@pulumi/scm 1.0.0-alpha.1762844275 → 1.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/address.d.ts +3 -3
- package/address.js +3 -3
- package/addressGroup.d.ts +2 -2
- package/addressGroup.js +2 -2
- package/{aggregateInterface.d.ts → aggregateEthernetInterface.d.ts} +24 -26
- package/{aggregateInterface.js → aggregateEthernetInterface.js} +11 -13
- package/aggregateEthernetInterface.js.map +1 -0
- package/antiSpywareSignature.d.ts +3 -3
- package/appOverrideRule.d.ts +3 -128
- package/appOverrideRule.js +0 -95
- package/appOverrideRule.js.map +1 -1
- package/applicationFilter.d.ts +0 -16
- package/applicationFilter.js +0 -16
- package/applicationFilter.js.map +1 -1
- package/authenticationRule.d.ts +0 -123
- package/authenticationRule.js +0 -103
- package/authenticationRule.js.map +1 -1
- package/bgpRouteMapRedistribution.d.ts +6 -6
- package/certificateProfile.d.ts +0 -29
- package/certificateProfile.js +0 -29
- package/certificateProfile.js.map +1 -1
- package/decryptionProfile.d.ts +0 -139
- package/decryptionProfile.js +0 -139
- package/decryptionProfile.js.map +1 -1
- package/decryptionRule.d.ts +0 -139
- package/decryptionRule.js +0 -119
- package/decryptionRule.js.map +1 -1
- package/dnsProxy.d.ts +6 -6
- package/dnsSecurityProfile.d.ts +0 -2
- package/dnsSecurityProfile.js +0 -2
- package/dnsSecurityProfile.js.map +1 -1
- package/dynamicUserGroup.d.ts +3 -3
- package/dynamicUserGroup.js +3 -3
- package/ethernetInterface.d.ts +11 -13
- package/ethernetInterface.js +0 -2
- package/ethernetInterface.js.map +1 -1
- package/externalDynamicList.d.ts +0 -80
- package/externalDynamicList.js +0 -80
- package/externalDynamicList.js.map +1 -1
- package/folder.d.ts +0 -60
- package/folder.js +0 -60
- package/folder.js.map +1 -1
- package/getAddressGroupList.d.ts +4 -4
- package/getAddressGroupList.js +4 -4
- package/getAddressList.d.ts +4 -4
- package/getAddressList.js +4 -4
- package/getAggregateEthernetInterface.d.ts +78 -0
- package/getAggregateEthernetInterface.js +30 -0
- package/getAggregateEthernetInterface.js.map +1 -0
- package/{getAggregateInterfaceList.d.ts → getAggregateEthernetInterfaceList.d.ts} +9 -35
- package/getAggregateEthernetInterfaceList.js +40 -0
- package/getAggregateEthernetInterfaceList.js.map +1 -0
- package/getAntiSpywareProfileList.d.ts +2 -2
- package/getAntiSpywareProfileList.js +2 -2
- package/getAntiSpywareSignature.d.ts +1 -1
- package/getAntiSpywareSignatureList.d.ts +2 -2
- package/getAntiSpywareSignatureList.js +2 -2
- package/getAppOverrideRule.d.ts +1 -65
- package/getAppOverrideRule.js +0 -52
- package/getAppOverrideRule.js.map +1 -1
- package/getAppOverrideRuleList.d.ts +2 -48
- package/getAppOverrideRuleList.js +2 -36
- package/getAppOverrideRuleList.js.map +1 -1
- package/getApplicationGroupList.d.ts +4 -4
- package/getApplicationGroupList.js +4 -4
- package/getApplicationList.d.ts +2 -2
- package/getApplicationList.js +2 -2
- package/getAuthenticationRule.d.ts +0 -74
- package/getAuthenticationRule.js +0 -62
- package/getAuthenticationRule.js.map +1 -1
- package/getAuthenticationRuleList.d.ts +2 -50
- package/getAuthenticationRuleList.js +2 -38
- package/getAuthenticationRuleList.js.map +1 -1
- package/getBgpRouteMapRedistribution.d.ts +7 -7
- package/getCertificateProfileList.d.ts +2 -2
- package/getCertificateProfileList.js +2 -2
- package/getDecryptionProfile.d.ts +0 -40
- package/getDecryptionProfile.js +0 -40
- package/getDecryptionProfile.js.map +1 -1
- package/getDecryptionProfileList.d.ts +0 -32
- package/getDecryptionProfileList.js +0 -32
- package/getDecryptionProfileList.js.map +1 -1
- package/getDecryptionRule.d.ts +0 -74
- package/getDecryptionRule.js +0 -62
- package/getDecryptionRule.js.map +1 -1
- package/getDecryptionRuleList.d.ts +2 -48
- package/getDecryptionRuleList.js +2 -36
- package/getDecryptionRuleList.js.map +1 -1
- package/getDnsProxy.d.ts +1 -1
- package/getDnsSecurityProfile.d.ts +0 -40
- package/getDnsSecurityProfile.js +0 -40
- package/getDnsSecurityProfile.js.map +1 -1
- package/getDnsSecurityProfileList.d.ts +0 -32
- package/getDnsSecurityProfileList.js +0 -32
- package/getDnsSecurityProfileList.js.map +1 -1
- package/getDynamicUserGroupList.d.ts +4 -4
- package/getDynamicUserGroupList.js +4 -4
- package/getEthernetInterface.d.ts +2 -40
- package/getEthernetInterface.js +0 -38
- package/getEthernetInterface.js.map +1 -1
- package/getEthernetInterfaceList.d.ts +0 -26
- package/getEthernetInterfaceList.js +0 -26
- package/getEthernetInterfaceList.js.map +1 -1
- package/getExternalDynamicListList.d.ts +4 -4
- package/getExternalDynamicListList.js +4 -4
- package/getFolder.d.ts +0 -36
- package/getFolder.js +0 -36
- package/getFolder.js.map +1 -1
- package/getHipObjectList.d.ts +4 -4
- package/getHipObjectList.js +4 -4
