@pulumiverse/vercel 1.14.2 → 1.14.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/attackChallengeMode.d.ts +3 -3
- package/firewallConfig.d.ts +119 -0
- package/firewallConfig.js +71 -0
- package/firewallConfig.js.map +1 -0
- package/index.d.ts +3 -0
- package/index.js +6 -1
- package/index.js.map +1 -1
- package/package.json +1 -1
- package/types/input.d.ts +199 -0
- package/types/output.d.ts +199 -0
package/attackChallengeMode.d.ts
CHANGED
|
@@ -50,7 +50,7 @@ export declare class AttackChallengeMode extends pulumi.CustomResource {
|
|
|
50
50
|
*/
|
|
51
51
|
readonly enabled: pulumi.Output<boolean>;
|
|
52
52
|
/**
|
|
53
|
-
* The ID of the Project to
|
|
53
|
+
* The ID of the Project to toggle Attack Challenge Mode on.
|
|
54
54
|
*/
|
|
55
55
|
readonly projectId: pulumi.Output<string>;
|
|
56
56
|
/**
|
|
@@ -75,7 +75,7 @@ export interface AttackChallengeModeState {
|
|
|
75
75
|
*/
|
|
76
76
|
enabled?: pulumi.Input<boolean>;
|
|
77
77
|
/**
|
|
78
|
-
* The ID of the Project to
|
|
78
|
+
* The ID of the Project to toggle Attack Challenge Mode on.
|
|
79
79
|
*/
|
|
80
80
|
projectId?: pulumi.Input<string>;
|
|
81
81
|
/**
|
|
@@ -92,7 +92,7 @@ export interface AttackChallengeModeArgs {
|
|
|
92
92
|
*/
|
|
93
93
|
enabled: pulumi.Input<boolean>;
|
|
94
94
|
/**
|
|
95
|
-
* The ID of the Project to
|
|
95
|
+
* The ID of the Project to toggle Attack Challenge Mode on.
|
|
96
96
|
*/
|
|
97
97
|
projectId: pulumi.Input<string>;
|
|
98
98
|
/**
|
|
@@ -0,0 +1,119 @@
|
|
|
1
|
+
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
import * as inputs from "./types/input";
|
|
3
|
+
import * as outputs from "./types/output";
|
|
4
|
+
/**
|
|
5
|
+
* Define Custom Rules to shape the way your traffic is handled by the Vercel Edge Network.
|
|
6
|
+
*
|
|
7
|
+
* ## Import
|
|
8
|
+
*
|
|
9
|
+
* ```sh
|
|
10
|
+
* $ pulumi import vercel:index/firewallConfig:FirewallConfig example team_xxxxxxxxxxxxxxxxxxxxxxxx/prj_xxxxxxxxxxxxxxxxxxxxxxxxxxxx
|
|
11
|
+
* ```
|
|
12
|
+
*/
|
|
13
|
+
export declare class FirewallConfig extends pulumi.CustomResource {
|
|
14
|
+
/**
|
|
15
|
+
* Get an existing FirewallConfig resource's state with the given name, ID, and optional extra
|
|
16
|
+
* properties used to qualify the lookup.
|
|
17
|
+
*
|
|
18
|
+
* @param name The _unique_ name of the resulting resource.
|
|
19
|
+
* @param id The _unique_ provider ID of the resource to lookup.
|
|
20
|
+
* @param state Any extra arguments used during the lookup.
|
|
21
|
+
* @param opts Optional settings to control the behavior of the CustomResource.
|
|
22
|
+
*/
|
|
23
|
+
static get(name: string, id: pulumi.Input<pulumi.ID>, state?: FirewallConfigState, opts?: pulumi.CustomResourceOptions): FirewallConfig;
|
|
24
|
+
/**
|
|
25
|
+
* Returns true if the given object is an instance of FirewallConfig. This is designed to work even
|
|
26
|
+
* when multiple copies of the Pulumi SDK have been loaded into the same process.
|
|
27
|
+
*/
|
|
28
|
+
static isInstance(obj: any): obj is FirewallConfig;
|
|
29
|
+
/**
|
|
30
|
+
* Whether firewall is enabled or not.
|
|
31
|
+
*/
|
|
32
|
+
readonly enabled: pulumi.Output<boolean>;
|
|
33
|
+
/**
|
|
34
|
+
* IP rules to apply to the project.
|
|
35
|
+
*/
|
|
36
|
+
readonly ipRules: pulumi.Output<outputs.FirewallConfigIpRules | undefined>;
|
|
37
|
+
/**
|
|
38
|
+
* The managed rulesets that are enabled.
|
|
39
|
+
*/
|
|
40
|
+
readonly managedRulesets: pulumi.Output<outputs.FirewallConfigManagedRulesets | undefined>;
|
|
41
|
+
/**
|
|
42
|
+
* The ID of the project this configuration belongs to.
|
|
43
|
+
*/
|
|
44
|
+
readonly projectId: pulumi.Output<string>;
|
|
45
|
+
/**
|
|
46
|
+
* Custom rules to apply to the project
|
|
47
|
+
*/
|
|
48
|
+
readonly rules: pulumi.Output<outputs.FirewallConfigRules | undefined>;
|
|
49
|
+
/**
|
|
50
|
+
* The ID of the team this project belongs to.
|
|
51
|
+
*/
|
|
52
|
+
readonly teamId: pulumi.Output<string>;
|
|
53
|
+
/**
|
|
54
|
+
* Create a FirewallConfig resource with the given unique name, arguments, and options.
|
|
55
|
+
*
|
|
56
|
+
* @param name The _unique_ name of the resource.
|
|
57
|
+
* @param args The arguments to use to populate this resource's properties.
|
|
58
|
+
* @param opts A bag of options that control this resource's behavior.
|
|
59
|
+
*/
|
|
60
|
+
constructor(name: string, args: FirewallConfigArgs, opts?: pulumi.CustomResourceOptions);
|
|
61
|
+
}
|
|
62
|
+
/**
|
|
63
|
+
* Input properties used for looking up and filtering FirewallConfig resources.
|
|
64
|
+
*/
|
|
65
|
+
export interface FirewallConfigState {
|
|
66
|
+
/**
|
|
67
|
+
* Whether firewall is enabled or not.
|
|
68
|
+
*/
|
|
69
|
+
enabled?: pulumi.Input<boolean>;
|
|
70
|
+
/**
|
|
71
|
+
* IP rules to apply to the project.
|
|
72
|
+
*/
|
|
73
|
+
ipRules?: pulumi.Input<inputs.FirewallConfigIpRules>;
|
|
74
|
+
/**
|
|
75
|
+
* The managed rulesets that are enabled.
|
|
76
|
+
*/
|
|
77
|
+
managedRulesets?: pulumi.Input<inputs.FirewallConfigManagedRulesets>;
|
|
78
|
+
/**
|
|
79
|
+
* The ID of the project this configuration belongs to.
