@pulumi/scm 1.0.0 → 1.0.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/address.d.ts +39 -3
- package/address.js +3 -3
- package/address.js.map +1 -1
- package/addressGroup.d.ts +26 -2
- package/addressGroup.js +2 -2
- package/addressGroup.js.map +1 -1
- package/aggregateInterface.d.ts +258 -0
- package/aggregateInterface.js +163 -0
- package/aggregateInterface.js.map +1 -0
- package/antiSpywareProfile.d.ts +57 -0
- package/antiSpywareProfile.js +45 -0
- package/antiSpywareProfile.js.map +1 -1
- package/antiSpywareSignature.d.ts +49 -3
- package/antiSpywareSignature.js +34 -0
- package/antiSpywareSignature.js.map +1 -1
- package/appOverrideRule.d.ts +140 -3
- package/appOverrideRule.js +95 -0
- package/appOverrideRule.js.map +1 -1
- package/application.d.ts +81 -0
- package/application.js +69 -0
- package/application.js.map +1 -1
- package/applicationFilter.d.ts +28 -0
- package/applicationFilter.js +16 -0
- package/applicationFilter.js.map +1 -1
- package/applicationGroup.d.ts +12 -0
- package/applicationGroup.js.map +1 -1
- package/authenticationPortal.d.ts +191 -0
- package/authenticationPortal.js +93 -0
- package/authenticationPortal.js.map +1 -0
- package/authenticationProfile.d.ts +66 -9
- package/authenticationProfile.js +45 -0
- package/authenticationProfile.js.map +1 -1
- package/authenticationRule.d.ts +135 -0
- package/authenticationRule.js +103 -0
- package/authenticationRule.js.map +1 -1
- package/authenticationSequence.d.ts +35 -0
- package/authenticationSequence.js +23 -0
- package/authenticationSequence.js.map +1 -1
- package/autoVpnCluster.d.ts +176 -0
- package/autoVpnCluster.js +115 -0
- package/autoVpnCluster.js.map +1 -0
- package/autoVpnSetting.d.ts +95 -0
- package/autoVpnSetting.js +80 -0
- package/autoVpnSetting.js.map +1 -0
- package/bgpAddressFamilyProfile.d.ts +38 -3
- package/bgpAddressFamilyProfile.js +23 -0
- package/bgpAddressFamilyProfile.js.map +1 -1
- package/bgpAuthProfile.d.ts +25 -0
- package/bgpAuthProfile.js +13 -0
- package/bgpAuthProfile.js.map +1 -1
- package/bgpFilteringProfile.d.ts +46 -0
- package/bgpFilteringProfile.js +34 -0
- package/bgpFilteringProfile.js.map +1 -1
- package/bgpRedistributionProfile.d.ts +39 -0
- package/bgpRedistributionProfile.js +27 -0
- package/bgpRedistributionProfile.js.map +1 -1
- package/bgpRouteMap.d.ts +65 -0
- package/bgpRouteMap.js +53 -0
- package/bgpRouteMap.js.map +1 -1
- package/bgpRouteMapRedistribution.d.ts +36 -6
- package/bgpRouteMapRedistribution.js.map +1 -1
- package/bgpRouting.d.ts +133 -0
- package/bgpRouting.js +82 -0
- package/bgpRouting.js.map +1 -0
- package/certificateProfile.d.ts +41 -0
- package/certificateProfile.js +29 -0
- package/certificateProfile.js.map +1 -1
- package/decryptionExclusion.d.ts +12 -0
- package/decryptionExclusion.js.map +1 -1
- package/decryptionProfile.d.ts +151 -0
- package/decryptionProfile.js +139 -0
- package/decryptionProfile.js.map +1 -1
- package/decryptionRule.d.ts +177 -0
- package/decryptionRule.js +145 -0
- package/decryptionRule.js.map +1 -1
- package/dhcpInterface.d.ts +24 -0
- package/dhcpInterface.js.map +1 -1
- package/dnsProxy.d.ts +18 -6
- package/dnsProxy.js.map +1 -1
- package/dnsSecurityProfile.d.ts +138 -0
- package/dnsSecurityProfile.js +126 -0
- package/dnsSecurityProfile.js.map +1 -1
- package/dosProtectionProfile.d.ts +12 -0
- package/dosProtectionProfile.js.map +1 -1
- package/dosProtectionRule.d.ts +12 -0
- package/dosProtectionRule.js.map +1 -1
- package/dynamicUserGroup.d.ts +15 -3
- package/dynamicUserGroup.js +3 -3
- package/dynamicUserGroup.js.map +1 -1
- package/ethernetInterface.d.ts +204 -11
- package/ethernetInterface.js +147 -0
- package/ethernetInterface.js.map +1 -1
- package/externalDynamicList.d.ts +92 -0
- package/externalDynamicList.js +80 -0
- package/externalDynamicList.js.map +1 -1
- package/fileBlockingProfile.d.ts +86 -0
- package/fileBlockingProfile.js +74 -0
- package/fileBlockingProfile.js.map +1 -1
- package/folder.d.ts +60 -0
- package/folder.js +60 -0
- package/folder.js.map +1 -1
- package/getAddress.d.ts +0 -21
- package/getAddress.js.map +1 -1
- package/getAddressGroup.d.ts +0 -15
- package/getAddressGroup.js.map +1 -1
- package/getAddressGroupList.d.ts +4 -4
- package/getAddressGroupList.js +4 -4
- package/getAddressList.d.ts +4 -4
- package/getAddressList.js +4 -4
- package/getAggregateInterface.d.ts +104 -0
- package/getAggregateInterface.js +68 -0
- package/getAggregateInterface.js.map +1 -0
- package/getAggregateInterfaceList.d.ts +136 -0
- package/getAggregateInterfaceList.js +66 -0
- package/getAggregateInterfaceList.js.map +1 -0
- package/getAntiSpywareProfile.d.ts +0 -21
- package/getAntiSpywareProfile.js.map +1 -1
- package/getAntiSpywareProfileList.d.ts +2 -2
- package/getAntiSpywareProfileList.js +2 -2
- package/getAntiSpywareSignature.d.ts +41 -28
- package/getAntiSpywareSignature.js +40 -0
- package/getAntiSpywareSignature.js.map +1 -1
- package/getAntiSpywareSignatureList.d.ts +2 -2
- package/getAntiSpywareSignatureList.js +2 -2
- package/getAppOverrideRule.d.ts +28 -37
- package/getAppOverrideRule.js +24 -0
- package/getAppOverrideRule.js.map +1 -1
- package/getAppOverrideRuleList.d.ts +48 -2
- package/getAppOverrideRuleList.js +36 -2
- package/getAppOverrideRuleList.js.map +1 -1
- package/getApplication.d.ts +0 -66
- package/getApplication.js.map +1 -1
- package/getApplicationFilter.d.ts +0 -57
- package/getApplicationFilter.js.map +1 -1
- package/getApplicationGroup.d.ts +0 -9
- package/getApplicationGroup.js.map +1 -1
- package/getApplicationGroupList.d.ts +4 -4
- package/getApplicationGroupList.js +4 -4
- package/getApplicationList.d.ts +2 -2
- package/getApplicationList.js +2 -2
- package/getAuthenticationProfile.d.ts +27 -25
- package/getAuthenticationProfile.js +26 -0
- package/getAuthenticationProfile.js.map +1 -1
- package/getAuthenticationProfileList.d.ts +32 -0
- package/getAuthenticationProfileList.js +32 -0
- package/getAuthenticationProfileList.js.map +1 -1
- package/getAuthenticationRule.d.ts +29 -51
- package/getAuthenticationRule.js +26 -0
- package/getAuthenticationRule.js.map +1 -1
- package/getAuthenticationRuleList.d.ts +50 -2
- package/getAuthenticationRuleList.js +38 -2
- package/getAuthenticationRuleList.js.map +1 -1
- package/getAuthenticationSequence.d.ts +26 -9
- package/getAuthenticationSequence.js +26 -0
- package/getAuthenticationSequence.js.map +1 -1
- package/getAuthenticationSequenceList.d.ts +32 -0
- package/getAuthenticationSequenceList.js +32 -0
- package/getAuthenticationSequenceList.js.map +1 -1
- package/getAutoVpnCluster.d.ts +112 -0
- package/getAutoVpnCluster.js +68 -0
- package/getAutoVpnCluster.js.map +1 -0
- package/{getAggregateEthernetInterfaceList.d.ts → getAutoVpnClusterList.d.ts} +35 -9
- package/getAutoVpnClusterList.js +66 -0
- package/getAutoVpnClusterList.js.map +1 -0
- package/getAutoVpnSetting.d.ts +52 -0
- package/getAutoVpnSetting.js +44 -0
- package/getAutoVpnSetting.js.map +1 -0
