diff --git a/.pulumi-java-gen.version b/.pulumi-java-gen.version
index 92e0c74..47d04a5 100644
--- a/.pulumi-java-gen.version
+++ b/.pulumi-java-gen.version
@@ -1 +1 @@
-0.16.1
\ No newline at end of file
+0.18.0
\ No newline at end of file
diff --git a/examples/go.mod b/examples/go.mod
index ce9686a..a785952 100644
--- a/examples/go.mod
+++ b/examples/go.mod
@@ -1,3 +1,177 @@
module github.com/crowdstrike/pulumi-crowdstrike/examples
go 1.22.5
+
+require github.com/pulumi/pulumi/pkg/v3 v3.140.0
+
+require (
+ cloud.google.com/go v0.112.1 // indirect
+ cloud.google.com/go/compute/metadata v0.5.0 // indirect
+ cloud.google.com/go/iam v1.1.6 // indirect
+ cloud.google.com/go/kms v1.15.7 // indirect
+ cloud.google.com/go/logging v1.9.0 // indirect
+ cloud.google.com/go/longrunning v0.5.5 // indirect
+ cloud.google.com/go/storage v1.39.1 // indirect
+ dario.cat/mergo v1.0.0 // indirect
+ github.com/Azure/azure-sdk-for-go/sdk/azcore v1.11.1 // indirect
+ github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.6.0 // indirect
+ github.com/Azure/azure-sdk-for-go/sdk/internal v1.8.0 // indirect
+ github.com/Azure/azure-sdk-for-go/sdk/keyvault/azkeys v0.10.0 // indirect
+ github.com/Azure/azure-sdk-for-go/sdk/keyvault/internal v0.7.1 // indirect
+ github.com/AzureAD/microsoft-authentication-library-for-go v1.2.2 // indirect
+ github.com/BurntSushi/toml v1.2.1 // indirect
+ github.com/Microsoft/go-winio v0.6.1 // indirect
+ github.com/ProtonMail/go-crypto v1.0.0 // indirect
+ github.com/aead/chacha20 v0.0.0-20180709150244-8b13a72661da // indirect
+ github.com/agext/levenshtein v1.2.3 // indirect
+ github.com/apparentlymart/go-textseg/v13 v13.0.0 // indirect
+ github.com/apparentlymart/go-textseg/v15 v15.0.0 // indirect
+ github.com/atotto/clipboard v0.1.4 // indirect
+ github.com/aws/aws-sdk-go v1.50.36 // indirect
+ github.com/aws/aws-sdk-go-v2 v1.26.1 // indirect
+ github.com/aws/aws-sdk-go-v2/config v1.27.11 // indirect
+ github.com/aws/aws-sdk-go-v2/credentials v1.17.11 // indirect
+ github.com/aws/aws-sdk-go-v2/feature/ec2/imds v1.16.1 // indirect
+ github.com/aws/aws-sdk-go-v2/internal/configsources v1.3.5 // indirect
+ github.com/aws/aws-sdk-go-v2/internal/endpoints/v2 v2.6.5 // indirect
+ github.com/aws/aws-sdk-go-v2/internal/ini v1.8.0 // indirect
+ github.com/aws/aws-sdk-go-v2/service/internal/accept-encoding v1.11.2 // indirect
+ github.com/aws/aws-sdk-go-v2/service/internal/presigned-url v1.11.7 // indirect
+ github.com/aws/aws-sdk-go-v2/service/kms v1.30.1 // indirect
+ github.com/aws/aws-sdk-go-v2/service/sso v1.20.5 // indirect
+ github.com/aws/aws-sdk-go-v2/service/ssooidc v1.23.4 // indirect
+ github.com/aws/aws-sdk-go-v2/service/sts v1.28.6 // indirect
+ github.com/aws/smithy-go v1.20.2 // indirect
+ github.com/aymanbagabas/go-osc52/v2 v2.0.1 // indirect
+ github.com/blang/semver v3.5.1+incompatible // indirect
+ github.com/cenkalti/backoff/v3 v3.2.2 // indirect
+ github.com/charmbracelet/bubbles v0.16.1 // indirect
+ github.com/charmbracelet/bubbletea v0.25.0 // indirect
+ github.com/charmbracelet/lipgloss v0.7.1 // indirect
+ github.com/cheggaaa/pb v1.0.29 // indirect
+ github.com/cloudflare/circl v1.3.7 // indirect
+ github.com/containerd/console v1.0.4-0.20230313162750-1ae8d489ac81 // indirect
+ github.com/cyphar/filepath-securejoin v0.2.4 // indirect
+ github.com/davecgh/go-spew v1.1.1 // indirect
+ github.com/deckarep/golang-set/v2 v2.5.0 // indirect
+ github.com/djherbis/times v1.5.0 // indirect
+ github.com/edsrzf/mmap-go v1.1.0 // indirect
+ github.com/emirpasic/gods v1.18.1 // indirect
+ github.com/felixge/httpsnoop v1.0.4 // indirect
+ github.com/go-git/gcfg v1.5.1-0.20230307220236-3a3c6141e376 // indirect
+ github.com/go-git/go-billy/v5 v5.5.0 // indirect
+ github.com/go-git/go-git/v5 v5.12.0 // indirect
+ github.com/go-jose/go-jose/v3 v3.0.3 // indirect
+ github.com/go-logr/logr v1.4.1 // indirect
+ github.com/go-logr/stdr v1.2.2 // indirect
+ github.com/gofrs/uuid v4.2.0+incompatible // indirect
+ github.com/gogo/protobuf v1.3.2 // indirect
+ github.com/golang-jwt/jwt/v5 v5.2.1 // indirect
+ github.com/golang/glog v1.2.2 // indirect
+ github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da // indirect
+ github.com/golang/protobuf v1.5.4 // indirect
+ github.com/google/go-querystring v1.1.0 // indirect
+ github.com/google/s2a-go v0.1.7 // indirect
+ github.com/google/uuid v1.6.0 // indirect
+ github.com/google/wire v0.6.0 // indirect
+ github.com/googleapis/enterprise-certificate-proxy v0.3.2 // indirect
+ github.com/googleapis/gax-go/v2 v2.12.2 // indirect
+ github.com/gorilla/mux v1.8.0 // indirect
+ github.com/grpc-ecosystem/grpc-opentracing v0.0.0-20180507213350-8e809c8a8645 // indirect
+ github.com/hashicorp/errwrap v1.1.0 // indirect
+ github.com/hashicorp/go-cleanhttp v0.5.2 // indirect
+ github.com/hashicorp/go-multierror v1.1.1 // indirect
+ github.com/hashicorp/go-retryablehttp v0.7.7 // indirect
+ github.com/hashicorp/go-rootcerts v1.0.2 // indirect
+ github.com/hashicorp/go-secure-stdlib/parseutil v0.1.8 // indirect
+ github.com/hashicorp/go-secure-stdlib/strutil v0.1.2 // indirect
+ github.com/hashicorp/go-sockaddr v1.0.6 // indirect
+ github.com/hashicorp/hcl v1.0.0 // indirect
+ github.com/hashicorp/hcl/v2 v2.22.0 // indirect
+ github.com/hashicorp/vault/api v1.12.0 // indirect
+ github.com/inconshreveable/mousetrap v1.1.0 // indirect
+ github.com/jbenet/go-context v0.0.0-20150711004518-d14ea06fba99 // indirect
+ github.com/jmespath/go-jmespath v0.4.0 // indirect
+ github.com/json-iterator/go v1.1.12 // indirect
+ github.com/kevinburke/ssh_config v1.2.0 // indirect
+ github.com/kylelemons/godebug v1.1.0 // indirect
+ github.com/lucasb-eyer/go-colorful v1.2.0 // indirect
+ github.com/mattn/go-isatty v0.0.20 // indirect
+ github.com/mattn/go-localereader v0.0.1 // indirect
+ github.com/mattn/go-runewidth v0.0.15 // indirect
+ github.com/mitchellh/copystructure v1.2.0 // indirect
+ github.com/mitchellh/go-homedir v1.1.0 // indirect
+ github.com/mitchellh/go-ps v1.0.0 // indirect
+ github.com/mitchellh/go-wordwrap v1.0.1 // indirect
+ github.com/mitchellh/mapstructure v1.5.0 // indirect
+ github.com/mitchellh/reflectwalk v1.0.2 // indirect
+ github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd // indirect
+ github.com/modern-go/reflect2 v1.0.2 // indirect
+ github.com/muesli/ansi v0.0.0-20230316100256-276c6243b2f6 // indirect
+ github.com/muesli/cancelreader v0.2.2 // indirect
+ github.com/muesli/reflow v0.3.0 // indirect
+ github.com/muesli/termenv v0.15.2 // indirect
+ github.com/natefinch/atomic v1.0.1 // indirect
+ github.com/opentracing/basictracer-go v1.1.0 // indirect
+ github.com/opentracing/opentracing-go v1.2.0 // indirect
+ github.com/pgavlin/fx v0.1.6 // indirect
+ github.com/pgavlin/goldmark v1.1.33-0.20200616210433-b5eb04559386 // indirect
+ github.com/pjbgf/sha1cd v0.3.0 // indirect
+ github.com/pkg/browser v0.0.0-20240102092130-5ac0b6a4141c // indirect
+ github.com/pkg/errors v0.9.1 // indirect
+ github.com/pkg/term v1.1.0 // indirect
+ github.com/pmezard/go-difflib v1.0.0 // indirect
+ github.com/pulumi/appdash v0.0.0-20231130102222-75f619a67231 // indirect
+ github.com/pulumi/esc v0.10.0 // indirect
+ github.com/pulumi/pulumi/sdk/v3 v3.140.0 // indirect
+ github.com/rivo/uniseg v0.4.4 // indirect
+ github.com/rogpeppe/go-internal v1.12.0 // indirect
+ github.com/ryanuber/go-glob v1.0.0 // indirect
+ github.com/sabhiram/go-gitignore v0.0.0-20210923224102-525f6e181f06 // indirect
+ github.com/santhosh-tekuri/jsonschema/v5 v5.0.0 // indirect
+ github.com/segmentio/asm v1.1.3 // indirect
+ github.com/segmentio/encoding v0.3.5 // indirect
+ github.com/sergi/go-diff v1.3.2-0.20230802210424-5b0b94c5c0d3 // indirect
+ github.com/skeema/knownhosts v1.2.2 // indirect
+ github.com/spf13/cobra v1.8.0 // indirect
+ github.com/spf13/pflag v1.0.5 // indirect
+ github.com/stretchr/testify v1.9.0 // indirect
+ github.com/texttheater/golang-levenshtein v1.0.1 // indirect
+ github.com/uber/jaeger-client-go v2.30.0+incompatible // indirect
+ github.com/uber/jaeger-lib v2.4.1+incompatible // indirect
+ github.com/xanzy/ssh-agent v0.3.3 // indirect
+ github.com/xeipuuv/gojsonpointer v0.0.0-20180127040702-4e3ac2762d5f // indirect
+ github.com/xeipuuv/gojsonreference v0.0.0-20180127040603-bd5ef7bd5415 // indirect
+ github.com/xeipuuv/gojsonschema v1.2.0 // indirect
+ github.com/zclconf/go-cty v1.13.2 // indirect
+ go.opencensus.io v0.24.0 // indirect
+ go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.49.0 // indirect
+ go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.49.0 // indirect
+ go.opentelemetry.io/otel v1.24.0 // indirect
+ go.opentelemetry.io/otel/metric v1.24.0 // indirect
+ go.opentelemetry.io/otel/trace v1.24.0 // indirect
+ go.uber.org/atomic v1.9.0 // indirect
+ gocloud.dev v0.37.0 // indirect
+ gocloud.dev/secrets/hashivault v0.37.0 // indirect
+ golang.org/x/crypto v0.26.0 // indirect
+ golang.org/x/exp v0.0.0-20240604190554-fc45aab8b7f8 // indirect
+ golang.org/x/mod v0.18.0 // indirect
+ golang.org/x/net v0.28.0 // indirect
+ golang.org/x/oauth2 v0.22.0 // indirect
+ golang.org/x/sync v0.8.0 // indirect
+ golang.org/x/sys v0.24.0 // indirect
+ golang.org/x/term v0.23.0 // indirect
+ golang.org/x/text v0.17.0 // indirect
+ golang.org/x/time v0.5.0 // indirect
+ golang.org/x/tools v0.22.0 // indirect
+ golang.org/x/xerrors v0.0.0-20231012003039-104605ab7028 // indirect
+ google.golang.org/api v0.169.0 // indirect
+ google.golang.org/genproto v0.0.0-20240311173647-c811ad7063a7 // indirect
+ google.golang.org/genproto/googleapis/api v0.0.0-20240814211410-ddb44dafa142 // indirect
+ google.golang.org/genproto/googleapis/rpc v0.0.0-20240814211410-ddb44dafa142 // indirect
+ google.golang.org/grpc v1.67.1 // indirect
+ google.golang.org/protobuf v1.35.1 // indirect
+ gopkg.in/warnings.v0 v0.1.2 // indirect
+ gopkg.in/yaml.v3 v3.0.1 // indirect
+ lukechampine.com/frand v1.4.2 // indirect
+)
diff --git a/examples/go.sum b/examples/go.sum
index e69de29..e2374cd 100644
--- a/examples/go.sum
+++ b/examples/go.sum
@@ -0,0 +1,614 @@
+cloud.google.com/go v0.26.0/go.mod h1:aQUYkXzVsufM+DwF1aE+0xfcU+56JwCaLick0ClmMTw=
+cloud.google.com/go v0.112.1 h1:uJSeirPke5UNZHIb4SxfZklVSiWWVqW4oXlETwZziwM=
+cloud.google.com/go v0.112.1/go.mod h1:+Vbu+Y1UU+I1rjmzeMOb/8RfkKJK2Gyxi1X6jJCZLo4=
+cloud.google.com/go/compute/metadata v0.5.0 h1:Zr0eK8JbFv6+Wi4ilXAR8FJ3wyNdpxHKJNPos6LTZOY=
+cloud.google.com/go/compute/metadata v0.5.0/go.mod h1:aHnloV2TPI38yx4s9+wAZhHykWvVCfu7hQbF+9CWoiY=
+cloud.google.com/go/iam v1.1.6 h1:bEa06k05IO4f4uJonbB5iAgKTPpABy1ayxaIZV/GHVc=
+cloud.google.com/go/iam v1.1.6/go.mod h1:O0zxdPeGBoFdWW3HWmBxJsk0pfvNM/p/qa82rWOGTwI=
+cloud.google.com/go/kms v1.15.7 h1:7caV9K3yIxvlQPAcaFffhlT7d1qpxjB1wHBtjWa13SM=
+cloud.google.com/go/kms v1.15.7/go.mod h1:ub54lbsa6tDkUwnu4W7Yt1aAIFLnspgh0kPGToDukeI=
+cloud.google.com/go/logging v1.9.0 h1:iEIOXFO9EmSiTjDmfpbRjOxECO7R8C7b8IXUGOj7xZw=
+cloud.google.com/go/logging v1.9.0/go.mod h1:1Io0vnZv4onoUnsVUQY3HZ3Igb1nBchky0A0y7BBBhE=
+cloud.google.com/go/longrunning v0.5.5 h1:GOE6pZFdSrTb4KAiKnXsJBtlE6mEyaW44oKyMILWnOg=
+cloud.google.com/go/longrunning v0.5.5/go.mod h1:WV2LAxD8/rg5Z1cNW6FJ/ZpX4E4VnDnoTk0yawPBB7s=
+cloud.google.com/go/storage v1.39.1 h1:MvraqHKhogCOTXTlct/9C3K3+Uy2jBmFYb3/Sp6dVtY=
+cloud.google.com/go/storage v1.39.1/go.mod h1:xK6xZmxZmo+fyP7+DEF6FhNc24/JAe95OLyOHCXFH1o=
+dario.cat/mergo v1.0.0 h1:AGCNq9Evsj31mOgNPcLyXc+4PNABt905YmuqPYYpBWk=
+dario.cat/mergo v1.0.0/go.mod h1:uNxQE+84aUszobStD9th8a29P2fMDhsBdgRYvZOxGmk=
+github.com/Azure/azure-sdk-for-go/sdk/azcore v1.11.1 h1:E+OJmp2tPvt1W+amx48v1eqbjDYsgN+RzP4q16yV5eM=
+github.com/Azure/azure-sdk-for-go/sdk/azcore v1.11.1/go.mod h1:a6xsAQUZg+VsS3TJ05SRp524Hs4pZ/AeFSr5ENf0Yjo=
+github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.6.0 h1:U2rTu3Ef+7w9FHKIAXM6ZyqF3UOWJZ12zIm8zECAFfg=
+github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.6.0/go.mod h1:9kIvujWAA58nmPmWB1m23fyWic1kYZMxD9CxaWn4Qpg=
+github.com/Azure/azure-sdk-for-go/sdk/internal v1.8.0 h1:jBQA3cKT4L2rWMpgE7Yt3Hwh2aUj8KXjIGLxjHeYNNo=
+github.com/Azure/azure-sdk-for-go/sdk/internal v1.8.0/go.mod h1:4OG6tQ9EOP/MT0NMjDlRzWoVFxfu9rN9B2X+tlSVktg=
+github.com/Azure/azure-sdk-for-go/sdk/keyvault/azkeys v0.10.0 h1:m/sWOGCREuSBqg2htVQTBY8nOZpyajYztF0vUvSZTuM=
+github.com/Azure/azure-sdk-for-go/sdk/keyvault/azkeys v0.10.0/go.mod h1:Pu5Zksi2KrU7LPbZbNINx6fuVrUp/ffvpxdDj+i8LeE=
+github.com/Azure/azure-sdk-for-go/sdk/keyvault/internal v0.7.1 h1:FbH3BbSb4bvGluTesZZ+ttN/MDsnMmQP36OSnDuSXqw=
+github.com/Azure/azure-sdk-for-go/sdk/keyvault/internal v0.7.1/go.mod h1:9V2j0jn9jDEkCkv8w/bKTNppX/d0FVA1ud77xCIP4KA=
+github.com/AzureAD/microsoft-authentication-library-for-go v1.2.2 h1:XHOnouVk1mxXfQidrMEnLlPk9UMeRtyBTnEFtxkV0kU=
+github.com/AzureAD/microsoft-authentication-library-for-go v1.2.2/go.mod h1:wP83P5OoQ5p6ip3ScPr0BAq0BvuPAvacpEuSzyouqAI=
+github.com/BurntSushi/toml v0.3.1/go.mod h1:xHWCNGjB5oqiDr8zfno3MHue2Ht5sIBksp03qcyfWMU=
+github.com/BurntSushi/toml v1.2.1 h1:9F2/+DoOYIOksmaJFPw1tGFy1eDnIJXg+UHjuD8lTak=
+github.com/BurntSushi/toml v1.2.1/go.mod h1:CxXYINrC8qIiEnFrOxCa7Jy5BFHlXnUU2pbicEuybxQ=
+github.com/HdrHistogram/hdrhistogram-go v1.1.2 h1:5IcZpTvzydCQeHzK4Ef/D5rrSqwxob0t8PQPMybUNFM=
+github.com/HdrHistogram/hdrhistogram-go v1.1.2/go.mod h1:yDgFjdqOqDEKOvasDdhWNXYg9BVp4O+o5f6V/ehm6Oo=
+github.com/Microsoft/go-winio v0.5.2/go.mod h1:WpS1mjBmmwHBEWmogvA2mj8546UReBk4v8QkMxJ6pZY=
+github.com/Microsoft/go-winio v0.6.1 h1:9/kr64B9VUZrLm5YYwbGtUJnMgqWVOdUAXu6Migciow=
+github.com/Microsoft/go-winio v0.6.1/go.mod h1:LRdKpFKfdobln8UmuiYcKPot9D2v6svN5+sAH+4kjUM=
+github.com/ProtonMail/go-crypto v1.0.0 h1:LRuvITjQWX+WIfr930YHG2HNfjR1uOfyf5vE0kC2U78=
+github.com/ProtonMail/go-crypto v1.0.0/go.mod h1:EjAoLdwvbIOoOQr3ihjnSoLZRtE8azugULFRteWMNc0=
+github.com/aead/chacha20 v0.0.0-20180709150244-8b13a72661da h1:KjTM2ks9d14ZYCvmHS9iAKVt9AyzRSqNU1qabPih5BY=
+github.com/aead/chacha20 v0.0.0-20180709150244-8b13a72661da/go.mod h1:eHEWzANqSiWQsof+nXEI9bUVUyV6F53Fp89EuCh2EAA=
+github.com/agext/levenshtein v1.2.3 h1:YB2fHEn0UJagG8T1rrWknE3ZQzWM06O8AMAatNn7lmo=
+github.com/agext/levenshtein v1.2.3/go.mod h1:JEDfjyjHDjOF/1e4FlBE/PkbqA9OfWu2ki2W0IB5558=
+github.com/anmitsu/go-shlex v0.0.0-20200514113438-38f4b401e2be h1:9AeTilPcZAjCFIImctFaOjnTIavg87rW78vTPkQqLI8=
+github.com/anmitsu/go-shlex v0.0.0-20200514113438-38f4b401e2be/go.mod h1:ySMOLuWl6zY27l47sB3qLNK6tF2fkHG55UZxx8oIVo4=
+github.com/apparentlymart/go-textseg/v13 v13.0.0 h1:Y+KvPE1NYz0xl601PVImeQfFyEy6iT90AvPUL1NNfNw=
+github.com/apparentlymart/go-textseg/v13 v13.0.0/go.mod h1:ZK2fH7c4NqDTLtiYLvIkEghdlcqw7yxLeM89kiTRPUo=
+github.com/apparentlymart/go-textseg/v15 v15.0.0 h1:uYvfpb3DyLSCGWnctWKGj857c6ew1u1fNQOlOtuGxQY=
+github.com/apparentlymart/go-textseg/v15 v15.0.0/go.mod h1:K8XmNZdhEBkdlyDdvbmmsvpAG721bKi0joRfFdHIWJ4=
+github.com/armon/go-socks5 v0.0.0-20160902184237-e75332964ef5 h1:0CwZNZbxp69SHPdPJAN/hZIm0C4OItdklCFmMRWYpio=
+github.com/armon/go-socks5 v0.0.0-20160902184237-e75332964ef5/go.mod h1:wHh0iHkYZB8zMSxRWpUBQtwG5a7fFgvEO+odwuTv2gs=
+github.com/atotto/clipboard v0.1.4 h1:EH0zSVneZPSuFR11BlR9YppQTVDbh5+16AmcJi4g1z4=
+github.com/atotto/clipboard v0.1.4/go.mod h1:ZY9tmq7sm5xIbd9bOK4onWV4S6X0u6GY7Vn0Yu86PYI=
+github.com/aws/aws-sdk-go v1.50.36 h1:PjWXHwZPuTLMR1NIb8nEjLucZBMzmf84TLoLbD8BZqk=
+github.com/aws/aws-sdk-go v1.50.36/go.mod h1:LF8svs817+Nz+DmiMQKTO3ubZ/6IaTpq3TjupRn3Eqk=
+github.com/aws/aws-sdk-go-v2 v1.26.1 h1:5554eUqIYVWpU0YmeeYZ0wU64H2VLBs8TlhRB2L+EkA=
+github.com/aws/aws-sdk-go-v2 v1.26.1/go.mod h1:ffIFB97e2yNsv4aTSGkqtHnppsIJzw7G7BReUZ3jCXM=
+github.com/aws/aws-sdk-go-v2/aws/protocol/eventstream v1.6.2 h1:x6xsQXGSmW6frevwDA+vi/wqhp1ct18mVXYN08/93to=
+github.com/aws/aws-sdk-go-v2/aws/protocol/eventstream v1.6.2/go.mod h1:lPprDr1e6cJdyYeGXnRaJoP4Md+cDBvi2eOj00BlGmg=
+github.com/aws/aws-sdk-go-v2/config v1.27.11 h1:f47rANd2LQEYHda2ddSCKYId18/8BhSRM4BULGmfgNA=
+github.com/aws/aws-sdk-go-v2/config v1.27.11/go.mod h1:SMsV78RIOYdve1vf36z8LmnszlRWkwMQtomCAI0/mIE=
+github.com/aws/aws-sdk-go-v2/credentials v1.17.11 h1:YuIB1dJNf1Re822rriUOTxopaHHvIq0l/pX3fwO+Tzs=
+github.com/aws/aws-sdk-go-v2/credentials v1.17.11/go.mod h1:AQtFPsDH9bI2O+71anW6EKL+NcD7LG3dpKGMV4SShgo=
+github.com/aws/aws-sdk-go-v2/feature/ec2/imds v1.16.1 h1:FVJ0r5XTHSmIHJV6KuDmdYhEpvlHpiSd38RQWhut5J4=
+github.com/aws/aws-sdk-go-v2/feature/ec2/imds v1.16.1/go.mod h1:zusuAeqezXzAB24LGuzuekqMAEgWkVYukBec3kr3jUg=
+github.com/aws/aws-sdk-go-v2/feature/s3/manager v1.16.15 h1:7Zwtt/lP3KNRkeZre7soMELMGNoBrutx8nobg1jKWmo=
+github.com/aws/aws-sdk-go-v2/feature/s3/manager v1.16.15/go.mod h1:436h2adoHb57yd+8W+gYPrrA9U/R/SuAuOO42Ushzhw=
+github.com/aws/aws-sdk-go-v2/internal/configsources v1.3.5 h1:aw39xVGeRWlWx9EzGVnhOR4yOjQDHPQ6o6NmBlscyQg=
+github.com/aws/aws-sdk-go-v2/internal/configsources v1.3.5/go.mod h1:FSaRudD0dXiMPK2UjknVwwTYyZMRsHv3TtkabsZih5I=
+github.com/aws/aws-sdk-go-v2/internal/endpoints/v2 v2.6.5 h1:PG1F3OD1szkuQPzDw3CIQsRIrtTlUC3lP84taWzHlq0=
+github.com/aws/aws-sdk-go-v2/internal/endpoints/v2 v2.6.5/go.mod h1:jU1li6RFryMz+so64PpKtudI+QzbKoIEivqdf6LNpOc=
+github.com/aws/aws-sdk-go-v2/internal/ini v1.8.0 h1:hT8rVHwugYE2lEfdFE0QWVo81lF7jMrYJVDWI+f+VxU=
+github.com/aws/aws-sdk-go-v2/internal/ini v1.8.0/go.mod h1:8tu/lYfQfFe6IGnaOdrpVgEL2IrrDOf6/m9RQum4NkY=
+github.com/aws/aws-sdk-go-v2/internal/v4a v1.3.5 h1:81KE7vaZzrl7yHBYHVEzYB8sypz11NMOZ40YlWvPxsU=
+github.com/aws/aws-sdk-go-v2/internal/v4a v1.3.5/go.mod h1:LIt2rg7Mcgn09Ygbdh/RdIm0rQ+3BNkbP1gyVMFtRK0=
+github.com/aws/aws-sdk-go-v2/service/iam v1.31.4 h1:eVm30ZIDv//r6Aogat9I88b5YX1xASSLcEDqHYRPVl0=
+github.com/aws/aws-sdk-go-v2/service/iam v1.31.4/go.mod h1:aXWImQV0uTW35LM0A/T4wEg6R1/ReXUu4SM6/lUHYK0=
+github.com/aws/aws-sdk-go-v2/service/internal/accept-encoding v1.11.2 h1:Ji0DY1xUsUr3I8cHps0G+XM3WWU16lP6yG8qu1GAZAs=
+github.com/aws/aws-sdk-go-v2/service/internal/accept-encoding v1.11.2/go.mod h1:5CsjAbs3NlGQyZNFACh+zztPDI7fU6eW9QsxjfnuBKg=
+github.com/aws/aws-sdk-go-v2/service/internal/checksum v1.3.7 h1:ZMeFZ5yk+Ek+jNr1+uwCd2tG89t6oTS5yVWpa6yy2es=
+github.com/aws/aws-sdk-go-v2/service/internal/checksum v1.3.7/go.mod h1:mxV05U+4JiHqIpGqqYXOHLPKUC6bDXC44bsUhNjOEwY=
+github.com/aws/aws-sdk-go-v2/service/internal/presigned-url v1.11.7 h1:ogRAwT1/gxJBcSWDMZlgyFUM962F51A5CRhDLbxLdmo=
+github.com/aws/aws-sdk-go-v2/service/internal/presigned-url v1.11.7/go.mod h1:YCsIZhXfRPLFFCl5xxY+1T9RKzOKjCut+28JSX2DnAk=
+github.com/aws/aws-sdk-go-v2/service/internal/s3shared v1.17.5 h1:f9RyWNtS8oH7cZlbn+/JNPpjUk5+5fLd5lM9M0i49Ys=
+github.com/aws/aws-sdk-go-v2/service/internal/s3shared v1.17.5/go.mod h1:h5CoMZV2VF297/VLhRhO1WF+XYWOzXo+4HsObA4HjBQ=
+github.com/aws/aws-sdk-go-v2/service/kms v1.30.1 h1:SBn4I0fJXF9FYOVRSVMWuhvEKoAHDikjGpS3wlmw5DE=
+github.com/aws/aws-sdk-go-v2/service/kms v1.30.1/go.mod h1:2snWQJQUKsbN66vAawJuOGX7dr37pfOq9hb0tZDGIqQ=
+github.com/aws/aws-sdk-go-v2/service/s3 v1.53.1 h1:6cnno47Me9bRykw9AEv9zkXE+5or7jz8TsskTTccbgc=
+github.com/aws/aws-sdk-go-v2/service/s3 v1.53.1/go.mod h1:qmdkIIAC+GCLASF7R2whgNrJADz0QZPX+Seiw/i4S3o=
+github.com/aws/aws-sdk-go-v2/service/sso v1.20.5 h1:vN8hEbpRnL7+Hopy9dzmRle1xmDc7o8tmY0klsr175w=
+github.com/aws/aws-sdk-go-v2/service/sso v1.20.5/go.mod h1:qGzynb/msuZIE8I75DVRCUXw3o3ZyBmUvMwQ2t/BrGM=
+github.com/aws/aws-sdk-go-v2/service/ssooidc v1.23.4 h1:Jux+gDDyi1Lruk+KHF91tK2KCuY61kzoCpvtvJJBtOE=
+github.com/aws/aws-sdk-go-v2/service/ssooidc v1.23.4/go.mod h1:mUYPBhaF2lGiukDEjJX2BLRRKTmoUSitGDUgM4tRxak=
+github.com/aws/aws-sdk-go-v2/service/sts v1.28.6 h1:cwIxeBttqPN3qkaAjcEcsh8NYr8n2HZPkcKgPAi1phU=
+github.com/aws/aws-sdk-go-v2/service/sts v1.28.6/go.mod h1:FZf1/nKNEkHdGGJP/cI2MoIMquumuRK6ol3QQJNDxmw=
+github.com/aws/smithy-go v1.20.2 h1:tbp628ireGtzcHDDmLT/6ADHidqnwgF57XOXZe6tp4Q=
+github.com/aws/smithy-go v1.20.2/go.mod h1:krry+ya/rV9RDcV/Q16kpu6ypI4K2czasz0NC3qS14E=
+github.com/aymanbagabas/go-osc52/v2 v2.0.1 h1:HwpRHbFMcZLEVr42D4p7XBqjyuxQH5SMiErDT4WkJ2k=
+github.com/aymanbagabas/go-osc52/v2 v2.0.1/go.mod h1:uYgXzlJ7ZpABp8OJ+exZzJJhRNQ2ASbcXHWsFqH8hp8=
+github.com/blang/semver v3.5.1+incompatible h1:cQNTCjp13qL8KC3Nbxr/y2Bqb63oX6wdnnjpJbkM4JQ=
+github.com/blang/semver v3.5.1+incompatible/go.mod h1:kRBLl5iJ+tD4TcOOxsy/0fnwebNt5EWlYSAyrTnjyyk=
+github.com/bwesterb/go-ristretto v1.2.3/go.mod h1:fUIoIZaG73pV5biE2Blr2xEzDoMj7NFEuV9ekS419A0=
+github.com/cenkalti/backoff/v3 v3.2.2 h1:cfUAAO3yvKMYKPrvhDuHSwQnhZNk/RMHKdZqKTxfm6M=
+github.com/cenkalti/backoff/v3 v3.2.2/go.mod h1:cIeZDE3IrqwwJl6VUwCN6trj1oXrTS4rc0ij+ULvLYs=
+github.com/census-instrumentation/opencensus-proto v0.2.1/go.mod h1:f6KPmirojxKA12rnyqOA5BBL4O983OfeGPqjHWSTneU=
+github.com/charmbracelet/bubbles v0.16.1 h1:6uzpAAaT9ZqKssntbvZMlksWHruQLNxg49H5WdeuYSY=
+github.com/charmbracelet/bubbles v0.16.1/go.mod h1:2QCp9LFlEsBQMvIYERr7Ww2H2bA7xen1idUDIzm/+Xc=
+github.com/charmbracelet/bubbletea v0.25.0 h1:bAfwk7jRz7FKFl9RzlIULPkStffg5k6pNt5dywy4TcM=
+github.com/charmbracelet/bubbletea v0.25.0/go.mod h1:EN3QDR1T5ZdWmdfDzYcqOCAps45+QIJbLOBxmVNWNNg=
+github.com/charmbracelet/lipgloss v0.7.1 h1:17WMwi7N1b1rVWOjMT+rCh7sQkvDU75B2hbZpc5Kc1E=
+github.com/charmbracelet/lipgloss v0.7.1/go.mod h1:yG0k3giv8Qj8edTCbbg6AlQ5e8KNWpFujkNawKNhE2c=
+github.com/cheggaaa/pb v1.0.29 h1:FckUN5ngEk2LpvuG0fw1GEFx6LtyY2pWI/Z2QgCnEYo=
+github.com/cheggaaa/pb v1.0.29/go.mod h1:W40334L7FMC5JKWldsTWbdGjLo0RxUKK73K+TuPxX30=
+github.com/client9/misspell v0.3.4/go.mod h1:qj6jICC3Q7zFZvVWo7KLAzC3yx5G7kyvSDkc90ppPyw=
+github.com/cloudflare/circl v1.3.3/go.mod h1:5XYMA4rFBvNIrhs50XuiBJ15vF2pZn4nnUKZrLbUZFA=
+github.com/cloudflare/circl v1.3.7 h1:qlCDlTPz2n9fu58M0Nh1J/JzcFpfgkFHHX3O35r5vcU=
+github.com/cloudflare/circl v1.3.7/go.mod h1:sRTcRWXGLrKw6yIGJ+l7amYJFfAXbZG0kBSc8r4zxgA=
+github.com/cncf/udpa/go v0.0.0-20191209042840-269d4d468f6f/go.mod h1:M8M6+tZqaGXZJjfX53e64911xZQV5JYwmTeXPW+k8Sc=
+github.com/containerd/console v1.0.4-0.20230313162750-1ae8d489ac81 h1:q2hJAaP1k2wIvVRd/hEHD7lacgqrCPS+k8g1MndzfWY=
+github.com/containerd/console v1.0.4-0.20230313162750-1ae8d489ac81/go.mod h1:YynlIjWYF8myEu6sdkwKIvGQq+cOckRm6So2avqoYAk=
+github.com/cpuguy83/go-md2man/v2 v2.0.3/go.mod h1:tgQtvFlXSQOSOSIRvRPT7W67SCa46tRHOmNcaadrF8o=
+github.com/cyphar/filepath-securejoin v0.2.4 h1:Ugdm7cg7i6ZK6x3xDF1oEu1nfkyfH53EtKeQYTC3kyg=
+github.com/cyphar/filepath-securejoin v0.2.4/go.mod h1:aPGpWjXOXUn2NCNjFvBE6aRxGGx79pTxQpKOJNYHHl4=
+github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
+github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c=
+github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
+github.com/deckarep/golang-set/v2 v2.5.0 h1:hn6cEZtQ0h3J8kFrHR/NrzyOoTnjgW1+FmNJzQ7y/sA=
+github.com/deckarep/golang-set/v2 v2.5.0/go.mod h1:VAky9rY/yGXJOLEDv3OMci+7wtDpOF4IN+y82NBOac4=
+github.com/djherbis/times v1.5.0 h1:79myA211VwPhFTqUk8xehWrsEO+zcIZj0zT8mXPVARU=
+github.com/djherbis/times v1.5.0/go.mod h1:5q7FDLvbNg1L/KaBmPcWlVR9NmoKo3+ucqUA3ijQhA0=
+github.com/edsrzf/mmap-go v1.1.0 h1:6EUwBLQ/Mcr1EYLE4Tn1VdW1A4ckqCQWZBw8Hr0kjpQ=
+github.com/edsrzf/mmap-go v1.1.0/go.mod h1:19H/e8pUPLicwkyNgOykDXkJ9F0MHE+Z52B8EIth78Q=
+github.com/elazarl/goproxy v0.0.0-20230808193330-2592e75ae04a h1:mATvB/9r/3gvcejNsXKSkQ6lcIaNec2nyfOdlTBR2lU=
+github.com/elazarl/goproxy v0.0.0-20230808193330-2592e75ae04a/go.mod h1:Ro8st/ElPeALwNFlcTpWmkr6IoMFfkjXAvTHpevnDsM=
+github.com/emirpasic/gods v1.18.1 h1:FXtiHYKDGKCW2KzwZKx0iC0PQmdlorYgdFG9jPXJ1Bc=
+github.com/emirpasic/gods v1.18.1/go.mod h1:8tpGGwCnJ5H4r6BWwaV6OrWmMoPhUl5jm/FMNAnJvWQ=
+github.com/envoyproxy/go-control-plane v0.9.0/go.mod h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4=
+github.com/envoyproxy/go-control-plane v0.9.1-0.20191026205805-5f8ba28d4473/go.mod h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4=
+github.com/envoyproxy/go-control-plane v0.9.4/go.mod h1:6rpuAdCZL397s3pYoYcLgu1mIlRU8Am5FuJP05cCM98=
+github.com/envoyproxy/protoc-gen-validate v0.1.0/go.mod h1:iSmxcyjqTsJpI2R4NaDN7+kN2VEUnK/pcBlmesArF7c=
+github.com/fatih/color v1.9.0/go.mod h1:eQcE1qtQxscV5RaZvpXrrb8Drkc3/DdQ+uUYCNjL+zU=
+github.com/fatih/color v1.16.0 h1:zmkK9Ngbjj+K0yRhTVONQh1p/HknKYSlNT+vZCzyokM=
+github.com/fatih/color v1.16.0/go.mod h1:fL2Sau1YI5c0pdGEVCbKQbLXB6edEj1ZgiY4NijnWvE=
+github.com/felixge/httpsnoop v1.0.4 h1:NFTV2Zj1bL4mc9sqWACXbQFVBBg2W3GPvqp8/ESS2Wg=
+github.com/felixge/httpsnoop v1.0.4/go.mod h1:m8KPJKqk1gH5J9DgRY2ASl2lWCfGKXixSwevea8zH2U=
+github.com/gliderlabs/ssh v0.3.7 h1:iV3Bqi942d9huXnzEF2Mt+CY9gLu8DNM4Obd+8bODRE=
+github.com/gliderlabs/ssh v0.3.7/go.mod h1:zpHEXBstFnQYtGnB8k8kQLol82umzn/2/snG7alWVD8=
+github.com/go-git/gcfg v1.5.1-0.20230307220236-3a3c6141e376 h1:+zs/tPmkDkHx3U66DAb0lQFJrpS6731Oaa12ikc+DiI=
+github.com/go-git/gcfg v1.5.1-0.20230307220236-3a3c6141e376/go.mod h1:an3vInlBmSxCcxctByoQdvwPiA7DTK7jaaFDBTtu0ic=
+github.com/go-git/go-billy/v5 v5.5.0 h1:yEY4yhzCDuMGSv83oGxiBotRzhwhNr8VZyphhiu+mTU=
+github.com/go-git/go-billy/v5 v5.5.0/go.mod h1:hmexnoNsr2SJU1Ju67OaNz5ASJY3+sHgFRpCtpDCKow=
+github.com/go-git/go-git-fixtures/v4 v4.3.2-0.20231010084843-55a94097c399 h1:eMje31YglSBqCdIqdhKBW8lokaMrL3uTkpGYlE2OOT4=
+github.com/go-git/go-git-fixtures/v4 v4.3.2-0.20231010084843-55a94097c399/go.mod h1:1OCfN199q1Jm3HZlxleg+Dw/mwps2Wbk9frAWm+4FII=
+github.com/go-git/go-git/v5 v5.12.0 h1:7Md+ndsjrzZxbddRDZjF14qK+NN56sy6wkqaVrjZtys=
+github.com/go-git/go-git/v5 v5.12.0/go.mod h1:FTM9VKtnI2m65hNI/TenDDDnUf2Q9FHnXYjuz9i5OEY=
+github.com/go-jose/go-jose/v3 v3.0.3 h1:fFKWeig/irsp7XD2zBxvnmA/XaRWp5V3CBsZXJF7G7k=
+github.com/go-jose/go-jose/v3 v3.0.3/go.mod h1:5b+7YgP7ZICgJDBdfjZaIt+H/9L9T/YQrVfLAMboGkQ=
+github.com/go-logr/logr v1.2.2/go.mod h1:jdQByPbusPIv2/zmleS9BjJVeZ6kBagPoEUsqbVz/1A=
+github.com/go-logr/logr v1.4.1 h1:pKouT5E8xu9zeFC39JXRDukb6JFQPXM5p5I91188VAQ=
+github.com/go-logr/logr v1.4.1/go.mod h1:9T104GzyrTigFIr8wt5mBrctHMim0Nb2HLGrmQ40KvY=
+github.com/go-logr/stdr v1.2.2 h1:hSWxHoqTgW2S2qGc0LTAI563KZ5YKYRhT3MFKZMbjag=
+github.com/go-logr/stdr v1.2.2/go.mod h1:mMo/vtBO5dYbehREoey6XUKy/eSumjCCveDpRre4VKE=
+github.com/go-test/deep v1.0.3 h1:ZrJSEWsXzPOxaZnFteGEfooLba+ju3FYIbOrS+rQd68=
+github.com/go-test/deep v1.0.3/go.mod h1:wGDj63lr65AM2AQyKZd/NYHGb0R+1RLqB8NKt3aSFNA=
+github.com/gofrs/uuid v4.2.0+incompatible h1:yyYWMnhkhrKwwr8gAOcOCYxOOscHgDS9yZgBrnJfGa0=
+github.com/gofrs/uuid v4.2.0+incompatible/go.mod h1:b2aQJv3Z4Fp6yNu3cdSllBxTCLRxnplIgP/c0N/04lM=
+github.com/gogo/protobuf v1.3.1/go.mod h1:SlYgWuQ5SjCEi6WLHjHCa1yvBfUnHcTbrrZtXPKa29o=
+github.com/gogo/protobuf v1.3.2 h1:Ov1cvc58UF3b5XjBnZv7+opcTcQFZebYjWzi34vdm4Q=
+github.com/gogo/protobuf v1.3.2/go.mod h1:P1XiOD3dCwIKUDQYPy72D8LYyHL2YPYrpS2s69NZV8Q=
+github.com/golang-jwt/jwt/v5 v5.2.1 h1:OuVbFODueb089Lh128TAcimifWaLhJwVflnrgM17wHk=
+github.com/golang-jwt/jwt/v5 v5.2.1/go.mod h1:pqrtFR0X4osieyHYxtmOUWsAWrfe1Q5UVIyoH402zdk=
+github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b/go.mod h1:SBH7ygxi8pfUlaOkMMuAQtPIUF8ecWP5IEl/CR7VP2Q=
+github.com/golang/glog v1.2.2 h1:1+mZ9upx1Dh6FmUTFR1naJ77miKiXgALjWOZ3NVFPmY=
+github.com/golang/glog v1.2.2/go.mod h1:6AhwSGph0fcJtXVM/PEHPqZlFeoLxhs7/t5UDAwmO+w=
+github.com/golang/groupcache v0.0.0-20200121045136-8c9f03a8e57e/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc=
+github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da h1:oI5xCqsCo564l8iNU+DwB5epxmsaqB+rhGL0m5jtYqE=
+github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc=
+github.com/golang/mock v1.1.1/go.mod h1:oTYuIxOrZwtPieC+H1uAHpcLFnEyAGVDL/k47Jfbm0A=
+github.com/golang/protobuf v1.2.0/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
+github.com/golang/protobuf v1.3.2/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
+github.com/golang/protobuf v1.4.0-rc.1/go.mod h1:ceaxUfeHdC40wWswd/P6IGgMaK3YpKi5j83Wpe3EHw8=
+github.com/golang/protobuf v1.4.0-rc.1.0.20200221234624-67d41d38c208/go.mod h1:xKAWHe0F5eneWXFV3EuXVDTCmh+JuBKY0li0aMyXATA=
+github.com/golang/protobuf v1.4.0-rc.2/go.mod h1:LlEzMj4AhA7rCAGe4KMBDvJI+AwstrUpVNzEA03Pprs=
+github.com/golang/protobuf v1.4.0-rc.4.0.20200313231945-b860323f09d0/go.mod h1:WU3c8KckQ9AFe+yFwt9sWVRKCVIyN9cPHBJSNnbL67w=
+github.com/golang/protobuf v1.4.0/go.mod h1:jodUvKwWbYaEsadDk5Fwe5c77LiNKVO9IDvqG2KuDX0=
+github.com/golang/protobuf v1.4.1/go.mod h1:U8fpvMrcmy5pZrNK1lt4xCsGvpyWQ/VVv6QDs8UjoX8=
+github.com/golang/protobuf v1.4.3/go.mod h1:oDoupMAO8OvCJWAcko0GGGIgR6R6ocIYbsSw735rRwI=
+github.com/golang/protobuf v1.5.4 h1:i7eJL8qZTpSEXOPTxNKhASYpMn+8e5Q6AdndVa1dWek=
+github.com/golang/protobuf v1.5.4/go.mod h1:lnTiLA8Wa4RWRcIUkrtSVa5nRhsEGBg48fD6rSs7xps=
+github.com/google/go-cmp v0.2.0/go.mod h1:oXzfMopK8JAjlY9xF4vHSVASa0yLyX7SntLO5aqRK0M=
+github.com/google/go-cmp v0.3.0/go.mod h1:8QqcDgzrUqlUb/G2PQTWiueGozuR1884gddMywk6iLU=
+github.com/google/go-cmp v0.3.1/go.mod h1:8QqcDgzrUqlUb/G2PQTWiueGozuR1884gddMywk6iLU=
+github.com/google/go-cmp v0.4.0/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
+github.com/google/go-cmp v0.5.0/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
+github.com/google/go-cmp v0.5.2/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
+github.com/google/go-cmp v0.5.3/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
+github.com/google/go-cmp v0.5.9/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY=
+github.com/google/go-cmp v0.6.0 h1:ofyhxvXcZhMsU5ulbFiLKl/XBFqE1GSq7atu8tAmTRI=
+github.com/google/go-cmp v0.6.0/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY=
+github.com/google/go-querystring v1.1.0 h1:AnCroh3fv4ZBgVIf1Iwtovgjaw/GiKJo8M8yD/fhyJ8=
+github.com/google/go-querystring v1.1.0/go.mod h1:Kcdr2DB4koayq7X8pmAG4sNG59So17icRSOU623lUBU=
+github.com/google/go-replayers/grpcreplay v1.1.0 h1:S5+I3zYyZ+GQz68OfbURDdt/+cSMqCK1wrvNx7WBzTE=
+github.com/google/go-replayers/grpcreplay v1.1.0/go.mod h1:qzAvJ8/wi57zq7gWqaE6AwLM6miiXUQwP1S+I9icmhk=
+github.com/google/go-replayers/httpreplay v1.2.0 h1:VM1wEyyjaoU53BwrOnaf9VhAyQQEEioJvFYxYcLRKzk=
+github.com/google/go-replayers/httpreplay v1.2.0/go.mod h1:WahEFFZZ7a1P4VM1qEeHy+tME4bwyqPcwWbNlUI1Mcg=
+github.com/google/gofuzz v1.0.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
+github.com/google/martian/v3 v3.3.2 h1:IqNFLAmvJOgVlpdEBiQbDc2EwKW77amAycfTuWKdfvw=
+github.com/google/martian/v3 v3.3.2/go.mod h1:oBOf6HBosgwRXnUGWUB05QECsc6uvmMiJ3+6W4l/CUk=
+github.com/google/s2a-go v0.1.7 h1:60BLSyTrOV4/haCDW4zb1guZItoSq8foHCXrAnjBo/o=
+github.com/google/s2a-go v0.1.7/go.mod h1:50CgR4k1jNlWBu4UfS4AcfhVe1r6pdZPygJ3R8F0Qdw=
+github.com/google/subcommands v1.2.0/go.mod h1:ZjhPrFU+Olkh9WazFPsl27BQ4UPiG37m3yTrtFlrHVk=
+github.com/google/uuid v1.1.2/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
+github.com/google/uuid v1.6.0 h1:NIvaJDMOsjHA8n1jAhLSgzrAzy1Hgr+hNrb57e+94F0=
+github.com/google/uuid v1.6.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
+github.com/google/wire v0.6.0 h1:HBkoIh4BdSxoyo9PveV8giw7ZsaBOvzWKfcg/6MrVwI=
+github.com/google/wire v0.6.0/go.mod h1:F4QhpQ9EDIdJ1Mbop/NZBRB+5yrR6qg3BnctaoUk6NA=
+github.com/googleapis/enterprise-certificate-proxy v0.3.2 h1:Vie5ybvEvT75RniqhfFxPRy3Bf7vr3h0cechB90XaQs=
+github.com/googleapis/enterprise-certificate-proxy v0.3.2/go.mod h1:VLSiSSBs/ksPL8kq3OBOQ6WRI2QnaFynd1DCjZ62+V0=
+github.com/googleapis/gax-go/v2 v2.12.2 h1:mhN09QQW1jEWeMF74zGR81R30z4VJzjZsfkUhuHF+DA=
+github.com/googleapis/gax-go/v2 v2.12.2/go.mod h1:61M8vcyyXR2kqKFxKrfA22jaA8JGF7Dc8App1U3H6jc=
+github.com/gorilla/mux v1.8.0 h1:i40aqfkR1h2SlN9hojwV5ZA91wcXFOvkdNIeFDP5koI=
+github.com/gorilla/mux v1.8.0/go.mod h1:DVbg23sWSpFRCP0SfiEN6jmj59UnW/n46BH5rLB71So=
+github.com/grpc-ecosystem/grpc-opentracing v0.0.0-20180507213350-8e809c8a8645 h1:MJG/KsmcqMwFAkh8mTnAwhyKoB+sTAnY4CACC110tbU=
+github.com/grpc-ecosystem/grpc-opentracing v0.0.0-20180507213350-8e809c8a8645/go.mod h1:6iZfnjpejD4L/4DwD7NryNaJyCQdzwWwH2MWhCA90Kw=
+github.com/hashicorp/errwrap v1.0.0/go.mod h1:YH+1FKiLXxHSkmPseP+kNlulaMuP3n2brvKWEqk/Jc4=
+github.com/hashicorp/errwrap v1.1.0 h1:OxrOeh75EUXMY8TBjag2fzXGZ40LB6IKw45YeGUDY2I=
+github.com/hashicorp/errwrap v1.1.0/go.mod h1:YH+1FKiLXxHSkmPseP+kNlulaMuP3n2brvKWEqk/Jc4=
+github.com/hashicorp/go-cleanhttp v0.5.2 h1:035FKYIWjmULyFRBKPs8TBQoi0x6d9G4xc9neXJWAZQ=
+github.com/hashicorp/go-cleanhttp v0.5.2/go.mod h1:kO/YDlP8L1346E6Sodw+PrpBSV4/SoxCXGY6BqNFT48=
+github.com/hashicorp/go-hclog v1.6.3 h1:Qr2kF+eVWjTiYmU7Y31tYlP1h0q/X3Nl3tPGdaB11/k=
+github.com/hashicorp/go-hclog v1.6.3/go.mod h1:W4Qnvbt70Wk/zYJryRzDRU/4r0kIg0PVHBcfoyhpF5M=
+github.com/hashicorp/go-multierror v1.1.1 h1:H5DkEtf6CXdFp0N0Em5UCwQpXMWke8IA0+lD48awMYo=
+github.com/hashicorp/go-multierror v1.1.1/go.mod h1:iw975J/qwKPdAO1clOe2L8331t/9/fmwbPZ6JB6eMoM=
+github.com/hashicorp/go-retryablehttp v0.7.7 h1:C8hUCYzor8PIfXHa4UrZkU4VvK8o9ISHxT2Q8+VepXU=
+github.com/hashicorp/go-retryablehttp v0.7.7/go.mod h1:pkQpWZeYWskR+D1tR2O5OcBFOxfA7DoAO6xtkuQnHTk=
+github.com/hashicorp/go-rootcerts v1.0.2 h1:jzhAVGtqPKbwpyCPELlgNWhE1znq+qwJtW5Oi2viEzc=
+github.com/hashicorp/go-rootcerts v1.0.2/go.mod h1:pqUvnprVnM5bf7AOirdbb01K4ccR319Vf4pU3K5EGc8=
+github.com/hashicorp/go-secure-stdlib/parseutil v0.1.8 h1:iBt4Ew4XEGLfh6/bPk4rSYmuZJGizr6/x/AEizP0CQc=
+github.com/hashicorp/go-secure-stdlib/parseutil v0.1.8/go.mod h1:aiJI+PIApBRQG7FZTEBx5GiiX+HbOHilUdNxUZi4eV0=
+github.com/hashicorp/go-secure-stdlib/strutil v0.1.2 h1:kes8mmyCpxJsI7FTwtzRqEy9CdjCtrXrXGuOpxEA7Ts=
+github.com/hashicorp/go-secure-stdlib/strutil v0.1.2/go.mod h1:Gou2R9+il93BqX25LAKCLuM+y9U2T4hlwvT1yprcna4=
+github.com/hashicorp/go-sockaddr v1.0.6 h1:RSG8rKU28VTUTvEKghe5gIhIQpv8evvNpnDEyqO4u9I=
+github.com/hashicorp/go-sockaddr v1.0.6/go.mod h1:uoUUmtwU7n9Dv3O4SNLeFvg0SxQ3lyjsj6+CCykpaxI=
+github.com/hashicorp/hcl v1.0.0 h1:0Anlzjpi4vEasTeNFn2mLJgTSwt0+6sfsiTG8qcWGx4=
+github.com/hashicorp/hcl v1.0.0/go.mod h1:E5yfLk+7swimpb2L/Alb/PJmXilQ/rhwaUYs4T20WEQ=
+github.com/hashicorp/hcl/v2 v2.22.0 h1:hkZ3nCtqeJsDhPRFz5EA9iwcG1hNWGePOTw6oyul12M=
+github.com/hashicorp/hcl/v2 v2.22.0/go.mod h1:62ZYHrXgPoX8xBnzl8QzbWq4dyDsDtfCRgIq1rbJEvA=
+github.com/hashicorp/vault/api v1.12.0 h1:meCpJSesvzQyao8FCOgk2fGdoADAnbDu2WPJN1lDLJ4=
+github.com/hashicorp/vault/api v1.12.0/go.mod h1:si+lJCYO7oGkIoNPAN8j3azBLTn9SjMGS+jFaHd1Cck=
+github.com/inconshreveable/mousetrap v1.1.0 h1:wN+x4NVGpMsO7ErUn/mUI3vEoE6Jt13X2s0bqwp9tc8=
+github.com/inconshreveable/mousetrap v1.1.0/go.mod h1:vpF70FUmC8bwa3OWnCshd2FqLfsEA9PFc4w1p2J65bw=