|
|
80
|
+
*/
|
|
81
|
+
projectId?: pulumi.Input<string>;
|
|
82
|
+
/**
|
|
83
|
+
* Custom rules to apply to the project
|
|
84
|
+
*/
|
|
85
|
+
rules?: pulumi.Input<inputs.FirewallConfigRules>;
|
|
86
|
+
/**
|
|
87
|
+
* The ID of the team this project belongs to.
|
|
88
|
+
*/
|
|
89
|
+
teamId?: pulumi.Input<string>;
|
|
90
|
+
}
|
|
91
|
+
/**
|
|
92
|
+
* The set of arguments for constructing a FirewallConfig resource.
|
|
93
|
+
*/
|
|
94
|
+
export interface FirewallConfigArgs {
|
|
95
|
+
/**
|
|
96
|
+
* Whether firewall is enabled or not.
|
|
97
|
+
*/
|
|
98
|
+
enabled?: pulumi.Input<boolean>;
|
|
99
|
+
/**
|
|
100
|
+
* IP rules to apply to the project.
|
|
101
|
+
*/
|
|
102
|
+
ipRules?: pulumi.Input<inputs.FirewallConfigIpRules>;
|
|
103
|
+
/**
|
|
104
|
+
* The managed rulesets that are enabled.
|
|
105
|
+
*/
|
|
106
|
+
managedRulesets?: pulumi.Input<inputs.FirewallConfigManagedRulesets>;
|
|
107
|
+
/**
|
|
108
|
+
* The ID of the project this configuration belongs to.
|
|
109
|
+
*/
|
|
110
|
+
projectId: pulumi.Input<string>;
|
|
111
|
+
/**
|
|
112
|
+
* Custom rules to apply to the project
|
|
113
|
+
*/
|
|
114
|
+
rules?: pulumi.Input<inputs.FirewallConfigRules>;
|
|
115
|
+
/**
|
|
116
|
+
* The ID of the team this project belongs to.
|
|
117
|
+
*/
|
|
118
|
+
teamId?: pulumi.Input<string>;
|
|
119
|
+
}
|
|
@@ -0,0 +1,71 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
|
+
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.FirewallConfig = void 0;
|
|
6
|
+
const pulumi = require("@pulumi/pulumi");
|
|
7
|
+
const utilities = require("./utilities");
|
|
8
|
+
/**
|
|
9
|
+
* Define Custom Rules to shape the way your traffic is handled by the Vercel Edge Network.
|
|
10
|
+
*
|
|
11
|
+
* ## Import
|
|
12
|
+
*
|
|
13
|
+
* ```sh
|
|
14
|
+
* $ pulumi import vercel:index/firewallConfig:FirewallConfig example team_xxxxxxxxxxxxxxxxxxxxxxxx/prj_xxxxxxxxxxxxxxxxxxxxxxxxxxxx
|
|
15
|
+
* ```
|
|
16
|
+
*/
|
|
17
|
+
class FirewallConfig extends pulumi.CustomResource {
|
|
18
|
+
/**
|
|
19
|
+
* Get an existing FirewallConfig resource's state with the given name, ID, and optional extra
|
|
20
|
+
* properties used to qualify the lookup.
|
|
21
|
+
*
|
|
22
|
+
* @param name The _unique_ name of the resulting resource.
|
|
23
|
+
* @param id The _unique_ provider ID of the resource to lookup.
|
|
24
|
+
* @param state Any extra arguments used during the lookup.
|
|
25
|
+
* @param opts Optional settings to control the behavior of the CustomResource.
|
|
26
|
+
*/
|
|
27
|
+
static get(name, id, state, opts) {
|
|
28
|
+
return new FirewallConfig(name, state, Object.assign(Object.assign({}, opts), { id: id }));
|
|
29
|
+
}
|
|
30
|
+
/**
|
|
31
|
+
* Returns true if the given object is an instance of FirewallConfig. This is designed to work even
|
|
32
|
+
* when multiple copies of the Pulumi SDK have been loaded into the same process.
|
|
33
|
+
*/
|
|
34
|
+
static isInstance(obj) {
|
|
35
|
+
if (obj === undefined || obj === null) {
|
|
36
|
+
return false;
|
|
37
|
+
}
|
|
38
|
+
return obj['__pulumiType'] === FirewallConfig.__pulumiType;
|
|
39
|
+
}
|
|
40
|
+
constructor(name, argsOrState, opts) {
|
|
41
|
+
let resourceInputs = {};
|
|
42
|
+
opts = opts || {};
|
|
43
|
+
if (opts.id) {
|
|
44
|
+
const state = argsOrState;
|
|
45
|
+
resourceInputs["enabled"] = state ? state.enabled : undefined;
|
|
46
|
+
resourceInputs["ipRules"] = state ? state.ipRules : undefined;
|
|
47
|
+
resourceInputs["managedRulesets"] = state ? state.managedRulesets : undefined;
|
|
48
|
+
resourceInputs["projectId"] = state ? state.projectId : undefined;
|
|
49
|
+
resourceInputs["rules"] = state ? state.rules : undefined;
|
|
50
|
+
resourceInputs["teamId"] = state ? state.teamId : undefined;
|
|
51
|
+
}
|
|
52
|
+
else {
|
|
53
|
+
const args = argsOrState;
|
|
54
|
+
if ((!args || args.projectId === undefined) && !opts.urn) {
|
|
55
|
+
throw new Error("Missing required property 'projectId'");
|
|
56
|
+
}
|
|
57
|
+
resourceInputs["enabled"] = args ? args.enabled : undefined;
|
|
58
|
+
resourceInputs["ipRules"] = args ? args.ipRules : undefined;
|
|
59
|
+
resourceInputs["managedRulesets"] = args ? args.managedRulesets : undefined;
|
|
60
|
+
resourceInputs["projectId"] = args ? args.projectId : undefined;
|
|
61
|
+
resourceInputs["rules"] = args ? args.rules : undefined;
|
|
62
|
+
resourceInputs["teamId"] = args ? args.teamId : undefined;
|
|
63
|
+
}
|
|
64
|
+
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
65
|
+
super(FirewallConfig.__pulumiType, name, resourceInputs, opts);
|
|
66
|
+
}
|
|
67
|
+
}
|
|
68
|
+
exports.FirewallConfig = FirewallConfig;
|
|
69
|
+
/** @internal */
|
|
70
|
+
FirewallConfig.__pulumiType = 'vercel:index/firewallConfig:FirewallConfig';
|
|
71
|
+
//# sourceMappingURL=firewallConfig.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"firewallConfig.js","sourceRoot":"","sources":["../firewallConfig.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;GAQG;AACH,MAAa,cAAe,SAAQ,MAAM,CAAC,cAAc;IACrD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA2B,EAAE,IAAmC;QACzH,OAAO,IAAI,cAAc,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACrE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,cAAc,CAAC,YAAY,CAAC;IAC/D,CAAC;IAmCD,YAAY,IAAY,EAAE,WAAsD,EAAE,IAAmC;QACjH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA8C,CAAC;YAC7D,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAA6C,CAAC;YAC3D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,SAAS,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACtD,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,cAAc,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACnE,CAAC;;AAtFL,wCAuFC;AAzEG,gBAAgB;AACO,2BAAY,GAAG,4CAA4C,CAAC"}
|
package/index.d.ts
CHANGED
|
@@ -19,6 +19,9 @@ export declare const EdgeConfigSchema: typeof import("./edgeConfigSchema").EdgeC