- package/getBgpAddressFamilyProfile.d.ts +36 -9
- package/getBgpAddressFamilyProfile.js +36 -0
- package/getBgpAddressFamilyProfile.js.map +1 -1
- package/getBgpAuthProfile.d.ts +36 -12
- package/getBgpAuthProfile.js +36 -0
- package/getBgpAuthProfile.js.map +1 -1
- package/getBgpAuthProfileList.d.ts +26 -0
- package/getBgpAuthProfileList.js +26 -0
- package/getBgpAuthProfileList.js.map +1 -1
- package/getBgpFilteringProfile.d.ts +0 -9
- package/getBgpFilteringProfile.js.map +1 -1
- package/getBgpRedistributionProfile.d.ts +36 -9
- package/getBgpRedistributionProfile.js +36 -0
- package/getBgpRedistributionProfile.js.map +1 -1
- package/getBgpRedistributionProfileList.d.ts +26 -0
- package/getBgpRedistributionProfileList.js +26 -0
- package/getBgpRedistributionProfileList.js.map +1 -1
- package/getBgpRouteMap.d.ts +36 -9
- package/getBgpRouteMap.js +36 -0
- package/getBgpRouteMap.js.map +1 -1
- package/getBgpRouteMapList.d.ts +26 -0
- package/getBgpRouteMapList.js +26 -0
- package/getBgpRouteMapList.js.map +1 -1
- package/getBgpRouteMapRedistribution.d.ts +6 -24
- package/getBgpRouteMapRedistribution.js.map +1 -1
- package/getBgpRouting.d.ts +64 -0
- package/getBgpRouting.js +44 -0
- package/getBgpRouting.js.map +1 -0
- package/getCertificateProfile.d.ts +0 -21
- package/getCertificateProfile.js.map +1 -1
- package/getCertificateProfileList.d.ts +2 -2
- package/getCertificateProfileList.js +2 -2
- package/getDecryptionExclusion.d.ts +0 -6
- package/getDecryptionExclusion.js.map +1 -1
- package/getDecryptionProfile.d.ts +40 -18
- package/getDecryptionProfile.js +40 -0
- package/getDecryptionProfile.js.map +1 -1
- package/getDecryptionProfileList.d.ts +32 -0
- package/getDecryptionProfileList.js +32 -0
- package/getDecryptionProfileList.js.map +1 -1
- package/getDecryptionRule.d.ts +29 -51
- package/getDecryptionRule.js +26 -0
- package/getDecryptionRule.js.map +1 -1
- package/getDecryptionRuleList.d.ts +48 -2
- package/getDecryptionRuleList.js +36 -2
- package/getDecryptionRuleList.js.map +1 -1
- package/getDhcpInterface.d.ts +0 -12
- package/getDhcpInterface.js.map +1 -1
- package/getDnsProxy.d.ts +0 -24
- package/getDnsProxy.js.map +1 -1
- package/getDnsSecurityProfile.d.ts +40 -6
- package/getDnsSecurityProfile.js +40 -0
- package/getDnsSecurityProfile.js.map +1 -1
- package/getDnsSecurityProfileList.d.ts +32 -0
- package/getDnsSecurityProfileList.js +32 -0
- package/getDnsSecurityProfileList.js.map +1 -1
- package/getDosProtectionProfile.d.ts +0 -15
- package/getDosProtectionProfile.js.map +1 -1
- package/getDosProtectionRule.d.ts +0 -39
- package/getDosProtectionRule.js.map +1 -1
- package/getDynamicUserGroup.d.ts +0 -12
- package/getDynamicUserGroup.js.map +1 -1
- package/getDynamicUserGroupList.d.ts +4 -4
- package/getDynamicUserGroupList.js +4 -4
- package/getEthernetInterface.d.ts +40 -37
- package/getEthernetInterface.js +38 -0
- package/getEthernetInterface.js.map +1 -1
- package/getEthernetInterfaceList.d.ts +26 -0
- package/getEthernetInterfaceList.js +26 -0
- package/getEthernetInterfaceList.js.map +1 -1
- package/getExternalDynamicList.d.ts +0 -12
- package/getExternalDynamicList.js.map +1 -1
- package/getExternalDynamicListList.d.ts +4 -4
- package/getExternalDynamicListList.js +4 -4
- package/getFileBlockingProfile.d.ts +40 -9
- package/getFileBlockingProfile.js +40 -0
- package/getFileBlockingProfile.js.map +1 -1
- package/getFileBlockingProfileList.d.ts +32 -0
- package/getFileBlockingProfileList.js +32 -0
- package/getFileBlockingProfileList.js.map +1 -1
- package/getFolder.d.ts +36 -0
- package/getFolder.js +36 -0
- package/getFolder.js.map +1 -1
- package/getHipObject.d.ts +0 -27
- package/getHipObject.js.map +1 -1
- package/getHipObjectList.d.ts +4 -4
- package/getHipObjectList.js +4 -4
- package/getHipProfile.d.ts +0 -9
- package/getHipProfile.js.map +1 -1
- package/getHipProfileList.d.ts +4 -4
- package/getHipProfileList.js +4 -4
- package/getHttpHeaderProfile.d.ts +0 -9
- package/getHttpHeaderProfile.js.map +1 -1
- package/getHttpServerProfile.d.ts +0 -15
- package/getHttpServerProfile.js.map +1 -1
- package/getIkeCryptoProfile.d.ts +0 -18
- package/getIkeCryptoProfile.js.map +1 -1
- package/getIkeGateway.d.ts +0 -27
- package/getIkeGateway.js.map +1 -1
- package/getInterfaceManagementProfile.d.ts +29 -41
- package/getInterfaceManagementProfile.js +26 -0
- package/getInterfaceManagementProfile.js.map +1 -1
- package/getInterfaceManagementProfileList.d.ts +42 -0
- package/getInterfaceManagementProfileList.js +42 -0
- package/getInterfaceManagementProfileList.js.map +1 -1
- package/getIpsecCryptoProfile.d.ts +0 -21
- package/getIpsecCryptoProfile.js.map +1 -1
- package/getIpsecTunnel.d.ts +0 -15
- package/getIpsecTunnel.js.map +1 -1
- package/getKerberosServerProfile.d.ts +0 -9
- package/getKerberosServerProfile.js.map +1 -1
- package/getLayer2Subinterface.d.ts +41 -13
- package/getLayer2Subinterface.js +40 -0
- package/getLayer2Subinterface.js.map +1 -1
- package/getLayer2SubinterfaceList.d.ts +26 -0
- package/getLayer2SubinterfaceList.js +26 -0
- package/getLayer2SubinterfaceList.js.map +1 -1
- package/getLayer3Subinterface.d.ts +43 -25
- package/getLayer3Subinterface.js +42 -0
- package/getLayer3Subinterface.js.map +1 -1
- package/getLayer3SubinterfaceList.d.ts +26 -0
- package/getLayer3SubinterfaceList.js +26 -0
- package/getLayer3SubinterfaceList.js.map +1 -1
- package/getLdapServerProfile.d.ts +0 -27
- package/getLdapServerProfile.js.map +1 -1
- package/getLinkTag.d.ts +0 -6
- package/getLinkTag.js.map +1 -1
- package/getLocalUser.d.ts +0 -15
- package/getLocalUser.js.map +1 -1
- package/getLocalUserGroup.d.ts +0 -9
- package/getLocalUserGroup.js.map +1 -1
- package/getLogForwardingProfile.d.ts +0 -9
- package/getLogForwardingProfile.js.map +1 -1
- package/getLogicalRouter.d.ts +38 -12
- package/getLogicalRouter.js +38 -0
- package/getLogicalRouter.js.map +1 -1
- package/getLogicalRouterList.d.ts +40 -0
- package/getLogicalRouterList.js +30 -0
- package/getLogicalRouterList.js.map +1 -1
- package/getLoopbackInterface.d.ts +45 -21
- package/getLoopbackInterface.js +38 -0
- package/getLoopbackInterface.js.map +1 -1
- package/getLoopbackInterfaceList.d.ts +26 -0
- package/getLoopbackInterfaceList.js +26 -0
- package/getLoopbackInterfaceList.js.map +1 -1
- package/getNatRule.d.ts +46 -14
- package/getNatRule.js +36 -0
- package/getNatRule.js.map +1 -1
- package/getNatRuleList.d.ts +52 -2
- package/getNatRuleList.js +40 -2
- package/getNatRuleList.js.map +1 -1
- package/getOspfAuthProfile.d.ts +0 -15
- package/getOspfAuthProfile.js.map +1 -1
- package/getPbfRule.d.ts +34 -27
- package/getPbfRule.js +34 -0
- package/getPbfRule.js.map +1 -1
- package/getPbfRuleList.d.ts +34 -0
- package/getPbfRuleList.js +34 -0
- package/getPbfRuleList.js.map +1 -1
- package/getProfileGroup.d.ts +0 -27
- package/getProfileGroup.js.map +1 -1
- package/getQosPolicyRule.d.ts +27 -12
- package/getQosPolicyRule.js +24 -0
- package/getQosPolicyRule.js.map +1 -1
