1. Packages
  2. Routeros Provider
  3. API Docs
  4. SystemScript
routeros 1.83.1 published on Monday, Apr 28, 2025 by terraform-routeros

routeros.SystemScript

Explore with Pulumi AI

routeros logo
routeros 1.83.1 published on Monday, Apr 28, 2025 by terraform-routeros

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as routeros from "@pulumi/routeros";
    
    const script = new routeros.SystemScript("script", {
        policies: [
            "read",
            "write",
            "test",
            "policy",
        ],
        source: `    :log info "This is a test script created by Terraform."
        
    `,
    });
    
    import pulumi
    import pulumi_routeros as routeros
    
    script = routeros.SystemScript("script",
        policies=[
            "read",
            "write",
            "test",
            "policy",
        ],
        source="""    :log info "This is a test script created by Terraform."
        
    """)
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-terraform-provider/sdks/go/routeros/routeros"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := routeros.NewSystemScript(ctx, "script", &routeros.SystemScriptArgs{
    			Policies: pulumi.StringArray{
    				pulumi.String("read"),
    				pulumi.String("write"),
    				pulumi.String("test"),
    				pulumi.String("policy"),
    			},
    			Source: pulumi.String("    :log info \"This is a test script created by Terraform.\"\n    \n"),
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Routeros = Pulumi.Routeros;
    
    return await Deployment.RunAsync(() => 
    {
        var script = new Routeros.SystemScript("script", new()
        {
            Policies = new[]
            {
                "read",
                "write",
                "test",
                "policy",
            },
            Source = @"    :log info ""This is a test script created by Terraform.""
        
    ",
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.routeros.SystemScript;
    import com.pulumi.routeros.SystemScriptArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var script = new SystemScript("script", SystemScriptArgs.builder()
                .policies(            
                    "read",
                    "write",
                    "test",
                    "policy")
                .source("""
        :log info "This is a test script created by Terraform."
        
                """)
                .build());
    
        }
    }
    
    resources:
      script:
        type: routeros:SystemScript
        properties:
          policies:
            - read
            - write
            - test
            - policy
          source: "    :log info \"This is a test script created by Terraform.\"\n    \n"
    

    Create SystemScript Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new SystemScript(name: string, args: SystemScriptArgs, opts?: CustomResourceOptions);
    @overload
    def SystemScript(resource_name: str,
                     args: SystemScriptArgs,
                     opts: Optional[ResourceOptions] = None)
    
    @overload
    def SystemScript(resource_name: str,
                     opts: Optional[ResourceOptions] = None,
                     source: Optional[str] = None,
                     ___id_: Optional[float] = None,
                     ___path_: Optional[str] = None,
                     ___skip_: Optional[str] = None,
                     comment: Optional[str] = None,
                     dont_require_permissions: Optional[bool] = None,
                     launch_trigger: Optional[str] = None,
                     name: Optional[str] = None,
                     policies: Optional[Sequence[str]] = None,
                     system_script_id: Optional[str] = None)
    func NewSystemScript(ctx *Context, name string, args SystemScriptArgs, opts ...ResourceOption) (*SystemScript, error)
    public SystemScript(string name, SystemScriptArgs args, CustomResourceOptions? opts = null)
    public SystemScript(String name, SystemScriptArgs args)
    public SystemScript(String name, SystemScriptArgs args, CustomResourceOptions options)
    
    type: routeros:SystemScript
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args SystemScriptArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args SystemScriptArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args SystemScriptArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args SystemScriptArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args SystemScriptArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    SystemScript Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The SystemScript resource accepts the following input properties:

    Source string
    Script source code.
    Comment string
    DontRequirePermissions bool
    Bypass permissions check when the script is being executed, useful when scripts are being executed from services that have limited permissions, such as Netwatch.
    LaunchTrigger string
    Changing the attribute value causes the script to run.
    Name string
    Name of the script.
    Policies List<string>
    List of applicable policies: * ftp - Policy that grants full rights to log in remotely via FTP, to read/write/erase files and to transfer files from/to the router. Should be used together with read/write policies. * password - Policy that grants rights to change the password. * policy - Policy that grants user management rights. Should be used together with the write policy. Allows also to see global variables created by other users (requires also 'test' policy). * read