+github.com/jbenet/go-context v0.0.0-20150711004518-d14ea06fba99 h1:BQSFePA1RWJOlocH6Fxy8MmwDt+yVQYULKfN0RoTN8A=
+github.com/jbenet/go-context v0.0.0-20150711004518-d14ea06fba99/go.mod h1:1lJo3i6rXxKeerYnT8Nvf0QmHCRC1n8sfWVwXF2Frvo=
+github.com/jmespath/go-jmespath v0.4.0 h1:BEgLn5cpjn8UN1mAw4NjwDrS35OdebyEtFe+9YPoQUg=
+github.com/jmespath/go-jmespath v0.4.0/go.mod h1:T8mJZnbsbmF+m6zOOFylbeCJqk5+pHWvzYPziyZiYoo=
+github.com/jmespath/go-jmespath/internal/testify v1.5.1 h1:shLQSRRSCCPj3f2gpwzGwWFoC7ycTf1rcQZHOlsJ6N8=
+github.com/jmespath/go-jmespath/internal/testify v1.5.1/go.mod h1:L3OGu8Wl2/fWfCI6z80xFu9LTZmf1ZRjMHUOPmWr69U=
+github.com/json-iterator/go v1.1.12 h1:PV8peI4a0ysnczrg+LtxykD8LfKY9ML6u2jnxaEnrnM=
+github.com/json-iterator/go v1.1.12/go.mod h1:e30LSqwooZae/UwlEbR2852Gd8hjQvJoHmT4TnhNGBo=
+github.com/kevinburke/ssh_config v1.2.0 h1:x584FjTGwHzMwvHx18PXxbBVzfnxogHaAReU4gf13a4=
+github.com/kevinburke/ssh_config v1.2.0/go.mod h1:CT57kijsi8u/K/BOFA39wgDQJ9CxiF4nAY/ojJ6r6mM=
+github.com/kisielk/errcheck v1.2.0/go.mod h1:/BMXB+zMLi60iA8Vv6Ksmxu/1UDYcXs4uQLJ+jE2L00=
+github.com/kisielk/errcheck v1.5.0/go.mod h1:pFxgyoBC7bSaBwPgfKdkLd5X25qrDl4LWUI2bnpBCr8=
+github.com/kisielk/gotool v1.0.0/go.mod h1:XhKaO+MFFWcvkIS/tQcRk01m1F5IRFswLeQ+oQHNcck=
+github.com/kr/pretty v0.1.0/go.mod h1:dAy3ld7l9f0ibDNOQOHHMYYIIbhfbHSm3C4ZsoJORNo=
+github.com/kr/pretty v0.3.1 h1:flRD4NNwYAUpkphVc1HcthR4KEIFJ65n8Mw5qdRn3LE=
+github.com/kr/pretty v0.3.1/go.mod h1:hoEshYVHaxMs3cyo3Yncou5ZscifuDolrwPKZanG3xk=
+github.com/kr/pty v1.1.1/go.mod h1:pFQYn66WHrOpPYNljwOMqo10TkYh1fy3cYio2l3bCsQ=
+github.com/kr/text v0.1.0/go.mod h1:4Jbv+DJW3UT/LiOwJeYQe1efqtUx/iVham/4vfdArNI=
+github.com/kr/text v0.2.0 h1:5Nx0Ya0ZqY2ygV366QzturHI13Jq95ApcVaJBhpS+AY=
+github.com/kr/text v0.2.0/go.mod h1:eLer722TekiGuMkidMxC/pM04lWEeraHUUmBw8l2grE=
+github.com/kylelemons/godebug v1.1.0 h1:RPNrshWIDI6G2gRW9EHilWtl7Z6Sb1BR0xunSBf0SNc=
+github.com/kylelemons/godebug v1.1.0/go.mod h1:9/0rRGxNHcop5bhtWyNeEfOS8JIWk580+fNqagV/RAw=
+github.com/lucasb-eyer/go-colorful v1.2.0 h1:1nnpGOrhyZZuNyfu1QjKiUICQ74+3FNCN69Aj6K7nkY=
+github.com/lucasb-eyer/go-colorful v1.2.0/go.mod h1:R4dSotOR9KMtayYi1e77YzuveK+i7ruzyGqttikkLy0=
+github.com/mattn/go-colorable v0.1.4/go.mod h1:U0ppj6V5qS13XJ6of8GYAs25YV2eR4EVcfRqFIhoBtE=
+github.com/mattn/go-colorable v0.1.13 h1:fFA4WZxdEF4tXPZVKMLwD8oUnCTTo08duU7wxecdEvA=
+github.com/mattn/go-colorable v0.1.13/go.mod h1:7S9/ev0klgBDR4GtXTXX8a3vIGJpMovkB8vQcUbaXHg=
+github.com/mattn/go-isatty v0.0.8/go.mod h1:Iq45c/XA43vh69/j3iqttzPXn0bhXyGjM0Hdxcsrc5s=
+github.com/mattn/go-isatty v0.0.11/go.mod h1:PhnuNfih5lzO57/f3n+odYbM4JtupLOxQOAqxQCu2WE=
+github.com/mattn/go-isatty v0.0.20 h1:xfD0iDuEKnDkl03q4limB+vH+GxLEtL/jb4xVJSWWEY=
+github.com/mattn/go-isatty v0.0.20/go.mod h1:W+V8PltTTMOvKvAeJH7IuucS94S2C6jfK/D7dTCTo3Y=
+github.com/mattn/go-localereader v0.0.1 h1:ygSAOl7ZXTx4RdPYinUpg6W99U8jWvWi9Ye2JC/oIi4=
+github.com/mattn/go-localereader v0.0.1/go.mod h1:8fBrzywKY7BI3czFoHkuzRoWE9C+EiG4R1k4Cjx5p88=
+github.com/mattn/go-runewidth v0.0.4/go.mod h1:LwmH8dsx7+W8Uxz3IHJYH5QSwggIsqBzpuz5H//U1FU=
+github.com/mattn/go-runewidth v0.0.12/go.mod h1:RAqKPSqVFrSLVXbA8x7dzmKdmGzieGRCM46jaSJTDAk=
+github.com/mattn/go-runewidth v0.0.15 h1:UNAjwbU9l54TA3KzvqLGxwWjHmMgBUVhBiTjelZgg3U=
+github.com/mattn/go-runewidth v0.0.15/go.mod h1:Jdepj2loyihRzMpdS35Xk/zdY8IAYHsh153qUoGf23w=
+github.com/mitchellh/copystructure v1.2.0 h1:vpKXTN4ewci03Vljg/q9QvCGUDttBOGBIa15WveJJGw=
+github.com/mitchellh/copystructure v1.2.0/go.mod h1:qLl+cE2AmVv+CoeAwDPye/v+N2HKCj9FbZEVFJRxO9s=
+github.com/mitchellh/go-homedir v1.1.0 h1:lukF9ziXFxDFPkA1vsr5zpc1XuPDn/wFntq5mG+4E0Y=
+github.com/mitchellh/go-homedir v1.1.0/go.mod h1:SfyaCUpYCn1Vlf4IUYiD9fPX4A5wJrkLzIz1N1q0pr0=
+github.com/mitchellh/go-ps v1.0.0 h1:i6ampVEEF4wQFF+bkYfwYgY+F/uYJDktmvLPf7qIgjc=
+github.com/mitchellh/go-ps v1.0.0/go.mod h1:J4lOc8z8yJs6vUwklHw2XEIiT4z4C40KtWVN3nvg8Pg=
+github.com/mitchellh/go-wordwrap v1.0.1 h1:TLuKupo69TCn6TQSyGxwI1EblZZEsQ0vMlAFQflz0v0=
+github.com/mitchellh/go-wordwrap v1.0.1/go.mod h1:R62XHJLzvMFRBbcrT7m7WgmE1eOyTSsCt+hzestvNj0=
+github.com/mitchellh/mapstructure v1.5.0 h1:jeMsZIYE/09sWLaz43PL7Gy6RuMjD2eJVyuac5Z2hdY=
+github.com/mitchellh/mapstructure v1.5.0/go.mod h1:bFUtVrKA4DC2yAKiSyO/QUcy7e+RRV2QTWOzhPopBRo=
+github.com/mitchellh/reflectwalk v1.0.2 h1:G2LzWKi524PWgd3mLHV8Y5k7s6XUvT0Gef6zxSIeXaQ=
+github.com/mitchellh/reflectwalk v1.0.2/go.mod h1:mSTlrgnPZtwu0c4WaC2kGObEpuNDbx0jmZXqmk4esnw=
+github.com/modern-go/concurrent v0.0.0-20180228061459-e0a39a4cb421/go.mod h1:6dJC0mAP4ikYIbvyc7fijjWJddQyLn8Ig3JB5CqoB9Q=
+github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd h1:TRLaZ9cD/w8PVh93nsPXa1VrQ6jlwL5oN8l14QlcNfg=
+github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd/go.mod h1:6dJC0mAP4ikYIbvyc7fijjWJddQyLn8Ig3JB5CqoB9Q=
+github.com/modern-go/reflect2 v1.0.2 h1:xBagoLtFs94CBntxluKeaWgTMpvLxC4ur3nMaC9Gz0M=
+github.com/modern-go/reflect2 v1.0.2/go.mod h1:yWuevngMOJpCy52FWWMvUC8ws7m/LJsjYzDa0/r8luk=
+github.com/muesli/ansi v0.0.0-20230316100256-276c6243b2f6 h1:ZK8zHtRHOkbHy6Mmr5D264iyp3TiX5OmNcI5cIARiQI=
+github.com/muesli/ansi v0.0.0-20230316100256-276c6243b2f6/go.mod h1:CJlz5H+gyd6CUWT45Oy4q24RdLyn7Md9Vj2/ldJBSIo=
+github.com/muesli/cancelreader v0.2.2 h1:3I4Kt4BQjOR54NavqnDogx/MIoWBFa0StPA8ELUXHmA=
+github.com/muesli/cancelreader v0.2.2/go.mod h1:3XuTXfFS2VjM+HTLZY9Ak0l6eUKfijIfMUZ4EgX0QYo=
+github.com/muesli/reflow v0.3.0 h1:IFsN6K9NfGtjeggFP+68I4chLZV2yIKsXJFNZ+eWh6s=
+github.com/muesli/reflow v0.3.0/go.mod h1:pbwTDkVPibjO2kyvBQRBxTWEEGDGq0FlB1BIKtnHY/8=
+github.com/muesli/termenv v0.15.2 h1:GohcuySI0QmI3wN8Ok9PtKGkgkFIk7y6Vpb5PvrY+Wo=
+github.com/muesli/termenv v0.15.2/go.mod h1:Epx+iuz8sNs7mNKhxzH4fWXGNpZwUaJKRS1noLXviQ8=
+github.com/natefinch/atomic v1.0.1 h1:ZPYKxkqQOx3KZ+RsbnP/YsgvxWQPGxjC0oBt2AhwV0A=
+github.com/natefinch/atomic v1.0.1/go.mod h1:N/D/ELrljoqDyT3rZrsUmtsuzvHkeB/wWjHV22AZRbM=
+github.com/onsi/gomega v1.27.10 h1:naR28SdDFlqrG6kScpT8VWpu1xWY5nJRCF3XaYyBjhI=
+github.com/onsi/gomega v1.27.10/go.mod h1:RsS8tutOdbdgzbPtzzATp12yT7kM5I5aElG3evPbQ0M=
+github.com/opentracing/basictracer-go v1.1.0 h1:Oa1fTSBvAl8pa3U+IJYqrKm0NALwH9OsgwOqDv4xJW0=
+github.com/opentracing/basictracer-go v1.1.0/go.mod h1:V2HZueSJEp879yv285Aap1BS69fQMD+MNP1mRs6mBQc=
+github.com/opentracing/opentracing-go v1.1.0/go.mod h1:UkNAQd3GIcIGf0SeVgPpRdFStlNbqXla1AfSYxPUl2o=
+github.com/opentracing/opentracing-go v1.2.0 h1:uEJPy/1a5RIPAJ0Ov+OIO8OxWu77jEv+1B0VhjKrZUs=
+github.com/opentracing/opentracing-go v1.2.0/go.mod h1:GxEUsuufX4nBwe+T+Wl9TAgYrxe9dPLANfrWvHYVTgc=
+github.com/pgavlin/fx v0.1.6 h1:r9jEg69DhNoCd3Xh0+5mIbdbS3PqWrVWujkY76MFRTU=
+github.com/pgavlin/fx v0.1.6/go.mod h1:KWZJ6fqBBSh8GxHYqwYCf3rYE7Gp2p0N8tJp8xv9u9M=
+github.com/pgavlin/goldmark v1.1.33-0.20200616210433-b5eb04559386 h1:LoCV5cscNVWyK5ChN/uCoIFJz8jZD63VQiGJIRgr6uo=
+github.com/pgavlin/goldmark v1.1.33-0.20200616210433-b5eb04559386/go.mod h1:MRxHTJrf9FhdfNQ8Hdeh9gmHevC9RJE/fu8M3JIGjoE=
+github.com/pjbgf/sha1cd v0.3.0 h1:4D5XXmUUBUl/xQ6IjCkEAbqXskkq/4O7LmGn0AqMDs4=
+github.com/pjbgf/sha1cd v0.3.0/go.mod h1:nZ1rrWOcGJ5uZgEEVL1VUM9iRQiZvWdbZjkKyFzPPsI=
+github.com/pkg/browser v0.0.0-20240102092130-5ac0b6a4141c h1:+mdjkGKdHQG3305AYmdv1U2eRNDiU2ErMBj1gwrq8eQ=
+github.com/pkg/browser v0.0.0-20240102092130-5ac0b6a4141c/go.mod h1:7rwL4CYBLnjLxUqIJNnCWiEdr3bn6IUYi15bNlnbCCU=
+github.com/pkg/errors v0.9.1 h1:FEBLx1zS214owpjy7qsBeixbURkuhQAwrK5UwLGTwt4=
+github.com/pkg/errors v0.9.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
+github.com/pkg/term v1.1.0 h1:xIAAdCMh3QIAy+5FrE8Ad8XoDhEU4ufwbaSozViP9kk=
+github.com/pkg/term v1.1.0/go.mod h1:E25nymQcrSllhX42Ok8MRm1+hyBdHY0dCeiKZ9jpNGw=
+github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM=
+github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
+github.com/prometheus/client_model v0.0.0-20190812154241-14fe0d1b01d4/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA=
+github.com/pulumi/appdash v0.0.0-20231130102222-75f619a67231 h1:vkHw5I/plNdTr435cARxCW6q9gc0S/Yxz7Mkd38pOb0=
+github.com/pulumi/appdash v0.0.0-20231130102222-75f619a67231/go.mod h1:murToZ2N9hNJzewjHBgfFdXhZKjY3z5cYC1VXk+lbFE=
+github.com/pulumi/esc v0.10.0 h1:jzBKzkLVW0mePeanDRfqSQoCJ5yrkux0jIwAkUxpRKE=
+github.com/pulumi/esc v0.10.0/go.mod h1:2Bfa+FWj/xl8CKqRTWbWgDX0SOD4opdQgvYSURTGK2c=
+github.com/pulumi/pulumi/pkg/v3 v3.140.0 h1:/bvHa19HY/6qHWvuAOVII8qr72MDGGczBWlPYlPo3j0=
+github.com/pulumi/pulumi/pkg/v3 v3.140.0/go.mod h1:rcTtSyisd7BzZTugNk/s9zlYgX9S0S10+pha3Tko6yM=
+github.com/pulumi/pulumi/sdk/v3 v3.140.0 h1:+Z/RBvdYg7tBNkBwk4p/FzlV7niBT3TbLAICq/Y0LDU=
+github.com/pulumi/pulumi/sdk/v3 v3.140.0/go.mod h1:PvKsX88co8XuwuPdzolMvew5lZV+4JmZfkeSjj7A6dI=
+github.com/rivo/uniseg v0.1.0/go.mod h1:J6wj4VEh+S6ZtnVlnTBMWIodfgj8LQOQFoIToxlJtxc=
+github.com/rivo/uniseg v0.2.0/go.mod h1:J6wj4VEh+S6ZtnVlnTBMWIodfgj8LQOQFoIToxlJtxc=
+github.com/rivo/uniseg v0.4.4 h1:8TfxU8dW6PdqD27gjM8MVNuicgxIjxpm4K7x4jp8sis=
+github.com/rivo/uniseg v0.4.4/go.mod h1:FN3SvrM+Zdj16jyLfmOkMNblXMcoc8DfTHruCPUcx88=
+github.com/rogpeppe/go-internal v1.12.0 h1:exVL4IDcn6na9z1rAb56Vxr+CgyK3nn3O+epU5NdKM8=
+github.com/rogpeppe/go-internal v1.12.0/go.mod h1:E+RYuTGaKKdloAfM02xzb0FW3Paa99yedzYV+kq4uf4=
+github.com/russross/blackfriday/v2 v2.1.0/go.mod h1:+Rmxgy9KzJVeS9/2gXHxylqXiyQDYRxCVz55jmeOWTM=
+github.com/ryanuber/go-glob v1.0.0 h1:iQh3xXAumdQ+4Ufa5b25cRpC5TYKlno6hsv6Cb3pkBk=
+github.com/ryanuber/go-glob v1.0.0/go.mod h1:807d1WSdnB0XRJzKNil9Om6lcp/3a0v4qIHxIXzX/Yc=
+github.com/sabhiram/go-gitignore v0.0.0-20210923224102-525f6e181f06 h1:OkMGxebDjyw0ULyrTYWeN0UNCCkmCWfjPnIA2W6oviI=
+github.com/sabhiram/go-gitignore v0.0.0-20210923224102-525f6e181f06/go.mod h1:+ePHsJ1keEjQtpvf9HHw0f4ZeJ0TLRsxhunSI2hYJSs=
+github.com/santhosh-tekuri/jsonschema/v5 v5.0.0 h1:TToq11gyfNlrMFZiYujSekIsPd9AmsA2Bj/iv+s4JHE=
+github.com/santhosh-tekuri/jsonschema/v5 v5.0.0/go.mod h1:FKdcjfQW6rpZSnxxUvEA5H/cDPdvJ/SZJQLWWXWGrZ0=
+github.com/segmentio/asm v1.1.3 h1:WM03sfUOENvvKexOLp+pCqgb/WDjsi7EK8gIsICtzhc=
+github.com/segmentio/asm v1.1.3/go.mod h1:Ld3L4ZXGNcSLRg4JBsZ3//1+f/TjYl0Mzen/DQy1EJg=
+github.com/segmentio/encoding v0.3.5 h1:UZEiaZ55nlXGDL92scoVuw00RmiRCazIEmvPSbSvt8Y=
+github.com/segmentio/encoding v0.3.5/go.mod h1:n0JeuIqEQrQoPDGsjo8UNd1iA0U8d8+oHAA4E3G3OxM=
+github.com/sergi/go-diff v1.3.2-0.20230802210424-5b0b94c5c0d3 h1:n661drycOFuPLCN3Uc8sB6B/s6Z4t2xvBgU1htSHuq8=
+github.com/sergi/go-diff v1.3.2-0.20230802210424-5b0b94c5c0d3/go.mod h1:A0bzQcvG0E7Rwjx0REVgAGH58e96+X0MeOfepqsbeW4=
+github.com/sirupsen/logrus v1.7.0/go.mod h1:yWOB1SBYBC5VeMP7gHvWumXLIWorT60ONWic61uBYv0=
+github.com/skeema/knownhosts v1.2.2 h1:Iug2P4fLmDw9f41PB6thxUkNUkJzB5i+1/exaj40L3A=
+github.com/skeema/knownhosts v1.2.2/go.mod h1:xYbVRSPxqBZFrdmDyMmsOs+uX1UZC3nTN3ThzgDxUwo=
+github.com/spf13/cobra v1.8.0 h1:7aJaZx1B85qltLMc546zn58BxxfZdR/W22ej9CFoEf0=
+github.com/spf13/cobra v1.8.0/go.mod h1:WXLWApfZ71AjXPya3WOlMsY9yMs7YeiHhFVlvLyhcho=
+github.com/spf13/pflag v1.0.5 h1:iy+VFUOCP1a+8yFto/drg2CJ5u0yRoB7fZw3DKv/JXA=
+github.com/spf13/pflag v1.0.5/go.mod h1:McXfInJRrz4CZXVZOBLb0bTZqETkiAhM9Iw0y3An2Bg=
+github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
+github.com/stretchr/objx v0.4.0/go.mod h1:YvHI0jy2hoMjB+UWwv71VJQ9isScKT/TqJzVSSt89Yw=
+github.com/stretchr/objx v0.5.0/go.mod h1:Yh+to48EsGEfYuaHDzXPcE3xhTkx73EhmCGUpEOglKo=
+github.com/stretchr/objx v0.5.2 h1:xuMeJ0Sdp5ZMRXx/aWO6RZxdr3beISkG5/G/aIRr3pY=
+github.com/stretchr/objx v0.5.2/go.mod h1:FRsXN1f5AsAjCGJKqEizvkpNtU+EGNCLh3NxZ/8L+MA=
+github.com/stretchr/testify v1.2.2/go.mod h1:a8OnRcib4nhh0OaRAV+Yts87kKdq0PP7pXfy6kDkUVs=
+github.com/stretchr/testify v1.3.0/go.mod h1:M5WIy9Dh21IEIfnGCwXGc5bZfKNJtfHm1UVUgZn+9EI=
+github.com/stretchr/testify v1.4.0/go.mod h1:j7eGeouHqKxXV5pUuKE4zz7dFj8WfuZ+81PSLYec5m4=
+github.com/stretchr/testify v1.5.1/go.mod h1:5W2xD1RspED5o8YsWQXVCued0rvSQ+mT+I5cxcmMvtA=
+github.com/stretchr/testify v1.6.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
+github.com/stretchr/testify v1.7.0/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
+github.com/stretchr/testify v1.7.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
+github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO+kdMU+MU=
+github.com/stretchr/testify v1.8.1/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4=
+github.com/stretchr/testify v1.9.0 h1:HtqpIVDClZ4nwg75+f6Lvsy/wHu+3BoSGCbBAcpTsTg=
+github.com/stretchr/testify v1.9.0/go.mod h1:r2ic/lqez/lEtzL7wO/rwa5dbSLXVDPFyf8C91i36aY=
+github.com/texttheater/golang-levenshtein v1.0.1 h1:+cRNoVrfiwufQPhoMzB6N0Yf/Mqajr6t1lOv8GyGE2U=
+github.com/texttheater/golang-levenshtein v1.0.1/go.mod h1:PYAKrbF5sAiq9wd+H82hs7gNaen0CplQ9uvm6+enD/8=
+github.com/uber/jaeger-client-go v2.30.0+incompatible h1:D6wyKGCecFaSRUpo8lCVbaOOb6ThwMmTEbhRwtKR97o=
+github.com/uber/jaeger-client-go v2.30.0+incompatible/go.mod h1:WVhlPFC8FDjOFMMWRy2pZqQJSXxYSwNYOkTr/Z6d3Kk=
+github.com/uber/jaeger-lib v2.4.1+incompatible h1:td4jdvLcExb4cBISKIpHuGoVXh+dVKhn2Um6rjCsSsg=
+github.com/uber/jaeger-lib v2.4.1+incompatible/go.mod h1:ComeNDZlWwrWnDv8aPp0Ba6+uUTzImX/AauajbLI56U=
+github.com/xanzy/ssh-agent v0.3.3 h1:+/15pJfg/RsTxqYcX6fHqOXZwwMP+2VyYWJeWM2qQFM=
+github.com/xanzy/ssh-agent v0.3.3/go.mod h1:6dzNDKs0J9rVPHPhaGCukekBHKqfl+L3KghI1Bc68Uw=
+github.com/xeipuuv/gojsonpointer v0.0.0-20180127040702-4e3ac2762d5f h1:J9EGpcZtP0E/raorCMxlFGSTBrsSlaDGf3jU/qvAE2c=
+github.com/xeipuuv/gojsonpointer v0.0.0-20180127040702-4e3ac2762d5f/go.mod h1:N2zxlSyiKSe5eX1tZViRH5QA0qijqEDrYZiPEAiq3wU=
+github.com/xeipuuv/gojsonreference v0.0.0-20180127040603-bd5ef7bd5415 h1:EzJWgHovont7NscjpAxXsDA8S8BMYve8Y5+7cuRE7R0=
+github.com/xeipuuv/gojsonreference v0.0.0-20180127040603-bd5ef7bd5415/go.mod h1:GwrjFmJcFw6At/Gs6z4yjiIwzuJ1/+UwLxMQDVQXShQ=
+github.com/xeipuuv/gojsonschema v1.2.0 h1:LhYJRs+L4fBtjZUfuSZIKGeVu0QRy8e5Xi7D17UxZ74=
+github.com/xeipuuv/gojsonschema v1.2.0/go.mod h1:anYRn/JVcOK2ZgGU+IjEV4nwlhoK5sQluxsYJ78Id3Y=
+github.com/yuin/goldmark v1.1.27/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
+github.com/yuin/goldmark v1.2.1/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
+github.com/yuin/goldmark v1.4.13/go.mod h1:6yULJ656Px+3vBD8DxQVa3kxgyrAnzto9xy5taEt/CY=
+github.com/zclconf/go-cty v1.13.2 h1:4GvrUxe/QUDYuJKAav4EYqdM47/kZa672LwmXFmEKT0=
+github.com/zclconf/go-cty v1.13.2/go.mod h1:YKQzy/7pZ7iq2jNFzy5go57xdxdWoLLpaEp4u238AE0=
+go.opencensus.io v0.24.0 h1:y73uSU6J157QMP2kn2r30vwW1A2W2WFwSCGnAVxeaD0=
+go.opencensus.io v0.24.0/go.mod h1:vNK8G9p7aAivkbmorf4v+7Hgx+Zs0yY+0fOtgBfjQKo=
+go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.49.0 h1:4Pp6oUg3+e/6M4C0A/3kJ2VYa++dsWVTtGgLVj5xtHg=
+go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.49.0/go.mod h1:Mjt1i1INqiaoZOMGR1RIUJN+i3ChKoFRqzrRQhlkbs0=
+go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.49.0 h1:jq9TW8u3so/bN+JPT166wjOI6/vQPF6Xe7nMNIltagk=
+go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.49.0/go.mod h1:p8pYQP+m5XfbZm9fxtSKAbM6oIllS7s2AfxrChvc7iw=
+go.opentelemetry.io/otel v1.24.0 h1:0LAOdjNmQeSTzGBzduGe/rU4tZhMwL5rWgtp9Ku5Jfo=
+go.opentelemetry.io/otel v1.24.0/go.mod h1:W7b9Ozg4nkF5tWI5zsXkaKKDjdVjpD4oAt9Qi/MArHo=
+go.opentelemetry.io/otel/metric v1.24.0 h1:6EhoGWWK28x1fbpA4tYTOWBkPefTDQnb8WSGXlc88kI=
+go.opentelemetry.io/otel/metric v1.24.0/go.mod h1:VYhLe1rFfxuTXLgj4CBiyz+9WYBA8pNGJgDcSFRKBco=
+go.opentelemetry.io/otel/sdk v1.22.0 h1:6coWHw9xw7EfClIC/+O31R8IY3/+EiRFHevmHafB2Gw=
+go.opentelemetry.io/otel/sdk v1.22.0/go.mod h1:iu7luyVGYovrRpe2fmj3CVKouQNdTOkxtLzPvPz1DOc=
+go.opentelemetry.io/otel/trace v1.24.0 h1:CsKnnL4dUAr/0llH9FKuc698G04IrpWV0MQA/Y1YELI=
+go.opentelemetry.io/otel/trace v1.24.0/go.mod h1:HPc3Xr/cOApsBI154IU0OI0HJexz+aw5uPdbs3UCjNU=
+go.uber.org/atomic v1.9.0 h1:ECmE8Bn/WFTYwEW/bpKD3M8VtR/zQVbavAoalC1PYyE=
+go.uber.org/atomic v1.9.0/go.mod h1:fEN4uk6kAWBTFdckzkM89CLk9XfWZrxpCo0nPH17wJc=
+gocloud.dev v0.37.0 h1:XF1rN6R0qZI/9DYjN16Uy0durAmSlf58DHOcb28GPro=
+gocloud.dev v0.37.0/go.mod h1:7/O4kqdInCNsc6LqgmuFnS0GRew4XNNYWpA44yQnwco=
+gocloud.dev/secrets/hashivault v0.37.0 h1:5ehGtUBP29DFAgAs6bPw7fVSgqQ3TxaoK2xVcLp1x+c=
+gocloud.dev/secrets/hashivault v0.37.0/go.mod h1:4ClUWjBfP8wLdGts56acjHz3mWLuATMoH9vi74FjIv8=
+golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
+golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
+golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
+golang.org/x/crypto v0.0.0-20210921155107-089bfa567519/go.mod h1:GvvjBRRGRdwPK5ydBHafDWAxML/pGHZbMvKqRZ5+Abc=
+golang.org/x/crypto v0.0.0-20220622213112-05595931fe9d/go.mod h1:IxCIyHEi3zRg3s0A5j5BB6A9Jmi73HwBIUl50j+osU4=
+golang.org/x/crypto v0.3.1-0.20221117191849-2c476679df9a/go.mod h1:hebNnKkNXi2UzZN1eVRvBB7co0a+JxK6XbPiWVs/3J4=
+golang.org/x/crypto v0.7.0/go.mod h1:pYwdfH91IfpZVANVyUOhSIPZaFoJGxTFbZhFTx+dXZU=
+golang.org/x/crypto v0.13.0/go.mod h1:y6Z2r+Rw4iayiXXAIxJIDAJ1zMW4yaTpebo8fPOliYc=
+golang.org/x/crypto v0.18.0/go.mod h1:R0j02AL6hcrfOiy9T4ZYp/rcWeMxM3L6QYxlOuEG1mg=
+golang.org/x/crypto v0.19.0/go.mod h1:Iy9bg/ha4yyC70EfRS8jz+B6ybOBKMaSxLj6P6oBDfU=
+golang.org/x/crypto v0.26.0 h1:RrRspgV4mU+YwB4FYnuBoKsUapNIL5cohGAmSH3azsw=
+golang.org/x/crypto v0.26.0/go.mod h1:GY7jblb9wI+FOo5y8/S2oY4zWP07AkOJ4+jxCqdqn54=
+golang.org/x/exp v0.0.0-20190121172915-509febef88a4/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
+golang.org/x/exp v0.0.0-20240604190554-fc45aab8b7f8 h1:LoYXNGAShUG3m/ehNk4iFctuhGX/+R1ZpfJ4/ia80JM=
+golang.org/x/exp v0.0.0-20240604190554-fc45aab8b7f8/go.mod h1:jj3sYF3dwk5D+ghuXyeI3r5MFf+NT2An6/9dOA95KSI=
+golang.org/x/lint v0.0.0-20181026193005-c67002cb31c3/go.mod h1:UVdnD1Gm6xHRNCYTkRU2/jEulfH38KcIWyp/GAMgvoE=
+golang.org/x/lint v0.0.0-20190227174305-5b3e6a55c961/go.mod h1:wehouNa3lNwaWXcvxsM5YxQ5yQlVC4a0KAMCusXpPoU=
+golang.org/x/lint v0.0.0-20190313153728-d0100b6bd8b3/go.mod h1:6SW0HCj/g11FgYtHlgUYUwCkIfeOF89ocIRzGO/8vkc=
+golang.org/x/lint v0.0.0-20200302205851-738671d3881b/go.mod h1:3xt1FjdF8hUf6vQPIChWIBhFzV8gjjsPE/fR3IyQdNY=
+golang.org/x/mod v0.1.1-0.20191105210325-c90efee705ee/go.mod h1:QqPTAvyqsEbceGzBzNggFXnrqF1CaUcvgkdR5Ot7KZg=
+golang.org/x/mod v0.2.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
+golang.org/x/mod v0.3.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
+golang.org/x/mod v0.6.0-dev.0.20220419223038-86c51ed26bb4/go.mod h1:jJ57K6gSWd91VN4djpZkiMVwK6gcyfeH4XE8wZrZaV4=
+golang.org/x/mod v0.8.0/go.mod h1:iBbtSCu2XBx23ZKBPSOrRkjjQPZFPuis4dIYUhu/chs=
+golang.org/x/mod v0.12.0/go.mod h1:iBbtSCu2XBx23ZKBPSOrRkjjQPZFPuis4dIYUhu/chs=
+golang.org/x/mod v0.14.0/go.mod h1:hTbmBsO62+eylJbnUtE2MGJUyE7QWk4xUqPFrRgJ+7c=
+golang.org/x/mod v0.18.0 h1:5+9lSbEzPSdWkH32vYPBwEpX8KwDbM52Ud9xBUvNlb0=
+golang.org/x/mod v0.18.0/go.mod h1:hTbmBsO62+eylJbnUtE2MGJUyE7QWk4xUqPFrRgJ+7c=
+golang.org/x/net v0.0.0-20180724234803-3673e40ba225/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
+golang.org/x/net v0.0.0-20180826012351-8a410e7b638d/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
+golang.org/x/net v0.0.0-20190213061140-3a22650c66bd/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
+golang.org/x/net v0.0.0-20190311183353-d8887717615a/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg=
+golang.org/x/net v0.0.0-20190404232315-eb5bcb51f2a3/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg=
+golang.org/x/net v0.0.0-20190620200207-3b0461eec859/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
+golang.org/x/net v0.0.0-20200226121028-0de0cce0169b/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
+golang.org/x/net v0.0.0-20200421231249-e086a090c8fd/go.mod h1:qpuaurCH72eLCgpAm/N6yyVIVM9cpaDIP3A8BGJEC5A=
+golang.org/x/net v0.0.0-20201021035429-f5854403a974/go.mod h1:sp8m0HH+o8qH0wwXwYZr8TS3Oi6o0r6Gce1SSxlDquU=
+golang.org/x/net v0.0.0-20201110031124-69a78807bb2b/go.mod h1:sp8m0HH+o8qH0wwXwYZr8TS3Oi6o0r6Gce1SSxlDquU=
+golang.org/x/net v0.0.0-20210226172049-e18ecbb05110/go.mod h1:m0MpNAwzfU5UDzcl9v0D8zg8gWTRqZa9RBIspLL5mdg=
+golang.org/x/net v0.0.0-20211112202133-69e39bad7dc2/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y=
+golang.org/x/net v0.0.0-20220722155237-a158d28d115b/go.mod h1:XRhObCWvk6IyKnWLug+ECip1KBveYUHfp+8e9klMJ9c=
+golang.org/x/net v0.2.0/go.mod h1:KqCZLdyyvdV855qA2rE3GC2aiw5xGR5TEjj8smXukLY=
+golang.org/x/net v0.6.0/go.mod h1:2Tu9+aMcznHK/AK1HMvgo6xiTLG5rD5rZLDS+rp2Bjs=
+golang.org/x/net v0.8.0/go.mod h1:QVkue5JL9kW//ek3r6jTKnTFis1tRmNAW2P1shuFdJc=
+golang.org/x/net v0.10.0/go.mod h1:0qNGK6F8kojg2nk9dLZ2mShWaEBan6FAoqfSigmmuDg=
+golang.org/x/net v0.15.0/go.mod h1:idbUs1IY1+zTqbi8yxTbhexhEEk5ur9LInksu6HrEpk=
+golang.org/x/net v0.20.0/go.mod h1:z8BVo6PvndSri0LbOE3hAn0apkU+1YvI6E70E9jsnvY=
+golang.org/x/net v0.28.0 h1:a9JDOJc5GMUJ0+UDqmLT86WiEy7iWyIhz8gz8E4e5hE=
+golang.org/x/net v0.28.0/go.mod h1:yqtgsTWOOnlGLG9GFRrK3++bGOUEkNBoHZc8MEDWPNg=
+golang.org/x/oauth2 v0.0.0-20180821212333-d2e6202438be/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U=
+golang.org/x/oauth2 v0.22.0 h1:BzDx2FehcG7jJwgWLELCdmLuxk2i+x9UDpSiss2u0ZA=
+golang.org/x/oauth2 v0.22.0/go.mod h1:XYTD2NtWslqkgxebSiOHnXEap4TF09sJSc7H1sXbhtI=
+golang.org/x/sync v0.0.0-20180314180146-1d60e4601c6f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.0.0-20181108010431-42b317875d0f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.0.0-20190423024810-112230192c58/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.0.0-20190911185100-cd5d95a43a6e/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.0.0-20201020160332-67f06af15bc9/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.0.0-20220722155255-886fb9371eb4/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.1.0/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.3.0/go.mod h1:FU7BRWz2tNW+3quACPkgCx/L+uEAv1htQ0V83Z9Rj+Y=
+golang.org/x/sync v0.6.0/go.mod h1:Czt+wKu1gCyEFDUtn0jG5QVvpJ6rzVqr5aXyt9drQfk=
+golang.org/x/sync v0.8.0 h1:3NFvSEYkUoMifnESzZl15y791HH1qU2xm6eCJU5ZPXQ=
+golang.org/x/sync v0.8.0/go.mod h1:Czt+wKu1gCyEFDUtn0jG5QVvpJ6rzVqr5aXyt9drQfk=
+golang.org/x/sys v0.0.0-20180830151530-49385e6e1522/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
+golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
+golang.org/x/sys v0.0.0-20190222072716-a9d3bda3a223/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
+golang.org/x/sys v0.0.0-20190412213103-97732733099d/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20190626221950-04f50cda93cb/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20191026070338-33540a1f6037/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200323222414-85ca7c5b95cd/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200909081042-eff7692f9009/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200930185726-fdedc70b468f/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20201119102817-f84b799fce68/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20210124154548-22da62e12c0c/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20210423082822-04245dca01da/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20210615035016-665e8c7367d1/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.0.0-20211110154304-99a53858aa08/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.0.0-20220520151302-bc2c85ada10a/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.0.0-20220715151400-c0bba94af5f8/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.0.0-20220722155257-8c9f86f7a55f/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.1.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.2.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.3.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.5.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.8.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.12.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.16.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
+golang.org/x/sys v0.17.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
+golang.org/x/sys v0.24.0 h1:Twjiwq9dn6R1fQcyiK+wQyHWfaz/BJB+YIpzU/Cv3Xg=
+golang.org/x/sys v0.24.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
+golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo=
+golang.org/x/term v0.0.0-20210927222741-03fcf44c2211/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8=
+golang.org/x/term v0.2.0/go.mod h1:TVmDHMZPmdnySmBfhjOoOdhjzdE1h4u1VwSiw2l1Nuc=
+golang.org/x/term v0.5.0/go.mod h1:jMB1sMXY+tzblOD4FWmEbocvup2/aLOaQEp7JmGp78k=
+golang.org/x/term v0.6.0/go.mod h1:m6U89DPEgQRMq3DNkDClhWw02AUbt2daBVO4cn4Hv9U=
+golang.org/x/term v0.8.0/go.mod h1:xPskH00ivmX89bAKVGSKKtLOWNx2+17Eiy94tnKShWo=
+golang.org/x/term v0.12.0/go.mod h1:owVbMEjm3cBLCHdkQu9b1opXd4ETQWc3BhuQGKgXgvU=
+golang.org/x/term v0.16.0/go.mod h1:yn7UURbUtPyrVJPGPq404EukNFxcm/foM+bV/bfcDsY=
+golang.org/x/term v0.17.0/go.mod h1:lLRBjIVuehSbZlaOtGMbcMncT+aqLLLmKrsjNrUguwk=
+golang.org/x/term v0.23.0 h1:F6D4vR+EHoL9/sWAWgAR1H2DcHr4PareCbAaCo1RpuU=
+golang.org/x/term v0.23.0/go.mod h1:DgV24QBUrK6jhZXl+20l6UWznPlwAHm1Q1mGHtydmSk=
+golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
+golang.org/x/text v0.3.3/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
+golang.org/x/text v0.3.6/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
+golang.org/x/text v0.3.7/go.mod h1:u+2+/6zg+i71rQMx5EYifcz6MCKuco9NR6JIITiCfzQ=
+golang.org/x/text v0.4.0/go.mod h1:mrYo+phRRbMaCq/xk9113O4dZlRixOauAjOtrjsXDZ8=
+golang.org/x/text v0.7.0/go.mod h1:mrYo+phRRbMaCq/xk9113O4dZlRixOauAjOtrjsXDZ8=
+golang.org/x/text v0.8.0/go.mod h1:e1OnstbJyHTd6l/uOt8jFFHp6TRDWZR/bV3emEE/zU8=
+golang.org/x/text v0.9.0/go.mod h1:e1OnstbJyHTd6l/uOt8jFFHp6TRDWZR/bV3emEE/zU8=
+golang.org/x/text v0.13.0/go.mod h1:TvPlkZtksWOMsz7fbANvkp4WM8x/WCo/om8BMLbz+aE=
+golang.org/x/text v0.14.0/go.mod h1:18ZOQIKpY8NJVqYksKHtTdi31H5itFRjB5/qKTNYzSU=
+golang.org/x/text v0.17.0 h1:XtiM5bkSOt+ewxlOE/aE/AKEHibwj/6gvWMl9Rsh0Qc=
+golang.org/x/text v0.17.0/go.mod h1:BuEKDfySbSR4drPmRPG/7iBdf8hvFMuRexcpahXilzY=
+golang.org/x/time v0.5.0 h1:o7cqy6amK/52YcAKIPlM3a+Fpj35zvRj2TP+e1xFSfk=
+golang.org/x/time v0.5.0/go.mod h1:3BpzKBy/shNhVucY/MWOyx10tF3SFh9QdLuxbVysPQM=
+golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
+golang.org/x/tools v0.0.0-20181030221726-6c7e314b6563/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
+golang.org/x/tools v0.0.0-20190114222345-bf090417da8b/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
+golang.org/x/tools v0.0.0-20190226205152-f727befe758c/go.mod h1:9Yl7xja0Znq3iFh3HoIrodX9oNMXvdceNzlUR8zjMvY=
+golang.org/x/tools v0.0.0-20190311212946-11955173bddd/go.mod h1:LCzVGOaR6xXOjkQ3onu1FJEFr0SW1gC7cKk1uF8kGRs=
+golang.org/x/tools v0.0.0-20190524140312-2c0ae7006135/go.mod h1:RgjU9mgBXZiqYHBnxXauZ1Gv1EHHAz9KjViQ78xBX0Q=
+golang.org/x/tools v0.0.0-20191119224855-298f0cb1881e/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
+golang.org/x/tools v0.0.0-20200130002326-2f3ba24bd6e7/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
+golang.org/x/tools v0.0.0-20200619180055-7c47624df98f/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
+golang.org/x/tools v0.0.0-20210106214847-113979e3529a/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
+golang.org/x/tools v0.1.12/go.mod h1:hNGJHUnrk76NpqgfD5Aqm5Crs+Hm0VOH/i9J2+nxYbc=
+golang.org/x/tools v0.6.0/go.mod h1:Xwgl3UAJ/d3gWutnCtw505GrjyAbvKui8lOU390QaIU=
+golang.org/x/tools v0.13.0/go.mod h1:HvlwmtVNQAhOuCjW7xxvovg8wbNq7LwfXh/k7wXUl58=
+golang.org/x/tools v0.17.0/go.mod h1:xsh6VxdV005rRVaS6SSAf9oiAqljS7UZUacMZ8Bnsps=
+golang.org/x/tools v0.22.0 h1:gqSGLZqv+AI9lIQzniJ0nZDRG5GBPsSi+DRNHWNz6yA=
+golang.org/x/tools v0.22.0/go.mod h1:aCwcsjqvq7Yqt6TNyX7QMU2enbQ/Gt0bo6krSeEri+c=
+golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
+golang.org/x/xerrors v0.0.0-20191011141410-1b5146add898/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
+golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
+golang.org/x/xerrors v0.0.0-20200804184101-5ec99f83aff1/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
+golang.org/x/xerrors v0.0.0-20231012003039-104605ab7028 h1:+cNy6SZtPcJQH3LJVLOSmiC7MMxXNOb3PU/VUEz+EhU=
+golang.org/x/xerrors v0.0.0-20231012003039-104605ab7028/go.mod h1:NDW/Ps6MPRej6fsCIbMTohpP40sJ/P/vI1MoTEGwX90=
+google.golang.org/api v0.169.0 h1:QwWPy71FgMWqJN/l6jVlFHUa29a7dcUy02I8o799nPY=
+google.golang.org/api v0.169.0/go.mod h1:gpNOiMA2tZ4mf5R9Iwf4rK/Dcz0fbdIgWYWVoxmsyLg=
+google.golang.org/appengine v1.1.0/go.mod h1:EbEs0AVv82hx2wNQdGPgUI5lhzA/G0D9YwlJXL52JkM=
+google.golang.org/appengine v1.4.0/go.mod h1:xpcJRLb0r/rnEns0DIKYYv+WjYCduHsrkT7/EB5XEv4=
+google.golang.org/genproto v0.0.0-20180817151627-c66870c02cf8/go.mod h1:JiN7NxoALGmiZfu7CAH4rXhgtRTLTxftemlI0sWmxmc=
+google.golang.org/genproto v0.0.0-20190819201941-24fa4b261c55/go.mod h1:DMBHOl98Agz4BDEuKkezgsaosCRResVns1a3J2ZsMNc=
+google.golang.org/genproto v0.0.0-20200526211855-cb27e3aa2013/go.mod h1:NbSheEEYHJ7i3ixzK3sjbqSGDJWnxyFXZblF3eUsNvo=
+google.golang.org/genproto v0.0.0-20240311173647-c811ad7063a7 h1:ImUcDPHjTrAqNhlOkSocDLfG9rrNHH7w7uoKWPaWZ8s=
+google.golang.org/genproto v0.0.0-20240311173647-c811ad7063a7/go.mod h1:/3XmxOjePkvmKrHuBy4zNFw7IzxJXtAgdpXi8Ll990U=
+google.golang.org/genproto/googleapis/api v0.0.0-20240814211410-ddb44dafa142 h1:wKguEg1hsxI2/L3hUYrpo1RVi48K+uTyzKqprwLXsb8=
+google.golang.org/genproto/googleapis/api v0.0.0-20240814211410-ddb44dafa142/go.mod h1:d6be+8HhtEtucleCbxpPW9PA9XwISACu8nvpPqF0BVo=
+google.golang.org/genproto/googleapis/rpc v0.0.0-20240814211410-ddb44dafa142 h1:e7S5W7MGGLaSu8j3YjdezkZ+m1/Nm0uRVRMEMGk26Xs=
+google.golang.org/genproto/googleapis/rpc v0.0.0-20240814211410-ddb44dafa142/go.mod h1:UqMtugtsSgubUsoxbuAoiCXvqvErP7Gf0so0mK9tHxU=
+google.golang.org/grpc v1.19.0/go.mod h1:mqu4LbDTu4XGKhr4mRzUsmM4RtVoemTSY81AxZiDr8c=
+google.golang.org/grpc v1.23.0/go.mod h1:Y5yQAOtifL1yxbo5wqy6BxZv8vAUGQwXBOALyacEbxg=
+google.golang.org/grpc v1.25.1/go.mod h1:c3i+UQWmh7LiEpx4sFZnkU36qjEYZ0imhYfXVyQciAY=
+google.golang.org/grpc v1.27.0/go.mod h1:qbnxyOmOxrQa7FizSgH+ReBfzJrCY1pSN7KXBS8abTk=
+google.golang.org/grpc v1.33.2/go.mod h1:JMHMWHQWaTccqQQlmk3MJZS+GWXOdAesneDmEnv2fbc=
+google.golang.org/grpc v1.67.1 h1:zWnc1Vrcno+lHZCOofnIMvycFcc0QRGIzm9dhnDX68E=
+google.golang.org/grpc v1.67.1/go.mod h1:1gLDyUQU7CTLJI90u3nXZ9ekeghjeM7pTDZlqFNg2AA=
+google.golang.org/protobuf v0.0.0-20200109180630-ec00e32a8dfd/go.mod h1:DFci5gLYBciE7Vtevhsrf46CRTquxDuWsQurQQe4oz8=
+google.golang.org/protobuf v0.0.0-20200221191635-4d8936d0db64/go.mod h1:kwYJMbMJ01Woi6D6+Kah6886xMZcty6N08ah7+eCXa0=
+google.golang.org/protobuf v0.0.0-20200228230310-ab0ca4ff8a60/go.mod h1:cfTl7dwQJ+fmap5saPgwCLgHXTUD7jkjRqWcaiX5VyM=
+google.golang.org/protobuf v1.20.1-0.20200309200217-e05f789c0967/go.mod h1:A+miEFZTKqfCUM6K7xSMQL9OKL/b6hQv+e19PK+JZNE=
+google.golang.org/protobuf v1.21.0/go.mod h1:47Nbq4nVaFHyn7ilMalzfO3qCViNmqZ2kzikPIcrTAo=
+google.golang.org/protobuf v1.22.0/go.mod h1:EGpADcykh3NcUnDUJcl1+ZksZNG86OlYog2l/sGQquU=
+google.golang.org/protobuf v1.23.0/go.mod h1:EGpADcykh3NcUnDUJcl1+ZksZNG86OlYog2l/sGQquU=
+google.golang.org/protobuf v1.23.1-0.20200526195155-81db48ad09cc/go.mod h1:EGpADcykh3NcUnDUJcl1+ZksZNG86OlYog2l/sGQquU=
+google.golang.org/protobuf v1.25.0/go.mod h1:9JNX74DMeImyA3h4bdi1ymwjUzf21/xIlbajtzgsN7c=
+google.golang.org/protobuf v1.35.1 h1:m3LfL6/Ca+fqnjnlqQXNpFPABW1UD7mjh8KO2mKFytA=
+google.golang.org/protobuf v1.35.1/go.mod h1:9fA7Ob0pmnwhb644+1+CVWFRbNajQ6iRojtC/QF5bRE=
+gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
+gopkg.in/check.v1 v1.0.0-20190902080502-41f04d3bba15/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
+gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c h1:Hei/4ADfdWqJk1ZMxUNpqntNwaWcugrBjAiHlqqRiVk=
+gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c/go.mod h1:JHkPIbrfpd72SG/EVd6muEfDQjcINNoR0C8j2r3qZ4Q=
+gopkg.in/warnings.v0 v0.1.2 h1:wFXVbFY8DY5/xOe1ECiWdKCzZlxgshcYVNkBHstARME=
+gopkg.in/warnings.v0 v0.1.2/go.mod h1:jksf8JmL6Qr/oQM2OXTHunEvvTAsrWBLb6OOjuVWRNI=
+gopkg.in/yaml.v2 v2.2.2/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
+gopkg.in/yaml.v2 v2.2.8/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
+gopkg.in/yaml.v2 v2.4.0 h1:D8xgwECY7CYvx+Y2n4sBz93Jn9JRvxdiyyo8CTfuKaY=
+gopkg.in/yaml.v2 v2.4.0/go.mod h1:RDklbk79AGWmwhnvt/jBztapEOGDOx6ZbXqjP6csGnQ=
+gopkg.in/yaml.v3 v3.0.0-20200313102051-9f266ea9e77c/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
+gopkg.in/yaml.v3 v3.0.1 h1:fxVm/GzAzEWqLHuvctI91KS9hhNmmWOoWu0XTYJS7CA=
+gopkg.in/yaml.v3 v3.0.1/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
+honnef.co/go/tools v0.0.0-20190102054323-c2f93a96b099/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
+honnef.co/go/tools v0.0.0-20190523083050-ea95bdfd59fc/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
+lukechampine.com/frand v1.4.2 h1:RzFIpOvkMXuPMBb9maa4ND4wjBn71E1Jpf8BzJHMaVw=
+lukechampine.com/frand v1.4.2/go.mod h1:4S/TM2ZgrKejMcKMbeLjISpJMO+/eZ1zu3vYX9dtj3s=
+pgregory.net/rapid v0.6.1 h1:4eyrDxyht86tT4Ztm+kvlyNBLIk071gR+ZQdhphc9dQ=
+pgregory.net/rapid v0.6.1/go.mod h1:PY5XlDGj0+V1FCq0o192FdRhpKHGTRIWBgqjDBTrq04=
diff --git a/provider/cmd/pulumi-resource-crowdstrike/schema.json b/provider/cmd/pulumi-resource-crowdstrike/schema.json
index 2e3f92f..d723814 100644
--- a/provider/cmd/pulumi-resource-crowdstrike/schema.json
+++ b/provider/cmd/pulumi-resource-crowdstrike/schema.json
@@ -1680,7 +1680,7 @@
}
},
"crowdstrike:index/preventionPolicyLinux:PreventionPolicyLinux": {
