All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.pulumi.azure.servicebus.inputs.NamespaceNetworkRuleSetArgs Maven / Gradle / Ivy

Go to download

A Pulumi package for creating and managing Microsoft Azure cloud resources, based on the Terraform azurerm provider. We recommend using the [Azure Native provider](https://github.com/pulumi/pulumi-azure-native) to provision Azure infrastructure. Azure Native provides complete coverage of Azure resources and same-day access to new resources and resource updates.

There is a newer version: 6.10.0-alpha.1731737215
Show newest version
// *** WARNING: this file was generated by pulumi-java-gen. ***
// *** Do not edit by hand unless you're certain you know what you are doing! ***

package com.pulumi.azure.servicebus.inputs;

import com.pulumi.azure.servicebus.inputs.NamespaceNetworkRuleSetNetworkRuleArgs;
import com.pulumi.core.Output;
import com.pulumi.core.annotations.Import;
import java.lang.Boolean;
import java.lang.String;
import java.util.List;
import java.util.Objects;
import java.util.Optional;
import javax.annotation.Nullable;


public final class NamespaceNetworkRuleSetArgs extends com.pulumi.resources.ResourceArgs {

    public static final NamespaceNetworkRuleSetArgs Empty = new NamespaceNetworkRuleSetArgs();

    /**
     * Specifies the default action for the Network Rule Set. Possible values are `Allow` and `Deny`. Defaults to `Allow`.
     * 
     */
    @Import(name="defaultAction")
    private @Nullable Output defaultAction;

    /**
     * @return Specifies the default action for the Network Rule Set. Possible values are `Allow` and `Deny`. Defaults to `Allow`.
     * 
     */
    public Optional> defaultAction() {
        return Optional.ofNullable(this.defaultAction);
    }

    /**
     * One or more IP Addresses, or CIDR Blocks which should be able to access the ServiceBus Namespace.
     * 
     */
    @Import(name="ipRules")
    private @Nullable Output> ipRules;

    /**
     * @return One or more IP Addresses, or CIDR Blocks which should be able to access the ServiceBus Namespace.
     * 
     */
    public Optional>> ipRules() {
        return Optional.ofNullable(this.ipRules);
    }

    /**
     * One or more `network_rules` blocks as defined below.
     * 
     */
    @Import(name="networkRules")
    private @Nullable Output> networkRules;

    /**
     * @return One or more `network_rules` blocks as defined below.
     * 
     */
    public Optional>> networkRules() {
        return Optional.ofNullable(this.networkRules);
    }

    /**
     * Whether to allow traffic over public network. Possible values are `true` and `false`. Defaults to `true`.
     * 
     * > **Note:** To disable public network access, you must also configure the property `public_network_access_enabled`.
     * 
     */
    @Import(name="publicNetworkAccessEnabled")
    private @Nullable Output publicNetworkAccessEnabled;

    /**
     * @return Whether to allow traffic over public network. Possible values are `true` and `false`. Defaults to `true`.
     * 
     * > **Note:** To disable public network access, you must also configure the property `public_network_access_enabled`.
     * 
     */
    public Optional> publicNetworkAccessEnabled() {
        return Optional.ofNullable(this.publicNetworkAccessEnabled);
    }

    /**
     * Are Azure Services that are known and trusted for this resource type are allowed to bypass firewall configuration? See [Trusted Microsoft Services](https://github.com/MicrosoftDocs/azure-docs/blob/master/articles/service-bus-messaging/includes/service-bus-trusted-services.md)
     * 
     */
    @Import(name="trustedServicesAllowed")
    private @Nullable Output trustedServicesAllowed;

    /**
     * @return Are Azure Services that are known and trusted for this resource type are allowed to bypass firewall configuration? See [Trusted Microsoft Services](https://github.com/MicrosoftDocs/azure-docs/blob/master/articles/service-bus-messaging/includes/service-bus-trusted-services.md)
     * 
     */
    public Optional> trustedServicesAllowed() {
        return Optional.ofNullable(this.trustedServicesAllowed);
    }

    private NamespaceNetworkRuleSetArgs() {}

    private NamespaceNetworkRuleSetArgs(NamespaceNetworkRuleSetArgs $) {
        this.defaultAction = $.defaultAction;
        this.ipRules = $.ipRules;
        this.networkRules = $.networkRules;
        this.publicNetworkAccessEnabled = $.publicNetworkAccessEnabled;
        this.trustedServicesAllowed = $.trustedServicesAllowed;
    }

    public static Builder builder() {
        return new Builder();
    }
    public static Builder builder(NamespaceNetworkRuleSetArgs defaults) {
        return new Builder(defaults);
    }

    public static final class Builder {
        private NamespaceNetworkRuleSetArgs $;

        public Builder() {
            $ = new NamespaceNetworkRuleSetArgs();
        }

        public Builder(NamespaceNetworkRuleSetArgs defaults) {
            $ = new NamespaceNetworkRuleSetArgs(Objects.requireNonNull(defaults));
        }