- package/getQosPolicyRuleList.d.ts +48 -2
- package/getQosPolicyRuleList.js +36 -2
- package/getQosPolicyRuleList.js.map +1 -1
- package/getQosProfile.d.ts +0 -6
- package/getQosProfile.js.map +1 -1
- package/getRadiusServerProfile.d.ts +24 -18
- package/getRadiusServerProfile.js +24 -0
- package/getRadiusServerProfile.js.map +1 -1
- package/getRegion.d.ts +0 -9
- package/getRegion.js.map +1 -1
- package/getRouteAccessList.d.ts +0 -9
- package/getRouteAccessList.js.map +1 -1
- package/getRouteCommunityList.d.ts +0 -9
- package/getRouteCommunityList.js.map +1 -1
- package/getRoutePathAccessList.d.ts +0 -6
- package/getRoutePathAccessList.js.map +1 -1
- package/getRoutePrefixList.d.ts +1 -10
- package/getRoutePrefixList.js.map +1 -1
- package/getSamlServerProfile.d.ts +0 -27
- package/getSamlServerProfile.js.map +1 -1
- package/getScepProfile.d.ts +0 -36
- package/getScepProfile.js.map +1 -1
- package/getSchedule.d.ts +0 -9
- package/getSchedule.js.map +1 -1
- package/getSdwanErrorCorrectionProfile.d.ts +0 -9
- package/getSdwanErrorCorrectionProfile.js.map +1 -1
- package/getSdwanPathQualityProfile.d.ts +0 -9
- package/getSdwanPathQualityProfile.js.map +1 -1
- package/getSdwanRule.d.ts +0 -45
- package/getSdwanRule.js.map +1 -1
- package/getSdwanSaasQualityProfile.d.ts +0 -9
- package/getSdwanSaasQualityProfile.js.map +1 -1
- package/getSdwanTrafficDistributionProfile.d.ts +0 -12
- package/getSdwanTrafficDistributionProfile.js.map +1 -1
- package/getSecurityRule.d.ts +42 -0
- package/getSecurityRule.js +30 -0
- package/getSecurityRule.js.map +1 -1
- package/getSecurityRuleList.d.ts +46 -2
- package/getSecurityRuleList.js +34 -2
- package/getSecurityRuleList.js.map +1 -1
- package/getService.d.ts +0 -12
- package/getService.js.map +1 -1
- package/getServiceConnection.d.ts +31 -1
- package/getServiceConnection.js +30 -0
- package/getServiceConnection.js.map +1 -1
- package/getServiceConnectionGroup.d.ts +26 -0
- package/getServiceConnectionGroup.js +26 -0
- package/getServiceConnectionGroup.js.map +1 -1
- package/getServiceGroup.d.ts +0 -12
- package/getServiceGroup.js.map +1 -1
- package/getServiceGroupList.d.ts +2 -2
- package/getServiceGroupList.js +2 -2
- package/getServiceList.d.ts +4 -4
- package/getServiceList.js +4 -4
- package/getSite.d.ts +30 -2
- package/getSite.js +24 -0
- package/getSite.js.map +1 -1
- package/getSiteList.d.ts +28 -0
- package/getSiteList.js +28 -0
- package/getSiteList.js.map +1 -1
- package/getSnippet.d.ts +36 -0
- package/getSnippet.js +36 -0
- package/getSnippet.js.map +1 -1
- package/getSnippetList.d.ts +24 -0
- package/getSnippetList.js +24 -0
- package/getSnippetList.js.map +1 -1
- package/getSyslogServerProfile.d.ts +0 -12
- package/getSyslogServerProfile.js.map +1 -1
- package/getTacacsServerProfile.d.ts +0 -18
- package/getTacacsServerProfile.js.map +1 -1
- package/getTag.d.ts +0 -6
- package/getTag.js.map +1 -1
- package/getTagList.d.ts +2 -2
- package/getTagList.js +2 -2
- package/getTlsServiceProfile.d.ts +0 -9
- package/getTlsServiceProfile.js.map +1 -1
- package/getTunnelInterface.d.ts +41 -18
- package/getTunnelInterface.js +38 -0
- package/getTunnelInterface.js.map +1 -1
- package/getTunnelInterfaceList.d.ts +26 -0
- package/getTunnelInterfaceList.js +26 -0
- package/getTunnelInterfaceList.js.map +1 -1
- package/getUrlAccessProfile.d.ts +0 -30
- package/getUrlAccessProfile.js.map +1 -1
- package/getUrlAccessProfileList.d.ts +2 -2
- package/getUrlAccessProfileList.js +2 -2
- package/getUrlCategory.d.ts +0 -12
- package/getUrlCategory.js.map +1 -1
- package/getUrlCategoryList.d.ts +4 -4
- package/getUrlCategoryList.js +4 -4
- package/getVariable.d.ts +0 -15
- package/getVariable.js.map +1 -1
- package/getVlanInterface.d.ts +43 -24
- package/getVlanInterface.js +40 -0
- package/getVlanInterface.js.map +1 -1
- package/getVlanInterfaceList.d.ts +26 -0
- package/getVlanInterfaceList.js +26 -0
- package/getVlanInterfaceList.js.map +1 -1
- package/getVulnerabilityProtectionProfile.d.ts +0 -12
- package/getVulnerabilityProtectionProfile.js.map +1 -1
- package/getVulnerabilityProtectionProfileList.d.ts +2 -2
- package/getVulnerabilityProtectionProfileList.js +2 -2
- package/getVulnerabilityProtectionSignature.d.ts +41 -28
- package/getVulnerabilityProtectionSignature.js +40 -0
- package/getVulnerabilityProtectionSignature.js.map +1 -1
- package/getVulnerabilityProtectionSignatureList.d.ts +32 -0
- package/getVulnerabilityProtectionSignatureList.js +32 -0
- package/getVulnerabilityProtectionSignatureList.js.map +1 -1
- package/getWildfireAntiVirusProfile.d.ts +0 -18
- package/getWildfireAntiVirusProfile.js.map +1 -1
- package/getZone.d.ts +44 -27
- package/getZone.js +44 -0
- package/getZone.js.map +1 -1
- package/getZoneList.d.ts +26 -0
- package/getZoneList.js +26 -0
- package/getZoneList.js.map +1 -1
- package/hipObject.d.ts +168 -0
- package/hipObject.js +156 -0
- package/hipObject.js.map +1 -1
- package/hipProfile.d.ts +12 -0
- package/hipProfile.js.map +1 -1
- package/httpHeaderProfile.d.ts +12 -0
- package/httpHeaderProfile.js.map +1 -1
- package/httpServerProfile.d.ts +12 -0
- package/httpServerProfile.js.map +1 -1
- package/ikeCryptoProfile.d.ts +12 -0
- package/ikeCryptoProfile.js.map +1 -1
- package/ikeGateway.d.ts +61 -0
- package/ikeGateway.js +49 -0
- package/ikeGateway.js.map +1 -1
- package/index.d.ts +36 -9
- package/index.js +58 -21
- package/index.js.map +1 -1
- package/interfaceManagementProfile.d.ts +68 -24
- package/interfaceManagementProfile.js +30 -0
- package/interfaceManagementProfile.js.map +1 -1
- package/ipsecCryptoProfile.d.ts +52 -0
- package/ipsecCryptoProfile.js +28 -0
- package/ipsecCryptoProfile.js.map +1 -1
- package/ipsecTunnel.d.ts +78 -0
- package/ipsecTunnel.js +66 -0
- package/ipsecTunnel.js.map +1 -1
- package/kerberosServerProfile.d.ts +12 -0
- package/kerberosServerProfile.js.map +1 -1
- package/layer2Subinterface.d.ts +48 -7
- package/layer2Subinterface.js +32 -0
- package/layer2Subinterface.js.map +1 -1
- package/layer3Subinterface.d.ts +94 -11
- package/layer3Subinterface.js +59 -0
- package/layer3Subinterface.js.map +1 -1
- package/ldapServerProfile.d.ts +12 -0
- package/ldapServerProfile.js.map +1 -1
- package/linkTag.d.ts +12 -0
- package/linkTag.js.map +1 -1
- package/localUser.d.ts +12 -0
- package/localUser.js.map +1 -1
- package/localUserGroup.d.ts +12 -0
- package/localUserGroup.js.map +1 -1
- package/logForwardingProfile.d.ts +12 -0
- package/logForwardingProfile.js.map +1 -1
- package/logicalRouter.d.ts +162 -0
- package/logicalRouter.js +150 -0
- package/logicalRouter.js.map +1 -1
- package/loopbackInterface.d.ts +70 -15
- package/loopbackInterface.js +35 -2
- package/loopbackInterface.js.map +1 -1
- package/mfaServer.d.ts +12 -0
- package/mfaServer.js.map +1 -1
- package/natRule.d.ts +135 -42
- package/natRule.js +121 -8
- package/natRule.js.map +1 -1
- package/ospfAuthProfile.d.ts +24 -0
- package/ospfAuthProfile.js.map +1 -1
- package/package.json +2 -2
- package/pbfRule.d.ts +101 -0
