@drunk-pulumi/azure-components 0.0.6
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/PulumiPlugin.yaml +1 -0
- package/README.md +1 -0
- package/ResourceBuilder.d.ts +54 -0
- package/ResourceBuilder.js +71 -0
- package/aks/AzKubernetes.d.ts +55 -0
- package/aks/AzKubernetes.js +288 -0
- package/aks/ContainerRegistry.d.ts +19 -0
- package/aks/ContainerRegistry.js +119 -0
- package/aks/helpers.d.ts +6 -0
- package/aks/helpers.js +52 -0
- package/aks/index.d.ts +3 -0
- package/aks/index.js +43 -0
- package/app/AppCert.d.ts +15 -0
- package/app/AppCert.js +74 -0
- package/app/AppConfig.d.ts +18 -0
- package/app/AppConfig.js +124 -0
- package/app/AppService.d.ts +69 -0
- package/app/AppService.js +122 -0
- package/app/IoTHub.d.ts +15 -0
- package/app/IoTHub.js +80 -0
- package/app/LogicApp.d.ts +19 -0
- package/app/LogicApp.js +77 -0
- package/app/SignalR.d.ts +45 -0
- package/app/SignalR.js +125 -0
- package/app/index.d.ts +6 -0
- package/app/index.js +23 -0
- package/azAd/AppRegistration.d.ts +52 -0
- package/azAd/AppRegistration.js +165 -0
- package/azAd/AzRole.d.ts +14 -0
- package/azAd/AzRole.js +72 -0
- package/azAd/CustomRoles.d.ts +10 -0
- package/azAd/CustomRoles.js +73 -0
- package/azAd/GroupRole.d.ts +29 -0
- package/azAd/GroupRole.js +107 -0
- package/azAd/RoleAssignment.d.ts +15 -0
- package/azAd/RoleAssignment.js +63 -0
- package/azAd/UserAssignedIdentity.d.ts +17 -0
- package/azAd/UserAssignedIdentity.js +76 -0
- package/azAd/helpers/graphBuiltIn.d.ts +14 -0
- package/azAd/helpers/graphBuiltIn.js +5134 -0
- package/azAd/helpers/index.d.ts +3 -0
- package/azAd/helpers/index.js +39 -0
- package/azAd/helpers/rolesBuiltIn.d.ts +90 -0
- package/azAd/helpers/rolesBuiltIn.js +18601 -0
- package/azAd/helpers/rsRoleDefinition.d.ts +62 -0
- package/azAd/helpers/rsRoleDefinition.js +120 -0
- package/azAd/index.d.ts +7 -0
- package/azAd/index.js +24 -0
- package/base/BaseComponent.d.ts +53 -0
- package/base/BaseComponent.js +98 -0
- package/base/BaseResourceComponent.d.ts +108 -0
- package/base/BaseResourceComponent.js +180 -0
- package/base/helpers.d.ts +12 -0
- package/base/helpers.js +29 -0
- package/base/index.d.ts +3 -0
- package/base/index.js +43 -0
- package/common/PGPGenerator.d.ts +26 -0
- package/common/PGPGenerator.js +72 -0
- package/common/RandomPassword.d.ts +21 -0
- package/common/RandomPassword.js +84 -0
- package/common/RandomString.d.ts +20 -0
- package/common/RandomString.js +74 -0
- package/common/ResourceLocker.d.ts +9 -0
- package/common/ResourceLocker.js +52 -0
- package/common/RsGroup.d.ts +20 -0
- package/common/RsGroup.js +85 -0
- package/common/SshGenerator.d.ts +17 -0
- package/common/SshGenerator.js +66 -0
- package/common/index.d.ts +5 -0
- package/common/index.js +22 -0
- package/database/AzSql.d.ts +71 -0
- package/database/AzSql.js +283 -0
- package/database/MySql.d.ts +35 -0
- package/database/MySql.js +181 -0
- package/database/Postgres.d.ts +32 -0
- package/database/Postgres.js +171 -0
- package/database/Redis.d.ts +26 -0
- package/database/Redis.js +125 -0
- package/database/helpers.d.ts +7 -0
- package/database/helpers.js +52 -0
- package/database/index.d.ts +5 -0
- package/database/index.js +45 -0
- package/helpers/Location/LocationBuiltIn.d.ts +6 -0
- package/helpers/Location/LocationBuiltIn.js +493 -0
- package/helpers/Location/index.d.ts +3 -0
- package/helpers/Location/index.js +25 -0
- package/helpers/autoTags.d.ts +1 -0
- package/helpers/autoTags.js +27 -0
- package/helpers/azureEnv.d.ts +21 -0
- package/helpers/azureEnv.js +102 -0
- package/helpers/configHelper.d.ts +5 -0
- package/helpers/configHelper.js +54 -0
- package/helpers/index.d.ts +4 -0
- package/helpers/index.js +41 -0
- package/helpers/rsHelpers.d.ts +18 -0
- package/helpers/rsHelpers.js +92 -0
- package/helpers/stackEnv.d.ts +4 -0
- package/helpers/stackEnv.js +54 -0
- package/index.d.ts +14 -0
- package/index.js +53 -0
- package/logs/Logs.d.ts +48 -0
- package/logs/Logs.js +154 -0
- package/logs/helpers.d.ts +1 -0
- package/logs/helpers.js +38 -0
- package/logs/index.d.ts +1 -0
- package/logs/index.js +18 -0
- package/package.json +34 -0
- package/services/Automation.d.ts +16 -0
- package/services/Automation.js +85 -0
- package/services/AzSearch.d.ts +20 -0
- package/services/AzSearch.js +113 -0
- package/services/ServiceBus.d.ts +42 -0
- package/services/ServiceBus.js +256 -0
- package/services/index.d.ts +3 -0
- package/services/index.js +20 -0
- package/storage/StorageAccount.d.ts +53 -0
- package/storage/StorageAccount.js +261 -0
- package/storage/helpers.d.ts +24 -0
- package/storage/helpers.js +89 -0
- package/storage/index.d.ts +2 -0
- package/storage/index.js +42 -0
- package/types.d.ts +125 -0
- package/types.js +3 -0
- package/vault/EncryptionKey.d.ts +21 -0
- package/vault/EncryptionKey.js +73 -0
- package/vault/KeyVault.d.ts +31 -0
- package/vault/KeyVault.js +110 -0
- package/vault/VaultSecret.d.ts +23 -0
- package/vault/VaultSecret.js +72 -0
- package/vault/VaultSecrets.d.ts +25 -0
- package/vault/VaultSecrets.js +31 -0
- package/vault/helpers.d.ts +1 -0
- package/vault/helpers.js +13 -0
- package/vault/index.d.ts +5 -0
- package/vault/index.js +45 -0
- package/vm/DiskEncryptionSet.d.ts +16 -0
- package/vm/DiskEncryptionSet.js +74 -0
- package/vm/VirtualMachine.d.ts +45 -0
- package/vm/VirtualMachine.js +192 -0
- package/vm/helpers.d.ts +16 -0
- package/vm/helpers.js +15 -0
- package/vm/index.d.ts +3 -0
- package/vm/index.js +43 -0
- package/vnet/AzCdn.d.ts +44 -0
- package/vnet/AzCdn.js +276 -0
- package/vnet/Basion.d.ts +19 -0
- package/vnet/Basion.js +78 -0
- package/vnet/DnsZone.d.ts +36 -0
- package/vnet/DnsZone.js +113 -0
- package/vnet/Firewall.d.ts +53 -0
- package/vnet/Firewall.js +136 -0
- package/vnet/FirewallPolicies/FirewallPolicyBuilder.d.ts +18 -0
- package/vnet/FirewallPolicies/FirewallPolicyBuilder.js +91 -0
- package/vnet/FirewallPolicies/commonPolicies.d.ts +10 -0
- package/vnet/FirewallPolicies/commonPolicies.js +55 -0
- package/vnet/FirewallPolicies/index.d.ts +0 -0
- package/vnet/FirewallPolicies/index.js +2 -0
- package/vnet/IpAddresses.d.ts +36 -0
- package/vnet/IpAddresses.js +74 -0
- package/vnet/NetworkPeering.d.ts +21 -0
- package/vnet/NetworkPeering.js +85 -0
- package/vnet/PrivateDnsZone.d.ts +38 -0
- package/vnet/PrivateDnsZone.js +111 -0
- package/vnet/PrivateEndpoint.d.ts +43 -0
- package/vnet/PrivateEndpoint.js +181 -0
- package/vnet/RouteTable.d.ts +22 -0
- package/vnet/RouteTable.js +75 -0
- package/vnet/VirtualNetwork.d.ts +99 -0
- package/vnet/VirtualNetwork.js +311 -0
- package/vnet/VpnGateway.d.ts +18 -0
- package/vnet/VpnGateway.js +90 -0
- package/vnet/helpers.d.ts +16 -0
- package/vnet/helpers.js +47 -0
- package/vnet/index.d.ts +13 -0
- package/vnet/index.js +53 -0
- package/vnet/securityRules/SecurityRuleBuilder.d.ts +12 -0
- package/vnet/securityRules/SecurityRuleBuilder.js +55 -0
- package/vnet/securityRules/commonRules.d.ts +9 -0
- package/vnet/securityRules/commonRules.js +94 -0
- package/vnet/securityRules/index.d.ts +2 -0
- package/vnet/securityRules/index.js +19 -0
|
@@ -0,0 +1,256 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
+
if (k2 === undefined) k2 = k;
|
|
4
|
+
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
+
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
+
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
+
}
|
|
8
|
+
Object.defineProperty(o, k2, desc);
|
|
9
|
+
}) : (function(o, m, k, k2) {
|
|
10
|
+
if (k2 === undefined) k2 = k;
|
|
11
|
+
o[k2] = m[k];
|
|
12
|
+
}));
|
|
13
|
+
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
|
|
14
|
+
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
|
15
|
+
}) : function(o, v) {
|
|
16
|
+
o["default"] = v;
|
|
17
|
+
});
|
|
18
|
+
var __importStar = (this && this.__importStar) || (function () {
|
|
19
|
+
var ownKeys = function(o) {
|
|
20
|
+
ownKeys = Object.getOwnPropertyNames || function (o) {
|
|
21
|
+
var ar = [];
|
|
22
|
+
for (var k in o) if (Object.prototype.hasOwnProperty.call(o, k)) ar[ar.length] = k;
|
|
23
|
+
return ar;
|
|
24
|
+
};
|
|
25
|
+
return ownKeys(o);
|
|
26
|
+
};
|
|
27
|
+
return function (mod) {
|
|
28
|
+
if (mod && mod.__esModule) return mod;
|
|
29
|
+
var result = {};
|
|
30
|
+
if (mod != null) for (var k = ownKeys(mod), i = 0; i < k.length; i++) if (k[i] !== "default") __createBinding(result, mod, k[i]);
|
|
31
|
+
__setModuleDefault(result, mod);
|
|
32
|
+
return result;
|
|
33
|
+
};
|
|
34
|
+
})();
|
|
35
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
36
|
+
exports.ServiceBus = void 0;
|
|
37
|
+
const bus = __importStar(require("@pulumi/azure-native/servicebus"));
|
|
38
|
+
const pulumi = __importStar(require("@pulumi/pulumi"));
|
|
39
|
+
const base_1 = require("../base");
|
|
40
|
+
const helpers_1 = require("../helpers");
|
|
41
|
+
const vault = __importStar(require("../vault"));
|
|
42
|
+
const PrivateEndpoint_1 = require("../vnet/PrivateEndpoint");
|
|
43
|
+
const defaultQueueOptions = {
|
|
44
|
+
//duplicateDetectionHistoryTimeWindow: 'P10M',
|
|
45
|
+
//maxMessageSizeInKilobytes: 1024,
|
|
46
|
+
//autoDeleteOnIdle: isPrd ? 'P180D' : 'P90D',
|
|
47
|
+
maxDeliveryCount: 10,
|
|
48
|
+
enableBatchedOperations: true,
|
|
49
|
+
enablePartitioning: false,
|
|
50
|
+
maxSizeInMegabytes: helpers_1.azureEnv.isPrd ? 10 * 1024 : 1024,
|
|
51
|
+
//Default is 'PT1M' (1 minute) and max is 5 minutes.
