diff --git a/.pulumi-java-gen.version b/.pulumi-java-gen.version
index d183d4ace..92e0c7438 100644
--- a/.pulumi-java-gen.version
+++ b/.pulumi-java-gen.version
@@ -1 +1 @@
-0.16.0
\ No newline at end of file
+0.16.1
\ No newline at end of file
diff --git a/provider/cmd/pulumi-resource-cloudflare/bridge-metadata.json b/provider/cmd/pulumi-resource-cloudflare/bridge-metadata.json
index 2cd7807f3..222c45b7e 100644
--- a/provider/cmd/pulumi-resource-cloudflare/bridge-metadata.json
+++ b/provider/cmd/pulumi-resource-cloudflare/bridge-metadata.json
@@ -1933,6 +1933,9 @@
}
}
},
+ "cache_reserve": {
+ "maxItemsOne": true
+ },
"cookie_fields": {
"maxItemsOne": false
},
@@ -2118,6 +2121,9 @@
"body_scanning": {
"maxItemsOne": true
},
+ "certificate": {
+ "maxItemsOne": true
+ },
"custom_certificate": {
"maxItemsOne": true
},
@@ -2445,6 +2451,9 @@
"d1_database_binding": {
"maxItemsOne": false
},
+ "hyperdrive_config_binding": {
+ "maxItemsOne": false
+ },
"kv_namespace_binding": {
"maxItemsOne": false
},
@@ -2524,6 +2533,9 @@
"d1_database_binding": {
"maxItemsOne": false
},
+ "hyperdrive_config_binding": {
+ "maxItemsOne": false
+ },
"kv_namespace_binding": {
"maxItemsOne": false
},
@@ -3404,6 +3416,10 @@
}
}
},
+ "cloudflare_zero_trust_gateway_certificate": {
+ "current": "cloudflare:index/zeroTrustGatewayCertificate:ZeroTrustGatewayCertificate",
+ "majorVersion": 5
+ },
"cloudflare_zero_trust_gateway_policy": {
"current": "cloudflare:index/zeroTrustGatewayPolicy:ZeroTrustGatewayPolicy",
"majorVersion": 5,
@@ -3489,6 +3505,9 @@
"body_scanning": {
"maxItemsOne": true
},
+ "certificate": {
+ "maxItemsOne": true
+ },
"custom_certificate": {
"maxItemsOne": true
},
@@ -4073,6 +4092,9 @@
}
}
},
+ "cache_reserve": {
+ "maxItemsOne": true
+ },
"cookie_fields": {
"maxItemsOne": false
},
@@ -4422,6 +4444,7 @@
"cloudflare:index/zeroTrustDexTest:ZeroTrustDexTest": 0,
"cloudflare:index/zeroTrustDlpProfile:ZeroTrustDlpProfile": 0,
"cloudflare:index/zeroTrustDnsLocation:ZeroTrustDnsLocation": 0,
+ "cloudflare:index/zeroTrustGatewayCertificate:ZeroTrustGatewayCertificate": 0,
"cloudflare:index/zeroTrustGatewayPolicy:ZeroTrustGatewayPolicy": 0,
"cloudflare:index/zeroTrustGatewayProxyEndpoint:ZeroTrustGatewayProxyEndpoint": 0,
"cloudflare:index/zeroTrustGatewaySettings:ZeroTrustGatewaySettings": 0,
diff --git a/provider/cmd/pulumi-resource-cloudflare/schema.json b/provider/cmd/pulumi-resource-cloudflare/schema.json
index 6669edabc..b6d2838ec 100644
--- a/provider/cmd/pulumi-resource-cloudflare/schema.json
+++ b/provider/cmd/pulumi-resource-cloudflare/schema.json
@@ -592,7 +592,8 @@
"cloudflare:index/AccessGroupExclude:AccessGroupExclude": {
"properties": {
"anyValidServiceToken": {
- "type": "boolean"
+ "type": "boolean",
+ "description": "Matches any valid Access service token.\n"
},
"authContexts": {
"type": "array",
@@ -601,19 +602,23 @@
}
},
"authMethod": {
- "type": "string"
+ "type": "string",
+ "description": "The type of authentication method. Refer to https://datatracker.ietf.org/doc/html/rfc8176#section-2 for possible types.\n"
},
"azures": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/AccessGroupExcludeAzure:AccessGroupExcludeAzure"
- }
+ },
+ "description": "Matches an Azure group. Requires an Azure identity provider.\n"
},
"certificate": {
- "type": "boolean"
+ "type": "boolean",
+ "description": "Matches any valid client certificate.\n"
},
"commonName": {
- "type": "string"
+ "type": "string",
+ "description": "Matches a valid client certificate common name.\n"
},
"commonNames": {
"type": "array",
@@ -626,62 +631,72 @@
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a device posture integration.\n"
},
"emailDomains": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The email domain to match.\n"
},
"emailLists": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a previously created email list.\n"
},
"emails": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The email of the user.\n"
},
"everyone": {
- "type": "boolean"
+ "type": "boolean",
+ "description": "Matches everyone.\n"
},
"externalEvaluation": {
- "$ref": "#/types/cloudflare:index/AccessGroupExcludeExternalEvaluation:AccessGroupExcludeExternalEvaluation"
+ "$ref": "#/types/cloudflare:index/AccessGroupExcludeExternalEvaluation:AccessGroupExcludeExternalEvaluation",
+ "description": "Create Allow or Block policies which evaluate the user based on custom criteria. https://developers.cloudflare.com/cloudflare-one/policies/access/external-evaluation/.\n"
},
"geos": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "Matches a specific country.\n"
},
"githubs": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/AccessGroupExcludeGithub:AccessGroupExcludeGithub"
- }
+ },
+ "description": "Matches a Github organization. Requires a Github identity provider.\n"
},
"groups": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a previously created Access group.\n"
},
"gsuites": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/AccessGroupExcludeGsuite:AccessGroupExcludeGsuite"
- }
+ },
+ "description": "Matches a group in Google Workspace. Requires a Google Workspace identity provider.\n"
},
"ipLists": {
"type": "array",
"items": {
"type": "string"
},
- "description": "The ID of an existing IP list to reference.\n"
+ "description": "The ID of a previously created IP list.\n"
},
"ips": {
"type": "array",
@@ -694,25 +709,29 @@
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a configured identity provider.\n"
},
"oktas": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/AccessGroupExcludeOkta:AccessGroupExcludeOkta"
- }
+ },
+ "description": "Matches an Okta group. Requires an Okta identity provider.\n"
},
"samls": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/AccessGroupExcludeSaml:AccessGroupExcludeSaml"
- }
+ },
+ "description": "Matches a SAML group. Requires a SAML identity provider.\n"
},
"serviceTokens": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of an Access service token.\n"
}
},
"type": "object"
@@ -729,7 +748,7 @@
},
"identityProviderId": {
"type": "string",
- "description": "The ID of the Azure Identity provider.\n"
+ "description": "The ID of the Azure identity provider.\n"
}
},
"type": "object",
@@ -743,7 +762,7 @@
"properties": {
"identityProviderId": {
"type": "string",
- "description": "The ID of the Azure Identity provider.\n"
+ "description": "The ID of the Azure identity provider.\n"
},
"ids": {
"type": "array",
@@ -758,10 +777,12 @@
"cloudflare:index/AccessGroupExcludeExternalEvaluation:AccessGroupExcludeExternalEvaluation": {
"properties": {
"evaluateUrl": {
- "type": "string"
+ "type": "string",
+ "description": "The API endpoint containing your business logic.\n"
},
"keysUrl": {
- "type": "string"
+ "type": "string",
+ "description": "The API endpoint containing the key that Access uses to verify that the response came from your API.\n"
}
},
"type": "object"
@@ -769,16 +790,19 @@
"cloudflare:index/AccessGroupExcludeGithub:AccessGroupExcludeGithub": {
"properties": {
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your Github identity provider.\n"
},
"name": {
- "type": "string"
+ "type": "string",
+ "description": "The name of the organization.\n"
},
"teams": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The teams that should be matched.\n"
}
},
"type": "object"
@@ -789,10 +813,12 @@
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The email of the Google Workspace group.\n"
},
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your Google Workspace identity provider.\n"
}
},
"type": "object"
@@ -800,13 +826,15 @@
"cloudflare:index/AccessGroupExcludeOkta:AccessGroupExcludeOkta": {
"properties": {
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your Okta identity provider.\n"
},
"names": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The name of the Okta Group.\n"
}
},
"type": "object"
@@ -814,13 +842,16 @@
"cloudflare:index/AccessGroupExcludeSaml:AccessGroupExcludeSaml": {
"properties": {
"attributeName": {
- "type": "string"
+ "type": "string",
+ "description": "The name of the SAML attribute.\n"
},
"attributeValue": {
- "type": "string"
+ "type": "string",
+ "description": "The SAML attribute value to look for.\n"
},
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your SAML identity provider.\n"
}
},
"type": "object"
@@ -828,7 +859,8 @@
"cloudflare:index/AccessGroupInclude:AccessGroupInclude": {
"properties": {
"anyValidServiceToken": {
- "type": "boolean"
+ "type": "boolean",
+ "description": "Matches any valid Access service token.\n"
},
"authContexts": {
"type": "array",
@@ -837,19 +869,23 @@
}
},
"authMethod": {
- "type": "string"
+ "type": "string",
+ "description": "The type of authentication method. Refer to https://datatracker.ietf.org/doc/html/rfc8176#section-2 for possible types.\n"
},
"azures": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/AccessGroupIncludeAzure:AccessGroupIncludeAzure"
- }
+ },
+ "description": "Matches an Azure group. Requires an Azure identity provider.\n"
},
"certificate": {
- "type": "boolean"
+ "type": "boolean",
+ "description": "Matches any valid client certificate.\n"
},
"commonName": {
- "type": "string"
+ "type": "string",
+ "description": "Matches a valid client certificate common name.\n"
},
"commonNames": {
"type": "array",
@@ -862,62 +898,72 @@
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a device posture integration.\n"
},
"emailDomains": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The email domain to match.\n"
},
"emailLists": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a previously created email list.\n"
},
"emails": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The email of the user.\n"
},
"everyone": {
- "type": "boolean"
+ "type": "boolean",
+ "description": "Matches everyone.\n"
},
"externalEvaluation": {
- "$ref": "#/types/cloudflare:index/AccessGroupIncludeExternalEvaluation:AccessGroupIncludeExternalEvaluation"
+ "$ref": "#/types/cloudflare:index/AccessGroupIncludeExternalEvaluation:AccessGroupIncludeExternalEvaluation",
+ "description": "Create Allow or Block policies which evaluate the user based on custom criteria. https://developers.cloudflare.com/cloudflare-one/policies/access/external-evaluation/.\n"
},
"geos": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "Matches a specific country.\n"
},
"githubs": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/AccessGroupIncludeGithub:AccessGroupIncludeGithub"
- }
+ },
+ "description": "Matches a Github organization. Requires a Github identity provider.\n"
},
"groups": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a previously created Access group.\n"
},
"gsuites": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/AccessGroupIncludeGsuite:AccessGroupIncludeGsuite"
- }
+ },
+ "description": "Matches a group in Google Workspace. Requires a Google Workspace identity provider.\n"
},
"ipLists": {
"type": "array",
"items": {
"type": "string"
},
- "description": "The ID of an existing IP list to reference.\n"
+ "description": "The ID of a previously created IP list.\n"
},
"ips": {
"type": "array",
@@ -930,25 +976,29 @@
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a configured identity provider.\n"
},
"oktas": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/AccessGroupIncludeOkta:AccessGroupIncludeOkta"
- }
+ },
+ "description": "Matches an Okta group. Requires an Okta identity provider.\n"
},
"samls": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/AccessGroupIncludeSaml:AccessGroupIncludeSaml"
- }
+ },
+ "description": "Matches a SAML group. Requires a SAML identity provider.\n"
},
"serviceTokens": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of an Access service token.\n"
}
},
"type": "object"
@@ -965,7 +1015,7 @@
},
"identityProviderId": {
"type": "string",
- "description": "The ID of the Azure Identity provider.\n"
+ "description": "The ID of the Azure identity provider.\n"
}
},
"type": "object",
@@ -979,7 +1029,7 @@
"properties": {
"identityProviderId": {
"type": "string",
- "description": "The ID of the Azure Identity provider.\n"
+ "description": "The ID of the Azure identity provider.\n"
},
"ids": {
"type": "array",
@@ -994,10 +1044,12 @@
"cloudflare:index/AccessGroupIncludeExternalEvaluation:AccessGroupIncludeExternalEvaluation": {
"properties": {
"evaluateUrl": {
- "type": "string"
+ "type": "string",
+ "description": "The API endpoint containing your business logic.\n"
},
"keysUrl": {
- "type": "string"
+ "type": "string",
+ "description": "The API endpoint containing the key that Access uses to verify that the response came from your API.\n"
}
},
"type": "object"
@@ -1005,16 +1057,19 @@
"cloudflare:index/AccessGroupIncludeGithub:AccessGroupIncludeGithub": {
"properties": {
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your Github identity provider.\n"
},
"name": {
- "type": "string"
+ "type": "string",
+ "description": "The name of the organization.\n"
},
"teams": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The teams that should be matched.\n"
}
},
"type": "object"
@@ -1025,10 +1080,12 @@
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The email of the Google Workspace group.\n"
},
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your Google Workspace identity provider.\n"
}
},
"type": "object"
@@ -1036,13 +1093,15 @@
"cloudflare:index/AccessGroupIncludeOkta:AccessGroupIncludeOkta": {
"properties": {
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your Okta identity provider.\n"
},
"names": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The name of the Okta Group.\n"
}
},
"type": "object"
@@ -1050,13 +1109,16 @@
"cloudflare:index/AccessGroupIncludeSaml:AccessGroupIncludeSaml": {
"properties": {
"attributeName": {
- "type": "string"
+ "type": "string",
+ "description": "The name of the SAML attribute.\n"
},
"attributeValue": {
- "type": "string"
+ "type": "string",
+ "description": "The SAML attribute value to look for.\n"
},
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your SAML identity provider.\n"
}
},
"type": "object"
@@ -1064,7 +1126,8 @@
"cloudflare:index/AccessGroupRequire:AccessGroupRequire": {
"properties": {
"anyValidServiceToken": {
- "type": "boolean"
+ "type": "boolean",
+ "description": "Matches any valid Access service token.\n"
},
"authContexts": {
"type": "array",
@@ -1073,19 +1136,23 @@
}
},
"authMethod": {
- "type": "string"
+ "type": "string",
+ "description": "The type of authentication method. Refer to https://datatracker.ietf.org/doc/html/rfc8176#section-2 for possible types.\n"
},
"azures": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/AccessGroupRequireAzure:AccessGroupRequireAzure"
- }
+ },
+ "description": "Matches an Azure group. Requires an Azure identity provider.\n"
},
"certificate": {
- "type": "boolean"
+ "type": "boolean",
+ "description": "Matches any valid client certificate.\n"
},
"commonName": {
- "type": "string"
+ "type": "string",
+ "description": "Matches a valid client certificate common name.\n"
},
"commonNames": {
"type": "array",
@@ -1098,62 +1165,72 @@
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a device posture integration.\n"
},
"emailDomains": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The email domain to match.\n"
},
"emailLists": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a previously created email list.\n"
},
"emails": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The email of the user.\n"
},
"everyone": {
- "type": "boolean"
+ "type": "boolean",
+ "description": "Matches everyone.\n"
},
"externalEvaluation": {
- "$ref": "#/types/cloudflare:index/AccessGroupRequireExternalEvaluation:AccessGroupRequireExternalEvaluation"
+ "$ref": "#/types/cloudflare:index/AccessGroupRequireExternalEvaluation:AccessGroupRequireExternalEvaluation",
+ "description": "Create Allow or Block policies which evaluate the user based on custom criteria. https://developers.cloudflare.com/cloudflare-one/policies/access/external-evaluation/.\n"
},
"geos": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "Matches a specific country.\n"
},
"githubs": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/AccessGroupRequireGithub:AccessGroupRequireGithub"
- }
+ },
+ "description": "Matches a Github organization. Requires a Github identity provider.\n"
},
"groups": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a previously created Access group.\n"
},
"gsuites": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/AccessGroupRequireGsuite:AccessGroupRequireGsuite"
- }
+ },
+ "description": "Matches a group in Google Workspace. Requires a Google Workspace identity provider.\n"
},
"ipLists": {
"type": "array",
"items": {
"type": "string"
},
- "description": "The ID of an existing IP list to reference.\n"
+ "description": "The ID of a previously created IP list.\n"
},
"ips": {
"type": "array",
@@ -1166,25 +1243,29 @@
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a configured identity provider.\n"
},
"oktas": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/AccessGroupRequireOkta:AccessGroupRequireOkta"
- }
+ },
+ "description": "Matches an Okta group. Requires an Okta identity provider.\n"
},
"samls": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/AccessGroupRequireSaml:AccessGroupRequireSaml"
- }
+ },
+ "description": "Matches a SAML group. Requires a SAML identity provider.\n"
},
"serviceTokens": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of an Access service token.\n"
}
},
"type": "object"
@@ -1201,7 +1282,7 @@
},
"identityProviderId": {
"type": "string",
- "description": "The ID of the Azure Identity provider.\n"
+ "description": "The ID of the Azure identity provider.\n"
}
},
"type": "object",
@@ -1215,7 +1296,7 @@
"properties": {
"identityProviderId": {
"type": "string",
- "description": "The ID of the Azure Identity provider.\n"
+ "description": "The ID of the Azure identity provider.\n"
},
"ids": {
"type": "array",
@@ -1230,10 +1311,12 @@
"cloudflare:index/AccessGroupRequireExternalEvaluation:AccessGroupRequireExternalEvaluation": {
"properties": {
"evaluateUrl": {
- "type": "string"
+ "type": "string",
+ "description": "The API endpoint containing your business logic.\n"
},
"keysUrl": {
- "type": "string"
+ "type": "string",
+ "description": "The API endpoint containing the key that Access uses to verify that the response came from your API.\n"
}
},
"type": "object"
@@ -1241,16 +1324,19 @@
"cloudflare:index/AccessGroupRequireGithub:AccessGroupRequireGithub": {
"properties": {
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your Github identity provider.\n"
},
"name": {
- "type": "string"
+ "type": "string",
+ "description": "The name of the organization.\n"
},
"teams": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The teams that should be matched.\n"
}
},
"type": "object"
@@ -1261,10 +1347,12 @@
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The email of the Google Workspace group.\n"
},
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your Google Workspace identity provider.\n"
}
},
"type": "object"
@@ -1272,13 +1360,15 @@
"cloudflare:index/AccessGroupRequireOkta:AccessGroupRequireOkta": {
"properties": {
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your Okta identity provider.\n"
},
"names": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The name of the Okta Group.\n"
}
},
"type": "object"
@@ -1286,13 +1376,16 @@
"cloudflare:index/AccessGroupRequireSaml:AccessGroupRequireSaml": {
"properties": {
"attributeName": {
- "type": "string"
+ "type": "string",
+ "description": "The name of the SAML attribute.\n"
},
"attributeValue": {
- "type": "string"
+ "type": "string",
+ "description": "The SAML attribute value to look for.\n"
},
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your SAML identity provider.\n"
}
},
"type": "object"
@@ -1513,7 +1606,8 @@
"cloudflare:index/AccessPolicyExclude:AccessPolicyExclude": {
"properties": {
"anyValidServiceToken": {
- "type": "boolean"
+ "type": "boolean",
+ "description": "Matches any valid Access service token.\n"
},
"authContexts": {
"type": "array",
@@ -1522,19 +1616,23 @@
}
},
"authMethod": {
- "type": "string"
+ "type": "string",
+ "description": "The type of authentication method. Refer to https://datatracker.ietf.org/doc/html/rfc8176#section-2 for possible types.\n"
},
"azures": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/AccessPolicyExcludeAzure:AccessPolicyExcludeAzure"
- }
+ },
+ "description": "Matches an Azure group. Requires an Azure identity provider.\n"
},
"certificate": {
- "type": "boolean"
+ "type": "boolean",
+ "description": "Matches any valid client certificate.\n"
},
"commonName": {
- "type": "string"
+ "type": "string",
+ "description": "Matches a valid client certificate common name.\n"
},
"commonNames": {
"type": "array",
@@ -1547,62 +1645,72 @@
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a device posture integration.\n"
},
"emailDomains": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The email domain to match.\n"
},
"emailLists": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a previously created email list.\n"
},
"emails": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The email of the user.\n"
},
"everyone": {
- "type": "boolean"
+ "type": "boolean",
+ "description": "Matches everyone.\n"
},
"externalEvaluation": {
- "$ref": "#/types/cloudflare:index/AccessPolicyExcludeExternalEvaluation:AccessPolicyExcludeExternalEvaluation"
+ "$ref": "#/types/cloudflare:index/AccessPolicyExcludeExternalEvaluation:AccessPolicyExcludeExternalEvaluation",
+ "description": "Create Allow or Block policies which evaluate the user based on custom criteria. https://developers.cloudflare.com/cloudflare-one/policies/access/external-evaluation/.\n"
},
"geos": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "Matches a specific country.\n"
},
"githubs": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/AccessPolicyExcludeGithub:AccessPolicyExcludeGithub"
- }
+ },
+ "description": "Matches a Github organization. Requires a Github identity provider.\n"
},
"groups": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a previously created Access group.\n"
},
"gsuites": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/AccessPolicyExcludeGsuite:AccessPolicyExcludeGsuite"
- }
+ },
+ "description": "Matches a group in Google Workspace. Requires a Google Workspace identity provider.\n"
},
"ipLists": {
"type": "array",
"items": {
"type": "string"
},
- "description": "The ID of an existing IP list to reference.\n"
+ "description": "The ID of a previously created IP list.\n"
},
"ips": {
"type": "array",
@@ -1615,25 +1723,29 @@
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a configured identity provider.\n"
},
"oktas": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/AccessPolicyExcludeOkta:AccessPolicyExcludeOkta"
- }
+ },
+ "description": "Matches an Okta group. Requires an Okta identity provider.\n"
},
"samls": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/AccessPolicyExcludeSaml:AccessPolicyExcludeSaml"
- }
+ },
+ "description": "Matches a SAML group. Requires a SAML identity provider.\n"
},
"serviceTokens": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of an Access service token.\n"
}
},
"type": "object"
@@ -1650,7 +1762,7 @@
},
"identityProviderId": {
"type": "string",
- "description": "The ID of the Azure Identity provider.\n"
+ "description": "The ID of the Azure identity provider.\n"
}
},
"type": "object",
@@ -1664,7 +1776,7 @@
"properties": {
"identityProviderId": {
"type": "string",
- "description": "The ID of the Azure Identity provider.\n"
+ "description": "The ID of the Azure identity provider.\n"
},
"ids": {
"type": "array",
@@ -1679,10 +1791,12 @@
"cloudflare:index/AccessPolicyExcludeExternalEvaluation:AccessPolicyExcludeExternalEvaluation": {
"properties": {
"evaluateUrl": {
- "type": "string"
+ "type": "string",
+ "description": "The API endpoint containing your business logic.\n"
},
"keysUrl": {
- "type": "string"
+ "type": "string",
+ "description": "The API endpoint containing the key that Access uses to verify that the response came from your API.\n"
}
},
"type": "object"
@@ -1690,16 +1804,19 @@
"cloudflare:index/AccessPolicyExcludeGithub:AccessPolicyExcludeGithub": {
"properties": {
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your Github identity provider.\n"
},
"name": {
- "type": "string"
+ "type": "string",
+ "description": "The name of the organization.\n"
},
"teams": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The teams that should be matched.\n"
}
},
"type": "object"
@@ -1710,10 +1827,12 @@
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The email of the Google Workspace group.\n"
},
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your Google Workspace identity provider.\n"
}
},
"type": "object"
@@ -1721,13 +1840,15 @@
"cloudflare:index/AccessPolicyExcludeOkta:AccessPolicyExcludeOkta": {
"properties": {
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your Okta identity provider.\n"
},
"names": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The name of the Okta Group.\n"
}
},
"type": "object"
@@ -1735,13 +1856,16 @@
"cloudflare:index/AccessPolicyExcludeSaml:AccessPolicyExcludeSaml": {
"properties": {
"attributeName": {
- "type": "string"
+ "type": "string",
+ "description": "The name of the SAML attribute.\n"
},
"attributeValue": {
- "type": "string"
+ "type": "string",
+ "description": "The SAML attribute value to look for.\n"
},
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your SAML identity provider.\n"
}
},
"type": "object"
@@ -1749,7 +1873,8 @@
"cloudflare:index/AccessPolicyInclude:AccessPolicyInclude": {
"properties": {
"anyValidServiceToken": {
- "type": "boolean"
+ "type": "boolean",
+ "description": "Matches any valid Access service token.\n"
},
"authContexts": {
"type": "array",
@@ -1758,19 +1883,23 @@
}
},
"authMethod": {
- "type": "string"
+ "type": "string",
+ "description": "The type of authentication method. Refer to https://datatracker.ietf.org/doc/html/rfc8176#section-2 for possible types.\n"
},
"azures": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/AccessPolicyIncludeAzure:AccessPolicyIncludeAzure"
- }
+ },
+ "description": "Matches an Azure group. Requires an Azure identity provider.\n"
},
"certificate": {
- "type": "boolean"
+ "type": "boolean",
+ "description": "Matches any valid client certificate.\n"
},
"commonName": {
- "type": "string"
+ "type": "string",
+ "description": "Matches a valid client certificate common name.\n"
},
"commonNames": {
"type": "array",
@@ -1783,62 +1912,72 @@
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a device posture integration.\n"
},
"emailDomains": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The email domain to match.\n"
},
"emailLists": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a previously created email list.\n"
},
"emails": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The email of the user.\n"
},
"everyone": {
- "type": "boolean"
+ "type": "boolean",
+ "description": "Matches everyone.\n"
},
"externalEvaluation": {
- "$ref": "#/types/cloudflare:index/AccessPolicyIncludeExternalEvaluation:AccessPolicyIncludeExternalEvaluation"
+ "$ref": "#/types/cloudflare:index/AccessPolicyIncludeExternalEvaluation:AccessPolicyIncludeExternalEvaluation",
+ "description": "Create Allow or Block policies which evaluate the user based on custom criteria. https://developers.cloudflare.com/cloudflare-one/policies/access/external-evaluation/.\n"
},
"geos": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "Matches a specific country.\n"
},
"githubs": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/AccessPolicyIncludeGithub:AccessPolicyIncludeGithub"
- }
+ },
+ "description": "Matches a Github organization. Requires a Github identity provider.\n"
},
"groups": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a previously created Access group.\n"
},
"gsuites": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/AccessPolicyIncludeGsuite:AccessPolicyIncludeGsuite"
- }
+ },
+ "description": "Matches a group in Google Workspace. Requires a Google Workspace identity provider.\n"
},
"ipLists": {
"type": "array",
"items": {
"type": "string"
},
- "description": "The ID of an existing IP list to reference.\n"
+ "description": "The ID of a previously created IP list.\n"
},
"ips": {
"type": "array",
@@ -1851,25 +1990,29 @@
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a configured identity provider.\n"
},
"oktas": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/AccessPolicyIncludeOkta:AccessPolicyIncludeOkta"
- }
+ },
+ "description": "Matches an Okta group. Requires an Okta identity provider.\n"
},
"samls": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/AccessPolicyIncludeSaml:AccessPolicyIncludeSaml"
- }
+ },
+ "description": "Matches a SAML group. Requires a SAML identity provider.\n"
},
"serviceTokens": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of an Access service token.\n"
}
},
"type": "object"
@@ -1886,7 +2029,7 @@
},
"identityProviderId": {
"type": "string",
- "description": "The ID of the Azure Identity provider.\n"
+ "description": "The ID of the Azure identity provider.\n"
}
},
"type": "object",
@@ -1900,7 +2043,7 @@
"properties": {
"identityProviderId": {
"type": "string",
- "description": "The ID of the Azure Identity provider.\n"
+ "description": "The ID of the Azure identity provider.\n"
},
"ids": {
"type": "array",
@@ -1915,10 +2058,12 @@
"cloudflare:index/AccessPolicyIncludeExternalEvaluation:AccessPolicyIncludeExternalEvaluation": {
"properties": {
"evaluateUrl": {
- "type": "string"
+ "type": "string",
+ "description": "The API endpoint containing your business logic.\n"
},
"keysUrl": {
- "type": "string"
+ "type": "string",
+ "description": "The API endpoint containing the key that Access uses to verify that the response came from your API.\n"
}
},
"type": "object"
@@ -1926,16 +2071,19 @@
"cloudflare:index/AccessPolicyIncludeGithub:AccessPolicyIncludeGithub": {
"properties": {
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your Github identity provider.\n"
},
"name": {
- "type": "string"
+ "type": "string",
+ "description": "The name of the organization.\n"
},
"teams": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The teams that should be matched.\n"
}
},
"type": "object"
@@ -1946,10 +2094,12 @@
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The email of the Google Workspace group.\n"
},
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your Google Workspace identity provider.\n"
}
},
"type": "object"
@@ -1957,13 +2107,15 @@
"cloudflare:index/AccessPolicyIncludeOkta:AccessPolicyIncludeOkta": {
"properties": {
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your Okta identity provider.\n"
},
"names": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The name of the Okta Group.\n"
}
},
"type": "object"
@@ -1971,13 +2123,16 @@
"cloudflare:index/AccessPolicyIncludeSaml:AccessPolicyIncludeSaml": {
"properties": {
"attributeName": {
- "type": "string"
+ "type": "string",
+ "description": "The name of the SAML attribute.\n"
},
"attributeValue": {
- "type": "string"
+ "type": "string",
+ "description": "The SAML attribute value to look for.\n"
},
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your SAML identity provider.\n"
}
},
"type": "object"
@@ -1985,7 +2140,8 @@
"cloudflare:index/AccessPolicyRequire:AccessPolicyRequire": {
"properties": {
"anyValidServiceToken": {
- "type": "boolean"
+ "type": "boolean",
+ "description": "Matches any valid Access service token.\n"
},
"authContexts": {
"type": "array",
@@ -1994,19 +2150,23 @@
}
},
"authMethod": {
- "type": "string"
+ "type": "string",
+ "description": "The type of authentication method. Refer to https://datatracker.ietf.org/doc/html/rfc8176#section-2 for possible types.\n"
},
"azures": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/AccessPolicyRequireAzure:AccessPolicyRequireAzure"
- }
+ },
+ "description": "Matches an Azure group. Requires an Azure identity provider.\n"
},
"certificate": {
- "type": "boolean"
+ "type": "boolean",
+ "description": "Matches any valid client certificate.\n"
},
"commonName": {
- "type": "string"
+ "type": "string",
+ "description": "Matches a valid client certificate common name.\n"
},
"commonNames": {
"type": "array",
@@ -2019,62 +2179,72 @@
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a device posture integration.\n"
},
"emailDomains": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The email domain to match.\n"
},
"emailLists": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a previously created email list.\n"
},
"emails": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The email of the user.\n"
},
"everyone": {
- "type": "boolean"
+ "type": "boolean",
+ "description": "Matches everyone.\n"
},
"externalEvaluation": {
- "$ref": "#/types/cloudflare:index/AccessPolicyRequireExternalEvaluation:AccessPolicyRequireExternalEvaluation"
+ "$ref": "#/types/cloudflare:index/AccessPolicyRequireExternalEvaluation:AccessPolicyRequireExternalEvaluation",
+ "description": "Create Allow or Block policies which evaluate the user based on custom criteria. https://developers.cloudflare.com/cloudflare-one/policies/access/external-evaluation/.\n"
},
"geos": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "Matches a specific country.\n"
},
"githubs": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/AccessPolicyRequireGithub:AccessPolicyRequireGithub"
- }
+ },
+ "description": "Matches a Github organization. Requires a Github identity provider.\n"
},
"groups": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a previously created Access group.\n"
},
"gsuites": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/AccessPolicyRequireGsuite:AccessPolicyRequireGsuite"
- }
+ },
+ "description": "Matches a group in Google Workspace. Requires a Google Workspace identity provider.\n"
},
"ipLists": {
"type": "array",
"items": {
"type": "string"
},
- "description": "The ID of an existing IP list to reference.\n"
+ "description": "The ID of a previously created IP list.\n"
},
"ips": {
"type": "array",
@@ -2087,25 +2257,29 @@
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a configured identity provider.\n"
},
"oktas": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/AccessPolicyRequireOkta:AccessPolicyRequireOkta"
- }
+ },
+ "description": "Matches an Okta group. Requires an Okta identity provider.\n"
},
"samls": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/AccessPolicyRequireSaml:AccessPolicyRequireSaml"
- }
+ },
+ "description": "Matches a SAML group. Requires a SAML identity provider.\n"
},
"serviceTokens": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of an Access service token.\n"
}
},
"type": "object"
@@ -2122,7 +2296,7 @@
},
"identityProviderId": {
"type": "string",
- "description": "The ID of the Azure Identity provider.\n"
+ "description": "The ID of the Azure identity provider.\n"
}
},
"type": "object",
@@ -2136,7 +2310,7 @@
"properties": {
"identityProviderId": {
"type": "string",
- "description": "The ID of the Azure Identity provider.\n"
+ "description": "The ID of the Azure identity provider.\n"
},
"ids": {
"type": "array",
@@ -2151,10 +2325,12 @@
"cloudflare:index/AccessPolicyRequireExternalEvaluation:AccessPolicyRequireExternalEvaluation": {
"properties": {
"evaluateUrl": {
- "type": "string"
+ "type": "string",
+ "description": "The API endpoint containing your business logic.\n"
},
"keysUrl": {
- "type": "string"
+ "type": "string",
+ "description": "The API endpoint containing the key that Access uses to verify that the response came from your API.\n"
}
},
"type": "object"
@@ -2162,16 +2338,19 @@
"cloudflare:index/AccessPolicyRequireGithub:AccessPolicyRequireGithub": {
"properties": {
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your Github identity provider.\n"
},
"name": {
- "type": "string"
+ "type": "string",
+ "description": "The name of the organization.\n"
},
"teams": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The teams that should be matched.\n"
}
},
"type": "object"
@@ -2182,10 +2361,12 @@
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The email of the Google Workspace group.\n"
},
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your Google Workspace identity provider.\n"
}
},
"type": "object"
@@ -2193,13 +2374,15 @@
"cloudflare:index/AccessPolicyRequireOkta:AccessPolicyRequireOkta": {
"properties": {
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your Okta identity provider.\n"
},
"names": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The name of the Okta Group.\n"
}
},
"type": "object"
@@ -2207,13 +2390,16 @@
"cloudflare:index/AccessPolicyRequireSaml:AccessPolicyRequireSaml": {
"properties": {
"attributeName": {
- "type": "string"
+ "type": "string",
+ "description": "The name of the SAML attribute.\n"
},
"attributeValue": {
- "type": "string"
+ "type": "string",
+ "description": "The SAML attribute value to look for.\n"
},
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your SAML identity provider.\n"
}
},
"type": "object"
@@ -2797,7 +2983,7 @@
"items": {
"$ref": "#/types/cloudflare:index/DevicePostureRuleInputLocation:DevicePostureRuleInputLocation"
},
- "description": "List of locations to check for client certificate posture check.\n"
+ "description": "List of operating system locations to check for a client certificate..\n"
},
"networkStatus": {
"type": "string",
@@ -2869,7 +3055,7 @@
},
"versionOperator": {
"type": "string",
