@pulumi/scm 1.0.0-alpha.1762844275 → 1.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/address.d.ts +3 -3
- package/address.js +3 -3
- package/addressGroup.d.ts +2 -2
- package/addressGroup.js +2 -2
- package/{aggregateInterface.d.ts → aggregateEthernetInterface.d.ts} +24 -26
- package/{aggregateInterface.js → aggregateEthernetInterface.js} +11 -13
- package/aggregateEthernetInterface.js.map +1 -0
- package/antiSpywareSignature.d.ts +3 -3
- package/appOverrideRule.d.ts +3 -128
- package/appOverrideRule.js +0 -95
- package/appOverrideRule.js.map +1 -1
- package/applicationFilter.d.ts +0 -16
- package/applicationFilter.js +0 -16
- package/applicationFilter.js.map +1 -1
- package/authenticationRule.d.ts +0 -123
- package/authenticationRule.js +0 -103
- package/authenticationRule.js.map +1 -1
- package/bgpRouteMapRedistribution.d.ts +6 -6
- package/certificateProfile.d.ts +0 -29
- package/certificateProfile.js +0 -29
- package/certificateProfile.js.map +1 -1
- package/decryptionProfile.d.ts +0 -139
- package/decryptionProfile.js +0 -139
- package/decryptionProfile.js.map +1 -1
- package/decryptionRule.d.ts +0 -139
- package/decryptionRule.js +0 -119
- package/decryptionRule.js.map +1 -1
- package/dnsProxy.d.ts +6 -6
- package/dnsSecurityProfile.d.ts +0 -2
- package/dnsSecurityProfile.js +0 -2
- package/dnsSecurityProfile.js.map +1 -1
- package/dynamicUserGroup.d.ts +3 -3
- package/dynamicUserGroup.js +3 -3
- package/ethernetInterface.d.ts +11 -13
- package/ethernetInterface.js +0 -2
- package/ethernetInterface.js.map +1 -1
- package/externalDynamicList.d.ts +0 -80
- package/externalDynamicList.js +0 -80
- package/externalDynamicList.js.map +1 -1
- package/folder.d.ts +0 -60
- package/folder.js +0 -60
- package/folder.js.map +1 -1
- package/getAddressGroupList.d.ts +4 -4
- package/getAddressGroupList.js +4 -4
- package/getAddressList.d.ts +4 -4
- package/getAddressList.js +4 -4
- package/getAggregateEthernetInterface.d.ts +78 -0
- package/getAggregateEthernetInterface.js +30 -0
- package/getAggregateEthernetInterface.js.map +1 -0
- package/{getAggregateInterfaceList.d.ts → getAggregateEthernetInterfaceList.d.ts} +9 -35
- package/getAggregateEthernetInterfaceList.js +40 -0
- package/getAggregateEthernetInterfaceList.js.map +1 -0
- package/getAntiSpywareProfileList.d.ts +2 -2
- package/getAntiSpywareProfileList.js +2 -2
- package/getAntiSpywareSignature.d.ts +1 -1
- package/getAntiSpywareSignatureList.d.ts +2 -2
- package/getAntiSpywareSignatureList.js +2 -2
- package/getAppOverrideRule.d.ts +1 -65
- package/getAppOverrideRule.js +0 -52
- package/getAppOverrideRule.js.map +1 -1
- package/getAppOverrideRuleList.d.ts +2 -48
- package/getAppOverrideRuleList.js +2 -36
- package/getAppOverrideRuleList.js.map +1 -1
- package/getApplicationGroupList.d.ts +4 -4
- package/getApplicationGroupList.js +4 -4
- package/getApplicationList.d.ts +2 -2
- package/getApplicationList.js +2 -2
- package/getAuthenticationRule.d.ts +0 -74
- package/getAuthenticationRule.js +0 -62
- package/getAuthenticationRule.js.map +1 -1
- package/getAuthenticationRuleList.d.ts +2 -50
- package/getAuthenticationRuleList.js +2 -38
- package/getAuthenticationRuleList.js.map +1 -1
- package/getBgpRouteMapRedistribution.d.ts +7 -7
- package/getCertificateProfileList.d.ts +2 -2
- package/getCertificateProfileList.js +2 -2
- package/getDecryptionProfile.d.ts +0 -40
- package/getDecryptionProfile.js +0 -40
- package/getDecryptionProfile.js.map +1 -1
- package/getDecryptionProfileList.d.ts +0 -32
- package/getDecryptionProfileList.js +0 -32
- package/getDecryptionProfileList.js.map +1 -1
- package/getDecryptionRule.d.ts +0 -74
- package/getDecryptionRule.js +0 -62
- package/getDecryptionRule.js.map +1 -1
- package/getDecryptionRuleList.d.ts +2 -48
- package/getDecryptionRuleList.js +2 -36
- package/getDecryptionRuleList.js.map +1 -1
- package/getDnsProxy.d.ts +1 -1
- package/getDnsSecurityProfile.d.ts +0 -40
- package/getDnsSecurityProfile.js +0 -40
- package/getDnsSecurityProfile.js.map +1 -1
- package/getDnsSecurityProfileList.d.ts +0 -32
- package/getDnsSecurityProfileList.js +0 -32
- package/getDnsSecurityProfileList.js.map +1 -1
- package/getDynamicUserGroupList.d.ts +4 -4
- package/getDynamicUserGroupList.js +4 -4
- package/getEthernetInterface.d.ts +2 -40
- package/getEthernetInterface.js +0 -38
- package/getEthernetInterface.js.map +1 -1
- package/getEthernetInterfaceList.d.ts +0 -26
- package/getEthernetInterfaceList.js +0 -26
- package/getEthernetInterfaceList.js.map +1 -1
- package/getExternalDynamicListList.d.ts +4 -4
- package/getExternalDynamicListList.js +4 -4
- package/getFolder.d.ts +0 -36
- package/getFolder.js +0 -36
- package/getFolder.js.map +1 -1
- package/getHipObjectList.d.ts +4 -4
- package/getHipObjectList.js +4 -4
- package/getHipProfileList.d.ts +4 -4
- package/getHipProfileList.js +4 -4
- package/getInterfaceManagementProfile.d.ts +8 -89
- package/getInterfaceManagementProfile.js +0 -80