- package/pbfRule.js +89 -0
- package/pbfRule.js.map +1 -1
- package/profileGroup.d.ts +12 -0
- package/profileGroup.js.map +1 -1
- package/qosPolicyRule.d.ts +107 -0
- package/qosPolicyRule.js +75 -0
- package/qosPolicyRule.js.map +1 -1
- package/qosProfile.d.ts +12 -0
- package/qosProfile.js.map +1 -1
- package/radiusServerProfile.d.ts +50 -0
- package/radiusServerProfile.js +38 -0
- package/radiusServerProfile.js.map +1 -1
- package/region.d.ts +12 -0
- package/region.js.map +1 -1
- package/remoteNetwork.d.ts +81 -0
- package/remoteNetwork.js +81 -0
- package/remoteNetwork.js.map +1 -1
- package/routeAccessList.d.ts +12 -0
- package/routeAccessList.js.map +1 -1
- package/routeCommunityList.d.ts +12 -0
- package/routeCommunityList.js.map +1 -1
- package/routePathAccessList.d.ts +12 -0
- package/routePathAccessList.js.map +1 -1
- package/routePrefixList.d.ts +49 -12
- package/routePrefixList.js +27 -2
- package/routePrefixList.js.map +1 -1
- package/samlServerProfile.d.ts +12 -0
- package/samlServerProfile.js.map +1 -1
- package/scepProfile.d.ts +12 -0
- package/scepProfile.js.map +1 -1
- package/schedule.d.ts +12 -0
- package/schedule.js.map +1 -1
- package/sdwanErrorCorrectionProfile.d.ts +12 -0
- package/sdwanErrorCorrectionProfile.js.map +1 -1
- package/sdwanPathQualityProfile.d.ts +12 -0
- package/sdwanPathQualityProfile.js.map +1 -1
- package/sdwanRule.d.ts +12 -0
- package/sdwanRule.js.map +1 -1
- package/sdwanSaasQualityProfile.d.ts +12 -0
- package/sdwanSaasQualityProfile.js.map +1 -1
- package/sdwanTrafficDistributionProfile.d.ts +16 -4
- package/sdwanTrafficDistributionProfile.js.map +1 -1
- package/securityRule.d.ts +207 -0
- package/securityRule.js +187 -0
- package/securityRule.js.map +1 -1
- package/service.d.ts +12 -0
- package/service.js.map +1 -1
- package/serviceConnection.d.ts +82 -3
- package/serviceConnection.js +81 -2
- package/serviceConnection.js.map +1 -1
- package/serviceConnectionGroup.d.ts +100 -0
- package/serviceConnectionGroup.js +100 -0
- package/serviceConnectionGroup.js.map +1 -1
- package/serviceGroup.d.ts +14 -2
- package/serviceGroup.js +2 -2
- package/serviceGroup.js.map +1 -1
- package/site.d.ts +298 -0
- package/site.js +177 -0
- package/site.js.map +1 -0
- package/snippet.d.ts +24 -5
- package/snippet.js +24 -1
- package/snippet.js.map +1 -1
- package/syslogServerProfile.d.ts +12 -0
- package/syslogServerProfile.js.map +1 -1
- package/tacacsServerProfile.d.ts +12 -0
- package/tacacsServerProfile.js.map +1 -1
- package/tag.d.ts +15 -3
- package/tag.js +3 -3
- package/tag.js.map +1 -1
- package/tlsServiceProfile.d.ts +12 -0
- package/tlsServiceProfile.js.map +1 -1
- package/tunnelInterface.d.ts +54 -12
- package/tunnelInterface.js +32 -2
- package/tunnelInterface.js.map +1 -1
- package/types/input.d.ts +1621 -471
- package/types/output.d.ts +5592 -2091
- package/urlAccessProfile.d.ts +12 -0
- package/urlAccessProfile.js.map +1 -1
- package/urlCategory.d.ts +12 -0
- package/urlCategory.js.map +1 -1
- package/variable.d.ts +13 -5
- package/variable.js +1 -1
- package/variable.js.map +1 -1
- package/vlanInterface.d.ts +64 -20
- package/vlanInterface.js +20 -0
- package/vlanInterface.js.map +1 -1
- package/vulnerabilityProtectionProfile.d.ts +263 -0
- package/vulnerabilityProtectionProfile.js +251 -0
- package/vulnerabilityProtectionProfile.js.map +1 -1
- package/vulnerabilityProtectionSignature.d.ts +214 -10
- package/vulnerabilityProtectionSignature.js +204 -0
- package/vulnerabilityProtectionSignature.js.map +1 -1
- package/wildfireAntiVirusProfile.d.ts +12 -0
- package/wildfireAntiVirusProfile.js.map +1 -1
- package/zone.d.ts +83 -0
- package/zone.js +71 -0
- package/zone.js.map +1 -1
- package/zoneProtectionProfile.d.ts +18 -0
- package/zoneProtectionProfile.js.map +1 -1
- package/aggregateEthernetInterface.d.ts +0 -139
- package/aggregateEthernetInterface.js +0 -68
- package/aggregateEthernetInterface.js.map +0 -1
- package/getAggregateEthernetInterface.d.ts +0 -78
- package/getAggregateEthernetInterface.js +0 -30
- package/getAggregateEthernetInterface.js.map +0 -1
- package/getAggregateEthernetInterfaceList.js +0 -40
- package/getAggregateEthernetInterfaceList.js.map +0 -1
|
@@ -26,10 +26,12 @@ export declare class SdwanTrafficDistributionProfile extends pulumi.CustomResour
|
|
|
26
26
|
readonly device: pulumi.Output<string | undefined>;
|
|
27
27
|
/**
|
|
28
28
|
* The folder in which the resource is defined
|
|
29
|
+
*
|
|
30
|
+
* > ℹ️ **Note:** You must specify exactly one of `device`, `folder`, and `snippet`.
|
|
29
31
|
*/
|
|
30
32
|
readonly folder: pulumi.Output<string | undefined>;
|
|
31
33
|
/**
|
|
32
|
-
* Link tags
|
|
34
|
+
* Link-Tags for interfaces identified by defined tags
|
|
33
35
|
*/
|
|
34
36
|
readonly linkTags: pulumi.Output<outputs.SdwanTrafficDistributionProfileLinkTag[] | undefined>;
|
|
35
37
|
/**
|
|
@@ -38,13 +40,15 @@ export declare class SdwanTrafficDistributionProfile extends pulumi.CustomResour
|
|
|
38
40
|
readonly name: pulumi.Output<string>;
|
|
39
41
|
/**
|
|
40
42
|
* The snippet in which the resource is defined
|
|
43
|
+
*
|
|
44
|
+
* > ℹ️ **Note:** You must specify exactly one of `device`, `folder`, and `snippet`.
|
|
41
45
|
*/
|
|
42
46
|
readonly snippet: pulumi.Output<string | undefined>;
|
|
43
47
|
readonly tfid: pulumi.Output<string>;
|
|
44
48
|
/**
|
|
45
49
|
* Traffic distribution
|
|
46
50
|
*/
|
|
47
|
-
readonly trafficDistribution: pulumi.Output<string
|
|
51
|
+
readonly trafficDistribution: pulumi.Output<string>;
|
|
48
52
|
/**
|
|
49
53
|
* Create a SdwanTrafficDistributionProfile resource with the given unique name, arguments, and options.
|
|
50
54
|
*
|
|
@@ -64,10 +68,12 @@ export interface SdwanTrafficDistributionProfileState {
|
|
|
64
68
|
device?: pulumi.Input<string>;
|
|
65
69
|
/**
|
|
66
70
|
* The folder in which the resource is defined
|
|
71
|
+
*
|
|
72
|
+
* > ℹ️ **Note:** You must specify exactly one of `device`, `folder`, and `snippet`.
|
|
67
73
|
*/
|
|
68
74
|
folder?: pulumi.Input<string>;
|
|
69
75
|
/**
|
|
70
|
-
* Link tags
|
|
76
|
+
* Link-Tags for interfaces identified by defined tags
|
|
71
77
|
*/
|
|
72
78
|
linkTags?: pulumi.Input<pulumi.Input<inputs.SdwanTrafficDistributionProfileLinkTag>[]>;
|
|
73
79
|
/**
|
|
@@ -76,6 +82,8 @@ export interface SdwanTrafficDistributionProfileState {
|
|
|
76
82
|
name?: pulumi.Input<string>;
|
|
77
83
|
/**
|
|
78
84
|
* The snippet in which the resource is defined
|
|
85
|
+
*
|
|
86
|
+
* > ℹ️ **Note:** You must specify exactly one of `device`, `folder`, and `snippet`.
|
|
79
87
|
*/
|
|
80
88
|
snippet?: pulumi.Input<string>;
|
|
81
89
|
tfid?: pulumi.Input<string>;
|
|
@@ -94,10 +102,12 @@ export interface SdwanTrafficDistributionProfileArgs {
|
|
|
94
102
|
device?: pulumi.Input<string>;
|
|
95
103
|
/**
|
|
96
104
|
* The folder in which the resource is defined
|
|
105
|
+
*
|
|
106
|
+
* > ℹ️ **Note:** You must specify exactly one of `device`, `folder`, and `snippet`.