- "description": "The version comparison operator for crowdstrike. Available values: `\u003e`, `\u003e=`, `\u003c`, `\u003c=`, `==`.\n"
+ "description": "The version comparison operator for Crowdstrike. Available values: `\u003e`, `\u003e=`, `\u003c`, `\u003c=`, `==`.\n"
}
},
"type": "object",
@@ -2893,14 +3079,14 @@
"items": {
"type": "string"
},
- "description": "List of paths to check for client certificate.\n"
+ "description": "List of paths to check for client certificate rule.\n"
},
"trustStores": {
"type": "array",
"items": {
"type": "string"
},
- "description": "List of trust stores to check for client certificate. Available values: `system`, `user`.\n"
+ "description": "List of trust stores to check for client certificate rule. Available values: `system`, `user`.\n"
}
},
"type": "object"
@@ -5347,6 +5533,10 @@
"$ref": "#/types/cloudflare:index/RulesetRuleActionParametersCacheKey:RulesetRuleActionParametersCacheKey",
"description": "List of cache key parameters to apply to the request.\n"
},
+ "cacheReserve": {
+ "$ref": "#/types/cloudflare:index/RulesetRuleActionParametersCacheReserve:RulesetRuleActionParametersCacheReserve",
+ "description": "List of cache reserve parameters to apply to the request.\n"
+ },
"content": {
"type": "string",
"description": "Content of the custom error response.\n"
@@ -5758,6 +5948,22 @@
},
"type": "object"
},
+ "cloudflare:index/RulesetRuleActionParametersCacheReserve:RulesetRuleActionParametersCacheReserve": {
+ "properties": {
+ "eligible": {
+ "type": "boolean",
+ "description": "Determines whether Cloudflare will write the eligible resource to cache reserve.\n"
+ },
+ "minimumFileSize": {
+ "type": "integer",
+ "description": "The minimum file size, in bytes, eligible for storage in cache reserve. If omitted and \"eligible\" is true, Cloudflare will use 0 bytes by default.\n"
+ }
+ },
+ "type": "object",
+ "required": [
+ "eligible"
+ ]
+ },
"cloudflare:index/RulesetRuleActionParametersEdgeTtl:RulesetRuleActionParametersEdgeTtl": {
"properties": {
"default": {
@@ -6297,6 +6503,18 @@
"inspectionMode"
]
},
+ "cloudflare:index/TeamsAccountCertificate:TeamsAccountCertificate": {
+ "properties": {
+ "id": {
+ "type": "string",
+ "description": "ID of certificate for TLS interception.\n"
+ }
+ },
+ "type": "object",
+ "required": [
+ "id"
+ ]
+ },
"cloudflare:index/TeamsAccountCustomCertificate:TeamsAccountCustomCertificate": {
"properties": {
"enabled": {
@@ -6449,7 +6667,7 @@
"properties": {
"disableForTime": {
"type": "integer",
- "description": "Sets the time limit in seconds that a user can use an override code to bypass WARP\n"
+ "description": "Sets the time limit in seconds that a user can use an override code to bypass WARP.\n"
},
"rootCa": {
"type": "boolean",
@@ -7224,6 +7442,23 @@
"name"
]
},
+ "cloudflare:index/WorkerScriptHyperdriveConfigBinding:WorkerScriptHyperdriveConfigBinding": {
+ "properties": {
+ "binding": {
+ "type": "string",
+ "description": "The global variable for the binding in your Worker code.\n"
+ },
+ "id": {
+ "type": "string",
+ "description": "The ID of the Hyperdrive config to use.\n"
+ }
+ },
+ "type": "object",
+ "required": [
+ "binding",
+ "id"
+ ]
+ },
"cloudflare:index/WorkerScriptKvNamespaceBinding:WorkerScriptKvNamespaceBinding": {
"properties": {
"name": {
@@ -7394,6 +7629,23 @@
"name"
]
},
+ "cloudflare:index/WorkersScriptHyperdriveConfigBinding:WorkersScriptHyperdriveConfigBinding": {
+ "properties": {
+ "binding": {
+ "type": "string",
+ "description": "The global variable for the binding in your Worker code.\n"
+ },
+ "id": {
+ "type": "string",
+ "description": "The ID of the Hyperdrive config to use.\n"
+ }
+ },
+ "type": "object",
+ "required": [
+ "binding",
+ "id"
+ ]
+ },
"cloudflare:index/WorkersScriptKvNamespaceBinding:WorkersScriptKvNamespaceBinding": {
"properties": {
"name": {
@@ -7985,7 +8237,8 @@
"cloudflare:index/ZeroTrustAccessGroupExclude:ZeroTrustAccessGroupExclude": {
"properties": {
"anyValidServiceToken": {
- "type": "boolean"
+ "type": "boolean",
+ "description": "Matches any valid Access service token.\n"
},
"authContexts": {
"type": "array",
@@ -7994,19 +8247,23 @@
}
},
"authMethod": {
- "type": "string"
+ "type": "string",
+ "description": "The type of authentication method. Refer to https://datatracker.ietf.org/doc/html/rfc8176#section-2 for possible types.\n"
},
"azures": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/ZeroTrustAccessGroupExcludeAzure:ZeroTrustAccessGroupExcludeAzure"
- }
+ },
+ "description": "Matches an Azure group. Requires an Azure identity provider.\n"
},
"certificate": {
- "type": "boolean"
+ "type": "boolean",
+ "description": "Matches any valid client certificate.\n"
},
"commonName": {
- "type": "string"
+ "type": "string",
+ "description": "Matches a valid client certificate common name.\n"
},
"commonNames": {
"type": "array",
@@ -8019,65 +8276,75 @@
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a device posture integration.\n"
},
"emailDomains": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The email domain to match.\n"
},
"emailLists": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a previously created email list.\n"
},
"emails": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The email of the user.\n"
},
"everyone": {
- "type": "boolean"
+ "type": "boolean",
+ "description": "Matches everyone.\n"
},
"externalEvaluations": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/ZeroTrustAccessGroupExcludeExternalEvaluation:ZeroTrustAccessGroupExcludeExternalEvaluation"
- }
+ },
+ "description": "Create Allow or Block policies which evaluate the user based on custom criteria. https://developers.cloudflare.com/cloudflare-one/policies/access/external-evaluation/.\n"
},
"geos": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "Matches a specific country.\n"
},
"githubs": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/ZeroTrustAccessGroupExcludeGithub:ZeroTrustAccessGroupExcludeGithub"
- }
+ },
+ "description": "Matches a Github organization. Requires a Github identity provider.\n"
},
"groups": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a previously created Access group.\n"
},
"gsuites": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/ZeroTrustAccessGroupExcludeGsuite:ZeroTrustAccessGroupExcludeGsuite"
- }
+ },
+ "description": "Matches a group in Google Workspace. Requires a Google Workspace identity provider.\n"
},
"ipLists": {
"type": "array",
"items": {
"type": "string"
},
- "description": "The ID of an existing IP list to reference.\n"
+ "description": "The ID of a previously created IP list.\n"
},
"ips": {
"type": "array",
@@ -8090,25 +8357,29 @@
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a configured identity provider.\n"
},
"oktas": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/ZeroTrustAccessGroupExcludeOkta:ZeroTrustAccessGroupExcludeOkta"
- }
+ },
+ "description": "Matches an Okta group. Requires an Okta identity provider.\n"
},
"samls": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/ZeroTrustAccessGroupExcludeSaml:ZeroTrustAccessGroupExcludeSaml"
- }
+ },
+ "description": "Matches a SAML group. Requires a SAML identity provider.\n"
},
"serviceTokens": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of an Access service token.\n"
}
},
"type": "object"
@@ -8125,7 +8396,7 @@
},
"identityProviderId": {
"type": "string",
- "description": "The ID of the Azure Identity provider.\n"
+ "description": "The ID of the Azure identity provider.\n"
}
},
"type": "object",
@@ -8139,7 +8410,7 @@
"properties": {
"identityProviderId": {
"type": "string",
- "description": "The ID of the Azure Identity provider.\n"
+ "description": "The ID of the Azure identity provider.\n"
},
"ids": {
"type": "array",
@@ -8154,10 +8425,12 @@
"cloudflare:index/ZeroTrustAccessGroupExcludeExternalEvaluation:ZeroTrustAccessGroupExcludeExternalEvaluation": {
"properties": {
"evaluateUrl": {
- "type": "string"
+ "type": "string",
+ "description": "The API endpoint containing your business logic.\n"
},
"keysUrl": {
- "type": "string"
+ "type": "string",
+ "description": "The API endpoint containing the key that Access uses to verify that the response came from your API.\n"
}
},
"type": "object"
@@ -8165,16 +8438,19 @@
"cloudflare:index/ZeroTrustAccessGroupExcludeGithub:ZeroTrustAccessGroupExcludeGithub": {
"properties": {
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your Github identity provider.\n"
},
"name": {
- "type": "string"
+ "type": "string",
+ "description": "The name of the organization.\n"
},
"teams": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The teams that should be matched.\n"
}
},
"type": "object"
@@ -8185,10 +8461,12 @@
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The email of the Google Workspace group.\n"
},
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your Google Workspace identity provider.\n"
}
},
"type": "object"
@@ -8196,13 +8474,15 @@
"cloudflare:index/ZeroTrustAccessGroupExcludeOkta:ZeroTrustAccessGroupExcludeOkta": {
"properties": {
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your Okta identity provider.\n"
},
"names": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The name of the Okta Group.\n"
}
},
"type": "object"
@@ -8210,13 +8490,16 @@
"cloudflare:index/ZeroTrustAccessGroupExcludeSaml:ZeroTrustAccessGroupExcludeSaml": {
"properties": {
"attributeName": {
- "type": "string"
+ "type": "string",
+ "description": "The name of the SAML attribute.\n"
},
"attributeValue": {
- "type": "string"
+ "type": "string",
+ "description": "The SAML attribute value to look for.\n"
},
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your SAML identity provider.\n"
}
},
"type": "object"
@@ -8224,7 +8507,8 @@
"cloudflare:index/ZeroTrustAccessGroupInclude:ZeroTrustAccessGroupInclude": {
"properties": {
"anyValidServiceToken": {
- "type": "boolean"
+ "type": "boolean",
+ "description": "Matches any valid Access service token.\n"
},
"authContexts": {
"type": "array",
@@ -8233,19 +8517,23 @@
}
},
"authMethod": {
- "type": "string"
+ "type": "string",
+ "description": "The type of authentication method. Refer to https://datatracker.ietf.org/doc/html/rfc8176#section-2 for possible types.\n"
},
"azures": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/ZeroTrustAccessGroupIncludeAzure:ZeroTrustAccessGroupIncludeAzure"
- }
+ },
+ "description": "Matches an Azure group. Requires an Azure identity provider.\n"
},
"certificate": {
- "type": "boolean"
+ "type": "boolean",
+ "description": "Matches any valid client certificate.\n"
},
"commonName": {
- "type": "string"
+ "type": "string",
+ "description": "Matches a valid client certificate common name.\n"
},
"commonNames": {
"type": "array",
@@ -8258,65 +8546,75 @@
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a device posture integration.\n"
},
"emailDomains": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The email domain to match.\n"
},
"emailLists": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a previously created email list.\n"
},
"emails": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The email of the user.\n"
},
"everyone": {
- "type": "boolean"
+ "type": "boolean",
+ "description": "Matches everyone.\n"
},
"externalEvaluations": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/ZeroTrustAccessGroupIncludeExternalEvaluation:ZeroTrustAccessGroupIncludeExternalEvaluation"
- }
+ },
+ "description": "Create Allow or Block policies which evaluate the user based on custom criteria. https://developers.cloudflare.com/cloudflare-one/policies/access/external-evaluation/.\n"
},
"geos": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "Matches a specific country.\n"
},
"githubs": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/ZeroTrustAccessGroupIncludeGithub:ZeroTrustAccessGroupIncludeGithub"
- }
+ },
+ "description": "Matches a Github organization. Requires a Github identity provider.\n"
},
"groups": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a previously created Access group.\n"
},
"gsuites": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/ZeroTrustAccessGroupIncludeGsuite:ZeroTrustAccessGroupIncludeGsuite"
- }
+ },
+ "description": "Matches a group in Google Workspace. Requires a Google Workspace identity provider.\n"
},
"ipLists": {
"type": "array",
"items": {
"type": "string"
},
- "description": "The ID of an existing IP list to reference.\n"
+ "description": "The ID of a previously created IP list.\n"
},
"ips": {
"type": "array",
@@ -8329,25 +8627,29 @@
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a configured identity provider.\n"
},
"oktas": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/ZeroTrustAccessGroupIncludeOkta:ZeroTrustAccessGroupIncludeOkta"
- }
+ },
+ "description": "Matches an Okta group. Requires an Okta identity provider.\n"
},
"samls": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/ZeroTrustAccessGroupIncludeSaml:ZeroTrustAccessGroupIncludeSaml"
- }
+ },
+ "description": "Matches a SAML group. Requires a SAML identity provider.\n"
},
"serviceTokens": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of an Access service token.\n"
}
},
"type": "object"
@@ -8364,7 +8666,7 @@
},
"identityProviderId": {
"type": "string",
- "description": "The ID of the Azure Identity provider.\n"
+ "description": "The ID of the Azure identity provider.\n"
}
},
"type": "object",
@@ -8378,7 +8680,7 @@
"properties": {
"identityProviderId": {
"type": "string",
- "description": "The ID of the Azure Identity provider.\n"
+ "description": "The ID of the Azure identity provider.\n"
},
"ids": {
"type": "array",
@@ -8393,10 +8695,12 @@
"cloudflare:index/ZeroTrustAccessGroupIncludeExternalEvaluation:ZeroTrustAccessGroupIncludeExternalEvaluation": {
"properties": {
"evaluateUrl": {
- "type": "string"
+ "type": "string",
+ "description": "The API endpoint containing your business logic.\n"
},
"keysUrl": {
- "type": "string"
+ "type": "string",
+ "description": "The API endpoint containing the key that Access uses to verify that the response came from your API.\n"
}
},
"type": "object"
@@ -8404,16 +8708,19 @@
"cloudflare:index/ZeroTrustAccessGroupIncludeGithub:ZeroTrustAccessGroupIncludeGithub": {
"properties": {
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your Github identity provider.\n"
},
"name": {
- "type": "string"
+ "type": "string",
+ "description": "The name of the organization.\n"
},
"teams": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The teams that should be matched.\n"
}
},
"type": "object"
@@ -8424,10 +8731,12 @@
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The email of the Google Workspace group.\n"
},
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your Google Workspace identity provider.\n"
}
},
"type": "object"
@@ -8435,13 +8744,15 @@
"cloudflare:index/ZeroTrustAccessGroupIncludeOkta:ZeroTrustAccessGroupIncludeOkta": {
"properties": {
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your Okta identity provider.\n"
},
"names": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The name of the Okta Group.\n"
}
},
"type": "object"
@@ -8449,13 +8760,16 @@
"cloudflare:index/ZeroTrustAccessGroupIncludeSaml:ZeroTrustAccessGroupIncludeSaml": {
"properties": {
"attributeName": {
- "type": "string"
+ "type": "string",
+ "description": "The name of the SAML attribute.\n"
},
"attributeValue": {
- "type": "string"
+ "type": "string",
+ "description": "The SAML attribute value to look for.\n"
},
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your SAML identity provider.\n"
}
},
"type": "object"
@@ -8463,7 +8777,8 @@
"cloudflare:index/ZeroTrustAccessGroupRequire:ZeroTrustAccessGroupRequire": {
"properties": {
"anyValidServiceToken": {
- "type": "boolean"
+ "type": "boolean",
+ "description": "Matches any valid Access service token.\n"
},
"authContexts": {
"type": "array",
@@ -8472,19 +8787,23 @@
}
},
"authMethod": {
- "type": "string"
+ "type": "string",
+ "description": "The type of authentication method. Refer to https://datatracker.ietf.org/doc/html/rfc8176#section-2 for possible types.\n"
},
"azures": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/ZeroTrustAccessGroupRequireAzure:ZeroTrustAccessGroupRequireAzure"
- }
+ },
+ "description": "Matches an Azure group. Requires an Azure identity provider.\n"
},
"certificate": {
- "type": "boolean"
+ "type": "boolean",
+ "description": "Matches any valid client certificate.\n"
},
"commonName": {
- "type": "string"
+ "type": "string",
+ "description": "Matches a valid client certificate common name.\n"
},
"commonNames": {
"type": "array",
@@ -8497,65 +8816,75 @@
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a device posture integration.\n"
},
"emailDomains": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The email domain to match.\n"
},
"emailLists": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a previously created email list.\n"
},
"emails": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The email of the user.\n"
},
"everyone": {
- "type": "boolean"
+ "type": "boolean",
+ "description": "Matches everyone.\n"
},
"externalEvaluations": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/ZeroTrustAccessGroupRequireExternalEvaluation:ZeroTrustAccessGroupRequireExternalEvaluation"
- }
+ },
+ "description": "Create Allow or Block policies which evaluate the user based on custom criteria. https://developers.cloudflare.com/cloudflare-one/policies/access/external-evaluation/.\n"
},
"geos": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "Matches a specific country.\n"
},
"githubs": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/ZeroTrustAccessGroupRequireGithub:ZeroTrustAccessGroupRequireGithub"
- }
+ },
+ "description": "Matches a Github organization. Requires a Github identity provider.\n"
},
"groups": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a previously created Access group.\n"
},
"gsuites": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/ZeroTrustAccessGroupRequireGsuite:ZeroTrustAccessGroupRequireGsuite"
- }
+ },
+ "description": "Matches a group in Google Workspace. Requires a Google Workspace identity provider.\n"
},
"ipLists": {
"type": "array",
"items": {
"type": "string"
},
- "description": "The ID of an existing IP list to reference.\n"
+ "description": "The ID of a previously created IP list.\n"
},
"ips": {
"type": "array",
@@ -8568,25 +8897,29 @@
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a configured identity provider.\n"
},
"oktas": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/ZeroTrustAccessGroupRequireOkta:ZeroTrustAccessGroupRequireOkta"
- }
+ },
+ "description": "Matches an Okta group. Requires an Okta identity provider.\n"
},
"samls": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/ZeroTrustAccessGroupRequireSaml:ZeroTrustAccessGroupRequireSaml"
- }
+ },
+ "description": "Matches a SAML group. Requires a SAML identity provider.\n"
},
"serviceTokens": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of an Access service token.\n"
}
},
"type": "object"
@@ -8603,7 +8936,7 @@
},
"identityProviderId": {
"type": "string",
- "description": "The ID of the Azure Identity provider.\n"
+ "description": "The ID of the Azure identity provider.\n"
}
},
"type": "object",
@@ -8617,7 +8950,7 @@
"properties": {
"identityProviderId": {
"type": "string",
- "description": "The ID of the Azure Identity provider.\n"
+ "description": "The ID of the Azure identity provider.\n"
},
"ids": {
"type": "array",
@@ -8632,10 +8965,12 @@
"cloudflare:index/ZeroTrustAccessGroupRequireExternalEvaluation:ZeroTrustAccessGroupRequireExternalEvaluation": {
"properties": {
"evaluateUrl": {
- "type": "string"
+ "type": "string",
+ "description": "The API endpoint containing your business logic.\n"
},
"keysUrl": {
- "type": "string"
+ "type": "string",
+ "description": "The API endpoint containing the key that Access uses to verify that the response came from your API.\n"
}
},
"type": "object"
@@ -8643,16 +8978,19 @@
"cloudflare:index/ZeroTrustAccessGroupRequireGithub:ZeroTrustAccessGroupRequireGithub": {
"properties": {
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your Github identity provider.\n"
},
"name": {
- "type": "string"
+ "type": "string",
+ "description": "The name of the organization.\n"
},
"teams": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The teams that should be matched.\n"
}
},
"type": "object"
@@ -8663,10 +9001,12 @@
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The email of the Google Workspace group.\n"
},
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your Google Workspace identity provider.\n"
}
},
"type": "object"
@@ -8674,13 +9014,15 @@
"cloudflare:index/ZeroTrustAccessGroupRequireOkta:ZeroTrustAccessGroupRequireOkta": {
"properties": {
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your Okta identity provider.\n"
},
"names": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The name of the Okta Group.\n"
}
},
"type": "object"
@@ -8688,13 +9030,16 @@
"cloudflare:index/ZeroTrustAccessGroupRequireSaml:ZeroTrustAccessGroupRequireSaml": {
"properties": {
"attributeName": {
- "type": "string"
+ "type": "string",
+ "description": "The name of the SAML attribute.\n"
},
"attributeValue": {
- "type": "string"
+ "type": "string",
+ "description": "The SAML attribute value to look for.\n"
},
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your SAML identity provider.\n"
}
},
"type": "object"
@@ -8915,7 +9260,8 @@
"cloudflare:index/ZeroTrustAccessPolicyExclude:ZeroTrustAccessPolicyExclude": {
"properties": {
"anyValidServiceToken": {
- "type": "boolean"
+ "type": "boolean",
+ "description": "Matches any valid Access service token.\n"
},
"authContexts": {
"type": "array",
@@ -8924,19 +9270,23 @@
}
},
"authMethod": {
- "type": "string"
+ "type": "string",
+ "description": "The type of authentication method. Refer to https://datatracker.ietf.org/doc/html/rfc8176#section-2 for possible types.\n"
},
"azures": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/ZeroTrustAccessPolicyExcludeAzure:ZeroTrustAccessPolicyExcludeAzure"
- }
+ },
+ "description": "Matches an Azure group. Requires an Azure identity provider.\n"
},
"certificate": {
- "type": "boolean"
+ "type": "boolean",
+ "description": "Matches any valid client certificate.\n"
},
"commonName": {
- "type": "string"
+ "type": "string",
+ "description": "Matches a valid client certificate common name.\n"
},
"commonNames": {
"type": "array",
@@ -8949,65 +9299,75 @@
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a device posture integration.\n"
},
"emailDomains": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The email domain to match.\n"
},
"emailLists": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a previously created email list.\n"
},
"emails": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The email of the user.\n"
},
"everyone": {
- "type": "boolean"
+ "type": "boolean",
+ "description": "Matches everyone.\n"
},
"externalEvaluations": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/ZeroTrustAccessPolicyExcludeExternalEvaluation:ZeroTrustAccessPolicyExcludeExternalEvaluation"
- }
+ },
+ "description": "Create Allow or Block policies which evaluate the user based on custom criteria. https://developers.cloudflare.com/cloudflare-one/policies/access/external-evaluation/.\n"
},
"geos": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "Matches a specific country.\n"
},
"githubs": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/ZeroTrustAccessPolicyExcludeGithub:ZeroTrustAccessPolicyExcludeGithub"
- }
+ },
+ "description": "Matches a Github organization. Requires a Github identity provider.\n"
},
"groups": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a previously created Access group.\n"
},
"gsuites": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/ZeroTrustAccessPolicyExcludeGsuite:ZeroTrustAccessPolicyExcludeGsuite"
- }
+ },
+ "description": "Matches a group in Google Workspace. Requires a Google Workspace identity provider.\n"
},
"ipLists": {
"type": "array",
"items": {
"type": "string"
},
- "description": "The ID of an existing IP list to reference.\n"
+ "description": "The ID of a previously created IP list.\n"
},
"ips": {
"type": "array",
@@ -9020,25 +9380,29 @@
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a configured identity provider.\n"
},
"oktas": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/ZeroTrustAccessPolicyExcludeOkta:ZeroTrustAccessPolicyExcludeOkta"
- }
+ },
+ "description": "Matches an Okta group. Requires an Okta identity provider.\n"
},
"samls": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/ZeroTrustAccessPolicyExcludeSaml:ZeroTrustAccessPolicyExcludeSaml"
- }
+ },
+ "description": "Matches a SAML group. Requires a SAML identity provider.\n"
},
"serviceTokens": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of an Access service token.\n"
}
},
"type": "object"
@@ -9055,7 +9419,7 @@
},
"identityProviderId": {
"type": "string",
- "description": "The ID of the Azure Identity provider.\n"
+ "description": "The ID of the Azure identity provider.\n"
}
},
"type": "object",
@@ -9069,7 +9433,7 @@
"properties": {
"identityProviderId": {
"type": "string",
- "description": "The ID of the Azure Identity provider.\n"
+ "description": "The ID of the Azure identity provider.\n"
},
"ids": {
"type": "array",
@@ -9084,10 +9448,12 @@
"cloudflare:index/ZeroTrustAccessPolicyExcludeExternalEvaluation:ZeroTrustAccessPolicyExcludeExternalEvaluation": {
"properties": {
"evaluateUrl": {
- "type": "string"
+ "type": "string",
+ "description": "The API endpoint containing your business logic.\n"
},
"keysUrl": {
- "type": "string"
+ "type": "string",
+ "description": "The API endpoint containing the key that Access uses to verify that the response came from your API.\n"
}
},
"type": "object"
@@ -9095,16 +9461,19 @@
"cloudflare:index/ZeroTrustAccessPolicyExcludeGithub:ZeroTrustAccessPolicyExcludeGithub": {
"properties": {
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your Github identity provider.\n"
},
"name": {
- "type": "string"
+ "type": "string",
+ "description": "The name of the organization.\n"
},
"teams": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The teams that should be matched.\n"
}
},
"type": "object"
@@ -9115,10 +9484,12 @@
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The email of the Google Workspace group.\n"
},
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your Google Workspace identity provider.\n"
}
},
"type": "object"
@@ -9126,13 +9497,15 @@
"cloudflare:index/ZeroTrustAccessPolicyExcludeOkta:ZeroTrustAccessPolicyExcludeOkta": {
"properties": {
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your Okta identity provider.\n"
},
"names": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The name of the Okta Group.\n"
}
},
"type": "object"
@@ -9140,13 +9513,16 @@
"cloudflare:index/ZeroTrustAccessPolicyExcludeSaml:ZeroTrustAccessPolicyExcludeSaml": {
"properties": {
"attributeName": {
- "type": "string"
+ "type": "string",
+ "description": "The name of the SAML attribute.\n"
},
"attributeValue": {
- "type": "string"
+ "type": "string",
+ "description": "The SAML attribute value to look for.\n"
},
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your SAML identity provider.\n"
}
},
"type": "object"
@@ -9154,7 +9530,8 @@
"cloudflare:index/ZeroTrustAccessPolicyInclude:ZeroTrustAccessPolicyInclude": {
"properties": {
"anyValidServiceToken": {
- "type": "boolean"
+ "type": "boolean",
+ "description": "Matches any valid Access service token.\n"
},
"authContexts": {
"type": "array",
@@ -9163,19 +9540,23 @@
}
},
"authMethod": {
- "type": "string"
+ "type": "string",
+ "description": "The type of authentication method. Refer to https://datatracker.ietf.org/doc/html/rfc8176#section-2 for possible types.\n"
},
"azures": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/ZeroTrustAccessPolicyIncludeAzure:ZeroTrustAccessPolicyIncludeAzure"
- }
+ },
+ "description": "Matches an Azure group. Requires an Azure identity provider.\n"
},
"certificate": {
- "type": "boolean"
+ "type": "boolean",
+ "description": "Matches any valid client certificate.\n"
},
"commonName": {
- "type": "string"
+ "type": "string",
+ "description": "Matches a valid client certificate common name.\n"
},
"commonNames": {
"type": "array",
@@ -9188,65 +9569,75 @@
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a device posture integration.\n"
},
"emailDomains": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The email domain to match.\n"
},
"emailLists": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a previously created email list.\n"
},
"emails": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The email of the user.\n"
},
"everyone": {
- "type": "boolean"
+ "type": "boolean",
+ "description": "Matches everyone.\n"
},
"externalEvaluations": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/ZeroTrustAccessPolicyIncludeExternalEvaluation:ZeroTrustAccessPolicyIncludeExternalEvaluation"
- }
+ },
+ "description": "Create Allow or Block policies which evaluate the user based on custom criteria. https://developers.cloudflare.com/cloudflare-one/policies/access/external-evaluation/.\n"
},
"geos": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "Matches a specific country.\n"
},
"githubs": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/ZeroTrustAccessPolicyIncludeGithub:ZeroTrustAccessPolicyIncludeGithub"
- }
+ },
+ "description": "Matches a Github organization. Requires a Github identity provider.\n"
},
"groups": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a previously created Access group.\n"
},
"gsuites": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/ZeroTrustAccessPolicyIncludeGsuite:ZeroTrustAccessPolicyIncludeGsuite"
- }
+ },
+ "description": "Matches a group in Google Workspace. Requires a Google Workspace identity provider.\n"
},
"ipLists": {
"type": "array",
"items": {
"type": "string"
},
- "description": "The ID of an existing IP list to reference.\n"
+ "description": "The ID of a previously created IP list.\n"
},
"ips": {
"type": "array",
@@ -9259,25 +9650,29 @@
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a configured identity provider.\n"
},
"oktas": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/ZeroTrustAccessPolicyIncludeOkta:ZeroTrustAccessPolicyIncludeOkta"
- }
+ },
+ "description": "Matches an Okta group. Requires an Okta identity provider.\n"
},
"samls": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/ZeroTrustAccessPolicyIncludeSaml:ZeroTrustAccessPolicyIncludeSaml"
- }
+ },
+ "description": "Matches a SAML group. Requires a SAML identity provider.\n"
},
"serviceTokens": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of an Access service token.\n"
}
},
"type": "object"
@@ -9294,7 +9689,7 @@
},
"identityProviderId": {
"type": "string",
- "description": "The ID of the Azure Identity provider.\n"
+ "description": "The ID of the Azure identity provider.\n"
}
},
"type": "object",
@@ -9308,7 +9703,7 @@
"properties": {
"identityProviderId": {
"type": "string",
- "description": "The ID of the Azure Identity provider.\n"
+ "description": "The ID of the Azure identity provider.\n"
},
"ids": {
"type": "array",
@@ -9323,10 +9718,12 @@
"cloudflare:index/ZeroTrustAccessPolicyIncludeExternalEvaluation:ZeroTrustAccessPolicyIncludeExternalEvaluation": {
"properties": {
"evaluateUrl": {
- "type": "string"
+ "type": "string",
+ "description": "The API endpoint containing your business logic.\n"
},
"keysUrl": {
- "type": "string"
+ "type": "string",
+ "description": "The API endpoint containing the key that Access uses to verify that the response came from your API.\n"
}
},
"type": "object"
@@ -9334,16 +9731,19 @@
"cloudflare:index/ZeroTrustAccessPolicyIncludeGithub:ZeroTrustAccessPolicyIncludeGithub": {
"properties": {
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your Github identity provider.\n"
},
"name": {
- "type": "string"
+ "type": "string",
+ "description": "The name of the organization.\n"
},
"teams": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The teams that should be matched.\n"
}
},
"type": "object"
@@ -9354,10 +9754,12 @@
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The email of the Google Workspace group.\n"
},
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your Google Workspace identity provider.\n"
}
},
"type": "object"
@@ -9365,13 +9767,15 @@
"cloudflare:index/ZeroTrustAccessPolicyIncludeOkta:ZeroTrustAccessPolicyIncludeOkta": {
"properties": {
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your Okta identity provider.\n"
},
"names": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The name of the Okta Group.\n"
}
},
"type": "object"
@@ -9379,13 +9783,16 @@
"cloudflare:index/ZeroTrustAccessPolicyIncludeSaml:ZeroTrustAccessPolicyIncludeSaml": {
"properties": {
"attributeName": {
- "type": "string"
+ "type": "string",
+ "description": "The name of the SAML attribute.\n"
},
"attributeValue": {
- "type": "string"
+ "type": "string",
+ "description": "The SAML attribute value to look for.\n"
},
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your SAML identity provider.\n"
}
},
"type": "object"
@@ -9393,7 +9800,8 @@
"cloudflare:index/ZeroTrustAccessPolicyRequire:ZeroTrustAccessPolicyRequire": {
"properties": {
"anyValidServiceToken": {
- "type": "boolean"
+ "type": "boolean",
+ "description": "Matches any valid Access service token.\n"
},
"authContexts": {
"type": "array",
@@ -9402,19 +9810,23 @@
}
},
"authMethod": {
- "type": "string"
+ "type": "string",
+ "description": "The type of authentication method. Refer to https://datatracker.ietf.org/doc/html/rfc8176#section-2 for possible types.\n"
},
"azures": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/ZeroTrustAccessPolicyRequireAzure:ZeroTrustAccessPolicyRequireAzure"
- }
+ },
+ "description": "Matches an Azure group. Requires an Azure identity provider.\n"
},
"certificate": {
- "type": "boolean"
+ "type": "boolean",
+ "description": "Matches any valid client certificate.\n"
},
"commonName": {
- "type": "string"
+ "type": "string",
+ "description": "Matches a valid client certificate common name.\n"
},
"commonNames": {
"type": "array",
@@ -9427,65 +9839,75 @@
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a device posture integration.\n"
},
"emailDomains": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The email domain to match.\n"
},
"emailLists": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a previously created email list.\n"
},
"emails": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The email of the user.\n"
},
"everyone": {
- "type": "boolean"
+ "type": "boolean",
+ "description": "Matches everyone.\n"
},
"externalEvaluations": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/ZeroTrustAccessPolicyRequireExternalEvaluation:ZeroTrustAccessPolicyRequireExternalEvaluation"
- }
+ },
+ "description": "Create Allow or Block policies which evaluate the user based on custom criteria. https://developers.cloudflare.com/cloudflare-one/policies/access/external-evaluation/.\n"
},
"geos": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "Matches a specific country.\n"
},
"githubs": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/ZeroTrustAccessPolicyRequireGithub:ZeroTrustAccessPolicyRequireGithub"
- }
+ },
+ "description": "Matches a Github organization. Requires a Github identity provider.\n"
},
"groups": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a previously created Access group.\n"
},
"gsuites": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/ZeroTrustAccessPolicyRequireGsuite:ZeroTrustAccessPolicyRequireGsuite"
- }
+ },
+ "description": "Matches a group in Google Workspace. Requires a Google Workspace identity provider.\n"
},
"ipLists": {
"type": "array",
"items": {
"type": "string"
},
- "description": "The ID of an existing IP list to reference.\n"
+ "description": "The ID of a previously created IP list.\n"
},
"ips": {
"type": "array",
@@ -9498,25 +9920,29 @@
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of a configured identity provider.\n"
},
"oktas": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/ZeroTrustAccessPolicyRequireOkta:ZeroTrustAccessPolicyRequireOkta"
- }
+ },
+ "description": "Matches an Okta group. Requires an Okta identity provider.\n"
},
"samls": {
"type": "array",
"items": {
"$ref": "#/types/cloudflare:index/ZeroTrustAccessPolicyRequireSaml:ZeroTrustAccessPolicyRequireSaml"
- }
+ },
+ "description": "Matches a SAML group. Requires a SAML identity provider.\n"
},
"serviceTokens": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The ID of an Access service token.\n"
}
},
"type": "object"
@@ -9533,7 +9959,7 @@
},
"identityProviderId": {
"type": "string",
- "description": "The ID of the Azure Identity provider.\n"
+ "description": "The ID of the Azure identity provider.\n"
}
},
"type": "object",
@@ -9547,7 +9973,7 @@
"properties": {
"identityProviderId": {
"type": "string",
- "description": "The ID of the Azure Identity provider.\n"
+ "description": "The ID of the Azure identity provider.\n"
},
"ids": {
"type": "array",
@@ -9562,10 +9988,12 @@
"cloudflare:index/ZeroTrustAccessPolicyRequireExternalEvaluation:ZeroTrustAccessPolicyRequireExternalEvaluation": {
"properties": {
"evaluateUrl": {
- "type": "string"
+ "type": "string",
+ "description": "The API endpoint containing your business logic.\n"
},
"keysUrl": {
- "type": "string"
+ "type": "string",
+ "description": "The API endpoint containing the key that Access uses to verify that the response came from your API.\n"
}
},
"type": "object"
@@ -9573,16 +10001,19 @@