- "description": "This resource allows you to manage CrowdStrike Falcon prevention policies for Linux hosts. Prevention policies allow you to manage what activity will trigger detections and preventions on your hosts.\n\n## API Scopes\n\nThe following API scopes are required:\n\n- Prevention policies | Read \u0026 Write\n\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as crowdstrike from \"@crowdstrike/pulumi\";\n\nconst example = new crowdstrike.PreventionPolicyLinux(\"example\", {\n enabled: true,\n description: \"Made with Pulumi\",\n hostGroups: [\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\"],\n ioaRuleGroups: [\"ed334b3243bc4b6bb8e7d40a2ecd86fa\"],\n cloudAntiMalware: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n sensorAntiMalware: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n quarantine: true,\n customBlocking: true,\n preventSuspiciousProcesses: true,\n scriptBasedExecutionMonitoring: true,\n uploadUnknownExecutables: true,\n uploadUnknownDetectionRelatedExecutables: true,\n driftPrevention: true,\n emailProtocolVisibility: true,\n filesystemVisibility: true,\n ftpVisibility: true,\n httpVisibility: true,\n networkVisibility: true,\n tlsVisibility: true,\n});\nexport const preventionPolicyLinux = example;\n```\n```python\nimport pulumi\nimport crowdstrike_pulumi as crowdstrike\n\nexample = crowdstrike.PreventionPolicyLinux(\"example\",\n enabled=True,\n description=\"Made with Pulumi\",\n host_groups=[\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\"],\n ioa_rule_groups=[\"ed334b3243bc4b6bb8e7d40a2ecd86fa\"],\n cloud_anti_malware={\n \"detection\": \"MODERATE\",\n \"prevention\": \"CAUTIOUS\",\n },\n sensor_anti_malware={\n \"detection\": \"MODERATE\",\n \"prevention\": \"CAUTIOUS\",\n },\n quarantine=True,\n custom_blocking=True,\n prevent_suspicious_processes=True,\n script_based_execution_monitoring=True,\n upload_unknown_executables=True,\n upload_unknown_detection_related_executables=True,\n drift_prevention=True,\n email_protocol_visibility=True,\n filesystem_visibility=True,\n ftp_visibility=True,\n http_visibility=True,\n network_visibility=True,\n tls_visibility=True)\npulumi.export(\"preventionPolicyLinux\", example)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Crowdstrike = CrowdStrike.Crowdstrike;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Crowdstrike.PreventionPolicyLinux(\"example\", new()\n {\n Enabled = true,\n Description = \"Made with Pulumi\",\n HostGroups = new[]\n {\n \"d6e3c1e1b3d0467da0fowc96a5e6ecb5\",\n },\n IoaRuleGroups = new[]\n {\n \"ed334b3243bc4b6bb8e7d40a2ecd86fa\",\n },\n CloudAntiMalware = new Crowdstrike.Inputs.PreventionPolicyLinuxCloudAntiMalwareArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n SensorAntiMalware = new Crowdstrike.Inputs.PreventionPolicyLinuxSensorAntiMalwareArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n Quarantine = true,\n CustomBlocking = true,\n PreventSuspiciousProcesses = true,\n ScriptBasedExecutionMonitoring = true,\n UploadUnknownExecutables = true,\n UploadUnknownDetectionRelatedExecutables = true,\n DriftPrevention = true,\n EmailProtocolVisibility = true,\n FilesystemVisibility = true,\n FtpVisibility = true,\n HttpVisibility = true,\n NetworkVisibility = true,\n TlsVisibility = true,\n });\n\n return new Dictionary\u003cstring, object?\u003e\n {\n [\"preventionPolicyLinux\"] = example,\n };\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/crowdstrike/pulumi-crowdstrike/sdk/go/crowdstrike\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := crowdstrike.NewPreventionPolicyLinux(ctx, \"example\", \u0026crowdstrike.PreventionPolicyLinuxArgs{\n\t\t\tEnabled: pulumi.Bool(true),\n\t\t\tDescription: pulumi.String(\"Made with Pulumi\"),\n\t\t\tHostGroups: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\"),\n\t\t\t},\n\t\t\tIoaRuleGroups: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"ed334b3243bc4b6bb8e7d40a2ecd86fa\"),\n\t\t\t},\n\t\t\tCloudAntiMalware: \u0026crowdstrike.PreventionPolicyLinuxCloudAntiMalwareArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tSensorAntiMalware: \u0026crowdstrike.PreventionPolicyLinuxSensorAntiMalwareArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tQuarantine: pulumi.Bool(true),\n\t\t\tCustomBlocking: pulumi.Bool(true),\n\t\t\tPreventSuspiciousProcesses: pulumi.Bool(true),\n\t\t\tScriptBasedExecutionMonitoring: pulumi.Bool(true),\n\t\t\tUploadUnknownExecutables: pulumi.Bool(true),\n\t\t\tUploadUnknownDetectionRelatedExecutables: pulumi.Bool(true),\n\t\t\tDriftPrevention: pulumi.Bool(true),\n\t\t\tEmailProtocolVisibility: pulumi.Bool(true),\n\t\t\tFilesystemVisibility: pulumi.Bool(true),\n\t\t\tFtpVisibility: pulumi.Bool(true),\n\t\t\tHttpVisibility: pulumi.Bool(true),\n\t\t\tNetworkVisibility: pulumi.Bool(true),\n\t\t\tTlsVisibility: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tctx.Export(\"preventionPolicyLinux\", example)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.crowdstrike.PreventionPolicyLinux;\nimport com.pulumi.crowdstrike.PreventionPolicyLinuxArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyLinuxCloudAntiMalwareArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyLinuxSensorAntiMalwareArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new PreventionPolicyLinux(\"example\", PreventionPolicyLinuxArgs.builder()\n .enabled(true)\n .description(\"Made with Pulumi\")\n .hostGroups(\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\")\n .ioaRuleGroups(\"ed334b3243bc4b6bb8e7d40a2ecd86fa\")\n .cloudAntiMalware(PreventionPolicyLinuxCloudAntiMalwareArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .sensorAntiMalware(PreventionPolicyLinuxSensorAntiMalwareArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .quarantine(true)\n .customBlocking(true)\n .preventSuspiciousProcesses(true)\n .scriptBasedExecutionMonitoring(true)\n .uploadUnknownExecutables(true)\n .uploadUnknownDetectionRelatedExecutables(true)\n .driftPrevention(true)\n .emailProtocolVisibility(true)\n .filesystemVisibility(true)\n .ftpVisibility(true)\n .httpVisibility(true)\n .networkVisibility(true)\n .tlsVisibility(true)\n .build());\n\n ctx.export(\"preventionPolicyLinux\", example);\n }\n}\n```\n```yaml\nresources:\n example:\n type: crowdstrike:PreventionPolicyLinux\n properties:\n enabled: true\n description: Made with Pulumi\n hostGroups:\n - d6e3c1e1b3d0467da0fowc96a5e6ecb5\n ioaRuleGroups:\n - ed334b3243bc4b6bb8e7d40a2ecd86fa\n cloudAntiMalware:\n detection: MODERATE\n prevention: CAUTIOUS\n sensorAntiMalware:\n detection: MODERATE\n prevention: CAUTIOUS\n quarantine: true\n customBlocking: true\n preventSuspiciousProcesses: true\n scriptBasedExecutionMonitoring: true\n uploadUnknownExecutables: true\n uploadUnknownDetectionRelatedExecutables: true\n driftPrevention: true\n emailProtocolVisibility: true\n filesystemVisibility: true\n ftpVisibility: true\n httpVisibility: true\n networkVisibility: true\n tlsVisibility: true\noutputs:\n preventionPolicyLinux: ${example}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nprevention policy can be imported by specifying the policy id.\n\n```sh\n$ pulumi import crowdstrike:index/preventionPolicyLinux:PreventionPolicyLinux example 7fb858a949034a0cbca175f660f1e769\n```\n\n",
+ "description": "This resource allows you to manage CrowdStrike Falcon prevention policies for Linux hosts. Prevention policies allow you to manage what activity will trigger detections and preventions on your hosts.\n\n## API Scopes\n\nThe following API scopes are required:\n\n- Prevention policies | Read \u0026 Write\n\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as crowdstrike from \"@crowdstrike/pulumi\";\n\nconst example = new crowdstrike.PreventionPolicyLinux(\"example\", {\n enabled: true,\n description: \"Made with Pulumi\",\n hostGroups: [\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\"],\n ioaRuleGroups: [],\n cloudAntiMalware: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n sensorAntiMalware: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n quarantine: true,\n customBlocking: true,\n preventSuspiciousProcesses: true,\n scriptBasedExecutionMonitoring: true,\n uploadUnknownExecutables: true,\n uploadUnknownDetectionRelatedExecutables: true,\n driftPrevention: true,\n emailProtocolVisibility: true,\n filesystemVisibility: true,\n ftpVisibility: true,\n httpVisibility: true,\n networkVisibility: true,\n tlsVisibility: true,\n});\nexport const preventionPolicyLinux = example;\n```\n```python\nimport pulumi\nimport crowdstrike_pulumi as crowdstrike\n\nexample = crowdstrike.PreventionPolicyLinux(\"example\",\n enabled=True,\n description=\"Made with Pulumi\",\n host_groups=[\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\"],\n ioa_rule_groups=[],\n cloud_anti_malware={\n \"detection\": \"MODERATE\",\n \"prevention\": \"CAUTIOUS\",\n },\n sensor_anti_malware={\n \"detection\": \"MODERATE\",\n \"prevention\": \"CAUTIOUS\",\n },\n quarantine=True,\n custom_blocking=True,\n prevent_suspicious_processes=True,\n script_based_execution_monitoring=True,\n upload_unknown_executables=True,\n upload_unknown_detection_related_executables=True,\n drift_prevention=True,\n email_protocol_visibility=True,\n filesystem_visibility=True,\n ftp_visibility=True,\n http_visibility=True,\n network_visibility=True,\n tls_visibility=True)\npulumi.export(\"preventionPolicyLinux\", example)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Crowdstrike = CrowdStrike.Crowdstrike;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Crowdstrike.PreventionPolicyLinux(\"example\", new()\n {\n Enabled = true,\n Description = \"Made with Pulumi\",\n HostGroups = new[]\n {\n \"d6e3c1e1b3d0467da0fowc96a5e6ecb5\",\n },\n IoaRuleGroups = new[] {},\n CloudAntiMalware = new Crowdstrike.Inputs.PreventionPolicyLinuxCloudAntiMalwareArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n SensorAntiMalware = new Crowdstrike.Inputs.PreventionPolicyLinuxSensorAntiMalwareArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n Quarantine = true,\n CustomBlocking = true,\n PreventSuspiciousProcesses = true,\n ScriptBasedExecutionMonitoring = true,\n UploadUnknownExecutables = true,\n UploadUnknownDetectionRelatedExecutables = true,\n DriftPrevention = true,\n EmailProtocolVisibility = true,\n FilesystemVisibility = true,\n FtpVisibility = true,\n HttpVisibility = true,\n NetworkVisibility = true,\n TlsVisibility = true,\n });\n\n return new Dictionary\u003cstring, object?\u003e\n {\n [\"preventionPolicyLinux\"] = example,\n };\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/crowdstrike/pulumi-crowdstrike/sdk/go/crowdstrike\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := crowdstrike.NewPreventionPolicyLinux(ctx, \"example\", \u0026crowdstrike.PreventionPolicyLinuxArgs{\n\t\t\tEnabled: pulumi.Bool(true),\n\t\t\tDescription: pulumi.String(\"Made with Pulumi\"),\n\t\t\tHostGroups: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\"),\n\t\t\t},\n\t\t\tIoaRuleGroups: pulumi.StringArray{},\n\t\t\tCloudAntiMalware: \u0026crowdstrike.PreventionPolicyLinuxCloudAntiMalwareArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tSensorAntiMalware: \u0026crowdstrike.PreventionPolicyLinuxSensorAntiMalwareArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tQuarantine: pulumi.Bool(true),\n\t\t\tCustomBlocking: pulumi.Bool(true),\n\t\t\tPreventSuspiciousProcesses: pulumi.Bool(true),\n\t\t\tScriptBasedExecutionMonitoring: pulumi.Bool(true),\n\t\t\tUploadUnknownExecutables: pulumi.Bool(true),\n\t\t\tUploadUnknownDetectionRelatedExecutables: pulumi.Bool(true),\n\t\t\tDriftPrevention: pulumi.Bool(true),\n\t\t\tEmailProtocolVisibility: pulumi.Bool(true),\n\t\t\tFilesystemVisibility: pulumi.Bool(true),\n\t\t\tFtpVisibility: pulumi.Bool(true),\n\t\t\tHttpVisibility: pulumi.Bool(true),\n\t\t\tNetworkVisibility: pulumi.Bool(true),\n\t\t\tTlsVisibility: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tctx.Export(\"preventionPolicyLinux\", example)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.crowdstrike.PreventionPolicyLinux;\nimport com.pulumi.crowdstrike.PreventionPolicyLinuxArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyLinuxCloudAntiMalwareArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyLinuxSensorAntiMalwareArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new PreventionPolicyLinux(\"example\", PreventionPolicyLinuxArgs.builder()\n .enabled(true)\n .description(\"Made with Pulumi\")\n .hostGroups(\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\")\n .ioaRuleGroups()\n .cloudAntiMalware(PreventionPolicyLinuxCloudAntiMalwareArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .sensorAntiMalware(PreventionPolicyLinuxSensorAntiMalwareArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .quarantine(true)\n .customBlocking(true)\n .preventSuspiciousProcesses(true)\n .scriptBasedExecutionMonitoring(true)\n .uploadUnknownExecutables(true)\n .uploadUnknownDetectionRelatedExecutables(true)\n .driftPrevention(true)\n .emailProtocolVisibility(true)\n .filesystemVisibility(true)\n .ftpVisibility(true)\n .httpVisibility(true)\n .networkVisibility(true)\n .tlsVisibility(true)\n .build());\n\n ctx.export(\"preventionPolicyLinux\", example);\n }\n}\n```\n```yaml\nresources:\n example:\n type: crowdstrike:PreventionPolicyLinux\n properties:\n enabled: true\n description: Made with Pulumi\n hostGroups:\n - d6e3c1e1b3d0467da0fowc96a5e6ecb5\n ioaRuleGroups: []\n cloudAntiMalware:\n detection: MODERATE\n prevention: CAUTIOUS\n sensorAntiMalware:\n detection: MODERATE\n prevention: CAUTIOUS\n quarantine: true\n customBlocking: true\n preventSuspiciousProcesses: true\n scriptBasedExecutionMonitoring: true\n uploadUnknownExecutables: true\n uploadUnknownDetectionRelatedExecutables: true\n driftPrevention: true\n emailProtocolVisibility: true\n filesystemVisibility: true\n ftpVisibility: true\n httpVisibility: true\n networkVisibility: true\n tlsVisibility: true\noutputs:\n preventionPolicyLinux: ${example}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nprevention policy can be imported by specifying the policy id.\n\n```sh\n$ pulumi import crowdstrike:index/preventionPolicyLinux:PreventionPolicyLinux example 7fb858a949034a0cbca175f660f1e769\n```\n\n",
"properties": {
"cloudAntiMalware": {
"$ref": "#/types/crowdstrike:index/PreventionPolicyLinuxCloudAntiMalware:PreventionPolicyLinuxCloudAntiMalware",
@@ -1780,7 +1780,9 @@
"enabled",
"filesystemVisibility",
"ftpVisibility",
+ "hostGroups",
"httpVisibility",
+ "ioaRuleGroups",
"lastUpdated",
"name",
"networkVisibility",
@@ -1880,6 +1882,10 @@
"description": "Whether to enable the setting. Upload all unknown executables for advanced analysis in the cloud.\n"
}
},
+ "requiredInputs": [
+ "hostGroups",
+ "ioaRuleGroups"
+ ],
"stateInputs": {
"description": "Input properties used for looking up and filtering PreventionPolicyLinux resources.\n",
"properties": {
@@ -1977,7 +1983,7 @@
}
},
"crowdstrike:index/preventionPolicyMac:PreventionPolicyMac": {
- "description": "This resource allows you to manage CrowdStrike Falcon prevention policies for Mac hosts. Prevention policies allow you to manage what activity will trigger detections and preventions on your hosts.\n\n## API Scopes\n\nThe following API scopes are required:\n\n- Prevention policies | Read \u0026 Write\n\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as crowdstrike from \"@crowdstrike/pulumi\";\n\nconst example = new crowdstrike.PreventionPolicyMac(\"example\", {\n enabled: false,\n description: \"Made with Pulumi\",\n hostGroups: [\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\"],\n ioaRuleGroups: [\"ed334b3243bc4b6bb8e7d40a2ecd86fa\"],\n cloudAdwareAndPup: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n cloudAntiMalware: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n sensorAntiMalware: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n sensorAdwareAndPup: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n notifyEndUsers: true,\n customBlocking: true,\n detectOnWrite: true,\n intelligenceSourcedThreats: true,\n preventSuspiciousProcesses: true,\n quarantine: true,\n quarantineOnWrite: true,\n scriptBasedExecutionMonitoring: true,\n sensorTamperingProtection: true,\n uploadUnknownExecutables: true,\n uploadUnknownDetectionRelatedExecutables: true,\n xpcomShell: true,\n kcPasswordDecoded: true,\n hashCollector: true,\n empyreBackdoor: true,\n chopperWebshell: true,\n});\nexport const preventionPolicyMac = example;\n```\n```python\nimport pulumi\nimport crowdstrike_pulumi as crowdstrike\n\nexample = crowdstrike.PreventionPolicyMac(\"example\",\n enabled=False,\n description=\"Made with Pulumi\",\n host_groups=[\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\"],\n ioa_rule_groups=[\"ed334b3243bc4b6bb8e7d40a2ecd86fa\"],\n cloud_adware_and_pup={\n \"detection\": \"MODERATE\",\n \"prevention\": \"CAUTIOUS\",\n },\n cloud_anti_malware={\n \"detection\": \"MODERATE\",\n \"prevention\": \"CAUTIOUS\",\n },\n sensor_anti_malware={\n \"detection\": \"MODERATE\",\n \"prevention\": \"CAUTIOUS\",\n },\n sensor_adware_and_pup={\n \"detection\": \"MODERATE\",\n \"prevention\": \"CAUTIOUS\",\n },\n notify_end_users=True,\n custom_blocking=True,\n detect_on_write=True,\n intelligence_sourced_threats=True,\n prevent_suspicious_processes=True,\n quarantine=True,\n quarantine_on_write=True,\n script_based_execution_monitoring=True,\n sensor_tampering_protection=True,\n upload_unknown_executables=True,\n upload_unknown_detection_related_executables=True,\n xpcom_shell=True,\n kc_password_decoded=True,\n hash_collector=True,\n empyre_backdoor=True,\n chopper_webshell=True)\npulumi.export(\"preventionPolicyMac\", example)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Crowdstrike = CrowdStrike.Crowdstrike;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Crowdstrike.PreventionPolicyMac(\"example\", new()\n {\n Enabled = false,\n Description = \"Made with Pulumi\",\n HostGroups = new[]\n {\n \"d6e3c1e1b3d0467da0fowc96a5e6ecb5\",\n },\n IoaRuleGroups = new[]\n {\n \"ed334b3243bc4b6bb8e7d40a2ecd86fa\",\n },\n CloudAdwareAndPup = new Crowdstrike.Inputs.PreventionPolicyMacCloudAdwareAndPupArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n CloudAntiMalware = new Crowdstrike.Inputs.PreventionPolicyMacCloudAntiMalwareArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n SensorAntiMalware = new Crowdstrike.Inputs.PreventionPolicyMacSensorAntiMalwareArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n SensorAdwareAndPup = new Crowdstrike.Inputs.PreventionPolicyMacSensorAdwareAndPupArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n NotifyEndUsers = true,\n CustomBlocking = true,\n DetectOnWrite = true,\n IntelligenceSourcedThreats = true,\n PreventSuspiciousProcesses = true,\n Quarantine = true,\n QuarantineOnWrite = true,\n ScriptBasedExecutionMonitoring = true,\n SensorTamperingProtection = true,\n UploadUnknownExecutables = true,\n UploadUnknownDetectionRelatedExecutables = true,\n XpcomShell = true,\n KcPasswordDecoded = true,\n HashCollector = true,\n EmpyreBackdoor = true,\n ChopperWebshell = true,\n });\n\n return new Dictionary\u003cstring, object?\u003e\n {\n [\"preventionPolicyMac\"] = example,\n };\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/crowdstrike/pulumi-crowdstrike/sdk/go/crowdstrike\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := crowdstrike.NewPreventionPolicyMac(ctx, \"example\", \u0026crowdstrike.PreventionPolicyMacArgs{\n\t\t\tEnabled: pulumi.Bool(false),\n\t\t\tDescription: pulumi.String(\"Made with Pulumi\"),\n\t\t\tHostGroups: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\"),\n\t\t\t},\n\t\t\tIoaRuleGroups: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"ed334b3243bc4b6bb8e7d40a2ecd86fa\"),\n\t\t\t},\n\t\t\tCloudAdwareAndPup: \u0026crowdstrike.PreventionPolicyMacCloudAdwareAndPupArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tCloudAntiMalware: \u0026crowdstrike.PreventionPolicyMacCloudAntiMalwareArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tSensorAntiMalware: \u0026crowdstrike.PreventionPolicyMacSensorAntiMalwareArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tSensorAdwareAndPup: \u0026crowdstrike.PreventionPolicyMacSensorAdwareAndPupArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tNotifyEndUsers: pulumi.Bool(true),\n\t\t\tCustomBlocking: pulumi.Bool(true),\n\t\t\tDetectOnWrite: pulumi.Bool(true),\n\t\t\tIntelligenceSourcedThreats: pulumi.Bool(true),\n\t\t\tPreventSuspiciousProcesses: pulumi.Bool(true),\n\t\t\tQuarantine: pulumi.Bool(true),\n\t\t\tQuarantineOnWrite: pulumi.Bool(true),\n\t\t\tScriptBasedExecutionMonitoring: pulumi.Bool(true),\n\t\t\tSensorTamperingProtection: pulumi.Bool(true),\n\t\t\tUploadUnknownExecutables: pulumi.Bool(true),\n\t\t\tUploadUnknownDetectionRelatedExecutables: pulumi.Bool(true),\n\t\t\tXpcomShell: pulumi.Bool(true),\n\t\t\tKcPasswordDecoded: pulumi.Bool(true),\n\t\t\tHashCollector: pulumi.Bool(true),\n\t\t\tEmpyreBackdoor: pulumi.Bool(true),\n\t\t\tChopperWebshell: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tctx.Export(\"preventionPolicyMac\", example)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.crowdstrike.PreventionPolicyMac;\nimport com.pulumi.crowdstrike.PreventionPolicyMacArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyMacCloudAdwareAndPupArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyMacCloudAntiMalwareArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyMacSensorAntiMalwareArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyMacSensorAdwareAndPupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new PreventionPolicyMac(\"example\", PreventionPolicyMacArgs.builder()\n .enabled(false)\n .description(\"Made with Pulumi\")\n .hostGroups(\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\")\n .ioaRuleGroups(\"ed334b3243bc4b6bb8e7d40a2ecd86fa\")\n .cloudAdwareAndPup(PreventionPolicyMacCloudAdwareAndPupArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .cloudAntiMalware(PreventionPolicyMacCloudAntiMalwareArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .sensorAntiMalware(PreventionPolicyMacSensorAntiMalwareArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .sensorAdwareAndPup(PreventionPolicyMacSensorAdwareAndPupArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .notifyEndUsers(true)\n .customBlocking(true)\n .detectOnWrite(true)\n .intelligenceSourcedThreats(true)\n .preventSuspiciousProcesses(true)\n .quarantine(true)\n .quarantineOnWrite(true)\n .scriptBasedExecutionMonitoring(true)\n .sensorTamperingProtection(true)\n .uploadUnknownExecutables(true)\n .uploadUnknownDetectionRelatedExecutables(true)\n .xpcomShell(true)\n .kcPasswordDecoded(true)\n .hashCollector(true)\n .empyreBackdoor(true)\n .chopperWebshell(true)\n .build());\n\n ctx.export(\"preventionPolicyMac\", example);\n }\n}\n```\n```yaml\nresources:\n example:\n type: crowdstrike:PreventionPolicyMac\n properties:\n enabled: false\n description: Made with Pulumi\n hostGroups:\n - d6e3c1e1b3d0467da0fowc96a5e6ecb5\n ioaRuleGroups:\n - ed334b3243bc4b6bb8e7d40a2ecd86fa\n cloudAdwareAndPup:\n detection: MODERATE\n prevention: CAUTIOUS\n cloudAntiMalware:\n detection: MODERATE\n prevention: CAUTIOUS\n sensorAntiMalware:\n detection: MODERATE\n prevention: CAUTIOUS\n sensorAdwareAndPup:\n detection: MODERATE\n prevention: CAUTIOUS\n notifyEndUsers: true\n customBlocking: true\n detectOnWrite: true\n intelligenceSourcedThreats: true\n preventSuspiciousProcesses: true\n quarantine: true\n quarantineOnWrite: true\n scriptBasedExecutionMonitoring: true\n sensorTamperingProtection: true\n uploadUnknownExecutables: true\n uploadUnknownDetectionRelatedExecutables: true\n xpcomShell: true\n kcPasswordDecoded: true\n hashCollector: true\n empyreBackdoor: true\n chopperWebshell: true\noutputs:\n preventionPolicyMac: ${example}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nprevention policy can be imported by specifying the policy id.\n\n```sh\n$ pulumi import crowdstrike:index/preventionPolicyMac:PreventionPolicyMac example 7fb858a949034a0cbca175f660f1e769\n```\n\n",
+ "description": "This resource allows you to manage CrowdStrike Falcon prevention policies for Mac hosts. Prevention policies allow you to manage what activity will trigger detections and preventions on your hosts.\n\n## API Scopes\n\nThe following API scopes are required:\n\n- Prevention policies | Read \u0026 Write\n\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as crowdstrike from \"@crowdstrike/pulumi\";\n\nconst example = new crowdstrike.PreventionPolicyMac(\"example\", {\n enabled: false,\n description: \"Made with Pulumi\",\n hostGroups: [\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\"],\n ioaRuleGroups: [],\n cloudAdwareAndPup: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n cloudAntiMalware: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n sensorAntiMalware: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n sensorAdwareAndPup: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n notifyEndUsers: true,\n customBlocking: true,\n detectOnWrite: true,\n intelligenceSourcedThreats: true,\n preventSuspiciousProcesses: true,\n quarantine: true,\n quarantineOnWrite: true,\n scriptBasedExecutionMonitoring: true,\n sensorTamperingProtection: true,\n uploadUnknownExecutables: true,\n uploadUnknownDetectionRelatedExecutables: true,\n xpcomShell: true,\n kcPasswordDecoded: true,\n hashCollector: true,\n empyreBackdoor: true,\n chopperWebshell: true,\n});\nexport const preventionPolicyMac = example;\n```\n```python\nimport pulumi\nimport crowdstrike_pulumi as crowdstrike\n\nexample = crowdstrike.PreventionPolicyMac(\"example\",\n enabled=False,\n description=\"Made with Pulumi\",\n host_groups=[\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\"],\n ioa_rule_groups=[],\n cloud_adware_and_pup={\n \"detection\": \"MODERATE\",\n \"prevention\": \"CAUTIOUS\",\n },\n cloud_anti_malware={\n \"detection\": \"MODERATE\",\n \"prevention\": \"CAUTIOUS\",\n },\n sensor_anti_malware={\n \"detection\": \"MODERATE\",\n \"prevention\": \"CAUTIOUS\",\n },\n sensor_adware_and_pup={\n \"detection\": \"MODERATE\",\n \"prevention\": \"CAUTIOUS\",\n },\n notify_end_users=True,\n custom_blocking=True,\n detect_on_write=True,\n intelligence_sourced_threats=True,\n prevent_suspicious_processes=True,\n quarantine=True,\n quarantine_on_write=True,\n script_based_execution_monitoring=True,\n sensor_tampering_protection=True,\n upload_unknown_executables=True,\n upload_unknown_detection_related_executables=True,\n xpcom_shell=True,\n kc_password_decoded=True,\n hash_collector=True,\n empyre_backdoor=True,\n chopper_webshell=True)\npulumi.export(\"preventionPolicyMac\", example)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Crowdstrike = CrowdStrike.Crowdstrike;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Crowdstrike.PreventionPolicyMac(\"example\", new()\n {\n Enabled = false,\n Description = \"Made with Pulumi\",\n HostGroups = new[]\n {\n \"d6e3c1e1b3d0467da0fowc96a5e6ecb5\",\n },\n IoaRuleGroups = new[] {},\n CloudAdwareAndPup = new Crowdstrike.Inputs.PreventionPolicyMacCloudAdwareAndPupArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n CloudAntiMalware = new Crowdstrike.Inputs.PreventionPolicyMacCloudAntiMalwareArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n SensorAntiMalware = new Crowdstrike.Inputs.PreventionPolicyMacSensorAntiMalwareArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n SensorAdwareAndPup = new Crowdstrike.Inputs.PreventionPolicyMacSensorAdwareAndPupArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n NotifyEndUsers = true,\n CustomBlocking = true,\n DetectOnWrite = true,\n IntelligenceSourcedThreats = true,\n PreventSuspiciousProcesses = true,\n Quarantine = true,\n QuarantineOnWrite = true,\n ScriptBasedExecutionMonitoring = true,\n SensorTamperingProtection = true,\n UploadUnknownExecutables = true,\n UploadUnknownDetectionRelatedExecutables = true,\n XpcomShell = true,\n KcPasswordDecoded = true,\n HashCollector = true,\n EmpyreBackdoor = true,\n ChopperWebshell = true,\n });\n\n return new Dictionary\u003cstring, object?\u003e\n {\n [\"preventionPolicyMac\"] = example,\n };\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/crowdstrike/pulumi-crowdstrike/sdk/go/crowdstrike\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := crowdstrike.NewPreventionPolicyMac(ctx, \"example\", \u0026crowdstrike.PreventionPolicyMacArgs{\n\t\t\tEnabled: pulumi.Bool(false),\n\t\t\tDescription: pulumi.String(\"Made with Pulumi\"),\n\t\t\tHostGroups: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\"),\n\t\t\t},\n\t\t\tIoaRuleGroups: pulumi.StringArray{},\n\t\t\tCloudAdwareAndPup: \u0026crowdstrike.PreventionPolicyMacCloudAdwareAndPupArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tCloudAntiMalware: \u0026crowdstrike.PreventionPolicyMacCloudAntiMalwareArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tSensorAntiMalware: \u0026crowdstrike.PreventionPolicyMacSensorAntiMalwareArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tSensorAdwareAndPup: \u0026crowdstrike.PreventionPolicyMacSensorAdwareAndPupArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tNotifyEndUsers: pulumi.Bool(true),\n\t\t\tCustomBlocking: pulumi.Bool(true),\n\t\t\tDetectOnWrite: pulumi.Bool(true),\n\t\t\tIntelligenceSourcedThreats: pulumi.Bool(true),\n\t\t\tPreventSuspiciousProcesses: pulumi.Bool(true),\n\t\t\tQuarantine: pulumi.Bool(true),\n\t\t\tQuarantineOnWrite: pulumi.Bool(true),\n\t\t\tScriptBasedExecutionMonitoring: pulumi.Bool(true),\n\t\t\tSensorTamperingProtection: pulumi.Bool(true),\n\t\t\tUploadUnknownExecutables: pulumi.Bool(true),\n\t\t\tUploadUnknownDetectionRelatedExecutables: pulumi.Bool(true),\n\t\t\tXpcomShell: pulumi.Bool(true),\n\t\t\tKcPasswordDecoded: pulumi.Bool(true),\n\t\t\tHashCollector: pulumi.Bool(true),\n\t\t\tEmpyreBackdoor: pulumi.Bool(true),\n\t\t\tChopperWebshell: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tctx.Export(\"preventionPolicyMac\", example)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.crowdstrike.PreventionPolicyMac;\nimport com.pulumi.crowdstrike.PreventionPolicyMacArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyMacCloudAdwareAndPupArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyMacCloudAntiMalwareArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyMacSensorAntiMalwareArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyMacSensorAdwareAndPupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new PreventionPolicyMac(\"example\", PreventionPolicyMacArgs.builder()\n .enabled(false)\n .description(\"Made with Pulumi\")\n .hostGroups(\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\")\n .ioaRuleGroups()\n .cloudAdwareAndPup(PreventionPolicyMacCloudAdwareAndPupArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .cloudAntiMalware(PreventionPolicyMacCloudAntiMalwareArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .sensorAntiMalware(PreventionPolicyMacSensorAntiMalwareArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .sensorAdwareAndPup(PreventionPolicyMacSensorAdwareAndPupArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .notifyEndUsers(true)\n .customBlocking(true)\n .detectOnWrite(true)\n .intelligenceSourcedThreats(true)\n .preventSuspiciousProcesses(true)\n .quarantine(true)\n .quarantineOnWrite(true)\n .scriptBasedExecutionMonitoring(true)\n .sensorTamperingProtection(true)\n .uploadUnknownExecutables(true)\n .uploadUnknownDetectionRelatedExecutables(true)\n .xpcomShell(true)\n .kcPasswordDecoded(true)\n .hashCollector(true)\n .empyreBackdoor(true)\n .chopperWebshell(true)\n .build());\n\n ctx.export(\"preventionPolicyMac\", example);\n }\n}\n```\n```yaml\nresources:\n example:\n type: crowdstrike:PreventionPolicyMac\n properties:\n enabled: false\n description: Made with Pulumi\n hostGroups:\n - d6e3c1e1b3d0467da0fowc96a5e6ecb5\n ioaRuleGroups: []\n cloudAdwareAndPup:\n detection: MODERATE\n prevention: CAUTIOUS\n cloudAntiMalware:\n detection: MODERATE\n prevention: CAUTIOUS\n sensorAntiMalware:\n detection: MODERATE\n prevention: CAUTIOUS\n sensorAdwareAndPup:\n detection: MODERATE\n prevention: CAUTIOUS\n notifyEndUsers: true\n customBlocking: true\n detectOnWrite: true\n intelligenceSourcedThreats: true\n preventSuspiciousProcesses: true\n quarantine: true\n quarantineOnWrite: true\n scriptBasedExecutionMonitoring: true\n sensorTamperingProtection: true\n uploadUnknownExecutables: true\n uploadUnknownDetectionRelatedExecutables: true\n xpcomShell: true\n kcPasswordDecoded: true\n hashCollector: true\n empyreBackdoor: true\n chopperWebshell: true\noutputs:\n preventionPolicyMac: ${example}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nprevention policy can be imported by specifying the policy id.\n\n```sh\n$ pulumi import crowdstrike:index/preventionPolicyMac:PreventionPolicyMac example 7fb858a949034a0cbca175f660f1e769\n```\n\n",
"properties": {
"chopperWebshell": {
"type": "boolean",
@@ -2098,7 +2104,9 @@
"empyreBackdoor",
"enabled",
"hashCollector",
+ "hostGroups",
"intelligenceSourcedThreats",
+ "ioaRuleGroups",
"kcPasswordDecoded",
"lastUpdated",
"name",
@@ -2222,6 +2230,10 @@
"description": "Whether to enable the setting. The execution of an XPCOM shell was blocked.\n"
}
},
+ "requiredInputs": [
+ "hostGroups",
+ "ioaRuleGroups"
+ ],
"stateInputs": {
"description": "Input properties used for looking up and filtering PreventionPolicyMac resources.\n",
"properties": {
@@ -2339,7 +2351,7 @@
}
},
"crowdstrike:index/preventionPolicyWindows:PreventionPolicyWindows": {
