UNPKG

@pulumi/f5bigip

Version:

A Pulumi package for creating and managing F5 BigIP resources.

218 lines • 12 kB
"use strict"; // *** WARNING: this file was generated by pulumi-language-nodejs. *** // *** Do not edit by hand unless you're certain you know what you are doing! *** var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) { if (k2 === undefined) k2 = k; var desc = Object.getOwnPropertyDescriptor(m, k); if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) { desc = { enumerable: true, get: function() { return m[k]; } }; } Object.defineProperty(o, k2, desc); }) : (function(o, m, k, k2) { if (k2 === undefined) k2 = k; o[k2] = m[k]; })); var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) { Object.defineProperty(o, "default", { enumerable: true, value: v }); }) : function(o, v) { o["default"] = v; }); var __importStar = (this && this.__importStar) || function (mod) { if (mod && mod.__esModule) return mod; var result = {}; if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k); __setModuleDefault(result, mod); return result; }; Object.defineProperty(exports, "__esModule", { value: true }); exports.ProfileClientSsl = void 0; const pulumi = __importStar(require("@pulumi/pulumi")); const utilities = __importStar(require("../utilities")); /** * `f5bigip.ltm.ProfileClientSsl` Manages client SSL profiles on a BIG-IP * * Resources should be named with their "full path". The full path is the combination of the partition + name (example: /Common/my-pool ) or partition + directory + name of the resource (example: /Common/test/my-pool ) * * ## Example Usage * * ```typescript * import * as pulumi from "@pulumi/pulumi"; * import * as f5bigip from "@pulumi/f5bigip"; * * const test_ClientSsl = new f5bigip.ltm.ProfileClientSsl("test-ClientSsl", { * name: "/Common/test-ClientSsl", * defaultsFrom: "/Common/clientssl", * authenticate: "always", * ciphers: "DEFAULT", * }); * ``` * * ## Importing * * An existing client-ssl profile can be imported into this resource by supplying client-ssl profile Name in `full path` as `id`. * An example is below: * ```sh * $ terraform import bigip_ltm_profile_client_ssl.test-ClientSsl-import /Common/test-ClientSsl * ``` */ class ProfileClientSsl extends pulumi.CustomResource { /** * Get an existing ProfileClientSsl resource's state with the given name, ID, and optional extra * properties used to qualify the lookup. * * @param name The _unique_ name of the resulting resource. * @param id The _unique_ provider ID of the resource to lookup. * @param state Any extra arguments used during the lookup. * @param opts Optional settings to control the behavior of the CustomResource. */ static get(name, id, state, opts) { return new ProfileClientSsl(name, state, { ...opts, id: id }); } /** @internal */ static __pulumiType = 'f5bigip:ltm/profileClientSsl:ProfileClientSsl'; /** * Returns true if the given object is an instance of ProfileClientSsl. This is designed to work even * when multiple copies of the Pulumi SDK have been loaded into the same process. */ static isInstance(obj) { if (obj === undefined || obj === null) { return false; } return obj['__pulumiType'] === ProfileClientSsl.__pulumiType; } constructor(name, argsOrState, opts) { let resourceInputs = {}; opts = opts || {}; if (opts.id) { const state = argsOrState; resourceInputs["alertTimeout"] = state?.alertTimeout; resourceInputs["allowExpiredCrl"] = state?.allowExpiredCrl; resourceInputs["allowNonSsl"] = state?.allowNonSsl; resourceInputs["authenticate"] = state?.authenticate; resourceInputs["authenticateDepth"] = state?.authenticateDepth; resourceInputs["c3dClientFallbackCert"] = state?.c3dClientFallbackCert; resourceInputs["c3dDropUnknownOcspStatus"] = state?.c3dDropUnknownOcspStatus; resourceInputs["c3dOcsp"] = state?.c3dOcsp; resourceInputs["caFile"] = state?.caFile; resourceInputs["cacheSize"] = state?.cacheSize; resourceInputs["cacheTimeout"] = state?.cacheTimeout; resourceInputs["cert"] = state?.cert; resourceInputs["certExtensionIncludes"] = state?.certExtensionIncludes; resourceInputs["certKeyChain"] = state?.certKeyChain; resourceInputs["certLifeSpan"] = state?.certLifeSpan; resourceInputs["certLookupByIpaddrPort"] = state?.certLookupByIpaddrPort; resourceInputs["chain"] = state?.chain; resourceInputs["cipherGroup"] = state?.cipherGroup; resourceInputs["ciphers"] = state?.ciphers; resourceInputs["clientCertCa"] = state?.clientCertCa; resourceInputs["crlFile"] = state?.crlFile; resourceInputs["defaultsFrom"] = state?.defaultsFrom; resourceInputs["forwardProxyBypassDefaultAction"] = state?.forwardProxyBypassDefaultAction; resourceInputs["fullPath"] = state?.fullPath; resourceInputs["generation"] = state?.generation; resourceInputs["genericAlert"] = state?.genericAlert; resourceInputs["handshakeTimeout"] = state?.handshakeTimeout; resourceInputs["inheritCertKeychain"] = state?.inheritCertKeychain; resourceInputs["key"] = state?.key; resourceInputs["modSslMethods"] = state?.modSslMethods; resourceInputs["mode"] = state?.mode; resourceInputs["name"] = state?.name; resourceInputs["ocspStapling