- package/getInterfaceManagementProfile.js.map +1 -1
- package/getInterfaceManagementProfileList.d.ts +0 -42
- package/getInterfaceManagementProfileList.js +0 -42
- package/getInterfaceManagementProfileList.js.map +1 -1
- package/getLayer2Subinterface.d.ts +2 -42
- package/getLayer2Subinterface.js +0 -40
- package/getLayer2Subinterface.js.map +1 -1
- package/getLayer2SubinterfaceList.d.ts +0 -26
- package/getLayer2SubinterfaceList.js +0 -26
- package/getLayer2SubinterfaceList.js.map +1 -1
- package/getLayer3Subinterface.d.ts +3 -45
- package/getLayer3Subinterface.js +0 -42
- package/getLayer3Subinterface.js.map +1 -1
- package/getLayer3SubinterfaceList.d.ts +0 -26
- package/getLayer3SubinterfaceList.js +0 -26
- package/getLayer3SubinterfaceList.js.map +1 -1
- package/getLogicalRouter.d.ts +0 -38
- package/getLogicalRouter.js +0 -38
- package/getLogicalRouter.js.map +1 -1
- package/getLogicalRouterList.d.ts +0 -40
- package/getLogicalRouterList.js +0 -30
- package/getLogicalRouterList.js.map +1 -1
- package/getLoopbackInterface.d.ts +7 -49
- package/getLoopbackInterface.js +0 -38
- package/getLoopbackInterface.js.map +1 -1
- package/getLoopbackInterfaceList.d.ts +0 -26
- package/getLoopbackInterfaceList.js +0 -26
- package/getLoopbackInterfaceList.js.map +1 -1
- package/getNatRule.d.ts +14 -86
- package/getNatRule.js +0 -76
- package/getNatRule.js.map +1 -1
- package/getNatRuleList.d.ts +2 -52
- package/getNatRuleList.js +2 -40
- package/getNatRuleList.js.map +1 -1
- package/getPbfRule.d.ts +0 -88
- package/getPbfRule.js +0 -88
- package/getPbfRule.js.map +1 -1
- package/getPbfRuleList.d.ts +0 -34
- package/getPbfRuleList.js +0 -34
- package/getPbfRuleList.js.map +1 -1
- package/getQosPolicyRule.d.ts +0 -72
- package/getQosPolicyRule.js +0 -60
- package/getQosPolicyRule.js.map +1 -1
- package/getQosPolicyRuleList.d.ts +2 -48
- package/getQosPolicyRuleList.js +2 -36
- package/getQosPolicyRuleList.js.map +1 -1
- package/getRadiusServerProfile.d.ts +0 -54
- package/getRadiusServerProfile.js +0 -54
- package/getRadiusServerProfile.js.map +1 -1
- package/getSdwanTrafficDistributionProfile.d.ts +1 -1
- package/getSecurityRule.d.ts +0 -106
- package/getSecurityRule.js +0 -94
- package/getSecurityRule.js.map +1 -1
- package/getSecurityRuleList.d.ts +2 -46
- package/getSecurityRuleList.js +2 -34
- package/getSecurityRuleList.js.map +1 -1
- package/getServiceConnection.d.ts +1 -177
- package/getServiceConnection.js +0 -176
- package/getServiceConnection.js.map +1 -1
- package/getServiceConnectionGroup.d.ts +0 -208
- package/getServiceConnectionGroup.js +0 -208
- package/getServiceConnectionGroup.js.map +1 -1
- package/getServiceGroupList.d.ts +2 -2
- package/getServiceGroupList.js +2 -2
- package/getServiceList.d.ts +4 -4
- package/getServiceList.js +4 -4
- package/getSnippet.d.ts +0 -48
- package/getSnippet.js +0 -48
- package/getSnippet.js.map +1 -1
- package/getSnippetList.d.ts +0 -24
- package/getSnippetList.js +0 -24
- package/getSnippetList.js.map +1 -1
- package/getTagList.d.ts +2 -2
- package/getTagList.js +2 -2
- package/getTunnelInterface.d.ts +4 -42
- package/getTunnelInterface.js +0 -38
- package/getTunnelInterface.js.map +1 -1
- package/getTunnelInterfaceList.d.ts +0 -26
- package/getTunnelInterfaceList.js +0 -26
- package/getTunnelInterfaceList.js.map +1 -1
- package/getUrlAccessProfileList.d.ts +2 -2
- package/getUrlAccessProfileList.js +2 -2
- package/getUrlCategoryList.d.ts +4 -4
- package/getUrlCategoryList.js +4 -4
- package/getVlanInterface.d.ts +6 -46
- package/getVlanInterface.js +0 -40
- package/getVlanInterface.js.map +1 -1
- package/getVlanInterfaceList.d.ts +0 -26
- package/getVlanInterfaceList.js +0 -26
- package/getVlanInterfaceList.js.map +1 -1
- package/getVulnerabilityProtectionProfileList.d.ts +2 -2
- package/getVulnerabilityProtectionProfileList.js +2 -2
- package/getVulnerabilityProtectionSignature.d.ts +1 -41
- package/getVulnerabilityProtectionSignature.js +0 -40
- package/getVulnerabilityProtectionSignature.js.map +1 -1
- package/getVulnerabilityProtectionSignatureList.d.ts +0 -32
- package/getVulnerabilityProtectionSignatureList.js +0 -32
- package/getVulnerabilityProtectionSignatureList.js.map +1 -1
- package/getZone.d.ts +0 -44
- package/getZone.js +0 -44
- package/getZone.js.map +1 -1
- package/getZoneList.d.ts +0 -26
- package/getZoneList.js +0 -26
- package/getZoneList.js.map +1 -1
- package/ikeGateway.d.ts +0 -49
- package/ikeGateway.js +0 -49
- package/ikeGateway.js.map +1 -1
- package/index.d.ts +9 -9
- package/index.js +12 -12
- package/index.js.map +1 -1
- package/interfaceManagementProfile.d.ts +24 -56
- package/interfaceManagementProfile.js +0 -30
- package/interfaceManagementProfile.js.map +1 -1
- package/ipsecCryptoProfile.d.ts +0 -28
- package/ipsecCryptoProfile.js +0 -28
- package/ipsecCryptoProfile.js.map +1 -1
- package/ipsecTunnel.d.ts +0 -66
- package/ipsecTunnel.js +0 -66
- package/ipsecTunnel.js.map +1 -1
- package/layer2Subinterface.d.ts +7 -36