- package/getHipProfileList.d.ts +4 -4
- package/getHipProfileList.js +4 -4
- package/getInterfaceManagementProfile.d.ts +8 -89
- package/getInterfaceManagementProfile.js +0 -80
- package/getInterfaceManagementProfile.js.map +1 -1
- package/getInterfaceManagementProfileList.d.ts +0 -42
- package/getInterfaceManagementProfileList.js +0 -42
- package/getInterfaceManagementProfileList.js.map +1 -1
- package/getLayer2Subinterface.d.ts +2 -42
- package/getLayer2Subinterface.js +0 -40
- package/getLayer2Subinterface.js.map +1 -1
- package/getLayer2SubinterfaceList.d.ts +0 -26
- package/getLayer2SubinterfaceList.js +0 -26
- package/getLayer2SubinterfaceList.js.map +1 -1
- package/getLayer3Subinterface.d.ts +3 -45
- package/getLayer3Subinterface.js +0 -42
- package/getLayer3Subinterface.js.map +1 -1
- package/getLayer3SubinterfaceList.d.ts +0 -26
- package/getLayer3SubinterfaceList.js +0 -26
- package/getLayer3SubinterfaceList.js.map +1 -1
- package/getLogicalRouter.d.ts +0 -38
- package/getLogicalRouter.js +0 -38
- package/getLogicalRouter.js.map +1 -1
- package/getLogicalRouterList.d.ts +0 -40
- package/getLogicalRouterList.js +0 -30
- package/getLogicalRouterList.js.map +1 -1
- package/getLoopbackInterface.d.ts +7 -49
- package/getLoopbackInterface.js +0 -38
- package/getLoopbackInterface.js.map +1 -1
- package/getLoopbackInterfaceList.d.ts +0 -26
- package/getLoopbackInterfaceList.js +0 -26
- package/getLoopbackInterfaceList.js.map +1 -1
- package/getNatRule.d.ts +14 -86
- package/getNatRule.js +0 -76
- package/getNatRule.js.map +1 -1
- package/getNatRuleList.d.ts +2 -52
- package/getNatRuleList.js +2 -40
- package/getNatRuleList.js.map +1 -1
- package/getPbfRule.d.ts +0 -88
- package/getPbfRule.js +0 -88
- package/getPbfRule.js.map +1 -1
- package/getPbfRuleList.d.ts +0 -34
- package/getPbfRuleList.js +0 -34
- package/getPbfRuleList.js.map +1 -1
- package/getQosPolicyRule.d.ts +0 -72
- package/getQosPolicyRule.js +0 -60
- package/getQosPolicyRule.js.map +1 -1
- package/getQosPolicyRuleList.d.ts +2 -48
- package/getQosPolicyRuleList.js +2 -36
- package/getQosPolicyRuleList.js.map +1 -1
- package/getRadiusServerProfile.d.ts +0 -54
- package/getRadiusServerProfile.js +0 -54
- package/getRadiusServerProfile.js.map +1 -1
- package/getSdwanTrafficDistributionProfile.d.ts +1 -1
- package/getSecurityRule.d.ts +0 -106
- package/getSecurityRule.js +0 -94
- package/getSecurityRule.js.map +1 -1
- package/getSecurityRuleList.d.ts +2 -46
- package/getSecurityRuleList.js +2 -34
- package/getSecurityRuleList.js.map +1 -1
- package/getServiceConnection.d.ts +1 -177
- package/getServiceConnection.js +0 -176
- package/getServiceConnection.js.map +1 -1
- package/getServiceConnectionGroup.d.ts +0 -208
- package/getServiceConnectionGroup.js +0 -208
- package/getServiceConnectionGroup.js.map +1 -1
- package/getServiceGroupList.d.ts +2 -2
- package/getServiceGroupList.js +2 -2
- package/getServiceList.d.ts +4 -4
- package/getServiceList.js +4 -4
- package/getSnippet.d.ts +0 -48
- package/getSnippet.js +0 -48
- package/getSnippet.js.map +1 -1
- package/getSnippetList.d.ts +0 -24
- package/getSnippetList.js +0 -24
- package/getSnippetList.js.map +1 -1
- package/getTagList.d.ts +2 -2
- package/getTagList.js +2 -2
- package/getTunnelInterface.d.ts +4 -42
- package/getTunnelInterface.js +0 -38
- package/getTunnelInterface.js.map +1 -1
- package/getTunnelInterfaceList.d.ts +0 -26
- package/getTunnelInterfaceList.js +0 -26
- package/getTunnelInterfaceList.js.map +1 -1
- package/getUrlAccessProfileList.d.ts +2 -2
- package/getUrlAccessProfileList.js +2 -2
- package/getUrlCategoryList.d.ts +4 -4
- package/getUrlCategoryList.js +4 -4
- package/getVlanInterface.d.ts +6 -46
- package/getVlanInterface.js +0 -40
- package/getVlanInterface.js.map +1 -1
- package/getVlanInterfaceList.d.ts +0 -26
- package/getVlanInterfaceList.js +0 -26
- package/getVlanInterfaceList.js.map +1 -1
- package/getVulnerabilityProtectionProfileList.d.ts +2 -2
- package/getVulnerabilityProtectionProfileList.js +2 -2
- package/getVulnerabilityProtectionSignature.d.ts +1 -41
- package/getVulnerabilityProtectionSignature.js +0 -40
- package/getVulnerabilityProtectionSignature.js.map +1 -1
- package/getVulnerabilityProtectionSignatureList.d.ts +0 -32
- package/getVulnerabilityProtectionSignatureList.js +0 -32
- package/getVulnerabilityProtectionSignatureList.js.map +1 -1
- package/getZone.d.ts +0 -44
- package/getZone.js +0 -44
- package/getZone.js.map +1 -1
- package/getZoneList.d.ts +0 -26
- package/getZoneList.js +0 -26
- package/getZoneList.js.map +1 -1
- package/ikeGateway.d.ts +0 -49
- package/ikeGateway.js +0 -49
- package/ikeGateway.js.map +1 -1
- package/index.d.ts +9 -9
- package/index.js +12 -12
- package/index.js.map +1 -1
- package/interfaceManagementProfile.d.ts +24 -56
