@pulumi/f5bigip
Version:
A Pulumi package for creating and managing F5 BigIP resources.
218 lines • 12 kB
JavaScript
;
// *** WARNING: this file was generated by pulumi-language-nodejs. ***
// *** Do not edit by hand unless you're certain you know what you are doing! ***
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
if (k2 === undefined) k2 = k;
var desc = Object.getOwnPropertyDescriptor(m, k);
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
desc = { enumerable: true, get: function() { return m[k]; } };
}
Object.defineProperty(o, k2, desc);
}) : (function(o, m, k, k2) {
if (k2 === undefined) k2 = k;
o[k2] = m[k];
}));
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
Object.defineProperty(o, "default", { enumerable: true, value: v });
}) : function(o, v) {
o["default"] = v;
});
var __importStar = (this && this.__importStar) || function (mod) {
if (mod && mod.__esModule) return mod;
var result = {};
if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
__setModuleDefault(result, mod);
return result;
};
Object.defineProperty(exports, "__esModule", { value: true });
exports.ProfileClientSsl = void 0;
const pulumi = __importStar(require("@pulumi/pulumi"));
const utilities = __importStar(require("../utilities"));
/**
* `f5bigip.ltm.ProfileClientSsl` Manages client SSL profiles on a BIG-IP
*
* Resources should be named with their "full path". The full path is the combination of the partition + name (example: /Common/my-pool ) or partition + directory + name of the resource (example: /Common/test/my-pool )
*
* ## Example Usage
*
* ```typescript
* import * as pulumi from "@pulumi/pulumi";
* import * as f5bigip from "@pulumi/f5bigip";
*
* const test_ClientSsl = new f5bigip.ltm.ProfileClientSsl("test-ClientSsl", {
* name: "/Common/test-ClientSsl",
* defaultsFrom: "/Common/clientssl",
* authenticate: "always",
* ciphers: "DEFAULT",
* });
* ```
*
* ## Importing
*
* An existing client-ssl profile can be imported into this resource by supplying client-ssl profile Name in `full path` as `id`.
* An example is below:
* ```sh
* $ terraform import bigip_ltm_profile_client_ssl.test-ClientSsl-import /Common/test-ClientSsl
* ```
*/
class ProfileClientSsl extends pulumi.CustomResource {
/**
* Get an existing ProfileClientSsl resource's state with the given name, ID, and optional extra
* properties used to qualify the lookup.
*
* @param name The _unique_ name of the resulting resource.
* @param id The _unique_ provider ID of the resource to lookup.
* @param state Any extra arguments used during the lookup.
* @param opts Optional settings to control the behavior of the CustomResource.
*/
static get(name, id, state, opts) {
return new ProfileClientSsl(name, state, { ...opts, id: id });
}
/** @internal */
static __pulumiType = 'f5bigip:ltm/profileClientSsl:ProfileClientSsl';
/**
* Returns true if the given object is an instance of ProfileClientSsl. This is designed to work even
* when multiple copies of the Pulumi SDK have been loaded into the same process.
