@pulumi/scm 1.0.0-alpha.1763793524 → 1.0.0-alpha.1764128391
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/address.d.ts +36 -0
- package/address.js.map +1 -1
- package/addressGroup.d.ts +24 -0
- package/addressGroup.js.map +1 -1
- package/aggregateInterface.d.ts +24 -0
- package/aggregateInterface.js.map +1 -1
- package/antiSpywareProfile.d.ts +12 -0
- package/antiSpywareProfile.js.map +1 -1
- package/antiSpywareSignature.d.ts +12 -0
- package/antiSpywareSignature.js.map +1 -1
- package/appOverrideRule.d.ts +12 -0
- package/appOverrideRule.js.map +1 -1
- package/application.d.ts +12 -0
- package/application.js.map +1 -1
- package/applicationFilter.d.ts +12 -0
- package/applicationFilter.js.map +1 -1
- package/applicationGroup.d.ts +12 -0
- package/applicationGroup.js.map +1 -1
- package/authenticationPortal.d.ts +191 -0
- package/authenticationPortal.js +93 -0
- package/authenticationPortal.js.map +1 -0
- package/authenticationProfile.d.ts +66 -9
- package/authenticationProfile.js +45 -0
- package/authenticationProfile.js.map +1 -1
- package/authenticationRule.d.ts +12 -0
- package/authenticationRule.js.map +1 -1
- package/authenticationSequence.d.ts +35 -0
- package/authenticationSequence.js +23 -0
- package/authenticationSequence.js.map +1 -1
- package/autoVpnCluster.d.ts +176 -0
- package/autoVpnCluster.js +115 -0
- package/autoVpnCluster.js.map +1 -0
- package/autoVpnSetting.d.ts +95 -0
- package/autoVpnSetting.js +80 -0
- package/autoVpnSetting.js.map +1 -0
- package/bgpAddressFamilyProfile.d.ts +38 -3
- package/bgpAddressFamilyProfile.js +23 -0
- package/bgpAddressFamilyProfile.js.map +1 -1
- package/bgpAuthProfile.d.ts +25 -0
- package/bgpAuthProfile.js +13 -0
- package/bgpAuthProfile.js.map +1 -1
- package/bgpFilteringProfile.d.ts +46 -0
- package/bgpFilteringProfile.js +34 -0
- package/bgpFilteringProfile.js.map +1 -1
- package/bgpRedistributionProfile.d.ts +39 -0
- package/bgpRedistributionProfile.js +27 -0
- package/bgpRedistributionProfile.js.map +1 -1
- package/bgpRouteMap.d.ts +65 -0
- package/bgpRouteMap.js +53 -0
- package/bgpRouteMap.js.map +1 -1
- package/bgpRouteMapRedistribution.d.ts +30 -0
- package/bgpRouteMapRedistribution.js.map +1 -1
- package/bgpRouting.d.ts +133 -0
- package/bgpRouting.js +82 -0
- package/bgpRouting.js.map +1 -0
- package/certificateProfile.d.ts +12 -0
- package/certificateProfile.js.map +1 -1
- package/decryptionExclusion.d.ts +12 -0
- package/decryptionExclusion.js.map +1 -1
- package/decryptionProfile.d.ts +12 -0
- package/decryptionProfile.js.map +1 -1
- package/decryptionRule.d.ts +38 -0
- package/decryptionRule.js +26 -0
- package/decryptionRule.js.map +1 -1
- package/dhcpInterface.d.ts +24 -0
- package/dhcpInterface.js.map +1 -1
- package/dnsProxy.d.ts +12 -0
- package/dnsProxy.js.map +1 -1
- package/dnsSecurityProfile.d.ts +12 -0
- package/dnsSecurityProfile.js.map +1 -1
- package/dosProtectionProfile.d.ts +12 -0
- package/dosProtectionProfile.js.map +1 -1
- package/dosProtectionRule.d.ts +12 -0
- package/dosProtectionRule.js.map +1 -1
- package/dynamicUserGroup.d.ts +12 -0
- package/dynamicUserGroup.js.map +1 -1
- package/ethernetInterface.d.ts +85 -0
- package/ethernetInterface.js +39 -0
- package/ethernetInterface.js.map +1 -1
- package/externalDynamicList.d.ts +12 -0
- package/externalDynamicList.js.map +1 -1
- package/fileBlockingProfile.d.ts +86 -0
- package/fileBlockingProfile.js +74 -0
- package/fileBlockingProfile.js.map +1 -1
- package/getAddress.d.ts +0 -21
- package/getAddress.js.map +1 -1
- package/getAddressGroup.d.ts +0 -15
- package/getAddressGroup.js.map +1 -1
- package/getAggregateInterface.d.ts +0 -12
- package/getAggregateInterface.js.map +1 -1
- package/getAntiSpywareProfile.d.ts +0 -21
- package/getAntiSpywareProfile.js.map +1 -1
- package/getAntiSpywareSignature.d.ts +0 -27
- package/getAntiSpywareSignature.js.map +1 -1
- package/getAppOverrideRule.d.ts +4 -77
- package/getAppOverrideRule.js +4 -32
- package/getAppOverrideRule.js.map +1 -1
- package/getApplication.d.ts +0 -66
- package/getApplication.js.map +1 -1
- package/getApplicationFilter.d.ts +0 -57
- package/getApplicationFilter.js.map +1 -1
- package/getApplicationGroup.d.ts +0 -9
- package/getApplicationGroup.js.map +1 -1
- package/getAuthenticationProfile.d.ts +27 -25
- package/getAuthenticationProfile.js +26 -0
- package/getAuthenticationProfile.js.map +1 -1
- package/getAuthenticationProfileList.d.ts +32 -0
- package/getAuthenticationProfileList.js +32 -0
- package/getAuthenticationProfileList.js.map +1 -1
- package/getAuthenticationRule.d.ts +8 -104
- package/getAuthenticationRule.js +8 -44
- package/getAuthenticationRule.js.map +1 -1
- package/getAuthenticationSequence.d.ts +26 -9
- package/getAuthenticationSequence.js +26 -0
- package/getAuthenticationSequence.js.map +1 -1
- package/getAuthenticationSequenceList.d.ts +32 -0
- package/getAuthenticationSequenceList.js +32 -0
- package/getAuthenticationSequenceList.js.map +1 -1
- package/getAutoVpnCluster.d.ts +112 -0
- package/getAutoVpnCluster.js +68 -0
- package/getAutoVpnCluster.js.map +1 -0
- package/getAutoVpnClusterList.d.ts +136 -0
- package/getAutoVpnClusterList.js +66 -0
- package/getAutoVpnClusterList.js.map +1 -0
- package/getAutoVpnSetting.d.ts +52 -0
- package/getAutoVpnSetting.js +44 -0
- package/getAutoVpnSetting.js.map +1 -0
- package/getBgpAddressFamilyProfile.d.ts +36 -9
- package/getBgpAddressFamilyProfile.js +36 -0
- package/getBgpAddressFamilyProfile.js.map +1 -1
- package/getBgpAuthProfile.d.ts +36 -12
- package/getBgpAuthProfile.js +36 -0
- package/getBgpAuthProfile.js.map +1 -1
- package/getBgpAuthProfileList.d.ts +26 -0
- package/getBgpAuthProfileList.js +26 -0
- package/getBgpAuthProfileList.js.map +1 -1
- package/getBgpFilteringProfile.d.ts +0 -9
- package/getBgpFilteringProfile.js.map +1 -1
- package/getBgpRedistributionProfile.d.ts +36 -9
- package/getBgpRedistributionProfile.js +36 -0
- package/getBgpRedistributionProfile.js.map +1 -1
- package/getBgpRedistributionProfileList.d.ts +26 -0
- package/getBgpRedistributionProfileList.js +26 -0
- package/getBgpRedistributionProfileList.js.map +1 -1
- package/getBgpRouteMap.d.ts +36 -9
