@bdzscaler/pulumi-zia
Version:
A Pulumi package for creating and managing zia cloud resources.
167 lines • 14.6 kB
JavaScript
// *** WARNING: this file was generated by pulumi-language-nodejs. ***
// *** Do not edit by hand unless you're certain you know what you are doing! ***
Object.defineProperty(exports, "__esModule", { value: true });
exports.AdvancedSettings = void 0;
const pulumi = require("@pulumi/pulumi");
const utilities = require("./utilities");
/**
* * [Official documentation](https://help.zscaler.com/zia/configuring-advanced-settings)
* * [API documentation](https://help.zscaler.com/zia/advanced-settings#/advancedSettings-get)
*
* The **zia_advanced_settings** resource alows you to updates the advanced settings configuration in the ZIA Admin Portal. To learn more see [Configuring Advanced Settings](https://help.zscaler.com/zia/configuring-advanced-settings)
*
* ## Example Usage
*
* ## Import
*
* Zscaler offers a dedicated tool called Zscaler-Terraformer to allow the automated import of ZIA configurations into Terraform-compliant HashiCorp Configuration Language.
*
* Visit
*
* **zia_advanced_settings** can be imported by using `advanced_settings` as the import ID.
*
* For example:
*
* ```sh
* $ pulumi import zia:index/advancedSettings:AdvancedSettings this "advanced_settings"
* ```
*/
class AdvancedSettings extends pulumi.CustomResource {
/**
* Get an existing AdvancedSettings resource's state with the given name, ID, and optional extra
* properties used to qualify the lookup.
*
* @param name The _unique_ name of the resulting resource.
* @param id The _unique_ provider ID of the resource to lookup.
* @param state Any extra arguments used during the lookup.
* @param opts Optional settings to control the behavior of the CustomResource.
*/
static get(name, id, state, opts) {
return new AdvancedSettings(name, state, Object.assign(Object.assign({}, opts), { id: id }));
}
/**
* Returns true if the given object is an instance of AdvancedSettings. This is designed to work even
* when multiple copies of the Pulumi SDK have been loaded into the same process.
*/
static isInstance(obj) {
if (obj === undefined || obj === null) {
return false;
}
return obj['__pulumiType'] === AdvancedSettings.__pulumiType;
}
constructor(name, argsOrState, opts) {
let resourceInputs = {};
opts = opts || {};
if (opts.id) {
const state = argsOrState;
resourceInputs["authBypassApps"] = state ? state.authBypassApps : undefined;
resourceInputs["authBypassUrlCategories"] = state ? state.authBypassUrlCategories : undefined;
resourceInputs["authBypassUrls"] = state ? state.authBypassUrls : undefined;
resourceInputs["basicBypassApps"] = state ? state.basicBypassApps : undefined;
resourceInputs["basicBypassUrlCategories"] = state ? state.basicBypassUrlCategories : undefined;
resourceInputs["blockConnectHostSniMismatch"] = state ? state.blockConnectHostSniMismatch : undefined;
resourceInputs["blockDomainFrontingApps"] = state ? state.blockDomainFrontingApps : undefined;
resourceInputs["blockDomainFrontingOnHostHeader"] = state ? state.blockDomainFrontingOnHostHeader : undefined;
resourceInputs["blockHttpTunnelOnNonHttpPorts"] = state ? state.blockHttpTunnelOnNonHttpPorts : undefined;
resourceInputs["blockNonCompliantHttpRequestOnHttpPorts"] = state ? state.blockNonCompliantHttpRequestOnHttpPorts : undefined;
