Device Settings Policy Args
Provides a Cloudflare Device Settings Policy resource. Device policies configure settings applied to WARP devices.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as cloudflare from "@pulumi/cloudflare";
const developerWarpPolicy = new cloudflare.DeviceSettingsPolicy("developer_warp_policy", {
accountId: "f037e56e89293a057740de681ac9abbe",
name: "Developers WARP settings policy",
description: "Developers WARP settings policy description",
precedence: 10,
match: "any(identity.groups.name[*] in {\"Developers\"})",
"default": false,
enabled: true,
allowModeSwitch: true,
allowUpdates: true,
allowedToLeave: true,
autoConnect: 0,
captivePortal: 5,
disableAutoFallback: true,
supportUrl: "https://cloudflare.com",
switchLocked: true,
serviceModeV2Mode: "warp",
serviceModeV2Port: 3000,
excludeOfficeIps: false,
tunnelProtocol: "wireguard",
});
import pulumi
import pulumi_cloudflare as cloudflare
developer_warp_policy = cloudflare.DeviceSettingsPolicy("developer_warp_policy",
account_id="f037e56e89293a057740de681ac9abbe",
name="Developers WARP settings policy",
description="Developers WARP settings policy description",
precedence=10,
match="any(identity.groups.name[*] in {\"Developers\"})",
default=False,
enabled=True,
allow_mode_switch=True,
allow_updates=True,
allowed_to_leave=True,
auto_connect=0,
captive_portal=5,
disable_auto_fallback=True,
support_url="https://cloudflare.com",
switch_locked=True,
service_mode_v2_mode="warp",
service_mode_v2_port=3000,
exclude_office_ips=False,
tunnel_protocol="wireguard")
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Cloudflare = Pulumi.Cloudflare;
return await Deployment.RunAsync(() =>
{
var developerWarpPolicy = new Cloudflare.DeviceSettingsPolicy("developer_warp_policy", new()
{
AccountId = "f037e56e89293a057740de681ac9abbe",
Name = "Developers WARP settings policy",
Description = "Developers WARP settings policy description",
Precedence = 10,
Match = "any(identity.groups.name[*] in {\"Developers\"})",
Default = false,
Enabled = true,
AllowModeSwitch = true,
AllowUpdates = true,
AllowedToLeave = true,
AutoConnect = 0,
CaptivePortal = 5,
DisableAutoFallback = true,
SupportUrl = "https://cloudflare.com",
SwitchLocked = true,
ServiceModeV2Mode = "warp",
ServiceModeV2Port = 3000,
ExcludeOfficeIps = false,
TunnelProtocol = "wireguard",
});
});
package main
import (
"github.com/pulumi/pulumi-cloudflare/sdk/v5/go/cloudflare"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := cloudflare.NewDeviceSettingsPolicy(ctx, "developer_warp_policy", &cloudflare.DeviceSettingsPolicyArgs{
AccountId: pulumi.String("f037e56e89293a057740de681ac9abbe"),
Name: pulumi.String("Developers WARP settings policy"),
Description: pulumi.String("Developers WARP settings policy description"),
Precedence: pulumi.Int(10),
Match: pulumi.String("any(identity.groups.name[*] in {\"Developers\"})"),
Default: pulumi.Bool(false),
Enabled: pulumi.Bool(true),
AllowModeSwitch: pulumi.Bool(true),
AllowUpdates: pulumi.Bool(true),
AllowedToLeave: pulumi.Bool(true),
AutoConnect: pulumi.Int(0),
CaptivePortal: pulumi.Int(5),
DisableAutoFallback: pulumi.Bool(true),
SupportUrl: pulumi.String("https://cloudflare.com"),
SwitchLocked: pulumi.Bool(true),
ServiceModeV2Mode: pulumi.String("warp"),
ServiceModeV2Port: pulumi.Int(3000),
ExcludeOfficeIps: pulumi.Bool(false),
TunnelProtocol: pulumi.String("wireguard"),
})
if err != nil {
return err
}
return nil
})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.cloudflare.DeviceSettingsPolicy;
import com.pulumi.cloudflare.DeviceSettingsPolicyArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var developerWarpPolicy = new DeviceSettingsPolicy("developerWarpPolicy", DeviceSettingsPolicyArgs.builder()
.accountId("f037e56e89293a057740de681ac9abbe")
.name("Developers WARP settings policy")
.description("Developers WARP settings policy description")
.precedence(10)
.match("any(identity.groups.name[*] in {\"Developers\"})")
.default_(false)
.enabled(true)
.allowModeSwitch(true)
.allowUpdates(true)
.allowedToLeave(true)
.autoConnect(0)
.captivePortal(5)
.disableAutoFallback(true)
.supportUrl("https://cloudflare.com")
.switchLocked(true)
.serviceModeV2Mode("warp")
.serviceModeV2Port(3000)
.excludeOfficeIps(false)
.tunnelProtocol("wireguard")
.build());
}
}
resources:
developerWarpPolicy:
type: cloudflare:DeviceSettingsPolicy
name: developer_warp_policy
properties:
accountId: f037e56e89293a057740de681ac9abbe
name: Developers WARP settings policy
description: Developers WARP settings policy description
precedence: 10
match: any(identity.groups.name[*] in {"Developers"})
default: false
enabled: true
allowModeSwitch: true
allowUpdates: true
allowedToLeave: true
autoConnect: 0
captivePortal: 5
disableAutoFallback: true
supportUrl: https://cloudflare.com
switchLocked: true
serviceModeV2Mode: warp
serviceModeV2Port: 3000
excludeOfficeIps: false
tunnelProtocol: wireguard
Import
For default device settings policies you must use "default" as the policy ID.
$ pulumi import cloudflare:index/deviceSettingsPolicy:DeviceSettingsPolicy example <account_id>/<device_policy_id>
Constructors
Properties
Whether to allow devices to leave the organization. Defaults to true
.
Whether to allow mode switch for this policy.
Whether to allow updates under this policy.
The amount of time in seconds to reconnect after having been disabled.
The captive portal value for this policy. Defaults to 180
.
Description of Policy.
Whether to disable auto fallback for this policy.
Whether to add Microsoft IPs to split tunnel exclusions.
The precedence of the policy. Lower values indicate higher precedence.
The service mode. Available values: 1dot1
, warp
, proxy
, posture_only
, warp_tunnel_only
. Defaults to warp
.
The port to use for the proxy service mode. Required when using service_mode_v2_mode
.
The support URL that will be opened when sending feedback.
Enablement of the ZT client switch lock.
Determines which tunnel protocol to use. Available values: ""
, wireguard
, masque
. Defaults to wireguard
.