|
|
|
19
19
|
export { EdgeConfigTokenArgs, EdgeConfigTokenState } from "./edgeConfigToken";
|
|
20
20
|
export type EdgeConfigToken = import("./edgeConfigToken").EdgeConfigToken;
|
|
21
21
|
export declare const EdgeConfigToken: typeof import("./edgeConfigToken").EdgeConfigToken;
|
|
22
|
+
export { FirewallConfigArgs, FirewallConfigState } from "./firewallConfig";
|
|
23
|
+
export type FirewallConfig = import("./firewallConfig").FirewallConfig;
|
|
24
|
+
export declare const FirewallConfig: typeof import("./firewallConfig").FirewallConfig;
|
|
22
25
|
export { GetAliasArgs, GetAliasResult, GetAliasOutputArgs } from "./getAlias";
|
|
23
26
|
export declare const getAlias: typeof import("./getAlias").getAlias;
|
|
24
27
|
export declare const getAliasOutput: typeof import("./getAlias").getAliasOutput;
|
package/index.js
CHANGED
|
@@ -2,7 +2,7 @@
|
|
|
2
2
|
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
3
|
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
4
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
-
exports.types = exports.config = exports.Webhook = exports.SharedEnvironmentVariable = exports.Provider = exports.ProjectFunctionCpu = exports.ProjectEnvironmentVariable = exports.ProjectDomain = exports.ProjectDeploymentRetention = exports.Project = exports.LogDrain = exports.getSharedEnvironmentVariableOutput = exports.getSharedEnvironmentVariable = exports.getProjectFunctionCpuOutput = exports.getProjectFunctionCpu = exports.getProjectDirectoryOutput = exports.getProjectDirectory = exports.getProjectDeploymentRetentionOutput = exports.getProjectDeploymentRetention = exports.getProjectOutput = exports.getProject = exports.getPrebuiltProjectOutput = exports.getPrebuiltProject = exports.getLogDrainOutput = exports.getLogDrain = exports.getFileOutput = exports.getFile = exports.getEndpointVerificationOutput = exports.getEndpointVerification = exports.getEdgeConfigTokenOutput = exports.getEdgeConfigToken = exports.getEdgeConfigSchemaOutput = exports.getEdgeConfigSchema = exports.getEdgeConfigOutput = exports.getEdgeConfig = exports.getDeploymentOutput = exports.getDeployment = exports.getAttackChallengeModeOutput = exports.getAttackChallengeMode = exports.getAliasOutput = exports.getAlias = exports.EdgeConfigToken = exports.EdgeConfigSchema = exports.EdgeConfig = exports.DnsRecord = exports.Deployment = exports.AttackChallengeMode = exports.Alias = void 0;
|
|
5
|
+
exports.types = exports.config = exports.Webhook = exports.SharedEnvironmentVariable = exports.Provider = exports.ProjectFunctionCpu = exports.ProjectEnvironmentVariable = exports.ProjectDomain = exports.ProjectDeploymentRetention = exports.Project = exports.LogDrain = exports.getSharedEnvironmentVariableOutput = exports.getSharedEnvironmentVariable = exports.getProjectFunctionCpuOutput = exports.getProjectFunctionCpu = exports.getProjectDirectoryOutput = exports.getProjectDirectory = exports.getProjectDeploymentRetentionOutput = exports.getProjectDeploymentRetention = exports.getProjectOutput = exports.getProject = exports.getPrebuiltProjectOutput = exports.getPrebuiltProject = exports.getLogDrainOutput = exports.getLogDrain = exports.getFileOutput = exports.getFile = exports.getEndpointVerificationOutput = exports.getEndpointVerification = exports.getEdgeConfigTokenOutput = exports.getEdgeConfigToken = exports.getEdgeConfigSchemaOutput = exports.getEdgeConfigSchema = exports.getEdgeConfigOutput = exports.getEdgeConfig = exports.getDeploymentOutput = exports.getDeployment = exports.getAttackChallengeModeOutput = exports.getAttackChallengeMode = exports.getAliasOutput = exports.getAlias = exports.FirewallConfig = exports.EdgeConfigToken = exports.EdgeConfigSchema = exports.EdgeConfig = exports.DnsRecord = exports.Deployment = exports.AttackChallengeMode = exports.Alias = void 0;
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
exports.Alias = null;
|
|
@@ -19,6 +19,8 @@ exports.EdgeConfigSchema = null;
|
|
|
19
19
|
utilities.lazyLoad(exports, ["EdgeConfigSchema"], () => require("./edgeConfigSchema"));
|
|
20
20
|
exports.EdgeConfigToken = null;
|
|
21
21
|
utilities.lazyLoad(exports, ["EdgeConfigToken"], () => require("./edgeConfigToken"));
|
|
22
|
+
exports.FirewallConfig = null;
|
|
23
|
+
utilities.lazyLoad(exports, ["FirewallConfig"], () => require("./firewallConfig"));
|
|
22
24
|
exports.getAlias = null;
|
|
23
25
|
exports.getAliasOutput = null;
|
|
24
26
|
utilities.lazyLoad(exports, ["getAlias", "getAliasOutput"], () => require("./getAlias"));
|
|
@@ -105,6 +107,8 @@ const _module = {
|
|
|
105
107
|
return new exports.EdgeConfigSchema(name, undefined, { urn });
|
|
106
108
|
case "vercel:index/edgeConfigToken:EdgeConfigToken":
|
|
107
109
|
return new exports.EdgeConfigToken(name, undefined, { urn });
|
|
110
|
+
case "vercel:index/firewallConfig:FirewallConfig":
|
|
111
|
+
return new exports.FirewallConfig(name, undefined, { urn });
|
|
108
112
|
case "vercel:index/logDrain:LogDrain":
|
|
109
113
|
return new exports.LogDrain(name, undefined, { urn });
|
|
110
114
|
case "vercel:index/project:Project":
|
|
@@ -133,6 +137,7 @@ pulumi.runtime.registerResourceModule("vercel", "index/dnsRecord", _module);
|
|
|
133
137
|
pulumi.runtime.registerResourceModule("vercel", "index/edgeConfig", _module);
|
|
134
138
|
pulumi.runtime.registerResourceModule("vercel", "index/edgeConfigSchema", _module);
|
|
135
139
|
pulumi.runtime.registerResourceModule("vercel", "index/edgeConfigToken", _module);
|
|
140
|
+
pulumi.runtime.registerResourceModule("vercel", "index/firewallConfig", _module);
|
|
136
141
|
pulumi.runtime.registerResourceModule("vercel", "index/logDrain", _module);
|
|
137
142
|
pulumi.runtime.registerResourceModule("vercel", "index/project", _module);
|
|
138
143
|
pulumi.runtime.registerResourceModule("vercel", "index/projectDeploymentRetention", _module);
