UNPKG

@pulumi/gcp

Version:

A Pulumi package for creating and managing Google Cloud Platform resources.

233 lines • 9.2 kB
"use strict"; // *** WARNING: this file was generated by pulumi-language-nodejs. *** // *** Do not edit by hand unless you're certain you know what you are doing! *** Object.defineProperty(exports, "__esModule", { value: true }); exports.NetworkFirewallPolicyWithRules = void 0; const pulumi = require("@pulumi/pulumi"); const utilities = require("../utilities"); /** * The Compute NetworkFirewallPolicy with rules resource * * ## Example Usage * * ### Compute Network Firewall Policy With Rules Full * * ```typescript * import * as pulumi from "@pulumi/pulumi"; * import * as gcp from "@pulumi/gcp"; * * const project = gcp.organizations.getProject({}); * const addressGroup1 = new gcp.networksecurity.AddressGroup("address_group_1", { * name: "address-group", * parent: project.then(project => project.id), * description: "Global address group", * location: "global", * items: ["208.80.154.224/32"], * type: "IPV4", * capacity: 100, * }); * const secureTagKey1 = new gcp.tags.TagKey("secure_tag_key_1", { * description: "Tag key", * parent: project.then(project => project.id), * purpose: "GCE_FIREWALL", * shortName: "tag-key", * purposeData: { * network: project.then(project => `${project.name}/default`), * }, * }); * const secureTagValue1 = new gcp.tags.TagValue("secure_tag_value_1", { * description: "Tag value", * parent: secureTagKey1.id, * shortName: "tag-value", * }); * const securityProfile1 = new gcp.networksecurity.SecurityProfile("security_profile_1", { * name: "sp", * type: "THREAT_PREVENTION", * parent: "organizations/123456789", * location: "global", * }); * const securityProfileGroup1 = new gcp.networksecurity.SecurityProfileGroup("security_profile_group_1", { * name: "spg", * parent: "organizations/123456789", * description: "my description", * threatPreventionProfile: securityProfile1.id, * }); * const primary = new gcp.compute.NetworkFirewallPolicyWithRules("primary", { * name: "fw-policy", * description: "Terraform test", * rules: [ * { * description: "tcp rule", * priority: 1000, * enableLogging: true, * action: "allow", * direction: "EGRESS", * match: { * destIpRanges: ["11.100.0.1/32"], * destFqdns: [ * "www.yyy.com", * "www.zzz.com", * ], * destRegionCodes: [ * "HK", * "IN", * ], * destThreatIntelligences: [ * "iplist-search-engines-crawlers", * "iplist-tor-exit-nodes", * ], * destAddressGroups: [addressGroup1.id], * layer4Configs: [{ * ipProtocol: "tcp", * ports: [ * "8080", * "7070", * ], * }], * }, * targetSecureTags: [{ * name: secureTagValue1.id, * }], * }, * { * description: "udp rule", * priority: 2000, * enableLogging: false, * action: "deny", * direction: "INGRESS", * disabled: true, * match: { * srcIpRanges: ["0.0.0.0/0"], * srcFqdns: [ * "www.abc.com", * "www.def.com", * ], * srcRegionCodes: [ * "US", * "CA", * ], * srcThreatIntelligences: [ * "iplist-known-malicious-ips", * "iplist-public-clouds", * ], * srcAddressGroups: [addressGroup1.id], * srcSecureTags: [{ * name: secureTagValue1.id, * }], * layer4Configs: [{ * ipProtocol: "udp", * }], * }, * }, * { * description: "security profile group rule", * ruleName: "tcp rule", * priority: 3000, * enableLogging: false, * action: "apply_security_profile_group", * direction: "INGRESS", * targetServiceAccounts: ["test@google.com"], * securityProfileGroup: pulumi.interpolate`//networksecurity.googleapis.com/${securityProfileGroup1.id}`, * tlsInspect: true, * match: { * srcIpRanges: ["0.0.0.0/0"], * layer4Configs: [{ * ipProtocol: "tcp", * }], * }, * }, * ], * }); * ``` * * ## Import * * NetworkFirewallPolicyWithRules can be imported using any of these accepted formats: * * * `projects/{{project}}/global/firewallPolicies/{{name}}` * * * `{{project}}/{{name}}` * * * `{{name}}` * * When using the `pulumi import` command, NetworkFirewallPolicyWithRules can be imported using one of the formats above. For example: * * ```sh * $ pulumi import gcp:compute/networkFirewallPolicyWithRules:NetworkFirewallPolicyWithRules default projects/{{project}}/global/firewallPolicies/{{name}} * ``` * * ```sh * $ pulumi import gcp:compute/networkFirewallPolicyWithRules:NetworkFirewallPolicyWithRules default {{project}}/{{name}} * ``` * * ```sh * $ pulumi import gcp:compute/networkFirewallPolicyWithRules:NetworkFirewallPolicyWithRules default {{name}} * ``` */ class NetworkFirewallPolicyWithRules extends pulumi.CustomResource { /** * Get an existing NetworkFirewallPolicyWithRules resource's state with the given name, ID, and optional extra * properties used to qualify the lookup. * * @param name The _unique_ name of the resulting resource. * @param id The _unique_ provider ID of the resource to lookup. * @param state Any extra arguments used during the lookup. * @param opts Optional settings to control the behavior of the CustomResource. */ static get(name, id, state, opts) { return new NetworkFirewallPolicyWithRules(name, state, { ...opts, id: id }); } /** * Returns true if the given object is an instance of NetworkFirewallPolicyWithRules. This is designed to work even * when multiple copies of the Pulumi SDK have been loaded into the same process. */ static isInstance(obj) { if (obj === undefined || obj === null) { return false; } return obj['__pulumiType'] === NetworkFirewallPolicyWithRules.__pulumiType; } constructor(name, argsOrState, opts) { let resourceInputs = {}; opts = opts || {}; if (opts.id) { const state = argsOrState; resourceInputs["creationTimestamp"] = state?.creationTimestamp; resourceInputs["description"] = state?.description; resourceInputs["fingerprint"] = state?.fingerprint; resourceInputs["name"] = state?.name; resourceInputs["networkFirewallPolicyId"] = state?.networkFirewallPolicyId; resourceInputs["policyType"] = state?.policyType; resourceInputs["predefinedRules"] = state?.predefinedRules; resourceInputs["project"] = state?.project; resourceInputs["ruleTupleCount"] = state?.ruleTupleCount; resourceInputs["rules"] = state?.rules; resourceInputs["selfLink"] = state?.selfLink; resourceInputs["selfLinkWithId"] = state?.selfLinkWithId; } else { const args = argsOrState; if (args?.rules === undefined && !opts.urn) { throw new Error("Missing required property 'rules'"); } resourceInputs["description"] = args?.description; resourceInputs["name"] = args?.name; resourceInputs["policyType"] = args?.policyType; resourceInputs["project"] = args?.project; resourceInputs["rules"] = args?.rules; resourceInputs["creationTimestamp"] = undefined /*out*/; resourceInputs["fingerprint"] = undefined /*out*/; resourceInputs["networkFirewallPolicyId"] = undefined /*out*/; resourceInputs["predefinedRules"] = undefined /*out*/; resourceInputs["ruleTupleCount"] = undefined /*out*/; resourceInputs["selfLink"] = undefined /*out*/; resourceInputs["selfLinkWithId"] = undefined /*out*/; } opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts); super(NetworkFirewallPolicyWithRules.__pulumiType, name, resourceInputs, opts); } } exports.NetworkFirewallPolicyWithRules = NetworkFirewallPolicyWithRules; /** @internal */ NetworkFirewallPolicyWithRules.__pulumiType = 'gcp:compute/networkFirewallPolicyWithRules:NetworkFirewallPolicyWithRules'; //# sourceMappingURL=networkFirewallPolicyWithRules.js.map