- package/getBgpRouteMap.js +36 -0
- package/getBgpRouteMap.js.map +1 -1
- package/getBgpRouteMapList.d.ts +26 -0
- package/getBgpRouteMapList.js +26 -0
- package/getBgpRouteMapList.js.map +1 -1
- package/getBgpRouteMapRedistribution.d.ts +0 -18
- package/getBgpRouteMapRedistribution.js.map +1 -1
- package/getBgpRouting.d.ts +64 -0
- package/getBgpRouting.js +44 -0
- package/getBgpRouting.js.map +1 -0
- package/getCertificateProfile.d.ts +0 -21
- package/getCertificateProfile.js.map +1 -1
- package/getDecryptionExclusion.d.ts +0 -6
- package/getDecryptionExclusion.js.map +1 -1
- package/getDecryptionProfile.d.ts +0 -18
- package/getDecryptionProfile.js.map +1 -1
- package/getDecryptionRule.d.ts +4 -100
- package/getDecryptionRule.js +4 -40
- package/getDecryptionRule.js.map +1 -1
- package/getDhcpInterface.d.ts +0 -12
- package/getDhcpInterface.js.map +1 -1
- package/getDnsProxy.d.ts +0 -24
- package/getDnsProxy.js.map +1 -1
- package/getDnsSecurityProfile.d.ts +0 -6
- package/getDnsSecurityProfile.js.map +1 -1
- package/getDosProtectionProfile.d.ts +0 -15
- package/getDosProtectionProfile.js.map +1 -1
- package/getDosProtectionRule.d.ts +0 -39
- package/getDosProtectionRule.js.map +1 -1
- package/getDynamicUserGroup.d.ts +0 -12
- package/getDynamicUserGroup.js.map +1 -1
- package/getEthernetInterface.d.ts +2 -37
- package/getEthernetInterface.js.map +1 -1
- package/getExternalDynamicList.d.ts +0 -12
- package/getExternalDynamicList.js.map +1 -1
- package/getFileBlockingProfile.d.ts +40 -9
- package/getFileBlockingProfile.js +40 -0
- package/getFileBlockingProfile.js.map +1 -1
- package/getFileBlockingProfileList.d.ts +32 -0
- package/getFileBlockingProfileList.js +32 -0
- package/getFileBlockingProfileList.js.map +1 -1
- package/getHipObject.d.ts +0 -27
- package/getHipObject.js.map +1 -1
- package/getHipProfile.d.ts +0 -9
- package/getHipProfile.js.map +1 -1
- package/getHttpHeaderProfile.d.ts +0 -9
- package/getHttpHeaderProfile.js.map +1 -1
- package/getHttpServerProfile.d.ts +0 -15
- package/getHttpServerProfile.js.map +1 -1
- package/getIkeCryptoProfile.d.ts +0 -18
- package/getIkeCryptoProfile.js.map +1 -1
- package/getIkeGateway.d.ts +0 -27
- package/getIkeGateway.js.map +1 -1
- package/getInterfaceManagementProfile.d.ts +6 -99
- package/getInterfaceManagementProfile.js +6 -60
- package/getInterfaceManagementProfile.js.map +1 -1
- package/getIpsecCryptoProfile.d.ts +0 -21
- package/getIpsecCryptoProfile.js.map +1 -1
- package/getIpsecTunnel.d.ts +0 -15
- package/getIpsecTunnel.js.map +1 -1
- package/getKerberosServerProfile.d.ts +0 -9
- package/getKerberosServerProfile.js.map +1 -1
- package/getLayer2Subinterface.d.ts +0 -12
- package/getLayer2Subinterface.js.map +1 -1
- package/getLayer3Subinterface.d.ts +0 -24
- package/getLayer3Subinterface.js.map +1 -1
- package/getLdapServerProfile.d.ts +0 -27
- package/getLdapServerProfile.js.map +1 -1
- package/getLinkTag.d.ts +0 -6
- package/getLinkTag.js.map +1 -1
- package/getLocalUser.d.ts +0 -15
- package/getLocalUser.js.map +1 -1
- package/getLocalUserGroup.d.ts +0 -9
- package/getLocalUserGroup.js.map +1 -1
- package/getLogForwardingProfile.d.ts +0 -9
- package/getLogForwardingProfile.js.map +1 -1
- package/getLogicalRouter.d.ts +0 -12
- package/getLogicalRouter.js.map +1 -1
- package/getLoopbackInterface.d.ts +0 -18
- package/getLoopbackInterface.js.map +1 -1
- package/getNatRule.d.ts +10 -50
- package/getNatRule.js +10 -50
- package/getNatRule.js.map +1 -1
- package/getOspfAuthProfile.d.ts +0 -15
- package/getOspfAuthProfile.js.map +1 -1
- package/getPbfRule.d.ts +8 -89
- package/getPbfRule.js +8 -62
- package/getPbfRule.js.map +1 -1
- package/getProfileGroup.d.ts +0 -27
- package/getProfileGroup.js.map +1 -1
- package/getQosPolicyRule.d.ts +4 -61
- package/getQosPolicyRule.js +4 -40
- package/getQosPolicyRule.js.map +1 -1
- package/getQosProfile.d.ts +0 -6
- package/getQosProfile.js.map +1 -1
- package/getRadiusServerProfile.d.ts +6 -54
- package/getRadiusServerProfile.js +6 -36
- package/getRadiusServerProfile.js.map +1 -1
- package/getRegion.d.ts +0 -9
- package/getRegion.js.map +1 -1
- package/getRouteAccessList.d.ts +0 -9
- package/getRouteAccessList.js.map +1 -1
- package/getRouteCommunityList.d.ts +0 -9
- package/getRouteCommunityList.js.map +1 -1
- package/getRoutePathAccessList.d.ts +0 -6
- package/getRoutePathAccessList.js.map +1 -1
- package/getRoutePrefixList.d.ts +1 -10
- package/getRoutePrefixList.js.map +1 -1
- package/getSamlServerProfile.d.ts +0 -27
- package/getSamlServerProfile.js.map +1 -1
- package/getScepProfile.d.ts +0 -36
- package/getScepProfile.js.map +1 -1
- package/getSchedule.d.ts +0 -9
- package/getSchedule.js.map +1 -1
- package/getSdwanErrorCorrectionProfile.d.ts +0 -9
- package/getSdwanErrorCorrectionProfile.js.map +1 -1
- package/getSdwanPathQualityProfile.d.ts +0 -9
- package/getSdwanPathQualityProfile.js.map +1 -1
- package/getSdwanRule.d.ts +0 -45
- package/getSdwanRule.js.map +1 -1
- package/getSdwanSaasQualityProfile.d.ts +0 -9
- package/getSdwanSaasQualityProfile.js.map +1 -1
- package/getSdwanTrafficDistributionProfile.d.ts +0 -12
- package/getSdwanTrafficDistributionProfile.js.map +1 -1
- package/getSecurityRule.d.ts +10 -74
- package/getSecurityRule.js +10 -74
- package/getSecurityRule.js.map +1 -1
- package/getService.d.ts +0 -12
- package/getService.js.map +1 -1
- package/getServiceConnection.d.ts +10 -156
- package/getServiceConnection.js +10 -156
- package/getServiceConnection.js.map +1 -1
- package/getServiceConnectionGroup.d.ts +4 -186
- package/getServiceConnectionGroup.js +4 -186
- package/getServiceConnectionGroup.js.map +1 -1
- package/getServiceGroup.d.ts +0 -12
- package/getServiceGroup.js.map +1 -1
- package/getSite.d.ts +30 -2
- package/getSite.js +24 -0
- package/getSite.js.map +1 -1
- package/getSiteList.d.ts +28 -0
- package/getSiteList.js +28 -0
- package/getSiteList.js.map +1 -1
- package/getSnippet.d.ts +12 -24
- package/getSnippet.js +12 -24
- package/getSnippet.js.map +1 -1
- package/getSyslogServerProfile.d.ts +0 -12
- package/getSyslogServerProfile.js.map +1 -1
- package/getTacacsServerProfile.d.ts +0 -18
- package/getTacacsServerProfile.js.map +1 -1