|
|
97
107
|
*/
|
|
98
108
|
folder?: pulumi.Input<string>;
|
|
99
109
|
/**
|
|
100
|
-
* Link tags
|
|
110
|
+
* Link-Tags for interfaces identified by defined tags
|
|
101
111
|
*/
|
|
102
112
|
linkTags?: pulumi.Input<pulumi.Input<inputs.SdwanTrafficDistributionProfileLinkTag>[]>;
|
|
103
113
|
/**
|
|
@@ -106,6 +116,8 @@ export interface SdwanTrafficDistributionProfileArgs {
|
|
|
106
116
|
name?: pulumi.Input<string>;
|
|
107
117
|
/**
|
|
108
118
|
* The snippet in which the resource is defined
|
|
119
|
+
*
|
|
120
|
+
* > ℹ️ **Note:** You must specify exactly one of `device`, `folder`, and `snippet`.
|
|
109
121
|
*/
|
|
110
122
|
snippet?: pulumi.Input<string>;
|
|
111
123
|
/**
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"sdwanTrafficDistributionProfile.js","sourceRoot":"","sources":["../sdwanTrafficDistributionProfile.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;GAEG;AACH,MAAa,+BAAgC,SAAQ,MAAM,CAAC,cAAc;IACtE;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA4C,EAAE,IAAmC;QAC1I,OAAO,IAAI,+BAA+B,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACtF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,+BAA+B,CAAC,YAAY,CAAC;IAChF,CAAC;
|
|
1
|
+
{"version":3,"file":"sdwanTrafficDistributionProfile.js","sourceRoot":"","sources":["../sdwanTrafficDistributionProfile.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;GAEG;AACH,MAAa,+BAAgC,SAAQ,MAAM,CAAC,cAAc;IACtE;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA4C,EAAE,IAAmC;QAC1I,OAAO,IAAI,+BAA+B,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACtF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,+BAA+B,CAAC,YAAY,CAAC;IAChF,CAAC;IAwCD,YAAY,IAAY,EAAE,WAAwF,EAAE,IAAmC;QACnJ,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA+D,CAAC;YAC9E,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;YACzC,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;YACzC,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,qBAAqB,CAAC,GAAG,KAAK,EAAE,mBAAmB,CAAC;SACtE;aAAM;YACH,MAAM,IAAI,GAAG,WAA8D,CAAC;YAC5E,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,qBAAqB,CAAC,GAAG,IAAI,EAAE,mBAAmB,CAAC;YAClE,cAAc,CAAC,MAAM,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAC9C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,+BAA+B,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACpF,CAAC;;AA1FL,0EA2FC;AA7EG,gBAAgB;AACO,4CAAY,GAAG,2EAA2E,CAAC"}
|
package/securityRule.d.ts
CHANGED
|
@@ -5,6 +5,189 @@ import * as outputs from "./types/output";
|
|
|
5
5
|
* SecurityRule resource
|
|
6
6
|
*
|
|
7
7
|
* ## Example Usage
|
|
8
|
+
*
|
|
9
|
+
* ```typescript
|
|
10
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
11
|
+
* import * as scm from "@pulumi/scm";
|
|
12
|
+
*
|
|
13
|
+
* // First, create the tag objects that you will reference.
|
|
14
|
+
* const outboundTag = new scm.Tag("outbound_tag", {
|
|
15
|
+
* folder: "All",
|
|
16
|
+
* name: "outbound143",
|
|
17
|
+
* color: "Red",
|
|
18
|
+
* });
|
|
19
|
+
* const webTag = new scm.Tag("web_tag", {
|
|
20
|
+
* folder: "All",
|
|
21
|
+
* name: "web143",
|
|
22
|
+
* color: "Blue",
|
|
23
|
+
* });
|
|
24
|
+
* // --- Existing Rules (Backward Compatibility) ---
|
|
25
|
+
* const standardWebAccess = new scm.SecurityRule("standard_web_access", {
|
|
26
|
+
* folder: "All",
|
|
27
|
+
* name: "Allow Standard Web Access143",
|
|
28
|
+
* description: "Allow outbound web traffic to any destination...",
|
|
29
|
+
* position: "pre",
|
|
30
|
+
* action: "allow",
|
|
31
|
+
* categories: ["any"],
|
|
32
|
+
* applications: [
|
|
33
|
+
* "web-browsing",
|
|
34
|
+
* "ssl",
|
|
35
|
+
* ],
|
|
36
|
+
* services: [
|
|
37
|
+
* "service-http",
|
|
38
|
+
* "service-https",
|
|
39
|
+
* ],
|
|
40
|
+
* froms: [
|
|
41
|
+
* "untrust",
|
|
42
|
+
* "trust",
|
|
43
|
+
* ],
|
|
44
|
+
* tos: ["trust"],
|
|
45
|
+
* sources: ["any"],
|
|
46
|
+
* destinations: ["any"],
|
|
47
|
+
* negateSource: false,
|
|
48
|
+
* negateDestination: false,
|
|
49
|
+
* sourceUsers: ["any"],
|
|
50
|
+
* sourceHips: ["any"],
|
|
51
|
+
* destinationHips: ["any"],
|
|
52
|
+
* logStart: true,
|
|
53
|
+
* logEnd: true,
|
|
54
|
+
* disabled: false,
|
|
55
|
+
* tags: [
|
|
56
|
+
* outboundTag.name,
|
|
57
|
+
* webTag.name,
|
|
58
|
+
* ],
|
|
59
|
+
* });
|
|
60
|
+
* const blockRiskySaas = new scm.SecurityRule("block_risky_saas", {
|
|
61
|
+
* folder: "All",
|
|
62
|
+
* name: "Block Risky SaaS Applications143",
|
|
63
|
+
* description: "Prevent data exfiltration by blocking risky SaaS apps...",
|
|
64
|
+
* action: "deny",
|
|
65
|
+
* policyType: "Internet",
|
|
66
|
+
* securitySettings: {
|
|
67
|
+
* antiSpyware: "yes",
|
|
68
|
+
* vulnerability: "yes",
|
|
69
|
+
* virusAndWildfireAnalysis: "yes",
|
|
70
|
+
* },
|
|
71
|
+
* blockWebApplications: ["facebook-posting"],
|
|
72
|
+
* logSettings: {
|
|
73
|
+
* logSessions: true,
|
|
74
|
+
* },
|
|
75
|
+
* froms: ["any"],
|
|
76
|
+
* tos: ["any"],
|
|
77
|
+
* sources: ["any"],
|
|
78
|
+
* destinations: ["any"],
|
|
79
|
+
* sourceUsers: ["any"],
|
|
80
|
+
* disabled: false,
|
|
81
|
+
* tags: [
|
|
82
|
+
* outboundTag.name,
|
|
83
|
+
* webTag.name,
|
|
84
|
+
* ],
|
|
85
|
+
* });
|
|
86
|
+
* // --- NEW Examples Demonstrating Rule Ordering ---
|
|
87
|
+
* // Example 1: Place a critical block rule at the absolute top
|
|
88
|
+
* const criticalBlockTop = new scm.SecurityRule("critical_block_top", {
|
|
89
|
+
* folder: "All",
|
|
90
|
+
* name: "CRITICAL Block Malicious IPs Top143",
|
|
91
|
+
* description: "Always block known malicious IPs first.",
|
|
92
|
+
* relativePosition: "top",
|
|
93
|
+
* action: "deny",
|
|
94
|
+
* froms: ["any"],
|
|
95
|
+
* tos: ["any"],
|
|
96
|
+
* sources: ["any"],
|
|
97
|
+
* destinations: ["any"],
|
|
98
|
+
* sourceUsers: ["any"],
|
|
99
|
+
* categories: ["any"],
|
|
100
|
+
* applications: ["any"],
|
|
101
|
+
* services: ["any"],
|
|
102
|
+
* logEnd: true,
|
|
103
|
+
* tags: [outboundTag.name],
|
|
104
|
+
* });
|
|
105
|
+
* // Example 2: Place a cleanup rule at the absolute bottom
|
|
106
|
+
* const cleanupDenyBottom = new scm.SecurityRule("cleanup_deny_bottom", {
|
|
107
|
+
* folder: "All",
|
|
108
|
+
* name: "Cleanup Deny All Bottom143",
|
|
109
|
+
* description: "Deny any traffic not explicitly allowed.",
|
|
110
|
+
* relativePosition: "bottom",
|
|
111
|
+
* action: "deny",
|
|
112
|
+
* froms: ["any"],
|
|
113
|
+
* tos: ["any"],
|
|
114
|
+
* sources: ["any"],
|
|
115
|
+
* destinations: ["any"],
|
|
116
|
+