- package/interfaceManagementProfile.js +0 -30
- package/interfaceManagementProfile.js.map +1 -1
- package/ipsecCryptoProfile.d.ts +0 -28
- package/ipsecCryptoProfile.js +0 -28
- package/ipsecCryptoProfile.js.map +1 -1
- package/ipsecTunnel.d.ts +0 -66
- package/ipsecTunnel.js +0 -66
- package/ipsecTunnel.js.map +1 -1
- package/layer2Subinterface.d.ts +7 -36
- package/layer2Subinterface.js +0 -32
- package/layer2Subinterface.js.map +1 -1
- package/layer3Subinterface.d.ts +11 -70
- package/layer3Subinterface.js +0 -59
- package/layer3Subinterface.js.map +1 -1
- package/logicalRouter.d.ts +0 -2
- package/logicalRouter.js +0 -2
- package/logicalRouter.js.map +1 -1
- package/loopbackInterface.d.ts +15 -58
- package/loopbackInterface.js +2 -35
- package/loopbackInterface.js.map +1 -1
- package/natRule.d.ts +42 -135
- package/natRule.js +8 -121
- package/natRule.js.map +1 -1
- package/package.json +2 -2
- package/pbfRule.d.ts +0 -89
- package/pbfRule.js +0 -89
- package/pbfRule.js.map +1 -1
- package/qosPolicyRule.d.ts +0 -95
- package/qosPolicyRule.js +0 -75
- package/qosPolicyRule.js.map +1 -1
- package/radiusServerProfile.d.ts +0 -38
- package/radiusServerProfile.js +0 -38
- package/radiusServerProfile.js.map +1 -1
- package/remoteNetwork.d.ts +0 -81
- package/remoteNetwork.js +0 -81
- package/remoteNetwork.js.map +1 -1
- package/sdwanTrafficDistributionProfile.d.ts +4 -4
- package/securityRule.d.ts +0 -181
- package/securityRule.js +0 -161
- package/securityRule.js.map +1 -1
- package/serviceConnection.d.ts +3 -82
- package/serviceConnection.js +2 -81
- package/serviceConnection.js.map +1 -1
- package/serviceConnectionGroup.d.ts +0 -100
- package/serviceConnectionGroup.js +0 -100
- package/serviceConnectionGroup.js.map +1 -1
- package/serviceGroup.d.ts +2 -2
- package/serviceGroup.js +2 -2
- package/snippet.d.ts +0 -23
- package/snippet.js +0 -23
- package/snippet.js.map +1 -1
- package/tag.d.ts +3 -3
- package/tag.js +3 -3
- package/tunnelInterface.d.ts +12 -42
- package/tunnelInterface.js +2 -32
- package/tunnelInterface.js.map +1 -1
- package/types/input.d.ts +335 -607
- package/types/output.d.ts +1069 -1945
- package/vlanInterface.d.ts +20 -40
- package/vlanInterface.js +0 -20
- package/vlanInterface.js.map +1 -1
- package/vulnerabilityProtectionSignature.d.ts +10 -12
- package/vulnerabilityProtectionSignature.js +0 -14
- package/vulnerabilityProtectionSignature.js.map +1 -1
- package/zone.d.ts +0 -71
- package/zone.js +0 -71
- package/zone.js.map +1 -1
- package/aggregateInterface.js.map +0 -1
- package/getAggregateInterface.d.ts +0 -116
- package/getAggregateInterface.js +0 -68
- package/getAggregateInterface.js.map +0 -1
- package/getAggregateInterfaceList.js +0 -66
- package/getAggregateInterfaceList.js.map +0 -1
package/getSecurityRuleList.d.ts
CHANGED
|
@@ -2,24 +2,8 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
2
2
|
import * as outputs from "./types/output";
|
|
3
3
|
/**
|
|
4
4
|
* Retrieves a listing of config items.
|
|
5
|
-
*
|
|
6
|
-
* ## Example Usage
|
|
7
|
-
*
|
|
8
|
-
* ```typescript
|
|
9
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
10
|
-
* import * as scm from "@pulumi/scm";
|
|
11
|
-
*
|
|
12
|
-
* const pagedRulesList = scm.getSecurityRuleList({
|
|
13
|
-
* folder: "All",
|
|
14
|
-
* position: "pre",
|
|
15
|
-
* });
|
|
16
|
-
* export const fetchedRuleListSummary = {
|
|
17
|
-
* countOfRulesFetched: pagedRulesList.then(pagedRulesList => pagedRulesList.total),
|
|
18
|
-
* firstRuleName: pagedRulesList.then(pagedRulesList => pagedRulesList.datas?.[0]?.name),
|
|
19
|
-
* };
|
|
20
|
-
* ```
|
|
21
5
|
*/
|
|
22
|
-
export declare function getSecurityRuleList(args
|
|
6
|
+
export declare function getSecurityRuleList(args?: GetSecurityRuleListArgs, opts?: pulumi.InvokeOptions): Promise<GetSecurityRuleListResult>;
|
|
23
7
|
/**
|
|
24
8
|
* A collection of arguments for invoking getSecurityRuleList.
|
|
25
9
|
*/
|
|
@@ -44,10 +28,6 @@ export interface GetSecurityRuleListArgs {
|
|
|
44
28
|
* The offset of the first item to return.
|
|
45
29
|
*/
|
|
46
30
|
offset?: number;
|
|
47
|
-
/**
|
|
48
|
-
* The position of a security rule
|
|
49
|
-
*/
|
|
50
|
-
position: string;
|
|
51
31
|
/**
|
|
52
32
|
* The snippet of the item.
|
|
53
33
|
*/
|
|
@@ -85,10 +65,6 @@ export interface GetSecurityRuleListResult {
|
|
|
85
65
|
* The offset of the first item to return.
|
|
86
66
|
*/
|
|
87
67
|
readonly offset?: number;
|
|
88
|
-
/**
|
|
89
|
-
* The position of a security rule
|
|
90
|
-
*/
|
|
91
|
-
readonly position: string;
|
|
92
68
|
/**
|
|
93
69
|
* The snippet of the item.
|
|
94
70
|
*/
|
|
@@ -101,24 +77,8 @@ export interface GetSecurityRuleListResult {
|
|
|
101
77
|
}
|
|
102
78
|
/**
|
|
103
79
|
* Retrieves a listing of config items.