- "description": "This resource allows you to manage CrowdStrike Falcon prevention policies for Windows hosts. Prevention policies allow you to manage what activity will trigger detections and preventions on your hosts.\n\n## API Scopes\n\nThe following API scopes are required:\n\n- Prevention policies | Read \u0026 Write\n\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as crowdstrike from \"@crowdstrike/pulumi\";\n\nconst example = new crowdstrike.PreventionPolicyWindows(\"example\", {\n enabled: false,\n description: \"Made with Pulumi\",\n hostGroups: [\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\"],\n ioaRuleGroups: [\"ed334b3243bc4b6bb8e7d40a2ecd86fa\"],\n adwareAndPup: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n cloudAntiMalwareMicrosoftOfficeFiles: {\n detection: \"MODERATE\",\n prevention: \"DISABLED\",\n },\n cloudAntiMalware: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n cloudAntiMalwareUserInitiated: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n sensorAntiMalware: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n sensorAntiMalwareUserInitiated: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n extendedUserModeData: {\n detection: \"MODERATE\",\n },\n usbInsertionTriggeredScan: false,\n applicationExploitationActivity: false,\n additionalUserModeData: false,\n notifyEndUsers: false,\n advancedRemediation: false,\n backupDeletion: false,\n biosDeepVisibility: false,\n chopperWebshell: false,\n codeInjection: false,\n credentialDumping: false,\n cryptowall: false,\n customBlocking: false,\n detectOnWrite: false,\n driveByDownload: false,\n driverLoadPrevention: false,\n interpreterOnly: false,\n engineFullVisibility: false,\n enhancedExploitationVisibility: false,\n enhancedMlForLargerFiles: false,\n fileEncryption: false,\n fileSystemAccess: false,\n forceAslr: false,\n forceDep: false,\n heapSprayPreallocation: false,\n nullPageAllocation: false,\n sehOverwriteProtection: false,\n hardwareEnhancedExploitDetection: false,\n httpDetections: false,\n redactHttpDetectionDetails: false,\n intelligenceSourcedThreats: false,\n javascriptViaRundll32: false,\n locky: false,\n memoryScanning: false,\n memoryScanningScanWithCpu: false,\n microsoftOfficeFileSuspiciousMacroRemoval: false,\n onWriteScriptFileVisibility: false,\n preventSuspiciousProcesses: false,\n quarantineAndSecurityCenterRegistration: false,\n quarantineOnRemovableMedia: false,\n quarantineOnWrite: false,\n scriptBasedExecutionMonitoring: false,\n sensorTamperingProtection: false,\n suspiciousRegistryOperations: false,\n suspiciousScriptsAndCommands: false,\n uploadUnknownExecutables: false,\n uploadUnknownDetectionRelatedExecutables: false,\n volumeShadowCopyAudit: false,\n volumeShadowCopyProtect: false,\n vulnerableDriverProtection: false,\n windowsLogonBypassStickyKeys: false,\n});\nexport const preventionPolicyWindows = example;\n```\n```python\nimport pulumi\nimport crowdstrike_pulumi as crowdstrike\n\nexample = crowdstrike.PreventionPolicyWindows(\"example\",\n enabled=False,\n description=\"Made with Pulumi\",\n host_groups=[\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\"],\n ioa_rule_groups=[\"ed334b3243bc4b6bb8e7d40a2ecd86fa\"],\n adware_and_pup={\n \"detection\": \"MODERATE\",\n \"prevention\": \"CAUTIOUS\",\n },\n cloud_anti_malware_microsoft_office_files={\n \"detection\": \"MODERATE\",\n \"prevention\": \"DISABLED\",\n },\n cloud_anti_malware={\n \"detection\": \"MODERATE\",\n \"prevention\": \"CAUTIOUS\",\n },\n cloud_anti_malware_user_initiated={\n \"detection\": \"MODERATE\",\n \"prevention\": \"CAUTIOUS\",\n },\n sensor_anti_malware={\n \"detection\": \"MODERATE\",\n \"prevention\": \"CAUTIOUS\",\n },\n sensor_anti_malware_user_initiated={\n \"detection\": \"MODERATE\",\n \"prevention\": \"CAUTIOUS\",\n },\n extended_user_mode_data={\n \"detection\": \"MODERATE\",\n },\n usb_insertion_triggered_scan=False,\n application_exploitation_activity=False,\n additional_user_mode_data=False,\n notify_end_users=False,\n advanced_remediation=False,\n backup_deletion=False,\n bios_deep_visibility=False,\n chopper_webshell=False,\n code_injection=False,\n credential_dumping=False,\n cryptowall=False,\n custom_blocking=False,\n detect_on_write=False,\n drive_by_download=False,\n driver_load_prevention=False,\n interpreter_only=False,\n engine_full_visibility=False,\n enhanced_exploitation_visibility=False,\n enhanced_ml_for_larger_files=False,\n file_encryption=False,\n file_system_access=False,\n force_aslr=False,\n force_dep=False,\n heap_spray_preallocation=False,\n null_page_allocation=False,\n seh_overwrite_protection=False,\n hardware_enhanced_exploit_detection=False,\n http_detections=False,\n redact_http_detection_details=False,\n intelligence_sourced_threats=False,\n javascript_via_rundll32=False,\n locky=False,\n memory_scanning=False,\n memory_scanning_scan_with_cpu=False,\n microsoft_office_file_suspicious_macro_removal=False,\n on_write_script_file_visibility=False,\n prevent_suspicious_processes=False,\n quarantine_and_security_center_registration=False,\n quarantine_on_removable_media=False,\n quarantine_on_write=False,\n script_based_execution_monitoring=False,\n sensor_tampering_protection=False,\n suspicious_registry_operations=False,\n suspicious_scripts_and_commands=False,\n upload_unknown_executables=False,\n upload_unknown_detection_related_executables=False,\n volume_shadow_copy_audit=False,\n volume_shadow_copy_protect=False,\n vulnerable_driver_protection=False,\n windows_logon_bypass_sticky_keys=False)\npulumi.export(\"preventionPolicyWindows\", example)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Crowdstrike = CrowdStrike.Crowdstrike;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Crowdstrike.PreventionPolicyWindows(\"example\", new()\n {\n Enabled = false,\n Description = \"Made with Pulumi\",\n HostGroups = new[]\n {\n \"d6e3c1e1b3d0467da0fowc96a5e6ecb5\",\n },\n IoaRuleGroups = new[]\n {\n \"ed334b3243bc4b6bb8e7d40a2ecd86fa\",\n },\n AdwareAndPup = new Crowdstrike.Inputs.PreventionPolicyWindowsAdwareAndPupArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n CloudAntiMalwareMicrosoftOfficeFiles = new Crowdstrike.Inputs.PreventionPolicyWindowsCloudAntiMalwareMicrosoftOfficeFilesArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"DISABLED\",\n },\n CloudAntiMalware = new Crowdstrike.Inputs.PreventionPolicyWindowsCloudAntiMalwareArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n CloudAntiMalwareUserInitiated = new Crowdstrike.Inputs.PreventionPolicyWindowsCloudAntiMalwareUserInitiatedArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n SensorAntiMalware = new Crowdstrike.Inputs.PreventionPolicyWindowsSensorAntiMalwareArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n SensorAntiMalwareUserInitiated = new Crowdstrike.Inputs.PreventionPolicyWindowsSensorAntiMalwareUserInitiatedArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n ExtendedUserModeData = new Crowdstrike.Inputs.PreventionPolicyWindowsExtendedUserModeDataArgs\n {\n Detection = \"MODERATE\",\n },\n UsbInsertionTriggeredScan = false,\n ApplicationExploitationActivity = false,\n AdditionalUserModeData = false,\n NotifyEndUsers = false,\n AdvancedRemediation = false,\n BackupDeletion = false,\n BiosDeepVisibility = false,\n ChopperWebshell = false,\n CodeInjection = false,\n CredentialDumping = false,\n Cryptowall = false,\n CustomBlocking = false,\n DetectOnWrite = false,\n DriveByDownload = false,\n DriverLoadPrevention = false,\n InterpreterOnly = false,\n EngineFullVisibility = false,\n EnhancedExploitationVisibility = false,\n EnhancedMlForLargerFiles = false,\n FileEncryption = false,\n FileSystemAccess = false,\n ForceAslr = false,\n ForceDep = false,\n HeapSprayPreallocation = false,\n NullPageAllocation = false,\n SehOverwriteProtection = false,\n HardwareEnhancedExploitDetection = false,\n HttpDetections = false,\n RedactHttpDetectionDetails = false,\n IntelligenceSourcedThreats = false,\n JavascriptViaRundll32 = false,\n Locky = false,\n MemoryScanning = false,\n MemoryScanningScanWithCpu = false,\n MicrosoftOfficeFileSuspiciousMacroRemoval = false,\n OnWriteScriptFileVisibility = false,\n PreventSuspiciousProcesses = false,\n QuarantineAndSecurityCenterRegistration = false,\n QuarantineOnRemovableMedia = false,\n QuarantineOnWrite = false,\n ScriptBasedExecutionMonitoring = false,\n SensorTamperingProtection = false,\n SuspiciousRegistryOperations = false,\n SuspiciousScriptsAndCommands = false,\n UploadUnknownExecutables = false,\n UploadUnknownDetectionRelatedExecutables = false,\n VolumeShadowCopyAudit = false,\n VolumeShadowCopyProtect = false,\n VulnerableDriverProtection = false,\n WindowsLogonBypassStickyKeys = false,\n });\n\n return new Dictionary\u003cstring, object?\u003e\n {\n [\"preventionPolicyWindows\"] = example,\n };\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/crowdstrike/pulumi-crowdstrike/sdk/go/crowdstrike\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := crowdstrike.NewPreventionPolicyWindows(ctx, \"example\", \u0026crowdstrike.PreventionPolicyWindowsArgs{\n\t\t\tEnabled: pulumi.Bool(false),\n\t\t\tDescription: pulumi.String(\"Made with Pulumi\"),\n\t\t\tHostGroups: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\"),\n\t\t\t},\n\t\t\tIoaRuleGroups: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"ed334b3243bc4b6bb8e7d40a2ecd86fa\"),\n\t\t\t},\n\t\t\tAdwareAndPup: \u0026crowdstrike.PreventionPolicyWindowsAdwareAndPupArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tCloudAntiMalwareMicrosoftOfficeFiles: \u0026crowdstrike.PreventionPolicyWindowsCloudAntiMalwareMicrosoftOfficeFilesArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"DISABLED\"),\n\t\t\t},\n\t\t\tCloudAntiMalware: \u0026crowdstrike.PreventionPolicyWindowsCloudAntiMalwareArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tCloudAntiMalwareUserInitiated: \u0026crowdstrike.PreventionPolicyWindowsCloudAntiMalwareUserInitiatedArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tSensorAntiMalware: \u0026crowdstrike.PreventionPolicyWindowsSensorAntiMalwareArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tSensorAntiMalwareUserInitiated: \u0026crowdstrike.PreventionPolicyWindowsSensorAntiMalwareUserInitiatedArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tExtendedUserModeData: \u0026crowdstrike.PreventionPolicyWindowsExtendedUserModeDataArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t},\n\t\t\tUsbInsertionTriggeredScan: pulumi.Bool(false),\n\t\t\tApplicationExploitationActivity: pulumi.Bool(false),\n\t\t\tAdditionalUserModeData: pulumi.Bool(false),\n\t\t\tNotifyEndUsers: pulumi.Bool(false),\n\t\t\tAdvancedRemediation: pulumi.Bool(false),\n\t\t\tBackupDeletion: pulumi.Bool(false),\n\t\t\tBiosDeepVisibility: pulumi.Bool(false),\n\t\t\tChopperWebshell: pulumi.Bool(false),\n\t\t\tCodeInjection: pulumi.Bool(false),\n\t\t\tCredentialDumping: pulumi.Bool(false),\n\t\t\tCryptowall: pulumi.Bool(false),\n\t\t\tCustomBlocking: pulumi.Bool(false),\n\t\t\tDetectOnWrite: pulumi.Bool(false),\n\t\t\tDriveByDownload: pulumi.Bool(false),\n\t\t\tDriverLoadPrevention: pulumi.Bool(false),\n\t\t\tInterpreterOnly: pulumi.Bool(false),\n\t\t\tEngineFullVisibility: pulumi.Bool(false),\n\t\t\tEnhancedExploitationVisibility: pulumi.Bool(false),\n\t\t\tEnhancedMlForLargerFiles: pulumi.Bool(false),\n\t\t\tFileEncryption: pulumi.Bool(false),\n\t\t\tFileSystemAccess: pulumi.Bool(false),\n\t\t\tForceAslr: pulumi.Bool(false),\n\t\t\tForceDep: pulumi.Bool(false),\n\t\t\tHeapSprayPreallocation: pulumi.Bool(false),\n\t\t\tNullPageAllocation: pulumi.Bool(false),\n\t\t\tSehOverwriteProtection: pulumi.Bool(false),\n\t\t\tHardwareEnhancedExploitDetection: pulumi.Bool(false),\n\t\t\tHttpDetections: pulumi.Bool(false),\n\t\t\tRedactHttpDetectionDetails: pulumi.Bool(false),\n\t\t\tIntelligenceSourcedThreats: pulumi.Bool(false),\n\t\t\tJavascriptViaRundll32: pulumi.Bool(false),\n\t\t\tLocky: pulumi.Bool(false),\n\t\t\tMemoryScanning: pulumi.Bool(false),\n\t\t\tMemoryScanningScanWithCpu: pulumi.Bool(false),\n\t\t\tMicrosoftOfficeFileSuspiciousMacroRemoval: pulumi.Bool(false),\n\t\t\tOnWriteScriptFileVisibility: pulumi.Bool(false),\n\t\t\tPreventSuspiciousProcesses: pulumi.Bool(false),\n\t\t\tQuarantineAndSecurityCenterRegistration: pulumi.Bool(false),\n\t\t\tQuarantineOnRemovableMedia: pulumi.Bool(false),\n\t\t\tQuarantineOnWrite: pulumi.Bool(false),\n\t\t\tScriptBasedExecutionMonitoring: pulumi.Bool(false),\n\t\t\tSensorTamperingProtection: pulumi.Bool(false),\n\t\t\tSuspiciousRegistryOperations: pulumi.Bool(false),\n\t\t\tSuspiciousScriptsAndCommands: pulumi.Bool(false),\n\t\t\tUploadUnknownExecutables: pulumi.Bool(false),\n\t\t\tUploadUnknownDetectionRelatedExecutables: pulumi.Bool(false),\n\t\t\tVolumeShadowCopyAudit: pulumi.Bool(false),\n\t\t\tVolumeShadowCopyProtect: pulumi.Bool(false),\n\t\t\tVulnerableDriverProtection: pulumi.Bool(false),\n\t\t\tWindowsLogonBypassStickyKeys: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tctx.Export(\"preventionPolicyWindows\", example)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.crowdstrike.PreventionPolicyWindows;\nimport com.pulumi.crowdstrike.PreventionPolicyWindowsArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyWindowsAdwareAndPupArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyWindowsCloudAntiMalwareMicrosoftOfficeFilesArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyWindowsCloudAntiMalwareArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyWindowsCloudAntiMalwareUserInitiatedArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyWindowsSensorAntiMalwareArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyWindowsSensorAntiMalwareUserInitiatedArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyWindowsExtendedUserModeDataArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new PreventionPolicyWindows(\"example\", PreventionPolicyWindowsArgs.builder()\n .enabled(false)\n .description(\"Made with Pulumi\")\n .hostGroups(\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\")\n .ioaRuleGroups(\"ed334b3243bc4b6bb8e7d40a2ecd86fa\")\n .adwareAndPup(PreventionPolicyWindowsAdwareAndPupArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .cloudAntiMalwareMicrosoftOfficeFiles(PreventionPolicyWindowsCloudAntiMalwareMicrosoftOfficeFilesArgs.builder()\n .detection(\"MODERATE\")\n .prevention(\"DISABLED\")\n .build())\n .cloudAntiMalware(PreventionPolicyWindowsCloudAntiMalwareArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .cloudAntiMalwareUserInitiated(PreventionPolicyWindowsCloudAntiMalwareUserInitiatedArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .sensorAntiMalware(PreventionPolicyWindowsSensorAntiMalwareArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .sensorAntiMalwareUserInitiated(PreventionPolicyWindowsSensorAntiMalwareUserInitiatedArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .extendedUserModeData(PreventionPolicyWindowsExtendedUserModeDataArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .usbInsertionTriggeredScan(false)\n .applicationExploitationActivity(false)\n .additionalUserModeData(false)\n .notifyEndUsers(false)\n .advancedRemediation(false)\n .backupDeletion(false)\n .biosDeepVisibility(false)\n .chopperWebshell(false)\n .codeInjection(false)\n .credentialDumping(false)\n .cryptowall(false)\n .customBlocking(false)\n .detectOnWrite(false)\n .driveByDownload(false)\n .driverLoadPrevention(false)\n .interpreterOnly(false)\n .engineFullVisibility(false)\n .enhancedExploitationVisibility(false)\n .enhancedMlForLargerFiles(false)\n .fileEncryption(false)\n .fileSystemAccess(false)\n .forceAslr(false)\n .forceDep(false)\n .heapSprayPreallocation(false)\n .nullPageAllocation(false)\n .sehOverwriteProtection(false)\n .hardwareEnhancedExploitDetection(false)\n .httpDetections(false)\n .redactHttpDetectionDetails(false)\n .intelligenceSourcedThreats(false)\n .javascriptViaRundll32(false)\n .locky(false)\n .memoryScanning(false)\n .memoryScanningScanWithCpu(false)\n .microsoftOfficeFileSuspiciousMacroRemoval(false)\n .onWriteScriptFileVisibility(false)\n .preventSuspiciousProcesses(false)\n .quarantineAndSecurityCenterRegistration(false)\n .quarantineOnRemovableMedia(false)\n .quarantineOnWrite(false)\n .scriptBasedExecutionMonitoring(false)\n .sensorTamperingProtection(false)\n .suspiciousRegistryOperations(false)\n .suspiciousScriptsAndCommands(false)\n .uploadUnknownExecutables(false)\n .uploadUnknownDetectionRelatedExecutables(false)\n .volumeShadowCopyAudit(false)\n .volumeShadowCopyProtect(false)\n .vulnerableDriverProtection(false)\n .windowsLogonBypassStickyKeys(false)\n .build());\n\n ctx.export(\"preventionPolicyWindows\", example);\n }\n}\n```\n```yaml\nresources:\n example:\n type: crowdstrike:PreventionPolicyWindows\n properties:\n enabled: false\n description: Made with Pulumi\n hostGroups:\n - d6e3c1e1b3d0467da0fowc96a5e6ecb5\n ioaRuleGroups:\n - ed334b3243bc4b6bb8e7d40a2ecd86fa\n adwareAndPup:\n detection: MODERATE\n prevention: CAUTIOUS\n cloudAntiMalwareMicrosoftOfficeFiles:\n detection: MODERATE\n prevention: DISABLED\n cloudAntiMalware:\n detection: MODERATE\n prevention: CAUTIOUS\n cloudAntiMalwareUserInitiated:\n detection: MODERATE\n prevention: CAUTIOUS\n sensorAntiMalware:\n detection: MODERATE\n prevention: CAUTIOUS\n sensorAntiMalwareUserInitiated:\n detection: MODERATE\n prevention: CAUTIOUS\n extendedUserModeData:\n detection: MODERATE\n usbInsertionTriggeredScan: false\n applicationExploitationActivity: false\n additionalUserModeData: false\n notifyEndUsers: false\n advancedRemediation: false\n backupDeletion: false\n biosDeepVisibility: false\n chopperWebshell: false\n codeInjection: false\n credentialDumping: false\n cryptowall: false\n customBlocking: false\n detectOnWrite: false\n driveByDownload: false\n driverLoadPrevention: false\n interpreterOnly: false\n engineFullVisibility: false\n enhancedExploitationVisibility: false\n enhancedMlForLargerFiles: false\n fileEncryption: false\n fileSystemAccess: false\n forceAslr: false\n forceDep: false\n heapSprayPreallocation: false\n nullPageAllocation: false\n sehOverwriteProtection: false\n hardwareEnhancedExploitDetection: false\n httpDetections: false\n redactHttpDetectionDetails: false\n intelligenceSourcedThreats: false\n javascriptViaRundll32: false\n locky: false\n memoryScanning: false\n memoryScanningScanWithCpu: false\n microsoftOfficeFileSuspiciousMacroRemoval: false\n onWriteScriptFileVisibility: false\n preventSuspiciousProcesses: false\n quarantineAndSecurityCenterRegistration: false\n quarantineOnRemovableMedia: false\n quarantineOnWrite: false\n scriptBasedExecutionMonitoring: false\n sensorTamperingProtection: false\n suspiciousRegistryOperations: false\n suspiciousScriptsAndCommands: false\n uploadUnknownExecutables: false\n uploadUnknownDetectionRelatedExecutables: false\n volumeShadowCopyAudit: false\n volumeShadowCopyProtect: false\n vulnerableDriverProtection: false\n windowsLogonBypassStickyKeys: false\noutputs:\n preventionPolicyWindows: ${example}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nprevention policy can be imported by specifying the policy id.\n\n```sh\n$ pulumi import crowdstrike:index/preventionPolicyWindows:PreventionPolicyWindows example 7fb858a949034a0cbca175f660f1e769\n```\n\n",
+ "description": "This resource allows you to manage CrowdStrike Falcon prevention policies for Windows hosts. Prevention policies allow you to manage what activity will trigger detections and preventions on your hosts.\n\n## API Scopes\n\nThe following API scopes are required:\n\n- Prevention policies | Read \u0026 Write\n\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as crowdstrike from \"@crowdstrike/pulumi\";\n\nconst example = new crowdstrike.PreventionPolicyWindows(\"example\", {\n enabled: false,\n description: \"Made with Pulumi\",\n hostGroups: [\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\"],\n ioaRuleGroups: [],\n adwareAndPup: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n cloudAntiMalwareMicrosoftOfficeFiles: {\n detection: \"MODERATE\",\n prevention: \"DISABLED\",\n },\n cloudAntiMalware: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n cloudAntiMalwareUserInitiated: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n sensorAntiMalware: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n sensorAntiMalwareUserInitiated: {\n detection: \"MODERATE\",\n prevention: \"CAUTIOUS\",\n },\n extendedUserModeData: {\n detection: \"MODERATE\",\n },\n usbInsertionTriggeredScan: false,\n applicationExploitationActivity: false,\n additionalUserModeData: false,\n notifyEndUsers: false,\n advancedRemediation: false,\n backupDeletion: false,\n biosDeepVisibility: false,\n chopperWebshell: false,\n codeInjection: false,\n credentialDumping: false,\n cryptowall: false,\n customBlocking: false,\n detectOnWrite: false,\n driveByDownload: false,\n driverLoadPrevention: false,\n interpreterOnly: false,\n engineFullVisibility: false,\n enhancedExploitationVisibility: false,\n enhancedMlForLargerFiles: false,\n fileEncryption: false,\n fileSystemAccess: false,\n forceAslr: false,\n forceDep: false,\n heapSprayPreallocation: false,\n nullPageAllocation: false,\n sehOverwriteProtection: false,\n hardwareEnhancedExploitDetection: false,\n httpDetections: false,\n redactHttpDetectionDetails: false,\n intelligenceSourcedThreats: false,\n javascriptViaRundll32: false,\n locky: false,\n memoryScanning: false,\n memoryScanningScanWithCpu: false,\n microsoftOfficeFileSuspiciousMacroRemoval: false,\n onWriteScriptFileVisibility: false,\n preventSuspiciousProcesses: false,\n quarantineAndSecurityCenterRegistration: false,\n quarantineOnRemovableMedia: false,\n quarantineOnWrite: false,\n scriptBasedExecutionMonitoring: false,\n sensorTamperingProtection: false,\n suspiciousRegistryOperations: false,\n suspiciousScriptsAndCommands: false,\n uploadUnknownExecutables: false,\n uploadUnknownDetectionRelatedExecutables: false,\n volumeShadowCopyAudit: false,\n volumeShadowCopyProtect: false,\n vulnerableDriverProtection: false,\n windowsLogonBypassStickyKeys: false,\n});\nexport const preventionPolicyWindows = example;\n```\n```python\nimport pulumi\nimport crowdstrike_pulumi as crowdstrike\n\nexample = crowdstrike.PreventionPolicyWindows(\"example\",\n enabled=False,\n description=\"Made with Pulumi\",\n host_groups=[\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\"],\n ioa_rule_groups=[],\n adware_and_pup={\n \"detection\": \"MODERATE\",\n \"prevention\": \"CAUTIOUS\",\n },\n cloud_anti_malware_microsoft_office_files={\n \"detection\": \"MODERATE\",\n \"prevention\": \"DISABLED\",\n },\n cloud_anti_malware={\n \"detection\": \"MODERATE\",\n \"prevention\": \"CAUTIOUS\",\n },\n cloud_anti_malware_user_initiated={\n \"detection\": \"MODERATE\",\n \"prevention\": \"CAUTIOUS\",\n },\n sensor_anti_malware={\n \"detection\": \"MODERATE\",\n \"prevention\": \"CAUTIOUS\",\n },\n sensor_anti_malware_user_initiated={\n \"detection\": \"MODERATE\",\n \"prevention\": \"CAUTIOUS\",\n },\n extended_user_mode_data={\n \"detection\": \"MODERATE\",\n },\n usb_insertion_triggered_scan=False,\n application_exploitation_activity=False,\n additional_user_mode_data=False,\n notify_end_users=False,\n advanced_remediation=False,\n backup_deletion=False,\n bios_deep_visibility=False,\n chopper_webshell=False,\n code_injection=False,\n credential_dumping=False,\n cryptowall=False,\n custom_blocking=False,\n detect_on_write=False,\n drive_by_download=False,\n driver_load_prevention=False,\n interpreter_only=False,\n engine_full_visibility=False,\n enhanced_exploitation_visibility=False,\n enhanced_ml_for_larger_files=False,\n file_encryption=False,\n file_system_access=False,\n force_aslr=False,\n force_dep=False,\n heap_spray_preallocation=False,\n null_page_allocation=False,\n seh_overwrite_protection=False,\n hardware_enhanced_exploit_detection=False,\n http_detections=False,\n redact_http_detection_details=False,\n intelligence_sourced_threats=False,\n javascript_via_rundll32=False,\n locky=False,\n memory_scanning=False,\n memory_scanning_scan_with_cpu=False,\n microsoft_office_file_suspicious_macro_removal=False,\n on_write_script_file_visibility=False,\n prevent_suspicious_processes=False,\n quarantine_and_security_center_registration=False,\n quarantine_on_removable_media=False,\n quarantine_on_write=False,\n script_based_execution_monitoring=False,\n sensor_tampering_protection=False,\n suspicious_registry_operations=False,\n suspicious_scripts_and_commands=False,\n upload_unknown_executables=False,\n upload_unknown_detection_related_executables=False,\n volume_shadow_copy_audit=False,\n volume_shadow_copy_protect=False,\n vulnerable_driver_protection=False,\n windows_logon_bypass_sticky_keys=False)\npulumi.export(\"preventionPolicyWindows\", example)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Crowdstrike = CrowdStrike.Crowdstrike;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Crowdstrike.PreventionPolicyWindows(\"example\", new()\n {\n Enabled = false,\n Description = \"Made with Pulumi\",\n HostGroups = new[]\n {\n \"d6e3c1e1b3d0467da0fowc96a5e6ecb5\",\n },\n IoaRuleGroups = new[] {},\n AdwareAndPup = new Crowdstrike.Inputs.PreventionPolicyWindowsAdwareAndPupArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n CloudAntiMalwareMicrosoftOfficeFiles = new Crowdstrike.Inputs.PreventionPolicyWindowsCloudAntiMalwareMicrosoftOfficeFilesArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"DISABLED\",\n },\n CloudAntiMalware = new Crowdstrike.Inputs.PreventionPolicyWindowsCloudAntiMalwareArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n CloudAntiMalwareUserInitiated = new Crowdstrike.Inputs.PreventionPolicyWindowsCloudAntiMalwareUserInitiatedArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n SensorAntiMalware = new Crowdstrike.Inputs.PreventionPolicyWindowsSensorAntiMalwareArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n SensorAntiMalwareUserInitiated = new Crowdstrike.Inputs.PreventionPolicyWindowsSensorAntiMalwareUserInitiatedArgs\n {\n Detection = \"MODERATE\",\n Prevention = \"CAUTIOUS\",\n },\n ExtendedUserModeData = new Crowdstrike.Inputs.PreventionPolicyWindowsExtendedUserModeDataArgs\n {\n Detection = \"MODERATE\",\n },\n UsbInsertionTriggeredScan = false,\n ApplicationExploitationActivity = false,\n AdditionalUserModeData = false,\n NotifyEndUsers = false,\n AdvancedRemediation = false,\n BackupDeletion = false,\n BiosDeepVisibility = false,\n ChopperWebshell = false,\n CodeInjection = false,\n CredentialDumping = false,\n Cryptowall = false,\n CustomBlocking = false,\n DetectOnWrite = false,\n DriveByDownload = false,\n DriverLoadPrevention = false,\n InterpreterOnly = false,\n EngineFullVisibility = false,\n EnhancedExploitationVisibility = false,\n EnhancedMlForLargerFiles = false,\n FileEncryption = false,\n FileSystemAccess = false,\n ForceAslr = false,\n ForceDep = false,\n HeapSprayPreallocation = false,\n NullPageAllocation = false,\n SehOverwriteProtection = false,\n HardwareEnhancedExploitDetection = false,\n HttpDetections = false,\n RedactHttpDetectionDetails = false,\n IntelligenceSourcedThreats = false,\n JavascriptViaRundll32 = false,\n Locky = false,\n MemoryScanning = false,\n MemoryScanningScanWithCpu = false,\n MicrosoftOfficeFileSuspiciousMacroRemoval = false,\n OnWriteScriptFileVisibility = false,\n PreventSuspiciousProcesses = false,\n QuarantineAndSecurityCenterRegistration = false,\n QuarantineOnRemovableMedia = false,\n QuarantineOnWrite = false,\n ScriptBasedExecutionMonitoring = false,\n SensorTamperingProtection = false,\n SuspiciousRegistryOperations = false,\n SuspiciousScriptsAndCommands = false,\n UploadUnknownExecutables = false,\n UploadUnknownDetectionRelatedExecutables = false,\n VolumeShadowCopyAudit = false,\n VolumeShadowCopyProtect = false,\n VulnerableDriverProtection = false,\n WindowsLogonBypassStickyKeys = false,\n });\n\n return new Dictionary\u003cstring, object?\u003e\n {\n [\"preventionPolicyWindows\"] = example,\n };\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/crowdstrike/pulumi-crowdstrike/sdk/go/crowdstrike\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := crowdstrike.NewPreventionPolicyWindows(ctx, \"example\", \u0026crowdstrike.PreventionPolicyWindowsArgs{\n\t\t\tEnabled: pulumi.Bool(false),\n\t\t\tDescription: pulumi.String(\"Made with Pulumi\"),\n\t\t\tHostGroups: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\"),\n\t\t\t},\n\t\t\tIoaRuleGroups: pulumi.StringArray{},\n\t\t\tAdwareAndPup: \u0026crowdstrike.PreventionPolicyWindowsAdwareAndPupArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tCloudAntiMalwareMicrosoftOfficeFiles: \u0026crowdstrike.PreventionPolicyWindowsCloudAntiMalwareMicrosoftOfficeFilesArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"DISABLED\"),\n\t\t\t},\n\t\t\tCloudAntiMalware: \u0026crowdstrike.PreventionPolicyWindowsCloudAntiMalwareArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tCloudAntiMalwareUserInitiated: \u0026crowdstrike.PreventionPolicyWindowsCloudAntiMalwareUserInitiatedArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tSensorAntiMalware: \u0026crowdstrike.PreventionPolicyWindowsSensorAntiMalwareArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tSensorAntiMalwareUserInitiated: \u0026crowdstrike.PreventionPolicyWindowsSensorAntiMalwareUserInitiatedArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t\tPrevention: pulumi.String(\"CAUTIOUS\"),\n\t\t\t},\n\t\t\tExtendedUserModeData: \u0026crowdstrike.PreventionPolicyWindowsExtendedUserModeDataArgs{\n\t\t\t\tDetection: pulumi.String(\"MODERATE\"),\n\t\t\t},\n\t\t\tUsbInsertionTriggeredScan: pulumi.Bool(false),\n\t\t\tApplicationExploitationActivity: pulumi.Bool(false),\n\t\t\tAdditionalUserModeData: pulumi.Bool(false),\n\t\t\tNotifyEndUsers: pulumi.Bool(false),\n\t\t\tAdvancedRemediation: pulumi.Bool(false),\n\t\t\tBackupDeletion: pulumi.Bool(false),\n\t\t\tBiosDeepVisibility: pulumi.Bool(false),\n\t\t\tChopperWebshell: pulumi.Bool(false),\n\t\t\tCodeInjection: pulumi.Bool(false),\n\t\t\tCredentialDumping: pulumi.Bool(false),\n\t\t\tCryptowall: pulumi.Bool(false),\n\t\t\tCustomBlocking: pulumi.Bool(false),\n\t\t\tDetectOnWrite: pulumi.Bool(false),\n\t\t\tDriveByDownload: pulumi.Bool(false),\n\t\t\tDriverLoadPrevention: pulumi.Bool(false),\n\t\t\tInterpreterOnly: pulumi.Bool(false),\n\t\t\tEngineFullVisibility: pulumi.Bool(false),\n\t\t\tEnhancedExploitationVisibility: pulumi.Bool(false),\n\t\t\tEnhancedMlForLargerFiles: pulumi.Bool(false),\n\t\t\tFileEncryption: pulumi.Bool(false),\n\t\t\tFileSystemAccess: pulumi.Bool(false),\n\t\t\tForceAslr: pulumi.Bool(false),\n\t\t\tForceDep: pulumi.Bool(false),\n\t\t\tHeapSprayPreallocation: pulumi.Bool(false),\n\t\t\tNullPageAllocation: pulumi.Bool(false),\n\t\t\tSehOverwriteProtection: pulumi.Bool(false),\n\t\t\tHardwareEnhancedExploitDetection: pulumi.Bool(false),\n\t\t\tHttpDetections: pulumi.Bool(false),\n\t\t\tRedactHttpDetectionDetails: pulumi.Bool(false),\n\t\t\tIntelligenceSourcedThreats: pulumi.Bool(false),\n\t\t\tJavascriptViaRundll32: pulumi.Bool(false),\n\t\t\tLocky: pulumi.Bool(false),\n\t\t\tMemoryScanning: pulumi.Bool(false),\n\t\t\tMemoryScanningScanWithCpu: pulumi.Bool(false),\n\t\t\tMicrosoftOfficeFileSuspiciousMacroRemoval: pulumi.Bool(false),\n\t\t\tOnWriteScriptFileVisibility: pulumi.Bool(false),\n\t\t\tPreventSuspiciousProcesses: pulumi.Bool(false),\n\t\t\tQuarantineAndSecurityCenterRegistration: pulumi.Bool(false),\n\t\t\tQuarantineOnRemovableMedia: pulumi.Bool(false),\n\t\t\tQuarantineOnWrite: pulumi.Bool(false),\n\t\t\tScriptBasedExecutionMonitoring: pulumi.Bool(false),\n\t\t\tSensorTamperingProtection: pulumi.Bool(false),\n\t\t\tSuspiciousRegistryOperations: pulumi.Bool(false),\n\t\t\tSuspiciousScriptsAndCommands: pulumi.Bool(false),\n\t\t\tUploadUnknownExecutables: pulumi.Bool(false),\n\t\t\tUploadUnknownDetectionRelatedExecutables: pulumi.Bool(false),\n\t\t\tVolumeShadowCopyAudit: pulumi.Bool(false),\n\t\t\tVolumeShadowCopyProtect: pulumi.Bool(false),\n\t\t\tVulnerableDriverProtection: pulumi.Bool(false),\n\t\t\tWindowsLogonBypassStickyKeys: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tctx.Export(\"preventionPolicyWindows\", example)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.crowdstrike.PreventionPolicyWindows;\nimport com.pulumi.crowdstrike.PreventionPolicyWindowsArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyWindowsAdwareAndPupArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyWindowsCloudAntiMalwareMicrosoftOfficeFilesArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyWindowsCloudAntiMalwareArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyWindowsCloudAntiMalwareUserInitiatedArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyWindowsSensorAntiMalwareArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyWindowsSensorAntiMalwareUserInitiatedArgs;\nimport com.pulumi.crowdstrike.inputs.PreventionPolicyWindowsExtendedUserModeDataArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new PreventionPolicyWindows(\"example\", PreventionPolicyWindowsArgs.builder()\n .enabled(false)\n .description(\"Made with Pulumi\")\n .hostGroups(\"d6e3c1e1b3d0467da0fowc96a5e6ecb5\")\n .ioaRuleGroups()\n .adwareAndPup(PreventionPolicyWindowsAdwareAndPupArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .cloudAntiMalwareMicrosoftOfficeFiles(PreventionPolicyWindowsCloudAntiMalwareMicrosoftOfficeFilesArgs.builder()\n .detection(\"MODERATE\")\n .prevention(\"DISABLED\")\n .build())\n .cloudAntiMalware(PreventionPolicyWindowsCloudAntiMalwareArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .cloudAntiMalwareUserInitiated(PreventionPolicyWindowsCloudAntiMalwareUserInitiatedArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .sensorAntiMalware(PreventionPolicyWindowsSensorAntiMalwareArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .sensorAntiMalwareUserInitiated(PreventionPolicyWindowsSensorAntiMalwareUserInitiatedArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .extendedUserModeData(PreventionPolicyWindowsExtendedUserModeDataArgs.builder()\n%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))\n .usbInsertionTriggeredScan(false)\n .applicationExploitationActivity(false)\n .additionalUserModeData(false)\n .notifyEndUsers(false)\n .advancedRemediation(false)\n .backupDeletion(false)\n .biosDeepVisibility(false)\n .chopperWebshell(false)\n .codeInjection(false)\n .credentialDumping(false)\n .cryptowall(false)\n .customBlocking(false)\n .detectOnWrite(false)\n .driveByDownload(false)\n .driverLoadPrevention(false)\n .interpreterOnly(false)\n .engineFullVisibility(false)\n .enhancedExploitationVisibility(false)\n .enhancedMlForLargerFiles(false)\n .fileEncryption(false)\n .fileSystemAccess(false)\n .forceAslr(false)\n .forceDep(false)\n .heapSprayPreallocation(false)\n .nullPageAllocation(false)\n .sehOverwriteProtection(false)\n .hardwareEnhancedExploitDetection(false)\n .httpDetections(false)\n .redactHttpDetectionDetails(false)\n .intelligenceSourcedThreats(false)\n .javascriptViaRundll32(false)\n .locky(false)\n .memoryScanning(false)\n .memoryScanningScanWithCpu(false)\n .microsoftOfficeFileSuspiciousMacroRemoval(false)\n .onWriteScriptFileVisibility(false)\n .preventSuspiciousProcesses(false)\n .quarantineAndSecurityCenterRegistration(false)\n .quarantineOnRemovableMedia(false)\n .quarantineOnWrite(false)\n .scriptBasedExecutionMonitoring(false)\n .sensorTamperingProtection(false)\n .suspiciousRegistryOperations(false)\n .suspiciousScriptsAndCommands(false)\n .uploadUnknownExecutables(false)\n .uploadUnknownDetectionRelatedExecutables(false)\n .volumeShadowCopyAudit(false)\n .volumeShadowCopyProtect(false)\n .vulnerableDriverProtection(false)\n .windowsLogonBypassStickyKeys(false)\n .build());\n\n ctx.export(\"preventionPolicyWindows\", example);\n }\n}\n```\n```yaml\nresources:\n example:\n type: crowdstrike:PreventionPolicyWindows\n properties:\n enabled: false\n description: Made with Pulumi\n hostGroups:\n - d6e3c1e1b3d0467da0fowc96a5e6ecb5\n ioaRuleGroups: []\n adwareAndPup:\n detection: MODERATE\n prevention: CAUTIOUS\n cloudAntiMalwareMicrosoftOfficeFiles:\n detection: MODERATE\n prevention: DISABLED\n cloudAntiMalware:\n detection: MODERATE\n prevention: CAUTIOUS\n cloudAntiMalwareUserInitiated:\n detection: MODERATE\n prevention: CAUTIOUS\n sensorAntiMalware:\n detection: MODERATE\n prevention: CAUTIOUS\n sensorAntiMalwareUserInitiated:\n detection: MODERATE\n prevention: CAUTIOUS\n extendedUserModeData:\n detection: MODERATE\n usbInsertionTriggeredScan: false\n applicationExploitationActivity: false\n additionalUserModeData: false\n notifyEndUsers: false\n advancedRemediation: false\n backupDeletion: false\n biosDeepVisibility: false\n chopperWebshell: false\n codeInjection: false\n credentialDumping: false\n cryptowall: false\n customBlocking: false\n detectOnWrite: false\n driveByDownload: false\n driverLoadPrevention: false\n interpreterOnly: false\n engineFullVisibility: false\n enhancedExploitationVisibility: false\n enhancedMlForLargerFiles: false\n fileEncryption: false\n fileSystemAccess: false\n forceAslr: false\n forceDep: false\n heapSprayPreallocation: false\n nullPageAllocation: false\n sehOverwriteProtection: false\n hardwareEnhancedExploitDetection: false\n httpDetections: false\n redactHttpDetectionDetails: false\n intelligenceSourcedThreats: false\n javascriptViaRundll32: false\n locky: false\n memoryScanning: false\n memoryScanningScanWithCpu: false\n microsoftOfficeFileSuspiciousMacroRemoval: false\n onWriteScriptFileVisibility: false\n preventSuspiciousProcesses: false\n quarantineAndSecurityCenterRegistration: false\n quarantineOnRemovableMedia: false\n quarantineOnWrite: false\n scriptBasedExecutionMonitoring: false\n sensorTamperingProtection: false\n suspiciousRegistryOperations: false\n suspiciousScriptsAndCommands: false\n uploadUnknownExecutables: false\n uploadUnknownDetectionRelatedExecutables: false\n volumeShadowCopyAudit: false\n volumeShadowCopyProtect: false\n vulnerableDriverProtection: false\n windowsLogonBypassStickyKeys: false\noutputs:\n preventionPolicyWindows: ${example}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nprevention policy can be imported by specifying the policy id.\n\n```sh\n$ pulumi import crowdstrike:index/preventionPolicyWindows:PreventionPolicyWindows example 7fb858a949034a0cbca175f660f1e769\n```\n\n",