resourceInputs["blockNonHttpOnHttpPortEnabled"] = state ? state.blockNonHttpOnHttpPortEnabled : undefined;
resourceInputs["cascadeUrlFiltering"] = state ? state.cascadeUrlFiltering : undefined;
resourceInputs["digestAuthBypassApps"] = state ? state.digestAuthBypassApps : undefined;
resourceInputs["digestAuthBypassUrlCategories"] = state ? state.digestAuthBypassUrlCategories : undefined;
resourceInputs["digestAuthBypassUrls"] = state ? state.digestAuthBypassUrls : undefined;
resourceInputs["dnsResolutionOnTransparentProxyApps"] = state ? state.dnsResolutionOnTransparentProxyApps : undefined;
resourceInputs["dnsResolutionOnTransparentProxyExemptApps"] = state ? state.dnsResolutionOnTransparentProxyExemptApps : undefined;
resourceInputs["dnsResolutionOnTransparentProxyExemptUrlCategories"] = state ? state.dnsResolutionOnTransparentProxyExemptUrlCategories : undefined;
resourceInputs["dnsResolutionOnTransparentProxyExemptUrls"] = state ? state.dnsResolutionOnTransparentProxyExemptUrls : undefined;
resourceInputs["dnsResolutionOnTransparentProxyIpv6Apps"] = state ? state.dnsResolutionOnTransparentProxyIpv6Apps : undefined;
resourceInputs["dnsResolutionOnTransparentProxyIpv6ExemptApps"] = state ? state.dnsResolutionOnTransparentProxyIpv6ExemptApps : undefined;
resourceInputs["dnsResolutionOnTransparentProxyIpv6ExemptUrlCategories"] = state ? state.dnsResolutionOnTransparentProxyIpv6ExemptUrlCategories : undefined;
resourceInputs["dnsResolutionOnTransparentProxyIpv6UrlCategories"] = state ? state.dnsResolutionOnTransparentProxyIpv6UrlCategories : undefined;
resourceInputs["dnsResolutionOnTransparentProxyUrlCategories"] = state ? state.dnsResolutionOnTransparentProxyUrlCategories : undefined;
resourceInputs["dnsResolutionOnTransparentProxyUrls"] = state ? state.dnsResolutionOnTransparentProxyUrls : undefined;
resourceInputs["domainFrontingBypassUrlCategories"] = state ? state.domainFrontingBypassUrlCategories : undefined;
resourceInputs["dynamicUserRiskEnabled"] = state ? state.dynamicUserRiskEnabled : undefined;
resourceInputs["ecsForAllEnabled"] = state ? state.ecsForAllEnabled : undefined;
resourceInputs["enableAdminRankAccess"] = state ? state.enableAdminRankAccess : undefined;
resourceInputs["enableDnsResolutionOnTransparentProxy"] = state ? state.enableDnsResolutionOnTransparentProxy : undefined;
resourceInputs["enableEvaluatePolicyOnGlobalSslBypass"] = state ? state.enableEvaluatePolicyOnGlobalSslBypass : undefined;
resourceInputs["enableIpv6DnsOptimizationOnAllTransparentProxy"] = state ? state.enableIpv6DnsOptimizationOnAllTransparentProxy : undefined;
resourceInputs["enableIpv6DnsResolutionOnTransparentProxy"] = state ? state.enableIpv6DnsResolutionOnTransparentProxy : undefined;
resourceInputs["enableOffice365"] = state ? state.enableOffice365 : undefined;
resourceInputs["enablePolicyForUnauthenticatedTraffic"] = state ? state.enablePolicyForUnauthenticatedTraffic : undefined;
resourceInputs["enforceSurrogateIpForWindowsApp"] = state ? state.enforceSurrogateIpForWindowsApp : undefined;
resourceInputs["http2NonbrowserTrafficEnabled"] = state ? state.http2NonbrowserTrafficEnabled : undefined;
resourceInputs["httpRangeHeaderRemoveUrlCategories"] = state ? state.httpRangeHeaderRemoveUrlCategories : undefined;