|
|
104
|
-
*
|
|
105
|
-
* ## Example Usage
|
|
106
|
-
*
|
|
107
|
-
* ```typescript
|
|
108
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
109
|
-
* import * as scm from "@pulumi/scm";
|
|
110
|
-
*
|
|
111
|
-
* const pagedRulesList = scm.getSecurityRuleList({
|
|
112
|
-
* folder: "All",
|
|
113
|
-
* position: "pre",
|
|
114
|
-
* });
|
|
115
|
-
* export const fetchedRuleListSummary = {
|
|
116
|
-
* countOfRulesFetched: pagedRulesList.then(pagedRulesList => pagedRulesList.total),
|
|
117
|
-
* firstRuleName: pagedRulesList.then(pagedRulesList => pagedRulesList.datas?.[0]?.name),
|
|
118
|
-
* };
|
|
119
|
-
* ```
|
|
120
80
|
*/
|
|
121
|
-
export declare function getSecurityRuleListOutput(args
|
|
81
|
+
export declare function getSecurityRuleListOutput(args?: GetSecurityRuleListOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output<GetSecurityRuleListResult>;
|
|
122
82
|
/**
|
|
123
83
|
* A collection of arguments for invoking getSecurityRuleList.
|
|
124
84
|
*/
|
|
@@ -143,10 +103,6 @@ export interface GetSecurityRuleListOutputArgs {
|
|
|
143
103
|
* The offset of the first item to return.
|
|
144
104
|
*/
|
|
145
105
|
offset?: pulumi.Input<number>;
|
|
146
|
-
/**
|
|
147
|
-
* The position of a security rule
|
|
148
|
-
*/
|
|
149
|
-
position: pulumi.Input<string>;
|
|
150
106
|
/**
|
|
151
107
|
* The snippet of the item.
|
|
152
108
|
*/
|
package/getSecurityRuleList.js
CHANGED
|
@@ -7,24 +7,9 @@ const pulumi = require("@pulumi/pulumi");
|
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
9
|
* Retrieves a listing of config items.
|
|
10
|
-
*
|
|
11
|
-
* ## Example Usage
|
|
12
|
-
*
|
|
13
|
-
* ```typescript
|
|
14
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
15
|
-
* import * as scm from "@pulumi/scm";
|
|
16
|
-
*
|
|
17
|
-
* const pagedRulesList = scm.getSecurityRuleList({
|
|
18
|
-
* folder: "All",
|
|
19
|
-
* position: "pre",
|
|
20
|
-
* });
|
|
21
|
-
* export const fetchedRuleListSummary = {
|
|
22
|
-
* countOfRulesFetched: pagedRulesList.then(pagedRulesList => pagedRulesList.total),
|
|
23
|
-
* firstRuleName: pagedRulesList.then(pagedRulesList => pagedRulesList.datas?.[0]?.name),
|
|
24
|
-
* };
|
|
25
|
-
* ```
|
|
26
10
|
*/
|
|
27
11
|
function getSecurityRuleList(args, opts) {
|
|
12
|
+
args = args || {};
|
|
28
13
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
|
|
29
14
|
return pulumi.runtime.invoke("scm:index/getSecurityRuleList:getSecurityRuleList", {
|
|
30
15
|
"device": args.device,
|
|
@@ -32,31 +17,15 @@ function getSecurityRuleList(args, opts) {
|
|
|
32
17
|
"limit": args.limit,
|
|
33
18
|
"name": args.name,
|
|
34
19
|
"offset": args.offset,
|
|
35
|
-
"position": args.position,
|
|
36
20
|
"snippet": args.snippet,
|
|
37
21
|
}, opts);
|
|
38
22
|
}
|
|
39
23
|
exports.getSecurityRuleList = getSecurityRuleList;
|
|
40
24
|
/**
|
|
41
25
|
* Retrieves a listing of config items.
|
|
42
|
-
*
|
|
43
|
-
* ## Example Usage
|
|
44
|
-
*
|
|
45
|
-
* ```typescript
|
|
46
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
47
|
-
* import * as scm from "@pulumi/scm";
|
|
48
|
-
*
|
|
49
|
-
* const pagedRulesList = scm.getSecurityRuleList({
|
|
50
|
-
* folder: "All",
|
|
51
|
-
* position: "pre",
|
|
52
|
-
* });
|
|
53
|
-
* export const fetchedRuleListSummary = {
|
|
54
|
-
* countOfRulesFetched: pagedRulesList.then(pagedRulesList => pagedRulesList.total),
|
|
55
|
-
* firstRuleName: pagedRulesList.then(pagedRulesList => pagedRulesList.datas?.[0]?.name),
|
|
56
|
-
* };
|
|
57
|
-
* ```
|
|
58
26
|
*/
|
|
59
27
|
function getSecurityRuleListOutput(args, opts) {
|
|
28
|
+
args = args || {};
|
|
60
29
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
|
|
61
30
|
return pulumi.runtime.invokeOutput("scm:index/getSecurityRuleList:getSecurityRuleList", {
|
|
62
31
|
"device": args.device,
|
|
@@ -64,7 +33,6 @@ function getSecurityRuleListOutput(args, opts) {
|
|
|
64
33
|
"limit": args.limit,
|
|
65
34
|
"name": args.name,
|
|
66
35
|
"offset": args.offset,
|
|
67
|
-
"position": args.position,
|
|
68
36
|
"snippet": args.snippet,
|
|
69
37
|
}, opts);
|
|
70
38
|
}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getSecurityRuleList.js","sourceRoot":"","sources":["../getSecurityRuleList.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"getSecurityRuleList.js","sourceRoot":"","sources":["../getSecurityRuleList.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;GAEG;AACH,SAAgB,mBAAmB,CAAC,IAA8B,EAAE,IAA2B;IAC3F,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;IAClB,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,mDAAmD,EAAE;QAC9E,QAAQ,EAAE,IAAI,CAAC,MAAM;QACrB,QAAQ,EAAE,IAAI,CAAC,MAAM;QACrB,OAAO,EAAE,IAAI,CAAC,KAAK;QACnB,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,QAAQ,EAAE,IAAI,CAAC,MAAM;QACrB,SAAS,EAAE,IAAI,CAAC,OAAO;KAC1B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAXD,kDAWC;AA0ED;;GAEG;AACH,SAAgB,yBAAyB,CAAC,IAAoC,EAAE,IAAiC;IAC7G,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;IAClB,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,YAAY,CAAC,mDAAmD,EAAE;QACpF,QAAQ,EAAE,IAAI,CAAC,MAAM;QACrB,QAAQ,EAAE,IAAI,CAAC,MAAM;QACrB,OAAO,EAAE,IAAI,CAAC,KAAK;QACnB,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,QAAQ,EAAE,IAAI,CAAC,MAAM;QACrB,SAAS,EAAE,IAAI,CAAC,OAAO;KAC1B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAXD,8DAWC"}
|
|
@@ -4,94 +4,6 @@ import * as outputs from "./types/output";
|
|
|
4
4
|
* ServiceConnection data source
|
|
5
5
|
*
|
|
6
6
|
* ## Example Usage
|
|
7
|
-
*
|
|
8
|
-
* ```typescript
|
|
9
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
10
|
-
* import * as scm from "@pulumi/scm";
|
|
11
|
-
*
|
|
12
|
-
* const config = new pulumi.Config();
|
|
13
|
-
* // The folder scope for the SCM resource (e.g., 'Shared', 'Predefined', or a specific folder name).