"properties": {
"additionalUserModeData": {
"type": "boolean",
@@ -2628,9 +2640,11 @@
"forceDep",
"hardwareEnhancedExploitDetection",
"heapSprayPreallocation",
+ "hostGroups",
"httpDetections",
"intelligenceSourcedThreats",
"interpreterOnly",
+ "ioaRuleGroups",
"javascriptViaRundll32",
"lastUpdated",
"locky",
@@ -2917,6 +2931,10 @@
"description": "Whether to enable the setting. A command line process associated with Windows logon bypass was prevented from executing.\n"
}
},
+ "requiredInputs": [
+ "hostGroups",
+ "ioaRuleGroups"
+ ],
"stateInputs": {
"description": "Input properties used for looking up and filtering PreventionPolicyWindows resources.\n",
"properties": {
@@ -3334,7 +3352,7 @@
},
"functions": {
"crowdstrike:index/getSensorUpdatePolicyBuilds:getSensorUpdatePolicyBuilds": {
- "description": "This data source provides information about the latest sensor builds for each platform.\n\n## API Scopes\n\nThe following API scopes are required:\n\n- Sensor update policies | Write\n\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as crowdstrike from \"@pulumi/crowdstrike\";\n\nconst builds = crowdstrike.getSensorUpdatePolicyBuilds({});\nexport const latestWindowsBuild = builds.then(builds =\u003e builds.windows?.latest);\nexport const n1LinuxBuild = builds.then(builds =\u003e builds.linux?.n1);\nexport const n2MacBuild = builds.then(builds =\u003e builds.mac?.n2);\nexport const latestLinuxArm64Build = builds.then(builds =\u003e builds.linuxArm64?.latest);\n```\n```python\nimport pulumi\nimport pulumi_crowdstrike as crowdstrike\n\nbuilds = crowdstrike.get_sensor_update_policy_builds()\npulumi.export(\"latestWindowsBuild\", builds.windows.latest)\npulumi.export(\"n1LinuxBuild\", builds.linux.n1)\npulumi.export(\"n2MacBuild\", builds.mac.n2)\npulumi.export(\"latestLinuxArm64Build\", builds.linux_arm64.latest)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Crowdstrike = Pulumi.Crowdstrike;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var builds = Crowdstrike.GetSensorUpdatePolicyBuilds.Invoke();\n\n return new Dictionary\u003cstring, object?\u003e\n {\n [\"latestWindowsBuild\"] = builds.Apply(getSensorUpdatePolicyBuildsResult =\u003e getSensorUpdatePolicyBuildsResult.Windows?.Latest),\n [\"n1LinuxBuild\"] = builds.Apply(getSensorUpdatePolicyBuildsResult =\u003e getSensorUpdatePolicyBuildsResult.Linux?.N1),\n [\"n2MacBuild\"] = builds.Apply(getSensorUpdatePolicyBuildsResult =\u003e getSensorUpdatePolicyBuildsResult.Mac?.N2),\n [\"latestLinuxArm64Build\"] = builds.Apply(getSensorUpdatePolicyBuildsResult =\u003e getSensorUpdatePolicyBuildsResult.LinuxArm64?.Latest),\n };\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/crowdstrike/pulumi-crowdstrike/sdk/go/crowdstrike\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tbuilds, err := crowdstrike.GetSensorUpdatePolicyBuilds(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tctx.Export(\"latestWindowsBuild\", builds.Windows.Latest)\n\t\tctx.Export(\"n1LinuxBuild\", builds.Linux.N1)\n\t\tctx.Export(\"n2MacBuild\", builds.Mac.N2)\n\t\tctx.Export(\"latestLinuxArm64Build\", builds.LinuxArm64.Latest)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.crowdstrike.CrowdstrikeFunctions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var builds = CrowdstrikeFunctions.getSensorUpdatePolicyBuilds();\n\n ctx.export(\"latestWindowsBuild\", builds.applyValue(getSensorUpdatePolicyBuildsResult -\u003e getSensorUpdatePolicyBuildsResult.windows().latest()));\n ctx.export(\"n1LinuxBuild\", builds.applyValue(getSensorUpdatePolicyBuildsResult -\u003e getSensorUpdatePolicyBuildsResult.linux().n1()));\n ctx.export(\"n2MacBuild\", builds.applyValue(getSensorUpdatePolicyBuildsResult -\u003e getSensorUpdatePolicyBuildsResult.mac().n2()));\n ctx.export(\"latestLinuxArm64Build\", builds.applyValue(getSensorUpdatePolicyBuildsResult -\u003e getSensorUpdatePolicyBuildsResult.linuxArm64().latest()));\n }\n}\n```\n```yaml\nvariables:\n builds:\n fn::invoke:\n Function: crowdstrike:getSensorUpdatePolicyBuilds\n Arguments: {}\noutputs:\n latestWindowsBuild: ${builds.windows.latest}\n n1LinuxBuild: ${builds.linux.n1}\n n2MacBuild: ${builds.mac.n2}\n latestLinuxArm64Build: ${builds.linuxArm64.latest}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
+ "description": "This data source provides information about the latest sensor builds for each platform.\n\n## API Scopes\n\nThe following API scopes are required:\n\n- Sensor update policies | Write\n\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as crowdstrike from \"@pulumi/crowdstrike\";\n\nconst builds = crowdstrike.getSensorUpdatePolicyBuilds({});\nexport const latestWindowsBuild = builds.then(builds =\u003e builds.windows?.latest);\nexport const n1LinuxBuild = builds.then(builds =\u003e builds.linux?.n1);\nexport const n2MacBuild = builds.then(builds =\u003e builds.mac?.n2);\nexport const latestLinuxArm64Build = builds.then(builds =\u003e builds.linuxArm64?.latest);\n```\n```python\nimport pulumi\nimport pulumi_crowdstrike as crowdstrike\n\nbuilds = crowdstrike.get_sensor_update_policy_builds()\npulumi.export(\"latestWindowsBuild\", builds.windows.latest)\npulumi.export(\"n1LinuxBuild\", builds.linux.n1)\npulumi.export(\"n2MacBuild\", builds.mac.n2)\npulumi.export(\"latestLinuxArm64Build\", builds.linux_arm64.latest)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Crowdstrike = Pulumi.Crowdstrike;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var builds = Crowdstrike.GetSensorUpdatePolicyBuilds.Invoke();\n\n return new Dictionary\u003cstring, object?\u003e\n {\n [\"latestWindowsBuild\"] = builds.Apply(getSensorUpdatePolicyBuildsResult =\u003e getSensorUpdatePolicyBuildsResult.Windows?.Latest),\n [\"n1LinuxBuild\"] = builds.Apply(getSensorUpdatePolicyBuildsResult =\u003e getSensorUpdatePolicyBuildsResult.Linux?.N1),\n [\"n2MacBuild\"] = builds.Apply(getSensorUpdatePolicyBuildsResult =\u003e getSensorUpdatePolicyBuildsResult.Mac?.N2),\n [\"latestLinuxArm64Build\"] = builds.Apply(getSensorUpdatePolicyBuildsResult =\u003e getSensorUpdatePolicyBuildsResult.LinuxArm64?.Latest),\n };\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/crowdstrike/pulumi-crowdstrike/sdk/go/crowdstrike\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tbuilds, err := crowdstrike.GetSensorUpdatePolicyBuilds(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tctx.Export(\"latestWindowsBuild\", builds.Windows.Latest)\n\t\tctx.Export(\"n1LinuxBuild\", builds.Linux.N1)\n\t\tctx.Export(\"n2MacBuild\", builds.Mac.N2)\n\t\tctx.Export(\"latestLinuxArm64Build\", builds.LinuxArm64.Latest)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.crowdstrike.CrowdstrikeFunctions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var builds = CrowdstrikeFunctions.getSensorUpdatePolicyBuilds();\n\n ctx.export(\"latestWindowsBuild\", builds.applyValue(getSensorUpdatePolicyBuildsResult -\u003e getSensorUpdatePolicyBuildsResult.windows().latest()));\n ctx.export(\"n1LinuxBuild\", builds.applyValue(getSensorUpdatePolicyBuildsResult -\u003e getSensorUpdatePolicyBuildsResult.linux().n1()));\n ctx.export(\"n2MacBuild\", builds.applyValue(getSensorUpdatePolicyBuildsResult -\u003e getSensorUpdatePolicyBuildsResult.mac().n2()));\n ctx.export(\"latestLinuxArm64Build\", builds.applyValue(getSensorUpdatePolicyBuildsResult -\u003e getSensorUpdatePolicyBuildsResult.linuxArm64().latest()));\n }\n}\n```\n```yaml\nvariables:\n builds:\n fn::invoke:\n Function: crowdstrike:getSensorUpdatePolicyBuilds\n Arguments: {}\noutputs:\n latestWindowsBuild: ${builds.windows.latest}\n n1LinuxBuild: ${builds.linux.n1}\n n2MacBuild: ${builds.mac.n2}\n latestLinuxArm64Build: ${builds.linuxArm64.latest}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
"outputs": {
"description": "A collection of values returned by getSensorUpdatePolicyBuilds.\n",
"properties": {
diff --git a/provider/go.mod b/provider/go.mod
index d7393c8..516d10f 100644
--- a/provider/go.mod
+++ b/provider/go.mod
@@ -9,26 +9,17 @@ replace github.com/crowdstrike/terraform-provider-crowdstrike/shim => ./shim
require (
github.com/crowdstrike/terraform-provider-crowdstrike/shim v0.0.0-00010101000000-000000000000
github.com/ettle/strcase v0.1.1
- github.com/pulumi/pulumi-terraform-bridge/pf v0.44.1
- github.com/pulumi/pulumi-terraform-bridge/v3 v3.91.1
- github.com/pulumi/pulumi/sdk/v3 v3.133.0
+ github.com/pulumi/pulumi-terraform-bridge/pf v0.49.0
+ github.com/pulumi/pulumi-terraform-bridge/v3 v3.96.0
+ github.com/pulumi/pulumi/sdk/v3 v3.140.0
)
require (
cloud.google.com/go v0.112.1 // indirect
- cloud.google.com/go/compute/metadata v0.3.0 // indirect
+ cloud.google.com/go/compute/metadata v0.5.0 // indirect
cloud.google.com/go/iam v1.1.6 // indirect
- cloud.google.com/go/kms v1.15.7 // indirect
- cloud.google.com/go/logging v1.9.0 // indirect
- cloud.google.com/go/longrunning v0.5.5 // indirect
cloud.google.com/go/storage v1.39.1 // indirect
dario.cat/mergo v1.0.0 // indirect
- github.com/Azure/azure-sdk-for-go/sdk/azcore v1.11.1 // indirect
- github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.7.0 // indirect
- github.com/Azure/azure-sdk-for-go/sdk/internal v1.8.0 // indirect
- github.com/Azure/azure-sdk-for-go/sdk/keyvault/azkeys v0.10.0 // indirect
- github.com/Azure/azure-sdk-for-go/sdk/keyvault/internal v0.7.1 // indirect
- github.com/AzureAD/microsoft-authentication-library-for-go v1.2.2 // indirect
github.com/BurntSushi/toml v1.2.1 // indirect
github.com/Masterminds/goutils v1.1.1 // indirect
github.com/Masterminds/semver v1.5.0 // indirect
@@ -44,26 +35,11 @@ require (
github.com/asaskevich/govalidator v0.0.0-20230301143203-a9d515a09cc2 // indirect
github.com/atotto/clipboard v0.1.4 // indirect
github.com/aws/aws-sdk-go v1.50.36 // indirect
- github.com/aws/aws-sdk-go-v2 v1.26.1 // indirect
- github.com/aws/aws-sdk-go-v2/config v1.27.11 // indirect
- github.com/aws/aws-sdk-go-v2/credentials v1.17.11 // indirect
- github.com/aws/aws-sdk-go-v2/feature/ec2/imds v1.16.1 // indirect
- github.com/aws/aws-sdk-go-v2/internal/configsources v1.3.5 // indirect
- github.com/aws/aws-sdk-go-v2/internal/endpoints/v2 v2.6.5 // indirect
- github.com/aws/aws-sdk-go-v2/internal/ini v1.8.0 // indirect
- github.com/aws/aws-sdk-go-v2/service/internal/accept-encoding v1.11.2 // indirect
- github.com/aws/aws-sdk-go-v2/service/internal/presigned-url v1.11.7 // indirect
- github.com/aws/aws-sdk-go-v2/service/kms v1.30.1 // indirect
- github.com/aws/aws-sdk-go-v2/service/sso v1.20.5 // indirect
- github.com/aws/aws-sdk-go-v2/service/ssooidc v1.23.4 // indirect
- github.com/aws/aws-sdk-go-v2/service/sts v1.28.6 // indirect
- github.com/aws/smithy-go v1.20.2 // indirect
github.com/aymanbagabas/go-osc52/v2 v2.0.1 // indirect
github.com/bgentry/go-netrc v0.0.0-20140422174119-9fd32a8b3d3d // indirect
github.com/bgentry/speakeasy v0.1.0 // indirect
github.com/blang/semver v3.5.1+incompatible // indirect
github.com/blang/semver/v4 v4.0.0 // indirect
- github.com/cenkalti/backoff/v3 v3.2.2 // indirect
github.com/charmbracelet/bubbles v0.16.1 // indirect
github.com/charmbracelet/bubbletea v0.25.0 // indirect
github.com/charmbracelet/lipgloss v0.7.1 // indirect
@@ -71,9 +47,8 @@ require (
github.com/cloudflare/circl v1.3.7 // indirect
github.com/containerd/console v1.0.4-0.20230313162750-1ae8d489ac81 // indirect
github.com/crowdstrike/gofalcon v0.6.1-0.20240426204036-ac8ce2b4f2d7 // indirect
- github.com/crowdstrike/terraform-provider-crowdstrike v0.0.7 // indirect
+ github.com/crowdstrike/terraform-provider-crowdstrike v0.0.10 // indirect
github.com/cyphar/filepath-securejoin v0.2.4 // indirect
- github.com/davecgh/go-spew v1.1.1 // indirect
github.com/deckarep/golang-set/v2 v2.5.0 // indirect
github.com/djherbis/times v1.5.0 // indirect
github.com/edsrzf/mmap-go v1.1.0 // indirect
@@ -83,7 +58,6 @@ require (
github.com/go-git/gcfg v1.5.1-0.20230307220236-3a3c6141e376 // indirect
github.com/go-git/go-billy/v5 v5.5.0 // indirect
github.com/go-git/go-git/v5 v5.12.0 // indirect
- github.com/go-jose/go-jose/v3 v3.0.3 // indirect
github.com/go-logr/logr v1.4.1 // indirect
github.com/go-logr/stdr v1.2.2 // indirect
github.com/go-openapi/analysis v0.23.0 // indirect
@@ -96,20 +70,15 @@ require (
github.com/go-openapi/strfmt v0.23.0 // indirect
github.com/go-openapi/swag v0.23.0 // indirect
github.com/go-openapi/validate v0.24.0 // indirect
- github.com/gofrs/uuid v4.2.0+incompatible // indirect
github.com/gogo/protobuf v1.3.2 // indirect
- github.com/golang-jwt/jwt/v5 v5.2.1 // indirect
- github.com/golang/glog v1.2.1 // indirect
+ github.com/golang/glog v1.2.2 // indirect
github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da // indirect
github.com/golang/protobuf v1.5.4 // indirect
- github.com/google/go-querystring v1.1.0 // indirect
github.com/google/s2a-go v0.1.7 // indirect
github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510 // indirect
github.com/google/uuid v1.6.0 // indirect
- github.com/google/wire v0.6.0 // indirect
github.com/googleapis/enterprise-certificate-proxy v0.3.2 // indirect
github.com/googleapis/gax-go/v2 v2.12.2 // indirect
- github.com/gorilla/mux v1.8.0 // indirect
github.com/grpc-ecosystem/grpc-opentracing v0.0.0-20180507213350-8e809c8a8645 // indirect
github.com/hashicorp/errwrap v1.1.0 // indirect
github.com/hashicorp/go-cleanhttp v0.5.2 // indirect
@@ -117,25 +86,19 @@ require (
github.com/hashicorp/go-getter v1.7.5 // indirect
github.com/hashicorp/go-hclog v1.6.3 // indirect
github.com/hashicorp/go-multierror v1.1.1 // indirect
- github.com/hashicorp/go-plugin v1.6.1 // indirect
- github.com/hashicorp/go-retryablehttp v0.7.7 // indirect
- github.com/hashicorp/go-rootcerts v1.0.2 // indirect
+ github.com/hashicorp/go-plugin v1.6.2 // indirect
github.com/hashicorp/go-safetemp v1.0.0 // indirect
- github.com/hashicorp/go-secure-stdlib/parseutil v0.1.8 // indirect
- github.com/hashicorp/go-secure-stdlib/strutil v0.1.2 // indirect
- github.com/hashicorp/go-sockaddr v1.0.6 // indirect
github.com/hashicorp/go-uuid v1.0.3 // indirect
github.com/hashicorp/go-version v1.6.0 // indirect
github.com/hashicorp/hcl v1.0.0 // indirect
- github.com/hashicorp/hcl/v2 v2.20.0 // indirect
+ github.com/hashicorp/hcl/v2 v2.22.0 // indirect
github.com/hashicorp/hil v0.0.0-20190212132231-97b3a9cdfa93 // indirect
- github.com/hashicorp/terraform-plugin-framework v1.12.0 // indirect
+ github.com/hashicorp/terraform-plugin-framework v1.13.0 // indirect
github.com/hashicorp/terraform-plugin-framework-validators v0.12.0 // indirect
- github.com/hashicorp/terraform-plugin-go v0.24.0 // indirect
+ github.com/hashicorp/terraform-plugin-go v0.25.0 // indirect
github.com/hashicorp/terraform-plugin-log v0.9.0 // indirect
github.com/hashicorp/terraform-registry-address v0.2.3 // indirect
github.com/hashicorp/terraform-svchost v0.1.1 // indirect
- github.com/hashicorp/vault/api v1.12.0 // indirect
github.com/hashicorp/yamux v0.1.1 // indirect
github.com/huandu/xstrings v1.3.3 // indirect
github.com/iancoleman/strcase v0.2.0 // indirect
@@ -147,7 +110,6 @@ require (
github.com/json-iterator/go v1.1.12 // indirect
github.com/kevinburke/ssh_config v1.2.0 // indirect
github.com/klauspost/compress v1.15.11 // indirect
- github.com/kylelemons/godebug v1.1.0 // indirect
github.com/lucasb-eyer/go-colorful v1.2.0 // indirect
github.com/mailru/easyjson v0.7.7 // indirect
github.com/mattn/go-colorable v0.1.13 // indirect
@@ -172,28 +134,25 @@ require (
github.com/natefinch/atomic v1.0.1 // indirect
github.com/oklog/run v1.1.0 // indirect
github.com/oklog/ulid v1.3.1 // indirect
+ github.com/olekukonko/tablewriter v0.0.5 // indirect
github.com/opentracing/basictracer-go v1.1.0 // indirect
github.com/opentracing/opentracing-go v1.2.0 // indirect
github.com/pgavlin/fx v0.1.6 // indirect
github.com/pgavlin/goldmark v1.1.33-0.20200616210433-b5eb04559386 // indirect
github.com/pjbgf/sha1cd v0.3.0 // indirect
- github.com/pkg/browser v0.0.0-20240102092130-5ac0b6a4141c // indirect
github.com/pkg/errors v0.9.1 // indirect
github.com/pkg/term v1.1.0 // indirect
- github.com/pmezard/go-difflib v1.0.0 // indirect
github.com/posener/complete v1.2.3 // indirect
github.com/pulumi/appdash v0.0.0-20231130102222-75f619a67231 // indirect
github.com/pulumi/esc v0.10.0 // indirect
github.com/pulumi/inflector v0.1.1 // indirect
- github.com/pulumi/pulumi-java/pkg v0.16.1 // indirect
- github.com/pulumi/pulumi-terraform-bridge/x/muxer v0.0.8 // indirect
- github.com/pulumi/pulumi-yaml v1.10.0 // indirect
- github.com/pulumi/pulumi/pkg/v3 v3.133.0 // indirect
+ github.com/pulumi/pulumi-java/pkg v0.17.0 // indirect
+ github.com/pulumi/pulumi-yaml v1.11.2 // indirect
+ github.com/pulumi/pulumi/pkg/v3 v3.140.0 // indirect
github.com/pulumi/schema-tools v0.1.2 // indirect
github.com/rivo/uniseg v0.4.4 // indirect
github.com/rogpeppe/go-internal v1.12.0 // indirect
github.com/russross/blackfriday/v2 v2.1.0 // indirect
- github.com/ryanuber/go-glob v1.0.0 // indirect
github.com/sabhiram/go-gitignore v0.0.0-20210923224102-525f6e181f06 // indirect
github.com/santhosh-tekuri/jsonschema/v5 v5.0.0 // indirect
github.com/segmentio/asm v1.1.3 // indirect
@@ -206,7 +165,6 @@ require (
github.com/spf13/cast v1.5.0 // indirect
github.com/spf13/cobra v1.8.0 // indirect
github.com/spf13/pflag v1.0.5 // indirect
- github.com/stretchr/testify v1.9.0 // indirect
github.com/teekennedy/goldmark-markdown v0.3.0 // indirect
github.com/texttheater/golang-levenshtein v1.0.1 // indirect
github.com/uber/jaeger-client-go v2.30.0+incompatible // indirect
@@ -215,9 +173,6 @@ require (
github.com/vmihailenco/msgpack/v5 v5.4.1 // indirect
github.com/vmihailenco/tagparser/v2 v2.0.0 // indirect
github.com/xanzy/ssh-agent v0.3.3 // indirect
- github.com/xeipuuv/gojsonpointer v0.0.0-20180127040702-4e3ac2762d5f // indirect
- github.com/xeipuuv/gojsonreference v0.0.0-20180127040603-bd5ef7bd5415 // indirect
- github.com/xeipuuv/gojsonschema v1.2.0 // indirect
github.com/yuin/goldmark v1.7.4 // indirect
github.com/zclconf/go-cty v1.14.4 // indirect
go.mongodb.org/mongo-driver v1.15.0 // indirect
@@ -228,26 +183,23 @@ require (
go.opentelemetry.io/otel/metric v1.26.0 // indirect
go.opentelemetry.io/otel/trace v1.26.0 // indirect
go.uber.org/atomic v1.9.0 // indirect
- gocloud.dev v0.37.0 // indirect
- gocloud.dev/secrets/hashivault v0.37.0 // indirect
- golang.org/x/crypto v0.25.0 // indirect
+ golang.org/x/crypto v0.26.0 // indirect
golang.org/x/exp v0.0.0-20240604190554-fc45aab8b7f8 // indirect
golang.org/x/mod v0.18.0 // indirect
- golang.org/x/net v0.27.0 // indirect
- golang.org/x/oauth2 v0.21.0 // indirect
- golang.org/x/sync v0.7.0 // indirect
- golang.org/x/sys v0.22.0 // indirect
- golang.org/x/term v0.22.0 // indirect
- golang.org/x/text v0.16.0 // indirect
+ golang.org/x/net v0.28.0 // indirect
+ golang.org/x/oauth2 v0.22.0 // indirect
+ golang.org/x/sync v0.8.0 // indirect
+ golang.org/x/sys v0.24.0 // indirect
+ golang.org/x/term v0.23.0 // indirect
+ golang.org/x/text v0.17.0 // indirect
golang.org/x/time v0.5.0 // indirect
golang.org/x/tools v0.22.0 // indirect
- golang.org/x/xerrors v0.0.0-20231012003039-104605ab7028 // indirect
google.golang.org/api v0.169.0 // indirect
google.golang.org/genproto v0.0.0-20240311173647-c811ad7063a7 // indirect
- google.golang.org/genproto/googleapis/api v0.0.0-20240604185151-ef581f913117 // indirect
- google.golang.org/genproto/googleapis/rpc v0.0.0-20240604185151-ef581f913117 // indirect
- google.golang.org/grpc v1.66.2 // indirect
- google.golang.org/protobuf v1.34.2 // indirect
+ google.golang.org/genproto/googleapis/api v0.0.0-20240814211410-ddb44dafa142 // indirect
+ google.golang.org/genproto/googleapis/rpc v0.0.0-20240814211410-ddb44dafa142 // indirect
+ google.golang.org/grpc v1.67.1 // indirect
+ google.golang.org/protobuf v1.35.1 // indirect
gopkg.in/warnings.v0 v0.1.2 // indirect
gopkg.in/yaml.v3 v3.0.1 // indirect
lukechampine.com/frand v1.4.2 // indirect
diff --git a/provider/go.sum b/provider/go.sum
index f5146ac..76ae3db 100644
--- a/provider/go.sum
+++ b/provider/go.sum
@@ -70,8 +70,8 @@ cloud.google.com/go/compute v1.6.0/go.mod h1:T29tfhtVbq1wvAPo0E3+7vhgmkOYeXjhFvz
cloud.google.com/go/compute v1.6.1/go.mod h1:g85FgpzFvNULZ+S8AYq87axRKuf2Kh7deLqV/jJ3thU=
cloud.google.com/go/compute v1.7.0/go.mod h1:435lt8av5oL9P3fv1OEzSbSUe+ybHXGMPQHHZWZxy9U=
cloud.google.com/go/compute v1.10.0/go.mod h1:ER5CLbMxl90o2jtNbGSbtfOpQKR0t15FOtRsugnLrlU=
-cloud.google.com/go/compute/metadata v0.3.0 h1:Tz+eQXMEqDIKRsmY3cHTL6FVaynIjX2QxYC4trgAKZc=
-cloud.google.com/go/compute/metadata v0.3.0/go.mod h1:zFmK7XCadkQkj6TtorcaGlCW1hT1fIilQDwofLpJ20k=
+cloud.google.com/go/compute/metadata v0.5.0 h1:Zr0eK8JbFv6+Wi4ilXAR8FJ3wyNdpxHKJNPos6LTZOY=
+cloud.google.com/go/compute/metadata v0.5.0/go.mod h1:aHnloV2TPI38yx4s9+wAZhHykWvVCfu7hQbF+9CWoiY=
cloud.google.com/go/containeranalysis v0.5.1/go.mod h1:1D92jd8gRR/c0fGMlymRgxWD3Qw9C1ff6/T7mLgVL8I=
cloud.google.com/go/containeranalysis v0.6.0/go.mod h1:HEJoiEIu+lEXM+k7+qLCci0h33lX3ZqoYFdmPcoO7s4=
cloud.google.com/go/datacatalog v1.3.0/go.mod h1:g9svFY6tuR+j+hrTw3J2dNcmI0dzmSiyOzm8kpLq0a0=
@@ -237,8 +237,6 @@ github.com/anmitsu/go-shlex v0.0.0-20200514113438-38f4b401e2be/go.mod h1:ySMOLuW
github.com/antihax/optional v1.0.0/go.mod h1:uupD/76wgC+ih3iEmQUL+0Ugr19nfwCT1kdvxnR2qWY=
github.com/apparentlymart/go-cidr v1.1.0 h1:2mAhrMoF+nhXqxTzSZMUzDHkLjmIHC+Zzn4tdgBZjnU=
github.com/apparentlymart/go-cidr v1.1.0/go.mod h1:EBcsNrHc3zQeuaeCeCtQruQm+n9/YjEn/vI25Lg7Gwc=
-github.com/apparentlymart/go-dump v0.0.0-20180507223929-23540a00eaa3 h1:ZSTrOEhiM5J5RFxEaFvMZVEAM1KvT1YzbEOwB2EAGjA=
-github.com/apparentlymart/go-dump v0.0.0-20180507223929-23540a00eaa3/go.mod h1:oL81AME2rN47vu18xqj1S1jPIPuN7afo62yKTNn3XMM=
github.com/apparentlymart/go-textseg/v12 v12.0.0/go.mod h1:S/4uRK2UtaQttw1GenVJEynmyUenKwP++x/+DdGV/Ec=
github.com/apparentlymart/go-textseg/v15 v15.0.0 h1:uYvfpb3DyLSCGWnctWKGj857c6ew1u1fNQOlOtuGxQY=
github.com/apparentlymart/go-textseg/v15 v15.0.0/go.mod h1:K8XmNZdhEBkdlyDdvbmmsvpAG721bKi0joRfFdHIWJ4=
@@ -256,38 +254,24 @@ github.com/aws/aws-sdk-go v1.50.36 h1:PjWXHwZPuTLMR1NIb8nEjLucZBMzmf84TLoLbD8BZq
github.com/aws/aws-sdk-go v1.50.36/go.mod h1:LF8svs817+Nz+DmiMQKTO3ubZ/6IaTpq3TjupRn3Eqk=
github.com/aws/aws-sdk-go-v2 v1.26.1 h1:5554eUqIYVWpU0YmeeYZ0wU64H2VLBs8TlhRB2L+EkA=
github.com/aws/aws-sdk-go-v2 v1.26.1/go.mod h1:ffIFB97e2yNsv4aTSGkqtHnppsIJzw7G7BReUZ3jCXM=
-github.com/aws/aws-sdk-go-v2/aws/protocol/eventstream v1.6.2 h1:x6xsQXGSmW6frevwDA+vi/wqhp1ct18mVXYN08/93to=
-github.com/aws/aws-sdk-go-v2/aws/protocol/eventstream v1.6.2/go.mod h1:lPprDr1e6cJdyYeGXnRaJoP4Md+cDBvi2eOj00BlGmg=
github.com/aws/aws-sdk-go-v2/config v1.27.11 h1:f47rANd2LQEYHda2ddSCKYId18/8BhSRM4BULGmfgNA=
github.com/aws/aws-sdk-go-v2/config v1.27.11/go.mod h1:SMsV78RIOYdve1vf36z8LmnszlRWkwMQtomCAI0/mIE=
github.com/aws/aws-sdk-go-v2/credentials v1.17.11 h1:YuIB1dJNf1Re822rriUOTxopaHHvIq0l/pX3fwO+Tzs=
github.com/aws/aws-sdk-go-v2/credentials v1.17.11/go.mod h1:AQtFPsDH9bI2O+71anW6EKL+NcD7LG3dpKGMV4SShgo=
github.com/aws/aws-sdk-go-v2/feature/ec2/imds v1.16.1 h1:FVJ0r5XTHSmIHJV6KuDmdYhEpvlHpiSd38RQWhut5J4=
github.com/aws/aws-sdk-go-v2/feature/ec2/imds v1.16.1/go.mod h1:zusuAeqezXzAB24LGuzuekqMAEgWkVYukBec3kr3jUg=
-github.com/aws/aws-sdk-go-v2/feature/s3/manager v1.16.15 h1:7Zwtt/lP3KNRkeZre7soMELMGNoBrutx8nobg1jKWmo=
-github.com/aws/aws-sdk-go-v2/feature/s3/manager v1.16.15/go.mod h1:436h2adoHb57yd+8W+gYPrrA9U/R/SuAuOO42Ushzhw=
github.com/aws/aws-sdk-go-v2/internal/configsources v1.3.5 h1:aw39xVGeRWlWx9EzGVnhOR4yOjQDHPQ6o6NmBlscyQg=
github.com/aws/aws-sdk-go-v2/internal/configsources v1.3.5/go.mod h1:FSaRudD0dXiMPK2UjknVwwTYyZMRsHv3TtkabsZih5I=
github.com/aws/aws-sdk-go-v2/internal/endpoints/v2 v2.6.5 h1:PG1F3OD1szkuQPzDw3CIQsRIrtTlUC3lP84taWzHlq0=
github.com/aws/aws-sdk-go-v2/internal/endpoints/v2 v2.6.5/go.mod h1:jU1li6RFryMz+so64PpKtudI+QzbKoIEivqdf6LNpOc=
github.com/aws/aws-sdk-go-v2/internal/ini v1.8.0 h1:hT8rVHwugYE2lEfdFE0QWVo81lF7jMrYJVDWI+f+VxU=
github.com/aws/aws-sdk-go-v2/internal/ini v1.8.0/go.mod h1:8tu/lYfQfFe6IGnaOdrpVgEL2IrrDOf6/m9RQum4NkY=
-github.com/aws/aws-sdk-go-v2/internal/v4a v1.3.5 h1:81KE7vaZzrl7yHBYHVEzYB8sypz11NMOZ40YlWvPxsU=
-github.com/aws/aws-sdk-go-v2/internal/v4a v1.3.5/go.mod h1:LIt2rg7Mcgn09Ygbdh/RdIm0rQ+3BNkbP1gyVMFtRK0=
-github.com/aws/aws-sdk-go-v2/service/iam v1.31.4 h1:eVm30ZIDv//r6Aogat9I88b5YX1xASSLcEDqHYRPVl0=
-github.com/aws/aws-sdk-go-v2/service/iam v1.31.4/go.mod h1:aXWImQV0uTW35LM0A/T4wEg6R1/ReXUu4SM6/lUHYK0=
github.com/aws/aws-sdk-go-v2/service/internal/accept-encoding v1.11.2 h1:Ji0DY1xUsUr3I8cHps0G+XM3WWU16lP6yG8qu1GAZAs=
github.com/aws/aws-sdk-go-v2/service/internal/accept-encoding v1.11.2/go.mod h1:5CsjAbs3NlGQyZNFACh+zztPDI7fU6eW9QsxjfnuBKg=
-github.com/aws/aws-sdk-go-v2/service/internal/checksum v1.3.7 h1:ZMeFZ5yk+Ek+jNr1+uwCd2tG89t6oTS5yVWpa6yy2es=
-github.com/aws/aws-sdk-go-v2/service/internal/checksum v1.3.7/go.mod h1:mxV05U+4JiHqIpGqqYXOHLPKUC6bDXC44bsUhNjOEwY=
github.com/aws/aws-sdk-go-v2/service/internal/presigned-url v1.11.7 h1:ogRAwT1/gxJBcSWDMZlgyFUM962F51A5CRhDLbxLdmo=
github.com/aws/aws-sdk-go-v2/service/internal/presigned-url v1.11.7/go.mod h1:YCsIZhXfRPLFFCl5xxY+1T9RKzOKjCut+28JSX2DnAk=
-github.com/aws/aws-sdk-go-v2/service/internal/s3shared v1.17.5 h1:f9RyWNtS8oH7cZlbn+/JNPpjUk5+5fLd5lM9M0i49Ys=
-github.com/aws/aws-sdk-go-v2/service/internal/s3shared v1.17.5/go.mod h1:h5CoMZV2VF297/VLhRhO1WF+XYWOzXo+4HsObA4HjBQ=
github.com/aws/aws-sdk-go-v2/service/kms v1.30.1 h1:SBn4I0fJXF9FYOVRSVMWuhvEKoAHDikjGpS3wlmw5DE=
github.com/aws/aws-sdk-go-v2/service/kms v1.30.1/go.mod h1:2snWQJQUKsbN66vAawJuOGX7dr37pfOq9hb0tZDGIqQ=
-github.com/aws/aws-sdk-go-v2/service/s3 v1.53.1 h1:6cnno47Me9bRykw9AEv9zkXE+5or7jz8TsskTTccbgc=
-github.com/aws/aws-sdk-go-v2/service/s3 v1.53.1/go.mod h1:qmdkIIAC+GCLASF7R2whgNrJADz0QZPX+Seiw/i4S3o=
github.com/aws/aws-sdk-go-v2/service/sso v1.20.5 h1:vN8hEbpRnL7+Hopy9dzmRle1xmDc7o8tmY0klsr175w=
github.com/aws/aws-sdk-go-v2/service/sso v1.20.5/go.mod h1:qGzynb/msuZIE8I75DVRCUXw3o3ZyBmUvMwQ2t/BrGM=
github.com/aws/aws-sdk-go-v2/service/ssooidc v1.23.4 h1:Jux+gDDyi1Lruk+KHF91tK2KCuY61kzoCpvtvJJBtOE=
@@ -342,8 +326,8 @@ github.com/containerd/console v1.0.4-0.20230313162750-1ae8d489ac81/go.mod h1:Yyn
github.com/cpuguy83/go-md2man/v2 v2.0.3/go.mod h1:tgQtvFlXSQOSOSIRvRPT7W67SCa46tRHOmNcaadrF8o=
github.com/crowdstrike/gofalcon v0.6.1-0.20240426204036-ac8ce2b4f2d7 h1:NLcXFICTUakAvJFSH8z+Ht6SfJ52FbOasYdP8p7BcsQ=
github.com/crowdstrike/gofalcon v0.6.1-0.20240426204036-ac8ce2b4f2d7/go.mod h1:7KSolP3XCntqZiu7GfGd8uedAQ82dqBNpP0gqBksWB8=
-github.com/crowdstrike/terraform-provider-crowdstrike v0.0.7 h1:7taix8vblqPrK9HkDkHF6CHL53QsSxpUDDccWaBpSjc=
-github.com/crowdstrike/terraform-provider-crowdstrike v0.0.7/go.mod h1:R9kYJzHPH0NKBwPwJdNchkorNDAKxbqr/Cnxx8JPPw0=
+github.com/crowdstrike/terraform-provider-crowdstrike v0.0.10 h1:m7woH9Q+zfURBYv/2aLr17bUJQwGt1bqd6VziVVxPes=
+github.com/crowdstrike/terraform-provider-crowdstrike v0.0.10/go.mod h1:R9kYJzHPH0NKBwPwJdNchkorNDAKxbqr/Cnxx8JPPw0=
github.com/cyphar/filepath-securejoin v0.2.4 h1:Ugdm7cg7i6ZK6x3xDF1oEu1nfkyfH53EtKeQYTC3kyg=
github.com/cyphar/filepath-securejoin v0.2.4/go.mod h1:aPGpWjXOXUn2NCNjFvBE6aRxGGx79pTxQpKOJNYHHl4=
github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
@@ -378,8 +362,8 @@ github.com/fatih/color v1.16.0 h1:zmkK9Ngbjj+K0yRhTVONQh1p/HknKYSlNT+vZCzyokM=
github.com/fatih/color v1.16.0/go.mod h1:fL2Sau1YI5c0pdGEVCbKQbLXB6edEj1ZgiY4NijnWvE=
github.com/felixge/httpsnoop v1.0.4 h1:NFTV2Zj1bL4mc9sqWACXbQFVBBg2W3GPvqp8/ESS2Wg=
github.com/felixge/httpsnoop v1.0.4/go.mod h1:m8KPJKqk1gH5J9DgRY2ASl2lWCfGKXixSwevea8zH2U=
-github.com/frankban/quicktest v1.14.3 h1:FJKSZTDHjyhriyC81FLQ0LY93eSai0ZyR/ZIkd3ZUKE=
-github.com/frankban/quicktest v1.14.3/go.mod h1:mgiwOwqx65TmIk1wJ6Q7wvnVMocbUorkibMOrVTHZps=
+github.com/frankban/quicktest v1.14.4 h1:g2rn0vABPOOXmZUj+vbmUp0lPoXEMuhTpIluN0XL9UY=
+github.com/frankban/quicktest v1.14.4/go.mod h1:4ptaffx2x8+WTWXmUCuVU6aPUX1/Mz7zb5vbUoiM6w0=
github.com/ghodss/yaml v1.0.0/go.mod h1:4dBDuWmgqj2HViK6kFavaiC9ZROes6MMH2rRYeMEF04=
github.com/gliderlabs/ssh v0.3.7 h1:iV3Bqi942d9huXnzEF2Mt+CY9gLu8DNM4Obd+8bODRE=
github.com/gliderlabs/ssh v0.3.7/go.mod h1:zpHEXBstFnQYtGnB8k8kQLol82umzn/2/snG7alWVD8=
@@ -431,8 +415,8 @@ github.com/gogo/protobuf v1.3.2/go.mod h1:P1XiOD3dCwIKUDQYPy72D8LYyHL2YPYrpS2s69
github.com/golang-jwt/jwt/v5 v5.2.1 h1:OuVbFODueb089Lh128TAcimifWaLhJwVflnrgM17wHk=
github.com/golang-jwt/jwt/v5 v5.2.1/go.mod h1:pqrtFR0X4osieyHYxtmOUWsAWrfe1Q5UVIyoH402zdk=
github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b/go.mod h1:SBH7ygxi8pfUlaOkMMuAQtPIUF8ecWP5IEl/CR7VP2Q=
-github.com/golang/glog v1.2.1 h1:OptwRhECazUx5ix5TTWC3EZhsZEHWcYWY4FQHTIubm4=
-github.com/golang/glog v1.2.1/go.mod h1:6AhwSGph0fcJtXVM/PEHPqZlFeoLxhs7/t5UDAwmO+w=
+github.com/golang/glog v1.2.2 h1:1+mZ9upx1Dh6FmUTFR1naJ77miKiXgALjWOZ3NVFPmY=
+github.com/golang/glog v1.2.2/go.mod h1:6AhwSGph0fcJtXVM/PEHPqZlFeoLxhs7/t5UDAwmO+w=
github.com/golang/groupcache v0.0.0-20190702054246-869f871628b6/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc=
github.com/golang/groupcache v0.0.0-20191227052852-215e87163ea7/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc=
github.com/golang/groupcache v0.0.0-20200121045136-8c9f03a8e57e/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc=
@@ -489,10 +473,6 @@ github.com/google/go-cmp v0.6.0 h1:ofyhxvXcZhMsU5ulbFiLKl/XBFqE1GSq7atu8tAmTRI=
github.com/google/go-cmp v0.6.0/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY=
github.com/google/go-querystring v1.1.0 h1:AnCroh3fv4ZBgVIf1Iwtovgjaw/GiKJo8M8yD/fhyJ8=
github.com/google/go-querystring v1.1.0/go.mod h1:Kcdr2DB4koayq7X8pmAG4sNG59So17icRSOU623lUBU=
-github.com/google/go-replayers/grpcreplay v1.1.0 h1:S5+I3zYyZ+GQz68OfbURDdt/+cSMqCK1wrvNx7WBzTE=
-github.com/google/go-replayers/grpcreplay v1.1.0/go.mod h1:qzAvJ8/wi57zq7gWqaE6AwLM6miiXUQwP1S+I9icmhk=
-github.com/google/go-replayers/httpreplay v1.2.0 h1:VM1wEyyjaoU53BwrOnaf9VhAyQQEEioJvFYxYcLRKzk=
-github.com/google/go-replayers/httpreplay v1.2.0/go.mod h1:WahEFFZZ7a1P4VM1qEeHy+tME4bwyqPcwWbNlUI1Mcg=
github.com/google/gofuzz v1.0.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
github.com/google/martian v2.1.0+incompatible h1:/CP5g8u/VJHijgedC/Legn3BAbAaWPgecwXBIDzw5no=
github.com/google/martian v2.1.0+incompatible/go.mod h1:9I4somxYTbIHy5NJKHRl3wXiIaQGbYVAs8BPL6v8lEs=
@@ -521,7 +501,6 @@ github.com/google/s2a-go v0.1.7 h1:60BLSyTrOV4/haCDW4zb1guZItoSq8foHCXrAnjBo/o=
github.com/google/s2a-go v0.1.7/go.mod h1:50CgR4k1jNlWBu4UfS4AcfhVe1r6pdZPygJ3R8F0Qdw=
github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510 h1:El6M4kTTCOh6aBiKaUGG7oYTSPP8MxqL4YI3kZKwcP4=
github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510/go.mod h1:pupxD2MaaD3pAXIBCelhxNneeOaAeabZDe5s4K6zSpQ=
-github.com/google/subcommands v1.2.0/go.mod h1:ZjhPrFU+Olkh9WazFPsl27BQ4UPiG37m3yTrtFlrHVk=
github.com/google/uuid v1.1.1/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
github.com/google/uuid v1.1.2/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
github.com/google/uuid v1.3.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
@@ -568,8 +547,8 @@ github.com/hashicorp/go-hclog v1.6.3/go.mod h1:W4Qnvbt70Wk/zYJryRzDRU/4r0kIg0PVH
github.com/hashicorp/go-multierror v1.0.0/go.mod h1:dHtQlpGsu+cZNNAkkCN/P3hoUDHhCYQXV3UM06sGGrk=
github.com/hashicorp/go-multierror v1.1.1 h1:H5DkEtf6CXdFp0N0Em5UCwQpXMWke8IA0+lD48awMYo=
github.com/hashicorp/go-multierror v1.1.1/go.mod h1:iw975J/qwKPdAO1clOe2L8331t/9/fmwbPZ6JB6eMoM=