- package/layer2Subinterface.js +0 -32
- package/layer2Subinterface.js.map +1 -1
- package/layer3Subinterface.d.ts +11 -70
- package/layer3Subinterface.js +0 -59
- package/layer3Subinterface.js.map +1 -1
- package/logicalRouter.d.ts +0 -2
- package/logicalRouter.js +0 -2
- package/logicalRouter.js.map +1 -1
- package/loopbackInterface.d.ts +15 -58
- package/loopbackInterface.js +2 -35
- package/loopbackInterface.js.map +1 -1
- package/natRule.d.ts +42 -135
- package/natRule.js +8 -121
- package/natRule.js.map +1 -1
- package/package.json +2 -2
- package/pbfRule.d.ts +0 -89
- package/pbfRule.js +0 -89
- package/pbfRule.js.map +1 -1
- package/qosPolicyRule.d.ts +0 -95
- package/qosPolicyRule.js +0 -75
- package/qosPolicyRule.js.map +1 -1
- package/radiusServerProfile.d.ts +0 -38
- package/radiusServerProfile.js +0 -38
- package/radiusServerProfile.js.map +1 -1
- package/remoteNetwork.d.ts +0 -81
- package/remoteNetwork.js +0 -81
- package/remoteNetwork.js.map +1 -1
- package/sdwanTrafficDistributionProfile.d.ts +4 -4
- package/securityRule.d.ts +0 -181
- package/securityRule.js +0 -161
- package/securityRule.js.map +1 -1
- package/serviceConnection.d.ts +3 -82
- package/serviceConnection.js +2 -81
- package/serviceConnection.js.map +1 -1
- package/serviceConnectionGroup.d.ts +0 -100
- package/serviceConnectionGroup.js +0 -100
- package/serviceConnectionGroup.js.map +1 -1
- package/serviceGroup.d.ts +2 -2
- package/serviceGroup.js +2 -2
- package/snippet.d.ts +0 -23
- package/snippet.js +0 -23
- package/snippet.js.map +1 -1
- package/tag.d.ts +3 -3
- package/tag.js +3 -3
- package/tunnelInterface.d.ts +12 -42
- package/tunnelInterface.js +2 -32
- package/tunnelInterface.js.map +1 -1
- package/types/input.d.ts +335 -607
- package/types/output.d.ts +1069 -1945
- package/vlanInterface.d.ts +20 -40
- package/vlanInterface.js +0 -20
- package/vlanInterface.js.map +1 -1
- package/vulnerabilityProtectionSignature.d.ts +10 -12
- package/vulnerabilityProtectionSignature.js +0 -14
- package/vulnerabilityProtectionSignature.js.map +1 -1
- package/zone.d.ts +0 -71
- package/zone.js +0 -71
- package/zone.js.map +1 -1
- package/aggregateInterface.js.map +0 -1
- package/getAggregateInterface.d.ts +0 -116
- package/getAggregateInterface.js +0 -68
- package/getAggregateInterface.js.map +0 -1
- package/getAggregateInterfaceList.js +0 -66
- package/getAggregateInterfaceList.js.map +0 -1
package/remoteNetwork.js
CHANGED
|
@@ -9,87 +9,6 @@ const utilities = require("./utilities");
|
|
|
9
9
|
* RemoteNetwork resource
|
|
10
10
|
*
|
|
11
11
|
* ## Example Usage
|
|
12
|
-
*
|
|
13
|
-
* ```typescript
|
|
14
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
15
|
-
* import * as scm from "@pulumi/scm";
|
|
16
|
-
*
|
|
17
|
-
* // --- DEPENDENCY 1: IKE Crypto Profile ---
|
|
18
|
-
* // This profile defines the encryption and authentication algorithms for the IKE Gateway.
|
|
19
|
-
* // The values are taken from the 'createTestIKECryptoProfile' helper function.
|
|
20
|
-
* const example = new scm.IkeCryptoProfile("example", {
|
|
21
|
-
* name: "example-ike-crypto-prf-for-rn",
|
|
22
|
-
* folder: "Remote Networks",
|
|
23
|
-
* hashes: ["sha256"],
|
|
24
|
-
* dhGroups: ["group14"],
|
|
25
|
-
* encryptions: ["aes-256-cbc"],
|
|
26
|
-
* });
|
|
27
|
-
* // --- DEPENDENCY 2: IKE Gateway ---
|
|
28
|
-
* // This defines the VPN peer. It depends on the IKE Crypto Profile created above.
|
|
29
|
-
* // The values are taken from the 'createTestIKEGateway' helper function.
|
|
30
|
-
* const exampleIkeGateway = new scm.IkeGateway("example", {
|
|
31
|
-
* name: "example-ike-gateway-for-rn",
|
|
32
|
-
* folder: "Remote Networks",
|
|
33
|
-
* authentication: {
|
|
34
|
-
* preSharedKey: {
|
|
35
|
-
* key: "secret",
|
|
36
|
-
* },
|
|
37
|
-
* },
|
|
38
|
-
* peerAddress: {
|
|
39
|
-
* ip: "1.1.1.1",
|
|
40
|
-
* },
|
|
41
|
-
* protocol: {
|
|
42
|
-
* ikev1: {
|
|
43
|
-
* ikeCryptoProfile: example.name,
|
|
44
|
-
* },
|
|
45
|
-
* },
|
|
46
|
-
* }, {
|
|
47
|
-
* dependsOn: [example],
|
|
48
|
-
* });
|
|
49
|
-
* // --- DEPENDENCY 3: IPsec Tunnel ---
|
|
50
|
-
* // This defines the tunnel interface itself and uses the IKE Gateway.
|
|
51
|
-
* // The values are taken from the 'createTestIPsecTunnel' helper function.
|
|
52
|
-
* const exampleIpsecTunnel = new scm.IpsecTunnel("example", {
|
|
53
|
-
* name: "example-ipsec-tunnel-for-rn",
|
|
54
|
-
* folder: "Remote Networks",
|
|
55
|
-
* antiReplay: true,
|
|
56
|
-
* copyTos: false,
|
|
57
|
-
* enableGreEncapsulation: false,
|
|
58
|
-
* autoKey: {
|
|
59
|
-
* ikeGateways: [{
|
|
60
|
-
* name: exampleIkeGateway.name,
|
|
61
|
-
* }],
|
|
62
|
-
* ipsecCryptoProfile: "PaloAlto-Networks-IPSec-Crypto",
|
|
63
|
-
* },
|
|
64
|
-
* }, {
|
|
65
|
-
* dependsOn: [exampleIkeGateway],
|
|
66
|
-
* });
|
|
67
|
-
* // --- MAIN RESOURCE: Remote Network ---
|
|
68
|
-
* // This is the final resource, which uses the IPsec Tunnel created above.