    • Policy that grants read access to the router's configuration. All console commands that do not alter router's configuration are allowed. Doesn't affect FTP. * reboot - Policy that allows rebooting the router. * sensitive - Policy that grants rights to change "hide sensitive" option, if this policy is disabled sensitive information is not displayed.
    • sniff - Policy that grants rights to use packet sniffer tool. * test - Policy that grants rights to run ping, traceroute, bandwidth-test, wireless scan, snooper, and other test commands. * write - Policy that grants write access to the router's configuration, except for user management. This policy does not allow to read the configuration, so make sure to enable read policy as well. policy = ["ftp", "read", "write"]
    SystemScriptId string
    ___id_ double
    Resource ID type (.id / name). This is an internal service field, setting a value is not required.
    ___path_ string
    Resource path for CRUD operations. This is an internal service field, setting a value is not required.
    ___skip_ string
    A set of transformations for field names. This is an internal service field, setting a value is not required.
    Source string
    Script source code.
    Comment string
    DontRequirePermissions bool
    Bypass permissions check when the script is being executed, useful when scripts are being executed from services that have limited permissions, such as Netwatch.
    LaunchTrigger string
    Changing the attribute value causes the script to run.
    Name string
    Name of the script.
    Policies []string
    List of applicable policies: * ftp - Policy that grants full rights to log in remotely via FTP, to read/write/erase files and to transfer files from/to the router. Should be used together with read/write policies. * password - Policy that grants rights to change the password. * policy - Policy that grants user management rights. Should be used together with the write policy. Allows also to see global variables created by other users (requires also 'test' policy). * read

    • Policy that grants read access to the router's configuration. All console commands that do not alter router's configuration are allowed. Doesn't affect FTP. * reboot - Policy that allows rebooting the router. * sensitive - Policy that grants rights to change "hide sensitive" option, if this policy is disabled sensitive information is not displayed.
    • sniff - Policy that grants rights to use packet sniffer tool. * test - Policy that grants rights to run ping, traceroute, bandwidth-test, wireless scan, snooper, and other test commands. * write - Policy that grants write access to the router's configuration, except for user management. This policy does not allow to read the configuration, so make sure to enable read policy as well. policy = ["ftp", "read", "write"]
    SystemScriptId string
    ___id_ float64
    Resource ID type (.id / name). This is an internal service field, setting a value is not required.
    ___path_ string
    Resource path for CRUD operations. This is an internal service field, setting a value is not required.
    ___skip_ string
    A set of transformations for field names. This is an internal service field, setting a value is not required.
    source String
    Script source code.
    ___id_ Double
    Resource ID type (.id / name). This is an internal service field, setting a value is not required.
    ___path_ String
    Resource path for CRUD operations. This is an internal service field, setting a value is not required.
    ___skip_ String
    A set of transformations for field names. This is an internal service field, setting a value is not required.
    comment String
    dontRequirePermissions Boolean
    Bypass permissions check when the script is being executed, useful when scripts are being executed from services that have limited permissions, such as Netwatch.
    launchTrigger String
    Changing the attribute value causes the script to run.
    name String
    Name of the script.
    policies List<String>
    List of applicable policies: * ftp - Policy that grants full rights to log in remotely via FTP, to read/write/erase files and to transfer files from/to the router. Should be used together with read/write policies. * password - Policy that grants rights to change the password. * policy - Policy that grants user management rights. Should be used together with the write policy. Allows also to see global variables created by other users (requires also 'test' policy). * read

    • Policy that grants read access to the router's configuration. All console commands that do not alter router's configuration are allowed. Doesn't affect FTP. * reboot - Policy that allows rebooting the router. * sensitive - Policy that grants rights to change "hide sensitive" option, if this policy is disabled sensitive information is not displayed.
    • sniff - Policy that grants rights to use packet sniffer tool. * test - Policy that grants rights to run ping, traceroute, bandwidth-test, wireless scan, snooper, and other test commands. * write - Policy that grants write access to the router's configuration, except for user management. This policy does not allow to read the configuration, so make sure to enable read policy as well. policy = ["ftp", "read", "write"]
    systemScriptId String
    source string
    Script source code.
    ___id_ number
    Resource ID type (.id / name). This is an internal service field, setting a value is not required.
    ___path_ string
    Resource path for CRUD operations. This is an internal service field, setting a value is not required.
    ___skip_ string
    A set of transformations for field names. This is an internal service field, setting a value is not required.
    comment string
    dontRequirePermissions boolean
    Bypass permissions check when the script is being executed, useful when scripts are being executed from services that have limited permissions, such as Netwatch.
    launchTrigger string
    Changing the attribute value causes the script to run.
    name string
    Name of the script.
    policies string[]
    List of applicable policies: * ftp - Policy that grants full rights to log in remotely via FTP, to read/write/erase files and to transfer files from/to the router. Should be used together with read/write policies. * password - Policy that grants rights to change the password. * policy - Policy that grants user management rights. Should be used together with the write policy. Allows also to see global variables created by other users (requires also 'test' policy). * read