        /**
         * @param defaultAction Specifies the default action for the Network Rule Set. Possible values are `Allow` and `Deny`. Defaults to `Allow`.
         * 
         * @return builder
         * 
         */
        public Builder defaultAction(@Nullable Output defaultAction) {
            $.defaultAction = defaultAction;
            return this;
        }

        /**
         * @param defaultAction Specifies the default action for the Network Rule Set. Possible values are `Allow` and `Deny`. Defaults to `Allow`.
         * 
         * @return builder
         * 
         */
        public Builder defaultAction(String defaultAction) {
            return defaultAction(Output.of(defaultAction));
        }

        /**
         * @param ipRules One or more IP Addresses, or CIDR Blocks which should be able to access the ServiceBus Namespace.
         * 
         * @return builder
         * 
         */
        public Builder ipRules(@Nullable Output> ipRules) {
            $.ipRules = ipRules;
            return this;
        }

        /**
         * @param ipRules One or more IP Addresses, or CIDR Blocks which should be able to access the ServiceBus Namespace.
         * 
         * @return builder
         * 
         */
        public Builder ipRules(List ipRules) {
            return ipRules(Output.of(ipRules));
        }

        /**
         * @param ipRules One or more IP Addresses, or CIDR Blocks which should be able to access the ServiceBus Namespace.
         * 
         * @return builder
         * 
         */
        public Builder ipRules(String... ipRules) {
            return ipRules(List.of(ipRules));
        }

        /**
         * @param networkRules One or more `network_rules` blocks as defined below.
         * 
         * @return builder
         * 
         */
        public Builder networkRules(@Nullable Output> networkRules) {
            $.networkRules = networkRules;
            return this;
        }

        /**
         * @param networkRules One or more `network_rules` blocks as defined below.
         * 
         * @return builder
         * 
         */
        public Builder networkRules(List networkRules) {
            return networkRules(Output.of(networkRules));
        }

        /**
         * @param networkRules One or more `network_rules` blocks as defined below.
         * 
         * @return builder
         * 
         */
        public Builder networkRules(NamespaceNetworkRuleSetNetworkRuleArgs... networkRules) {
            return networkRules(List.of(networkRules));
        }

        /**
         * @param publicNetworkAccessEnabled Whether to allow traffic over public network. Possible values are `true` and `false`. Defaults to `true`.
         * 
         * > **Note:** To disable public network access, you must also configure the property `public_network_access_enabled`.
         * 
         * @return builder
         * 
         */
        public Builder publicNetworkAccessEnabled(@Nullable Output publicNetworkAccessEnabled) {
            $.publicNetworkAccessEnabled = publicNetworkAccessEnabled;
            return this;
        }

        /**
         * @param publicNetworkAccessEnabled Whether to allow traffic over public network. Possible values are `true` and `false`. Defaults to `true`.
         * 
         * > **Note:** To disable public network access, you must also configure the property `public_network_access_enabled`.
         * 
         * @return builder
         * 
         */
        public Builder publicNetworkAccessEnabled(Boolean publicNetworkAccessEnabled) {
            return publicNetworkAccessEnabled(Output.of(publicNetworkAccessEnabled));
        }

        /**
         * @param trustedServicesAllowed Are Azure Services that are known and trusted for this resource type are allowed to bypass firewall configuration? See [Trusted Microsoft Services](https://github.com/MicrosoftDocs/azure-docs/blob/master/articles/service-bus-messaging/includes/service-bus-trusted-services.md)
         * 
         * @return builder
         * 
         */
        public Builder trustedServicesAllowed(@Nullable Output trustedServicesAllowed) {
            $.trustedServicesAllowed = trustedServicesAllowed;
            return this;
        }

        /**
         * @param trustedServicesAllowed Are Azure Services that are known and trusted for this resource type are allowed to bypass firewall configuration? See [Trusted Microsoft Services](https://github.com/MicrosoftDocs/azure-docs/blob/master/articles/service-bus-messaging/includes/service-bus-trusted-services.md)
         * 
         * @return builder
         * 
         */
        public Builder trustedServicesAllowed(Boolean trustedServicesAllowed) {
            return trustedServicesAllowed(Output.of(trustedServicesAllowed));
        }

        public NamespaceNetworkRuleSetArgs build() {
            return $;
        }
    }

}




© 2015 - 2024 Weber Informatics LLC | Privacy Policy