*/
static isInstance(obj) {
if (obj === undefined || obj === null) {
return false;
}
return obj['__pulumiType'] === ProfileClientSsl.__pulumiType;
}
constructor(name, argsOrState, opts) {
let resourceInputs = {};
opts = opts || {};
if (opts.id) {
const state = argsOrState;
resourceInputs["alertTimeout"] = state?.alertTimeout;
resourceInputs["allowExpiredCrl"] = state?.allowExpiredCrl;
resourceInputs["allowNonSsl"] = state?.allowNonSsl;
resourceInputs["authenticate"] = state?.authenticate;
resourceInputs["authenticateDepth"] = state?.authenticateDepth;
resourceInputs["c3dClientFallbackCert"] = state?.c3dClientFallbackCert;
resourceInputs["c3dDropUnknownOcspStatus"] = state?.c3dDropUnknownOcspStatus;
resourceInputs["c3dOcsp"] = state?.c3dOcsp;
resourceInputs["caFile"] = state?.caFile;
resourceInputs["cacheSize"] = state?.cacheSize;
resourceInputs["cacheTimeout"] = state?.cacheTimeout;
resourceInputs["cert"] = state?.cert;
resourceInputs["certExtensionIncludes"] = state?.certExtensionIncludes;
resourceInputs["certKeyChain"] = state?.certKeyChain;
resourceInputs["certLifeSpan"] = state?.certLifeSpan;
resourceInputs["certLookupByIpaddrPort"] = state?.certLookupByIpaddrPort;
resourceInputs["chain"] = state?.chain;
resourceInputs["cipherGroup"] = state?.cipherGroup;
resourceInputs["ciphers"] = state?.ciphers;
resourceInputs["clientCertCa"] = state?.clientCertCa;
resourceInputs["crlFile"] = state?.crlFile;
resourceInputs["defaultsFrom"] = state?.defaultsFrom;
resourceInputs["forwardProxyBypassDefaultAction"] = state?.forwardProxyBypassDefaultAction;
resourceInputs["fullPath"] = state?.fullPath;
resourceInputs["generation"] = state?.generation;
resourceInputs["genericAlert"] = state?.genericAlert;
resourceInputs["handshakeTimeout"] = state?.handshakeTimeout;
resourceInputs["inheritCertKeychain"] = state?.inheritCertKeychain;
resourceInputs["key"] = state?.key;
resourceInputs["modSslMethods"] = state?.modSslMethods;
resourceInputs["mode"] = state?.mode;
resourceInputs["name"] = state?.name;
resourceInputs["ocspStapling"] = state?.ocspStapling;
resourceInputs["partition"] = state?.partition;
resourceInputs["passphrase"] = state?.passphrase;
resourceInputs["peerCertMode"] = state?.peerCertMode;
resourceInputs["proxyCaCert"] = state?.proxyCaCert;
resourceInputs["proxyCaKey"] = state?.proxyCaKey;
resourceInputs["proxyCaPassphrase"] = state?.proxyCaPassphrase;
resourceInputs["proxySsl"] = state?.proxySsl;
resourceInputs["proxySslPassthrough"] = state?.proxySslPassthrough;
resourceInputs["renegotiatePeriod"] = state?.renegotiatePeriod;
resourceInputs["renegotiateSize"] = state?.renegotiateSize;
resourceInputs["renegotiation"] = state?.renegotiation;
resourceInputs["retainCertificate"] = state?.retainCertificate;
resourceInputs["secureRenegotiation"] = state?.secureRenegotiation;
resourceInputs["serverName"] = state?.serverName;
resourceInputs["sessionMirroring"] = state?.sessionMirroring;
resourceInputs["sessionTicket"] = state?.sessionTicket;
resourceInputs["sniDefault"] = state?.sniDefault;
resourceInputs["sniRequire"] = state?.sniRequire;
resourceInputs["sslC3d"] = state?.sslC3d;
resourceInputs["sslForwardProxy"] = state?.sslForwardProxy;
resourceInputs["sslForwardProxyBypass"] = state?.sslForwardProxyBypass;
resourceInputs["sslSignHash"] = state?.sslSignHash;
resourceInputs["strictResume"] = state?.strictResume;
resourceInputs["tmOptions"] = state?.tmOptions;
resourceInputs["uncleanShutdown"] = state?.uncleanShutdown;
}
else {
const args = argsOrState;
if (args?.name === undefined && !opts.urn) {
