diff --git a/.gitignore b/.gitignore index 9efdaff..4de5424 100644 --- a/.gitignore +++ b/.gitignore @@ -29,3 +29,5 @@ sdk/java/.gradle sdk/java/gradle sdk/java/gradlew sdk/java/gradlew.bat + +go.work.sum diff --git a/.pulumi-java-gen.version b/.pulumi-java-gen.version new file mode 100644 index 0000000..92e0c74 --- /dev/null +++ b/.pulumi-java-gen.version @@ -0,0 +1 @@ +0.16.1 \ No newline at end of file diff --git a/examples/go.sum b/examples/go.sum new file mode 100644 index 0000000..e69de29 diff --git a/go.work b/go.work index 4874e49..30406ee 100644 --- a/go.work +++ b/go.work @@ -1,4 +1,4 @@ -go 1.22 +go 1.22.5 use ( ./provider diff --git a/go.work.sum b/go.work.sum deleted file mode 100644 index 7d82646..0000000 --- a/go.work.sum +++ /dev/null @@ -1,236 +0,0 @@ -cloud.google.com/go/accessapproval v1.7.5/go.mod h1:g88i1ok5dvQ9XJsxpUInWWvUBrIZhyPDPbk4T01OoJ0= -cloud.google.com/go/accesscontextmanager v1.8.5/go.mod h1:TInEhcZ7V9jptGNqN3EzZ5XMhT6ijWxTGjzyETwmL0Q= -cloud.google.com/go/aiplatform v1.62.2/go.mod h1:ViLUVST6/gJAR80fyZmFSOn77rPHDkXqZDMDr4Qb8OM= -cloud.google.com/go/analytics v0.23.0/go.mod h1:YPd7Bvik3WS95KBok2gPXDqQPHy08TsCQG6CdUCb+u0= -cloud.google.com/go/apigateway v1.6.5/go.mod h1:6wCwvYRckRQogyDDltpANi3zsCDl6kWi0b4Je+w2UiI= -cloud.google.com/go/apigeeconnect v1.6.5/go.mod h1:MEKm3AiT7s11PqTfKE3KZluZA9O91FNysvd3E6SJ6Ow= -cloud.google.com/go/apigeeregistry v0.8.3/go.mod h1:aInOWnqF4yMQx8kTjDqHNXjZGh/mxeNlAf52YqtASUs= -cloud.google.com/go/appengine v1.8.5/go.mod h1:uHBgNoGLTS5di7BvU25NFDuKa82v0qQLjyMJLuPQrVo= -cloud.google.com/go/area120 v0.8.5/go.mod h1:BcoFCbDLZjsfe4EkCnEq1LKvHSK0Ew/zk5UFu6GMyA0= -cloud.google.com/go/artifactregistry v1.14.7/go.mod h1:0AUKhzWQzfmeTvT4SjfI4zjot72EMfrkvL9g9aRjnnM= -cloud.google.com/go/asset v1.18.0/go.mod h1:JnuX7WLUc55AFKJOqF0n7gBPZostxZQCHPEu2WQ1980= -cloud.google.com/go/assuredworkloads v1.11.5/go.mod h1:FKJ3g3ZvkL2D7qtqIGnDufFkHxwIpNM9vtmhvt+6wqk= -cloud.google.com/go/automl v1.13.5/go.mod h1:MDw3vLem3yh+SvmSgeYUmUKqyls6NzSumDm9OJ3xJ1Y= -cloud.google.com/go/baremetalsolution v1.2.4/go.mod h1:BHCmxgpevw9IEryE99HbYEfxXkAEA3hkMJbYYsHtIuY= -cloud.google.com/go/batch v1.8.2/go.mod h1:QA8HAbPZ1tTcTFZmRgk7v13i0tNQ9x6s1wsZl6jZQh0= -cloud.google.com/go/beyondcorp v1.0.4/go.mod h1:Gx8/Rk2MxrvWfn4WIhHIG1NV7IBfg14pTKv1+EArVcc= -cloud.google.com/go/bigquery v1.59.1/go.mod h1:VP1UJYgevyTwsV7desjzNzDND5p6hZB+Z8gZJN1GQUc= -cloud.google.com/go/billing v1.18.3/go.mod h1:RuLq6KCY/YQfB2X/hCv3xpsrrBCdxnMS0pJcL7qqx5w= -cloud.google.com/go/binaryauthorization v1.8.1/go.mod h1:1HVRyBerREA/nhI7yLang4Zn7vfNVA3okoAR9qYQJAQ= -cloud.google.com/go/certificatemanager v1.7.5/go.mod h1:uX+v7kWqy0Y3NG/ZhNvffh0kuqkKZIXdvlZRO7z0VtM= -cloud.google.com/go/channel v1.17.5/go.mod h1:FlpaOSINDAXgEext0KMaBq/vwpLMkkPAw9b2mApQeHc= -cloud.google.com/go/cloudbuild v1.15.1/go.mod h1:gIofXZSu+XD2Uy+qkOrGKEx45zd7s28u/k8f99qKals= -cloud.google.com/go/clouddms v1.7.4/go.mod h1:RdrVqoFG9RWI5AvZ81SxJ/xvxPdtcRhFotwdE79DieY= -cloud.google.com/go/cloudtasks v1.12.6/go.mod h1:b7c7fe4+TJsFZfDyzO51F7cjq7HLUlRi/KZQLQjDsaY= -cloud.google.com/go/contactcenterinsights v1.13.0/go.mod h1:ieq5d5EtHsu8vhe2y3amtZ+BE+AQwX5qAy7cpo0POsI= -cloud.google.com/go/container v1.33.0/go.mod h1:u5QBBv/V9dVNK/NtTppCf6T4P8gzp+dQSwx2DqPnAKc= -cloud.google.com/go/containeranalysis v0.11.4/go.mod h1:cVZT7rXYBS9NG1rhQbWL9pWbXCKHWJPYraE8/FTSYPE= -cloud.google.com/go/datacatalog v1.19.3/go.mod h1:ra8V3UAsciBpJKQ+z9Whkxzxv7jmQg1hfODr3N3YPJ4= -cloud.google.com/go/dataflow v0.9.5/go.mod h1:udl6oi8pfUHnL0z6UN9Lf9chGqzDMVqcYTcZ1aPnCZQ= -cloud.google.com/go/dataform v0.9.2/go.mod h1:S8cQUwPNWXo7m/g3DhWHsLBoufRNn9EgFrMgne2j7cI= -cloud.google.com/go/datafusion v1.7.5/go.mod h1:bYH53Oa5UiqahfbNK9YuYKteeD4RbQSNMx7JF7peGHc= -cloud.google.com/go/datalabeling v0.8.5/go.mod h1:IABB2lxQnkdUbMnQaOl2prCOfms20mcPxDBm36lps+s= -cloud.google.com/go/dataplex v1.14.2/go.mod h1:0oGOSFlEKef1cQeAHXy4GZPB/Ife0fz/PxBf+ZymA2U= -cloud.google.com/go/dataproc/v2 v2.4.0/go.mod h1:3B1Ht2aRB8VZIteGxQS/iNSJGzt9+CA0WGnDVMEm7Z4= -cloud.google.com/go/dataqna v0.8.5/go.mod h1:vgihg1mz6n7pb5q2YJF7KlXve6tCglInd6XO0JGOlWM= -cloud.google.com/go/datastore v1.15.0/go.mod h1:GAeStMBIt9bPS7jMJA85kgkpsMkvseWWXiaHya9Jes8= -cloud.google.com/go/datastream v1.10.4/go.mod h1:7kRxPdxZxhPg3MFeCSulmAJnil8NJGGvSNdn4p1sRZo= -cloud.google.com/go/deploy v1.17.1/go.mod h1:SXQyfsXrk0fBmgBHRzBjQbZhMfKZ3hMQBw5ym7MN/50= -cloud.google.com/go/dialogflow v1.49.0/go.mod h1:dhVrXKETtdPlpPhE7+2/k4Z8FRNUp6kMV3EW3oz/fe0= -cloud.google.com/go/dlp v1.12.0/go.mod h1:IUCT4ZMALgUqQyy2VMhvfYD/yFQFfbsgk1d7RoSLeSk= -cloud.google.com/go/documentai v1.26.0/go.mod h1:9YCBSv7aXXS88lpXQWcJbLB490u3WeQdGt5aGCkHGkA= -cloud.google.com/go/domains v0.9.5/go.mod h1:dBzlxgepazdFhvG7u23XMhmMKBjrkoUNaw0A8AQB55Y= -cloud.google.com/go/edgecontainer v1.1.5/go.mod h1:rgcjrba3DEDEQAidT4yuzaKWTbkTI5zAMu3yy6ZWS0M= -cloud.google.com/go/errorreporting v0.3.0/go.mod h1:xsP2yaAp+OAW4OIm60An2bbLpqIhKXdWR/tawvl7QzU= -cloud.google.com/go/essentialcontacts v1.6.6/go.mod h1:XbqHJGaiH0v2UvtuucfOzFXN+rpL/aU5BCZLn4DYl1Q= -cloud.google.com/go/eventarc v1.13.4/go.mod h1:zV5sFVoAa9orc/52Q+OuYUG9xL2IIZTbbuTHC6JSY8s= -cloud.google.com/go/filestore v1.8.1/go.mod h1:MbN9KcaM47DRTIuLfQhJEsjaocVebNtNQhSLhKCF5GM= -cloud.google.com/go/firestore v1.15.0/go.mod h1:GWOxFXcv8GZUtYpWHw/w6IuYNux/BtmeVTMmjrm4yhk= -cloud.google.com/go/functions v1.16.0/go.mod h1:nbNpfAG7SG7Duw/o1iZ6ohvL7mc6MapWQVpqtM29n8k= -cloud.google.com/go/gkebackup v1.3.5/go.mod h1:KJ77KkNN7Wm1LdMopOelV6OodM01pMuK2/5Zt1t4Tvc= -cloud.google.com/go/gkeconnect v0.8.5/go.mod h1:LC/rS7+CuJ5fgIbXv8tCD/mdfnlAadTaUufgOkmijuk= -cloud.google.com/go/gkehub v0.14.5/go.mod h1:6bzqxM+a+vEH/h8W8ec4OJl4r36laxTs3A/fMNHJ0wA= -cloud.google.com/go/gkemulticloud v1.1.1/go.mod h1:C+a4vcHlWeEIf45IB5FFR5XGjTeYhF83+AYIpTy4i2Q= -cloud.google.com/go/gsuiteaddons v1.6.5/go.mod h1:Lo4P2IvO8uZ9W+RaC6s1JVxo42vgy+TX5a6hfBZ0ubs= -cloud.google.com/go/iap v1.9.4/go.mod h1:vO4mSq0xNf/Pu6E5paORLASBwEmphXEjgCFg7aeNu1w= -cloud.google.com/go/ids v1.4.5/go.mod h1:p0ZnyzjMWxww6d2DvMGnFwCsSxDJM666Iir1bK1UuBo= -cloud.google.com/go/iot v1.7.5/go.mod h1:nq3/sqTz3HGaWJi1xNiX7F41ThOzpud67vwk0YsSsqs= -cloud.google.com/go/language v1.12.3/go.mod h1:evFX9wECX6mksEva8RbRnr/4wi/vKGYnAJrTRXU8+f8= -cloud.google.com/go/lifesciences v0.9.5/go.mod h1:OdBm0n7C0Osh5yZB7j9BXyrMnTRGBJIZonUMxo5CzPw= -cloud.google.com/go/managedidentities v1.6.5/go.mod h1:fkFI2PwwyRQbjLxlm5bQ8SjtObFMW3ChBGNqaMcgZjI= -cloud.google.com/go/maps v1.7.0/go.mod h1:LqhDUCNSDAH6MvvubxDm7lPfHPhn6MduIaGCZ4iY1Ig= -cloud.google.com/go/mediatranslation v0.8.5/go.mod h1:y7kTHYIPCIfgyLbKncgqouXJtLsU+26hZhHEEy80fSs= -cloud.google.com/go/memcache v1.10.5/go.mod h1:/FcblbNd0FdMsx4natdj+2GWzTq+cjZvMa1I+9QsuMA= -cloud.google.com/go/metastore v1.13.4/go.mod h1:FMv9bvPInEfX9Ac1cVcRXp8EBBQnBcqH6gz3KvJ9BAE= -cloud.google.com/go/monitoring v1.18.0/go.mod h1:c92vVBCeq/OB4Ioyo+NbN2U7tlg5ZH41PZcdvfc+Lcg= -cloud.google.com/go/networkconnectivity v1.14.4/go.mod h1:PU12q++/IMnDJAB+3r+tJtuCXCfwfN+C6Niyj6ji1Po= -cloud.google.com/go/networkmanagement v1.9.4/go.mod h1:daWJAl0KTFytFL7ar33I6R/oNBH8eEOX/rBNHrC/8TA= -cloud.google.com/go/networksecurity v0.9.5/go.mod h1:KNkjH/RsylSGyyZ8wXpue8xpCEK+bTtvof8SBfIhMG8= -cloud.google.com/go/notebooks v1.11.3/go.mod h1:0wQyI2dQC3AZyQqWnRsp+yA+kY4gC7ZIVP4Qg3AQcgo= -cloud.google.com/go/optimization v1.6.3/go.mod h1:8ve3svp3W6NFcAEFr4SfJxrldzhUl4VMUJmhrqVKtYA= -cloud.google.com/go/orchestration v1.9.0/go.mod h1:sq28tiaY9crFRQlxIcYUupwq3Tr5fLctHmDlc+3WE9c= -cloud.google.com/go/orgpolicy v1.12.1/go.mod h1:aibX78RDl5pcK3jA8ysDQCFkVxLj3aOQqrbBaUL2V5I= -cloud.google.com/go/osconfig v1.12.5/go.mod h1:D9QFdxzfjgw3h/+ZaAb5NypM8bhOMqBzgmbhzWViiW8= -cloud.google.com/go/oslogin v1.13.1/go.mod h1:vS8Sr/jR7QvPWpCjNqy6LYZr5Zs1e8ZGW/KPn9gmhws= -cloud.google.com/go/phishingprotection v0.8.5/go.mod h1:g1smd68F7mF1hgQPuYn3z8HDbNre8L6Z0b7XMYFmX7I= -cloud.google.com/go/policytroubleshooter v1.10.3/go.mod h1:+ZqG3agHT7WPb4EBIRqUv4OyIwRTZvsVDHZ8GlZaoxk= -cloud.google.com/go/privatecatalog v0.9.5/go.mod h1:fVWeBOVe7uj2n3kWRGlUQqR/pOd450J9yZoOECcQqJk= -cloud.google.com/go/pubsub v1.37.0/go.mod h1:YQOQr1uiUM092EXwKs56OPT650nwnawc+8/IjoUeGzQ= -cloud.google.com/go/pubsublite v1.8.1/go.mod h1:fOLdU4f5xldK4RGJrBMm+J7zMWNj/k4PxwEZXy39QS0= -cloud.google.com/go/recaptchaenterprise/v2 v2.11.0/go.mod h1:AgMf7QG7DBLcv8dstOz9+9dohjfh76IhBrkFxWdDL5Y= -cloud.google.com/go/recommendationengine v0.8.5/go.mod h1:A38rIXHGFvoPvmy6pZLozr0g59NRNREz4cx7F58HAsQ= -cloud.google.com/go/recommender v1.12.1/go.mod h1:gf95SInWNND5aPas3yjwl0I572dtudMhMIG4ni8nr+0= -cloud.google.com/go/redis v1.14.2/go.mod h1:g0Lu7RRRz46ENdFKQ2EcQZBAJ2PtJHJLuiiRuEXwyQw= -cloud.google.com/go/resourcemanager v1.9.5/go.mod h1:hep6KjelHA+ToEjOfO3garMKi/CLYwTqeAw7YiEI9x8= -cloud.google.com/go/resourcesettings v1.6.5/go.mod h1:WBOIWZraXZOGAgoR4ukNj0o0HiSMO62H9RpFi9WjP9I= -cloud.google.com/go/retail v1.16.0/go.mod h1:LW7tllVveZo4ReWt68VnldZFWJRzsh9np+01J9dYWzE= -cloud.google.com/go/run v1.3.5/go.mod h1:AuT4W7a7gq7TUa0GrX9F6w/uiUoWHIV767yhqXqcbeg= -cloud.google.com/go/scheduler v1.10.6/go.mod h1:pe2pNCtJ+R01E06XCDOJs1XvAMbv28ZsQEbqknxGOuE= -cloud.google.com/go/secretmanager v1.11.5/go.mod h1:eAGv+DaCHkeVyQi0BeXgAHOU0RdrMeZIASKc+S7VqH4= -cloud.google.com/go/security v1.15.5/go.mod h1:KS6X2eG3ynWjqcIX976fuToN5juVkF6Ra6c7MPnldtc= -cloud.google.com/go/securitycenter v1.27.0/go.mod h1:J8BkC1KQ59pzVwFZ9OiqcKL57JwPNEv8SMxfVztjqD0= -cloud.google.com/go/servicedirectory v1.11.4/go.mod h1:Bz2T9t+/Ehg6x+Y7Ycq5xiShYLD96NfEsWNHyitj1qM= -cloud.google.com/go/shell v1.7.5/go.mod h1:hL2++7F47/IfpfTO53KYf1EC+F56k3ThfNEXd4zcuiE= -cloud.google.com/go/spanner v1.58.0/go.mod h1:eSpP+aaT38sdwFs0ovo7Z1VsG9RyM9n7EHpM5DhDEsE= -cloud.google.com/go/speech v1.22.0/go.mod h1:d7pmrSKyrD12c7dRrjqgA/U0eeyZs0i4VpvOlpJXEBA= -cloud.google.com/go/storagetransfer v1.10.4/go.mod h1:vef30rZKu5HSEf/x1tK3WfWrL0XVoUQN/EPDRGPzjZs= -cloud.google.com/go/talent v1.6.6/go.mod h1:y/WQDKrhVz12WagoarpAIyKKMeKGKHWPoReZ0g8tseQ= -cloud.google.com/go/texttospeech v1.7.5/go.mod h1:tzpCuNWPwrNJnEa4Pu5taALuZL4QRRLcb+K9pbhXT6M= -cloud.google.com/go/tpu v1.6.5/go.mod h1:P9DFOEBIBhuEcZhXi+wPoVy/cji+0ICFi4TtTkMHSSs= -cloud.google.com/go/trace v1.10.5/go.mod h1:9hjCV1nGBCtXbAE4YK7OqJ8pmPYSxPA0I67JwRd5s3M= -cloud.google.com/go/translate v1.10.1/go.mod h1:adGZcQNom/3ogU65N9UXHOnnSvjPwA/jKQUMnsYXOyk= -cloud.google.com/go/video v1.20.4/go.mod h1:LyUVjyW+Bwj7dh3UJnUGZfyqjEto9DnrvTe1f/+QrW0= -cloud.google.com/go/videointelligence v1.11.5/go.mod h1:/PkeQjpRponmOerPeJxNPuxvi12HlW7Em0lJO14FC3I= -cloud.google.com/go/vision/v2 v2.8.0/go.mod h1:ocqDiA2j97pvgogdyhoxiQp2ZkDCyr0HWpicywGGRhU= -cloud.google.com/go/vmmigration v1.7.5/go.mod h1:pkvO6huVnVWzkFioxSghZxIGcsstDvYiVCxQ9ZH3eYI= -cloud.google.com/go/vmwareengine v1.1.1/go.mod h1:nMpdsIVkUrSaX8UvmnBhzVzG7PPvNYc5BszcvIVudYs= -cloud.google.com/go/vpcaccess v1.7.5/go.mod h1:slc5ZRvvjP78c2dnL7m4l4R9GwL3wDLcpIWz6P/ziig= -cloud.google.com/go/webrisk v1.9.5/go.mod h1:aako0Fzep1Q714cPEM5E+mtYX8/jsfegAuS8aivxy3U= -cloud.google.com/go/websecurityscanner v1.6.5/go.mod h1:QR+DWaxAz2pWooylsBF854/Ijvuoa3FCyS1zBa1rAVQ= -cloud.google.com/go/workflows v1.12.4/go.mod h1:yQ7HUqOkdJK4duVtMeBCAOPiN1ZF1E9pAMX51vpwB/w= -contrib.go.opencensus.io/exporter/aws v0.0.0-20230502192102-15967c811cec/go.mod h1:uu1P0UCM/6RbsMrgPa98ll8ZcHM858i/AD06a9aLRCA= -contrib.go.opencensus.io/exporter/stackdriver v0.13.14/go.mod h1:5pSSGY0Bhuk7waTHuDf4aQ8D2DrhgETRo9fy6k3Xlzc= -contrib.go.opencensus.io/integrations/ocsql v0.1.7/go.mod h1:8DsSdjz3F+APR+0z0WkU1aRorQCFfRxvqjUUPMbF3fE= -filippo.io/edwards25519 v1.1.0/go.mod h1:BxyFTGdWcka3PhytdK4V28tE5sGfRvvvRV7EaN4VDT4= -github.com/AlecAivazis/survey/v2 v2.3.7/go.mod h1:xUTIdE4KCOIjsBAE1JYsUPoCqYdZ1reCfTwbto0Fduo= -github.com/Azure/azure-amqp-common-go/v3 v3.2.3/go.mod h1:7rPmbSfszeovxGfc5fSAXE4ehlXQZHpMja2OtxC2Tas= -github.com/Azure/azure-sdk-for-go v66.0.0+incompatible h1:bmmC38SlE8/E81nNADlgmVGurPWMHDX2YNXVQMrBpEE= -github.com/Azure/azure-sdk-for-go v66.0.0+incompatible/go.mod h1:9XXNKU+eRnpl9moKnB4QOLf1HestfXbmab5FXxiDBjc= -github.com/Azure/azure-sdk-for-go/sdk/messaging/azservicebus v1.6.1/go.mod h1:xNjFERdhyMqZncbNJSPBsTCddk5kwsUVUzELQPMj/LA= -github.com/Azure/azure-sdk-for-go/sdk/storage/azblob v1.3.1/go.mod h1:SUZc9YRRHfx2+FAQKNDGrssXehqLpxmwRv2mC/5ntj4= -github.com/Azure/go-amqp v1.0.5/go.mod h1:vZAogwdrkbyK3Mla8m/CxSc/aKdnTZ4IbPxl51Y5WZE= -github.com/Azure/go-ansiterm v0.0.0-20210617225240-d185dfc1b5a1/go.mod h1:xomTg63KZ2rFqZQzSB4Vz2SUXa1BpHTVz9L5PTmPC4E= -github.com/Azure/go-autorest v14.2.0+incompatible/go.mod h1:r+4oMnoxhatjLLJ6zxSWATqVooLgysK6ZNox3g/xq24= -github.com/Azure/go-autorest/autorest v0.11.28/go.mod h1:MrkzG3Y3AH668QyF9KRk5neJnGgmhQ6krbhR8Q5eMvA= -github.com/Azure/go-autorest/autorest/adal v0.9.21/go.mod h1:zua7mBUaCc5YnSLKYgGJR/w5ePdMDA6H56upLsHzA9U= -github.com/Azure/go-autorest/autorest/azure/auth v0.5.11/go.mod h1:84w/uV8E37feW2NCJ08uT9VBfjfUHpgLVnG2InYD6cg= -github.com/Azure/go-autorest/autorest/azure/cli v0.4.6/go.mod h1:piCfgPho7BiIDdEQ1+g4VmKyD5y+p/XtSNqE6Hc4QD0= -github.com/Azure/go-autorest/autorest/date v0.3.0/go.mod h1:BI0uouVdmngYNUzGWeSYnokU+TrmwEsOqdt8Y6sso74= -github.com/Azure/go-autorest/autorest/to v0.4.0/go.mod h1:fE8iZBn7LQR7zH/9XU2NcPR4o9jEImooCeWJcYV/zLE= -github.com/Azure/go-autorest/autorest/validation v0.3.1/go.mod h1:yhLgjC0Wda5DYXl6JAsWyUe4KVNffhoDhG0zVzUMo3E= -github.com/Azure/go-autorest/logger v0.2.1/go.mod h1:T9E3cAhj2VqvPOtCYAvby9aBXkZmbF5NWuPV8+WeEW8= -github.com/Azure/go-autorest/tracing v0.6.0/go.mod h1:+vhtPC754Xsa23ID7GlGsrdKBpUA79WCAKPPZVC2DeU= -github.com/GoogleCloudPlatform/cloudsql-proxy v1.34.0/go.mod h1:XNDFTVaBS0jJYam3A88dpdzImNh0RRhBF4k05CNEENs= -github.com/Kunde21/markdownfmt/v3 v3.1.0/go.mod h1:tPXN1RTyOzJwhfHoon9wUr4HGYmWgVxSQN6VBJDkrVc= -github.com/Netflix/go-expect v0.0.0-20220104043353-73e0943537d2/go.mod h1:HBCaDeC1lPdgDeDbhX8XFpy1jqjK0IBG8W5K+xYqA0w= -github.com/acarl005/stripansi v0.0.0-20180116102854-5a71ef0e047d/go.mod h1:asat636LX7Bqt5lYEZ27JNDcqxfjdBQuJ/MM4CN/Lzo= -github.com/acomagu/bufpipe v1.0.3/go.mod h1:mxdxdup/WdsKVreO5GpW4+M/1CE2sMG4jeGJ2sYmHc4= -github.com/alecthomas/chroma v0.10.0/go.mod h1:jtJATyUxlIORhUOFNA9NZDWGAQ8wpxQQqNSB4rjA/1s= -github.com/alecthomas/chroma/v2 v2.13.0/go.mod h1:BUGjjsD+ndS6eX37YgTchSEG+Jg9Jv1GiZs9sqPqztk= -github.com/apparentlymart/go-dump v0.0.0-20180507223929-23540a00eaa3/go.mod h1:oL81AME2rN47vu18xqj1S1jPIPuN7afo62yKTNn3XMM= -github.com/apparentlymart/go-textseg/v13 v13.0.0/go.mod h1:ZK2fH7c4NqDTLtiYLvIkEghdlcqw7yxLeM89kiTRPUo= -github.com/armon/go-metrics v0.4.0/go.mod h1:E6amYzXo6aW1tqzoZGT755KkbgrJsSdpwZ+3JqfkOG4= -github.com/aws/aws-sdk-go-v2/service/secretsmanager v1.28.2/go.mod h1:GvNHKQAAOSKjmlccE/+Ww2gDbwYP9EewIuvWiQSquQs= -github.com/aws/aws-sdk-go-v2/service/sns v1.29.2/go.mod h1:ZIs7/BaYel9NODoYa8PW39o15SFAXDEb4DxOG2It15U= -github.com/aws/aws-sdk-go-v2/service/sqs v1.31.2/go.mod h1:J3XhTE+VsY1jDsdDY+ACFAppZj/gpvygzC5JE0bTLbQ= -github.com/aws/aws-sdk-go-v2/service/ssm v1.49.2/go.mod h1:loBAHYxz7JyucJvq4xuW9vunu8iCzjNYfSrQg2QEczA= -github.com/aymerick/douceur v0.2.0/go.mod h1:wlT5vV2O3h55X9m7iVYN0TBM0NH/MmbLnd30/FjWUq4= -github.com/bmatcuk/doublestar/v4 v4.6.1/go.mod h1:xBQ8jztBU6kakFMg+8WGxn0c6z1fTSPVIjEY1Wr7jzc= -github.com/bwesterb/go-ristretto v1.2.3/go.mod h1:fUIoIZaG73pV5biE2Blr2xEzDoMj7NFEuV9ekS419A0= -github.com/ccojocar/zxcvbn-go v1.0.1/go.mod h1:g1qkXtUSvHP8lhHp5GrSmTz6uWALGRMQdw6Qnz/hi60= -github.com/cenkalti/backoff/v4 v4.2.1/go.mod h1:Y3VNntkOUPxTVeUxJ/G5vcM//AlwfmyYozVcomhLiZE= -github.com/census-instrumentation/opencensus-proto v0.4.1/go.mod h1:4T9NM4+4Vw91VeyqjLS6ao50K5bOcLKN6Q42XnYaRYw= -github.com/cespare/xxhash/v2 v2.2.0/go.mod h1:VGX0DQ3Q6kWi7AoAeZDth3/j3BFtOZR5XLFGgcrjCOs= -github.com/charmbracelet/glamour v0.6.0/go.mod h1:taqWV4swIMMbWALc0m7AfE9JkPSU8om2538k9ITBxOc= -github.com/charmbracelet/harmonica v0.2.0/go.mod h1:KSri/1RMQOZLbw7AHqgcBycp8pgJnQMYYT8QZRqZ1Ao= -github.com/cncf/xds/go v0.0.0-20231128003011-0fa0005c9caa/go.mod h1:x/1Gn8zydmfq8dk6e9PdstVsDgu9RuyIIJqAaF//0IM= -github.com/creack/pty v1.1.17/go.mod h1:MOBLtS5ELjhRRrroQr9kyvTxUAFNvYEK993ew/Vr4O4= -github.com/dimchansky/utfbom v1.1.1/go.mod h1:SxdoEBH5qIqFocHMyGOXVAybYJdr71b1Q/j0mACtrfE= -github.com/dlclark/regexp2 v1.11.0/go.mod h1:DHkYz0B9wPfa6wondMfaivmHpzrQ3v9q8cnmRbL6yW8= -github.com/dnaeon/go-vcr v1.1.0/go.mod h1:M7tiix8f0r6mKKJ3Yq/kqU1OYf3MnfmBWVbPx/yU9ko= -github.com/docker/go-units v0.5.0/go.mod h1:fgPhTUdO+D/Jk86RDLlptpiXQzgHJF7gydDDbaIK4Dk= -github.com/dustin/go-humanize v1.0.1/go.mod h1:Mu1zIs6XwVuF/gI1OepvI0qD18qycQx+mFykh5fBlto= -github.com/envoyproxy/go-control-plane v0.12.0/go.mod h1:ZBTaoJ23lqITozF0M6G4/IragXCQKCnYbmlmtHvwRG0= -github.com/envoyproxy/protoc-gen-validate v1.0.4/go.mod h1:qys6tmnRsYrQqIhm2bvKZH4Blx/1gTIZ2UKVY1M+Yew= -github.com/erikgeiser/promptkit v0.9.0/go.mod h1:pU9dtogSe3Jlc2AY77EP7R4WFP/vgD4v+iImC83KsCo= -github.com/fsnotify/fsnotify v1.7.0/go.mod h1:40Bi/Hjc2AVfZrqy+aj+yEI+/bRxZnMJyTJwOpGvigM= -github.com/gedex/inflector v0.0.0-20170307190818-16278e9db813/go.mod h1:P+oSoE9yhSRvsmYyZsshflcR6ePWYLql6UU1amW13IM= -github.com/go-ole/go-ole v1.2.6/go.mod h1:pprOEPIfldk/42T2oK7lQ4v4JSDwmV0As9GaiUsvbm0= -github.com/go-sql-driver/mysql v1.8.0/go.mod h1:wEBSXgmK//2ZFJyE+qWnIsVGmvmEKlqwuVSjsCm7DZg= -github.com/golang-jwt/jwt v3.2.1+incompatible h1:73Z+4BJcrTC+KczS6WvTPvRGOp1WmfEP4Q1lOd9Z/+c= -github.com/golang-jwt/jwt v3.2.1+incompatible/go.mod h1:8pz2t5EyA70fFQQSrl6XZXzqecmYZeUEB8OUGHkxJ+I= -github.com/golang-jwt/jwt/v4 v4.4.2/go.mod h1:m21LjoU+eqJr34lmDMbreY2eSTRJ1cv77w39/MY0Ch0= -github.com/golang/snappy v0.0.4/go.mod h1:/XxbfmMg8lxefKM7IXC3fBNl/7bRcc72aCRzEWrmP2Q= -github.com/google/go-pkcs11 v0.2.1-0.20230907215043-c6f79328ddf9/go.mod h1:6eQoGcuNJpa7jnd5pMGdkSaQpNDYvPlXWMcjXXThLlY= -github.com/google/pprof v0.0.0-20230406165453-00490a63f317/go.mod h1:79YE0hCXdHag9sBkw2o+N/YnZtTkXi0UT9Nnixa5eYk= -github.com/gorilla/css v1.0.0/go.mod h1:Dn721qIggHpt4+EFCcTLTU/vk5ySda2ReITrtgBl60c= -github.com/grpc-ecosystem/grpc-gateway/v2 v2.16.0/go.mod h1:YN5jB8ie0yfIUg6VvR9Kz84aCaG7AsGZnLjhHbUqwPg= -github.com/hashicorp/cli v1.1.6/go.mod h1:MPon5QYlgjjo0BSoAiN0ESeT5fRzDjVRp+uioJ0piz4= -github.com/hashicorp/go-immutable-radix v1.3.1/go.mod h1:0y9vanUI8NX6FsYoO3zeMjhV/C5i9g4Q3DwcSNZ4P60= -github.com/hashicorp/go-secure-stdlib/mlock v0.1.2/go.mod h1:zq93CJChV6L9QTfGKtfBxKqD7BqqXx5O04A/ns2p5+I= -github.com/hashicorp/golang-lru v0.5.4/go.mod h1:iADmTwqILo4mZ8BN3D2Q6+9jd8WM5uGBxy+E8yxSoD4= -github.com/hashicorp/terraform-plugin-docs v0.19.1/go.mod h1:NPfKCSfzTtq+YCFHr2qTAMknWUxR8C4KgTbGkHULSV8= -github.com/hashicorp/vault/sdk v0.6.1/go.mod h1:Ck4JuAC6usTphfrrRJCRH+7/N7O2ozZzkm/fzQFt4uM= -github.com/hinshun/vt10x v0.0.0-20220301184237-5011da428d02/go.mod h1:Q48J4R4DvxnHolD5P8pOtXigYlRuPLGl6moFx3ulM68= -github.com/ijc/Gotty v0.0.0-20170406111628-a8b993ba6abd/go.mod h1:3LVOLeyx9XVvwPgrt2be44XgSqndprz1G18rSk8KD84= -github.com/kballard/go-shellquote v0.0.0-20180428030007-95032a82bc51/go.mod h1:CzGEWj7cYgsdH8dAjBGEr58BoE7ScuLd+fwFZ44+/x8= -github.com/lib/pq v1.10.9/go.mod h1:AlVN5x4E4T544tWzH6hKfbfQvm3HdbOxrmggDNAPY9o= -github.com/lufia/plan9stats v0.0.0-20211012122336-39d0f177ccd0/go.mod h1:zJYVVT2jmtg6P3p1VtQj7WsuWi/y4VnjVBn7F8KPB3I= -github.com/mgutz/ansi v0.0.0-20170206155736-9520e82c474b/go.mod h1:01TrycV0kFyexm33Z7vhZRXopbI8J3TDReVlkTgMUxE= -github.com/microcosm-cc/bluemonday v1.0.21/go.mod h1:ytNkv4RrDrLJ2pqlsSI46O6IVXmZOBBD4SaJyDwwTkM= -github.com/mmcloughlin/avo v0.5.0/go.mod h1:ChHFdoV7ql95Wi7vuq2YT1bwCJqiWdZrQ1im3VujLYM= -github.com/moby/moby v25.0.4+incompatible/go.mod h1:fDXVQ6+S340veQPv35CzDahGBmHsiclFwfEygB/TWMc= -github.com/moby/term v0.0.0-20210619224110-3f7ff695adc6/go.mod h1:E2VnQOmVuvZB6UYnnDB0qG5Nq/1tD9acaOpo6xmt0Kw= -github.com/montanaflynn/stats v0.7.0/go.mod h1:etXPPgVO6n31NxCd9KQUMvCM+ve0ruNzt6R8Bnaayow= -github.com/mxschmitt/golang-combinations v1.0.0/go.mod h1:RbMhWvfCelHR6WROvT2bVfxJvZHoEvBj71SKe+H0MYU= -github.com/nbutton23/zxcvbn-go v0.0.0-20180912185939-ae427f1e4c1d/go.mod h1:o96djdrsSGy3AWPyBgZMAGfxZNfgntdJG+11KU4QvbU= -github.com/niemeyer/pretty v0.0.0-20200227124842-a10e7caefd8e/go.mod h1:zD1mROLANZcx1PVRCS0qkT7pwLkGfwJo4zjcN/Tysno= -github.com/nxadm/tail v1.4.11/go.mod h1:OTaG3NK980DZzxbRq6lEuzgU+mug70nY11sMd4JXXHc= -github.com/olekukonko/tablewriter v0.0.5/go.mod h1:hPp6KlRPjbx+hW8ykQs1w3UBbZlj6HuIJcUGPhkA7kY= -github.com/petar-dambovaliev/aho-corasick v0.0.0-20230725210150-fb29fc3c913e/go.mod h1:EHPiTAKtiFmrMldLUNswFwfZ2eJIYBHktdaUTZxYWRw= -github.com/pgavlin/diff v0.0.0-20230503175810-113847418e2e/go.mod h1:WGwlmuPAiQTGQUjxyAfP7j4JgbgiFvFpI/qRtsQtS/4= -github.com/pgavlin/text v0.0.0-20230428184845-84c285f11d2f/go.mod h1:fk4+YyTLi0Ap0CsL1HA70/tAs6evqw3hbPGdR8rD/3E= -github.com/pierrec/lz4 v2.6.1+incompatible/go.mod h1:pdkljMzZIN41W+lC3N2tnIh5sFi+IEE17M5jbnwPHcY= -github.com/power-devops/perfstat v0.0.0-20210106213030-5aafc221ea8c/go.mod h1:OmDBASR4679mdNQnz2pUhc2G8CO2JrUAVFDRBDP/hJE= -github.com/prometheus/prometheus v0.50.1/go.mod h1:FvE8dtQ1Ww63IlyKBn1V4s+zMwF9kHkVNkQBR1pM4CU= -github.com/ryanuber/columnize v2.1.2+incompatible/go.mod h1:sm1tb6uqfes/u+d4ooFouqFdy9/2g9QGwK3SQygK0Ts= -github.com/sahilm/fuzzy v0.1.0/go.mod h1:VFvziUEIMCrT6A6tw2RFIXPXXmzXbOsSHF0DOI8ZK9Y= -github.com/shirou/gopsutil/v3 v3.22.3/go.mod h1:D01hZJ4pVHPpCTZ3m3T2+wDF2YAGfd+H4ifUguaQzHM= -github.com/shurcooL/httpfs v0.0.0-20190707220628-8d4bc4ba7749/go.mod h1:ZY1cvUeJuFPAdZ/B6v7RHavJWZn2YPVFQ1OSXhCGOkg= -github.com/shurcooL/vfsgen v0.0.0-20200824052919-0d455de96546/go.mod h1:TrYk7fJVaAttu97ZZKrO9UbRa8izdowaMIZcxYMbVaw= -github.com/sourcegraph/appdash-data v0.0.0-20151005221446-73f23eafcf67/go.mod h1:tNZjgbYncKL5HxvDULAr/mWDmFz4B7H8yrXEDlnoIiw= -github.com/tklauser/go-sysconf v0.3.10/go.mod h1:C8XykCvCb+Gn0oNCWPIlcb0RuglQTYaQ2hGm7jmxEFk= -github.com/tklauser/numcpus v0.4.0/go.mod h1:1+UI3pD8NW14VMwdgJNJ1ESk2UnwhAnz5hMwiKKqXCQ= -github.com/xdg-go/pbkdf2 v1.0.0/go.mod h1:jrpuAogTd400dnrH08LKmI/xc1MbPOebTwRqcT5RDeI= -github.com/xdg-go/scram v1.1.2/go.mod h1:RT/sEzTbU5y00aCK8UOx6R7YryM0iF1N2MOmC3kKLN4= -github.com/xdg-go/stringprep v1.0.4/go.mod h1:mPGuuIYwz7CmR2bT9j4GbQqutWS1zV24gijq1dTyGkM= -github.com/youmark/pkcs8 v0.0.0-20181117223130-1be2e3e5546d/go.mod h1:rHwXgn7JulP+udvsHwJoVG1YGAP6VLg4y9I5dyZdqmA= -github.com/yuin/goldmark v1.7.0/go.mod h1:uzxRWxtg69N339t3louHJ7+O03ezfj6PlliRlaOzY1E= -github.com/yuin/goldmark-emoji v1.0.1/go.mod h1:2w1E6FEWLcDQkoTE+7HU6QF1F6SLlNGjRIBbIZQFqkQ= -github.com/yuin/goldmark-meta v1.1.0/go.mod h1:U4spWENafuA7Zyg+Lj5RqK/MF+ovMYtBvXi1lBb2VP0= -github.com/yusufpapurcu/wmi v1.2.2/go.mod h1:SBZ9tNy3G9/m5Oi98Zks0QjeHVDvuK0qfxQmPyzfmi0= -github.com/zclconf/go-cty-debug v0.0.0-20191215020915-b22d67c1ba0b/go.mod h1:ZRKQfBXbGkpdV6QMzT3rU1kSTAnfu1dO8dPKjYprgj8= -go.abhg.dev/goldmark/frontmatter v0.2.0/go.mod h1:XqrEkZuM57djk7zrlRUB02x8I5J0px76YjkOzhB4YlU= -go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.19.0/go.mod h1:IPtUMKL4O3tH5y+iXVyAXqpAwMuzC1IrxVS81rummfE= -go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.19.0/go.mod h1:0+KuTDyKL4gjKCF75pHOX4wuzYDUZYfAQdSu43o+Z2I= -go.opentelemetry.io/proto/otlp v1.0.0/go.mod h1:Sy6pihPLfYHkr3NkUbEhGHFhINUSI/v80hjKIs5JXpM= -go.pennock.tech/tabular v1.1.3/go.mod h1:UzyxF5itNqTCS1ZGXfwDwbFgYj/lS+e67Fid68QOYZ0= -go.uber.org/multierr v1.11.0/go.mod h1:20+QtiLqy0Nd6FdQB9TLXag12DsQkrbs3htMFfDN80Y= -go.uber.org/zap v1.27.0/go.mod h1:GB2qFLM7cTU87MWRP2mPIjqfIDnGu+VIO4V/SdhGo2E= -golang.org/x/sys v0.14.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA= -golang.org/x/telemetry v0.0.0-20240521205824-bda55230c457/go.mod h1:pRgIJT+bRLFKnoM1ldnzKoxTIn14Yxz928LQRYYgIN0= -google.golang.org/genproto/googleapis/bytestream v0.0.0-20240304161311-37d4d3c04a78/go.mod h1:vh/N7795ftP0AkN1w8XKqN4w1OdUKXW5Eummda+ofv8= -gopkg.in/square/go-jose.v2 v2.6.0/go.mod h1:M9dMgbHiYLoDGQrXy7OpJDJWiKiU//h+vD76mk0e1AI= -gopkg.in/tomb.v1 v1.0.0-20141024135613-dd632973f1e7/go.mod h1:dt/ZhP58zS4L8KSrWDmTeBkI65Dw0HsyUHuEVlX15mw= -mvdan.cc/sh/v3 v3.7.0/go.mod h1:K2gwkaesF/D7av7Kxl0HbF5kGOd2ArupNTX3X44+8l8= -sourcegraph.com/sourcegraph/appdash v0.0.0-20211028080628-e2786a622600/go.mod h1:hI742Nqp5OhwiqlzhgfbWU4mW4yO10fP+LoT9WOswdU= diff --git a/provider/cmd/pulumi-resource-crowdstrike/schema.json b/provider/cmd/pulumi-resource-crowdstrike/schema.json index 13548f4..45b45e6 100644 --- a/provider/cmd/pulumi-resource-crowdstrike/schema.json +++ b/provider/cmd/pulumi-resource-crowdstrike/schema.json @@ -1569,7 +1569,7 @@ } }, "crowdstrike:index/hostGroup:HostGroup": { - "description": "This resource allows you to manage host groups in the CrowdStrike Falcon Platform.\n\n## API Scopes\n\nThe following API scopes are required:\n\n- Host groups | Read \u0026 Write\n- Firewall management | Read \u0026 Write\n- Prevention policies | Read \u0026 Write\n- Response policies | Read \u0026 Write\n- Sensor update policies | Read \u0026 Write\n\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as crowdstrike from \"@crowdstrike/pulumi\";\n\nconst example = new crowdstrike.HostGroup(\"example\", {\n description: \"Made with Pulumi\",\n type: \"dynamic\",\n assignmentRule: \"tags:'SensorGroupingTags/cloud-lab'+os_version:'Amazon Linux 2'\",\n});\nexport const hostGroup = example;\n```\n```python\nimport pulumi\nimport crowdstrike_pulumi as crowdstrike\n\nexample = crowdstrike.HostGroup(\"example\",\n description=\"Made with Pulumi\",\n type=\"dynamic\",\n assignment_rule=\"tags:'SensorGroupingTags/cloud-lab'+os_version:'Amazon Linux 2'\")\npulumi.export(\"hostGroup\", example)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Crowdstrike = CrowdStrike.Crowdstrike;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Crowdstrike.HostGroup(\"example\", new()\n {\n Description = \"Made with Pulumi\",\n Type = \"dynamic\",\n AssignmentRule = \"tags:'SensorGroupingTags/cloud-lab'+os_version:'Amazon Linux 2'\",\n });\n\n return new Dictionary\u003cstring, object?\u003e\n {\n [\"hostGroup\"] = example,\n };\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/crowdstrike/pulumi-crowdstrike/sdk/go/crowdstrike\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := crowdstrike.NewHostGroup(ctx, \"example\", \u0026crowdstrike.HostGroupArgs{\n\t\t\tDescription: pulumi.String(\"Made with Pulumi\"),\n\t\t\tType: pulumi.String(\"dynamic\"),\n\t\t\tAssignmentRule: pulumi.String(\"tags:'SensorGroupingTags/cloud-lab'+os_version:'Amazon Linux 2'\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tctx.Export(\"hostGroup\", example)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.crowdstrike.HostGroup;\nimport com.pulumi.crowdstrike.HostGroupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new HostGroup(\"example\", HostGroupArgs.builder()\n .description(\"Made with Pulumi\")\n .type(\"dynamic\")\n .assignmentRule(\"tags:'SensorGroupingTags/cloud-lab'+os_version:'Amazon Linux 2'\")\n .build());\n\n ctx.export(\"hostGroup\", example);\n }\n}\n```\n```yaml\nresources:\n example:\n type: crowdstrike:HostGroup\n properties:\n description: Made with Pulumi\n type: dynamic\n assignmentRule: tags:'SensorGroupingTags/cloud-lab'+os_version:'Amazon Linux 2'\noutputs:\n hostGroup: ${example}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nhost group can be imported by specifying the policy id.\n\n```sh\n$ pulumi import crowdstrike:index/hostGroup:HostGroup example 7fb858a949034a0cbca175f660f1e769\n```\n\n", + "description": "This resource allows you to manage host groups in the CrowdStrike Falcon Platform.\n\n## API Scopes\n\nThe following API scopes are required:\n\n- Host groups | Read \u0026 Write\n- Firewall management | Read \u0026 Write\n- Prevention policies | Read \u0026 Write\n- Response policies | Read \u0026 Write\n- Sensor update policies | Read \u0026 Write\n\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as crowdstrike from \"@crowdstrike/pulumi\";\n\nconst dynamic = new crowdstrike.HostGroup(\"dynamic\", {\n assignmentRule: \"tags:'SensorGroupingTags/molecule'+os_version:'Debian GNU 11'\",\n description: \"Made with Pulumi\",\n type: \"dynamic\",\n});\nconst static = new crowdstrike.HostGroup(\"static\", {\n description: \"Made with Pulumi\",\n type: \"static\",\n hostnames: [\n \"host1\",\n \"host2\",\n ],\n});\nconst staticByID = new crowdstrike.HostGroup(\"staticByID\", {\n description: \"Made with Pulumi\",\n type: \"staticByID\",\n hostIds: [\n \"123123\",\n \"124124\",\n ],\n});\nexport const hostGroup = dynamic;\n```\n```python\nimport pulumi\nimport crowdstrike_pulumi as crowdstrike\n\ndynamic = crowdstrike.HostGroup(\"dynamic\",\n assignment_rule=\"tags:'SensorGroupingTags/molecule'+os_version:'Debian GNU 11'\",\n description=\"Made with Pulumi\",\n type=\"dynamic\")\nstatic = crowdstrike.HostGroup(\"static\",\n description=\"Made with Pulumi\",\n type=\"static\",\n hostnames=[\n \"host1\",\n \"host2\",\n ])\nstatic_by_id = crowdstrike.HostGroup(\"staticByID\",\n description=\"Made with Pulumi\",\n type=\"staticByID\",\n host_ids=[\n \"123123\",\n \"124124\",\n ])\npulumi.export(\"hostGroup\", dynamic)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Crowdstrike = CrowdStrike.Crowdstrike;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var @dynamic = new Crowdstrike.HostGroup(\"dynamic\", new()\n {\n AssignmentRule = \"tags:'SensorGroupingTags/molecule'+os_version:'Debian GNU 11'\",\n Description = \"Made with Pulumi\",\n Type = \"dynamic\",\n });\n\n var @static = new Crowdstrike.HostGroup(\"static\", new()\n {\n Description = \"Made with Pulumi\",\n Type = \"static\",\n Hostnames = new[]\n {\n \"host1\",\n \"host2\",\n },\n });\n\n var staticByID = new Crowdstrike.HostGroup(\"staticByID\", new()\n {\n Description = \"Made with Pulumi\",\n Type = \"staticByID\",\n HostIds = new[]\n {\n \"123123\",\n \"124124\",\n },\n });\n\n return new Dictionary\u003cstring, object?