resourceInputs["kerberosBypassApps"] = state ? state.kerberosBypassApps : undefined;
resourceInputs["kerberosBypassUrlCategories"] = state ? state.kerberosBypassUrlCategories : undefined;
resourceInputs["kerberosBypassUrls"] = state ? state.kerberosBypassUrls : undefined;
resourceInputs["logInternalIp"] = state ? state.logInternalIp : undefined;
resourceInputs["preferSniOverConnHost"] = state ? state.preferSniOverConnHost : undefined;
resourceInputs["preferSniOverConnHostApps"] = state ? state.preferSniOverConnHostApps : undefined;
resourceInputs["sipaXffHeaderEnabled"] = state ? state.sipaXffHeaderEnabled : undefined;
resourceInputs["sniDnsOptimizationBypassUrlCategories"] = state ? state.sniDnsOptimizationBypassUrlCategories : undefined;
resourceInputs["trackHttpTunnelOnHttpPorts"] = state ? state.trackHttpTunnelOnHttpPorts : undefined;
resourceInputs["uiSessionTimeout"] = state ? state.uiSessionTimeout : undefined;
resourceInputs["zscalerClientConnector1AndPacRoadWarriorInFirewall"] = state ? state.zscalerClientConnector1AndPacRoadWarriorInFirewall : undefined;
}
else {
const args = argsOrState;
resourceInputs["authBypassApps"] = args ? args.authBypassApps : undefined;
resourceInputs["authBypassUrlCategories"] = args ? args.authBypassUrlCategories : undefined;
resourceInputs["authBypassUrls"] = args ? args.authBypassUrls : undefined;
resourceInputs["basicBypassApps"] = args ? args.basicBypassApps : undefined;
resourceInputs["basicBypassUrlCategories"] = args ? args.basicBypassUrlCategories : undefined;
resourceInputs["blockConnectHostSniMismatch"] = args ? args.blockConnectHostSniMismatch : undefined;
resourceInputs["blockDomainFrontingApps"] = args ? args.blockDomainFrontingApps : undefined;
resourceInputs["blockDomainFrontingOnHostHeader"] = args ? args.blockDomainFrontingOnHostHeader : undefined;
resourceInputs["blockHttpTunnelOnNonHttpPorts"] = args ? args.blockHttpTunnelOnNonHttpPorts : undefined;
resourceInputs["blockNonCompliantHttpRequestOnHttpPorts"] = args ? args.blockNonCompliantHttpRequestOnHttpPorts : undefined;
resourceInputs["blockNonHttpOnHttpPortEnabled"] = args ? args.blockNonHttpOnHttpPortEnabled : undefined;
resourceInputs["cascadeUrlFiltering"] = args ? args.cascadeUrlFiltering : undefined;
resourceInputs["digestAuthBypassApps"] = args ? args.digestAuthBypassApps : undefined;
resourceInputs["digestAuthBypassUrlCategories"] = args ? args.digestAuthBypassUrlCategories : undefined;
resourceInputs["digestAuthBypassUrls"] = args ? args.digestAuthBypassUrls : undefined;
resourceInputs["dnsResolutionOnTransparentProxyApps"] = args ? args.dnsResolutionOnTransparentProxyApps : undefined;
resourceInputs["dnsResolutionOnTransparentProxyExemptApps"] = args ? args.dnsResolutionOnTransparentProxyExemptApps : undefined;
resourceInputs["dnsResolutionOnTransparentProxyExemptUrlCategories"] = args ? args.dnsResolutionOnTransparentProxyExemptUrlCategories : undefined;
resourceInputs["dnsResolutionOnTransparentProxyExemptUrls"] = args ? args.dnsResolutionOnTransparentProxyExemptUrls : undefined;
resourceInputs["dnsResolutionOnTransparentProxyIpv6Apps"] = args ? args.dnsResolutionOnTransparentProxyIpv6Apps : undefined;
resourceInputs["dnsResolutionOnTransparentProxyIpv6ExemptApps"] = args ? args.dnsResolutionOnTransparentProxyIpv6ExemptApps : undefined;