"] = state?.ocspStapling; resourceInputs["partition"] = state?.partition; resourceInputs["passphrase"] = state?.passphrase; resourceInputs["peerCertMode"] = state?.peerCertMode; resourceInputs["proxyCaCert"] = state?.proxyCaCert; resourceInputs["proxyCaKey"] = state?.proxyCaKey; resourceInputs["proxyCaPassphrase"] = state?.proxyCaPassphrase; resourceInputs["proxySsl"] = state?.proxySsl; resourceInputs["proxySslPassthrough"] = state?.proxySslPassthrough; resourceInputs["renegotiatePeriod"] = state?.renegotiatePeriod; resourceInputs["renegotiateSize"] = state?.renegotiateSize; resourceInputs["renegotiation"] = state?.renegotiation; resourceInputs["retainCertificate"] = state?.retainCertificate; resourceInputs["secureRenegotiation"] = state?.secureRenegotiation; resourceInputs["serverName"] = state?.serverName; resourceInputs["sessionMirroring"] = state?.sessionMirroring; resourceInputs["sessionTicket"] = state?.sessionTicket; resourceInputs["sniDefault"] = state?.sniDefault; resourceInputs["sniRequire"] = state?.sniRequire; resourceInputs["sslC3d"] = state?.sslC3d; resourceInputs["sslForwardProxy"] = state?.sslForwardProxy; resourceInputs["sslForwardProxyBypass"] = state?.sslForwardProxyBypass; resourceInputs["sslSignHash"] = state?.sslSignHash; resourceInputs["strictResume"] = state?.strictResume; resourceInputs["tmOptions"] = state?.tmOptions; resourceInputs["uncleanShutdown"] = state?.uncleanShutdown; } else { const args = argsOrState; if (args?.name === undefined && !opts.urn) { throw new Error("Missing required property 'name'"); } resourceInputs["alertTimeout"] = args?.alertTimeout; resourceInputs["allowExpiredCrl"] = args?.allowExpiredCrl; resourceInputs["allowNonSsl"] = args?.allowNonSsl; resourceInputs["authenticate"] = args?.authenticate; resourceInputs["authenticateDepth"] = args?.authenticateDepth; resourceInputs["c3dClientFallbackCert"] = args?.c3dClientFallbackCert; resourceInputs["c3dDropUnknownOcspStatus"] = args?.c3dDropUnknownOcspStatus; resourceInputs["c3dOcsp"] = args?.c3dOcsp; resourceInputs["caFile"] = args?.caFile; resourceInputs["cacheSize"] = args?.cacheSize; resourceInputs["cacheTimeout"] = args?.cacheTimeout; resourceInputs["cert"] = args?.cert; resourceInputs["certExtensionIncludes"] = args?.certExtensionIncludes; resourceInputs["certKeyChain"] = args?.certKeyChain; resourceInputs["certLifeSpan"] = args?.certLifeSpan; resourceInputs["certLookupByIpaddrPort"] = args?.certLookupByIpaddrPort; resourceInputs["chain"] = args?.chain; resourceInputs["cipherGroup"] = args?.cipherGroup; resourceInputs["ciphers"] = args?.ciphers; resourceInputs["clientCertCa"] = args?.clientCertCa; resourceInputs["crlFile"] = args?.crlFile; resourceInputs["defaultsFrom"] = args?.defaultsFrom; resourceInputs["forwardProxyBypassDefaultAction"] = args?.forwardProxyBypassDefaultAction; resourceInputs["fullPath"] = args?.fullPath; resourceInputs["generation"] = args?.generation; resourceInputs["genericAlert"] = args?.genericAlert; resourceInputs["handshakeTimeout"] = args?.handshakeTimeout; resourceInputs["inheritCertKeychain"] = args?.inheritCertKeychain; resourceInputs["key"] = args?.key; resourceInputs["modSslMethods"] = args?.modSslMethods; resourceInputs["mode"] = args?.mode; resourceInputs["name"] = args?.name; resourceInputs["ocspStapling"] = args?.ocspStapling; resourceInputs["partition"] = args?.partition; resourceInputs["passphrase"] = args?.passphrase ? pulumi.secret(args.passphrase) : undefined; resourceInputs["peerCertMode"] = args?.peerCertMode; resourceInputs["proxyCaCert"] = args?.proxyCaCert; resourceInputs["proxyCaKey"] = args?.proxyCaKey; resourceInputs["proxyCaPassphrase"] = args?.proxyCaPassphrase; resourceInputs["proxySsl"] = args?.proxySsl; resourceInputs["proxySslPassthrough"] = args?.proxySslPassthrough; resourceInputs["renegotiatePeriod"] = args?.renegotiatePeriod; resourceInputs["renegotiateSize"] = args?.renegotiateSize; resourceInputs["renegotiation"] = args?.renegotiation; resourceInputs["retainCertificate"] = args?.retainCertificate; resourceInputs["secureRenegotiation"] = args?.secureRenegotiation; resourceInputs["serverName"] = args?.serverName; resourceInputs["sessionMirroring"] = args?.sessionMirroring; resourceInputs["sessionTicket"] = args?.sessionTicket; resourceInputs["sniDefault"] = args?.sniDefault; resourceInputs["sniRequire"] = args?.sniRequire; resourceInputs["sslC3d"] = args?.sslC3d; resourceInputs["sslForwardProxy"] = args?.sslForwardProxy; resourceInputs["sslForwardProxyBypass"] = args?.sslForwardProxyBypass; resourceInputs["sslSignHash"] = args?.sslSignHash; resourceInputs["strictResume"] = args?.strictResume; resourceInputs["tmOptions"] = args?.tmOptions; resourceInputs["uncleanShutdown"] = args?.uncleanShutdown; } opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts); const secretOpts = { additionalSecretOutputs: ["passphrase"] }; opts = pulumi.mergeOptions(opts, secretOpts); super(ProfileClientSsl.__pulumiType, name, resourceInputs, opts); } } exports.ProfileClientSsl = ProfileClientSsl; //# sourceMappingURL=profileClientSsl.js.map