@pulumi/scm 1.0.0-alpha.1762844275 → 1.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (298) hide show
  1. package/address.d.ts +3 -3
  2. package/address.js +3 -3
  3. package/addressGroup.d.ts +2 -2
  4. package/addressGroup.js +2 -2
  5. package/{aggregateInterface.d.ts → aggregateEthernetInterface.d.ts} +24 -26
  6. package/{aggregateInterface.js → aggregateEthernetInterface.js} +11 -13
  7. package/aggregateEthernetInterface.js.map +1 -0
  8. package/antiSpywareSignature.d.ts +3 -3
  9. package/appOverrideRule.d.ts +3 -128
  10. package/appOverrideRule.js +0 -95
  11. package/appOverrideRule.js.map +1 -1
  12. package/applicationFilter.d.ts +0 -16
  13. package/applicationFilter.js +0 -16
  14. package/applicationFilter.js.map +1 -1
  15. package/authenticationRule.d.ts +0 -123
  16. package/authenticationRule.js +0 -103
  17. package/authenticationRule.js.map +1 -1
  18. package/bgpRouteMapRedistribution.d.ts +6 -6
  19. package/certificateProfile.d.ts +0 -29
  20. package/certificateProfile.js +0 -29
  21. package/certificateProfile.js.map +1 -1
  22. package/decryptionProfile.d.ts +0 -139
  23. package/decryptionProfile.js +0 -139
  24. package/decryptionProfile.js.map +1 -1
  25. package/decryptionRule.d.ts +0 -139
  26. package/decryptionRule.js +0 -119
  27. package/decryptionRule.js.map +1 -1
  28. package/dnsProxy.d.ts +6 -6
  29. package/dnsSecurityProfile.d.ts +0 -2
  30. package/dnsSecurityProfile.js +0 -2
  31. package/dnsSecurityProfile.js.map +1 -1
  32. package/dynamicUserGroup.d.ts +3 -3
  33. package/dynamicUserGroup.js +3 -3
  34. package/ethernetInterface.d.ts +11 -13
  35. package/ethernetInterface.js +0 -2
  36. package/ethernetInterface.js.map +1 -1
  37. package/externalDynamicList.d.ts +0 -80
  38. package/externalDynamicList.js +0 -80
  39. package/externalDynamicList.js.map +1 -1
  40. package/folder.d.ts +0 -60
  41. package/folder.js +0 -60
  42. package/folder.js.map +1 -1
  43. package/getAddressGroupList.d.ts +4 -4
  44. package/getAddressGroupList.js +4 -4
  45. package/getAddressList.d.ts +4 -4
  46. package/getAddressList.js +4 -4
  47. package/getAggregateEthernetInterface.d.ts +78 -0
  48. package/getAggregateEthernetInterface.js +30 -0
  49. package/getAggregateEthernetInterface.js.map +1 -0
  50. package/{getAggregateInterfaceList.d.ts → getAggregateEthernetInterfaceList.d.ts} +9 -35
  51. package/getAggregateEthernetInterfaceList.js +40 -0
  52. package/getAggregateEthernetInterfaceList.js.map +1 -0
  53. package/getAntiSpywareProfileList.d.ts +2 -2
  54. package/getAntiSpywareProfileList.js +2 -2
  55. package/getAntiSpywareSignature.d.ts +1 -1
  56. package/getAntiSpywareSignatureList.d.ts +2 -2
  57. package/getAntiSpywareSignatureList.js +2 -2
  58. package/getAppOverrideRule.d.ts +1 -65
  59. package/getAppOverrideRule.js +0 -52
  60. package/getAppOverrideRule.js.map +1 -1
  61. package/getAppOverrideRuleList.d.ts +2 -48
  62. package/getAppOverrideRuleList.js +2 -36
  63. package/getAppOverrideRuleList.js.map +1 -1
  64. package/getApplicationGroupList.d.ts +4 -4
  65. package/getApplicationGroupList.js +4 -4
  66. package/getApplicationList.d.ts +2 -2
  67. package/getApplicationList.js +2 -2
  68. package/getAuthenticationRule.d.ts +0 -74
  69. package/getAuthenticationRule.js +0 -62
  70. package/getAuthenticationRule.js.map +1 -1
  71. package/getAuthenticationRuleList.d.ts +2 -50
  72. package/getAuthenticationRuleList.js +2 -38
  73. package/getAuthenticationRuleList.js.map +1 -1
  74. package/getBgpRouteMapRedistribution.d.ts +7 -7
  75. package/getCertificateProfileList.d.ts +2 -2
  76. package/getCertificateProfileList.js +2 -2
  77. package/getDecryptionProfile.d.ts +0 -40
  78. package/getDecryptionProfile.js +0 -40
  79. package/getDecryptionProfile.js.map +1 -1
  80. package/getDecryptionProfileList.d.ts +0 -32
  81. package/getDecryptionProfileList.js +0 -32
  82. package/getDecryptionProfileList.js.map +1 -1
  83. package/getDecryptionRule.d.ts +0 -74
  84. package/getDecryptionRule.js +0 -62
  85. package/getDecryptionRule.js.map +1 -1
  86. package/getDecryptionRuleList.d.ts +2 -48
  87. package/getDecryptionRuleList.js +2 -36
  88. package/getDecryptionRuleList.js.map +1 -1
  89. package/getDnsProxy.d.ts +1 -1
  90. package/getDnsSecurityProfile.d.ts +0 -40
  91. package/getDnsSecurityProfile.js +0 -40
  92. package/getDnsSecurityProfile.js.map +1 -1
  93. package/getDnsSecurityProfileList.d.ts +0 -32
  94. package/getDnsSecurityProfileList.js +0 -32
  95. package/getDnsSecurityProfileList.js.map +1 -1
  96. package/getDynamicUserGroupList.d.ts +4 -4
  97. package/getDynamicUserGroupList.js +4 -4
  98. package/getEthernetInterface.d.ts +2 -40
  99. package/getEthernetInterface.js +0 -38