"cloudflare:index/ZeroTrustAccessPolicyRequireGithub:ZeroTrustAccessPolicyRequireGithub": {
"properties": {
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your Github identity provider.\n"
},
"name": {
- "type": "string"
+ "type": "string",
+ "description": "The name of the organization.\n"
},
"teams": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The teams that should be matched.\n"
}
},
"type": "object"
@@ -9593,10 +10024,12 @@
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The email of the Google Workspace group.\n"
},
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your Google Workspace identity provider.\n"
}
},
"type": "object"
@@ -9604,13 +10037,15 @@
"cloudflare:index/ZeroTrustAccessPolicyRequireOkta:ZeroTrustAccessPolicyRequireOkta": {
"properties": {
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your Okta identity provider.\n"
},
"names": {
"type": "array",
"items": {
"type": "string"
- }
+ },
+ "description": "The name of the Okta Group.\n"
}
},
"type": "object"
@@ -9618,13 +10053,16 @@
"cloudflare:index/ZeroTrustAccessPolicyRequireSaml:ZeroTrustAccessPolicyRequireSaml": {
"properties": {
"attributeName": {
- "type": "string"
+ "type": "string",
+ "description": "The name of the SAML attribute.\n"
},
"attributeValue": {
- "type": "string"
+ "type": "string",
+ "description": "The SAML attribute value to look for.\n"
},
"identityProviderId": {
- "type": "string"
+ "type": "string",
+ "description": "The ID of your SAML identity provider.\n"
}
},
"type": "object"
@@ -9730,7 +10168,7 @@
},
"eidLastSeen": {
"type": "string",
- "description": "The time a device last seen in Tanium. Must be in the format `1h` or `30m`. Valid units are `d`, `h` and `m`\n"
+ "description": "The time a device last seen in Tanium. Must be in the format `1h` or `30m`. Valid units are `d`, `h` and `m`.\n"
},
"enabled": {
"type": "boolean",
@@ -9745,7 +10183,7 @@
"items": {
"type": "string"
},
- "description": "List of values indicating purposes for which the certificate public key can be used. Available values: `clientAuth`, `emailProtection`\n"
+ "description": "List of values indicating purposes for which the certificate public key can be used. Available values: `clientAuth`, `emailProtection`.\n"
},
"id": {
"type": "string",
@@ -9772,7 +10210,7 @@
"items": {
"$ref": "#/types/cloudflare:index/ZeroTrustDevicePostureRuleInputLocation:ZeroTrustDevicePostureRuleInputLocation"
},
- "description": "List of locations to check for client certificate.\n"
+ "description": "List of operating system locations to check for a client certificate..\n"
},
"networkStatus": {
"type": "string",
@@ -9844,7 +10282,7 @@
},
"versionOperator": {
"type": "string",
- "description": "The version comparison operator for crowdstrike. Available values: `\u003e`, `\u003e=`, `\u003c`, `\u003c=`, `==`.\n"
+ "description": "The version comparison operator for Crowdstrike. Available values: `\u003e`, `\u003e=`, `\u003c`, `\u003c=`, `==`.\n"
}
},
"type": "object",
@@ -9875,7 +10313,7 @@
"items": {
"type": "string"
},
- "description": "List of trust stores to check for client certificate rule. Available values: `system`, `user`\n"
+ "description": "List of trust stores to check for client certificate rule. Available values: `system`, `user`.\n"
}
},
"type": "object"
@@ -10394,6 +10832,18 @@
"inspectionMode"
]
},
+ "cloudflare:index/ZeroTrustGatewaySettingsCertificate:ZeroTrustGatewaySettingsCertificate": {
+ "properties": {
+ "id": {
+ "type": "string",
+ "description": "ID of certificate for TLS interception.\n"
+ }
+ },
+ "type": "object",
+ "required": [
+ "id"
+ ]
+ },
"cloudflare:index/ZeroTrustGatewaySettingsCustomCertificate:ZeroTrustGatewaySettingsCustomCertificate": {
"properties": {
"enabled": {
@@ -10546,7 +10996,7 @@
"properties": {
"disableForTime": {
"type": "integer",
- "description": "Sets the time limit in seconds that a user can use an override code to bypass WARP\n"
+ "description": "Sets the time limit in seconds that a user can use an override code to bypass WARP.\n"
},
"rootCa": {
"type": "boolean",
@@ -11097,6 +11547,9 @@
"pseudoIpv4": {
"type": "string"
},
+ "replaceInsecureJs": {
+ "type": "string"
+ },
"responseBuffering": {
"type": "string"
},
@@ -11194,6 +11647,7 @@
"privacyPass",
"proxyReadTimeout",
"pseudoIpv4",
+ "replaceInsecureJs",
"responseBuffering",
"rocketLoader",
"securityHeader",
@@ -11421,6 +11875,9 @@
"pseudoIpv4": {
"type": "string"
},
+ "replaceInsecureJs": {
+ "type": "string"
+ },
"responseBuffering": {
"type": "string"
},
@@ -11518,6 +11975,7 @@
"privacyPass",
"proxyReadTimeout",
"pseudoIpv4",
+ "replaceInsecureJs",
"responseBuffering",
"rocketLoader",
"securityHeader",
@@ -12308,6 +12766,10 @@
"$ref": "#/types/cloudflare:index/getRulesetsRulesetRuleActionParametersCacheKey:getRulesetsRulesetRuleActionParametersCacheKey",
"description": "List of cache key parameters to apply to the request.\n"
},
+ "cacheReserve": {
+ "$ref": "#/types/cloudflare:index/getRulesetsRulesetRuleActionParametersCacheReserve:getRulesetsRulesetRuleActionParametersCacheReserve",
+ "description": "List of cache reserve parameters to apply to the request.\n"
+ },
"content": {
"type": "string",
"description": "Content of the custom error response\n"
@@ -12698,6 +13160,27 @@
},
"type": "object"
},
+ "cloudflare:index/getRulesetsRulesetRuleActionParametersCacheReserve:getRulesetsRulesetRuleActionParametersCacheReserve": {
+ "properties": {
+ "eligible": {
+ "type": "boolean",
+ "description": "Determines whether Cloudflare will write the eligible resource to cache reserve.\n"
+ },
+ "minimumFileSize": {
+ "type": "integer",
+ "description": "The minimum file size, in bytes, eligible for storage in cache reserve. If omitted and \"eligible\" is true, Cloudflare will use 0 bytes by default.\n"
+ }
+ },
+ "type": "object",
+ "required": [
+ "eligible"
+ ],
+ "language": {
+ "nodejs": {
+ "requiredInputs": []
+ }
+ }
+ },
"cloudflare:index/getRulesetsRulesetRuleActionParametersEdgeTtl:getRulesetsRulesetRuleActionParametersEdgeTtl": {
"properties": {
"default": {
@@ -14551,7 +15034,7 @@
"properties": {
"accountId": {
"type": "string",
- "description": "The account identifier to target for the resource. Conflicts with `zone_id`. **Modifying this attribute will force creation of a new resource.**\n"
+ "description": "The account identifier to target for the resource. Conflicts with `zone_id`.\n"
},
"applicationId": {
"type": "string",
@@ -14617,7 +15100,7 @@
},
"zoneId": {
"type": "string",
- "description": "The zone identifier to target for the resource. Conflicts with `account_id`. **Modifying this attribute will force creation of a new resource.**\n"
+ "description": "The zone identifier to target for the resource. Conflicts with `account_id`.\n"
}
},
"required": [
@@ -14628,7 +15111,7 @@
"inputProperties": {
"accountId": {
"type": "string",
- "description": "The account identifier to target for the resource. Conflicts with `zone_id`. **Modifying this attribute will force creation of a new resource.**\n"
+ "description": "The account identifier to target for the resource. Conflicts with `zone_id`.\n"
},
"applicationId": {
"type": "string",
@@ -14695,7 +15178,7 @@
},
"zoneId": {
"type": "string",
- "description": "The zone identifier to target for the resource. Conflicts with `account_id`. **Modifying this attribute will force creation of a new resource.**\n"
+ "description": "The zone identifier to target for the resource. Conflicts with `account_id`.\n"
}
},
"requiredInputs": [
@@ -14708,7 +15191,7 @@
"properties": {
"accountId": {
"type": "string",
- "description": "The account identifier to target for the resource. Conflicts with `zone_id`. **Modifying this attribute will force creation of a new resource.**\n"
+ "description": "The account identifier to target for the resource. Conflicts with `zone_id`.\n"
},
"applicationId": {
"type": "string",
@@ -14775,7 +15258,7 @@
},
"zoneId": {
"type": "string",
- "description": "The zone identifier to target for the resource. Conflicts with `account_id`. **Modifying this attribute will force creation of a new resource.**\n"
+ "description": "The zone identifier to target for the resource. Conflicts with `account_id`.\n"
}
},
"type": "object"
@@ -16065,6 +16548,10 @@
"cloudflare:index/botManagement:BotManagement": {
"description": "Provides a resource to configure Bot Management.\n\nSpecifically, this resource can be used to manage:\n\n- **Bot Fight Mode**\n- **Super Bot Fight Mode**\n- **Bot Management for Enterprise**\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as cloudflare from \"@pulumi/cloudflare\";\n\nconst example = new cloudflare.BotManagement(\"example\", {\n zoneId: \"0da42c8d2132a9ddaf714f9e7c920711\",\n enableJs: true,\n sbfmDefinitelyAutomated: \"block\",\n sbfmLikelyAutomated: \"managed_challenge\",\n sbfmVerifiedBots: \"allow\",\n sbfmStaticResourceProtection: false,\n optimizeWordpress: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_cloudflare as cloudflare\n\nexample = cloudflare.BotManagement(\"example\",\n zone_id=\"0da42c8d2132a9ddaf714f9e7c920711\",\n enable_js=True,\n sbfm_definitely_automated=\"block\",\n sbfm_likely_automated=\"managed_challenge\",\n sbfm_verified_bots=\"allow\",\n sbfm_static_resource_protection=False,\n optimize_wordpress=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Cloudflare = Pulumi.Cloudflare;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Cloudflare.BotManagement(\"example\", new()\n {\n ZoneId = \"0da42c8d2132a9ddaf714f9e7c920711\",\n EnableJs = true,\n SbfmDefinitelyAutomated = \"block\",\n SbfmLikelyAutomated = \"managed_challenge\",\n SbfmVerifiedBots = \"allow\",\n SbfmStaticResourceProtection = false,\n OptimizeWordpress = true,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-cloudflare/sdk/v5/go/cloudflare\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := cloudflare.NewBotManagement(ctx, \"example\", \u0026cloudflare.BotManagementArgs{\n\t\t\tZoneId: pulumi.String(\"0da42c8d2132a9ddaf714f9e7c920711\"),\n\t\t\tEnableJs: pulumi.Bool(true),\n\t\t\tSbfmDefinitelyAutomated: pulumi.String(\"block\"),\n\t\t\tSbfmLikelyAutomated: pulumi.String(\"managed_challenge\"),\n\t\t\tSbfmVerifiedBots: pulumi.String(\"allow\"),\n\t\t\tSbfmStaticResourceProtection: pulumi.Bool(false),\n\t\t\tOptimizeWordpress: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.cloudflare.BotManagement;\nimport com.pulumi.cloudflare.BotManagementArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new BotManagement(\"example\", BotManagementArgs.builder()\n .zoneId(\"0da42c8d2132a9ddaf714f9e7c920711\")\n .enableJs(true)\n .sbfmDefinitelyAutomated(\"block\")\n .sbfmLikelyAutomated(\"managed_challenge\")\n .sbfmVerifiedBots(\"allow\")\n .sbfmStaticResourceProtection(false)\n .optimizeWordpress(true)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: cloudflare:BotManagement\n properties:\n zoneId: 0da42c8d2132a9ddaf714f9e7c920711\n enableJs: true\n sbfmDefinitelyAutomated: block\n sbfmLikelyAutomated: managed_challenge\n sbfmVerifiedBots: allow\n sbfmStaticResourceProtection: false\n optimizeWordpress: true\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\n```sh\n$ pulumi import cloudflare:index/botManagement:BotManagement example \u003czone_id\u003e\n```\n\n",
"properties": {
+ "aiBotsProtection": {
+ "type": "string",
+ "description": "Enable rule to block AI Scrapers and Crawlers.\n"
+ },
"autoUpdateModel": {
"type": "boolean",
"description": "Automatically update to the newest bot detection models created by Cloudflare as they are released. [Learn more.](https://developers.cloudflare.com/bots/reference/machine-learning-models#model-versions-and-release-notes).\n"
@@ -16111,10 +16598,15 @@
}
},
"required": [
+ "aiBotsProtection",
"usingLatestModel",
"zoneId"
],
"inputProperties": {
+ "aiBotsProtection": {
+ "type": "string",
+ "description": "Enable rule to block AI Scrapers and Crawlers.\n"
+ },
"autoUpdateModel": {
"type": "boolean",
"description": "Automatically update to the newest bot detection models created by Cloudflare as they are released. [Learn more.](https://developers.cloudflare.com/bots/reference/machine-learning-models#model-versions-and-release-notes).\n"
@@ -16163,6 +16655,10 @@
"stateInputs": {
"description": "Input properties used for looking up and filtering BotManagement resources.\n",
"properties": {
+ "aiBotsProtection": {
+ "type": "string",
+ "description": "Enable rule to block AI Scrapers and Crawlers.\n"
+ },
"autoUpdateModel": {
"type": "boolean",
"description": "Automatically update to the newest bot detection models created by Cloudflare as they are released. [Learn more.](https://developers.cloudflare.com/bots/reference/machine-learning-models#model-versions-and-release-notes).\n"
@@ -17553,7 +18049,7 @@
},
"tunnelProtocol": {
"type": "string",
- "description": "Determines which tunnel protocol to use. Available values: `\"\"`, `wireguard`, `masque`. Defaults to `wireguard`\n"
+ "description": "Determines which tunnel protocol to use. Available values: `\"\"`, `wireguard`, `masque`. Defaults to `wireguard`.\n"
}
},
"required": [
@@ -17636,7 +18132,7 @@
},
"tunnelProtocol": {
"type": "string",
- "description": "Determines which tunnel protocol to use. Available values: `\"\"`, `wireguard`, `masque`. Defaults to `wireguard`\n"
+ "description": "Determines which tunnel protocol to use. Available values: `\"\"`, `wireguard`, `masque`. Defaults to `wireguard`.\n"
}
},
"requiredInputs": [
@@ -17721,7 +18217,7 @@
},
"tunnelProtocol": {
"type": "string",
- "description": "Determines which tunnel protocol to use. Available values: `\"\"`, `wireguard`, `masque`. Defaults to `wireguard`\n"
+ "description": "Determines which tunnel protocol to use. Available values: `\"\"`, `wireguard`, `masque`. Defaults to `wireguard`.\n"
}
},
"type": "object"
@@ -21906,7 +22402,7 @@
},
"alertType": {
"type": "string",
- "description": "The event type that will trigger the dispatch of a notification. See the developer documentation for descriptions of [available alert types](https://developers.cloudflare.com/fundamentals/notifications/notification-available/). Available values: `advanced_http_alert_error`, `access_custom_certificate_expiration_type`, `advanced_ddos_attack_l4_alert`, `advanced_ddos_attack_l7_alert`, `bgp_hijack_notification`, `billing_usage_alert`, `block_notification_block_removed`, `block_notification_new_block`, `block_notification_review_rejected`, `brand_protection_alert`, `brand_protection_digest`, `clickhouse_alert_fw_anomaly`, `clickhouse_alert_fw_ent_anomaly`, `custom_ssl_certificate_event_type`, `dedicated_ssl_certificate_event_type`, `dos_attack_l4`, `dos_attack_l7`, `expiring_service_token_alert`, `failing_logpush_job_disabled_alert`, `fbm_auto_advertisement`, `fbm_dosd_attack`, `fbm_volumetric_attack`, `health_check_status_notification`, `hostname_aop_custom_certificate_expiration_type`, `http_alert_edge_error`, `http_alert_origin_error`, `incident_alert`, `load_balancing_health_alert`, `load_balancing_pool_enablement_alert`, `logo_match_alert`, `magic_tunnel_health_check_event`, `maintenance_event_notification`, `mtls_certificate_store_certificate_expiration_type`, `pages_event_alert`, `radar_notification`, `real_origin_monitoring`, `scriptmonitor_alert_new_code_change_detections`, `scriptmonitor_alert_new_hosts`, `scriptmonitor_alert_new_malicious_hosts`, `scriptmonitor_alert_new_malicious_scripts`, `scriptmonitor_alert_new_malicious_url`, `scriptmonitor_alert_new_max_length_resource_url`, `scriptmonitor_alert_new_resources`, `secondary_dns_all_primaries_failing`, `secondary_dns_primaries_failing`, `secondary_dns_zone_successfully_updated`, `secondary_dns_zone_validation_warning`, `sentinel_alert`, `stream_live_notifications`, `traffic_anomalies_alert`, `tunnel_health_event`, `tunnel_update_event`, `universal_ssl_event_type`, `web_analytics_metrics_update`, `weekly_account_overview`, `workers_alert`, `zone_aop_custom_certificate_expiration_type`.\n"
+ "description": "The event type that will trigger the dispatch of a notification. See the developer documentation for descriptions of [available alert types](https://developers.cloudflare.com/fundamentals/notifications/notification-available/). Available values: `advanced_http_alert_error`, `access_custom_certificate_expiration_type`, `advanced_ddos_attack_l4_alert`, `advanced_ddos_attack_l7_alert`, `bgp_hijack_notification`, `billing_usage_alert`, `block_notification_block_removed`, `block_notification_new_block`, `block_notification_review_rejected`, `brand_protection_alert`, `brand_protection_digest`, `clickhouse_alert_fw_anomaly`, `clickhouse_alert_fw_ent_anomaly`, `custom_ssl_certificate_event_type`, `dedicated_ssl_certificate_event_type`, `dos_attack_l4`, `dos_attack_l7`, `expiring_service_token_alert`, `failing_logpush_job_disabled_alert`, `fbm_auto_advertisement`, `fbm_dosd_attack`, `fbm_volumetric_attack`, `health_check_status_notification`, `hostname_aop_custom_certificate_expiration_type`, `http_alert_edge_error`, `http_alert_origin_error`, `image_notification`, `incident_alert`, `load_balancing_health_alert`, `load_balancing_pool_enablement_alert`, `logo_match_alert`, `magic_tunnel_health_check_event`, `maintenance_event_notification`, `mtls_certificate_store_certificate_expiration_type`, `pages_event_alert`, `radar_notification`, `real_origin_monitoring`, `scriptmonitor_alert_new_code_change_detections`, `scriptmonitor_alert_new_hosts`, `scriptmonitor_alert_new_malicious_hosts`, `scriptmonitor_alert_new_malicious_scripts`, `scriptmonitor_alert_new_malicious_url`, `scriptmonitor_alert_new_max_length_resource_url`, `scriptmonitor_alert_new_resources`, `secondary_dns_all_primaries_failing`, `secondary_dns_primaries_failing`, `secondary_dns_zone_successfully_updated`, `secondary_dns_zone_validation_warning`, `sentinel_alert`, `stream_live_notifications`, `traffic_anomalies_alert`, `tunnel_health_event`, `tunnel_update_event`, `universal_ssl_event_type`, `web_analytics_metrics_update`, `weekly_account_overview`, `workers_alert`, `zone_aop_custom_certificate_expiration_type`.\n"
},
"created": {
"type": "string",
@@ -21969,7 +22465,7 @@
},
"alertType": {
"type": "string",
- "description": "The event type that will trigger the dispatch of a notification. See the developer documentation for descriptions of [available alert types](https://developers.cloudflare.com/fundamentals/notifications/notification-available/). Available values: `advanced_http_alert_error`, `access_custom_certificate_expiration_type`, `advanced_ddos_attack_l4_alert`, `advanced_ddos_attack_l7_alert`, `bgp_hijack_notification`, `billing_usage_alert`, `block_notification_block_removed`, `block_notification_new_block`, `block_notification_review_rejected`, `brand_protection_alert`, `brand_protection_digest`, `clickhouse_alert_fw_anomaly`, `clickhouse_alert_fw_ent_anomaly`, `custom_ssl_certificate_event_type`, `dedicated_ssl_certificate_event_type`, `dos_attack_l4`, `dos_attack_l7`, `expiring_service_token_alert`, `failing_logpush_job_disabled_alert`, `fbm_auto_advertisement`, `fbm_dosd_attack`, `fbm_volumetric_attack`, `health_check_status_notification`, `hostname_aop_custom_certificate_expiration_type`, `http_alert_edge_error`, `http_alert_origin_error`, `incident_alert`, `load_balancing_health_alert`, `load_balancing_pool_enablement_alert`, `logo_match_alert`, `magic_tunnel_health_check_event`, `maintenance_event_notification`, `mtls_certificate_store_certificate_expiration_type`, `pages_event_alert`, `radar_notification`, `real_origin_monitoring`, `scriptmonitor_alert_new_code_change_detections`, `scriptmonitor_alert_new_hosts`, `scriptmonitor_alert_new_malicious_hosts`, `scriptmonitor_alert_new_malicious_scripts`, `scriptmonitor_alert_new_malicious_url`, `scriptmonitor_alert_new_max_length_resource_url`, `scriptmonitor_alert_new_resources`, `secondary_dns_all_primaries_failing`, `secondary_dns_primaries_failing`, `secondary_dns_zone_successfully_updated`, `secondary_dns_zone_validation_warning`, `sentinel_alert`, `stream_live_notifications`, `traffic_anomalies_alert`, `tunnel_health_event`, `tunnel_update_event`, `universal_ssl_event_type`, `web_analytics_metrics_update`, `weekly_account_overview`, `workers_alert`, `zone_aop_custom_certificate_expiration_type`.\n"
+ "description": "The event type that will trigger the dispatch of a notification. See the developer documentation for descriptions of [available alert types](https://developers.cloudflare.com/fundamentals/notifications/notification-available/). Available values: `advanced_http_alert_error`, `access_custom_certificate_expiration_type`, `advanced_ddos_attack_l4_alert`, `advanced_ddos_attack_l7_alert`, `bgp_hijack_notification`, `billing_usage_alert`, `block_notification_block_removed`, `block_notification_new_block`, `block_notification_review_rejected`, `brand_protection_alert`, `brand_protection_digest`, `clickhouse_alert_fw_anomaly`, `clickhouse_alert_fw_ent_anomaly`, `custom_ssl_certificate_event_type`, `dedicated_ssl_certificate_event_type`, `dos_attack_l4`, `dos_attack_l7`, `expiring_service_token_alert`, `failing_logpush_job_disabled_alert`, `fbm_auto_advertisement`, `fbm_dosd_attack`, `fbm_volumetric_attack`, `health_check_status_notification`, `hostname_aop_custom_certificate_expiration_type`, `http_alert_edge_error`, `http_alert_origin_error`, `image_notification`, `incident_alert`, `load_balancing_health_alert`, `load_balancing_pool_enablement_alert`, `logo_match_alert`, `magic_tunnel_health_check_event`, `maintenance_event_notification`, `mtls_certificate_store_certificate_expiration_type`, `pages_event_alert`, `radar_notification`, `real_origin_monitoring`, `scriptmonitor_alert_new_code_change_detections`, `scriptmonitor_alert_new_hosts`, `scriptmonitor_alert_new_malicious_hosts`, `scriptmonitor_alert_new_malicious_scripts`, `scriptmonitor_alert_new_malicious_url`, `scriptmonitor_alert_new_max_length_resource_url`, `scriptmonitor_alert_new_resources`, `secondary_dns_all_primaries_failing`, `secondary_dns_primaries_failing`, `secondary_dns_zone_successfully_updated`, `secondary_dns_zone_validation_warning`, `sentinel_alert`, `stream_live_notifications`, `traffic_anomalies_alert`, `tunnel_health_event`, `tunnel_update_event`, `universal_ssl_event_type`, `web_analytics_metrics_update`, `weekly_account_overview`, `workers_alert`, `zone_aop_custom_certificate_expiration_type`.\n"
},
"description": {
"type": "string",
@@ -22024,7 +22520,7 @@
},
"alertType": {
"type": "string",
- "description": "The event type that will trigger the dispatch of a notification. See the developer documentation for descriptions of [available alert types](https://developers.cloudflare.com/fundamentals/notifications/notification-available/). Available values: `advanced_http_alert_error`, `access_custom_certificate_expiration_type`, `advanced_ddos_attack_l4_alert`, `advanced_ddos_attack_l7_alert`, `bgp_hijack_notification`, `billing_usage_alert`, `block_notification_block_removed`, `block_notification_new_block`, `block_notification_review_rejected`, `brand_protection_alert`, `brand_protection_digest`, `clickhouse_alert_fw_anomaly`, `clickhouse_alert_fw_ent_anomaly`, `custom_ssl_certificate_event_type`, `dedicated_ssl_certificate_event_type`, `dos_attack_l4`, `dos_attack_l7`, `expiring_service_token_alert`, `failing_logpush_job_disabled_alert`, `fbm_auto_advertisement`, `fbm_dosd_attack`, `fbm_volumetric_attack`, `health_check_status_notification`, `hostname_aop_custom_certificate_expiration_type`, `http_alert_edge_error`, `http_alert_origin_error`, `incident_alert`, `load_balancing_health_alert`, `load_balancing_pool_enablement_alert`, `logo_match_alert`, `magic_tunnel_health_check_event`, `maintenance_event_notification`, `mtls_certificate_store_certificate_expiration_type`, `pages_event_alert`, `radar_notification`, `real_origin_monitoring`, `scriptmonitor_alert_new_code_change_detections`, `scriptmonitor_alert_new_hosts`, `scriptmonitor_alert_new_malicious_hosts`, `scriptmonitor_alert_new_malicious_scripts`, `scriptmonitor_alert_new_malicious_url`, `scriptmonitor_alert_new_max_length_resource_url`, `scriptmonitor_alert_new_resources`, `secondary_dns_all_primaries_failing`, `secondary_dns_primaries_failing`, `secondary_dns_zone_successfully_updated`, `secondary_dns_zone_validation_warning`, `sentinel_alert`, `stream_live_notifications`, `traffic_anomalies_alert`, `tunnel_health_event`, `tunnel_update_event`, `universal_ssl_event_type`, `web_analytics_metrics_update`, `weekly_account_overview`, `workers_alert`, `zone_aop_custom_certificate_expiration_type`.\n"
+ "description": "The event type that will trigger the dispatch of a notification. See the developer documentation for descriptions of [available alert types](https://developers.cloudflare.com/fundamentals/notifications/notification-available/). Available values: `advanced_http_alert_error`, `access_custom_certificate_expiration_type`, `advanced_ddos_attack_l4_alert`, `advanced_ddos_attack_l7_alert`, `bgp_hijack_notification`, `billing_usage_alert`, `block_notification_block_removed`, `block_notification_new_block`, `block_notification_review_rejected`, `brand_protection_alert`, `brand_protection_digest`, `clickhouse_alert_fw_anomaly`, `clickhouse_alert_fw_ent_anomaly`, `custom_ssl_certificate_event_type`, `dedicated_ssl_certificate_event_type`, `dos_attack_l4`, `dos_attack_l7`, `expiring_service_token_alert`, `failing_logpush_job_disabled_alert`, `fbm_auto_advertisement`, `fbm_dosd_attack`, `fbm_volumetric_attack`, `health_check_status_notification`, `hostname_aop_custom_certificate_expiration_type`, `http_alert_edge_error`, `http_alert_origin_error`, `image_notification`, `incident_alert`, `load_balancing_health_alert`, `load_balancing_pool_enablement_alert`, `logo_match_alert`, `magic_tunnel_health_check_event`, `maintenance_event_notification`, `mtls_certificate_store_certificate_expiration_type`, `pages_event_alert`, `radar_notification`, `real_origin_monitoring`, `scriptmonitor_alert_new_code_change_detections`, `scriptmonitor_alert_new_hosts`, `scriptmonitor_alert_new_malicious_hosts`, `scriptmonitor_alert_new_malicious_scripts`, `scriptmonitor_alert_new_malicious_url`, `scriptmonitor_alert_new_max_length_resource_url`, `scriptmonitor_alert_new_resources`, `secondary_dns_all_primaries_failing`, `secondary_dns_primaries_failing`, `secondary_dns_zone_successfully_updated`, `secondary_dns_zone_validation_warning`, `sentinel_alert`, `stream_live_notifications`, `traffic_anomalies_alert`, `tunnel_health_event`, `tunnel_update_event`, `universal_ssl_event_type`, `web_analytics_metrics_update`, `weekly_account_overview`, `workers_alert`, `zone_aop_custom_certificate_expiration_type`.\n"
},
"created": {
"type": "string",
@@ -23312,7 +23808,7 @@
}
},
"cloudflare:index/ruleset:Ruleset": {
- "description": "The [Cloudflare Ruleset Engine](https://developers.cloudflare.com/firewall/cf-rulesets)\nallows you to create and deploy rules and rulesets.\n\nThe engine syntax, inspired by the Wireshark Display Filter language, is the\nsame syntax used in custom Firewall Rules. Cloudflare uses the Ruleset Engine\nin different products, allowing you to configure several products using the same\nbasic syntax.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.cloudflare.Ruleset;\nimport com.pulumi.cloudflare.RulesetArgs;\nimport com.pulumi.cloudflare.inputs.RulesetRuleArgs;\nimport com.pulumi.cloudflare.inputs.RulesetRuleActionParametersArgs;\nimport com.pulumi.cloudflare.inputs.RulesetRuleActionParametersOverridesArgs;\nimport com.pulumi.cloudflare.inputs.RulesetRuleActionParametersUriArgs;\nimport com.pulumi.cloudflare.inputs.RulesetRuleActionParametersUriPathArgs;\nimport com.pulumi.cloudflare.inputs.RulesetRuleActionParametersUriQueryArgs;\nimport com.pulumi.cloudflare.inputs.RulesetRuleRatelimitArgs;\nimport com.pulumi.cloudflare.inputs.RulesetRuleActionParametersOriginArgs;\nimport com.pulumi.cloudflare.inputs.RulesetRuleActionParametersEdgeTtlArgs;\nimport com.pulumi.cloudflare.inputs.RulesetRuleActionParametersBrowserTtlArgs;\nimport com.pulumi.cloudflare.inputs.RulesetRuleActionParametersServeStaleArgs;\nimport com.pulumi.cloudflare.inputs.RulesetRuleActionParametersCacheKeyArgs;\nimport com.pulumi.cloudflare.inputs.RulesetRuleActionParametersCacheKeyCustomKeyArgs;\nimport com.pulumi.cloudflare.inputs.RulesetRuleActionParametersCacheKeyCustomKeyQueryStringArgs;\nimport com.pulumi.cloudflare.inputs.RulesetRuleActionParametersCacheKeyCustomKeyHeaderArgs;\nimport com.pulumi.cloudflare.inputs.RulesetRuleActionParametersCacheKeyCustomKeyCookieArgs;\nimport com.pulumi.cloudflare.inputs.RulesetRuleActionParametersCacheKeyCustomKeyUserArgs;\nimport com.pulumi.cloudflare.inputs.RulesetRuleActionParametersCacheKeyCustomKeyHostArgs;\nimport com.pulumi.cloudflare.inputs.RulesetRuleActionParametersFromListArgs;\nimport com.pulumi.cloudflare.inputs.RulesetRuleActionParametersFromValueArgs;\nimport com.pulumi.cloudflare.inputs.RulesetRuleActionParametersFromValueTargetUrlArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n // Magic Transit\n var magicTransitExample = new Ruleset(\"magicTransitExample\", RulesetArgs.builder()\n .accountId(\"f037e56e89293a057740de681ac9abbe\")\n .name(\"account magic transit\")\n .description(\"example magic transit ruleset description\")\n .kind(\"root\")\n .phase(\"magic_transit\")\n .rules(RulesetRuleArgs.builder()\n .action(\"allow\")\n .expression(\"tcp.dstport in { 32768..65535 }\")\n .description(\"Allow TCP Ephemeral Ports\")\n .build())\n .build());\n\n // Zone-level WAF Managed Ruleset\n var zoneLevelManagedWaf = new Ruleset(\"zoneLevelManagedWaf\", RulesetArgs.builder()\n .zoneId(\"0da42c8d2132a9ddaf714f9e7c920711\")\n .name(\"managed WAF\")\n .description(\"managed WAF ruleset description\")\n .kind(\"zone\")\n .phase(\"http_request_firewall_managed\")\n .rules(RulesetRuleArgs.builder()\n .action(\"execute\")\n .actionParameters(RulesetRuleActionParametersArgs.builder()\n .id(\"efb7b8c949ac4650a09736fc376e9aee\")\n .build())\n .expression(\"(http.host eq \\\"example.host.com\\\")\")\n .description(\"Execute Cloudflare Managed Ruleset on my zone-level phase entry point ruleset\")\n .enabled(true)\n .build())\n .build());\n\n // Zone-level WAF with tag-based overrides\n var zoneLevelManagedWafWithCategoryBasedOverrides = new Ruleset(\"zoneLevelManagedWafWithCategoryBasedOverrides\", RulesetArgs.builder()\n .zoneId(\"0da42c8d2132a9ddaf714f9e7c920711\")\n .name(\"managed WAF with tag-based overrides\")\n .description(\"managed WAF with tag-based overrides ruleset description\")\n .kind(\"zone\")\n .phase(\"http_request_firewall_managed\")\n .rules(RulesetRuleArgs.builder()\n .action(\"execute\")\n .actionParameters(RulesetRuleActionParametersArgs.builder()\n .id(\"efb7b8c949ac4650a09736fc376e9aee\")\n .overrides(RulesetRuleActionParametersOverridesArgs.builder()\n .categories( \n RulesetRuleActionParametersOverridesCategoryArgs.builder()\n .category(\"wordpress\")\n .action(\"block\")\n .enabled(true)\n .build(),\n RulesetRuleActionParametersOverridesCategoryArgs.builder()\n .category(\"joomla\")\n .action(\"block\")\n .enabled(true)\n .build())\n .build())\n .build())\n .expression(\"(http.host eq \\\"example.host.com\\\")\")\n .description(\"overrides to only enable wordpress rules to block\")\n .enabled(false)\n .build())\n .build());\n\n // Rewrite the URI path component to a static path\n var transformUriRulePath = new Ruleset(\"transformUriRulePath\", RulesetArgs.builder()\n .zoneId(\"0da42c8d2132a9ddaf714f9e7c920711\")\n .name(\"transform rule for URI path\")\n .description(\"change the URI path to a new static path\")\n .kind(\"zone\")\n .phase(\"http_request_transform\")\n .rules(RulesetRuleArgs.builder()\n .action(\"rewrite\")\n .actionParameters(RulesetRuleActionParametersArgs.builder()\n .uri(RulesetRuleActionParametersUriArgs.builder()\n .path(RulesetRuleActionParametersUriPathArgs.builder()\n .value(\"/my-new-route\")\n .build())\n .build())\n .build())\n .expression(\"(http.host eq \\\"example.com\\\" and http.request.uri.path eq \\\"/old-path\\\")\")\n .description(\"example URI path transform rule\")\n .enabled(true)\n .build())\n .build());\n\n // Rewrite the URI query component to a static query\n var transformUriRuleQuery = new Ruleset(\"transformUriRuleQuery\", RulesetArgs.builder()\n .zoneId(\"0da42c8d2132a9ddaf714f9e7c920711\")\n .name(\"transform rule for URI query parameter\")\n .description(\"change the URI query to a new static query\")\n .kind(\"zone\")\n .phase(\"http_request_transform\")\n .rules(RulesetRuleArgs.builder()\n .action(\"rewrite\")\n .actionParameters(RulesetRuleActionParametersArgs.builder()\n .uri(RulesetRuleActionParametersUriArgs.builder()\n .query(RulesetRuleActionParametersUriQueryArgs.builder()\n .value(\"old=new_again\")\n .build())\n .build())\n .build())\n .expression(\"(http.host eq \\\"example.host.com\\\")\")\n .description(\"URI transformation query example\")\n .enabled(true)\n .build())\n .build());\n\n // Rewrite HTTP headers to a modified values\n var transformUriHttpHeaders = new Ruleset(\"transformUriHttpHeaders\", RulesetArgs.builder()\n .zoneId(\"0da42c8d2132a9ddaf714f9e7c920711\")\n .name(\"transform rule for HTTP headers\")\n .description(\"modify HTTP headers before reaching origin\")\n .kind(\"zone\")\n .phase(\"http_request_late_transform\")\n .rules(RulesetRuleArgs.builder()\n .action(\"rewrite\")\n .actionParameters(RulesetRuleActionParametersArgs.builder()\n .headers( \n RulesetRuleActionParametersHeaderArgs.builder()\n .name(\"example-http-header-1\")\n .operation(\"set\")\n .value(\"my-http-header-value-1\")\n .build(),\n RulesetRuleActionParametersHeaderArgs.builder()\n .name(\"example-http-header-2\")\n .operation(\"set\")\n .expression(\"cf.zone.name\")\n .build(),\n RulesetRuleActionParametersHeaderArgs.builder()\n .name(\"example-http-header-3-to-remove\")\n .operation(\"remove\")\n .build())\n .build())\n .expression(\"(http.host eq \\\"example.host.com\\\")\")\n .description(\"example request header transform rule\")\n .enabled(false)\n .build())\n .build());\n\n // HTTP rate limit for an API route\n var rateLimitingExample = new Ruleset(\"rateLimitingExample\", RulesetArgs.builder()\n .zoneId(\"0da42c8d2132a9ddaf714f9e7c920711\")\n .name(\"restrict API requests count\")\n .description(\"apply HTTP rate limiting for a route\")\n .kind(\"zone\")\n .phase(\"http_ratelimit\")\n .rules(RulesetRuleArgs.builder()\n .action(\"block\")\n .ratelimit(RulesetRuleRatelimitArgs.builder()\n .characteristics( \n \"cf.colo.id\",\n \"ip.src\")\n .period(60)\n .requestsPerPeriod(100)\n .mitigationTimeout(600)\n .build())\n .expression(\"(http.request.uri.path matches \\\"^/api/\\\")\")\n .description(\"rate limit for API\")\n .enabled(true)\n .build())\n .build());\n\n // Change origin for an API route\n var httpOriginExample = new Ruleset(\"httpOriginExample\", RulesetArgs.builder()\n .zoneId(\"0da42c8d2132a9ddaf714f9e7c920711\")\n .name(\"Change to some origin\")\n .description(\"Change origin for a route\")\n .kind(\"zone\")\n .phase(\"http_request_origin\")\n .rules(RulesetRuleArgs.builder()\n .action(\"route\")\n .actionParameters(RulesetRuleActionParametersArgs.builder()\n .hostHeader(\"some.host\")\n .origin(RulesetRuleActionParametersOriginArgs.builder()\n .host(\"some.host\")\n .port(80)\n .build())\n .build())\n .expression(\"(http.request.uri.path matches \\\"^/api/\\\")\")\n .description(\"change origin to some.host\")\n .enabled(true)\n .build())\n .build());\n\n // Custom fields logging\n var customFieldsLoggingExample = new Ruleset(\"customFieldsLoggingExample\", RulesetArgs.builder()\n .zoneId(\"0da42c8d2132a9ddaf714f9e7c920711\")\n .name(\"log custom fields\")\n .description(\"add custom fields to logging\")\n .kind(\"zone\")\n .phase(\"http_log_custom_fields\")\n .rules(RulesetRuleArgs.builder()\n .action(\"log_custom_field\")\n .actionParameters(RulesetRuleActionParametersArgs.builder()\n .requestFields( \n \"content-type\",\n \"x-forwarded-for\",\n \"host\")\n .responseFields( \n \"server\",\n \"content-type\",\n \"allow\")\n .cookieFields( \n \"__ga\",\n \"accountNumber\",\n \"__cfruid\")\n .build())\n .expression(\"(http.host eq \\\"example.host.com\\\")\")\n .description(\"log custom fields rule\")\n .enabled(true)\n .build())\n .build());\n\n // Custom cache keys + settings\n var cacheSettingsExample = new Ruleset(\"cacheSettingsExample\", RulesetArgs.builder()\n .zoneId(\"0da42c8d2132a9ddaf714f9e7c920711\")\n .name(\"set cache settings\")\n .description(\"set cache settings for the request\")\n .kind(\"zone\")\n .phase(\"http_request_cache_settings\")\n .rules(RulesetRuleArgs.builder()\n .action(\"set_cache_settings\")\n .actionParameters(RulesetRuleActionParametersArgs.builder()\n .edgeTtl(RulesetRuleActionParametersEdgeTtlArgs.builder()\n .mode(\"override_origin\")\n .default_(60)\n .statusCodeTtls( \n RulesetRuleActionParametersEdgeTtlStatusCodeTtlArgs.builder()\n .statusCode(200)\n .value(50)\n .build(),\n RulesetRuleActionParametersEdgeTtlStatusCodeTtlArgs.builder()\n .statusCodeRange(%!v(PANIC=Format method: runtime error: invalid memory address or nil pointer dereference))\n .value(30)\n .build())\n .build())\n .browserTtl(RulesetRuleActionParametersBrowserTtlArgs.builder()\n .mode(\"respect_origin\")\n .build())\n .serveStale(RulesetRuleActionParametersServeStaleArgs.builder()\n .disableStaleWhileUpdating(true)\n .build())\n .respectStrongEtags(true)\n .cacheKey(RulesetRuleActionParametersCacheKeyArgs.builder()\n .ignoreQueryStringsOrder(false)\n .cacheDeceptionArmor(true)\n .customKey(RulesetRuleActionParametersCacheKeyCustomKeyArgs.builder()\n .queryString(RulesetRuleActionParametersCacheKeyCustomKeyQueryStringArgs.builder()\n .excludes(\"*\")\n .build())\n .header(RulesetRuleActionParametersCacheKeyCustomKeyHeaderArgs.builder()\n .includes( \n \"habc\",\n \"hdef\")\n .checkPresences( \n \"habc_t\",\n \"hdef_t\")\n .excludeOrigin(true)\n .contains(Map.ofEntries(\n Map.entry(\"accept\", \n \"image/web\",\n \"image/png\"),\n Map.entry(\"accept-encoding\", \n \"br\",\n \"zstd\"),\n Map.entry(\"some-header\", \n \"some-value\",\n \"some-other-value\")\n ))\n .build())\n .cookie(RulesetRuleActionParametersCacheKeyCustomKeyCookieArgs.builder()\n .includes( \n \"cabc\",\n \"cdef\")\n .checkPresences( \n \"cabc_t\",\n \"cdef_t\")\n .build())\n .user(RulesetRuleActionParametersCacheKeyCustomKeyUserArgs.builder()\n .deviceType(true)\n .geo(false)\n .build())\n .host(RulesetRuleActionParametersCacheKeyCustomKeyHostArgs.builder()\n .resolved(true)\n .build())\n .build())\n .build())\n .originErrorPagePassthru(false)\n .build())\n .expression(\"(http.host eq \\\"example.host.com\\\")\")\n .description(\"set cache settings rule\")\n .enabled(true)\n .build())\n .build());\n\n // Redirects based on a List resource\n var redirectFromListExample = new Ruleset(\"redirectFromListExample\", RulesetArgs.builder()\n .accountId(\"f037e56e89293a057740de681ac9abbe\")\n .name(\"redirects\")\n .description(\"Redirect ruleset\")\n .kind(\"root\")\n .phase(\"http_request_redirect\")\n .rules(RulesetRuleArgs.builder()\n .action(\"redirect\")\n .actionParameters(RulesetRuleActionParametersArgs.builder()\n .fromList(RulesetRuleActionParametersFromListArgs.builder()\n .name(\"redirect_list\")\n .key(\"http.request.full_uri\")\n .build())\n .build())\n .expression(\"http.request.full_uri in $redirect_list\")\n .description(\"Apply redirects from redirect_list\")\n .enabled(true)\n .build())\n .build());\n\n // Dynamic Redirects from value resource\n var redirectFromValueExample = new Ruleset(\"redirectFromValueExample\", RulesetArgs.builder()\n .zoneId(\"0da42c8d2132a9ddaf714f9e7c920711\")\n .name(\"redirects\")\n .description(\"Redirect ruleset\")\n .kind(\"zone\")\n .phase(\"http_request_dynamic_redirect\")\n .rules(RulesetRuleArgs.builder()\n .action(\"redirect\")\n .actionParameters(RulesetRuleActionParametersArgs.builder()\n .fromValue(RulesetRuleActionParametersFromValueArgs.builder()\n .statusCode(301)\n .targetUrl(RulesetRuleActionParametersFromValueTargetUrlArgs.builder()\n .value(\"some_host.com\")\n .build())\n .preserveQueryString(true)\n .build())\n .build())\n .expression(\"(http.request.uri.path matches \\\"^/api/\\\")\")\n .description(\"Apply redirect from value\")\n .enabled(true)\n .build())\n .build());\n\n // Serve some custom error response\n var httpCustomErrorExample = new Ruleset(\"httpCustomErrorExample\", RulesetArgs.builder()\n .zoneId(\"0da42c8d2132a9ddaf714f9e7c920711\")\n .name(\"Serve some error response\")\n .description(\"Serve some error response\")\n .kind(\"zone\")\n .phase(\"http_custom_errors\")\n .rules(RulesetRuleArgs.builder()\n .action(\"serve_error\")\n .actionParameters(RulesetRuleActionParametersArgs.builder()\n .content(\"some error html\")\n .contentType(\"text/html\")\n .statusCode(\"530\")\n .build())\n .expression(\"(http.request.uri.path matches \\\"^/api/\\\")\")\n .description(\"serve some error response\")\n .enabled(true)\n .build())\n .build());\n\n // Set Configuration Rules for an API route\n var httpConfigRulesExample = new Ruleset(\"httpConfigRulesExample\", RulesetArgs.builder()\n .zoneId(\"0da42c8d2132a9ddaf714f9e7c920711\")\n .name(\"set config rules\")\n .description(\"set config rules for request\")\n .kind(\"zone\")\n .phase(\"http_config_settings\")\n .rules(RulesetRuleArgs.builder()\n .action(\"set_config\")\n .actionParameters(RulesetRuleActionParametersArgs.builder()\n .emailObfuscation(true)\n .bic(true)\n .build())\n .expression(\"(http.request.uri.path matches \\\"^/api/\\\")\")\n .description(\"set config rules for matching request\")\n .enabled(true)\n .build())\n .build());\n\n // Set compress algorithm for response.