|
|
69
|
-
* // The values are taken directly from the 'Test_deployment_services_RemoteNetworksAPIService_Create' test.
|
|
70
|
-
* const exampleRemoteNetwork = new scm.RemoteNetwork("example", {
|
|
71
|
-
* name: "example-remote-network",
|
|
72
|
-
* folder: "Remote Networks",
|
|
73
|
-
* licenseType: "FWAAS-AGGREGATE",
|
|
74
|
-
* region: "us-west-2",
|
|
75
|
-
* spnName: "us-west-dakota",
|
|
76
|
-
* subnets: ["192.168.1.0/24"],
|
|
77
|
-
* ipsecTunnel: exampleIpsecTunnel.name,
|
|
78
|
-
* protocol: {
|
|
79
|
-
* bgp: {
|
|
80
|
-
* enable: true,
|
|
81
|
-
* peerAs: "65000",
|
|
82
|
-
* localIpAddress: "169.254.1.1",
|
|
83
|
-
* peerIpAddress: "169.254.1.2",
|
|
84
|
-
* doNotExportRoutes: false,
|
|
85
|
-
* originateDefaultRoute: false,
|
|
86
|
-
* summarizeMobileUserRoutes: false,
|
|
87
|
-
* },
|
|
88
|
-
* },
|
|
89
|
-
* }, {
|
|
90
|
-
* dependsOn: [exampleIpsecTunnel],
|
|
91
|
-
* });
|
|
92
|
-
* ```
|
|
93
12
|
*/
|
|
94
13
|
class RemoteNetwork extends pulumi.CustomResource {
|
|
95
14
|
/**
|
package/remoteNetwork.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"remoteNetwork.js","sourceRoot":"","sources":["../remoteNetwork.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"remoteNetwork.js","sourceRoot":"","sources":["../remoteNetwork.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;GAIG;AACH,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;IACpD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA0B,EAAE,IAAmC;QACxH,OAAO,IAAI,aAAa,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACpE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,aAAa,CAAC,YAAY,CAAC;IAC9D,CAAC;IA4DD,YAAY,IAAY,EAAE,WAAoD,EAAE,IAAmC;QAC/G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA6C,CAAC;YAC5D,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,EAAE,iBAAiB,CAAC;YAC/D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,EAAE,eAAe,CAAC;YAC3D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;YACzC,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;YACzC,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,EAAE,oBAAoB,CAAC;YACrE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;SACxC;aAAM;YACH,MAAM,IAAI,GAAG,WAA4C,CAAC;YAC1D,IAAI,IAAI,EAAE,MAAM,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACzC,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,IAAI,IAAI,EAAE,WAAW,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC9C,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,IAAI,IAAI,EAAE,MAAM,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACzC,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,EAAE,iBAAiB,CAAC;YAC9D,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,EAAE,oBAAoB,CAAC;YACpE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,iBAAiB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACtD,cAAc,CAAC,MAAM,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAC9C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,iBAAiB,CAAC,EAAE,CAAC;QACpE,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAClE,CAAC;;AArIL,sCAsIC;AAxHG,gBAAgB;AACO,0BAAY,GAAG,uCAAuC,CAAC"}
|
|
@@ -29,7 +29,7 @@ export declare class SdwanTrafficDistributionProfile extends pulumi.CustomResour
|
|
|
29
29
|
*/
|
|
30
30
|
readonly folder: pulumi.Output<string | undefined>;
|
|
31
31
|
/**
|
|
32
|
-
* Link
|
|
32
|
+
* Link tags
|
|
33
33
|
*/
|
|
34
34
|
readonly linkTags: pulumi.Output<outputs.SdwanTrafficDistributionProfileLinkTag[] | undefined>;
|
|
35
35
|
/**
|
|
@@ -44,7 +44,7 @@ export declare class SdwanTrafficDistributionProfile extends pulumi.CustomResour
|
|
|
44
44
|
/**
|
|
45
45
|
* Traffic distribution
|
|
46
46
|
*/
|
|
47
|
-
readonly trafficDistribution: pulumi.Output<string>;
|
|
47
|
+
readonly trafficDistribution: pulumi.Output<string | undefined>;
|
|
48
48
|
/**
|
|
49
49
|
* Create a SdwanTrafficDistributionProfile resource with the given unique name, arguments, and options.
|
|
50
50
|
*
|
|
@@ -67,7 +67,7 @@ export interface SdwanTrafficDistributionProfileState {
|
|
|
67
67
|
*/
|
|
68
68
|
folder?: pulumi.Input<string>;
|
|
69
69
|
/**
|
|
70
|
-
* Link
|
|
70
|
+
* Link tags
|
|
71
71
|
*/
|
|
72
72
|
linkTags?: pulumi.Input<pulumi.Input<inputs.SdwanTrafficDistributionProfileLinkTag>[]>;
|
|
73
73
|
/**
|
|
@@ -97,7 +97,7 @@ export interface SdwanTrafficDistributionProfileArgs {
|
|
|
97
97
|
*/
|
|
98
98
|
folder?: pulumi.Input<string>;
|
|
99
99
|
/**
|
|
100
|
-
* Link
|
|
100
|
+
* Link tags
|
|
101
101
|
*/
|
|
102
102
|
linkTags?: pulumi.Input<pulumi.Input<inputs.SdwanTrafficDistributionProfileLinkTag>[]>;
|
|
103
103
|
/**
|
package/securityRule.d.ts
CHANGED
|
@@ -5,163 +5,6 @@ import * as outputs from "./types/output";
|
|
|
5
5
|
* SecurityRule resource
|
|
6
6
|
*
|
|
7
7
|
* ## Example Usage
|
|
8
|
-
*
|
|
9
|
-
* ```typescript
|
|
10
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
11
|
-
* import * as scm from "@pulumi/scm";
|
|
12
|
-
*
|
|
13
|
-
* // First, create the tag objects that you will reference.