- package/getTag.d.ts +0 -6
- package/getTag.js.map +1 -1
- package/getTlsServiceProfile.d.ts +0 -9
- package/getTlsServiceProfile.js.map +1 -1
- package/getTunnelInterface.d.ts +0 -15
- package/getTunnelInterface.js.map +1 -1
- package/getUrlAccessProfile.d.ts +0 -30
- package/getUrlAccessProfile.js.map +1 -1
- package/getUrlCategory.d.ts +0 -12
- package/getUrlCategory.js.map +1 -1
- package/getVariable.d.ts +0 -15
- package/getVariable.js.map +1 -1
- package/getVlanInterface.d.ts +0 -21
- package/getVlanInterface.js.map +1 -1
- package/getVulnerabilityProtectionProfile.d.ts +0 -12
- package/getVulnerabilityProtectionProfile.js.map +1 -1
- package/getVulnerabilityProtectionSignature.d.ts +0 -27
- package/getVulnerabilityProtectionSignature.js.map +1 -1
- package/getWildfireAntiVirusProfile.d.ts +0 -18
- package/getWildfireAntiVirusProfile.js.map +1 -1
- package/getZone.d.ts +0 -27
- package/getZone.js.map +1 -1
- package/hipObject.d.ts +12 -0
- package/hipObject.js.map +1 -1
- package/hipProfile.d.ts +12 -0
- package/hipProfile.js.map +1 -1
- package/httpHeaderProfile.d.ts +12 -0
- package/httpHeaderProfile.js.map +1 -1
- package/httpServerProfile.d.ts +12 -0
- package/httpServerProfile.js.map +1 -1
- package/ikeCryptoProfile.d.ts +12 -0
- package/ikeCryptoProfile.js.map +1 -1
- package/ikeGateway.d.ts +12 -0
- package/ikeGateway.js.map +1 -1
- package/index.d.ts +27 -0
- package/index.js +47 -10
- package/index.js.map +1 -1
- package/interfaceManagementProfile.d.ts +12 -0
- package/interfaceManagementProfile.js.map +1 -1
- package/ipsecCryptoProfile.d.ts +24 -0
- package/ipsecCryptoProfile.js.map +1 -1
- package/ipsecTunnel.d.ts +12 -0
- package/ipsecTunnel.js.map +1 -1
- package/kerberosServerProfile.d.ts +12 -0
- package/kerberosServerProfile.js.map +1 -1
- package/layer2Subinterface.d.ts +12 -0
- package/layer2Subinterface.js.map +1 -1
- package/layer3Subinterface.d.ts +24 -0
- package/layer3Subinterface.js.map +1 -1
- package/ldapServerProfile.d.ts +12 -0
- package/ldapServerProfile.js.map +1 -1
- package/linkTag.d.ts +12 -0
- package/linkTag.js.map +1 -1
- package/localUser.d.ts +12 -0
- package/localUser.js.map +1 -1
- package/localUserGroup.d.ts +12 -0
- package/localUserGroup.js.map +1 -1
- package/logForwardingProfile.d.ts +12 -0
- package/logForwardingProfile.js.map +1 -1
- package/logicalRouter.d.ts +12 -0
- package/logicalRouter.js.map +1 -1
- package/loopbackInterface.d.ts +12 -0
- package/loopbackInterface.js.map +1 -1
- package/mfaServer.d.ts +12 -0
- package/mfaServer.js.map +1 -1
- package/ospfAuthProfile.d.ts +24 -0
- package/ospfAuthProfile.js.map +1 -1
- package/package.json +2 -2
- package/pbfRule.d.ts +12 -0
- package/pbfRule.js.map +1 -1
- package/profileGroup.d.ts +12 -0
- package/profileGroup.js.map +1 -1
- package/qosPolicyRule.d.ts +12 -0
- package/qosPolicyRule.js.map +1 -1
- package/qosProfile.d.ts +12 -0
- package/qosProfile.js.map +1 -1
- package/radiusServerProfile.d.ts +14 -2
- package/radiusServerProfile.js +2 -2
- package/radiusServerProfile.js.map +1 -1
- package/region.d.ts +12 -0
- package/region.js.map +1 -1
- package/remoteNetwork.d.ts +4 -4
- package/remoteNetwork.js +4 -4
- package/routeAccessList.d.ts +12 -0
- package/routeAccessList.js.map +1 -1
- package/routeCommunityList.d.ts +12 -0
- package/routeCommunityList.js.map +1 -1
- package/routePathAccessList.d.ts +12 -0
- package/routePathAccessList.js.map +1 -1
- package/routePrefixList.d.ts +49 -12
- package/routePrefixList.js +27 -2
- package/routePrefixList.js.map +1 -1
- package/samlServerProfile.d.ts +12 -0
- package/samlServerProfile.js.map +1 -1
- package/scepProfile.d.ts +12 -0
- package/scepProfile.js.map +1 -1
- package/schedule.d.ts +12 -0
- package/schedule.js.map +1 -1
- package/sdwanErrorCorrectionProfile.d.ts +12 -0
- package/sdwanErrorCorrectionProfile.js.map +1 -1
- package/sdwanPathQualityProfile.d.ts +12 -0
- package/sdwanPathQualityProfile.js.map +1 -1
- package/sdwanRule.d.ts +12 -0
- package/sdwanRule.js.map +1 -1
- package/sdwanSaasQualityProfile.d.ts +12 -0
- package/sdwanSaasQualityProfile.js.map +1 -1
- package/sdwanTrafficDistributionProfile.d.ts +12 -0
- package/sdwanTrafficDistributionProfile.js.map +1 -1
- package/securityRule.d.ts +26 -0
- package/securityRule.js +26 -0
- package/securityRule.js.map +1 -1
- package/service.d.ts +12 -0
- package/service.js.map +1 -1
- package/serviceGroup.d.ts +12 -0
- package/serviceGroup.js.map +1 -1
- package/site.d.ts +298 -0
- package/site.js +177 -0
- package/site.js.map +1 -0
- package/snippet.d.ts +1 -5
- package/snippet.js +1 -1
- package/snippet.js.map +1 -1
- package/syslogServerProfile.d.ts +12 -0
- package/syslogServerProfile.js.map +1 -1
- package/tacacsServerProfile.d.ts +12 -0
- package/tacacsServerProfile.js.map +1 -1
- package/tag.d.ts +12 -0
- package/tag.js.map +1 -1
- package/tlsServiceProfile.d.ts +12 -0
- package/tlsServiceProfile.js.map +1 -1
- package/tunnelInterface.d.ts +12 -0
- package/tunnelInterface.js.map +1 -1
- package/types/input.d.ts +1026 -148
- package/types/output.d.ts +3272 -647
- package/urlAccessProfile.d.ts +12 -0
- package/urlAccessProfile.js.map +1 -1
- package/urlCategory.d.ts +12 -0
- package/urlCategory.js.map +1 -1
- package/variable.d.ts +13 -5
- package/variable.js +1 -1
- package/variable.js.map +1 -1
- package/vlanInterface.d.ts +24 -0
- package/vlanInterface.js.map +1 -1
- package/vulnerabilityProtectionProfile.d.ts +12 -0
- package/vulnerabilityProtectionProfile.js.map +1 -1
- package/vulnerabilityProtectionSignature.d.ts +12 -0
- package/vulnerabilityProtectionSignature.js.map +1 -1
- package/wildfireAntiVirusProfile.d.ts +12 -0
- package/wildfireAntiVirusProfile.js.map +1 -1
- package/zone.d.ts +12 -0
- package/zone.js.map +1 -1
- package/zoneProtectionProfile.d.ts +18 -0
- package/zoneProtectionProfile.js.map +1 -1
|
@@ -9,88 +9,15 @@ import * as outputs from "./types/output";
|
|
|
9
9
|
* import * as pulumi from "@pulumi/pulumi";
|
|
10
10
|
* import * as scm from "@pulumi/scm";
|
|
11
11
|
*
|
|
12
|
-
* const config = new pulumi.Config();
|
|
13
|
-
* // The folder scope for the SCM resource (e.g., 'Shared', 'Predefined', or a specific folder name).