|
package/index.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAK5B,QAAA,KAAK,GAAmC,IAAW,CAAC;AACjE,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,SAAS,CAAC,CAAC,CAAC;AAIpD,QAAA,mBAAmB,GAA+D,IAAW,CAAC;AAC3G,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,qBAAqB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,uBAAuB,CAAC,CAAC,CAAC;AAIhF,QAAA,UAAU,GAA6C,IAAW,CAAC;AAChF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,YAAY,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,cAAc,CAAC,CAAC,CAAC;AAI9D,QAAA,SAAS,GAA2C,IAAW,CAAC;AAC7E,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,WAAW,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC,CAAC;AAI5D,QAAA,UAAU,GAA6C,IAAW,CAAC;AAChF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,YAAY,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,cAAc,CAAC,CAAC,CAAC;AAI9D,QAAA,gBAAgB,GAAyD,IAAW,CAAC;AAClG,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,kBAAkB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,oBAAoB,CAAC,CAAC,CAAC;AAI1E,QAAA,eAAe,GAAuD,IAAW,CAAC;AAC/F,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,iBAAiB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,mBAAmB,CAAC,CAAC,CAAC;
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAK5B,QAAA,KAAK,GAAmC,IAAW,CAAC;AACjE,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,SAAS,CAAC,CAAC,CAAC;AAIpD,QAAA,mBAAmB,GAA+D,IAAW,CAAC;AAC3G,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,qBAAqB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,uBAAuB,CAAC,CAAC,CAAC;AAIhF,QAAA,UAAU,GAA6C,IAAW,CAAC;AAChF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,YAAY,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,cAAc,CAAC,CAAC,CAAC;AAI9D,QAAA,SAAS,GAA2C,IAAW,CAAC;AAC7E,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,WAAW,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC,CAAC;AAI5D,QAAA,UAAU,GAA6C,IAAW,CAAC;AAChF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,YAAY,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,cAAc,CAAC,CAAC,CAAC;AAI9D,QAAA,gBAAgB,GAAyD,IAAW,CAAC;AAClG,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,kBAAkB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,oBAAoB,CAAC,CAAC,CAAC;AAI1E,QAAA,eAAe,GAAuD,IAAW,CAAC;AAC/F,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,iBAAiB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,mBAAmB,CAAC,CAAC,CAAC;AAIxE,QAAA,cAAc,GAAqD,IAAW,CAAC;AAC5F,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,gBAAgB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,kBAAkB,CAAC,CAAC,CAAC;AAGtE,QAAA,QAAQ,GAAyC,IAAW,CAAC;AAC7D,QAAA,cAAc,GAA+C,IAAW,CAAC;AACtF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,UAAU,EAAC,gBAAgB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,YAAY,CAAC,CAAC,CAAC;AAG3E,QAAA,sBAAsB,GAAqE,IAAW,CAAC;AACvG,QAAA,4BAA4B,GAA2E,IAAW,CAAC;AAChI,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,wBAAwB,EAAC,8BAA8B,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,0BAA0B,CAAC,CAAC,CAAC;AAGrH,QAAA,aAAa,GAAmD,IAAW,CAAC;AAC5E,QAAA,mBAAmB,GAAyD,IAAW,CAAC;AACrG,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,eAAe,EAAC,qBAAqB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,iBAAiB,CAAC,CAAC,CAAC;AAG1F,QAAA,aAAa,GAAmD,IAAW,CAAC;AAC5E,QAAA,mBAAmB,GAAyD,IAAW,CAAC;AACrG,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,eAAe,EAAC,qBAAqB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,iBAAiB,CAAC,CAAC,CAAC;AAG1F,QAAA,mBAAmB,GAA+D,IAAW,CAAC;AAC9F,QAAA,yBAAyB,GAAqE,IAAW,CAAC;AACvH,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,qBAAqB,EAAC,2BAA2B,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,uBAAuB,CAAC,CAAC,CAAC;AAG5G,QAAA,kBAAkB,GAA6D,IAAW,CAAC;AAC3F,QAAA,wBAAwB,GAAmE,IAAW,CAAC;AACpH,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,oBAAoB,EAAC,0BAA0B,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,sBAAsB,CAAC,CAAC,CAAC;AAGzG,QAAA,uBAAuB,GAAuE,IAAW,CAAC;AAC1G,QAAA,6BAA6B,GAA6E,IAAW,CAAC;AACnI,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,yBAAyB,EAAC,+BAA+B,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,2BAA2B,CAAC,CAAC,CAAC;AAGxH,QAAA,OAAO,GAAuC,IAAW,CAAC;AAC1D,QAAA,aAAa,GAA6C,IAAW,CAAC;AACnF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,SAAS,EAAC,eAAe,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,WAAW,CAAC,CAAC,CAAC;AAGxE,QAAA,WAAW,GAA+C,IAAW,CAAC;AACtE,QAAA,iBAAiB,GAAqD,IAAW,CAAC;AAC/F,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,aAAa,EAAC,mBAAmB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,eAAe,CAAC,CAAC,CAAC;AAGpF,QAAA,kBAAkB,GAA6D,IAAW,CAAC;AAC3F,QAAA,wBAAwB,GAAmE,IAAW,CAAC;AACpH,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,oBAAoB,EAAC,0BAA0B,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,sBAAsB,CAAC,CAAC,CAAC;AAGzG,QAAA,UAAU,GAA6C,IAAW,CAAC;AACnE,QAAA,gBAAgB,GAAmD,IAAW,CAAC;AAC5F,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,YAAY,EAAC,kBAAkB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,cAAc,CAAC,CAAC,CAAC;AAGjF,QAAA,6BAA6B,GAAmF,IAAW,CAAC;AAC5H,QAAA,mCAAmC,GAAyF,IAAW,CAAC;AACrJ,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,+BAA+B,EAAC,qCAAqC,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,iCAAiC,CAAC,CAAC,CAAC;AAG1I,QAAA,mBAAmB,GAA+D,IAAW,CAAC;AAC9F,QAAA,yBAAyB,GAAqE,IAAW,CAAC;AACvH,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,qBAAqB,EAAC,2BAA2B,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,uBAAuB,CAAC,CAAC,CAAC;AAG5G,QAAA,qBAAqB,GAAmE,IAAW,CAAC;AACpG,QAAA,2BAA2B,GAAyE,IAAW,CAAC;AAC7H,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,uBAAuB,EAAC,6BAA6B,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,yBAAyB,CAAC,CAAC,CAAC;AAGlH,QAAA,4BAA4B,GAAiF,IAAW,CAAC;AACzH,QAAA,kCAAkC,GAAuF,IAAW,CAAC;AAClJ,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,8BAA8B,EAAC,oCAAoC,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,gCAAgC,CAAC,CAAC,CAAC;AAIvI,QAAA,QAAQ,GAAyC,IAAW,CAAC;AAC1E,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,UAAU,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,YAAY,CAAC,CAAC,CAAC;AAI1D,QAAA,OAAO,GAAuC,IAAW,CAAC;AACvE,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,SAAS,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,WAAW,CAAC,CAAC,CAAC;AAIxD,QAAA,0BAA0B,GAA6E,IAAW,CAAC;AAChI,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,4BAA4B,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,8BAA8B,CAAC,CAAC,CAAC;AAI9F,QAAA,aAAa,GAAmD,IAAW,CAAC;AACzF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,eAAe,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,iBAAiB,CAAC,CAAC,CAAC;AAIpE,QAAA,0BAA0B,GAA6E,IAAW,CAAC;AAChI,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,4BAA4B,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,8BAA8B,CAAC,CAAC,CAAC;AAI9F,QAAA,kBAAkB,GAA6D,IAAW,CAAC;AACxG,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,oBAAoB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,sBAAsB,CAAC,CAAC,CAAC;AAI9E,QAAA,QAAQ,GAAyC,IAAW,CAAC;AAC1E,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,UAAU,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,YAAY,CAAC,CAAC,CAAC;AAI1D,QAAA,yBAAyB,GAA2E,IAAW,CAAC;AAC7H,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,2BAA2B,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,6BAA6B,CAAC,CAAC,CAAC;AAI5F,QAAA,OAAO,GAAuC,IAAW,CAAC;AACvE,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,SAAS,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,WAAW,CAAC,CAAC,CAAC;AAGrE,sBAAsB;AACtB,mCAAmC;AAI/B,wBAAM;AAHV,iCAAiC;AAI7B,sBAAK;AAGT,MAAM,OAAO,GAAG;IACZ,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE;IAC/B,SAAS,EAAE,CAAC,IAAY,EAAE,IAAY,EAAE,GAAW,EAAmB,EAAE;QACpE,QAAQ,IAAI,EAAE;YACV,KAAK,0BAA0B;gBAC3B,OAAO,IAAI,aAAK,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACnD,KAAK,sDAAsD;gBACvD,OAAO,IAAI,2BAAmB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACjE,KAAK,oCAAoC;gBACrC,OAAO,IAAI,kBAAU,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACxD,KAAK,kCAAkC;gBACnC,OAAO,IAAI,iBAAS,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACvD,KAAK,oCAAoC;gBACrC,OAAO,IAAI,kBAAU,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACxD,KAAK,gDAAgD;gBACjD,OAAO,IAAI,wBAAgB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC9D,KAAK,8CAA8C;gBAC/C,OAAO,IAAI,uBAAe,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC7D,KAAK,4CAA4C;gBAC7C,OAAO,IAAI,sBAAc,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC5D,KAAK,gCAAgC;gBACjC,OAAO,IAAI,gBAAQ,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACtD,KAAK,8BAA8B;gBAC/B,OAAO,IAAI,eAAO,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACrD,KAAK,oEAAoE;gBACrE,OAAO,IAAI,kCAA0B,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACxE,KAAK,0CAA0C;gBAC3C,OAAO,IAAI,qBAAa,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC3D,KAAK,oEAAoE;gBACrE,OAAO,IAAI,kCAA0B,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACxE,KAAK,oDAAoD;gBACrD,OAAO,IAAI,0BAAkB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAChE,KAAK,kEAAkE;gBACnE,OAAO,IAAI,iCAAyB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACvE,KAAK,8BAA8B;gBAC/B,OAAO,IAAI,eAAO,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACrD;gBACI,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,EAAE,CAAC,CAAC;SACxD;IACL,CAAC;CACJ,CAAC;AACF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,QAAQ,EAAE,aAAa,EAAE,OAAO,CAAC,CAAA;AACvE,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,QAAQ,EAAE,2BAA2B,EAAE,OAAO,CAAC,CAAA;AACrF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,QAAQ,EAAE,kBAAkB,EAAE,OAAO,CAAC,CAAA;AAC5E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,QAAQ,EAAE,iBAAiB,EAAE,OAAO,CAAC,CAAA;AAC3E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,QAAQ,EAAE,kBAAkB,EAAE,OAAO,CAAC,CAAA;AAC5E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,QAAQ,EAAE,wBAAwB,EAAE,OAAO,CAAC,CAAA;AAClF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,QAAQ,EAAE,uBAAuB,EAAE,OAAO,CAAC,CAAA;AACjF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,QAAQ,EAAE,sBAAsB,EAAE,OAAO,CAAC,CAAA;AAChF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,QAAQ,EAAE,gBAAgB,EAAE,OAAO,CAAC,CAAA;AAC1E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,QAAQ,EAAE,eAAe,EAAE,OAAO,CAAC,CAAA;AACzE,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,QAAQ,EAAE,kCAAkC,EAAE,OAAO,CAAC,CAAA;AAC5F,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,QAAQ,EAAE,qBAAqB,EAAE,OAAO,CAAC,CAAA;AAC/E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,QAAQ,EAAE,kCAAkC,EAAE,OAAO,CAAC,CAAA;AAC5F,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,QAAQ,EAAE,0BAA0B,EAAE,OAAO,CAAC,CAAA;AACpF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,QAAQ,EAAE,iCAAiC,EAAE,OAAO,CAAC,CAAA;AAC3F,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,QAAQ,EAAE,eAAe,EAAE,OAAO,CAAC,CAAA;AACzE,MAAM,CAAC,OAAO,CAAC,uBAAuB,CAAC,QAAQ,EAAE;IAC7C,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE;IAC/B,iBAAiB,EAAE,CAAC,IAAY,EAAE,IAAY,EAAE,GAAW,EAA2B,EAAE;QACpF,IAAI,IAAI,KAAK,yBAAyB,EAAE;YACpC,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,EAAE,CAAC,CAAC;SACpD;QACD,OAAO,IAAI,gBAAQ,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAC;IACvD,CAAC;CACJ,CAAC,CAAC"}
|
package/package.json
CHANGED
package/types/input.d.ts
CHANGED
|
@@ -40,6 +40,205 @@ export interface DnsRecordSrv {
|
|
|
40
40
|
*/
|
|
41
41
|
weight: pulumi.Input<number>;
|
|
42
42
|
}
|
|
43
|
+
export interface FirewallConfigIpRules {
|
|
44
|
+
rules?: pulumi.Input<pulumi.Input<inputs.FirewallConfigIpRulesRule>[]>;
|
|
45
|
+
}
|
|
46
|
+
export interface FirewallConfigIpRulesRule {
|
|
47
|
+
action: pulumi.Input<string>;
|
|
48
|
+
/**
|
|
49
|
+
* Hosts to apply these rules to
|
|
50
|
+
*/
|
|
51
|
+
hostname: pulumi.Input<string>;
|
|
52
|
+
/**
|
|
53
|
+
* The ID of this resource.