-github.com/hashicorp/go-plugin v1.6.1 h1:P7MR2UP6gNKGPp+y7EZw2kOiq4IR9WiqLvp0XOsVdwI=
-github.com/hashicorp/go-plugin v1.6.1/go.mod h1:XPHFku2tFo3o3QKFgSYo+cghcUhw1NA1hZyMK0PWAw0=
+github.com/hashicorp/go-plugin v1.6.2 h1:zdGAEd0V1lCaU0u+MxWQhtSDQmahpkwOun8U8EiRVog=
+github.com/hashicorp/go-plugin v1.6.2/go.mod h1:CkgLQ5CZqNmdL9U9JzM532t8ZiYQ35+pj3b1FD37R0Q=
github.com/hashicorp/go-retryablehttp v0.7.7 h1:C8hUCYzor8PIfXHa4UrZkU4VvK8o9ISHxT2Q8+VepXU=
github.com/hashicorp/go-retryablehttp v0.7.7/go.mod h1:pkQpWZeYWskR+D1tR2O5OcBFOxfA7DoAO6xtkuQnHTk=
github.com/hashicorp/go-rootcerts v1.0.2 h1:jzhAVGtqPKbwpyCPELlgNWhE1znq+qwJtW5Oi2viEzc=
@@ -592,8 +571,8 @@ github.com/hashicorp/hc-install v0.6.4 h1:QLqlM56/+SIIGvGcfFiwMY3z5WGXT066suo/v9
github.com/hashicorp/hc-install v0.6.4/go.mod h1:05LWLy8TD842OtgcfBbOT0WMoInBMUSHjmDx10zuBIA=
github.com/hashicorp/hcl v1.0.0 h1:0Anlzjpi4vEasTeNFn2mLJgTSwt0+6sfsiTG8qcWGx4=
github.com/hashicorp/hcl v1.0.0/go.mod h1:E5yfLk+7swimpb2L/Alb/PJmXilQ/rhwaUYs4T20WEQ=
-github.com/hashicorp/hcl/v2 v2.20.0 h1:l++cRs/5jQOiKVvqXZm/P1ZEfVXJmvLS9WSVxkaeTb4=
-github.com/hashicorp/hcl/v2 v2.20.0/go.mod h1:WmcD/Ym72MDOOx5F62Ly+leloeu6H7m0pG7VBiU6pQk=
+github.com/hashicorp/hcl/v2 v2.22.0 h1:hkZ3nCtqeJsDhPRFz5EA9iwcG1hNWGePOTw6oyul12M=
+github.com/hashicorp/hcl/v2 v2.22.0/go.mod h1:62ZYHrXgPoX8xBnzl8QzbWq4dyDsDtfCRgIq1rbJEvA=
github.com/hashicorp/hil v0.0.0-20190212132231-97b3a9cdfa93 h1:T1Q6ag9tCwun16AW+XK3tAql24P4uTGUMIn1/92WsQQ=
github.com/hashicorp/hil v0.0.0-20190212132231-97b3a9cdfa93/go.mod h1:n2TSygSNwsLJ76m8qFXTSc7beTb+auJxYdqrnoqwZWE=
github.com/hashicorp/logutils v1.0.0 h1:dLEQVugN8vlakKOUE3ihGLTZJRB4j+M2cdTm/ORI65Y=
@@ -602,12 +581,12 @@ github.com/hashicorp/terraform-exec v0.20.0 h1:DIZnPsqzPGuUnq6cH8jWcPunBfY+C+M8J
github.com/hashicorp/terraform-exec v0.20.0/go.mod h1:ckKGkJWbsNqFKV1itgMnE0hY9IYf1HoiekpuN0eWoDw=
github.com/hashicorp/terraform-json v0.21.0 h1:9NQxbLNqPbEMze+S6+YluEdXgJmhQykRyRNd+zTI05U=
github.com/hashicorp/terraform-json v0.21.0/go.mod h1:qdeBs11ovMzo5puhrRibdD6d2Dq6TyE/28JiU4tIQxk=
-github.com/hashicorp/terraform-plugin-framework v1.12.0 h1:7HKaueHPaikX5/7cbC1r9d1m12iYHY+FlNZEGxQ42CQ=
-github.com/hashicorp/terraform-plugin-framework v1.12.0/go.mod h1:N/IOQ2uYjW60Jp39Cp3mw7I/OpC/GfZ0385R0YibmkE=
+github.com/hashicorp/terraform-plugin-framework v1.13.0 h1:8OTG4+oZUfKgnfTdPTJwZ532Bh2BobF4H+yBiYJ/scw=
+github.com/hashicorp/terraform-plugin-framework v1.13.0/go.mod h1:j64rwMGpgM3NYXTKuxrCnyubQb/4VKldEKlcG8cvmjU=
github.com/hashicorp/terraform-plugin-framework-validators v0.12.0 h1:HOjBuMbOEzl7snOdOoUfE2Jgeto6JOjLVQ39Ls2nksc=
github.com/hashicorp/terraform-plugin-framework-validators v0.12.0/go.mod h1:jfHGE/gzjxYz6XoUwi/aYiiKrJDeutQNUtGQXkaHklg=
-github.com/hashicorp/terraform-plugin-go v0.24.0 h1:2WpHhginCdVhFIrWHxDEg6RBn3YaWzR2o6qUeIEat2U=
-github.com/hashicorp/terraform-plugin-go v0.24.0/go.mod h1:tUQ53lAsOyYSckFGEefGC5C8BAaO0ENqzFd3bQeuYQg=
+github.com/hashicorp/terraform-plugin-go v0.25.0 h1:oi13cx7xXA6QciMcpcFi/rwA974rdTxjqEhXJjbAyks=
+github.com/hashicorp/terraform-plugin-go v0.25.0/go.mod h1:+SYagMYadJP86Kvn+TGeV+ofr/R3g4/If0O5sO96MVw=
github.com/hashicorp/terraform-plugin-log v0.9.0 h1:i7hOA+vdAItN1/7UrfBqBwvYPQ9TFvymaRGZED3FCV0=
github.com/hashicorp/terraform-plugin-log v0.9.0/go.mod h1:rKL8egZQ/eXSyDqzLUuwUYLVdlYeamldAHSxjUFADow=
github.com/hashicorp/terraform-plugin-sdk v1.7.0 h1:B//oq0ZORG+EkVrIJy0uPGSonvmXqxSzXe8+GhknoW0=
@@ -696,6 +675,7 @@ github.com/mattn/go-isatty v0.0.20/go.mod h1:W+V8PltTTMOvKvAeJH7IuucS94S2C6jfK/D
github.com/mattn/go-localereader v0.0.1 h1:ygSAOl7ZXTx4RdPYinUpg6W99U8jWvWi9Ye2JC/oIi4=
github.com/mattn/go-localereader v0.0.1/go.mod h1:8fBrzywKY7BI3czFoHkuzRoWE9C+EiG4R1k4Cjx5p88=
github.com/mattn/go-runewidth v0.0.4/go.mod h1:LwmH8dsx7+W8Uxz3IHJYH5QSwggIsqBzpuz5H//U1FU=
+github.com/mattn/go-runewidth v0.0.9/go.mod h1:H031xJmbD/WCDINGzjvQ9THkh0rPKHF+m2gUSrubnMI=
github.com/mattn/go-runewidth v0.0.12/go.mod h1:RAqKPSqVFrSLVXbA8x7dzmKdmGzieGRCM46jaSJTDAk=
github.com/mattn/go-runewidth v0.0.15 h1:UNAjwbU9l54TA3KzvqLGxwWjHmMgBUVhBiTjelZgg3U=
github.com/mattn/go-runewidth v0.0.15/go.mod h1:Jdepj2loyihRzMpdS35Xk/zdY8IAYHsh153qUoGf23w=
@@ -741,6 +721,8 @@ github.com/oklog/run v1.1.0 h1:GEenZ1cK0+q0+wsJew9qUg/DyD8k3JzYsZAi5gYi2mA=
github.com/oklog/run v1.1.0/go.mod h1:sVPdnTZT1zYwAJeCMu2Th4T21pA3FPOQRfWjQlk7DVU=
github.com/oklog/ulid v1.3.1 h1:EGfNDEx6MqHz8B3uNV6QAib1UR2Lm97sHi3ocA6ESJ4=
github.com/oklog/ulid v1.3.1/go.mod h1:CirwcVhetQ6Lv90oh/F+FBtV6XMibvdAFo93nm5qn4U=
+github.com/olekukonko/tablewriter v0.0.5 h1:P2Ga83D34wi1o9J6Wh1mRuqd4mF/x/lgBS7N7AbDhec=
+github.com/olekukonko/tablewriter v0.0.5/go.mod h1:hPp6KlRPjbx+hW8ykQs1w3UBbZlj6HuIJcUGPhkA7kY=
github.com/onsi/gomega v1.27.10 h1:naR28SdDFlqrG6kScpT8VWpu1xWY5nJRCF3XaYyBjhI=
github.com/onsi/gomega v1.27.10/go.mod h1:RsS8tutOdbdgzbPtzzATp12yT7kM5I5aElG3evPbQ0M=
github.com/opentracing/basictracer-go v1.1.0 h1:Oa1fTSBvAl8pa3U+IJYqrKm0NALwH9OsgwOqDv4xJW0=
@@ -773,22 +755,20 @@ github.com/pulumi/esc v0.10.0 h1:jzBKzkLVW0mePeanDRfqSQoCJ5yrkux0jIwAkUxpRKE=
github.com/pulumi/esc v0.10.0/go.mod h1:2Bfa+FWj/xl8CKqRTWbWgDX0SOD4opdQgvYSURTGK2c=
github.com/pulumi/inflector v0.1.1 h1:dvlxlWtXwOJTUUtcYDvwnl6Mpg33prhK+7mzeF+SobA=
github.com/pulumi/inflector v0.1.1/go.mod h1:HUFCjcPTz96YtTuUlwG3i3EZG4WlniBvR9bd+iJxCUY=
-github.com/pulumi/providertest v0.0.14 h1:5QlAPAAs82jkQraHsJvq1xgVfC7xtW8sFJwv2pHgxQ8=
-github.com/pulumi/providertest v0.0.14/go.mod h1:GcsqEGgSngwaNOD+kICJPIUQlnA911fGBU8HDlJvVL0=
-github.com/pulumi/pulumi-java/pkg v0.16.1 h1:orHnDWFbpOERwaBLry9f+6nqPX7x0MsrIkaa5QDGAns=
-github.com/pulumi/pulumi-java/pkg v0.16.1/go.mod h1:QH0DihZkWYle9XFc+LJ76m4hUo+fA3RdyaM90pqOaSM=
-github.com/pulumi/pulumi-terraform-bridge/pf v0.44.1 h1:39UPLBqbnvylm2heU/Rxa1+G++NZHdtW2Qg+hEhp5Wo=
-github.com/pulumi/pulumi-terraform-bridge/pf v0.44.1/go.mod h1:Zj4XBf+TuV3um7y82X3xk2yQiP+pnQ7YxMc4fq/rVVw=
-github.com/pulumi/pulumi-terraform-bridge/v3 v3.91.1 h1:Twh0IKS1pGHP6LHDq1oR0vbHlV52asoUCC7spEJl3Ao=
-github.com/pulumi/pulumi-terraform-bridge/v3 v3.91.1/go.mod h1:DvueDDtOIbf7W1Or4oH0o7F990ozp/ROmlm/vgLoe+g=
-github.com/pulumi/pulumi-terraform-bridge/x/muxer v0.0.8 h1:mav2tSitA9BPJPLLahKgepHyYsMzwaTm4cvp0dcTMYw=
-github.com/pulumi/pulumi-terraform-bridge/x/muxer v0.0.8/go.mod h1:qUYk2c9i/yqMGNj9/bQyXpS39BxNDSXYjVN1njnq0zY=
-github.com/pulumi/pulumi-yaml v1.10.0 h1:djbgMJCxJBmYMr4kOpAXH5iauxGohYjEuTLfxD3NUUI=
-github.com/pulumi/pulumi-yaml v1.10.0/go.mod h1://lTvwHpgJ+WBKeMGiLrd/jinc4dl3eWV5LZ3G8iCfE=
-github.com/pulumi/pulumi/pkg/v3 v3.133.0 h1:j1rd7ToLZIQc5H0427ISOXSbOIIemZ6B0MXtRhQ38Yg=
-github.com/pulumi/pulumi/pkg/v3 v3.133.0/go.mod h1:JtMAnrsFIccO138WcMfPdhO0PioDukKihnZC0xTRLwo=
-github.com/pulumi/pulumi/sdk/v3 v3.133.0 h1:o+7dbJZY9BVgAjOF5GYIWgjp/zpKAgWZwD4pPjUMXKQ=
-github.com/pulumi/pulumi/sdk/v3 v3.133.0/go.mod h1:J5kQEX8v87aeUhk6NdQXnjCo1DbiOnOiL3Sf2DuDda8=
+github.com/pulumi/providertest v0.1.3 h1:GpNKRy/haNjRHiUA9bi4diU4Op2zf3axYXbga5AepHg=
+github.com/pulumi/providertest v0.1.3/go.mod h1:GcsqEGgSngwaNOD+kICJPIUQlnA911fGBU8HDlJvVL0=
+github.com/pulumi/pulumi-java/pkg v0.17.0 h1:KmaVLrVmlkzShOfaJNJDlckorbFm8dM/C7L4hj6LX8U=
+github.com/pulumi/pulumi-java/pkg v0.17.0/go.mod h1:ji4U4H7t81X4aaE88D9+z5CmKH/QoLwQi9N1iGl+2KQ=
+github.com/pulumi/pulumi-terraform-bridge/pf v0.49.0 h1:GJ20wQxz5dYbOWdDyDp1E3SuuTuLVdBpnp70FJ+VVpQ=
+github.com/pulumi/pulumi-terraform-bridge/pf v0.49.0/go.mod h1:zDdNBSsrNhUxyeX1MrXr/O71DBpWMFZ8dGIGV0Pbj0c=
+github.com/pulumi/pulumi-terraform-bridge/v3 v3.96.0 h1:uJB3tM1j+9SKeXLCAx3DBVHsYk4ddXNrVoiqpgXal2Q=
+github.com/pulumi/pulumi-terraform-bridge/v3 v3.96.0/go.mod h1:WnOTAfdtm5+kW3rIU0rLhxFSEHtJIMf19FdOU6NFXG0=
+github.com/pulumi/pulumi-yaml v1.11.2 h1:MU7TTNbruGCSgNHhaBygjIbLWm3WSbd1q98GpMIgQzE=
+github.com/pulumi/pulumi-yaml v1.11.2/go.mod h1:RdXRBupRGGAD1kbYNG1V1h6pyFnXisvQsl0AANvVjGI=
+github.com/pulumi/pulumi/pkg/v3 v3.140.0 h1:/bvHa19HY/6qHWvuAOVII8qr72MDGGczBWlPYlPo3j0=
+github.com/pulumi/pulumi/pkg/v3 v3.140.0/go.mod h1:rcTtSyisd7BzZTugNk/s9zlYgX9S0S10+pha3Tko6yM=
+github.com/pulumi/pulumi/sdk/v3 v3.140.0 h1:+Z/RBvdYg7tBNkBwk4p/FzlV7niBT3TbLAICq/Y0LDU=
+github.com/pulumi/pulumi/sdk/v3 v3.140.0/go.mod h1:PvKsX88co8XuwuPdzolMvew5lZV+4JmZfkeSjj7A6dI=
github.com/pulumi/schema-tools v0.1.2 h1:Fd9xvUjgck4NA+7/jSk7InqCUT4Kj940+EcnbQKpfZo=
github.com/pulumi/schema-tools v0.1.2/go.mod h1:62lgj52Tzq11eqWTIaKd+EVyYAu5dEcDJxMhTjvMO/k=
github.com/pulumi/terraform-diff-reader v0.0.2 h1:kTE4nEXU3/SYXESvAIem+wyHMI3abqkI3OhJ0G04LLI=
@@ -889,8 +869,8 @@ github.com/yuin/goldmark v1.7.4 h1:BDXOHExt+A7gwPCJgPIIq7ENvceR7we7rOS9TNoLZeg=
github.com/yuin/goldmark v1.7.4/go.mod h1:uzxRWxtg69N339t3louHJ7+O03ezfj6PlliRlaOzY1E=
github.com/zclconf/go-cty v1.14.4 h1:uXXczd9QDGsgu0i/QFR/hzI5NYCHLf6NQw/atrbnhq8=
github.com/zclconf/go-cty v1.14.4/go.mod h1:VvMs5i0vgZdhYawQNq5kePSpLAoz8u1xvZgrPIxfnZE=
-github.com/zclconf/go-cty-debug v0.0.0-20191215020915-b22d67c1ba0b h1:FosyBZYxY34Wul7O/MSKey3txpPYyCqVO5ZyceuQJEI=
-github.com/zclconf/go-cty-debug v0.0.0-20191215020915-b22d67c1ba0b/go.mod h1:ZRKQfBXbGkpdV6QMzT3rU1kSTAnfu1dO8dPKjYprgj8=
+github.com/zclconf/go-cty-debug v0.0.0-20240509010212-0d6042c53940 h1:4r45xpDWB6ZMSMNJFMOjqrGHynW3DIBuR2H9j0ug+Mo=
+github.com/zclconf/go-cty-debug v0.0.0-20240509010212-0d6042c53940/go.mod h1:CmBdvvj3nqzfzJ6nTCIwDTPZ56aVGvDrmztiO5g3qrM=
github.com/zclconf/go-cty-yaml v1.0.1 h1:up11wlgAaDvlAGENcFDnZgkn0qUJurso7k6EpURKNF8=
github.com/zclconf/go-cty-yaml v1.0.1/go.mod h1:IP3Ylp0wQpYm50IHK8OZWKMu6sPJIUgKa8XhiVHura0=
go.mongodb.org/mongo-driver v1.15.0 h1:rJCKC8eEliewXjZGf0ddURtl7tTVy1TK3bfl0gkUSLc=
@@ -935,11 +915,8 @@ golang.org/x/crypto v0.0.0-20210921155107-089bfa567519/go.mod h1:GvvjBRRGRdwPK5y
golang.org/x/crypto v0.0.0-20220622213112-05595931fe9d/go.mod h1:IxCIyHEi3zRg3s0A5j5BB6A9Jmi73HwBIUl50j+osU4=
golang.org/x/crypto v0.0.0-20220722155217-630584e8d5aa/go.mod h1:IxCIyHEi3zRg3s0A5j5BB6A9Jmi73HwBIUl50j+osU4=
golang.org/x/crypto v0.3.0/go.mod h1:hebNnKkNXi2UzZN1eVRvBB7co0a+JxK6XbPiWVs/3J4=
-golang.org/x/crypto v0.13.0/go.mod h1:y6Z2r+Rw4iayiXXAIxJIDAJ1zMW4yaTpebo8fPOliYc=
-golang.org/x/crypto v0.18.0/go.mod h1:R0j02AL6hcrfOiy9T4ZYp/rcWeMxM3L6QYxlOuEG1mg=
-golang.org/x/crypto v0.19.0/go.mod h1:Iy9bg/ha4yyC70EfRS8jz+B6ybOBKMaSxLj6P6oBDfU=
-golang.org/x/crypto v0.25.0 h1:ypSNr+bnYL2YhwoMt2zPxHFmbAN1KZs/njMG3hxUp30=
-golang.org/x/crypto v0.25.0/go.mod h1:T+wALwcMOSE0kXgUAnPAHqTLW+XHgcELELW8VaDgm/M=
+golang.org/x/crypto v0.26.0 h1:RrRspgV4mU+YwB4FYnuBoKsUapNIL5cohGAmSH3azsw=
+golang.org/x/crypto v0.26.0/go.mod h1:GY7jblb9wI+FOo5y8/S2oY4zWP07AkOJ4+jxCqdqn54=
golang.org/x/exp v0.0.0-20190121172915-509febef88a4/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
golang.org/x/exp v0.0.0-20190306152737-a1d7652674e8/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
golang.org/x/exp v0.0.0-20190510132918-efd6b22b2522/go.mod h1:ZjyILWgesfNpC6sMxTJOJm9Kp84zZh5NQWvqDGG3Qr8=
@@ -978,9 +955,6 @@ golang.org/x/mod v0.4.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
golang.org/x/mod v0.4.1/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
golang.org/x/mod v0.4.2/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
golang.org/x/mod v0.6.0-dev.0.20220419223038-86c51ed26bb4/go.mod h1:jJ57K6gSWd91VN4djpZkiMVwK6gcyfeH4XE8wZrZaV4=
-golang.org/x/mod v0.8.0/go.mod h1:iBbtSCu2XBx23ZKBPSOrRkjjQPZFPuis4dIYUhu/chs=
-golang.org/x/mod v0.12.0/go.mod h1:iBbtSCu2XBx23ZKBPSOrRkjjQPZFPuis4dIYUhu/chs=
-golang.org/x/mod v0.14.0/go.mod h1:hTbmBsO62+eylJbnUtE2MGJUyE7QWk4xUqPFrRgJ+7c=
golang.org/x/mod v0.18.0 h1:5+9lSbEzPSdWkH32vYPBwEpX8KwDbM52Ud9xBUvNlb0=
golang.org/x/mod v0.18.0/go.mod h1:hTbmBsO62+eylJbnUtE2MGJUyE7QWk4xUqPFrRgJ+7c=
golang.org/x/net v0.0.0-20180724234803-3673e40ba225/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
@@ -1034,12 +1008,8 @@ golang.org/x/net v0.0.0-20220909164309-bea034e7d591/go.mod h1:YDH+HFinaLZZlnHAfS
golang.org/x/net v0.0.0-20221014081412-f15817d10f9b/go.mod h1:YDH+HFinaLZZlnHAfSS6ZXJJ9M9t4Dl22yv3iI2vPwk=
golang.org/x/net v0.1.0/go.mod h1:Cx3nUiGt4eDBEyega/BKRp+/AlGL8hYe7U9odMt2Cco=
golang.org/x/net v0.2.0/go.mod h1:KqCZLdyyvdV855qA2rE3GC2aiw5xGR5TEjj8smXukLY=
-golang.org/x/net v0.6.0/go.mod h1:2Tu9+aMcznHK/AK1HMvgo6xiTLG5rD5rZLDS+rp2Bjs=
-golang.org/x/net v0.10.0/go.mod h1:0qNGK6F8kojg2nk9dLZ2mShWaEBan6FAoqfSigmmuDg=
-golang.org/x/net v0.15.0/go.mod h1:idbUs1IY1+zTqbi8yxTbhexhEEk5ur9LInksu6HrEpk=
-golang.org/x/net v0.20.0/go.mod h1:z8BVo6PvndSri0LbOE3hAn0apkU+1YvI6E70E9jsnvY=
-golang.org/x/net v0.27.0 h1:5K3Njcw06/l2y9vpGCSdcxWOYHOUk3dVNGDXN+FvAys=
-golang.org/x/net v0.27.0/go.mod h1:dDi0PyhWNoiUOrAS8uXv/vnScO4wnHQO4mj9fn/RytE=
+golang.org/x/net v0.28.0 h1:a9JDOJc5GMUJ0+UDqmLT86WiEy7iWyIhz8gz8E4e5hE=
+golang.org/x/net v0.28.0/go.mod h1:yqtgsTWOOnlGLG9GFRrK3++bGOUEkNBoHZc8MEDWPNg=
golang.org/x/oauth2 v0.0.0-20180821212333-d2e6202438be/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U=
golang.org/x/oauth2 v0.0.0-20190226205417-e64efc72b421/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw=
golang.org/x/oauth2 v0.0.0-20190604053449-0f29369cfe45/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw=
@@ -1065,8 +1035,8 @@ golang.org/x/oauth2 v0.0.0-20220822191816-0ebed06d0094/go.mod h1:h4gKUeWbJ4rQPri
golang.org/x/oauth2 v0.0.0-20220909003341-f21342109be1/go.mod h1:h4gKUeWbJ4rQPri7E0u6Gs4e9Ri2zaLxzw5DI5XGrYg=
golang.org/x/oauth2 v0.0.0-20221014153046-6fdb5e3db783/go.mod h1:h4gKUeWbJ4rQPri7E0u6Gs4e9Ri2zaLxzw5DI5XGrYg=
golang.org/x/oauth2 v0.1.0/go.mod h1:G9FE4dLTsbXUu90h/Pf85g4w1D+SSAgR+q46nJZ8M4A=
-golang.org/x/oauth2 v0.21.0 h1:tsimM75w1tF/uws5rbeHzIWxEqElMehnc+iW793zsZs=
-golang.org/x/oauth2 v0.21.0/go.mod h1:XYTD2NtWslqkgxebSiOHnXEap4TF09sJSc7H1sXbhtI=
+golang.org/x/oauth2 v0.22.0 h1:BzDx2FehcG7jJwgWLELCdmLuxk2i+x9UDpSiss2u0ZA=
+golang.org/x/oauth2 v0.22.0/go.mod h1:XYTD2NtWslqkgxebSiOHnXEap4TF09sJSc7H1sXbhtI=
golang.org/x/sync v0.0.0-20180314180146-1d60e4601c6f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
golang.org/x/sync v0.0.0-20181108010431-42b317875d0f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
golang.org/x/sync v0.0.0-20181221193216-37e7f081c4d4/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
@@ -1081,11 +1051,8 @@ golang.org/x/sync v0.0.0-20210220032951-036812b2e83c/go.mod h1:RxMgew5VJxzue5/jJ
golang.org/x/sync v0.0.0-20220601150217-0de741cfad7f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
golang.org/x/sync v0.0.0-20220722155255-886fb9371eb4/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
golang.org/x/sync v0.0.0-20220929204114-8fcdb60fdcc0/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
-golang.org/x/sync v0.1.0/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
-golang.org/x/sync v0.3.0/go.mod h1:FU7BRWz2tNW+3quACPkgCx/L+uEAv1htQ0V83Z9Rj+Y=
-golang.org/x/sync v0.6.0/go.mod h1:Czt+wKu1gCyEFDUtn0jG5QVvpJ6rzVqr5aXyt9drQfk=
-golang.org/x/sync v0.7.0 h1:YsImfSBoP9QPYL0xyKJPq0gcaJdG3rInoqxTWbfQu9M=
-golang.org/x/sync v0.7.0/go.mod h1:Czt+wKu1gCyEFDUtn0jG5QVvpJ6rzVqr5aXyt9drQfk=
+golang.org/x/sync v0.8.0 h1:3NFvSEYkUoMifnESzZl15y791HH1qU2xm6eCJU5ZPXQ=
+golang.org/x/sync v0.8.0/go.mod h1:Czt+wKu1gCyEFDUtn0jG5QVvpJ6rzVqr5aXyt9drQfk=
golang.org/x/sys v0.0.0-20180830151530-49385e6e1522/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
golang.org/x/sys v0.0.0-20190222072716-a9d3bda3a223/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
@@ -1162,25 +1129,15 @@ golang.org/x/sys v0.0.0-20220728004956-3c1f35247d10/go.mod h1:oPkhp1MJrh7nUepCBc
golang.org/x/sys v0.0.0-20220811171246-fbc7d0a398ab/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.1.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.2.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-golang.org/x/sys v0.5.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-golang.org/x/sys v0.8.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-golang.org/x/sys v0.12.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-golang.org/x/sys v0.16.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
-golang.org/x/sys v0.17.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
-golang.org/x/sys v0.22.0 h1:RI27ohtqKCnwULzJLqkv897zojh5/DwS/ENaMzUOaWI=
-golang.org/x/sys v0.22.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
+golang.org/x/sys v0.24.0 h1:Twjiwq9dn6R1fQcyiK+wQyHWfaz/BJB+YIpzU/Cv3Xg=
+golang.org/x/sys v0.24.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo=
golang.org/x/term v0.0.0-20210927222741-03fcf44c2211/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8=
golang.org/x/term v0.1.0/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8=
golang.org/x/term v0.2.0/go.mod h1:TVmDHMZPmdnySmBfhjOoOdhjzdE1h4u1VwSiw2l1Nuc=
-golang.org/x/term v0.5.0/go.mod h1:jMB1sMXY+tzblOD4FWmEbocvup2/aLOaQEp7JmGp78k=
-golang.org/x/term v0.8.0/go.mod h1:xPskH00ivmX89bAKVGSKKtLOWNx2+17Eiy94tnKShWo=
-golang.org/x/term v0.12.0/go.mod h1:owVbMEjm3cBLCHdkQu9b1opXd4ETQWc3BhuQGKgXgvU=
-golang.org/x/term v0.16.0/go.mod h1:yn7UURbUtPyrVJPGPq404EukNFxcm/foM+bV/bfcDsY=
-golang.org/x/term v0.17.0/go.mod h1:lLRBjIVuehSbZlaOtGMbcMncT+aqLLLmKrsjNrUguwk=
-golang.org/x/term v0.22.0 h1:BbsgPEJULsl2fV/AT3v15Mjva5yXKQDyKf+TbDz7QJk=
-golang.org/x/term v0.22.0/go.mod h1:F3qCibpT5AMpCRfhfT53vVJwhLtIVHhB9XDjfFvnMI4=
+golang.org/x/term v0.23.0 h1:F6D4vR+EHoL9/sWAWgAR1H2DcHr4PareCbAaCo1RpuU=
+golang.org/x/term v0.23.0/go.mod h1:DgV24QBUrK6jhZXl+20l6UWznPlwAHm1Q1mGHtydmSk=
golang.org/x/text v0.0.0-20170915032832-14c0d48ead0c/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
golang.org/x/text v0.3.1-0.20180807135948-17ff2d5776d2/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
@@ -1191,12 +1148,8 @@ golang.org/x/text v0.3.5/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
golang.org/x/text v0.3.6/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
golang.org/x/text v0.3.7/go.mod h1:u+2+/6zg+i71rQMx5EYifcz6MCKuco9NR6JIITiCfzQ=
golang.org/x/text v0.4.0/go.mod h1:mrYo+phRRbMaCq/xk9113O4dZlRixOauAjOtrjsXDZ8=
-golang.org/x/text v0.7.0/go.mod h1:mrYo+phRRbMaCq/xk9113O4dZlRixOauAjOtrjsXDZ8=
-golang.org/x/text v0.9.0/go.mod h1:e1OnstbJyHTd6l/uOt8jFFHp6TRDWZR/bV3emEE/zU8=
-golang.org/x/text v0.13.0/go.mod h1:TvPlkZtksWOMsz7fbANvkp4WM8x/WCo/om8BMLbz+aE=
-golang.org/x/text v0.14.0/go.mod h1:18ZOQIKpY8NJVqYksKHtTdi31H5itFRjB5/qKTNYzSU=
-golang.org/x/text v0.16.0 h1:a94ExnEXNtEwYLGJSIUxnWoxoRz/ZcCsV63ROupILh4=
-golang.org/x/text v0.16.0/go.mod h1:GhwF1Be+LQoKShO3cGOHzqOgRrGaYc9AvblQOmPVHnI=
+golang.org/x/text v0.17.0 h1:XtiM5bkSOt+ewxlOE/aE/AKEHibwj/6gvWMl9Rsh0Qc=
+golang.org/x/text v0.17.0/go.mod h1:BuEKDfySbSR4drPmRPG/7iBdf8hvFMuRexcpahXilzY=
golang.org/x/time v0.0.0-20181108054448-85acf8d2951c/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
golang.org/x/time v0.0.0-20190308202827-9d24e82272b4/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
golang.org/x/time v0.0.0-20191024005414-555d28b269f0/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
@@ -1258,9 +1211,6 @@ golang.org/x/tools v0.1.3/go.mod h1:o0xws9oXOQQZyjljx8fwUC0k7L1pTE6eaCbjGeHmOkk=
golang.org/x/tools v0.1.4/go.mod h1:o0xws9oXOQQZyjljx8fwUC0k7L1pTE6eaCbjGeHmOkk=
golang.org/x/tools v0.1.5/go.mod h1:o0xws9oXOQQZyjljx8fwUC0k7L1pTE6eaCbjGeHmOkk=
golang.org/x/tools v0.1.12/go.mod h1:hNGJHUnrk76NpqgfD5Aqm5Crs+Hm0VOH/i9J2+nxYbc=
-golang.org/x/tools v0.6.0/go.mod h1:Xwgl3UAJ/d3gWutnCtw505GrjyAbvKui8lOU390QaIU=
-golang.org/x/tools v0.13.0/go.mod h1:HvlwmtVNQAhOuCjW7xxvovg8wbNq7LwfXh/k7wXUl58=
-golang.org/x/tools v0.17.0/go.mod h1:xsh6VxdV005rRVaS6SSAf9oiAqljS7UZUacMZ8Bnsps=
golang.org/x/tools v0.22.0 h1:gqSGLZqv+AI9lIQzniJ0nZDRG5GBPsSi+DRNHWNz6yA=
golang.org/x/tools v0.22.0/go.mod h1:aCwcsjqvq7Yqt6TNyX7QMU2enbQ/Gt0bo6krSeEri+c=
golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
@@ -1437,10 +1387,10 @@ google.golang.org/genproto v0.0.0-20221014213838-99cd37c6964a/go.mod h1:1vXfmgAz
google.golang.org/genproto v0.0.0-20221025140454-527a21cfbd71/go.mod h1:9qHF0xnpdSfF6knlcsnpzUu5y+rpwgbvsyGAZPBMg4s=
google.golang.org/genproto v0.0.0-20240311173647-c811ad7063a7 h1:ImUcDPHjTrAqNhlOkSocDLfG9rrNHH7w7uoKWPaWZ8s=
google.golang.org/genproto v0.0.0-20240311173647-c811ad7063a7/go.mod h1:/3XmxOjePkvmKrHuBy4zNFw7IzxJXtAgdpXi8Ll990U=
-google.golang.org/genproto/googleapis/api v0.0.0-20240604185151-ef581f913117 h1:+rdxYoE3E5htTEWIe15GlN6IfvbURM//Jt0mmkmm6ZU=
-google.golang.org/genproto/googleapis/api v0.0.0-20240604185151-ef581f913117/go.mod h1:OimBR/bc1wPO9iV4NC2bpyjy3VnAwZh5EBPQdtaE5oo=
-google.golang.org/genproto/googleapis/rpc v0.0.0-20240604185151-ef581f913117 h1:1GBuWVLM/KMVUv1t1En5Gs+gFZCNd360GGb4sSxtrhU=
-google.golang.org/genproto/googleapis/rpc v0.0.0-20240604185151-ef581f913117/go.mod h1:EfXuqaE1J41VCDicxHzUDm+8rk+7ZdXzHV0IhO/I6s0=
+google.golang.org/genproto/googleapis/api v0.0.0-20240814211410-ddb44dafa142 h1:wKguEg1hsxI2/L3hUYrpo1RVi48K+uTyzKqprwLXsb8=
+google.golang.org/genproto/googleapis/api v0.0.0-20240814211410-ddb44dafa142/go.mod h1:d6be+8HhtEtucleCbxpPW9PA9XwISACu8nvpPqF0BVo=
+google.golang.org/genproto/googleapis/rpc v0.0.0-20240814211410-ddb44dafa142 h1:e7S5W7MGGLaSu8j3YjdezkZ+m1/Nm0uRVRMEMGk26Xs=
+google.golang.org/genproto/googleapis/rpc v0.0.0-20240814211410-ddb44dafa142/go.mod h1:UqMtugtsSgubUsoxbuAoiCXvqvErP7Gf0so0mK9tHxU=
google.golang.org/grpc v1.19.0/go.mod h1:mqu4LbDTu4XGKhr4mRzUsmM4RtVoemTSY81AxZiDr8c=
google.golang.org/grpc v1.20.1/go.mod h1:10oTOabMzJvdu6/UiuZezV6QK5dSlG84ov/aaiqXj38=
google.golang.org/grpc v1.21.1/go.mod h1:oYelfM1adQP15Ek0mdvEgi9Df8B9CZIaU1084ijfRaM=
@@ -1476,8 +1426,8 @@ google.golang.org/grpc v1.48.0/go.mod h1:vN9eftEi1UMyUsIF80+uQXhHjbXYbm0uXoFCACu
google.golang.org/grpc v1.49.0/go.mod h1:ZgQEeidpAuNRZ8iRrlBKXZQP1ghovWIVhdJRyCDK+GI=
google.golang.org/grpc v1.50.0/go.mod h1:ZgQEeidpAuNRZ8iRrlBKXZQP1ghovWIVhdJRyCDK+GI=
google.golang.org/grpc v1.50.1/go.mod h1:ZgQEeidpAuNRZ8iRrlBKXZQP1ghovWIVhdJRyCDK+GI=
-google.golang.org/grpc v1.66.2 h1:3QdXkuq3Bkh7w+ywLdLvM56cmGvQHUMZpiCzt6Rqaoo=
-google.golang.org/grpc v1.66.2/go.mod h1:s3/l6xSSCURdVfAnL+TqCNMyTDAGN6+lZeVxnZR128Y=
+google.golang.org/grpc v1.67.1 h1:zWnc1Vrcno+lHZCOofnIMvycFcc0QRGIzm9dhnDX68E=
+google.golang.org/grpc v1.67.1/go.mod h1:1gLDyUQU7CTLJI90u3nXZ9ekeghjeM7pTDZlqFNg2AA=
google.golang.org/grpc/cmd/protoc-gen-go-grpc v1.1.0/go.mod h1:6Kw0yEErY5E/yWrBtf03jp27GLLJujG4z/JK95pnjjw=
google.golang.org/protobuf v0.0.0-20200109180630-ec00e32a8dfd/go.mod h1:DFci5gLYBciE7Vtevhsrf46CRTquxDuWsQurQQe4oz8=
google.golang.org/protobuf v0.0.0-20200221191635-4d8936d0db64/go.mod h1:kwYJMbMJ01Woi6D6+Kah6886xMZcty6N08ah7+eCXa0=
@@ -1494,8 +1444,8 @@ google.golang.org/protobuf v1.26.0/go.mod h1:9q0QmTI4eRPtz6boOQmLYwt+qCgq0jsYwAQ
google.golang.org/protobuf v1.27.1/go.mod h1:9q0QmTI4eRPtz6boOQmLYwt+qCgq0jsYwAQnmE0givc=
google.golang.org/protobuf v1.28.0/go.mod h1:HV8QOd/L58Z+nl8r43ehVNZIU/HEI6OcFqwMG9pJV4I=
google.golang.org/protobuf v1.28.1/go.mod h1:HV8QOd/L58Z+nl8r43ehVNZIU/HEI6OcFqwMG9pJV4I=
-google.golang.org/protobuf v1.34.2 h1:6xV6lTsCfpGD21XK49h7MhtcApnLqkfYgPcdHftf6hg=
-google.golang.org/protobuf v1.34.2/go.mod h1:qYOHts0dSfpeUzUFpOMr/WGzszTmLH+DiWniOlNbLDw=
+google.golang.org/protobuf v1.35.1 h1:m3LfL6/Ca+fqnjnlqQXNpFPABW1UD7mjh8KO2mKFytA=
+google.golang.org/protobuf v1.35.1/go.mod h1:9fA7Ob0pmnwhb644+1+CVWFRbNajQ6iRojtC/QF5bRE=
gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
gopkg.in/check.v1 v1.0.0-20190902080502-41f04d3bba15/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
@@ -1514,6 +1464,7 @@ gopkg.in/yaml.v2 v2.4.0/go.mod h1:RDklbk79AGWmwhnvt/jBztapEOGDOx6ZbXqjP6csGnQ=
gopkg.in/yaml.v3 v3.0.0-20200313102051-9f266ea9e77c/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
gopkg.in/yaml.v3 v3.0.1 h1:fxVm/GzAzEWqLHuvctI91KS9hhNmmWOoWu0XTYJS7CA=
gopkg.in/yaml.v3 v3.0.1/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
+gotest.tools v2.2.0+incompatible h1:VsBPFP1AI068pPrMxtb/S8Zkgf9xEmTLJjfM+P5UIEo=
gotest.tools/v3 v3.0.3 h1:4AuOwCGf4lLR9u3YOe2awrHygurzhO/HeQ6laiA6Sx0=
gotest.tools/v3 v3.0.3/go.mod h1:Z7Lb0S5l+klDB31fvDQX8ss/FlKDxtlFlw3Oa8Ymbl8=
honnef.co/go/tools v0.0.0-20190102054323-c2f93a96b099/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
diff --git a/provider/shim/go.mod b/provider/shim/go.mod
index 7caa0cd..7630551 100644
--- a/provider/shim/go.mod
+++ b/provider/shim/go.mod
@@ -3,7 +3,7 @@ module github.com/crowdstrike/terraform-provider-crowdstrike/shim
go 1.22
require (
- github.com/crowdstrike/terraform-provider-crowdstrike v0.0.7
+ github.com/crowdstrike/terraform-provider-crowdstrike v0.0.10
github.com/hashicorp/terraform-plugin-framework v1.8.0
)
diff --git a/provider/shim/go.sum b/provider/shim/go.sum
index beb09df..8462ea0 100644
--- a/provider/shim/go.sum
+++ b/provider/shim/go.sum
@@ -12,8 +12,8 @@ github.com/cloudflare/circl v1.3.7 h1:qlCDlTPz2n9fu58M0Nh1J/JzcFpfgkFHHX3O35r5vc
github.com/cloudflare/circl v1.3.7/go.mod h1:sRTcRWXGLrKw6yIGJ+l7amYJFfAXbZG0kBSc8r4zxgA=
github.com/crowdstrike/gofalcon v0.6.1-0.20240426204036-ac8ce2b4f2d7 h1:NLcXFICTUakAvJFSH8z+Ht6SfJ52FbOasYdP8p7BcsQ=
github.com/crowdstrike/gofalcon v0.6.1-0.20240426204036-ac8ce2b4f2d7/go.mod h1:7KSolP3XCntqZiu7GfGd8uedAQ82dqBNpP0gqBksWB8=
-github.com/crowdstrike/terraform-provider-crowdstrike v0.0.7 h1:7taix8vblqPrK9HkDkHF6CHL53QsSxpUDDccWaBpSjc=
-github.com/crowdstrike/terraform-provider-crowdstrike v0.0.7/go.mod h1:R9kYJzHPH0NKBwPwJdNchkorNDAKxbqr/Cnxx8JPPw0=
+github.com/crowdstrike/terraform-provider-crowdstrike v0.0.10 h1:m7woH9Q+zfURBYv/2aLr17bUJQwGt1bqd6VziVVxPes=
+github.com/crowdstrike/terraform-provider-crowdstrike v0.0.10/go.mod h1:R9kYJzHPH0NKBwPwJdNchkorNDAKxbqr/Cnxx8JPPw0=
github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c=
github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
diff --git a/sdk/dotnet/PreventionPolicyLinux.cs b/sdk/dotnet/PreventionPolicyLinux.cs
index 236f03a..f8cde0b 100644
--- a/sdk/dotnet/PreventionPolicyLinux.cs
+++ b/sdk/dotnet/PreventionPolicyLinux.cs
@@ -37,10 +37,7 @@ namespace CrowdStrike.Crowdstrike
/// {
/// "d6e3c1e1b3d0467da0fowc96a5e6ecb5",
/// },
- /// IoaRuleGroups = new[]
- /// {
- /// "ed334b3243bc4b6bb8e7d40a2ecd86fa",
- /// },
+ /// IoaRuleGroups = new[] {},
/// CloudAntiMalware = new Crowdstrike.Inputs.PreventionPolicyLinuxCloudAntiMalwareArgs
/// {
/// Detection = "MODERATE",
@@ -215,7 +212,7 @@ public partial class PreventionPolicyLinux : global::Pulumi.CustomResource
/// The unique name of the resource
/// The arguments used to populate this resource's properties
/// A bag of options that control this resource's behavior
- public PreventionPolicyLinux(string name, PreventionPolicyLinuxArgs? args = null, CustomResourceOptions? options = null)
+ public PreventionPolicyLinux(string name, PreventionPolicyLinuxArgs args, CustomResourceOptions? options = null)
: base("crowdstrike:index/preventionPolicyLinux:PreventionPolicyLinux", name, args ?? new PreventionPolicyLinuxArgs(), MakeResourceOptions(options, ""))
{
}
@@ -302,7 +299,7 @@ public sealed class PreventionPolicyLinuxArgs : global::Pulumi.ResourceArgs
[Input("ftpVisibility")]
public Input? FtpVisibility { get; set; }
- [Input("hostGroups")]
+ [Input("hostGroups", required: true)]
private InputList? _hostGroups;
///
@@ -320,7 +317,7 @@ public InputList HostGroups
[Input("httpVisibility")]
public Input? HttpVisibility { get; set; }
- [Input("ioaRuleGroups")]
+ [Input("ioaRuleGroups", required: true)]
private InputList? _ioaRuleGroups;
///
diff --git a/sdk/dotnet/PreventionPolicyMac.cs b/sdk/dotnet/PreventionPolicyMac.cs
index d029038..7c33562 100644
--- a/sdk/dotnet/PreventionPolicyMac.cs
+++ b/sdk/dotnet/PreventionPolicyMac.cs
@@ -37,10 +37,7 @@ namespace CrowdStrike.Crowdstrike
/// {
/// "d6e3c1e1b3d0467da0fowc96a5e6ecb5",
/// },
- /// IoaRuleGroups = new[]
- /// {
- /// "ed334b3243bc4b6bb8e7d40a2ecd86fa",
- /// },
+ /// IoaRuleGroups = new[] {},
/// CloudAdwareAndPup = new Crowdstrike.Inputs.PreventionPolicyMacCloudAdwareAndPupArgs
/// {
/// Detection = "MODERATE",
@@ -258,7 +255,7 @@ public partial class PreventionPolicyMac : global::Pulumi.CustomResource
/// The unique name of the resource
/// The arguments used to populate this resource's properties
/// A bag of options that control this resource's behavior
- public PreventionPolicyMac(string name, PreventionPolicyMacArgs? args = null, CustomResourceOptions? options = null)
+ public PreventionPolicyMac(string name, PreventionPolicyMacArgs args, CustomResourceOptions? options = null)
: base("crowdstrike:index/preventionPolicyMac:PreventionPolicyMac", name, args ?? new PreventionPolicyMacArgs(), MakeResourceOptions(options, ""))
{
}
@@ -351,7 +348,7 @@ public sealed class PreventionPolicyMacArgs : global::Pulumi.ResourceArgs
[Input("hashCollector")]
public Input? HashCollector { get; set; }
- [Input("hostGroups")]
+ [Input("hostGroups", required: true)]
private InputList? _hostGroups;
///
@@ -369,7 +366,7 @@ public InputList HostGroups
[Input("intelligenceSourcedThreats")]
public Input? IntelligenceSourcedThreats { get; set; }
- [Input("ioaRuleGroups")]
+ [Input("ioaRuleGroups", required: true)]
private InputList? _ioaRuleGroups;
///
diff --git a/sdk/dotnet/PreventionPolicyWindows.cs b/sdk/dotnet/PreventionPolicyWindows.cs
index d251e37..ff42c97 100644
--- a/sdk/dotnet/PreventionPolicyWindows.cs
+++ b/sdk/dotnet/PreventionPolicyWindows.cs
@@ -37,10 +37,7 @@ namespace CrowdStrike.Crowdstrike
/// {
/// "d6e3c1e1b3d0467da0fowc96a5e6ecb5",
/// },
- /// IoaRuleGroups = new[]
- /// {
- /// "ed334b3243bc4b6bb8e7d40a2ecd86fa",
- /// },
+ /// IoaRuleGroups = new[] {},
/// AdwareAndPup = new Crowdstrike.Inputs.PreventionPolicyWindowsAdwareAndPupArgs
/// {
/// Detection = "MODERATE",
@@ -528,7 +525,7 @@ public partial class PreventionPolicyWindows : global::Pulumi.CustomResource
/// The unique name of the resource
/// The arguments used to populate this resource's properties
/// A bag of options that control this resource's behavior
- public PreventionPolicyWindows(string name, PreventionPolicyWindowsArgs? args = null, CustomResourceOptions? options = null)
+ public PreventionPolicyWindows(string name, PreventionPolicyWindowsArgs args, CustomResourceOptions? options = null)
: base("crowdstrike:index/preventionPolicyWindows:PreventionPolicyWindows", name, args ?? new PreventionPolicyWindowsArgs(), MakeResourceOptions(options, ""))
{
}
@@ -741,7 +738,7 @@ public sealed class PreventionPolicyWindowsArgs : global::Pulumi.ResourceArgs
[Input("heapSprayPreallocation")]
public Input? HeapSprayPreallocation { get; set; }
- [Input("hostGroups")]
+ [Input("hostGroups", required: true)]
private InputList? _hostGroups;
///
@@ -771,7 +768,7 @@ public InputList HostGroups
[Input("interpreterOnly")]
public Input? InterpreterOnly { get; set; }
- [Input("ioaRuleGroups")]
+ [Input("ioaRuleGroups", required: true)]
private InputList? _ioaRuleGroups;
///
diff --git a/sdk/go.mod b/sdk/go.mod
index 3d5294f..ee288bc 100644
--- a/sdk/go.mod
+++ b/sdk/go.mod
@@ -4,7 +4,7 @@ go 1.22
require (
github.com/blang/semver v3.5.1+incompatible
- github.com/pulumi/pulumi/sdk/v3 v3.133.0
+ github.com/pulumi/pulumi/sdk/v3 v3.140.0
)
require (
diff --git a/sdk/go.sum b/sdk/go.sum
index 1526633..22da94d 100644
--- a/sdk/go.sum
+++ b/sdk/go.sum
@@ -150,8 +150,8 @@ github.com/pulumi/appdash v0.0.0-20231130102222-75f619a67231 h1:vkHw5I/plNdTr435
github.com/pulumi/appdash v0.0.0-20231130102222-75f619a67231/go.mod h1:murToZ2N9hNJzewjHBgfFdXhZKjY3z5cYC1VXk+lbFE=
github.com/pulumi/esc v0.9.1 h1:HH5eEv8sgyxSpY5a8yePyqFXzA8cvBvapfH8457+mIs=
github.com/pulumi/esc v0.9.1/go.mod h1:oEJ6bOsjYlQUpjf70GiX+CXn3VBmpwFDxUTlmtUN84c=
-github.com/pulumi/pulumi/sdk/v3 v3.133.0 h1:o+7dbJZY9BVgAjOF5GYIWgjp/zpKAgWZwD4pPjUMXKQ=
-github.com/pulumi/pulumi/sdk/v3 v3.133.0/go.mod h1:J5kQEX8v87aeUhk6NdQXnjCo1DbiOnOiL3Sf2DuDda8=
+github.com/pulumi/pulumi/sdk/v3 v3.140.0 h1:+Z/RBvdYg7tBNkBwk4p/FzlV7niBT3TbLAICq/Y0LDU=
+github.com/pulumi/pulumi/sdk/v3 v3.140.0/go.mod h1:PvKsX88co8XuwuPdzolMvew5lZV+4JmZfkeSjj7A6dI=
github.com/rivo/uniseg v0.1.0/go.mod h1:J6wj4VEh+S6ZtnVlnTBMWIodfgj8LQOQFoIToxlJtxc=
github.com/rivo/uniseg v0.2.0/go.mod h1:J6wj4VEh+S6ZtnVlnTBMWIodfgj8LQOQFoIToxlJtxc=
github.com/rivo/uniseg v0.4.4 h1:8TfxU8dW6PdqD27gjM8MVNuicgxIjxpm4K7x4jp8sis=
diff --git a/sdk/go/crowdstrike/getSensorUpdatePolicyBuilds.go b/sdk/go/crowdstrike/getSensorUpdatePolicyBuilds.go
index c4ecb8e..4725638 100644
--- a/sdk/go/crowdstrike/getSensorUpdatePolicyBuilds.go
+++ b/sdk/go/crowdstrike/getSensorUpdatePolicyBuilds.go
@@ -33,7 +33,7 @@ import (
//
// func main() {
// pulumi.Run(func(ctx *pulumi.Context) error {
-// builds, err := crowdstrike.GetSensorUpdatePolicyBuilds(ctx, nil, nil)
+// builds, err := crowdstrike.GetSensorUpdatePolicyBuilds(ctx, map[string]interface{}{}, nil)
// if err != nil {
// return err
// }
diff --git a/sdk/go/crowdstrike/preventionPolicyLinux.go b/sdk/go/crowdstrike/preventionPolicyLinux.go
index ff68c33..16cba84 100644
--- a/sdk/go/crowdstrike/preventionPolicyLinux.go
+++ b/sdk/go/crowdstrike/preventionPolicyLinux.go
@@ -7,6 +7,7 @@ import (
"context"
"reflect"
+ "errors"
"github.com/crowdstrike/pulumi-crowdstrike/sdk/go/crowdstrike/internal"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
@@ -39,9 +40,7 @@ import (
// HostGroups: pulumi.StringArray{
// pulumi.String("d6e3c1e1b3d0467da0fowc96a5e6ecb5"),
// },
-// IoaRuleGroups: pulumi.StringArray{
-// pulumi.String("ed334b3243bc4b6bb8e7d40a2ecd86fa"),
-// },
+// IoaRuleGroups: pulumi.StringArray{},
// CloudAntiMalware: &crowdstrike.PreventionPolicyLinuxCloudAntiMalwareArgs{
// Detection: pulumi.String("MODERATE"),
// Prevention: pulumi.String("CAUTIOUS"),
@@ -131,9 +130,15 @@ type PreventionPolicyLinux struct {
func NewPreventionPolicyLinux(ctx *pulumi.Context,
name string, args *PreventionPolicyLinuxArgs, opts ...pulumi.ResourceOption) (*PreventionPolicyLinux, error) {
if args == nil {
- args = &PreventionPolicyLinuxArgs{}
+ return nil, errors.New("missing one or more required arguments")
}
+ if args.HostGroups == nil {
+ return nil, errors.New("invalid value for required argument 'HostGroups'")
+ }
+ if args.IoaRuleGroups == nil {
+ return nil, errors.New("invalid value for required argument 'IoaRuleGroups'")
+ }
opts = internal.PkgResourceDefaultOpts(opts)
var resource PreventionPolicyLinux
err := ctx.RegisterResource("crowdstrike:index/preventionPolicyLinux:PreventionPolicyLinux", name, args, &resource, opts...)