|
|
14
|
-
* const folderScope = config.get("folderScope") || "Service Connections";
|
|
15
|
-
* //# 1. Define the IKE Crypto Profile (IKE Phase 1)
|
|
16
|
-
* // Note: The resource name is plural: "scm_ike_crypto_profile"
|
|
17
|
-
* const example = new scm.IkeCryptoProfile("example", {
|
|
18
|
-
* name: "example-ike-crypto_data",
|
|
19
|
-
* folder: folderScope,
|
|
20
|
-
* hashes: ["sha256"],
|
|
21
|
-
* dhGroups: ["group14"],
|
|
22
|
-
* encryptions: ["aes-256-cbc"],
|
|
23
|
-
* });
|
|
24
|
-
* //# 2. Define the IPsec Crypto Profile (IKE Phase 2)
|
|
25
|
-
* // Note: The resource name is plural and nested blocks now use an equals sign (=).
|
|
26
|
-
* const exampleIpsecCryptoProfile = new scm.IpsecCryptoProfile("example", {
|
|
27
|
-
* name: "panw-IPSec-Crypto_data",
|
|
28
|
-
* folder: folderScope,
|
|
29
|
-
* esp: {
|
|
30
|
-
* encryptions: ["aes-256-gcm"],
|
|
31
|
-
* authentications: ["sha256"],
|
|
32
|
-
* },
|
|
33
|
-
* dhGroup: "group14",
|
|
34
|
-
* lifetime: {
|
|
35
|
-
* hours: 8,
|
|
36
|
-
* },
|
|
37
|
-
* });
|
|
38
|
-
* //# 3. Define the IKE Gateway
|
|
39
|
-
* // Note: The resource name is plural and nested blocks now use an equals sign (=).
|
|
40
|
-
* const exampleIkeGateway = new scm.IkeGateway("example", {
|
|
41
|
-
* name: "example-gateway_data",
|
|
42
|
-
* folder: folderScope,
|
|
43
|
-
* peerAddress: {
|
|
44
|
-
* ip: "1.1.1.1",
|
|
45
|
-
* },
|
|
46
|
-
* authentication: {
|
|
47
|
-
* preSharedKey: {
|
|
48
|
-
* key: "secret",
|
|
49
|
-
* },
|
|
50
|
-
* },
|
|
51
|
-
* protocol: {
|
|
52
|
-
* ikev1: {
|
|
53
|
-
* ikeCryptoProfile: example.name,
|
|
54
|
-
* },
|
|
55
|
-
* },
|
|
56
|
-
* });
|
|
57
|
-
* //# 4. Define the IPsec Tunnel
|
|
58
|
-
* // Note: Nested 'auto_key' block uses an equals sign (=).
|
|
59
|
-
* const exampleIpsecTunnel = new scm.IpsecTunnel("example", {
|
|
60
|
-
* name: "example-tunnel_data",
|
|
61
|
-
* folder: folderScope,
|
|
62
|
-
* tunnelInterface: "tunnel",
|
|
63
|
-
* antiReplay: true,
|
|
64
|
-
* copyTos: false,
|
|
65
|
-
* enableGreEncapsulation: false,
|
|
66
|
-
* autoKey: {
|
|
67
|
-
* ikeGateways: [{
|
|
68
|
-
* name: exampleIkeGateway.name,
|
|
69
|
-
* }],
|
|
70
|
-
* ipsecCryptoProfile: exampleIpsecCryptoProfile.name,
|
|
71
|
-
* },
|
|
72
|
-
* }, {
|
|
73
|
-
* dependsOn: [exampleIkeGateway],
|
|
74
|
-
* });
|
|
75
|
-
* const siteAVpnSc = new scm.ServiceConnection("site_a_vpn_sc", {
|
|
76
|
-
* name: "creating_a_service_connection_data",
|
|
77
|
-
* region: "us-west-1",
|
|
78
|
-
* ipsecTunnel: exampleIpsecTunnel.name,
|
|
79
|
-
* subnets: [
|
|
80
|
-
* "10.1.0.0/16",
|
|
81
|
-
* "172.16.0.0/24",
|
|
82
|
-
* ],
|
|
83
|
-
* sourceNat: true,
|
|
84
|
-
* });
|
|
85
12
|
* //------------------------------------------------------
|
|
86
13
|
* // Data Soruce
|
|
87
14
|
* //------------------------------------------------------
|
|
88
|
-
* const createdConnLookup = scm.
|
|
89
|
-
* id:
|
|
15
|
+
* const createdConnLookup = scm.getServiceConnection({
|
|
16
|
+
* id: "3d07bda7-2cfa-4fdc-b504-cd82847b2ec3",
|
|
90
17
|
* });
|
|
91
|
-
* export const createdServiceConnectionId = createdConnLookup.
|
|
92
|
-
* export const createdServiceConnectionRegion = createdConnLookup.
|
|
93
|
-
* export const createdServiceConnectionSubnets = createdConnLookup.
|
|
18
|
+
* export const createdServiceConnectionId = createdConnLookup.then(createdConnLookup => createdConnLookup.id);
|
|
19
|
+
* export const createdServiceConnectionRegion = createdConnLookup.then(createdConnLookup => createdConnLookup.region);
|
|
20
|
+
* export const createdServiceConnectionSubnets = createdConnLookup.then(createdConnLookup => createdConnLookup.subnets);
|
|
94
21
|
* ```
|
|
95
22
|
*/
|
|
96
23
|
export declare function getServiceConnection(args: GetServiceConnectionArgs, opts?: pulumi.InvokeOptions): Promise<GetServiceConnectionResult>;
|
|
@@ -184,88 +111,15 @@ export interface GetServiceConnectionResult {
|
|
|
184
111
|
* import * as pulumi from "@pulumi/pulumi";
|
|
185
112
|
* import * as scm from "@pulumi/scm";
|
|
186
113
|
*
|
|
187
|
-
* const config = new pulumi.Config();
|
|
188
|
-
* // The folder scope for the SCM resource (e.g., 'Shared', 'Predefined', or a specific folder name).