|
|
52
|
+
lockDuration: 'PT1M',
|
|
53
|
+
defaultMessageTimeToLive: helpers_1.azureEnv.isPrd ? 'P90D' : 'P5D',
|
|
54
|
+
deadLetteringOnMessageExpiration: true,
|
|
55
|
+
};
|
|
56
|
+
const defaultTopicOptions = {
|
|
57
|
+
//duplicateDetectionHistoryTimeWindow: 'P10M',
|
|
58
|
+
//maxMessageSizeInKilobytes: 1024,
|
|
59
|
+
//autoDeleteOnIdle: isPrd ? 'P180D' : 'P90D',
|
|
60
|
+
defaultMessageTimeToLive: helpers_1.azureEnv.isPrd ? 'P30D' : 'P5D',
|
|
61
|
+
enablePartitioning: false,
|
|
62
|
+
maxSizeInMegabytes: helpers_1.azureEnv.isPrd ? 10 * 1024 : 1024,
|
|
63
|
+
enableBatchedOperations: true,
|
|
64
|
+
};
|
|
65
|
+
const defaultSubOptions = {
|
|
66
|
+
duplicateDetectionHistoryTimeWindow: 'P10M',
|
|
67
|
+
//autoDeleteOnIdle: isPrd ? 'P180D' : 'P90D',
|
|
68
|
+
defaultMessageTimeToLive: helpers_1.azureEnv.isPrd ? 'P90D' : 'P5D',
|
|
69
|
+
enableBatchedOperations: true,
|
|
70
|
+
deadLetteringOnMessageExpiration: true,
|
|
71
|
+
lockDuration: 'PT1M',
|
|
72
|
+
maxDeliveryCount: 10,
|
|
73
|
+
};
|
|
74
|
+
class ServiceBus extends base_1.BaseResourceComponent {
|
|
75
|
+
id;
|
|
76
|
+
resourceName;
|
|
77
|
+
constructor(name, args, opts) {
|
|
78
|
+
super('ServiceBus', name, args, opts);
|
|
79
|
+
const service = this.createBusNamespace();
|
|
80
|
+
this.createNetwork(service);
|
|
81
|
+
this.createConnectionStrings(service);
|
|
82
|
+
this.createQueues(service);
|
|
83
|
+
this.createTopics(service);
|
|
84
|
+
this.id = service.id;
|
|
85
|
+
this.resourceName = service.name;
|
|
86
|
+
this.registerOutputs();
|
|
87
|
+
}
|
|
88
|
+
getOutputs() {
|
|
89
|
+
return {
|
|
90
|
+
id: this.id,
|
|
91
|
+
resourceName: this.resourceName,
|
|
92
|
+
};
|
|
93
|
+
}
|
|
94
|
+
createBusNamespace() {
|
|
95
|
+
const { rsGroup, defaultUAssignedId, vaultInfo, enableEncryption, network, ...props } = this.args;
|
|
96
|
+
const encryptionKey = enableEncryption ? this.getEncryptionKey() : undefined;
|
|
97
|
+
const service = new bus.Namespace(this.name, {
|
|
98
|
+
...props,
|
|
99
|
+
...rsGroup,
|
|
100
|
+
minimumTlsVersion: '1.2',
|
|
101
|
+
identity: {
|
|
102
|
+
type: defaultUAssignedId
|
|
103
|
+
? bus.ManagedServiceIdentityType.SystemAssigned_UserAssigned
|
|
104
|
+
: bus.ManagedServiceIdentityType.SystemAssigned,
|
|
105
|
+
//all uuid must assign here before use
|
|
106
|
+
userAssignedIdentities: defaultUAssignedId ? [defaultUAssignedId.id] : undefined,
|
|
107
|
+
},
|
|
108
|
+
encryption: encryptionKey && props.sku.name === 'Premium'
|
|
109
|
+
? {
|
|
110
|
+
keySource: bus.KeySource.Microsoft_KeyVault,
|
|
111
|
+
keyVaultProperties: [
|
|
112
|
+
{
|
|
113
|
+
...encryptionKey,
|
|
114
|
+
identity: defaultUAssignedId ? { userAssignedIdentity: defaultUAssignedId.id } : undefined,
|
|
115
|
+
},
|
|
116
|
+
],
|
|
117
|
+
requireInfrastructureEncryption: true,
|
|
118
|
+
}
|
|
119
|
+
: undefined,
|
|
120
|
+
publicNetworkAccess: network?.publicNetworkAccess ? 'Enabled' : network?.privateLink ? 'Disabled' : 'Enabled',
|
|
121
|
+
}, {
|
|
122
|
+
...this.opts,
|
|
123
|
+
parent: this,
|
|
124
|
+
});
|
|
125
|
+
this.addSecret('hostname', pulumi.interpolate `${service.name}.servicebus.windows.net`);
|
|
126
|
+
return service;
|
|
127
|
+
}
|
|
128
|
+
createNetwork(service) {
|
|
129
|
+
const { rsGroup, network } = this.args;
|
|
130
|
+
if (!network)
|
|
131
|
+
return;
|
|
132
|
+
new bus.NamespaceNetworkRuleSet(this.name, {
|
|
133
|
+
...rsGroup,
|
|
134
|
+
namespaceName: service.name,
|
|
135
|
+
defaultAction: network.defaultAction ? network.defaultAction : 'Allow',
|
|
136
|
+
trustedServiceAccessEnabled: true,
|
|
137
|
+
ipRules: network.ipRules
|
|
138
|
+
? pulumi.output(network.ipRules).apply((ips) => ips.map((i) => ({
|
|
139
|
+
ipMask: i,
|
|
140
|
+
action: bus.NetworkRuleIPAction.Allow,
|
|
141
|
+
})))
|
|
142
|
+
: undefined,
|
|
143
|
+
virtualNetworkRules: network.vnetRules
|
|
144
|
+
? pulumi.output(network.vnetRules).apply((vIds) => vIds.map((v) => ({
|
|
145
|
+
ignoreMissingVnetServiceEndpoint: v.ignoreMissingVnetServiceEndpoint,
|
|
146
|
+
subnet: { id: v.subnetId },
|
|
147
|
+
})))
|
|
148
|
+
: undefined,
|
|
149
|
+
}, { dependsOn: service, parent: this });
|
|
150
|
+
if (network.privateLink) {
|
|
151
|
+
return new PrivateEndpoint_1.PrivateEndpoint(this.name, { ...network.privateLink, resourceInfo: service, rsGroup, type: 'serviceBus' }, { dependsOn: service, parent: this });
|
|
152
|
+
}
|
|
153
|
+
}
|
|
154
|
+
createConnectionStrings(service) {
|
|
155
|
+
const { disableLocalAuth, rsGroup } = this.args;
|
|
156
|
+
if (disableLocalAuth)
|
|
157
|
+
return;
|
|
158
|
+
// const manageRule = new bus.NamespaceAuthorizationRule(
|
|
159
|
+
// `${this.name}-manage`,
|
|
160
|
+
// {
|
|
161
|
+
// ...rsGroup,
|
|
162
|
+
// namespaceName: service.name,
|
|
163
|
+
// rights: ['Listen', 'Send', 'Manage'],
|
|
164
|
+
// },
|
|
165
|
+
// { dependsOn: service, parent: this },
|
|
166
|
+
// );
|
|
167
|
+
const listenRule = new bus.NamespaceAuthorizationRule(`${this.name}-listen`, {
|
|
168
|
+
...rsGroup,
|
|
169
|
+
namespaceName: service.name,
|
|
170
|
+
rights: ['Listen'],
|
|
171
|
+
}, { dependsOn: service, parent: this });
|
|
172
|
+
const sendRule = new bus.NamespaceAuthorizationRule(`${this.name}-send`, {
|
|
173
|
+
...rsGroup,
|
|
174
|
+
namespaceName: service.name,
|
|
175
|
+
rights: ['Listen'],
|
|
176
|
+
}, { dependsOn: service, parent: this });
|
|
177
|
+
this.addConnectionsToVault(service);
|
|
178
|
+
this.addConnectionsToVault(service, listenRule);
|
|
179
|
+
this.addConnectionsToVault(service, sendRule);
|
|
180
|
+
}
|
|
181
|
+
addConnectionsToVault(service, rule) {
|
|
182
|
+
const { rsGroup, vaultInfo } = this.args;
|
|
183
|
+
if (!vaultInfo)
|
|
184
|
+
return;
|
|
185
|
+
const ruleName = rule ? rule.name : 'RootManageSharedAccessKey';
|
|
186
|
+
pulumi.output([service.name, ruleName, rsGroup.resourceGroupName]).apply(async ([svName, rName, rsName]) => {
|
|
187
|
+
const keys = await bus.listNamespaceKeys({
|
|
188
|
+
resourceGroupName: rsName,
|
|
189
|
+
authorizationRuleName: rName,
|
|
190
|
+
namespaceName: svName,
|
|
191
|
+
});
|
|
192
|
+
new vault.VaultSecrets(`${this.name}-${rName}`, {
|
|
193
|
+
vaultInfo,
|
|
194
|
+
secrets: {
|
|
195
|
+
[`${this.name}-${rName}-primary-conn`]: {
|
|
196
|
+
value: keys.primaryConnectionString,
|
|
197
|
+
contentType: 'ServiceBus Primary ConnectionString',
|
|
198
|
+
},
|
|
199
|
+
[`${this.name}-${rName}-secondary-conn`]: {
|
|
200
|
+
value: keys.secondaryConnectionString,
|
|
201
|
+
contentType: 'ServiceBus Secondary ConnectionString',
|
|
202
|
+
},
|
|
203
|
+
},
|
|
204
|
+
}, { dependsOn: rule ? [service, rule] : [service], parent: this });
|
|
205
|
+
});
|
|
206
|
+
}
|
|
207
|
+
createQueues(service) {
|
|
208
|
+
const { queues, rsGroup } = this.args;
|
|
209
|
+
if (!queues)
|
|
210
|
+
return;
|
|
211
|
+
Object.keys(queues).map((k) => {
|
|
212
|
+
const queueOps = queues[k];
|
|
213
|
+
return new bus.Queue(`${this.name}-${k}`, {
|
|
214
|
+
...rsGroup,
|
|
215
|
+
queueName: k,
|
|
216
|
+
namespaceName: service.name,
|
|
217
|
+
...defaultQueueOptions,
|
|
218
|
+
...queueOps,
|
|
219
|
+
}, { dependsOn: service, parent: this });
|
|
220
|
+
});
|
|
221
|
+
}
|
|
222
|
+
createTopics(service) {
|
|
223
|
+
const { topics, rsGroup } = this.args;
|
|
224
|
+
if (!topics)
|
|
225
|
+
return;
|
|
226
|
+
Object.keys(topics).map((k) => {
|
|
227
|
+
const topicOps = topics[k];
|
|
228
|
+
const topic = new bus.Topic(`${this.name}-${k}`, {
|
|
229
|
+
...rsGroup,
|
|
230
|
+
topicName: k,
|
|
231
|
+
namespaceName: service.name,
|
|
232
|
+
...defaultTopicOptions,
|
|
233
|
+
...topicOps,
|
|
234
|
+
}, { dependsOn: service, parent: this });
|
|
235
|
+
if (topicOps.subscriptions)
|
|
236
|
+
this.createSubscriptions(service, topic, topicOps.subscriptions);
|
|
237
|
+
return topic;
|
|
238
|
+
});
|
|
239
|
+
}
|
|
240
|
+
createSubscriptions(service, topic, subscriptions) {
|
|
241
|
+
const { rsGroup } = this.args;
|
|
242
|
+
topic.name.apply((topicName) => Object.keys(subscriptions).map((k) => {
|
|
243
|
+
const subOps = subscriptions[k];
|
|
244
|
+
return new bus.Subscription(`${this.name}-${topicName}-${k}`, {
|
|
245
|
+
...rsGroup,
|
|
246
|
+
topicName: topicName,
|
|
247
|
+
namespaceName: service.name,
|
|
248
|
+
subscriptionName: k,
|
|
249
|
+
...defaultTopicOptions,
|
|
250
|
+
...subOps,
|
|
251
|
+
}, { dependsOn: [service, topic], parent: this });
|
|
252
|
+
}));
|
|
253
|
+
}
|
|
254
|
+
}
|
|
255
|
+
exports.ServiceBus = ServiceBus;
|
|
256
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"ServiceBus.js","sourceRoot":"","sources":["../../src/services/ServiceBus.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,qEAAuD;AACvD,uDAAyC;AACzC,kCAAgE;AAChE,wCAAsC;AAEtC,gDAAkC;AAClC,6DAA0D;AAE1D,MAAM,mBAAmB,GAA2B;IAClD,8CAA8C;IAC9C,kCAAkC;IAClC,6CAA6C;IAC7C,gBAAgB,EAAE,EAAE;IACpB,uBAAuB,EAAE,IAAI;IAC7B,kBAAkB,EAAE,KAAK;IACzB,kBAAkB,EAAE,kBAAQ,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI;IACrD,oDAAoD;IACpD,YAAY,EAAE,MAAM;IACpB,wBAAwB,EAAE,kBAAQ,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,KAAK;IACzD,gCAAgC,EAAE,IAAI;CACvC,CAAC;AAEF,MAAM,mBAAmB,GAA2B;IAClD,8CAA8C;IAC9C,kCAAkC;IAClC,6CAA6C;IAC7C,wBAAwB,EAAE,kBAAQ,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,KAAK;IACzD,kBAAkB,EAAE,KAAK;IACzB,kBAAkB,EAAE,kBAAQ,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI;IACrD,uBAAuB,EAAE,IAAI;CAC9B,CAAC;AAEF,MAAM,iBAAiB,GAAkC;IACvD,mCAAmC,EAAE,MAAM;IAC3C,6CAA6C;IAC7C,wBAAwB,EAAE,kBAAQ,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,KAAK;IACzD,uBAAuB,EAAE,IAAI;IAC7B,gCAAgC,EAAE,IAAI;IACtC,YAAY,EAAE,MAAM;IACpB,gBAAgB,EAAE,EAAE;CACrB,CAAC;AAwCF,MAAa,UAAW,SAAQ,4BAAqC;IACnD,EAAE,CAAwB;IAC1B,YAAY,CAAwB;IAEpD,YAAY,IAAY,EAAE,IAAoB,EAAE,IAAsC;QACpF,KAAK,CAAC,YAAY,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,CAAC,CAAC;QAEtC,MAAM,OAAO,GAAG,IAAI,CAAC,kBAAkB,EAAE,CAAC;QAC1C,IAAI,CAAC,aAAa,CAAC,OAAO,CAAC,CAAC;QAC5B,IAAI,CAAC,uBAAuB,CAAC,OAAO,CAAC,CAAC;QAEtC,IAAI,CAAC,YAAY,CAAC,OAAO,CAAC,CAAC;QAC3B,IAAI,CAAC,YAAY,CAAC,OAAO,CAAC,CAAC;QAE3B,IAAI,CAAC,EAAE,GAAG,OAAO,CAAC,EAAE,CAAC;QACrB,IAAI,CAAC,YAAY,GAAG,OAAO,CAAC,IAAI,CAAC;QACjC,IAAI,CAAC,eAAe,EAAE,CAAC;IACzB,CAAC;IAEM,UAAU;QACf,OAAO;YACL,EAAE,EAAE,IAAI,CAAC,EAAE;YACX,YAAY,EAAE,IAAI,CAAC,YAAY;SAChC,CAAC;IACJ,CAAC;IAEO,kBAAkB;QACxB,MAAM,EAAE,OAAO,EAAE,kBAAkB,EAAE,SAAS,EAAE,gBAAgB,EAAE,OAAO,EAAE,GAAG,KAAK,EAAE,GAAG,IAAI,CAAC,IAAI,CAAC;QAClG,MAAM,aAAa,GAAG,gBAAgB,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,EAAE,CAAC,CAAC,CAAC,SAAS,CAAC;QAE7E,MAAM,OAAO,GAAG,IAAI,GAAG,CAAC,SAAS,CAC/B,IAAI,CAAC,IAAI,EACT;YACE,GAAG,KAAK;YACR,GAAG,OAAO;YACV,iBAAiB,EAAE,KAAK;YAExB,QAAQ,EAAE;gBACR,IAAI,EAAE,kBAAkB;oBACtB,CAAC,CAAC,GAAG,CAAC,0BAA0B,CAAC,2BAA2B;oBAC5D,CAAC,CAAC,GAAG,CAAC,0BAA0B,CAAC,cAAc;gBACjD,sCAAsC;gBACtC,sBAAsB,EAAE,kBAAkB,CAAC,CAAC,CAAC,CAAC,kBAAkB,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,SAAS;aACjF;YAED,UAAU,EACR,aAAa,IAAI,KAAK,CAAC,GAAG,CAAC,IAAI,KAAK,SAAS;gBAC3C,CAAC,CAAC;oBACE,SAAS,EAAE,GAAG,CAAC,SAAS,CAAC,kBAAkB;oBAC3C,kBAAkB,EAAE;wBAClB;4BACE,GAAG,aAAa;4BAChB,QAAQ,EAAE,kBAAkB,CAAC,CAAC,CAAC,EAAE,oBAAoB,EAAE,kBAAkB,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,SAAS;yBAC3F;qBACF;oBACD,+BAA+B,