  100. package/getEthernetInterface.js.map +1 -1
  101. package/getEthernetInterfaceList.d.ts +0 -26
  102. package/getEthernetInterfaceList.js +0 -26
  103. package/getEthernetInterfaceList.js.map +1 -1
  104. package/getExternalDynamicListList.d.ts +4 -4
  105. package/getExternalDynamicListList.js +4 -4
  106. package/getFolder.d.ts +0 -36
  107. package/getFolder.js +0 -36
  108. package/getFolder.js.map +1 -1
  109. package/getHipObjectList.d.ts +4 -4
  110. package/getHipObjectList.js +4 -4
  111. package/getHipProfileList.d.ts +4 -4
  112. package/getHipProfileList.js +4 -4
  113. package/getInterfaceManagementProfile.d.ts +8 -89
  114. package/getInterfaceManagementProfile.js +0 -80
  115. package/getInterfaceManagementProfile.js.map +1 -1
  116. package/getInterfaceManagementProfileList.d.ts +0 -42
  117. package/getInterfaceManagementProfileList.js +0 -42
  118. package/getInterfaceManagementProfileList.js.map +1 -1
  119. package/getLayer2Subinterface.d.ts +2 -42
  120. package/getLayer2Subinterface.js +0 -40
  121. package/getLayer2Subinterface.js.map +1 -1
  122. package/getLayer2SubinterfaceList.d.ts +0 -26
  123. package/getLayer2SubinterfaceList.js +0 -26
  124. package/getLayer2SubinterfaceList.js.map +1 -1
  125. package/getLayer3Subinterface.d.ts +3 -45
  126. package/getLayer3Subinterface.js +0 -42
  127. package/getLayer3Subinterface.js.map +1 -1
  128. package/getLayer3SubinterfaceList.d.ts +0 -26
  129. package/getLayer3SubinterfaceList.js +0 -26
  130. package/getLayer3SubinterfaceList.js.map +1 -1
  131. package/getLogicalRouter.d.ts +0 -38
  132. package/getLogicalRouter.js +0 -38
  133. package/getLogicalRouter.js.map +1 -1
  134. package/getLogicalRouterList.d.ts +0 -40
  135. package/getLogicalRouterList.js +0 -30
  136. package/getLogicalRouterList.js.map +1 -1
  137. package/getLoopbackInterface.d.ts +7 -49
  138. package/getLoopbackInterface.js +0 -38
  139. package/getLoopbackInterface.js.map +1 -1
  140. package/getLoopbackInterfaceList.d.ts +0 -26
  141. package/getLoopbackInterfaceList.js +0 -26
  142. package/getLoopbackInterfaceList.js.map +1 -1
  143. package/getNatRule.d.ts +14 -86
  144. package/getNatRule.js +0 -76
  145. package/getNatRule.js.map +1 -1
  146. package/getNatRuleList.d.ts +2 -52
  147. package/getNatRuleList.js +2 -40
  148. package/getNatRuleList.js.map +1 -1
  149. package/getPbfRule.d.ts +0 -88
  150. package/getPbfRule.js +0 -88
  151. package/getPbfRule.js.map +1 -1
  152. package/getPbfRuleList.d.ts +0 -34
  153. package/getPbfRuleList.js +0 -34
  154. package/getPbfRuleList.js.map +1 -1
  155. package/getQosPolicyRule.d.ts +0 -72
  156. package/getQosPolicyRule.js +0 -60
  157. package/getQosPolicyRule.js.map +1 -1
  158. package/getQosPolicyRuleList.d.ts +2 -48
  159. package/getQosPolicyRuleList.js +2 -36
  160. package/getQosPolicyRuleList.js.map +1 -1
  161. package/getRadiusServerProfile.d.ts +0 -54
  162. package/getRadiusServerProfile.js +0 -54
  163. package/getRadiusServerProfile.js.map +1 -1
  164. package/getSdwanTrafficDistributionProfile.d.ts +1 -1
  165. package/getSecurityRule.d.ts +0 -106
  166. package/getSecurityRule.js +0 -94
  167. package/getSecurityRule.js.map +1 -1
  168. package/getSecurityRuleList.d.ts +2 -46
  169. package/getSecurityRuleList.js +2 -34
  170. package/getSecurityRuleList.js.map +1 -1
  171. package/getServiceConnection.d.ts +1 -177
  172. package/getServiceConnection.js +0 -176
  173. package/getServiceConnection.js.map +1 -1
  174. package/getServiceConnectionGroup.d.ts +0 -208
  175. package/getServiceConnectionGroup.js +0 -208
  176. package/getServiceConnectionGroup.js.map +1 -1
  177. package/getServiceGroupList.d.ts +2 -2
  178. package/getServiceGroupList.js +2 -2
  179. package/getServiceList.d.ts +4 -4
  180. package/getServiceList.js +4 -4
  181. package/getSnippet.d.ts +0 -48
  182. package/getSnippet.js +0 -48
  183. package/getSnippet.js.map +1 -1
  184. package/getSnippetList.d.ts +0 -24
  185. package/getSnippetList.js +0 -24
  186. package/getSnippetList.js.map +1 -1
  187. package/getTagList.d.ts +2 -2
  188. package/getTagList.js +2 -2
  189. package/getTunnelInterface.d.ts +4 -42
  190. package/getTunnelInterface.js +0 -38
  191. package/getTunnelInterface.js.map +1 -1
  192. package/getTunnelInterfaceList.d.ts +0 -26
  193. package/getTunnelInterfaceList.js +0 -26
  194. package/getTunnelInterfaceList.js.map +1 -1
  195. package/getUrlAccessProfileList.d.ts +2 -2
  196. package/getUrlAccessProfileList.js +2 -2
  197. package/getUrlCategoryList.d.ts +4 -4
  198. package/getUrlCategoryList.js +4 -4
  199. package/getVlanInterface.d.ts +6 -46
  200. package/getVlanInterface.js +0 -40
  201. package/getVlanInterface.js.map +1 -1
  202. package/getVlanInterfaceList.d.ts +0 -26
