@pulumi/gcp
Version:
A Pulumi package for creating and managing Google Cloud Platform resources.
233 lines • 9.2 kB
JavaScript
// *** WARNING: this file was generated by pulumi-language-nodejs. ***
// *** Do not edit by hand unless you're certain you know what you are doing! ***
Object.defineProperty(exports, "__esModule", { value: true });
exports.NetworkFirewallPolicyWithRules = void 0;
const pulumi = require("@pulumi/pulumi");
const utilities = require("../utilities");
/**
* The Compute NetworkFirewallPolicy with rules resource
*
* ## Example Usage
*
* ### Compute Network Firewall Policy With Rules Full
*
* ```typescript
* import * as pulumi from "@pulumi/pulumi";
* import * as gcp from "@pulumi/gcp";
*
* const project = gcp.organizations.getProject({});
* const addressGroup1 = new gcp.networksecurity.AddressGroup("address_group_1", {
* name: "address-group",
* parent: project.then(project => project.id),
* description: "Global address group",
* location: "global",
* items: ["208.80.154.224/32"],
* type: "IPV4",
* capacity: 100,
* });
* const secureTagKey1 = new gcp.tags.TagKey("secure_tag_key_1", {
* description: "Tag key",
* parent: project.then(project => project.id),
* purpose: "GCE_FIREWALL",
* shortName: "tag-key",
* purposeData: {
* network: project.then(project => `${project.name}/default`),
* },
* });
* const secureTagValue1 = new gcp.tags.TagValue("secure_tag_value_1", {
* description: "Tag value",
* parent: secureTagKey1.id,
* shortName: "tag-value",
* });
* const securityProfile1 = new gcp.networksecurity.SecurityProfile("security_profile_1", {
* name: "sp",
* type: "THREAT_PREVENTION",
* parent: "organizations/123456789",
* location: "global",
* });
* const securityProfileGroup1 = new gcp.networksecurity.SecurityProfileGroup("security_profile_group_1", {
* name: "spg",
* parent: "organizations/123456789",
* description: "my description",
* threatPreventionProfile: securityProfile1.id,
* });
* const primary = new gcp.compute.NetworkFirewallPolicyWithRules("primary", {
* name: "fw-policy",
* description: "Terraform test",
* rules: [
* {
* description: "tcp rule",
* priority: 1000,
* enableLogging: true,
* action: "allow",
* direction: "EGRESS",
* match: {
* destIpRanges: ["11.100.0.1/32"],
* destFqdns: [
* "www.yyy.com",
* "www.zzz.com",
* ],
* destRegionCodes: [
* "HK",
* "IN",
* ],
* destThreatIntelligences: [
* "iplist-search-engines-crawlers",
* "iplist-tor-exit-nodes",
* ],
* destAddressGroups: [addressGroup1.id],
* layer4Configs: [{
* ipProtocol: "tcp",
* ports: [
* "8080",
* "7070",
* ],
* }],
* },
* targetSecureTags: [{
* name: secureTagValue1.id,
* }],
* },
* {
* description: "udp rule",
* priority: 2000,
* enableLogging: false,
* action: "deny",
* direction: "INGRESS",
* disabled: true,
* match: {
* srcIpRanges: ["0.0.0.0/0"],
* srcFqdns: [
* "www.abc.com",
* "www.def.com",
* ],
* srcRegionCodes: [
* "US",
* "CA",
* ],
* srcThreatIntelligences: [
* "iplist-known-malicious-ips",
* "iplist-public-clouds",
* ],
* srcAddressGroups: [addressGroup1.id],
* srcSecureTags: [{
* name: secureTagValue1.id,
* }],
* layer4Configs: [{
* ipProtocol: "udp",
* }],
* },
* },
* {
* description: "security profile group rule",
* ruleName: "tcp rule",
* priority: 3000,
* enableLogging: false,
* action: "apply_security_profile_group",
* direction: "INGRESS",
* targetServiceAccounts: ["test@google.com"],
* securityProfileGroup: pulumi.interpolate`//networksecurity.googleapis.com/${securityProfileGroup1.id}`,
* tlsInspect: true,
* match: {
* srcIpRanges: ["0.0.0.0/0"],
* layer4Configs: [{
* ipProtocol: "tcp",
* }],
* },
* },
* ],
* });
* ```
*
* ## Import
*