\u003e\n {\n [\"hostGroup\"] = @dynamic,\n };\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/crowdstrike/pulumi-crowdstrike/sdk/go/crowdstrike\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tdynamic, err := crowdstrike.NewHostGroup(ctx, \"dynamic\", \u0026crowdstrike.HostGroupArgs{\n\t\t\tAssignmentRule: pulumi.String(\"tags:'SensorGroupingTags/molecule'+os_version:'Debian GNU 11'\"),\n\t\t\tDescription: pulumi.String(\"Made with Pulumi\"),\n\t\t\tType: pulumi.String(\"dynamic\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = crowdstrike.NewHostGroup(ctx, \"static\", \u0026crowdstrike.HostGroupArgs{\n\t\t\tDescription: pulumi.String(\"Made with Pulumi\"),\n\t\t\tType: pulumi.String(\"static\"),\n\t\t\tHostnames: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"host1\"),\n\t\t\t\tpulumi.String(\"host2\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = crowdstrike.NewHostGroup(ctx, \"staticByID\", \u0026crowdstrike.HostGroupArgs{\n\t\t\tDescription: pulumi.String(\"Made with Pulumi\"),\n\t\t\tType: pulumi.String(\"staticByID\"),\n\t\t\tHostIds: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"123123\"),\n\t\t\t\tpulumi.String(\"124124\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tctx.Export(\"hostGroup\", dynamic)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.crowdstrike.HostGroup;\nimport com.pulumi.crowdstrike.HostGroupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var dynamic = new HostGroup(\"dynamic\", HostGroupArgs.builder()\n .assignmentRule(\"tags:'SensorGroupingTags/molecule'+os_version:'Debian GNU 11'\")\n .description(\"Made with Pulumi\")\n .type(\"dynamic\")\n .build());\n\n var static_ = new HostGroup(\"static\", HostGroupArgs.builder()\n .description(\"Made with Pulumi\")\n .type(\"static\")\n .hostnames( \n \"host1\",\n \"host2\")\n .build());\n\n var staticByID = new HostGroup(\"staticByID\", HostGroupArgs.builder()\n .description(\"Made with Pulumi\")\n .type(\"staticByID\")\n .hostIds( \n \"123123\",\n \"124124\")\n .build());\n\n ctx.export(\"hostGroup\", dynamic);\n }\n}\n```\n```yaml\nresources:\n dynamic:\n type: crowdstrike:HostGroup\n properties:\n assignmentRule: tags:'SensorGroupingTags/molecule'+os_version:'Debian GNU 11'\n description: Made with Pulumi\n type: dynamic\n static:\n type: crowdstrike:HostGroup\n properties:\n description: Made with Pulumi\n type: static\n hostnames:\n - host1\n - host2\n staticByID:\n type: crowdstrike:HostGroup\n properties:\n description: Made with Pulumi\n type: staticByID\n hostIds:\n - '123123'\n - '124124'\noutputs:\n hostGroup: ${dynamic}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nhost group can be imported by specifying the policy id.\n\n```sh\n$ pulumi import crowdstrike:index/hostGroup:HostGroup example 7fb858a949034a0cbca175f660f1e769\n```\n\n", "properties": { "assignmentRule": { "type": "string", @@ -1579,6 +1579,20 @@ "type": "string", "description": "Description of the host group.\n" }, + "hostIds": { + "type": "array", + "items": { + "type": "string" + }, + "description": "List of host ids to add to a staticByID host group.\n" + }, + "hostnames": { + "type": "array", + "items": { + "type": "string" + }, + "description": "List of hostnames to add to a static host group.\n" + }, "lastUpdated": { "type": "string" }, @@ -1592,7 +1606,6 @@ } }, "required": [ - "assignmentRule", "description", "lastUpdated", "name", @@ -1607,6 +1620,20 @@ "type": "string", "description": "Description of the host group.\n" }, + "hostIds": { + "type": "array", + "items": { + "type": "string" + }, + "description": "List of host ids to add to a staticByID host group.\n" + }, + "hostnames": { + "type": "array", + "items": { + "type": "string" + }, + "description": "List of hostnames to add to a static host group.\n" + }, "name": { "type": "string", "description": "Name of the host group.\n" @@ -1631,6 +1658,20 @@ "type": "string", "description": "Description of the host group.\n" }, + "hostIds": { + "type": "array", + "items": { + "type": "string" + }, + "description": "List of host ids to add to a staticByID host group.\n" + }, + "hostnames": { + "type": "array", + "items": { + "type": "string" + }, + "description": "List of hostnames to add to a static host group.\n" + }, "lastUpdated": { "type": "string" }, @@ -1647,7 +1688,7 @@ } }, "crowdstrike:index/preventionPolicyLinux:PreventionPolicyLinux": { - "description": "This resource allows you to manage CrowdStrike Falcon prevention policies for Linux hosts. Prevention policies allow you to manage what activity will trigger detections and preventions on your hosts.\n\n## API Scopes\n\nThe following API scopes are required:\n\n- Prevention policies | Read \u0026 Write\n\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as crowdstrike from \"@crowdstrike/pulumi\";\n\nconst example = new crowdstrike.PreventionPolicyLinux(\"example\", {\n enabled: true,\n description: \"Made with Pulumi\",\n hostGroups: [\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\"],\n ioaRuleGroups: [\"ed334b3243bc4b6bb8e7d40a2ecd86fa\"],\n cloudAntiMalware: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n sensorAntiMalware: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n quarantine: true,\n customBlocking: true,\n preventSuspiciousProcesses: true,\n scriptBasedExecutionMonitoring: true,\n uploadUnknownExecutables: true,\n uploadUnknownDetectionRelatedExecutables: true,\n driftPrevention: true,\n emailProtocolVisibility: true,\n filesystemVisibility: true,\n ftpVisibility: true,\n httpVisibility: true,\n networkVisibility: true,\n tlsVisibility: true,\n});\nexport const preventionPolicyLinux = example;\n```\n```python\nimport pulumi\nimport crowdstrike_pulumi as crowdstrike\n\nexample = crowdstrike.PreventionPolicyLinux(\"example\",\n enabled=True,\n description=\"Made with Pulumi\",\n host_groups=[\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\"],\n ioa_rule_groups=[\"ed334b3243bc4b6bb8e7d40a2ecd86fa\"],\n cloud_anti_malware=crowdstrike.PreventionPolicyLinuxCloudAntiMalwareArgs(\n detection=\"MODERATE\",\n prevention=\"CAUTIOUS\",\n ),\n sensor_anti_malware=crowdstrike.PreventionPolicyLinuxSensorAntiMalwareArgs(\n detection=\"MODERATE\",\n prevention=\"CAUTIOUS\",\n ),\n quarantine=True,\n custom_blocking=True,\n prevent_suspicious_processes=True,\n script_based_execution_monitoring=True,\n upload_unknown_executables=True,\n upload_unknown_detection_related_executables=True,\n drift_prevention=True,\n email_protocol_visibility=True,\n filesystem_visibility=True,\n ftp_visibility=True,\n http_visibility=True,\n network_visibility=True,\n tls_visibility=True)\npulumi.export(\"preventionPolicyLinux\", example)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Crowdstrike = CrowdStrike.Crowdstrike;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Crowdstrike.PreventionPolicyLinux(\"example\", new()\n {\n Enabled = true,\n Description = \"Made with Pulumi\",\n HostGroups = new[]\n {\n \"d6e3c1e1b3d0467da0fowc96a5e6ecb5\",\n },\n IoaRuleGroups = new[]\n {\n \"ed334b3243bc4b6bb8e7d40a2ecd86fa\",\n },\n CloudAntiMalware = new Crowdstrike.Inputs.PreventionPolicyLinuxCloudAntiMalwareArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n SensorAntiMalware = new Crowdstrike.Inputs.PreventionPolicyLinuxSensorAntiMalwareArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n Quarantine = true,\n CustomBlocking = true,\n PreventSuspiciousProcesses = true,\n ScriptBasedExecutionMonitoring = true,\n UploadUnknownExecutables = true,\n UploadUnknownDetectionRelatedExecutables = true,\n DriftPrevention = true,\n EmailProtocolVisibility = true,\n FilesystemVisibility = true,\n FtpVisibility = true,\n HttpVisibility = true,\n NetworkVisibility = true,\n TlsVisibility = true,\n });\n\n return new Dictionary\u003cstring, object?\u003e\n {\n [\"preventionPolicyLinux\"] = example,\n };\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/crowdstrike/pulumi-crowdstrike/sdk/go/crowdstrike\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := crowdstrike.NewPreventionPolicyLinux(ctx, \"example\", \u0026crowdstrike.PreventionPolicyLinuxArgs{\n\t\t\tEnabled: pulumi.Bool(true),\n\t\t\tDescription: pulumi.String(\"Made with Pulumi\"),\n\t\t\tHostGroups: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\"),\n\t\t\t},\n\t\t\tIoaRuleGroups: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"ed334b3243bc4b6bb8e7d40a2ecd86fa\"),\n\t\t\t},\n\t\t\tCloudAntiMalware: \u0026crowdstrike.PreventionPolicyLinuxCloudAntiMalwareArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tSensorAntiMalware: \u0026crowdstrike.PreventionPolicyLinuxSensorAntiMalwareArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tQuarantine: pulumi.Bool(true),\n\t\t\tCustomBlocking: pulumi.Bool(true),\n\t\t\tPreventSuspiciousProcesses: pulumi.Bool(true),\n\t\t\tScriptBasedExecutionMonitoring: pulumi.Bool(true),\n\t\t\tUploadUnknownExecutables: pulumi.Bool(true),\n\t\t\tUploadUnknownDetectionRelatedExecutables: pulumi.Bool(true),\n\t\t\tDriftPrevention: pulumi.Bool(true),\n\t\t\tEmailProtocolVisibility: pulumi.Bool(true),\n\t\t\tFilesystemVisibility: pulumi.Bool(true),\n\t\t\tFtpVisibility: pulumi.Bool(true),\n\t\t\tHttpVisibility: pulumi.Bool(true),\n\t\t\tNetworkVisibility: pulumi.Bool(true),\n\t\t\tTlsVisibility: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tctx.Export(\"preventionPolicyLinux\", example)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.crowdstrike.PreventionPolicyLinux;\nimport com.pulumi.crowdstrike.PreventionPolicyLinuxArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyLinuxCloudAntiMalwareArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyLinuxSensorAntiMalwareArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new PreventionPolicyLinux(\"example\", PreventionPolicyLinuxArgs.builder()\n .enabled(true)\n .description(\"Made with Pulumi\")\n .hostGroups(\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\")\n .ioaRuleGroups(\"ed334b3243bc4b6bb8e7d40a2ecd86fa\")\n .cloudAntiMalware(PreventionPolicyLinuxCloudAntiMalwareArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .sensorAntiMalware(PreventionPolicyLinuxSensorAntiMalwareArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .quarantine(true)\n .customBlocking(true)\n .preventSuspiciousProcesses(true)\n .scriptBasedExecutionMonitoring(true)\n .uploadUnknownExecutables(true)\n .uploadUnknownDetectionRelatedExecutables(true)\n .driftPrevention(true)\n .emailProtocolVisibility(true)\n .filesystemVisibility(true)\n .ftpVisibility(true)\n .httpVisibility(true)\n .networkVisibility(true)\n .tlsVisibility(true)\n .build());\n\n ctx.export(\"preventionPolicyLinux\", example);\n }\n}\n```\n```yaml\nresources:\n example:\n type: crowdstrike:PreventionPolicyLinux\n properties:\n enabled: true\n description: Made with Pulumi\n hostGroups:\n - d6e3c1e1b3d0467da0fowc96a5e6ecb5\n ioaRuleGroups:\n - ed334b3243bc4b6bb8e7d40a2ecd86fa\n cloudAntiMalware:\n detection: MODERATE\n prevention: CAUTIOUS\n sensorAntiMalware:\n detection: MODERATE\n prevention: CAUTIOUS\n quarantine: true\n customBlocking: true\n preventSuspiciousProcesses: true\n scriptBasedExecutionMonitoring: true\n uploadUnknownExecutables: true\n uploadUnknownDetectionRelatedExecutables: true\n driftPrevention: true\n emailProtocolVisibility: true\n filesystemVisibility: true\n ftpVisibility: true\n httpVisibility: true\n networkVisibility: true\n tlsVisibility: true\noutputs:\n preventionPolicyLinux: ${example}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nprevention policy can be imported by specifying the policy id.\n\n```sh\n$ pulumi import crowdstrike:index/preventionPolicyLinux:PreventionPolicyLinux example 7fb858a949034a0cbca175f660f1e769\n```\n\n", + "description": "This resource allows you to manage CrowdStrike Falcon prevention policies for Linux hosts. Prevention policies allow you to manage what activity will trigger detections and preventions on your hosts.\n\n## API Scopes\n\nThe following API scopes are required:\n\n- Prevention policies | Read \u0026 Write\n\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as crowdstrike from \"@crowdstrike/pulumi\";\n\nconst example = new crowdstrike.PreventionPolicyLinux(\"example\", {\n enabled: true,\n description: \"Made with Pulumi\",\n hostGroups: [\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\"],\n ioaRuleGroups: [\"ed334b3243bc4b6bb8e7d40a2ecd86fa\"],\n cloudAntiMalware: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n sensorAntiMalware: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n quarantine: true,\n customBlocking: true,\n preventSuspiciousProcesses: true,\n scriptBasedExecutionMonitoring: true,\n uploadUnknownExecutables: true,\n uploadUnknownDetectionRelatedExecutables: true,\n driftPrevention: true,\n emailProtocolVisibility: true,\n filesystemVisibility: true,\n ftpVisibility: true,\n httpVisibility: true,\n networkVisibility: true,\n tlsVisibility: true,\n});\nexport const preventionPolicyLinux = example;\n```\n```python\nimport pulumi\nimport crowdstrike_pulumi as crowdstrike\n\nexample = crowdstrike.PreventionPolicyLinux(\"example\",\n enabled=True,\n description=\"Made with Pulumi\",\n host_groups=[\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\"],\n ioa_rule_groups=[\"ed334b3243bc4b6bb8e7d40a2ecd86fa\"],\n cloud_anti_malware={\n \"detection\": \"MODERATE\",\n \"prevention\": \"CAUTIOUS\",\n },\n sensor_anti_malware={\n \"detection\": \"MODERATE\",\n \"prevention\": \"CAUTIOUS\",\n },\n quarantine=True,\n custom_blocking=True,\n prevent_suspicious_processes=True,\n script_based_execution_monitoring=True,\n upload_unknown_executables=True,\n upload_unknown_detection_related_executables=True,\n drift_prevention=True,\n email_protocol_visibility=True,\n filesystem_visibility=True,\n ftp_visibility=True,\n http_visibility=True,\n network_visibility=True,\n tls_visibility=True)\npulumi.export(\"preventionPolicyLinux\", example)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Crowdstrike = CrowdStrike.Crowdstrike;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Crowdstrike.PreventionPolicyLinux(\"example\", new()\n {\n Enabled = true,\n Description = \"Made with Pulumi\",\n HostGroups = new[]\n {\n \"d6e3c1e1b3d0467da0fowc96a5e6ecb5\",\n },\n IoaRuleGroups = new[]\n {\n \"ed334b3243bc4b6bb8e7d40a2ecd86fa\",\n },\n CloudAntiMalware = new Crowdstrike.Inputs.PreventionPolicyLinuxCloudAntiMalwareArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n SensorAntiMalware = new Crowdstrike.Inputs.PreventionPolicyLinuxSensorAntiMalwareArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n Quarantine = true,\n CustomBlocking = true,\n PreventSuspiciousProcesses = true,\n ScriptBasedExecutionMonitoring = true,\n UploadUnknownExecutables = true,\n UploadUnknownDetectionRelatedExecutables = true,\n DriftPrevention = true,\n EmailProtocolVisibility = true,\n FilesystemVisibility = true,\n FtpVisibility = true,\n HttpVisibility = true,\n NetworkVisibility = true,\n TlsVisibility = true,\n });\n\n return new Dictionary\u003cstring, object?\u003e\n {\n [\"preventionPolicyLinux\"] = example,\n };\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/crowdstrike/pulumi-crowdstrike/sdk/go/crowdstrike\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := crowdstrike.NewPreventionPolicyLinux(ctx, \"example\", \u0026crowdstrike.PreventionPolicyLinuxArgs{\n\t\t\tEnabled: pulumi.Bool(true),\n\t\t\tDescription: pulumi.String(\"Made with Pulumi\"),\n\t\t\tHostGroups: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\"),\n\t\t\t},\n\t\t\tIoaRuleGroups: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"ed334b3243bc4b6bb8e7d40a2ecd86fa\"),\n\t\t\t},\n\t\t\tCloudAntiMalware: \u0026crowdstrike.PreventionPolicyLinuxCloudAntiMalwareArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tSensorAntiMalware: \u0026crowdstrike.PreventionPolicyLinuxSensorAntiMalwareArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tQuarantine: pulumi.Bool(true),\n\t\t\tCustomBlocking: pulumi.Bool(true),\n\t\t\tPreventSuspiciousProcesses: pulumi.Bool(true),\n\t\t\tScriptBasedExecutionMonitoring: pulumi.Bool(true),\n\t\t\tUploadUnknownExecutables: pulumi.Bool(true),\n\t\t\tUploadUnknownDetectionRelatedExecutables: pulumi.Bool(true),\n\t\t\tDriftPrevention: pulumi.Bool(true),\n\t\t\tEmailProtocolVisibility: pulumi.Bool(true),\n\t\t\tFilesystemVisibility: pulumi.Bool(true),\n\t\t\tFtpVisibility: pulumi.Bool(true),\n\t\t\tHttpVisibility: pulumi.Bool(true),\n\t\t\tNetworkVisibility: pulumi.Bool(true),\n\t\t\tTlsVisibility: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tctx.Export(\"preventionPolicyLinux\", example)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.crowdstrike.PreventionPolicyLinux;\nimport com.pulumi.crowdstrike.PreventionPolicyLinuxArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyLinuxCloudAntiMalwareArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyLinuxSensorAntiMalwareArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new PreventionPolicyLinux(\"example\", PreventionPolicyLinuxArgs.builder()\n .enabled(true)\n .description(\"Made with Pulumi\")\n .hostGroups(\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\")\n .ioaRuleGroups(\"ed334b3243bc4b6bb8e7d40a2ecd86fa\")\n .cloudAntiMalware(PreventionPolicyLinuxCloudAntiMalwareArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .sensorAntiMalware(PreventionPolicyLinuxSensorAntiMalwareArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .quarantine(true)\n .customBlocking(true)\n .preventSuspiciousProcesses(true)\n .scriptBasedExecutionMonitoring(true)\n .uploadUnknownExecutables(true)\n .uploadUnknownDetectionRelatedExecutables(true)\n .driftPrevention(true)\n .emailProtocolVisibility(true)\n .filesystemVisibility(true)\n .ftpVisibility(true)\n .httpVisibility(true)\n .networkVisibility(true)\n .tlsVisibility(true)\n .build());\n\n ctx.export(\"preventionPolicyLinux\", example);\n }\n}\n```\n```yaml\nresources:\n example:\n type: crowdstrike:PreventionPolicyLinux\n properties:\n enabled: true\n description: Made with Pulumi\n hostGroups:\n - d6e3c1e1b3d0467da0fowc96a5e6ecb5\n ioaRuleGroups:\n - ed334b3243bc4b6bb8e7d40a2ecd86fa\n cloudAntiMalware:\n detection: MODERATE\n prevention: CAUTIOUS\n sensorAntiMalware:\n detection: MODERATE\n prevention: CAUTIOUS\n quarantine: true\n customBlocking: true\n preventSuspiciousProcesses: true\n scriptBasedExecutionMonitoring: true\n uploadUnknownExecutables: true\n uploadUnknownDetectionRelatedExecutables: true\n driftPrevention: true\n emailProtocolVisibility: true\n filesystemVisibility: true\n ftpVisibility: true\n httpVisibility: true\n networkVisibility: true\n tlsVisibility: true\noutputs:\n preventionPolicyLinux: ${example}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nprevention policy can be imported by specifying the policy id.\n\n```sh\n$ pulumi import crowdstrike:index/preventionPolicyLinux:PreventionPolicyLinux example 7fb858a949034a0cbca175f660f1e769\n```\n\n", "properties": { "cloudAntiMalware": { "$ref": "#/types/crowdstrike:index/PreventionPolicyLinuxCloudAntiMalware:PreventionPolicyLinuxCloudAntiMalware", @@ -1944,7 +1985,7 @@ } }, "crowdstrike:index/preventionPolicyMac:PreventionPolicyMac": { - "description": "This resource allows you to manage CrowdStrike Falcon prevention policies for Mac hosts. Prevention policies allow you to manage what activity will trigger detections and preventions on your hosts.\n\n## API Scopes\n\nThe following API scopes are required:\n\n- Prevention policies | Read \u0026 Write\n\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as crowdstrike from \"@crowdstrike/pulumi\";\n\nconst example = new crowdstrike.PreventionPolicyMac(\"example\", {\n enabled: false,\n description: \"Made with Pulumi\",\n hostGroups: [\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\"],\n ioaRuleGroups: [\"ed334b3243bc4b6bb8e7d40a2ecd86fa\"],\n cloudAdwareAndPup: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n cloudAntiMalware: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n sensorAntiMalware: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n sensorAdwareAndPup: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n notifyEndUsers: true,\n customBlocking: true,\n detectOnWrite: true,\n intelligenceSourcedThreats: true,\n preventSuspiciousProcesses: true,\n quarantine: true,\n quarantineOnWrite: true,\n scriptBasedExecutionMonitoring: true,\n sensorTamperingProtection: true,\n uploadUnknownExecutables: true,\n uploadUnknownDetectionRelatedExecutables: true,\n xpcomShell: true,\n kcPasswordDecoded: true,\n hashCollector: true,\n empyreBackdoor: true,\n chopperWebshell: true,\n});\nexport const preventionPolicyMac = example;\n```\n```python\nimport pulumi\nimport crowdstrike_pulumi as crowdstrike\n\nexample = crowdstrike.PreventionPolicyMac(\"example\",\n enabled=False,\n description=\"Made with Pulumi\",\n host_groups=[\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\"],\n ioa_rule_groups=[\"ed334b3243bc4b6bb8e7d40a2ecd86fa\"],\n cloud_adware_and_pup=crowdstrike.PreventionPolicyMacCloudAdwareAndPupArgs(\n detection=\"MODERATE\",\n prevention=\"CAUTIOUS\",\n ),\n cloud_anti_malware=crowdstrike.PreventionPolicyMacCloudAntiMalwareArgs(\n detection=\"MODERATE\",\n prevention=\"CAUTIOUS\",\n ),\n sensor_anti_malware=crowdstrike.PreventionPolicyMacSensorAntiMalwareArgs(\n detection=\"MODERATE\",\n prevention=\"CAUTIOUS\",\n ),\n sensor_adware_and_pup=crowdstrike.PreventionPolicyMacSensorAdwareAndPupArgs(\n detection=\"MODERATE\",\n prevention=\"CAUTIOUS\",\n ),\n notify_end_users=True,\n custom_blocking=True,\n detect_on_write=True,\n intelligence_sourced_threats=True,\n prevent_suspicious_processes=True,\n quarantine=True,\n quarantine_on_write=True,\n script_based_execution_monitoring=True,\n sensor_tampering_protection=True,\n upload_unknown_executables=True,\n upload_unknown_detection_related_executables=True,\n xpcom_shell=True,\n kc_password_decoded=True,\n hash_collector=True,\n empyre_backdoor=True,\n chopper_webshell=True)\npulumi.export(\"preventionPolicyMac\", example)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Crowdstrike = CrowdStrike.Crowdstrike;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Crowdstrike.PreventionPolicyMac(\"example\", new()\n {\n Enabled = false,\n Description = \"Made with Pulumi\",\n HostGroups = new[]\n {\n \"d6e3c1e1b3d0467da0fowc96a5e6ecb5\",\n },\n IoaRuleGroups = new[]\n {\n \"ed334b3243bc4b6bb8e7d40a2ecd86fa\",\n },\n CloudAdwareAndPup = new Crowdstrike.Inputs.PreventionPolicyMacCloudAdwareAndPupArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n CloudAntiMalware = new Crowdstrike.Inputs.PreventionPolicyMacCloudAntiMalwareArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n SensorAntiMalware = new Crowdstrike.Inputs.PreventionPolicyMacSensorAntiMalwareArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n SensorAdwareAndPup = new Crowdstrike.Inputs.PreventionPolicyMacSensorAdwareAndPupArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n NotifyEndUsers = true,\n CustomBlocking = true,\n DetectOnWrite = true,\n IntelligenceSourcedThreats = true,\n PreventSuspiciousProcesses = true,\n Quarantine = true,\n QuarantineOnWrite = true,\n ScriptBasedExecutionMonitoring = true,\n SensorTamperingProtection = true,\n UploadUnknownExecutables = true,\n UploadUnknownDetectionRelatedExecutables = true,\n XpcomShell = true,\n KcPasswordDecoded = true,\n HashCollector = true,\n EmpyreBackdoor = true,\n ChopperWebshell = true,\n });\n\n return new Dictionary\u003cstring, object?\u003e\n {\n [\"preventionPolicyMac\"] = example,\n };\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/crowdstrike/pulumi-crowdstrike/sdk/go/crowdstrike\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := crowdstrike.NewPreventionPolicyMac(ctx, \"example\", \u0026crowdstrike.PreventionPolicyMacArgs{\n\t\t\tEnabled: pulumi.Bool(false),\n\t\t\tDescription: pulumi.String(\"Made with Pulumi\"),\n\t\t\tHostGroups: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\"),\n\t\t\t},\n\t\t\tIoaRuleGroups: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"ed334b3243bc4b6bb8e7d40a2ecd86fa\"),\n\t\t\t},\n\t\t\tCloudAdwareAndPup: \u0026crowdstrike.PreventionPolicyMacCloudAdwareAndPupArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tCloudAntiMalware: \u0026crowdstrike.PreventionPolicyMacCloudAntiMalwareArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tSensorAntiMalware: \u0026crowdstrike.PreventionPolicyMacSensorAntiMalwareArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tSensorAdwareAndPup: \u0026crowdstrike.PreventionPolicyMacSensorAdwareAndPupArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tNotifyEndUsers: pulumi.Bool(true),\n\t\t\tCustomBlocking: pulumi.Bool(true),\n\t\t\tDetectOnWrite: pulumi.Bool(true),\n\t\t\tIntelligenceSourcedThreats: pulumi.Bool(true),\n\t\t\tPreventSuspiciousProcesses: pulumi.Bool(true),\n\t\t\tQuarantine: pulumi.Bool(true),\n\t\t\tQuarantineOnWrite: pulumi.Bool(true),\n\t\t\tScriptBasedExecutionMonitoring: pulumi.Bool(true),\n\t\t\tSensorTamperingProtection: pulumi.Bool(true),\n\t\t\tUploadUnknownExecutables: pulumi.Bool(true),\n\t\t\tUploadUnknownDetectionRelatedExecutables: pulumi.Bool(true),\n\t\t\tXpcomShell: pulumi.Bool(true),\n\t\t\tKcPasswordDecoded: pulumi.Bool(true),\n\t\t\tHashCollector: pulumi.Bool(true),\n\t\t\tEmpyreBackdoor: pulumi.Bool(true),\n\t\t\tChopperWebshell: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tctx.Export(\"preventionPolicyMac\", example)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.crowdstrike.PreventionPolicyMac;\nimport com.pulumi.crowdstrike.PreventionPolicyMacArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyMacCloudAdwareAndPupArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyMacCloudAntiMalwareArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyMacSensorAntiMalwareArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyMacSensorAdwareAndPupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new PreventionPolicyMac(\"example\", PreventionPolicyMacArgs.builder()\n .enabled(false)\n .description(\"Made with Pulumi\")\n .hostGroups(\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\")\n .ioaRuleGroups(\"ed334b3243bc4b6bb8e7d40a2ecd86fa\")\n .cloudAdwareAndPup(PreventionPolicyMacCloudAdwareAndPupArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .cloudAntiMalware(PreventionPolicyMacCloudAntiMalwareArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .sensorAntiMalware(PreventionPolicyMacSensorAntiMalwareArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .sensorAdwareAndPup(PreventionPolicyMacSensorAdwareAndPupArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .notifyEndUsers(true)\n .customBlocking(true)\n .detectOnWrite(true)\n .intelligenceSourcedThreats(true)\n .preventSuspiciousProcesses(true)\n .quarantine(true)\n .quarantineOnWrite(true)\n .scriptBasedExecutionMonitoring(true)\n .sensorTamperingProtection(true)\n .uploadUnknownExecutables(true)\n .uploadUnknownDetectionRelatedExecutables(true)\n .xpcomShell(true)\n .kcPasswordDecoded(true)\n .hashCollector(true)\n .empyreBackdoor(true)\n .chopperWebshell(true)\n .build());\n\n ctx.export(\"preventionPolicyMac\", example);\n }\n}\n```\n```yaml\nresources:\n example:\n type: crowdstrike:PreventionPolicyMac\n properties:\n enabled: false\n description: Made with Pulumi\n hostGroups:\n - d6e3c1e1b3d0467da0fowc96a5e6ecb5\n ioaRuleGroups:\n - ed334b3243bc4b6bb8e7d40a2ecd86fa\n cloudAdwareAndPup:\n detection: MODERATE\n prevention: CAUTIOUS\n cloudAntiMalware:\n detection: MODERATE\n prevention: CAUTIOUS\n sensorAntiMalware:\n detection: MODERATE\n prevention: CAUTIOUS\n sensorAdwareAndPup:\n detection: MODERATE\n prevention: CAUTIOUS\n notifyEndUsers: true\n customBlocking: true\n detectOnWrite: true\n intelligenceSourcedThreats: true\n preventSuspiciousProcesses: true\n quarantine: true\n quarantineOnWrite: true\n scriptBasedExecutionMonitoring: true\n sensorTamperingProtection: true\n uploadUnknownExecutables: true\n uploadUnknownDetectionRelatedExecutables: true\n xpcomShell: true\n kcPasswordDecoded: true\n hashCollector: true\n empyreBackdoor: true\n chopperWebshell: true\noutputs:\n preventionPolicyMac: ${example}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nprevention policy can be imported by specifying the policy id.\n\n```sh\n$ pulumi import crowdstrike:index/preventionPolicyMac:PreventionPolicyMac example 7fb858a949034a0cbca175f660f1e769\n```\n\n", + "description": "This resource allows you to manage CrowdStrike Falcon prevention policies for Mac hosts. Prevention policies allow you to manage what activity will trigger detections and preventions on your hosts.