|
|
189
|
-
* const folderScope = config.get("folderScope") || "Service Connections";
|
|
190
|
-
* //# 1. Define the IKE Crypto Profile (IKE Phase 1)
|
|
191
|
-
* // Note: The resource name is plural: "scm_ike_crypto_profile"
|
|
192
|
-
* const example = new scm.IkeCryptoProfile("example", {
|
|
193
|
-
* name: "example-ike-crypto_data",
|
|
194
|
-
* folder: folderScope,
|
|
195
|
-
* hashes: ["sha256"],
|
|
196
|
-
* dhGroups: ["group14"],
|
|
197
|
-
* encryptions: ["aes-256-cbc"],
|
|
198
|
-
* });
|
|
199
|
-
* //# 2. Define the IPsec Crypto Profile (IKE Phase 2)
|
|
200
|
-
* // Note: The resource name is plural and nested blocks now use an equals sign (=).
|
|
201
|
-
* const exampleIpsecCryptoProfile = new scm.IpsecCryptoProfile("example", {
|
|
202
|
-
* name: "panw-IPSec-Crypto_data",
|
|
203
|
-
* folder: folderScope,
|
|
204
|
-
* esp: {
|
|
205
|
-
* encryptions: ["aes-256-gcm"],
|
|
206
|
-
* authentications: ["sha256"],
|
|
207
|
-
* },
|
|
208
|
-
* dhGroup: "group14",
|
|
209
|
-
* lifetime: {
|
|
210
|
-
* hours: 8,
|
|
211
|
-
* },
|
|
212
|
-
* });
|
|
213
|
-
* //# 3. Define the IKE Gateway
|
|
214
|
-
* // Note: The resource name is plural and nested blocks now use an equals sign (=).
|
|
215
|
-
* const exampleIkeGateway = new scm.IkeGateway("example", {
|
|
216
|
-
* name: "example-gateway_data",
|
|
217
|
-
* folder: folderScope,
|
|
218
|
-
* peerAddress: {
|
|
219
|
-
* ip: "1.1.1.1",
|
|
220
|
-
* },
|
|
221
|
-
* authentication: {
|
|
222
|
-
* preSharedKey: {
|
|
223
|
-
* key: "secret",
|
|
224
|
-
* },
|
|
225
|
-
* },
|
|
226
|
-
* protocol: {
|
|
227
|
-
* ikev1: {
|
|
228
|
-
* ikeCryptoProfile: example.name,
|
|
229
|
-
* },
|
|
230
|
-
* },
|
|
231
|
-
* });
|
|
232
|
-
* //# 4. Define the IPsec Tunnel
|
|
233
|
-
* // Note: Nested 'auto_key' block uses an equals sign (=).
|
|
234
|
-
* const exampleIpsecTunnel = new scm.IpsecTunnel("example", {
|
|
235
|
-
* name: "example-tunnel_data",
|
|
236
|
-
* folder: folderScope,
|
|
237
|
-
* tunnelInterface: "tunnel",
|
|
238
|
-
* antiReplay: true,
|
|
239
|
-
* copyTos: false,
|
|
240
|
-
* enableGreEncapsulation: false,
|
|
241
|
-
* autoKey: {
|
|
242
|
-
* ikeGateways: [{
|
|
243
|
-
* name: exampleIkeGateway.name,
|
|
244
|
-
* }],
|
|
245
|
-
* ipsecCryptoProfile: exampleIpsecCryptoProfile.name,
|
|
246
|
-
* },
|
|
247
|
-
* }, {
|
|
248
|
-
* dependsOn: [exampleIkeGateway],
|
|
249
|
-
* });
|
|
250
|
-
* const siteAVpnSc = new scm.ServiceConnection("site_a_vpn_sc", {
|
|
251
|
-
* name: "creating_a_service_connection_data",
|
|
252
|
-
* region: "us-west-1",
|
|
253
|
-
* ipsecTunnel: exampleIpsecTunnel.name,
|
|
254
|
-
* subnets: [
|
|
255
|
-
* "10.1.0.0/16",
|
|
256
|
-
* "172.16.0.0/24",
|
|
257
|
-
* ],
|
|
258
|
-
* sourceNat: true,
|
|
259
|
-
* });
|
|
260
114
|
* //------------------------------------------------------
|
|
261
115
|
* // Data Soruce
|
|
262
116
|
* //------------------------------------------------------
|
|
263
|
-
* const createdConnLookup = scm.
|
|
264
|
-
* id:
|
|
117
|
+
* const createdConnLookup = scm.getServiceConnection({
|
|
118
|
+
* id: "3d07bda7-2cfa-4fdc-b504-cd82847b2ec3",
|
|
265
119
|
* });
|
|
266
|
-
* export const createdServiceConnectionId = createdConnLookup.
|
|
267
|
-
* export const createdServiceConnectionRegion = createdConnLookup.
|
|
268
|
-
* export const createdServiceConnectionSubnets = createdConnLookup.
|
|
120
|
+
* export const createdServiceConnectionId = createdConnLookup.then(createdConnLookup => createdConnLookup.id);
|
|
121
|
+
* export const createdServiceConnectionRegion = createdConnLookup.then(createdConnLookup => createdConnLookup.region);
|
|
122
|
+
* export const createdServiceConnectionSubnets = createdConnLookup.then(createdConnLookup => createdConnLookup.subnets);
|
|
269
123
|
* ```
|
|
270
124
|
*/
|
|
271
125
|
export declare function getServiceConnectionOutput(args: GetServiceConnectionOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output<GetServiceConnectionResult>;
|
package/getServiceConnection.js
CHANGED
|
@@ -14,88 +14,15 @@ const utilities = require("./utilities");
|
|
|
14
14
|
* import * as pulumi from "@pulumi/pulumi";
|
|
15
15
|
* import * as scm from "@pulumi/scm";
|
|
16
16
|
*
|
|
17
|
-
* const config = new pulumi.Config();
|
|
18
|
-
* // The folder scope for the SCM resource (e.g., 'Shared', 'Predefined', or a specific folder name).
|
|
19
|
-
* const folderScope = config.get("folderScope") || "Service Connections";
|
|
20
|
-
* //# 1. Define the IKE Crypto Profile (IKE Phase 1)
|
|
21
|
-
* // Note: The resource name is plural: "scm_ike_crypto_profile"
|
|
22
|
-
* const example = new scm.IkeCryptoProfile("example", {
|
|
23
|
-
* name: "example-ike-crypto_data",
|
|
24
|
-
* folder: folderScope,
|
|
25
|
-
* hashes: ["sha256"],
|
|
26
|
-
* dhGroups: ["group14"],
|
|
27
|
-
* encryptions: ["aes-256-cbc"],
|
|
28
|
-
* });
|
|
29
|
-
* //# 2. Define the IPsec Crypto Profile (IKE Phase 2)
|
|
30
|
-
* // Note: The resource name is plural and nested blocks now use an equals sign (=).
|
|
31
|
-
* const exampleIpsecCryptoProfile = new scm.IpsecCryptoProfile("example", {
|
|
32
|
-
* name: "panw-IPSec-Crypto_data",
|
|
33
|
-
* folder: folderScope,
|
|
34
|
-
* esp: {
|
|
35
|
-
* encryptions: ["aes-256-gcm"],
|
|
36
|
-
* authentications: ["sha256"],
|
|
37
|
-
* },
|
|
38
|
-
* dhGroup: "group14",
|
|
39
|
-
* lifetime: {
|
|
40
|
-
* hours: 8,
|
|
41
|
-
* },
|
|
42
|
-
* });
|
|
43
|
-
* //# 3. Define the IKE Gateway
|
|
44
|
-
* // Note: The resource name is plural and nested blocks now use an equals sign (=).