  203. package/getVlanInterfaceList.js +0 -26
  204. package/getVlanInterfaceList.js.map +1 -1
  205. package/getVulnerabilityProtectionProfileList.d.ts +2 -2
  206. package/getVulnerabilityProtectionProfileList.js +2 -2
  207. package/getVulnerabilityProtectionSignature.d.ts +1 -41
  208. package/getVulnerabilityProtectionSignature.js +0 -40
  209. package/getVulnerabilityProtectionSignature.js.map +1 -1
  210. package/getVulnerabilityProtectionSignatureList.d.ts +0 -32
  211. package/getVulnerabilityProtectionSignatureList.js +0 -32
  212. package/getVulnerabilityProtectionSignatureList.js.map +1 -1
  213. package/getZone.d.ts +0 -44
  214. package/getZone.js +0 -44
  215. package/getZone.js.map +1 -1
  216. package/getZoneList.d.ts +0 -26
  217. package/getZoneList.js +0 -26
  218. package/getZoneList.js.map +1 -1
  219. package/ikeGateway.d.ts +0 -49
  220. package/ikeGateway.js +0 -49
  221. package/ikeGateway.js.map +1 -1
  222. package/index.d.ts +9 -9
  223. package/index.js +12 -12
  224. package/index.js.map +1 -1
  225. package/interfaceManagementProfile.d.ts +24 -56
  226. package/interfaceManagementProfile.js +0 -30
  227. package/interfaceManagementProfile.js.map +1 -1
  228. package/ipsecCryptoProfile.d.ts +0 -28
  229. package/ipsecCryptoProfile.js +0 -28
  230. package/ipsecCryptoProfile.js.map +1 -1
  231. package/ipsecTunnel.d.ts +0 -66
  232. package/ipsecTunnel.js +0 -66
  233. package/ipsecTunnel.js.map +1 -1
  234. package/layer2Subinterface.d.ts +7 -36
  235. package/layer2Subinterface.js +0 -32
  236. package/layer2Subinterface.js.map +1 -1
  237. package/layer3Subinterface.d.ts +11 -70
  238. package/layer3Subinterface.js +0 -59
  239. package/layer3Subinterface.js.map +1 -1
  240. package/logicalRouter.d.ts +0 -2
  241. package/logicalRouter.js +0 -2
  242. package/logicalRouter.js.map +1 -1
  243. package/loopbackInterface.d.ts +15 -58
  244. package/loopbackInterface.js +2 -35
  245. package/loopbackInterface.js.map +1 -1
  246. package/natRule.d.ts +42 -135
  247. package/natRule.js +8 -121
  248. package/natRule.js.map +1 -1
  249. package/package.json +2 -2
  250. package/pbfRule.d.ts +0 -89
  251. package/pbfRule.js +0 -89
  252. package/pbfRule.js.map +1 -1
  253. package/qosPolicyRule.d.ts +0 -95
  254. package/qosPolicyRule.js +0 -75
  255. package/qosPolicyRule.js.map +1 -1
  256. package/radiusServerProfile.d.ts +0 -38
  257. package/radiusServerProfile.js +0 -38
  258. package/radiusServerProfile.js.map +1 -1
  259. package/remoteNetwork.d.ts +0 -81
  260. package/remoteNetwork.js +0 -81
  261. package/remoteNetwork.js.map +1 -1
  262. package/sdwanTrafficDistributionProfile.d.ts +4 -4
  263. package/securityRule.d.ts +0 -181
  264. package/securityRule.js +0 -161
  265. package/securityRule.js.map +1 -1
  266. package/serviceConnection.d.ts +3 -82
  267. package/serviceConnection.js +2 -81
  268. package/serviceConnection.js.map +1 -1
  269. package/serviceConnectionGroup.d.ts +0 -100
  270. package/serviceConnectionGroup.js +0 -100
  271. package/serviceConnectionGroup.js.map +1 -1
  272. package/serviceGroup.d.ts +2 -2
  273. package/serviceGroup.js +2 -2
  274. package/snippet.d.ts +0 -23
  275. package/snippet.js +0 -23
  276. package/snippet.js.map +1 -1
  277. package/tag.d.ts +3 -3
  278. package/tag.js +3 -3
  279. package/tunnelInterface.d.ts +12 -42
  280. package/tunnelInterface.js +2 -32
  281. package/tunnelInterface.js.map +1 -1
  282. package/types/input.d.ts +335 -607
  283. package/types/output.d.ts +1069 -1945
  284. package/vlanInterface.d.ts +20 -40
  285. package/vlanInterface.js +0 -20
  286. package/vlanInterface.js.map +1 -1
  287. package/vulnerabilityProtectionSignature.d.ts +10 -12
  288. package/vulnerabilityProtectionSignature.js +0 -14
  289. package/vulnerabilityProtectionSignature.js.map +1 -1
  290. package/zone.d.ts +0 -71
  291. package/zone.js +0 -71
  292. package/zone.js.map +1 -1
  293. package/aggregateInterface.js.map +0 -1
  294. package/getAggregateInterface.d.ts +0 -116
  295. package/getAggregateInterface.js +0 -68
  296. package/getAggregateInterface.js.map +0 -1
  297. package/getAggregateInterfaceList.js +0 -66
  298. package/getAggregateInterfaceList.js.map +0 -1
package/remoteNetwork.js CHANGED
@@ -9,87 +9,6 @@ const utilities = require("./utilities");
9
9
  * RemoteNetwork resource
10
10
  *
11
11
  * ## Example Usage
12
- *
13
- * ```typescript
14
- * import * as pulumi from "@pulumi/pulumi";
15
- * import * as scm from "@pulumi/scm";
16
- *
17
- * // --- DEPENDENCY 1: IKE Crypto Profile ---
18
- * // This profile defines the encryption and authentication algorithms for the IKE Gateway.
19
- * // The values are taken from the 'createTestIKECryptoProfile' helper function.