\n var responseCompressBrotliHtml = new Ruleset(\"responseCompressBrotliHtml\", RulesetArgs.builder()\n .zoneId(\"0da42c8d2132a9ddaf714f9e7c920711\")\n .name(\"Brotli response compression for HTML\")\n .description(\"Response compression ruleset\")\n .kind(\"zone\")\n .phase(\"http_response_compression\")\n .rules(RulesetRuleArgs.builder()\n .action(\"compress_response\")\n .actionParameters(RulesetRuleActionParametersArgs.builder()\n .algorithms( \n RulesetRuleActionParametersAlgorithmArgs.builder()\n .name(\"brotli\")\n .build(),\n RulesetRuleActionParametersAlgorithmArgs.builder()\n .name(\"auto\")\n .build())\n .build())\n .expression(\"http.response.content_type.media_type == \\\"text/html\\\"\")\n .description(\"Prefer brotli compression for HTML\")\n .enabled(true)\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n # Magic Transit\n magicTransitExample:\n type: cloudflare:Ruleset\n name: magic_transit_example\n properties:\n accountId: f037e56e89293a057740de681ac9abbe\n name: account magic transit\n description: example magic transit ruleset description\n kind: root\n phase: magic_transit\n rules:\n - action: allow\n expression: tcp.dstport in { 32768..65535 }\n description: Allow TCP Ephemeral Ports\n # Zone-level WAF Managed Ruleset\n zoneLevelManagedWaf:\n type: cloudflare:Ruleset\n name: zone_level_managed_waf\n properties:\n zoneId: 0da42c8d2132a9ddaf714f9e7c920711\n name: managed WAF\n description: managed WAF ruleset description\n kind: zone\n phase: http_request_firewall_managed\n rules:\n - action: execute\n actionParameters:\n id: efb7b8c949ac4650a09736fc376e9aee\n expression: (http.host eq \"example.host.com\")\n description: Execute Cloudflare Managed Ruleset on my zone-level phase entry point ruleset\n enabled: true\n # Zone-level WAF with tag-based overrides\n zoneLevelManagedWafWithCategoryBasedOverrides:\n type: cloudflare:Ruleset\n name: zone_level_managed_waf_with_category_based_overrides\n properties:\n zoneId: 0da42c8d2132a9ddaf714f9e7c920711\n name: managed WAF with tag-based overrides\n description: managed WAF with tag-based overrides ruleset description\n kind: zone\n phase: http_request_firewall_managed\n rules:\n - action: execute\n actionParameters:\n id: efb7b8c949ac4650a09736fc376e9aee\n overrides:\n categories:\n - category: wordpress\n action: block\n enabled: true\n - category: joomla\n action: block\n enabled: true\n expression: (http.host eq \"example.host.com\")\n description: overrides to only enable wordpress rules to block\n enabled: false\n # Rewrite the URI path component to a static path\n transformUriRulePath:\n type: cloudflare:Ruleset\n name: transform_uri_rule_path\n properties:\n zoneId: 0da42c8d2132a9ddaf714f9e7c920711\n name: transform rule for URI path\n description: change the URI path to a new static path\n kind: zone\n phase: http_request_transform\n rules:\n - action: rewrite\n actionParameters:\n uri:\n path:\n value: /my-new-route\n expression: (http.host eq \"example.com\" and http.request.uri.path eq \"/old-path\")\n description: example URI path transform rule\n enabled: true\n # Rewrite the URI query component to a static query\n transformUriRuleQuery:\n type: cloudflare:Ruleset\n name: transform_uri_rule_query\n properties:\n zoneId: 0da42c8d2132a9ddaf714f9e7c920711\n name: transform rule for URI query parameter\n description: change the URI query to a new static query\n kind: zone\n phase: http_request_transform\n rules:\n - action: rewrite\n actionParameters:\n uri:\n query:\n value: old=new_again\n expression: (http.host eq \"example.host.com\")\n description: URI transformation query example\n enabled: true\n # Rewrite HTTP headers to a modified values\n transformUriHttpHeaders:\n type: cloudflare:Ruleset\n name: transform_uri_http_headers\n properties:\n zoneId: 0da42c8d2132a9ddaf714f9e7c920711\n name: transform rule for HTTP headers\n description: modify HTTP headers before reaching origin\n kind: zone\n phase: http_request_late_transform\n rules:\n - action: rewrite\n actionParameters:\n headers:\n - name: example-http-header-1\n operation: set\n value: my-http-header-value-1\n - name: example-http-header-2\n operation: set\n expression: cf.zone.name\n - name: example-http-header-3-to-remove\n operation: remove\n expression: (http.host eq \"example.host.com\")\n description: example request header transform rule\n enabled: false\n # HTTP rate limit for an API route\n rateLimitingExample:\n type: cloudflare:Ruleset\n name: rate_limiting_example\n properties:\n zoneId: 0da42c8d2132a9ddaf714f9e7c920711\n name: restrict API requests count\n description: apply HTTP rate limiting for a route\n kind: zone\n phase: http_ratelimit\n rules:\n - action: block\n ratelimit:\n characteristics:\n - cf.colo.id\n - ip.src\n period: 60\n requestsPerPeriod: 100\n mitigationTimeout: 600\n expression: (http.request.uri.path matches \"^/api/\")\n description: rate limit for API\n enabled: true\n # Change origin for an API route\n httpOriginExample:\n type: cloudflare:Ruleset\n name: http_origin_example\n properties:\n zoneId: 0da42c8d2132a9ddaf714f9e7c920711\n name: Change to some origin\n description: Change origin for a route\n kind: zone\n phase: http_request_origin\n rules:\n - action: route\n actionParameters:\n hostHeader: some.host\n origin:\n host: some.host\n port: 80\n expression: (http.request.uri.path matches \"^/api/\")\n description: change origin to some.host\n enabled: true\n # Custom fields logging\n customFieldsLoggingExample:\n type: cloudflare:Ruleset\n name: custom_fields_logging_example\n properties:\n zoneId: 0da42c8d2132a9ddaf714f9e7c920711\n name: log custom fields\n description: add custom fields to logging\n kind: zone\n phase: http_log_custom_fields\n rules:\n - action: log_custom_field\n actionParameters:\n requestFields:\n - content-type\n - x-forwarded-for\n - host\n responseFields:\n - server\n - content-type\n - allow\n cookieFields:\n - __ga\n - accountNumber\n - __cfruid\n expression: (http.host eq \"example.host.com\")\n description: log custom fields rule\n enabled: true\n # Custom cache keys + settings\n cacheSettingsExample:\n type: cloudflare:Ruleset\n name: cache_settings_example\n properties:\n zoneId: 0da42c8d2132a9ddaf714f9e7c920711\n name: set cache settings\n description: set cache settings for the request\n kind: zone\n phase: http_request_cache_settings\n rules:\n - action: set_cache_settings\n actionParameters:\n edgeTtl:\n mode: override_origin\n default: 60\n statusCodeTtls:\n - statusCode: 200\n value: 50\n - statusCodeRange:\n from: 201\n to: 300\n value: 30\n browserTtl:\n mode: respect_origin\n serveStale:\n disableStaleWhileUpdating: true\n respectStrongEtags: true\n cacheKey:\n ignoreQueryStringsOrder: false\n cacheDeceptionArmor: true\n customKey:\n queryString:\n excludes:\n - '*'\n header:\n includes:\n - habc\n - hdef\n checkPresences:\n - habc_t\n - hdef_t\n excludeOrigin: true\n contains:\n accept:\n - image/web\n - image/png\n accept-encoding:\n - br\n - zstd\n some-header:\n - some-value\n - some-other-value\n cookie:\n includes:\n - cabc\n - cdef\n checkPresences:\n - cabc_t\n - cdef_t\n user:\n deviceType: true\n geo: false\n host:\n resolved: true\n originErrorPagePassthru: false\n expression: (http.host eq \"example.host.com\")\n description: set cache settings rule\n enabled: true\n # Redirects based on a List resource\n redirectFromListExample:\n type: cloudflare:Ruleset\n name: redirect_from_list_example\n properties:\n accountId: f037e56e89293a057740de681ac9abbe\n name: redirects\n description: Redirect ruleset\n kind: root\n phase: http_request_redirect\n rules:\n - action: redirect\n actionParameters:\n fromList:\n name: redirect_list\n key: http.request.full_uri\n expression: http.request.full_uri in $redirect_list\n description: Apply redirects from redirect_list\n enabled: true\n # Dynamic Redirects from value resource\n redirectFromValueExample:\n type: cloudflare:Ruleset\n name: redirect_from_value_example\n properties:\n zoneId: 0da42c8d2132a9ddaf714f9e7c920711\n name: redirects\n description: Redirect ruleset\n kind: zone\n phase: http_request_dynamic_redirect\n rules:\n - action: redirect\n actionParameters:\n fromValue:\n statusCode: 301\n targetUrl:\n value: some_host.com\n preserveQueryString: true\n expression: (http.request.uri.path matches \"^/api/\")\n description: Apply redirect from value\n enabled: true\n # Serve some custom error response\n httpCustomErrorExample:\n type: cloudflare:Ruleset\n name: http_custom_error_example\n properties:\n zoneId: 0da42c8d2132a9ddaf714f9e7c920711\n name: Serve some error response\n description: Serve some error response\n kind: zone\n phase: http_custom_errors\n rules:\n - action: serve_error\n actionParameters:\n content: some error html\n contentType: text/html\n statusCode: '530'\n expression: (http.request.uri.path matches \"^/api/\")\n description: serve some error response\n enabled: true\n # Set Configuration Rules for an API route\n httpConfigRulesExample:\n type: cloudflare:Ruleset\n name: http_config_rules_example\n properties:\n zoneId: 0da42c8d2132a9ddaf714f9e7c920711\n name: set config rules\n description: set config rules for request\n kind: zone\n phase: http_config_settings\n rules:\n - action: set_config\n actionParameters:\n emailObfuscation: true\n bic: true\n expression: (http.request.uri.path matches \"^/api/\")\n description: set config rules for matching request\n enabled: true\n # Set compress algorithm for response.\n responseCompressBrotliHtml:\n type: cloudflare:Ruleset\n name: response_compress_brotli_html\n properties:\n zoneId: 0da42c8d2132a9ddaf714f9e7c920711\n name: Brotli response compression for HTML\n description: Response compression ruleset\n kind: zone\n phase: http_response_compression\n rules:\n - action: compress_response\n actionParameters:\n algorithms:\n - name: brotli\n - name: auto\n expression: http.response.content_type.media_type == \"text/html\"\n description: Prefer brotli compression for HTML\n enabled: true\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nImport an account scoped Ruleset configuration.\n\n```sh\n$ pulumi import cloudflare:index/ruleset:Ruleset example account/\u003caccount_id\u003e/\u003cruleset_id\u003e\n```\n\nImport a zone scoped Ruleset configuration.\n\n```sh\n$ pulumi import cloudflare:index/ruleset:Ruleset example zone/\u003czone_id\u003e/\u003cruleset_id\u003e\n```\n\n",
+ "description": "The [Cloudflare Ruleset Engine](https://developers.cloudflare.com/firewall/cf-rulesets)\nallows you to create and deploy rules and rulesets.\n\nThe engine syntax, inspired by the Wireshark Display Filter language, is the\nsame syntax used in custom Firewall Rules. Cloudflare uses the Ruleset Engine\nin different products, allowing you to configure several products using the same\nbasic syntax.\n\n## Import\n\nImport an account scoped Ruleset configuration.\n\n```sh\n$ pulumi import cloudflare:index/ruleset:Ruleset example account/\u003caccount_id\u003e/\u003cruleset_id\u003e\n```\n\nImport a zone scoped Ruleset configuration.\n\n```sh\n$ pulumi import cloudflare:index/ruleset:Ruleset example zone/\u003czone_id\u003e/\u003cruleset_id\u003e\n```\n\n",
"properties": {
"accountId": {
"type": "string",
@@ -23844,7 +24340,7 @@
}
},
"cloudflare:index/teamsAccount:TeamsAccount": {
- "description": "Provides a Cloudflare Teams Account resource. The Teams Account\nresource defines configuration for secure web gateway.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as cloudflare from \"@pulumi/cloudflare\";\n\nconst example = new cloudflare.TeamsAccount(\"example\", {\n accountId: \"f037e56e89293a057740de681ac9abbe\",\n tlsDecryptEnabled: true,\n protocolDetectionEnabled: true,\n blockPage: {\n footerText: \"hello\",\n headerText: \"hello\",\n logoPath: \"https://example.com/logo.jpg\",\n backgroundColor: \"#000000\",\n },\n bodyScanning: {\n inspectionMode: \"deep\",\n },\n antivirus: {\n enabledDownloadPhase: true,\n enabledUploadPhase: false,\n failClosed: true,\n notificationSettings: {\n enabled: true,\n message: \"you are blocked\",\n supportUrl: \"https://example.com/blocked\",\n },\n },\n fips: {\n tls: true,\n },\n proxy: {\n tcp: true,\n udp: true,\n rootCa: true,\n virtualIp: false,\n },\n urlBrowserIsolationEnabled: true,\n logging: {\n redactPii: true,\n settingsByRuleType: {\n dns: {\n logAll: false,\n logBlocks: true,\n },\n http: {\n logAll: true,\n logBlocks: true,\n },\n l4: {\n logAll: false,\n logBlocks: true,\n },\n },\n },\n extendedEmailMatching: {\n enabled: true,\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_cloudflare as cloudflare\n\nexample = cloudflare.TeamsAccount(\"example\",\n account_id=\"f037e56e89293a057740de681ac9abbe\",\n tls_decrypt_enabled=True,\n protocol_detection_enabled=True,\n block_page={\n \"footer_text\": \"hello\",\n \"header_text\": \"hello\",\n \"logo_path\": \"https://example.com/logo.jpg\",\n \"background_color\": \"#000000\",\n },\n body_scanning={\n \"inspection_mode\": \"deep\",\n },\n antivirus={\n \"enabled_download_phase\": True,\n \"enabled_upload_phase\": False,\n \"fail_closed\": True,\n \"notification_settings\": {\n \"enabled\": True,\n \"message\": \"you are blocked\",\n \"support_url\": \"https://example.com/blocked\",\n },\n },\n fips={\n \"tls\": True,\n },\n proxy={\n \"tcp\": True,\n \"udp\": True,\n \"root_ca\": True,\n \"virtual_ip\": False,\n },\n url_browser_isolation_enabled=True,\n logging={\n \"redact_pii\": True,\n \"settings_by_rule_type\": {\n \"dns\": {\n \"log_all\": False,\n \"log_blocks\": True,\n },\n \"http\": {\n \"log_all\": True,\n \"log_blocks\": True,\n },\n \"l4\": {\n \"log_all\": False,\n \"log_blocks\": True,\n },\n },\n },\n extended_email_matching={\n \"enabled\": True,\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Cloudflare = Pulumi.Cloudflare;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Cloudflare.TeamsAccount(\"example\", new()\n {\n AccountId = \"f037e56e89293a057740de681ac9abbe\",\n TlsDecryptEnabled = true,\n ProtocolDetectionEnabled = true,\n BlockPage = new Cloudflare.Inputs.TeamsAccountBlockPageArgs\n {\n FooterText = \"hello\",\n HeaderText = \"hello\",\n LogoPath = \"https://example.com/logo.jpg\",\n BackgroundColor = \"#000000\",\n },\n BodyScanning = new Cloudflare.Inputs.TeamsAccountBodyScanningArgs\n {\n InspectionMode = \"deep\",\n },\n Antivirus = new Cloudflare.Inputs.TeamsAccountAntivirusArgs\n {\n EnabledDownloadPhase = true,\n EnabledUploadPhase = false,\n FailClosed = true,\n NotificationSettings = new Cloudflare.Inputs.TeamsAccountAntivirusNotificationSettingsArgs\n {\n Enabled = true,\n Message = \"you are blocked\",\n SupportUrl = \"https://example.com/blocked\",\n },\n },\n Fips = new Cloudflare.Inputs.TeamsAccountFipsArgs\n {\n Tls = true,\n },\n Proxy = new Cloudflare.Inputs.TeamsAccountProxyArgs\n {\n Tcp = true,\n Udp = true,\n RootCa = true,\n VirtualIp = false,\n },\n UrlBrowserIsolationEnabled = true,\n Logging = new Cloudflare.Inputs.TeamsAccountLoggingArgs\n {\n RedactPii = true,\n SettingsByRuleType = new Cloudflare.Inputs.TeamsAccountLoggingSettingsByRuleTypeArgs\n {\n Dns = new Cloudflare.Inputs.TeamsAccountLoggingSettingsByRuleTypeDnsArgs\n {\n LogAll = false,\n LogBlocks = true,\n },\n Http = new Cloudflare.Inputs.TeamsAccountLoggingSettingsByRuleTypeHttpArgs\n {\n LogAll = true,\n LogBlocks = true,\n },\n L4 = new Cloudflare.Inputs.TeamsAccountLoggingSettingsByRuleTypeL4Args\n {\n LogAll = false,\n LogBlocks = true,\n },\n },\n },\n ExtendedEmailMatching = new Cloudflare.Inputs.TeamsAccountExtendedEmailMatchingArgs\n {\n Enabled = true,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-cloudflare/sdk/v5/go/cloudflare\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := cloudflare.NewTeamsAccount(ctx, \"example\", \u0026cloudflare.TeamsAccountArgs{\n\t\t\tAccountId: pulumi.String(\"f037e56e89293a057740de681ac9abbe\"),\n\t\t\tTlsDecryptEnabled: pulumi.Bool(true),\n\t\t\tProtocolDetectionEnabled: pulumi.Bool(true),\n\t\t\tBlockPage: \u0026cloudflare.TeamsAccountBlockPageArgs{\n\t\t\t\tFooterText: pulumi.String(\"hello\"),\n\t\t\t\tHeaderText: pulumi.String(\"hello\"),\n\t\t\t\tLogoPath: pulumi.String(\"https://example.com/logo.jpg\"),\n\t\t\t\tBackgroundColor: pulumi.String(\"#000000\"),\n\t\t\t},\n\t\t\tBodyScanning: \u0026cloudflare.TeamsAccountBodyScanningArgs{\n\t\t\t\tInspectionMode: pulumi.String(\"deep\"),\n\t\t\t},\n\t\t\tAntivirus: \u0026cloudflare.TeamsAccountAntivirusArgs{\n\t\t\t\tEnabledDownloadPhase: pulumi.Bool(true),\n\t\t\t\tEnabledUploadPhase: pulumi.Bool(false),\n\t\t\t\tFailClosed: pulumi.Bool(true),\n\t\t\t\tNotificationSettings: \u0026cloudflare.TeamsAccountAntivirusNotificationSettingsArgs{\n\t\t\t\t\tEnabled: pulumi.Bool(true),\n\t\t\t\t\tMessage: pulumi.String(\"you are blocked\"),\n\t\t\t\t\tSupportUrl: pulumi.String(\"https://example.com/blocked\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tFips: \u0026cloudflare.TeamsAccountFipsArgs{\n\t\t\t\tTls: pulumi.Bool(true),\n\t\t\t},\n\t\t\tProxy: \u0026cloudflare.TeamsAccountProxyArgs{\n\t\t\t\tTcp: pulumi.Bool(true),\n\t\t\t\tUdp: pulumi.Bool(true),\n\t\t\t\tRootCa: pulumi.Bool(true),\n\t\t\t\tVirtualIp: pulumi.Bool(false),\n\t\t\t},\n\t\t\tUrlBrowserIsolationEnabled: pulumi.Bool(true),\n\t\t\tLogging: \u0026cloudflare.TeamsAccountLoggingArgs{\n\t\t\t\tRedactPii: pulumi.Bool(true),\n\t\t\t\tSettingsByRuleType: \u0026cloudflare.TeamsAccountLoggingSettingsByRuleTypeArgs{\n\t\t\t\t\tDns: \u0026cloudflare.TeamsAccountLoggingSettingsByRuleTypeDnsArgs{\n\t\t\t\t\t\tLogAll: pulumi.Bool(false),\n\t\t\t\t\t\tLogBlocks: pulumi.Bool(true),\n\t\t\t\t\t},\n\t\t\t\t\tHttp: \u0026cloudflare.TeamsAccountLoggingSettingsByRuleTypeHttpArgs{\n\t\t\t\t\t\tLogAll: pulumi.Bool(true),\n\t\t\t\t\t\tLogBlocks: pulumi.Bool(true),\n\t\t\t\t\t},\n\t\t\t\t\tL4: \u0026cloudflare.TeamsAccountLoggingSettingsByRuleTypeL4Args{\n\t\t\t\t\t\tLogAll: pulumi.Bool(false),\n\t\t\t\t\t\tLogBlocks: pulumi.Bool(true),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\tExtendedEmailMatching: \u0026cloudflare.TeamsAccountExtendedEmailMatchingArgs{\n\t\t\t\tEnabled: pulumi.Bool(true),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.cloudflare.TeamsAccount;\nimport com.pulumi.cloudflare.TeamsAccountArgs;\nimport com.pulumi.cloudflare.inputs.TeamsAccountBlockPageArgs;\nimport com.pulumi.cloudflare.inputs.TeamsAccountBodyScanningArgs;\nimport com.pulumi.cloudflare.inputs.TeamsAccountAntivirusArgs;\nimport com.pulumi.cloudflare.inputs.TeamsAccountAntivirusNotificationSettingsArgs;\nimport com.pulumi.cloudflare.inputs.TeamsAccountFipsArgs;\nimport com.pulumi.cloudflare.inputs.TeamsAccountProxyArgs;\nimport com.pulumi.cloudflare.inputs.TeamsAccountLoggingArgs;\nimport com.pulumi.cloudflare.inputs.TeamsAccountLoggingSettingsByRuleTypeArgs;\nimport com.pulumi.cloudflare.inputs.TeamsAccountLoggingSettingsByRuleTypeDnsArgs;\nimport com.pulumi.cloudflare.inputs.TeamsAccountLoggingSettingsByRuleTypeHttpArgs;\nimport com.pulumi.cloudflare.inputs.TeamsAccountLoggingSettingsByRuleTypeL4Args;\nimport com.pulumi.cloudflare.inputs.TeamsAccountExtendedEmailMatchingArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new TeamsAccount(\"example\", TeamsAccountArgs.builder()\n .accountId(\"f037e56e89293a057740de681ac9abbe\")\n .tlsDecryptEnabled(true)\n .protocolDetectionEnabled(true)\n .blockPage(TeamsAccountBlockPageArgs.builder()\n .footerText(\"hello\")\n .headerText(\"hello\")\n .logoPath(\"https://example.com/logo.jpg\")\n .backgroundColor(\"#000000\")\n .build())\n .bodyScanning(TeamsAccountBodyScanningArgs.builder()\n .inspectionMode(\"deep\")\n .build())\n .antivirus(TeamsAccountAntivirusArgs.builder()\n .enabledDownloadPhase(true)\n .enabledUploadPhase(false)\n .failClosed(true)\n .notificationSettings(TeamsAccountAntivirusNotificationSettingsArgs.builder()\n .enabled(true)\n .message(\"you are blocked\")\n .supportUrl(\"https://example.com/blocked\")\n .build())\n .build())\n .fips(TeamsAccountFipsArgs.builder()\n .tls(true)\n .build())\n .proxy(TeamsAccountProxyArgs.builder()\n .tcp(true)\n .udp(true)\n .rootCa(true)\n .virtualIp(false)\n .build())\n .urlBrowserIsolationEnabled(true)\n .logging(TeamsAccountLoggingArgs.builder()\n .redactPii(true)\n .settingsByRuleType(TeamsAccountLoggingSettingsByRuleTypeArgs.builder()\n .dns(TeamsAccountLoggingSettingsByRuleTypeDnsArgs.builder()\n .logAll(false)\n .logBlocks(true)\n .build())\n .http(TeamsAccountLoggingSettingsByRuleTypeHttpArgs.builder()\n .logAll(true)\n .logBlocks(true)\n .build())\n .l4(TeamsAccountLoggingSettingsByRuleTypeL4Args.builder()\n .logAll(false)\n .logBlocks(true)\n .build())\n .build())\n .build())\n .extendedEmailMatching(TeamsAccountExtendedEmailMatchingArgs.builder()\n .enabled(true)\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: cloudflare:TeamsAccount\n properties:\n accountId: f037e56e89293a057740de681ac9abbe\n tlsDecryptEnabled: true\n protocolDetectionEnabled: true\n blockPage:\n footerText: hello\n headerText: hello\n logoPath: https://example.com/logo.jpg\n backgroundColor: '#000000'\n bodyScanning:\n inspectionMode: deep\n antivirus:\n enabledDownloadPhase: true\n enabledUploadPhase: false\n failClosed: true\n notificationSettings:\n enabled: true\n message: you are blocked\n supportUrl: https://example.com/blocked\n fips:\n tls: true\n proxy:\n tcp: true\n udp: true\n rootCa: true\n virtualIp: false\n urlBrowserIsolationEnabled: true\n logging:\n redactPii: true\n settingsByRuleType:\n dns:\n logAll: false\n logBlocks: true\n http:\n logAll: true\n logBlocks: true\n l4:\n logAll: false\n logBlocks: true\n extendedEmailMatching:\n enabled: true\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\n```sh\n$ pulumi import cloudflare:index/teamsAccount:TeamsAccount example \u003caccount_id\u003e\n```\n\n",
+ "description": "Provides a Cloudflare Teams Account resource. The Teams Account\nresource defines configuration for secure web gateway.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as cloudflare from \"@pulumi/cloudflare\";\n\nconst example = new cloudflare.TeamsAccount(\"example\", {\n accountId: \"f037e56e89293a057740de681ac9abbe\",\n tlsDecryptEnabled: true,\n protocolDetectionEnabled: true,\n blockPage: {\n footerText: \"hello\",\n headerText: \"hello\",\n logoPath: \"https://example.com/logo.jpg\",\n backgroundColor: \"#000000\",\n },\n bodyScanning: {\n inspectionMode: \"deep\",\n },\n antivirus: {\n enabledDownloadPhase: true,\n enabledUploadPhase: false,\n failClosed: true,\n notificationSettings: {\n enabled: true,\n message: \"you are blocked\",\n supportUrl: \"https://example.com/blocked\",\n },\n },\n fips: {\n tls: true,\n },\n proxy: {\n tcp: true,\n udp: true,\n rootCa: true,\n virtualIp: false,\n disableForTime: 3600,\n },\n urlBrowserIsolationEnabled: true,\n logging: {\n redactPii: true,\n settingsByRuleType: {\n dns: {\n logAll: false,\n logBlocks: true,\n },\n http: {\n logAll: true,\n logBlocks: true,\n },\n l4: {\n logAll: false,\n logBlocks: true,\n },\n },\n },\n extendedEmailMatching: {\n enabled: true,\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_cloudflare as cloudflare\n\nexample = cloudflare.TeamsAccount(\"example\",\n account_id=\"f037e56e89293a057740de681ac9abbe\",\n tls_decrypt_enabled=True,\n protocol_detection_enabled=True,\n block_page={\n \"footer_text\": \"hello\",\n \"header_text\": \"hello\",\n \"logo_path\": \"https://example.com/logo.jpg\",\n \"background_color\": \"#000000\",\n },\n body_scanning={\n \"inspection_mode\": \"deep\",\n },\n antivirus={\n \"enabled_download_phase\": True,\n \"enabled_upload_phase\": False,\n \"fail_closed\": True,\n \"notification_settings\": {\n \"enabled\": True,\n \"message\": \"you are blocked\",\n \"support_url\": \"https://example.com/blocked\",\n },\n },\n fips={\n \"tls\": True,\n },\n proxy={\n \"tcp\": True,\n \"udp\": True,\n \"root_ca\": True,\n \"virtual_ip\": False,\n \"disable_for_time\": 3600,\n },\n url_browser_isolation_enabled=True,\n logging={\n \"redact_pii\": True,\n \"settings_by_rule_type\": {\n \"dns\": {\n \"log_all\": False,\n \"log_blocks\": True,\n },\n \"http\": {\n \"log_all\": True,\n \"log_blocks\": True,\n },\n \"l4\": {\n \"log_all\": False,\n \"log_blocks\": True,\n },\n },\n },\n extended_email_matching={\n \"enabled\": True,\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Cloudflare = Pulumi.Cloudflare;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Cloudflare.TeamsAccount(\"example\", new()\n {\n AccountId = \"f037e56e89293a057740de681ac9abbe\",\n TlsDecryptEnabled = true,\n ProtocolDetectionEnabled = true,\n BlockPage = new Cloudflare.Inputs.TeamsAccountBlockPageArgs\n {\n FooterText = \"hello\",\n HeaderText = \"hello\",\n LogoPath = \"https://example.com/logo.jpg\",\n BackgroundColor = \"#000000\",\n },\n BodyScanning = new Cloudflare.Inputs.TeamsAccountBodyScanningArgs\n {\n InspectionMode = \"deep\",\n },\n Antivirus = new Cloudflare.Inputs.TeamsAccountAntivirusArgs\n {\n EnabledDownloadPhase = true,\n EnabledUploadPhase = false,\n FailClosed = true,\n NotificationSettings = new Cloudflare.Inputs.TeamsAccountAntivirusNotificationSettingsArgs\n {\n Enabled = true,\n Message = \"you are blocked\",\n SupportUrl = \"https://example.com/blocked\",\n },\n },\n Fips = new Cloudflare.Inputs.TeamsAccountFipsArgs\n {\n Tls = true,\n },\n Proxy = new Cloudflare.Inputs.TeamsAccountProxyArgs\n {\n Tcp = true,\n Udp = true,\n RootCa = true,\n VirtualIp = false,\n DisableForTime = 3600,\n },\n UrlBrowserIsolationEnabled = true,\n Logging = new Cloudflare.Inputs.TeamsAccountLoggingArgs\n {\n RedactPii = true,\n SettingsByRuleType = new Cloudflare.Inputs.TeamsAccountLoggingSettingsByRuleTypeArgs\n {\n Dns = new Cloudflare.Inputs.TeamsAccountLoggingSettingsByRuleTypeDnsArgs\n {\n LogAll = false,\n LogBlocks = true,\n },\n Http = new Cloudflare.Inputs.TeamsAccountLoggingSettingsByRuleTypeHttpArgs\n {\n LogAll = true,\n LogBlocks = true,\n },\n L4 = new Cloudflare.Inputs.TeamsAccountLoggingSettingsByRuleTypeL4Args\n {\n LogAll = false,\n LogBlocks = true,\n },\n },\n },\n ExtendedEmailMatching = new Cloudflare.Inputs.TeamsAccountExtendedEmailMatchingArgs\n {\n Enabled = true,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-cloudflare/sdk/v5/go/cloudflare\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := cloudflare.NewTeamsAccount(ctx, \"example\", \u0026cloudflare.TeamsAccountArgs{\n\t\t\tAccountId: pulumi.String(\"f037e56e89293a057740de681ac9abbe\"),\n\t\t\tTlsDecryptEnabled: pulumi.Bool(true),\n\t\t\tProtocolDetectionEnabled: pulumi.Bool(true),\n\t\t\tBlockPage: \u0026cloudflare.TeamsAccountBlockPageArgs{\n\t\t\t\tFooterText: pulumi.String(\"hello\"),\n\t\t\t\tHeaderText: pulumi.String(\"hello\"),\n\t\t\t\tLogoPath: pulumi.String(\"https://example.com/logo.jpg\"),\n\t\t\t\tBackgroundColor: pulumi.String(\"#000000\"),\n\t\t\t},\n\t\t\tBodyScanning: \u0026cloudflare.TeamsAccountBodyScanningArgs{\n\t\t\t\tInspectionMode: pulumi.String(\"deep\"),\n\t\t\t},\n\t\t\tAntivirus: \u0026cloudflare.TeamsAccountAntivirusArgs{\n\t\t\t\tEnabledDownloadPhase: pulumi.Bool(true),\n\t\t\t\tEnabledUploadPhase: pulumi.Bool(false),\n\t\t\t\tFailClosed: pulumi.Bool(true),\n\t\t\t\tNotificationSettings: \u0026cloudflare.TeamsAccountAntivirusNotificationSettingsArgs{\n\t\t\t\t\tEnabled: pulumi.Bool(true),\n\t\t\t\t\tMessage: pulumi.String(\"you are blocked\"),\n\t\t\t\t\tSupportUrl: pulumi.String(\"https://example.com/blocked\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tFips: \u0026cloudflare.TeamsAccountFipsArgs{\n\t\t\t\tTls: pulumi.Bool(true),\n\t\t\t},\n\t\t\tProxy: \u0026cloudflare.TeamsAccountProxyArgs{\n\t\t\t\tTcp: pulumi.Bool(true),\n\t\t\t\tUdp: pulumi.Bool(true),\n\t\t\t\tRootCa: pulumi.Bool(true),\n\t\t\t\tVirtualIp: pulumi.Bool(false),\n\t\t\t\tDisableForTime: pulumi.Int(3600),\n\t\t\t},\n\t\t\tUrlBrowserIsolationEnabled: pulumi.Bool(true),\n\t\t\tLogging: \u0026cloudflare.TeamsAccountLoggingArgs{\n\t\t\t\tRedactPii: pulumi.Bool(true),\n\t\t\t\tSettingsByRuleType: \u0026cloudflare.TeamsAccountLoggingSettingsByRuleTypeArgs{\n\t\t\t\t\tDns: \u0026cloudflare.TeamsAccountLoggingSettingsByRuleTypeDnsArgs{\n\t\t\t\t\t\tLogAll: pulumi.Bool(false),\n\t\t\t\t\t\tLogBlocks: pulumi.Bool(true),\n\t\t\t\t\t},\n\t\t\t\t\tHttp: \u0026cloudflare.TeamsAccountLoggingSettingsByRuleTypeHttpArgs{\n\t\t\t\t\t\tLogAll: pulumi.Bool(true),\n\t\t\t\t\t\tLogBlocks: pulumi.Bool(true),\n\t\t\t\t\t},\n\t\t\t\t\tL4: \u0026cloudflare.TeamsAccountLoggingSettingsByRuleTypeL4Args{\n\t\t\t\t\t\tLogAll: pulumi.Bool(false),\n\t\t\t\t\t\tLogBlocks: pulumi.Bool(true),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\tExtendedEmailMatching: \u0026cloudflare.TeamsAccountExtendedEmailMatchingArgs{\n\t\t\t\tEnabled: pulumi.Bool(true),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.cloudflare.TeamsAccount;\nimport com.pulumi.cloudflare.TeamsAccountArgs;\nimport com.pulumi.cloudflare.inputs.TeamsAccountBlockPageArgs;\nimport com.pulumi.cloudflare.inputs.TeamsAccountBodyScanningArgs;\nimport com.pulumi.cloudflare.inputs.TeamsAccountAntivirusArgs;\nimport com.pulumi.cloudflare.inputs.TeamsAccountAntivirusNotificationSettingsArgs;\nimport com.pulumi.cloudflare.inputs.TeamsAccountFipsArgs;\nimport com.pulumi.cloudflare.inputs.TeamsAccountProxyArgs;\nimport com.pulumi.cloudflare.inputs.TeamsAccountLoggingArgs;\nimport com.pulumi.cloudflare.inputs.TeamsAccountLoggingSettingsByRuleTypeArgs;\nimport com.pulumi.cloudflare.inputs.TeamsAccountLoggingSettingsByRuleTypeDnsArgs;\nimport com.pulumi.cloudflare.inputs.TeamsAccountLoggingSettingsByRuleTypeHttpArgs;\nimport com.pulumi.cloudflare.inputs.TeamsAccountLoggingSettingsByRuleTypeL4Args;\nimport com.pulumi.cloudflare.inputs.TeamsAccountExtendedEmailMatchingArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new TeamsAccount(\"example\", TeamsAccountArgs.builder()\n .accountId(\"f037e56e89293a057740de681ac9abbe\")\n .tlsDecryptEnabled(true)\n .protocolDetectionEnabled(true)\n .blockPage(TeamsAccountBlockPageArgs.builder()\n .footerText(\"hello\")\n .headerText(\"hello\")\n .logoPath(\"https://example.com/logo.jpg\")\n .backgroundColor(\"#000000\")\n .build())\n .bodyScanning(TeamsAccountBodyScanningArgs.builder()\n .inspectionMode(\"deep\")\n .build())\n .antivirus(TeamsAccountAntivirusArgs.builder()\n .enabledDownloadPhase(true)\n .enabledUploadPhase(false)\n .failClosed(true)\n .notificationSettings(TeamsAccountAntivirusNotificationSettingsArgs.builder()\n .enabled(true)\n .message(\"you are blocked\")\n .supportUrl(\"https://example.com/blocked\")\n .build())\n .build())\n .fips(TeamsAccountFipsArgs.builder()\n .tls(true)\n .build())\n .proxy(TeamsAccountProxyArgs.builder()\n .tcp(true)\n .udp(true)\n .rootCa(true)\n .virtualIp(false)\n .disableForTime(3600)\n .build())\n .urlBrowserIsolationEnabled(true)\n .logging(TeamsAccountLoggingArgs.builder()\n .redactPii(true)\n .settingsByRuleType(TeamsAccountLoggingSettingsByRuleTypeArgs.builder()\n .dns(TeamsAccountLoggingSettingsByRuleTypeDnsArgs.builder()\n .logAll(false)\n .logBlocks(true)\n .build())\n .http(TeamsAccountLoggingSettingsByRuleTypeHttpArgs.builder()\n .logAll(true)\n .logBlocks(true)\n .build())\n .l4(TeamsAccountLoggingSettingsByRuleTypeL4Args.builder()\n .logAll(false)\n .logBlocks(true)\n .build())\n .build())\n .build())\n .extendedEmailMatching(TeamsAccountExtendedEmailMatchingArgs.builder()\n .enabled(true)\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: cloudflare:TeamsAccount\n properties:\n accountId: f037e56e89293a057740de681ac9abbe\n tlsDecryptEnabled: true\n protocolDetectionEnabled: true\n blockPage:\n footerText: hello\n headerText: hello\n logoPath: https://example.com/logo.jpg\n backgroundColor: '#000000'\n bodyScanning:\n inspectionMode: deep\n antivirus:\n enabledDownloadPhase: true\n enabledUploadPhase: false\n failClosed: true\n notificationSettings:\n enabled: true\n message: you are blocked\n supportUrl: https://example.com/blocked\n fips:\n tls: true\n proxy:\n tcp: true\n udp: true\n rootCa: true\n virtualIp: false\n disableForTime: 3600\n urlBrowserIsolationEnabled: true\n logging:\n redactPii: true\n settingsByRuleType:\n dns:\n logAll: false\n logBlocks: true\n http:\n logAll: true\n logBlocks: true\n l4:\n logAll: false\n logBlocks: true\n extendedEmailMatching:\n enabled: true\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\n```sh\n$ pulumi import cloudflare:index/teamsAccount:TeamsAccount example \u003caccount_id\u003e\n```\n\n",
"properties": {
"accountId": {
"type": "string",
@@ -23866,9 +24362,14 @@
"$ref": "#/types/cloudflare:index/TeamsAccountBodyScanning:TeamsAccountBodyScanning",
"description": "Configuration for body scanning.\n"
},
+ "certificate": {
+ "$ref": "#/types/cloudflare:index/TeamsAccountCertificate:TeamsAccountCertificate",
+ "description": "Configuration for TLS interception certificate. This will be required starting Feb 2025.\n"
+ },
"customCertificate": {
"$ref": "#/types/cloudflare:index/TeamsAccountCustomCertificate:TeamsAccountCustomCertificate",
- "description": "Configuration for custom certificates / BYO-PKI.\n"
+ "description": "Configuration for custom certificates / BYO-PKI. Conflicts with `certificate`.\n",
+ "deprecationMessage": "Use `certificate` instead. Continuing to use custom_certificate may result in inconsistent configuration."