* sourceUsers: ["any"],
|
|
117
|
+
* categories: ["any"],
|
|
118
|
+
* applications: ["any"],
|
|
119
|
+
* services: ["any"],
|
|
120
|
+
* logEnd: true,
|
|
121
|
+
* tags: [outboundTag.name],
|
|
122
|
+
* });
|
|
123
|
+
* // Example 3: Place a rule *before* the standard web access rule
|
|
124
|
+
* const allowUpdatesBeforeWeb = new scm.SecurityRule("allow_updates_before_web", {
|
|
125
|
+
* folder: "All",
|
|
126
|
+
* name: "Allow OS Updates Before Web143",
|
|
127
|
+
* description: "Allow specific OS update traffic before general web access.",
|
|
128
|
+
* relativePosition: "before",
|
|
129
|
+
* targetRule: standardWebAccess.id,
|
|
130
|
+
* action: "allow",
|
|
131
|
+
* froms: ["trust"],
|
|
132
|
+
* tos: ["untrust"],
|
|
133
|
+
* sources: ["any"],
|
|
134
|
+
* destinations: ["any"],
|
|
135
|
+
* sourceUsers: ["any"],
|
|
136
|
+
* categories: ["any"],
|
|
137
|
+
* applications: [
|
|
138
|
+
* "ms-update",
|
|
139
|
+
* "apple-update",
|
|
140
|
+
* ],
|
|
141
|
+
* services: ["service-https"],
|
|
142
|
+
* logEnd: true,
|
|
143
|
+
* tags: [outboundTag.name],
|
|
144
|
+
* });
|
|
145
|
+
* // Example 4: Place a rule *after* the standard web access rule
|
|
146
|
+
* const allowCorpAppsAfterWeb = new scm.SecurityRule("allow_corp_apps_after_web", {
|
|
147
|
+
* folder: "All",
|
|
148
|
+
* name: "Allow Corp Apps After Web143",
|
|
149
|
+
* description: "Allow access to specific corporate apps after general web access.",
|
|
150
|
+
* relativePosition: "after",
|
|
151
|
+
* targetRule: standardWebAccess.id,
|
|
152
|
+
* action: "allow",
|
|
153
|
+
* froms: ["trust"],
|
|
154
|
+
* tos: ["untrust"],
|
|
155
|
+
* sources: ["any"],
|
|
156
|
+
* destinations: ["any"],
|
|
157
|
+
* sourceUsers: ["any"],
|
|
158
|
+
* categories: ["any"],
|
|
159
|
+
* applications: ["ms-update"],
|
|
160
|
+
* services: ["service-https"],
|
|
161
|
+
* logEnd: true,
|
|
162
|
+
* tags: [webTag.name],
|
|
163
|
+
* });
|
|
164
|
+
* ```
|
|
165
|
+
*
|
|
166
|
+
* ## Import
|
|
167
|
+
*
|
|
168
|
+
* The following command can be used to import a resource not managed by Terraform:
|
|
169
|
+
*
|
|
170
|
+
* bash
|
|
171
|
+
*
|
|
172
|
+
* ```sh
|
|
173
|
+
* $ pulumi import scm:index/securityRule:SecurityRule example folder:::id
|
|
174
|
+
* ```
|
|
175
|
+
*
|
|
176
|
+
* or
|
|
177
|
+
*
|
|
178
|
+
* bash
|
|
179
|
+
*
|
|
180
|
+
* ```sh
|
|
181
|
+
* $ pulumi import scm:index/securityRule:SecurityRule example :snippet::id
|
|
182
|
+
* ```
|
|
183
|
+
*
|
|
184
|
+
* or
|
|
185
|
+
*
|
|
186
|
+
* bash
|
|
187
|
+
*
|
|
188
|
+
* ```sh
|
|
189
|
+
* $ pulumi import scm:index/securityRule:SecurityRule example ::device:id
|
|
190
|
+
* ```
|
|
8
191
|
*/
|
|
9
192
|
export declare class SecurityRule extends pulumi.CustomResource {
|
|
10
193
|
/**
|
|
@@ -130,6 +313,10 @@ export declare class SecurityRule extends pulumi.CustomResource {
|
|
|
130
313
|
* The security profile object
|
|
131
314
|
*/
|
|
132
315
|
readonly profileSetting: pulumi.Output<outputs.SecurityRuleProfileSetting>;
|
|
316
|
+
/**
|
|
317
|
+
* Relative positioning rule. String must be one of these: `"before"`, `"after"`, `"top"`, `"bottom"`. If not specified, rule is created at the bottom of the ruleset.
|
|
318
|
+
*/
|
|
319
|
+
readonly relativePosition: pulumi.Output<string | undefined>;
|
|
133
320
|
/**
|
|
134
321
|
* Schedule in which this rule will be applied
|
|
135
322
|
*/
|
|
@@ -162,6 +349,10 @@ export declare class SecurityRule extends pulumi.CustomResource {
|
|
|
162
349
|
* The tags associated with the security rule
|
|
163
350
|
*/
|
|
164
351
|
readonly tags: pulumi.Output<string[] | undefined>;
|
|
352
|
+
/**
|
|
353
|
+
* The name or UUID of the rule to position this rule relative to. Required when `relativePosition` is `"before"` or `"after"`.
|
|
354
|
+
*/
|
|
355
|
+
readonly targetRule: pulumi.Output<string | undefined>;
|
|
165
356
|
/**
|
|
166
357
|
* Tenant restrictions
|
|
167
358
|
*/
|
|
@@ -292,6 +483,10 @@ export interface SecurityRuleState {
|
|
|
292
483
|
* The security profile object
|
|
293
484
|
*/
|
|
294
485
|
profileSetting?: pulumi.Input<inputs.SecurityRuleProfileSetting>;
|
|
486
|
+
/**
|
|
487
|
+
* Relative positioning rule. String must be one of these: `"before"`, `"after"`, `"top"`, `"bottom"`. If not specified, rule is created at the bottom of the ruleset.
|
|
488
|
+
*/
|
|
489
|
+
relativePosition?: pulumi.Input<string>;
|
|
295
490
|
/**
|
|
296
491
|
* Schedule in which this rule will be applied
|
|
297
492
|
*/
|
|
@@ -324,6 +519,10 @@ export interface SecurityRuleState {
|
|
|
324
519
|
* The tags associated with the security rule
|
|
325
520
|
*/
|
|
326
521
|
tags?: pulumi.Input<pulumi.Input<string>[]>;
|
|
522
|
+
/**
|
|
523
|
+
* The name or UUID of the rule to position this rule relative to. Required when `relativePosition` is `"before"` or `"after"`.
|
|
524
|
+
*/
|
|
525
|
+
targetRule?: pulumi.Input<string>;
|
|
327
526
|
/**
|
|
328
527
|
* Tenant restrictions
|
|
329
528
|
*/
|
|
@@ -446,6 +645,10 @@ export interface SecurityRuleArgs {
|
|
|
446
645
|
* The security profile object
|
|
447
646
|
*/
|
|
448
647
|
profileSetting?: pulumi.Input<inputs.SecurityRuleProfileSetting>;
|
|
648
|
+
/**
|
|
649
|
+
* Relative positioning rule. String must be one of these: `"before"`, `"after"`, `"top"`, `"bottom"`. If not specified, rule is created at the bottom of the ruleset.
|
|
650
|
+
*/
|
|
651
|
+
relativePosition?: pulumi.Input<string>;
|
|
449
652
|
/**
|
|
450
653
|
* Schedule in which this rule will be applied
|
|
451
654
|
*/
|
|
@@ -478,6 +681,10 @@ export interface SecurityRuleArgs {
|
|
|
478
681
|
* The tags associated with the security rule
|
|
479
682
|
*/
|
|
480
683
|
tags?: pulumi.Input<pulumi.Input<string>[]>;
|
|
684
|
+
/**
|
|
685
|
+
* The name or UUID of the rule to position this rule relative to. Required when `relativePosition` is `"before"` or `"after"`.
|
|
686
|
+
*/
|
|
687
|
+
targetRule?: pulumi.Input<string>;
|
|
481
688
|
/**
|
|
482
689
|
* Tenant restrictions
|
|
483
690
|
*/
|
package/securityRule.js
CHANGED
|
@@ -9,6 +9,189 @@ const utilities = require("./utilities");
|
|
|
9
9
|
* SecurityRule resource
|
|
10
10
|
*
|
|
11
11
|
* ## Example Usage
|
|
12
|
+
*
|
|
13
|
+
* ```typescript
|
|
14
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
15
|
+
* import * as scm from "@pulumi/scm";
|
|
16
|
+
*
|
|
17
|
+
* // First, create the tag objects that you will reference.