|
|
14
|
-
* const outboundTag = new scm.Tag("outbound_tag", {
|
|
15
|
-
* folder: "All",
|
|
16
|
-
* name: "outbound143",
|
|
17
|
-
* color: "Red",
|
|
18
|
-
* });
|
|
19
|
-
* const webTag = new scm.Tag("web_tag", {
|
|
20
|
-
* folder: "All",
|
|
21
|
-
* name: "web143",
|
|
22
|
-
* color: "Blue",
|
|
23
|
-
* });
|
|
24
|
-
* // --- Existing Rules (Backward Compatibility) ---
|
|
25
|
-
* const standardWebAccess = new scm.SecurityRule("standard_web_access", {
|
|
26
|
-
* folder: "All",
|
|
27
|
-
* name: "Allow Standard Web Access143",
|
|
28
|
-
* description: "Allow outbound web traffic to any destination...",
|
|
29
|
-
* position: "pre",
|
|
30
|
-
* action: "allow",
|
|
31
|
-
* categories: ["any"],
|
|
32
|
-
* applications: [
|
|
33
|
-
* "web-browsing",
|
|
34
|
-
* "ssl",
|
|
35
|
-
* ],
|
|
36
|
-
* services: [
|
|
37
|
-
* "service-http",
|
|
38
|
-
* "service-https",
|
|
39
|
-
* ],
|
|
40
|
-
* froms: [
|
|
41
|
-
* "untrust",
|
|
42
|
-
* "trust",
|
|
43
|
-
* ],
|
|
44
|
-
* tos: ["trust"],
|
|
45
|
-
* sources: ["any"],
|
|
46
|
-
* destinations: ["any"],
|
|
47
|
-
* negateSource: false,
|
|
48
|
-
* negateDestination: false,
|
|
49
|
-
* sourceUsers: ["any"],
|
|
50
|
-
* sourceHips: ["any"],
|
|
51
|
-
* destinationHips: ["any"],
|
|
52
|
-
* logStart: true,
|
|
53
|
-
* logEnd: true,
|
|
54
|
-
* disabled: false,
|
|
55
|
-
* tags: [
|
|
56
|
-
* outboundTag.name,
|
|
57
|
-
* webTag.name,
|
|
58
|
-
* ],
|
|
59
|
-
* });
|
|
60
|
-
* const blockRiskySaas = new scm.SecurityRule("block_risky_saas", {
|
|
61
|
-
* folder: "All",
|
|
62
|
-
* name: "Block Risky SaaS Applications143",
|
|
63
|
-
* description: "Prevent data exfiltration by blocking risky SaaS apps...",
|
|
64
|
-
* action: "deny",
|
|
65
|
-
* policyType: "Internet",
|
|
66
|
-
* securitySettings: {
|
|
67
|
-
* antiSpyware: "yes",
|
|
68
|
-
* vulnerability: "yes",
|
|
69
|
-
* virusAndWildfireAnalysis: "yes",
|
|
70
|
-
* },
|
|
71
|
-
* blockWebApplications: ["facebook-posting"],
|
|
72
|
-
* logSettings: {
|
|
73
|
-
* logSessions: true,
|
|
74
|
-
* },
|
|
75
|
-
* froms: ["any"],
|
|
76
|
-
* tos: ["any"],
|
|
77
|
-
* sources: ["any"],
|
|
78
|
-
* destinations: ["any"],
|
|
79
|
-
* sourceUsers: ["any"],
|
|
80
|
-
* disabled: false,
|
|
81
|
-
* tags: [
|
|
82
|
-
* outboundTag.name,
|
|
83
|
-
* webTag.name,
|
|
84
|
-
* ],
|
|
85
|
-
* });
|
|
86
|
-
* // --- NEW Examples Demonstrating Rule Ordering ---
|
|
87
|
-
* // Example 1: Place a critical block rule at the absolute top
|
|
88
|
-
* const criticalBlockTop = new scm.SecurityRule("critical_block_top", {
|
|
89
|
-
* folder: "All",
|
|
90
|
-
* name: "CRITICAL Block Malicious IPs Top143",
|
|
91
|
-
* description: "Always block known malicious IPs first.",
|
|
92
|
-
* relativePosition: "top",
|
|
93
|
-
* action: "deny",
|
|
94
|
-
* froms: ["any"],
|
|
95
|
-
* tos: ["any"],
|
|
96
|
-
* sources: ["any"],
|
|
97
|
-
* destinations: ["any"],
|
|
98
|
-
* sourceUsers: ["any"],
|
|
99
|
-
* categories: ["any"],
|
|
100
|
-
* applications: ["any"],
|
|
101
|
-
* services: ["any"],
|
|
102
|
-
* logEnd: true,
|
|
103
|
-
* tags: [outboundTag.name],
|
|
104
|
-
* });
|
|
105
|
-
* // Example 2: Place a cleanup rule at the absolute bottom
|
|
106
|
-
* const cleanupDenyBottom = new scm.SecurityRule("cleanup_deny_bottom", {
|
|
107
|
-
* folder: "All",
|
|
108
|
-
* name: "Cleanup Deny All Bottom143",
|
|
109
|
-
* description: "Deny any traffic not explicitly allowed.",
|
|
110
|
-
* relativePosition: "bottom",
|
|
111
|
-
* action: "deny",
|
|
112
|
-
* froms: ["any"],
|
|
113
|
-
* tos: ["any"],
|
|
114
|
-
* sources: ["any"],
|
|
115
|
-
* destinations: ["any"],
|
|
116
|
-
* sourceUsers: ["any"],
|
|
117
|
-
* categories: ["any"],
|
|
118
|
-
* applications: ["any"],
|
|
119
|
-
* services: ["any"],
|
|
120
|
-
* logEnd: true,
|
|
121
|
-
* tags: [outboundTag.name],
|
|
122
|
-
* });
|
|
123
|
-
* // Example 3: Place a rule *before* the standard web access rule
|
|
124
|
-
* const allowUpdatesBeforeWeb = new scm.SecurityRule("allow_updates_before_web", {
|
|
125
|
-
* folder: "All",
|
|
126
|
-
* name: "Allow OS Updates Before Web143",
|
|
127
|
-
* description: "Allow specific OS update traffic before general web access.",
|
|
128
|
-
* relativePosition: "before",
|
|
129
|
-
* targetRule: standardWebAccess.id,
|
|
130
|
-
* action: "allow",
|
|
131
|
-
* froms: ["trust"],
|
|
132
|
-
* tos: ["untrust"],
|
|
133
|
-
* sources: ["any"],
|
|
134
|
-
* destinations: ["any"],
|
|
135
|
-
* sourceUsers: ["any"],
|
|
136
|
-
* categories: ["any"],
|
|
137
|
-
* applications: [
|
|
138
|
-
* "ms-update",
|
|
139
|
-
* "apple-update",
|
|
140
|
-
* ],
|
|
141
|
-
* services: ["service-https"],
|
|
142
|
-
* logEnd: true,
|
|
143
|
-
* tags: [outboundTag.name],
|
|
144
|
-
* });
|
|
145
|
-
* // Example 4: Place a rule *after* the standard web access rule
|
|
146
|
-
* const allowCorpAppsAfterWeb = new scm.SecurityRule("allow_corp_apps_after_web", {
|
|
147
|
-
* folder: "All",
|
|
148
|
-
* name: "Allow Corp Apps After Web143",
|
|
149
|
-
* description: "Allow access to specific corporate apps after general web access.",
|
|
150
|
-
* relativePosition: "after",
|
|
151
|
-
* targetRule: standardWebAccess.id,
|
|
152
|
-
* action: "allow",
|
|
153
|
-
* froms: ["trust"],
|
|
154
|
-
* tos: ["untrust"],
|
|
155
|
-
* sources: ["any"],
|
|
156
|
-
* destinations: ["any"],
|
|
157
|
-
* sourceUsers: ["any"],
|
|
158
|
-
* categories: ["any"],
|
|
159
|
-
* applications: ["ms-update"],
|
|
160
|
-
* services: ["service-https"],
|
|
161
|
-
* logEnd: true,
|
|
162
|
-
* tags: [webTag.name],
|
|
163
|
-
* });
|
|
164
|
-
* ```
|
|
165
8
|
*/
|
|
166
9
|
export declare class SecurityRule extends pulumi.CustomResource {
|
|
167
10
|
/**
|
|
@@ -287,10 +130,6 @@ export declare class SecurityRule extends pulumi.CustomResource {
|
|
|
287
130
|
* The security profile object
|
|
288
131
|
*/
|
|
289
132
|
readonly profileSetting: pulumi.Output<outputs.SecurityRuleProfileSetting>;
|
|
290
|
-
/**
|
|
291
|
-
* Relative positioning rule. String must be one of these: `"before"`, `"after"`, `"top"`, `"bottom"`. If not specified, rule is created at the bottom of the ruleset.