20
- * const example = new scm.IkeCryptoProfile("example", {
21
- * name: "example-ike-crypto-prf-for-rn",
22
- * folder: "Remote Networks",
23
- * hashes: ["sha256"],
24
- * dhGroups: ["group14"],
25
- * encryptions: ["aes-256-cbc"],
26
- * });
27
- * // --- DEPENDENCY 2: IKE Gateway ---
28
- * // This defines the VPN peer. It depends on the IKE Crypto Profile created above.
29
- * // The values are taken from the 'createTestIKEGateway' helper function.
30
- * const exampleIkeGateway = new scm.IkeGateway("example", {
31
- * name: "example-ike-gateway-for-rn",
32
- * folder: "Remote Networks",
33
- * authentication: {
34
- * preSharedKey: {
35
- * key: "secret",
36
- * },
37
- * },
38
- * peerAddress: {
39
- * ip: "1.1.1.1",
40
- * },
41
- * protocol: {
42
- * ikev1: {
43
- * ikeCryptoProfile: example.name,
44
- * },
45
- * },
46
- * }, {
47
- * dependsOn: [example],
48
- * });
49
- * // --- DEPENDENCY 3: IPsec Tunnel ---
50
- * // This defines the tunnel interface itself and uses the IKE Gateway.
51
- * // The values are taken from the 'createTestIPsecTunnel' helper function.
52
- * const exampleIpsecTunnel = new scm.IpsecTunnel("example", {
53
- * name: "example-ipsec-tunnel-for-rn",
54
- * folder: "Remote Networks",
55
- * antiReplay: true,
56
- * copyTos: false,
57
- * enableGreEncapsulation: false,
58
- * autoKey: {
59
- * ikeGateways: [{
60
- * name: exampleIkeGateway.name,
61
- * }],
62
- * ipsecCryptoProfile: "PaloAlto-Networks-IPSec-Crypto",
63
- * },
64
- * }, {
65
- * dependsOn: [exampleIkeGateway],
66
- * });
67
- * // --- MAIN RESOURCE: Remote Network ---
68
- * // This is the final resource, which uses the IPsec Tunnel created above.
69
- * // The values are taken directly from the 'Test_deployment_services_RemoteNetworksAPIService_Create' test.
70
- * const exampleRemoteNetwork = new scm.RemoteNetwork("example", {
71
- * name: "example-remote-network",
72
- * folder: "Remote Networks",
73
- * licenseType: "FWAAS-AGGREGATE",
74
- * region: "us-west-2",
75
- * spnName: "us-west-dakota",
76
- * subnets: ["192.168.1.0/24"],
77
- * ipsecTunnel: exampleIpsecTunnel.name,
78
- * protocol: {
79
- * bgp: {
80
- * enable: true,
81
- * peerAs: "65000",
82
- * localIpAddress: "169.254.1.1",
83
- * peerIpAddress: "169.254.1.2",
84
- * doNotExportRoutes: false,
85
- * originateDefaultRoute: false,
86
- * summarizeMobileUserRoutes: false,
87
- * },
88
- * },
89
- * }, {
90
- * dependsOn: [exampleIpsecTunnel],
91
- * });
92
- * ```
93
12
  */
94
13
  class RemoteNetwork extends pulumi.CustomResource {
95
14
  /**
@@ -1 +1 @@
1
- {"version":3,"file":"remoteNetwork.js","sourceRoot":"","sources":["../remoteNetwork.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAqFG;AACH,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;IACpD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA0B,EAAE,IAAmC;QACxH,OAAO,IAAI,aAAa,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACpE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,aAAa,CAAC,YAAY,CAAC;IAC9D,CAAC;IA4DD,YAAY,IAAY,EAAE,WAAoD,EAAE,IAAmC;QAC/G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA6C,CAAC;YAC5D,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,EAAE,iBAAiB,CAAC;YAC/D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,EAAE,eAAe,CAAC;YAC3D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;YACzC,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;YACzC,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,EAAE,oBAAoB,CAAC;YACrE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;SACxC;aAAM;YACH,MAAM,IAAI,GAAG,WAA4C,CAAC;YAC1D,IAAI,IAAI,EAAE,MAAM,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACzC,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,IAAI,IAAI,EAAE,WAAW,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC9C,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,IAAI,IAAI,EAAE,MAAM,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACzC,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,EAAE,iBAAiB,CAAC;YAC9D,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,EAAE,oBAAoB,CAAC;YACpE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,iBAAiB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACtD,cAAc,CAAC,MAAM,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAC9C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,iBAAiB,CAAC,EAAE,CAAC;QACpE,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAClE,CAAC;;AArIL,sCAsIC;AAxHG,gBAAgB;AACO,0BAAY,GAAG,uCAAuC,CAAC"}
1
+ {"version":3,"file":"remoteNetwork.js","sourceRoot":"","sources":["../remoteNetwork.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;GAIG;AACH,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;IACpD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA0B,EAAE,IAAmC;QACxH,OAAO,IAAI,aAAa,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACpE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,aAAa,CAAC,YAAY,CAAC;IAC9D,CAAC;IA4DD,YAAY,IAAY,EAAE,WAAoD,EAAE,IAAmC;QAC/G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA6C,CAAC;YAC5D,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,EAAE,iBAAiB,CAAC;YAC/D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,EAAE,eAAe,CAAC;YAC3D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;YACzC,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;YACzC,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,EAAE,oBAAoB,CAAC;YACrE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;SACxC;aAAM;YACH,MAAM,IAAI,GAAG,WAA4C,CAAC;YAC1D,IAAI,IAAI,EAAE,MAAM,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACzC,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,IAAI,IAAI,EAAE,WAAW,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC9C,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,IAAI,IAAI,EAAE,MAAM,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACzC,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,EAAE,iBAAiB,CAAC;YAC9D,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,EAAE,oBAAoB,CAAC;YACpE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,iBAAiB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACtD,cAAc,CAAC,MAAM,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAC9C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,iBAAiB,CAAC,EAAE,CAAC;QACpE,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAClE,CAAC;;AArIL,sCAsIC;AAxHG,gBAAgB;AACO,0BAAY,GAAG,uCAAuC,CAAC"}
@@ -29,7 +29,7 @@ export declare class SdwanTrafficDistributionProfile extends pulumi.CustomResour
29
29
  */
30
30
  readonly folder: pulumi.Output<string | undefined>;
31
31
  /**
32
- * Link-Tags for interfaces identified by defined tags
32
+ * Link tags
33
33
  */
34
34
  readonly linkTags: pulumi.Output<outputs.SdwanTrafficDistributionProfileLinkTag[] | undefined>;
35
35
  /**
@@ -44,7 +44,7 @@ export declare class SdwanTrafficDistributionProfile extends pulumi.CustomResour
44
44
  /**
45
45
  * Traffic distribution
46
46
  */
47
- readonly trafficDistribution: pulumi.Output<string>;
47
+ readonly trafficDistribution: pulumi.Output<string | undefined>;
48
48
  /**
49
49
  * Create a SdwanTrafficDistributionProfile resource with the given unique name, arguments, and options.