    • Policy that grants read access to the router's configuration. All console commands that do not alter router's configuration are allowed. Doesn't affect FTP. * reboot - Policy that allows rebooting the router. * sensitive - Policy that grants rights to change "hide sensitive" option, if this policy is disabled sensitive information is not displayed.
    • sniff - Policy that grants rights to use packet sniffer tool. * test - Policy that grants rights to run ping, traceroute, bandwidth-test, wireless scan, snooper, and other test commands. * write - Policy that grants write access to the router's configuration, except for user management. This policy does not allow to read the configuration, so make sure to enable read policy as well. policy = ["ftp", "read", "write"]
    systemScriptId string
    source str
    Script source code.
    ___id_ float
    Resource ID type (.id / name). This is an internal service field, setting a value is not required.
    ___path_ str
    Resource path for CRUD operations. This is an internal service field, setting a value is not required.
    ___skip_ str
    A set of transformations for field names. This is an internal service field, setting a value is not required.
    comment str
    dont_require_permissions bool
    Bypass permissions check when the script is being executed, useful when scripts are being executed from services that have limited permissions, such as Netwatch.
    launch_trigger str
    Changing the attribute value causes the script to run.
    name str
    Name of the script.
    policies Sequence[str]
    List of applicable policies: * ftp - Policy that grants full rights to log in remotely via FTP, to read/write/erase files and to transfer files from/to the router. Should be used together with read/write policies. * password - Policy that grants rights to change the password. * policy - Policy that grants user management rights. Should be used together with the write policy. Allows also to see global variables created by other users (requires also 'test' policy). * read

    • Policy that grants read access to the router's configuration. All console commands that do not alter router's configuration are allowed. Doesn't affect FTP. * reboot - Policy that allows rebooting the router. * sensitive - Policy that grants rights to change "hide sensitive" option, if this policy is disabled sensitive information is not displayed.
    • sniff - Policy that grants rights to use packet sniffer tool. * test - Policy that grants rights to run ping, traceroute, bandwidth-test, wireless scan, snooper, and other test commands. * write - Policy that grants write access to the router's configuration, except for user management. This policy does not allow to read the configuration, so make sure to enable read policy as well. policy = ["ftp", "read", "write"]
    system_script_id str
    source String
    Script source code.
    ___id_ Number
    Resource ID type (.id / name). This is an internal service field, setting a value is not required.
    ___path_ String
    Resource path for CRUD operations. This is an internal service field, setting a value is not required.
    ___skip_ String
    A set of transformations for field names. This is an internal service field, setting a value is not required.
    comment String
    dontRequirePermissions Boolean
    Bypass permissions check when the script is being executed, useful when scripts are being executed from services that have limited permissions, such as Netwatch.
    launchTrigger String
    Changing the attribute value causes the script to run.
    name String
    Name of the script.
    policies List<String>
    List of applicable policies: * ftp - Policy that grants full rights to log in remotely via FTP, to read/write/erase files and to transfer files from/to the router. Should be used together with read/write policies. * password - Policy that grants rights to change the password. * policy - Policy that grants user management rights. Should be used together with the write policy. Allows also to see global variables created by other users (requires also 'test' policy). * read

    • Policy that grants read access to the router's configuration. All console commands that do not alter router's configuration are allowed. Doesn't affect FTP. * reboot - Policy that allows rebooting the router. * sensitive - Policy that grants rights to change "hide sensitive" option, if this policy is disabled sensitive information is not displayed.
    • sniff - Policy that grants rights to use packet sniffer tool. * test - Policy that grants rights to run ping, traceroute, bandwidth-test, wireless scan, snooper, and other test commands. * write - Policy that grants write access to the router's configuration, except for user management. This policy does not allow to read the configuration, so make sure to enable read policy as well. policy = ["ftp", "read", "write"]
    systemScriptId String