EAAE,IAAI;iBACtC;gBACH,CAAC,CAAC,SAAS;YAEf,mBAAmB,EAAE,OAAO,EAAE,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS;SAC9G,EACD;YACE,GAAG,IAAI,CAAC,IAAI;YACZ,MAAM,EAAE,IAAI;SACb,CACF,CAAC;QAEF,IAAI,CAAC,SAAS,CAAC,UAAU,EAAE,MAAM,CAAC,WAAW,CAAA,GAAG,OAAO,CAAC,IAAI,yBAAyB,CAAC,CAAC;QAEvF,OAAO,OAAO,CAAC;IACjB,CAAC;IAEO,aAAa,CAAC,OAAsB;QAC1C,MAAM,EAAE,OAAO,EAAE,OAAO,EAAE,GAAG,IAAI,CAAC,IAAI,CAAC;QACvC,IAAI,CAAC,OAAO;YAAE,OAAO;QAErB,IAAI,GAAG,CAAC,uBAAuB,CAC7B,IAAI,CAAC,IAAI,EACT;YACE,GAAG,OAAO;YACV,aAAa,EAAE,OAAO,CAAC,IAAI;YAC3B,aAAa,EAAE,OAAO,CAAC,aAAa,CAAC,CAAC,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC,CAAC,OAAO;YACtE,2BAA2B,EAAE,IAAI;YAEjC,OAAO,EAAE,OAAO,CAAC,OAAO;gBACtB,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC,KAAK,CAAC,CAAC,GAAG,EAAE,EAAE,CAC3C,GAAG,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;oBACd,MAAM,EAAE,CAAC;oBACT,MAAM,EAAE,GAAG,CAAC,mBAAmB,CAAC,KAAK;iBACtC,CAAC,CAAC,CACJ;gBACH,CAAC,CAAC,SAAS;YACb,mBAAmB,EAAE,OAAO,CAAC,SAAS;gBACpC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,OAAO,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,CAAC,IAAI,EAAE,EAAE,CAC9C,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;oBACf,gCAAgC,EAAE,CAAC,CAAC,gCAAgC;oBACpE,MAAM,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC,QAAQ,EAAE;iBAC3B,CAAC,CAAC,CACJ;gBACH,CAAC,CAAC,SAAS;SACd,EACD,EAAE,SAAS,EAAE,OAAO,EAAE,MAAM,EAAE,IAAI,EAAE,CACrC,CAAC;QAEF,IAAI,OAAO,CAAC,WAAW,EAAE,CAAC;YACxB,OAAO,IAAI,iCAAe,CACxB,IAAI,CAAC,IAAI,EACT,EAAE,GAAG,OAAO,CAAC,WAAW,EAAE,YAAY,EAAE,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,YAAY,EAAE,EAC9E,EAAE,SAAS,EAAE,OAAO,EAAE,MAAM,EAAE,IAAI,EAAE,CACrC,CAAC;QACJ,CAAC;IACH,CAAC;IAEO,uBAAuB,CAAC,OAAsB;QACpD,MAAM,EAAE,gBAAgB,EAAE,OAAO,EAAE,GAAG,IAAI,CAAC,IAAI,CAAC;QAChD,IAAI,gBAAgB;YAAE,OAAO;QAE7B,yDAAyD;QACzD,2BAA2B;QAC3B,MAAM;QACN,kBAAkB;QAClB,mCAAmC;QACnC,4CAA4C;QAC5C,OAAO;QACP,0CAA0C;QAC1C,KAAK;QAEL,MAAM,UAAU,GAAG,IAAI,GAAG,CAAC,0BAA0B,CACnD,GAAG,IAAI,CAAC,IAAI,SAAS,EACrB;YACE,GAAG,OAAO;YACV,aAAa,EAAE,OAAO,CAAC,IAAI;YAC3B,MAAM,EAAE,CAAC,QAAQ,CAAC;SACnB,EACD,EAAE,SAAS,EAAE,OAAO,EAAE,MAAM,EAAE,IAAI,EAAE,CACrC,CAAC;QAEF,MAAM,QAAQ,GAAG,IAAI,GAAG,CAAC,0BAA0B,CACjD,GAAG,IAAI,CAAC,IAAI,OAAO,EACnB;YACE,GAAG,OAAO;YACV,aAAa,EAAE,OAAO,CAAC,IAAI;YAC3B,MAAM,EAAE,CAAC,QAAQ,CAAC;SACnB,EACD,EAAE,SAAS,EAAE,OAAO,EAAE,MAAM,EAAE,IAAI,EAAE,CACrC,CAAC;QAEF,IAAI,CAAC,qBAAqB,CAAC,OAAO,CAAC,CAAC;QACpC,IAAI,CAAC,qBAAqB,CAAC,OAAO,EAAE,UAAU,CAAC,CAAC;QAChD,IAAI,CAAC,qBAAqB,CAAC,OAAO,EAAE,QAAQ,CAAC,CAAC;IAChD,CAAC;IAEO,qBAAqB,CAAC,OAAsB,EAAE,IAAqC;QACzF,MAAM,EAAE,OAAO,EAAE,SAAS,EAAE,GAAG,IAAI,CAAC,IAAI,CAAC;QACzC,IAAI,CAAC,SAAS;YAAE,OAAO;QAEvB,MAAM,QAAQ,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,2BAA2B,CAAC;QAChE,MAAM,CAAC,MAAM,CAAC,CAAC,OAAO,CAAC,IAAI,EAAE,QAAQ,EAAE,OAAO,CAAC,iBAAiB,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,EAAE,CAAC,MAAM,EAAE,KAAK,EAAE,MAAM,CAAC,EAAE,EAAE;YACzG,MAAM,IAAI,GAAG,MAAM,GAAG,CAAC,iBAAiB,CAAC;gBACvC,iBAAiB,EAAE,MAAM;gBACzB,qBAAqB,EAAE,KAAK;gBAC5B,aAAa,EAAE,MAAM;aACtB,CAAC,CAAC;YAEH,IAAI,KAAK,CAAC,YAAY,CACpB,GAAG,IAAI,CAAC,IAAI,IAAI,KAAK,EAAE,EACvB;gBACE,SAAS;gBACT,OAAO,EAAE;oBACP,CAAC,GAAG,IAAI,CAAC,IAAI,IAAI,KAAK,eAAe,CAAC,EAAE;wBACtC,KAAK,EAAE,IAAI,CAAC,uBAAuB;wBACnC,WAAW,EAAE,qCAAqC;qBACnD;oBACD,CAAC,GAAG,IAAI,CAAC,IAAI,IAAI,KAAK,iBAAiB,CAAC,EAAE;wBACxC,KAAK,EAAE,IAAI,CAAC,yBAAyB;wBACrC,WAAW,EAAE,uCAAuC;qBACrD;iBACF;aACF,EACD,EAAE,SAAS,EAAE,IAAI,CAAC,CAAC,CAAC,CAAC,OAAO,EAAE,IAAI,CAAC,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,EAAE,MAAM,EAAE,IAAI,EAAE,CAChE,CAAC;QACJ,CAAC,CAAC,CAAC;IACL,CAAC;IAEO,YAAY,CAAC,OAAsB;QACzC,MAAM,EAAE,MAAM,EAAE,OAAO,EAAE,GAAG,IAAI,CAAC,IAAI,CAAC;QACtC,IAAI,CAAC,MAAM;YAAE,OAAO;QAEpB,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE;YAC5B,MAAM,QAAQ,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;YAC3B,OAAO,IAAI,GAAG,CAAC,KAAK,CAClB,GAAG,IAAI,CAAC,IAAI,IAAI,CAAC,EAAE,EACnB;gBACE,GAAG,OAAO;gBACV,SAAS,EAAE,CAAC;gBACZ,aAAa,EAAE,OAAO,CAAC,IAAI;gBAC3B,GAAG,mBAAmB;gBACtB,GAAG,QAAQ;aACZ,EACD,EAAE,SAAS,EAAE,OAAO,EAAE,MAAM,EAAE,IAAI,EAAE,CACrC,CAAC;QACJ,CAAC,CAAC,CAAC;IACL,CAAC;IAEO,YAAY,CAAC,OAAsB;QACzC,MAAM,EAAE,MAAM,EAAE,OAAO,EAAE,GAAG,IAAI,CAAC,IAAI,CAAC;QACtC,IAAI,CAAC,MAAM;YAAE,OAAO;QAEpB,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE;YAC5B,MAAM,QAAQ,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;YAC3B,MAAM,KAAK,GAAG,IAAI,GAAG,CAAC,KAAK,CACzB,GAAG,IAAI,CAAC,IAAI,IAAI,CAAC,EAAE,EACnB;gBACE,GAAG,OAAO;gBACV,SAAS,EAAE,CAAC;gBACZ,aAAa,EAAE,OAAO,CAAC,IAAI;gBAC3B,GAAG,mBAAmB;gBACtB,GAAG,QAAQ;aACZ,EACD,EAAE,SAAS,EAAE,OAAO,EAAE,MAAM,EAAE,IAAI,EAAE,CACrC,CAAC;YAEF,IAAI,QAAQ,CAAC,aAAa;gBAAE,IAAI,CAAC,mBAAmB,CAAC,OAAO,EAAE,KAAK,EAAE,QAAQ,CAAC,aAAa,CAAC,CAAC;YAC7F,OAAO,KAAK,CAAC;QACf,CAAC,CAAC,CAAC;IACL,CAAC;IAEO,mBAAmB,CAAC,OAAsB,EAAE,KAAgB,EAAE,aAAgC;QACpG,MAAM,EAAE,OAAO,EAAE,GAAG,IAAI,CAAC,IAAI,CAAC;QAC9B,KAAK,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,SAAS,EAAE,EAAE,CAC7B,MAAM,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE;YACnC,MAAM,MAAM,GAAG,aAAa,CAAC,CAAC,CAAC,CAAC;YAChC,OAAO,IAAI,GAAG,CAAC,YAAY,CACzB,GAAG,IAAI,CAAC,IAAI,IAAI,SAAS,IAAI,CAAC,EAAE,EAChC;gBACE,GAAG,OAAO;gBACV,SAAS,EAAE,SAAS;gBACpB,aAAa,EAAE,OAAO,CAAC,IAAI;gBAC3B,gBAAgB,EAAE,CAAC;gBACnB,GAAG,mBAAmB;gBACtB,GAAG,MAAM;aACV,EACD,EAAE,SAAS,EAAE,CAAC,OAAO,EAAE,KAAK,CAAC,EAAE,MAAM,EAAE,IAAI,EAAE,CAC9C,CAAC;QACJ,CAAC,CAAC,CACH,CAAC;IACJ,CAAC;CACF;AAvPD,gCAuPC"}
|
|
@@ -0,0 +1,20 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
+
if (k2 === undefined) k2 = k;
|
|
4
|
+
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
+
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
+
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