|
|
18
|
+
* const outboundTag = new scm.Tag("outbound_tag", {
|
|
19
|
+
* folder: "All",
|
|
20
|
+
* name: "outbound143",
|
|
21
|
+
* color: "Red",
|
|
22
|
+
* });
|
|
23
|
+
* const webTag = new scm.Tag("web_tag", {
|
|
24
|
+
* folder: "All",
|
|
25
|
+
* name: "web143",
|
|
26
|
+
* color: "Blue",
|
|
27
|
+
* });
|
|
28
|
+
* // --- Existing Rules (Backward Compatibility) ---
|
|
29
|
+
* const standardWebAccess = new scm.SecurityRule("standard_web_access", {
|
|
30
|
+
* folder: "All",
|
|
31
|
+
* name: "Allow Standard Web Access143",
|
|
32
|
+
* description: "Allow outbound web traffic to any destination...",
|
|
33
|
+
* position: "pre",
|
|
34
|
+
* action: "allow",
|
|
35
|
+
* categories: ["any"],
|
|
36
|
+
* applications: [
|
|
37
|
+
* "web-browsing",
|
|
38
|
+
* "ssl",
|
|
39
|
+
* ],
|
|
40
|
+
* services: [
|
|
41
|
+
* "service-http",
|
|
42
|
+
* "service-https",
|
|
43
|
+
* ],
|
|
44
|
+
* froms: [
|
|
45
|
+
* "untrust",
|
|
46
|
+
* "trust",
|
|
47
|
+
* ],
|
|
48
|
+
* tos: ["trust"],
|
|
49
|
+
* sources: ["any"],
|
|
50
|
+
* destinations: ["any"],
|
|
51
|
+
* negateSource: false,
|
|
52
|
+
* negateDestination: false,
|
|
53
|
+
* sourceUsers: ["any"],
|
|
54
|
+
* sourceHips: ["any"],
|
|
55
|
+
* destinationHips: ["any"],
|
|
56
|
+
* logStart: true,
|
|
57
|
+
* logEnd: true,
|
|
58
|
+
* disabled: false,
|
|
59
|
+
* tags: [
|
|
60
|
+
* outboundTag.name,
|
|
61
|
+
* webTag.name,
|
|
62
|
+
* ],
|
|
63
|
+
* });
|
|
64
|
+
* const blockRiskySaas = new scm.SecurityRule("block_risky_saas", {
|
|
65
|
+
* folder: "All",
|
|
66
|
+
* name: "Block Risky SaaS Applications143",
|
|
67
|
+
* description: "Prevent data exfiltration by blocking risky SaaS apps...",
|
|
68
|
+
* action: "deny",
|
|
69
|
+
* policyType: "Internet",
|
|
70
|
+
* securitySettings: {
|
|
71
|
+
* antiSpyware: "yes",
|
|
72
|
+
* vulnerability: "yes",
|
|
73
|
+
* virusAndWildfireAnalysis: "yes",
|
|
74
|
+
* },
|
|
75
|
+
* blockWebApplications: ["facebook-posting"],
|
|
76
|
+
* logSettings: {
|
|
77
|
+
* logSessions: true,
|
|
78
|
+
* },
|
|
79
|
+
* froms: ["any"],
|
|
80
|
+
* tos: ["any"],
|
|
81
|
+
* sources: ["any"],
|
|
82
|
+
* destinations: ["any"],
|
|
83
|
+
* sourceUsers: ["any"],
|
|
84
|
+
* disabled: false,
|
|
85
|
+
* tags: [
|
|
86
|
+
* outboundTag.name,
|
|
87
|
+
* webTag.name,
|
|
88
|
+
* ],
|
|
89
|
+
* });
|
|
90
|
+
* // --- NEW Examples Demonstrating Rule Ordering ---
|
|
91
|
+
* // Example 1: Place a critical block rule at the absolute top
|
|
92
|
+
* const criticalBlockTop = new scm.SecurityRule("critical_block_top", {
|
|
93
|
+
* folder: "All",
|
|
94
|
+
* name: "CRITICAL Block Malicious IPs Top143",
|
|
95
|
+
* description: "Always block known malicious IPs first.",
|
|
96
|
+
* relativePosition: "top",
|
|
97
|
+
* action: "deny",
|
|
98
|
+
* froms: ["any"],
|
|
99
|
+
* tos: ["any"],
|
|
100
|
+
* sources: ["any"],
|
|
101
|
+
* destinations: ["any"],
|
|
102
|
+
* sourceUsers: ["any"],
|
|
103
|
+
* categories: ["any"],
|
|
104
|
+
* applications: ["any"],
|
|
105
|
+
* services: ["any"],
|
|
106
|
+
* logEnd: true,
|
|
107
|
+
* tags: [outboundTag.name],
|
|
108
|
+
* });
|
|
109
|
+
* // Example 2: Place a cleanup rule at the absolute bottom
|
|
110
|
+
* const cleanupDenyBottom = new scm.SecurityRule("cleanup_deny_bottom", {
|
|
111
|
+
* folder: "All",
|
|
112
|
+
* name: "Cleanup Deny All Bottom143",
|
|
113
|
+
* description: "Deny any traffic not explicitly allowed.",
|
|
114
|
+
* relativePosition: "bottom",
|
|
115
|
+
* action: "deny",
|
|
116
|
+
* froms: ["any"],
|
|
117
|
+
* tos: ["any"],
|
|
118
|
+
* sources: ["any"],
|
|
119
|
+
* destinations: ["any"],
|
|
120
|
+
* sourceUsers: ["any"],
|
|
121
|
+
* categories: ["any"],
|
|
122
|
+
* applications: ["any"],
|
|
123
|
+
* services: ["any"],
|
|
124
|
+
* logEnd: true,
|
|
125
|
+
* tags: [outboundTag.name],
|
|
126
|
+
* });
|
|
127
|
+
* // Example 3: Place a rule *before* the standard web access rule
|
|
128
|
+
* const allowUpdatesBeforeWeb = new scm.SecurityRule("allow_updates_before_web", {
|
|
129
|
+
* folder: "All",
|
|
130
|
+
* name: "Allow OS Updates Before Web143",
|
|
131
|
+
* description: "Allow specific OS update traffic before general web access.",
|
|
132
|
+
* relativePosition: "before",
|
|
133
|
+
* targetRule: standardWebAccess.id,
|
|
134
|
+
* action: "allow",
|
|
135
|
+
* froms: ["trust"],
|
|
136
|
+
* tos: ["untrust"],
|
|
137
|
+
* sources: ["any"],
|
|
138
|
+
* destinations: ["any"],
|
|
139
|
+
* sourceUsers: ["any"],
|
|
140
|
+
* categories: ["any"],
|
|
141
|
+
* applications: [
|
|
142
|
+
* "ms-update",
|
|
143
|
+
* "apple-update",
|
|
144
|
+
* ],
|
|
145
|
+
* services: ["service-https"],
|
|
146
|
+
* logEnd: true,
|
|
147
|
+
* tags: [outboundTag.name],
|
|
148
|
+
* });
|
|
149
|
+
* // Example 4: Place a rule *after* the standard web access rule
|
|
150
|
+
* const allowCorpAppsAfterWeb = new scm.SecurityRule("allow_corp_apps_after_web", {
|
|
151
|
+
* folder: "All",
|
|
152
|
+
* name: "Allow Corp Apps After Web143",
|
|
153
|
+
* description: "Allow access to specific corporate apps after general web access.",
|
|
154
|
+
* relativePosition: "after",
|
|
155
|
+
* targetRule: standardWebAccess.id,
|
|
156
|
+
* action: "allow",
|
|
157
|
+
* froms: ["trust"],
|
|
158
|
+
* tos: ["untrust"],
|
|
159
|
+
* sources: ["any"],
|
|
160
|
+
* destinations: ["any"],
|
|
161
|
+
* sourceUsers: ["any"],
|
|
162
|
+
* categories: ["any"],
|
|
163
|
+
* applications: ["ms-update"],
|
|
164
|
+
* services: ["service-https"],
|
|
165
|
+
* logEnd: true,
|
|
166
|
+
* tags: [webTag.name],
|
|
167
|
+
* });
|
|
168
|
+
* ```
|
|
169
|
+
*
|
|
170
|
+
* ## Import
|
|
171
|
+
*
|
|
172
|
+
* The following command can be used to import a resource not managed by Terraform:
|
|
173
|
+
*
|
|
174
|
+
* bash
|
|
175
|
+
*
|
|
176
|
+
* ```sh
|
|
177
|
+
* $ pulumi import scm:index/securityRule:SecurityRule example folder:::id
|
|
178
|
+
* ```
|
|
179
|
+
*
|
|
180
|
+
* or
|
|
181
|
+
*
|
|
182
|
+
* bash
|
|
183
|
+
*
|
|
184
|
+
* ```sh
|
|
185
|
+
* $ pulumi import scm:index/securityRule:SecurityRule example :snippet::id
|
|
186
|
+
* ```
|
|
187
|
+
*
|
|
188
|
+
* or
|
|
189
|
+
*
|
|
190
|
+
* bash
|
|
191
|
+
*
|
|
192
|
+
* ```sh
|
|
193
|
+
* $ pulumi import scm:index/securityRule:SecurityRule example ::device:id
|
|
194
|
+
* ```
|
|
12
195
|
*/
|
|
13
196
|
class SecurityRule extends pulumi.CustomResource {
|
|
14
197
|
/**
|
|
@@ -65,6 +248,7 @@ class SecurityRule extends pulumi.CustomResource {
|
|
|
65
248
|
resourceInputs["policyType"] = state?.policyType;
|
|
66
249
|
resourceInputs["position"] = state?.position;
|
|
67
250
|
resourceInputs["profileSetting"] = state?.profileSetting;
|
|
251
|
+
resourceInputs["relativePosition"] = state?.relativePosition;
|
|
68
252
|
resourceInputs["schedule"] = state?.schedule;
|
|
69
253
|
resourceInputs["securitySettings"] = state?.securitySettings;
|
|
70
254
|
resourceInputs["services"] = state?.services;
|
|
@@ -73,6 +257,7 @@ class SecurityRule extends pulumi.CustomResource {
|
|
|
73
257
|
resourceInputs["sourceUsers"] = state?.sourceUsers;
|
|
74
258
|
resourceInputs["sources"] = state?.sources;
|
|
75
259
|
resourceInputs["tags"] = state?.tags;
|
|
260
|
+
resourceInputs["targetRule"] = state?.targetRule;
|
|
76
261
|
resourceInputs["tenantRestrictions"] = state?.tenantRestrictions;
|
|
77
262
|
resourceInputs["tfid"] = state?.tfid;
|
|
78
263
|
resourceInputs["tos"] = state?.tos;
|
|
@@ -106,6 +291,7 @@ class SecurityRule extends pulumi.CustomResource {
|
|
|
106
291
|
resourceInputs["policyType"] = args?.policyType;
|
|
107
292
|
resourceInputs["position"] = args?.position;
|
|
108
293
|