|
|
14
|
-
* const folderScope = config.get("folderScope") || "Service Connections";
|
|
15
|
-
* //# 1. Define the IKE Crypto Profile (IKE Phase 1)
|
|
16
|
-
* // Note: The resource name is plural: "scm_ike_crypto_profile"
|
|
17
|
-
* const example = new scm.IkeCryptoProfile("example", {
|
|
18
|
-
* name: "example-ike-crypto_data",
|
|
19
|
-
* folder: folderScope,
|
|
20
|
-
* hashes: ["sha256"],
|
|
21
|
-
* dhGroups: ["group14"],
|
|
22
|
-
* encryptions: ["aes-256-cbc"],
|
|
23
|
-
* });
|
|
24
|
-
* //# 2. Define the IPsec Crypto Profile (IKE Phase 2)
|
|
25
|
-
* // Note: The resource name is plural and nested blocks now use an equals sign (=).
|
|
26
|
-
* const exampleIpsecCryptoProfile = new scm.IpsecCryptoProfile("example", {
|
|
27
|
-
* name: "panw-IPSec-Crypto_data",
|
|
28
|
-
* folder: folderScope,
|
|
29
|
-
* esp: {
|
|
30
|
-
* encryptions: ["aes-256-gcm"],
|
|
31
|
-
* authentications: ["sha256"],
|
|
32
|
-
* },
|
|
33
|
-
* dhGroup: "group14",
|
|
34
|
-
* lifetime: {
|
|
35
|
-
* hours: 8,
|
|
36
|
-
* },
|
|
37
|
-
* });
|
|
38
|
-
* //# 3. Define the IKE Gateway
|
|
39
|
-
* // Note: The resource name is plural and nested blocks now use an equals sign (=).
|
|
40
|
-
* const exampleIkeGateway = new scm.IkeGateway("example", {
|
|
41
|
-
* name: "example-gateway_data",
|
|
42
|
-
* folder: folderScope,
|
|
43
|
-
* peerAddress: {
|
|
44
|
-
* ip: "1.1.1.1",
|
|
45
|
-
* },
|
|
46
|
-
* authentication: {
|
|
47
|
-
* preSharedKey: {
|
|
48
|
-
* key: "secret",
|
|
49
|
-
* },
|
|
50
|
-
* },
|
|
51
|
-
* protocol: {
|
|
52
|
-
* ikev1: {
|
|
53
|
-
* ikeCryptoProfile: example.name,
|
|
54
|
-
* },
|
|
55
|
-
* },
|
|
56
|
-
* });
|
|
57
|
-
* //# 4. Define the IPsec Tunnel
|
|
58
|
-
* // Note: Nested 'auto_key' block uses an equals sign (=).
|
|
59
|
-
* const exampleIpsecTunnel = new scm.IpsecTunnel("example", {
|
|
60
|
-
* name: "example-tunnel_data",
|
|
61
|
-
* folder: folderScope,
|
|
62
|
-
* tunnelInterface: "tunnel",
|
|
63
|
-
* antiReplay: true,
|
|
64
|
-
* copyTos: false,
|
|
65
|
-
* enableGreEncapsulation: false,
|
|
66
|
-
* autoKey: {
|
|
67
|
-
* ikeGateways: [{
|
|
68
|
-
* name: exampleIkeGateway.name,
|
|
69
|
-
* }],
|
|
70
|
-
* ipsecCryptoProfile: exampleIpsecCryptoProfile.name,
|
|
71
|
-
* },
|
|
72
|
-
* }, {
|
|
73
|
-
* dependsOn: [exampleIkeGateway],
|
|
74
|
-
* });
|
|
75
|
-
* const siteAVpnSc = new scm.ServiceConnection("site_a_vpn_sc", {
|
|
76
|
-
* name: "creating_a_service_connection_data",
|
|
77
|
-
* region: "us-west-1",
|
|
78
|
-
* ipsecTunnel: exampleIpsecTunnel.name,
|
|
79
|
-
* subnets: [
|
|
80
|
-
* "10.1.0.0/16",
|
|
81
|
-
* "172.16.0.0/24",
|
|
82
|
-
* ],
|
|
83
|
-
* sourceNat: true,
|
|
84
|
-
* });
|
|
85
|
-
* //------------------------------------------------------
|
|
86
|
-
* // Data Soruce
|
|
87
|
-
* //------------------------------------------------------
|
|
88
|
-
* const createdConnLookup = scm.getServiceConnectionOutput({
|
|
89
|
-
* id: siteAVpnSc.id,
|
|
90
|
-
* });
|
|
91
|
-
* export const createdServiceConnectionId = createdConnLookup.apply(createdConnLookup => createdConnLookup.id);
|
|
92
|
-
* export const createdServiceConnectionRegion = createdConnLookup.apply(createdConnLookup => createdConnLookup.region);
|
|
93
|
-
* export const createdServiceConnectionSubnets = createdConnLookup.apply(createdConnLookup => createdConnLookup.subnets);
|
|
94
|
-
* ```
|
|
95
7
|
*/
|
|
96
8
|
export declare function getServiceConnection(args: GetServiceConnectionArgs, opts?: pulumi.InvokeOptions): Promise<GetServiceConnectionResult>;
|
|
97
9
|
/**
|
|
@@ -114,7 +26,7 @@ export interface GetServiceConnectionResult {
|
|
|
114
26
|
/**
|
|
115
27
|
* Backup s c
|
|
116
28
|
*/
|
|
117
|
-
readonly
|
|
29
|
+
readonly backupSC: string;
|
|
118
30
|
/**
|
|
119
31
|
* Bgp peer
|
|
120
32
|
*/
|
|
@@ -179,94 +91,6 @@ export interface GetServiceConnectionResult {
|
|
|
179
91
|
* ServiceConnection data source
|
|
180
92
|
*
|
|
181
93
|
* ## Example Usage
|
|
182
|
-
*
|
|
183
|
-
* ```typescript
|
|
184
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
185
|
-
* import * as scm from "@pulumi/scm";
|
|
186
|
-
*
|
|
187
|
-
* const config = new pulumi.Config();
|
|
188
|
-
* // The folder scope for the SCM resource (e.g., 'Shared', 'Predefined', or a specific folder name).
