
186
+ *
187
+ * const config = new pulumi.Config();
188
+ * // The folder scope for the SCM resource (e.g., 'Shared', 'Predefined', or a specific folder name).
189
+ * const folderScope = config.get("folderScope") || "Service Connections";
190
+ * //# 1. Define the IKE Crypto Profile (IKE Phase 1)
191
+ * // Note: The resource name is plural: "scm_ike_crypto_profile"
192
+ * const example = new scm.IkeCryptoProfile("example", {
193
+ * name: "example-ike-crypto_data",
194
+ * folder: folderScope,
195
+ * hashes: ["sha256"],
196
+ * dhGroups: ["group14"],
197
+ * encryptions: ["aes-256-cbc"],
198
+ * });
199
+ * //# 2. Define the IPsec Crypto Profile (IKE Phase 2)
200
+ * // Note: The resource name is plural and nested blocks now use an equals sign (=).
201
+ * const exampleIpsecCryptoProfile = new scm.IpsecCryptoProfile("example", {
202
+ * name: "panw-IPSec-Crypto_data",
203
+ * folder: folderScope,
204
+ * esp: {
205
+ * encryptions: ["aes-256-gcm"],
206
+ * authentications: ["sha256"],
207
+ * },
208
+ * dhGroup: "group14",
209
+ * lifetime: {
210
+ * hours: 8,
211
+ * },
212
+ * });
213
+ * //# 3. Define the IKE Gateway
214
+ * // Note: The resource name is plural and nested blocks now use an equals sign (=).
215
+ * const exampleIkeGateway = new scm.IkeGateway("example", {
216
+ * name: "example-gateway_data",
217
+ * folder: folderScope,
218
+ * peerAddress: {
219
+ * ip: "1.1.1.1",
220
+ * },
221
+ * authentication: {
222
+ * preSharedKey: {
223
+ * key: "secret",
224
+ * },
225
+ * },
226
+ * protocol: {
227
+ * ikev1: {
228
+ * ikeCryptoProfile: example.name,
229
+ * },
230
+ * },
231
+ * });
232
+ * //# 4. Define the IPsec Tunnel
233
+ * // Note: Nested 'auto_key' block uses an equals sign (=).
234
+ * const exampleIpsecTunnel = new scm.IpsecTunnel("example", {
235
+ * name: "example-tunnel_data",
236
+ * folder: folderScope,
237
+ * tunnelInterface: "tunnel",
238
+ * antiReplay: true,
239
+ * copyTos: false,
240
+ * enableGreEncapsulation: false,
241
+ * autoKey: {
242
+ * ikeGateways: [{
243
+ * name: exampleIkeGateway.name,
244
+ * }],
245
+ * ipsecCryptoProfile: exampleIpsecCryptoProfile.name,
246
+ * },
247
+ * }, {
248
+ * dependsOn: [exampleIkeGateway],
249
+ * });
250
+ * const siteAVpnSc = new scm.ServiceConnection("site_a_vpn_sc", {
251
+ * name: "creating_a_service_connection_data",
252
+ * region: "us-west-1",
253
+ * ipsecTunnel: exampleIpsecTunnel.name,
254
+ * subnets: [
255
+ * "10.1.0.0/16",
256
+ * "172.16.0.0/24",
257
+ * ],
258
+ * sourceNat: true,
259
+ * });
260
+ * //------------------------------------------------------
261
+ * // Data Soruce
262
+ * //------------------------------------------------------
263
+ * const createdConnLookup = scm.getServiceConnectionOutput({
264
+ * id: siteAVpnSc.id,
265
+ * });
266
+ * export const createdServiceConnectionId = createdConnLookup.apply(createdConnLookup => createdConnLookup.id);
267
+ * export const createdServiceConnectionRegion = createdConnLookup.apply(createdConnLookup => createdConnLookup.region);
268
+ * export const createdServiceConnectionSubnets = createdConnLookup.apply(createdConnLookup => createdConnLookup.subnets);
269
+ * ```
94
270
  */
95
271
  export declare function getServiceConnectionOutput(args: GetServiceConnectionOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output<GetServiceConnectionResult>;
96
272
  /**