|
|
292
|
-
*/
|
|
293
|
-
readonly relativePosition: pulumi.Output<string | undefined>;
|
|
294
133
|
/**
|
|
295
134
|
* Schedule in which this rule will be applied
|
|
296
135
|
*/
|
|
@@ -323,10 +162,6 @@ export declare class SecurityRule extends pulumi.CustomResource {
|
|
|
323
162
|
* The tags associated with the security rule
|
|
324
163
|
*/
|
|
325
164
|
readonly tags: pulumi.Output<string[] | undefined>;
|
|
326
|
-
/**
|
|
327
|
-
* The name or UUID of the rule to position this rule relative to. Required when `relativePosition` is `"before"` or `"after"`.
|
|
328
|
-
*/
|
|
329
|
-
readonly targetRule: pulumi.Output<string | undefined>;
|
|
330
165
|
/**
|
|
331
166
|
* Tenant restrictions
|
|
332
167
|
*/
|
|
@@ -457,10 +292,6 @@ export interface SecurityRuleState {
|
|
|
457
292
|
* The security profile object
|
|
458
293
|
*/
|
|
459
294
|
profileSetting?: pulumi.Input<inputs.SecurityRuleProfileSetting>;
|
|
460
|
-
/**
|
|
461
|
-
* Relative positioning rule. String must be one of these: `"before"`, `"after"`, `"top"`, `"bottom"`. If not specified, rule is created at the bottom of the ruleset.
|
|
462
|
-
*/
|
|
463
|
-
relativePosition?: pulumi.Input<string>;
|
|
464
295
|
/**
|
|
465
296
|
* Schedule in which this rule will be applied
|
|
466
297
|
*/
|
|
@@ -493,10 +324,6 @@ export interface SecurityRuleState {
|
|
|
493
324
|
* The tags associated with the security rule
|
|
494
325
|
*/
|
|
495
326
|
tags?: pulumi.Input<pulumi.Input<string>[]>;
|
|
496
|
-
/**
|
|
497
|
-
* The name or UUID of the rule to position this rule relative to. Required when `relativePosition` is `"before"` or `"after"`.
|
|
498
|
-
*/
|
|
499
|
-
targetRule?: pulumi.Input<string>;
|
|
500
327
|
/**
|
|
501
328
|
* Tenant restrictions
|
|
502
329
|
*/
|
|
@@ -619,10 +446,6 @@ export interface SecurityRuleArgs {
|
|
|
619
446
|
* The security profile object
|
|
620
447
|
*/
|
|
621
448
|
profileSetting?: pulumi.Input<inputs.SecurityRuleProfileSetting>;
|
|
622
|
-
/**
|
|
623
|
-
* Relative positioning rule. String must be one of these: `"before"`, `"after"`, `"top"`, `"bottom"`. If not specified, rule is created at the bottom of the ruleset.
|
|
624
|
-
*/
|
|
625
|
-
relativePosition?: pulumi.Input<string>;
|
|
626
449
|
/**
|
|
627
450
|
* Schedule in which this rule will be applied
|
|
628
451
|
*/
|
|
@@ -655,10 +478,6 @@ export interface SecurityRuleArgs {
|
|
|
655
478
|
* The tags associated with the security rule
|
|
656
479
|
*/
|
|
657
480
|
tags?: pulumi.Input<pulumi.Input<string>[]>;
|
|
658
|
-
/**
|
|
659
|
-
* The name or UUID of the rule to position this rule relative to. Required when `relativePosition` is `"before"` or `"after"`.
|
|
660
|
-
*/
|
|
661
|
-
targetRule?: pulumi.Input<string>;
|
|
662
481
|
/**
|
|
663
482
|
* Tenant restrictions
|
|
664
483
|
*/
|
package/securityRule.js
CHANGED
|
@@ -9,163 +9,6 @@ const utilities = require("./utilities");
|
|
|
9
9
|
* SecurityRule resource
|
|
10
10
|
*
|
|
11
11
|
* ## Example Usage
|
|
12
|
-
*
|
|
13
|
-
* ```typescript
|
|
14
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
15
|
-
* import * as scm from "@pulumi/scm";
|
|
16
|
-
*
|
|
17
|
-
* // First, create the tag objects that you will reference.