50
50
  *
@@ -67,7 +67,7 @@ export interface SdwanTrafficDistributionProfileState {
67
67
  */
68
68
  folder?: pulumi.Input<string>;
69
69
  /**
70
- * Link-Tags for interfaces identified by defined tags
70
+ * Link tags
71
71
  */
72
72
  linkTags?: pulumi.Input<pulumi.Input<inputs.SdwanTrafficDistributionProfileLinkTag>[]>;
73
73
  /**
@@ -97,7 +97,7 @@ export interface SdwanTrafficDistributionProfileArgs {
97
97
  */
98
98
  folder?: pulumi.Input<string>;
99
99
  /**
100
- * Link-Tags for interfaces identified by defined tags
100
+ * Link tags
101
101
  */
102
102
  linkTags?: pulumi.Input<pulumi.Input<inputs.SdwanTrafficDistributionProfileLinkTag>[]>;
103
103
  /**
package/securityRule.d.ts CHANGED
@@ -5,163 +5,6 @@ import * as outputs from "./types/output";
5
5
  * SecurityRule resource
6
6
  *
7
7
  * ## Example Usage
8
- *
9
- * ```typescript
10
- * import * as pulumi from "@pulumi/pulumi";
11
- * import * as scm from "@pulumi/scm";
12
- *
13
- * // First, create the tag objects that you will reference.
14
- * const outboundTag = new scm.Tag("outbound_tag", {
15
- * folder: "All",
16
- * name: "outbound143",
17
- * color: "Red",
18
- * });
19
- * const webTag = new scm.Tag("web_tag", {
20
- * folder: "All",
21
- * name: "web143",
22
- * color: "Blue",
23
- * });
24
- * // --- Existing Rules (Backward Compatibility) ---
25
- * const standardWebAccess = new scm.SecurityRule("standard_web_access", {
26
- * folder: "All",
27
- * name: "Allow Standard Web Access143",
28
- * description: "Allow outbound web traffic to any destination...",
29
- * position: "pre",
30
- * action: "allow",
31
- * categories: ["any"],
32
- * applications: [
33
- * "web-browsing",
34
- * "ssl",
35
- * ],
36
- * services: [
37
- * "service-http",
38
- * "service-https",
39
- * ],
40
- * froms: [
41
- * "untrust",
42
- * "trust",
43
- * ],
44
- * tos: ["trust"],
45
- * sources: ["any"],
46
- * destinations: ["any"],
47
- * negateSource: false,
48
- * negateDestination: false,
49
- * sourceUsers: ["any"],
50
- * sourceHips: ["any"],
51
- * destinationHips: ["any"],
52
- * logStart: true,
53
- * logEnd: true,
54
- * disabled: false,
55
- * tags: [
56
- * outboundTag.name,
57
- * webTag.name,
58
- * ],
59
- * });
60
- * const blockRiskySaas = new scm.SecurityRule("block_risky_saas", {
61
- * folder: "All",
62
- * name: "Block Risky SaaS Applications143",
63
- * description: "Prevent data exfiltration by blocking risky SaaS apps...",
64
- * action: "deny",
65
- * policyType: "Internet",
66
- * securitySettings: {
67
- * antiSpyware: "yes",
68
- * vulnerability: "yes",
69
- * virusAndWildfireAnalysis: "yes",
70
- * },
71
- * blockWebApplications: ["facebook-posting"],
72
- * logSettings: {
73
- * logSessions: true,
74
- * },
75
- * froms: ["any"],
76
- * tos: ["any"],
77
- * sources: ["any"],
78
- * destinations: ["any"],
79
- * sourceUsers: ["any"],
80
- * disabled: false,
81
- * tags: [
82
- * outboundTag.name,
83
- * webTag.name,
84
- * ],
85
- * });
86
- * // --- NEW Examples Demonstrating Rule Ordering ---
87
- * // Example 1: Place a critical block rule at the absolute top
88
- * const criticalBlockTop = new scm.SecurityRule("critical_block_top", {
89
- * folder: "All",
90
- * name: "CRITICAL Block Malicious IPs Top143",
91
- * description: "Always block known malicious IPs first.",
92
- * relativePosition: "top",
93
- * action: "deny",
94
- * froms: ["any"],
95
- * tos: ["any"],
96
- * sources: ["any"],
97
- * destinations: ["any"],
98
- * sourceUsers: ["any"],
99
- * categories: ["any"],
100
- * applications: ["any"],
101
- * services: ["any"],
102
- * logEnd: true,
103
- * tags: [outboundTag.name],
104
- * });
105
- * // Example 2: Place a cleanup rule at the absolute bottom
106
- * const cleanupDenyBottom = new scm.SecurityRule("cleanup_deny_bottom", {
107
- * folder: "All",
108
- * name: "Cleanup Deny All Bottom143",
109
- * description: "Deny any traffic not explicitly allowed.",
110
- * relativePosition: "bottom",
111
- * action: "deny",
112
- * froms: ["any"],
113
- * tos: ["any"],
114
- * sources: ["any"],
115
- * destinations: ["any"],
116
- * sourceUsers: ["any"],
117
- * categories: ["any"],
118
- * applications: ["any"],
119
- * services: ["any"],
120
- * logEnd: true,
121
- * tags: [outboundTag.name],
122
- * });
123
- * // Example 3: Place a rule *before* the standard web access rule
124
- * const allowUpdatesBeforeWeb = new scm.SecurityRule("allow_updates_before_web", {
125
- * folder: "All",
126
- * name: "Allow OS Updates Before Web143",
127
- * description: "Allow specific OS update traffic before general web access.",
