@pulumiverse/fortios
Version:
A Pulumi package for creating and managing Fortios resources. Based on terraform-provider-fortios: version v1.16.0
189 lines • 8.94 kB
JavaScript
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
// *** Do not edit by hand unless you're certain you know what you are doing! ***
Object.defineProperty(exports, "__esModule", { value: true });
exports.Accprofile = void 0;
const pulumi = require("@pulumi/pulumi");
const utilities = require("../utilities");
/**
* Configure access profiles for system administrators.
*
* ## Example Usage
*
* ```typescript
* import * as pulumi from "@pulumi/pulumi";
* import * as fortios from "@pulumiverse/fortios";
*
* const test12 = new fortios.system.Accprofile("test12", {
* admintimeout: 10,
* admintimeoutOverride: "disable",
* authgrp: "read-write",
* ftviewgrp: "read-write",
* fwgrp: "custom",
* fwgrpPermission: {
* address: "read-write",
* policy: "read-write",
* schedule: "none",
* service: "none",
* },
* loggrp: "read-write",
* loggrpPermission: {
* config: "none",
* dataAccess: "none",
* reportAccess: "none",
* threatWeight: "none",
* },
* netgrp: "read-write",
* netgrpPermission: {
* cfg: "none",
* packetCapture: "none",
* routeCfg: "none",
* },
* scope: "vdom",
* secfabgrp: "read-write",
* sysgrp: "read-write",
* sysgrpPermission: {
* admin: "none",
* cfg: "none",
* mnt: "none",
* upd: "none",
* },
* utmgrp: "custom",
* utmgrpPermission: {
* antivirus: "read-write",
* applicationControl: "none",
* dataLossPrevention: "none",
* dnsfilter: "none",
* endpointControl: "none",
* icap: "none",
* ips: "read-write",
* voip: "none",
* waf: "none",
* webfilter: "none",
* },
* vpngrp: "read-write",
* wanoptgrp: "read-write",
* wifi: "read-write",
* });
* ```
*
* ## Import
*
* System Accprofile can be imported using any of these accepted formats:
*
* ```sh
* $ pulumi import fortios:system/accprofile:Accprofile labelname {{name}}
* ```
*
* If you do not want to import arguments of block:
*
* $ export "FORTIOS_IMPORT_TABLE"="false"
*
* ```sh
* $ pulumi import fortios:system/accprofile:Accprofile labelname {{name}}
* ```
*
* $ unset "FORTIOS_IMPORT_TABLE"
*/
class Accprofile extends pulumi.CustomResource {
/**
* Get an existing Accprofile resource's state with the given name, ID, and optional extra
* properties used to qualify the lookup.
*
* @param name The _unique_ name of the resulting resource.
* @param id The _unique_ provider ID of the resource to lookup.
* @param state Any extra arguments used during the lookup.
* @param opts Optional settings to control the behavior of the CustomResource.
*/
static get(name, id, state, opts) {
return new Accprofile(name, state, Object.assign(Object.assign({}, opts), { id: id }));
}
/**
* Returns true if the given object is an instance of Accprofile. This is designed to work even
* when multiple copies of the Pulumi SDK have been loaded into the same process.
