import * as pulumi from "@pulumi/pulumi"; /** * ## Example Usage * * ```typescript * import * as pulumi from "@pulumi/pulumi"; * import * as cloudflare from "@pulumi/cloudflare"; * * const exampleZeroTrustDeviceSettings = new cloudflare.ZeroTrustDeviceSettings("example_zero_trust_device_settings", { * accountId: "699d98642c564d2e855e9661899b7252", * disableForTime: 0, * externalEmergencySignalEnabled: true, * externalEmergencySignalFingerprint: "abcd1234567890abcd1234567890abcd1234567890abcd1234567890abcd1234", * externalEmergencySignalInterval: "5m", * externalEmergencySignalUrl: "https://192.0.2.1/signal", * gatewayProxyEnabled: true, * gatewayUdpProxyEnabled: true, * rootCertificateInstallationEnabled: true, * useZtVirtualIp: true, * }); * ``` * * ## Import * * ~> This resource does not currently support `pulumi import`. */ export declare class ZeroTrustDeviceSettings extends pulumi.CustomResource { /** * Get an existing ZeroTrustDeviceSettings resource's state with the given name, ID, and optional extra * properties used to qualify the lookup. * * @param name The _unique_ name of the resulting resource. * @param id The _unique_ provider ID of the resource to lookup. * @param state Any extra arguments used during the lookup. * @param opts Optional settings to control the behavior of the CustomResource. */ static get(name: string, id: pulumi.Input, state?: ZeroTrustDeviceSettingsState, opts?: pulumi.CustomResourceOptions): ZeroTrustDeviceSettings; /** * Returns true if the given object is an instance of ZeroTrustDeviceSettings. This is designed to work even * when multiple copies of the Pulumi SDK have been loaded into the same process. */ static isInstance(obj: any): obj is ZeroTrustDeviceSettings; readonly accountId: pulumi.Output; /** * Sets the time limit, in seconds, that a user can use an override code to bypass WARP. */ readonly disableForTime: pulumi.Output; /** * Controls whether the external emergency disconnect feature is enabled. */ readonly externalEmergencySignalEnabled: pulumi.Output; /** * The SHA256 fingerprint (64 hexadecimal characters) of the HTTPS server certificate for the external*emergency*signal_url. If provided, the WARP client will use this value to verify the server's identity. The device will ignore any response if the server's certificate fingerprint does not exactly match this value. */ readonly externalEmergencySignalFingerprint: pulumi.Output; /** * The interval at which the WARP client fetches the emergency disconnect signal, formatted as a duration string (e.g., "5m", "2m30s", "1h"). Minimum 30 seconds. */ readonly externalEmergencySignalInterval: pulumi.Output; /** * The HTTPS URL from which to fetch the emergency disconnect signal. Must use HTTPS and have an IPv4 or IPv6 address as the host. */ readonly externalEmergencySignalUrl: pulumi.Output; /** * Enable gateway proxy filtering on TCP. */ readonly gatewayProxyEnabled: pulumi.Output; /** * Enable gateway proxy filtering on UDP. */ readonly gatewayUdpProxyEnabled: pulumi.Output; /** * Enable installation of cloudflare managed root certificate. */ readonly rootCertificateInstallationEnabled: pulumi.Output; /** * Enable using CGNAT virtual IPv4. */ readonly useZtVirtualIp: pulumi.Output; /** * Create a ZeroTrustDeviceSettings resource with the given unique name, arguments, and options. * * @param name The _unique_ name of the resource. * @param args The arguments to use to populate this resource's properties. * @param opts A bag of options that control this resource's behavior. */ constructor(name: string, args: ZeroTrustDeviceSettingsArgs, opts?: pulumi.CustomResourceOptions); } /** * Input properties used for looking up and filtering ZeroTrustDeviceSettings resources. */ export interface ZeroTrustDeviceSettingsState { accountId?: pulumi.Input; /** * Sets the time limit, in seconds, that a user can use an override code to bypass WARP. */ disableForTime?: pulumi.Input; /** * Controls whether the external emergency disconnect feature is enabled. */ externalEmergencySignalEnabled?: pulumi.Input; /** * The SHA256 fingerprint (64 hexadecimal characters) of the HTTPS server certificate for the external*emergency*signal_url. If provided, the WARP client will use this value to verify the server's identity. The device will ignore any response if the server's certificate fingerprint does not exactly match this value. */ externalEmergencySignalFingerprint?: pulumi.Input; /** * The interval at which the WARP client fetches the emergency disconnect signal, formatted as a duration string (e.g., "5m", "2m30s", "1h"). Minimum 30 seconds. */ externalEmergencySignalInterval?: pulumi.Input; /** * The HTTPS URL from which to fetch the emergency disconnect signal. Must use HTTPS and have an IPv4 or IPv6 address as the host. */ externalEmergencySignalUrl?: pulumi.Input; /** * Enable gateway proxy filtering on TCP. */ gatewayProxyEnabled?: pulumi.Input; /** * Enable gateway proxy filtering on UDP. */ gatewayUdpProxyEnabled?: pulumi.Input; /** * Enable installation of cloudflare managed root certificate. */ rootCertificateInstallationEnabled?: pulumi.Input; /** * Enable using CGNAT virtual IPv4. */ useZtVirtualIp?: pulumi.Input; } /** * The set of arguments for constructing a ZeroTrustDeviceSettings resource. */ export interface ZeroTrustDeviceSettingsArgs { accountId: pulumi.Input; /** * Sets the time limit, in seconds, that a user can use an override code to bypass WARP. */ disableForTime?: pulumi.Input; /** * Controls whether the external emergency disconnect feature is enabled. */ externalEmergencySignalEnabled?: pulumi.Input; /** * The SHA256 fingerprint (64 hexadecimal characters) of the HTTPS server certificate for the external*emergency*signal_url. If provided, the WARP client will use this value to verify the server's identity. The device will ignore any response if the server's certificate fingerprint does not exactly match this value. */ externalEmergencySignalFingerprint?: pulumi.Input; /** * The interval at which the WARP client fetches the emergency disconnect signal, formatted as a duration string (e.g., "5m", "2m30s", "1h"). Minimum 30 seconds. */ externalEmergencySignalInterval?: pulumi.Input; /** * The HTTPS URL from which to fetch the emergency disconnect signal. Must use HTTPS and have an IPv4 or IPv6 address as the host. */ externalEmergencySignalUrl?: pulumi.Input; /** * Enable gateway proxy filtering on TCP. */ gatewayProxyEnabled?: pulumi.Input; /** * Enable gateway proxy filtering on UDP. */ gatewayUdpProxyEnabled?: pulumi.Input; /** * Enable installation of cloudflare managed root certificate. */ rootCertificateInstallationEnabled?: pulumi.Input; /** * Enable using CGNAT virtual IPv4. */ useZtVirtualIp?: pulumi.Input; }