diff --git a/sdk/go/crowdstrike/preventionPolicyMac.go b/sdk/go/crowdstrike/preventionPolicyMac.go
index c3b5fb5..d89892f 100644
--- a/sdk/go/crowdstrike/preventionPolicyMac.go
+++ b/sdk/go/crowdstrike/preventionPolicyMac.go
@@ -7,6 +7,7 @@ import (
"context"
"reflect"
+ "errors"
"github.com/crowdstrike/pulumi-crowdstrike/sdk/go/crowdstrike/internal"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
@@ -39,9 +40,7 @@ import (
// HostGroups: pulumi.StringArray{
// pulumi.String("d6e3c1e1b3d0467da0fowc96a5e6ecb5"),
// },
-// IoaRuleGroups: pulumi.StringArray{
-// pulumi.String("ed334b3243bc4b6bb8e7d40a2ecd86fa"),
-// },
+// IoaRuleGroups: pulumi.StringArray{},
// CloudAdwareAndPup: &crowdstrike.PreventionPolicyMacCloudAdwareAndPupArgs{
// Detection: pulumi.String("MODERATE"),
// Prevention: pulumi.String("CAUTIOUS"),
@@ -152,9 +151,15 @@ type PreventionPolicyMac struct {
func NewPreventionPolicyMac(ctx *pulumi.Context,
name string, args *PreventionPolicyMacArgs, opts ...pulumi.ResourceOption) (*PreventionPolicyMac, error) {
if args == nil {
- args = &PreventionPolicyMacArgs{}
+ return nil, errors.New("missing one or more required arguments")
}
+ if args.HostGroups == nil {
+ return nil, errors.New("invalid value for required argument 'HostGroups'")
+ }
+ if args.IoaRuleGroups == nil {
+ return nil, errors.New("invalid value for required argument 'IoaRuleGroups'")
+ }
opts = internal.PkgResourceDefaultOpts(opts)
var resource PreventionPolicyMac
err := ctx.RegisterResource("crowdstrike:index/preventionPolicyMac:PreventionPolicyMac", name, args, &resource, opts...)
diff --git a/sdk/go/crowdstrike/preventionPolicyWindows.go b/sdk/go/crowdstrike/preventionPolicyWindows.go
index 6c3f88f..e05478f 100644
--- a/sdk/go/crowdstrike/preventionPolicyWindows.go
+++ b/sdk/go/crowdstrike/preventionPolicyWindows.go
@@ -7,6 +7,7 @@ import (
"context"
"reflect"
+ "errors"
"github.com/crowdstrike/pulumi-crowdstrike/sdk/go/crowdstrike/internal"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
@@ -39,9 +40,7 @@ import (
// HostGroups: pulumi.StringArray{
// pulumi.String("d6e3c1e1b3d0467da0fowc96a5e6ecb5"),
// },
-// IoaRuleGroups: pulumi.StringArray{
-// pulumi.String("ed334b3243bc4b6bb8e7d40a2ecd86fa"),
-// },
+// IoaRuleGroups: pulumi.StringArray{},
// AdwareAndPup: &crowdstrike.PreventionPolicyWindowsAdwareAndPupArgs{
// Detection: pulumi.String("MODERATE"),
// Prevention: pulumi.String("CAUTIOUS"),
@@ -271,9 +270,15 @@ type PreventionPolicyWindows struct {
func NewPreventionPolicyWindows(ctx *pulumi.Context,
name string, args *PreventionPolicyWindowsArgs, opts ...pulumi.ResourceOption) (*PreventionPolicyWindows, error) {
if args == nil {
- args = &PreventionPolicyWindowsArgs{}
+ return nil, errors.New("missing one or more required arguments")
}
+ if args.HostGroups == nil {
+ return nil, errors.New("invalid value for required argument 'HostGroups'")
+ }
+ if args.IoaRuleGroups == nil {
+ return nil, errors.New("invalid value for required argument 'IoaRuleGroups'")
+ }
opts = internal.PkgResourceDefaultOpts(opts)
var resource PreventionPolicyWindows
err := ctx.RegisterResource("crowdstrike:index/preventionPolicyWindows:PreventionPolicyWindows", name, args, &resource, opts...)
diff --git a/sdk/nodejs/preventionPolicyLinux.ts b/sdk/nodejs/preventionPolicyLinux.ts
index f45a574..a83f006 100644
--- a/sdk/nodejs/preventionPolicyLinux.ts
+++ b/sdk/nodejs/preventionPolicyLinux.ts
@@ -25,7 +25,7 @@ import * as utilities from "./utilities";
* enabled: true,
* description: "Made with Pulumi",
* hostGroups: ["d6e3c1e1b3d0467da0fowc96a5e6ecb5"],
- * ioaRuleGroups: ["ed334b3243bc4b6bb8e7d40a2ecd86fa"],
+ * ioaRuleGroups: [],
* cloudAntiMalware: {
* detection: "MODERATE",
* prevention: "CAUTIOUS",
@@ -122,7 +122,7 @@ export class PreventionPolicyLinux extends pulumi.CustomResource {
/**
* Host Group ids to attach to the prevention policy.
*/
- public readonly hostGroups!: pulumi.Output;
+ public readonly hostGroups!: pulumi.Output;
/**
* Whether to enable the setting. Allows the sensor to monitor unencrypted HTTP traffic for malicious patterns and improved detections.
*/
@@ -130,7 +130,7 @@ export class PreventionPolicyLinux extends pulumi.CustomResource {
/**
* IOA Rule Group to attach to the prevention policy.
*/
- public readonly ioaRuleGroups!: pulumi.Output;
+ public readonly ioaRuleGroups!: pulumi.Output;
public /*out*/ readonly lastUpdated!: pulumi.Output;
/**
* Name of the prevention policy.
@@ -176,7 +176,7 @@ export class PreventionPolicyLinux extends pulumi.CustomResource {
* @param args The arguments to use to populate this resource's properties.
* @param opts A bag of options that control this resource's behavior.
*/
- constructor(name: string, args?: PreventionPolicyLinuxArgs, opts?: pulumi.CustomResourceOptions)
+ constructor(name: string, args: PreventionPolicyLinuxArgs, opts?: pulumi.CustomResourceOptions)
constructor(name: string, argsOrState?: PreventionPolicyLinuxArgs | PreventionPolicyLinuxState, opts?: pulumi.CustomResourceOptions) {
let resourceInputs: pulumi.Inputs = {};
opts = opts || {};
@@ -205,6 +205,12 @@ export class PreventionPolicyLinux extends pulumi.CustomResource {
resourceInputs["uploadUnknownExecutables"] = state ? state.uploadUnknownExecutables : undefined;
} else {
const args = argsOrState as PreventionPolicyLinuxArgs | undefined;
+ if ((!args || args.hostGroups === undefined) && !opts.urn) {
+ throw new Error("Missing required property 'hostGroups'");
+ }
+ if ((!args || args.ioaRuleGroups === undefined) && !opts.urn) {
+ throw new Error("Missing required property 'ioaRuleGroups'");
+ }
resourceInputs["cloudAntiMalware"] = args ? args.cloudAntiMalware : undefined;
resourceInputs["customBlocking"] = args ? args.customBlocking : undefined;
resourceInputs["description"] = args ? args.description : undefined;
@@ -358,7 +364,7 @@ export interface PreventionPolicyLinuxArgs {
/**
* Host Group ids to attach to the prevention policy.
*/
- hostGroups?: pulumi.Input[]>;
+ hostGroups: pulumi.Input[]>;
/**
* Whether to enable the setting. Allows the sensor to monitor unencrypted HTTP traffic for malicious patterns and improved detections.
*/
@@ -366,7 +372,7 @@ export interface PreventionPolicyLinuxArgs {
/**
* IOA Rule Group to attach to the prevention policy.
*/
- ioaRuleGroups?: pulumi.Input[]>;
+ ioaRuleGroups: pulumi.Input[]>;
/**
* Name of the prevention policy.
*/
diff --git a/sdk/nodejs/preventionPolicyMac.ts b/sdk/nodejs/preventionPolicyMac.ts
index 6ab6c28..709be51 100644
--- a/sdk/nodejs/preventionPolicyMac.ts
+++ b/sdk/nodejs/preventionPolicyMac.ts
@@ -25,7 +25,7 @@ import * as utilities from "./utilities";
* enabled: false,
* description: "Made with Pulumi",
* hostGroups: ["d6e3c1e1b3d0467da0fowc96a5e6ecb5"],
- * ioaRuleGroups: ["ed334b3243bc4b6bb8e7d40a2ecd86fa"],
+ * ioaRuleGroups: [],
* cloudAdwareAndPup: {
* detection: "MODERATE",
* prevention: "CAUTIOUS",
@@ -137,7 +137,7 @@ export class PreventionPolicyMac extends pulumi.CustomResource {
/**
* Host Group ids to attach to the prevention policy.
*/
- public readonly hostGroups!: pulumi.Output;
+ public readonly hostGroups!: pulumi.Output;
/**
* Whether to enable the setting. Block processes that CrowdStrike Intelligence analysts classify as malicious. These are focused on static hash-based IOCs.
*/
@@ -145,7 +145,7 @@ export class PreventionPolicyMac extends pulumi.CustomResource {
/**
* IOA Rule Group to attach to the prevention policy.
*/
- public readonly ioaRuleGroups!: pulumi.Output;
+ public readonly ioaRuleGroups!: pulumi.Output;
/**
* Whether to enable the setting. An attempt to recover a plaintext password via the kcpassword file was blocked.
*/
@@ -207,7 +207,7 @@ export class PreventionPolicyMac extends pulumi.CustomResource {
* @param args The arguments to use to populate this resource's properties.
* @param opts A bag of options that control this resource's behavior.
*/
- constructor(name: string, args?: PreventionPolicyMacArgs, opts?: pulumi.CustomResourceOptions)
+ constructor(name: string, args: PreventionPolicyMacArgs, opts?: pulumi.CustomResourceOptions)
constructor(name: string, argsOrState?: PreventionPolicyMacArgs | PreventionPolicyMacState, opts?: pulumi.CustomResourceOptions) {
let resourceInputs: pulumi.Inputs = {};
opts = opts || {};
@@ -241,6 +241,12 @@ export class PreventionPolicyMac extends pulumi.CustomResource {
resourceInputs["xpcomShell"] = state ? state.xpcomShell : undefined;
} else {
const args = argsOrState as PreventionPolicyMacArgs | undefined;
+ if ((!args || args.hostGroups === undefined) && !opts.urn) {
+ throw new Error("Missing required property 'hostGroups'");
+ }
+ if ((!args || args.ioaRuleGroups === undefined) && !opts.urn) {
+ throw new Error("Missing required property 'ioaRuleGroups'");
+ }
resourceInputs["chopperWebshell"] = args ? args.chopperWebshell : undefined;
resourceInputs["cloudAdwareAndPup"] = args ? args.cloudAdwareAndPup : undefined;
resourceInputs["cloudAntiMalware"] = args ? args.cloudAntiMalware : undefined;
@@ -423,7 +429,7 @@ export interface PreventionPolicyMacArgs {
/**
* Host Group ids to attach to the prevention policy.
*/
- hostGroups?: pulumi.Input[]>;
+ hostGroups: pulumi.Input[]>;
/**
* Whether to enable the setting. Block processes that CrowdStrike Intelligence analysts classify as malicious. These are focused on static hash-based IOCs.
*/
@@ -431,7 +437,7 @@ export interface PreventionPolicyMacArgs {
/**
* IOA Rule Group to attach to the prevention policy.
*/
- ioaRuleGroups?: pulumi.Input[]>;
+ ioaRuleGroups: pulumi.Input[]>;
/**
* Whether to enable the setting. An attempt to recover a plaintext password via the kcpassword file was blocked.
*/
diff --git a/sdk/nodejs/preventionPolicyWindows.ts b/sdk/nodejs/preventionPolicyWindows.ts
index 90f476a..788e4b1 100644
--- a/sdk/nodejs/preventionPolicyWindows.ts
+++ b/sdk/nodejs/preventionPolicyWindows.ts
@@ -25,7 +25,7 @@ import * as utilities from "./utilities";
* enabled: false,
* description: "Made with Pulumi",
* hostGroups: ["d6e3c1e1b3d0467da0fowc96a5e6ecb5"],
- * ioaRuleGroups: ["ed334b3243bc4b6bb8e7d40a2ecd86fa"],
+ * ioaRuleGroups: [],
* adwareAndPup: {
* detection: "MODERATE",
* prevention: "CAUTIOUS",
@@ -262,7 +262,7 @@ export class PreventionPolicyWindows extends pulumi.CustomResource {
/**
* Host Group ids to attach to the prevention policy.
*/
- public readonly hostGroups!: pulumi.Output;
+ public readonly hostGroups!: pulumi.Output;
/**
* Whether to enable the setting. Allows the sensor to monitor unencrypted HTTP traffic and certain encrypted HTTPS traffic on the sensor for malicious patterns and generate detection events on non-Server systems.
*/
@@ -278,7 +278,7 @@ export class PreventionPolicyWindows extends pulumi.CustomResource {
/**
* IOA Rule Group to attach to the prevention policy.
*/
- public readonly ioaRuleGroups!: pulumi.Output;
+ public readonly ioaRuleGroups!: pulumi.Output;
/**
* Whether to enable the setting. JavaScript executing from a command line via rundll32.exe was prevented.
*/
@@ -400,7 +400,7 @@ export class PreventionPolicyWindows extends pulumi.CustomResource {
* @param args The arguments to use to populate this resource's properties.
* @param opts A bag of options that control this resource's behavior.
*/
- constructor(name: string, args?: PreventionPolicyWindowsArgs, opts?: pulumi.CustomResourceOptions)
+ constructor(name: string, args: PreventionPolicyWindowsArgs, opts?: pulumi.CustomResourceOptions)
constructor(name: string, argsOrState?: PreventionPolicyWindowsArgs | PreventionPolicyWindowsState, opts?: pulumi.CustomResourceOptions) {
let resourceInputs: pulumi.Inputs = {};
opts = opts || {};
@@ -471,6 +471,12 @@ export class PreventionPolicyWindows extends pulumi.CustomResource {
resourceInputs["windowsLogonBypassStickyKeys"] = state ? state.windowsLogonBypassStickyKeys : undefined;
} else {
const args = argsOrState as PreventionPolicyWindowsArgs | undefined;
+ if ((!args || args.hostGroups === undefined) && !opts.urn) {
+ throw new Error("Missing required property 'hostGroups'");
+ }
+ if ((!args || args.ioaRuleGroups === undefined) && !opts.urn) {
+ throw new Error("Missing required property 'ioaRuleGroups'");
+ }
resourceInputs["additionalUserModeData"] = args ? args.additionalUserModeData : undefined;
resourceInputs["advancedRemediation"] = args ? args.advancedRemediation : undefined;
resourceInputs["adwareAndPup"] = args ? args.adwareAndPup : undefined;
@@ -918,7 +924,7 @@ export interface PreventionPolicyWindowsArgs {
/**
* Host Group ids to attach to the prevention policy.
*/
- hostGroups?: pulumi.Input[]>;
+ hostGroups: pulumi.Input[]>;
/**
* Whether to enable the setting. Allows the sensor to monitor unencrypted HTTP traffic and certain encrypted HTTPS traffic on the sensor for malicious patterns and generate detection events on non-Server systems.
*/
@@ -934,7 +940,7 @@ export interface PreventionPolicyWindowsArgs {
/**
* IOA Rule Group to attach to the prevention policy.
*/
- ioaRuleGroups?: pulumi.Input[]>;
+ ioaRuleGroups: pulumi.Input[]>;
/**
* Whether to enable the setting. JavaScript executing from a command line via rundll32.exe was prevented.
*/
diff --git a/sdk/python/crowdstrike_pulumi/_inputs.py b/sdk/python/crowdstrike_pulumi/_inputs.py
index adfa118..4f2d243 100644
--- a/sdk/python/crowdstrike_pulumi/_inputs.py
+++ b/sdk/python/crowdstrike_pulumi/_inputs.py
@@ -4,32 +4,106 @@
import copy
import warnings
+import sys
import pulumi
import pulumi.runtime
from typing import Any, Mapping, Optional, Sequence, Union, overload
+if sys.version_info >= (3, 11):
+ from typing import NotRequired, TypedDict, TypeAlias
+else:
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
from . import _utilities
__all__ = [
'FilevantagePolicyScheduledExclusionArgs',
+ 'FilevantagePolicyScheduledExclusionArgsDict',
'FilevantagePolicyScheduledExclusionRepeatedArgs',
+ 'FilevantagePolicyScheduledExclusionRepeatedArgsDict',
'FilevantageRuleGroupRuleArgs',
+ 'FilevantageRuleGroupRuleArgsDict',
'PreventionPolicyLinuxCloudAntiMalwareArgs',
+ 'PreventionPolicyLinuxCloudAntiMalwareArgsDict',
'PreventionPolicyLinuxSensorAntiMalwareArgs',
+ 'PreventionPolicyLinuxSensorAntiMalwareArgsDict',
'PreventionPolicyMacCloudAdwareAndPupArgs',
+ 'PreventionPolicyMacCloudAdwareAndPupArgsDict',
'PreventionPolicyMacCloudAntiMalwareArgs',
+ 'PreventionPolicyMacCloudAntiMalwareArgsDict',
'PreventionPolicyMacSensorAdwareAndPupArgs',
+ 'PreventionPolicyMacSensorAdwareAndPupArgsDict',
'PreventionPolicyMacSensorAntiMalwareArgs',
+ 'PreventionPolicyMacSensorAntiMalwareArgsDict',
'PreventionPolicyWindowsAdwareAndPupArgs',
+ 'PreventionPolicyWindowsAdwareAndPupArgsDict',
'PreventionPolicyWindowsCloudAntiMalwareArgs',
+ 'PreventionPolicyWindowsCloudAntiMalwareArgsDict',
'PreventionPolicyWindowsCloudAntiMalwareMicrosoftOfficeFilesArgs',
+ 'PreventionPolicyWindowsCloudAntiMalwareMicrosoftOfficeFilesArgsDict',
'PreventionPolicyWindowsCloudAntiMalwareUserInitiatedArgs',
+ 'PreventionPolicyWindowsCloudAntiMalwareUserInitiatedArgsDict',
'PreventionPolicyWindowsExtendedUserModeDataArgs',
+ 'PreventionPolicyWindowsExtendedUserModeDataArgsDict',
'PreventionPolicyWindowsSensorAntiMalwareArgs',
+ 'PreventionPolicyWindowsSensorAntiMalwareArgsDict',
'PreventionPolicyWindowsSensorAntiMalwareUserInitiatedArgs',
+ 'PreventionPolicyWindowsSensorAntiMalwareUserInitiatedArgsDict',
'SensorUpdatePolicyScheduleArgs',
+ 'SensorUpdatePolicyScheduleArgsDict',
'SensorUpdatePolicyScheduleTimeBlockArgs',
+ 'SensorUpdatePolicyScheduleTimeBlockArgsDict',
]
+MYPY = False
+
+if not MYPY:
+ class FilevantagePolicyScheduledExclusionArgsDict(TypedDict):
+ name: pulumi.Input[str]
+ """
+ Name of the scheduled exclusion.
+ """
+ start_date: pulumi.Input[str]
+ """
+ The start date of the scheduled exclusion. Format: YYYY-MM-DD
+ """
+ start_time: pulumi.Input[str]
+ """
+ The start time of the scheduled exclusion in 24 hour format. Format: HH:MM
+ """
+ timezone: pulumi.Input[str]
+ """
+ The timezone to use for the time fields. See https://en.wikipedia.org/wiki/List*of*tz*database*time_zones.
+ """
+ description: NotRequired[pulumi.Input[str]]
+ """
+ Description of the scheduled exclusion.
+ """
+ end_date: NotRequired[pulumi.Input[str]]
+ """
+ The end date of the scheduled exclusion. Format: YYYY-MM-DD
+ """
+ end_time: NotRequired[pulumi.Input[str]]
+ """
+ The end time of the scheduled exclusion in 24 hour format. Format: HH:MM
+ """
+ id: NotRequired[pulumi.Input[str]]
+ """
+ Identifier for the scheduled exclusion.
+ """
+ processes: NotRequired[pulumi.Input[str]]
+ """
+ A comma separated list of processes to exclude changes from. Example: **/run*me.sh excludes changes made by run*me.sh in any location
+ """
+ repeated: NotRequired[pulumi.Input['FilevantagePolicyScheduledExclusionRepeatedArgsDict']]
+ """
+ Repeated scheduled exclusion
+ """
+ users: NotRequired[pulumi.Input[str]]
+ """
+ A comma separated list of users to exclude changes from. Example: user1,user2,admin* excludes changes made by user1, user2, and any user starting with admin
+ """
+elif False:
+ FilevantagePolicyScheduledExclusionArgsDict: TypeAlias = Mapping[str, Any]
+
@pulumi.input_type
class FilevantagePolicyScheduledExclusionArgs:
def __init__(__self__, *,
@@ -209,6 +283,39 @@ def users(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "users", value)
+if not MYPY:
+ class FilevantagePolicyScheduledExclusionRepeatedArgsDict(TypedDict):
+ all_day: pulumi.Input[bool]
+ """
+ If the exclusion is all day.
+ """
+ frequency: pulumi.Input[str]
+ """
+ The frequency of the exclusion. Options: daily, weekly, monthly
+ """
+ days_of_months: NotRequired[pulumi.Input[Sequence[pulumi.Input[int]]]]
+ """
+ The days of the month to allow the exclusion. Required if frequency is set to monthly and monthly_occurrence is set to days. Options: 1-31
+ """
+ days_of_weeks: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
+ """
+ The days of the week to allow the exclusion. Required if frequency is set to weekly or set to monthly and monthly_occurrence is set to a week. Options: Sunday, Monday, Tuesday, Wednesday, Thursday, Friday, Saturday
+ """
+ end_time: NotRequired[pulumi.Input[str]]
+ """
+ The end time to end the scheduled exclusion in 24 hour format. Format: HH:MM required if all_day is false
+ """
+ monthly_occurrence: NotRequired[pulumi.Input[str]]
+ """
+ The monthly occurrence of the exclusion. Either specify a week (first, second, third, fourth) or set to days to specify days of the month. Options: first, second, third, fourth, days. Required if frequency is set to monthly
+ """
+ start_time: NotRequired[pulumi.Input[str]]
+ """
+ The start time to allow the scheduled exclusion in 24 hour format. Format: HH:MM required if all_day is false
+ """
+elif False:
+ FilevantagePolicyScheduledExclusionRepeatedArgsDict: TypeAlias = Mapping[str, Any]
+
@pulumi.input_type
class FilevantagePolicyScheduledExclusionRepeatedArgs:
def __init__(__self__, *,
@@ -326,6 +433,139 @@ def start_time(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "start_time", value)
+if not MYPY:
+ class FilevantageRuleGroupRuleArgsDict(TypedDict):
+ description: pulumi.Input[str]
+ """
+ Description of the filevantage rule.
+ """
+ path: pulumi.Input[str]
+ """
+ Representing the file system or registry path to monitor. All paths must end with the path separator, e.g. c:\\windows\\ for windows and /usr/bin/ for linux/mac.
+ """
+ severity: pulumi.Input[str]
+ """
+ Severity to categorize change events produced by this rule.
+ """
+ depth: NotRequired[pulumi.Input[str]]
+ """
+ Depth below the base path to monitor.
+ """
+ enable_content_capture: NotRequired[pulumi.Input[bool]]
+ """
+ Enable content capture for the rule. Requires watch*file*write*changes or watch*key*value*set_changes to be enabled.
+ """
+ exclude: NotRequired[pulumi.Input[str]]
+ """
+ Represents the files, directories, registry keys, or registry values that will be excluded from monitoring.
+ """
+ exclude_processes: NotRequired[pulumi.Input[str]]
+ """
+ Represents the changes performed by specific processes that will be excluded from monitoring.
+ """
+ exclude_users: NotRequired[pulumi.Input[str]]
+ """
+ Represents the changes performed by specific users that will be excluded from monitoring.
+ """
+ file_names: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
+ """
+ List of file names whose content will be monitored. Listed files must match the file include pattern and not match the file exclude pattern.
+ """
+ id: NotRequired[pulumi.Input[str]]
+ """
+ Identifier for the filevantage rule.
+ """
+ include: NotRequired[pulumi.Input[str]]
+ """
+ Represents the files, directories, registry keys, or registry values that will be monitored. Defaults to all (*)
+ """
+ include_processes: NotRequired[pulumi.Input[str]]
+ """
+ Represents the changes performed by specific processes that will be monitored.
+ """
+ include_users: NotRequired[pulumi.Input[str]]
+ """
+ Represents the changes performed by specific users that will be monitored.
+ """
+ precedence: NotRequired[pulumi.Input[int]]
+ """
+ Precedence of the rule in the rule group.
+ """
+ registry_values: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
+ """
+ List of registry values whose content will be monitored. Listed registry values must match the registry include pattern and not match the registry exclude pattern.
+ """
+ watch_directory_attribute_changes: NotRequired[pulumi.Input[bool]]
+ """
+ Monitor directory attribute change events.
+ """
+ watch_directory_create_changes: NotRequired[pulumi.Input[bool]]
+ """
+ Monitor directory creation events.
+ """
+ watch_directory_delete_changes: NotRequired[pulumi.Input[bool]]
+ """
+ Monitor directory deletion events.
+ """
+ watch_directory_permission_changes: NotRequired[pulumi.Input[bool]]
+ """
+ Monitor directory permission change events.
+ """
+ watch_directory_rename_changes: NotRequired[pulumi.Input[bool]]
+ """
+ Monitor directory rename events.
+ """
+ watch_file_attribute_changes: NotRequired[pulumi.Input[bool]]
+ """
+ Monitor file attribute change events.
+ """
+ watch_file_create_changes: NotRequired[pulumi.Input[bool]]
+ """
+ Monitor file creation events.
+ """
+ watch_file_delete_changes: NotRequired[pulumi.Input[bool]]
+ """
+ Monitor file deletion events.
+ """
+ watch_file_permission_changes: NotRequired[pulumi.Input[bool]]
+ """
+ Monitor file permission change events.
+ """
+ watch_file_rename_changes: NotRequired[pulumi.Input[bool]]
+ """
+ Monitor file rename events.
+ """
+ watch_file_write_changes: NotRequired[pulumi.Input[bool]]
+ """
+ Monitor file write events.
+ """
+ watch_key_create_changes: NotRequired[pulumi.Input[bool]]
+ """
+ Monitor registry key creation events.
+ """
+ watch_key_delete_changes: NotRequired[pulumi.Input[bool]]
+ """
+ Monitor registry key deletion events.
+ """
+ watch_key_permissions_changes: NotRequired[pulumi.Input[bool]]
+ """
+ Monitor registry key permission change events.
+ """
+ watch_key_rename_changes: NotRequired[pulumi.Input[bool]]
+ """
+ Monitor registry key rename events.
+ """
+ watch_key_value_delete_changes: NotRequired[pulumi.Input[bool]]
+ """
+ Monitor registry value deletion events.
+ """
+ watch_key_value_set_changes: NotRequired[pulumi.Input[bool]]
+ """
+ Monitor registry value set events.
+ """
+elif False:
+ FilevantageRuleGroupRuleArgsDict: TypeAlias = Mapping[str, Any]
+
@pulumi.input_type
class FilevantageRuleGroupRuleArgs:
def __init__(__self__, *,
@@ -842,6 +1082,19 @@ def watch_key_value_set_changes(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "watch_key_value_set_changes", value)
+if not MYPY:
+ class PreventionPolicyLinuxCloudAntiMalwareArgsDict(TypedDict):
+ detection: pulumi.Input[str]
+ """
+ Machine learning level for detection.
+ """
+ prevention: pulumi.Input[str]
+ """
+ Machine learning level for prevention.
+ """
+elif False:
+ PreventionPolicyLinuxCloudAntiMalwareArgsDict: TypeAlias = Mapping[str, Any]
+
@pulumi.input_type
class PreventionPolicyLinuxCloudAntiMalwareArgs:
def __init__(__self__, *,
@@ -879,6 +1132,19 @@ def prevention(self, value: pulumi.Input[str]):
pulumi.set(self, "prevention", value)
+if not MYPY:
+ class PreventionPolicyLinuxSensorAntiMalwareArgsDict(TypedDict):
+ detection: pulumi.Input[str]
+ """
+ Machine learning level for detection.
+ """
+ prevention: pulumi.Input[str]
+ """
+ Machine learning level for prevention.
+ """
+elif False:
+ PreventionPolicyLinuxSensorAntiMalwareArgsDict: TypeAlias = Mapping[str, Any]
+
@pulumi.input_type
class PreventionPolicyLinuxSensorAntiMalwareArgs:
def __init__(__self__, *,
@@ -916,6 +1182,19 @@ def prevention(self, value: pulumi.Input[str]):
pulumi.set(self, "prevention", value)
+if not MYPY:
+ class PreventionPolicyMacCloudAdwareAndPupArgsDict(TypedDict):
+ detection: pulumi.Input[str]
+ """
+ Machine learning level for detection.
+ """
+ prevention: pulumi.Input[str]
+ """
+ Machine learning level for prevention.
+ """
+elif False:
+ PreventionPolicyMacCloudAdwareAndPupArgsDict: TypeAlias = Mapping[str, Any]
+
@pulumi.input_type
class PreventionPolicyMacCloudAdwareAndPupArgs:
def __init__(__self__, *,
@@ -953,6 +1232,19 @@ def prevention(self, value: pulumi.Input[str]):
pulumi.set(self, "prevention", value)
+if not MYPY:
+ class PreventionPolicyMacCloudAntiMalwareArgsDict(TypedDict):
+ detection: pulumi.Input[str]
+ """
+ Machine learning level for detection.
+ """
+ prevention: pulumi.Input[str]
+ """
+ Machine learning level for prevention.
+ """
+elif False:
+ PreventionPolicyMacCloudAntiMalwareArgsDict: TypeAlias = Mapping[str, Any]
+
@pulumi.input_type
class PreventionPolicyMacCloudAntiMalwareArgs:
def __init__(__self__, *,
@@ -990,6 +1282,19 @@ def prevention(self, value: pulumi.Input[str]):
pulumi.set(self, "prevention", value)
+if not MYPY:
+ class PreventionPolicyMacSensorAdwareAndPupArgsDict(TypedDict):
+ detection: pulumi.Input[str]
+ """
+ Machine learning level for detection.
+ """
+ prevention: pulumi.Input[str]
+ """
+ Machine learning level for prevention.
+ """
+elif False:
+ PreventionPolicyMacSensorAdwareAndPupArgsDict: TypeAlias = Mapping[str, Any]
+
@pulumi.input_type
class PreventionPolicyMacSensorAdwareAndPupArgs:
def __init__(__self__, *,
@@ -1027,6 +1332,19 @@ def prevention(self, value: pulumi.Input[str]):
pulumi.set(self, "prevention", value)
+if not MYPY:
+ class PreventionPolicyMacSensorAntiMalwareArgsDict(TypedDict):
+ detection: pulumi.Input[str]
+ """
+ Machine learning level for detection.
+ """
+ prevention: pulumi.Input[str]
+ """
+ Machine learning level for prevention.
+ """
+elif False:
+ PreventionPolicyMacSensorAntiMalwareArgsDict: TypeAlias = Mapping[str, Any]
+
@pulumi.input_type
class PreventionPolicyMacSensorAntiMalwareArgs:
def __init__(__self__, *,
@@ -1064,6 +1382,19 @@ def prevention(self, value: pulumi.Input[str]):
pulumi.set(self, "prevention", value)
+if not MYPY:
+ class PreventionPolicyWindowsAdwareAndPupArgsDict(TypedDict):
+ detection: pulumi.Input[str]
+ """
+ Machine learning level for detection.
+ """
+ prevention: pulumi.Input[str]
+ """
+ Machine learning level for prevention.
+ """
+elif False:
+ PreventionPolicyWindowsAdwareAndPupArgsDict: TypeAlias = Mapping[str, Any]
+
@pulumi.input_type
class PreventionPolicyWindowsAdwareAndPupArgs:
def __init__(__self__, *,
@@ -1101,6 +1432,19 @@ def prevention(self, value: pulumi.Input[str]):
pulumi.set(self, "prevention", value)
+if not MYPY:
+ class PreventionPolicyWindowsCloudAntiMalwareArgsDict(TypedDict):
+ detection: pulumi.Input[str]
+ """
+ Machine learning level for detection.
+ """
+ prevention: pulumi.Input[str]
+ """
+ Machine learning level for prevention.
+ """
+elif False:
+ PreventionPolicyWindowsCloudAntiMalwareArgsDict: TypeAlias = Mapping[str, Any]
+
@pulumi.input_type
class PreventionPolicyWindowsCloudAntiMalwareArgs:
def __init__(__self__, *,
@@ -1138,6 +1482,19 @@ def prevention(self, value: pulumi.Input[str]):
pulumi.set(self, "prevention", value)
+if not MYPY:
+ class PreventionPolicyWindowsCloudAntiMalwareMicrosoftOfficeFilesArgsDict(TypedDict):
+ detection: pulumi.Input[str]
+ """
+ Machine learning level for detection.
+ """
+ prevention: pulumi.Input[str]
+ """
+ Machine learning level for prevention.
+ """
+elif False:
+ PreventionPolicyWindowsCloudAntiMalwareMicrosoftOfficeFilesArgsDict: TypeAlias = Mapping[str, Any]
+
@pulumi.input_type
class PreventionPolicyWindowsCloudAntiMalwareMicrosoftOfficeFilesArgs:
def __init__(__self__, *,
@@ -1175,6 +1532,19 @@ def prevention(self, value: pulumi.Input[str]):
pulumi.set(self, "prevention", value)
+if not MYPY:
+ class PreventionPolicyWindowsCloudAntiMalwareUserInitiatedArgsDict(TypedDict):
+ detection: pulumi.Input[str]
+ """
+ Machine learning level for detection.
+ """
+ prevention: pulumi.Input[str]
+ """
+ Machine learning level for prevention.
+ """
+elif False:
+ PreventionPolicyWindowsCloudAntiMalwareUserInitiatedArgsDict: TypeAlias = Mapping[str, Any]
+
@pulumi.input_type
class PreventionPolicyWindowsCloudAntiMalwareUserInitiatedArgs:
def __init__(__self__, *,
@@ -1212,6 +1582,15 @@ def prevention(self, value: pulumi.Input[str]):
pulumi.set(self, "prevention", value)
+if not MYPY:
+ class PreventionPolicyWindowsExtendedUserModeDataArgsDict(TypedDict):
+ detection: pulumi.Input[str]
+ """
+ Machine learning level for detection.
+ """
+elif False:
+ PreventionPolicyWindowsExtendedUserModeDataArgsDict: TypeAlias = Mapping[str, Any]
+
@pulumi.input_type
class PreventionPolicyWindowsExtendedUserModeDataArgs:
def __init__(__self__, *,
@@ -1234,6 +1613,19 @@ def detection(self, value: pulumi.Input[str]):
pulumi.set(self, "detection", value)
+if not MYPY:
+ class PreventionPolicyWindowsSensorAntiMalwareArgsDict(TypedDict):
+ detection: pulumi.Input[str]
+ """
+ Machine learning level for detection.