|
|
189
|
-
* const folderScope = config.get("folderScope") || "Service Connections";
|
|
190
|
-
* //# 1. Define the IKE Crypto Profile (IKE Phase 1)
|
|
191
|
-
* // Note: The resource name is plural: "scm_ike_crypto_profile"
|
|
192
|
-
* const example = new scm.IkeCryptoProfile("example", {
|
|
193
|
-
* name: "example-ike-crypto_data",
|
|
194
|
-
* folder: folderScope,
|
|
195
|
-
* hashes: ["sha256"],
|
|
196
|
-
* dhGroups: ["group14"],
|
|
197
|
-
* encryptions: ["aes-256-cbc"],
|
|
198
|
-
* });
|
|
199
|
-
* //# 2. Define the IPsec Crypto Profile (IKE Phase 2)
|
|
200
|
-
* // Note: The resource name is plural and nested blocks now use an equals sign (=).
|
|
201
|
-
* const exampleIpsecCryptoProfile = new scm.IpsecCryptoProfile("example", {
|
|
202
|
-
* name: "panw-IPSec-Crypto_data",
|
|
203
|
-
* folder: folderScope,
|
|
204
|
-
* esp: {
|
|
205
|
-
* encryptions: ["aes-256-gcm"],
|
|
206
|
-
* authentications: ["sha256"],
|
|
207
|
-
* },
|
|
208
|
-
* dhGroup: "group14",
|
|
209
|
-
* lifetime: {
|
|
210
|
-
* hours: 8,
|
|
211
|
-
* },
|
|
212
|
-
* });
|
|
213
|
-
* //# 3. Define the IKE Gateway
|
|
214
|
-
* // Note: The resource name is plural and nested blocks now use an equals sign (=).
|
|
215
|
-
* const exampleIkeGateway = new scm.IkeGateway("example", {
|
|
216
|
-
* name: "example-gateway_data",
|
|
217
|
-
* folder: folderScope,
|
|
218
|
-
* peerAddress: {
|
|
219
|
-
* ip: "1.1.1.1",
|
|
220
|
-
* },
|
|
221
|
-
* authentication: {
|
|
222
|
-
* preSharedKey: {
|
|
223
|
-
* key: "secret",
|
|
224
|
-
* },
|
|
225
|
-
* },
|
|
226
|
-
* protocol: {
|
|
227
|
-
* ikev1: {
|
|
228
|
-
* ikeCryptoProfile: example.name,
|
|
229
|
-
* },
|
|
230
|
-
* },
|
|
231
|
-
* });
|
|
232
|
-
* //# 4. Define the IPsec Tunnel
|
|
233
|
-
* // Note: Nested 'auto_key' block uses an equals sign (=).
|
|
234
|
-
* const exampleIpsecTunnel = new scm.IpsecTunnel("example", {
|
|
235
|
-
* name: "example-tunnel_data",
|
|
236
|
-
* folder: folderScope,
|
|
237
|
-
* tunnelInterface: "tunnel",
|
|
238
|
-
* antiReplay: true,
|
|
239
|
-
* copyTos: false,
|
|
240
|
-
* enableGreEncapsulation: false,
|
|
241
|
-
* autoKey: {
|
|
242
|
-
* ikeGateways: [{
|
|
243
|
-
* name: exampleIkeGateway.name,
|
|
244
|
-
* }],
|
|
245
|
-
* ipsecCryptoProfile: exampleIpsecCryptoProfile.name,
|
|
246
|
-
* },
|
|
247
|
-
* }, {
|
|
248
|
-
* dependsOn: [exampleIkeGateway],
|
|
249
|
-
* });
|
|
250
|
-
* const siteAVpnSc = new scm.ServiceConnection("site_a_vpn_sc", {
|
|
251
|
-
* name: "creating_a_service_connection_data",
|
|
252
|
-
* region: "us-west-1",
|
|
253
|
-
* ipsecTunnel: exampleIpsecTunnel.name,
|
|
254
|
-
* subnets: [
|
|
255
|
-
* "10.1.0.0/16",
|
|
256
|
-
* "172.16.0.0/24",
|
|
257
|
-
* ],
|
|
258
|
-
* sourceNat: true,
|
|
259
|
-
* });
|
|
260
|
-
* //------------------------------------------------------
|
|
261
|
-
* // Data Soruce
|
|
262
|
-
* //------------------------------------------------------
|
|
263
|
-
* const createdConnLookup = scm.getServiceConnectionOutput({
|
|
264
|
-
* id: siteAVpnSc.id,
|
|
265
|
-
* });
|
|
266
|
-
* export const createdServiceConnectionId = createdConnLookup.apply(createdConnLookup => createdConnLookup.id);
|
|
267
|
-
* export const createdServiceConnectionRegion = createdConnLookup.apply(createdConnLookup => createdConnLookup.region);
|
|
268
|
-
* export const createdServiceConnectionSubnets = createdConnLookup.apply(createdConnLookup => createdConnLookup.subnets);
|
|
269
|
-
* ```
|
|
270
94
|
*/
|
|
271
95
|
export declare function getServiceConnectionOutput(args: GetServiceConnectionOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output<GetServiceConnectionResult>;
|
|
272
96
|
/**
|
package/getServiceConnection.js
CHANGED
|
@@ -9,94 +9,6 @@ const utilities = require("./utilities");
|
|
|
9
9
|
* ServiceConnection data source
|
|
10
10
|
*
|
|
11
11
|
* ## Example Usage
|
|
12
|
-
*
|
|
13
|
-
* ```typescript
|
|
14
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
15
|
-
* import * as scm from "@pulumi/scm";
|
|
16
|
-
*
|
|
17
|
-
* const config = new pulumi.Config();
|
|
18
|
-
* // The folder scope for the SCM resource (e.g., 'Shared', 'Predefined', or a specific folder name).