    Outputs

    All input properties are implicitly available as output properties. Additionally, the SystemScript resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Invalid bool
    LastStarted string
    Date and time when the script was last invoked.
    Owner string
    RunCount string
    This counter is incremented each time the script is executed.
    Id string
    The provider-assigned unique ID for this managed resource.
    Invalid bool
    LastStarted string
    Date and time when the script was last invoked.
    Owner string
    RunCount string
    This counter is incremented each time the script is executed.
    id String
    The provider-assigned unique ID for this managed resource.
    invalid Boolean
    lastStarted String
    Date and time when the script was last invoked.
    owner String
    runCount String
    This counter is incremented each time the script is executed.
    id string
    The provider-assigned unique ID for this managed resource.
    invalid boolean
    lastStarted string
    Date and time when the script was last invoked.
    owner string
    runCount string
    This counter is incremented each time the script is executed.
    id str
    The provider-assigned unique ID for this managed resource.
    invalid bool
    last_started str
    Date and time when the script was last invoked.
    owner str
    run_count str
    This counter is incremented each time the script is executed.
    id String
    The provider-assigned unique ID for this managed resource.
    invalid Boolean
    lastStarted String
    Date and time when the script was last invoked.
    owner String
    runCount String
    This counter is incremented each time the script is executed.

    Look up Existing SystemScript Resource

    Get an existing SystemScript resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: SystemScriptState, opts?: CustomResourceOptions): SystemScript
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            ___id_: Optional[float] = None,
            ___path_: Optional[str] = None,
            ___skip_: Optional[str] = None,
            comment: Optional[str] = None,
            dont_require_permissions: Optional[bool] = None,
            invalid: Optional[bool] = None,
            last_started: Optional[str] = None,
            launch_trigger: Optional[str] = None,
            name: Optional[str] = None,
            owner: Optional[str] = None,
            policies: Optional[Sequence[str]] = None,
            run_count: Optional[str] = None,
            source: Optional[str] = None,
            system_script_id: Optional[str] = None) -> SystemScript
    func GetSystemScript(ctx *Context, name string, id IDInput, state *SystemScriptState, opts ...ResourceOption) (*SystemScript, error)
    public static SystemScript Get(string name, Input<string> id, SystemScriptState? state, CustomResourceOptions? opts = null)
    public static SystemScript get(String name, Output<String> id, SystemScriptState state, CustomResourceOptions options)
    resources:  _:    type: routeros:SystemScript    get:      id: ${id}
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    Comment string
    DontRequirePermissions bool
    Bypass permissions check when the script is being executed, useful when scripts are being executed from services that have limited permissions, such as Netwatch.
    Invalid bool
    LastStarted string
    Date and time when the script was last invoked.
    LaunchTrigger string
    Changing the attribute value causes the script to run.
    Name string
    Name of the script.
    Owner string
    Policies List<string>
    List of applicable policies: * ftp - Policy that grants full rights to log in remotely via FTP, to read/write/erase files and to transfer files from/to the router. Should be used together with read/write policies. * password - Policy that grants rights to change the password. * policy - Policy that grants user management rights. Should be used together with the write policy. Allows also to see global variables created by other users (requires also 'test' policy). * read

    • Policy that grants read access to the router's configuration. All console commands that do not alter router's configuration are allowed. Doesn't affect FTP. * reboot - Policy that allows rebooting the router. * sensitive - Policy that grants rights to change "hide sensitive" option, if this policy is disabled sensitive information is not displayed.
    • sniff - Policy that grants rights to use packet sniffer tool. * test - Policy that grants rights to run ping, traceroute, bandwidth-test, wireless scan, snooper, and other test commands. * write - Policy that grants write access to the router's configuration, except for user management. This policy does not allow to read the configuration, so make sure to enable read policy as well. policy = ["ftp", "read", "write"]
    RunCount string
    This counter is incremented each time the script is executed.
    Source string
    Script source code.
    SystemScriptId string
    ___id_ double
    Resource ID type (.id / name). This is an internal service field, setting a value is not required.
    ___path_ string
    Resource path for CRUD operations. This is an internal service field, setting a value is not required.
    ___skip_ string
    A set of transformations for field names. This is an internal service field, setting a value is not required.
    Comment string
    DontRequirePermissions bool
    Bypass permissions check when the script is being executed, useful when scripts are being executed from services that have limited permissions, such as Netwatch.
    Invalid bool
    LastStarted string
    Date and time when the script was last invoked.
    LaunchTrigger string
    Changing the attribute value causes the script to run.
    Name string
    Name of the script.
    Owner string
    Policies []string
    List of applicable policies: * ftp - Policy that grants full rights to log in remotely via FTP, to read/write/erase files and to transfer files from/to the router. Should be used together with read/write policies. * password - Policy that grants rights to change the password. * policy - Policy that grants user management rights. Should be used together with the write policy. Allows also to see global variables created by other users (requires also 'test' policy). * read