|
|
54
|
+
*/
|
|
55
|
+
id?: pulumi.Input<string>;
|
|
56
|
+
/**
|
|
57
|
+
* IP or CIDR to block
|
|
58
|
+
*/
|
|
59
|
+
ip: pulumi.Input<string>;
|
|
60
|
+
notes?: pulumi.Input<string>;
|
|
61
|
+
}
|
|
62
|
+
export interface FirewallConfigManagedRulesets {
|
|
63
|
+
/**
|
|
64
|
+
* Enable the owasp managed rulesets and select ruleset behaviors
|
|
65
|
+
*/
|
|
66
|
+
owasp?: pulumi.Input<inputs.FirewallConfigManagedRulesetsOwasp>;
|
|
67
|
+
}
|
|
68
|
+
export interface FirewallConfigManagedRulesetsOwasp {
|
|
69
|
+
/**
|
|
70
|
+
* Generic Attack Detection
|
|
71
|
+
*/
|
|
72
|
+
gen?: pulumi.Input<inputs.FirewallConfigManagedRulesetsOwaspGen>;
|
|
73
|
+
/**
|
|
74
|
+
* Java Attack Detection
|
|
75
|
+
*/
|
|
76
|
+
java?: pulumi.Input<inputs.FirewallConfigManagedRulesetsOwaspJava>;
|
|
77
|
+
/**
|
|
78
|
+
* Local File Inclusion Rules
|
|
79
|
+
*/
|
|
80
|
+
lfi?: pulumi.Input<inputs.FirewallConfigManagedRulesetsOwaspLfi>;
|
|
81
|
+
/**
|
|
82
|
+
* Multipart Rules
|
|
83
|
+
*/
|
|
84
|
+
ma?: pulumi.Input<inputs.FirewallConfigManagedRulesetsOwaspMa>;
|
|
85
|
+
/**
|
|
86
|
+
* PHP Attack Detection
|
|
87
|
+
*/
|
|
88
|
+
php?: pulumi.Input<inputs.FirewallConfigManagedRulesetsOwaspPhp>;
|
|
89
|
+
/**
|
|
90
|
+
* Remote Code Execution Rules
|
|
91
|
+
*/
|
|
92
|
+
rce?: pulumi.Input<inputs.FirewallConfigManagedRulesetsOwaspRce>;
|
|
93
|
+
/**
|
|
94
|
+
* Remote File Inclusion Rules
|
|
95
|
+
*/
|
|
96
|
+
rfi?: pulumi.Input<inputs.FirewallConfigManagedRulesetsOwaspRfi>;
|
|
97
|
+
/**
|
|
98
|
+
* Scanner Detection Rules
|
|
99
|
+
*/
|
|
100
|
+
sd?: pulumi.Input<inputs.FirewallConfigManagedRulesetsOwaspSd>;
|
|
101
|
+
/**
|
|
102
|
+
* SQL Injection Rules
|
|
103
|
+
*/
|
|
104
|
+
sqli?: pulumi.Input<inputs.FirewallConfigManagedRulesetsOwaspSqli>;
|
|
105
|
+
/**
|
|
106
|
+
* Cross Site Scripting Rules
|
|
107
|
+
*/
|
|
108
|
+
xss?: pulumi.Input<inputs.FirewallConfigManagedRulesetsOwaspXss>;
|
|
109
|
+
}
|
|
110
|
+
export interface FirewallConfigManagedRulesetsOwaspGen {
|
|
111
|
+
action: pulumi.Input<string>;
|
|
112
|
+
active?: pulumi.Input<boolean>;
|
|
113
|
+
}
|
|
114
|
+
export interface FirewallConfigManagedRulesetsOwaspJava {
|
|
115
|
+
action: pulumi.Input<string>;
|
|
116
|
+
active?: pulumi.Input<boolean>;
|
|
117
|
+
}
|
|
118
|
+
export interface FirewallConfigManagedRulesetsOwaspLfi {
|
|
119
|
+
action: pulumi.Input<string>;
|
|
120
|
+
active?: pulumi.Input<boolean>;
|
|
121
|
+
}
|
|
122
|
+
export interface FirewallConfigManagedRulesetsOwaspMa {
|
|
123
|
+
action: pulumi.Input<string>;
|
|
124
|
+
active?: pulumi.Input<boolean>;
|
|
125
|
+
}
|
|
126
|
+
export interface FirewallConfigManagedRulesetsOwaspPhp {
|
|
127
|
+
action: pulumi.Input<string>;
|
|
128
|
+
active?: pulumi.Input<boolean>;
|
|
129
|
+
}
|
|
130
|
+
export interface FirewallConfigManagedRulesetsOwaspRce {
|
|
131
|
+
action: pulumi.Input<string>;
|
|
132
|
+
active?: pulumi.Input<boolean>;
|
|
133
|
+
}
|
|
134
|
+
export interface FirewallConfigManagedRulesetsOwaspRfi {
|
|
135
|
+
action: pulumi.Input<string>;
|
|
136
|
+
active?: pulumi.Input<boolean>;
|
|
137
|
+
}
|
|
138
|
+
export interface FirewallConfigManagedRulesetsOwaspSd {
|
|
139
|
+
action: pulumi.Input<string>;
|
|
140
|
+
active?: pulumi.Input<boolean>;
|
|
141
|
+
}
|
|
142
|
+
export interface FirewallConfigManagedRulesetsOwaspSqli {
|
|
143
|
+
action: pulumi.Input<string>;
|
|
144
|
+
active?: pulumi.Input<boolean>;
|
|
145
|
+
}
|
|
146
|
+
export interface FirewallConfigManagedRulesetsOwaspXss {
|
|
147
|
+
action: pulumi.Input<string>;
|
|
148
|
+
active?: pulumi.Input<boolean>;
|
|
149
|
+
}
|
|
150
|
+
export interface FirewallConfigRules {
|
|
151
|
+
rules?: pulumi.Input<pulumi.Input<inputs.FirewallConfigRulesRule>[]>;
|
|
152
|
+
}
|
|
153
|
+
export interface FirewallConfigRulesRule {
|
|
154
|
+
/**
|
|
155
|
+
* Actions to take when the condition groups match a request
|
|
156
|
+
*/
|
|
157
|
+
action: pulumi.Input<inputs.FirewallConfigRulesRuleAction>;
|
|
158
|
+
/**
|
|
159
|
+
* Rule is active or disabled
|
|
160
|
+
*/
|
|
161
|
+
active?: pulumi.Input<boolean>;
|
|
162
|
+
/**
|
|
163
|
+
* Sets of conditions that may match a request
|
|
164
|
+
*/
|
|
165
|
+
conditionGroups: pulumi.Input<pulumi.Input<inputs.FirewallConfigRulesRuleConditionGroup>[]>;
|
|
166
|
+
description?: pulumi.Input<string>;
|
|
167
|
+
/**
|
|
168
|
+
* The ID of this resource.