|
|
19
|
-
* const folderScope = config.get("folderScope") || "Service Connections";
|
|
20
|
-
* //# 1. Define the IKE Crypto Profile (IKE Phase 1)
|
|
21
|
-
* // Note: The resource name is plural: "scm_ike_crypto_profile"
|
|
22
|
-
* const example = new scm.IkeCryptoProfile("example", {
|
|
23
|
-
* name: "example-ike-crypto_data",
|
|
24
|
-
* folder: folderScope,
|
|
25
|
-
* hashes: ["sha256"],
|
|
26
|
-
* dhGroups: ["group14"],
|
|
27
|
-
* encryptions: ["aes-256-cbc"],
|
|
28
|
-
* });
|
|
29
|
-
* //# 2. Define the IPsec Crypto Profile (IKE Phase 2)
|
|
30
|
-
* // Note: The resource name is plural and nested blocks now use an equals sign (=).
|
|
31
|
-
* const exampleIpsecCryptoProfile = new scm.IpsecCryptoProfile("example", {
|
|
32
|
-
* name: "panw-IPSec-Crypto_data",
|
|
33
|
-
* folder: folderScope,
|
|
34
|
-
* esp: {
|
|
35
|
-
* encryptions: ["aes-256-gcm"],
|
|
36
|
-
* authentications: ["sha256"],
|
|
37
|
-
* },
|
|
38
|
-
* dhGroup: "group14",
|
|
39
|
-
* lifetime: {
|
|
40
|
-
* hours: 8,
|
|
41
|
-
* },
|
|
42
|
-
* });
|
|
43
|
-
* //# 3. Define the IKE Gateway
|
|
44
|
-
* // Note: The resource name is plural and nested blocks now use an equals sign (=).
|
|
45
|
-
* const exampleIkeGateway = new scm.IkeGateway("example", {
|
|
46
|
-
* name: "example-gateway_data",
|
|
47
|
-
* folder: folderScope,
|
|
48
|
-
* peerAddress: {
|
|
49
|
-
* ip: "1.1.1.1",
|
|
50
|
-
* },
|
|
51
|
-
* authentication: {
|
|
52
|
-
* preSharedKey: {
|
|
53
|
-
* key: "secret",
|
|
54
|
-
* },
|
|
55
|
-
* },
|
|
56
|
-
* protocol: {
|
|
57
|
-
* ikev1: {
|
|
58
|
-
* ikeCryptoProfile: example.name,
|
|
59
|
-
* },
|
|
60
|
-
* },
|
|
61
|
-
* });
|
|
62
|
-
* //# 4. Define the IPsec Tunnel
|
|
63
|
-
* // Note: Nested 'auto_key' block uses an equals sign (=).
|
|
64
|
-
* const exampleIpsecTunnel = new scm.IpsecTunnel("example", {
|
|
65
|
-
* name: "example-tunnel_data",
|
|
66
|
-
* folder: folderScope,
|
|
67
|
-
* tunnelInterface: "tunnel",
|
|
68
|
-
* antiReplay: true,
|
|
69
|
-
* copyTos: false,
|
|
70
|
-
* enableGreEncapsulation: false,
|
|
71
|
-
* autoKey: {
|
|
72
|
-
* ikeGateways: [{
|
|
73
|
-
* name: exampleIkeGateway.name,
|
|
74
|
-
* }],
|
|
75
|
-
* ipsecCryptoProfile: exampleIpsecCryptoProfile.name,
|
|
76
|
-
* },
|
|
77
|
-
* }, {
|
|
78
|
-
* dependsOn: [exampleIkeGateway],
|
|
79
|
-
* });
|
|
80
|
-
* const siteAVpnSc = new scm.ServiceConnection("site_a_vpn_sc", {
|
|
81
|
-
* name: "creating_a_service_connection_data",
|
|
82
|
-
* region: "us-west-1",
|
|
83
|
-
* ipsecTunnel: exampleIpsecTunnel.name,
|
|
84
|
-
* subnets: [
|
|
85
|
-
* "10.1.0.0/16",
|
|
86
|
-
* "172.16.0.0/24",
|
|
87
|
-
* ],
|
|
88
|
-
* sourceNat: true,
|
|
89
|
-
* });
|
|
90
|
-
* //------------------------------------------------------
|
|
91
|
-
* // Data Soruce
|
|
92
|
-
* //------------------------------------------------------
|
|
93
|
-
* const createdConnLookup = scm.getServiceConnectionOutput({
|
|
94
|
-
* id: siteAVpnSc.id,
|
|
95
|
-
* });
|
|
96
|
-
* export const createdServiceConnectionId = createdConnLookup.apply(createdConnLookup => createdConnLookup.id);
|
|
97
|
-
* export const createdServiceConnectionRegion = createdConnLookup.apply(createdConnLookup => createdConnLookup.region);
|
|
98
|
-
* export const createdServiceConnectionSubnets = createdConnLookup.apply(createdConnLookup => createdConnLookup.subnets);
|
|
99
|
-
* ```
|
|
100
12
|
*/
|
|
101
13
|
function getServiceConnection(args, opts) {
|
|
102
14
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
|
|
@@ -110,94 +22,6 @@ exports.getServiceConnection = getServiceConnection;
|
|
|
110
22
|
* ServiceConnection data source
|
|
111
23
|
*
|
|
112
24
|
* ## Example Usage
|
|
113
|
-
*
|
|
114
|
-
* ```typescript
|
|
115
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
116
|
-
* import * as scm from "@pulumi/scm";
|
|
117
|
-
*
|
|
118
|
-
* const config = new pulumi.Config();
|
|
119
|
-
* // The folder scope for the SCM resource (e.g., 'Shared', 'Predefined', or a specific folder name).