\n\n## API Scopes\n\nThe following API scopes are required:\n\n- Prevention policies | Read \u0026 Write\n\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as crowdstrike from \"@crowdstrike/pulumi\";\n\nconst example = new crowdstrike.PreventionPolicyMac(\"example\", {\n enabled: false,\n description: \"Made with Pulumi\",\n hostGroups: [\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\"],\n ioaRuleGroups: [\"ed334b3243bc4b6bb8e7d40a2ecd86fa\"],\n cloudAdwareAndPup: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n cloudAntiMalware: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n sensorAntiMalware: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n sensorAdwareAndPup: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n notifyEndUsers: true,\n customBlocking: true,\n detectOnWrite: true,\n intelligenceSourcedThreats: true,\n preventSuspiciousProcesses: true,\n quarantine: true,\n quarantineOnWrite: true,\n scriptBasedExecutionMonitoring: true,\n sensorTamperingProtection: true,\n uploadUnknownExecutables: true,\n uploadUnknownDetectionRelatedExecutables: true,\n xpcomShell: true,\n kcPasswordDecoded: true,\n hashCollector: true,\n empyreBackdoor: true,\n chopperWebshell: true,\n});\nexport const preventionPolicyMac = example;\n```\n```python\nimport pulumi\nimport crowdstrike_pulumi as crowdstrike\n\nexample = crowdstrike.PreventionPolicyMac(\"example\",\n enabled=False,\n description=\"Made with Pulumi\",\n host_groups=[\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\"],\n ioa_rule_groups=[\"ed334b3243bc4b6bb8e7d40a2ecd86fa\"],\n cloud_adware_and_pup={\n \"detection\": \"MODERATE\",\n \"prevention\": \"CAUTIOUS\",\n },\n cloud_anti_malware={\n \"detection\": \"MODERATE\",\n \"prevention\": \"CAUTIOUS\",\n },\n sensor_anti_malware={\n \"detection\": \"MODERATE\",\n \"prevention\": \"CAUTIOUS\",\n },\n sensor_adware_and_pup={\n \"detection\": \"MODERATE\",\n \"prevention\": \"CAUTIOUS\",\n },\n notify_end_users=True,\n custom_blocking=True,\n detect_on_write=True,\n intelligence_sourced_threats=True,\n prevent_suspicious_processes=True,\n quarantine=True,\n quarantine_on_write=True,\n script_based_execution_monitoring=True,\n sensor_tampering_protection=True,\n upload_unknown_executables=True,\n upload_unknown_detection_related_executables=True,\n xpcom_shell=True,\n kc_password_decoded=True,\n hash_collector=True,\n empyre_backdoor=True,\n chopper_webshell=True)\npulumi.export(\"preventionPolicyMac\", example)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Crowdstrike = CrowdStrike.Crowdstrike;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Crowdstrike.PreventionPolicyMac(\"example\", new()\n {\n Enabled = false,\n Description = \"Made with Pulumi\",\n HostGroups = new[]\n {\n \"d6e3c1e1b3d0467da0fowc96a5e6ecb5\",\n },\n IoaRuleGroups = new[]\n {\n \"ed334b3243bc4b6bb8e7d40a2ecd86fa\",\n },\n CloudAdwareAndPup = new Crowdstrike.Inputs.PreventionPolicyMacCloudAdwareAndPupArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n CloudAntiMalware = new Crowdstrike.Inputs.PreventionPolicyMacCloudAntiMalwareArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n SensorAntiMalware = new Crowdstrike.Inputs.PreventionPolicyMacSensorAntiMalwareArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n SensorAdwareAndPup = new Crowdstrike.Inputs.PreventionPolicyMacSensorAdwareAndPupArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n NotifyEndUsers = true,\n CustomBlocking = true,\n DetectOnWrite = true,\n IntelligenceSourcedThreats = true,\n PreventSuspiciousProcesses = true,\n Quarantine = true,\n QuarantineOnWrite = true,\n ScriptBasedExecutionMonitoring = true,\n SensorTamperingProtection = true,\n UploadUnknownExecutables = true,\n UploadUnknownDetectionRelatedExecutables = true,\n XpcomShell = true,\n KcPasswordDecoded = true,\n HashCollector = true,\n EmpyreBackdoor = true,\n ChopperWebshell = true,\n });\n\n return new Dictionary\u003cstring, object?\u003e\n {\n [\"preventionPolicyMac\"] = example,\n };\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/crowdstrike/pulumi-crowdstrike/sdk/go/crowdstrike\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := crowdstrike.NewPreventionPolicyMac(ctx, \"example\", \u0026crowdstrike.PreventionPolicyMacArgs{\n\t\t\tEnabled: pulumi.Bool(false),\n\t\t\tDescription: pulumi.String(\"Made with Pulumi\"),\n\t\t\tHostGroups: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\"),\n\t\t\t},\n\t\t\tIoaRuleGroups: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"ed334b3243bc4b6bb8e7d40a2ecd86fa\"),\n\t\t\t},\n\t\t\tCloudAdwareAndPup: \u0026crowdstrike.PreventionPolicyMacCloudAdwareAndPupArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tCloudAntiMalware: \u0026crowdstrike.PreventionPolicyMacCloudAntiMalwareArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tSensorAntiMalware: \u0026crowdstrike.PreventionPolicyMacSensorAntiMalwareArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tSensorAdwareAndPup: \u0026crowdstrike.PreventionPolicyMacSensorAdwareAndPupArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tNotifyEndUsers: pulumi.Bool(true),\n\t\t\tCustomBlocking: pulumi.Bool(true),\n\t\t\tDetectOnWrite: pulumi.Bool(true),\n\t\t\tIntelligenceSourcedThreats: pulumi.Bool(true),\n\t\t\tPreventSuspiciousProcesses: pulumi.Bool(true),\n\t\t\tQuarantine: pulumi.Bool(true),\n\t\t\tQuarantineOnWrite: pulumi.Bool(true),\n\t\t\tScriptBasedExecutionMonitoring: pulumi.Bool(true),\n\t\t\tSensorTamperingProtection: pulumi.Bool(true),\n\t\t\tUploadUnknownExecutables: pulumi.Bool(true),\n\t\t\tUploadUnknownDetectionRelatedExecutables: pulumi.Bool(true),\n\t\t\tXpcomShell: pulumi.Bool(true),\n\t\t\tKcPasswordDecoded: pulumi.Bool(true),\n\t\t\tHashCollector: pulumi.Bool(true),\n\t\t\tEmpyreBackdoor: pulumi.Bool(true),\n\t\t\tChopperWebshell: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tctx.Export(\"preventionPolicyMac\", example)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.crowdstrike.PreventionPolicyMac;\nimport com.pulumi.crowdstrike.PreventionPolicyMacArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyMacCloudAdwareAndPupArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyMacCloudAntiMalwareArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyMacSensorAntiMalwareArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyMacSensorAdwareAndPupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new PreventionPolicyMac(\"example\", PreventionPolicyMacArgs.builder()\n .enabled(false)\n .description(\"Made with Pulumi\")\n .hostGroups(\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\")\n .ioaRuleGroups(\"ed334b3243bc4b6bb8e7d40a2ecd86fa\")\n .cloudAdwareAndPup(PreventionPolicyMacCloudAdwareAndPupArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .cloudAntiMalware(PreventionPolicyMacCloudAntiMalwareArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .sensorAntiMalware(PreventionPolicyMacSensorAntiMalwareArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .sensorAdwareAndPup(PreventionPolicyMacSensorAdwareAndPupArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .notifyEndUsers(true)\n .customBlocking(true)\n .detectOnWrite(true)\n .intelligenceSourcedThreats(true)\n .preventSuspiciousProcesses(true)\n .quarantine(true)\n .quarantineOnWrite(true)\n .scriptBasedExecutionMonitoring(true)\n .sensorTamperingProtection(true)\n .uploadUnknownExecutables(true)\n .uploadUnknownDetectionRelatedExecutables(true)\n .xpcomShell(true)\n .kcPasswordDecoded(true)\n .hashCollector(true)\n .empyreBackdoor(true)\n .chopperWebshell(true)\n .build());\n\n ctx.export(\"preventionPolicyMac\", example);\n }\n}\n```\n```yaml\nresources:\n example:\n type: crowdstrike:PreventionPolicyMac\n properties:\n enabled: false\n description: Made with Pulumi\n hostGroups:\n - d6e3c1e1b3d0467da0fowc96a5e6ecb5\n ioaRuleGroups:\n - ed334b3243bc4b6bb8e7d40a2ecd86fa\n cloudAdwareAndPup:\n detection: MODERATE\n prevention: CAUTIOUS\n cloudAntiMalware:\n detection: MODERATE\n prevention: CAUTIOUS\n sensorAntiMalware:\n detection: MODERATE\n prevention: CAUTIOUS\n sensorAdwareAndPup:\n detection: MODERATE\n prevention: CAUTIOUS\n notifyEndUsers: true\n customBlocking: true\n detectOnWrite: true\n intelligenceSourcedThreats: true\n preventSuspiciousProcesses: true\n quarantine: true\n quarantineOnWrite: true\n scriptBasedExecutionMonitoring: true\n sensorTamperingProtection: true\n uploadUnknownExecutables: true\n uploadUnknownDetectionRelatedExecutables: true\n xpcomShell: true\n kcPasswordDecoded: true\n hashCollector: true\n empyreBackdoor: true\n chopperWebshell: true\noutputs:\n preventionPolicyMac: ${example}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nprevention policy can be imported by specifying the policy id.\n\n```sh\n$ pulumi import crowdstrike:index/preventionPolicyMac:PreventionPolicyMac example 7fb858a949034a0cbca175f660f1e769\n```\n\n", "properties": { "chopperWebshell": { "type": "boolean", @@ -2306,7 +2347,7 @@ } }, "crowdstrike:index/preventionPolicyWindows:PreventionPolicyWindows": { - "description": "This resource allows you to manage CrowdStrike Falcon prevention policies for Windows hosts. Prevention policies allow you to manage what activity will trigger detections and preventions on your hosts.\n\n## API Scopes\n\nThe following API scopes are required:\n\n- Prevention policies | Read \u0026 Write\n\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as crowdstrike from \"@crowdstrike/pulumi\";\n\nconst example = new crowdstrike.PreventionPolicyWindows(\"example\", {\n enabled: false,\n description: \"Made with Pulumi\",\n hostGroups: [\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\"],\n ioaRuleGroups: [\"ed334b3243bc4b6bb8e7d40a2ecd86fa\"],\n adwareAndPup: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n cloudAntiMalwareMicrosoftOfficeFiles: {\n detection: \"MODERATE\",\n prevention: \"DISABLED\",\n },\n cloudAntiMalware: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n cloudAntiMalwareUserInitiated: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n sensorAntiMalware: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n sensorAntiMalwareUserInitiated: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n extendedUserModeData: {\n detection: \"MODERATE\",\n },\n usbInsertionTriggeredScan: false,\n applicationExploitationActivity: false,\n additionalUserModeData: false,\n notifyEndUsers: false,\n advancedRemediation: false,\n backupDeletion: false,\n biosDeepVisibility: false,\n chopperWebshell: false,\n codeInjection: false,\n credentialDumping: false,\n cryptowall: false,\n customBlocking: false,\n detectOnWrite: false,\n driveByDownload: false,\n driverLoadPrevention: false,\n interpreterOnly: false,\n engineFullVisibility: false,\n enhancedExploitationVisibility: false,\n enhancedMlForLargerFiles: false,\n fileEncryption: false,\n fileSystemAccess: false,\n forceAslr: false,\n forceDep: false,\n heapSprayPreallocation: false,\n nullPageAllocation: false,\n sehOverwriteProtection: false,\n hardwareEnhancedExploitDetection: false,\n httpDetections: false,\n redactHttpDetectionDetails: false,\n intelligenceSourcedThreats: false,\n javascriptViaRundll32: false,\n locky: false,\n memoryScanning: false,\n memoryScanningScanWithCpu: false,\n microsoftOfficeFileSuspiciousMacroRemoval: false,\n onWriteScriptFileVisibility: false,\n preventSuspiciousProcesses: false,\n quarantineAndSecurityCenterRegistration: false,\n quarantineOnRemovableMedia: false,\n quarantineOnWrite: false,\n scriptBasedExecutionMonitoring: false,\n sensorTamperingProtection: false,\n suspiciousRegistryOperations: false,\n suspiciousScriptsAndCommands: false,\n uploadUnknownExecutables: false,\n uploadUnknownDetectionRelatedExecutables: false,\n volumeShadowCopyAudit: false,\n volumeShadowCopyProtect: false,\n vulnerableDriverProtection: false,\n windowsLogonBypassStickyKeys: false,\n});\nexport const preventionPolicyWindows = example;\n```\n```python\nimport pulumi\nimport crowdstrike_pulumi as crowdstrike\n\nexample = crowdstrike.PreventionPolicyWindows(\"example\",\n enabled=False,\n description=\"Made with Pulumi\",\n host_groups=[\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\"],\n ioa_rule_groups=[\"ed334b3243bc4b6bb8e7d40a2ecd86fa\"],\n adware_and_pup=crowdstrike.PreventionPolicyWindowsAdwareAndPupArgs(\n detection=\"MODERATE\",\n prevention=\"CAUTIOUS\",\n ),\n cloud_anti_malware_microsoft_office_files=crowdstrike.PreventionPolicyWindowsCloudAntiMalwareMicrosoftOfficeFilesArgs(\n detection=\"MODERATE\",\n prevention=\"DISABLED\",\n ),\n cloud_anti_malware=crowdstrike.PreventionPolicyWindowsCloudAntiMalwareArgs(\n detection=\"MODERATE\",\n prevention=\"CAUTIOUS\",\n ),\n cloud_anti_malware_user_initiated=crowdstrike.PreventionPolicyWindowsCloudAntiMalwareUserInitiatedArgs(\n detection=\"MODERATE\",\n prevention=\"CAUTIOUS\",\n ),\n sensor_anti_malware=crowdstrike.PreventionPolicyWindowsSensorAntiMalwareArgs(\n detection=\"MODERATE\",\n prevention=\"CAUTIOUS\",\n ),\n sensor_anti_malware_user_initiated=crowdstrike.PreventionPolicyWindowsSensorAntiMalwareUserInitiatedArgs(\n detection=\"MODERATE\",\n prevention=\"CAUTIOUS\",\n ),\n extended_user_mode_data=crowdstrike.PreventionPolicyWindowsExtendedUserModeDataArgs(\n detection=\"MODERATE\",\n ),\n usb_insertion_triggered_scan=False,\n application_exploitation_activity=False,\n additional_user_mode_data=False,\n notify_end_users=False,\n advanced_remediation=False,\n backup_deletion=False,\n bios_deep_visibility=False,\n chopper_webshell=False,\n code_injection=False,\n credential_dumping=False,\n cryptowall=False,\n custom_blocking=False,\n detect_on_write=False,\n drive_by_download=False,\n driver_load_prevention=False,\n interpreter_only=False,\n engine_full_visibility=False,\n enhanced_exploitation_visibility=False,\n enhanced_ml_for_larger_files=False,\n file_encryption=False,\n file_system_access=False,\n force_aslr=False,\n force_dep=False,\n heap_spray_preallocation=False,\n null_page_allocation=False,\n seh_overwrite_protection=False,\n hardware_enhanced_exploit_detection=False,\n http_detections=False,\n redact_http_detection_details=False,\n intelligence_sourced_threats=False,\n javascript_via_rundll32=False,\n locky=False,\n memory_scanning=False,\n memory_scanning_scan_with_cpu=False,\n microsoft_office_file_suspicious_macro_removal=False,\n on_write_script_file_visibility=False,\n prevent_suspicious_processes=False,\n quarantine_and_security_center_registration=False,\n quarantine_on_removable_media=False,\n quarantine_on_write=False,\n script_based_execution_monitoring=False,\n sensor_tampering_protection=False,\n suspicious_registry_operations=False,\n suspicious_scripts_and_commands=False,\n upload_unknown_executables=False,\n upload_unknown_detection_related_executables=False,\n volume_shadow_copy_audit=False,\n volume_shadow_copy_protect=False,\n vulnerable_driver_protection=False,\n windows_logon_bypass_sticky_keys=False)\npulumi.export(\"preventionPolicyWindows\", example)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Crowdstrike = CrowdStrike.Crowdstrike;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Crowdstrike.PreventionPolicyWindows(\"example\", new()\n {\n Enabled = false,\n Description = \"Made with Pulumi\",\n HostGroups = new[]\n {\n \"d6e3c1e1b3d0467da0fowc96a5e6ecb5\",\n },\n IoaRuleGroups = new[]\n {\n \"ed334b3243bc4b6bb8e7d40a2ecd86fa\",\n },\n AdwareAndPup = new Crowdstrike.Inputs.PreventionPolicyWindowsAdwareAndPupArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n CloudAntiMalwareMicrosoftOfficeFiles = new Crowdstrike.Inputs.PreventionPolicyWindowsCloudAntiMalwareMicrosoftOfficeFilesArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"DISABLED\",\n },\n CloudAntiMalware = new Crowdstrike.Inputs.PreventionPolicyWindowsCloudAntiMalwareArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n CloudAntiMalwareUserInitiated = new Crowdstrike.Inputs.PreventionPolicyWindowsCloudAntiMalwareUserInitiatedArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n SensorAntiMalware = new Crowdstrike.Inputs.PreventionPolicyWindowsSensorAntiMalwareArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n SensorAntiMalwareUserInitiated = new Crowdstrike.Inputs.PreventionPolicyWindowsSensorAntiMalwareUserInitiatedArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n ExtendedUserModeData = new Crowdstrike.Inputs.PreventionPolicyWindowsExtendedUserModeDataArgs\n {\n Detection = \"MODERATE\",\n },\n UsbInsertionTriggeredScan = false,\n ApplicationExploitationActivity = false,\n AdditionalUserModeData = false,\n NotifyEndUsers = false,\n AdvancedRemediation = false,\n BackupDeletion = false,\n BiosDeepVisibility = false,\n ChopperWebshell = false,\n CodeInjection = false,\n CredentialDumping = false,\n Cryptowall = false,\n CustomBlocking = false,\n DetectOnWrite = false,\n DriveByDownload = false,\n DriverLoadPrevention = false,\n InterpreterOnly = false,\n EngineFullVisibility = false,\n EnhancedExploitationVisibility = false,\n EnhancedMlForLargerFiles = false,\n FileEncryption = false,\n FileSystemAccess = false,\n ForceAslr = false,\n ForceDep = false,\n HeapSprayPreallocation = false,\n NullPageAllocation = false,\n SehOverwriteProtection = false,\n HardwareEnhancedExploitDetection = false,\n HttpDetections = false,\n RedactHttpDetectionDetails = false,\n IntelligenceSourcedThreats = false,\n JavascriptViaRundll32 = false,\n Locky = false,\n MemoryScanning = false,\n MemoryScanningScanWithCpu = false,\n MicrosoftOfficeFileSuspiciousMacroRemoval = false,\n OnWriteScriptFileVisibility = false,\n PreventSuspiciousProcesses = false,\n QuarantineAndSecurityCenterRegistration = false,\n QuarantineOnRemovableMedia = false,\n QuarantineOnWrite = false,\n ScriptBasedExecutionMonitoring = false,\n SensorTamperingProtection = false,\n SuspiciousRegistryOperations = false,\n SuspiciousScriptsAndCommands = false,\n UploadUnknownExecutables = false,\n UploadUnknownDetectionRelatedExecutables = false,\n VolumeShadowCopyAudit = false,\n VolumeShadowCopyProtect = false,\n VulnerableDriverProtection = false,\n WindowsLogonBypassStickyKeys = false,\n });\n\n return new Dictionary\u003cstring, object?\u003e\n {\n [\"preventionPolicyWindows\"] = example,\n };\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/crowdstrike/pulumi-crowdstrike/sdk/go/crowdstrike\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := crowdstrike.NewPreventionPolicyWindows(ctx, \"example\", \u0026crowdstrike.PreventionPolicyWindowsArgs{\n\t\t\tEnabled: pulumi.Bool(false),\n\t\t\tDescription: pulumi.String(\"Made with Pulumi\"),\n\t\t\tHostGroups: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\"),\n\t\t\t},\n\t\t\tIoaRuleGroups: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"ed334b3243bc4b6bb8e7d40a2ecd86fa\"),\n\t\t\t},\n\t\t\tAdwareAndPup: \u0026crowdstrike.PreventionPolicyWindowsAdwareAndPupArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tCloudAntiMalwareMicrosoftOfficeFiles: \u0026crowdstrike.PreventionPolicyWindowsCloudAntiMalwareMicrosoftOfficeFilesArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"DISABLED\"),\n\t\t\t},\n\t\t\tCloudAntiMalware: \u0026crowdstrike.PreventionPolicyWindowsCloudAntiMalwareArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tCloudAntiMalwareUserInitiated: \u0026crowdstrike.PreventionPolicyWindowsCloudAntiMalwareUserInitiatedArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tSensorAntiMalware: \u0026crowdstrike.PreventionPolicyWindowsSensorAntiMalwareArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tSensorAntiMalwareUserInitiated: \u0026crowdstrike.PreventionPolicyWindowsSensorAntiMalwareUserInitiatedArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tExtendedUserModeData: \u0026crowdstrike.PreventionPolicyWindowsExtendedUserModeDataArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t},\n\t\t\tUsbInsertionTriggeredScan: pulumi.Bool(false),\n\t\t\tApplicationExploitationActivity: pulumi.Bool(false),\n\t\t\tAdditionalUserModeData: pulumi.Bool(false),\n\t\t\tNotifyEndUsers: pulumi.Bool(false),\n\t\t\tAdvancedRemediation: pulumi.Bool(false),\n\t\t\tBackupDeletion: pulumi.Bool(false),\n\t\t\tBiosDeepVisibility: pulumi.Bool(false),\n\t\t\tChopperWebshell: pulumi.Bool(false),\n\t\t\tCodeInjection: pulumi.Bool(false),\n\t\t\tCredentialDumping: pulumi.Bool(false),\n\t\t\tCryptowall: pulumi.Bool(false),\n\t\t\tCustomBlocking: pulumi.Bool(false),\n\t\t\tDetectOnWrite: pulumi.Bool(false),\n\t\t\tDriveByDownload: pulumi.Bool(false),\n\t\t\tDriverLoadPrevention: pulumi.Bool(false),\n\t\t\tInterpreterOnly: pulumi.Bool(false),\n\t\t\tEngineFullVisibility: pulumi.Bool(false),\n\t\t\tEnhancedExploitationVisibility: pulumi.Bool(false),\n\t\t\tEnhancedMlForLargerFiles: pulumi.Bool(false),\n\t\t\tFileEncryption: pulumi.Bool(false),\n\t\t\tFileSystemAccess: pulumi.Bool(false),\n\t\t\tForceAslr: pulumi.Bool(false),\n\t\t\tForceDep: pulumi.Bool(false),\n\t\t\tHeapSprayPreallocation: pulumi.Bool(false),\n\t\t\tNullPageAllocation: pulumi.Bool(false),\n\t\t\tSehOverwriteProtection: pulumi.Bool(false),\n\t\t\tHardwareEnhancedExploitDetection: pulumi.Bool(false),\n\t\t\tHttpDetections: pulumi.Bool(false),\n\t\t\tRedactHttpDetectionDetails: pulumi.Bool(false),\n\t\t\tIntelligenceSourcedThreats: pulumi.Bool(false),\n\t\t\tJavascriptViaRundll32: pulumi.Bool(false),\n\t\t\tLocky: pulumi.Bool(false),\n\t\t\tMemoryScanning: pulumi.Bool(false),\n\t\t\tMemoryScanningScanWithCpu: pulumi.Bool(false),\n\t\t\tMicrosoftOfficeFileSuspiciousMacroRemoval: pulumi.Bool(false),\n\t\t\tOnWriteScriptFileVisibility: pulumi.Bool(false),\n\t\t\tPreventSuspiciousProcesses: pulumi.Bool(false),\n\t\t\tQuarantineAndSecurityCenterRegistration: pulumi.Bool(false),\n\t\t\tQuarantineOnRemovableMedia: pulumi.Bool(false),\n\t\t\tQuarantineOnWrite: pulumi.Bool(false),\n\t\t\tScriptBasedExecutionMonitoring: pulumi.Bool(false),\n\t\t\tSensorTamperingProtection: pulumi.Bool(false),\n\t\t\tSuspiciousRegistryOperations: pulumi.Bool(false),\n\t\t\tSuspiciousScriptsAndCommands: pulumi.Bool(false),\n\t\t\tUploadUnknownExecutables: pulumi.Bool(false),\n\t\t\tUploadUnknownDetectionRelatedExecutables: pulumi.Bool(false),\n\t\t\tVolumeShadowCopyAudit: pulumi.Bool(false),\n\t\t\tVolumeShadowCopyProtect: pulumi.Bool(false),\n\t\t\tVulnerableDriverProtection: pulumi.Bool(false),\n\t\t\tWindowsLogonBypassStickyKeys: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tctx.Export(\"preventionPolicyWindows\", example)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.crowdstrike.PreventionPolicyWindows;\nimport com.pulumi.crowdstrike.PreventionPolicyWindowsArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyWindowsAdwareAndPupArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyWindowsCloudAntiMalwareMicrosoftOfficeFilesArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyWindowsCloudAntiMalwareArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyWindowsCloudAntiMalwareUserInitiatedArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyWindowsSensorAntiMalwareArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyWindowsSensorAntiMalwareUserInitiatedArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyWindowsExtendedUserModeDataArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new PreventionPolicyWindows(\"example\", PreventionPolicyWindowsArgs.builder()\n .enabled(false)\n .description(\"Made with Pulumi\")\n .hostGroups(\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\")\n .ioaRuleGroups(\"ed334b3243bc4b6bb8e7d40a2ecd86fa\")\n .adwareAndPup(PreventionPolicyWindowsAdwareAndPupArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .cloudAntiMalwareMicrosoftOfficeFiles(PreventionPolicyWindowsCloudAntiMalwareMicrosoftOfficeFilesArgs.builder()\n .detection(\"MODERATE\")\n .prevention(\"DISABLED\")\n .build())\n .cloudAntiMalware(PreventionPolicyWindowsCloudAntiMalwareArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .cloudAntiMalwareUserInitiated(PreventionPolicyWindowsCloudAntiMalwareUserInitiatedArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .sensorAntiMalware(PreventionPolicyWindowsSensorAntiMalwareArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .sensorAntiMalwareUserInitiated(PreventionPolicyWindowsSensorAntiMalwareUserInitiatedArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .extendedUserModeData(PreventionPolicyWindowsExtendedUserModeDataArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .usbInsertionTriggeredScan(false)\n .applicationExploitationActivity(false)\n .additionalUserModeData(false)\n .notifyEndUsers(false)\n .advancedRemediation(false)\n .backupDeletion(false)\n .biosDeepVisibility(false)\n .chopperWebshell(false)\n .codeInjection(false)\n .credentialDumping(false)\n .cryptowall(false)\n .customBlocking(false)\n .detectOnWrite(false)\n .driveByDownload(false)\n .driverLoadPrevention(false)\n .interpreterOnly(false)\n .engineFullVisibility(false)\n .enhancedExploitationVisibility(false)\n .enhancedMlForLargerFiles(false)\n .fileEncryption(false)\n .fileSystemAccess(false)\n .forceAslr(false)\n .forceDep(false)\n .heapSprayPreallocation(false)\n .nullPageAllocation(false)\n .sehOverwriteProtection(false)\n .hardwareEnhancedExploitDetection(false)\n .httpDetections(false)\n .redactHttpDetectionDetails(false)\n .intelligenceSourcedThreats(false)\n .javascriptViaRundll32(false)\n .locky(false)\n .memoryScanning(false)\n .memoryScanningScanWithCpu(false)\n .microsoftOfficeFileSuspiciousMacroRemoval(false)\n .onWriteScriptFileVisibility(false)\n .preventSuspiciousProcesses(false)\n .quarantineAndSecurityCenterRegistration(false)\n .quarantineOnRemovableMedia(false)\n .quarantineOnWrite(false)\n .scriptBasedExecutionMonitoring(false)\n .sensorTamperingProtection(false)\n .suspiciousRegistryOperations(false)\n .suspiciousScriptsAndCommands(false)\n .uploadUnknownExecutables(false)\n .uploadUnknownDetectionRelatedExecutables(false)\n .volumeShadowCopyAudit(false)\n .volumeShadowCopyProtect(false)\n .vulnerableDriverProtection(false)\n .windowsLogonBypassStickyKeys(false)\n .build());\n\n ctx.export(\"preventionPolicyWindows\", example);\n }\n}\n```\n```yaml\nresources:\n example:\n type: crowdstrike:PreventionPolicyWindows\n properties:\n enabled: false\n description: Made with Pulumi\n hostGroups:\n - d6e3c1e1b3d0467da0fowc96a5e6ecb5\n ioaRuleGroups:\n - ed334b3243bc4b6bb8e7d40a2ecd86fa\n adwareAndPup:\n detection: MODERATE\n prevention: CAUTIOUS\n cloudAntiMalwareMicrosoftOfficeFiles:\n detection: MODERATE\n prevention: DISABLED\n cloudAntiMalware:\n detection: MODERATE\n prevention: CAUTIOUS\n cloudAntiMalwareUserInitiated:\n detection: MODERATE\n prevention: CAUTIOUS\n sensorAntiMalware:\n detection: MODERATE\n prevention: CAUTIOUS\n sensorAntiMalwareUserInitiated:\n detection: MODERATE\n prevention: CAUTIOUS\n extendedUserModeData:\n detection: MODERATE\n usbInsertionTriggeredScan: false\n applicationExploitationActivity: false\n additionalUserModeData: false\n notifyEndUsers: false\n advancedRemediation: false\n backupDeletion: false\n biosDeepVisibility: false\n chopperWebshell: false\n codeInjection: false\n credentialDumping: false\n cryptowall: false\n customBlocking: false\n detectOnWrite: false\n driveByDownload: false\n driverLoadPrevention: false\n interpreterOnly: false\n engineFullVisibility: false\n enhancedExploitationVisibility: false\n enhancedMlForLargerFiles: false\n fileEncryption: false\n fileSystemAccess: false\n forceAslr: false\n forceDep: false\n heapSprayPreallocation: false\n nullPageAllocation: false\n sehOverwriteProtection: false\n hardwareEnhancedExploitDetection: false\n httpDetections: false\n redactHttpDetectionDetails: false\n intelligenceSourcedThreats: false\n javascriptViaRundll32: false\n locky: false\n memoryScanning: false\n memoryScanningScanWithCpu: false\n microsoftOfficeFileSuspiciousMacroRemoval: false\n onWriteScriptFileVisibility: false\n preventSuspiciousProcesses: false\n quarantineAndSecurityCenterRegistration: false\n quarantineOnRemovableMedia: false\n quarantineOnWrite: false\n scriptBasedExecutionMonitoring: false\n sensorTamperingProtection: false\n suspiciousRegistryOperations: false\n suspiciousScriptsAndCommands: false\n uploadUnknownExecutables: false\n uploadUnknownDetectionRelatedExecutables: false\n volumeShadowCopyAudit: false\n volumeShadowCopyProtect: false\n vulnerableDriverProtection: false\n windowsLogonBypassStickyKeys: false\noutputs:\n preventionPolicyWindows: ${example}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nprevention policy can be imported by specifying the policy id.\n\n```sh\n$ pulumi import crowdstrike:index/preventionPolicyWindows:PreventionPolicyWindows example 7fb858a949034a0cbca175f660f1e769\n```\n\n", + "description": "This resource allows you to manage CrowdStrike Falcon prevention policies for Windows hosts. Prevention policies allow you to manage what activity will trigger detections and preventions on your hosts.