},
"extendedEmailMatching": {
"$ref": "#/types/cloudflare:index/TeamsAccountExtendedEmailMatching:TeamsAccountExtendedEmailMatching",
@@ -23935,9 +24436,14 @@
"$ref": "#/types/cloudflare:index/TeamsAccountBodyScanning:TeamsAccountBodyScanning",
"description": "Configuration for body scanning.\n"
},
+ "certificate": {
+ "$ref": "#/types/cloudflare:index/TeamsAccountCertificate:TeamsAccountCertificate",
+ "description": "Configuration for TLS interception certificate. This will be required starting Feb 2025.\n"
+ },
"customCertificate": {
"$ref": "#/types/cloudflare:index/TeamsAccountCustomCertificate:TeamsAccountCustomCertificate",
- "description": "Configuration for custom certificates / BYO-PKI.\n"
+ "description": "Configuration for custom certificates / BYO-PKI. Conflicts with `certificate`.\n",
+ "deprecationMessage": "Use `certificate` instead. Continuing to use custom_certificate may result in inconsistent configuration."
},
"extendedEmailMatching": {
"$ref": "#/types/cloudflare:index/TeamsAccountExtendedEmailMatching:TeamsAccountExtendedEmailMatching",
@@ -24005,9 +24511,14 @@
"$ref": "#/types/cloudflare:index/TeamsAccountBodyScanning:TeamsAccountBodyScanning",
"description": "Configuration for body scanning.\n"
},
+ "certificate": {
+ "$ref": "#/types/cloudflare:index/TeamsAccountCertificate:TeamsAccountCertificate",
+ "description": "Configuration for TLS interception certificate. This will be required starting Feb 2025.\n"
+ },
"customCertificate": {
"$ref": "#/types/cloudflare:index/TeamsAccountCustomCertificate:TeamsAccountCustomCertificate",
- "description": "Configuration for custom certificates / BYO-PKI.\n"
+ "description": "Configuration for custom certificates / BYO-PKI. Conflicts with `certificate`.\n",
+ "deprecationMessage": "Use `certificate` instead. Continuing to use custom_certificate may result in inconsistent configuration."
},
"extendedEmailMatching": {
"$ref": "#/types/cloudflare:index/TeamsAccountExtendedEmailMatching:TeamsAccountExtendedEmailMatching",
@@ -25264,7 +25775,7 @@
}
},
"cloudflare:index/waitingRoom:WaitingRoom": {
- "description": "Provides a Cloudflare Waiting Room resource.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as cloudflare from \"@pulumi/cloudflare\";\n\n// Waiting Room\nconst example = new cloudflare.WaitingRoom(\"example\", {\n zoneId: \"0da42c8d2132a9ddaf714f9e7c920711\",\n name: \"foo\",\n host: \"foo.example.com\",\n path: \"/\",\n newUsersPerMinute: 200,\n totalActiveUsers: 200,\n cookieSuffix: \"queue1\",\n additionalRoutes: [\n {\n host: \"shop1.example.com\",\n path: \"/example-path\",\n },\n {\n host: \"shop2.example.com\",\n },\n ],\n queueingStatusCode: 200,\n});\n```\n```python\nimport pulumi\nimport pulumi_cloudflare as cloudflare\n\n# Waiting Room\nexample = cloudflare.WaitingRoom(\"example\",\n zone_id=\"0da42c8d2132a9ddaf714f9e7c920711\",\n name=\"foo\",\n host=\"foo.example.com\",\n path=\"/\",\n new_users_per_minute=200,\n total_active_users=200,\n cookie_suffix=\"queue1\",\n additional_routes=[\n {\n \"host\": \"shop1.example.com\",\n \"path\": \"/example-path\",\n },\n {\n \"host\": \"shop2.example.com\",\n },\n ],\n queueing_status_code=200)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Cloudflare = Pulumi.Cloudflare;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n // Waiting Room\n var example = new Cloudflare.WaitingRoom(\"example\", new()\n {\n ZoneId = \"0da42c8d2132a9ddaf714f9e7c920711\",\n Name = \"foo\",\n Host = \"foo.example.com\",\n Path = \"/\",\n NewUsersPerMinute = 200,\n TotalActiveUsers = 200,\n CookieSuffix = \"queue1\",\n AdditionalRoutes = new[]\n {\n new Cloudflare.Inputs.WaitingRoomAdditionalRouteArgs\n {\n Host = \"shop1.example.com\",\n Path = \"/example-path\",\n },\n new Cloudflare.Inputs.WaitingRoomAdditionalRouteArgs\n {\n Host = \"shop2.example.com\",\n },\n },\n QueueingStatusCode = 200,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-cloudflare/sdk/v5/go/cloudflare\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t// Waiting Room\n\t\t_, err := cloudflare.NewWaitingRoom(ctx, \"example\", \u0026cloudflare.WaitingRoomArgs{\n\t\t\tZoneId: pulumi.String(\"0da42c8d2132a9ddaf714f9e7c920711\"),\n\t\t\tName: pulumi.String(\"foo\"),\n\t\t\tHost: pulumi.String(\"foo.example.com\"),\n\t\t\tPath: pulumi.String(\"/\"),\n\t\t\tNewUsersPerMinute: pulumi.Int(200),\n\t\t\tTotalActiveUsers: pulumi.Int(200),\n\t\t\tCookieSuffix: pulumi.String(\"queue1\"),\n\t\t\tAdditionalRoutes: cloudflare.WaitingRoomAdditionalRouteArray{\n\t\t\t\t\u0026cloudflare.WaitingRoomAdditionalRouteArgs{\n\t\t\t\t\tHost: pulumi.String(\"shop1.example.com\"),\n\t\t\t\t\tPath: pulumi.String(\"/example-path\"),\n\t\t\t\t},\n\t\t\t\t\u0026cloudflare.WaitingRoomAdditionalRouteArgs{\n\t\t\t\t\tHost: pulumi.String(\"shop2.example.com\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tQueueingStatusCode: pulumi.Int(200),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.cloudflare.WaitingRoom;\nimport com.pulumi.cloudflare.WaitingRoomArgs;\nimport com.pulumi.cloudflare.inputs.WaitingRoomAdditionalRouteArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n // Waiting Room\n var example = new WaitingRoom(\"example\", WaitingRoomArgs.builder()\n .zoneId(\"0da42c8d2132a9ddaf714f9e7c920711\")\n .name(\"foo\")\n .host(\"foo.example.com\")\n .path(\"/\")\n .newUsersPerMinute(200)\n .totalActiveUsers(200)\n .cookieSuffix(\"queue1\")\n .additionalRoutes( \n WaitingRoomAdditionalRouteArgs.builder()\n .host(\"shop1.example.com\")\n .path(\"/example-path\")\n .build(),\n WaitingRoomAdditionalRouteArgs.builder()\n .host(\"shop2.example.com\")\n .build())\n .queueingStatusCode(200)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n # Waiting Room\n example:\n type: cloudflare:WaitingRoom\n properties:\n zoneId: 0da42c8d2132a9ddaf714f9e7c920711\n name: foo\n host: foo.example.com\n path: /\n newUsersPerMinute: 200\n totalActiveUsers: 200\n cookieSuffix: queue1\n additionalRoutes:\n - host: shop1.example.com\n path: /example-path\n - host: shop2.example.com\n queueingStatusCode: 200\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nUse the Zone ID and Waiting Room ID to import.\n\n```sh\n$ pulumi import cloudflare:index/waitingRoom:WaitingRoom default \u003czone_id\u003e/\u003cwaiting_room_id\u003e\n```\n\n",
+ "description": "Provides a Cloudflare Waiting Room resource.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as cloudflare from \"@pulumi/cloudflare\";\n\n// Waiting Room\nconst example = new cloudflare.WaitingRoom(\"example\", {\n zoneId: \"0da42c8d2132a9ddaf714f9e7c920711\",\n name: \"foo\",\n host: \"foo.example.com\",\n path: \"/\",\n newUsersPerMinute: 200,\n totalActiveUsers: 200,\n cookieSuffix: \"queue1\",\n additionalRoutes: [\n {\n host: \"shop1.example.com\",\n path: \"/example-path\",\n },\n {\n host: \"shop2.example.com\",\n },\n ],\n queueingStatusCode: 200,\n enabledOriginCommands: [\"revoke\"],\n});\n```\n```python\nimport pulumi\nimport pulumi_cloudflare as cloudflare\n\n# Waiting Room\nexample = cloudflare.WaitingRoom(\"example\",\n zone_id=\"0da42c8d2132a9ddaf714f9e7c920711\",\n name=\"foo\",\n host=\"foo.example.com\",\n path=\"/\",\n new_users_per_minute=200,\n total_active_users=200,\n cookie_suffix=\"queue1\",\n additional_routes=[\n {\n \"host\": \"shop1.example.com\",\n \"path\": \"/example-path\",\n },\n {\n \"host\": \"shop2.example.com\",\n },\n ],\n queueing_status_code=200,\n enabled_origin_commands=[\"revoke\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Cloudflare = Pulumi.Cloudflare;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n // Waiting Room\n var example = new Cloudflare.WaitingRoom(\"example\", new()\n {\n ZoneId = \"0da42c8d2132a9ddaf714f9e7c920711\",\n Name = \"foo\",\n Host = \"foo.example.com\",\n Path = \"/\",\n NewUsersPerMinute = 200,\n TotalActiveUsers = 200,\n CookieSuffix = \"queue1\",\n AdditionalRoutes = new[]\n {\n new Cloudflare.Inputs.WaitingRoomAdditionalRouteArgs\n {\n Host = \"shop1.example.com\",\n Path = \"/example-path\",\n },\n new Cloudflare.Inputs.WaitingRoomAdditionalRouteArgs\n {\n Host = \"shop2.example.com\",\n },\n },\n QueueingStatusCode = 200,\n EnabledOriginCommands = new[]\n {\n \"revoke\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-cloudflare/sdk/v5/go/cloudflare\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t// Waiting Room\n\t\t_, err := cloudflare.NewWaitingRoom(ctx, \"example\", \u0026cloudflare.WaitingRoomArgs{\n\t\t\tZoneId: pulumi.String(\"0da42c8d2132a9ddaf714f9e7c920711\"),\n\t\t\tName: pulumi.String(\"foo\"),\n\t\t\tHost: pulumi.String(\"foo.example.com\"),\n\t\t\tPath: pulumi.String(\"/\"),\n\t\t\tNewUsersPerMinute: pulumi.Int(200),\n\t\t\tTotalActiveUsers: pulumi.Int(200),\n\t\t\tCookieSuffix: pulumi.String(\"queue1\"),\n\t\t\tAdditionalRoutes: cloudflare.WaitingRoomAdditionalRouteArray{\n\t\t\t\t\u0026cloudflare.WaitingRoomAdditionalRouteArgs{\n\t\t\t\t\tHost: pulumi.String(\"shop1.example.com\"),\n\t\t\t\t\tPath: pulumi.String(\"/example-path\"),\n\t\t\t\t},\n\t\t\t\t\u0026cloudflare.WaitingRoomAdditionalRouteArgs{\n\t\t\t\t\tHost: pulumi.String(\"shop2.example.com\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tQueueingStatusCode: pulumi.Int(200),\n\t\t\tEnabledOriginCommands: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"revoke\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.cloudflare.WaitingRoom;\nimport com.pulumi.cloudflare.WaitingRoomArgs;\nimport com.pulumi.cloudflare.inputs.WaitingRoomAdditionalRouteArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n // Waiting Room\n var example = new WaitingRoom(\"example\", WaitingRoomArgs.builder()\n .zoneId(\"0da42c8d2132a9ddaf714f9e7c920711\")\n .name(\"foo\")\n .host(\"foo.example.com\")\n .path(\"/\")\n .newUsersPerMinute(200)\n .totalActiveUsers(200)\n .cookieSuffix(\"queue1\")\n .additionalRoutes( \n WaitingRoomAdditionalRouteArgs.builder()\n .host(\"shop1.example.com\")\n .path(\"/example-path\")\n .build(),\n WaitingRoomAdditionalRouteArgs.builder()\n .host(\"shop2.example.com\")\n .build())\n .queueingStatusCode(200)\n .enabledOriginCommands(\"revoke\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n # Waiting Room\n example:\n type: cloudflare:WaitingRoom\n properties:\n zoneId: 0da42c8d2132a9ddaf714f9e7c920711\n name: foo\n host: foo.example.com\n path: /\n newUsersPerMinute: 200\n totalActiveUsers: 200\n cookieSuffix: queue1\n additionalRoutes:\n - host: shop1.example.com\n path: /example-path\n - host: shop2.example.com\n queueingStatusCode: 200\n enabledOriginCommands:\n - revoke\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nUse the Zone ID and Waiting Room ID to import.\n\n```sh\n$ pulumi import cloudflare:index/waitingRoom:WaitingRoom default \u003czone_id\u003e/\u003cwaiting_room_id\u003e\n```\n\n",
"properties": {
"additionalRoutes": {
"type": "array",
@@ -25298,7 +25809,7 @@
"items": {
"type": "string"
},
- "description": "The list of enabled origin commands for the waiting room. Available values: `revoke`\n"
+ "description": "The list of enabled origin commands for the waiting room. Available values: `revoke`.\n"
},
"host": {
"type": "string",
@@ -25389,7 +25900,7 @@
"items": {
"type": "string"
},
- "description": "The list of enabled origin commands for the waiting room. Available values: `revoke`\n"
+ "description": "The list of enabled origin commands for the waiting room. Available values: `revoke`.\n"
},
"host": {
"type": "string",
@@ -25484,7 +25995,7 @@
"items": {
"type": "string"
},
- "description": "The list of enabled origin commands for the waiting room. Available values: `revoke`\n"
+ "description": "The list of enabled origin commands for the waiting room. Available values: `revoke`.\n"
},
"host": {
"type": "string",
@@ -26485,6 +26996,12 @@
"type": "string",
"description": "Name of the Workers for Platforms dispatch namespace.\n"
},
+ "hyperdriveConfigBindings": {
+ "type": "array",
+ "items": {
+ "$ref": "#/types/cloudflare:index/WorkerScriptHyperdriveConfigBinding:WorkerScriptHyperdriveConfigBinding"
+ }
+ },
"kvNamespaceBindings": {
"type": "array",
"items": {
@@ -26595,6 +27112,12 @@
"type": "string",
"description": "Name of the Workers for Platforms dispatch namespace.\n"
},
+ "hyperdriveConfigBindings": {
+ "type": "array",
+ "items": {
+ "$ref": "#/types/cloudflare:index/WorkerScriptHyperdriveConfigBinding:WorkerScriptHyperdriveConfigBinding"
+ }
+ },
"kvNamespaceBindings": {
"type": "array",
"items": {
@@ -26706,6 +27229,12 @@
"type": "string",
"description": "Name of the Workers for Platforms dispatch namespace.\n"
},
+ "hyperdriveConfigBindings": {
+ "type": "array",
+ "items": {
+ "$ref": "#/types/cloudflare:index/WorkerScriptHyperdriveConfigBinding:WorkerScriptHyperdriveConfigBinding"
+ }
+ },
"kvNamespaceBindings": {
"type": "array",
"items": {
@@ -27325,6 +27854,12 @@
"type": "string",
"description": "Name of the Workers for Platforms dispatch namespace.\n"
},
+ "hyperdriveConfigBindings": {
+ "type": "array",
+ "items": {
+ "$ref": "#/types/cloudflare:index/WorkersScriptHyperdriveConfigBinding:WorkersScriptHyperdriveConfigBinding"
+ }
+ },
"kvNamespaceBindings": {
"type": "array",
"items": {
@@ -27435,6 +27970,12 @@
"type": "string",
"description": "Name of the Workers for Platforms dispatch namespace.\n"
},
+ "hyperdriveConfigBindings": {
+ "type": "array",
+ "items": {
+ "$ref": "#/types/cloudflare:index/WorkersScriptHyperdriveConfigBinding:WorkersScriptHyperdriveConfigBinding"
+ }
+ },
"kvNamespaceBindings": {
"type": "array",
"items": {
@@ -27546,6 +28087,12 @@
"type": "string",
"description": "Name of the Workers for Platforms dispatch namespace.\n"
},
+ "hyperdriveConfigBindings": {
+ "type": "array",
+ "items": {
+ "$ref": "#/types/cloudflare:index/WorkersScriptHyperdriveConfigBinding:WorkersScriptHyperdriveConfigBinding"
+ }
+ },
"kvNamespaceBindings": {
"type": "array",
"items": {
@@ -28862,7 +29409,7 @@
"properties": {
"accountId": {
"type": "string",
- "description": "The account identifier to target for the resource. Conflicts with `zone_id`. **Modifying this attribute will force creation of a new resource.**\n"
+ "description": "The account identifier to target for the resource. Conflicts with `zone_id`.\n"
},
"applicationId": {
"type": "string",
@@ -28928,7 +29475,7 @@
},
"zoneId": {
"type": "string",
- "description": "The zone identifier to target for the resource. Conflicts with `account_id`. **Modifying this attribute will force creation of a new resource.**\n"
+ "description": "The zone identifier to target for the resource. Conflicts with `account_id`.\n"
}
},
"required": [
@@ -28939,7 +29486,7 @@
"inputProperties": {
"accountId": {
"type": "string",
- "description": "The account identifier to target for the resource. Conflicts with `zone_id`. **Modifying this attribute will force creation of a new resource.**\n"
+ "description": "The account identifier to target for the resource. Conflicts with `zone_id`.\n"
},
"applicationId": {
"type": "string",
@@ -29006,7 +29553,7 @@
},
"zoneId": {
"type": "string",
- "description": "The zone identifier to target for the resource. Conflicts with `account_id`. **Modifying this attribute will force creation of a new resource.**\n"
+ "description": "The zone identifier to target for the resource. Conflicts with `account_id`.\n"
}
},
"requiredInputs": [
@@ -29019,7 +29566,7 @@
"properties": {
"accountId": {
"type": "string",
- "description": "The account identifier to target for the resource. Conflicts with `zone_id`. **Modifying this attribute will force creation of a new resource.**\n"
+ "description": "The account identifier to target for the resource. Conflicts with `zone_id`.\n"
},
"applicationId": {
"type": "string",
@@ -29086,7 +29633,7 @@
},
"zoneId": {
"type": "string",
- "description": "The zone identifier to target for the resource. Conflicts with `account_id`. **Modifying this attribute will force creation of a new resource.**\n"
+ "description": "The zone identifier to target for the resource. Conflicts with `account_id`.\n"
}
},
"type": "object"
@@ -29604,7 +30151,7 @@
},
"type": {
"type": "string",
- "description": "The device posture rule type. Available values: `serial_number`, `file`, `application`, `gateway`, `warp`, `domain_joined`, `os_version`, `disk_encryption`, `firewall`, `client_certificate`, `workspace_one`, `unique_client_id`, `crowdstrike_s2s`, `sentinelone`, `kolide`, `tanium_s2s`, `intune`, `sentinelone_s2s`.\n"
+ "description": "The device posture rule type. Available values: `serial_number`, `file`, `application`, `gateway`, `warp`, `domain_joined`, `os_version`, `disk_encryption`, `firewall`, `client_certificate`, `client_certificate_v2`, `workspace_one`, `unique_client_id`, `crowdstrike_s2s`, `sentinelone`, `kolide`, `tanium_s2s`, `intune`, `sentinelone_s2s`.\n"
}
},
"required": [
@@ -29648,7 +30195,7 @@
},
"type": {
"type": "string",
- "description": "The device posture rule type. Available values: `serial_number`, `file`, `application`, `gateway`, `warp`, `domain_joined`, `os_version`, `disk_encryption`, `firewall`, `client_certificate`, `workspace_one`, `unique_client_id`, `crowdstrike_s2s`, `sentinelone`, `kolide`, `tanium_s2s`, `intune`, `sentinelone_s2s`.\n"
+ "description": "The device posture rule type. Available values: `serial_number`, `file`, `application`, `gateway`, `warp`, `domain_joined`, `os_version`, `disk_encryption`, `firewall`, `client_certificate`, `client_certificate_v2`, `workspace_one`, `unique_client_id`, `crowdstrike_s2s`, `sentinelone`, `kolide`, `tanium_s2s`, `intune`, `sentinelone_s2s`.\n"
}
},
"requiredInputs": [
@@ -29693,7 +30240,7 @@
},
"type": {
"type": "string",
- "description": "The device posture rule type. Available values: `serial_number`, `file`, `application`, `gateway`, `warp`, `domain_joined`, `os_version`, `disk_encryption`, `firewall`, `client_certificate`, `workspace_one`, `unique_client_id`, `crowdstrike_s2s`, `sentinelone`, `kolide`, `tanium_s2s`, `intune`, `sentinelone_s2s`.\n"
+ "description": "The device posture rule type. Available values: `serial_number`, `file`, `application`, `gateway`, `warp`, `domain_joined`, `os_version`, `disk_encryption`, `firewall`, `client_certificate`, `client_certificate_v2`, `workspace_one`, `unique_client_id`, `crowdstrike_s2s`, `sentinelone`, `kolide`, `tanium_s2s`, `intune`, `sentinelone_s2s`.\n"
}
},
"type": "object"
@@ -29776,7 +30323,7 @@
},
"tunnelProtocol": {
"type": "string",
- "description": "Determines which tunnel protocol to use. Available values: `\"\"`, `wireguard`, `masque`\n"
+ "description": "Determines which tunnel protocol to use. Available values: `\"\"`, `wireguard`, `masque`. Defaults to `wireguard`.\n"
}
},
"required": [
@@ -29859,7 +30406,7 @@
},
"tunnelProtocol": {
"type": "string",
- "description": "Determines which tunnel protocol to use. Available values: `\"\"`, `wireguard`, `masque`\n"
+ "description": "Determines which tunnel protocol to use. Available values: `\"\"`, `wireguard`, `masque`. Defaults to `wireguard`.\n"
}
},
"requiredInputs": [
@@ -29944,7 +30491,7 @@
},
"tunnelProtocol": {
"type": "string",
- "description": "Determines which tunnel protocol to use. Available values: `\"\"`, `wireguard`, `masque`\n"
+ "description": "Determines which tunnel protocol to use. Available values: `\"\"`, `wireguard`, `masque`. Defaults to `wireguard`.\n"
}
},
"type": "object"
@@ -30349,6 +30896,133 @@
"type": "object"
}
},
+ "cloudflare:index/zeroTrustGatewayCertificate:ZeroTrustGatewayCertificate": {
+ "description": "Provides a Cloudflare Teams Gateway Certificate resource. A Teams Certificate can\nbe specified for Gateway TLS interception and block pages.\n",
+ "properties": {
+ "accountId": {
+ "type": "string",
+ "description": "The account identifier to target for the resource.\n"
+ },
+ "activate": {
+ "type": "boolean",
+ "description": "Whether or not to activate a certificate. A certificate must be activated to use in Gateway certificate settings. Defaults to `false`.\n"
+ },
+ "bindingStatus": {
+ "type": "string",
+ "description": "The deployment status of the certificate on the edge Available values: `IP`, `SERIAL`, `URL`, `DOMAIN`, `EMAIL`.\n"
+ },
+ "createdAt": {
+ "type": "string"
+ },
+ "custom": {
+ "type": "boolean",
+ "description": "The type of certificate (custom or Gateway-managed). Must provide only one of `custom`, `gateway_managed`.\n"
+ },
+ "expiresOn": {
+ "type": "string"
+ },
+ "gatewayManaged": {
+ "type": "boolean",
+ "description": "The type of certificate (custom or Gateway-managed). Must provide only one of `custom`, `gateway_managed`.\n"
+ },
+ "inUse": {
+ "type": "boolean",
+ "description": "Whether the certificate is in use by Gateway for TLS interception and the block page.\n"
+ },
+ "qsPackId": {
+ "type": "string"
+ },
+ "uploadedOn": {
+ "type": "string"
+ },
+ "validityPeriodDays": {
+ "type": "integer",
+ "description": "Number of days the generated certificate will be valid, minimum 1 day and maximum 30 years. Defaults to 5 years. Defaults to `1826`. Required when using `gateway_managed`. Conflicts with `custom`. **Modifying this attribute will force creation of a new resource.**\n"
+ }
+ },
+ "required": [
+ "accountId",
+ "bindingStatus",
+ "createdAt",
+ "expiresOn",
+ "inUse",
+ "qsPackId",
+ "uploadedOn"
+ ],
+ "inputProperties": {
+ "accountId": {
+ "type": "string",
+ "description": "The account identifier to target for the resource.\n"
+ },
+ "activate": {
+ "type": "boolean",
+ "description": "Whether or not to activate a certificate. A certificate must be activated to use in Gateway certificate settings. Defaults to `false`.\n"
+ },
+ "custom": {
+ "type": "boolean",
+ "description": "The type of certificate (custom or Gateway-managed). Must provide only one of `custom`, `gateway_managed`.\n"
+ },
+ "gatewayManaged": {
+ "type": "boolean",
+ "description": "The type of certificate (custom or Gateway-managed). Must provide only one of `custom`, `gateway_managed`.\n"
+ },
+ "validityPeriodDays": {
+ "type": "integer",
+ "description": "Number of days the generated certificate will be valid, minimum 1 day and maximum 30 years. Defaults to 5 years. Defaults to `1826`. Required when using `gateway_managed`. Conflicts with `custom`. **Modifying this attribute will force creation of a new resource.**\n",
+ "willReplaceOnChanges": true
+ }
+ },
+ "requiredInputs": [
+ "accountId"
+ ],
+ "stateInputs": {
+ "description": "Input properties used for looking up and filtering ZeroTrustGatewayCertificate resources.\n",
+ "properties": {
+ "accountId": {
+ "type": "string",
+ "description": "The account identifier to target for the resource.\n"
+ },
+ "activate": {
+ "type": "boolean",
+ "description": "Whether or not to activate a certificate. A certificate must be activated to use in Gateway certificate settings. Defaults to `false`.\n"
+ },
+ "bindingStatus": {
+ "type": "string",
+ "description": "The deployment status of the certificate on the edge Available values: `IP`, `SERIAL`, `URL`, `DOMAIN`, `EMAIL`.\n"
+ },
+ "createdAt": {
+ "type": "string"
+ },
+ "custom": {
+ "type": "boolean",
+ "description": "The type of certificate (custom or Gateway-managed). Must provide only one of `custom`, `gateway_managed`.\n"
+ },
+ "expiresOn": {
+ "type": "string"
+ },
+ "gatewayManaged": {
+ "type": "boolean",
+ "description": "The type of certificate (custom or Gateway-managed). Must provide only one of `custom`, `gateway_managed`.\n"
+ },
+ "inUse": {
+ "type": "boolean",
+ "description": "Whether the certificate is in use by Gateway for TLS interception and the block page.\n"
+ },
+ "qsPackId": {
+ "type": "string"
+ },
+ "uploadedOn": {
+ "type": "string"
+ },
+ "validityPeriodDays": {
+ "type": "integer",
+ "description": "Number of days the generated certificate will be valid, minimum 1 day and maximum 30 years. Defaults to 5 years. Defaults to `1826`. Required when using `gateway_managed`. Conflicts with `custom`. **Modifying this attribute will force creation of a new resource.**\n",
+ "willReplaceOnChanges": true
+ }
+ },
+ "type": "object"
+ }
+ },
"cloudflare:index/zeroTrustGatewayPolicy:ZeroTrustGatewayPolicy": {
"description": "Provides a Cloudflare Teams rule resource. Teams rules comprise secure web gateway policies.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as cloudflare from \"@pulumi/cloudflare\";\n\nconst example = new cloudflare.ZeroTrustGatewayPolicy(\"example\", {\n accountId: \"f037e56e89293a057740de681ac9abbe\",\n name: \"office\",\n description: \"desc\",\n precedence: 1,\n action: \"block\",\n filters: [\"http\"],\n traffic: \"http.request.uri == \\\"https://www.example.com/malicious\\\"\",\n ruleSettings: {\n blockPageEnabled: true,\n blockPageReason: \"access not permitted\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_cloudflare as cloudflare\n\nexample = cloudflare.ZeroTrustGatewayPolicy(\"example\",\n account_id=\"f037e56e89293a057740de681ac9abbe\",\n name=\"office\",\n description=\"desc\",\n precedence=1,\n action=\"block\",\n filters=[\"http\"],\n traffic=\"http.request.uri == \\\"https://www.example.com/malicious\\\"\",\n rule_settings={\n \"block_page_enabled\": True,\n \"block_page_reason\": \"access not permitted\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Cloudflare = Pulumi.Cloudflare;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Cloudflare.ZeroTrustGatewayPolicy(\"example\", new()\n {\n AccountId = \"f037e56e89293a057740de681ac9abbe\",\n Name = \"office\",\n Description = \"desc\",\n Precedence = 1,\n Action = \"block\",\n Filters = new[]\n {\n \"http\",\n },\n Traffic = \"http.request.uri == \\\"https://www.example.com/malicious\\\"\",\n RuleSettings = new Cloudflare.Inputs.ZeroTrustGatewayPolicyRuleSettingsArgs\n {\n BlockPageEnabled = true,\n BlockPageReason = \"access not permitted\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-cloudflare/sdk/v5/go/cloudflare\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := cloudflare.NewZeroTrustGatewayPolicy(ctx, \"example\", \u0026cloudflare.ZeroTrustGatewayPolicyArgs{\n\t\t\tAccountId: pulumi.String(\"f037e56e89293a057740de681ac9abbe\"),\n\t\t\tName: pulumi.String(\"office\"),\n\t\t\tDescription: pulumi.String(\"desc\"),\n\t\t\tPrecedence: pulumi.Int(1),\n\t\t\tAction: pulumi.String(\"block\"),\n\t\t\tFilters: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"http\"),\n\t\t\t},\n\t\t\tTraffic: pulumi.String(\"http.request.uri == \\\"https://www.example.com/malicious\\\"\"),\n\t\t\tRuleSettings: \u0026cloudflare.ZeroTrustGatewayPolicyRuleSettingsArgs{\n\t\t\t\tBlockPageEnabled: pulumi.Bool(true),\n\t\t\t\tBlockPageReason: pulumi.String(\"access not permitted\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.cloudflare.ZeroTrustGatewayPolicy;\nimport com.pulumi.cloudflare.ZeroTrustGatewayPolicyArgs;\nimport com.pulumi.cloudflare.inputs.ZeroTrustGatewayPolicyRuleSettingsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ZeroTrustGatewayPolicy(\"example\", ZeroTrustGatewayPolicyArgs.builder()\n .accountId(\"f037e56e89293a057740de681ac9abbe\")\n .name(\"office\")\n .description(\"desc\")\n .precedence(1)\n .action(\"block\")\n .filters(\"http\")\n .traffic(\"http.request.uri == \\\"https://www.example.com/malicious\\\"\")\n .ruleSettings(ZeroTrustGatewayPolicyRuleSettingsArgs.builder()\n .blockPageEnabled(true)\n .blockPageReason(\"access not permitted\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: cloudflare:ZeroTrustGatewayPolicy\n properties:\n accountId: f037e56e89293a057740de681ac9abbe\n name: office\n description: desc\n precedence: 1\n action: block\n filters:\n - http\n traffic: http.request.uri == \"https://www.example.com/malicious\"\n ruleSettings:\n blockPageEnabled: true\n blockPageReason: access not permitted\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\n```sh\n$ pulumi import cloudflare:index/zeroTrustGatewayPolicy:ZeroTrustGatewayPolicy example \u003caccount_id\u003e/\u003cteams_rule_id\u003e\n```\n\n",