|
|
18
|
-
* const outboundTag = new scm.Tag("outbound_tag", {
|
|
19
|
-
* folder: "All",
|
|
20
|
-
* name: "outbound143",
|
|
21
|
-
* color: "Red",
|
|
22
|
-
* });
|
|
23
|
-
* const webTag = new scm.Tag("web_tag", {
|
|
24
|
-
* folder: "All",
|
|
25
|
-
* name: "web143",
|
|
26
|
-
* color: "Blue",
|
|
27
|
-
* });
|
|
28
|
-
* // --- Existing Rules (Backward Compatibility) ---
|
|
29
|
-
* const standardWebAccess = new scm.SecurityRule("standard_web_access", {
|
|
30
|
-
* folder: "All",
|
|
31
|
-
* name: "Allow Standard Web Access143",
|
|
32
|
-
* description: "Allow outbound web traffic to any destination...",
|
|
33
|
-
* position: "pre",
|
|
34
|
-
* action: "allow",
|
|
35
|
-
* categories: ["any"],
|
|
36
|
-
* applications: [
|
|
37
|
-
* "web-browsing",
|
|
38
|
-
* "ssl",
|
|
39
|
-
* ],
|
|
40
|
-
* services: [
|
|
41
|
-
* "service-http",
|
|
42
|
-
* "service-https",
|
|
43
|
-
* ],
|
|
44
|
-
* froms: [
|
|
45
|
-
* "untrust",
|
|
46
|
-
* "trust",
|
|
47
|
-
* ],
|
|
48
|
-
* tos: ["trust"],
|
|
49
|
-
* sources: ["any"],
|
|
50
|
-
* destinations: ["any"],
|
|
51
|
-
* negateSource: false,
|
|
52
|
-
* negateDestination: false,
|
|
53
|
-
* sourceUsers: ["any"],
|
|
54
|
-
* sourceHips: ["any"],
|
|
55
|
-
* destinationHips: ["any"],
|
|
56
|
-
* logStart: true,
|
|
57
|
-
* logEnd: true,
|
|
58
|
-
* disabled: false,
|
|
59
|
-
* tags: [
|
|
60
|
-
* outboundTag.name,
|
|
61
|
-
* webTag.name,
|
|
62
|
-
* ],
|
|
63
|
-
* });
|
|
64
|
-
* const blockRiskySaas = new scm.SecurityRule("block_risky_saas", {
|
|
65
|
-
* folder: "All",
|
|
66
|
-
* name: "Block Risky SaaS Applications143",
|
|
67
|
-
* description: "Prevent data exfiltration by blocking risky SaaS apps...",
|
|
68
|
-
* action: "deny",
|
|
69
|
-
* policyType: "Internet",
|
|
70
|
-
* securitySettings: {
|
|
71
|
-
* antiSpyware: "yes",
|
|
72
|
-
* vulnerability: "yes",
|
|
73
|
-
* virusAndWildfireAnalysis: "yes",
|
|
74
|
-
* },
|
|
75
|
-
* blockWebApplications: ["facebook-posting"],
|
|
76
|
-
* logSettings: {
|
|
77
|
-
* logSessions: true,
|
|
78
|
-
* },
|
|
79
|
-
* froms: ["any"],
|
|
80
|
-
* tos: ["any"],
|
|
81
|
-
* sources: ["any"],
|
|
82
|
-
* destinations: ["any"],
|
|
83
|
-
* sourceUsers: ["any"],
|
|
84
|
-
* disabled: false,
|
|
85
|
-
* tags: [
|
|
86
|
-
* outboundTag.name,
|
|
87
|
-
* webTag.name,
|
|
88
|
-
* ],
|
|
89
|
-
* });
|
|
90
|
-
* // --- NEW Examples Demonstrating Rule Ordering ---
|
|
91
|
-
* // Example 1: Place a critical block rule at the absolute top
|
|
92
|
-
* const criticalBlockTop = new scm.SecurityRule("critical_block_top", {
|
|
93
|
-
* folder: "All",
|
|
94
|
-
* name: "CRITICAL Block Malicious IPs Top143",
|
|
95
|
-
* description: "Always block known malicious IPs first.",
|
|
96
|
-
* relativePosition: "top",
|
|
97
|
-
* action: "deny",
|
|
98
|
-
* froms: ["any"],
|
|
99
|
-
* tos: ["any"],
|
|
100
|
-
* sources: ["any"],
|
|
101
|
-
* destinations: ["any"],
|
|
102
|
-
* sourceUsers: ["any"],
|
|
103
|
-
* categories: ["any"],
|
|
104
|
-
* applications: ["any"],
|
|
105
|
-
* services: ["any"],
|
|
106
|
-
* logEnd: true,
|
|
107
|
-
* tags: [outboundTag.name],
|
|
108
|
-
* });
|
|
109
|
-
* // Example 2: Place a cleanup rule at the absolute bottom
|
|
110
|
-
* const cleanupDenyBottom = new scm.SecurityRule("cleanup_deny_bottom", {
|
|
111
|
-
* folder: "All",
|
|
112
|
-
* name: "Cleanup Deny All Bottom143",
|
|
113
|
-
* description: "Deny any traffic not explicitly allowed.",
|
|
114
|
-
* relativePosition: "bottom",
|
|
115
|
-
* action: "deny",
|
|
116
|
-
* froms: ["any"],
|
|
117
|
-
* tos: ["any"],
|
|
118
|
-
* sources: ["any"],
|
|
119
|
-
* destinations: ["any"],
|
|
120
|
-
* sourceUsers: ["any"],
|
|
121
|
-
* categories: ["any"],
|
|
122
|
-
* applications: ["any"],
|
|
123
|
-
* services: ["any"],
|
|
124
|
-
* logEnd: true,
|
|
125
|
-
* tags: [outboundTag.name],
|
|
126
|
-
* });
|
|
127
|
-
* // Example 3: Place a rule *before* the standard web access rule
|
|
128
|
-
* const allowUpdatesBeforeWeb = new scm.SecurityRule("allow_updates_before_web", {
|
|
129
|
-
* folder: "All",
|
|
130
|
-
* name: "Allow OS Updates Before Web143",
|
|
131
|
-
* description: "Allow specific OS update traffic before general web access.",
|
|
132
|
-
* relativePosition: "before",
|
|
133
|
-
* targetRule: standardWebAccess.id,
|
|
134
|
-
* action: "allow",
|
|
135
|
-
* froms: ["trust"],
|
|
136
|
-
* tos: ["untrust"],
|
|
137
|
-
* sources: ["any"],
|
|
138
|
-
* destinations: ["any"],
|
|
139
|
-
* sourceUsers: ["any"],
|
|
140
|
-
* categories: ["any"],
|
|
141
|
-
* applications: [
|
|
142
|
-
* "ms-update",
|
|
143
|
-
* "apple-update",
|
|
144
|
-
* ],
|
|
145
|
-
* services: ["service-https"],
|
|
146
|
-
* logEnd: true,
|
|
147
|
-
* tags: [outboundTag.name],
|
|
148
|
-
* });
|
|
149
|
-
* // Example 4: Place a rule *after* the standard web access rule
|
|
150
|
-
* const allowCorpAppsAfterWeb = new scm.SecurityRule("allow_corp_apps_after_web", {
|
|
151
|
-
* folder: "All",
|
|
152
|
-
* name: "Allow Corp Apps After Web143",
|
|
153
|
-
* description: "Allow access to specific corporate apps after general web access.",
|
|
154
|
-
* relativePosition: "after",
|
|
155
|
-
* targetRule: standardWebAccess.id,
|
|
156
|
-
* action: "allow",
|
|
157
|
-
* froms: ["trust"],
|
|
158
|
-
* tos: ["untrust"],