+
}
|
|
8
|
+
Object.defineProperty(o, k2, desc);
|
|
9
|
+
}) : (function(o, m, k, k2) {
|
|
10
|
+
if (k2 === undefined) k2 = k;
|
|
11
|
+
o[k2] = m[k];
|
|
12
|
+
}));
|
|
13
|
+
var __exportStar = (this && this.__exportStar) || function(m, exports) {
|
|
14
|
+
for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
|
|
15
|
+
};
|
|
16
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
17
|
+
__exportStar(require("./Automation"), exports);
|
|
18
|
+
__exportStar(require("./AzSearch"), exports);
|
|
19
|
+
__exportStar(require("./ServiceBus"), exports);
|
|
20
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi9zcmMvc2VydmljZXMvaW5kZXgudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6Ijs7Ozs7Ozs7Ozs7Ozs7OztBQUFBLCtDQUE2QjtBQUM3Qiw2Q0FBMkI7QUFDM0IsK0NBQTZCIn0=
|
|
@@ -0,0 +1,53 @@
|
|
|
1
|
+
import * as storage from '@pulumi/azure-native/storage';
|
|
2
|
+
import * as inputs from '@pulumi/azure-native/types/input';
|
|
3
|
+
import * as pulumi from '@pulumi/pulumi';
|
|
4
|
+
import { BaseResourceComponent, CommonBaseArgs } from '../base';
|
|
5
|
+
import * as types from '../types';
|
|
6
|
+
import * as vnet from '../vnet';
|
|
7
|
+
export interface StorageAccountArgs extends CommonBaseArgs, types.WithEncryptionEnabler, types.WithUserAssignedIdentity, Pick<storage.StorageAccountArgs, 'accessTier' | 'allowBlobPublicAccess' | 'isHnsEnabled' | 'allowSharedKeyAccess' | 'isSftpEnabled' | 'largeFileSharesState' | 'routingPreference'> {
|
|
8
|
+
sku?: storage.SkuName | string;
|
|
9
|
+
network?: types.NetworkArgs & {
|
|
10
|
+
storageEndpointTypes?: vnet.StorageEndpointTypes[];
|
|
11
|
+
};
|
|
12
|
+
policies?: {
|
|
13
|
+
staticWebsite?: Partial<Pick<vnet.AzCdnArgs, 'endpoint'>> & {
|
|
14
|
+
enabled: boolean;
|
|
15
|
+
existingProfile?: types.ResourceWithGroupType;
|
|
16
|
+
};
|
|
17
|
+
keyExpirationPeriodInDays?: pulumi.Input<number>;
|
|
18
|
+
/**
|
|
19
|
+
* The SAS expiration period, DD.HH:MM:SS.
|
|
20
|
+
*/
|
|
21
|
+
sasExpirationPeriod?: pulumi.Input<string>;
|
|
22
|
+
sasExpirationAction?: 'Log' | 'Block';
|
|
23
|
+
blob?: Omit<storage.BlobServicePropertiesArgs, 'blobServicesName' | 'resourceGroupName' | 'accountName'>;
|
|
24
|
+
defaultManagementPolicyRules?: pulumi.Input<pulumi.Input<inputs.storage.ManagementPolicyRuleArgs>[]>;
|
|
25
|
+
};
|
|
26
|
+
containers?: {
|
|
27
|
+
containers?: Array<{
|
|
28
|
+
name: string;
|
|
29
|
+
isPublic?: boolean;
|
|
30
|
+
}>;
|
|
31
|
+
queues?: Array<string>;
|
|
32
|
+
fileShares?: Array<string>;
|
|
33
|
+
};
|
|
34
|
+
}
|
|
35
|
+
export declare class StorageAccount extends BaseResourceComponent<StorageAccountArgs> {
|
|
36
|
+
readonly rsGroup: types.ResourceGroupInputs;
|
|
37
|
+
readonly id: pulumi.Output<string>;
|
|
38
|
+
readonly resourceName: pulumi.Output<string>;
|
|
39
|
+
constructor(name: string, args: StorageAccountArgs, opts?: pulumi.ComponentResourceOptions);
|
|
40
|
+
getOutputs(): {
|
|
41
|
+
resourceName: pulumi.Output<string>;
|
|
42
|
+
id: pulumi.Output<string>;
|
|
43
|
+
rsGroup: {
|
|
44
|
+
resourceGroupName: pulumi.Input<string>;
|
|
45
|
+
location?: pulumi.Input<string> | undefined;
|
|
46
|
+
};
|
|
47
|
+
};
|
|
48
|
+
private createPrivateLink;
|
|
49
|
+
private createLifeCycleManagement;
|
|
50
|
+
private enableStaticWebsite;
|
|
51
|
+
private addSecretsToVault;
|
|
52
|
+
private createContainers;
|
|
53
|
+
}
|
|
@@ -0,0 +1,261 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
+
if (k2 === undefined) k2 = k;
|
|
4
|
+
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
+
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
+
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
+
}
|
|
8
|
+
Object.defineProperty(o, k2, desc);
|
|
9
|
+
}) : (function(o, m, k, k2) {
|
|
10
|
+
if (k2 === undefined) k2 = k;
|
|
11
|
+
o[k2] = m[k];
|
|
12
|
+
}));
|
|
13
|
+
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
|
|
14
|
+
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
|
15
|
+
}) : function(o, v) {
|
|
16
|
+
o["default"] = v;
|
|
17
|
+
});
|
|
18
|
+
var __importStar = (this && this.__importStar) || (function () {
|
|
19
|
+
var ownKeys = function(o) {
|
|
20
|
+
ownKeys = Object.getOwnPropertyNames || function (o) {
|
|
21
|
+
var ar = [];
|
|
22
|
+
for (var k in o) if (Object.prototype.hasOwnProperty.call(o, k)) ar[ar.length] = k;
|
|
23
|
+
return ar;
|
|
24
|
+
};
|
|
25
|
+
return ownKeys(o);
|
|
26
|
+
};
|
|
27
|
+
return function (mod) {
|
|
28
|
+
if (mod && mod.__esModule) return mod;
|
|
29
|
+
var result = {};
|
|
30
|
+
if (mod != null) for (var k = ownKeys(mod), i = 0; i < k.length; i++) if (k[i] !== "default") __createBinding(result, mod, k[i]);
|
|
31
|
+
__setModuleDefault(result, mod);
|
|
32
|
+
return result;
|
|
33
|
+
};
|
|
34
|
+
})();
|
|
35
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
36
|
+
exports.StorageAccount = void 0;
|
|
37
|
+
const storage = __importStar(require("@pulumi/azure-native/storage"));
|
|
38
|
+
const pulumi = __importStar(require("@pulumi/pulumi"));
|
|
39
|
+
const base_1 = require("../base");
|
|
40
|
+
const vault = __importStar(require("../vault"));
|
|
41
|
+
const vnet = __importStar(require("../vnet"));
|
|
42
|
+
class StorageAccount extends base_1.BaseResourceComponent {
|
|
43
|
+
rsGroup;
|
|
44
|
+
id;
|
|
45
|
+
resourceName;
|
|
46
|
+
constructor(name, args, opts) {
|
|
47
|
+
super('StorageAccount', name, args, opts);
|
|
48
|
+
const { rsGroup, sku, vaultInfo, defaultUAssignedId, policies, enableEncryption, network, containers, ...props } = args;
|
|
49
|
+
const encryptionKey = enableEncryption ? this.getEncryptionKey() : undefined;