* NetworkFirewallPolicyWithRules can be imported using any of these accepted formats:
*
* * `projects/{{project}}/global/firewallPolicies/{{name}}`
*
* * `{{project}}/{{name}}`
*
* * `{{name}}`
*
* When using the `pulumi import` command, NetworkFirewallPolicyWithRules can be imported using one of the formats above. For example:
*
* ```sh
* $ pulumi import gcp:compute/networkFirewallPolicyWithRules:NetworkFirewallPolicyWithRules default projects/{{project}}/global/firewallPolicies/{{name}}
* ```
*
* ```sh
* $ pulumi import gcp:compute/networkFirewallPolicyWithRules:NetworkFirewallPolicyWithRules default {{project}}/{{name}}
* ```
*
* ```sh
* $ pulumi import gcp:compute/networkFirewallPolicyWithRules:NetworkFirewallPolicyWithRules default {{name}}
* ```
*/
class NetworkFirewallPolicyWithRules extends pulumi.CustomResource {
/**
* Get an existing NetworkFirewallPolicyWithRules resource's state with the given name, ID, and optional extra
* properties used to qualify the lookup.
*
* @param name The _unique_ name of the resulting resource.
* @param id The _unique_ provider ID of the resource to lookup.
* @param state Any extra arguments used during the lookup.
* @param opts Optional settings to control the behavior of the CustomResource.
*/
static get(name, id, state, opts) {
return new NetworkFirewallPolicyWithRules(name, state, { ...opts, id: id });
}
/**
* Returns true if the given object is an instance of NetworkFirewallPolicyWithRules. This is designed to work even
* when multiple copies of the Pulumi SDK have been loaded into the same process.
*/
static isInstance(obj) {
if (obj === undefined || obj === null) {
return false;
}
return obj['__pulumiType'] === NetworkFirewallPolicyWithRules.__pulumiType;
}
constructor(name, argsOrState, opts) {
let resourceInputs = {};
opts = opts || {};
if (opts.id) {
const state = argsOrState;
resourceInputs["creationTimestamp"] = state?.creationTimestamp;
resourceInputs["description"] = state?.description;
resourceInputs["fingerprint"] = state?.fingerprint;
resourceInputs["name"] = state?.name;
resourceInputs["networkFirewallPolicyId"] = state?.networkFirewallPolicyId;
resourceInputs["policyType"] = state?.policyType;
resourceInputs["predefinedRules"] = state?.predefinedRules;
resourceInputs["project"] = state?.project;
resourceInputs["ruleTupleCount"] = state?.ruleTupleCount;
resourceInputs["rules"] = state?.rules;
resourceInputs["selfLink"] = state?.selfLink;
resourceInputs["selfLinkWithId"] = state?.selfLinkWithId;
}
else {
const args = argsOrState;
if (args?.rules === undefined && !opts.urn) {
throw new Error("Missing required property 'rules'");
}
resourceInputs["description"] = args?.description;
resourceInputs["name"] = args?.name;
resourceInputs["policyType"] = args?.policyType;
resourceInputs["project"] = args?.project;
resourceInputs["rules"] = args?.rules;
resourceInputs["creationTimestamp"] = undefined /*out*/;
resourceInputs["fingerprint"] = undefined /*out*/;
resourceInputs["networkFirewallPolicyId"] = undefined /*out*/;
resourceInputs["predefinedRules"] = undefined /*out*/;
resourceInputs["ruleTupleCount"] = undefined /*out*/;
resourceInputs["selfLink"] = undefined /*out*/;
resourceInputs["selfLinkWithId"] = undefined /*out*/;
}
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
super(NetworkFirewallPolicyWithRules.__pulumiType, name, resourceInputs, opts);
}
}
exports.NetworkFirewallPolicyWithRules = NetworkFirewallPolicyWithRules;
/** @internal */
NetworkFirewallPolicyWithRules.__pulumiType = 'gcp:compute/networkFirewallPolicyWithRules:NetworkFirewallPolicyWithRules';
//# sourceMappingURL=networkFirewallPolicyWithRules.js.map
;