|
|
120
|
-
* const folderScope = config.get("folderScope") || "Service Connections";
|
|
121
|
-
* //# 1. Define the IKE Crypto Profile (IKE Phase 1)
|
|
122
|
-
* // Note: The resource name is plural: "scm_ike_crypto_profile"
|
|
123
|
-
* const example = new scm.IkeCryptoProfile("example", {
|
|
124
|
-
* name: "example-ike-crypto_data",
|
|
125
|
-
* folder: folderScope,
|
|
126
|
-
* hashes: ["sha256"],
|
|
127
|
-
* dhGroups: ["group14"],
|
|
128
|
-
* encryptions: ["aes-256-cbc"],
|
|
129
|
-
* });
|
|
130
|
-
* //# 2. Define the IPsec Crypto Profile (IKE Phase 2)
|
|
131
|
-
* // Note: The resource name is plural and nested blocks now use an equals sign (=).
|
|
132
|
-
* const exampleIpsecCryptoProfile = new scm.IpsecCryptoProfile("example", {
|
|
133
|
-
* name: "panw-IPSec-Crypto_data",
|
|
134
|
-
* folder: folderScope,
|
|
135
|
-
* esp: {
|
|
136
|
-
* encryptions: ["aes-256-gcm"],
|
|
137
|
-
* authentications: ["sha256"],
|
|
138
|
-
* },
|
|
139
|
-
* dhGroup: "group14",
|
|
140
|
-
* lifetime: {
|
|
141
|
-
* hours: 8,
|
|
142
|
-
* },
|
|
143
|
-
* });
|
|
144
|
-
* //# 3. Define the IKE Gateway
|
|
145
|
-
* // Note: The resource name is plural and nested blocks now use an equals sign (=).
|
|
146
|
-
* const exampleIkeGateway = new scm.IkeGateway("example", {
|
|
147
|
-
* name: "example-gateway_data",
|
|
148
|
-
* folder: folderScope,
|
|
149
|
-
* peerAddress: {
|
|
150
|
-
* ip: "1.1.1.1",
|
|
151
|
-
* },
|
|
152
|
-
* authentication: {
|
|
153
|
-
* preSharedKey: {
|
|
154
|
-
* key: "secret",
|
|
155
|
-
* },
|
|
156
|
-
* },
|
|
157
|
-
* protocol: {
|
|
158
|
-
* ikev1: {
|
|
159
|
-
* ikeCryptoProfile: example.name,
|
|
160
|
-
* },
|
|
161
|
-
* },
|
|
162
|
-
* });
|
|
163
|
-
* //# 4. Define the IPsec Tunnel
|
|
164
|
-
* // Note: Nested 'auto_key' block uses an equals sign (=).
|
|
165
|
-
* const exampleIpsecTunnel = new scm.IpsecTunnel("example", {
|
|
166
|
-
* name: "example-tunnel_data",
|
|
167
|
-
* folder: folderScope,
|
|
168
|
-
* tunnelInterface: "tunnel",
|
|
169
|
-
* antiReplay: true,
|
|
170
|
-
* copyTos: false,
|
|
171
|
-
* enableGreEncapsulation: false,
|
|
172
|
-
* autoKey: {
|
|
173
|
-
* ikeGateways: [{
|
|
174
|
-
* name: exampleIkeGateway.name,
|
|
175
|
-
* }],
|
|
176
|
-
* ipsecCryptoProfile: exampleIpsecCryptoProfile.name,
|
|
177
|
-
* },
|
|
178
|
-
* }, {
|
|
179
|
-
* dependsOn: [exampleIkeGateway],
|
|
180
|
-
* });
|
|
181
|
-
* const siteAVpnSc = new scm.ServiceConnection("site_a_vpn_sc", {
|
|
182
|
-
* name: "creating_a_service_connection_data",
|
|
183
|
-
* region: "us-west-1",
|
|
184
|
-
* ipsecTunnel: exampleIpsecTunnel.name,
|
|
185
|
-
* subnets: [
|
|
186
|
-
* "10.1.0.0/16",
|
|
187
|
-
* "172.16.0.0/24",
|
|
188
|
-
* ],
|
|
189
|
-
* sourceNat: true,
|
|
190
|
-
* });
|
|
191
|
-
* //------------------------------------------------------
|
|
192
|
-
* // Data Soruce
|
|
193
|
-
* //------------------------------------------------------
|
|
194
|
-
* const createdConnLookup = scm.getServiceConnectionOutput({
|
|
195
|
-
* id: siteAVpnSc.id,
|
|
196
|
-
* });
|
|
197
|
-
* export const createdServiceConnectionId = createdConnLookup.apply(createdConnLookup => createdConnLookup.id);
|
|
198
|
-
* export const createdServiceConnectionRegion = createdConnLookup.apply(createdConnLookup => createdConnLookup.region);
|
|
199
|
-
* export const createdServiceConnectionSubnets = createdConnLookup.apply(createdConnLookup => createdConnLookup.subnets);
|
|
200
|
-
* ```
|
|
201
25
|
*/
|
|
202
26
|
function getServiceConnectionOutput(args, opts) {
|
|
203
27
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getServiceConnection.js","sourceRoot":"","sources":["../getServiceConnection.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"getServiceConnection.js","sourceRoot":"","sources":["../getServiceConnection.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;GAIG;AACH,SAAgB,oBAAoB,CAAC,IAA8B,EAAE,IAA2B;IAC5F,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,qDAAqD,EAAE;QAChF,IAAI,EAAE,IAAI,CAAC,EAAE;QACb,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAND,oDAMC;AAkFD;;;;GAIG;AACH,SAAgB,0BAA0B,CAAC,IAAoC,EAAE,IAAiC;IAC9G,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,YAAY,CAAC,qDAAqD,EAAE;QACtF,IAAI,EAAE,IAAI,CAAC,EAAE;QACb,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAND,gEAMC"}
|