|
|
50
|
+
const stg = new storage.StorageAccount(name, {
|
|
51
|
+
...args.rsGroup,
|
|
52
|
+
...props,
|
|
53
|
+
kind: storage.Kind.StorageV2,
|
|
54
|
+
sku: {
|
|
55
|
+
name: args.sku ?? storage.SkuName.Standard_LRS,
|
|
56
|
+
},
|
|
57
|
+
enableHttpsTrafficOnly: true,
|
|
58
|
+
allowCrossTenantReplication: false,
|
|
59
|
+
minimumTlsVersion: 'TLS1_2',
|
|
60
|
+
defaultToOAuthAuthentication: !props.allowSharedKeyAccess,
|
|
61
|
+
identity: {
|
|
62
|
+
type: defaultUAssignedId
|
|
63
|
+
? storage.IdentityType.SystemAssigned_UserAssigned
|
|
64
|
+
: storage.IdentityType.SystemAssigned,
|
|
65
|
+
userAssignedIdentities: defaultUAssignedId ? [defaultUAssignedId.id] : undefined,
|
|
66
|
+
},
|
|
67
|
+
keyPolicy: {
|
|
68
|
+
keyExpirationPeriodInDays: policies?.keyExpirationPeriodInDays ?? 365,
|
|
69
|
+
},
|
|
70
|
+
sasPolicy: policies?.sasExpirationPeriod
|
|
71
|
+
? {
|
|
72
|
+
expirationAction: policies?.sasExpirationAction ?? 'Block',
|
|
73
|
+
sasExpirationPeriod: policies?.sasExpirationPeriod,
|
|
74
|
+
}
|
|
75
|
+
: undefined,
|
|
76
|
+
encryption: encryptionKey
|
|
77
|
+
? {
|
|
78
|
+
keySource: storage.KeySource.Microsoft_Keyvault,
|
|
79
|
+
keyVaultProperties: {
|
|
80
|
+
keyName: encryptionKey.keyName,
|
|
81
|
+
//keyVersion: encryptionKey.version,
|
|
82
|
+
keyVaultUri: encryptionKey.vaultUrl,
|
|
83
|
+
},
|
|
84
|
+
requireInfrastructureEncryption: true,
|
|
85
|
+
encryptionIdentity: defaultUAssignedId
|
|
86
|
+
? {
|
|
87
|
+
//encryptionFederatedIdentityClientId?: pulumi.Input<string>;
|
|
88
|
+
encryptionUserAssignedIdentity: defaultUAssignedId.id,
|
|
89
|
+
}
|
|
90
|
+
: undefined,
|
|
91
|
+
services: {
|
|
92
|
+
blob: {
|
|
93
|
+
enabled: true,
|
|
94
|
+
//keyType: storage.KeyType.Account,
|
|
95
|
+
},
|
|
96
|
+
file: {
|
|
97
|
+
enabled: true,
|
|
98
|
+
//keyType: storage.KeyType.Account,
|
|
99
|
+
},
|
|
100
|
+
queue: {
|
|
101
|
+
enabled: true,
|
|
102
|
+
//keyType: storage.KeyType.Account,
|
|
103
|
+
},
|
|
104
|
+
table: {
|
|
105
|
+
enabled: true,
|
|
106
|
+
//keyType: storage.KeyType.Account,
|
|
107
|
+
},
|
|
108
|
+
},
|
|
109
|
+
}
|
|
110
|
+
: //Default infra encryption
|
|
111
|
+
{
|
|
112
|
+
keySource: storage.KeySource.Microsoft_Storage,
|
|
113
|
+
requireInfrastructureEncryption: true,
|
|
114
|
+
},
|
|
115
|
+
//isLocalUserEnabled: false,
|
|
116
|
+
allowedCopyScope: network?.privateLink ? 'PrivateLink' : 'AAD',
|
|
117
|
+
publicNetworkAccess: network?.privateLink ? 'Disabled' : 'Enabled',
|
|
118
|
+
networkRuleSet: {
|
|
119
|
+
bypass: args.network?.bypass ?? 'None',
|
|
120
|
+
defaultAction: args.network?.defaultAction ?? storage.DefaultAction.Allow,
|
|
121
|
+
ipRules: args.network?.ipRules
|
|
122
|
+
? pulumi.output(args.network.ipRules).apply((ips) => ips.map((i) => ({
|
|
123
|
+
iPAddressOrRange: i,
|
|
124
|
+
action: storage.Action.Allow,
|
|
125
|
+
})))
|
|
126
|
+
: undefined,
|
|
127
|
+
virtualNetworkRules: args.network?.vnetRules
|
|
128
|
+
? pulumi.output(args.network.vnetRules).apply((vnetRules) => vnetRules.map((v) => ({
|
|
129
|
+
virtualNetworkResourceId: v.subnetId,
|
|
130
|
+
action: storage.Action.Allow,
|
|
131
|
+
})))
|
|
132
|
+
: undefined,
|
|
133
|
+
},
|
|
134
|
+
}, {
|
|
135
|
+
...opts,
|
|
136
|
+
dependsOn: encryptionKey,
|
|
137
|
+
});
|
|
138
|
+
this.createPrivateLink(stg);
|
|
139
|
+
this.createLifeCycleManagement(stg);
|
|
140
|
+
this.enableStaticWebsite(stg);
|
|
141
|
+
this.createContainers(stg);
|
|
142
|
+
this.addIdentityToRole('readOnly', stg.identity);
|
|
143
|
+
this.addSecretsToVault(stg);
|
|
144
|
+
this.id = stg.id;
|
|
145
|
+
this.resourceName = stg.name;
|
|
146
|
+
this.rsGroup = args.rsGroup;
|
|
147
|
+
this.registerOutputs();
|
|
148
|
+
}
|
|
149
|
+
getOutputs() {
|
|
150
|
+
return {
|
|
151
|
+
resourceName: this.resourceName,
|
|
152
|
+
id: this.id,
|
|
153
|
+
rsGroup: this.rsGroup,
|
|
154
|
+
};
|
|
155
|
+
}
|
|
156
|
+
createPrivateLink(stg) {
|
|
157
|
+
const { network } = this.args;
|
|
158
|
+
if (!network?.privateLink)
|
|
159
|
+
return;
|
|
160
|
+
const types = network.storageEndpointTypes ?? ['blob'];
|
|
161
|
+
return types.map((t) => new vnet.PrivateEndpoint(`${this.name}-${t}`, {
|
|
162
|
+
...network.privateLink,
|
|
163
|
+
resourceInfo: stg,
|
|
164
|
+
rsGroup: this.args.rsGroup,
|
|
165
|
+
type: 'storage',
|
|
166
|
+
storageType: t,
|
|
167
|
+
}, { dependsOn: stg, parent: this }));
|
|
168
|
+
}
|
|
169
|
+
createLifeCycleManagement(stg) {
|
|
170
|
+
const { rsGroup, policies } = this.args;
|
|
171
|
+
if (policies?.blob) {
|
|
172
|
+
new storage.BlobServiceProperties(`${this.name}-blob-properties`, {
|
|
173
|
+
...rsGroup,
|
|
174
|
+
accountName: stg.name,
|
|
175
|
+
blobServicesName: 'default',
|
|
176
|
+
...policies.blob,
|
|
177
|
+
}, { dependsOn: stg, parent: this });
|
|
178
|
+
}
|
|
179
|
+
if (policies?.defaultManagementPolicyRules) {
|
|
180
|
+
return new storage.ManagementPolicy(`${this.name}-lifecycle`, {
|
|
181
|
+
...rsGroup,
|
|
182
|
+
managementPolicyName: 'default',
|
|
183
|
+
accountName: stg.name,
|
|
184
|
+
policy: {
|
|
185
|
+
rules: policies.defaultManagementPolicyRules,
|
|
186
|
+
},
|
|
187
|
+
}, { dependsOn: stg, parent: this });
|
|
188
|
+
}
|
|
189
|
+
}
|
|
190
|
+
enableStaticWebsite(stg) {
|
|
191
|
+
const { rsGroup, policies } = this.args;
|
|
192
|
+
if (!policies?.staticWebsite?.enabled)
|
|
193
|
+
return;
|
|
194
|
+
const staticWeb = new storage.StorageAccountStaticWebsite(`${this.name}-static-website`, {
|
|
195
|
+
...rsGroup,
|
|
196
|
+
accountName: stg.name,
|
|
197
|
+
indexDocument: 'index.html',