|
|
169
|
+
*/
|
|
170
|
+
id?: pulumi.Input<string>;
|
|
171
|
+
/**
|
|
172
|
+
* Name to identify the rule
|
|
173
|
+
*/
|
|
174
|
+
name: pulumi.Input<string>;
|
|
175
|
+
}
|
|
176
|
+
export interface FirewallConfigRulesRuleAction {
|
|
177
|
+
/**
|
|
178
|
+
* Base action
|
|
179
|
+
*/
|
|
180
|
+
action: pulumi.Input<string>;
|
|
181
|
+
/**
|
|
182
|
+
* Forward persistence of a rule aciton
|
|
183
|
+
*/
|
|
184
|
+
actionDuration?: pulumi.Input<string>;
|
|
185
|
+
/**
|
|
186
|
+
* Behavior or a rate limiting action. Required if action is rate*limit
|
|
187
|
+
*/
|
|
188
|
+
rateLimit?: pulumi.Input<inputs.FirewallConfigRulesRuleActionRateLimit>;
|
|
189
|
+
/**
|
|
190
|
+
* How to redirect a request. Required if action is redirect
|
|
191
|
+
*/
|
|
192
|
+
redirect?: pulumi.Input<inputs.FirewallConfigRulesRuleActionRedirect>;
|
|
193
|
+
}
|
|
194
|
+
export interface FirewallConfigRulesRuleActionRateLimit {
|
|
195
|
+
/**
|
|
196
|
+
* Action to take when rate limit is exceeded
|
|
197
|
+
*/
|
|
198
|
+
action: pulumi.Input<string>;
|
|
199
|
+
/**
|
|
200
|
+
* Rate limiting algorithm
|
|
201
|
+
*/
|
|
202
|
+
algo: pulumi.Input<string>;
|
|
203
|
+
/**
|
|
204
|
+
* Keys used to bucket an individual client
|
|
205
|
+
*/
|
|
206
|
+
keys: pulumi.Input<pulumi.Input<string>[]>;
|
|
207
|
+
/**
|
|
208
|
+
* number of requests allowed in the window
|
|
209
|
+
*/
|
|
210
|
+
limit: pulumi.Input<number>;
|
|
211
|
+
/**
|
|
212
|
+
* Time window in seconds
|
|
213
|
+
*/
|
|
214
|
+
window: pulumi.Input<number>;
|
|
215
|
+
}
|
|
216
|
+
export interface FirewallConfigRulesRuleActionRedirect {
|
|
217
|
+
location: pulumi.Input<string>;
|
|
218
|
+
permanent: pulumi.Input<boolean>;
|
|
219
|
+
}
|
|
220
|
+
export interface FirewallConfigRulesRuleConditionGroup {
|
|
221
|
+
/**
|
|
222
|
+
* Conditions that must all match within a group
|
|
223
|
+
*/
|
|
224
|
+
conditions: pulumi.Input<pulumi.Input<inputs.FirewallConfigRulesRuleConditionGroupCondition>[]>;
|
|
225
|
+
}
|
|
226
|
+
export interface FirewallConfigRulesRuleConditionGroupCondition {
|
|
227
|
+
/**
|
|
228
|
+
* Key within type to match against
|
|
229
|
+
*/
|
|
230
|
+
key?: pulumi.Input<string>;
|
|
231
|
+
neg?: pulumi.Input<boolean>;
|
|
232
|
+
/**
|
|
233
|
+
* How to comparse type to value
|
|
234
|
+
*/
|
|
235
|
+
op: pulumi.Input<string>;
|
|
236
|
+
/**
|
|
237
|
+
* Request key type to match against
|
|
238
|
+
*/
|
|
239
|
+
type: pulumi.Input<string>;
|
|
240
|
+
value?: pulumi.Input<string>;
|
|
241
|
+
}
|
|
43
242
|
export interface ProjectEnvironment {
|
|
44
243
|
/**
|
|
45
244
|
* The git branch of the Environment Variable.
|
package/types/output.d.ts
CHANGED
|
@@ -39,6 +39,205 @@ export interface DnsRecordSrv {
|
|
|
39
39
|
*/
|
|
40
40
|
weight: number;
|
|
41
41
|
}
|
|
42
|
+
export interface FirewallConfigIpRules {
|
|
43
|
+
rules?: outputs.FirewallConfigIpRulesRule[];
|
|
44
|
+
}
|
|
45
|
+
export interface FirewallConfigIpRulesRule {
|
|
46
|
+
action: string;
|
|
47
|
+
/**
|
|
48
|
+
* Hosts to apply these rules to
|
|
49
|
+
*/
|
|
50
|
+
hostname: string;
|
|
51
|
+
/**
|
|
52
|
+
* The ID of this resource.
|
|
53
|
+
*/
|
|
54
|
+
id: string;
|
|
55
|
+
/**
|
|
56
|
+
* IP or CIDR to block
|
|
57
|
+
*/
|
|
58
|
+
ip: string;
|
|
59
|
+
notes?: string;
|
|
60
|
+
}
|
|
61
|
+
export interface FirewallConfigManagedRulesets {
|
|
62
|
+
/**
|
|
63
|
+
* Enable the owasp managed rulesets and select ruleset behaviors
|
|
64
|
+
*/
|
|
65
|
+
owasp?: outputs.FirewallConfigManagedRulesetsOwasp;
|
|
66
|
+
}
|
|
67
|
+
export interface FirewallConfigManagedRulesetsOwasp {
|
|
68
|
+
/**
|
|
69
|
+
* Generic Attack Detection
|
|
70
|
+
*/
|
|
71
|
+
gen?: outputs.FirewallConfigManagedRulesetsOwaspGen;
|
|
72
|
+
/**
|
|
73
|
+
* Java Attack Detection
|
|
74
|
+
*/
|
|
75
|
+
java?: outputs.FirewallConfigManagedRulesetsOwaspJava;
|
|
76
|
+
/**
|
|
77
|
+
* Local File Inclusion Rules
|
|
78
|
+
*/
|
|
79
|
+
lfi?: outputs.FirewallConfigManagedRulesetsOwaspLfi;
|
|
80
|
+
/**
|
|
81
|
+
* Multipart Rules
|
|
82
|
+
*/
|
|
83
|
+
ma?: outputs.FirewallConfigManagedRulesetsOwaspMa;
|
|
84
|
+
/**
|
|
85
|
+
* PHP Attack Detection
|
|
86
|
+
*/
|
|
87
|
+
php?: outputs.FirewallConfigManagedRulesetsOwaspPhp;
|
|
88
|
+
/**
|
|
89
|
+
* Remote Code Execution Rules
|
|
90
|
+
*/
|
|
91
|
+
rce?: outputs.FirewallConfigManagedRulesetsOwaspRce;
|
|
92
|
+
/**
|
|
93
|
+
* Remote File Inclusion Rules
|
|
94
|
+
*/
|
|
95
|
+
rfi?: outputs.FirewallConfigManagedRulesetsOwaspRfi;
|
|
96
|
+
/**
|
|
97
|
+
* Scanner Detection Rules
|
|
98
|
+
*/
|
|
99
|
+
sd?: outputs.FirewallConfigManagedRulesetsOwaspSd;
|
|
100
|
+
/**
|
|
101
|
+
* SQL Injection Rules