|
|
159
|
-
* sources: ["any"],
|
|
160
|
-
* destinations: ["any"],
|
|
161
|
-
* sourceUsers: ["any"],
|
|
162
|
-
* categories: ["any"],
|
|
163
|
-
* applications: ["ms-update"],
|
|
164
|
-
* services: ["service-https"],
|
|
165
|
-
* logEnd: true,
|
|
166
|
-
* tags: [webTag.name],
|
|
167
|
-
* });
|
|
168
|
-
* ```
|
|
169
12
|
*/
|
|
170
13
|
class SecurityRule extends pulumi.CustomResource {
|
|
171
14
|
/**
|
|
@@ -222,7 +65,6 @@ class SecurityRule extends pulumi.CustomResource {
|
|
|
222
65
|
resourceInputs["policyType"] = state?.policyType;
|
|
223
66
|
resourceInputs["position"] = state?.position;
|
|
224
67
|
resourceInputs["profileSetting"] = state?.profileSetting;
|
|
225
|
-
resourceInputs["relativePosition"] = state?.relativePosition;
|
|
226
68
|
resourceInputs["schedule"] = state?.schedule;
|
|
227
69
|
resourceInputs["securitySettings"] = state?.securitySettings;
|
|
228
70
|
resourceInputs["services"] = state?.services;
|
|
@@ -231,7 +73,6 @@ class SecurityRule extends pulumi.CustomResource {
|
|
|
231
73
|
resourceInputs["sourceUsers"] = state?.sourceUsers;
|
|
232
74
|
resourceInputs["sources"] = state?.sources;
|
|
233
75
|
resourceInputs["tags"] = state?.tags;
|
|
234
|
-
resourceInputs["targetRule"] = state?.targetRule;
|
|
235
76
|
resourceInputs["tenantRestrictions"] = state?.tenantRestrictions;
|
|
236
77
|
resourceInputs["tfid"] = state?.tfid;
|
|
237
78
|
resourceInputs["tos"] = state?.tos;
|
|
@@ -265,7 +106,6 @@ class SecurityRule extends pulumi.CustomResource {
|
|
|
265
106
|
resourceInputs["policyType"] = args?.policyType;
|
|
266
107
|
resourceInputs["position"] = args?.position;
|
|
267
108
|
resourceInputs["profileSetting"] = args?.profileSetting;
|
|
268
|
-
resourceInputs["relativePosition"] = args?.relativePosition;
|
|
269
109
|
resourceInputs["schedule"] = args?.schedule;
|
|
270
110
|
resourceInputs["securitySettings"] = args?.securitySettings;
|
|
271
111
|
resourceInputs["services"] = args?.services;
|
|
@@ -274,7 +114,6 @@ class SecurityRule extends pulumi.CustomResource {
|
|
|
274
114
|
resourceInputs["sourceUsers"] = args?.sourceUsers;
|
|
275
115
|
resourceInputs["sources"] = args?.sources;
|
|
276
116
|
resourceInputs["tags"] = args?.tags;
|
|
277
|
-
resourceInputs["targetRule"] = args?.targetRule;
|
|
278
117
|
resourceInputs["tenantRestrictions"] = args?.tenantRestrictions;
|
|
279
118
|
resourceInputs["tos"] = args?.tos;
|
|
280
119
|
resourceInputs["tfid"] = undefined /*out*/;
|
package/securityRule.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"securityRule.js","sourceRoot":"","sources":["../securityRule.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"securityRule.js","sourceRoot":"","sources":["../securityRule.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;GAIG;AACH,MAAa,YAAa,SAAQ,MAAM,CAAC,cAAc;IACnD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAyB,EAAE,IAAmC;QACvH,OAAO,IAAI,YAAY,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACnE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,YAAY,CAAC,YAAY,CAAC;IAC7D,CAAC;IAgKD,YAAY,IAAY,EAAE,WAAkD,EAAE,IAAmC;QAC7G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA4C,CAAC;YAC3D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;YACzC,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,EAAE,kBAAkB,CAAC;YACjE,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,EAAE,oBAAoB,CAAC;YACrE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,EAAE,kBAAkB,CAAC;YACjE,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,EAAE,oBAAoB,CAAC;YACrE,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,EAAE,sBAAsB,CAAC;YACzE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,EAAE,eAAe,CAAC;YAC3D,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;YACzC,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;YACzC,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;YACzC,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,EAAE,iBAAiB,CAAC;YAC/D,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,EAAE,gBAAgB,CAAC;YAC7D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,EAAE,kBAAkB,CAAC;YACjE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,EAAE,GAAG,CAAC;SACtC;aAAM;YACH,MAAM,IAAI,GAAG,WAA2C,CAAC;YACzD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,EAAE,kBAAkB,CAAC;YAChE,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,EAAE,oBAAoB,CAAC;YACpE,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,EAAE,kBAAkB,CAAC;YAChE,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,EAAE,oBAAoB,CAAC;YACpE,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,EAAE,sBAAsB,CAAC;YACxE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,EAAE,eAAe,CAAC;YAC1D,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC;YACtC,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,EAAE,iBAAiB,CAAC;YAC9D,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC;YACxD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,EAAE,gBAAgB,CAAC;YAC5D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,EAAE,kBAAkB,CAAC;YAChE,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,EAAE,GAAG,CAAC;YAClC,cAAc,CAAC,MAAM,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAC9C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,YAAY,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACjE,CAAC;;AAhRL,oCAiRC;AAnQG,gBAAgB;AACO,yBAAY,GAAG,qCAAqC,CAAC"}
|