    • Policy that grants read access to the router's configuration. All console commands that do not alter router's configuration are allowed. Doesn't affect FTP. * reboot - Policy that allows rebooting the router. * sensitive - Policy that grants rights to change "hide sensitive" option, if this policy is disabled sensitive information is not displayed.
    • sniff - Policy that grants rights to use packet sniffer tool. * test - Policy that grants rights to run ping, traceroute, bandwidth-test, wireless scan, snooper, and other test commands. * write - Policy that grants write access to the router's configuration, except for user management. This policy does not allow to read the configuration, so make sure to enable read policy as well. policy = ["ftp", "read", "write"]
    RunCount string
    This counter is incremented each time the script is executed.
    Source string
    Script source code.
    SystemScriptId string
    ___id_ float64
    Resource ID type (.id / name). This is an internal service field, setting a value is not required.
    ___path_ string
    Resource path for CRUD operations. This is an internal service field, setting a value is not required.
    ___skip_ string
    A set of transformations for field names. This is an internal service field, setting a value is not required.
    ___id_ Double
    Resource ID type (.id / name). This is an internal service field, setting a value is not required.
    ___path_ String
    Resource path for CRUD operations. This is an internal service field, setting a value is not required.
    ___skip_ String
    A set of transformations for field names. This is an internal service field, setting a value is not required.
    comment String
    dontRequirePermissions Boolean
    Bypass permissions check when the script is being executed, useful when scripts are being executed from services that have limited permissions, such as Netwatch.
    invalid Boolean
    lastStarted String
    Date and time when the script was last invoked.
    launchTrigger String
    Changing the attribute value causes the script to run.
    name String
    Name of the script.
    owner String
    policies List<String>
    List of applicable policies: * ftp - Policy that grants full rights to log in remotely via FTP, to read/write/erase files and to transfer files from/to the router. Should be used together with read/write policies. * password - Policy that grants rights to change the password. * policy - Policy that grants user management rights. Should be used together with the write policy. Allows also to see global variables created by other users (requires also 'test' policy). * read

    • Policy that grants read access to the router's configuration. All console commands that do not alter router's configuration are allowed. Doesn't affect FTP. * reboot - Policy that allows rebooting the router. * sensitive - Policy that grants rights to change "hide sensitive" option, if this policy is disabled sensitive information is not displayed.
    • sniff - Policy that grants rights to use packet sniffer tool. * test - Policy that grants rights to run ping, traceroute, bandwidth-test, wireless scan, snooper, and other test commands. * write - Policy that grants write access to the router's configuration, except for user management. This policy does not allow to read the configuration, so make sure to enable read policy as well. policy = ["ftp", "read", "write"]
    runCount String
    This counter is incremented each time the script is executed.
    source String
    Script source code.
    systemScriptId String
    ___id_ number
    Resource ID type (.id / name). This is an internal service field, setting a value is not required.
    ___path_ string
    Resource path for CRUD operations. This is an internal service field, setting a value is not required.
    ___skip_ string
    A set of transformations for field names. This is an internal service field, setting a value is not required.
    comment string
    dontRequirePermissions boolean
    Bypass permissions check when the script is being executed, useful when scripts are being executed from services that have limited permissions, such as Netwatch.
    invalid boolean
    lastStarted string
    Date and time when the script was last invoked.
    launchTrigger string
    Changing the attribute value causes the script to run.
    name string
    Name of the script.
    owner string
    policies string[]
    List of applicable policies: * ftp - Policy that grants full rights to log in remotely via FTP, to read/write/erase files and to transfer files from/to the router. Should be used together with read/write policies. * password - Policy that grants rights to change the password. * policy - Policy that grants user management rights. Should be used together with the write policy. Allows also to see global variables created by other users (requires also 'test' policy). * read