128
- * relativePosition: "before",
129
- * targetRule: standardWebAccess.id,
130
- * action: "allow",
131
- * froms: ["trust"],
132
- * tos: ["untrust"],
133
- * sources: ["any"],
134
- * destinations: ["any"],
135
- * sourceUsers: ["any"],
136
- * categories: ["any"],
137
- * applications: [
138
- * "ms-update",
139
- * "apple-update",
140
- * ],
141
- * services: ["service-https"],
142
- * logEnd: true,
143
- * tags: [outboundTag.name],
144
- * });
145
- * // Example 4: Place a rule *after* the standard web access rule
146
- * const allowCorpAppsAfterWeb = new scm.SecurityRule("allow_corp_apps_after_web", {
147
- * folder: "All",
148
- * name: "Allow Corp Apps After Web143",
149
- * description: "Allow access to specific corporate apps after general web access.",
150
- * relativePosition: "after",
151
- * targetRule: standardWebAccess.id,
152
- * action: "allow",
153
- * froms: ["trust"],
154
- * tos: ["untrust"],
155
- * sources: ["any"],
156
- * destinations: ["any"],
157
- * sourceUsers: ["any"],
158
- * categories: ["any"],
159
- * applications: ["ms-update"],
160
- * services: ["service-https"],
161
- * logEnd: true,
162
- * tags: [webTag.name],
163
- * });
164
- * ```
165
8
  */
166
9
  export declare class SecurityRule extends pulumi.CustomResource {
167
10
  /**
@@ -287,10 +130,6 @@ export declare class SecurityRule extends pulumi.CustomResource {
287
130
  * The security profile object
288
131
  */
289
132
  readonly profileSetting: pulumi.Output<outputs.SecurityRuleProfileSetting>;
290
- /**
291
- * Relative positioning rule. String must be one of these: `"before"`, `"after"`, `"top"`, `"bottom"`. If not specified, rule is created at the bottom of the ruleset.
292
- */
293
- readonly relativePosition: pulumi.Output<string | undefined>;
294
133
  /**
295
134
  * Schedule in which this rule will be applied
296
135
  */
@@ -323,10 +162,6 @@ export declare class SecurityRule extends pulumi.CustomResource {
323
162
  * The tags associated with the security rule
324
163
  */
325
164
  readonly tags: pulumi.Output<string[] | undefined>;
326
- /**
327
- * The name or UUID of the rule to position this rule relative to. Required when `relativePosition` is `"before"` or `"after"`.
328
- */
329
- readonly targetRule: pulumi.Output<string | undefined>;
330
165
  /**
331
166
  * Tenant restrictions
332
167
  */
@@ -457,10 +292,6 @@ export interface SecurityRuleState {
457
292
  * The security profile object
458
293
  */
459
294
  profileSetting?: pulumi.Input<inputs.SecurityRuleProfileSetting>;
460
- /**
461
- * Relative positioning rule. String must be one of these: `"before"`, `"after"`, `"top"`, `"bottom"`. If not specified, rule is created at the bottom of the ruleset.
462
- */
463
- relativePosition?: pulumi.Input<string>;
464
295
  /**
465
296
  * Schedule in which this rule will be applied
466
297
  */
@@ -493,10 +324,6 @@ export interface SecurityRuleState {
493
324
  * The tags associated with the security rule
494
325
  */
495
326
  tags?: pulumi.Input<pulumi.Input<string>[]>;
496
- /**
497
- * The name or UUID of the rule to position this rule relative to. Required when `relativePosition` is `"before"` or `"after"`.
498
- */
499
- targetRule?: pulumi.Input<string>;
500
327
  /**
501
328
  * Tenant restrictions
502
329
  */
@@ -619,10 +446,6 @@ export interface SecurityRuleArgs {
619
446
  * The security profile object
620
447
  */
621
448
  profileSetting?: pulumi.Input<inputs.SecurityRuleProfileSetting>;
622
- /**
623
- * Relative positioning rule. String must be one of these: `"before"`, `"after"`, `"top"`, `"bottom"`. If not specified, rule is created at the bottom of the ruleset.
624
- */
625
- relativePosition?: pulumi.Input<string>;
626
449
  /**
627
450
  * Schedule in which this rule will be applied
628
451
  */
@@ -655,10 +478,6 @@ export interface SecurityRuleArgs {
655
478
  * The tags associated with the security rule
656
479
  */
657
480
  tags?: pulumi.Input<pulumi.Input<string>[]>;
658
- /**
659
- * The name or UUID of the rule to position this rule relative to. Required when `relativePosition` is `"before"` or `"after"`.
660
- */
661
- targetRule?: pulumi.Input<string>;
662
481
  /**
663
482
  * Tenant restrictions
664
483
  */
package/securityRule.js CHANGED
@@ -9,163 +9,6 @@ const utilities = require("./utilities");
9
9
  * SecurityRule resource
10
10
  *
11
11
  * ## Example Usage
12
- *
13
- * ```typescript
14
- * import * as pulumi from "@pulumi/pulumi";
15
- * import * as scm from "@pulumi/scm";
16
- *
17
- * // First, create the tag objects that you will reference.