resourceInputs["profileSetting"] = args?.profileSetting;
|
|
294
|
+
resourceInputs["relativePosition"] = args?.relativePosition;
|
|
109
295
|
resourceInputs["schedule"] = args?.schedule;
|
|
110
296
|
resourceInputs["securitySettings"] = args?.securitySettings;
|
|
111
297
|
resourceInputs["services"] = args?.services;
|
|
@@ -114,6 +300,7 @@ class SecurityRule extends pulumi.CustomResource {
|
|
|
114
300
|
resourceInputs["sourceUsers"] = args?.sourceUsers;
|
|
115
301
|
resourceInputs["sources"] = args?.sources;
|
|
116
302
|
resourceInputs["tags"] = args?.tags;
|
|
303
|
+
resourceInputs["targetRule"] = args?.targetRule;
|
|
117
304
|
resourceInputs["tenantRestrictions"] = args?.tenantRestrictions;
|
|
118
305
|
resourceInputs["tos"] = args?.tos;
|
|
119
306
|
resourceInputs["tfid"] = undefined /*out*/;
|
package/securityRule.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"securityRule.js","sourceRoot":"","sources":["../securityRule.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"securityRule.js","sourceRoot":"","sources":["../securityRule.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2LG;AACH,MAAa,YAAa,SAAQ,MAAM,CAAC,cAAc;IACnD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAyB,EAAE,IAAmC;QACvH,OAAO,IAAI,YAAY,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACnE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,YAAY,CAAC,YAAY,CAAC;IAC7D,CAAC;IAwKD,YAAY,IAAY,EAAE,WAAkD,EAAE,IAAmC;QAC7G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA4C,CAAC;YAC3D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;YACzC,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,EAAE,kBAAkB,CAAC;YACjE,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,EAAE,oBAAoB,CAAC;YACrE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,EAAE,kBAAkB,CAAC;YACjE,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,EAAE,oBAAoB,CAAC;YACrE,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,EAAE,sBAAsB,CAAC;YACzE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,EAAE,eAAe,CAAC;YAC3D,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;YACzC,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;YACzC,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;YACzC,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,EAAE,iBAAiB,CAAC;YAC/D,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,EAAE,gBAAgB,CAAC;YAC7D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,EAAE,gBAAgB,CAAC;YAC7D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,EAAE,kBAAkB,CAAC;YACjE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,EAAE,GAAG,CAAC;SACtC;aAAM;YACH,MAAM,IAAI,GAAG,WAA2C,CAAC;YACzD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,EAAE,kBAAkB,CAAC;YAChE,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,EAAE,oBAAoB,CAAC;YACpE,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,EAAE,kBAAkB,CAAC;YAChE,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,EAAE,oBAAoB,CAAC;YACpE,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,EAAE,sBAAsB,CAAC;YACxE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,EAAE,eAAe,CAAC;YAC1D,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC;YACtC,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,EAAE,iBAAiB,CAAC;YAC9D,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC;YACxD,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,EAAE,gBAAgB,CAAC;YAC5D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,EAAE,gBAAgB,CAAC;YAC5D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,EAAE,kBAAkB,CAAC;YAChE,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,EAAE,GAAG,CAAC;YAClC,cAAc,CAAC,MAAM,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAC9C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,YAAY,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACjE,CAAC;;AA5RL,oCA6RC;AA/QG,gBAAgB;AACO,yBAAY,GAAG,qCAAqC,CAAC"}
|
package/service.d.ts
CHANGED
|
@@ -80,6 +80,8 @@ export declare class Service extends pulumi.CustomResource {
|
|
|
80
80
|
readonly device: pulumi.Output<string | undefined>;
|
|
81
81
|
/**
|
|
82
82
|
* The folder in which the resource is defined
|
|
83
|
+
*
|
|
84
|
+
* > ℹ️ **Note:** You must specify exactly one of `device`, `folder`, and `snippet`.
|
|
83
85
|
*/
|
|
84
86
|
readonly folder: pulumi.Output<string | undefined>;
|
|
85
87
|
/**
|
|
@@ -92,6 +94,8 @@ export declare class Service extends pulumi.CustomResource {
|
|
|
92
94
|
readonly protocol: pulumi.Output<outputs.ServiceProtocol>;
|
|
93
95
|
/**
|
|
94
96
|
* The snippet in which the resource is defined
|
|
97
|
+
*
|
|
98
|
+
* > ℹ️ **Note:** You must specify exactly one of `device`, `folder`, and `snippet`.
|
|
95
99
|
*/
|
|
96
100
|
readonly snippet: pulumi.Output<string | undefined>;
|
|
97
101
|
/**
|
|
@@ -122,6 +126,8 @@ export interface ServiceState {
|
|
|
122
126
|
device?: pulumi.Input<string>;
|
|
123
127
|
/**
|
|
124
128
|
* The folder in which the resource is defined
|
|
129
|
+
*
|
|
130
|
+
* > ℹ️ **Note:** You must specify exactly one of `device`, `folder`, and `snippet`.
|
|
125
131
|
*/
|
|
126
132
|
folder?: pulumi.Input<string>;
|
|
127
133
|
/**
|
|
@@ -134,6 +140,8 @@ export interface ServiceState {
|
|
|
134
140
|
protocol?: pulumi.Input<inputs.ServiceProtocol>;
|
|
135
141
|
/**
|
|
136
142
|
* The snippet in which the resource is defined
|
|
143
|
+
*
|
|
144
|
+
* > ℹ️ **Note:** You must specify exactly one of `device`, `folder`, and `snippet`.
|
|
137
145
|
*/
|
|
138
146
|
snippet?: pulumi.Input<string>;
|
|
139
147
|
/**
|
|
@@ -156,6 +164,8 @@ export interface ServiceArgs {
|
|
|
156
164
|
device?: pulumi.Input<string>;
|
|
157
165
|
/**
|
|
158
166
|
* The folder in which the resource is defined
|
|
167
|
+
*
|
|
168
|
+
* > ℹ️ **Note:** You must specify exactly one of `device`, `folder`, and `snippet`.
|
|
159
169
|
*/
|
|
160
170
|
folder?: pulumi.Input<string>;
|
|
161
171
|
/**
|
|
@@ -168,6 +178,8 @@ export interface ServiceArgs {
|
|
|
168
178
|
protocol?: pulumi.Input<inputs.ServiceProtocol>;
|
|
169
179
|
/**
|
|
170
180
|
* The snippet in which the resource is defined
|
|
181
|
+
*
|
|
182
|
+
* > ℹ️ **Note:** You must specify exactly one of `device`, `folder`, and `snippet`.
|
|
171
183
|
*/
|
|
172
184
|
snippet?: pulumi.Input<string>;
|
|
173
185
|
/**
|
package/service.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"service.js","sourceRoot":"","sources":["../service.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAoDG;AACH,MAAa,OAAQ,SAAQ,MAAM,CAAC,cAAc;IAC9C;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAoB,EAAE,IAAmC;QAClH,OAAO,IAAI,OAAO,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC9D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,OAAO,CAAC,YAAY,CAAC;IACxD,CAAC;
|
|
1
|
+
{"version":3,"file":"service.js","sourceRoot":"","sources":["../service.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAoDG;AACH,MAAa,OAAQ,SAAQ,MAAM,CAAC,cAAc;IAC9C;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAoB,EAAE,IAAmC;QAClH,OAAO,IAAI,OAAO,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC9D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,OAAO,CAAC,YAAY,CAAC;IACxD,CAAC;IA4CD,YAAY,IAAY,EAAE,WAAwC,EAAE,IAAmC;QACnG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAuC,CAAC;YACtD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;YACzC,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;YACzC,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;SACxC;aAAM;YACH,MAAM,IAAI,GAAG,WAAsC,CAAC;YACpD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,MAAM,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAC9C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,OAAO,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC5D,CAAC;;AAhGL,0BAiGC;AAnFG,gBAAgB;AACO,oBAAY,GAAG,2BAA2B,CAAC"}
|