\n\n## API Scopes\n\nThe following API scopes are required:\n\n- Prevention policies | Read \u0026 Write\n\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as crowdstrike from \"@crowdstrike/pulumi\";\n\nconst example = new crowdstrike.PreventionPolicyWindows(\"example\", {\n enabled: false,\n description: \"Made with Pulumi\",\n hostGroups: [\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\"],\n ioaRuleGroups: [\"ed334b3243bc4b6bb8e7d40a2ecd86fa\"],\n adwareAndPup: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n cloudAntiMalwareMicrosoftOfficeFiles: {\n detection: \"MODERATE\",\n prevention: \"DISABLED\",\n },\n cloudAntiMalware: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n cloudAntiMalwareUserInitiated: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n sensorAntiMalware: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n sensorAntiMalwareUserInitiated: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n extendedUserModeData: {\n detection: \"MODERATE\",\n },\n usbInsertionTriggeredScan: false,\n applicationExploitationActivity: false,\n additionalUserModeData: false,\n notifyEndUsers: false,\n advancedRemediation: false,\n backupDeletion: false,\n biosDeepVisibility: false,\n chopperWebshell: false,\n codeInjection: false,\n credentialDumping: false,\n cryptowall: false,\n customBlocking: false,\n detectOnWrite: false,\n driveByDownload: false,\n driverLoadPrevention: false,\n interpreterOnly: false,\n engineFullVisibility: false,\n enhancedExploitationVisibility: false,\n enhancedMlForLargerFiles: false,\n fileEncryption: false,\n fileSystemAccess: false,\n forceAslr: false,\n forceDep: false,\n heapSprayPreallocation: false,\n nullPageAllocation: false,\n sehOverwriteProtection: false,\n hardwareEnhancedExploitDetection: false,\n httpDetections: false,\n redactHttpDetectionDetails: false,\n intelligenceSourcedThreats: false,\n javascriptViaRundll32: false,\n locky: false,\n memoryScanning: false,\n memoryScanningScanWithCpu: false,\n microsoftOfficeFileSuspiciousMacroRemoval: false,\n onWriteScriptFileVisibility: false,\n preventSuspiciousProcesses: false,\n quarantineAndSecurityCenterRegistration: false,\n quarantineOnRemovableMedia: false,\n quarantineOnWrite: false,\n scriptBasedExecutionMonitoring: false,\n sensorTamperingProtection: false,\n suspiciousRegistryOperations: false,\n suspiciousScriptsAndCommands: false,\n uploadUnknownExecutables: false,\n uploadUnknownDetectionRelatedExecutables: false,\n volumeShadowCopyAudit: false,\n volumeShadowCopyProtect: false,\n vulnerableDriverProtection: false,\n windowsLogonBypassStickyKeys: false,\n});\nexport const preventionPolicyWindows = example;\n```\n```python\nimport pulumi\nimport crowdstrike_pulumi as crowdstrike\n\nexample = crowdstrike.PreventionPolicyWindows(\"example\",\n enabled=False,\n description=\"Made with Pulumi\",\n host_groups=[\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\"],\n ioa_rule_groups=[\"ed334b3243bc4b6bb8e7d40a2ecd86fa\"],\n adware_and_pup={\n \"detection\": \"MODERATE\",\n \"prevention\": \"CAUTIOUS\",\n },\n cloud_anti_malware_microsoft_office_files={\n \"detection\": \"MODERATE\",\n \"prevention\": \"DISABLED\",\n },\n cloud_anti_malware={\n \"detection\": \"MODERATE\",\n \"prevention\": \"CAUTIOUS\",\n },\n cloud_anti_malware_user_initiated={\n \"detection\": \"MODERATE\",\n \"prevention\": \"CAUTIOUS\",\n },\n sensor_anti_malware={\n \"detection\": \"MODERATE\",\n \"prevention\": \"CAUTIOUS\",\n },\n sensor_anti_malware_user_initiated={\n \"detection\": \"MODERATE\",\n \"prevention\": \"CAUTIOUS\",\n },\n extended_user_mode_data={\n \"detection\": \"MODERATE\",\n },\n usb_insertion_triggered_scan=False,\n application_exploitation_activity=False,\n additional_user_mode_data=False,\n notify_end_users=False,\n advanced_remediation=False,\n backup_deletion=False,\n bios_deep_visibility=False,\n chopper_webshell=False,\n code_injection=False,\n credential_dumping=False,\n cryptowall=False,\n custom_blocking=False,\n detect_on_write=False,\n drive_by_download=False,\n driver_load_prevention=False,\n interpreter_only=False,\n engine_full_visibility=False,\n enhanced_exploitation_visibility=False,\n enhanced_ml_for_larger_files=False,\n file_encryption=False,\n file_system_access=False,\n force_aslr=False,\n force_dep=False,\n heap_spray_preallocation=False,\n null_page_allocation=False,\n seh_overwrite_protection=False,\n hardware_enhanced_exploit_detection=False,\n http_detections=False,\n redact_http_detection_details=False,\n intelligence_sourced_threats=False,\n javascript_via_rundll32=False,\n locky=False,\n memory_scanning=False,\n memory_scanning_scan_with_cpu=False,\n microsoft_office_file_suspicious_macro_removal=False,\n on_write_script_file_visibility=False,\n prevent_suspicious_processes=False,\n quarantine_and_security_center_registration=False,\n quarantine_on_removable_media=False,\n quarantine_on_write=False,\n script_based_execution_monitoring=False,\n sensor_tampering_protection=False,\n suspicious_registry_operations=False,\n suspicious_scripts_and_commands=False,\n upload_unknown_executables=False,\n upload_unknown_detection_related_executables=False,\n volume_shadow_copy_audit=False,\n volume_shadow_copy_protect=False,\n vulnerable_driver_protection=False,\n windows_logon_bypass_sticky_keys=False)\npulumi.export(\"preventionPolicyWindows\", example)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Crowdstrike = CrowdStrike.Crowdstrike;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Crowdstrike.PreventionPolicyWindows(\"example\", new()\n {\n Enabled = false,\n Description = \"Made with Pulumi\",\n HostGroups = new[]\n {\n \"d6e3c1e1b3d0467da0fowc96a5e6ecb5\",\n },\n IoaRuleGroups = new[]\n {\n \"ed334b3243bc4b6bb8e7d40a2ecd86fa\",\n },\n AdwareAndPup = new Crowdstrike.Inputs.PreventionPolicyWindowsAdwareAndPupArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n CloudAntiMalwareMicrosoftOfficeFiles = new Crowdstrike.Inputs.PreventionPolicyWindowsCloudAntiMalwareMicrosoftOfficeFilesArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"DISABLED\",\n },\n CloudAntiMalware = new Crowdstrike.Inputs.PreventionPolicyWindowsCloudAntiMalwareArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n CloudAntiMalwareUserInitiated = new Crowdstrike.Inputs.PreventionPolicyWindowsCloudAntiMalwareUserInitiatedArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n SensorAntiMalware = new Crowdstrike.Inputs.PreventionPolicyWindowsSensorAntiMalwareArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n SensorAntiMalwareUserInitiated = new Crowdstrike.Inputs.PreventionPolicyWindowsSensorAntiMalwareUserInitiatedArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n ExtendedUserModeData = new Crowdstrike.Inputs.PreventionPolicyWindowsExtendedUserModeDataArgs\n {\n Detection = \"MODERATE\",\n },\n UsbInsertionTriggeredScan = false,\n ApplicationExploitationActivity = false,\n AdditionalUserModeData = false,\n NotifyEndUsers = false,\n AdvancedRemediation = false,\n BackupDeletion = false,\n BiosDeepVisibility = false,\n ChopperWebshell = false,\n CodeInjection = false,\n CredentialDumping = false,\n Cryptowall = false,\n CustomBlocking = false,\n DetectOnWrite = false,\n DriveByDownload = false,\n DriverLoadPrevention = false,\n InterpreterOnly = false,\n EngineFullVisibility = false,\n EnhancedExploitationVisibility = false,\n EnhancedMlForLargerFiles = false,\n FileEncryption = false,\n FileSystemAccess = false,\n ForceAslr = false,\n ForceDep = false,\n HeapSprayPreallocation = false,\n NullPageAllocation = false,\n SehOverwriteProtection = false,\n HardwareEnhancedExploitDetection = false,\n HttpDetections = false,\n RedactHttpDetectionDetails = false,\n IntelligenceSourcedThreats = false,\n JavascriptViaRundll32 = false,\n Locky = false,\n MemoryScanning = false,\n MemoryScanningScanWithCpu = false,\n MicrosoftOfficeFileSuspiciousMacroRemoval = false,\n OnWriteScriptFileVisibility = false,\n PreventSuspiciousProcesses = false,\n QuarantineAndSecurityCenterRegistration = false,\n QuarantineOnRemovableMedia = false,\n QuarantineOnWrite = false,\n ScriptBasedExecutionMonitoring = false,\n SensorTamperingProtection = false,\n SuspiciousRegistryOperations = false,\n SuspiciousScriptsAndCommands = false,\n UploadUnknownExecutables = false,\n UploadUnknownDetectionRelatedExecutables = false,\n VolumeShadowCopyAudit = false,\n VolumeShadowCopyProtect = false,\n VulnerableDriverProtection = false,\n WindowsLogonBypassStickyKeys = false,\n });\n\n return new Dictionary\u003cstring, object?\u003e\n {\n [\"preventionPolicyWindows\"] = example,\n };\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/crowdstrike/pulumi-crowdstrike/sdk/go/crowdstrike\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := crowdstrike.NewPreventionPolicyWindows(ctx, \"example\", \u0026crowdstrike.PreventionPolicyWindowsArgs{\n\t\t\tEnabled: pulumi.Bool(false),\n\t\t\tDescription: pulumi.String(\"Made with Pulumi\"),\n\t\t\tHostGroups: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\"),\n\t\t\t},\n\t\t\tIoaRuleGroups: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"ed334b3243bc4b6bb8e7d40a2ecd86fa\"),\n\t\t\t},\n\t\t\tAdwareAndPup: \u0026crowdstrike.PreventionPolicyWindowsAdwareAndPupArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tCloudAntiMalwareMicrosoftOfficeFiles: \u0026crowdstrike.PreventionPolicyWindowsCloudAntiMalwareMicrosoftOfficeFilesArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"DISABLED\"),\n\t\t\t},\n\t\t\tCloudAntiMalware: \u0026crowdstrike.PreventionPolicyWindowsCloudAntiMalwareArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tCloudAntiMalwareUserInitiated: \u0026crowdstrike.PreventionPolicyWindowsCloudAntiMalwareUserInitiatedArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tSensorAntiMalware: \u0026crowdstrike.PreventionPolicyWindowsSensorAntiMalwareArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tSensorAntiMalwareUserInitiated: \u0026crowdstrike.PreventionPolicyWindowsSensorAntiMalwareUserInitiatedArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tExtendedUserModeData: \u0026crowdstrike.PreventionPolicyWindowsExtendedUserModeDataArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t},\n\t\t\tUsbInsertionTriggeredScan: pulumi.Bool(false),\n\t\t\tApplicationExploitationActivity: pulumi.Bool(false),\n\t\t\tAdditionalUserModeData: pulumi.Bool(false),\n\t\t\tNotifyEndUsers: pulumi.Bool(false),\n\t\t\tAdvancedRemediation: pulumi.Bool(false),\n\t\t\tBackupDeletion: pulumi.Bool(false),\n\t\t\tBiosDeepVisibility: pulumi.Bool(false),\n\t\t\tChopperWebshell: pulumi.Bool(false),\n\t\t\tCodeInjection: pulumi.Bool(false),\n\t\t\tCredentialDumping: pulumi.Bool(false),\n\t\t\tCryptowall: pulumi.Bool(false),\n\t\t\tCustomBlocking: pulumi.Bool(false),\n\t\t\tDetectOnWrite: pulumi.Bool(false),\n\t\t\tDriveByDownload: pulumi.Bool(false),\n\t\t\tDriverLoadPrevention: pulumi.Bool(false),\n\t\t\tInterpreterOnly: pulumi.Bool(false),\n\t\t\tEngineFullVisibility: pulumi.Bool(false),\n\t\t\tEnhancedExploitationVisibility: pulumi.Bool(false),\n\t\t\tEnhancedMlForLargerFiles: pulumi.Bool(false),\n\t\t\tFileEncryption: pulumi.Bool(false),\n\t\t\tFileSystemAccess: pulumi.Bool(false),\n\t\t\tForceAslr: pulumi.Bool(false),\n\t\t\tForceDep: pulumi.Bool(false),\n\t\t\tHeapSprayPreallocation: pulumi.Bool(false),\n\t\t\tNullPageAllocation: pulumi.Bool(false),\n\t\t\tSehOverwriteProtection: pulumi.Bool(false),\n\t\t\tHardwareEnhancedExploitDetection: pulumi.Bool(false),\n\t\t\tHttpDetections: pulumi.Bool(false),\n\t\t\tRedactHttpDetectionDetails: pulumi.Bool(false),\n\t\t\tIntelligenceSourcedThreats: pulumi.Bool(false),\n\t\t\tJavascriptViaRundll32: pulumi.Bool(false),\n\t\t\tLocky: pulumi.Bool(false),\n\t\t\tMemoryScanning: pulumi.Bool(false),\n\t\t\tMemoryScanningScanWithCpu: pulumi.Bool(false),\n\t\t\tMicrosoftOfficeFileSuspiciousMacroRemoval: pulumi.Bool(false),\n\t\t\tOnWriteScriptFileVisibility: pulumi.Bool(false),\n\t\t\tPreventSuspiciousProcesses: pulumi.Bool(false),\n\t\t\tQuarantineAndSecurityCenterRegistration: pulumi.Bool(false),\n\t\t\tQuarantineOnRemovableMedia: pulumi.Bool(false),\n\t\t\tQuarantineOnWrite: pulumi.Bool(false),\n\t\t\tScriptBasedExecutionMonitoring: pulumi.Bool(false),\n\t\t\tSensorTamperingProtection: pulumi.Bool(false),\n\t\t\tSuspiciousRegistryOperations: pulumi.Bool(false),\n\t\t\tSuspiciousScriptsAndCommands: pulumi.Bool(false),\n\t\t\tUploadUnknownExecutables: pulumi.Bool(false),\n\t\t\tUploadUnknownDetectionRelatedExecutables: pulumi.Bool(false),\n\t\t\tVolumeShadowCopyAudit: pulumi.Bool(false),\n\t\t\tVolumeShadowCopyProtect: pulumi.Bool(false),\n\t\t\tVulnerableDriverProtection: pulumi.Bool(false),\n\t\t\tWindowsLogonBypassStickyKeys: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tctx.Export(\"preventionPolicyWindows\", example)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.crowdstrike.PreventionPolicyWindows;\nimport com.pulumi.crowdstrike.PreventionPolicyWindowsArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyWindowsAdwareAndPupArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyWindowsCloudAntiMalwareMicrosoftOfficeFilesArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyWindowsCloudAntiMalwareArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyWindowsCloudAntiMalwareUserInitiatedArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyWindowsSensorAntiMalwareArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyWindowsSensorAntiMalwareUserInitiatedArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyWindowsExtendedUserModeDataArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new PreventionPolicyWindows(\"example\", PreventionPolicyWindowsArgs.builder()\n .enabled(false)\n .description(\"Made with Pulumi\")\n .hostGroups(\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\")\n .ioaRuleGroups(\"ed334b3243bc4b6bb8e7d40a2ecd86fa\")\n .adwareAndPup(PreventionPolicyWindowsAdwareAndPupArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .cloudAntiMalwareMicrosoftOfficeFiles(PreventionPolicyWindowsCloudAntiMalwareMicrosoftOfficeFilesArgs.builder()\n .detection(\"MODERATE\")\n .prevention(\"DISABLED\")\n .build())\n .cloudAntiMalware(PreventionPolicyWindowsCloudAntiMalwareArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .cloudAntiMalwareUserInitiated(PreventionPolicyWindowsCloudAntiMalwareUserInitiatedArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .sensorAntiMalware(PreventionPolicyWindowsSensorAntiMalwareArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .sensorAntiMalwareUserInitiated(PreventionPolicyWindowsSensorAntiMalwareUserInitiatedArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .extendedUserModeData(PreventionPolicyWindowsExtendedUserModeDataArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .usbInsertionTriggeredScan(false)\n .applicationExploitationActivity(false)\n .additionalUserModeData(false)\n .notifyEndUsers(false)\n .advancedRemediation(false)\n .backupDeletion(false)\n .biosDeepVisibility(false)\n .chopperWebshell(false)\n .codeInjection(false)\n .credentialDumping(false)\n .cryptowall(false)\n .customBlocking(false)\n .detectOnWrite(false)\n .driveByDownload(false)\n .driverLoadPrevention(false)\n .interpreterOnly(false)\n .engineFullVisibility(false)\n .enhancedExploitationVisibility(false)\n .enhancedMlForLargerFiles(false)\n .fileEncryption(false)\n .fileSystemAccess(false)\n .forceAslr(false)\n .forceDep(false)\n .heapSprayPreallocation(false)\n .nullPageAllocation(false)\n .sehOverwriteProtection(false)\n .hardwareEnhancedExploitDetection(false)\n .httpDetections(false)\n .redactHttpDetectionDetails(false)\n .intelligenceSourcedThreats(false)\n .javascriptViaRundll32(false)\n .locky(false)\n .memoryScanning(false)\n .memoryScanningScanWithCpu(false)\n .microsoftOfficeFileSuspiciousMacroRemoval(false)\n .onWriteScriptFileVisibility(false)\n .preventSuspiciousProcesses(false)\n .quarantineAndSecurityCenterRegistration(false)\n .quarantineOnRemovableMedia(false)\n .quarantineOnWrite(false)\n .scriptBasedExecutionMonitoring(false)\n .sensorTamperingProtection(false)\n .suspiciousRegistryOperations(false)\n .suspiciousScriptsAndCommands(false)\n .uploadUnknownExecutables(false)\n .uploadUnknownDetectionRelatedExecutables(false)\n .volumeShadowCopyAudit(false)\n .volumeShadowCopyProtect(false)\n .vulnerableDriverProtection(false)\n .windowsLogonBypassStickyKeys(false)\n .build());\n\n ctx.export(\"preventionPolicyWindows\", example);\n }\n}\n```\n```yaml\nresources:\n example:\n type: crowdstrike:PreventionPolicyWindows\n properties:\n enabled: false\n description: Made with Pulumi\n hostGroups:\n - d6e3c1e1b3d0467da0fowc96a5e6ecb5\n ioaRuleGroups:\n - ed334b3243bc4b6bb8e7d40a2ecd86fa\n adwareAndPup:\n detection: MODERATE\n prevention: CAUTIOUS\n cloudAntiMalwareMicrosoftOfficeFiles:\n detection: MODERATE\n prevention: DISABLED\n cloudAntiMalware:\n detection: MODERATE\n prevention: CAUTIOUS\n cloudAntiMalwareUserInitiated:\n detection: MODERATE\n prevention: CAUTIOUS\n sensorAntiMalware:\n detection: MODERATE\n prevention: CAUTIOUS\n sensorAntiMalwareUserInitiated:\n detection: MODERATE\n prevention: CAUTIOUS\n extendedUserModeData:\n detection: MODERATE\n usbInsertionTriggeredScan: false\n applicationExploitationActivity: false\n additionalUserModeData: false\n notifyEndUsers: false\n advancedRemediation: false\n backupDeletion: false\n biosDeepVisibility: false\n chopperWebshell: false\n codeInjection: false\n credentialDumping: false\n cryptowall: false\n customBlocking: false\n detectOnWrite: false\n driveByDownload: false\n driverLoadPrevention: false\n interpreterOnly: false\n engineFullVisibility: false\n enhancedExploitationVisibility: false\n enhancedMlForLargerFiles: false\n fileEncryption: false\n fileSystemAccess: false\n forceAslr: false\n forceDep: false\n heapSprayPreallocation: false\n nullPageAllocation: false\n sehOverwriteProtection: false\n hardwareEnhancedExploitDetection: false\n httpDetections: false\n redactHttpDetectionDetails: false\n intelligenceSourcedThreats: false\n javascriptViaRundll32: false\n locky: false\n memoryScanning: false\n memoryScanningScanWithCpu: false\n microsoftOfficeFileSuspiciousMacroRemoval: false\n onWriteScriptFileVisibility: false\n preventSuspiciousProcesses: false\n quarantineAndSecurityCenterRegistration: false\n quarantineOnRemovableMedia: false\n quarantineOnWrite: false\n scriptBasedExecutionMonitoring: false\n sensorTamperingProtection: false\n suspiciousRegistryOperations: false\n suspiciousScriptsAndCommands: false\n uploadUnknownExecutables: false\n uploadUnknownDetectionRelatedExecutables: false\n volumeShadowCopyAudit: false\n volumeShadowCopyProtect: false\n vulnerableDriverProtection: false\n windowsLogonBypassStickyKeys: false\noutputs:\n preventionPolicyWindows: ${example}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nprevention policy can be imported by specifying the policy id.\n\n```sh\n$ pulumi import crowdstrike:index/preventionPolicyWindows:PreventionPolicyWindows example 7fb858a949034a0cbca175f660f1e769\n```\n\n", "properties": { "additionalUserModeData": { "type": "boolean", diff --git a/provider/go.mod b/provider/go.mod index 65981ab..36e9d46 100644 --- a/provider/go.mod +++ b/provider/go.mod @@ -1,21 +1,22 @@ module github.com/crowdstrike/pulumi-crowdstrike/provider -go 1.21 +go 1.22.0 + +toolchain go1.22.7 replace github.com/crowdstrike/terraform-provider-crowdstrike/shim => ./shim require ( github.com/crowdstrike/terraform-provider-crowdstrike/shim v0.0.0-00010101000000-000000000000 github.com/ettle/strcase v0.1.1 - github.com/pulumi/pulumi-terraform-bridge/pf v0.41.0 - github.com/pulumi/pulumi-terraform-bridge/v3 v3.88.0 - github.com/pulumi/pulumi/sdk/v3 v3.126.0 + github.com/pulumi/pulumi-terraform-bridge/pf v0.44.1 + github.com/pulumi/pulumi-terraform-bridge/v3 v3.91.1 + github.com/pulumi/pulumi/sdk/v3 v3.133.0 ) require ( cloud.google.com/go v0.112.1 // indirect - cloud.google.com/go/compute v1.25.0 // indirect - cloud.google.com/go/compute/metadata v0.2.3 // indirect + cloud.google.com/go/compute/metadata v0.3.0 // indirect cloud.google.com/go/iam v1.1.6 // indirect cloud.google.com/go/kms v1.15.7 // indirect cloud.google.com/go/logging v1.9.0 // indirect @@ -70,7 +71,7 @@ require ( github.com/cloudflare/circl v1.3.7 // indirect github.com/containerd/console v1.0.4-0.20230313162750-1ae8d489ac81 // indirect github.com/crowdstrike/gofalcon v0.6.1-0.20240426204036-ac8ce2b4f2d7 // indirect - github.com/crowdstrike/terraform-provider-crowdstrike v0.0.4 // indirect + github.com/crowdstrike/terraform-provider-crowdstrike v0.0.6 // indirect github.com/cyphar/filepath-securejoin v0.2.4 // indirect github.com/davecgh/go-spew v1.1.1 // indirect github.com/deckarep/golang-set/v2 v2.5.0 // indirect @@ -98,7 +99,7 @@ require ( github.com/gofrs/uuid v4.2.0+incompatible // indirect github.com/gogo/protobuf v1.3.2 // indirect github.com/golang-jwt/jwt/v5 v5.2.1 // indirect - github.com/golang/glog v1.2.0 // indirect + github.com/golang/glog v1.2.1 // indirect github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da // indirect github.com/golang/protobuf v1.5.4 // indirect github.com/google/go-querystring v1.1.0 // indirect @@ -116,7 +117,7 @@ require ( github.com/hashicorp/go-getter v1.7.5 // indirect github.com/hashicorp/go-hclog v1.6.3 // indirect github.com/hashicorp/go-multierror v1.1.1 // indirect - github.com/hashicorp/go-plugin v1.6.0 // indirect + github.com/hashicorp/go-plugin v1.6.1 // indirect github.com/hashicorp/go-retryablehttp v0.7.7 // indirect github.com/hashicorp/go-rootcerts v1.0.2 // indirect github.com/hashicorp/go-safetemp v1.0.0 // indirect @@ -128,9 +129,9 @@ require ( github.com/hashicorp/hcl v1.0.0 // indirect github.com/hashicorp/hcl/v2 v2.20.0 // indirect github.com/hashicorp/hil v0.0.0-20190212132231-97b3a9cdfa93 // indirect - github.com/hashicorp/terraform-plugin-framework v1.8.0 // indirect + github.com/hashicorp/terraform-plugin-framework v1.12.0 // indirect github.com/hashicorp/terraform-plugin-framework-validators v0.12.0 // indirect - github.com/hashicorp/terraform-plugin-go v0.22.2 // indirect + github.com/hashicorp/terraform-plugin-go v0.24.0 // indirect github.com/hashicorp/terraform-plugin-log v0.9.0 // indirect github.com/hashicorp/terraform-registry-address v0.2.3 // indirect github.com/hashicorp/terraform-svchost v0.1.1 // indirect @@ -182,12 +183,12 @@ require ( github.com/pmezard/go-difflib v1.0.0 // indirect github.com/posener/complete v1.2.3 // indirect github.com/pulumi/appdash v0.0.0-20231130102222-75f619a67231 // indirect - github.com/pulumi/esc v0.9.1 // indirect + github.com/pulumi/esc v0.10.0 // indirect github.com/pulumi/inflector v0.1.1 // indirect - github.com/pulumi/pulumi-java/pkg v0.11.0 // indirect + github.com/pulumi/pulumi-java/pkg v0.16.1 // indirect github.com/pulumi/pulumi-terraform-bridge/x/muxer v0.0.8 // indirect - github.com/pulumi/pulumi-yaml v1.9.1 // indirect - github.com/pulumi/pulumi/pkg/v3 v3.126.0 // indirect + github.com/pulumi/pulumi-yaml v1.10.0 // indirect + github.com/pulumi/pulumi/pkg/v3 v3.133.0 // indirect github.com/pulumi/schema-tools v0.1.2 // indirect github.com/rivo/uniseg v0.4.4 // indirect github.com/rogpeppe/go-internal v1.12.0 // indirect @@ -206,8 +207,8 @@ require ( github.com/spf13/cobra v1.8.0 // indirect github.com/spf13/pflag v1.0.5 // indirect github.com/stretchr/testify v1.9.0 // indirect + github.com/teekennedy/goldmark-markdown v0.3.0 // indirect github.com/texttheater/golang-levenshtein v1.0.1 // indirect - github.com/tweekmonster/luser v0.0.0-20161003172636-3fa38070dbd7 // indirect github.com/uber/jaeger-client-go v2.30.0+incompatible // indirect github.com/uber/jaeger-lib v2.4.1+incompatible // indirect github.com/ulikunitz/xz v0.5.10 // indirect @@ -217,6 +218,7 @@ require ( github.com/xeipuuv/gojsonpointer v0.0.0-20180127040702-4e3ac2762d5f // indirect github.com/xeipuuv/gojsonreference v0.0.0-20180127040603-bd5ef7bd5415 // indirect github.com/xeipuuv/gojsonschema v1.2.0 // indirect + github.com/yuin/goldmark v1.7.4 // indirect github.com/zclconf/go-cty v1.14.4 // indirect go.mongodb.org/mongo-driver v1.15.0 // indirect go.opencensus.io v0.24.0 // indirect @@ -228,25 +230,27 @@ require ( go.uber.org/atomic v1.9.0 // indirect gocloud.dev v0.37.0 // indirect gocloud.dev/secrets/hashivault v0.37.0 // indirect - golang.org/x/crypto v0.24.0 // indirect + golang.org/x/crypto v0.25.0 // indirect golang.org/x/exp v0.0.0-20240604190554-fc45aab8b7f8 // indirect golang.org/x/mod v0.18.0 // indirect - golang.org/x/net v0.26.0 // indirect - golang.org/x/oauth2 v0.19.0 // indirect + golang.org/x/net v0.27.0 // indirect + golang.org/x/oauth2 v0.21.0 // indirect golang.org/x/sync v0.7.0 // indirect - golang.org/x/sys v0.21.0 // indirect - golang.org/x/term v0.21.0 // indirect + golang.org/x/sys v0.22.0 // indirect + golang.org/x/term v0.22.0 // indirect golang.org/x/text v0.16.0 // indirect golang.org/x/time v0.5.0 // indirect golang.org/x/tools v0.22.0 // indirect golang.org/x/xerrors v0.0.0-20231012003039-104605ab7028 // indirect google.golang.org/api v0.169.0 // indirect google.golang.org/genproto v0.0.0-20240311173647-c811ad7063a7 // indirect - google.golang.org/genproto/googleapis/api v0.0.0-20240311173647-c811ad7063a7 // indirect - google.golang.org/genproto/googleapis/rpc v0.0.0-20240311173647-c811ad7063a7 // indirect - google.golang.org/grpc v1.63.2 // indirect - google.golang.org/protobuf v1.33.0 // indirect + google.golang.org/genproto/googleapis/api v0.0.0-20240604185151-ef581f913117 // indirect + google.golang.org/genproto/googleapis/rpc v0.0.0-20240604185151-ef581f913117 // indirect + google.golang.org/grpc v1.66.2 // indirect + google.golang.org/protobuf v1.34.2 // indirect gopkg.in/warnings.v0 v0.1.2 // indirect gopkg.in/yaml.v3 v3.0.1 // indirect lukechampine.com/frand v1.4.2 // indirect ) + +replace github.com/hashicorp/terraform-plugin-sdk/v2 => github.com/pulumi/terraform-plugin-sdk/v2 v2.0.0-20240520223432-0c0bf0d65f10 diff --git a/provider/go.sum b/provider/go.sum index b7b7d0b..42fb378 100644 --- a/provider/go.sum +++ b/provider/go.sum @@ -70,10 +70,8 @@ cloud.google.com/go/compute v1.6.0/go.mod h1:T29tfhtVbq1wvAPo0E3+7vhgmkOYeXjhFvz cloud.google.com/go/compute v1.6.1/go.mod h1:g85FgpzFvNULZ+S8AYq87axRKuf2Kh7deLqV/jJ3thU= cloud.google.com/go/compute v1.7.0/go.mod h1:435lt8av5oL9P3fv1OEzSbSUe+ybHXGMPQHHZWZxy9U= cloud.google.com/go/compute v1.10.0/go.mod h1:ER5CLbMxl90o2jtNbGSbtfOpQKR0t15FOtRsugnLrlU= -cloud.google.com/go/compute v1.25.0 h1:H1/4SqSUhjPFE7L5ddzHOfY2bCAvjwNRZPNl6Ni5oYU= -cloud.google.com/go/compute v1.25.0/go.mod h1:GR7F0ZPZH8EhChlMo9FkLd7eUTwEymjqQagxzilIxIE= -cloud.google.com/go/compute/metadata v0.2.3 h1:mg4jlk7mCAj6xXp9UJ4fjI9VUI5rubuGBW5aJ7UnBMY= -cloud.google.com/go/compute/metadata v0.2.3/go.mod h1:VAV5nSsACxMJvgaAuX6Pk2AawlZn8kiOGuCv6gTkwuA= +cloud.google.com/go/compute/metadata v0.3.0 h1:Tz+eQXMEqDIKRsmY3cHTL6FVaynIjX2QxYC4trgAKZc= +cloud.google.com/go/compute/metadata v0.3.0/go.mod h1:zFmK7XCadkQkj6TtorcaGlCW1hT1fIilQDwofLpJ20k= cloud.google.com/go/containeranalysis v0.5.1/go.mod h1:1D92jd8gRR/c0fGMlymRgxWD3Qw9C1ff6/T7mLgVL8I= cloud.google.com/go/containeranalysis v0.6.0/go.mod h1:HEJoiEIu+lEXM+k7+qLCci0h33lX3ZqoYFdmPcoO7s4= cloud.google.com/go/datacatalog v1.3.0/go.mod h1:g9svFY6tuR+j+hrTw3J2dNcmI0dzmSiyOzm8kpLq0a0= @@ -239,6 +237,8 @@ github.com/anmitsu/go-shlex v0.0.0-20200514113438-38f4b401e2be/go.mod h1:ySMOLuW github.com/antihax/optional v1.0.0/go.mod h1:uupD/76wgC+ih3iEmQUL+0Ugr19nfwCT1kdvxnR2qWY= github.com/apparentlymart/go-cidr v1.1.0 h1:2mAhrMoF+nhXqxTzSZMUzDHkLjmIHC+Zzn4tdgBZjnU= github.com/apparentlymart/go-cidr v1.1.0/go.mod h1:EBcsNrHc3zQeuaeCeCtQruQm+n9/YjEn/vI25Lg7Gwc= +github.com/apparentlymart/go-dump v0.0.0-20180507223929-23540a00eaa3 h1:ZSTrOEhiM5J5RFxEaFvMZVEAM1KvT1YzbEOwB2EAGjA= +github.com/apparentlymart/go-dump v0.0.0-20180507223929-23540a00eaa3/go.mod h1:oL81AME2rN47vu18xqj1S1jPIPuN7afo62yKTNn3XMM= github.com/apparentlymart/go-textseg/v12 v12.0.0/go.mod h1:S/4uRK2UtaQttw1GenVJEynmyUenKwP++x/+DdGV/Ec= github.com/apparentlymart/go-textseg/v15 v15.0.0 h1:uYvfpb3DyLSCGWnctWKGj857c6ew1u1fNQOlOtuGxQY= github.com/apparentlymart/go-textseg/v15 v15.0.0/go.mod h1:K8XmNZdhEBkdlyDdvbmmsvpAG721bKi0joRfFdHIWJ4= @@ -342,8 +342,8 @@ github.com/containerd/console v1.0.4-0.20230313162750-1ae8d489ac81/go.mod h1:Yyn github.com/cpuguy83/go-md2man/v2 v2.0.3/go.mod h1:tgQtvFlXSQOSOSIRvRPT7W67SCa46tRHOmNcaadrF8o= github.com/crowdstrike/gofalcon v0.6.1-0.20240426204036-ac8ce2b4f2d7 h1:NLcXFICTUakAvJFSH8z+Ht6SfJ52FbOasYdP8p7BcsQ= github.com/crowdstrike/gofalcon v0.6.1-0.20240426204036-ac8ce2b4f2d7/go.mod h1:7KSolP3XCntqZiu7GfGd8uedAQ82dqBNpP0gqBksWB8= -github.com/crowdstrike/terraform-provider-crowdstrike v0.0.4 h1:h0HtPheheH5VggvGXqWc49dYFctxhQqpm/ep+jtiww0= -github.com/crowdstrike/terraform-provider-crowdstrike v0.0.4/go.mod h1:R9kYJzHPH0NKBwPwJdNchkorNDAKxbqr/Cnxx8JPPw0= +github.com/crowdstrike/terraform-provider-crowdstrike v0.0.6 h1:L6SDq2C5LZnyyfk6bqtLfS9+q5GwAQQ5Fy+iwumgb64= +github.com/crowdstrike/terraform-provider-crowdstrike v0.0.6/go.mod h1:R9kYJzHPH0NKBwPwJdNchkorNDAKxbqr/Cnxx8JPPw0= github.com/cyphar/filepath-securejoin v0.2.4 h1:Ugdm7cg7i6ZK6x3xDF1oEu1nfkyfH53EtKeQYTC3kyg= github.com/cyphar/filepath-securejoin v0.2.4/go.mod h1:aPGpWjXOXUn2NCNjFvBE6aRxGGx79pTxQpKOJNYHHl4= github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38= @@ -378,8 +378,8 @@ github.com/fatih/color v1.16.0 h1:zmkK9Ngbjj+K0yRhTVONQh1p/HknKYSlNT+vZCzyokM= github.com/fatih/color v1.16.0/go.mod h1:fL2Sau1YI5c0pdGEVCbKQbLXB6edEj1ZgiY4NijnWvE= github.com/felixge/httpsnoop v1.0.4 h1:NFTV2Zj1bL4mc9sqWACXbQFVBBg2W3GPvqp8/ESS2Wg= github.com/felixge/httpsnoop v1.0.4/go.mod h1:m8KPJKqk1gH5J9DgRY2ASl2lWCfGKXixSwevea8zH2U= -github.com/frankban/quicktest v1.14.4 h1:g2rn0vABPOOXmZUj+vbmUp0lPoXEMuhTpIluN0XL9UY= -github.com/frankban/quicktest v1.14.4/go.mod h1:4ptaffx2x8+WTWXmUCuVU6aPUX1/Mz7zb5vbUoiM6w0= +github.com/frankban/quicktest v1.14.3 h1:FJKSZTDHjyhriyC81FLQ0LY93eSai0ZyR/ZIkd3ZUKE= +github.com/frankban/quicktest v1.14.3/go.mod h1:mgiwOwqx65TmIk1wJ6Q7wvnVMocbUorkibMOrVTHZps= github.com/ghodss/yaml v1.0.0/go.mod h1:4dBDuWmgqj2HViK6kFavaiC9ZROes6MMH2rRYeMEF04= github.com/gliderlabs/ssh v0.3.7 h1:iV3Bqi942d9huXnzEF2Mt+CY9gLu8DNM4Obd+8bODRE= github.com/gliderlabs/ssh v0.3.7/go.mod h1:zpHEXBstFnQYtGnB8k8kQLol82umzn/2/snG7alWVD8= @@ -431,8 +431,8 @@ github.com/gogo/protobuf v1.3.2/go.mod h1:P1XiOD3dCwIKUDQYPy72D8LYyHL2YPYrpS2s69 github.com/golang-jwt/jwt/v5 v5.2.1 h1:OuVbFODueb089Lh128TAcimifWaLhJwVflnrgM17wHk= github.com/golang-jwt/jwt/v5 v5.2.1/go.mod h1:pqrtFR0X4osieyHYxtmOUWsAWrfe1Q5UVIyoH402zdk= github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b/go.mod h1:SBH7ygxi8pfUlaOkMMuAQtPIUF8ecWP5IEl/CR7VP2Q= -github.com/golang/glog v1.2.0 h1:uCdmnmatrKCgMBlM4rMuJZWOkPDqdbZPnrMXDY4gI68= -github.com/golang/glog v1.2.0/go.mod h1:6AhwSGph0fcJtXVM/PEHPqZlFeoLxhs7/t5UDAwmO+w= +github.com/golang/glog v1.2.1 h1:OptwRhECazUx5ix5TTWC3EZhsZEHWcYWY4FQHTIubm4= +github.com/golang/glog v1.2.1/go.mod h1:6AhwSGph0fcJtXVM/PEHPqZlFeoLxhs7/t5UDAwmO+w= github.com/golang/groupcache v0.0.0-20190702054246-869f871628b6/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc= github.com/golang/groupcache v0.0.0-20191227052852-215e87163ea7/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc= github.com/golang/groupcache v0.0.0-20200121045136-8c9f03a8e57e/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc= @@ -568,8 +568,8 @@ github.com/hashicorp/go-hclog v1.6.3/go.mod h1:W4Qnvbt70Wk/zYJryRzDRU/4r0kIg0PVH github.com/hashicorp/go-multierror v1.0.0/go.mod h1:dHtQlpGsu+cZNNAkkCN/P3hoUDHhCYQXV3UM06sGGrk= github.com/hashicorp/go-multierror v1.1.1 h1:H5DkEtf6CXdFp0N0Em5UCwQpXMWke8IA0+lD48awMYo= github.com/hashicorp/go-multierror v1.1.1/go.mod h1:iw975J/qwKPdAO1clOe2L8331t/9/fmwbPZ6JB6eMoM= -github.com/hashicorp/go-plugin v1.6.0 h1:wgd4KxHJTVGGqWBq4QPB1i5BZNEx9BR8+OFmHDmTk8A= -github.com/hashicorp/go-plugin v1.6.0/go.mod h1:lBS5MtSSBZk0SHc66KACcjjlU6WzEVP/8pwz68aMkCI= +github.com/hashicorp/go-plugin v1.6.1 h1:P7MR2UP6gNKGPp+y7EZw2kOiq4IR9WiqLvp0XOsVdwI= +github.com/hashicorp/go-plugin v1.6.1/go.mod h1:XPHFku2tFo3o3QKFgSYo+cghcUhw1NA1hZyMK0PWAw0= github.com/hashicorp/go-retryablehttp v0.7.7 h1:C8hUCYzor8PIfXHa4UrZkU4VvK8o9ISHxT2Q8+VepXU= github.com/hashicorp/go-retryablehttp v0.7.7/go.mod h1:pkQpWZeYWskR+D1tR2O5OcBFOxfA7DoAO6xtkuQnHTk= github.com/hashicorp/go-rootcerts v1.0.2 h1:jzhAVGtqPKbwpyCPELlgNWhE1znq+qwJtW5Oi2viEzc= @@ -602,18 +602,16 @@ github.com/hashicorp/terraform-exec v0.20.0 h1:DIZnPsqzPGuUnq6cH8jWcPunBfY+C+M8J github.com/hashicorp/terraform-exec v0.20.0/go.mod h1:ckKGkJWbsNqFKV1itgMnE0hY9IYf1HoiekpuN0eWoDw= github.com/hashicorp/terraform-json v0.21.0 h1:9NQxbLNqPbEMze+S6+YluEdXgJmhQykRyRNd+zTI05U= github.com/hashicorp/terraform-json v0.21.0/go.mod h1:qdeBs11ovMzo5puhrRibdD6d2Dq6TyE/28JiU4tIQxk= -github.com/hashicorp/terraform-plugin-framework v1.8.0 h1:P07qy8RKLcoBkCrY2RHJer5AEvJnDuXomBgou6fD8kI= -github.com/hashicorp/terraform-plugin-framework v1.8.0/go.mod h1:/CpTukO88PcL/62noU7cuyaSJ4Rsim+A/pa+3rUVufY= +github.com/hashicorp/terraform-plugin-framework v1.12.0 h1:7HKaueHPaikX5/7cbC1r9d1m12iYHY+FlNZEGxQ42CQ= +github.com/hashicorp/terraform-plugin-framework v1.12.0/go.mod h1:N/IOQ2uYjW60Jp39Cp3mw7I/OpC/GfZ0385R0YibmkE= github.com/hashicorp/terraform-plugin-framework-validators v0.12.0 h1:HOjBuMbOEzl7snOdOoUfE2Jgeto6JOjLVQ39Ls2nksc= github.com/hashicorp/terraform-plugin-framework-validators v0.12.0/go.mod h1:jfHGE/gzjxYz6XoUwi/aYiiKrJDeutQNUtGQXkaHklg= -github.com/hashicorp/terraform-plugin-go v0.22.2 h1:5o8uveu6eZUf5J7xGPV0eY0TPXg3qpmwX9sce03Bxnc= -github.com/hashicorp/terraform-plugin-go v0.22.2/go.mod h1:drq8Snexp9HsbFZddvyLHN6LuWHHndSQg+gV+FPkcIM= +github.com/hashicorp/terraform-plugin-go v0.24.0 h1:2WpHhginCdVhFIrWHxDEg6RBn3YaWzR2o6qUeIEat2U= +github.com/hashicorp/terraform-plugin-go v0.24.0/go.mod h1:tUQ53lAsOyYSckFGEefGC5C8BAaO0ENqzFd3bQeuYQg= github.com/hashicorp/terraform-plugin-log v0.9.0 h1:i7hOA+vdAItN1/7UrfBqBwvYPQ9TFvymaRGZED3FCV0= github.com/hashicorp/terraform-plugin-log v0.9.0/go.mod h1:rKL8egZQ/eXSyDqzLUuwUYLVdlYeamldAHSxjUFADow= github.com/hashicorp/terraform-plugin-sdk v1.7.0 h1:B//oq0ZORG+EkVrIJy0uPGSonvmXqxSzXe8+GhknoW0= github.com/hashicorp/terraform-plugin-sdk v1.7.0/go.mod h1:OjgQmey5VxnPej/buEhe+YqKm0KNvV3QqU4hkqHqPCY= -github.com/hashicorp/terraform-plugin-sdk/v2 v2.33.0 h1:qHprzXy/As0rxedphECBEQAh3R4yp6pKksKHcqZx5G8= -github.com/hashicorp/terraform-plugin-sdk/v2 v2.33.0/go.mod h1:H+8tjs9TjV2w57QFVSMBQacf8k/E1XwLXGCARgViC6A= github.com/hashicorp/terraform-plugin-testing v1.7.0 h1:I6aeCyZ30z4NiI3tzyDoO6fS7YxP5xSL1ceOon3gTe8= github.com/hashicorp/terraform-plugin-testing v1.7.0/go.mod h1:sbAreCleJNOCz+y5vVHV8EJkIWZKi/t4ndKiUjM9vao= github.com/hashicorp/terraform-registry-address v0.2.3 h1:2TAiKJ1A3MAkZlH1YI/aTVcLZRu7JseiXNRHbOAyoTI= @@ -771,30 +769,34 @@ github.com/posener/complete v1.2.3/go.mod h1:WZIdtGGp+qx0sLrYKtIRAruyNpv6hFCicSg github.com/prometheus/client_model v0.0.0-20190812154241-14fe0d1b01d4/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA= github.com/pulumi/appdash v0.0.0-20231130102222-75f619a67231 h1:vkHw5I/plNdTr435cARxCW6q9gc0S/Yxz7Mkd38pOb0= github.com/pulumi/appdash v0.0.0-20231130102222-75f619a67231/go.mod h1:murToZ2N9hNJzewjHBgfFdXhZKjY3z5cYC1VXk+lbFE= -github.com/pulumi/esc v0.9.1 h1:HH5eEv8sgyxSpY5a8yePyqFXzA8cvBvapfH8457+mIs= -github.com/pulumi/esc v0.9.1/go.mod h1:oEJ6bOsjYlQUpjf70GiX+CXn3VBmpwFDxUTlmtUN84c= +github.com/pulumi/esc v0.10.0 h1:jzBKzkLVW0mePeanDRfqSQoCJ5yrkux0jIwAkUxpRKE= +github.com/pulumi/esc v0.10.0/go.mod h1:2Bfa+FWj/xl8CKqRTWbWgDX0SOD4opdQgvYSURTGK2c= github.com/pulumi/inflector v0.1.1 h1:dvlxlWtXwOJTUUtcYDvwnl6Mpg33prhK+7mzeF+SobA= github.com/pulumi/inflector v0.1.1/go.mod h1:HUFCjcPTz96YtTuUlwG3i3EZG4WlniBvR9bd+iJxCUY= github.com/pulumi/providertest v0.0.14 h1:5QlAPAAs82jkQraHsJvq1xgVfC7xtW8sFJwv2pHgxQ8= github.com/pulumi/providertest v0.0.14/go.mod h1:GcsqEGgSngwaNOD+kICJPIUQlnA911fGBU8HDlJvVL0= -github.com/pulumi/pulumi-java/pkg v0.11.0 h1:Jw9gBvyfmfOMq/EkYDm9+zGPxsDAA8jfeMpHmtZ+1oA= -github.com/pulumi/pulumi-java/pkg v0.11.0/go.mod h1:sXAk25P47AQVQL6ilAbFmRNgZykC7og/+87ihnqzFTc= -github.com/pulumi/pulumi-terraform-bridge/pf v0.41.0 h1:nSXm/mV699EtAXLoA/XrDkFyoyWPFyfcMqk/SGCuH2M= -github.com/pulumi/pulumi-terraform-bridge/pf v0.41.0/go.mod h1:vGN8Ab6u/dxRE1Byqo6dXQE/loVbe9hYqiiHqm00hV4= -github.com/pulumi/pulumi-terraform-bridge/v3 v3.88.0 h1:0W2Y3Fk7VAWHpjD3FwzVnqWo7g1hD+96C0YDobMnvDU= -github.com/pulumi/pulumi-terraform-bridge/v3 v3.88.0/go.mod h1:QSDiqiCMMbfzrsp3oyRPWgSVE/dkVH5ujxoFappqjdo= +github.com/pulumi/pulumi-java/pkg v0.16.1 h1:orHnDWFbpOERwaBLry9f+6nqPX7x0MsrIkaa5QDGAns= +github.com/pulumi/pulumi-java/pkg v0.16.1/go.mod h1:QH0DihZkWYle9XFc+LJ76m4hUo+fA3RdyaM90pqOaSM= +github.com/pulumi/pulumi-terraform-bridge/pf v0.44.1 h1:39UPLBqbnvylm2heU/Rxa1+G++NZHdtW2Qg+hEhp5Wo= +github.com/pulumi/pulumi-terraform-bridge/pf v0.44.1/go.mod h1:Zj4XBf+TuV3um7y82X3xk2yQiP+pnQ7YxMc4fq/rVVw= +github.com/pulumi/pulumi-terraform-bridge/v3 v3.91.1 h1:Twh0IKS1pGHP6LHDq1oR0vbHlV52asoUCC7spEJl3Ao= +github.com/pulumi/pulumi-terraform-bridge/v3 v3.91.1/go.mod h1:DvueDDtOIbf7W1Or4oH0o7F990ozp/ROmlm/vgLoe+g= github.com/pulumi/pulumi-terraform-bridge/x/muxer v0.0.8 h1:mav2tSitA9BPJPLLahKgepHyYsMzwaTm4cvp0dcTMYw= github.com/pulumi/pulumi-terraform-bridge/x/muxer v0.0.8/go.mod h1:qUYk2c9i/yqMGNj9/bQyXpS39BxNDSXYjVN1njnq0zY= -github.com/pulumi/pulumi-yaml v1.9.1 h1:JPeI80M23SPactxgnCFS1casZlSr7ZhAXwSx4H55QQ4= -github.com/pulumi/pulumi-yaml v1.9.1/go.mod h1:OH0R34yJxA5u6zjYBN4JXcWoEvfkRoOVWi6viu8buoA= -github.com/pulumi/pulumi/pkg/v3 v3.126.0 h1:XaZU1ehjHN2I5ihkfwxK/UFMDiCDM9FSt2TBnbldAx4= -github.com/pulumi/pulumi/pkg/v3 v3.126.0/go.mod h1:1P4/oK9zceOJUm48QQl/TqjDN68lfsdnTR1FITTFddw= -github.com/pulumi/pulumi/sdk/v3 v3.126.0 h1:6GQVhwG2jgnG7wjRiWgrq0/sU39onctAiBcvTlqb20s= -github.com/pulumi/pulumi/sdk/v3 v3.126.0/go.mod h1:p1U24en3zt51agx+WlNboSOV8eLlPWYAkxMzVEXKbnY= +github.com/pulumi/pulumi-yaml v1.10.0 h1:djbgMJCxJBmYMr4kOpAXH5iauxGohYjEuTLfxD3NUUI= +github.com/pulumi/pulumi-yaml v1.10.0/go.mod h1://lTvwHpgJ+WBKeMGiLrd/jinc4dl3eWV5LZ3G8iCfE= +github.com/pulumi/pulumi/pkg/v3 v3.133.0 h1:j1rd7ToLZIQc5H0427ISOXSbOIIemZ6B0MXtRhQ38Yg= +github.com/pulumi/pulumi/pkg/v3 v3.133.0/go.mod h1:JtMAnrsFIccO138WcMfPdhO0PioDukKihnZC0xTRLwo= +github.com/pulumi/pulumi/sdk/v3 v3.133.0 h1:o+7dbJZY9BVgAjOF5GYIWgjp/zpKAgWZwD4pPjUMXKQ= +github.com/pulumi/pulumi/sdk/v3 v3.133.0/go.mod h1:J5kQEX8v87aeUhk6NdQXnjCo1DbiOnOiL3Sf2DuDda8= github.com/pulumi/schema-tools v0.1.2 h1:Fd9xvUjgck4NA+7/jSk7InqCUT4Kj940+EcnbQKpfZo= github.com/pulumi/schema-tools v0.1.2/go.mod h1:62lgj52Tzq11eqWTIaKd+EVyYAu5dEcDJxMhTjvMO/k= github.com/pulumi/terraform-diff-reader v0.0.2 h1:kTE4nEXU3/SYXESvAIem+wyHMI3abqkI3OhJ0G04LLI= github.com/pulumi/terraform-diff-reader v0.0.2/go.mod h1:sZ9FUzGO+yM41hsQHs/yIcj/Y993qMdBxBU5mpDmAfQ= +github.com/pulumi/terraform-plugin-sdk/v2 v2.0.0-20240520223432-0c0bf0d65f10 h1:M6Ceq1o6gGeEKxTZgJ2CKLye3p67ZZjnsAwxr5VC32A= +github.com/pulumi/terraform-plugin-sdk/v2 v2.0.0-20240520223432-0c0bf0d65f10/go.mod h1:H+8tjs9TjV2w57QFVSMBQacf8k/E1XwLXGCARgViC6A= +github.com/rhysd/go-fakeio v1.0.0 h1:+TjiKCOs32dONY7DaoVz/VPOdvRkPfBkEyUDIpM8FQY= +github.com/rhysd/go-fakeio v1.0.0/go.mod h1:joYxF906trVwp2JLrE4jlN7A0z6wrz8O6o1UjarbFzE= github.com/rivo/uniseg v0.1.0/go.mod h1:J6wj4VEh+S6ZtnVlnTBMWIodfgj8LQOQFoIToxlJtxc= github.com/rivo/uniseg v0.2.0/go.mod h1:J6wj4VEh+S6ZtnVlnTBMWIodfgj8LQOQFoIToxlJtxc= github.com/rivo/uniseg v0.4.4 h1:8TfxU8dW6PdqD27gjM8MVNuicgxIjxpm4K7x4jp8sis= @@ -852,10 +854,10 @@ github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO github.com/stretchr/testify v1.8.1/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4= github.com/stretchr/testify v1.9.0 h1:HtqpIVDClZ4nwg75+f6Lvsy/wHu+3BoSGCbBAcpTsTg= github.com/stretchr/testify v1.9.0/go.mod h1:r2ic/lqez/lEtzL7wO/rwa5dbSLXVDPFyf8C91i36aY= +github.com/teekennedy/goldmark-markdown v0.3.0 h1:ik9/biVGCwGWFg8dQ3KVm2pQ/wiiG0whYiUcz9xH0W8= +github.com/teekennedy/goldmark-markdown v0.3.0/go.mod h1:kMhDz8La77A9UHvJGsxejd0QUflN9sS+QXCqnhmxmNo= github.com/texttheater/golang-levenshtein v1.0.1 h1:+cRNoVrfiwufQPhoMzB6N0Yf/Mqajr6t1lOv8GyGE2U= github.com/texttheater/golang-levenshtein v1.0.1/go.mod h1:PYAKrbF5sAiq9wd+H82hs7gNaen0CplQ9uvm6+enD/8= -github.com/tweekmonster/luser v0.0.0-20161003172636-3fa38070dbd7 h1:X9dsIWPuuEJlPX//UmRKophhOKCGXc46RVIGuttks68= -github.com/tweekmonster/luser v0.0.0-20161003172636-3fa38070dbd7/go.mod h1:UxoP3EypF8JfGEjAII8jx1q8rQyDnX8qdTCs/UQBVIE= github.com/uber/jaeger-client-go v2.30.0+incompatible h1:D6wyKGCecFaSRUpo8lCVbaOOb6ThwMmTEbhRwtKR97o= github.com/uber/jaeger-client-go v2.30.0+incompatible/go.mod h1:WVhlPFC8FDjOFMMWRy2pZqQJSXxYSwNYOkTr/Z6d3Kk= github.com/uber/jaeger-lib v2.4.1+incompatible h1:td4jdvLcExb4cBISKIpHuGoVXh+dVKhn2Um6rjCsSsg= @@ -883,8 +885,12 @@ github.com/yuin/goldmark v1.1.32/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9de github.com/yuin/goldmark v1.2.1/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74= github.com/yuin/goldmark v1.3.5/go.mod h1:mwnBkeHKe2W/ZEtQ+71ViKU8L12m81fl3OWwC1Zlc8k= github.com/yuin/goldmark v1.4.13/go.mod h1:6yULJ656Px+3vBD8DxQVa3kxgyrAnzto9xy5taEt/CY= +github.com/yuin/goldmark v1.7.4 h1:BDXOHExt+A7gwPCJgPIIq7ENvceR7we7rOS9TNoLZeg= +github.com/yuin/goldmark v1.7.4/go.mod h1:uzxRWxtg69N339t3louHJ7+O03ezfj6PlliRlaOzY1E= github.com/zclconf/go-cty v1.14.4 h1:uXXczd9QDGsgu0i/QFR/hzI5NYCHLf6NQw/atrbnhq8= github.com/zclconf/go-cty v1.14.4/go.mod h1:VvMs5i0vgZdhYawQNq5kePSpLAoz8u1xvZgrPIxfnZE= +github.com/zclconf/go-cty-debug v0.0.0-20191215020915-b22d67c1ba0b h1:FosyBZYxY34Wul7O/MSKey3txpPYyCqVO5ZyceuQJEI= +github.com/zclconf/go-cty-debug v0.0.0-20191215020915-b22d67c1ba0b/go.mod h1:ZRKQfBXbGkpdV6QMzT3rU1kSTAnfu1dO8dPKjYprgj8= github.com/zclconf/go-cty-yaml v1.0.1 h1:up11wlgAaDvlAGENcFDnZgkn0qUJurso7k6EpURKNF8= github.com/zclconf/go-cty-yaml v1.0.1/go.mod h1:IP3Ylp0wQpYm50IHK8OZWKMu6sPJIUgKa8XhiVHura0= go.mongodb.org/mongo-driver v1.15.0 h1:rJCKC8eEliewXjZGf0ddURtl7tTVy1TK3bfl0gkUSLc= @@ -932,8 +938,8 @@ golang.org/x/crypto v0.3.0/go.mod h1:hebNnKkNXi2UzZN1eVRvBB7co0a+JxK6XbPiWVs/3J4 golang.org/x/crypto v0.13.0/go.mod h1:y6Z2r+Rw4iayiXXAIxJIDAJ1zMW4yaTpebo8fPOliYc= golang.org/x/crypto v0.18.0/go.mod h1:R0j02AL6hcrfOiy9T4ZYp/rcWeMxM3L6QYxlOuEG1mg= golang.org/x/crypto v0.19.0/go.mod h1:Iy9bg/ha4yyC70EfRS8jz+B6ybOBKMaSxLj6P6oBDfU= -golang.org/x/crypto v0.24.0 h1:mnl8DM0o513X8fdIkmyFE/5hTYxbwYOjDS/+rK6qpRI= -golang.org/x/crypto v0.24.0/go.mod h1:Z1PMYSOR5nyMcyAVAIQSKCDwalqy85Aqn1x3Ws4L5DM= +golang.org/x/crypto v0.25.0 h1:ypSNr+bnYL2YhwoMt2zPxHFmbAN1KZs/njMG3hxUp30= +golang.org/x/crypto v0.25.0/go.mod h1:T+wALwcMOSE0kXgUAnPAHqTLW+XHgcELELW8VaDgm/M= golang.org/x/exp v0.0.0-20190121172915-509febef88a4/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA= golang.org/x/exp v0.0.0-20190306152737-a1d7652674e8/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA= golang.org/x/exp v0.0.0-20190510132918-efd6b22b2522/go.mod h1:ZjyILWgesfNpC6sMxTJOJm9Kp84zZh5NQWvqDGG3Qr8= @@ -1032,8 +1038,8 @@ golang.org/x/net v0.6.0/go.mod h1:2Tu9+aMcznHK/AK1HMvgo6xiTLG5rD5rZLDS+rp2Bjs= golang.org/x/net v0.10.0/go.mod h1:0qNGK6F8kojg2nk9dLZ2mShWaEBan6FAoqfSigmmuDg= golang.org/x/net v0.15.0/go.mod h1:idbUs1IY1+zTqbi8yxTbhexhEEk5ur9LInksu6HrEpk= golang.org/x/net v0.20.0/go.mod h1:z8BVo6PvndSri0LbOE3hAn0apkU+1YvI6E70E9jsnvY= -golang.org/x/net v0.26.0 h1:soB7SVo0PWrY4vPW/+ay0jKDNScG2X9wFeYlXIvJsOQ= -golang.org/x/net v0.26.0/go.mod h1:5YKkiSynbBIh3p6iOc/vibscux0x38BZDkn8sCUPxHE= +golang.org/x/net v0.27.0 h1:5K3Njcw06/l2y9vpGCSdcxWOYHOUk3dVNGDXN+FvAys= +golang.org/x/net v0.27.0/go.mod h1:dDi0PyhWNoiUOrAS8uXv/vnScO4wnHQO4mj9fn/RytE= golang.org/x/oauth2 v0.0.0-20180821212333-d2e6202438be/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U= golang.org/x/oauth2 v0.0.0-20190226205417-e64efc72b421/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw= golang.org/x/oauth2 v0.0.0-20190604053449-0f29369cfe45/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw= @@ -1059,8 +1065,8 @@ golang.org/x/oauth2 v0.0.0-20220822191816-0ebed06d0094/go.mod h1:h4gKUeWbJ4rQPri golang.org/x/oauth2 v0.0.0-20220909003341-f21342109be1/go.mod h1:h4gKUeWbJ4rQPri7E0u6Gs4e9Ri2zaLxzw5DI5XGrYg= golang.org/x/oauth2 v0.0.0-20221014153046-6fdb5e3db783/go.mod h1:h4gKUeWbJ4rQPri7E0u6Gs4e9Ri2zaLxzw5DI5XGrYg= golang.org/x/oauth2 v0.1.0/go.mod h1:G9FE4dLTsbXUu90h/Pf85g4w1D+SSAgR+q46nJZ8M4A= -golang.org/x/oauth2 v0.19.0 h1:9+E/EZBCbTLNrbN35fHv/a/d/mOBatymz1zbtQrXpIg= -golang.org/x/oauth2 v0.19.0/go.mod h1:vYi7skDa1x015PmRRYZ7+s1cWyPgrPiSYRe4rnsexc8= +golang.org/x/oauth2 v0.21.0 h1:tsimM75w1tF/uws5rbeHzIWxEqElMehnc+iW793zsZs= +golang.org/x/oauth2 v0.21.0/go.mod h1:XYTD2NtWslqkgxebSiOHnXEap4TF09sJSc7H1sXbhtI= golang.org/x/sync v0.0.0-20180314180146-1d60e4601c6f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= golang.org/x/sync v0.0.0-20181108010431-42b317875d0f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= golang.org/x/sync v0.0.0-20181221193216-37e7f081c4d4/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= @@ -1162,8 +1168,8 @@ golang.org/x/sys v0.8.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/sys v0.12.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/sys v0.16.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA= golang.org/x/sys v0.17.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA= -golang.org/x/sys v0.21.0 h1:rF+pYz3DAGSQAxAu1CbC7catZg4ebC4UIeIhKxBZvws= -golang.org/x/sys v0.21.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA= +golang.org/x/sys v0.22.0 h1:RI27ohtqKCnwULzJLqkv897zojh5/DwS/ENaMzUOaWI= +golang.org/x/sys v0.22.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA= golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo= golang.org/x/term v0.0.0-20210927222741-03fcf44c2211/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8= golang.org/x/term v0.1.0/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8= @@ -1173,8 +1179,8 @@ golang.org/x/term v0.8.0/go.mod h1:xPskH00ivmX89bAKVGSKKtLOWNx2+17Eiy94tnKShWo= golang.org/x/term v0.12.0/go.mod h1:owVbMEjm3cBLCHdkQu9b1opXd4ETQWc3BhuQGKgXgvU= golang.org/x/term v0.16.0/go.mod h1:yn7UURbUtPyrVJPGPq404EukNFxcm/foM+bV/bfcDsY= golang.org/x/term v0.17.0/go.mod h1:lLRBjIVuehSbZlaOtGMbcMncT+aqLLLmKrsjNrUguwk= -golang.org/x/term v0.21.0 h1:WVXCp+/EBEHOj53Rvu+7KiT/iElMrO8ACK16SMZ3jaA= -golang.org/x/term v0.21.0/go.mod h1:ooXLefLobQVslOqselCNF4SxFAaoS6KujMbsGzSDmX0= +golang.org/x/term v0.22.0 h1:BbsgPEJULsl2fV/AT3v15Mjva5yXKQDyKf+TbDz7QJk= +golang.org/x/term v0.22.0/go.mod h1:F3qCibpT5AMpCRfhfT53vVJwhLtIVHhB9XDjfFvnMI4= golang.org/x/text v0.0.0-20170915032832-14c0d48ead0c/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= golang.org/x/text v0.3.1-0.20180807135948-17ff2d5776d2/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= @@ -1431,10 +1437,10 @@ google.golang.org/genproto v0.0.0-20221014213838-99cd37c6964a/go.mod h1:1vXfmgAz google.golang.org/genproto v0.0.0-20221025140454-527a21cfbd71/go.mod h1:9qHF0xnpdSfF6knlcsnpzUu5y+rpwgbvsyGAZPBMg4s= google.golang.org/genproto v0.0.0-20240311173647-c811ad7063a7 h1:ImUcDPHjTrAqNhlOkSocDLfG9rrNHH7w7uoKWPaWZ8s= google.golang.org/genproto v0.0.0-20240311173647-c811ad7063a7/go.mod h1:/3XmxOjePkvmKrHuBy4zNFw7IzxJXtAgdpXi8Ll990U= -google.golang.org/genproto/googleapis/api v0.0.0-20240311173647-c811ad7063a7 h1:oqta3O3AnlWbmIE3bFnWbu4bRxZjfbWCp0cKSuZh01E= -google.golang.org/genproto/googleapis/api v0.0.0-20240311173647-c811ad7063a7/go.mod h1:VQW3tUculP/D4B+xVCo+VgSq8As6wA9ZjHl//pmk+6s= -google.golang.org/genproto/googleapis/rpc v0.0.0-20240311173647-c811ad7063a7 h1:8EeVk1VKMD+GD/neyEHGmz7pFblqPjHoi+PGQIlLx2s= -google.golang.org/genproto/googleapis/rpc v0.0.0-20240311173647-c811ad7063a7/go.mod h1:WtryC6hu0hhx87FDGxWCDptyssuo68sk10vYjF+T9fY= +google.golang.org/genproto/googleapis/api v0.0.0-20240604185151-ef581f913117 h1:+rdxYoE3E5htTEWIe15GlN6IfvbURM//Jt0mmkmm6ZU= +google.golang.org/genproto/googleapis/api v0.0.0-20240604185151-ef581f913117/go.mod h1:OimBR/bc1wPO9iV4NC2bpyjy3VnAwZh5EBPQdtaE5oo= +google.golang.org/genproto/googleapis/rpc v0.0.0-20240604185151-ef581f913117 h1:1GBuWVLM/KMVUv1t1En5Gs+gFZCNd360GGb4sSxtrhU= +google.golang.org/genproto/googleapis/rpc v0.0.0-20240604185151-ef581f913117/go.mod h1:EfXuqaE1J41VCDicxHzUDm+8rk+7ZdXzHV0IhO/I6s0= google.golang.org/grpc v1.19.0/go.mod h1:mqu4LbDTu4XGKhr4mRzUsmM4RtVoemTSY81AxZiDr8c= google.golang.org/grpc v1.20.1/go.mod h1:10oTOabMzJvdu6/UiuZezV6QK5dSlG84ov/aaiqXj38= google.golang.org/grpc v1.21.1/go.mod h1:oYelfM1adQP15Ek0mdvEgi9Df8B9CZIaU1084ijfRaM= @@ -1470,8 +1476,8 @@ google.golang.org/grpc v1.48.0/go.mod h1:vN9eftEi1UMyUsIF80+uQXhHjbXYbm0uXoFCACu google.golang.org/grpc v1.49.0/go.mod h1:ZgQEeidpAuNRZ8iRrlBKXZQP1ghovWIVhdJRyCDK+GI= google.golang.org/grpc v1.50.0/go.mod h1:ZgQEeidpAuNRZ8iRrlBKXZQP1ghovWIVhdJRyCDK+GI= google.golang.org/grpc v1.50.1/go.mod h1:ZgQEeidpAuNRZ8iRrlBKXZQP1ghovWIVhdJRyCDK+GI= -google.golang.org/grpc v1.63.2 h1:MUeiw1B2maTVZthpU5xvASfTh3LDbxHd6IJ6QQVU+xM= -google.golang.org/grpc v1.63.2/go.mod h1:WAX/8DgncnokcFUldAxq7GeB5DXHDbMF+lLvDomNkRA= +google.golang.org/grpc v1.66.2 h1:3QdXkuq3Bkh7w+ywLdLvM56cmGvQHUMZpiCzt6Rqaoo= +google.golang.org/grpc v1.66.2/go.mod h1:s3/l6xSSCURdVfAnL+TqCNMyTDAGN6+lZeVxnZR128Y= google.golang.org/grpc/cmd/protoc-gen-go-grpc v1.1.0/go.mod h1:6Kw0yEErY5E/yWrBtf03jp27GLLJujG4z/JK95pnjjw= google.golang.org/protobuf v0.0.0-20200109180630-ec00e32a8dfd/go.mod h1:DFci5gLYBciE7Vtevhsrf46CRTquxDuWsQurQQe4oz8= google.golang.org/protobuf v0.0.0-20200221191635-4d8936d0db64/go.mod h1:kwYJMbMJ01Woi6D6+Kah6886xMZcty6N08ah7+eCXa0= @@ -1488,8 +1494,8 @@ google.golang.org/protobuf v1.26.0/go.mod h1:9q0QmTI4eRPtz6boOQmLYwt+qCgq0jsYwAQ google.golang.org/protobuf v1.27.1/go.mod h1:9q0QmTI4eRPtz6boOQmLYwt+qCgq0jsYwAQnmE0givc= google.golang.org/protobuf v1.28.0/go.mod h1:HV8QOd/L58Z+nl8r43ehVNZIU/HEI6OcFqwMG9pJV4I= google.golang.org/protobuf v1.28.1/go.mod h1:HV8QOd/L58Z+nl8r43ehVNZIU/HEI6OcFqwMG9pJV4I= -google.golang.org/protobuf v1.33.0 h1:uNO2rsAINq/JlFpSdYEKIZ0uKD/R9cpdv0T+yoGwGmI= -google.golang.org/protobuf v1.33.0/go.mod h1:c6P6GXX6sHbq/GpV6MGZEdwhWPcYBgnhAHhKbcUYpos= +google.golang.org/protobuf v1.34.2 h1:6xV6lTsCfpGD21XK49h7MhtcApnLqkfYgPcdHftf6hg= +google.golang.org/protobuf v1.34.2/go.mod h1:qYOHts0dSfpeUzUFpOMr/WGzszTmLH+DiWniOlNbLDw= gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0= gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0= gopkg.in/check.v1 v1.0.0-20190902080502-41f04d3bba15/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0= diff --git a/provider/shim/go.mod b/provider/shim/go.mod index 92c0bb3..ee81cee 100644 --- a/provider/shim/go.mod +++ b/provider/shim/go.mod @@ -3,7 +3,7 @@ module github.com/crowdstrike/terraform-provider-crowdstrike/shim go 1.22 require ( - github.com/crowdstrike/terraform-provider-crowdstrike v0.0.4 + github.com/crowdstrike/terraform-provider-crowdstrike v0.0.6 github.com/hashicorp/terraform-plugin-framework v1.8.0 ) diff --git a/provider/shim/go.sum b/provider/shim/go.sum index 536e975..0a6f2f4 100644 --- a/provider/shim/go.sum +++ b/provider/shim/go.sum @@ -12,8 +12,8 @@ github.com/cloudflare/circl v1.3.7 h1:qlCDlTPz2n9fu58M0Nh1J/JzcFpfgkFHHX3O35r5vc github.com/cloudflare/circl v1.3.7/go.mod h1:sRTcRWXGLrKw6yIGJ+l7amYJFfAXbZG0kBSc8r4zxgA= github.com/crowdstrike/gofalcon v0.6.1-0.20240426204036-ac8ce2b4f2d7 h1:NLcXFICTUakAvJFSH8z+Ht6SfJ52FbOasYdP8p7BcsQ= github.com/crowdstrike/gofalcon v0.6.1-0.20240426204036-ac8ce2b4f2d7/go.mod h1:7KSolP3XCntqZiu7GfGd8uedAQ82dqBNpP0gqBksWB8= -github.com/crowdstrike/terraform-provider-crowdstrike v0.0.4 h1:h0HtPheheH5VggvGXqWc49dYFctxhQqpm/ep+jtiww0= -github.com/crowdstrike/terraform-provider-crowdstrike v0.0.4/go.mod h1:R9kYJzHPH0NKBwPwJdNchkorNDAKxbqr/Cnxx8JPPw0= +github.com/crowdstrike/terraform-provider-crowdstrike v0.0.6 h1:L6SDq2C5LZnyyfk6bqtLfS9+q5GwAQQ5Fy+iwumgb64= +github.com/crowdstrike/terraform-provider-crowdstrike v0.0.6/go.mod h1:R9kYJzHPH0NKBwPwJdNchkorNDAKxbqr/Cnxx8JPPw0= github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38= github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c= github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38= diff --git a/sdk/dotnet/HostGroup.cs b/sdk/dotnet/HostGroup.cs index 6c85ddc..00d2b9e 100644 --- a/sdk/dotnet/HostGroup.cs +++ b/sdk/dotnet/HostGroup.cs @@ -33,16 +33,38 @@ namespace CrowdStrike.Crowdstrike /// /// return await Deployment.RunAsync(() => /// { - /// var example = new Crowdstrike.HostGroup("example", new() + /// var @dynamic = new Crowdstrike.HostGroup("dynamic", new() /// { + /// AssignmentRule = "tags:'SensorGroupingTags/molecule'+os_version:'Debian GNU 11'", /// Description = "Made with Pulumi", /// Type = "dynamic", - /// AssignmentRule = "tags:'SensorGroupingTags/cloud-lab'+os_version:'Amazon Linux 2'", + /// }); + /// + /// var @static = new Crowdstrike.HostGroup("static", new() + /// { + /// Description = "Made with Pulumi", + /// Type = "static", + /// Hostnames = new[] + /// { + /// "host1", + /// "host2", + /// }, + /// }); + /// + /// var staticByID = new Crowdstrike.HostGroup("staticByID", new() + /// { + /// Description = "Made with Pulumi", + /// Type = "staticByID", + /// HostIds = new[] + /// { + /// "123123", + /// "124124", + /// }, /// }); /// /// return new Dictionary<string, object?> /// { - /// ["hostGroup"] = example, + /// ["hostGroup"] = @dynamic, /// }; /// }); /// ``` @@ -62,7 +84,7 @@ public partial class HostGroup : global::Pulumi.CustomResource /// The assignment rule for dynamic host groups. /// [Output("assignmentRule")] - public Output AssignmentRule { get; private set; } = null!; + public Output AssignmentRule { get; private set; } = null!; /// /// Description of the host group. @@ -70,6 +92,18 @@ public partial class HostGroup : global::Pulumi.CustomResource [Output("description")] public Output Description { get; private set; } = null!; + /// + /// List of host ids to add to a staticByID host group. + /// + [Output("hostIds")] + public Output> HostIds { get; private set; } = null!; + + /// + /// List of hostnames to add to a static host group. + /// + [Output("hostnames")] + public Output> Hostnames { get; private set; } = null!; + [Output("lastUpdated")] public Output LastUpdated { get; private set; } = null!; @@ -144,6 +178,30 @@ public sealed class HostGroupArgs : global::Pulumi.ResourceArgs [Input("description", required: true)] public Input Description { get; set; } = null!; + [Input("hostIds")] + private InputList? _hostIds; + + /// + /// List of host ids to add to a staticByID host group. + /// + public InputList HostIds + { + get => _hostIds ?? (_hostIds = new InputList()); + set => _hostIds = value; + } + + [Input("hostnames")] + private InputList? _hostnames; + + /// + /// List of hostnames to add to a static host group. + /// + public InputList Hostnames + { + get => _hostnames ?? (_hostnames = new InputList()); + set => _hostnames = value; + } + /// /// Name of the host group. /// @@ -176,6 +234,30 @@ public sealed class HostGroupState : global::Pulumi.ResourceArgs [Input("description")] public Input? Description { get; set; } + [Input("hostIds")] + private InputList? _hostIds; + + /// + /// List of host ids to add to a staticByID host group. + /// + public InputList HostIds + { + get => _hostIds ?? (_hostIds = new InputList()); + set => _hostIds = value; + } + + [Input("hostnames")] + private InputList? _hostnames; + + /// + /// List of hostnames to add to a static host group. + /// + public InputList Hostnames + { + get => _hostnames ?? (_hostnames = new InputList()); + set => _hostnames = value; + } + [Input("lastUpdated")] public Input? LastUpdated { get; set; } diff --git a/sdk/go.mod b/sdk/go.mod index eabb889..3d5294f 100644 --- a/sdk/go.mod +++ b/sdk/go.mod @@ -4,7 +4,7 @@ go 1.22 require ( github.com/blang/semver v3.5.1+incompatible - github.com/pulumi/pulumi/sdk/v3 v3.126.0 + github.com/pulumi/pulumi/sdk/v3 v3.133.0 ) require ( @@ -68,7 +68,6 @@ require ( github.com/spf13/cobra v1.7.0 // indirect github.com/spf13/pflag v1.0.5 // indirect github.com/texttheater/golang-levenshtein v1.0.1 // indirect - github.com/tweekmonster/luser v0.0.0-20161003172636-3fa38070dbd7 // indirect github.com/uber/jaeger-client-go v2.30.0+incompatible // indirect github.com/uber/jaeger-lib v2.4.1+incompatible // indirect github.com/xanzy/ssh-agent v0.3.3 // indirect diff --git a/sdk/go.sum b/sdk/go.sum index 7c37722..1526633 100644 --- a/sdk/go.sum +++ b/sdk/go.sum @@ -150,8 +150,8 @@ github.com/pulumi/appdash v0.0.0-20231130102222-75f619a67231 h1:vkHw5I/plNdTr435 github.com/pulumi/appdash v0.0.0-20231130102222-75f619a67231/go.mod h1:murToZ2N9hNJzewjHBgfFdXhZKjY3z5cYC1VXk+lbFE= github.com/pulumi/esc v0.9.1 h1:HH5eEv8sgyxSpY5a8yePyqFXzA8cvBvapfH8457+mIs= github.com/pulumi/esc v0.9.1/go.mod h1:oEJ6bOsjYlQUpjf70GiX+CXn3VBmpwFDxUTlmtUN84c= -github.com/pulumi/pulumi/sdk/v3 v3.126.0 h1:6GQVhwG2jgnG7wjRiWgrq0/sU39onctAiBcvTlqb20s= -github.com/pulumi/pulumi/sdk/v3 v3.126.0/go.mod h1:p1U24en3zt51agx+WlNboSOV8eLlPWYAkxMzVEXKbnY= +github.com/pulumi/pulumi/sdk/v3 v3.133.0 h1:o+7dbJZY9BVgAjOF5GYIWgjp/zpKAgWZwD4pPjUMXKQ= +github.com/pulumi/pulumi/sdk/v3 v3.133.0/go.mod h1:J5kQEX8v87aeUhk6NdQXnjCo1DbiOnOiL3Sf2DuDda8= github.com/rivo/uniseg v0.1.0/go.mod h1:J6wj4VEh+S6ZtnVlnTBMWIodfgj8LQOQFoIToxlJtxc= github.com/rivo/uniseg v0.2.0/go.mod h1:J6wj4VEh+S6ZtnVlnTBMWIodfgj8LQOQFoIToxlJtxc= github.com/rivo/uniseg v0.4.4 h1:8TfxU8dW6PdqD27gjM8MVNuicgxIjxpm4K7x4jp8sis= @@ -185,8 +185,6 @@ github.com/stretchr/testify v1.9.0 h1:HtqpIVDClZ4nwg75+f6Lvsy/wHu+3BoSGCbBAcpTsT github.com/stretchr/testify v1.9.0/go.mod h1:r2ic/lqez/lEtzL7wO/rwa5dbSLXVDPFyf8C91i36aY= github.com/texttheater/golang-levenshtein v1.0.1 h1:+cRNoVrfiwufQPhoMzB6N0Yf/Mqajr6t1lOv8GyGE2U= github.com/texttheater/golang-levenshtein v1.0.1/go.mod h1:PYAKrbF5sAiq9wd+H82hs7gNaen0CplQ9uvm6+enD/8= -github.com/tweekmonster/luser v0.0.0-20161003172636-3fa38070dbd7 h1:X9dsIWPuuEJlPX//UmRKophhOKCGXc46RVIGuttks68= -github.com/tweekmonster/luser v0.0.0-20161003172636-3fa38070dbd7/go.mod h1:UxoP3EypF8JfGEjAII8jx1q8rQyDnX8qdTCs/UQBVIE= github.com/uber/jaeger-client-go v2.30.0+incompatible h1:D6wyKGCecFaSRUpo8lCVbaOOb6ThwMmTEbhRwtKR97o= github.com/uber/jaeger-client-go v2.30.0+incompatible/go.mod h1:WVhlPFC8FDjOFMMWRy2pZqQJSXxYSwNYOkTr/Z6d3Kk= github.com/uber/jaeger-lib v2.4.1+incompatible h1:td4jdvLcExb4cBISKIpHuGoVXh+dVKhn2Um6rjCsSsg= diff --git a/sdk/go/crowdstrike/getSensorUpdatePolicyBuilds.go b/sdk/go/crowdstrike/getSensorUpdatePolicyBuilds.go index 0e7475e..c4ecb8e 100644 --- a/sdk/go/crowdstrike/getSensorUpdatePolicyBuilds.go +++ b/sdk/go/crowdstrike/getSensorUpdatePolicyBuilds.go @@ -71,13 +71,19 @@ type GetSensorUpdatePolicyBuildsResult struct { } func GetSensorUpdatePolicyBuildsOutput(ctx *pulumi.Context, opts ...pulumi.InvokeOption) GetSensorUpdatePolicyBuildsResultOutput { - return pulumi.ToOutput(0).ApplyT(func(int) (GetSensorUpdatePolicyBuildsResult, error) { - r, err := GetSensorUpdatePolicyBuilds(ctx, opts...) - var s GetSensorUpdatePolicyBuildsResult - if r != nil { - s = *r + return pulumi.ToOutput(0).ApplyT(func(int) (GetSensorUpdatePolicyBuildsResultOutput, error) { + opts = internal.PkgInvokeDefaultOpts(opts) + var rv GetSensorUpdatePolicyBuildsResult + secret, err := ctx.InvokePackageRaw("crowdstrike:index/getSensorUpdatePolicyBuilds:getSensorUpdatePolicyBuilds", nil, &rv, "", opts...) + if err != nil { + return GetSensorUpdatePolicyBuildsResultOutput{}, err } - return s, err + + output := pulumi.ToOutput(rv).(GetSensorUpdatePolicyBuildsResultOutput) + if secret { + return pulumi.ToSecret(output).(GetSensorUpdatePolicyBuildsResultOutput), nil + } + return output, nil }).(GetSensorUpdatePolicyBuildsResultOutput) } diff --git a/sdk/go/crowdstrike/hostGroup.go b/sdk/go/crowdstrike/hostGroup.go index 73b2015..15416aa 100644 --- a/sdk/go/crowdstrike/hostGroup.go +++ b/sdk/go/crowdstrike/hostGroup.go @@ -38,15 +38,37 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// example, err := crowdstrike.NewHostGroup(ctx, "example", &crowdstrike.HostGroupArgs{ +// dynamic, err := crowdstrike.NewHostGroup(ctx, "dynamic", &crowdstrike.HostGroupArgs{ +// AssignmentRule: pulumi.String("tags:'SensorGroupingTags/molecule'+os_version:'Debian GNU 11'"), // Description: pulumi.String("Made with Pulumi"), // Type: pulumi.String("dynamic"), -// AssignmentRule: pulumi.String("tags:'SensorGroupingTags/cloud-lab'+os_version:'Amazon Linux 2'"), // }) // if err != nil { // return err // } -// ctx.Export("hostGroup", example) +// _, err = crowdstrike.NewHostGroup(ctx, "static", &crowdstrike.HostGroupArgs{ +// Description: pulumi.String("Made with Pulumi"), +// Type: pulumi.String("static"), +// Hostnames: pulumi.StringArray{ +// pulumi.String("host1"), +// pulumi.String("host2"), +// }, +// }) +// if err != nil { +// return err +// } +// _, err = crowdstrike.NewHostGroup(ctx, "staticByID", &crowdstrike.HostGroupArgs{ +// Description: pulumi.String("Made with Pulumi"), +// Type: pulumi.String("staticByID"), +// HostIds: pulumi.StringArray{ +// pulumi.String("123123"), +// pulumi.String("124124"), +// }, +// }) +// if err != nil { +// return err +// } +// ctx.Export("hostGroup", dynamic) // return nil // }) // } @@ -64,10 +86,14 @@ type HostGroup struct { pulumi.CustomResourceState // The assignment rule for dynamic host groups. - AssignmentRule pulumi.StringOutput `pulumi:"assignmentRule"` + AssignmentRule pulumi.StringPtrOutput `pulumi:"assignmentRule"` // Description of the host group. Description pulumi.StringOutput `pulumi:"description"` - LastUpdated pulumi.StringOutput `pulumi:"lastUpdated"` + // List of host ids to add to a staticByID host group. + HostIds pulumi.StringArrayOutput `pulumi:"hostIds"` + // List of hostnames to add to a static host group. + Hostnames pulumi.StringArrayOutput `pulumi:"hostnames"` + LastUpdated pulumi.StringOutput `pulumi:"lastUpdated"` // Name of the host group. Name pulumi.StringOutput `pulumi:"name"` // The host group type, case sensitive. (dynamic, static, staticByID) @@ -114,7 +140,11 @@ type hostGroupState struct { AssignmentRule *string `pulumi:"assignmentRule"` // Description of the host group. Description *string `pulumi:"description"` - LastUpdated *string `pulumi:"lastUpdated"` + // List of host ids to add to a staticByID host group. + HostIds []string `pulumi:"hostIds"` + // List of hostnames to add to a static host group. + Hostnames []string `pulumi:"hostnames"` + LastUpdated *string `pulumi:"lastUpdated"` // Name of the host group. Name *string `pulumi:"name"` // The host group type, case sensitive. (dynamic, static, staticByID) @@ -126,6 +156,10 @@ type HostGroupState struct { AssignmentRule pulumi.StringPtrInput // Description of the host group. Description pulumi.StringPtrInput + // List of host ids to add to a staticByID host group. + HostIds pulumi.StringArrayInput + // List of hostnames to add to a static host group. + Hostnames pulumi.StringArrayInput LastUpdated pulumi.StringPtrInput // Name of the host group. Name pulumi.StringPtrInput @@ -142,6 +176,10 @@ type hostGroupArgs struct { AssignmentRule *string `pulumi:"assignmentRule"` // Description of the host group. Description string `pulumi:"description"` + // List of host ids to add to a staticByID host group. + HostIds []string `pulumi:"hostIds"` + // List of hostnames to add to a static host group. + Hostnames []string `pulumi:"hostnames"` // Name of the host group. Name *string `pulumi:"name"` // The host group type, case sensitive. (dynamic, static, staticByID) @@ -154,6 +192,10 @@ type HostGroupArgs struct { AssignmentRule pulumi.StringPtrInput // Description of the host group. Description pulumi.StringInput + // List of host ids to add to a staticByID host group. + HostIds pulumi.StringArrayInput + // List of hostnames to add to a static host group. + Hostnames pulumi.StringArrayInput // Name of the host group. Name pulumi.StringPtrInput // The host group type, case sensitive. (dynamic, static, staticByID) @@ -248,8 +290,8 @@ func (o HostGroupOutput) ToHostGroupOutputWithContext(ctx context.Context) HostG } // The assignment rule for dynamic host groups. -func (o HostGroupOutput) AssignmentRule() pulumi.StringOutput { - return o.ApplyT(func(v *HostGroup) pulumi.StringOutput { return v.AssignmentRule }).