18
- * const outboundTag = new scm.Tag("outbound_tag", {
19
- * folder: "All",
20
- * name: "outbound143",
21
- * color: "Red",
22
- * });
23
- * const webTag = new scm.Tag("web_tag", {
24
- * folder: "All",
25
- * name: "web143",
26
- * color: "Blue",
27
- * });
28
- * // --- Existing Rules (Backward Compatibility) ---
29
- * const standardWebAccess = new scm.SecurityRule("standard_web_access", {
30
- * folder: "All",
31
- * name: "Allow Standard Web Access143",
32
- * description: "Allow outbound web traffic to any destination...",
33
- * position: "pre",
34
- * action: "allow",
35
- * categories: ["any"],
36
- * applications: [
37
- * "web-browsing",
38
- * "ssl",
39
- * ],
40
- * services: [
41
- * "service-http",
42
- * "service-https",
43
- * ],
44
- * froms: [
45
- * "untrust",
46
- * "trust",
47
- * ],
48
- * tos: ["trust"],
49
- * sources: ["any"],
50
- * destinations: ["any"],
51
- * negateSource: false,
52
- * negateDestination: false,
53
- * sourceUsers: ["any"],
54
- * sourceHips: ["any"],
55
- * destinationHips: ["any"],
56
- * logStart: true,
57
- * logEnd: true,
58
- * disabled: false,
59
- * tags: [
60
- * outboundTag.name,
61
- * webTag.name,
62
- * ],
63
- * });
64
- * const blockRiskySaas = new scm.SecurityRule("block_risky_saas", {
65
- * folder: "All",
66
- * name: "Block Risky SaaS Applications143",
67
- * description: "Prevent data exfiltration by blocking risky SaaS apps...",
68
- * action: "deny",
69
- * policyType: "Internet",
70
- * securitySettings: {
71
- * antiSpyware: "yes",
72
- * vulnerability: "yes",
73
- * virusAndWildfireAnalysis: "yes",
74
- * },
75
- * blockWebApplications: ["facebook-posting"],
76
- * logSettings: {
77
- * logSessions: true,
78
- * },
79
- * froms: ["any"],
80
- * tos: ["any"],
81
- * sources: ["any"],
82
- * destinations: ["any"],
83
- * sourceUsers: ["any"],
84
- * disabled: false,
85
- * tags: [
86
- * outboundTag.name,
87
- * webTag.name,
88
- * ],
89
- * });
90
- * // --- NEW Examples Demonstrating Rule Ordering ---
91
- * // Example 1: Place a critical block rule at the absolute top
92
- * const criticalBlockTop = new scm.SecurityRule("critical_block_top", {
93
- * folder: "All",
94
- * name: "CRITICAL Block Malicious IPs Top143",
95
- * description: "Always block known malicious IPs first.",
96
- * relativePosition: "top",
97
- * action: "deny",
98
- * froms: ["any"],
99
- * tos: ["any"],
100
- * sources: ["any"],
101
- * destinations: ["any"],
102
- * sourceUsers: ["any"],
103
- * categories: ["any"],
104
- * applications: ["any"],
105
- * services: ["any"],
106
- * logEnd: true,
107
- * tags: [outboundTag.name],
108
- * });
109
- * // Example 2: Place a cleanup rule at the absolute bottom
110
- * const cleanupDenyBottom = new scm.SecurityRule("cleanup_deny_bottom", {
111
- * folder: "All",
112
- * name: "Cleanup Deny All Bottom143",
113
- * description: "Deny any traffic not explicitly allowed.",
114
- * relativePosition: "bottom",
115
- * action: "deny",
116
- * froms: ["any"],
117
- * tos: ["any"],
118
- * sources: ["any"],
119
- * destinations: ["any"],
120
- * sourceUsers: ["any"],
121
- * categories: ["any"],
122
- * applications: ["any"],
123
- * services: ["any"],
124
- * logEnd: true,
125
- * tags: [outboundTag.name],
126
- * });
127
- * // Example 3: Place a rule *before* the standard web access rule
128
- * const allowUpdatesBeforeWeb = new scm.SecurityRule("allow_updates_before_web", {
129
- * folder: "All",
130
- * name: "Allow OS Updates Before Web143",
131
- * description: "Allow specific OS update traffic before general web access.",
132
- * relativePosition: "before",
133
- * targetRule: standardWebAccess.id,
134
- * action: "allow",
135
- * froms: ["trust"],
136
- * tos: ["untrust"],
137
- * sources: ["any"],
138
- * destinations: ["any"],
139
- * sourceUsers: ["any"],
140
- * categories: ["any"],
141
- * applications: [
142
- * "ms-update",
143
- * "apple-update",
144
- * ],
145
- * services: ["service-https"],
146
- * logEnd: true,
147
- * tags: [outboundTag.name],
148
- * });
149
- * // Example 4: Place a rule *after* the standard web access rule
150
- * const allowCorpAppsAfterWeb = new scm.SecurityRule("allow_corp_apps_after_web", {
151
- * folder: "All",
152
- * name: "Allow Corp Apps After Web143",
153
- * description: "Allow access to specific corporate apps after general web access.",
154
- * relativePosition: "after",
155
- * targetRule: standardWebAccess.id,
156
- * action: "allow",
157
- * froms: ["trust"],
158
- * tos: ["untrust"],
159
- * sources: ["any"],
160
- * destinations: ["any"],
161
- * sourceUsers: ["any"],
162
- * categories: ["any"],
163
- * applications: ["ms-update"],
164
- * services: ["service-https"],
165
- * logEnd: true,
166
- * tags: [webTag.name],
167
- * });
168
- * ```
169
12
  */
170
13
  class SecurityRule extends pulumi.CustomResource {
171
14
  /**
@@ -222,7 +65,6 @@ class SecurityRule extends pulumi.CustomResource {
222
65
  resourceInputs["policyType"] = state?.policyType;
223
66
  resourceInputs["position"] = state?.position;
224
67
  resourceInputs["profileSetting"] = state?.profileSetting;
225
- resourceInputs["relativePosition"] = state?.relativePosition;
226
68
  resourceInputs["schedule"] = state?.schedule;
227
69
  resourceInputs["securitySettings"] = state?.securitySettings;
228
70
  resourceInputs["services"] = state?.services;
@@ -231,7 +73,6 @@ class SecurityRule extends pulumi.CustomResource {
231
73
  resourceInputs["sourceUsers"] = state?.sourceUsers;
232
74
  resourceInputs["sources"] = state?.sources;
233
75
  resourceInputs["tags"] = state?.tags;
234
- resourceInputs["targetRule"] = state?.targetRule;
235
76
  resourceInputs["tenantRestrictions"] = state?.tenantRestrictions;
236
77
  resourceInputs["tfid"] = state?.tfid;
237
78
  resourceInputs["tos"] = state?.tos;
@@ -265,7 +106,6 @@ class SecurityRule extends pulumi.CustomResource {
265
106
  resourceInputs["policyType"] = args?.policyType;
266
107
  resourceInputs["position"] = args?.position;
267
108
  resourceInputs["profileSetting"] = args?.profileSetting;
268
- resourceInputs["relativePosition"] = args?.relativePosition;
269
109
  resourceInputs["schedule"] = args?.schedule;