|
|
198
|
+
error404Document: 'index.html',
|
|
199
|
+
}, { dependsOn: stg, parent: this });
|
|
200
|
+
if (policies.staticWebsite.endpoint) {
|
|
201
|
+
new vnet.AzCdn(`${this.name}-cdn`, {
|
|
202
|
+
endpoint: policies.staticWebsite.endpoint,
|
|
203
|
+
rsGroup: policies.staticWebsite.existingProfile?.rsGroup ?? this.args.rsGroup,
|
|
204
|
+
existingProfile: policies.staticWebsite.existingProfile,
|
|
205
|
+
}, { dependsOn: [stg, staticWeb], parent: this });
|
|
206
|
+
}
|
|
207
|
+
}
|
|
208
|
+
addSecretsToVault(stg) {
|
|
209
|
+
const { rsGroup, vaultInfo } = this.args;
|
|
210
|
+
if (!vaultInfo)
|
|
211
|
+
return;
|
|
212
|
+
return stg.name.apply((n) => {
|
|
213
|
+
if (!n)
|
|
214
|
+
return;
|
|
215
|
+
return storage
|
|
216
|
+
.listStorageAccountKeysOutput({
|
|
217
|
+
resourceGroupName: rsGroup.resourceGroupName,
|
|
218
|
+
accountName: stg.name,
|
|
219
|
+
})
|
|
220
|
+
.apply((keys) => {
|
|
221
|
+
const secrets = keys.keys
|
|
222
|
+
.map((k) => ({
|
|
223
|
+
[`${n}-${k.keyName}`]: {
|
|
224
|
+
value: k.value,
|
|
225
|
+
contentType: `StorageAccount ${k.keyName}`,
|
|
226
|
+
},
|
|
227
|
+
}))
|
|
228
|
+
.reduce((acc, curr) => ({ ...acc, ...curr }), {});
|
|
229
|
+
return new vault.VaultSecrets(this.name, {
|
|
230
|
+
vaultInfo,
|
|
231
|
+
secrets,
|
|
232
|
+
}, { dependsOn: stg, parent: this });
|
|
233
|
+
});
|
|
234
|
+
});
|
|
235
|
+
}
|
|
236
|
+
createContainers(stg) {
|
|
237
|
+
const { rsGroup, containers } = this.args;
|
|
238
|
+
if (!containers)
|
|
239
|
+
return;
|
|
240
|
+
containers.containers?.map((c) => new storage.BlobContainer(c.name, {
|
|
241
|
+
containerName: c.name.toLowerCase(),
|
|
242
|
+
...rsGroup,
|
|
243
|
+
accountName: stg.name,
|
|
244
|
+
publicAccess: c.isPublic ? 'Blob' : 'None',
|
|
245
|
+
}, { dependsOn: stg, parent: this }));
|
|
246
|
+
//Create Queues
|
|
247
|
+
containers.queues?.map((q) => new storage.Queue(q, {
|
|
248
|
+
queueName: q.toLowerCase(),
|
|
249
|
+
accountName: stg.name,
|
|
250
|
+
...rsGroup,
|
|
251
|
+
}, { dependsOn: stg, parent: this }));
|
|
252
|
+
//File Share
|
|
253
|
+
containers.fileShares?.map((s) => new storage.FileShare(s, {
|
|
254
|
+
shareName: s.toLowerCase(),
|
|
255
|
+
accountName: stg.name,
|
|
256
|
+
...rsGroup,
|
|
257
|
+
}, { dependsOn: stg, parent: this }));
|
|
258
|
+
}
|
|
259
|
+
}
|
|
260
|
+
exports.StorageAccount = StorageAccount;
|
|
261
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"StorageAccount.js","sourceRoot":"","sources":["../../src/storage/StorageAccount.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,sEAAwD;AAExD,uDAAyC;AACzC,kCAAgE;AAEhE,gDAAkC;AAClC,8CAAgC;AA4ChC,MAAa,cAAe,SAAQ,4BAAyC;IAC3D,OAAO,CAA4B;IACnC,EAAE,CAAwB;IAC1B,YAAY,CAAwB;IAEpD,YAAY,IAAY,EAAE,IAAwB,EAAE,IAAsC;QACxF,KAAK,CAAC,gBAAgB,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,CAAC,CAAC;QAC1C,MAAM,EAAE,OAAO,EAAE,GAAG,EAAE,SAAS,EAAE,kBAAkB,EAAE,QAAQ,EAAE,gBAAgB,EAAE,OAAO,EAAE,UAAU,EAAE,GAAG,KAAK,EAAE,GAC9G,IAAI,CAAC;QAEP,MAAM,aAAa,GAAG,gBAAgB,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,EAAE,CAAC,CAAC,CAAC,SAAS,CAAC;QAE7E,MAAM,GAAG,GAAG,IAAI,OAAO,CAAC,cAAc,CACpC,IAAI,EACJ;YACE,GAAG,IAAI,CAAC,OAAO;YACf,GAAG,KAAK;YAER,IAAI,EAAE,OAAO,CAAC,IAAI,CAAC,SAAS;YAC5B,GAAG,EAAE;gBACH,IAAI,EAAE,IAAI,CAAC,GAAG,IAAI,OAAO,CAAC,OAAO,CAAC,YAAY;aAC/C;YAED,sBAAsB,EAAE,IAAI;YAC5B,2BAA2B,EAAE,KAAK;YAClC,iBAAiB,EAAE,QAAQ;YAC3B,4BAA4B,EAAE,CAAC,KAAK,CAAC,oBAAoB;YAEzD,QAAQ,EAAE;gBACR,IAAI,EAAE,kBAAkB;oBACtB,CAAC,CAAC,OAAO,CAAC,YAAY,CAAC,2BAA2B;oBAClD,CAAC,CAAC,OAAO,CAAC,YAAY,CAAC,cAAc;gBACvC,sBAAsB,EAAE,kBAAkB,CAAC,CAAC,CAAC,CAAC,kBAAkB,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,SAAS;aACjF;YAED,SAAS,EAAE;gBACT,yBAAyB,EAAE,QAAQ,EAAE,yBAAyB,IAAI,GAAG;aACtE;YACD,SAAS,EAAE,QAAQ,EAAE,mBAAmB;gBACtC,CAAC,CAAC;oBACE,gBAAgB,EAAE,QAAQ,EAAE,mBAAmB,IAAI,OAAO;oBAC1D,mBAAmB,EAAE,QAAQ,EAAE,mBAAmB;iBACnD;gBACH,CAAC,CAAC,SAAS;YACb,UAAU,EAAE,aAAa;gBACvB,CAAC,CAAC;oBACE,SAAS,EAAE,OAAO,CAAC,SAAS,CAAC,kBAAkB;oBAC/C,kBAAkB,EAAE;wBAClB,OAAO,EAAE,aAAa,CAAC,OAAO;wBAC9B,oCAAoC;wBACpC,WAAW,EAAE,aAAa,CAAC,QAAQ;qBACpC;oBACD,+BAA+B,EAAE,IAAI;oBACrC,kBAAkB,EAAE,kBAAkB;wBACpC,CAAC,CAAC;4BACE,6DAA6D;4BAC7D,8BAA8B,EAAE,kBAAkB,CAAC,EAAE;yBACtD;wBACH,CAAC,CAAC,SAAS;oBAEb,QAAQ,EAAE;wBACR,IAAI,EAAE;4BACJ,OAAO,EAAE,IAAI;4BACb,mCAAmC;yBACpC;wBACD,IAAI,EAAE;4BACJ,OAAO,EAAE,IAAI;4BACb,mCAAmC;yBACpC;wBACD,KAAK,EAAE;4BACL,OAAO,EAAE,IAAI;4BACb,mCAAmC;yBACpC;wBACD,KAAK,EAAE;4BACL,OAAO,EAAE,IAAI;4BACb,mCAAmC;yBACpC;qBACF;iBACF;gBACH,CAAC,CAAC,0BAA0B;oBAC1B;wBACE,SAAS,EAAE,OAAO,CAAC,SAAS,CAAC,iBAAiB;wBAC9C,+BAA+B,EAAE,IAAI;qBACtC;YAEL,4BAA4B;YAC5B,gBAAgB,EAAE,OAAO,EAAE,WAAW,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAC,KAAK;YAC9D,mBAAmB,EAAE,OAAO,EAAE,WAAW,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS;YAClE,cAAc,EAAE;gBACd,MAAM,EAAE,IAAI,CAAC,OAAO,EAAE,MAAM,IAAI,MAAM;gBACtC,aAAa,EAAE,IAAI,CAAC,OAAO,EAAE,aAAa,IAAI,OAAO,CAAC,aAAa,CAAC,KAAK;gBAEzE,OAAO,EAAE,IAAI,CAAC,OAAO,EAAE,OAAO;oBAC5B,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC,KAAK,CAAC,CAAC,GAAG,EAAE,EAAE,CAChD,GAAG,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;wBACd,gBAAgB,EAAE,CAAC;wBACnB,MAAM,EAAE,OAAO,CAAC,MAAM,CAAC,KAAK;qBAC7B,CAAC,CAAC,CACJ;oBACH,CAAC,CAAC,SAAS;gBAEb,mBAAmB,EAAE,IAAI,CAAC,OAAO,EAAE,SAAS;oBAC1C,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,CAAC,SAAS,EAAE,EAAE,CACxD,SAAS,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;wBACpB,wBAAwB,EAAE,CAAC,CAAC,QAAQ;wBACpC,MAAM,EAAE,OAAO,CAAC,MAAM,CAAC,KAAK;qBAC7B,CAAC,CAAC,CACJ;oBACH,CAAC,CAAC,SAAS;aACd;SACF,EACD;YACE,GAAG,IAAI;YACP,SAAS,EAAE,aAAa;SACzB,CACF,CAAC;QAEF,IAAI,CAAC,iBAAiB,CAAC,