UNPKG

@pulumi/f5bigip

Version:

A Pulumi package for creating and managing F5 BigIP resources.

205 lines • 11.1 kB
"use strict"; // *** WARNING: this file was generated by pulumi-language-nodejs. *** // *** Do not edit by hand unless you're certain you know what you are doing! *** var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) { if (k2 === undefined) k2 = k; var desc = Object.getOwnPropertyDescriptor(m, k); if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) { desc = { enumerable: true, get: function() { return m[k]; } }; } Object.defineProperty(o, k2, desc); }) : (function(o, m, k, k2) { if (k2 === undefined) k2 = k; o[k2] = m[k]; })); var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) { Object.defineProperty(o, "default", { enumerable: true, value: v }); }) : function(o, v) { o["default"] = v; }); var __importStar = (this && this.__importStar) || function (mod) { if (mod && mod.__esModule) return mod; var result = {}; if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k); __setModuleDefault(result, mod); return result; }; Object.defineProperty(exports, "__esModule", { value: true }); exports.ProfileServerSsl = void 0; const pulumi = __importStar(require("@pulumi/pulumi")); const utilities = __importStar(require("../utilities")); /** * `f5bigip.ltm.ProfileServerSsl` Manages server SSL profiles on a BIG-IP * * Resources should be named with their "full path". The full path is the combination of the partition + name (example: /Common/my-pool ) or partition + directory + name of the resource (example: /Common/test/my-pool ) * * ## Example Usage * * ```typescript * import * as pulumi from "@pulumi/pulumi"; * import * as f5bigip from "@pulumi/f5bigip"; * * const test_ServerSsl = new f5bigip.ltm.ProfileServerSsl("test-ServerSsl", { * name: "/Common/test-ServerSsl", * defaultsFrom: "/Common/serverssl", * authenticate: "always", * ciphers: "DEFAULT", * }); * ``` * * ## Importing * * An existing server-ssl profile can be imported into this resource by supplying server-ssl profile Name in `full path` as `id`. * An example is below: * ```sh * $ terraform import bigip_ltm_profile_server_ssl.test-ServerSsl-import /Common/test-ServerSsl * * ``` */ class ProfileServerSsl extends pulumi.CustomResource { /** * Get an existing ProfileServerSsl resource's state with the given name, ID, and optional extra * properties used to qualify the lookup. * * @param name The _unique_ name of the resulting resource. * @param id The _unique_ provider ID of the resource to lookup. * @param state Any extra arguments used during the lookup. * @param opts Optional settings to control the behavior of the CustomResource. */ static get(name, id, state, opts) { return new ProfileServerSsl(name, state, { ...opts, id: id }); } /** @internal */ static __pulumiType = 'f5bigip:ltm/profileServerSsl:ProfileServerSsl'; /** * Returns true if the given object is an instance of ProfileServerSsl. This is designed to work even * when multiple copies of the Pulumi SDK have been loaded into the same process. */ static isInstance(obj) { if (obj === undefined || obj === null) { return false; } return obj['__pulumiType'] === ProfileServerSsl.__pulumiType; } constructor(name, argsOrState, opts) { let resourceInputs = {}; opts = opts || {}; if (opts.id) { const state = argsOrState; resourceInputs["alertTimeout"] = state?.alertTimeout; resourceInputs["authenticate"] = state?.authenticate; resourceInputs["authenticateDepth"] = state?.authenticateDepth; resourceInputs["c3dCaCert"] = state?.c3dCaCert; resourceInputs["c3dCaKey"] = state?.c3dCaKey; resourceInputs["c3dCaPassphrase"] = state?.c3dCaPassphrase; resourceInputs["c3dCertExtensionCustomOids"] = state?.c3dCertExtensionCustomOids; resourceInputs["c3dCertExtensionIncludes"] = state?.c3dCertExtensionIncludes; resourceInputs["c3dCertLifespan"] = state?.c3dCertLifespan; resourceInputs["c3dCertificateExtensions"] = state?.c3dCertificateExtensions; resourceInputs["caFile"] = state?.caFile; resourceInputs["cacheSize"] = state?.cacheSize; resourceInputs["cacheTimeout"] = state?.cacheTimeout; resourceInputs["cert"] = state?.cert; resourceInputs["chain"] = state?.chain; resourceInputs["cipherGroup"] = state?.cipherGroup; resourceInputs["ciphers"] = state?.ciphers; resourceInputs["defaultsFrom"] = state?.defaultsFrom; resourceInputs["expireCertResponseControl"] = state?.expireCertResponseControl; resourceInputs["fullPath"] = state?.fullPath; resourceInputs["generation"] = state?.generation; resourceInputs["genericAlert"] = state?.genericAlert; resourceInputs["handshakeTimeout"] = state?.handshakeTimeout; resourceInputs["key"] = state?.key; resourceInputs["modSslMethods"] = state?.modSslMethods; resourceInputs["mode"] = state?.mode; resourceInputs["name"] = state?.name; resourceInputs["partition"] = state?.partition; resourceInputs["passphrase"] = state?.passphrase; resourceInputs["peerCertMode"] = state?.peerCertMode; resourceInputs["proxyCaCert"] = state?.proxyCaCert; resourceInputs["proxyCaKey"] = state?.proxyCaKey; resourceInputs["proxySsl"] = state?.proxySsl; resourceInputs["renegotiatePeriod"] = state?.renegotiatePeriod; resourceInputs["renegotiateSize"] = state?.renegotiateSize; resourceInputs["renegotiation"] = state?.renegotiation; resourceInputs["retainCertificate"] = state?.retainCertificate; resourceInputs["secureRenegotiation"] = state?.secureRenegotiation; resourceInputs["serverName"] = state?.serverName; resourceInputs["sessionMirroring"] = state?.sessionMirroring; resourceInputs["sessionTicket"] = state?.sessionTicket; resourceInputs["sniDefault"] = state?.sniDefault; resourceInputs["sniRequire"] = state?.sniRequire; resourceInputs["sslC3d"] = state?.sslC3d; resourceInputs["sslForwardProxy"] = state?.sslForwardProxy; resourceInputs["sslForwardProxyBypass"] = state?.sslForwardProxyBypass; resourceInputs["sslSignHash"] = state?.sslSignHash; resourceInputs["strictResume"] = state?.strictResume; resourceInputs["tmOptions"] = state?.tmOptions; resourceInputs["uncleanShutdown"] = state?.uncleanShutdown; resourceInputs["untrustedCertResponseControl"] = state?.untrustedCertResponseControl; } else { const args = argsOrState; if (args?.name === undefined && !opts.urn) { throw new Error("Missing required property 'name'"); } resourceInputs["alertTimeout"] = args?.alertTimeout; resourceInputs["authenticate"] = args?.authenticate; resourceInputs["authenticateDepth"] = args?.authenticateDepth; resourceInputs["c3dCaCert"] = args?.c3dCaCert; resourceInputs["c3dCaKey"] = args?.c3dCaKey; resourceInputs["c3dCaPassphrase"] = args?.c3dCaPassphrase; resourceInputs["c3dCertExtensionCustomOids"] = args?.c3dCertExtensionCustomOids; resourceInputs["c3dCertExtensionIncludes"] = args?.c3dCertExtensionIncludes; resourceInputs["c3dCertLifespan"] = args?.c3dCertLifespan; resourceInputs["c3dCertificateExtensions"] = args?.c3dCertificateExtensions; resourceInputs["caFile"] = args?.caFile; resourceInputs["cacheSize"] = args?.cacheSize; resourceInputs["cacheTimeout"] = args?.cacheTimeout; resourceInputs["cert"] = args?.cert; resourceInputs["chain"] = args?.chain; resourceInputs["cipherGroup"] = args?.cipherGroup; resourceInputs["ciphers"] = args?.ciphers; resourceInputs["defaultsFrom"] = args?.defaultsFrom; resourceInputs["expireCertResponseControl"] = args?.expireCertResponseControl; resourceInputs["fullPath"] = args?.fullPath; resourceInputs["generation"] = args?.generation; resourceInputs["genericAlert"] = args?.genericAlert; resourceInputs["handshakeTimeout"] = args?.handshakeTimeout; resourceInputs["key"] = args?.key; resourceInputs["modSslMethods"] = args?.modSslMethods; resourceInputs["mode"] = args?.mode; resourceInputs["name"] = args?.name; resourceInputs["partition"] = args?.partition; resourceInputs["passphrase"] = args?.passphrase ? pulumi.secret(args.passphrase) : undefined; resourceInputs["peerCertMode"] = args?.peerCertMode; resourceInputs["proxyCaCert"] = args?.proxyCaCert; resourceInputs["proxyCaKey"] = args?.proxyCaKey; resourceInputs["proxySsl"] = args?.proxySsl; resourceInputs["renegotiatePeriod"] = args?.renegotiatePeriod; resourceInputs["renegotiateSize"] = args?.renegotiateSize; resourceInputs["renegotiation"] = args?.renegotiation; resourceInputs["retainCertificate"] = args?.retainCertificate; resourceInputs["secureRenegotiation"] = args?.secureRenegotiation; resourceInputs["serverName"] = args?.serverName; resourceInputs["sessionMirroring"] = args?.sessionMirroring; resourceInputs["sessionTicket"] = args?.sessionTicket; resourceInputs["sniDefault"] = args?.sniDefault; resourceInputs["sniRequire"] = args?.sniRequire; resourceInputs["sslC3d"] = args?.sslC3d; resourceInputs["sslForwardProxy"] = args?.sslForwardProxy; resourceInputs["sslForwardProxyBypass"] = args?.sslForwardProxyBypass; resourceInputs["sslSignHash"] = args?.sslSignHash; resourceInputs["strictResume"] = args?.strictResume; resourceInputs["tmOptions"] = args?.tmOptions; resourceInputs["uncleanShutdown"] = args?.uncleanShutdown; resourceInputs["untrustedCertResponseControl"] = args?.untrustedCertResponseControl; } opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts); const secretOpts = { additionalSecretOutputs: ["passphrase"] }; opts = pulumi.mergeOptions(opts, secretOpts); super(ProfileServerSsl.__pulumiType, name, resourceInputs, opts); } } exports.ProfileServerSsl = ProfileServerSsl; //# sourceMappingURL=profileServerSsl.js.map