@drunk-pulumi/azure-components 1.0.3 → 1.0.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (74) hide show
  1. package/ResourceBuilder.d.ts +5 -5
  2. package/ResourceBuilder.js +9 -8
  3. package/aks/AzKubernetes.d.ts +50 -19
  4. package/aks/AzKubernetes.js +229 -125
  5. package/aks/ContainerRegistry.js +2 -1
  6. package/aks/helpers.d.ts +6 -0
  7. package/aks/helpers.js +26 -5
  8. package/aks/types.d.ts +245 -0
  9. package/aks/types.js +3 -0
  10. package/apim/Apim.d.ts +6 -3
  11. package/apim/Apim.js +18 -16
  12. package/app/AppContainer.d.ts +91 -0
  13. package/app/AppContainer.js +141 -0
  14. package/app/AppContainerEnv.d.ts +68 -0
  15. package/app/AppContainerEnv.js +142 -0
  16. package/app/index.d.ts +2 -0
  17. package/app/index.js +3 -1
  18. package/azAd/AppRegistration.d.ts +9 -12
  19. package/azAd/AppRegistration.js +15 -12
  20. package/azAd/CloudflareAzIdentity.d.ts +10 -0
  21. package/azAd/CloudflareAzIdentity.js +61 -0
  22. package/azAd/GroupRole.d.ts +1 -1
  23. package/azAd/GroupRole.js +4 -5
  24. package/azAd/UserAssignedIdentity.js +6 -6
  25. package/azAd/helpers/rsRoleDefinition.js +4 -9
  26. package/azAd/index.d.ts +1 -0
  27. package/azAd/index.js +2 -1
  28. package/base/BaseResourceComponent.d.ts +1 -1
  29. package/base/BaseResourceComponent.js +5 -5
  30. package/base/helpers.js +2 -2
  31. package/database/AzSql.d.ts +6 -5
  32. package/database/AzSql.js +2 -1
  33. package/database/Redis.d.ts +1 -4
  34. package/database/Redis.js +12 -4
  35. package/database/helpers.js +3 -3
  36. package/helpers/autoTags.js +4 -1
  37. package/helpers/index.d.ts +1 -0
  38. package/helpers/index.js +3 -2
  39. package/helpers/stackEnv.d.ts +2 -1
  40. package/helpers/stackEnv.js +4 -3
  41. package/helpers/zoneHelper.d.ts +24 -0
  42. package/helpers/zoneHelper.js +40 -0
  43. package/logs/Logs.d.ts +6 -16
  44. package/logs/Logs.js +4 -5
  45. package/package.json +8 -7
  46. package/services/ServiceBus.js +2 -1
  47. package/storage/StorageAccount.d.ts +4 -7
  48. package/storage/StorageAccount.js +16 -13
  49. package/types.d.ts +14 -3
  50. package/vault/KeyVault.d.ts +5 -0
  51. package/vault/KeyVault.js +13 -2
  52. package/vault/helpers.d.ts +7 -4
  53. package/vault/helpers.js +11 -4
  54. package/vm/DiskEncryptionSet.js +3 -1
  55. package/vm/VirtualMachine.d.ts +5 -0
  56. package/vm/VirtualMachine.js +156 -41
  57. package/vnet/Basion.js +3 -1
  58. package/vnet/Firewall.d.ts +8 -13
  59. package/vnet/Firewall.js +8 -6
  60. package/vnet/FirewallPolicies/FirewallPolicyBuilder.js +24 -6
  61. package/vnet/FirewallPolicies/commonPolicies.d.ts +29 -2
  62. package/vnet/FirewallPolicies/commonPolicies.js +466 -20
  63. package/vnet/FirewallPolicies/index.d.ts +2 -0
  64. package/vnet/FirewallPolicies/index.js +18 -1
  65. package/vnet/IpAddresses.d.ts +1 -1
  66. package/vnet/IpAddresses.js +3 -2
  67. package/vnet/PrivateDnsZone.d.ts +4 -4
  68. package/vnet/PrivateDnsZone.js +17 -17
  69. package/vnet/PrivateEndpoint.d.ts +2 -5
  70. package/vnet/PrivateEndpoint.js +6 -1
  71. package/vnet/VirtualNetwork.d.ts +11 -5
  72. package/vnet/VirtualNetwork.js +31 -9
  73. package/vnet/helpers.d.ts +2 -0
  74. package/vnet/helpers.js +40 -2
@@ -1,11 +1,365 @@
1
1
  "use strict";
2
2
  Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.getDefaultPolicies = getDefaultPolicies;
4
- exports.getAksPolicies = getAksPolicies;
3
+ exports.allAzurePorts = void 0;
4
+ exports.newFirewallPolicy = newFirewallPolicy;
5
+ exports.defaultAllowedPolicies = defaultAllowedPolicies;
6
+ exports.defaultDeniedPolicies = defaultDeniedPolicies;
7
+ exports.allowsCloudflareTunnels = allowsCloudflareTunnels;
8
+ exports.allowsAksPolicies = allowsAksPolicies;
5
9
  const helpers_1 = require("../../helpers");
6
10
  const FirewallPolicyBuilder_1 = require("./FirewallPolicyBuilder");
7
- function getDefaultPolicies(priority = 6001) {
8
- return new FirewallPolicyBuilder_1.FirewallPolicyBuilder('default', { priority, action: 'Deny' }).addAppRule('deny-everything-else', {
11
+ exports.allAzurePorts = [
12
+ '22',
13
+ '443',
14
+ '445',
15
+ '1433',
16
+ '1194',
17
+ '3306',
18
+ '3389',
19
+ '5432',
20
+ '5671',
21
+ '5672',
22
+ '6379',
23
+ '6380',
24
+ '8883',
25
+ '9000',
26
+ '10255',
27
+ ];
28
+ function newFirewallPolicy(name, { priority, action }) {
29
+ return new FirewallPolicyBuilder_1.FirewallPolicyBuilder(name, { priority, action });
30
+ }
31
+ function defaultAllowedPolicies({ name = 'default-allows', priority = 100, sourceAddresses, allowsAllApps, allowsAzurePortal, allowsAzureDevOps, allowsOffice365, allowsWindowsUpdate, }) {
32
+ const builder = new FirewallPolicyBuilder_1.FirewallPolicyBuilder(name, { priority, action: 'Allow' });
33
+ if (allowsAllApps) {
34
+ builder.addAppRule('allow-everything', {
35
+ description: 'Allows Everything (Dangerous)',
36
+ sourceAddresses,
37
+ targetFqdns: ['*'],
38
+ protocols: [
39
+ { protocolType: 'Http', port: 80 },
40
+ { protocolType: 'Https', port: 443 },
41
+ ],
42
+ });
43
+ return builder;
44
+ }
45
+ if (allowsAzurePortal) {
46
+ builder
47
+ .addNetRule('azure-portal-net', {
48
+ description: ' Allows Azure Portal Access',
49
+ ipProtocols: ['TCP', 'UDP'],
50
+ sourceAddresses,
51
+ destinationAddresses: [`AzureCloud.${helpers_1.azureEnv.currentRegionCode}`, `Sql.${helpers_1.azureEnv.currentRegionCode}`],
52
+ destinationPorts: exports.allAzurePorts,
53
+ })
54
+ .addAppRule('azure-apps', {
55
+ description: 'Allows Windows Updates',
56
+ sourceAddresses,
57
+ targetFqdns: ['AzureBackup', 'AzureKubernetesService', 'AzureActiveDirectoryDomainServices'],
58
+ protocols: [{ protocolType: 'Https', port: 443 }],
59
+ })
60