"properties": {
@@ -30602,7 +31276,7 @@
}
},
"cloudflare:index/zeroTrustGatewaySettings:ZeroTrustGatewaySettings": {
- "description": "Provides a Cloudflare Teams Account resource. The Teams Account\nresource defines configuration for secure web gateway.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as cloudflare from \"@pulumi/cloudflare\";\n\nconst example = new cloudflare.ZeroTrustGatewaySettings(\"example\", {\n accountId: \"f037e56e89293a057740de681ac9abbe\",\n tlsDecryptEnabled: true,\n protocolDetectionEnabled: true,\n blockPage: {\n footerText: \"hello\",\n headerText: \"hello\",\n logoPath: \"https://example.com/logo.jpg\",\n backgroundColor: \"#000000\",\n },\n bodyScanning: {\n inspectionMode: \"deep\",\n },\n antivirus: {\n enabledDownloadPhase: true,\n enabledUploadPhase: false,\n failClosed: true,\n notificationSettings: {\n enabled: true,\n message: \"you are blocked\",\n supportUrl: \"https://example.com/blocked\",\n },\n },\n fips: {\n tls: true,\n },\n proxy: {\n tcp: true,\n udp: true,\n rootCa: true,\n virtualIp: false,\n },\n urlBrowserIsolationEnabled: true,\n logging: {\n redactPii: true,\n settingsByRuleType: {\n dns: {\n logAll: false,\n logBlocks: true,\n },\n http: {\n logAll: true,\n logBlocks: true,\n },\n l4: {\n logAll: false,\n logBlocks: true,\n },\n },\n },\n extendedEmailMatching: {\n enabled: true,\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_cloudflare as cloudflare\n\nexample = cloudflare.ZeroTrustGatewaySettings(\"example\",\n account_id=\"f037e56e89293a057740de681ac9abbe\",\n tls_decrypt_enabled=True,\n protocol_detection_enabled=True,\n block_page={\n \"footer_text\": \"hello\",\n \"header_text\": \"hello\",\n \"logo_path\": \"https://example.com/logo.jpg\",\n \"background_color\": \"#000000\",\n },\n body_scanning={\n \"inspection_mode\": \"deep\",\n },\n antivirus={\n \"enabled_download_phase\": True,\n \"enabled_upload_phase\": False,\n \"fail_closed\": True,\n \"notification_settings\": {\n \"enabled\": True,\n \"message\": \"you are blocked\",\n \"support_url\": \"https://example.com/blocked\",\n },\n },\n fips={\n \"tls\": True,\n },\n proxy={\n \"tcp\": True,\n \"udp\": True,\n \"root_ca\": True,\n \"virtual_ip\": False,\n },\n url_browser_isolation_enabled=True,\n logging={\n \"redact_pii\": True,\n \"settings_by_rule_type\": {\n \"dns\": {\n \"log_all\": False,\n \"log_blocks\": True,\n },\n \"http\": {\n \"log_all\": True,\n \"log_blocks\": True,\n },\n \"l4\": {\n \"log_all\": False,\n \"log_blocks\": True,\n },\n },\n },\n extended_email_matching={\n \"enabled\": True,\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Cloudflare = Pulumi.Cloudflare;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Cloudflare.ZeroTrustGatewaySettings(\"example\", new()\n {\n AccountId = \"f037e56e89293a057740de681ac9abbe\",\n TlsDecryptEnabled = true,\n ProtocolDetectionEnabled = true,\n BlockPage = new Cloudflare.Inputs.ZeroTrustGatewaySettingsBlockPageArgs\n {\n FooterText = \"hello\",\n HeaderText = \"hello\",\n LogoPath = \"https://example.com/logo.jpg\",\n BackgroundColor = \"#000000\",\n },\n BodyScanning = new Cloudflare.Inputs.ZeroTrustGatewaySettingsBodyScanningArgs\n {\n InspectionMode = \"deep\",\n },\n Antivirus = new Cloudflare.Inputs.ZeroTrustGatewaySettingsAntivirusArgs\n {\n EnabledDownloadPhase = true,\n EnabledUploadPhase = false,\n FailClosed = true,\n NotificationSettings = new Cloudflare.Inputs.ZeroTrustGatewaySettingsAntivirusNotificationSettingsArgs\n {\n Enabled = true,\n Message = \"you are blocked\",\n SupportUrl = \"https://example.com/blocked\",\n },\n },\n Fips = new Cloudflare.Inputs.ZeroTrustGatewaySettingsFipsArgs\n {\n Tls = true,\n },\n Proxy = new Cloudflare.Inputs.ZeroTrustGatewaySettingsProxyArgs\n {\n Tcp = true,\n Udp = true,\n RootCa = true,\n VirtualIp = false,\n },\n UrlBrowserIsolationEnabled = true,\n Logging = new Cloudflare.Inputs.ZeroTrustGatewaySettingsLoggingArgs\n {\n RedactPii = true,\n SettingsByRuleType = new Cloudflare.Inputs.ZeroTrustGatewaySettingsLoggingSettingsByRuleTypeArgs\n {\n Dns = new Cloudflare.Inputs.ZeroTrustGatewaySettingsLoggingSettingsByRuleTypeDnsArgs\n {\n LogAll = false,\n LogBlocks = true,\n },\n Http = new Cloudflare.Inputs.ZeroTrustGatewaySettingsLoggingSettingsByRuleTypeHttpArgs\n {\n LogAll = true,\n LogBlocks = true,\n },\n L4 = new Cloudflare.Inputs.ZeroTrustGatewaySettingsLoggingSettingsByRuleTypeL4Args\n {\n LogAll = false,\n LogBlocks = true,\n },\n },\n },\n ExtendedEmailMatching = new Cloudflare.Inputs.ZeroTrustGatewaySettingsExtendedEmailMatchingArgs\n {\n Enabled = true,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-cloudflare/sdk/v5/go/cloudflare\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := cloudflare.NewZeroTrustGatewaySettings(ctx, \"example\", \u0026cloudflare.ZeroTrustGatewaySettingsArgs{\n\t\t\tAccountId: pulumi.String(\"f037e56e89293a057740de681ac9abbe\"),\n\t\t\tTlsDecryptEnabled: pulumi.Bool(true),\n\t\t\tProtocolDetectionEnabled: pulumi.Bool(true),\n\t\t\tBlockPage: \u0026cloudflare.ZeroTrustGatewaySettingsBlockPageArgs{\n\t\t\t\tFooterText: pulumi.String(\"hello\"),\n\t\t\t\tHeaderText: pulumi.String(\"hello\"),\n\t\t\t\tLogoPath: pulumi.String(\"https://example.com/logo.jpg\"),\n\t\t\t\tBackgroundColor: pulumi.String(\"#000000\"),\n\t\t\t},\n\t\t\tBodyScanning: \u0026cloudflare.ZeroTrustGatewaySettingsBodyScanningArgs{\n\t\t\t\tInspectionMode: pulumi.String(\"deep\"),\n\t\t\t},\n\t\t\tAntivirus: \u0026cloudflare.ZeroTrustGatewaySettingsAntivirusArgs{\n\t\t\t\tEnabledDownloadPhase: pulumi.Bool(true),\n\t\t\t\tEnabledUploadPhase: pulumi.Bool(false),\n\t\t\t\tFailClosed: pulumi.Bool(true),\n\t\t\t\tNotificationSettings: \u0026cloudflare.ZeroTrustGatewaySettingsAntivirusNotificationSettingsArgs{\n\t\t\t\t\tEnabled: pulumi.Bool(true),\n\t\t\t\t\tMessage: pulumi.String(\"you are blocked\"),\n\t\t\t\t\tSupportUrl: pulumi.String(\"https://example.com/blocked\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tFips: \u0026cloudflare.ZeroTrustGatewaySettingsFipsArgs{\n\t\t\t\tTls: pulumi.Bool(true),\n\t\t\t},\n\t\t\tProxy: \u0026cloudflare.ZeroTrustGatewaySettingsProxyArgs{\n\t\t\t\tTcp: pulumi.Bool(true),\n\t\t\t\tUdp: pulumi.Bool(true),\n\t\t\t\tRootCa: pulumi.Bool(true),\n\t\t\t\tVirtualIp: pulumi.Bool(false),\n\t\t\t},\n\t\t\tUrlBrowserIsolationEnabled: pulumi.Bool(true),\n\t\t\tLogging: \u0026cloudflare.ZeroTrustGatewaySettingsLoggingArgs{\n\t\t\t\tRedactPii: pulumi.Bool(true),\n\t\t\t\tSettingsByRuleType: \u0026cloudflare.ZeroTrustGatewaySettingsLoggingSettingsByRuleTypeArgs{\n\t\t\t\t\tDns: \u0026cloudflare.ZeroTrustGatewaySettingsLoggingSettingsByRuleTypeDnsArgs{\n\t\t\t\t\t\tLogAll: pulumi.Bool(false),\n\t\t\t\t\t\tLogBlocks: pulumi.Bool(true),\n\t\t\t\t\t},\n\t\t\t\t\tHttp: \u0026cloudflare.ZeroTrustGatewaySettingsLoggingSettingsByRuleTypeHttpArgs{\n\t\t\t\t\t\tLogAll: pulumi.Bool(true),\n\t\t\t\t\t\tLogBlocks: pulumi.Bool(true),\n\t\t\t\t\t},\n\t\t\t\t\tL4: \u0026cloudflare.ZeroTrustGatewaySettingsLoggingSettingsByRuleTypeL4Args{\n\t\t\t\t\t\tLogAll: pulumi.Bool(false),\n\t\t\t\t\t\tLogBlocks: pulumi.Bool(true),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\tExtendedEmailMatching: \u0026cloudflare.ZeroTrustGatewaySettingsExtendedEmailMatchingArgs{\n\t\t\t\tEnabled: pulumi.Bool(true),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.cloudflare.ZeroTrustGatewaySettings;\nimport com.pulumi.cloudflare.ZeroTrustGatewaySettingsArgs;\nimport com.pulumi.cloudflare.inputs.ZeroTrustGatewaySettingsBlockPageArgs;\nimport com.pulumi.cloudflare.inputs.ZeroTrustGatewaySettingsBodyScanningArgs;\nimport com.pulumi.cloudflare.inputs.ZeroTrustGatewaySettingsAntivirusArgs;\nimport com.pulumi.cloudflare.inputs.ZeroTrustGatewaySettingsAntivirusNotificationSettingsArgs;\nimport com.pulumi.cloudflare.inputs.ZeroTrustGatewaySettingsFipsArgs;\nimport com.pulumi.cloudflare.inputs.ZeroTrustGatewaySettingsProxyArgs;\nimport com.pulumi.cloudflare.inputs.ZeroTrustGatewaySettingsLoggingArgs;\nimport com.pulumi.cloudflare.inputs.ZeroTrustGatewaySettingsLoggingSettingsByRuleTypeArgs;\nimport com.pulumi.cloudflare.inputs.ZeroTrustGatewaySettingsLoggingSettingsByRuleTypeDnsArgs;\nimport com.pulumi.cloudflare.inputs.ZeroTrustGatewaySettingsLoggingSettingsByRuleTypeHttpArgs;\nimport com.pulumi.cloudflare.inputs.ZeroTrustGatewaySettingsLoggingSettingsByRuleTypeL4Args;\nimport com.pulumi.cloudflare.inputs.ZeroTrustGatewaySettingsExtendedEmailMatchingArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ZeroTrustGatewaySettings(\"example\", ZeroTrustGatewaySettingsArgs.builder()\n .accountId(\"f037e56e89293a057740de681ac9abbe\")\n .tlsDecryptEnabled(true)\n .protocolDetectionEnabled(true)\n .blockPage(ZeroTrustGatewaySettingsBlockPageArgs.builder()\n .footerText(\"hello\")\n .headerText(\"hello\")\n .logoPath(\"https://example.com/logo.jpg\")\n .backgroundColor(\"#000000\")\n .build())\n .bodyScanning(ZeroTrustGatewaySettingsBodyScanningArgs.builder()\n .inspectionMode(\"deep\")\n .build())\n .antivirus(ZeroTrustGatewaySettingsAntivirusArgs.builder()\n .enabledDownloadPhase(true)\n .enabledUploadPhase(false)\n .failClosed(true)\n .notificationSettings(ZeroTrustGatewaySettingsAntivirusNotificationSettingsArgs.builder()\n .enabled(true)\n .message(\"you are blocked\")\n .supportUrl(\"https://example.com/blocked\")\n .build())\n .build())\n .fips(ZeroTrustGatewaySettingsFipsArgs.builder()\n .tls(true)\n .build())\n .proxy(ZeroTrustGatewaySettingsProxyArgs.builder()\n .tcp(true)\n .udp(true)\n .rootCa(true)\n .virtualIp(false)\n .build())\n .urlBrowserIsolationEnabled(true)\n .logging(ZeroTrustGatewaySettingsLoggingArgs.builder()\n .redactPii(true)\n .settingsByRuleType(ZeroTrustGatewaySettingsLoggingSettingsByRuleTypeArgs.builder()\n .dns(ZeroTrustGatewaySettingsLoggingSettingsByRuleTypeDnsArgs.builder()\n .logAll(false)\n .logBlocks(true)\n .build())\n .http(ZeroTrustGatewaySettingsLoggingSettingsByRuleTypeHttpArgs.builder()\n .logAll(true)\n .logBlocks(true)\n .build())\n .l4(ZeroTrustGatewaySettingsLoggingSettingsByRuleTypeL4Args.builder()\n .logAll(false)\n .logBlocks(true)\n .build())\n .build())\n .build())\n .extendedEmailMatching(ZeroTrustGatewaySettingsExtendedEmailMatchingArgs.builder()\n .enabled(true)\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: cloudflare:ZeroTrustGatewaySettings\n properties:\n accountId: f037e56e89293a057740de681ac9abbe\n tlsDecryptEnabled: true\n protocolDetectionEnabled: true\n blockPage:\n footerText: hello\n headerText: hello\n logoPath: https://example.com/logo.jpg\n backgroundColor: '#000000'\n bodyScanning:\n inspectionMode: deep\n antivirus:\n enabledDownloadPhase: true\n enabledUploadPhase: false\n failClosed: true\n notificationSettings:\n enabled: true\n message: you are blocked\n supportUrl: https://example.com/blocked\n fips:\n tls: true\n proxy:\n tcp: true\n udp: true\n rootCa: true\n virtualIp: false\n urlBrowserIsolationEnabled: true\n logging:\n redactPii: true\n settingsByRuleType:\n dns:\n logAll: false\n logBlocks: true\n http:\n logAll: true\n logBlocks: true\n l4:\n logAll: false\n logBlocks: true\n extendedEmailMatching:\n enabled: true\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\n```sh\n$ pulumi import cloudflare:index/zeroTrustGatewaySettings:ZeroTrustGatewaySettings example \u003caccount_id\u003e\n```\n\n",
+ "description": "Provides a Cloudflare Teams Account resource. The Teams Account\nresource defines configuration for secure web gateway.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as cloudflare from \"@pulumi/cloudflare\";\n\nconst example = new cloudflare.ZeroTrustGatewaySettings(\"example\", {\n accountId: \"f037e56e89293a057740de681ac9abbe\",\n tlsDecryptEnabled: true,\n protocolDetectionEnabled: true,\n blockPage: {\n footerText: \"hello\",\n headerText: \"hello\",\n logoPath: \"https://example.com/logo.jpg\",\n backgroundColor: \"#000000\",\n },\n bodyScanning: {\n inspectionMode: \"deep\",\n },\n antivirus: {\n enabledDownloadPhase: true,\n enabledUploadPhase: false,\n failClosed: true,\n notificationSettings: {\n enabled: true,\n message: \"you are blocked\",\n supportUrl: \"https://example.com/blocked\",\n },\n },\n fips: {\n tls: true,\n },\n proxy: {\n tcp: true,\n udp: true,\n rootCa: true,\n virtualIp: false,\n disableForTime: 3600,\n },\n urlBrowserIsolationEnabled: true,\n logging: {\n redactPii: true,\n settingsByRuleType: {\n dns: {\n logAll: false,\n logBlocks: true,\n },\n http: {\n logAll: true,\n logBlocks: true,\n },\n l4: {\n logAll: false,\n logBlocks: true,\n },\n },\n },\n extendedEmailMatching: {\n enabled: true,\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_cloudflare as cloudflare\n\nexample = cloudflare.ZeroTrustGatewaySettings(\"example\",\n account_id=\"f037e56e89293a057740de681ac9abbe\",\n tls_decrypt_enabled=True,\n protocol_detection_enabled=True,\n block_page={\n \"footer_text\": \"hello\",\n \"header_text\": \"hello\",\n \"logo_path\": \"https://example.com/logo.jpg\",\n \"background_color\": \"#000000\",\n },\n body_scanning={\n \"inspection_mode\": \"deep\",\n },\n antivirus={\n \"enabled_download_phase\": True,\n \"enabled_upload_phase\": False,\n \"fail_closed\": True,\n \"notification_settings\": {\n \"enabled\": True,\n \"message\": \"you are blocked\",\n \"support_url\": \"https://example.com/blocked\",\n },\n },\n fips={\n \"tls\": True,\n },\n proxy={\n \"tcp\": True,\n \"udp\": True,\n \"root_ca\": True,\n \"virtual_ip\": False,\n \"disable_for_time\": 3600,\n },\n url_browser_isolation_enabled=True,\n logging={\n \"redact_pii\": True,\n \"settings_by_rule_type\": {\n \"dns\": {\n \"log_all\": False,\n \"log_blocks\": True,\n },\n \"http\": {\n \"log_all\": True,\n \"log_blocks\": True,\n },\n \"l4\": {\n \"log_all\": False,\n \"log_blocks\": True,\n },\n },\n },\n extended_email_matching={\n \"enabled\": True,\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Cloudflare = Pulumi.Cloudflare;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Cloudflare.ZeroTrustGatewaySettings(\"example\", new()\n {\n AccountId = \"f037e56e89293a057740de681ac9abbe\",\n TlsDecryptEnabled = true,\n ProtocolDetectionEnabled = true,\n BlockPage = new Cloudflare.Inputs.ZeroTrustGatewaySettingsBlockPageArgs\n {\n FooterText = \"hello\",\n HeaderText = \"hello\",\n LogoPath = \"https://example.com/logo.jpg\",\n BackgroundColor = \"#000000\",\n },\n BodyScanning = new Cloudflare.Inputs.ZeroTrustGatewaySettingsBodyScanningArgs\n {\n InspectionMode = \"deep\",\n },\n Antivirus = new Cloudflare.Inputs.ZeroTrustGatewaySettingsAntivirusArgs\n {\n EnabledDownloadPhase = true,\n EnabledUploadPhase = false,\n FailClosed = true,\n NotificationSettings = new Cloudflare.Inputs.ZeroTrustGatewaySettingsAntivirusNotificationSettingsArgs\n {\n Enabled = true,\n Message = \"you are blocked\",\n SupportUrl = \"https://example.com/blocked\",\n },\n },\n Fips = new Cloudflare.Inputs.ZeroTrustGatewaySettingsFipsArgs\n {\n Tls = true,\n },\n Proxy = new Cloudflare.Inputs.ZeroTrustGatewaySettingsProxyArgs\n {\n Tcp = true,\n Udp = true,\n RootCa = true,\n VirtualIp = false,\n DisableForTime = 3600,\n },\n UrlBrowserIsolationEnabled = true,\n Logging = new Cloudflare.Inputs.ZeroTrustGatewaySettingsLoggingArgs\n {\n RedactPii = true,\n SettingsByRuleType = new Cloudflare.Inputs.ZeroTrustGatewaySettingsLoggingSettingsByRuleTypeArgs\n {\n Dns = new Cloudflare.Inputs.ZeroTrustGatewaySettingsLoggingSettingsByRuleTypeDnsArgs\n {\n LogAll = false,\n LogBlocks = true,\n },\n Http = new Cloudflare.Inputs.ZeroTrustGatewaySettingsLoggingSettingsByRuleTypeHttpArgs\n {\n LogAll = true,\n LogBlocks = true,\n },\n L4 = new Cloudflare.Inputs.ZeroTrustGatewaySettingsLoggingSettingsByRuleTypeL4Args\n {\n LogAll = false,\n LogBlocks = true,\n },\n },\n },\n ExtendedEmailMatching = new Cloudflare.Inputs.ZeroTrustGatewaySettingsExtendedEmailMatchingArgs\n {\n Enabled = true,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-cloudflare/sdk/v5/go/cloudflare\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := cloudflare.NewZeroTrustGatewaySettings(ctx, \"example\", \u0026cloudflare.ZeroTrustGatewaySettingsArgs{\n\t\t\tAccountId: pulumi.String(\"f037e56e89293a057740de681ac9abbe\"),\n\t\t\tTlsDecryptEnabled: pulumi.Bool(true),\n\t\t\tProtocolDetectionEnabled: pulumi.Bool(true),\n\t\t\tBlockPage: \u0026cloudflare.ZeroTrustGatewaySettingsBlockPageArgs{\n\t\t\t\tFooterText: pulumi.String(\"hello\"),\n\t\t\t\tHeaderText: pulumi.String(\"hello\"),\n\t\t\t\tLogoPath: pulumi.String(\"https://example.com/logo.jpg\"),\n\t\t\t\tBackgroundColor: pulumi.String(\"#000000\"),\n\t\t\t},\n\t\t\tBodyScanning: \u0026cloudflare.ZeroTrustGatewaySettingsBodyScanningArgs{\n\t\t\t\tInspectionMode: pulumi.String(\"deep\"),\n\t\t\t},\n\t\t\tAntivirus: \u0026cloudflare.ZeroTrustGatewaySettingsAntivirusArgs{\n\t\t\t\tEnabledDownloadPhase: pulumi.Bool(true),\n\t\t\t\tEnabledUploadPhase: pulumi.Bool(false),\n\t\t\t\tFailClosed: pulumi.Bool(true),\n\t\t\t\tNotificationSettings: \u0026cloudflare.ZeroTrustGatewaySettingsAntivirusNotificationSettingsArgs{\n\t\t\t\t\tEnabled: pulumi.Bool(true),\n\t\t\t\t\tMessage: pulumi.String(\"you are blocked\"),\n\t\t\t\t\tSupportUrl: pulumi.String(\"https://example.com/blocked\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tFips: \u0026cloudflare.ZeroTrustGatewaySettingsFipsArgs{\n\t\t\t\tTls: pulumi.Bool(true),\n\t\t\t},\n\t\t\tProxy: \u0026cloudflare.ZeroTrustGatewaySettingsProxyArgs{\n\t\t\t\tTcp: pulumi.Bool(true),\n\t\t\t\tUdp: pulumi.Bool(true),\n\t\t\t\tRootCa: pulumi.Bool(true),\n\t\t\t\tVirtualIp: pulumi.Bool(false),\n\t\t\t\tDisableForTime: pulumi.Int(3600),\n\t\t\t},\n\t\t\tUrlBrowserIsolationEnabled: pulumi.Bool(true),\n\t\t\tLogging: \u0026cloudflare.ZeroTrustGatewaySettingsLoggingArgs{\n\t\t\t\tRedactPii: pulumi.Bool(true),\n\t\t\t\tSettingsByRuleType: \u0026cloudflare.ZeroTrustGatewaySettingsLoggingSettingsByRuleTypeArgs{\n\t\t\t\t\tDns: \u0026cloudflare.ZeroTrustGatewaySettingsLoggingSettingsByRuleTypeDnsArgs{\n\t\t\t\t\t\tLogAll: pulumi.Bool(false),\n\t\t\t\t\t\tLogBlocks: pulumi.Bool(true),\n\t\t\t\t\t},\n\t\t\t\t\tHttp: \u0026cloudflare.ZeroTrustGatewaySettingsLoggingSettingsByRuleTypeHttpArgs{\n\t\t\t\t\t\tLogAll: pulumi.Bool(true),\n\t\t\t\t\t\tLogBlocks: pulumi.Bool(true),\n\t\t\t\t\t},\n\t\t\t\t\tL4: \u0026cloudflare.ZeroTrustGatewaySettingsLoggingSettingsByRuleTypeL4Args{\n\t\t\t\t\t\tLogAll: pulumi.Bool(false),\n\t\t\t\t\t\tLogBlocks: pulumi.Bool(true),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\tExtendedEmailMatching: \u0026cloudflare.ZeroTrustGatewaySettingsExtendedEmailMatchingArgs{\n\t\t\t\tEnabled: pulumi.Bool(true),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.cloudflare.ZeroTrustGatewaySettings;\nimport com.pulumi.cloudflare.ZeroTrustGatewaySettingsArgs;\nimport com.pulumi.cloudflare.inputs.ZeroTrustGatewaySettingsBlockPageArgs;\nimport com.pulumi.cloudflare.inputs.ZeroTrustGatewaySettingsBodyScanningArgs;\nimport com.pulumi.cloudflare.inputs.ZeroTrustGatewaySettingsAntivirusArgs;\nimport com.pulumi.cloudflare.inputs.ZeroTrustGatewaySettingsAntivirusNotificationSettingsArgs;\nimport com.pulumi.cloudflare.inputs.ZeroTrustGatewaySettingsFipsArgs;\nimport com.pulumi.cloudflare.inputs.ZeroTrustGatewaySettingsProxyArgs;\nimport com.pulumi.cloudflare.inputs.ZeroTrustGatewaySettingsLoggingArgs;\nimport com.pulumi.cloudflare.inputs.ZeroTrustGatewaySettingsLoggingSettingsByRuleTypeArgs;\nimport com.pulumi.cloudflare.inputs.ZeroTrustGatewaySettingsLoggingSettingsByRuleTypeDnsArgs;\nimport com.pulumi.cloudflare.inputs.ZeroTrustGatewaySettingsLoggingSettingsByRuleTypeHttpArgs;\nimport com.pulumi.cloudflare.inputs.ZeroTrustGatewaySettingsLoggingSettingsByRuleTypeL4Args;\nimport com.pulumi.cloudflare.inputs.ZeroTrustGatewaySettingsExtendedEmailMatchingArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ZeroTrustGatewaySettings(\"example\", ZeroTrustGatewaySettingsArgs.builder()\n .accountId(\"f037e56e89293a057740de681ac9abbe\")\n .tlsDecryptEnabled(true)\n .protocolDetectionEnabled(true)\n .blockPage(ZeroTrustGatewaySettingsBlockPageArgs.builder()\n .footerText(\"hello\")\n .headerText(\"hello\")\n .logoPath(\"https://example.com/logo.jpg\")\n .backgroundColor(\"#000000\")\n .build())\n .bodyScanning(ZeroTrustGatewaySettingsBodyScanningArgs.builder()\n .inspectionMode(\"deep\")\n .build())\n .antivirus(ZeroTrustGatewaySettingsAntivirusArgs.builder()\n .enabledDownloadPhase(true)\n .enabledUploadPhase(false)\n .failClosed(true)\n .notificationSettings(ZeroTrustGatewaySettingsAntivirusNotificationSettingsArgs.builder()\n .enabled(true)\n .message(\"you are blocked\")\n .supportUrl(\"https://example.com/blocked\")\n .build())\n .build())\n .fips(ZeroTrustGatewaySettingsFipsArgs.builder()\n .tls(true)\n .build())\n .proxy(ZeroTrustGatewaySettingsProxyArgs.builder()\n .tcp(true)\n .udp(true)\n .rootCa(true)\n .virtualIp(false)\n .disableForTime(3600)\n .build())\n .urlBrowserIsolationEnabled(true)\n .logging(ZeroTrustGatewaySettingsLoggingArgs.builder()\n .redactPii(true)\n .settingsByRuleType(ZeroTrustGatewaySettingsLoggingSettingsByRuleTypeArgs.builder()\n .dns(ZeroTrustGatewaySettingsLoggingSettingsByRuleTypeDnsArgs.builder()\n .logAll(false)\n .logBlocks(true)\n .build())\n .http(ZeroTrustGatewaySettingsLoggingSettingsByRuleTypeHttpArgs.builder()\n .logAll(true)\n .logBlocks(true)\n .build())\n .l4(ZeroTrustGatewaySettingsLoggingSettingsByRuleTypeL4Args.builder()\n .logAll(false)\n .logBlocks(true)\n .build())\n .build())\n .build())\n .extendedEmailMatching(ZeroTrustGatewaySettingsExtendedEmailMatchingArgs.builder()\n .enabled(true)\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: cloudflare:ZeroTrustGatewaySettings\n properties:\n accountId: f037e56e89293a057740de681ac9abbe\n tlsDecryptEnabled: true\n protocolDetectionEnabled: true\n blockPage:\n footerText: hello\n headerText: hello\n logoPath: https://example.com/logo.jpg\n backgroundColor: '#000000'\n bodyScanning:\n inspectionMode: deep\n antivirus:\n enabledDownloadPhase: true\n enabledUploadPhase: false\n failClosed: true\n notificationSettings:\n enabled: true\n message: you are blocked\n supportUrl: https://example.com/blocked\n fips:\n tls: true\n proxy:\n tcp: true\n udp: true\n rootCa: true\n virtualIp: false\n disableForTime: 3600\n urlBrowserIsolationEnabled: true\n logging:\n redactPii: true\n settingsByRuleType:\n dns:\n logAll: false\n logBlocks: true\n http:\n logAll: true\n logBlocks: true\n l4:\n logAll: false\n logBlocks: true\n extendedEmailMatching:\n enabled: true\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\n```sh\n$ pulumi import cloudflare:index/zeroTrustGatewaySettings:ZeroTrustGatewaySettings example \u003caccount_id\u003e\n```\n\n",
"properties": {
"accountId": {
"type": "string",
@@ -30624,9 +31298,14 @@
"$ref": "#/types/cloudflare:index/ZeroTrustGatewaySettingsBodyScanning:ZeroTrustGatewaySettingsBodyScanning",
"description": "Configuration for body scanning.\n"
},
+ "certificate": {
+ "$ref": "#/types/cloudflare:index/ZeroTrustGatewaySettingsCertificate:ZeroTrustGatewaySettingsCertificate",
+ "description": "Configuration for TLS interception certificate. This will be required starting Feb 2025.\n"
+ },
"customCertificate": {
"$ref": "#/types/cloudflare:index/ZeroTrustGatewaySettingsCustomCertificate:ZeroTrustGatewaySettingsCustomCertificate",
- "description": "Configuration for custom certificates / BYO-PKI.\n"
+ "description": "Configuration for custom certificates / BYO-PKI. Conflicts with `certificate`.\n",
+ "deprecationMessage": "Use `certificate` instead. Continuing to use custom_certificate may result in inconsistent configuration."
},
"extendedEmailMatching": {
"$ref": "#/types/cloudflare:index/ZeroTrustGatewaySettingsExtendedEmailMatching:ZeroTrustGatewaySettingsExtendedEmailMatching",
@@ -30693,9 +31372,14 @@
"$ref": "#/types/cloudflare:index/ZeroTrustGatewaySettingsBodyScanning:ZeroTrustGatewaySettingsBodyScanning",
"description": "Configuration for body scanning.\n"
},
+ "certificate": {
+ "$ref": "#/types/cloudflare:index/ZeroTrustGatewaySettingsCertificate:ZeroTrustGatewaySettingsCertificate",
+ "description": "Configuration for TLS interception certificate. This will be required starting Feb 2025.\n"
+ },
"customCertificate": {
"$ref": "#/types/cloudflare:index/ZeroTrustGatewaySettingsCustomCertificate:ZeroTrustGatewaySettingsCustomCertificate",
- "description": "Configuration for custom certificates / BYO-PKI.\n"
+ "description": "Configuration for custom certificates / BYO-PKI. Conflicts with `certificate`.\n",
+ "deprecationMessage": "Use `certificate` instead. Continuing to use custom_certificate may result in inconsistent configuration."
},
"extendedEmailMatching": {
"$ref": "#/types/cloudflare:index/ZeroTrustGatewaySettingsExtendedEmailMatching:ZeroTrustGatewaySettingsExtendedEmailMatching",
@@ -30763,9 +31447,14 @@
"$ref": "#/types/cloudflare:index/ZeroTrustGatewaySettingsBodyScanning:ZeroTrustGatewaySettingsBodyScanning",
"description": "Configuration for body scanning.\n"
},
+ "certificate": {
+ "$ref": "#/types/cloudflare:index/ZeroTrustGatewaySettingsCertificate:ZeroTrustGatewaySettingsCertificate",
+ "description": "Configuration for TLS interception certificate. This will be required starting Feb 2025.\n"
+ },
"customCertificate": {
"$ref": "#/types/cloudflare:index/ZeroTrustGatewaySettingsCustomCertificate:ZeroTrustGatewaySettingsCustomCertificate",
- "description": "Configuration for custom certificates / BYO-PKI.\n"
+ "description": "Configuration for custom certificates / BYO-PKI. Conflicts with `certificate`.\n",
+ "deprecationMessage": "Use `certificate` instead. Continuing to use custom_certificate may result in inconsistent configuration."