    • Policy that grants read access to the router's configuration. All console commands that do not alter router's configuration are allowed. Doesn't affect FTP. * reboot - Policy that allows rebooting the router. * sensitive - Policy that grants rights to change "hide sensitive" option, if this policy is disabled sensitive information is not displayed.
    • sniff - Policy that grants rights to use packet sniffer tool. * test - Policy that grants rights to run ping, traceroute, bandwidth-test, wireless scan, snooper, and other test commands. * write - Policy that grants write access to the router's configuration, except for user management. This policy does not allow to read the configuration, so make sure to enable read policy as well. policy = ["ftp", "read", "write"]
    runCount string
    This counter is incremented each time the script is executed.
    source string
    Script source code.
    systemScriptId string
    ___id_ float
    Resource ID type (.id / name). This is an internal service field, setting a value is not required.
    ___path_ str
    Resource path for CRUD operations. This is an internal service field, setting a value is not required.
    ___skip_ str
    A set of transformations for field names. This is an internal service field, setting a value is not required.
    comment str
    dont_require_permissions bool
    Bypass permissions check when the script is being executed, useful when scripts are being executed from services that have limited permissions, such as Netwatch.
    invalid bool
    last_started str
    Date and time when the script was last invoked.
    launch_trigger str
    Changing the attribute value causes the script to run.
    name str
    Name of the script.
    owner str
    policies Sequence[str]
    List of applicable policies: * ftp - Policy that grants full rights to log in remotely via FTP, to read/write/erase files and to transfer files from/to the router. Should be used together with read/write policies. * password - Policy that grants rights to change the password. * policy - Policy that grants user management rights. Should be used together with the write policy. Allows also to see global variables created by other users (requires also 'test' policy). * read

    • Policy that grants read access to the router's configuration. All console commands that do not alter router's configuration are allowed. Doesn't affect FTP. * reboot - Policy that allows rebooting the router. * sensitive - Policy that grants rights to change "hide sensitive" option, if this policy is disabled sensitive information is not displayed.
    • sniff - Policy that grants rights to use packet sniffer tool. * test - Policy that grants rights to run ping, traceroute, bandwidth-test, wireless scan, snooper, and other test commands. * write - Policy that grants write access to the router's configuration, except for user management. This policy does not allow to read the configuration, so make sure to enable read policy as well. policy = ["ftp", "read", "write"]
    run_count str
    This counter is incremented each time the script is executed.
    source str
    Script source code.
    system_script_id str
    ___id_ Number
    Resource ID type (.id / name). This is an internal service field, setting a value is not required.
    ___path_ String
    Resource path for CRUD operations. This is an internal service field, setting a value is not required.
    ___skip_ String
    A set of transformations for field names. This is an internal service field, setting a value is not required.
    comment String
    dontRequirePermissions Boolean
    Bypass permissions check when the script is being executed, useful when scripts are being executed from services that have limited permissions, such as Netwatch.
    invalid Boolean
    lastStarted String
    Date and time when the script was last invoked.
    launchTrigger String
    Changing the attribute value causes the script to run.
    name String
    Name of the script.
    owner String
    policies List<String>
    List of applicable policies: * ftp - Policy that grants full rights to log in remotely via FTP, to read/write/erase files and to transfer files from/to the router. Should be used together with read/write policies. * password - Policy that grants rights to change the password. * policy - Policy that grants user management rights. Should be used together with the write policy. Allows also to see global variables created by other users (requires also 'test' policy). * read

    • Policy that grants read access to the router's configuration. All console commands that do not alter router's configuration are allowed. Doesn't affect FTP. * reboot - Policy that allows rebooting the router. * sensitive - Policy that grants rights to change "hide sensitive" option, if this policy is disabled sensitive information is not displayed.
    • sniff - Policy that grants rights to use packet sniffer tool. * test - Policy that grants rights to run ping, traceroute, bandwidth-test, wireless scan, snooper, and other test commands. * write - Policy that grants write access to the router's configuration, except for user management. This policy does not allow to read the configuration, so make sure to enable read policy as well. policy = ["ftp", "read", "write"]
    runCount String
    This counter is incremented each time the script is executed.
    source String
    Script source code.
    systemScriptId String

    Import

    #The ID can be found via API or the terminal

    #The command for the terminal is -> :put [/system/script get [print show-ids]]

    $ pulumi import routeros:index/systemScript:SystemScript script "*0"
    

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    routeros terraform-routeros/terraform-provider-routeros
    License
    Notes
    This Pulumi package is based on the routeros Terraform Provider.
    routeros logo
    routeros 1.83.1 published on Monday, Apr 28, 2025 by terraform-routeros