(pulumi.StringOutput) +func (o HostGroupOutput) AssignmentRule() pulumi.StringPtrOutput { + return o.ApplyT(func(v *HostGroup) pulumi.StringPtrOutput { return v.AssignmentRule }).(pulumi.StringPtrOutput) } // Description of the host group. @@ -257,6 +299,16 @@ func (o HostGroupOutput) Description() pulumi.StringOutput { return o.ApplyT(func(v *HostGroup) pulumi.StringOutput { return v.Description }).(pulumi.StringOutput) } +// List of host ids to add to a staticByID host group. +func (o HostGroupOutput) HostIds() pulumi.StringArrayOutput { + return o.ApplyT(func(v *HostGroup) pulumi.StringArrayOutput { return v.HostIds }).(pulumi.StringArrayOutput) +} + +// List of hostnames to add to a static host group. +func (o HostGroupOutput) Hostnames() pulumi.StringArrayOutput { + return o.ApplyT(func(v *HostGroup) pulumi.StringArrayOutput { return v.Hostnames }).(pulumi.StringArrayOutput) +} + func (o HostGroupOutput) LastUpdated() pulumi.StringOutput { return o.ApplyT(func(v *HostGroup) pulumi.StringOutput { return v.LastUpdated }).(pulumi.StringOutput) } diff --git a/sdk/nodejs/getSensorUpdatePolicyBuilds.ts b/sdk/nodejs/getSensorUpdatePolicyBuilds.ts index 3800089..58810b4 100644 --- a/sdk/nodejs/getSensorUpdatePolicyBuilds.ts +++ b/sdk/nodejs/getSensorUpdatePolicyBuilds.ts @@ -29,7 +29,6 @@ import * as utilities from "./utilities"; * ``` */ export function getSensorUpdatePolicyBuilds(opts?: pulumi.InvokeOptions): Promise { - opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invoke("crowdstrike:index/getSensorUpdatePolicyBuilds:getSensorUpdatePolicyBuilds", { }, opts); @@ -83,5 +82,7 @@ export interface GetSensorUpdatePolicyBuildsResult { * ``` */ export function getSensorUpdatePolicyBuildsOutput(opts?: pulumi.InvokeOptions): pulumi.Output { - return pulumi.output(getSensorUpdatePolicyBuilds(opts)) + opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); + return pulumi.runtime.invokeOutput("crowdstrike:index/getSensorUpdatePolicyBuilds:getSensorUpdatePolicyBuilds", { + }, opts); } diff --git a/sdk/nodejs/hostGroup.ts b/sdk/nodejs/hostGroup.ts index 2b540b8..62a13e8 100644 --- a/sdk/nodejs/hostGroup.ts +++ b/sdk/nodejs/hostGroup.ts @@ -23,12 +23,28 @@ import * as utilities from "./utilities"; * import * as pulumi from "@pulumi/pulumi"; * import * as crowdstrike from "@crowdstrike/pulumi"; * - * const example = new crowdstrike.HostGroup("example", { + * const dynamic = new crowdstrike.HostGroup("dynamic", { + * assignmentRule: "tags:'SensorGroupingTags/molecule'+os_version:'Debian GNU 11'", * description: "Made with Pulumi", * type: "dynamic", - * assignmentRule: "tags:'SensorGroupingTags/cloud-lab'+os_version:'Amazon Linux 2'", * }); - * export const hostGroup = example; + * const static = new crowdstrike.HostGroup("static", { + * description: "Made with Pulumi", + * type: "static", + * hostnames: [ + * "host1", + * "host2", + * ], + * }); + * const staticByID = new crowdstrike.HostGroup("staticByID", { + * description: "Made with Pulumi", + * type: "staticByID", + * hostIds: [ + * "123123", + * "124124", + * ], + * }); + * export const hostGroup = dynamic; * ``` * * ## Import @@ -70,11 +86,19 @@ export class HostGroup extends pulumi.CustomResource { /** * The assignment rule for dynamic host groups. */ - public readonly assignmentRule!: pulumi.Output; + public readonly assignmentRule!: pulumi.Output; /** * Description of the host group. */ public readonly description!: pulumi.Output; + /** + * List of host ids to add to a staticByID host group. + */ + public readonly hostIds!: pulumi.Output; + /** + * List of hostnames to add to a static host group. + */ + public readonly hostnames!: pulumi.Output; public /*out*/ readonly lastUpdated!: pulumi.Output; /** * Name of the host group. @@ -100,6 +124,8 @@ export class HostGroup extends pulumi.CustomResource { const state = argsOrState as HostGroupState | undefined; resourceInputs["assignmentRule"] = state ? state.assignmentRule : undefined; resourceInputs["description"] = state ? state.description : undefined; + resourceInputs["hostIds"] = state ? state.hostIds : undefined; + resourceInputs["hostnames"] = state ? state.hostnames : undefined; resourceInputs["lastUpdated"] = state ? state.lastUpdated : undefined; resourceInputs["name"] = state ? state.name : undefined; resourceInputs["type"] = state ? state.type : undefined; @@ -113,6 +139,8 @@ export class HostGroup extends pulumi.CustomResource { } resourceInputs["assignmentRule"] = args ? args.assignmentRule : undefined; resourceInputs["description"] = args ? args.description : undefined; + resourceInputs["hostIds"] = args ? args.hostIds : undefined; + resourceInputs["hostnames"] = args ? args.hostnames : undefined; resourceInputs["name"] = args ? args.name : undefined; resourceInputs["type"] = args ? args.type : undefined; resourceInputs["lastUpdated"] = undefined /*out*/; @@ -134,6 +162,14 @@ export interface HostGroupState { * Description of the host group. */ description?: pulumi.Input; + /** + * List of host ids to add to a staticByID host group. + */ + hostIds?: pulumi.Input[]>; + /** + * List of hostnames to add to a static host group. + */ + hostnames?: pulumi.Input[]>; lastUpdated?: pulumi.Input; /** * Name of the host group. @@ -157,6 +193,14 @@ export interface HostGroupArgs { * Description of the host group. */ description: pulumi.Input; + /** + * List of host ids to add to a staticByID host group. + */ + hostIds?: pulumi.Input[]>; + /** + * List of hostnames to add to a static host group. + */ + hostnames?: pulumi.Input[]>; /** * Name of the host group. */ diff --git a/sdk/python/crowdstrike_pulumi/filevantage_policy.py b/sdk/python/crowdstrike_pulumi/filevantage_policy.py index 48049f0..6cb312e 100644 --- a/sdk/python/crowdstrike_pulumi/filevantage_policy.py +++ b/sdk/python/crowdstrike_pulumi/filevantage_policy.py @@ -275,7 +275,7 @@ def __init__(__self__, name: Optional[pulumi.Input[str]] = None, platform_name: Optional[pulumi.Input[str]] = None, rule_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - scheduled_exclusions: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['FilevantagePolicyScheduledExclusionArgs']]]]] = None, + scheduled_exclusions: Optional[pulumi.Input[Sequence[pulumi.Input[Union['FilevantagePolicyScheduledExclusionArgs', 'FilevantagePolicyScheduledExclusionArgsDict']]]]] = None, __props__=None): """ This resource allows management of a FileVantage policy. A FileVantage policy is a collection of file integrity rules and rule groups that you can apply to host groups. @@ -302,7 +302,7 @@ def __init__(__self__, :param pulumi.Input[str] name: Name of the filevantage policy. :param pulumi.Input[str] platform_name: Platform for the filevantage policy to manage. (Windows, Mac, Linux) :param pulumi.Input[Sequence[pulumi.Input[str]]] rule_groups: Rule Group ids to attach to the filevantage policy. Precedence is based on the order of the list. Rule groups must be the same type as the policy. - :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['FilevantagePolicyScheduledExclusionArgs']]]] scheduled_exclusions: Scheduled exclusions for the filevantage policy. + :param pulumi.Input[Sequence[pulumi.Input[Union['FilevantagePolicyScheduledExclusionArgs', 'FilevantagePolicyScheduledExclusionArgsDict']]]] scheduled_exclusions: Scheduled exclusions for the filevantage policy. """ ... @overload @@ -348,7 +348,7 @@ def _internal_init(__self__, name: Optional[pulumi.Input[str]] = None, platform_name: Optional[pulumi.Input[str]] = None, rule_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - scheduled_exclusions: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['FilevantagePolicyScheduledExclusionArgs']]]]] = None, + scheduled_exclusions: Optional[pulumi.Input[Sequence[pulumi.Input[Union['FilevantagePolicyScheduledExclusionArgs', 'FilevantagePolicyScheduledExclusionArgsDict']]]]] = None, __props__=None): opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts) if not isinstance(opts, pulumi.ResourceOptions): @@ -385,7 +385,7 @@ def get(resource_name: str, name: Optional[pulumi.Input[str]] = None, platform_name: Optional[pulumi.Input[str]] = None, rule_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - scheduled_exclusions: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['FilevantagePolicyScheduledExclusionArgs']]]]] = None) -> 'FilevantagePolicy': + scheduled_exclusions: Optional[pulumi.Input[Sequence[pulumi.Input[Union['FilevantagePolicyScheduledExclusionArgs', 'FilevantagePolicyScheduledExclusionArgsDict']]]]] = None) -> 'FilevantagePolicy': """ Get an existing FilevantagePolicy resource's state with the given name, id, and optional extra properties used to qualify the lookup. @@ -399,7 +399,7 @@ def get(resource_name: str, :param pulumi.Input[str] name: Name of the filevantage policy. :param pulumi.Input[str] platform_name: Platform for the filevantage policy to manage. (Windows, Mac, Linux) :param pulumi.Input[Sequence[pulumi.Input[str]]] rule_groups: Rule Group ids to attach to the filevantage policy. Precedence is based on the order of the list. Rule groups must be the same type as the policy. - :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['FilevantagePolicyScheduledExclusionArgs']]]] scheduled_exclusions: Scheduled exclusions for the filevantage policy. + :param pulumi.Input[Sequence[pulumi.Input[Union['FilevantagePolicyScheduledExclusionArgs', 'FilevantagePolicyScheduledExclusionArgsDict']]]] scheduled_exclusions: Scheduled exclusions for the filevantage policy. """ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id)) diff --git a/sdk/python/crowdstrike_pulumi/filevantage_rule_group.py b/sdk/python/crowdstrike_pulumi/filevantage_rule_group.py index 15be13f..dac189f 100644 --- a/sdk/python/crowdstrike_pulumi/filevantage_rule_group.py +++ b/sdk/python/crowdstrike_pulumi/filevantage_rule_group.py @@ -176,7 +176,7 @@ def __init__(__self__, opts: Optional[pulumi.ResourceOptions] = None, description: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, - rules: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['FilevantageRuleGroupRuleArgs']]]]] = None, + rules: Optional[pulumi.Input[Sequence[pulumi.Input[Union['FilevantageRuleGroupRuleArgs', 'FilevantageRuleGroupRuleArgsDict']]]]] = None, type: Optional[pulumi.Input[str]] = None, __props__=None): """ @@ -200,7 +200,7 @@ def __init__(__self__, :param pulumi.ResourceOptions opts: Options for the resource. :param pulumi.Input[str] description: Description of the filevantage rule group. :param pulumi.Input[str] name: Name of the filevantage rule group. - :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['FilevantageRuleGroupRuleArgs']]]] rules: Rules to be associated with the rule group. Precedence is determined by the order of the rules in the list. + :param pulumi.Input[Sequence[pulumi.Input[Union['FilevantageRuleGroupRuleArgs', 'FilevantageRuleGroupRuleArgsDict']]]] rules: Rules to be associated with the rule group. Precedence is determined by the order of the rules in the list. :param pulumi.Input[str] type: The type of filevantage rule group. """ ... @@ -243,7 +243,7 @@ def _internal_init(__self__, opts: Optional[pulumi.ResourceOptions] = None, description: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, - rules: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['FilevantageRuleGroupRuleArgs']]]]] = None, + rules: Optional[pulumi.Input[Sequence[pulumi.Input[Union['FilevantageRuleGroupRuleArgs', 'FilevantageRuleGroupRuleArgsDict']]]]] = None, type: Optional[pulumi.Input[str]] = None, __props__=None): opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts) @@ -272,7 +272,7 @@ def get(resource_name: str, description: Optional[pulumi.Input[str]] = None, last_updated: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, - rules: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['FilevantageRuleGroupRuleArgs']]]]] = None, + rules: Optional[pulumi.Input[Sequence[pulumi.Input[Union['FilevantageRuleGroupRuleArgs', 'FilevantageRuleGroupRuleArgsDict']]]]] = None, type: Optional[pulumi.Input[str]] = None) -> 'FilevantageRuleGroup': """ Get an existing FilevantageRuleGroup resource's state with the given name, id, and optional extra @@ -283,7 +283,7 @@ def get(resource_name: str, :param pulumi.ResourceOptions opts: Options for the resource. :param pulumi.Input[str] description: Description of the filevantage rule group. :param pulumi.Input[str] name: Name of the filevantage rule group. - :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['FilevantageRuleGroupRuleArgs']]]] rules: Rules to be associated with the rule group. Precedence is determined by the order of the rules in the list. + :param pulumi.Input[Sequence[pulumi.Input[Union['FilevantageRuleGroupRuleArgs', 'FilevantageRuleGroupRuleArgsDict']]]] rules: Rules to be associated with the rule group. Precedence is determined by the order of the rules in the list. :param pulumi.Input[str] type: The type of filevantage rule group. """ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id)) diff --git a/sdk/python/crowdstrike_pulumi/host_group.py b/sdk/python/crowdstrike_pulumi/host_group.py index 03580cb..d449540 100644 --- a/sdk/python/crowdstrike_pulumi/host_group.py +++ b/sdk/python/crowdstrike_pulumi/host_group.py @@ -17,18 +17,26 @@ def __init__(__self__, *, description: pulumi.Input[str], type: pulumi.Input[str], assignment_rule: Optional[pulumi.Input[str]] = None, + host_ids: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, + hostnames: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, name: Optional[pulumi.Input[str]] = None): """ The set of arguments for constructing a HostGroup resource. :param pulumi.Input[str] description: Description of the host group. :param pulumi.Input[str] type: The host group type, case sensitive. (dynamic, static, staticByID) :param pulumi.Input[str] assignment_rule: The assignment rule for dynamic host groups. + :param pulumi.Input[Sequence[pulumi.Input[str]]] host_ids: List of host ids to add to a staticByID host group. + :param pulumi.Input[Sequence[pulumi.Input[str]]] hostnames: List of hostnames to add to a static host group. :param pulumi.Input[str] name: Name of the host group. """ pulumi.set(__self__, "description", description) pulumi.set(__self__, "type", type) if assignment_rule is not None: pulumi.set(__self__, "assignment_rule", assignment_rule) + if host_ids is not None: + pulumi.set(__self__, "host_ids", host_ids) + if hostnames is not None: + pulumi.set(__self__, "hostnames", hostnames) if name is not None: pulumi.set(__self__, "name", name) @@ -68,6 +76,30 @@ def assignment_rule(self) -> Optional[pulumi.Input[str]]: def assignment_rule(self, value: Optional[pulumi.Input[str]]): pulumi.set(self, "assignment_rule", value) + @property + @pulumi.getter(name="hostIds") + def host_ids(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]: + """ + List of host ids to add to a staticByID host group. + """ + return pulumi.get(self, "host_ids") + + @host_ids.setter + def host_ids(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]): + pulumi.set(self, "host_ids", value) + + @property + @pulumi.getter + def hostnames(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]: + """ + List of hostnames to add to a static host group. + """ + return pulumi.get(self, "hostnames") + + @hostnames.setter + def hostnames(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]): + pulumi.set(self, "hostnames", value) + @property @pulumi.getter def name(self) -> Optional[pulumi.Input[str]]: @@ -86,6 +118,8 @@ class _HostGroupState: def __init__(__self__, *, assignment_rule: Optional[pulumi.Input[str]] = None, description: Optional[pulumi.Input[str]] = None, + host_ids: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, + hostnames: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, last_updated: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, type: Optional[pulumi.Input[str]] = None): @@ -93,6 +127,8 @@ def __init__(__self__, *, Input properties used for looking up and filtering HostGroup resources. :param pulumi.Input[str] assignment_rule: The assignment rule for dynamic host groups. :param pulumi.Input[str] description: Description of the host group. + :param pulumi.Input[Sequence[pulumi.Input[str]]] host_ids: List of host ids to add to a staticByID host group. + :param pulumi.Input[Sequence[pulumi.Input[str]]] hostnames: List of hostnames to add to a static host group. :param pulumi.Input[str] name: Name of the host group. :param pulumi.Input[str] type: The host group type, case sensitive. (dynamic, static, staticByID) """ @@ -100,6 +136,10 @@ def __init__(__self__, *, pulumi.set(__self__, "assignment_rule", assignment_rule) if description is not None: pulumi.set(__self__, "description", description) + if host_ids is not None: + pulumi.set(__self__, "host_ids", host_ids) + if hostnames is not None: + pulumi.set(__self__, "hostnames", hostnames) if last_updated is not None: pulumi.set(__self__, "last_updated", last_updated) if name is not None: @@ -131,6 +171,30 @@ def description(self) -> Optional[pulumi.Input[str]]: def description(self, value: Optional[pulumi.Input[str]]): pulumi.set(self, "description", value) + @property + @pulumi.getter(name="hostIds") + def host_ids(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]: + """ + List of host ids to add to a staticByID host group. + """ + return pulumi.get(self, "host_ids") + + @host_ids.setter + def host_ids(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]): + pulumi.set(self, "host_ids", value) + + @property + @pulumi.getter + def hostnames(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]: + """ + List of hostnames to add to a static host group. + """ + return pulumi.get(self, "hostnames") + + @hostnames.setter + def hostnames(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]): + pulumi.set(self, "hostnames", value) + @property @pulumi.getter(name="lastUpdated") def last_updated(self) -> Optional[pulumi.Input[str]]: @@ -172,6 +236,8 @@ def __init__(__self__, opts: Optional[pulumi.ResourceOptions] = None, assignment_rule: Optional[pulumi.Input[str]] = None, description: Optional[pulumi.Input[str]] = None, + host_ids: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, + hostnames: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, name: Optional[pulumi.Input[str]] = None, type: Optional[pulumi.Input[str]] = None, __props__=None): @@ -194,11 +260,25 @@ def __init__(__self__, import pulumi import crowdstrike_pulumi as crowdstrike - example = crowdstrike.HostGroup("example", + dynamic = crowdstrike.HostGroup("dynamic", + assignment_rule="tags:'SensorGroupingTags/molecule'+os_version:'Debian GNU 11'", + description="Made with Pulumi", + type="dynamic") + static = crowdstrike.HostGroup("static", description="Made with Pulumi", - type="dynamic", - assignment_rule="tags:'SensorGroupingTags/cloud-lab'+os_version:'Amazon Linux 2'") - pulumi.export("hostGroup", example) + type="static", + hostnames=[ + "host1", + "host2", + ]) + static_by_id = crowdstrike.HostGroup("staticByID", + description="Made with Pulumi", + type="staticByID", + host_ids=[ + "123123", + "124124", + ]) + pulumi.export("hostGroup", dynamic) ``` ## Import @@ -213,6 +293,8 @@ def __init__(__self__, :param pulumi.ResourceOptions opts: Options for the resource. :param pulumi.Input[str] assignment_rule: The assignment rule for dynamic host groups. :param pulumi.Input[str] description: Description of the host group. + :param pulumi.Input[Sequence[pulumi.Input[str]]] host_ids: List of host ids to add to a staticByID host group. + :param pulumi.Input[Sequence[pulumi.Input[str]]] hostnames: List of hostnames to add to a static host group. :param pulumi.Input[str] name: Name of the host group. :param pulumi.Input[str] type: The host group type, case sensitive. (dynamic, static, staticByID) """ @@ -241,11 +323,25 @@ def __init__(__self__, import pulumi import crowdstrike_pulumi as crowdstrike - example = crowdstrike.HostGroup("example", + dynamic = crowdstrike.HostGroup("dynamic", + assignment_rule="tags:'SensorGroupingTags/molecule'+os_version:'Debian GNU 11'", + description="Made with Pulumi", + type="dynamic") + static = crowdstrike.HostGroup("static", description="Made with Pulumi", - type="dynamic", - assignment_rule="tags:'SensorGroupingTags/cloud-lab'+os_version:'Amazon Linux 2'") - pulumi.export("hostGroup", example) + type="static", + hostnames=[ + "host1", + "host2", + ]) + static_by_id = crowdstrike.HostGroup("staticByID", + description="Made with Pulumi", + type="staticByID", + host_ids=[ + "123123", + "124124", + ]) + pulumi.export("hostGroup", dynamic) ``` ## Import @@ -273,6 +369,8 @@ def _internal_init(__self__, opts: Optional[pulumi.ResourceOptions] = None, assignment_rule: Optional[pulumi.Input[str]] = None, description: Optional[pulumi.Input[str]] = None, + host_ids: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, + hostnames: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, name: Optional[pulumi.Input[str]] = None, type: Optional[pulumi.Input[str]] = None, __props__=None): @@ -288,6 +386,8 @@ def _internal_init(__self__, if description is None and not opts.urn: raise TypeError("Missing required property 'description'") __props__.__dict__["description"] = description + __props__.__dict__["host_ids"] = host_ids + __props__.__dict__["hostnames"] = hostnames __props__.__dict__["name"] = name if type is None and not opts.urn: raise TypeError("Missing required property 'type'") @@ -305,6 +405,8 @@ def get(resource_name: str, opts: Optional[pulumi.ResourceOptions] = None, assignment_rule: Optional[pulumi.Input[str]] = None, description: Optional[pulumi.Input[str]] = None, + host_ids: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, + hostnames: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, last_updated: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, type: Optional[pulumi.Input[str]] = None) -> 'HostGroup': @@ -317,6 +419,8 @@ def get(resource_name: str, :param pulumi.ResourceOptions opts: Options for the resource. :param pulumi.Input[str] assignment_rule: The assignment rule for dynamic host groups. :param pulumi.Input[str] description: Description of the host group. + :param pulumi.Input[Sequence[pulumi.Input[str]]] host_ids: List of host ids to add to a staticByID host group. + :param pulumi.Input[Sequence[pulumi.Input[str]]] hostnames: List of hostnames to add to a static host group. :param pulumi.Input[str] name: Name of the host group. :param pulumi.Input[str] type: The host group type, case sensitive. (dynamic, static, staticByID) """ @@ -326,6 +430,8 @@ def get(resource_name: str, __props__.__dict__["assignment_rule"] = assignment_rule __props__.__dict__["description"] = description + __props__.__dict__["host_ids"] = host_ids + __props__.__dict__["hostnames"] = hostnames __props__.__dict__["last_updated"] = last_updated __props__.__dict__["name"] = name __props__.__dict__["type"] = type @@ -333,7 +439,7 @@ def get(resource_name: str, @property @pulumi.getter(name="assignmentRule") - def assignment_rule(self) -> pulumi.Output[str]: + def assignment_rule(self) -> pulumi.Output[Optional[str]]: """ The assignment rule for dynamic host groups. """ @@ -347,6 +453,22 @@ def description(self) -> pulumi.Output[str]: """ return pulumi.get(self, "description") + @property + @pulumi.getter(name="hostIds") + def host_ids(self) -> pulumi.Output[Optional[Sequence[str]]]: + """ + List of host ids to add to a staticByID host group. + """ + return pulumi.get(self, "host_ids") + + @property + @pulumi.getter + def hostnames(self) -> pulumi.Output[Optional[Sequence[str]]]: + """ + List of hostnames to add to a static host group. + """ + return pulumi.get(self, "hostnames") + @property @pulumi.getter(name="lastUpdated") def last_updated(self) -> pulumi.Output[str]: diff --git a/sdk/python/crowdstrike_pulumi/prevention_policy_linux.py b/sdk/python/crowdstrike_pulumi/prevention_policy_linux.py index dea39a3..328a74e 100644 --- a/sdk/python/crowdstrike_pulumi/prevention_policy_linux.py +++ b/sdk/python/crowdstrike_pulumi/prevention_policy_linux.py @@ -686,7 +686,7 @@ class PreventionPolicyLinux(pulumi.CustomResource): def __init__(__self__, resource_name: str, opts: Optional[pulumi.ResourceOptions] = None, - cloud_anti_malware: Optional[pulumi.Input[pulumi.InputType['PreventionPolicyLinuxCloudAntiMalwareArgs']]] = None, + cloud_anti_malware: Optional[pulumi.Input[Union['PreventionPolicyLinuxCloudAntiMalwareArgs', 'PreventionPolicyLinuxCloudAntiMalwareArgsDict']]] = None, custom_blocking: Optional[pulumi.Input[bool]] = None, description: Optional[pulumi.Input[str]] = None, drift_prevention: Optional[pulumi.Input[bool]] = None, @@ -702,7 +702,7 @@ def __init__(__self__, prevent_suspicious_processes: Optional[pulumi.Input[bool]] = None, quarantine: Optional[pulumi.Input[bool]] = None, script_based_execution_monitoring: Optional[pulumi.Input[bool]] = None, - sensor_anti_malware: Optional[pulumi.Input[pulumi.InputType['PreventionPolicyLinuxSensorAntiMalwareArgs']]] = None, + sensor_anti_malware: Optional[pulumi.Input[Union['PreventionPolicyLinuxSensorAntiMalwareArgs', 'PreventionPolicyLinuxSensorAntiMalwareArgsDict']]] = None, tls_visibility: Optional[pulumi.Input[bool]] = None, upload_unknown_detection_related_executables: Optional[pulumi.Input[bool]] = None, upload_unknown_executables: Optional[pulumi.Input[bool]] = None, @@ -727,14 +727,14 @@ def __init__(__self__, description="Made with Pulumi", host_groups=["d6e3c1e1b3d0467da0fowc96a5e6ecb5"], ioa_rule_groups=["ed334b3243bc4b6bb8e7d40a2ecd86fa"], - cloud_anti_malware=crowdstrike.PreventionPolicyLinuxCloudAntiMalwareArgs( - detection="MODERATE", - prevention="CAUTIOUS", - ), - sensor_anti_malware=crowdstrike.PreventionPolicyLinuxSensorAntiMalwareArgs( - detection="MODERATE", - prevention="CAUTIOUS", - ), + cloud_anti_malware={ + "detection": "MODERATE", + "prevention": "CAUTIOUS", + }, + sensor_anti_malware={ + "detection": "MODERATE", + "prevention": "CAUTIOUS", + }, quarantine=True, custom_blocking=True, prevent_suspicious_processes=True, @@ -761,7 +761,7 @@ def __init__(__self__, :param str resource_name: The name of the resource. :param pulumi.ResourceOptions opts: Options for the resource. - :param pulumi.Input[pulumi.InputType['PreventionPolicyLinuxCloudAntiMalwareArgs']] cloud_anti_malware: Use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware for your online hosts. + :param pulumi.Input[Union['PreventionPolicyLinuxCloudAntiMalwareArgs', 'PreventionPolicyLinuxCloudAntiMalwareArgsDict']] cloud_anti_malware: Use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware for your online hosts. :param pulumi.Input[bool] custom_blocking: Whether to enable the setting. Block processes matching hashes that you add to IOC Management with the action set to "Block" or "Block, hide detection". :param pulumi.Input[str] description: Description of the prevention policy. :param pulumi.Input[bool] drift_prevention: Whether to enable the setting. Block new processes originating from files written in a container. This prevents a container from drifting from its immutable runtime state. @@ -777,7 +777,7 @@ def __init__(__self__, :param pulumi.Input[bool] prevent_suspicious_processes: Whether to enable the setting. Block processes that CrowdStrike analysts classify as suspicious. These are focused on dynamic IOAs, such as malware, exploits and other threats. :param pulumi.Input[bool] quarantine: Whether to enable the setting. Quarantine executable files after they’re prevented by NGAV. When this is enabled, we recommend setting anti-malware prevention levels to Moderate or higher and not using other antivirus solutions. :param pulumi.Input[bool] script_based_execution_monitoring: Whether to enable the setting. Provides visibility into suspicious scripts, including shell and other scripting languages. - :param pulumi.Input[pulumi.InputType['PreventionPolicyLinuxSensorAntiMalwareArgs']] sensor_anti_malware: For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent malware. + :param pulumi.Input[Union['PreventionPolicyLinuxSensorAntiMalwareArgs', 'PreventionPolicyLinuxSensorAntiMalwareArgsDict']] sensor_anti_malware: For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent malware. :param pulumi.Input[bool] tls_visibility: Whether to enable the setting. Allows the sensor to monitor TLS traffic for malicious patterns and improved detections. :param pulumi.Input[bool] upload_unknown_detection_related_executables: Whether to enable the setting. Upload all unknown detection-related executables for advanced analysis in the cloud. :param pulumi.Input[bool] upload_unknown_executables: Whether to enable the setting. Upload all unknown executables for advanced analysis in the cloud. @@ -808,14 +808,14 @@ def __init__(__self__, description="Made with Pulumi", host_groups=["d6e3c1e1b3d0467da0fowc96a5e6ecb5"], ioa_rule_groups=["ed334b3243bc4b6bb8e7d40a2ecd86fa"], - cloud_anti_malware=crowdstrike.PreventionPolicyLinuxCloudAntiMalwareArgs( - detection="MODERATE", - prevention="CAUTIOUS", - ), - sensor_anti_malware=crowdstrike.PreventionPolicyLinuxSensorAntiMalwareArgs( - detection="MODERATE", - prevention="CAUTIOUS", - ), + cloud_anti_malware={ + "detection": "MODERATE", + "prevention": "CAUTIOUS", + }, + sensor_anti_malware={ + "detection": "MODERATE", + "prevention": "CAUTIOUS", + }, quarantine=True, custom_blocking=True, prevent_suspicious_processes=True, @@ -855,7 +855,7 @@ def __init__(__self__, resource_name: str, *args, **kwargs): def _internal_init(__self__, resource_name: str, opts: Optional[pulumi.ResourceOptions] = None, - cloud_anti_malware: Optional[pulumi.Input[pulumi.InputType['PreventionPolicyLinuxCloudAntiMalwareArgs']]] = None, + cloud_anti_malware: Optional[pulumi.Input[Union['PreventionPolicyLinuxCloudAntiMalwareArgs', 'PreventionPolicyLinuxCloudAntiMalwareArgsDict']]] = None, custom_blocking: Optional[pulumi.Input[bool]] = None, description: Optional[pulumi.Input[str]] = None, drift_prevention: Optional[pulumi.Input[bool]] = None, @@ -871,7 +871,7 @@ def _internal_init(__self__, prevent_suspicious_processes: Optional[pulumi.Input[bool]] = None, quarantine: Optional[pulumi.Input[bool]] = None, script_based_execution_monitoring: Optional[pulumi.Input[bool]] = None, - sensor_anti_malware: Optional[pulumi.Input[pulumi.InputType['PreventionPolicyLinuxSensorAntiMalwareArgs']]] = None, + sensor_anti_malware: Optional[pulumi.Input[Union['PreventionPolicyLinuxSensorAntiMalwareArgs', 'PreventionPolicyLinuxSensorAntiMalwareArgsDict']]] = None, tls_visibility: Optional[pulumi.Input[bool]] = None, upload_unknown_detection_related_executables: Optional[pulumi.Input[bool]] = None, upload_unknown_executables: Optional[pulumi.Input[bool]] = None, @@ -915,7 +915,7 @@ def _internal_init(__self__, def get(resource_name: str, id: pulumi.Input[str], opts: Optional[pulumi.ResourceOptions] = None, - cloud_anti_malware: Optional[pulumi.Input[pulumi.InputType['PreventionPolicyLinuxCloudAntiMalwareArgs']]] = None, + cloud_anti_malware: Optional[pulumi.Input[Union['PreventionPolicyLinuxCloudAntiMalwareArgs', 'PreventionPolicyLinuxCloudAntiMalwareArgsDict']]] = None, custom_blocking: Optional[pulumi.Input[bool]] = None, description: Optional[pulumi.Input[str]] = None, drift_prevention: Optional[pulumi.Input[bool]] = None, @@ -932,7 +932,7 @@ def get(resource_name: str, prevent_suspicious_processes: Optional[pulumi.Input[bool]] = None, quarantine: Optional[pulumi.Input[bool]] = None, script_based_execution_monitoring: Optional[pulumi.Input[bool]] = None, - sensor_anti_malware: Optional[pulumi.Input[pulumi.InputType['PreventionPolicyLinuxSensorAntiMalwareArgs']]] = None, + sensor_anti_malware: Optional[pulumi.Input[Union['PreventionPolicyLinuxSensorAntiMalwareArgs', 'PreventionPolicyLinuxSensorAntiMalwareArgsDict']]] = None, tls_visibility: Optional[pulumi.Input[bool]] = None, upload_unknown_detection_related_executables: Optional[pulumi.Input[bool]] = None, upload_unknown_executables: Optional[pulumi.Input[bool]] = None) -> 'PreventionPolicyLinux': @@ -943,7 +943,7 @@ def get(resource_name: str, :param str resource_name: The unique name of the resulting resource. :param pulumi.Input[str] id: The unique provider ID of the resource to lookup. :param pulumi.ResourceOptions opts: Options for the resource. - :param pulumi.Input[pulumi.InputType['PreventionPolicyLinuxCloudAntiMalwareArgs']] cloud_anti_malware: Use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware for your online hosts. + :param pulumi.Input[Union['PreventionPolicyLinuxCloudAntiMalwareArgs', 'PreventionPolicyLinuxCloudAntiMalwareArgsDict']] cloud_anti_malware: Use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware for your online hosts. :param pulumi.Input[bool] custom_blocking: Whether to enable the setting. Block processes matching hashes that you add to IOC Management with the action set to "Block" or "Block, hide detection". :param pulumi.Input[str] description: Description of the prevention policy. :param pulumi.Input[bool] drift_prevention: Whether to enable the setting. Block new processes originating from files written in a container. This prevents a container from drifting from its immutable runtime state. @@ -959,7 +959,7 @@ def get(resource_name: str, :param pulumi.Input[bool] prevent_suspicious_processes: Whether to enable the setting. Block processes that CrowdStrike analysts classify as suspicious. These are focused on dynamic IOAs, such as malware, exploits and other threats. :param pulumi.Input[bool] quarantine: Whether to enable the setting. Quarantine executable files after they’re prevented by NGAV. When this is enabled, we recommend setting anti-malware prevention levels to Moderate or higher and not using other antivirus solutions. :param pulumi.Input[bool] script_based_execution_monitoring: Whether to enable the setting. Provides visibility into suspicious scripts, including shell and other scripting languages. - :param pulumi.Input[pulumi.InputType['PreventionPolicyLinuxSensorAntiMalwareArgs']] sensor_anti_malware: For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent malware. + :param pulumi.Input[Union['PreventionPolicyLinuxSensorAntiMalwareArgs', 'PreventionPolicyLinuxSensorAntiMalwareArgsDict']] sensor_anti_malware: For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent malware. :param pulumi.Input[bool] tls_visibility: Whether to enable the setting. Allows the sensor to monitor TLS traffic for malicious patterns and improved detections. :param pulumi.Input[bool] upload_unknown_detection_related_executables: Whether to enable the setting. Upload all unknown detection-related executables for advanced analysis in the cloud. :param pulumi.Input[bool] upload_unknown_executables: Whether to enable the setting. Upload all unknown executables for advanced analysis in the cloud. diff --git a/sdk/python/crowdstrike_pulumi/prevention_policy_mac.py b/sdk/python/crowdstrike_pulumi/prevention_policy_mac.py index 2f1526a..6298068 100644 --- a/sdk/python/crowdstrike_pulumi/prevention_policy_mac.py +++ b/sdk/python/crowdstrike_pulumi/prevention_policy_mac.py @@ -847,8 +847,8 @@ def __init__(__self__, resource_name: str, opts: Optional[pulumi.ResourceOptions] = None, chopper_webshell: Optional[pulumi.Input[bool]] = None, - cloud_adware_and_pup: Optional[pulumi.Input[pulumi.InputType['PreventionPolicyMacCloudAdwareAndPupArgs']]] = None, - cloud_anti_malware: Optional[pulumi.Input[pulumi.InputType['PreventionPolicyMacCloudAntiMalwareArgs']]] = None, + cloud_adware_and_pup: Optional[pulumi.Input[Union['PreventionPolicyMacCloudAdwareAndPupArgs', 'PreventionPolicyMacCloudAdwareAndPupArgsDict']]] = None, + cloud_anti_malware: Optional[pulumi.Input[Union['PreventionPolicyMacCloudAntiMalwareArgs', 'PreventionPolicyMacCloudAntiMalwareArgsDict']]] = None, custom_blocking: Optional[pulumi.Input[bool]] = None, description: Optional[pulumi.Input[str]] = None, detect_on_write: Optional[pulumi.Input[bool]] = None, @@ -865,8 +865,8 @@ def __init__(__self__, quarantine: Optional[pulumi.Input[bool]] = None, quarantine_on_write: Optional[pulumi.Input[bool]] = None, script_based_execution_monitoring: Optional[pulumi.Input[bool]] = None, - sensor_adware_and_pup: Optional[pulumi.Input[pulumi.InputType['PreventionPolicyMacSensorAdwareAndPupArgs']]] = None, - sensor_anti_malware: Optional[pulumi.Input[pulumi.InputType['PreventionPolicyMacSensorAntiMalwareArgs']]] = None, + sensor_adware_and_pup: Optional[pulumi.Input[Union['PreventionPolicyMacSensorAdwareAndPupArgs', 'PreventionPolicyMacSensorAdwareAndPupArgsDict']]] = None, + sensor_anti_malware: Optional[pulumi.Input[Union['PreventionPolicyMacSensorAntiMalwareArgs', 'PreventionPolicyMacSensorAntiMalwareArgsDict']]] = None, sensor_tampering_protection: Optional[pulumi.Input[bool]] = None, upload_unknown_detection_related_executables: Optional[pulumi.Input[bool]] = None, upload_unknown_executables: Optional[pulumi.Input[bool]] = None, @@ -892,22 +892,22 @@ def __init__(__self__, description="Made with Pulumi", host_groups=["d6e3c1e1b3d0467da0fowc96a5e6ecb5"], ioa_rule_groups=["ed334b3243bc4b6bb8e7d40a2ecd86fa"], - cloud_adware_and_pup=crowdstrike.PreventionPolicyMacCloudAdwareAndPupArgs( - detection="MODERATE", - prevention="CAUTIOUS", - ), - cloud_anti_malware=crowdstrike.PreventionPolicyMacCloudAntiMalwareArgs( - detection="MODERATE", - prevention="CAUTIOUS", - ), - sensor_anti_malware=crowdstrike.PreventionPolicyMacSensorAntiMalwareArgs( - detection="MODERATE", - prevention="CAUTIOUS", - ), - sensor_adware_and_pup=crowdstrike.PreventionPolicyMacSensorAdwareAndPupArgs( - detection="MODERATE", - prevention="CAUTIOUS", - ), + cloud_adware_and_pup={ + "detection": "MODERATE", + "prevention": "CAUTIOUS", + }, + cloud_anti_malware={ + "detection": "MODERATE", + "prevention": "CAUTIOUS", + }, + sensor_anti_malware={ + "detection": "MODERATE", + "prevention": "CAUTIOUS", + }, + sensor_adware_and_pup={ + "detection": "MODERATE", + "prevention": "CAUTIOUS", + }, notify_end_users=True, custom_blocking=True, detect_on_write=True, @@ -938,8 +938,8 @@ def __init__(__self__, :param str resource_name: The name of the resource. :param pulumi.ResourceOptions opts: Options for the resource. :param pulumi.Input[bool] chopper_webshell: Whether to enable the setting. Execution of a command shell was blocked and is indicative of the system hosting a Chopper web page. - :param pulumi.Input[pulumi.InputType['PreventionPolicyMacCloudAdwareAndPupArgs']] cloud_adware_and_pup: Use cloud-based machine learning informed by global analysis of executables to detect and prevent adware and potentially unwanted programs (PUP) for your online hosts. - :param pulumi.Input[pulumi.InputType['PreventionPolicyMacCloudAntiMalwareArgs']] cloud_anti_malware: Use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware for your online hosts. + :param pulumi.Input[Union['PreventionPolicyMacCloudAdwareAndPupArgs', 'PreventionPolicyMacCloudAdwareAndPupArgsDict']] cloud_adware_and_pup: Use cloud-based machine learning informed by global analysis of executables to detect and prevent adware and potentially unwanted programs (PUP) for your online hosts. + :param pulumi.Input[Union['PreventionPolicyMacCloudAntiMalwareArgs', 'PreventionPolicyMacCloudAntiMalwareArgsDict']] cloud_anti_malware: Use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware for your online hosts. :param pulumi.Input[bool] custom_blocking: Whether to enable the setting. Block processes matching hashes that you add to IOC Management with the action set to "Block" or "Block, hide detection". :param pulumi.Input[str] description: Description of the prevention policy. :param pulumi.Input[bool] detect_on_write: Whether to enable the setting. Use machine learning to analyze suspicious files when they're written to disk. To adjust detection sensitivity, change Anti-malware Detection levels in Sensor Machine Learning and Cloud Machine Learning. @@ -956,8 +956,8 @@ def __init__(__self__, :param pulumi.Input[bool] quarantine: Whether to enable the setting. Quarantine executable files after they’re prevented by NGAV. When this is enabled, we recommend setting anti-malware prevention levels to Moderate or higher and not using other antivirus solutions. :param pulumi.Input[bool] quarantine_on_write: Whether to enable the setting. Use machine learning to quarantine suspicious files when they're written to disk. To adjust quarantine sensitivity, change Anti-malware Prevention levels in Sensor Machine Learning and Cloud Machine Learning. :param pulumi.Input[bool] script_based_execution_monitoring: Whether to enable the setting. Provides visibility into suspicious scripts, including shell and other scripting languages. - :param pulumi.Input[pulumi.InputType['PreventionPolicyMacSensorAdwareAndPupArgs']] sensor_adware_and_pup: For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent adware and potentially unwanted programs (PUP). - :param pulumi.Input[pulumi.InputType['PreventionPolicyMacSensorAntiMalwareArgs']] sensor_anti_malware: For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent malware. + :param pulumi.Input[Union['PreventionPolicyMacSensorAdwareAndPupArgs', 'PreventionPolicyMacSensorAdwareAndPupArgsDict']] sensor_adware_and_pup: For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent adware and potentially unwanted programs (PUP). + :param pulumi.Input[Union['PreventionPolicyMacSensorAntiMalwareArgs', 'PreventionPolicyMacSensorAntiMalwareArgsDict']] sensor_anti_malware: For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent malware. :param pulumi.Input[bool] sensor_tampering_protection: Whether to enable the setting. Blocks attempts to tamper with the sensor. If disabled, the sensor still creates detections for tampering attempts but doesn’t block them. Disabling not recommended. :param pulumi.Input[bool] upload_unknown_detection_related_executables: Whether to enable the setting. Upload all unknown detection-related executables for advanced analysis in the cloud. :param pulumi.Input[bool] upload_unknown_executables: Whether to enable the setting. Upload all unknown executables for advanced analysis in the cloud. @@ -989,22 +989,22 @@ def __init__(__self__, description="Made with Pulumi", host_groups=["d6e3c1e1b3d0467da0fowc96a5e6ecb5"], ioa_rule_groups=["ed334b3243bc4b6bb8e7d40a2ecd86fa"], - cloud_adware_and_pup=crowdstrike.PreventionPolicyMacCloudAdwareAndPupArgs( - detection="MODERATE", - prevention="CAUTIOUS", - ), - cloud_anti_malware=crowdstrike.PreventionPolicyMacCloudAntiMalwareArgs( - detection="MODERATE", - prevention="CAUTIOUS", - ), - sensor_anti_malware=crowdstrike.PreventionPolicyMacSensorAntiMalwareArgs( - detection="MODERATE", - prevention="CAUTIOUS", - ), - sensor_adware_and_pup=crowdstrike.PreventionPolicyMacSensorAdwareAndPupArgs( - detection="MODERATE", - prevention="CAUTIOUS", - ), + cloud_adware_and_pup={ + "detection": "MODERATE", + "prevention": "CAUTIOUS", + }, + cloud_anti_malware={ + "detection": "MODERATE", + "prevention": "CAUTIOUS", + }, + sensor_anti_malware={ + "detection": "MODERATE", + "prevention": "CAUTIOUS", + }, + sensor_adware_and_pup={ + "detection": "MODERATE", + "prevention": "CAUTIOUS", + }, notify_end_users=True, custom_blocking=True, detect_on_write=True, @@ -1048,8 +1048,8 @@ def _internal_init(__self__, resource_name: str, opts: Optional[pulumi.ResourceOptions] = None, chopper_webshell: Optional[pulumi.Input[bool]] = None, - cloud_adware_and_pup: Optional[pulumi.Input[pulumi.InputType['PreventionPolicyMacCloudAdwareAndPupArgs']]] = None, - cloud_anti_malware: Optional[pulumi.Input[pulumi.InputType['PreventionPolicyMacCloudAntiMalwareArgs']]] = None, + cloud_adware_and_pup: Optional[pulumi.Input[Union['PreventionPolicyMacCloudAdwareAndPupArgs', 'PreventionPolicyMacCloudAdwareAndPupArgsDict']]] = None, + cloud_anti_malware: Optional[pulumi.Input[Union['PreventionPolicyMacCloudAntiMalwareArgs', 'PreventionPolicyMacCloudAntiMalwareArgsDict']]] = None, custom_blocking: Optional[pulumi.Input[bool]] = None, description: Optional[pulumi.Input[str]] = None, detect_on_write: Optional[pulumi.Input[bool]] = None, @@ -1066,8 +1066,8 @@ def _internal_init(__self__, quarantine: Optional[pulumi.Input[bool]] = None, quarantine_on_write: Optional[pulumi.Input[bool]] = None, script_based_execution_monitoring: Optional[pulumi.Input[bool]] = None, - sensor_adware_and_pup: Optional[pulumi.Input[pulumi.InputType['PreventionPolicyMacSensorAdwareAndPupArgs']]] = None, - sensor_anti_malware: Optional[pulumi.Input[pulumi.InputType['PreventionPolicyMacSensorAntiMalwareArgs']]] = None, + sensor_adware_and_pup: Optional[pulumi.Input[Union['PreventionPolicyMacSensorAdwareAndPupArgs', 'PreventionPolicyMacSensorAdwareAndPupArgsDict']]] = None, + sensor_anti_malware: Optional[pulumi.Input[Union['PreventionPolicyMacSensorAntiMalwareArgs', 'PreventionPolicyMacSensorAntiMalwareArgsDict']]] = None, sensor_tampering_protection: Optional[pulumi.Input[bool]] = None, upload_unknown_detection_related_executables: Optional[pulumi.Input[bool]] = None, upload_unknown_executables: Optional[pulumi.Input[bool]] = None, @@ -1118,8 +1118,8 @@ def get(resource_name: str, id: pulumi.Input[str], opts: Optional[pulumi.ResourceOptions] = None, chopper_webshell: Optional[pulumi.Input[bool]] = None, - cloud_adware_and_pup: Optional[pulumi.Input[pulumi.InputType['PreventionPolicyMacCloudAdwareAndPupArgs']]] = None, - cloud_anti_malware: Optional[pulumi.Input[pulumi.InputType['PreventionPolicyMacCloudAntiMalwareArgs']]] = None, + cloud_adware_and_pup: Optional[pulumi.Input[Union['PreventionPolicyMacCloudAdwareAndPupArgs', 'PreventionPolicyMacCloudAdwareAndPupArgsDict']]] = None, + cloud_anti_malware: Optional[pulumi.Input[Union['PreventionPolicyMacCloudAntiMalwareArgs', 'PreventionPolicyMacCloudAntiMalwareArgsDict']]] = None, custom_blocking: Optional[pulumi.Input[bool]] = None, description: Optional[pulumi.Input[str]] = None, detect_on_write: Optional[pulumi.Input[bool]] = None, @@ -1137,8 +1137,8 @@ def get(resource_name: str, quarantine: Optional[pulumi.Input[bool]] = None, quarantine_on_write: Optional[pulumi.Input[bool]] = None, script_based_execution_monitoring: Optional[pulumi.Input[bool]] = None, - sensor_adware_and_pup: Optional[pulumi.Input[pulumi.InputType['PreventionPolicyMacSensorAdwareAndPupArgs']]] = None, - sensor_anti_malware: Optional[pulumi.Input[pulumi.InputType['PreventionPolicyMacSensorAntiMalwareArgs']]] = None, + sensor_adware_and_pup: Optional[pulumi.Input[Union['PreventionPolicyMacSensorAdwareAndPupArgs', 'PreventionPolicyMacSensorAdwareAndPupArgsDict']]] = None, + sensor_anti_malware: Optional[pulumi.Input[Union['PreventionPolicyMacSensorAntiMalwareArgs', 'PreventionPolicyMacSensorAntiMalwareArgsDict']]] = None, sensor_tampering_protection: Optional[pulumi.Input[bool]] = None, upload_unknown_detection_related_executables: Optional[pulumi.Input[bool]] = None, upload_unknown_executables: Optional[pulumi.Input[bool]] = None, @@ -1151,8 +1151,8 @@ def get(resource_name: str, :param pulumi.Input[str] id: The unique provider ID of the resource to lookup. :param pulumi.ResourceOptions opts: Options for the resource. :param pulumi.Input[bool] chopper_webshell: Whether to enable the setting. Execution of a command shell was blocked and is indicative of the system hosting a Chopper web page. - :param pulumi.Input[pulumi.InputType['PreventionPolicyMacCloudAdwareAndPupArgs']] cloud_adware_and_pup: Use cloud-based machine learning informed by global analysis of executables to detect and prevent adware and potentially unwanted programs (PUP) for your online hosts. - :param pulumi.Input[pulumi.InputType['PreventionPolicyMacCloudAntiMalwareArgs']] cloud_anti_malware: Use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware for your online hosts. + :param pulumi.Input[Union['PreventionPolicyMacCloudAdwareAndPupArgs', 'PreventionPolicyMacCloudAdwareAndPupArgsDict']] cloud_adware_and_pup: Use cloud-based machine learning informed by global analysis of executables to detect and prevent adware and potentially unwanted programs (PUP) for your online hosts. + :param pulumi.Input[Union['PreventionPolicyMacCloudAntiMalwareArgs', 'PreventionPolicyMacCloudAntiMalwareArgsDict']] cloud_anti_malware: Use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware for your online hosts. :param pulumi.Input[bool] custom_blocking: Whether to enable the setting. Block processes matching hashes that you add to IOC Management with the action set to "Block" or "Block, hide detection". :param pulumi.Input[str] description: Description of the prevention policy. :param pulumi.Input[bool] detect_on_write: Whether to enable the setting. Use machine learning to analyze suspicious files when they're written to disk. To adjust detection sensitivity, change Anti-malware Detection levels in Sensor Machine Learning and Cloud Machine Learning. @@ -1169,8 +1169,8 @@ def get(resource_name: str, :param pulumi.Input[bool] quarantine: Whether to enable the setting. Quarantine executable files after they’re prevented by NGAV. When this is enabled, we recommend setting anti-malware prevention levels to Moderate or higher and not using other antivirus solutions. :param pulumi.Input[bool] quarantine_on_write: Whether to enable the setting. Use machine learning to quarantine suspicious files when they're written to disk. To adjust quarantine sensitivity, change Anti-malware Prevention levels in Sensor Machine Learning and Cloud Machine Learning. :param pulumi.Input[bool] script_based_execution_monitoring: Whether to enable the setting. Provides visibility into suspicious scripts, including shell and other scripting languages. - :param pulumi.Input[pulumi.InputType['PreventionPolicyMacSensorAdwareAndPupArgs']] sensor_adware_and_pup: For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent adware and potentially unwanted programs (PUP). - :param pulumi.Input[pulumi.InputType['PreventionPolicyMacSensorAntiMalwareArgs']] sensor_anti_malware: For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent malware. + :param pulumi.Input[Union['PreventionPolicyMacSensorAdwareAndPupArgs', 'PreventionPolicyMacSensorAdwareAndPupArgsDict']] sensor_adware_and_pup: For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent adware and potentially unwanted programs (PUP). + :param pulumi.Input[Union['PreventionPolicyMacSensorAntiMalwareArgs', 'PreventionPolicyMacSensorAntiMalwareArgsDict']] sensor_anti_malware: For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent malware. :param pulumi.Input[bool] sensor_tampering_protection: Whether to enable the setting. Blocks attempts to tamper with the sensor. If disabled, the sensor still creates detections for tampering attempts but doesn’t block them. Disabling not recommended. :param pulumi.Input[bool] upload_unknown_detection_related_executables: Whether to enable the setting. Upload all unknown detection-related executables for advanced analysis in the cloud. :param pulumi.Input[bool] upload_unknown_executables: Whether to enable the setting. Upload all unknown executables for advanced analysis in the cloud. diff --git a/sdk/python/crowdstrike_pulumi/prevention_policy_windows.py b/sdk/python/crowdstrike_pulumi/prevention_policy_windows.py index 932dcd1..7306180 100644 --- a/sdk/python/crowdstrike_pulumi/prevention_policy_windows.py +++ b/sdk/python/crowdstrike_pulumi/prevention_policy_windows.py @@ -2032,14 +2032,14 @@ def __init__(__self__, opts: Optional[pulumi.ResourceOptions] = None, additional_user_mode_data: Optional[pulumi.Input[bool]] = None, advanced_remediation: Optional[pulumi.Input[bool]] = None, - adware_and_pup: Optional[pulumi.Input[pulumi.InputType['PreventionPolicyWindowsAdwareAndPupArgs']]] = None, + adware_and_pup: Optional[pulumi.Input[Union['PreventionPolicyWindowsAdwareAndPupArgs', 'PreventionPolicyWindowsAdwareAndPupArgsDict']]] = None, application_exploitation_activity: Optional[pulumi.Input[bool]] = None, backup_deletion: Optional[pulumi.Input[bool]] = None, bios_deep_visibility: Optional[pulumi.Input[bool]] = None, chopper_webshell: Optional[pulumi.Input[bool]] = None, - cloud_anti_malware: Optional[pulumi.Input[pulumi.InputType['PreventionPolicyWindowsCloudAntiMalwareArgs']]] = None, - cloud_anti_malware_microsoft_office_files: Optional[pulumi.Input[pulumi.InputType['PreventionPolicyWindowsCloudAntiMalwareMicrosoftOfficeFilesArgs']]] = None, - cloud_anti_malware_user_initiated: Optional[pulumi.Input[pulumi.InputType['PreventionPolicyWindowsCloudAntiMalwareUserInitiatedArgs']]] = None, + cloud_anti_malware: Optional[pulumi.Input[Union['PreventionPolicyWindowsCloudAntiMalwareArgs', 'PreventionPolicyWindowsCloudAntiMalwareArgsDict']]] = None, + cloud_anti_malware_microsoft_office_files: Optional[pulumi.Input[Union['PreventionPolicyWindowsCloudAntiMalwareMicrosoftOfficeFilesArgs', 'PreventionPolicyWindowsCloudAntiMalwareMicrosoftOfficeFilesArgsDict']]] = None, + cloud_anti_malware_user_initiated: Optional[pulumi.Input[Union['PreventionPolicyWindowsCloudAntiMalwareUserInitiatedArgs', 'PreventionPolicyWindowsCloudAntiMalwareUserInitiatedArgsDict']]] = None, code_injection: Optional[pulumi.Input[bool]] = None, credential_dumping: Optional[pulumi.Input[bool]] = None, cryptowall: Optional[pulumi.Input[bool]] = None, @@ -2052,7 +2052,7 @@ def __init__(__self__, engine_full_visibility: Optional[pulumi.Input[bool]] = None, enhanced_exploitation_visibility: Optional[pulumi.Input[bool]] = None, enhanced_ml_for_larger_files: Optional[pulumi.Input[bool]] = None, - extended_user_mode_data: Optional[pulumi.Input[pulumi.InputType['PreventionPolicyWindowsExtendedUserModeDataArgs']]] = None, + extended_user_mode_data: Optional[pulumi.Input[Union['PreventionPolicyWindowsExtendedUserModeDataArgs', 'PreventionPolicyWindowsExtendedUserModeDataArgsDict']]] = None, file_encryption: Optional[pulumi.Input[bool]] = None, file_system_access: Optional[pulumi.Input[bool]] = None, force_aslr: Optional[pulumi.Input[bool]] = None, @@ -2080,8 +2080,8 @@ def __init__(__self__, redact_http_detection_details: Optional[pulumi.Input[bool]] = None, script_based_execution_monitoring: Optional[pulumi.Input[bool]] = None, seh_overwrite_protection: Optional[pulumi.Input[bool]] = None, - sensor_anti_malware: Optional[pulumi.Input[pulumi.InputType['PreventionPolicyWindowsSensorAntiMalwareArgs']]] = None, - sensor_anti_malware_user_initiated: Optional[pulumi.Input[pulumi.InputType['PreventionPolicyWindowsSensorAntiMalwareUserInitiatedArgs']]] = None, + sensor_anti_malware: Optional[pulumi.Input[Union['PreventionPolicyWindowsSensorAntiMalwareArgs', 'PreventionPolicyWindowsSensorAntiMalwareArgsDict']]] = None, + sensor_anti_malware_user_initiated: Optional[pulumi.Input[Union['PreventionPolicyWindowsSensorAntiMalwareUserInitiatedArgs', 'PreventionPolicyWindowsSensorAntiMalwareUserInitiatedArgsDict']]] = None, sensor_tampering_protection: Optional[pulumi.Input[bool]] = None, suspicious_registry_operations: Optional[pulumi.Input[bool]] = None, suspicious_scripts_and_commands: Optional[pulumi.Input[bool]] = None, @@ -2113,33 +2113,33 @@ def __init__(__self__, description="Made with Pulumi", host_groups=["d6e3c1e1b3d0467da0fowc96a5e6ecb5"], ioa_rule_groups=["ed334b3243bc4b6bb8e7d40a2ecd86fa"], - adware_and_pup=crowdstrike.PreventionPolicyWindowsAdwareAndPupArgs( - detection="MODERATE", - prevention="CAUTIOUS", - ), - cloud_anti_malware_microsoft_office_files=crowdstrike.PreventionPolicyWindowsCloudAntiMalwareMicrosoftOfficeFilesArgs( - detection="MODERATE", - prevention="DISABLED", - ), - cloud_anti_malware=crowdstrike.PreventionPolicyWindowsCloudAntiMalwareArgs( - detection="MODERATE", - prevention="CAUTIOUS", - ), - cloud_anti_malware_user_initiated=crowdstrike.PreventionPolicyWindowsCloudAntiMalwareUserInitiatedArgs( - detection="MODERATE", - prevention="CAUTIOUS", - ), - sensor_anti_malware=crowdstrike.PreventionPolicyWindowsSensorAntiMalwareArgs( - detection="MODERATE", - prevention="CAUTIOUS", - ), - sensor_anti_malware_user_initiated=crowdstrike.PreventionPolicyWindowsSensorAntiMalwareUserInitiatedArgs( - detection="MODERATE", - prevention="CAUTIOUS", - ), - extended_user_mode_data=crowdstrike.PreventionPolicyWindowsExtendedUserModeDataArgs( - detection="MODERATE", - ), + adware_and_pup={ + "detection": "MODERATE", + "prevention": "CAUTIOUS", + }, + cloud_anti_malware_microsoft_office_files={ + "detection": "MODERATE", + "prevention": "DISABLED", + }, + cloud_anti_malware={ + "detection": "MODERATE", + "prevention": "CAUTIOUS", + }, + cloud_anti_malware_user_initiated={ + "detection": "MODERATE", + "prevention": "CAUTIOUS", + }, + sensor_anti_malware={ + "detection": "MODERATE", + "prevention": "CAUTIOUS", + }, + sensor_anti_malware_user_initiated={ + "detection": "MODERATE", + "prevention": "CAUTIOUS", + }, + extended_user_mode_data={ + "detection": "MODERATE", + }, usb_insertion_triggered_scan=False, application_exploitation_activity=False, additional_user_mode_data=False, @@ -2205,14 +2205,14 @@ def __init__(__self__, :param pulumi.ResourceOptions opts: Options for the resource. :param pulumi.Input[bool] additional_user_mode_data: Whether to enable the setting. Allows the sensor to get more data from a user-mode component it loads into all eligible processes, which augments online machine learning and turns on additional detections. Recommend testing with critical applications before full deployment. :param pulumi.Input[bool] advanced_remediation: Whether to enable the setting. Perform advanced remediation for IOA detections to kill processes, quarantine files, remove scheduled tasks, and clear and delete ASEP registry values. - :param pulumi.Input[pulumi.InputType['PreventionPolicyWindowsAdwareAndPupArgs']] adware_and_pup: Use cloud-based machine learning informed by global analysis of executables to detect and prevent adware and potentially unwanted programs (PUP) for your online hosts. + :param pulumi.Input[Union['PreventionPolicyWindowsAdwareAndPupArgs', 'PreventionPolicyWindowsAdwareAndPupArgsDict']] adware_and_pup: Use cloud-based machine learning informed by global analysis of executables to detect and prevent adware and potentially unwanted programs (PUP) for your online hosts. :param pulumi.Input[bool] application_exploitation_activity: Whether to enable the setting. Creation of a process, such as a command prompt, from an exploited browser or browser flash plugin was blocked. :param pulumi.Input[bool] backup_deletion: Whether to enable the setting. Deletion of backups often indicative of ransomware activity. :param pulumi.Input[bool] bios_deep_visibility: Whether to enable the setting. Provides visibility into BIOS. Detects suspicious and unexpected images. Recommend testing to monitor system startup performance before full deployment. :param pulumi.Input[bool] chopper_webshell: Whether to enable the setting. Execution of a command shell was blocked and is indicative of the system hosting a Chopper web page. - :param pulumi.Input[pulumi.InputType['PreventionPolicyWindowsCloudAntiMalwareArgs']] cloud_anti_malware: Use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware for your online hosts. - :param pulumi.Input[pulumi.InputType['PreventionPolicyWindowsCloudAntiMalwareMicrosoftOfficeFilesArgs']] cloud_anti_malware_microsoft_office_files: Identifies potentially malicious macros in Microsoft Office files and, if prevention is enabled, either quarantines the file or removes the malicious macros before releasing the file back to the host - :param pulumi.Input[pulumi.InputType['PreventionPolicyWindowsCloudAntiMalwareUserInitiatedArgs']] cloud_anti_malware_user_initiated: For online hosts running on-demand scans initiated by end users, use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware. + :param pulumi.Input[Union['PreventionPolicyWindowsCloudAntiMalwareArgs', 'PreventionPolicyWindowsCloudAntiMalwareArgsDict']] cloud_anti_malware: Use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware for your online hosts. + :param pulumi.Input[Union['PreventionPolicyWindowsCloudAntiMalwareMicrosoftOfficeFilesArgs', 'PreventionPolicyWindowsCloudAntiMalwareMicrosoftOfficeFilesArgsDict']] cloud_anti_malware_microsoft_office_files: Identifies potentially malicious macros in Microsoft Office files and, if prevention is enabled, either quarantines the file or removes the malicious macros before releasing the file back to the host + :param pulumi.Input[Union['PreventionPolicyWindowsCloudAntiMalwareUserInitiatedArgs', 'PreventionPolicyWindowsCloudAntiMalwareUserInitiatedArgsDict']] cloud_anti_malware_user_initiated: For online hosts running on-demand scans initiated by end users, use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware. :param pulumi.Input[bool] code_injection: Whether to enable the setting. Kill processes that unexpectedly injected code into another process. Requires additional*user*mode_data to be enabled. :param pulumi.Input[bool] credential_dumping: Whether to enable the setting. Kill suspicious processes determined to be stealing logins and passwords. Requires additional*user*mode_data to be enabled. :param pulumi.Input[bool] cryptowall: Whether to enable the setting. A process associated with Cryptowall was blocked. @@ -2225,7 +2225,7 @@ def __init__(__self__, :param pulumi.Input[bool] engine_full_visibility: Whether to enable the setting. Provides visibility into malicious System Management Automation engine usage by any application. Requires interpreter_only to be enabled. :param pulumi.Input[bool] enhanced_exploitation_visibility: Whether to enable the setting. For hosts running Windows 10 1809 and Server 2019 and later, provides additional visibility into common exploitation techniques used to weaken or circumvent application security. :param pulumi.Input[bool] enhanced_ml_for_larger_files: Whether to enable the setting. Expand ML file size coverage. Existing ML level settings apply. - :param pulumi.Input[pulumi.InputType['PreventionPolicyWindowsExtendedUserModeDataArgs']] extended_user_mode_data: Allows the sensor to get more data from a user-mode component it loads into all eligible processes, which augments online machine learning and turns on additional detections. Recommend testing with critical applications before full deployment. + :param pulumi.Input[Union['PreventionPolicyWindowsExtendedUserModeDataArgs', 'PreventionPolicyWindowsExtendedUserModeDataArgsDict']] extended_user_mode_data: Allows the sensor to get more data from a user-mode component it loads into all eligible processes, which augments online machine learning and turns on additional detections. Recommend testing with critical applications before full deployment. :param pulumi.Input[bool] file_encryption: Whether to enable the setting. A process that created a file with a known ransomware extension was terminated. :param pulumi.Input[bool] file_system_access: Whether to enable the setting. A process associated with a high volume of file system operations typical of ransomware behavior was terminated. :param pulumi.Input[bool] force_aslr: Whether to enable the setting. An Address Space Layout Randomization (ASLR) bypass attempt was detected and blocked. This may have been part of an attempted exploit. Requires additional*user*mode_data to be enabled. @@ -2253,8 +2253,8 @@ def __init__(__self__, :param pulumi.Input[bool] redact_http_detection_details: Whether to enable the setting. Remove certain information from HTTP Detection events, including URL, raw HTTP header and POST bodies if they were present. This does not affect the generation of HTTP Detections, only additional details that would be included and may include personal information (depending on the malware in question). When disabled, the information is used to improve the response to detection events. Has no effect unless HTTP Detections is also enabled. :param pulumi.Input[bool] script_based_execution_monitoring: Whether to enable the setting. For hosts running Windows 10 and Servers 2016 and later, provides visibility into suspicious scripts and VBA macros in Office documents. Requires Quarantine & Security Center Registration toggle to be enabled. :param pulumi.Input[bool] seh_overwrite_protection: Whether to enable the setting. Overwriting a Structured Exception Handler (SEH) was detected and may have been blocked. This may have been part of an attempted exploit. Requires additional*user*mode_data to be enabled. - :param pulumi.Input[pulumi.InputType['PreventionPolicyWindowsSensorAntiMalwareArgs']] sensor_anti_malware: For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent malware. - :param pulumi.Input[pulumi.InputType['PreventionPolicyWindowsSensorAntiMalwareUserInitiatedArgs']] sensor_anti_malware_user_initiated: For offline and online hosts running on-demand scans initiated by end users, use sensor-based machine learning to identify and analyze unknown executables to detect and prevent malware. + :param pulumi.Input[Union['PreventionPolicyWindowsSensorAntiMalwareArgs', 'PreventionPolicyWindowsSensorAntiMalwareArgsDict']] sensor_anti_malware: For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent malware. + :param pulumi.Input[Union['PreventionPolicyWindowsSensorAntiMalwareUserInitiatedArgs', 'PreventionPolicyWindowsSensorAntiMalwareUserInitiatedArgsDict']] sensor_anti_malware_user_initiated: For offline and online hosts running on-demand scans initiated by end users, use sensor-based machine learning to identify and analyze unknown executables to detect and prevent malware. :param pulumi.Input[bool] sensor_tampering_protection: Whether to enable the setting. Blocks attempts to tamper with the sensor. If disabled, the sensor still creates detections for tampering attempts but doesn’t block them. Disabling not recommended. :param pulumi.Input[bool] suspicious_registry_operations: Whether to enable the setting. Block registry operations that CrowdStrike analysts classify as suspicious. Focuses on dynamic IOAs, such as ASEPs and security config changes. The associated process may be killed. :param pulumi.Input[bool] suspicious_scripts_and_commands: Whether to enable the setting. Block execution of scripts and commands that CrowdStrike analysts classify as suspicious. Requires Interpreter-Only and/or Script-Based Execution Monitoring. @@ -2292,33 +2292,33 @@ def __init__(__self__, description="Made with Pulumi", host_groups=["d6e3c1e1b3d0467da0fowc96a5e6ecb5"], ioa_rule_groups=["ed334b3243bc4b6bb8e7d40a2ecd86fa"], - adware_and_pup=crowdstrike.PreventionPolicyWindowsAdwareAndPupArgs( - detection="MODERATE", - prevention="CAUTIOUS", - ), - cloud_anti_malware_microsoft_office_files=crowdstrike.PreventionPolicyWindowsCloudAntiMalwareMicrosoftOfficeFilesArgs( - detection="MODERATE", - prevention="DISABLED", - ), - cloud_anti_malware=crowdstrike.PreventionPolicyWindowsCloudAntiMalwareArgs( - detection="MODERATE", - prevention="CAUTIOUS", - ), - cloud_anti_malware_user_initiated=crowdstrike.PreventionPolicyWindowsCloudAntiMalwareUserInitiatedArgs( - detection="MODERATE", - prevention="CAUTIOUS", - ), - sensor_anti_malware=crowdstrike.PreventionPolicyWindowsSensorAntiMalwareArgs( - detection="MODERATE", - prevention="CAUTIOUS", - ), - sensor_anti_malware_user_initiated=crowdstrike.PreventionPolicyWindowsSensorAntiMalwareUserInitiatedArgs( - detection="MODERATE", - prevention="CAUTIOUS", - ), - extended_user_mode_data=crowdstrike.PreventionPolicyWindowsExtendedUserModeDataArgs( - detection="MODERATE", - ), + adware_and_pup={ + "detection": "MODERATE", + "prevention": "CAUTIOUS", + }, + cloud_anti_malware_microsoft_office_files={ + "detection": "MODERATE", + "prevention": "DISABLED", + }, + cloud_anti_malware={ + "detection": "MODERATE", + "prevention": "CAUTIOUS", + }, + cloud_anti_malware_user_initiated={ + "detection": "MODERATE", + "prevention": "CAUTIOUS", + }, + sensor_anti_malware={ + "detection": "MODERATE", + "prevention": "CAUTIOUS", + }, + sensor_anti_malware_user_initiated={ + "detection": "MODERATE", + "prevention": "CAUTIOUS", + }, + extended_user_mode_data={ + "detection": "MODERATE", + }, usb_insertion_triggered_scan=False, application_exploitation_activity=False, additional_user_mode_data=False, @@ -2397,14 +2397,14 @@ def _internal_init(__self__, opts: Optional[pulumi.ResourceOptions] = None, additional_user_mode_data: Optional[pulumi.Input[bool]] = None, advanced_remediation: Optional[pulumi.Input[bool]] = None, - adware_and_pup: Optional[pulumi.Input[pulumi.InputType['PreventionPolicyWindowsAdwareAndPupArgs']]] = None, + adware_and_pup: Optional[pulumi.Input[Union['PreventionPolicyWindowsAdwareAndPupArgs', 'PreventionPolicyWindowsAdwareAndPupArgsDict']]] = None, application_exploitation_activity: Optional[pulumi.Input[bool]] = None, backup_deletion: Optional[pulumi.Input[bool]] = None, bios_deep_visibility: Optional[pulumi.Input[bool]] = None, chopper_webshell: Optional[pulumi.Input[bool]] = None, - cloud_anti_malware: Optional[pulumi.Input[pulumi.InputType['PreventionPolicyWindowsCloudAntiMalwareArgs']]] = None, - cloud_anti_malware_microsoft_office_files: Optional[pulumi.Input[pulumi.InputType['PreventionPolicyWindowsCloudAntiMalwareMicrosoftOfficeFilesArgs']]] = None, - cloud_anti_malware_user_initiated: Optional[pulumi.Input[pulumi.InputType['PreventionPolicyWindowsCloudAntiMalwareUserInitiatedArgs']]] = None, + cloud_anti_malware: Optional[pulumi.Input[Union['PreventionPolicyWindowsCloudAntiMalwareArgs', 'PreventionPolicyWindowsCloudAntiMalwareArgsDict']]] = None, + cloud_anti_malware_microsoft_office_files: Optional[pulumi.Input[Union['PreventionPolicyWindowsCloudAntiMalwareMicrosoftOfficeFilesArgs', 'PreventionPolicyWindowsCloudAntiMalwareMicrosoftOfficeFilesArgsDict']]] = None, + cloud_anti_malware_user_initiated: Optional[pulumi.Input[Union['PreventionPolicyWindowsCloudAntiMalwareUserInitiatedArgs', 'PreventionPolicyWindowsCloudAntiMalwareUserInitiatedArgsDict']]] = None, code_injection: Optional[pulumi.Input[bool]] = None, credential_dumping: Optional[pulumi.Input[bool]] = None, cryptowall: Optional[pulumi.Input[bool]] = None, @@ -2417,7 +2417,7 @@ def _internal_init(__self__, engine_full_visibility: Optional[pulumi.Input[bool]] = None, enhanced_exploitation_visibility: Optional[pulumi.Input[bool]] = None, enhanced_ml_for_larger_files: Optional[pulumi.Input[bool]] = None, - extended_user_mode_data: Optional[pulumi.Input[pulumi.InputType['PreventionPolicyWindowsExtendedUserModeDataArgs']]] = None, + extended_user_mode_data: Optional[pulumi.Input[Union['PreventionPolicyWindowsExtendedUserModeDataArgs', 'PreventionPolicyWindowsExtendedUserModeDataArgsDict']]] = None, file_encryption: Optional[pulumi.Input[bool]] = None, file_system_access: Optional[pulumi.Input[bool]] = None, force_aslr: Optional[pulumi.Input[bool]] = None, @@ -2445,8 +2445,8 @@ def _internal_init(__self__, redact_http_detection_details: Optional[pulumi.Input[bool]] = None, script_based_execution_monitoring: Optional[pulumi.Input[bool]] = None, seh_overwrite_protection: Optional[pulumi.Input[bool]] = None, - sensor_anti_malware: Optional[pulumi.Input[pulumi.InputType['PreventionPolicyWindowsSensorAntiMalwareArgs']]] = None, - sensor_anti_malware_user_initiated: Optional[pulumi.Input[pulumi.InputType['PreventionPolicyWindowsSensorAntiMalwareUserInitiatedArgs']]] = None, + sensor_anti_malware: Optional[pulumi.Input[Union['PreventionPolicyWindowsSensorAntiMalwareArgs', 'PreventionPolicyWindowsSensorAntiMalwareArgsDict']]] = None, + sensor_anti_malware_user_initiated: Optional[pulumi.Input[Union['PreventionPolicyWindowsSensorAntiMalwareUserInitiatedArgs', 'PreventionPolicyWindowsSensorAntiMalwareUserInitiatedArgsDict']]] = None, sensor_tampering_protection: Optional[pulumi.Input[bool]] = None, suspicious_registry_operations: Optional[pulumi.Input[bool]] = None, suspicious_scripts_and_commands: Optional[pulumi.Input[bool]] = None, @@ -2541,14 +2541,14 @@ def get(resource_name: str, opts: Optional[pulumi.ResourceOptions] = None, additional_user_mode_data: Optional[pulumi.Input[bool]] = None, advanced_remediation: Optional[pulumi.Input[bool]] = None, - adware_and_pup: Optional[pulumi.Input[pulumi.InputType['PreventionPolicyWindowsAdwareAndPupArgs']]] = None, + adware_and_pup: Optional[pulumi.Input[Union['PreventionPolicyWindowsAdwareAndPupArgs', 'PreventionPolicyWindowsAdwareAndPupArgsDict']]] = None, application_exploitation_activity: Optional[pulumi.Input[bool]] = None, backup_deletion: Optional[pulumi.Input[bool]] = None, bios_deep_visibility: Optional[pulumi.Input[bool]] = None, chopper_webshell: Optional[pulumi.Input[bool]] = None, - cloud_anti_malware: Optional[pulumi.Input[pulumi.InputType['PreventionPolicyWindowsCloudAntiMalwareArgs']]] = None, - cloud_anti_malware_microsoft_office_files: Optional[pulumi.Input[pulumi.InputType['PreventionPolicyWindowsCloudAntiMalwareMicrosoftOfficeFilesArgs']]] = None, - cloud_anti_malware_user_initiated: Optional[pulumi.Input[pulumi.InputType['PreventionPolicyWindowsCloudAntiMalwareUserInitiatedArgs']]] = None, + cloud_anti_malware: Optional[pulumi.Input[Union['PreventionPolicyWindowsCloudAntiMalwareArgs', 'PreventionPolicyWindowsCloudAntiMalwareArgsDict']]] = None, + cloud_anti_malware_microsoft_office_files: Optional[pulumi.Input[Union['PreventionPolicyWindowsCloudAntiMalwareMicrosoftOfficeFilesArgs', 'PreventionPolicyWindowsCloudAntiMalwareMicrosoftOfficeFilesArgsDict']]] = None, + cloud_anti_malware_user_initiated: Optional[pulumi.Input[Union['PreventionPolicyWindowsCloudAntiMalwareUserInitiatedArgs', 'PreventionPolicyWindowsCloudAntiMalwareUserInitiatedArgsDict']]] = None, code_injection: Optional[pulumi.Input[bool]] = None, credential_dumping: Optional[pulumi.Input[bool]] = None, cryptowall: Optional[pulumi.Input[bool]] = None, @@ -2561,7 +2561,7 @@ def get(resource_name: str, engine_full_visibility: Optional[pulumi.Input[bool]] = None, enhanced_exploitation_visibility: Optional[pulumi.Input[bool]] = None, enhanced_ml_for_larger_files: Optional[pulumi.Input[bool]] = None, - extended_user_mode_data: Optional[pulumi.Input[pulumi.InputType['PreventionPolicyWindowsExtendedUserModeDataArgs']]] = None, + extended_user_mode_data: Optional[pulumi.Input[Union['PreventionPolicyWindowsExtendedUserModeDataArgs', 'PreventionPolicyWindowsExtendedUserModeDataArgsDict']]] = None, file_encryption: Optional[pulumi.Input[bool]] = None, file_system_access: Optional[pulumi.Input[bool]] = None, force_aslr: Optional[pulumi.Input[bool]] = None, @@ -2590,8 +2590,8 @@ def get(resource_name: str, redact_http_detection_details: Optional[pulumi.Input[bool]] = None, script_based_execution_monitoring: Optional[pulumi.Input[bool]] = None, seh_overwrite_protection: Optional[pulumi.Input[bool]] = None, - sensor_anti_malware: Optional[pulumi.Input[pulumi.InputType['PreventionPolicyWindowsSensorAntiMalwareArgs']]] = None, - sensor_anti_malware_user_initiated: Optional[pulumi.Input[pulumi.InputType['PreventionPolicyWindowsSensorAntiMalwareUserInitiatedArgs']]] = None, + sensor_anti_malware: Optional[pulumi.Input[Union['PreventionPolicyWindowsSensorAntiMalwareArgs', 'PreventionPolicyWindowsSensorAntiMalwareArgsDict']]] = None, + sensor_anti_malware_user_initiated: Optional[pulumi.Input[Union['PreventionPolicyWindowsSensorAntiMalwareUserInitiatedArgs', 'PreventionPolicyWindowsSensorAntiMalwareUserInitiatedArgsDict']]] = None, sensor_tampering_protection: Optional[pulumi.Input[bool]] = None, suspicious_registry_operations: Optional[pulumi.Input[bool]] = None, suspicious_scripts_and_commands: Optional[pulumi.Input[bool]] = None, @@ -2611,14 +2611,14 @@ def get(resource_name: str, :param pulumi.ResourceOptions opts: Options for the resource. :param pulumi.Input[bool] additional_user_mode_data: Whether to enable the setting. Allows the sensor to get more data from a user-mode component it loads into all eligible processes, which augments online machine learning and turns on additional detections. Recommend testing with critical applications before full deployment. :param pulumi.Input[bool] advanced_remediation: Whether to enable the setting. Perform advanced remediation for IOA detections to kill processes, quarantine files, remove scheduled tasks, and clear and delete ASEP registry values. - :param pulumi.Input[pulumi.InputType['PreventionPolicyWindowsAdwareAndPupArgs']] adware_and_pup: Use cloud-based machine learning informed by global analysis of executables to detect and prevent adware and potentially unwanted programs (PUP) for your online hosts. + :param pulumi.Input[Union['PreventionPolicyWindowsAdwareAndPupArgs', 'PreventionPolicyWindowsAdwareAndPupArgsDict']] adware_and_pup: Use cloud-based machine learning informed by global analysis of executables to detect and prevent adware and potentially unwanted programs (PUP) for your online hosts. :param pulumi.Input[bool] application_exploitation_activity: Whether to enable the setting. Creation of a process, such as a command prompt, from an exploited browser or browser flash plugin was blocked. :param pulumi.Input[bool] backup_deletion: Whether to enable the setting. Deletion of backups often indicative of ransomware activity. :param pulumi.Input[bool] bios_deep_visibility: Whether to enable the setting. Provides visibility into BIOS. Detects suspicious and unexpected images. Recommend testing to monitor system startup performance before full deployment. :param pulumi.Input[bool] chopper_webshell: Whether to enable the setting. Execution of a command shell was blocked and is indicative of the system hosting a Chopper web page. - :param pulumi.Input[pulumi.InputType['PreventionPolicyWindowsCloudAntiMalwareArgs']] cloud_anti_malware: Use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware for your online hosts. - :param pulumi.Input[pulumi.InputType['PreventionPolicyWindowsCloudAntiMalwareMicrosoftOfficeFilesArgs']] cloud_anti_malware_microsoft_office_files: Identifies potentially malicious macros in Microsoft Office files and, if prevention is enabled, either quarantines the file or removes the malicious macros before releasing the file back to the host - :param pulumi.Input[pulumi.InputType['PreventionPolicyWindowsCloudAntiMalwareUserInitiatedArgs']] cloud_anti_malware_user_initiated: For online hosts running on-demand scans initiated by end users, use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware. + :param pulumi.Input[Union['PreventionPolicyWindowsCloudAntiMalwareArgs', 'PreventionPolicyWindowsCloudAntiMalwareArgsDict']] cloud_anti_malware: Use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware for your online hosts. + :param pulumi.Input[Union['PreventionPolicyWindowsCloudAntiMalwareMicrosoftOfficeFilesArgs', 'PreventionPolicyWindowsCloudAntiMalwareMicrosoftOfficeFilesArgsDict']] cloud_anti_malware_microsoft_office_files: Identifies potentially malicious macros in Microsoft Office files and, if prevention is enabled, either quarantines the file or removes the malicious macros before releasing the file back to the host + :param pulumi.Input[Union['PreventionPolicyWindowsCloudAntiMalwareUserInitiatedArgs', 'PreventionPolicyWindowsCloudAntiMalwareUserInitiatedArgsDict']] cloud_anti_malware_user_initiated: For online hosts running on-demand scans initiated by end users, use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware. :param pulumi.Input[bool] code_injection: Whether to enable the setting. Kill processes that unexpectedly injected code into another process. Requires additional*user*mode_data to be enabled. :param pulumi.Input[bool] credential_dumping: Whether to enable the setting. Kill suspicious processes determined to be stealing logins and passwords. Requires additional*user*mode_data to be enabled. :param pulumi.Input[bool] cryptowall: Whether to enable the setting. A process associated with Cryptowall was blocked. @@ -2631,7 +2631,7 @@ def get(resource_name: str, :param pulumi.Input[bool] engine_full_visibility: Whether to enable the setting. Provides visibility into malicious System Management Automation engine usage by any application. Requires interpreter_only to be enabled. :param pulumi.Input[bool] enhanced_exploitation_visibility: Whether to enable the setting. For hosts running Windows 10 1809 and Server 2019 and later, provides additional visibility into common exploitation techniques used to weaken or circumvent application security. :param pulumi.Input[bool] enhanced_ml_for_larger_files: Whether to enable the setting. Expand ML file size coverage. Existing ML level settings apply. - :param pulumi.Input[pulumi.InputType['PreventionPolicyWindowsExtendedUserModeDataArgs']] extended_user_mode_data: Allows the sensor to get more data from a user-mode component it loads into all eligible processes, which augments online machine learning and turns on additional detections. Recommend testing with critical applications before full deployment. + :param pulumi.Input[Union['PreventionPolicyWindowsExtendedUserModeDataArgs', 'PreventionPolicyWindowsExtendedUserModeDataArgsDict']] extended_user_mode_data: Allows the sensor to get more data from a user-mode component it loads into all eligible processes, which augments online machine learning and turns on additional detections. Recommend testing with critical applications before full deployment. :param pulumi.Input[bool] file_encryption: Whether to enable the setting. A process that created a file with a known ransomware extension was terminated. :param pulumi.Input[bool] file_system_access: Whether to enable the setting. A process associated with a high volume of file system operations typical of ransomware behavior was terminated. :param pulumi.Input[bool] force_aslr: Whether to enable the setting. An Address Space Layout Randomization (ASLR) bypass attempt was detected and blocked. This may have been part of an attempted exploit. Requires additional*user*mode_data to be enabled. @@ -2659,8 +2659,8 @@ def get(resource_name: str, :param pulumi.Input[bool] redact_http_detection_details: Whether to enable the setting. Remove certain information from HTTP Detection events, including URL, raw HTTP header and POST bodies if they were present. This does not affect the generation of HTTP Detections, only additional details that would be included and may include personal information (depending on the malware in question). When disabled, the information is used to improve the response to detection events. Has no effect unless HTTP Detections is also enabled. :param pulumi.Input[bool] script_based_execution_monitoring: Whether to enable the setting. For hosts running Windows 10 and Servers 2016 and later, provides visibility into suspicious scripts and VBA macros in Office documents. Requires Quarantine & Security Center Registration toggle to be enabled. :param pulumi.Input[bool] seh_overwrite_protection: Whether to enable the setting. Overwriting a Structured Exception Handler (SEH) was detected and may have been blocked. This may have been part of an attempted exploit. Requires additional*user*mode_data to be enabled. - :param pulumi.Input[pulumi.InputType['PreventionPolicyWindowsSensorAntiMalwareArgs']] sensor_anti_malware: For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent malware. - :param pulumi.Input[pulumi.InputType['PreventionPolicyWindowsSensorAntiMalwareUserInitiatedArgs']] sensor_anti_malware_user_initiated: For offline and online hosts running on-demand scans initiated by end users, use sensor-based machine learning to identify and analyze unknown executables to detect and prevent malware. + :param pulumi.Input[Union['PreventionPolicyWindowsSensorAntiMalwareArgs', 'PreventionPolicyWindowsSensorAntiMalwareArgsDict']] sensor_anti_malware: For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent malware. + :param pulumi.Input[Union['PreventionPolicyWindowsSensorAntiMalwareUserInitiatedArgs', 'PreventionPolicyWindowsSensorAntiMalwareUserInitiatedArgsDict']] sensor_anti_malware_user_initiated: For offline and online hosts running on-demand scans initiated by end users, use sensor-based machine learning to identify and analyze unknown executables to detect and prevent malware. :param pulumi.Input[bool] sensor_tampering_protection: Whether to enable the setting. Blocks attempts to tamper with the sensor. If disabled, the sensor still creates detections for tampering attempts but doesn’t block them. Disabling not recommended. :param pulumi.Input[bool] suspicious_registry_operations: Whether to enable the setting. Block registry operations that CrowdStrike analysts classify as suspicious. Focuses on dynamic IOAs, such as ASEPs and security config changes. The associated process may be killed. :param pulumi.Input[bool] suspicious_scripts_and_commands: Whether to enable the setting. Block execution of scripts and commands that CrowdStrike analysts classify as suspicious. Requires Interpreter-Only and/or Script-Based Execution Monitoring. diff --git a/sdk/python/crowdstrike_pulumi/sensor_update_policy.py b/sdk/python/crowdstrike_pulumi/sensor_update_policy.py index 671c11a..19894ed 100644 --- a/sdk/python/crowdstrike_pulumi/sensor_update_policy.py +++ b/sdk/python/crowdstrike_pulumi/sensor_update_policy.py @@ -338,7 +338,7 @@ def __init__(__self__, host_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, name: Optional[pulumi.Input[str]] = None, platform_name: Optional[pulumi.Input[str]] = None, - schedule: Optional[pulumi.Input[pulumi.InputType['SensorUpdatePolicyScheduleArgs']]] = None, + schedule: Optional[pulumi.Input[Union['SensorUpdatePolicyScheduleArgs', 'SensorUpdatePolicyScheduleArgsDict']]] = None, uninstall_protection: Optional[pulumi.Input[bool]] = None, __props__=None): """ @@ -367,7 +367,7 @@ def __init__(__self__, :param pulumi.Input[Sequence[pulumi.Input[str]]] host_groups: Host Group ids to attach to the sensor update policy. :param pulumi.Input[str] name: Name of the sensor update policy. :param pulumi.Input[str] platform_name: Platform for the sensor update policy to manage. (Windows, Mac, Linux) - :param pulumi.Input[pulumi.InputType['SensorUpdatePolicyScheduleArgs']] schedule: Prohibit sensor updates during a set of time blocks. + :param pulumi.Input[Union['SensorUpdatePolicyScheduleArgs', 'SensorUpdatePolicyScheduleArgsDict']] schedule: Prohibit sensor updates during a set of time blocks. :param pulumi.Input[bool] uninstall_protection: Enable uninstall protection. Windows and Mac only. """ ... @@ -415,7 +415,7 @@ def _internal_init(__self__, host_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, name: Optional[pulumi.Input[str]] = None, platform_name: Optional[pulumi.Input[str]] = None, - schedule: Optional[pulumi.Input[pulumi.InputType['SensorUpdatePolicyScheduleArgs']]] = None, + schedule: Optional[pulumi.Input[Union['SensorUpdatePolicyScheduleArgs', 'SensorUpdatePolicyScheduleArgsDict']]] = None, uninstall_protection: Optional[pulumi.Input[bool]] = None, __props__=None): opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts) @@ -460,7 +460,7 @@ def get(resource_name: str, last_updated: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, platform_name: Optional[pulumi.Input[str]] = None, - schedule: Optional[pulumi.Input[pulumi.InputType['SensorUpdatePolicyScheduleArgs']]] = None, + schedule: Optional[pulumi.Input[Union['SensorUpdatePolicyScheduleArgs', 'SensorUpdatePolicyScheduleArgsDict']]] = None, uninstall_protection: Optional[pulumi.Input[bool]] = None) -> 'SensorUpdatePolicy': """ Get an existing SensorUpdatePolicy resource's state with the given name, id, and optional extra @@ -476,7 +476,7 @@ def get(resource_name: str, :param pulumi.Input[Sequence[pulumi.Input[str]]] host_groups: Host Group ids to attach to the sensor update policy. :param pulumi.Input[str] name: Name of the sensor update policy. :param pulumi.Input[str] platform_name: Platform for the sensor update policy to manage. (Windows, Mac, Linux) - :param pulumi.Input[pulumi.InputType['SensorUpdatePolicyScheduleArgs']] schedule: Prohibit sensor updates during a set of time blocks. + :param pulumi.Input[Union['SensorUpdatePolicyScheduleArgs', 'SensorUpdatePolicyScheduleArgsDict']] schedule: Prohibit sensor updates during a set of time blocks. :param pulumi.Input[bool] uninstall_protection: Enable uninstall protection. Windows and Mac only. """ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))