*/
static isInstance(obj) {
if (obj === undefined || obj === null) {
return false;
}
return obj['__pulumiType'] === Accprofile.__pulumiType;
}
constructor(name, argsOrState, opts) {
let resourceInputs = {};
opts = opts || {};
if (opts.id) {
const state = argsOrState;
resourceInputs["admintimeout"] = state ? state.admintimeout : undefined;
resourceInputs["admintimeoutOverride"] = state ? state.admintimeoutOverride : undefined;
resourceInputs["authgrp"] = state ? state.authgrp : undefined;
resourceInputs["cliConfig"] = state ? state.cliConfig : undefined;
resourceInputs["cliDiagnose"] = state ? state.cliDiagnose : undefined;
resourceInputs["cliExec"] = state ? state.cliExec : undefined;
resourceInputs["cliGet"] = state ? state.cliGet : undefined;
resourceInputs["cliShow"] = state ? state.cliShow : undefined;
resourceInputs["comments"] = state ? state.comments : undefined;
resourceInputs["ftviewgrp"] = state ? state.ftviewgrp : undefined;
resourceInputs["fwgrp"] = state ? state.fwgrp : undefined;
resourceInputs["fwgrpPermission"] = state ? state.fwgrpPermission : undefined;
resourceInputs["getAllTables"] = state ? state.getAllTables : undefined;
resourceInputs["loggrp"] = state ? state.loggrp : undefined;
resourceInputs["loggrpPermission"] = state ? state.loggrpPermission : undefined;
resourceInputs["name"] = state ? state.name : undefined;
resourceInputs["netgrp"] = state ? state.netgrp : undefined;
resourceInputs["netgrpPermission"] = state ? state.netgrpPermission : undefined;
resourceInputs["scope"] = state ? state.scope : undefined;
resourceInputs["secfabgrp"] = state ? state.secfabgrp : undefined;
resourceInputs["sysgrp"] = state ? state.sysgrp : undefined;
resourceInputs["sysgrpPermission"] = state ? state.sysgrpPermission : undefined;
resourceInputs["systemDiagnostics"] = state ? state.systemDiagnostics : undefined;
resourceInputs["systemExecuteSsh"] = state ? state.systemExecuteSsh : undefined;
resourceInputs["systemExecuteTelnet"] = state ? state.systemExecuteTelnet : undefined;
resourceInputs["utmgrp"] = state ? state.utmgrp : undefined;
resourceInputs["utmgrpPermission"] = state ? state.utmgrpPermission : undefined;
resourceInputs["vdomparam"] = state ? state.vdomparam : undefined;
resourceInputs["vpngrp"] = state ? state.vpngrp : undefined;
resourceInputs["wanoptgrp"] = state ? state.wanoptgrp : undefined;
resourceInputs["wifi"] = state ? state.wifi : undefined;
}
else {
const args = argsOrState;
resourceInputs["admintimeout"] = args ? args.admintimeout : undefined;
resourceInputs["admintimeoutOverride"] = args ? args.admintimeoutOverride : undefined;
resourceInputs["authgrp"] = args ? args.authgrp : undefined;
resourceInputs["cliConfig"] = args ? args.cliConfig : undefined;
resourceInputs["cliDiagnose"] = args ? args.cliDiagnose : undefined;
resourceInputs["cliExec"] = args ? args.cliExec : undefined;
resourceInputs["cliGet"] = args ? args.cliGet : undefined;
resourceInputs["cliShow"] = args ? args.cliShow : undefined;
resourceInputs["comments"] = args ? args.comments : undefined;
resourceInputs["ftviewgrp"] = args ? args.ftviewgrp : undefined;
resourceInputs["fwgrp"] = args ? args.fwgrp : undefined;
resourceInputs["fwgrpPermission"] = args ? args.fwgrpPermission : undefined;
resourceInputs["getAllTables"] = args ? args.getAllTables : undefined;
resourceInputs["loggrp"] = args ? args.loggrp : undefined;
resourceInputs["loggrpPermission"] = args ? args.loggrpPermission : undefined;
resourceInputs["name"] = args ? args.name : undefined;
resourceInputs["netgrp"] = args ? args.netgrp : undefined;
resourceInputs["netgrpPermission"] = args ? args.netgrpPermission : undefined;
resourceInputs["scope"] = args ? args.scope : undefined;
resourceInputs["secfabgrp"] = args ? args.secfabgrp : undefined;
resourceInputs["sysgrp"] = args ? args.sysgrp : undefined;
resourceInputs["sysgrpPermission"] = args ? args.sysgrpPermission : undefined;
resourceInputs["systemDiagnostics"] = args ? args.systemDiagnostics : undefined;
resourceInputs["systemExecuteSsh"] = args ? args.systemExecuteSsh : undefined;
resourceInputs["systemExecuteTelnet"] = args ? args.systemExecuteTelnet : undefined;
resourceInputs["utmgrp"] = args ? args.utmgrp : undefined;
resourceInputs["utmgrpPermission"] = args ? args.utmgrpPermission : undefined;
resourceInputs["vdomparam"] = args ? args.vdomparam : undefined;
resourceInputs["vpngrp"] = args ? args.vpngrp : undefined;
resourceInputs["wanoptgrp"] = args ? args.wanoptgrp : undefined;
resourceInputs["wifi"] = args ? args.wifi : undefined;
}
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
super(Accprofile.__pulumiType, name, resourceInputs, opts);
}
}
exports.Accprofile = Accprofile;
/** @internal */
Accprofile.__pulumiType = 'fortios:system/accprofile:Accprofile';
//# sourceMappingURL=accprofile.js.map
;