|
|
45
|
-
* const exampleIkeGateway = new scm.IkeGateway("example", {
|
|
46
|
-
* name: "example-gateway_data",
|
|
47
|
-
* folder: folderScope,
|
|
48
|
-
* peerAddress: {
|
|
49
|
-
* ip: "1.1.1.1",
|
|
50
|
-
* },
|
|
51
|
-
* authentication: {
|
|
52
|
-
* preSharedKey: {
|
|
53
|
-
* key: "secret",
|
|
54
|
-
* },
|
|
55
|
-
* },
|
|
56
|
-
* protocol: {
|
|
57
|
-
* ikev1: {
|
|
58
|
-
* ikeCryptoProfile: example.name,
|
|
59
|
-
* },
|
|
60
|
-
* },
|
|
61
|
-
* });
|
|
62
|
-
* //# 4. Define the IPsec Tunnel
|
|
63
|
-
* // Note: Nested 'auto_key' block uses an equals sign (=).
|
|
64
|
-
* const exampleIpsecTunnel = new scm.IpsecTunnel("example", {
|
|
65
|
-
* name: "example-tunnel_data",
|
|
66
|
-
* folder: folderScope,
|
|
67
|
-
* tunnelInterface: "tunnel",
|
|
68
|
-
* antiReplay: true,
|
|
69
|
-
* copyTos: false,
|
|
70
|
-
* enableGreEncapsulation: false,
|
|
71
|
-
* autoKey: {
|
|
72
|
-
* ikeGateways: [{
|
|
73
|
-
* name: exampleIkeGateway.name,
|
|
74
|
-
* }],
|
|
75
|
-
* ipsecCryptoProfile: exampleIpsecCryptoProfile.name,
|
|
76
|
-
* },
|
|
77
|
-
* }, {
|
|
78
|
-
* dependsOn: [exampleIkeGateway],
|
|
79
|
-
* });
|
|
80
|
-
* const siteAVpnSc = new scm.ServiceConnection("site_a_vpn_sc", {
|
|
81
|
-
* name: "creating_a_service_connection_data",
|
|
82
|
-
* region: "us-west-1",
|
|
83
|
-
* ipsecTunnel: exampleIpsecTunnel.name,
|
|
84
|
-
* subnets: [
|
|
85
|
-
* "10.1.0.0/16",
|
|
86
|
-
* "172.16.0.0/24",
|
|
87
|
-
* ],
|
|
88
|
-
* sourceNat: true,
|
|
89
|
-
* });
|
|
90
17
|
* //------------------------------------------------------
|
|
91
18
|
* // Data Soruce
|
|
92
19
|
* //------------------------------------------------------
|
|
93
|
-
* const createdConnLookup = scm.
|
|
94
|
-
* id:
|
|
20
|
+
* const createdConnLookup = scm.getServiceConnection({
|
|
21
|
+
* id: "3d07bda7-2cfa-4fdc-b504-cd82847b2ec3",
|
|
95
22
|
* });
|
|
96
|
-
* export const createdServiceConnectionId = createdConnLookup.
|
|
97
|
-
* export const createdServiceConnectionRegion = createdConnLookup.
|
|
98
|
-
* export const createdServiceConnectionSubnets = createdConnLookup.
|
|
23
|
+
* export const createdServiceConnectionId = createdConnLookup.then(createdConnLookup => createdConnLookup.id);
|
|
24
|
+
* export const createdServiceConnectionRegion = createdConnLookup.then(createdConnLookup => createdConnLookup.region);
|
|
25
|
+
* export const createdServiceConnectionSubnets = createdConnLookup.then(createdConnLookup => createdConnLookup.subnets);
|
|
99
26
|
* ```
|
|
100
27
|
*/
|
|
101
28
|
function getServiceConnection(args, opts) {
|
|
@@ -115,88 +42,15 @@ exports.getServiceConnection = getServiceConnection;
|
|
|
115
42
|
* import * as pulumi from "@pulumi/pulumi";
|
|
116
43
|
* import * as scm from "@pulumi/scm";
|
|
117
44
|
*
|
|
118
|
-
* const config = new pulumi.Config();
|
|
119
|
-
* // The folder scope for the SCM resource (e.g., 'Shared', 'Predefined', or a specific folder name).
|
|
120
|
-
* const folderScope = config.get("folderScope") || "Service Connections";
|
|
121
|
-
* //# 1. Define the IKE Crypto Profile (IKE Phase 1)
|
|
122
|
-
* // Note: The resource name is plural: "scm_ike_crypto_profile"
|
|
123
|
-
* const example = new scm.IkeCryptoProfile("example", {
|
|
124
|
-
* name: "example-ike-crypto_data",
|
|
125
|
-
* folder: folderScope,
|
|
126
|
-
* hashes: ["sha256"],
|
|
127
|
-
* dhGroups: ["group14"],
|
|
128
|
-
* encryptions: ["aes-256-cbc"],
|
|
129
|
-
* });
|
|
130
|
-
* //# 2. Define the IPsec Crypto Profile (IKE Phase 2)
|
|
131
|
-
* // Note: The resource name is plural and nested blocks now use an equals sign (=).
|
|
132
|
-
* const exampleIpsecCryptoProfile = new scm.IpsecCryptoProfile("example", {
|
|
133
|
-
* name: "panw-IPSec-Crypto_data",
|
|
134
|
-
* folder: folderScope,
|
|
135
|
-
* esp: {
|
|
136
|
-
* encryptions: ["aes-256-gcm"],
|
|
137
|
-
* authentications: ["sha256"],
|
|
138
|
-
* },
|
|
139
|
-
* dhGroup: "group14",
|
|
140
|
-
* lifetime: {
|
|
141
|
-
* hours: 8,
|
|
142
|
-
* },
|
|
143
|
-
* });
|
|
144
|
-
* //# 3. Define the IKE Gateway
|
|
145
|
-
* // Note: The resource name is plural and nested blocks now use an equals sign (=).
|
|
146
|
-
* const exampleIkeGateway = new scm.IkeGateway("example", {
|
|
147
|
-
* name: "example-gateway_data",
|
|
148
|
-
* folder: folderScope,
|
|
149
|
-
* peerAddress: {
|
|
150
|
-
* ip: "1.1.1.1",
|
|
151
|
-
* },
|
|
152
|
-
* authentication: {
|
|
153
|
-
* preSharedKey: {
|
|
154
|
-
* key: "secret",
|
|
155
|
-
* },
|
|
156
|
-
* },
|
|
157
|
-
* protocol: {
|
|
158
|
-
* ikev1: {
|
|
159
|
-
* ikeCryptoProfile: example.name,
|
|
160
|
-
* },
|
|
161
|
-
* },
|
|
162
|
-
* });
|
|
163
|
-
* //# 4. Define the IPsec Tunnel
|
|
164
|
-
* // Note: Nested 'auto_key' block uses an equals sign (=).
|
|
165
|
-
* const exampleIpsecTunnel = new scm.IpsecTunnel("example", {
|
|
166
|
-
* name: "example-tunnel_data",
|
|
167
|
-
* folder: folderScope,
|
|
168
|
-
* tunnelInterface: "tunnel",
|
|
169
|
-
* antiReplay: true,
|
|
170
|
-
* copyTos: false,
|
|
171
|
-
* enableGreEncapsulation: false,
|
|
172
|
-
* autoKey: {
|
|
173
|
-
* ikeGateways: [{
|
|
174
|
-
* name: exampleIkeGateway.name,
|
|
175
|
-
* }],
|
|
176
|
-
* ipsecCryptoProfile: exampleIpsecCryptoProfile.name,
|
|
177
|
-
* },
|
|
178
|
-
* }, {
|
|
179
|
-
* dependsOn: [exampleIkeGateway],
|
|
180
|
-
* });
|
|
181
|
-
* const siteAVpnSc = new scm.ServiceConnection("site_a_vpn_sc", {
|
|
182
|
-
* name: "creating_a_service_connection_data",
|
|
183
|
-
* region: "us-west-1",
|
|
184
|
-
* ipsecTunnel: exampleIpsecTunnel.name,
|
|
185
|
-
* subnets: [
|
|
186
|
-
* "10.1.0.0/16",
|
|
187
|
-
* "172.16.0.0/24",
|
|
188
|
-
* ],
|
|
189
|
-
* sourceNat: true,
|
|
190
|
-
* });
|
|
191
45
|
* //------------------------------------------------------
|
|
192
46
|
* // Data Soruce
|
|
193
47
|
* //------------------------------------------------------
|
|
194
|
-
* const createdConnLookup = scm.