},
"extendedEmailMatching": {
"$ref": "#/types/cloudflare:index/ZeroTrustGatewaySettingsExtendedEmailMatching:ZeroTrustGatewaySettingsExtendedEmailMatching",
@@ -31083,6 +31772,7 @@
}
},
"cloudflare:index/zeroTrustRiskScoreIntegration:ZeroTrustRiskScoreIntegration": {
+ "description": "The [Risk Score Integration](https://developers.cloudflare.com/cloudflare-one/insights/risk-score/#send-risk-score-to-okta) resource allows you to transmit changes in User Risk Score to a specified vendor such as Okta.\n",
"properties": {
"accountId": {
"type": "string",
@@ -31094,11 +31784,11 @@
},
"integrationType": {
"type": "string",
- "description": "The type of integration, e.g. 'Okta'. Full list of allowed values can be found here:\nhttps://developers.cloudflare.com/api/operations/dlp-zt-risk-score-integration-create#request-body\n"
+ "description": "The type of integration, e.g. 'Okta'. Full list of allowed values can be found here: https://developers.cloudflare.com/api/operations/dlp-zt-risk-score-integration-create#request-body\n"
},
"referenceId": {
"type": "string",
- "description": "A reference id that can be supplied by the client. Currently this should be set to the Access-Okta IDP ID (a UUIDv4). If\nomitted, a random UUIDv4 is used.\nhttps://developers.cloudflare.com/api/operations/access-identity-providers-get-an-access-identity-provider\n"
+ "description": "A reference id that can be supplied by the client. Currently this should be set to the Access-Okta IDP ID (a UUIDv4). If omitted, a random UUIDv4 is used. https://developers.cloudflare.com/api/operations/access-identity-providers-get-an-access-identity-provider\n"
},
"tenantUrl": {
"type": "string",
@@ -31106,7 +31796,7 @@
},
"wellKnownUrl": {
"type": "string",
- "description": "The URL for the Shared Signals Framework configuration, e.g. '/.well-known/sse-configuration/{integration_uuid}/'.\nhttps://openid.net/specs/openid-sse-framework-1_0.html#rfc.section.6.2.1\n"
+ "description": "The URL for the Shared Signals Framework configuration, e.g. '/.well-known/sse-configuration/{integration*uuid}/'. https://openid.net/specs/openid-sse-framework-1*0.html#rfc.section.6.2.1\n"
}
},
"required": [
@@ -31128,11 +31818,11 @@
},
"integrationType": {
"type": "string",
- "description": "The type of integration, e.g. 'Okta'. Full list of allowed values can be found here:\nhttps://developers.cloudflare.com/api/operations/dlp-zt-risk-score-integration-create#request-body\n"
+ "description": "The type of integration, e.g. 'Okta'. Full list of allowed values can be found here: https://developers.cloudflare.com/api/operations/dlp-zt-risk-score-integration-create#request-body\n"
},
"referenceId": {
"type": "string",
- "description": "A reference id that can be supplied by the client. Currently this should be set to the Access-Okta IDP ID (a UUIDv4). If\nomitted, a random UUIDv4 is used.\nhttps://developers.cloudflare.com/api/operations/access-identity-providers-get-an-access-identity-provider\n"
+ "description": "A reference id that can be supplied by the client. Currently this should be set to the Access-Okta IDP ID (a UUIDv4). If omitted, a random UUIDv4 is used. https://developers.cloudflare.com/api/operations/access-identity-providers-get-an-access-identity-provider\n"
},
"tenantUrl": {
"type": "string",
@@ -31157,11 +31847,11 @@
},
"integrationType": {
"type": "string",
- "description": "The type of integration, e.g. 'Okta'. Full list of allowed values can be found here:\nhttps://developers.cloudflare.com/api/operations/dlp-zt-risk-score-integration-create#request-body\n"
+ "description": "The type of integration, e.g. 'Okta'. Full list of allowed values can be found here: https://developers.cloudflare.com/api/operations/dlp-zt-risk-score-integration-create#request-body\n"
},
"referenceId": {
"type": "string",
- "description": "A reference id that can be supplied by the client. Currently this should be set to the Access-Okta IDP ID (a UUIDv4). If\nomitted, a random UUIDv4 is used.\nhttps://developers.cloudflare.com/api/operations/access-identity-providers-get-an-access-identity-provider\n"
+ "description": "A reference id that can be supplied by the client. Currently this should be set to the Access-Okta IDP ID (a UUIDv4). If omitted, a random UUIDv4 is used. https://developers.cloudflare.com/api/operations/access-identity-providers-get-an-access-identity-provider\n"
},
"tenantUrl": {
"type": "string",
@@ -31169,7 +31859,7 @@
},
"wellKnownUrl": {
"type": "string",
- "description": "The URL for the Shared Signals Framework configuration, e.g. '/.well-known/sse-configuration/{integration_uuid}/'.\nhttps://openid.net/specs/openid-sse-framework-1_0.html#rfc.section.6.2.1\n"
+ "description": "The URL for the Shared Signals Framework configuration, e.g. '/.well-known/sse-configuration/{integration*uuid}/'. https://openid.net/specs/openid-sse-framework-1*0.html#rfc.section.6.2.1\n"
}
},
"type": "object"
@@ -32780,7 +33470,7 @@
},
"type": {
"type": "string",
- "description": "The device posture rule type. Available values: `serial_number`, `file`, `application`, `gateway`, `warp`, `domain_joined`, `os_version`, `disk_encryption`, `firewall`, `client_certificate`, `workspace_one`, `unique_client_id`, `crowdstrike_s2s`, `sentinelone`, `kolide`, `tanium_s2s`, `intune`, `sentinelone_s2s`.\n"
+ "description": "The device posture rule type. Available values: `serial_number`, `file`, `application`, `gateway`, `warp`, `domain_joined`, `os_version`, `disk_encryption`, `firewall`, `client_certificate`, `client_certificate_v2`, `workspace_one`, `unique_client_id`, `crowdstrike_s2s`, `sentinelone`, `kolide`, `tanium_s2s`, `intune`, `sentinelone_s2s`.\n"
}
},
"type": "object",
@@ -32811,7 +33501,7 @@
"type": "array"
},
"type": {
- "description": "The device posture rule type. Available values: `serial_number`, `file`, `application`, `gateway`, `warp`, `domain_joined`, `os_version`, `disk_encryption`, `firewall`, `client_certificate`, `workspace_one`, `unique_client_id`, `crowdstrike_s2s`, `sentinelone`, `kolide`, `tanium_s2s`, `intune`, `sentinelone_s2s`.\n",
+ "description": "The device posture rule type. Available values: `serial_number`, `file`, `application`, `gateway`, `warp`, `domain_joined`, `os_version`, `disk_encryption`, `firewall`, `client_certificate`, `client_certificate_v2`, `workspace_one`, `unique_client_id`, `crowdstrike_s2s`, `sentinelone`, `kolide`, `tanium_s2s`, `intune`, `sentinelone_s2s`.\n",
"type": "string"
}
},
diff --git a/provider/go.mod b/provider/go.mod
index 61ce468e5..559cc4496 100644
--- a/provider/go.mod
+++ b/provider/go.mod
@@ -46,19 +46,19 @@ require (
github.com/armon/go-radix v1.0.0 // indirect
github.com/atotto/clipboard v0.1.4 // indirect
github.com/aws/aws-sdk-go v1.50.36 // indirect
- github.com/aws/aws-sdk-go-v2 v1.30.4 // indirect
- github.com/aws/aws-sdk-go-v2/config v1.27.31 // indirect
- github.com/aws/aws-sdk-go-v2/credentials v1.17.30 // indirect
- github.com/aws/aws-sdk-go-v2/feature/ec2/imds v1.16.12 // indirect
- github.com/aws/aws-sdk-go-v2/internal/configsources v1.3.16 // indirect
- github.com/aws/aws-sdk-go-v2/internal/endpoints/v2 v2.6.16 // indirect
+ github.com/aws/aws-sdk-go-v2 v1.30.5 // indirect
+ github.com/aws/aws-sdk-go-v2/config v1.27.34 // indirect
+ github.com/aws/aws-sdk-go-v2/credentials v1.17.32 // indirect
+ github.com/aws/aws-sdk-go-v2/feature/ec2/imds v1.16.13 // indirect
+ github.com/aws/aws-sdk-go-v2/internal/configsources v1.3.17 // indirect
+ github.com/aws/aws-sdk-go-v2/internal/endpoints/v2 v2.6.17 // indirect
github.com/aws/aws-sdk-go-v2/internal/ini v1.8.1 // indirect
github.com/aws/aws-sdk-go-v2/service/internal/accept-encoding v1.11.4 // indirect
- github.com/aws/aws-sdk-go-v2/service/internal/presigned-url v1.11.18 // indirect
+ github.com/aws/aws-sdk-go-v2/service/internal/presigned-url v1.11.19 // indirect
github.com/aws/aws-sdk-go-v2/service/kms v1.30.1 // indirect
- github.com/aws/aws-sdk-go-v2/service/sso v1.22.5 // indirect
- github.com/aws/aws-sdk-go-v2/service/ssooidc v1.26.5 // indirect
- github.com/aws/aws-sdk-go-v2/service/sts v1.30.5 // indirect
+ github.com/aws/aws-sdk-go-v2/service/sso v1.22.7 // indirect
+ github.com/aws/aws-sdk-go-v2/service/ssooidc v1.26.7 // indirect
+ github.com/aws/aws-sdk-go-v2/service/sts v1.30.7 // indirect
github.com/aws/smithy-go v1.20.4 // indirect
github.com/aymanbagabas/go-osc52/v2 v2.0.1 // indirect
github.com/bgentry/go-netrc v0.0.0-20140422174119-9fd32a8b3d3d // indirect
@@ -70,7 +70,7 @@ require (
github.com/charmbracelet/lipgloss v0.7.1 // indirect
github.com/cheggaaa/pb v1.0.29 // indirect
github.com/cloudflare/circl v1.3.7 // indirect
- github.com/cloudflare/cloudflare-go v0.103.0 // indirect
+ github.com/cloudflare/cloudflare-go v0.104.0 // indirect
github.com/cloudflare/cloudflare-go/v2 v2.4.0 // indirect
github.com/containerd/console v1.0.4-0.20230313162750-1ae8d489ac81 // indirect
github.com/cyphar/filepath-securejoin v0.2.4 // indirect
@@ -231,16 +231,16 @@ require (
go.uber.org/atomic v1.9.0 // indirect
gocloud.dev v0.37.0 // indirect
gocloud.dev/secrets/hashivault v0.37.0 // indirect
- golang.org/x/crypto v0.26.0 // indirect
+ golang.org/x/crypto v0.27.0 // indirect
golang.org/x/exp v0.0.0-20240604190554-fc45aab8b7f8 // indirect
golang.org/x/mod v0.19.0 // indirect
- golang.org/x/net v0.28.0 // indirect
+ golang.org/x/net v0.29.0 // indirect
golang.org/x/oauth2 v0.18.0 // indirect
golang.org/x/sync v0.8.0 // indirect
- golang.org/x/sys v0.23.0 // indirect
- golang.org/x/term v0.23.0 // indirect
- golang.org/x/text v0.17.0 // indirect
- golang.org/x/time v0.5.0 // indirect
+ golang.org/x/sys v0.25.0 // indirect
+ golang.org/x/term v0.24.0 // indirect
+ golang.org/x/text v0.18.0 // indirect
+ golang.org/x/time v0.6.0 // indirect
golang.org/x/tools v0.22.0 // indirect
golang.org/x/xerrors v0.0.0-20231012003039-104605ab7028 // indirect
google.golang.org/api v0.169.0 // indirect
diff --git a/provider/go.sum b/provider/go.sum
index d725b741e..7f65b3e48 100644
--- a/provider/go.sum
+++ b/provider/go.sum
@@ -1240,46 +1240,46 @@ github.com/aws/aws-sdk-go v1.37.0/go.mod h1:hcU610XS61/+aQV88ixoOzUoG7v3b31pl2zK
github.com/aws/aws-sdk-go v1.44.122/go.mod h1:y4AeaBuwd2Lk+GepC1E9v0qOiTws0MIWAX4oIKwKHZo=
github.com/aws/aws-sdk-go v1.50.36 h1:PjWXHwZPuTLMR1NIb8nEjLucZBMzmf84TLoLbD8BZqk=
github.com/aws/aws-sdk-go v1.50.36/go.mod h1:LF8svs817+Nz+DmiMQKTO3ubZ/6IaTpq3TjupRn3Eqk=
-github.com/aws/aws-sdk-go-v2 v1.30.4 h1:frhcagrVNrzmT95RJImMHgabt99vkXGslubDaDagTk8=
-github.com/aws/aws-sdk-go-v2 v1.30.4/go.mod h1:CT+ZPWXbYrci8chcARI3OmI/qgd+f6WtuLOoaIA8PR0=
+github.com/aws/aws-sdk-go-v2 v1.30.5 h1:mWSRTwQAb0aLE17dSzztCVJWI9+cRMgqebndjwDyK0g=
+github.com/aws/aws-sdk-go-v2 v1.30.5/go.mod h1:CT+ZPWXbYrci8chcARI3OmI/qgd+f6WtuLOoaIA8PR0=
github.com/aws/aws-sdk-go-v2/aws/protocol/eventstream v1.6.4 h1:70PVAiL15/aBMh5LThwgXdSQorVr91L127ttckI9QQU=
github.com/aws/aws-sdk-go-v2/aws/protocol/eventstream v1.6.4/go.mod h1:/MQxMqci8tlqDH+pjmoLu1i0tbWCUP1hhyMRuFxpQCw=
-github.com/aws/aws-sdk-go-v2/config v1.27.31 h1:kxBoRsjhT3pq0cKthgj6RU6bXTm/2SgdoUMyrVw0rAI=
-github.com/aws/aws-sdk-go-v2/config v1.27.31/go.mod h1:z04nZdSWFPaDwK3DdJOG2r+scLQzMYuJeW0CujEm9FM=
-github.com/aws/aws-sdk-go-v2/credentials v1.17.30 h1:aau/oYFtibVovr2rDt8FHlU17BTicFEMAi29V1U+L5Q=
-github.com/aws/aws-sdk-go-v2/credentials v1.17.30/go.mod h1:BPJ/yXV92ZVq6G8uYvbU0gSl8q94UB63nMT5ctNO38g=
-github.com/aws/aws-sdk-go-v2/feature/ec2/imds v1.16.12 h1:yjwoSyDZF8Jth+mUk5lSPJCkMC0lMy6FaCD51jm6ayE=
-github.com/aws/aws-sdk-go-v2/feature/ec2/imds v1.16.12/go.mod h1:fuR57fAgMk7ot3WcNQfb6rSEn+SUffl7ri+aa8uKysI=
+github.com/aws/aws-sdk-go-v2/config v1.27.34 h1:5sLceuETg/215nLtY/QIVB2O6cosS0iC/Tx5oyqUhbw=
+github.com/aws/aws-sdk-go-v2/config v1.27.34/go.mod h1:kEqdYzRb8dd8Sy2pOdEbExTTF5v7ozEXX0McgPE7xks=
+github.com/aws/aws-sdk-go-v2/credentials v1.17.32 h1:7Cxhp/BnT2RcGy4VisJ9miUPecY+lyE9I8JvcZofn9I=
+github.com/aws/aws-sdk-go-v2/credentials v1.17.32/go.mod h1:P5/QMF3/DCHbXGEGkdbilXHsyTBX5D3HSwcrSc9p20I=
+github.com/aws/aws-sdk-go-v2/feature/ec2/imds v1.16.13 h1:pfQ2sqNpMVK6xz2RbqLEL0GH87JOwSxPV2rzm8Zsb74=
+github.com/aws/aws-sdk-go-v2/feature/ec2/imds v1.16.13/go.mod h1:NG7RXPUlqfsCLLFfi0+IpKN4sCB9D9fw/qTaSB+xRoU=
github.com/aws/aws-sdk-go-v2/feature/s3/manager v1.16.15 h1:7Zwtt/lP3KNRkeZre7soMELMGNoBrutx8nobg1jKWmo=
github.com/aws/aws-sdk-go-v2/feature/s3/manager v1.16.15/go.mod h1:436h2adoHb57yd+8W+gYPrrA9U/R/SuAuOO42Ushzhw=
-github.com/aws/aws-sdk-go-v2/internal/configsources v1.3.16 h1:TNyt/+X43KJ9IJJMjKfa3bNTiZbUP7DeCxfbTROESwY=
-github.com/aws/aws-sdk-go-v2/internal/configsources v1.3.16/go.mod h1:2DwJF39FlNAUiX5pAc0UNeiz16lK2t7IaFcm0LFHEgc=
-github.com/aws/aws-sdk-go-v2/internal/endpoints/v2 v2.6.16 h1:jYfy8UPmd+6kJW5YhY0L1/KftReOGxI/4NtVSTh9O/I=
-github.com/aws/aws-sdk-go-v2/internal/endpoints/v2 v2.6.16/go.mod h1:7ZfEPZxkW42Afq4uQB8H2E2e6ebh6mXTueEpYzjCzcs=
+github.com/aws/aws-sdk-go-v2/internal/configsources v1.3.17 h1:pI7Bzt0BJtYA0N/JEC6B8fJ4RBrEMi1LBrkMdFYNSnQ=
+github.com/aws/aws-sdk-go-v2/internal/configsources v1.3.17/go.mod h1:Dh5zzJYMtxfIjYW+/evjQ8uj2OyR/ve2KROHGHlSFqE=
+github.com/aws/aws-sdk-go-v2/internal/endpoints/v2 v2.6.17 h1:Mqr/V5gvrhA2gvgnF42Zh5iMiQNcOYthFYwCyrnuWlc=
+github.com/aws/aws-sdk-go-v2/internal/endpoints/v2 v2.6.17/go.mod h1:aLJpZlCmjE+V+KtN1q1uyZkfnUWpQGpbsn89XPKyzfU=
github.com/aws/aws-sdk-go-v2/internal/ini v1.8.1 h1:VaRN3TlFdd6KxX1x3ILT5ynH6HvKgqdiXoTxAF4HQcQ=
github.com/aws/aws-sdk-go-v2/internal/ini v1.8.1/go.mod h1:FbtygfRFze9usAadmnGJNc8KsP346kEe+y2/oyhGAGc=
-github.com/aws/aws-sdk-go-v2/internal/v4a v1.3.16 h1:mimdLQkIX1zr8GIPY1ZtALdBQGxcASiBd2MOp8m/dMc=
-github.com/aws/aws-sdk-go-v2/internal/v4a v1.3.16/go.mod h1:YHk6owoSwrIsok+cAH9PENCOGoH5PU2EllX4vLtSrsY=
+github.com/aws/aws-sdk-go-v2/internal/v4a v1.3.17 h1:Roo69qTpfu8OlJ2Tb7pAYVuF0CpuUMB0IYWwYP/4DZM=
+github.com/aws/aws-sdk-go-v2/internal/v4a v1.3.17/go.mod h1:NcWPxQzGM1USQggaTVwz6VpqMZPX1CvDJLDh6jnOCa4=
github.com/aws/aws-sdk-go-v2/service/iam v1.31.4 h1:eVm30ZIDv//r6Aogat9I88b5YX1xASSLcEDqHYRPVl0=
github.com/aws/aws-sdk-go-v2/service/iam v1.31.4/go.mod h1:aXWImQV0uTW35LM0A/T4wEg6R1/ReXUu4SM6/lUHYK0=
github.com/aws/aws-sdk-go-v2/service/internal/accept-encoding v1.11.4 h1:KypMCbLPPHEmf9DgMGw51jMj77VfGPAN2Kv4cfhlfgI=
github.com/aws/aws-sdk-go-v2/service/internal/accept-encoding v1.11.4/go.mod h1:Vz1JQXliGcQktFTN/LN6uGppAIRoLBR2bMvIMP0gOjc=
-github.com/aws/aws-sdk-go-v2/service/internal/checksum v1.3.18 h1:GckUnpm4EJOAio1c8o25a+b3lVfwVzC9gnSBqiiNmZM=
-github.com/aws/aws-sdk-go-v2/service/internal/checksum v1.3.18/go.mod h1:Br6+bxfG33Dk3ynmkhsW2Z/t9D4+lRqdLDNCKi85w0U=
-github.com/aws/aws-sdk-go-v2/service/internal/presigned-url v1.11.18 h1:tJ5RnkHCiSH0jyd6gROjlJtNwov0eGYNz8s8nFcR0jQ=
-github.com/aws/aws-sdk-go-v2/service/internal/presigned-url v1.11.18/go.mod h1:++NHzT+nAF7ZPrHPsA+ENvsXkOO8wEu+C6RXltAG4/c=
-github.com/aws/aws-sdk-go-v2/service/internal/s3shared v1.17.16 h1:jg16PhLPUiHIj8zYIW6bqzeQSuHVEiWnGA0Brz5Xv2I=
-github.com/aws/aws-sdk-go-v2/service/internal/s3shared v1.17.16/go.mod h1:Uyk1zE1VVdsHSU7096h/rwnXDzOzYQVl+FNPhPw7ShY=
+github.com/aws/aws-sdk-go-v2/service/internal/checksum v1.3.19 h1:FLMkfEiRjhgeDTCjjLoc3URo/TBkgeQbocA78lfkzSI=
+github.com/aws/aws-sdk-go-v2/service/internal/checksum v1.3.19/go.mod h1:Vx+GucNSsdhaxs3aZIKfSUjKVGsxN25nX2SRcdhuw08=
+github.com/aws/aws-sdk-go-v2/service/internal/presigned-url v1.11.19 h1:rfprUlsdzgl7ZL2KlXiUAoJnI/VxfHCvDFr2QDFj6u4=
+github.com/aws/aws-sdk-go-v2/service/internal/presigned-url v1.11.19/go.mod h1:SCWkEdRq8/7EK60NcvvQ6NXKuTcchAD4ROAsC37VEZE=
+github.com/aws/aws-sdk-go-v2/service/internal/s3shared v1.17.17 h1:u+EfGmksnJc/x5tq3A+OD7LrMbSSR/5TrKLvkdy/fhY=
+github.com/aws/aws-sdk-go-v2/service/internal/s3shared v1.17.17/go.mod h1:VaMx6302JHax2vHJWgRo+5n9zvbacs3bLU/23DNQrTY=
github.com/aws/aws-sdk-go-v2/service/kms v1.30.1 h1:SBn4I0fJXF9FYOVRSVMWuhvEKoAHDikjGpS3wlmw5DE=
github.com/aws/aws-sdk-go-v2/service/kms v1.30.1/go.mod h1:2snWQJQUKsbN66vAawJuOGX7dr37pfOq9hb0tZDGIqQ=
-github.com/aws/aws-sdk-go-v2/service/s3 v1.61.0 h1:Wb544Wh+xfSXqJ/j3R4aX9wrKUoZsJNmilBYZb3mKQ4=
-github.com/aws/aws-sdk-go-v2/service/s3 v1.61.0/go.mod h1:BSPI0EfnYUuNHPS0uqIo5VrRwzie+Fp+YhQOUs16sKI=
-github.com/aws/aws-sdk-go-v2/service/sso v1.22.5 h1:zCsFCKvbj25i7p1u94imVoO447I/sFv8qq+lGJhRN0c=
-github.com/aws/aws-sdk-go-v2/service/sso v1.22.5/go.mod h1:ZeDX1SnKsVlejeuz41GiajjZpRSWR7/42q/EyA/QEiM=
-github.com/aws/aws-sdk-go-v2/service/ssooidc v1.26.5 h1:SKvPgvdvmiTWoi0GAJ7AsJfOz3ngVkD/ERbs5pUnHNI=
-github.com/aws/aws-sdk-go-v2/service/ssooidc v1.26.5/go.mod h1:20sz31hv/WsPa3HhU3hfrIet2kxM4Pe0r20eBZ20Tac=
-github.com/aws/aws-sdk-go-v2/service/sts v1.30.5 h1:OMsEmCyz2i89XwRwPouAJvhj81wINh+4UK+k/0Yo/q8=
-github.com/aws/aws-sdk-go-v2/service/sts v1.30.5/go.mod h1:vmSqFK+BVIwVpDAGZB3CoCXHzurt4qBE8lf+I/kRTh0=
+github.com/aws/aws-sdk-go-v2/service/s3 v1.61.2 h1:Kp6PWAlXwP1UvIflkIP6MFZYBNDCa4mFCGtxrpICVOg=
+github.com/aws/aws-sdk-go-v2/service/s3 v1.61.2/go.mod h1:5FmD/Dqq57gP+XwaUnd5WFPipAuzrf0HmupX27Gvjvc=
+github.com/aws/aws-sdk-go-v2/service/sso v1.22.7 h1:pIaGg+08llrP7Q5aiz9ICWbY8cqhTkyy+0SHvfzQpTc=
+github.com/aws/aws-sdk-go-v2/service/sso v1.22.7/go.mod h1:eEygMHnTKH/3kNp9Jr1n3PdejuSNcgwLe1dWgQtO0VQ=
+github.com/aws/aws-sdk-go-v2/service/ssooidc v1.26.7 h1:/Cfdu0XV3mONYKaOt1Gr0k1KvQzkzPyiKUdlWJqy+J4=
+github.com/aws/aws-sdk-go-v2/service/ssooidc v1.26.7/go.mod h1:bCbAxKDqNvkHxRaIMnyVPXPo+OaPRwvmgzMxbz1VKSA=
+github.com/aws/aws-sdk-go-v2/service/sts v1.30.7 h1:NKTa1eqZYw8tiHSRGpP0VtTdub/8KNk8sDkNPFaOKDE=
+github.com/aws/aws-sdk-go-v2/service/sts v1.30.7/go.mod h1:NXi1dIAGteSaRLqYgarlhP/Ij0cFT+qmCwiJqWh/U5o=
github.com/aws/smithy-go v1.20.4 h1:2HK1zBdPgRbjFOHlfeQZfpC4r72MOb9bZkiFwggKO+4=
github.com/aws/smithy-go v1.20.4/go.mod h1:irrKGvNn1InZwb2d7fkIRNucdfwR8R+Ts3wxYa/cJHg=
github.com/aymanbagabas/go-osc52/v2 v2.0.1 h1:HwpRHbFMcZLEVr42D4p7XBqjyuxQH5SMiErDT4WkJ2k=
@@ -1319,8 +1319,8 @@ github.com/client9/misspell v0.3.4/go.mod h1:qj6jICC3Q7zFZvVWo7KLAzC3yx5G7kyvSDk
github.com/cloudflare/circl v1.3.3/go.mod h1:5XYMA4rFBvNIrhs50XuiBJ15vF2pZn4nnUKZrLbUZFA=
github.com/cloudflare/circl v1.3.7 h1:qlCDlTPz2n9fu58M0Nh1J/JzcFpfgkFHHX3O35r5vcU=
github.com/cloudflare/circl v1.3.7/go.mod h1:sRTcRWXGLrKw6yIGJ+l7amYJFfAXbZG0kBSc8r4zxgA=
-github.com/cloudflare/cloudflare-go v0.103.0 h1:XXKzgXeUbAo7UTtM4T5wuD2bJPBtNZv7TlZAEy5QI4k=
-github.com/cloudflare/cloudflare-go v0.103.0/go.mod h1:0DrjT4g8wgYFYIxhlqR8xi8dNWfyHFGilUkU3+XV8h0=
+github.com/cloudflare/cloudflare-go v0.104.0 h1:R/lB0dZupaZbOgibAH/BRrkFbZ6Acn/WsKg2iX2xXuY=
+github.com/cloudflare/cloudflare-go v0.104.0/go.mod h1:pfUQ4PIG4ISI0/Mmc21Bp86UnFU0ktmPf3iTgbSL+cM=
github.com/cloudflare/cloudflare-go/v2 v2.4.0 h1:gys/26GoVDklgfq8NYV39WgvOEwzK/XAqYObmnI6iFg=
github.com/cloudflare/cloudflare-go/v2 v2.4.0/go.mod h1:AoIzb05z/rvdJLztPct4tSa+3IqXJJ6c+pbUFMOlTr8=
github.com/cncf/udpa/go v0.0.0-20191209042840-269d4d468f6f/go.mod h1:M8M6+tZqaGXZJjfX53e64911xZQV5JYwmTeXPW+k8Sc=
@@ -2209,8 +2209,8 @@ golang.org/x/crypto v0.16.0/go.mod h1:gCAAfMLgwOJRpTjQ2zCCt2OcSfYMTeZVSRtQlPC7Nq
golang.org/x/crypto v0.17.0/go.mod h1:gCAAfMLgwOJRpTjQ2zCCt2OcSfYMTeZVSRtQlPC7Nq4=
golang.org/x/crypto v0.18.0/go.mod h1:R0j02AL6hcrfOiy9T4ZYp/rcWeMxM3L6QYxlOuEG1mg=
golang.org/x/crypto v0.19.0/go.mod h1:Iy9bg/ha4yyC70EfRS8jz+B6ybOBKMaSxLj6P6oBDfU=
-golang.org/x/crypto v0.26.0 h1:RrRspgV4mU+YwB4FYnuBoKsUapNIL5cohGAmSH3azsw=
-golang.org/x/crypto v0.26.0/go.mod h1:GY7jblb9wI+FOo5y8/S2oY4zWP07AkOJ4+jxCqdqn54=
+golang.org/x/crypto v0.27.0 h1:GXm2NjJrPaiv/h1tb2UH8QfgC/hOf/+z0p6PT8o1w7A=
+golang.org/x/crypto v0.27.0/go.mod h1:1Xngt8kV6Dvbssa53Ziq6Eqn0HqbZi5Z6R0ZpwQzt70=
golang.org/x/exp v0.0.0-20180321215751-8460e604b9de/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
golang.org/x/exp v0.0.0-20180807140117-3d87b88a115f/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
golang.org/x/exp v0.0.0-20190121172915-509febef88a4/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
@@ -2358,8 +2358,8 @@ golang.org/x/net v0.17.0/go.mod h1:NxSsAGuq816PNPmqtQdLE42eU2Fs7NoRIZrHJAlaCOE=
golang.org/x/net v0.18.0/go.mod h1:/czyP5RqHAH4odGYxBJ1qz0+CE5WZ+2j1YgoEo8F2jQ=
golang.org/x/net v0.19.0/go.mod h1:CfAk/cbD4CthTvqiEl8NpboMuiuOYsAr/7NOjZJtv1U=
golang.org/x/net v0.20.0/go.mod h1:z8BVo6PvndSri0LbOE3hAn0apkU+1YvI6E70E9jsnvY=
-golang.org/x/net v0.28.0 h1:a9JDOJc5GMUJ0+UDqmLT86WiEy7iWyIhz8gz8E4e5hE=
-golang.org/x/net v0.28.0/go.mod h1:yqtgsTWOOnlGLG9GFRrK3++bGOUEkNBoHZc8MEDWPNg=
+golang.org/x/net v0.29.0 h1:5ORfpBpCs4HzDYoodCDBbwHzdR5UrLBZ3sOnUJmFoHo=
+golang.org/x/net v0.29.0/go.mod h1:gLkgy8jTGERgjzMic6DS9+SP0ajcu6Xu3Orq/SpETg0=
golang.org/x/oauth2 v0.0.0-20180821212333-d2e6202438be/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U=
golang.org/x/oauth2 v0.0.0-20190226205417-e64efc72b421/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw=
golang.org/x/oauth2 v0.0.0-20190604053449-0f29369cfe45/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw=
@@ -2533,8 +2533,8 @@ golang.org/x/sys v0.14.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
golang.org/x/sys v0.15.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
golang.org/x/sys v0.16.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
golang.org/x/sys v0.17.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
-golang.org/x/sys v0.23.0 h1:YfKFowiIMvtgl1UERQoTPPToxltDeZfbj4H7dVUCwmM=
-golang.org/x/sys v0.23.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
+golang.org/x/sys v0.25.0 h1:r+8e+loiHxRqhXVl6ML1nO3l1+oFoWbnlu2Ehimmi34=
+golang.org/x/sys v0.25.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo=
golang.org/x/term v0.0.0-20210927222741-03fcf44c2211/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8=
golang.org/x/term v0.0.0-20220722155259-a9ba230a4035/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8=
@@ -2555,8 +2555,8 @@ golang.org/x/term v0.14.0/go.mod h1:TySc+nGkYR6qt8km8wUhuFRTVSMIX3XPR58y2lC8vww=
golang.org/x/term v0.15.0/go.mod h1:BDl952bC7+uMoWR75FIrCDx79TPU9oHkTZ9yRbYOrX0=
golang.org/x/term v0.16.0/go.mod h1:yn7UURbUtPyrVJPGPq404EukNFxcm/foM+bV/bfcDsY=
golang.org/x/term v0.17.0/go.mod h1:lLRBjIVuehSbZlaOtGMbcMncT+aqLLLmKrsjNrUguwk=
-golang.org/x/term v0.23.0 h1:F6D4vR+EHoL9/sWAWgAR1H2DcHr4PareCbAaCo1RpuU=
-golang.org/x/term v0.23.0/go.mod h1:DgV24QBUrK6jhZXl+20l6UWznPlwAHm1Q1mGHtydmSk=
+golang.org/x/term v0.24.0 h1:Mh5cbb+Zk2hqqXNO7S1iTjEphVL+jb8ZWaqh/g+JWkM=
+golang.org/x/term v0.24.0/go.mod h1:lOBK/LVxemqiMij05LGJ0tzNr8xlmwBRJ81PX6wVLH8=
golang.org/x/text v0.0.0-20170915032832-14c0d48ead0c/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
golang.org/x/text v0.3.1-0.20180807135948-17ff2d5776d2/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
@@ -2578,16 +2578,16 @@ golang.org/x/text v0.11.0/go.mod h1:TvPlkZtksWOMsz7fbANvkp4WM8x/WCo/om8BMLbz+aE=
golang.org/x/text v0.12.0/go.mod h1:TvPlkZtksWOMsz7fbANvkp4WM8x/WCo/om8BMLbz+aE=
golang.org/x/text v0.13.0/go.mod h1:TvPlkZtksWOMsz7fbANvkp4WM8x/WCo/om8BMLbz+aE=
golang.org/x/text v0.14.0/go.mod h1:18ZOQIKpY8NJVqYksKHtTdi31H5itFRjB5/qKTNYzSU=
-golang.org/x/text v0.17.0 h1:XtiM5bkSOt+ewxlOE/aE/AKEHibwj/6gvWMl9Rsh0Qc=
-golang.org/x/text v0.17.0/go.mod h1:BuEKDfySbSR4drPmRPG/7iBdf8hvFMuRexcpahXilzY=
+golang.org/x/text v0.18.0 h1:XvMDiNzPAl0jr17s6W9lcaIhGUfUORdGCNsuLmPG224=
+golang.org/x/text v0.18.0/go.mod h1:BuEKDfySbSR4drPmRPG/7iBdf8hvFMuRexcpahXilzY=
golang.org/x/time v0.0.0-20181108054448-85acf8d2951c/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
golang.org/x/time v0.0.0-20190308202827-9d24e82272b4/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
golang.org/x/time v0.0.0-20191024005414-555d28b269f0/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
golang.org/x/time v0.0.0-20220922220347-f3bd1da661af/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
golang.org/x/time v0.1.0/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
golang.org/x/time v0.3.0/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
-golang.org/x/time v0.5.0 h1:o7cqy6amK/52YcAKIPlM3a+Fpj35zvRj2TP+e1xFSfk=
-golang.org/x/time v0.5.0/go.mod h1:3BpzKBy/shNhVucY/MWOyx10tF3SFh9QdLuxbVysPQM=
+golang.org/x/time v0.6.0 h1:eTDhh4ZXt5Qf0augr54TN6suAUudPcawVZeIAPU7D4U=
+golang.org/x/time v0.6.0/go.mod h1:3BpzKBy/shNhVucY/MWOyx10tF3SFh9QdLuxbVysPQM=
golang.org/x/tools v0.0.0-20180525024113-a5b4c53f6e8b/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
golang.org/x/tools v0.0.0-20181030221726-6c7e314b6563/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
diff --git a/sdk/dotnet/AccessPolicy.cs b/sdk/dotnet/AccessPolicy.cs
index eb53c066e..6526130f4 100644
--- a/sdk/dotnet/AccessPolicy.cs
+++ b/sdk/dotnet/AccessPolicy.cs
@@ -32,7 +32,7 @@ namespace Pulumi.Cloudflare
public partial class AccessPolicy : global::Pulumi.CustomResource
{
///
- /// The account identifier to target for the resource. Conflicts with `zone_id`. **Modifying this attribute will force creation of a new resource.**
+ /// The account identifier to target for the resource. Conflicts with `zone_id`.
///
[Output("accountId")]
public Output AccountId { get; private set; } = null!;
@@ -110,7 +110,7 @@ public partial class AccessPolicy : global::Pulumi.CustomResource
public Output SessionDuration { get; private set; } = null!;
///
- /// The zone identifier to target for the resource. Conflicts with `account_id`. **Modifying this attribute will force creation of a new resource.**
+ /// The zone identifier to target for the resource. Conflicts with `account_id`.
///
[Output("zoneId")]
public Output ZoneId { get; private set; } = null!;
@@ -162,7 +162,7 @@ public static AccessPolicy Get(string name, Input id, AccessPolicyState?
public sealed class AccessPolicyArgs : global::Pulumi.ResourceArgs
{
///
- /// The account identifier to target for the resource. Conflicts with `zone_id`. **Modifying this attribute will force creation of a new resource.**
+ /// The account identifier to target for the resource. Conflicts with `zone_id`.
///
[Input("accountId")]
public Input? AccountId { get; set; }
@@ -263,7 +263,7 @@ public InputList Requires
public Input? SessionDuration { get; set; }
///
- /// The zone identifier to target for the resource. Conflicts with `account_id`. **Modifying this attribute will force creation of a new resource.**
+ /// The zone identifier to target for the resource. Conflicts with `account_id`.
///
[Input("zoneId")]
public Input? ZoneId { get; set; }
@@ -277,7 +277,7 @@ public AccessPolicyArgs()
public sealed class AccessPolicyState : global::Pulumi.ResourceArgs
{
///
- /// The account identifier to target for the resource. Conflicts with `zone_id`. **Modifying this attribute will force creation of a new resource.**
+ /// The account identifier to target for the resource. Conflicts with `zone_id`.
///
[Input("accountId")]
public Input? AccountId { get; set; }
@@ -378,7 +378,7 @@ public InputList Requires
public Input? SessionDuration { get; set; }
///
- /// The zone identifier to target for the resource. Conflicts with `account_id`. **Modifying this attribute will force creation of a new resource.**
+ /// The zone identifier to target for the resource. Conflicts with `account_id`.
///
[Input("zoneId")]
public Input? ZoneId { get; set; }
diff --git a/sdk/dotnet/BotManagement.cs b/sdk/dotnet/BotManagement.cs
index 29b010fe8..16041e8f5 100644
--- a/sdk/dotnet/BotManagement.cs
+++ b/sdk/dotnet/BotManagement.cs
@@ -51,6 +51,12 @@ namespace Pulumi.Cloudflare
[CloudflareResourceType("cloudflare:index/botManagement:BotManagement")]
public partial class BotManagement : global::Pulumi.CustomResource
{
+ ///
+ /// Enable rule to block AI Scrapers and Crawlers.
+ ///
+ [Output("aiBotsProtection")]
+ public Output AiBotsProtection { get; private set; } = null!;
+
///
/// Automatically update to the newest bot detection models created by Cloudflare as they are released. [Learn more.](https://developers.cloudflare.com/bots/reference/machine-learning-models#model-versions-and-release-notes).
///
@@ -163,6 +169,12 @@ public static BotManagement Get(string name, Input id, BotManagementStat
public sealed class BotManagementArgs : global::Pulumi.ResourceArgs
{
+ ///
+ /// Enable rule to block AI Scrapers and Crawlers.
+ ///
+ [Input("aiBotsProtection")]
+ public Input? AiBotsProtection { get; set; }
+
///
/// Automatically update to the newest bot detection models created by Cloudflare as they are released. [Learn more.](https://developers.cloudflare.com/bots/reference/machine-learning-models#model-versions-and-release-notes).
///
@@ -231,6 +243,12 @@ public BotManagementArgs()
public sealed class BotManagementState : global::Pulumi.ResourceArgs
{
+ ///
+ /// Enable rule to block AI Scrapers and Crawlers.
+ ///
+ [Input("aiBotsProtection")]
+ public Input? AiBotsProtection { get; set; }
+
///
/// Automatically update to the newest bot detection models created by Cloudflare as they are released. [Learn more.](https://developers.cloudflare.com/bots/reference/machine-learning-models#model-versions-and-release-notes).
///
diff --git a/sdk/dotnet/DeviceSettingsPolicy.cs b/sdk/dotnet/DeviceSettingsPolicy.cs
index 0e8304a7b..ca84f3b67 100644
--- a/sdk/dotnet/DeviceSettingsPolicy.cs
+++ b/sdk/dotnet/DeviceSettingsPolicy.cs
@@ -168,7 +168,7 @@ public partial class DeviceSettingsPolicy : global::Pulumi.CustomResource
public Output SwitchLocked { get; private set; } = null!;
///
- /// Determines which tunnel protocol to use. Available values: `""`, `wireguard`, `masque`. Defaults to `wireguard`
+ /// Determines which tunnel protocol to use. Available values: `""`, `wireguard`, `masque`. Defaults to `wireguard`.