+ .addAppRule('azure-portal-app', {
61
+ description: ' Allows Azure Portal Access',
62
+ sourceAddresses,
63
+ targetFqdns: [
64
+ '*.azure.com',
65
+ '*.azure.net',
66
+ '*.microsoftonline.com',
67
+ '*.msauth.net',
68
+ '*.msauthimages.net',
69
+ '*.msecnd.net',
70
+ '*.msftauth.net',
71
+ '*.msftauthimages.net',
72
+ 'www.microsoft.com',
73
+ 'learn.microsoft.com',
74
+ ],
75
+ protocols: [
76
+ { protocolType: 'Http', port: 80 },
77
+ { protocolType: 'Https', port: 443 },
78
+ ],
79
+ });
80
+ }
81
+ if (allowsAzureDevOps) {
82
+ builder.addAppRule('azure-devops-app', {
83
+ description: 'Allows Azure DevOps Access',
84
+ sourceAddresses,
85
+ targetFqdns: [
86
+ //Core Azure DevOps
87
+ '*.dev.azure.com',
88
+ 'aex.dev.azure.com',
89
+ 'app.vssps.dev.azure.com',
90
+ 'vsrm.dev.azure.com',
91
+ 'download.agent.dev.azure.com',
92
+ 'dataimport.dev.azure.com',
93
+ //Visual Studio & Legacy
94
+ '*.visualstudio.com',
95
+ '*.vsrm.visualstudio.com',
96
+ '*.vstmr.visualstudio.com',
97
+ '*.pkgs.visualstudio.com',
98
+ '*.vssps.visualstudio.com',
99
+ '*.vsblob.visualstudio.com',
100
+ 'aexprodea1.vsaex.visualstudio.com',
101
+ //Azure DevOps Assets & CDN
102
+ '*.vsassets.io',
103
+ '*.vstmrblob.vsassets.io',
104
+ '*.gallerycdn.vsassets.io',
105
+ 'cdn.vsassets.io',
106
+ '*.vsassetscdn.azure.cn',
107
+ '*.gallerycdn.azure.cn',
108
+ //Azure Artifacts
109
+ '*.blob.core.windows.net',
110
+ '*.dedup.microsoft.com',
111
+ //NuGet
112
+ '*.azurewebsites.net',
113
+ '*.nuget.org',
114
+ //SSH
115
+ 'ssh.dev.azure.com',
116
+ 'vs-ssh.visualstudio.com',
117
+ //Common Microsoft Services
118
+ 'azure.microsoft.com',
119
+ 'management.azure.com',
120
+ 'management.core.windows.net',
121
+ 'graph.microsoft.com',
122
+ 'static2.sharepointonline.com',
123
+ 'amp.azure.net',
124
+ //MSA Authentication (for MSA-backed orgs)
125
+ 'live.com',
126
+ 'login.live.com',
127
+ //Billing
128
+ '*.vscommerce.visualstudio.com',
129
+ //CDN Auth
130
+ 'aadcdn.msauth.net',
131
+ 'aadcdn.msftauth.net',
132
+ 'amcdn.msftauth.net',
133
+ 'azurecomcdn.azureedge.net',
134
+ ],
135
+ protocols: [{ protocolType: 'Https', port: 443 }],
136
+ });
137
+ }
138
+ if (allowsOffice365) {
139
+ builder.addAppRule('office365-app', {
140
+ description: 'Allows Microsoft 365/Office 365 Access',
141
+ sourceAddresses,
142
+ targetFqdns: [
143
+ //Microsoft 365 Unified Domains
144
+ '*.cloud.microsoft',
145
+ '*.static.microsoft',
146
+ '*.usercontent.microsoft',
147
+ //Exchange Online
148
+ 'outlook.cloud.microsoft',
149
+ 'outlook.office.com',
150
+ 'outlook.office365.com',
151
+ '*.outlook.com',
152
+ '*.protection.outlook.com',
153
+ '*.mail.protection.outlook.com',
154
+ '*.mx.microsoft',
155
+ 'smtp.office365.com',
156
+ //SharePoint Online and OneDrive
157
+ '*.sharepoint.com',
158
+ '*.sharepointonline.com',
159
+ 'storage.live.com',
160