resourceInputs["dnsResolutionOnTransparentProxyIpv6ExemptUrlCategories"] = args ? args.dnsResolutionOnTransparentProxyIpv6ExemptUrlCategories : undefined;
resourceInputs["dnsResolutionOnTransparentProxyIpv6UrlCategories"] = args ? args.dnsResolutionOnTransparentProxyIpv6UrlCategories : undefined;
resourceInputs["dnsResolutionOnTransparentProxyUrlCategories"] = args ? args.dnsResolutionOnTransparentProxyUrlCategories : undefined;
resourceInputs["dnsResolutionOnTransparentProxyUrls"] = args ? args.dnsResolutionOnTransparentProxyUrls : undefined;
resourceInputs["domainFrontingBypassUrlCategories"] = args ? args.domainFrontingBypassUrlCategories : undefined;
resourceInputs["dynamicUserRiskEnabled"] = args ? args.dynamicUserRiskEnabled : undefined;
resourceInputs["ecsForAllEnabled"] = args ? args.ecsForAllEnabled : undefined;
resourceInputs["enableAdminRankAccess"] = args ? args.enableAdminRankAccess : undefined;
resourceInputs["enableDnsResolutionOnTransparentProxy"] = args ? args.enableDnsResolutionOnTransparentProxy : undefined;
resourceInputs["enableEvaluatePolicyOnGlobalSslBypass"] = args ? args.enableEvaluatePolicyOnGlobalSslBypass : undefined;
resourceInputs["enableIpv6DnsOptimizationOnAllTransparentProxy"] = args ? args.enableIpv6DnsOptimizationOnAllTransparentProxy : undefined;
resourceInputs["enableIpv6DnsResolutionOnTransparentProxy"] = args ? args.enableIpv6DnsResolutionOnTransparentProxy : undefined;
resourceInputs["enableOffice365"] = args ? args.enableOffice365 : undefined;
resourceInputs["enablePolicyForUnauthenticatedTraffic"] = args ? args.enablePolicyForUnauthenticatedTraffic : undefined;
resourceInputs["enforceSurrogateIpForWindowsApp"] = args ? args.enforceSurrogateIpForWindowsApp : undefined;
resourceInputs["http2NonbrowserTrafficEnabled"] = args ? args.http2NonbrowserTrafficEnabled : undefined;
resourceInputs["httpRangeHeaderRemoveUrlCategories"] = args ? args.httpRangeHeaderRemoveUrlCategories : undefined;
resourceInputs["kerberosBypassApps"] = args ? args.kerberosBypassApps : undefined;
resourceInputs["kerberosBypassUrlCategories"] = args ? args.kerberosBypassUrlCategories : undefined;
resourceInputs["kerberosBypassUrls"] = args ? args.kerberosBypassUrls : undefined;
resourceInputs["logInternalIp"] = args ? args.logInternalIp : undefined;
resourceInputs["preferSniOverConnHost"] = args ? args.preferSniOverConnHost : undefined;
resourceInputs["preferSniOverConnHostApps"] = args ? args.preferSniOverConnHostApps : undefined;
resourceInputs["sipaXffHeaderEnabled"] = args ? args.sipaXffHeaderEnabled : undefined;
resourceInputs["sniDnsOptimizationBypassUrlCategories"] = args ? args.sniDnsOptimizationBypassUrlCategories : undefined;
resourceInputs["trackHttpTunnelOnHttpPorts"] = args ? args.trackHttpTunnelOnHttpPorts : undefined;
resourceInputs["uiSessionTimeout"] = args ? args.uiSessionTimeout : undefined;
resourceInputs["zscalerClientConnector1AndPacRoadWarriorInFirewall"] = args ? args.zscalerClientConnector1AndPacRoadWarriorInFirewall : undefined;
}
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
super(AdvancedSettings.__pulumiType, name, resourceInputs, opts);
}
}
exports.AdvancedSettings = AdvancedSettings;
/** @internal */
AdvancedSettings.__pulumiType = 'zia:index/advancedSettings:AdvancedSettings';
//# sourceMappingURL=advancedSettings.js.map
;