270
110
  resourceInputs["securitySettings"] = args?.securitySettings;
271
111
  resourceInputs["services"] = args?.services;
@@ -274,7 +114,6 @@ class SecurityRule extends pulumi.CustomResource {
274
114
  resourceInputs["sourceUsers"] = args?.sourceUsers;
275
115
  resourceInputs["sources"] = args?.sources;
276
116
  resourceInputs["tags"] = args?.tags;
277
- resourceInputs["targetRule"] = args?.targetRule;
278
117
  resourceInputs["tenantRestrictions"] = args?.tenantRestrictions;
279
118
  resourceInputs["tos"] = args?.tos;
280
119
  resourceInputs["tfid"] = undefined /*out*/;
@@ -1 +1 @@
1
- {"version":3,"file":"securityRule.js","sourceRoot":"","sources":["../securityRule.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAiKG;AACH,MAAa,YAAa,SAAQ,MAAM,CAAC,cAAc;IACnD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAyB,EAAE,IAAmC;QACvH,OAAO,IAAI,YAAY,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACnE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,YAAY,CAAC,YAAY,CAAC;IAC7D,CAAC;IAwKD,YAAY,IAAY,EAAE,WAAkD,EAAE,IAAmC;QAC7G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA4C,CAAC;YAC3D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;YACzC,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,EAAE,kBAAkB,CAAC;YACjE,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,EAAE,oBAAoB,CAAC;YACrE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,EAAE,kBAAkB,CAAC;YACjE,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,EAAE,oBAAoB,CAAC;YACrE,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,EAAE,sBAAsB,CAAC;YACzE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,EAAE,eAAe,CAAC;YAC3D,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;YACzC,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;YACzC,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;YACzC,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,EAAE,iBAAiB,CAAC;YAC/D,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,EAAE,gBAAgB,CAAC;YAC7D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,EAAE,gBAAgB,CAAC;YAC7D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,EAAE,kBAAkB,CAAC;YACjE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,EAAE,GAAG,CAAC;SACtC;aAAM;YACH,MAAM,IAAI,GAAG,WAA2C,CAAC;YACzD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,EAAE,kBAAkB,CAAC;YAChE,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,EAAE,oBAAoB,CAAC;YACpE,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,EAAE,kBAAkB,CAAC;YAChE,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,EAAE,oBAAoB,CAAC;YACpE,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,EAAE,sBAAsB,CAAC;YACxE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,EAAE,eAAe,CAAC;YAC1D,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC;YACtC,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,EAAE,iBAAiB,CAAC;YAC9D,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC;YACxD,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,EAAE,gBAAgB,CAAC;YAC5D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,EAAE,gBAAgB,CAAC;YAC5D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,EAAE,kBAAkB,CAAC;YAChE,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,EAAE,GAAG,CAAC;YAClC,cAAc,CAAC,MAAM,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAC9C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,YAAY,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACjE,CAAC;;AA5RL,oCA6RC;AA/QG,gBAAgB;AACO,yBAAY,GAAG,qCAAqC,CAAC"}
1
+ {"version":3,"file":"securityRule.js","sourceRoot":"","sources":["../securityRule.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;GAIG;AACH,MAAa,YAAa,SAAQ,MAAM,CAAC,cAAc;IACnD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAyB,EAAE,IAAmC;QACvH,OAAO,IAAI,YAAY,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACnE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,YAAY,CAAC,YAAY,CAAC;IAC7D,CAAC;IAgKD,YAAY,IAAY,EAAE,WAAkD,EAAE,IAAmC;QAC7G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA4C,CAAC;YAC3D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;YACzC,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,EAAE,kBAAkB,CAAC;YACjE,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,EAAE,oBAAoB,CAAC;YACrE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,EAAE,kBAAkB,CAAC;YACjE,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,EAAE,oBAAoB,CAAC;YACrE,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,EAAE,sBAAsB,CAAC;YACzE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,EAAE,eAAe,CAAC;YAC3D,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;YACzC,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;YACzC,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;YACzC,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,EAAE,iBAAiB,CAAC;YAC/D,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,EAAE,gBAAgB,CAAC;YAC7D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,EAAE,kBAAkB,CAAC;YACjE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,EAAE,GAAG,CAAC;SACtC;aAAM;YACH,MAAM,IAAI,GAAG,WAA2C,CAAC;YACzD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,EAAE,kBAAkB,CAAC;YAChE,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,EAAE,oBAAoB,CAAC;YACpE,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,EAAE,kBAAkB,CAAC;YAChE,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,EAAE,oBAAoB,CAAC;YACpE,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,EAAE,sBAAsB,CAAC;YACxE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,EAAE,eAAe,CAAC;YAC1D,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC;YACtC,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,EAAE,iBAAiB,CAAC;YAC9D,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC;YACxD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,EAAE,gBAAgB,CAAC;YAC5D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,EAAE,kBAAkB,CAAC;YAChE,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,EAAE,GAAG,CAAC;YAClC,cAAc,CAAC,MAAM,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAC9C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,YAAY,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACjE,CAAC;;AAhRL,oCAiRC;AAnQG,gBAAgB;AACO,yBAAY,GAAG,qCAAqC,CAAC"}