throw new Error("Missing required property 'name'");
}
resourceInputs["alertTimeout"] = args?.alertTimeout;
resourceInputs["allowExpiredCrl"] = args?.allowExpiredCrl;
resourceInputs["allowNonSsl"] = args?.allowNonSsl;
resourceInputs["authenticate"] = args?.authenticate;
resourceInputs["authenticateDepth"] = args?.authenticateDepth;
resourceInputs["c3dClientFallbackCert"] = args?.c3dClientFallbackCert;
resourceInputs["c3dDropUnknownOcspStatus"] = args?.c3dDropUnknownOcspStatus;
resourceInputs["c3dOcsp"] = args?.c3dOcsp;
resourceInputs["caFile"] = args?.caFile;
resourceInputs["cacheSize"] = args?.cacheSize;
resourceInputs["cacheTimeout"] = args?.cacheTimeout;
resourceInputs["cert"] = args?.cert;
resourceInputs["certExtensionIncludes"] = args?.certExtensionIncludes;
resourceInputs["certKeyChain"] = args?.certKeyChain;
resourceInputs["certLifeSpan"] = args?.certLifeSpan;
resourceInputs["certLookupByIpaddrPort"] = args?.certLookupByIpaddrPort;
resourceInputs["chain"] = args?.chain;
resourceInputs["cipherGroup"] = args?.cipherGroup;
resourceInputs["ciphers"] = args?.ciphers;
resourceInputs["clientCertCa"] = args?.clientCertCa;
resourceInputs["crlFile"] = args?.crlFile;
resourceInputs["defaultsFrom"] = args?.defaultsFrom;
resourceInputs["forwardProxyBypassDefaultAction"] = args?.forwardProxyBypassDefaultAction;
resourceInputs["fullPath"] = args?.fullPath;
resourceInputs["generation"] = args?.generation;
resourceInputs["genericAlert"] = args?.genericAlert;
resourceInputs["handshakeTimeout"] = args?.handshakeTimeout;
resourceInputs["inheritCertKeychain"] = args?.inheritCertKeychain;
resourceInputs["key"] = args?.key;
resourceInputs["modSslMethods"] = args?.modSslMethods;
resourceInputs["mode"] = args?.mode;
resourceInputs["name"] = args?.name;
resourceInputs["ocspStapling"] = args?.ocspStapling;
resourceInputs["partition"] = args?.partition;
resourceInputs["passphrase"] = args?.passphrase ? pulumi.secret(args.passphrase) : undefined;
resourceInputs["peerCertMode"] = args?.peerCertMode;
resourceInputs["proxyCaCert"] = args?.proxyCaCert;
resourceInputs["proxyCaKey"] = args?.proxyCaKey;
resourceInputs["proxyCaPassphrase"] = args?.proxyCaPassphrase;
resourceInputs["proxySsl"] = args?.proxySsl;
resourceInputs["proxySslPassthrough"] = args?.proxySslPassthrough;
resourceInputs["renegotiatePeriod"] = args?.renegotiatePeriod;
resourceInputs["renegotiateSize"] = args?.renegotiateSize;
resourceInputs["renegotiation"] = args?.renegotiation;
resourceInputs["retainCertificate"] = args?.retainCertificate;
resourceInputs["secureRenegotiation"] = args?.secureRenegotiation;
resourceInputs["serverName"] = args?.serverName;
resourceInputs["sessionMirroring"] = args?.sessionMirroring;
resourceInputs["sessionTicket"] = args?.sessionTicket;
resourceInputs["sniDefault"] = args?.sniDefault;
resourceInputs["sniRequire"] = args?.sniRequire;
resourceInputs["sslC3d"] = args?.sslC3d;
resourceInputs["sslForwardProxy"] = args?.sslForwardProxy;
resourceInputs["sslForwardProxyBypass"] = args?.sslForwardProxyBypass;
resourceInputs["sslSignHash"] = args?.sslSignHash;
resourceInputs["strictResume"] = args?.strictResume;
resourceInputs["tmOptions"] = args?.tmOptions;
resourceInputs["uncleanShutdown"] = args?.uncleanShutdown;
}
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
const secretOpts = { additionalSecretOutputs: ["passphrase"] };
opts = pulumi.mergeOptions(opts, secretOpts);
super(ProfileClientSsl.__pulumiType, name, resourceInputs, opts);
}
}
exports.ProfileClientSsl = ProfileClientSsl;
//# sourceMappingURL=profileClientSsl.js.map