UNPKG

@pulumiverse/fortios

Version:

A Pulumi package for creating and managing Fortios resources. Based on terraform-provider-fortios: version v1.16.0

189 lines 8.94 kB
"use strict"; // *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. *** // *** Do not edit by hand unless you're certain you know what you are doing! *** Object.defineProperty(exports, "__esModule", { value: true }); exports.Accprofile = void 0; const pulumi = require("@pulumi/pulumi"); const utilities = require("../utilities"); /** * Configure access profiles for system administrators. * * ## Example Usage * * ```typescript * import * as pulumi from "@pulumi/pulumi"; * import * as fortios from "@pulumiverse/fortios"; * * const test12 = new fortios.system.Accprofile("test12", { * admintimeout: 10, * admintimeoutOverride: "disable", * authgrp: "read-write", * ftviewgrp: "read-write", * fwgrp: "custom", * fwgrpPermission: { * address: "read-write", * policy: "read-write", * schedule: "none", * service: "none", * }, * loggrp: "read-write", * loggrpPermission: { * config: "none", * dataAccess: "none", * reportAccess: "none", * threatWeight: "none", * }, * netgrp: "read-write", * netgrpPermission: { * cfg: "none", * packetCapture: "none", * routeCfg: "none", * }, * scope: "vdom", * secfabgrp: "read-write", * sysgrp: "read-write", * sysgrpPermission: { * admin: "none", * cfg: "none", * mnt: "none", * upd: "none", * }, * utmgrp: "custom", * utmgrpPermission: { * antivirus: "read-write", * applicationControl: "none", * dataLossPrevention: "none", * dnsfilter: "none", * endpointControl: "none", * icap: "none", * ips: "read-write", * voip: "none", * waf: "none", * webfilter: "none", * }, * vpngrp: "read-write", * wanoptgrp: "read-write", * wifi: "read-write", * }); * ``` * * ## Import * * System Accprofile can be imported using any of these accepted formats: * * ```sh * $ pulumi import fortios:system/accprofile:Accprofile labelname {{name}} * ``` * * If you do not want to import arguments of block: * * $ export "FORTIOS_IMPORT_TABLE"="false" * * ```sh * $ pulumi import fortios:system/accprofile:Accprofile labelname {{name}} * ``` * * $ unset "FORTIOS_IMPORT_TABLE" */ class Accprofile extends pulumi.CustomResource { /** * Get an existing Accprofile resource's state with the given name, ID, and optional extra * properties used to qualify the lookup. * * @param name The _unique_ name of the resulting resource. * @param id The _unique_ provider ID of the resource to lookup. * @param state Any extra arguments used during the lookup. * @param opts Optional settings to control the behavior of the CustomResource. */ static get(name, id, state, opts) { return new Accprofile(name, state, Object.assign(Object.assign({}, opts), { id: id })); } /** * Returns true if the given object is an instance of Accprofile. This is designed to work even * when multiple copies of the Pulumi SDK have been loaded into the same process. */ static isInstance(obj) { if (obj === undefined || obj === null) { return false; } return obj['__pulumiType'] === Accprofile.__pulumiType; } constructor(name, argsOrState, opts) { let resourceInputs = {}; opts = opts || {}; if (opts.id) { const state = argsOrState; resourceInputs["admintimeout"] = state ? state.admintimeout : undefined; resourceInputs["admintimeoutOverride"] = state ? state.admintimeoutOverride : undefined; resourceInputs["authgrp"] = state ? state.authgrp : undefined; resourceInputs["cliConfig"] = state ? state.cliConfig : undefined; resourceInputs["cliDiagnose"] = state ? state.cliDiagnose : undefined; resourceInputs["cliExec"] = state ? state.cliExec : undefined; resourceInputs["cliGet"] = state ? state.cliGet : undefined; resourceInputs["cliShow"] = state ? state.cliShow : undefined; resourceInputs["comments"] = state ? state.comments : undefined; resourceInputs["ftviewgrp"] = state ? state.ftviewgrp : undefined; resourceInputs["fwgrp"] = state ? state.fwgrp : undefined; resourceInputs["fwgrpPermission"] = state ? state.fwgrpPermission : undefined; resourceInputs["getAllTables"] = state ? state.getAllTables : undefined; resourceInputs["loggrp"] = state ? state.loggrp : undefined; resourceInputs["loggrpPermission"] = state ? state.loggrpPermission : undefined; resourceInputs["name"] = state ? state.name : undefined; resourceInputs["netgrp"] = state ? state.netgrp : undefined; resourceInputs["netgrpPermission"] = state ? state.netgrpPermission : undefined; resourceInputs["scope"] = state ? state.scope : undefined; resourceInputs["secfabgrp"] = state ? state.secfabgrp : undefined; resourceInputs["sysgrp"] = state ? state.sysgrp : undefined; resourceInputs["sysgrpPermission"] = state ? state.sysgrpPermission : undefined; resourceInputs["systemDiagnostics"] = state ? state.systemDiagnostics : undefined; resourceInputs["systemExecuteSsh"] = state ? state.systemExecuteSsh : undefined; resourceInputs["systemExecuteTelnet"] = state ? state.systemExecuteTelnet : undefined; resourceInputs["utmgrp"] = state ? state.utmgrp : undefined; resourceInputs["utmgrpPermission"] = state ? state.utmgrpPermission : undefined; resourceInputs["vdomparam"] = state ? state.vdomparam : undefined; resourceInputs["vpngrp"] = state ? state.vpngrp : undefined; resourceInputs["wanoptgrp"] = state ? state.wanoptgrp : undefined; resourceInputs["wifi"] = state ? state.wifi : undefined; } else { const args = argsOrState; resourceInputs["admintimeout"] = args ? args.admintimeout : undefined; resourceInputs["admintimeoutOverride"] = args ? args.admintimeoutOverride : undefined; resourceInputs["authgrp"] = args ? args.authgrp : undefined; resourceInputs["cliConfig"] = args ? args.cliConfig : undefined; resourceInputs["cliDiagnose"] = args ? args.cliDiagnose : undefined; resourceInputs["cliExec"] = args ? args.cliExec : undefined; resourceInputs["cliGet"] = args ? args.cliGet : undefined; resourceInputs["cliShow"] = args ? args.cliShow : undefined; resourceInputs["comments"] = args ? args.comments : undefined; resourceInputs["ftviewgrp"] = args ? args.ftviewgrp : undefined; resourceInputs["fwgrp"] = args ? args.fwgrp : undefined; resourceInputs["fwgrpPermission"] = args ? args.fwgrpPermission : undefined; resourceInputs["getAllTables"] = args ? args.getAllTables : undefined; resourceInputs["loggrp"] = args ? args.loggrp : undefined; resourceInputs["loggrpPermission"] = args ? args.loggrpPermission : undefined; resourceInputs["name"] = args ? args.name : undefined; resourceInputs["netgrp"] = args ? args.netgrp : undefined; resourceInputs["netgrpPermission"] = args ? args.netgrpPermission : undefined; resourceInputs["scope"] = args ? args.scope : undefined; resourceInputs["secfabgrp"] = args ? args.secfabgrp : undefined; resourceInputs["sysgrp"] = args ? args.sysgrp : undefined; resourceInputs["sysgrpPermission"] = args ? args.sysgrpPermission : undefined; resourceInputs["systemDiagnostics"] = args ? args.systemDiagnostics : undefined; resourceInputs["systemExecuteSsh"] = args ? args.systemExecuteSsh : undefined; resourceInputs["systemExecuteTelnet"] = args ? args.systemExecuteTelnet : undefined; resourceInputs["utmgrp"] = args ? args.utmgrp : undefined; resourceInputs["utmgrpPermission"] = args ? args.utmgrpPermission : undefined; resourceInputs["vdomparam"] = args ? args.vdomparam : undefined; resourceInputs["vpngrp"] = args ? args.vpngrp : undefined; resourceInputs["wanoptgrp"] = args ? args.wanoptgrp : undefined; resourceInputs["wifi"] = args ? args.wifi : undefined; } opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts); super(Accprofile.__pulumiType, name, resourceInputs, opts); } } exports.Accprofile = Accprofile; /** @internal */ Accprofile.__pulumiType = 'fortios:system/accprofile:Accprofile'; //# sourceMappingURL=accprofile.js.map