|
|
195
|
-
* id:
|
|
48
|
+
* const createdConnLookup = scm.getServiceConnection({
|
|
49
|
+
* id: "3d07bda7-2cfa-4fdc-b504-cd82847b2ec3",
|
|
196
50
|
* });
|
|
197
|
-
* export const createdServiceConnectionId = createdConnLookup.
|
|
198
|
-
* export const createdServiceConnectionRegion = createdConnLookup.
|
|
199
|
-
* export const createdServiceConnectionSubnets = createdConnLookup.
|
|
51
|
+
* export const createdServiceConnectionId = createdConnLookup.then(createdConnLookup => createdConnLookup.id);
|
|
52
|
+
* export const createdServiceConnectionRegion = createdConnLookup.then(createdConnLookup => createdConnLookup.region);
|
|
53
|
+
* export const createdServiceConnectionSubnets = createdConnLookup.then(createdConnLookup => createdConnLookup.subnets);
|
|
200
54
|
* ```
|
|
201
55
|
*/
|
|
202
56
|
function getServiceConnectionOutput(args, opts) {
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getServiceConnection.js","sourceRoot":"","sources":["../getServiceConnection.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"getServiceConnection.js","sourceRoot":"","sources":["../getServiceConnection.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;GAmBG;AACH,SAAgB,oBAAoB,CAAC,IAA8B,EAAE,IAA2B;IAC5F,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,qDAAqD,EAAE;QAChF,IAAI,EAAE,IAAI,CAAC,EAAE;QACb,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAND,oDAMC;AAkFD;;;;;;;;;;;;;;;;;;;GAmBG;AACH,SAAgB,0BAA0B,CAAC,IAAoC,EAAE,IAAiC;IAC9G,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,YAAY,CAAC,qDAAqD,EAAE;QACtF,IAAI,EAAE,IAAI,CAAC,EAAE;QACb,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAND,gEAMC"}
|
|
@@ -8,102 +8,11 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
8
8
|
* import * as pulumi from "@pulumi/pulumi";
|
|
9
9
|
* import * as scm from "@pulumi/scm";
|
|
10
10
|
*
|
|
11
|
-
* const config = new pulumi.Config();
|
|
12
|
-
* // The folder scope for the SCM resource (e.g., 'Shared', 'Predefined', or a specific folder name).
|
|
13
|
-
* const folderScope = config.get("folderScope") || "Service Connections";
|
|
14
|
-
* //# 1. IKE Crypto Profile (IKE Phase 1)
|
|
15
|
-
* const example = new scm.IkeCryptoProfile("example", {
|
|
16
|
-
* name: "example-ike-crypto_sc_grp",
|
|
17
|
-
* folder: folderScope,
|
|
18
|
-
* hashes: ["sha256"],
|
|
19
|
-
* dhGroups: ["group14"],
|
|
20
|
-
* encryptions: ["aes-256-cbc"],
|
|
21
|
-
* });
|
|
22
|
-
* //# 2. IPsec Crypto Profile (IKE Phase 2)
|
|
23
|
-
* const exampleIpsecCryptoProfile = new scm.IpsecCryptoProfile("example", {
|
|
24
|
-
* name: "panw-IPSec-Crypto_sc_grp",
|
|
25
|
-
* folder: folderScope,
|
|
26
|
-
* esp: {
|
|
27
|
-
* encryptions: ["aes-256-gcm"],
|
|
28
|
-
* authentications: ["sha256"],
|
|
29
|
-
* },
|
|
30
|
-
* dhGroup: "group14",
|
|
31
|
-
* lifetime: {
|
|
32
|
-
* hours: 8,
|
|
33
|
-
* },
|
|
34
|
-
* });
|
|
35
|
-
* //# 3. IKE Gateway
|
|
36
|
-
* const exampleIkeGateway = new scm.IkeGateway("example", {
|
|
37
|
-
* name: "example-gateway_sc_grp",
|
|
38
|
-
* folder: folderScope,
|
|
39
|
-
* peerAddress: {
|
|
40
|
-
* ip: "1.1.1.1",
|
|
41
|
-
* },
|
|
42
|
-
* authentication: {
|
|
43
|
-
* preSharedKey: {
|
|
44
|
-
* key: "secret",
|
|
45
|
-
* },
|
|
46
|
-
* },
|
|
47
|
-
* protocol: {
|
|
48
|
-
* ikev1: {
|
|
49
|
-
* ikeCryptoProfile: example.name,
|
|
50
|
-
* },
|
|
51
|
-
* },
|
|
52
|
-
* });
|
|
53
|
-
* //# 4. IPsec Tunnel
|
|
54
|
-
* const exampleIpsecTunnel = new scm.IpsecTunnel("example", {
|
|
55
|
-
* name: "example-tunnel_sc_grp",
|
|
56
|
-
* folder: folderScope,
|
|
57
|
-
* tunnelInterface: "tunnel",
|
|
58
|
-
* antiReplay: true,
|
|
59
|
-
* copyTos: false,
|
|
60
|
-
* enableGreEncapsulation: false,
|
|
61
|
-
* autoKey: {
|
|
62
|
-
* ikeGateways: [{
|
|
63
|
-
* name: exampleIkeGateway.name,
|
|
64
|
-
* }],
|
|
65
|
-
* ipsecCryptoProfile: exampleIpsecCryptoProfile.name,
|
|
66
|
-
* },
|
|
67
|
-
* }, {
|
|
68
|
-
* dependsOn: [exampleIkeGateway],
|
|
69
|
-
* });
|
|
70
|
-
* //# 5. Service Connection (The target for the group)
|
|
71
|
-
* const siteAVpnSc = new scm.ServiceConnection("site_a_vpn_sc", {
|
|
72
|
-
* name: "creating_a_service_connection_sc_grp",
|
|
73
|
-
* region: "us-west-1a",
|
|
74
|
-
* ipsecTunnel: exampleIpsecTunnel.name,
|
|
75
|
-
* subnets: [
|
|
76
|
-
* "10.1.0.0/16",
|
|
77
|
-
* "172.16.0.0/24",
|
|
78
|
-
* ],
|
|
79
|
-
* sourceNat: false,
|
|
80
|
-
* });
|
|
81
|
-
* //# 5. Service Connection (The target for the group)
|
|
82
|
-
* const siteAVpnSc2 = new scm.ServiceConnection("site_a_vpn_sc_2", {
|
|
83
|
-
* name: "creating_a_service_connection_sc_grp_2",
|
|
84
|
-
* region: "us-west-1a",
|
|
85
|
-
* ipsecTunnel: exampleIpsecTunnel.name,
|
|
86
|
-
* subnets: [
|
|
87
|
-
* "10.1.0.0/16",
|
|
88
|
-
* "172.16.0.0/24",
|
|
89
|
-
* ],
|
|
90
|
-
* sourceNat: false,
|
|
91
|
-
* });
|
|
92
|
-
* //# 6. Service Connection Group (Groups the Service Connection created above)
|
|
93
|
-
* const exampleGroup = new scm.ServiceConnectionGroup("example_group", {
|
|
94
|
-
* name: "service-connection-group-app_sc_grp",
|
|
95
|
-
* targets: [
|
|
96
|
-
* siteAVpnSc.name,
|
|
97
|
-
* siteAVpnSc2.name,
|
|
98
|
-
* ],
|
|
99
|
-
* disableSnat: false,
|
|
100
|
-
* pbfOnly: true,
|
|
101
|
-
* });
|
|
102
11
|
* // ------------------------------------------------------------------
|
|
103
12
|
* // Data Source: SCM Service Connection Group (Single Lookup)
|
|
104
13
|
* // ------------------------------------------------------------------
|
|
105
|
-
* const groupLookup = scm.