///
[Output("tunnelProtocol")]
public Output TunnelProtocol { get; private set; } = null!;
@@ -328,7 +328,7 @@ public sealed class DeviceSettingsPolicyArgs : global::Pulumi.ResourceArgs
public Input? SwitchLocked { get; set; }
///
- /// Determines which tunnel protocol to use. Available values: `""`, `wireguard`, `masque`. Defaults to `wireguard`
+ /// Determines which tunnel protocol to use. Available values: `""`, `wireguard`, `masque`. Defaults to `wireguard`.
///
[Input("tunnelProtocol")]
public Input? TunnelProtocol { get; set; }
@@ -450,7 +450,7 @@ public sealed class DeviceSettingsPolicyState : global::Pulumi.ResourceArgs
public Input? SwitchLocked { get; set; }
///
- /// Determines which tunnel protocol to use. Available values: `""`, `wireguard`, `masque`. Defaults to `wireguard`
+ /// Determines which tunnel protocol to use. Available values: `""`, `wireguard`, `masque`. Defaults to `wireguard`.
///
[Input("tunnelProtocol")]
public Input? TunnelProtocol { get; set; }
diff --git a/sdk/dotnet/GetDevicePostureRules.cs b/sdk/dotnet/GetDevicePostureRules.cs
index e2b9a04c5..5da3078f1 100644
--- a/sdk/dotnet/GetDevicePostureRules.cs
+++ b/sdk/dotnet/GetDevicePostureRules.cs
@@ -80,7 +80,7 @@ public sealed class GetDevicePostureRulesArgs : global::Pulumi.InvokeArgs
public string? Name { get; set; }
///
- /// The device posture rule type. Available values: `serial_number`, `file`, `application`, `gateway`, `warp`, `domain_joined`, `os_version`, `disk_encryption`, `firewall`, `client_certificate`, `workspace_one`, `unique_client_id`, `crowdstrike_s2s`, `sentinelone`, `kolide`, `tanium_s2s`, `intune`, `sentinelone_s2s`.
+ /// The device posture rule type. Available values: `serial_number`, `file`, `application`, `gateway`, `warp`, `domain_joined`, `os_version`, `disk_encryption`, `firewall`, `client_certificate`, `client_certificate_v2`, `workspace_one`, `unique_client_id`, `crowdstrike_s2s`, `sentinelone`, `kolide`, `tanium_s2s`, `intune`, `sentinelone_s2s`.
///
[Input("type")]
public string? Type { get; set; }
@@ -106,7 +106,7 @@ public sealed class GetDevicePostureRulesInvokeArgs : global::Pulumi.InvokeArgs
public Input? Name { get; set; }
///
- /// The device posture rule type. Available values: `serial_number`, `file`, `application`, `gateway`, `warp`, `domain_joined`, `os_version`, `disk_encryption`, `firewall`, `client_certificate`, `workspace_one`, `unique_client_id`, `crowdstrike_s2s`, `sentinelone`, `kolide`, `tanium_s2s`, `intune`, `sentinelone_s2s`.
+ /// The device posture rule type. Available values: `serial_number`, `file`, `application`, `gateway`, `warp`, `domain_joined`, `os_version`, `disk_encryption`, `firewall`, `client_certificate`, `client_certificate_v2`, `workspace_one`, `unique_client_id`, `crowdstrike_s2s`, `sentinelone`, `kolide`, `tanium_s2s`, `intune`, `sentinelone_s2s`.
///
[Input("type")]
public Input? Type { get; set; }
@@ -138,7 +138,7 @@ public sealed class GetDevicePostureRulesResult
///
public readonly ImmutableArray Rules;
///
- /// The device posture rule type. Available values: `serial_number`, `file`, `application`, `gateway`, `warp`, `domain_joined`, `os_version`, `disk_encryption`, `firewall`, `client_certificate`, `workspace_one`, `unique_client_id`, `crowdstrike_s2s`, `sentinelone`, `kolide`, `tanium_s2s`, `intune`, `sentinelone_s2s`.
+ /// The device posture rule type. Available values: `serial_number`, `file`, `application`, `gateway`, `warp`, `domain_joined`, `os_version`, `disk_encryption`, `firewall`, `client_certificate`, `client_certificate_v2`, `workspace_one`, `unique_client_id`, `crowdstrike_s2s`, `sentinelone`, `kolide`, `tanium_s2s`, `intune`, `sentinelone_s2s`.
///
public readonly string? Type;
diff --git a/sdk/dotnet/Inputs/AccessGroupExcludeArgs.cs b/sdk/dotnet/Inputs/AccessGroupExcludeArgs.cs
index f4f5fa6b0..0437cf2d0 100644
--- a/sdk/dotnet/Inputs/AccessGroupExcludeArgs.cs
+++ b/sdk/dotnet/Inputs/AccessGroupExcludeArgs.cs
@@ -12,6 +12,9 @@ namespace Pulumi.Cloudflare.Inputs
public sealed class AccessGroupExcludeArgs : global::Pulumi.ResourceArgs
{
+ ///
+ /// Matches any valid Access service token.
+ ///
[Input("anyValidServiceToken")]
public Input? AnyValidServiceToken { get; set; }
@@ -23,20 +26,33 @@ public InputList AuthContexts
set => _authContexts = value;
}
+ ///
+ /// The type of authentication method. Refer to https://datatracker.ietf.org/doc/html/rfc8176#section-2 for possible types.
+ ///
[Input("authMethod")]
public Input? AuthMethod { get; set; }
[Input("azures")]
private InputList? _azures;
+
+ ///
+ /// Matches an Azure group. Requires an Azure identity provider.
+ ///
public InputList Azures
{
get => _azures ?? (_azures = new InputList());
set => _azures = value;
}
+ ///
+ /// Matches any valid client certificate.
+ ///
[Input("certificate")]
public Input? Certificate { get; set; }
+ ///
+ /// Matches a valid client certificate common name.
+ ///
[Input("commonName")]
public Input? CommonName { get; set; }
@@ -54,6 +70,10 @@ public InputList CommonNames
[Input("devicePostures")]
private InputList? _devicePostures;
+
+ ///
+ /// The ID of a device posture integration.
+ ///
public InputList DevicePostures
{
get => _devicePostures ?? (_devicePostures = new InputList());
@@ -62,6 +82,10 @@ public InputList DevicePostures
[Input("emailDomains")]
private InputList? _emailDomains;
+
+ ///
+ /// The email domain to match.
+ ///
public InputList EmailDomains
{
get => _emailDomains ?? (_emailDomains = new InputList());
@@ -70,6 +94,10 @@ public InputList EmailDomains
[Input("emailLists")]
private InputList? _emailLists;
+
+ ///
+ /// The ID of a previously created email list.
+ ///
public InputList EmailLists
{
get => _emailLists ?? (_emailLists = new InputList());
@@ -78,20 +106,34 @@ public InputList EmailLists
[Input("emails")]
private InputList? _emails;
+
+ ///
+ /// The email of the user.
+ ///
public InputList Emails
{
get => _emails ?? (_emails = new InputList());
set => _emails = value;
}
+ ///
+ /// Matches everyone.
+ ///
[Input("everyone")]
public Input? Everyone { get; set; }
+ ///
+ /// Create Allow or Block policies which evaluate the user based on custom criteria. https://developers.cloudflare.com/cloudflare-one/policies/access/external-evaluation/.
+ ///
[Input("externalEvaluation")]
public Input? ExternalEvaluation { get; set; }
[Input("geos")]
private InputList? _geos;
+
+ ///
+ /// Matches a specific country.
+ ///
public InputList Geos
{
get => _geos ?? (_geos = new InputList());
@@ -100,6 +142,10 @@ public InputList Geos
[Input("githubs")]
private InputList? _githubs;
+
+ ///
+ /// Matches a Github organization. Requires a Github identity provider.
+ ///
public InputList Githubs
{
get => _githubs ?? (_githubs = new InputList());
@@ -108,6 +154,10 @@ public InputList Githubs
[Input("groups")]
private InputList? _groups;
+
+ ///
+ /// The ID of a previously created Access group.
+ ///
public InputList Groups
{
get => _groups ?? (_groups = new InputList());
@@ -116,6 +166,10 @@ public InputList Groups
[Input("gsuites")]
private InputList? _gsuites;
+
+ ///
+ /// Matches a group in Google Workspace. Requires a Google Workspace identity provider.
+ ///
public InputList Gsuites
{
get => _gsuites ?? (_gsuites = new InputList());
@@ -126,7 +180,7 @@ public InputList Gsuites
private InputList? _ipLists;
///
- /// The ID of an existing IP list to reference.
+ /// The ID of a previously created IP list.
///
public InputList IpLists
{
@@ -148,6 +202,10 @@ public InputList Ips
[Input("loginMethods")]
private InputList? _loginMethods;
+
+ ///
+ /// The ID of a configured identity provider.
+ ///
public InputList LoginMethods
{
get => _loginMethods ?? (_loginMethods = new InputList());
@@ -156,6 +214,10 @@ public InputList LoginMethods
[Input("oktas")]
private InputList? _oktas;
+
+ ///
+ /// Matches an Okta group. Requires an Okta identity provider.
+ ///
public InputList Oktas
{
get => _oktas ?? (_oktas = new InputList());
@@ -164,6 +226,10 @@ public InputList Oktas
[Input("samls")]
private InputList? _samls;
+
+ ///
+ /// Matches a SAML group. Requires a SAML identity provider.
+ ///
public InputList Samls
{
get => _samls ?? (_samls = new InputList());
@@ -172,6 +238,10 @@ public InputList Samls
[Input("serviceTokens")]
private InputList? _serviceTokens;
+
+ ///
+ /// The ID of an Access service token.
+ ///
public InputList ServiceTokens
{
get => _serviceTokens ?? (_serviceTokens = new InputList());
diff --git a/sdk/dotnet/Inputs/AccessGroupExcludeAuthContextArgs.cs b/sdk/dotnet/Inputs/AccessGroupExcludeAuthContextArgs.cs
index 22b04f486..034e74260 100644
--- a/sdk/dotnet/Inputs/AccessGroupExcludeAuthContextArgs.cs
+++ b/sdk/dotnet/Inputs/AccessGroupExcludeAuthContextArgs.cs
@@ -25,7 +25,7 @@ public sealed class AccessGroupExcludeAuthContextArgs : global::Pulumi.ResourceA
public Input Id { get; set; } = null!;
///
- /// The ID of the Azure Identity provider.
+ /// The ID of the Azure identity provider.
///
[Input("identityProviderId", required: true)]
public Input IdentityProviderId { get; set; } = null!;
diff --git a/sdk/dotnet/Inputs/AccessGroupExcludeAuthContextGetArgs.cs b/sdk/dotnet/Inputs/AccessGroupExcludeAuthContextGetArgs.cs
index 9b4689137..b8c338082 100644
--- a/sdk/dotnet/Inputs/AccessGroupExcludeAuthContextGetArgs.cs
+++ b/sdk/dotnet/Inputs/AccessGroupExcludeAuthContextGetArgs.cs
@@ -25,7 +25,7 @@ public sealed class AccessGroupExcludeAuthContextGetArgs : global::Pulumi.Resour
public Input Id { get; set; } = null!;
///
- /// The ID of the Azure Identity provider.
+ /// The ID of the Azure identity provider.
///
[Input("identityProviderId", required: true)]
public Input IdentityProviderId { get; set; } = null!;
diff --git a/sdk/dotnet/Inputs/AccessGroupExcludeAzureArgs.cs b/sdk/dotnet/Inputs/AccessGroupExcludeAzureArgs.cs
index 1f07ed5f1..15292c122 100644
--- a/sdk/dotnet/Inputs/AccessGroupExcludeAzureArgs.cs
+++ b/sdk/dotnet/Inputs/AccessGroupExcludeAzureArgs.cs
@@ -13,7 +13,7 @@ namespace Pulumi.Cloudflare.Inputs
public sealed class AccessGroupExcludeAzureArgs : global::Pulumi.ResourceArgs
{
///
- /// The ID of the Azure Identity provider.
+ /// The ID of the Azure identity provider.
///
[Input("identityProviderId")]
public Input? IdentityProviderId { get; set; }
diff --git a/sdk/dotnet/Inputs/AccessGroupExcludeAzureGetArgs.cs b/sdk/dotnet/Inputs/AccessGroupExcludeAzureGetArgs.cs
index 834c6586f..b2f91e166 100644
--- a/sdk/dotnet/Inputs/AccessGroupExcludeAzureGetArgs.cs
+++ b/sdk/dotnet/Inputs/AccessGroupExcludeAzureGetArgs.cs
@@ -13,7 +13,7 @@ namespace Pulumi.Cloudflare.Inputs
public sealed class AccessGroupExcludeAzureGetArgs : global::Pulumi.ResourceArgs
{
///
- /// The ID of the Azure Identity provider.
+ /// The ID of the Azure identity provider.
///
[Input("identityProviderId")]
public Input? IdentityProviderId { get; set; }
diff --git a/sdk/dotnet/Inputs/AccessGroupExcludeExternalEvaluationArgs.cs b/sdk/dotnet/Inputs/AccessGroupExcludeExternalEvaluationArgs.cs
index 19453dba5..692502e13 100644
--- a/sdk/dotnet/Inputs/AccessGroupExcludeExternalEvaluationArgs.cs
+++ b/sdk/dotnet/Inputs/AccessGroupExcludeExternalEvaluationArgs.cs
@@ -12,9 +12,15 @@ namespace Pulumi.Cloudflare.Inputs
public sealed class AccessGroupExcludeExternalEvaluationArgs : global::Pulumi.ResourceArgs
{
+ ///
+ /// The API endpoint containing your business logic.
+ ///
[Input("evaluateUrl")]
public Input? EvaluateUrl { get; set; }
+ ///
+ /// The API endpoint containing the key that Access uses to verify that the response came from your API.
+ ///
[Input("keysUrl")]
public Input? KeysUrl { get; set; }
diff --git a/sdk/dotnet/Inputs/AccessGroupExcludeExternalEvaluationGetArgs.cs b/sdk/dotnet/Inputs/AccessGroupExcludeExternalEvaluationGetArgs.cs
index cbab00349..65a03df0f 100644
--- a/sdk/dotnet/Inputs/AccessGroupExcludeExternalEvaluationGetArgs.cs
+++ b/sdk/dotnet/Inputs/AccessGroupExcludeExternalEvaluationGetArgs.cs
@@ -12,9 +12,15 @@ namespace Pulumi.Cloudflare.Inputs
public sealed class AccessGroupExcludeExternalEvaluationGetArgs : global::Pulumi.ResourceArgs
{
+ ///
+ /// The API endpoint containing your business logic.
+ ///
[Input("evaluateUrl")]
public Input? EvaluateUrl { get; set; }
+ ///
+ /// The API endpoint containing the key that Access uses to verify that the response came from your API.
+ ///
[Input("keysUrl")]
public Input? KeysUrl { get; set; }
diff --git a/sdk/dotnet/Inputs/AccessGroupExcludeGetArgs.cs b/sdk/dotnet/Inputs/AccessGroupExcludeGetArgs.cs
index a558f01c0..12bcad53d 100644
--- a/sdk/dotnet/Inputs/AccessGroupExcludeGetArgs.cs
+++ b/sdk/dotnet/Inputs/AccessGroupExcludeGetArgs.cs
@@ -12,6 +12,9 @@ namespace Pulumi.Cloudflare.Inputs
public sealed class AccessGroupExcludeGetArgs : global::Pulumi.ResourceArgs
{
+ ///
+ /// Matches any valid Access service token.
+ ///
[Input("anyValidServiceToken")]
public Input? AnyValidServiceToken { get; set; }
@@ -23,20 +26,33 @@ public InputList AuthContexts
set => _authContexts = value;
}
+ ///
+ /// The type of authentication method. Refer to https://datatracker.ietf.org/doc/html/rfc8176#section-2 for possible types.
+ ///
[Input("authMethod")]
public Input? AuthMethod { get; set; }
[Input("azures")]
private InputList? _azures;
+
+ ///
+ /// Matches an Azure group. Requires an Azure identity provider.
+ ///
public InputList Azures
{
get => _azures ?? (_azures = new InputList());
set => _azures = value;
}
+ ///
+ /// Matches any valid client certificate.
+ ///
[Input("certificate")]
public Input? Certificate { get; set; }
+ ///
+ /// Matches a valid client certificate common name.
+ ///
[Input("commonName")]
public Input? CommonName { get; set; }
@@ -54,6 +70,10 @@ public InputList CommonNames
[Input("devicePostures")]
private InputList? _devicePostures;
+
+ ///
+ /// The ID of a device posture integration.
+ ///
public InputList DevicePostures
{
get => _devicePostures ?? (_devicePostures = new InputList());
@@ -62,6 +82,10 @@ public InputList DevicePostures
[Input("emailDomains")]
private InputList? _emailDomains;
+
+ ///
+ /// The email domain to match.
+ ///
public InputList EmailDomains
{
get => _emailDomains ?? (_emailDomains = new InputList());
@@ -70,6 +94,10 @@ public InputList EmailDomains
[Input("emailLists")]
private InputList? _emailLists;
+
+ ///
+ /// The ID of a previously created email list.
+ ///
public InputList EmailLists
{
get => _emailLists ?? (_emailLists = new InputList());
@@ -78,20 +106,34 @@ public InputList EmailLists
[Input("emails")]
private InputList? _emails;
+
+ ///
+ /// The email of the user.
+ ///
public InputList Emails
{
get => _emails ?? (_emails = new InputList());
set => _emails = value;
}
+ ///
+ /// Matches everyone.
+ ///
[Input("everyone")]
public Input? Everyone { get; set; }
+ ///
+ /// Create Allow or Block policies which evaluate the user based on custom criteria. https://developers.cloudflare.com/cloudflare-one/policies/access/external-evaluation/.
+ ///
[Input("externalEvaluation")]
public Input? ExternalEvaluation { get; set; }
[Input("geos")]
private InputList? _geos;
+
+ ///
+ /// Matches a specific country.
+ ///
public InputList Geos
{
get => _geos ?? (_geos = new InputList());
@@ -100,6 +142,10 @@ public InputList Geos
[Input("githubs")]
private InputList? _githubs;
+
+ ///
+ /// Matches a Github organization. Requires a Github identity provider.
+ ///
public InputList Githubs
{
get => _githubs ?? (_githubs = new InputList());
@@ -108,6 +154,10 @@ public InputList Githubs
[Input("groups")]
private InputList? _groups;
+
+ ///
+ /// The ID of a previously created Access group.
+ ///
public InputList Groups
{
get => _groups ?? (_groups = new InputList());
@@ -116,6 +166,10 @@ public InputList Groups
[Input("gsuites")]
private InputList? _gsuites;
+
+ ///
+ /// Matches a group in Google Workspace. Requires a Google Workspace identity provider.
+ ///
public InputList Gsuites
{
get => _gsuites ?? (_gsuites = new InputList());
@@ -126,7 +180,7 @@ public InputList Gsuites
private InputList? _ipLists;
///
- /// The ID of an existing IP list to reference.
+ /// The ID of a previously created IP list.
///
public InputList IpLists
{
@@ -148,6 +202,10 @@ public InputList Ips
[Input("loginMethods")]
private InputList? _loginMethods;
+
+ ///
+ /// The ID of a configured identity provider.
+ ///
public InputList LoginMethods
{
get => _loginMethods ?? (_loginMethods = new InputList());
@@ -156,6 +214,10 @@ public InputList LoginMethods
[Input("oktas")]
private InputList? _oktas;
+
+ ///
+ /// Matches an Okta group. Requires an Okta identity provider.
+ ///
public InputList Oktas
{
get => _oktas ?? (_oktas = new InputList());
@@ -164,6 +226,10 @@ public InputList Oktas
[Input("samls")]
private InputList? _samls;
+
+ ///
+ /// Matches a SAML group. Requires a SAML identity provider.
+ ///
public InputList Samls
{
get => _samls ?? (_samls = new InputList());
@@ -172,6 +238,10 @@ public InputList Samls
[Input("serviceTokens")]
private InputList? _serviceTokens;
+
+ ///
+ /// The ID of an Access service token.
+ ///
public InputList ServiceTokens
{
get => _serviceTokens ?? (_serviceTokens = new InputList());
diff --git a/sdk/dotnet/Inputs/AccessGroupExcludeGithubArgs.cs b/sdk/dotnet/Inputs/AccessGroupExcludeGithubArgs.cs
index 67b3ac7a9..9b9f63c84 100644
--- a/sdk/dotnet/Inputs/AccessGroupExcludeGithubArgs.cs
+++ b/sdk/dotnet/Inputs/AccessGroupExcludeGithubArgs.cs
@@ -12,14 +12,24 @@ namespace Pulumi.Cloudflare.Inputs
public sealed class AccessGroupExcludeGithubArgs : global::Pulumi.ResourceArgs
{
+ ///
+ /// The ID of your Github identity provider.
+ ///
[Input("identityProviderId")]
public Input? IdentityProviderId { get; set; }
+ ///
+ /// The name of the organization.
+ ///
[Input("name")]
public Input? Name { get; set; }
[Input("teams")]
private InputList? _teams;
+
+ ///
+ /// The teams that should be matched.
+ ///
public InputList Teams
{
get => _teams ?? (_teams = new InputList());
diff --git a/sdk/dotnet/Inputs/AccessGroupExcludeGithubGetArgs.cs b/sdk/dotnet/Inputs/AccessGroupExcludeGithubGetArgs.cs
index 23296d82e..aa408ba82 100644
--- a/sdk/dotnet/Inputs/AccessGroupExcludeGithubGetArgs.cs
+++ b/sdk/dotnet/Inputs/AccessGroupExcludeGithubGetArgs.cs
@@ -12,14 +12,24 @@ namespace Pulumi.Cloudflare.Inputs
public sealed class AccessGroupExcludeGithubGetArgs : global::Pulumi.ResourceArgs
{
+ ///
+ /// The ID of your Github identity provider.
+ ///
[Input("identityProviderId")]
public Input? IdentityProviderId { get; set; }
+ ///
+ /// The name of the organization.
+ ///
[Input("name")]
public Input? Name { get; set; }
[Input("teams")]
private InputList? _teams;
+
+ ///
+ /// The teams that should be matched.
+ ///
public InputList Teams
{
get => _teams ?? (_teams = new InputList());
diff --git a/sdk/dotnet/Inputs/AccessGroupExcludeGsuiteArgs.cs b/sdk/dotnet/Inputs/AccessGroupExcludeGsuiteArgs.cs
index cb4380e3f..e8db57654 100644
--- a/sdk/dotnet/Inputs/AccessGroupExcludeGsuiteArgs.cs
+++ b/sdk/dotnet/Inputs/AccessGroupExcludeGsuiteArgs.cs
@@ -14,12 +14,19 @@ public sealed class AccessGroupExcludeGsuiteArgs : global::Pulumi.ResourceArgs
{
[Input("emails")]
private InputList? _emails;
+
+ ///
+ /// The email of the Google Workspace group.
+ ///
public InputList Emails
{
get => _emails ?? (_emails = new InputList());
set => _emails = value;
}
+ ///
+ /// The ID of your Google Workspace identity provider.
+ ///
[Input("identityProviderId")]
public Input? IdentityProviderId { get; set; }
diff --git a/sdk/dotnet/Inputs/AccessGroupExcludeGsuiteGetArgs.cs b/sdk/dotnet/Inputs/AccessGroupExcludeGsuiteGetArgs.cs
index f6e088b36..989c70934 100644
--- a/sdk/dotnet/Inputs/AccessGroupExcludeGsuiteGetArgs.cs
+++ b/sdk/dotnet/Inputs/AccessGroupExcludeGsuiteGetArgs.cs
@@ -14,12 +14,19 @@ public sealed class AccessGroupExcludeGsuiteGetArgs : global::Pulumi.ResourceArg
{
[Input("emails")]
private InputList? _emails;
+
+ ///
+ /// The email of the Google Workspace group.
+ ///
public InputList Emails
{
get => _emails ?? (_emails = new InputList());
set => _emails = value;
}
+ ///
+ /// The ID of your Google Workspace identity provider.
+ ///
[Input("identityProviderId")]
public Input? IdentityProviderId { get; set; }
diff --git a/sdk/dotnet/Inputs/AccessGroupExcludeOktaArgs.cs b/sdk/dotnet/Inputs/AccessGroupExcludeOktaArgs.cs
index 609f80ca6..8722cd8f4 100644
--- a/sdk/dotnet/Inputs/AccessGroupExcludeOktaArgs.cs
+++ b/sdk/dotnet/Inputs/AccessGroupExcludeOktaArgs.cs
@@ -12,11 +12,18 @@ namespace Pulumi.Cloudflare.Inputs
public sealed class AccessGroupExcludeOktaArgs : global::Pulumi.ResourceArgs
{
+ ///
+ /// The ID of your Okta identity provider.
+ ///
[Input("identityProviderId")]
public Input? IdentityProviderId { get; set; }
[Input("names")]
private InputList? _names;
+
+ ///
+ /// The name of the Okta Group.
+ ///
public InputList Names
{
get => _names ?? (_names = new InputList());
diff --git a/sdk/dotnet/Inputs/AccessGroupExcludeOktaGetArgs.cs b/sdk/dotnet/Inputs/AccessGroupExcludeOktaGetArgs.cs
index 07460d181..6b86bb9e9 100644
--- a/sdk/dotnet/Inputs/AccessGroupExcludeOktaGetArgs.cs
+++ b/sdk/dotnet/Inputs/AccessGroupExcludeOktaGetArgs.cs
@@ -12,11 +12,18 @@ namespace Pulumi.Cloudflare.Inputs
public sealed class AccessGroupExcludeOktaGetArgs : global::Pulumi.ResourceArgs
{
+ ///
+ /// The ID of your Okta identity provider.
+ ///
[Input("identityProviderId")]
public Input? IdentityProviderId { get; set; }
[Input("names")]
private InputList? _names;
+
+ ///
+ /// The name of the Okta Group.
+ ///
public InputList Names
{
get => _names ?? (_names = new InputList());
diff --git a/sdk/dotnet/Inputs/AccessGroupExcludeSamlArgs.cs b/sdk/dotnet/Inputs/AccessGroupExcludeSamlArgs.cs
index 49fad6e13..708ca23a5 100644
--- a/sdk/dotnet/Inputs/AccessGroupExcludeSamlArgs.cs
+++ b/sdk/dotnet/Inputs/AccessGroupExcludeSamlArgs.cs
@@ -12,12 +12,21 @@ namespace Pulumi.Cloudflare.Inputs
public sealed class AccessGroupExcludeSamlArgs : global::Pulumi.ResourceArgs
{
+ ///
+ /// The name of the SAML attribute.
+ ///
[Input("attributeName")]
public Input? AttributeName { get; set; }
+ ///
+ /// The SAML attribute value to look for.
+ ///
[Input("attributeValue")]
public Input? AttributeValue { get; set; }
+ ///
+ /// The ID of your SAML identity provider.
+ ///
[Input("identityProviderId")]
public Input? IdentityProviderId { get; set; }
diff --git a/sdk/dotnet/Inputs/AccessGroupExcludeSamlGetArgs.cs b/sdk/dotnet/Inputs/AccessGroupExcludeSamlGetArgs.cs
index ed5222719..c5a3f8e1c 100644
--- a/sdk/dotnet/Inputs/AccessGroupExcludeSamlGetArgs.cs
+++ b/sdk/dotnet/Inputs/AccessGroupExcludeSamlGetArgs.cs
@@ -12,12 +12,21 @@ namespace Pulumi.Cloudflare.Inputs
public sealed class AccessGroupExcludeSamlGetArgs : global::Pulumi.ResourceArgs
{
+ ///
+ /// The name of the SAML attribute.
+ ///
[Input("attributeName")]
public Input? AttributeName { get; set; }
+ ///
+ /// The SAML attribute value to look for.
+ ///
[Input("attributeValue")]
public Input? AttributeValue { get; set; }
+ ///
+ /// The ID of your SAML identity provider.
+ ///
[Input("identityProviderId")]
public Input? IdentityProviderId { get; set; }
diff --git a/sdk/dotnet/Inputs/AccessGroupIncludeArgs.cs b/sdk/dotnet/Inputs/AccessGroupIncludeArgs.cs
index d32809942..b3b38b545 100644
--- a/sdk/dotnet/Inputs/AccessGroupIncludeArgs.cs
+++ b/sdk/dotnet/Inputs/AccessGroupIncludeArgs.cs
@@ -12,6 +12,9 @@ namespace Pulumi.Cloudflare.Inputs
public sealed class AccessGroupIncludeArgs : global::Pulumi.ResourceArgs
{
+ ///
+ /// Matches any valid Access service token.
+ ///
[Input("anyValidServiceToken")]
public Input? AnyValidServiceToken { get; set; }
@@ -23,20 +26,33 @@ public InputList AuthContexts
set => _authContexts = value;
}
+ ///
+ /// The type of authentication method. Refer to https://datatracker.ietf.org/doc/html/rfc8176#section-2 for possible types.
+ ///
[Input("authMethod")]
public Input? AuthMethod { get; set; }
[Input("azures")]
private InputList? _azures;
+
+ ///
+ /// Matches an Azure group. Requires an Azure identity provider.
+ ///
public InputList Azures
{
get => _azures ?? (_azures = new InputList());
set => _azures = value;
}
+ ///
+ /// Matches any valid client certificate.
+ ///
[Input("certificate")]
public Input? Certificate { get; set; }
+ ///
+ /// Matches a valid client certificate common name.
+ ///
[Input("commonName")]
public Input? CommonName { get; set; }
@@ -54,6 +70,10 @@ public InputList CommonNames
[Input("devicePostures")]
private InputList? _devicePostures;
+
+ ///
+ /// The ID of a device posture integration.
+ ///
public InputList DevicePostures
{
get => _devicePostures ?? (_devicePostures = new InputList());
@@ -62,6 +82,10 @@ public InputList DevicePostures
[Input("emailDomains")]
private InputList? _emailDomains;
+
+ ///
+ /// The email domain to match.
+ ///
public InputList EmailDomains
{
get => _emailDomains ?? (_emailDomains = new InputList());
@@ -70,6 +94,10 @@ public InputList EmailDomains
[Input("emailLists")]
private InputList? _emailLists;
+
+ ///
+ /// The ID of a previously created email list.
+ ///
public InputList EmailLists
{
get => _emailLists ?? (_emailLists = new InputList());
@@ -78,20 +106,34 @@ public InputList EmailLists
[Input("emails")]
private InputList? _emails;
+
+ ///
+ /// The email of the user.
+ ///
public InputList Emails
{
get => _emails ?? (_emails = new InputList());
set => _emails = value;
}
+ ///
+ /// Matches everyone.
+ ///
[Input("everyone")]
public Input? Everyone { get; set; }
+ ///
+ /// Create Allow or Block policies which evaluate the user based on custom criteria. https://developers.cloudflare.com/cloudflare-one/policies/access/external-evaluation/.
+ ///
[Input("externalEvaluation")]
public Input? ExternalEvaluation { get; set; }
[Input("geos")]
private InputList? _geos;
+
+ ///
+ /// Matches a specific country.
+ ///
public InputList Geos
{
get => _geos ?? (_geos = new InputList());
@@ -100,6 +142,10 @@ public InputList Geos
[Input("githubs")]
private InputList? _githubs;
+
+ ///
+ /// Matches a Github organization. Requires a Github identity provider.
+ ///
public InputList Githubs
{
get => _githubs ?? (_githubs = new InputList());
@@ -108,6 +154,10 @@ public InputList Githubs
[Input("groups")]
private InputList? _groups;
+
+ ///
+ /// The ID of a previously created Access group.
+ ///
public InputList Groups
{
get => _groups ?? (_groups = new InputList());
@@ -116,6 +166,10 @@ public InputList Groups
[Input("gsuites")]
private InputList? _gsuites;
+
+ ///
+ /// Matches a group in Google Workspace. Requires a Google Workspace identity provider.
+ ///
public InputList Gsuites
{
get => _gsuites ?? (_gsuites = new InputList());
@@ -126,7 +180,7 @@ public InputList Gsuites
private InputList? _ipLists;
///
- /// The ID of an existing IP list to reference.
+ /// The ID of a previously created IP list.
///
public InputList IpLists
{
@@ -148,6 +202,10 @@ public InputList Ips
[Input("loginMethods")]
private InputList? _loginMethods;
+
+ ///
+ /// The ID of a configured identity provider.
+ ///
public InputList LoginMethods
{
get => _loginMethods ?? (_loginMethods = new InputList());
@@ -156,6 +214,10 @@ public InputList LoginMethods
[Input("oktas")]
private InputList? _oktas;
+
+ ///
+ /// Matches an Okta group. Requires an Okta identity provider.
+ ///
public InputList Oktas
{
get => _oktas ?? (_oktas = new InputList());
@@ -164,6 +226,10 @@ public InputList Oktas
[Input("samls")]
private InputList? _samls;
+
+ ///
+ /// Matches a SAML group. Requires a SAML identity provider.
+ ///
public InputList Samls
{
get => _samls ?? (_samls = new InputList());
@@ -172,6 +238,10 @@ public InputList Samls
[Input("serviceTokens")]
private InputList? _serviceTokens;
+
+ ///
+ /// The ID of an Access service token.
+ ///
public InputList ServiceTokens
{
get => _serviceTokens ?? (_serviceTokens = new InputList());
diff --git a/sdk/dotnet/Inputs/AccessGroupIncludeAuthContextArgs.cs b/sdk/dotnet/Inputs/AccessGroupIncludeAuthContextArgs.cs
index 742f361ca..ec8247d7a 100644
--- a/sdk/dotnet/Inputs/AccessGroupIncludeAuthContextArgs.cs
+++ b/sdk/dotnet/Inputs/AccessGroupIncludeAuthContextArgs.cs
@@ -25,7 +25,7 @@ public sealed class AccessGroupIncludeAuthContextArgs : global::Pulumi.ResourceA
public Input Id { get; set; } = null!;
///
- /// The ID of the Azure Identity provider.
+ /// The ID of the Azure identity provider.
///
[Input("identityProviderId", required: true)]
public Input IdentityProviderId { get; set; } = null!;
diff --git a/sdk/dotnet/Inputs/AccessGroupIncludeAuthContextGetArgs.cs b/sdk/dotnet/Inputs/AccessGroupIncludeAuthContextGetArgs.cs
index b57015ccb..69b7ed6fe 100644
--- a/sdk/dotnet/Inputs/AccessGroupIncludeAuthContextGetArgs.cs
+++ b/sdk/dotnet/Inputs/AccessGroupIncludeAuthContextGetArgs.cs
@@ -25,7 +25,7 @@ public sealed class AccessGroupIncludeAuthContextGetArgs : global::Pulumi.Resour
public Input Id { get; set; } = null!;
///
- /// The ID of the Azure Identity provider.
+ /// The ID of the Azure identity provider.
///
[Input("identityProviderId", required: true)]
public Input IdentityProviderId { get; set; } = null!;
diff --git a/sdk/dotnet/Inputs/AccessGroupIncludeAzureArgs.cs b/sdk/dotnet/Inputs/AccessGroupIncludeAzureArgs.cs
index 606e6d39b..d2fc4b8b2 100644
--- a/sdk/dotnet/Inputs/AccessGroupIncludeAzureArgs.cs
+++ b/sdk/dotnet/Inputs/AccessGroupIncludeAzureArgs.cs
@@ -13,7 +13,7 @@ namespace Pulumi.Cloudflare.Inputs
public sealed class AccessGroupIncludeAzureArgs : global::Pulumi.ResourceArgs
{
///
- /// The ID of the Azure Identity provider.
+ /// The ID of the Azure identity provider.
///
[Input("identityProviderId")]
public Input? IdentityProviderId { get; set; }
diff --git a/sdk/dotnet/Inputs/AccessGroupIncludeAzureGetArgs.cs b/sdk/dotnet/Inputs/AccessGroupIncludeAzureGetArgs.cs
index d8572ec6d..1fa4dcbf9 100644
--- a/sdk/dotnet/Inputs/AccessGroupIncludeAzureGetArgs.cs
+++ b/sdk/dotnet/Inputs/AccessGroupIncludeAzureGetArgs.cs
@@ -13,7 +13,7 @@ namespace Pulumi.Cloudflare.Inputs
public sealed class AccessGroupIncludeAzureGetArgs : global::Pulumi.ResourceArgs
{
///
- /// The ID of the Azure Identity provider.
+ /// The ID of the Azure identity provider.
///
[Input("identityProviderId")]
public Input? IdentityProviderId { get; set; }
diff --git a/sdk/dotnet/Inputs/AccessGroupIncludeExternalEvaluationArgs.cs b/sdk/dotnet/Inputs/AccessGroupIncludeExternalEvaluationArgs.cs
index 7c25534db..6a621d932 100644
--- a/sdk/dotnet/Inputs/AccessGroupIncludeExternalEvaluationArgs.cs
+++ b/sdk/dotnet/Inputs/AccessGroupIncludeExternalEvaluationArgs.cs
@@ -12,9 +12,15 @@ namespace Pulumi.Cloudflare.Inputs
public sealed class AccessGroupIncludeExternalEvaluationArgs : global::Pulumi.ResourceArgs
{
+ ///
+ /// The API endpoint containing your business logic.
+ ///
[Input("evaluateUrl")]
public Input? EvaluateUrl { get; set; }
+ ///