+ """
+ prevention: pulumi.Input[str]
+ """
+ Machine learning level for prevention.
+ """
+elif False:
+ PreventionPolicyWindowsSensorAntiMalwareArgsDict: TypeAlias = Mapping[str, Any]
+
@pulumi.input_type
class PreventionPolicyWindowsSensorAntiMalwareArgs:
def __init__(__self__, *,
@@ -1271,6 +1663,19 @@ def prevention(self, value: pulumi.Input[str]):
pulumi.set(self, "prevention", value)
+if not MYPY:
+ class PreventionPolicyWindowsSensorAntiMalwareUserInitiatedArgsDict(TypedDict):
+ detection: pulumi.Input[str]
+ """
+ Machine learning level for detection.
+ """
+ prevention: pulumi.Input[str]
+ """
+ Machine learning level for prevention.
+ """
+elif False:
+ PreventionPolicyWindowsSensorAntiMalwareUserInitiatedArgsDict: TypeAlias = Mapping[str, Any]
+
@pulumi.input_type
class PreventionPolicyWindowsSensorAntiMalwareUserInitiatedArgs:
def __init__(__self__, *,
@@ -1308,6 +1713,23 @@ def prevention(self, value: pulumi.Input[str]):
pulumi.set(self, "prevention", value)
+if not MYPY:
+ class SensorUpdatePolicyScheduleArgsDict(TypedDict):
+ enabled: pulumi.Input[bool]
+ """
+ Enable the scheduler for sensor update policy.
+ """
+ time_blocks: NotRequired[pulumi.Input[Sequence[pulumi.Input['SensorUpdatePolicyScheduleTimeBlockArgsDict']]]]
+ """
+ The time block to prevent sensor updates. Only set when enabled is true.
+ """
+ timezone: NotRequired[pulumi.Input[str]]
+ """
+ The time zones that will be used for the time blocks. Only set when enabled is true.
+ """
+elif False:
+ SensorUpdatePolicyScheduleArgsDict: TypeAlias = Mapping[str, Any]
+
@pulumi.input_type
class SensorUpdatePolicyScheduleArgs:
def __init__(__self__, *,
@@ -1362,6 +1784,23 @@ def timezone(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "timezone", value)
+if not MYPY:
+ class SensorUpdatePolicyScheduleTimeBlockArgsDict(TypedDict):
+ days: pulumi.Input[Sequence[pulumi.Input[str]]]
+ """
+ The days of the week the time block should be active.
+ """
+ end_time: pulumi.Input[str]
+ """
+ The end time for the time block in 24HR format. Must be atleast 1 hour more than start_time.
+ """
+ start_time: pulumi.Input[str]
+ """
+ The start time for the time block in 24HR format. Must be atleast 1 hour before end_time.
+ """
+elif False:
+ SensorUpdatePolicyScheduleTimeBlockArgsDict: TypeAlias = Mapping[str, Any]
+
@pulumi.input_type
class SensorUpdatePolicyScheduleTimeBlockArgs:
def __init__(__self__, *,
diff --git a/sdk/python/crowdstrike_pulumi/_utilities.py b/sdk/python/crowdstrike_pulumi/_utilities.py
index b0c73ca..d2b71d0 100644
--- a/sdk/python/crowdstrike_pulumi/_utilities.py
+++ b/sdk/python/crowdstrike_pulumi/_utilities.py
@@ -264,7 +264,7 @@ def call_plain(
output = pulumi.runtime.call(tok, props, res, typ)
# Ingoring deps silently. They are typically non-empty, r.f() calls include r as a dependency.
- result, known, secret, _ = _sync_await(asyncio.ensure_future(_await_output(output)))
+ result, known, secret, _ = _sync_await(asyncio.create_task(_await_output(output)))
problem = None
if not known:
diff --git a/sdk/python/crowdstrike_pulumi/config/__init__.pyi b/sdk/python/crowdstrike_pulumi/config/__init__.pyi
index 8c4b031..0c3b09d 100644
--- a/sdk/python/crowdstrike_pulumi/config/__init__.pyi
+++ b/sdk/python/crowdstrike_pulumi/config/__init__.pyi
@@ -4,9 +4,14 @@
import copy
import warnings
+import sys
import pulumi
import pulumi.runtime
from typing import Any, Mapping, Optional, Sequence, Union, overload
+if sys.version_info >= (3, 11):
+ from typing import NotRequired, TypedDict, TypeAlias
+else:
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
from .. import _utilities
clientId: Optional[str]
diff --git a/sdk/python/crowdstrike_pulumi/config/vars.py b/sdk/python/crowdstrike_pulumi/config/vars.py
index dee0c12..7b7c2f9 100644
--- a/sdk/python/crowdstrike_pulumi/config/vars.py
+++ b/sdk/python/crowdstrike_pulumi/config/vars.py
@@ -4,9 +4,14 @@
import copy
import warnings
+import sys
import pulumi
import pulumi.runtime
from typing import Any, Mapping, Optional, Sequence, Union, overload
+if sys.version_info >= (3, 11):
+ from typing import NotRequired, TypedDict, TypeAlias
+else:
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
from .. import _utilities
import types
diff --git a/sdk/python/crowdstrike_pulumi/filevantage_policy.py b/sdk/python/crowdstrike_pulumi/filevantage_policy.py
index 6cb312e..0e649a4 100644
--- a/sdk/python/crowdstrike_pulumi/filevantage_policy.py
+++ b/sdk/python/crowdstrike_pulumi/filevantage_policy.py
@@ -4,9 +4,14 @@
import copy
import warnings
+import sys
import pulumi
import pulumi.runtime
from typing import Any, Mapping, Optional, Sequence, Union, overload
+if sys.version_info >= (3, 11):
+ from typing import NotRequired, TypedDict, TypeAlias
+else:
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
from . import _utilities
from . import outputs
from ._inputs import *
diff --git a/sdk/python/crowdstrike_pulumi/filevantage_rule_group.py b/sdk/python/crowdstrike_pulumi/filevantage_rule_group.py
index dac189f..805290a 100644
--- a/sdk/python/crowdstrike_pulumi/filevantage_rule_group.py
+++ b/sdk/python/crowdstrike_pulumi/filevantage_rule_group.py
@@ -4,9 +4,14 @@
import copy
import warnings
+import sys
import pulumi
import pulumi.runtime
from typing import Any, Mapping, Optional, Sequence, Union, overload
+if sys.version_info >= (3, 11):
+ from typing import NotRequired, TypedDict, TypeAlias
+else:
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
from . import _utilities
from . import outputs
from ._inputs import *
diff --git a/sdk/python/crowdstrike_pulumi/get_sensor_update_policy_builds.py b/sdk/python/crowdstrike_pulumi/get_sensor_update_policy_builds.py
index 271d754..9d8008f 100644
--- a/sdk/python/crowdstrike_pulumi/get_sensor_update_policy_builds.py
+++ b/sdk/python/crowdstrike_pulumi/get_sensor_update_policy_builds.py
@@ -4,9 +4,14 @@
import copy
import warnings
+import sys
import pulumi
import pulumi.runtime
from typing import Any, Mapping, Optional, Sequence, Union, overload
+if sys.version_info >= (3, 11):
+ from typing import NotRequired, TypedDict, TypeAlias
+else:
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
from . import _utilities
from . import outputs
@@ -126,9 +131,6 @@ def get_sensor_update_policy_builds(opts: Optional[pulumi.InvokeOptions] = None)
linux_arm64=pulumi.get(__ret__, 'linux_arm64'),
mac=pulumi.get(__ret__, 'mac'),
windows=pulumi.get(__ret__, 'windows'))
-
-
-@_utilities.lift_output_func(get_sensor_update_policy_builds)
def get_sensor_update_policy_builds_output(opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSensorUpdatePolicyBuildsResult]:
"""
This data source provides information about the latest sensor builds for each platform.
@@ -152,4 +154,12 @@ def get_sensor_update_policy_builds_output(opts: Optional[pulumi.InvokeOptions]
pulumi.export("latestLinuxArm64Build", builds.linux_arm64.latest)
```
"""
- ...
+ __args__ = dict()
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
+ __ret__ = pulumi.runtime.invoke_output('crowdstrike:index/getSensorUpdatePolicyBuilds:getSensorUpdatePolicyBuilds', __args__, opts=opts, typ=GetSensorUpdatePolicyBuildsResult)
+ return __ret__.apply(lambda __response__: GetSensorUpdatePolicyBuildsResult(
+ id=pulumi.get(__response__, 'id'),
+ linux=pulumi.get(__response__, 'linux'),
+ linux_arm64=pulumi.get(__response__, 'linux_arm64'),
+ mac=pulumi.get(__response__, 'mac'),
+ windows=pulumi.get(__response__, 'windows')))
diff --git a/sdk/python/crowdstrike_pulumi/host_group.py b/sdk/python/crowdstrike_pulumi/host_group.py
index e287333..de9a3ca 100644
--- a/sdk/python/crowdstrike_pulumi/host_group.py
+++ b/sdk/python/crowdstrike_pulumi/host_group.py
@@ -4,9 +4,14 @@
import copy
import warnings
+import sys
import pulumi
import pulumi.runtime
from typing import Any, Mapping, Optional, Sequence, Union, overload
+if sys.version_info >= (3, 11):
+ from typing import NotRequired, TypedDict, TypeAlias
+else:
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
from . import _utilities
__all__ = ['HostGroupArgs', 'HostGroup']
diff --git a/sdk/python/crowdstrike_pulumi/outputs.py b/sdk/python/crowdstrike_pulumi/outputs.py
index d697a62..b7fd396 100644
--- a/sdk/python/crowdstrike_pulumi/outputs.py
+++ b/sdk/python/crowdstrike_pulumi/outputs.py
@@ -4,9 +4,14 @@
import copy
import warnings
+import sys
import pulumi
import pulumi.runtime
from typing import Any, Mapping, Optional, Sequence, Union, overload
+if sys.version_info >= (3, 11):
+ from typing import NotRequired, TypedDict, TypeAlias
+else:
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
from . import _utilities
from . import outputs
diff --git a/sdk/python/crowdstrike_pulumi/prevention_policy_linux.py b/sdk/python/crowdstrike_pulumi/prevention_policy_linux.py
index 328a74e..93d4a50 100644
--- a/sdk/python/crowdstrike_pulumi/prevention_policy_linux.py
+++ b/sdk/python/crowdstrike_pulumi/prevention_policy_linux.py
@@ -4,9 +4,14 @@
import copy
import warnings
+import sys
import pulumi
import pulumi.runtime
from typing import Any, Mapping, Optional, Sequence, Union, overload
+if sys.version_info >= (3, 11):
+ from typing import NotRequired, TypedDict, TypeAlias
+else:
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
from . import _utilities
from . import outputs
from ._inputs import *
@@ -16,6 +21,8 @@
@pulumi.input_type
class PreventionPolicyLinuxArgs:
def __init__(__self__, *,
+ host_groups: pulumi.Input[Sequence[pulumi.Input[str]]],
+ ioa_rule_groups: pulumi.Input[Sequence[pulumi.Input[str]]],
cloud_anti_malware: Optional[pulumi.Input['PreventionPolicyLinuxCloudAntiMalwareArgs']] = None,
custom_blocking: Optional[pulumi.Input[bool]] = None,
description: Optional[pulumi.Input[str]] = None,
@@ -24,9 +31,7 @@ def __init__(__self__, *,
enabled: Optional[pulumi.Input[bool]] = None,
filesystem_visibility: Optional[pulumi.Input[bool]] = None,
ftp_visibility: Optional[pulumi.Input[bool]] = None,
- host_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
http_visibility: Optional[pulumi.Input[bool]] = None,
- ioa_rule_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
name: Optional[pulumi.Input[str]] = None,
network_visibility: Optional[pulumi.Input[bool]] = None,
prevent_suspicious_processes: Optional[pulumi.Input[bool]] = None,
@@ -38,6 +43,8 @@ def __init__(__self__, *,
upload_unknown_executables: Optional[pulumi.Input[bool]] = None):
"""
The set of arguments for constructing a PreventionPolicyLinux resource.
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] host_groups: Host Group ids to attach to the prevention policy.
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] ioa_rule_groups: IOA Rule Group to attach to the prevention policy.
:param pulumi.Input['PreventionPolicyLinuxCloudAntiMalwareArgs'] cloud_anti_malware: Use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware for your online hosts.
:param pulumi.Input[bool] custom_blocking: Whether to enable the setting. Block processes matching hashes that you add to IOC Management with the action set to "Block" or "Block, hide detection".
:param pulumi.Input[str] description: Description of the prevention policy.
@@ -46,9 +53,7 @@ def __init__(__self__, *,
:param pulumi.Input[bool] enabled: Enable the prevention policy.
:param pulumi.Input[bool] filesystem_visibility: Whether to enable the setting. Allows the sensor to monitor filesystem activity for additional telemetry and improved detections.
:param pulumi.Input[bool] ftp_visibility: Whether to enable the setting. Allows the sensor to monitor unencrypted FTP traffic for malicious patterns and improved detections.
- :param pulumi.Input[Sequence[pulumi.Input[str]]] host_groups: Host Group ids to attach to the prevention policy.
:param pulumi.Input[bool] http_visibility: Whether to enable the setting. Allows the sensor to monitor unencrypted HTTP traffic for malicious patterns and improved detections.
- :param pulumi.Input[Sequence[pulumi.Input[str]]] ioa_rule_groups: IOA Rule Group to attach to the prevention policy.
:param pulumi.Input[str] name: Name of the prevention policy.
:param pulumi.Input[bool] network_visibility: Whether to enable the setting. Allows the sensor to monitor network activity for additional telemetry and improved detections.
:param pulumi.Input[bool] prevent_suspicious_processes: Whether to enable the setting. Block processes that CrowdStrike analysts classify as suspicious. These are focused on dynamic IOAs, such as malware, exploits and other threats.
@@ -59,6 +64,8 @@ def __init__(__self__, *,
:param pulumi.Input[bool] upload_unknown_detection_related_executables: Whether to enable the setting. Upload all unknown detection-related executables for advanced analysis in the cloud.
:param pulumi.Input[bool] upload_unknown_executables: Whether to enable the setting. Upload all unknown executables for advanced analysis in the cloud.
"""
+ pulumi.set(__self__, "host_groups", host_groups)
+ pulumi.set(__self__, "ioa_rule_groups", ioa_rule_groups)
if cloud_anti_malware is not None:
pulumi.set(__self__, "cloud_anti_malware", cloud_anti_malware)
if custom_blocking is not None:
@@ -75,12 +82,8 @@ def __init__(__self__, *,
pulumi.set(__self__, "filesystem_visibility", filesystem_visibility)
if ftp_visibility is not None:
pulumi.set(__self__, "ftp_visibility", ftp_visibility)
- if host_groups is not None:
- pulumi.set(__self__, "host_groups", host_groups)
if http_visibility is not None:
pulumi.set(__self__, "http_visibility", http_visibility)
- if ioa_rule_groups is not None:
- pulumi.set(__self__, "ioa_rule_groups", ioa_rule_groups)
if name is not None:
pulumi.set(__self__, "name", name)
if network_visibility is not None:
@@ -100,6 +103,30 @@ def __init__(__self__, *,
if upload_unknown_executables is not None:
pulumi.set(__self__, "upload_unknown_executables", upload_unknown_executables)
+ @property
+ @pulumi.getter(name="hostGroups")
+ def host_groups(self) -> pulumi.Input[Sequence[pulumi.Input[str]]]:
+ """
+ Host Group ids to attach to the prevention policy.
+ """
+ return pulumi.get(self, "host_groups")
+
+ @host_groups.setter
+ def host_groups(self, value: pulumi.Input[Sequence[pulumi.Input[str]]]):
+ pulumi.set(self, "host_groups", value)
+
+ @property
+ @pulumi.getter(name="ioaRuleGroups")
+ def ioa_rule_groups(self) -> pulumi.Input[Sequence[pulumi.Input[str]]]:
+ """
+ IOA Rule Group to attach to the prevention policy.
+ """
+ return pulumi.get(self, "ioa_rule_groups")
+
+ @ioa_rule_groups.setter
+ def ioa_rule_groups(self, value: pulumi.Input[Sequence[pulumi.Input[str]]]):
+ pulumi.set(self, "ioa_rule_groups", value)
+
@property
@pulumi.getter(name="cloudAntiMalware")
def cloud_anti_malware(self) -> Optional[pulumi.Input['PreventionPolicyLinuxCloudAntiMalwareArgs']]:
@@ -196,18 +223,6 @@ def ftp_visibility(self) -> Optional[pulumi.Input[bool]]:
def ftp_visibility(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "ftp_visibility", value)
- @property
- @pulumi.getter(name="hostGroups")
- def host_groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
- """
- Host Group ids to attach to the prevention policy.
- """
- return pulumi.get(self, "host_groups")
-
- @host_groups.setter
- def host_groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
- pulumi.set(self, "host_groups", value)
-
@property
@pulumi.getter(name="httpVisibility")
def http_visibility(self) -> Optional[pulumi.Input[bool]]:
@@ -220,18 +235,6 @@ def http_visibility(self) -> Optional[pulumi.Input[bool]]:
def http_visibility(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "http_visibility", value)
- @property
- @pulumi.getter(name="ioaRuleGroups")
- def ioa_rule_groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
- """
- IOA Rule Group to attach to the prevention policy.
- """
- return pulumi.get(self, "ioa_rule_groups")
-
- @ioa_rule_groups.setter
- def ioa_rule_groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
- pulumi.set(self, "ioa_rule_groups", value)
-
@property
@pulumi.getter
def name(self) -> Optional[pulumi.Input[str]]:
@@ -726,7 +729,7 @@ def __init__(__self__,
enabled=True,
description="Made with Pulumi",
host_groups=["d6e3c1e1b3d0467da0fowc96a5e6ecb5"],
- ioa_rule_groups=["ed334b3243bc4b6bb8e7d40a2ecd86fa"],
+ ioa_rule_groups=[],
cloud_anti_malware={
"detection": "MODERATE",
"prevention": "CAUTIOUS",
@@ -786,7 +789,7 @@ def __init__(__self__,
@overload
def __init__(__self__,
resource_name: str,
- args: Optional[PreventionPolicyLinuxArgs] = None,
+ args: PreventionPolicyLinuxArgs,
opts: Optional[pulumi.ResourceOptions] = None):
"""
This resource allows you to manage CrowdStrike Falcon prevention policies for Linux hosts. Prevention policies allow you to manage what activity will trigger detections and preventions on your hosts.
@@ -807,7 +810,7 @@ def __init__(__self__,
enabled=True,
description="Made with Pulumi",
host_groups=["d6e3c1e1b3d0467da0fowc96a5e6ecb5"],
- ioa_rule_groups=["ed334b3243bc4b6bb8e7d40a2ecd86fa"],
+ ioa_rule_groups=[],
cloud_anti_malware={
"detection": "MODERATE",
"prevention": "CAUTIOUS",
@@ -892,8 +895,12 @@ def _internal_init(__self__,
__props__.__dict__["enabled"] = enabled
__props__.__dict__["filesystem_visibility"] = filesystem_visibility
__props__.__dict__["ftp_visibility"] = ftp_visibility
+ if host_groups is None and not opts.urn:
+ raise TypeError("Missing required property 'host_groups'")
__props__.__dict__["host_groups"] = host_groups
__props__.__dict__["http_visibility"] = http_visibility
+ if ioa_rule_groups is None and not opts.urn:
+ raise TypeError("Missing required property 'ioa_rule_groups'")
__props__.__dict__["ioa_rule_groups"] = ioa_rule_groups
__props__.__dict__["name"] = name
__props__.__dict__["network_visibility"] = network_visibility
@@ -1057,7 +1064,7 @@ def ftp_visibility(self) -> pulumi.Output[bool]:
@property
@pulumi.getter(name="hostGroups")
- def host_groups(self) -> pulumi.Output[Optional[Sequence[str]]]:
+ def host_groups(self) -> pulumi.Output[Sequence[str]]:
"""
Host Group ids to attach to the prevention policy.
"""
@@ -1073,7 +1080,7 @@ def http_visibility(self) -> pulumi.Output[bool]:
@property
@pulumi.getter(name="ioaRuleGroups")
- def ioa_rule_groups(self) -> pulumi.Output[Optional[Sequence[str]]]:
+ def ioa_rule_groups(self) -> pulumi.Output[Sequence[str]]:
"""
IOA Rule Group to attach to the prevention policy.
"""
diff --git a/sdk/python/crowdstrike_pulumi/prevention_policy_mac.py b/sdk/python/crowdstrike_pulumi/prevention_policy_mac.py
index 6298068..1968173 100644
--- a/sdk/python/crowdstrike_pulumi/prevention_policy_mac.py
+++ b/sdk/python/crowdstrike_pulumi/prevention_policy_mac.py
@@ -4,9 +4,14 @@
import copy
import warnings
+import sys
import pulumi
import pulumi.runtime
from typing import Any, Mapping, Optional, Sequence, Union, overload
+if sys.version_info >= (3, 11):
+ from typing import NotRequired, TypedDict, TypeAlias
+else:
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
from . import _utilities
from . import outputs
from ._inputs import *
@@ -16,6 +21,8 @@
@pulumi.input_type
class PreventionPolicyMacArgs:
def __init__(__self__, *,
+ host_groups: pulumi.Input[Sequence[pulumi.Input[str]]],
+ ioa_rule_groups: pulumi.Input[Sequence[pulumi.Input[str]]],
chopper_webshell: Optional[pulumi.Input[bool]] = None,
cloud_adware_and_pup: Optional[pulumi.Input['PreventionPolicyMacCloudAdwareAndPupArgs']] = None,
cloud_anti_malware: Optional[pulumi.Input['PreventionPolicyMacCloudAntiMalwareArgs']] = None,
@@ -25,9 +32,7 @@ def __init__(__self__, *,
empyre_backdoor: Optional[pulumi.Input[bool]] = None,
enabled: Optional[pulumi.Input[bool]] = None,
hash_collector: Optional[pulumi.Input[bool]] = None,
- host_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
intelligence_sourced_threats: Optional[pulumi.Input[bool]] = None,
- ioa_rule_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
kc_password_decoded: Optional[pulumi.Input[bool]] = None,
name: Optional[pulumi.Input[str]] = None,
notify_end_users: Optional[pulumi.Input[bool]] = None,
@@ -43,6 +48,8 @@ def __init__(__self__, *,
xpcom_shell: Optional[pulumi.Input[bool]] = None):
"""
The set of arguments for constructing a PreventionPolicyMac resource.
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] host_groups: Host Group ids to attach to the prevention policy.
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] ioa_rule_groups: IOA Rule Group to attach to the prevention policy.
:param pulumi.Input[bool] chopper_webshell: Whether to enable the setting. Execution of a command shell was blocked and is indicative of the system hosting a Chopper web page.
:param pulumi.Input['PreventionPolicyMacCloudAdwareAndPupArgs'] cloud_adware_and_pup: Use cloud-based machine learning informed by global analysis of executables to detect and prevent adware and potentially unwanted programs (PUP) for your online hosts.
:param pulumi.Input['PreventionPolicyMacCloudAntiMalwareArgs'] cloud_anti_malware: Use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware for your online hosts.
@@ -52,9 +59,7 @@ def __init__(__self__, *,
:param pulumi.Input[bool] empyre_backdoor: Whether to enable the setting. A process with behaviors indicative of the Empyre Backdoor was terminated.
:param pulumi.Input[bool] enabled: Enable the prevention policy.
:param pulumi.Input[bool] hash_collector: Whether to enable the setting. An attempt to dump a user’s hashed password was blocked.
- :param pulumi.Input[Sequence[pulumi.Input[str]]] host_groups: Host Group ids to attach to the prevention policy.
:param pulumi.Input[bool] intelligence_sourced_threats: Whether to enable the setting. Block processes that CrowdStrike Intelligence analysts classify as malicious. These are focused on static hash-based IOCs.
- :param pulumi.Input[Sequence[pulumi.Input[str]]] ioa_rule_groups: IOA Rule Group to attach to the prevention policy.
:param pulumi.Input[bool] kc_password_decoded: Whether to enable the setting. An attempt to recover a plaintext password via the kcpassword file was blocked.
:param pulumi.Input[str] name: Name of the prevention policy.
:param pulumi.Input[bool] notify_end_users: Whether to enable the setting. Show a pop-up notification to the end user when the Falcon sensor blocks, kills, or quarantines. See these messages in Console.app by searching for Process: Falcon Notifications.
@@ -69,6 +74,8 @@ def __init__(__self__, *,
:param pulumi.Input[bool] upload_unknown_executables: Whether to enable the setting. Upload all unknown executables for advanced analysis in the cloud.
:param pulumi.Input[bool] xpcom_shell: Whether to enable the setting. The execution of an XPCOM shell was blocked.
"""
+ pulumi.set(__self__, "host_groups", host_groups)
+ pulumi.set(__self__, "ioa_rule_groups", ioa_rule_groups)
if chopper_webshell is not None:
pulumi.set(__self__, "chopper_webshell", chopper_webshell)
if cloud_adware_and_pup is not None:
@@ -87,12 +94,8 @@ def __init__(__self__, *,
pulumi.set(__self__, "enabled", enabled)
if hash_collector is not None:
pulumi.set(__self__, "hash_collector", hash_collector)
- if host_groups is not None:
- pulumi.set(__self__, "host_groups", host_groups)
if intelligence_sourced_threats is not None:
pulumi.set(__self__, "intelligence_sourced_threats", intelligence_sourced_threats)
- if ioa_rule_groups is not None:
- pulumi.set(__self__, "ioa_rule_groups", ioa_rule_groups)
if kc_password_decoded is not None:
pulumi.set(__self__, "kc_password_decoded", kc_password_decoded)
if name is not None:
@@ -120,6 +123,30 @@ def __init__(__self__, *,
if xpcom_shell is not None:
pulumi.set(__self__, "xpcom_shell", xpcom_shell)
+ @property
+ @pulumi.getter(name="hostGroups")
+ def host_groups(self) -> pulumi.Input[Sequence[pulumi.Input[str]]]:
+ """
+ Host Group ids to attach to the prevention policy.
+ """
+ return pulumi.get(self, "host_groups")
+
+ @host_groups.setter
+ def host_groups(self, value: pulumi.Input[Sequence[pulumi.Input[str]]]):
+ pulumi.set(self, "host_groups", value)
+
+ @property
+ @pulumi.getter(name="ioaRuleGroups")
+ def ioa_rule_groups(self) -> pulumi.Input[Sequence[pulumi.Input[str]]]:
+ """
+ IOA Rule Group to attach to the prevention policy.
+ """
+ return pulumi.get(self, "ioa_rule_groups")
+
+ @ioa_rule_groups.setter
+ def ioa_rule_groups(self, value: pulumi.Input[Sequence[pulumi.Input[str]]]):
+ pulumi.set(self, "ioa_rule_groups", value)
+
@property
@pulumi.getter(name="chopperWebshell")
def chopper_webshell(self) -> Optional[pulumi.Input[bool]]:
@@ -228,18 +255,6 @@ def hash_collector(self) -> Optional[pulumi.Input[bool]]:
def hash_collector(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "hash_collector", value)
- @property
- @pulumi.getter(name="hostGroups")
- def host_groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
- """
- Host Group ids to attach to the prevention policy.
- """
- return pulumi.get(self, "host_groups")
-
- @host_groups.setter
- def host_groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
- pulumi.set(self, "host_groups", value)
-
@property
@pulumi.getter(name="intelligenceSourcedThreats")
def intelligence_sourced_threats(self) -> Optional[pulumi.Input[bool]]:
@@ -252,18 +267,6 @@ def intelligence_sourced_threats(self) -> Optional[pulumi.Input[bool]]:
def intelligence_sourced_threats(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "intelligence_sourced_threats", value)
- @property
- @pulumi.getter(name="ioaRuleGroups")
- def ioa_rule_groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
- """
- IOA Rule Group to attach to the prevention policy.
- """
- return pulumi.get(self, "ioa_rule_groups")
-
- @ioa_rule_groups.setter
- def ioa_rule_groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
- pulumi.set(self, "ioa_rule_groups", value)
-
@property
@pulumi.getter(name="kcPasswordDecoded")
def kc_password_decoded(self) -> Optional[pulumi.Input[bool]]:
@@ -891,7 +894,7 @@ def __init__(__self__,
enabled=False,
description="Made with Pulumi",
host_groups=["d6e3c1e1b3d0467da0fowc96a5e6ecb5"],
- ioa_rule_groups=["ed334b3243bc4b6bb8e7d40a2ecd86fa"],
+ ioa_rule_groups=[],
cloud_adware_and_pup={
"detection": "MODERATE",
"prevention": "CAUTIOUS",
@@ -967,7 +970,7 @@ def __init__(__self__,
@overload
def __init__(__self__,
resource_name: str,
- args: Optional[PreventionPolicyMacArgs] = None,
+ args: PreventionPolicyMacArgs,
opts: Optional[pulumi.ResourceOptions] = None):
"""
This resource allows you to manage CrowdStrike Falcon prevention policies for Mac hosts. Prevention policies allow you to manage what activity will trigger detections and preventions on your hosts.
@@ -988,7 +991,7 @@ def __init__(__self__,
enabled=False,
description="Made with Pulumi",
host_groups=["d6e3c1e1b3d0467da0fowc96a5e6ecb5"],
- ioa_rule_groups=["ed334b3243bc4b6bb8e7d40a2ecd86fa"],
+ ioa_rule_groups=[],
cloud_adware_and_pup={
"detection": "MODERATE",
"prevention": "CAUTIOUS",
@@ -1090,8 +1093,12 @@ def _internal_init(__self__,
__props__.__dict__["empyre_backdoor"] = empyre_backdoor
__props__.__dict__["enabled"] = enabled
__props__.__dict__["hash_collector"] = hash_collector
+ if host_groups is None and not opts.urn:
+ raise TypeError("Missing required property 'host_groups'")
__props__.__dict__["host_groups"] = host_groups
__props__.__dict__["intelligence_sourced_threats"] = intelligence_sourced_threats
+ if ioa_rule_groups is None and not opts.urn:
+ raise TypeError("Missing required property 'ioa_rule_groups'")
__props__.__dict__["ioa_rule_groups"] = ioa_rule_groups
__props__.__dict__["kc_password_decoded"] = kc_password_decoded
__props__.__dict__["name"] = name
@@ -1282,7 +1289,7 @@ def hash_collector(self) -> pulumi.Output[bool]:
@property
@pulumi.getter(name="hostGroups")
- def host_groups(self) -> pulumi.Output[Optional[Sequence[str]]]:
+ def host_groups(self) -> pulumi.Output[Sequence[str]]:
"""
Host Group ids to attach to the prevention policy.
"""
@@ -1298,7 +1305,7 @@ def intelligence_sourced_threats(self) -> pulumi.Output[bool]:
@property
@pulumi.getter(name="ioaRuleGroups")
- def ioa_rule_groups(self) -> pulumi.Output[Optional[Sequence[str]]]:
+ def ioa_rule_groups(self) -> pulumi.Output[Sequence[str]]:
"""
IOA Rule Group to attach to the prevention policy.
"""
diff --git a/sdk/python/crowdstrike_pulumi/prevention_policy_windows.py b/sdk/python/crowdstrike_pulumi/prevention_policy_windows.py
index 7306180..73fdcb0 100644
--- a/sdk/python/crowdstrike_pulumi/prevention_policy_windows.py
+++ b/sdk/python/crowdstrike_pulumi/prevention_policy_windows.py
@@ -4,9 +4,14 @@
import copy
import warnings
+import sys
import pulumi
import pulumi.runtime
from typing import Any, Mapping, Optional, Sequence, Union, overload
+if sys.version_info >= (3, 11):
+ from typing import NotRequired, TypedDict, TypeAlias
+else:
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
from . import _utilities
from . import outputs
from ._inputs import *
@@ -16,6 +21,8 @@
@pulumi.input_type
class PreventionPolicyWindowsArgs:
def __init__(__self__, *,
+ host_groups: pulumi.Input[Sequence[pulumi.Input[str]]],
+ ioa_rule_groups: pulumi.Input[Sequence[pulumi.Input[str]]],
additional_user_mode_data: Optional[pulumi.Input[bool]] = None,
advanced_remediation: Optional[pulumi.Input[bool]] = None,
adware_and_pup: Optional[pulumi.Input['PreventionPolicyWindowsAdwareAndPupArgs']] = None,
@@ -45,11 +52,9 @@ def __init__(__self__, *,
force_dep: Optional[pulumi.Input[bool]] = None,
hardware_enhanced_exploit_detection: Optional[pulumi.Input[bool]] = None,
heap_spray_preallocation: Optional[pulumi.Input[bool]] = None,
- host_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
http_detections: Optional[pulumi.Input[bool]] = None,
intelligence_sourced_threats: Optional[pulumi.Input[bool]] = None,
interpreter_only: Optional[pulumi.Input[bool]] = None,
- ioa_rule_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
javascript_via_rundll32: Optional[pulumi.Input[bool]] = None,
locky: Optional[pulumi.Input[bool]] = None,
memory_scanning: Optional[pulumi.Input[bool]] = None,
@@ -80,6 +85,8 @@ def __init__(__self__, *,
windows_logon_bypass_sticky_keys: Optional[pulumi.Input[bool]] = None):
"""
The set of arguments for constructing a PreventionPolicyWindows resource.
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] host_groups: Host Group ids to attach to the prevention policy.
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] ioa_rule_groups: IOA Rule Group to attach to the prevention policy.
:param pulumi.Input[bool] additional_user_mode_data: Whether to enable the setting. Allows the sensor to get more data from a user-mode component it loads into all eligible processes, which augments online machine learning and turns on additional detections. Recommend testing with critical applications before full deployment.
:param pulumi.Input[bool] advanced_remediation: Whether to enable the setting. Perform advanced remediation for IOA detections to kill processes, quarantine files, remove scheduled tasks, and clear and delete ASEP registry values.
:param pulumi.Input['PreventionPolicyWindowsAdwareAndPupArgs'] adware_and_pup: Use cloud-based machine learning informed by global analysis of executables to detect and prevent adware and potentially unwanted programs (PUP) for your online hosts.
@@ -109,11 +116,9 @@ def __init__(__self__, *,
:param pulumi.Input[bool] force_dep: Whether to enable the setting. A process that had Force Data Execution Prevention (Force DEP) applied tried to execute non-executable memory and was blocked. Requires additional*user*mode_data to be enabled.
:param pulumi.Input[bool] hardware_enhanced_exploit_detection: Whether to enable the setting. Provides additional visibility into application exploits by using CPU hardware features that detect suspicious control flows. Available only for hosts running Windows 10 (RS4) or Windows Server 2016 Version 1803 or later and Skylake or later CPU.
:param pulumi.Input[bool] heap_spray_preallocation: Whether to enable the setting. A heap spray attempt was detected and blocked. This may have been part of an attempted exploit. Requires additional*user*mode_data to be enabled.
- :param pulumi.Input[Sequence[pulumi.Input[str]]] host_groups: Host Group ids to attach to the prevention policy.
:param pulumi.Input[bool] http_detections: Whether to enable the setting. Allows the sensor to monitor unencrypted HTTP traffic and certain encrypted HTTPS traffic on the sensor for malicious patterns and generate detection events on non-Server systems.
:param pulumi.Input[bool] intelligence_sourced_threats: Whether to enable the setting. Block processes that CrowdStrike Intelligence analysts classify as malicious. These are focused on static hash-based IOCs.
:param pulumi.Input[bool] interpreter_only: Whether to enable the setting. Provides visibility into malicious PowerShell interpreter usage. For hosts running Windows 10, Script-Based Execution Monitoring may be used instead.
- :param pulumi.Input[Sequence[pulumi.Input[str]]] ioa_rule_groups: IOA Rule Group to attach to the prevention policy.
:param pulumi.Input[bool] javascript_via_rundll32: Whether to enable the setting. JavaScript executing from a command line via rundll32.exe was prevented.
:param pulumi.Input[bool] locky: Whether to enable the setting. A process determined to be associated with Locky was blocked.
:param pulumi.Input[bool] memory_scanning: Whether to enable the setting. Provides visibility into in-memory attacks by scanning for suspicious artifacts on hosts with the following: an integrated GPU and supporting OS libraries, Windows 10 v1607 (RS1) or later, and a Skylake or newer Intel CPU.
@@ -143,6 +148,8 @@ def __init__(__self__, *,
:param pulumi.Input[bool] vulnerable_driver_protection: Whether to enable the setting. Quarantine and block the loading of newly written kernel drivers that CrowdStrike analysts have identified as vulnerable. Available on Windows 10 and Windows 2016 and later. Requires driver*load*prevention.
:param pulumi.Input[bool] windows_logon_bypass_sticky_keys: Whether to enable the setting. A command line process associated with Windows logon bypass was prevented from executing.
"""
+ pulumi.set(__self__, "host_groups", host_groups)
+ pulumi.set(__self__, "ioa_rule_groups", ioa_rule_groups)
if additional_user_mode_data is not None:
pulumi.set(__self__, "additional_user_mode_data", additional_user_mode_data)
if advanced_remediation is not None:
@@ -201,16 +208,12 @@ def __init__(__self__, *,
pulumi.set(__self__, "hardware_enhanced_exploit_detection", hardware_enhanced_exploit_detection)
if heap_spray_preallocation is not None:
pulumi.set(__self__, "heap_spray_preallocation", heap_spray_preallocation)
- if host_groups is not None:
- pulumi.set(__self__, "host_groups", host_groups)
if http_detections is not None:
pulumi.set(__self__, "http_detections", http_detections)
if intelligence_sourced_threats is not None:
pulumi.set(__self__, "intelligence_sourced_threats", intelligence_sourced_threats)
if interpreter_only is not None:
pulumi.set(__self__, "interpreter_only", interpreter_only)
- if ioa_rule_groups is not None:
- pulumi.set(__self__, "ioa_rule_groups", ioa_rule_groups)
if javascript_via_rundll32 is not None:
pulumi.set(__self__, "javascript_via_rundll32", javascript_via_rundll32)
if locky is not None:
@@ -268,6 +271,30 @@ def __init__(__self__, *,
if windows_logon_bypass_sticky_keys is not None:
pulumi.set(__self__, "windows_logon_bypass_sticky_keys", windows_logon_bypass_sticky_keys)
+ @property
+ @pulumi.getter(name="hostGroups")
+ def host_groups(self) -> pulumi.Input[Sequence[pulumi.Input[str]]]:
+ """
+ Host Group ids to attach to the prevention policy.
+ """
+ return pulumi.get(self, "host_groups")
+
+ @host_groups.setter
+ def host_groups(self, value: pulumi.Input[Sequence[pulumi.Input[str]]]):
+ pulumi.set(self, "host_groups", value)
+
+ @property
+ @pulumi.getter(name="ioaRuleGroups")
+ def ioa_rule_groups(self) -> pulumi.Input[Sequence[pulumi.Input[str]]]:
+ """
+ IOA Rule Group to attach to the prevention policy.
+ """
+ return pulumi.get(self, "ioa_rule_groups")
+
+ @ioa_rule_groups.setter
+ def ioa_rule_groups(self, value: pulumi.Input[Sequence[pulumi.Input[str]]]):
+ pulumi.set(self, "ioa_rule_groups", value)
+
@property
@pulumi.getter(name="additionalUserModeData")
def additional_user_mode_data(self) -> Optional[pulumi.Input[bool]]:
@@ -616,18 +643,6 @@ def heap_spray_preallocation(self) -> Optional[pulumi.Input[bool]]:
def heap_spray_preallocation(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "heap_spray_preallocation", value)
- @property
- @pulumi.getter(name="hostGroups")
- def host_groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
- """
- Host Group ids to attach to the prevention policy.
- """
- return pulumi.get(self, "host_groups")
-
- @host_groups.setter
- def host_groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
- pulumi.set(self, "host_groups", value)
-
@property
@pulumi.getter(name="httpDetections")
def http_detections(self) -> Optional[pulumi.Input[bool]]:
@@ -664,18 +679,6 @@ def interpreter_only(self) -> Optional[pulumi.Input[bool]]:
def interpreter_only(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "interpreter_only", value)
- @property
- @pulumi.getter(name="ioaRuleGroups")
- def ioa_rule_groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
- """
- IOA Rule Group to attach to the prevention policy.
- """
- return pulumi.get(self, "ioa_rule_groups")
-
- @ioa_rule_groups.setter
- def ioa_rule_groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
- pulumi.set(self, "ioa_rule_groups", value)
-
@property
@pulumi.getter(name="javascriptViaRundll32")
def javascript_via_rundll32(self) -> Optional[pulumi.Input[bool]]:
@@ -2112,7 +2115,7 @@ def __init__(__self__,
enabled=False,
description="Made with Pulumi",
host_groups=["d6e3c1e1b3d0467da0fowc96a5e6ecb5"],
- ioa_rule_groups=["ed334b3243bc4b6bb8e7d40a2ecd86fa"],
+ ioa_rule_groups=[],
adware_and_pup={
"detection": "MODERATE",
"prevention": "CAUTIOUS",
@@ -2270,7 +2273,7 @@ def __init__(__self__,
@overload
def __init__(__self__,
resource_name: str,
- args: Optional[PreventionPolicyWindowsArgs] = None,
+ args: PreventionPolicyWindowsArgs,
opts: Optional[pulumi.ResourceOptions] = None):
"""
This resource allows you to manage CrowdStrike Falcon prevention policies for Windows hosts. Prevention policies allow you to manage what activity will trigger detections and preventions on your hosts.
@@ -2291,7 +2294,7 @@ def __init__(__self__,
enabled=False,
description="Made with Pulumi",
host_groups=["d6e3c1e1b3d0467da0fowc96a5e6ecb5"],
- ioa_rule_groups=["ed334b3243bc4b6bb8e7d40a2ecd86fa"],
+ ioa_rule_groups=[],
adware_and_pup={
"detection": "MODERATE",
"prevention": "CAUTIOUS",
@@ -2495,10 +2498,14 @@ def _internal_init(__self__,
__props__.__dict__["force_dep"] = force_dep
__props__.__dict__["hardware_enhanced_exploit_detection"] = hardware_enhanced_exploit_detection
__props__.__dict__["heap_spray_preallocation"] = heap_spray_preallocation
+ if host_groups is None and not opts.urn:
+ raise TypeError("Missing required property 'host_groups'")
__props__.__dict__["host_groups"] = host_groups
__props__.__dict__["http_detections"] = http_detections
__props__.__dict__["intelligence_sourced_threats"] = intelligence_sourced_threats
__props__.__dict__["interpreter_only"] = interpreter_only
+ if ioa_rule_groups is None and not opts.urn:
+ raise TypeError("Missing required property 'ioa_rule_groups'")
__props__.__dict__["ioa_rule_groups"] = ioa_rule_groups
__props__.__dict__["javascript_via_rundll32"] = javascript_via_rundll32
__props__.__dict__["locky"] = locky
@@ -2975,7 +2982,7 @@ def heap_spray_preallocation(self) -> pulumi.Output[bool]:
@property
@pulumi.getter(name="hostGroups")
- def host_groups(self) -> pulumi.Output[Optional[Sequence[str]]]:
+ def host_groups(self) -> pulumi.Output[Sequence[str]]:
"""
Host Group ids to attach to the prevention policy.
"""
@@ -3007,7 +3014,7 @@ def interpreter_only(self) -> pulumi.Output[bool]:
@property
@pulumi.getter(name="ioaRuleGroups")
- def ioa_rule_groups(self) -> pulumi.Output[Optional[Sequence[str]]]:
+ def ioa_rule_groups(self) -> pulumi.Output[Sequence[str]]:
"""
IOA Rule Group to attach to the prevention policy.
"""
diff --git a/sdk/python/crowdstrike_pulumi/provider.py b/sdk/python/crowdstrike_pulumi/provider.py
index 4871054..aa5fcb7 100644
--- a/sdk/python/crowdstrike_pulumi/provider.py
+++ b/sdk/python/crowdstrike_pulumi/provider.py
@@ -4,9 +4,14 @@
import copy
import warnings
+import sys
import pulumi
import pulumi.runtime
from typing import Any, Mapping, Optional, Sequence, Union, overload
+if sys.version_info >= (3, 11):
+ from typing import NotRequired, TypedDict, TypeAlias
+else:
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
from . import _utilities
__all__ = ['ProviderArgs', 'Provider']
diff --git a/sdk/python/crowdstrike_pulumi/sensor_update_policy.py b/sdk/python/crowdstrike_pulumi/sensor_update_policy.py
index 19894ed..ac09faf 100644
--- a/sdk/python/crowdstrike_pulumi/sensor_update_policy.py
+++ b/sdk/python/crowdstrike_pulumi/sensor_update_policy.py
@@ -4,9 +4,14 @@
import copy
import warnings
+import sys
import pulumi
import pulumi.runtime
from typing import Any, Mapping, Optional, Sequence, Union, overload
+if sys.version_info >= (3, 11):
+ from typing import NotRequired, TypedDict, TypeAlias
+else:
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
from . import _utilities
from . import outputs
from ._inputs import *
diff --git a/sdk/python/setup.py b/sdk/python/setup.py
index 397723f..777b258 100644
--- a/sdk/python/setup.py
+++ b/sdk/python/setup.py
@@ -39,6 +39,7 @@ def readme():
install_requires=[
'parver>=0.2.1',
'pulumi>=3.0.0,<4.0.0',
- 'semver>=2.8.1'
+ 'semver>=2.8.1',
+ 'typing-extensions>=4.11,<5; python_version < "3.11"'
],
zip_safe=False)