|
|
106
|
-
* id:
|
|
14
|
+
* const groupLookup = scm.getServiceConnectionGroup({
|
|
15
|
+
* id: "1480fd9d-dae7-4bf3-94f6-4945e89b59b6",
|
|
107
16
|
* });
|
|
108
17
|
* export const lookedUpServiceConnectionGroupDetails = groupLookup;
|
|
109
18
|
* ```
|
|
@@ -157,102 +66,11 @@ export interface GetServiceConnectionGroupResult {
|
|
|
157
66
|
* import * as pulumi from "@pulumi/pulumi";
|
|
158
67
|
* import * as scm from "@pulumi/scm";
|
|
159
68
|
*
|
|
160
|
-
* const config = new pulumi.Config();
|
|
161
|
-
* // The folder scope for the SCM resource (e.g., 'Shared', 'Predefined', or a specific folder name).
|
|
162
|
-
* const folderScope = config.get("folderScope") || "Service Connections";
|
|
163
|
-
* //# 1. IKE Crypto Profile (IKE Phase 1)
|
|
164
|
-
* const example = new scm.IkeCryptoProfile("example", {
|
|
165
|
-
* name: "example-ike-crypto_sc_grp",
|
|
166
|
-
* folder: folderScope,
|
|
167
|
-
* hashes: ["sha256"],
|
|
168
|
-
* dhGroups: ["group14"],
|
|
169
|
-
* encryptions: ["aes-256-cbc"],
|
|
170
|
-
* });
|
|
171
|
-
* //# 2. IPsec Crypto Profile (IKE Phase 2)
|
|
172
|
-
* const exampleIpsecCryptoProfile = new scm.IpsecCryptoProfile("example", {
|
|
173
|
-
* name: "panw-IPSec-Crypto_sc_grp",
|
|
174
|
-
* folder: folderScope,
|
|
175
|
-
* esp: {
|
|
176
|
-
* encryptions: ["aes-256-gcm"],
|
|
177
|
-
* authentications: ["sha256"],
|
|
178
|
-
* },
|
|
179
|
-
* dhGroup: "group14",
|
|
180
|
-
* lifetime: {
|
|
181
|
-
* hours: 8,
|
|
182
|
-
* },
|
|
183
|
-
* });
|
|
184
|
-
* //# 3. IKE Gateway
|
|
185
|
-
* const exampleIkeGateway = new scm.IkeGateway("example", {
|
|
186
|
-
* name: "example-gateway_sc_grp",
|
|
187
|
-
* folder: folderScope,
|
|
188
|
-
* peerAddress: {
|
|
189
|
-
* ip: "1.1.1.1",
|
|
190
|
-
* },
|
|
191
|
-
* authentication: {
|
|
192
|
-
* preSharedKey: {
|
|
193
|
-
* key: "secret",
|
|
194
|
-
* },
|
|
195
|
-
* },
|
|
196
|
-
* protocol: {
|
|
197
|
-
* ikev1: {
|
|
198
|
-
* ikeCryptoProfile: example.name,
|
|
199
|
-
* },
|
|
200
|
-
* },
|
|
201
|
-
* });
|
|
202
|
-
* //# 4. IPsec Tunnel
|
|
203
|
-
* const exampleIpsecTunnel = new scm.IpsecTunnel("example", {
|
|
204
|
-
* name: "example-tunnel_sc_grp",
|
|
205
|
-
* folder: folderScope,
|
|
206
|
-
* tunnelInterface: "tunnel",
|
|
207
|
-
* antiReplay: true,
|
|
208
|
-
* copyTos: false,
|
|
209
|
-
* enableGreEncapsulation: false,
|
|
210
|
-
* autoKey: {
|
|
211
|
-
* ikeGateways: [{
|
|
212
|
-
* name: exampleIkeGateway.name,
|
|
213
|
-
* }],
|
|
214
|
-
* ipsecCryptoProfile: exampleIpsecCryptoProfile.name,
|
|
215
|
-
* },
|
|
216
|
-
* }, {
|
|
217
|
-
* dependsOn: [exampleIkeGateway],
|
|
218
|
-
* });
|
|
219
|
-
* //# 5. Service Connection (The target for the group)
|
|
220
|
-
* const siteAVpnSc = new scm.ServiceConnection("site_a_vpn_sc", {
|
|
221
|
-
* name: "creating_a_service_connection_sc_grp",
|
|
222
|
-
* region: "us-west-1a",
|
|
223
|
-
* ipsecTunnel: exampleIpsecTunnel.name,
|
|
224
|
-
* subnets: [
|
|
225
|
-
* "10.1.0.0/16",
|
|
226
|
-
* "172.16.0.0/24",
|
|
227
|
-
* ],
|
|
228
|
-
* sourceNat: false,
|
|
229
|
-
* });
|
|
230
|
-
* //# 5. Service Connection (The target for the group)
|
|
231
|
-
* const siteAVpnSc2 = new scm.ServiceConnection("site_a_vpn_sc_2", {
|
|
232
|
-
* name: "creating_a_service_connection_sc_grp_2",
|
|
233
|
-
* region: "us-west-1a",
|
|
234
|
-
* ipsecTunnel: exampleIpsecTunnel.name,
|
|
235
|
-
* subnets: [
|
|
236
|
-
* "10.1.0.0/16",
|
|
237
|
-
* "172.16.0.0/24",
|
|
238
|
-
* ],
|
|
239
|
-
* sourceNat: false,
|
|
240
|
-
* });
|
|
241
|
-
* //# 6. Service Connection Group (Groups the Service Connection created above)
|
|
242
|
-
* const exampleGroup = new scm.ServiceConnectionGroup("example_group", {
|
|
243
|
-
* name: "service-connection-group-app_sc_grp",
|
|
244
|
-
* targets: [
|
|
245
|
-
* siteAVpnSc.name,
|
|
246
|
-
* siteAVpnSc2.name,
|
|
247
|
-
* ],
|
|
248
|
-
* disableSnat: false,
|
|
249
|
-
* pbfOnly: true,
|
|
250
|
-
* });
|
|
251
69
|
* // ------------------------------------------------------------------
|
|
252
70
|
* // Data Source: SCM Service Connection Group (Single Lookup)
|
|
253
71
|
* // ------------------------------------------------------------------
|
|
254
|
-
* const groupLookup = scm.
|
|
255
|
-
* id:
|
|
72
|
+
* const groupLookup = scm.getServiceConnectionGroup({
|
|
73
|
+
* id: "1480fd9d-dae7-4bf3-94f6-4945e89b59b6",
|
|
256
74
|
* });
|
|
257
75
|
* export const lookedUpServiceConnectionGroupDetails = groupLookup;
|
|
258
76
|
* ```
|