GAAG,CAAC,CAAC;QAC5B,IAAI,CAAC,yBAAyB,CAAC,GAAG,CAAC,CAAC;QACpC,IAAI,CAAC,mBAAmB,CAAC,GAAG,CAAC,CAAC;QAC9B,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,CAAC;QAE3B,IAAI,CAAC,iBAAiB,CAAC,UAAU,EAAE,GAAG,CAAC,QAAQ,CAAC,CAAC;QACjD,IAAI,CAAC,iBAAiB,CAAC,GAAG,CAAC,CAAC;QAE5B,IAAI,CAAC,EAAE,GAAG,GAAG,CAAC,EAAE,CAAC;QACjB,IAAI,CAAC,YAAY,GAAG,GAAG,CAAC,IAAI,CAAC;QAC7B,IAAI,CAAC,OAAO,GAAG,IAAI,CAAC,OAAO,CAAC;QAE5B,IAAI,CAAC,eAAe,EAAE,CAAC;IACzB,CAAC;IAEM,UAAU;QACf,OAAO;YACL,YAAY,EAAE,IAAI,CAAC,YAAY;YAC/B,EAAE,EAAE,IAAI,CAAC,EAAE;YACX,OAAO,EAAE,IAAI,CAAC,OAAO;SACtB,CAAC;IACJ,CAAC;IAEO,iBAAiB,CAAC,GAA2B;QACnD,MAAM,EAAE,OAAO,EAAE,GAAG,IAAI,CAAC,IAAI,CAAC;QAC9B,IAAI,CAAC,OAAO,EAAE,WAAW;YAAE,OAAO;QAElC,MAAM,KAAK,GAAG,OAAO,CAAC,oBAAoB,IAAI,CAAC,MAAM,CAAC,CAAC;QACvD,OAAO,KAAK,CAAC,GAAG,CACd,CAAC,CAAC,EAAE,EAAE,CACJ,IAAI,IAAI,CAAC,eAAe,CACtB,GAAG,IAAI,CAAC,IAAI,IAAI,CAAC,EAAE,EACnB;YACE,GAAG,OAAO,CAAC,WAAY;YACvB,YAAY,EAAE,GAAG;YACjB,OAAO,EAAE,IAAI,CAAC,IAAI,CAAC,OAAO;YAC1B,IAAI,EAAE,SAAS;YACf,WAAW,EAAE,CAAC;SACf,EACD,EAAE,SAAS,EAAE,GAAG,EAAE,MAAM,EAAE,IAAI,EAAE,CACjC,CACJ,CAAC;IACJ,CAAC;IAEO,yBAAyB,CAAC,GAA2B;QAC3D,MAAM,EAAE,OAAO,EAAE,QAAQ,EAAE,GAAG,IAAI,CAAC,IAAI,CAAC;QAExC,IAAI,QAAQ,EAAE,IAAI,EAAE,CAAC;YACnB,IAAI,OAAO,CAAC,qBAAqB,CAC/B,GAAG,IAAI,CAAC,IAAI,kBAAkB,EAC9B;gBACE,GAAG,OAAO;gBACV,WAAW,EAAE,GAAG,CAAC,IAAI;gBACrB,gBAAgB,EAAE,SAAS;gBAC3B,GAAG,QAAQ,CAAC,IAAI;aACjB,EACD,EAAE,SAAS,EAAE,GAAG,EAAE,MAAM,EAAE,IAAI,EAAE,CACjC,CAAC;QACJ,CAAC;QAED,IAAI,QAAQ,EAAE,4BAA4B,EAAE,CAAC;YAC3C,OAAO,IAAI,OAAO,CAAC,gBAAgB,CACjC,GAAG,IAAI,CAAC,IAAI,YAAY,EACxB;gBACE,GAAG,OAAO;gBACV,oBAAoB,EAAE,SAAS;gBAC/B,WAAW,EAAE,GAAG,CAAC,IAAI;gBAErB,MAAM,EAAE;oBACN,KAAK,EAAE,QAAQ,CAAC,4BAA4B;iBAC7C;aACF,EACD,EAAE,SAAS,EAAE,GAAG,EAAE,MAAM,EAAE,IAAI,EAAE,CACjC,CAAC;QACJ,CAAC;IACH,CAAC;IAEO,mBAAmB,CAAC,GAA2B;QACrD,MAAM,EAAE,OAAO,EAAE,QAAQ,EAAE,GAAG,IAAI,CAAC,IAAI,CAAC;QACxC,IAAI,CAAC,QAAQ,EAAE,aAAa,EAAE,OAAO;YAAE,OAAO;QAE9C,MAAM,SAAS,GAAG,IAAI,OAAO,CAAC,2BAA2B,CACvD,GAAG,IAAI,CAAC,IAAI,iBAAiB,EAC7B;YACE,GAAG,OAAO;YACV,WAAW,EAAE,GAAG,CAAC,IAAI;YACrB,aAAa,EAAE,YAAY;YAC3B,gBAAgB,EAAE,YAAY;SAC/B,EACD,EAAE,SAAS,EAAE,GAAG,EAAE,MAAM,EAAE,IAAI,EAAE,CACjC,CAAC;QAEF,IAAI,QAAQ,CAAC,aAAa,CAAC,QAAQ,EAAE,CAAC;YACpC,IAAI,IAAI,CAAC,KAAK,CACZ,GAAG,IAAI,CAAC,IAAI,MAAM,EAClB;gBACE,QAAQ,EAAE,QAAQ,CAAC,aAAa,CAAC,QAAQ;gBACzC,OAAO,EAAE,QAAQ,CAAC,aAAa,CAAC,eAAe,EAAE,OAAO,IAAI,IAAI,CAAC,IAAI,CAAC,OAAO;gBAC7E,eAAe,EAAE,QAAQ,CAAC,aAAa,CAAC,eAAe;aACxD,EACD,EAAE,SAAS,EAAE,CAAC,GAAG,EAAE,SAAS,CAAC,EAAE,MAAM,EAAE,IAAI,EAAE,CAC9C,CAAC;QACJ,CAAC;IACH,CAAC;IAEO,iBAAiB,CAAC,GAA2B;QACnD,MAAM,EAAE,OAAO,EAAE,SAAS,EAAE,GAAG,IAAI,CAAC,IAAI,CAAC;QACzC,IAAI,CAAC,SAAS;YAAE,OAAO;QAEvB,OAAO,GAAG,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,EAAE;YAC1B,IAAI,CAAC,CAAC;gBAAE,OAAO;YAEf,OAAO,OAAO;iBACX,4BAA4B,CAAC;gBAC5B,iBAAiB,EAAE,OAAO,CAAC,iBAAiB;gBAC5C,WAAW,EAAE,GAAG,CAAC,IAAI;aACtB,CAAC;iBACD,KAAK,CAAC,CAAC,IAAI,EAAE,EAAE;gBACd,MAAM,OAAO,GAAG,IAAI,CAAC,IAAI;qBACtB,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;oBACX,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,OAAO,EAAE,CAAC,EAAE;wBACrB,KAAK,EAAE,CAAC,CAAC,KAAK;wBACd,WAAW,EAAE,kBAAkB,CAAC,CAAC,OAAO,EAAE;qBAC3C;iBACF,CAAC,CAAC;qBACF,MAAM,CAAC,CAAC,GAAG,EAAE,IAAI,EAAE,EAAE,CAAC,CAAC,EAAE,GAAG,GAAG,EAAE,GAAG,IAAI,EAAE,CAAC,EAAE,EAA6C,CAAC,CAAC;gBAE/F,OAAO,IAAI,KAAK,CAAC,YAAY,CAC3B,IAAI,CAAC,IAAI,EACT;oBACE,SAAS;oBACT,OAAO;iBACR,EACD,EAAE,SAAS,EAAE,GAAG,EAAE,MAAM,EAAE,IAAI,EAAE,CACjC,CAAC;YACJ,CAAC,CAAC,CAAC;QACP,CAAC,CAAC,CAAC;IACL,CAAC;IAEO,gBAAgB,CAAC,GAA2B;QAClD,MAAM,EAAE,OAAO,EAAE,UAAU,EAAE,GAAG,IAAI,CAAC,IAAI,CAAC;QAC1C,IAAI,CAAC,UAAU;YAAE,OAAO;QAExB,UAAU,CAAC,UAAU,EAAE,GAAG,CACxB,CAAC,CAAC,EAAE,EAAE,CACJ,IAAI,OAAO,CAAC,aAAa,CACvB,CAAC,CAAC,IAAI,EACN;YACE,aAAa,EAAE,CAAC,CAAC,IAAI,CAAC,WAAW,EAAE;YACnC,GAAG,OAAO;YACV,WAAW,EAAE,GAAG,CAAC,IAAI;YACrB,YAAY,EAAE,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,MAAM;SAC3C,EACD,EAAE,SAAS,EAAE,GAAG,EAAE,MAAM,EAAE,IAAI,EAAE,CACjC,CACJ,CAAC;QAEF,eAAe;QACf,UAAU,CAAC,MAAM,EAAE,GAAG,CACpB,CAAC,CAAC,EAAE,EAAE,CACJ,IAAI,OAAO,CAAC,KAAK,CACf,CAAC,EACD;YACE,SAAS,EAAE,CAAC,CAAC,WAAW,EAAE;YAC1B,WAAW,EAAE,GAAG,CAAC,IAAI;YACrB,GAAG,OAAO;SACX,EACD,EAAE,SAAS,EAAE,GAAG,EAAE,MAAM,EAAE,IAAI,EAAE,CACjC,CACJ,CAAC;QAEF,YAAY;QACZ,UAAU,CAAC,UAAU,EAAE,GAAG,CACxB,CAAC,CAAC,EAAE,EAAE,CACJ,IAAI,OAAO,CAAC,SAAS,CACnB,CAAC,EACD;YACE,SAAS,EAAE,CAAC,CAAC,WAAW,EAAE;YAC1B,WAAW,EAAE,GAAG,CAAC,IAAI;YACrB,GAAG,OAAO;SACX,EACD,EAAE,SAAS,EAAE,GAAG,EAAE,MAAM,EAAE,IAAI,EAAE,CACjC,CACJ,CAAC;IACJ,CAAC;CACF;AA9SD,wCA8SC"}
|
|
@@ -0,0 +1,24 @@
|
|
|
1
|
+
import * as pulumi from '@pulumi/pulumi';
|
|
2
|
+
import * as types from '../types';
|
|
3
|
+
export declare function getStorageEndpoints(storage: types.ResourceType): {
|
|
4
|
+
blob: string;
|
|
5
|
+
file: string;
|
|
6
|
+
queue: string;
|
|
7
|
+
table: string;
|
|
8
|
+
lake: string;
|
|
9
|
+
web: string;
|
|
10
|
+
resourceName: string;
|
|
11
|
+
id: string;
|
|
12
|
+
};
|
|
13
|
+
export declare function getStorageEndpointsOutputs(storage: types.ResourceInputs): {
|
|
14
|
+
blob: pulumi.Output<string>;
|
|
15
|
+
file: pulumi.Output<string>;
|
|
16
|
+
queue: pulumi.Output<string>;
|
|
17
|
+
table: pulumi.Output<string>;
|
|
18
|
+
lake: pulumi.Output<string>;
|
|
19
|
+
web: pulumi.Output<string>;
|
|
20
|
+
resourceName: pulumi.Input<string>;
|
|
21
|
+
id: pulumi.Input<string>;
|
|
22
|
+
};
|
|
23
|
+
/** Get storage access key. If vault is provided it will get the secrets from the vault if not it will get from storage directly. */
|
|
24
|
+
export declare function getStorageAccessKeyOutputs(stg: types.ResourceWithGroupInputs, vaultInfo?: types.ResourceInputs): pulumi.Output<string>;
|