|
|
102
|
+
*/
|
|
103
|
+
sqli?: outputs.FirewallConfigManagedRulesetsOwaspSqli;
|
|
104
|
+
/**
|
|
105
|
+
* Cross Site Scripting Rules
|
|
106
|
+
*/
|
|
107
|
+
xss?: outputs.FirewallConfigManagedRulesetsOwaspXss;
|
|
108
|
+
}
|
|
109
|
+
export interface FirewallConfigManagedRulesetsOwaspGen {
|
|
110
|
+
action: string;
|
|
111
|
+
active?: boolean;
|
|
112
|
+
}
|
|
113
|
+
export interface FirewallConfigManagedRulesetsOwaspJava {
|
|
114
|
+
action: string;
|
|
115
|
+
active?: boolean;
|
|
116
|
+
}
|
|
117
|
+
export interface FirewallConfigManagedRulesetsOwaspLfi {
|
|
118
|
+
action: string;
|
|
119
|
+
active?: boolean;
|
|
120
|
+
}
|
|
121
|
+
export interface FirewallConfigManagedRulesetsOwaspMa {
|
|
122
|
+
action: string;
|
|
123
|
+
active?: boolean;
|
|
124
|
+
}
|
|
125
|
+
export interface FirewallConfigManagedRulesetsOwaspPhp {
|
|
126
|
+
action: string;
|
|
127
|
+
active?: boolean;
|
|
128
|
+
}
|
|
129
|
+
export interface FirewallConfigManagedRulesetsOwaspRce {
|
|
130
|
+
action: string;
|
|
131
|
+
active?: boolean;
|
|
132
|
+
}
|
|
133
|
+
export interface FirewallConfigManagedRulesetsOwaspRfi {
|
|
134
|
+
action: string;
|
|
135
|
+
active?: boolean;
|
|
136
|
+
}
|
|
137
|
+
export interface FirewallConfigManagedRulesetsOwaspSd {
|
|
138
|
+
action: string;
|
|
139
|
+
active?: boolean;
|
|
140
|
+
}
|
|
141
|
+
export interface FirewallConfigManagedRulesetsOwaspSqli {
|
|
142
|
+
action: string;
|
|
143
|
+
active?: boolean;
|
|
144
|
+
}
|
|
145
|
+
export interface FirewallConfigManagedRulesetsOwaspXss {
|
|
146
|
+
action: string;
|
|
147
|
+
active?: boolean;
|
|
148
|
+
}
|
|
149
|
+
export interface FirewallConfigRules {
|
|
150
|
+
rules?: outputs.FirewallConfigRulesRule[];
|
|
151
|
+
}
|
|
152
|
+
export interface FirewallConfigRulesRule {
|
|
153
|
+
/**
|
|
154
|
+
* Actions to take when the condition groups match a request
|
|
155
|
+
*/
|
|
156
|
+
action: outputs.FirewallConfigRulesRuleAction;
|
|
157
|
+
/**
|
|
158
|
+
* Rule is active or disabled
|
|
159
|
+
*/
|
|
160
|
+
active?: boolean;
|
|
161
|
+
/**
|
|
162
|
+
* Sets of conditions that may match a request
|
|
163
|
+
*/
|
|
164
|
+
conditionGroups: outputs.FirewallConfigRulesRuleConditionGroup[];
|
|
165
|
+
description?: string;
|
|
166
|
+
/**
|
|
167
|
+
* The ID of this resource.
|
|
168
|
+
*/
|
|
169
|
+
id: string;
|
|
170
|
+
/**
|
|
171
|
+
* Name to identify the rule
|
|
172
|
+
*/
|
|
173
|
+
name: string;
|
|
174
|
+
}
|
|
175
|
+
export interface FirewallConfigRulesRuleAction {
|
|
176
|
+
/**
|
|
177
|
+
* Base action
|
|
178
|
+
*/
|
|
179
|
+
action: string;
|
|
180
|
+
/**
|
|
181
|
+
* Forward persistence of a rule aciton
|
|
182
|
+
*/
|
|
183
|
+
actionDuration?: string;
|
|
184
|
+
/**
|
|
185
|
+
* Behavior or a rate limiting action. Required if action is rate*limit
|
|
186
|
+
*/
|
|
187
|
+
rateLimit?: outputs.FirewallConfigRulesRuleActionRateLimit;
|
|
188
|
+
/**
|
|
189
|
+
* How to redirect a request. Required if action is redirect
|
|
190
|
+
*/
|
|
191
|
+
redirect?: outputs.FirewallConfigRulesRuleActionRedirect;
|
|
192
|
+
}
|
|
193
|
+
export interface FirewallConfigRulesRuleActionRateLimit {
|
|
194
|
+
/**
|
|
195
|
+
* Action to take when rate limit is exceeded
|
|
196
|
+
*/
|
|
197
|
+
action: string;
|
|
198
|
+
/**
|
|
199
|
+
* Rate limiting algorithm
|
|
200
|
+
*/
|
|
201
|
+
algo: string;
|
|
202
|
+
/**
|
|
203
|
+
* Keys used to bucket an individual client
|
|
204
|
+
*/
|
|
205
|
+
keys: string[];
|
|
206
|
+
/**
|
|
207
|
+
* number of requests allowed in the window
|
|
208
|
+
*/
|
|
209
|
+
limit: number;
|
|
210
|
+
/**
|
|
211
|
+
* Time window in seconds
|
|
212
|
+
*/
|
|
213
|
+
window: number;
|
|
214
|
+
}
|
|
215
|
+
export interface FirewallConfigRulesRuleActionRedirect {
|
|
216
|
+
location: string;
|
|
217
|
+
permanent: boolean;
|
|
218
|
+
}
|
|
219
|
+
export interface FirewallConfigRulesRuleConditionGroup {
|
|
220
|
+
/**
|
|
221
|
+
* Conditions that must all match within a group
|
|
222
|
+
*/
|
|
223
|
+
conditions: outputs.FirewallConfigRulesRuleConditionGroupCondition[];
|
|
224
|
+
}
|
|
225
|
+
export interface FirewallConfigRulesRuleConditionGroupCondition {
|
|
226
|
+
/**
|
|
227
|
+
* Key within type to match against
|
|
228
|
+
*/
|
|
229
|
+
key?: string;
|
|
230
|
+
neg?: boolean;
|
|
231
|
+
/**
|
|
232
|
+
* How to comparse type to value
|
|
233
|
+
*/
|
|
234
|
+
op: string;
|
|
235
|
+
/**
|
|
236
|
+
* Request key type to match against
|
|
237
|
+
*/
|
|
238
|
+
type: string;
|
|
239
|
+
value?: string;
|
|
240
|
+
}
|
|
42
241
|
export interface GetProjectEnvironment {
|
|
43
242
|
/**
|
|
44
243
|
* The git branch of the environment variable.
|