+ '*.search.production.apac.trafficmanager.net',
161
+ '*.search.production.emea.trafficmanager.net',
162
+ '*.search.production.us.trafficmanager.net',
163
+ '*.wns.windows.com',
164
+ 'admin.onedrive.com',
165
+ 'officeclient.microsoft.com',
166
+ 'g.live.com',
167
+ 'oneclient.sfx.ms',
168
+ 'spoprod-a.akamaihd.net',
169
+ '*.svc.ms',
170
+ //Microsoft Teams
171
+ '*.lync.com',
172
+ '*.teams.cloud.microsoft',
173
+ '*.teams.microsoft.com',
174
+ 'teams.cloud.microsoft',
175
+ 'teams.microsoft.com',
176
+ '*.keydelivery.mediaservices.windows.net',
177
+ '*.streaming.mediaservices.windows.net',
178
+ 'aka.ms',
179
+ 'adl.windows.com',
180
+ 'join.secure.skypeassets.com',
181
+ 'mlccdnprod.azureedge.net',
182
+ '*.skype.com',
183
+ //Microsoft 365 Common and Office Online
184
+ '*.officeapps.live.com',
185
+ '*.online.office.com',
186
+ 'office.live.com',
187
+ '*.office.net',
188
+ '*.onenote.com',
189
+ '*cdn.onenote.net',
190
+ 'ajax.aspnetcdn.com',
191
+ 'apis.live.net',
192
+ 'officeapps.live.com',
193
+ 'www.onedrive.com',
194
+ //Authentication & Identity
195
+ '*.auth.microsoft.com',
196
+ '*.msftidentity.com',
197
+ '*.msidentity.com',
198
+ 'account.activedirectory.windowsazure.com',
199
+ 'accounts.accesscontrol.windows.net',
200
+ 'adminwebservice.microsoftonline.com',
201
+ 'api.passwordreset.microsoftonline.com',
202
+ 'autologon.microsoftazuread-sso.com',
203
+ 'becws.microsoftonline.com',
204
+ 'ccs.login.microsoftonline.com',
205
+ 'clientconfig.microsoftonline-p.net',
206
+ 'companymanager.microsoftonline.com',
207
+ 'device.login.microsoftonline.com',
208
+ 'login-us.microsoftonline.com',
209
+ 'login.microsoft.com',
210
+ 'login.microsoftonline-p.com',
211
+ 'login.microsoftonline.com',
212
+ 'login.windows.net',
213
+ 'logincert.microsoftonline.com',
214
+ 'loginex.microsoftonline.com',
215
+ 'nexus.microsoftonline-p.com',
216
+ 'passwordreset.microsoftonline.com',
217
+ 'provisioningapi.microsoftonline.com',
218
+ '*.hip.live.com',
219
+ '*.microsoftonline-p.com',
220
+ '*.microsoftonline.com',
221
+ '*.msauth.net',
222
+ '*.msauthimages.net',
223
+ '*.msecnd.net',
224
+ '*.msftauth.net',
225
+ '*.msftauthimages.net',
226
+ '*.phonefactor.net',
227
+ 'enterpriseregistration.windows.net',
228
+ //Security & Compliance
229
+ '*.protection.office.com',
230
+ '*.security.microsoft.com',
231
+ 'compliance.microsoft.com',
232
+ 'defender.microsoft.com',
233
+ 'protection.office.com',
234
+ 'purview.microsoft.com',
235
+ 'security.microsoft.com',
236
+ '*.portal.cloudappsecurity.com',
237
+ //Telemetry & Diagnostics
238
+ '*.aria.microsoft.com',
239
+ '*.events.data.microsoft.com',
240
+ //Common Services
241
+ '*.o365weve.com',
242
+ 'appsforoffice.microsoft.com',
243
+ 'assets.onestore.ms',
244
+ 'auth.gfx.ms',
245
+ 'c1.microsoft.com',
246
+ 'dgps.support.microsoft.com',
247
+ 'docs.microsoft.com',
248
+ 'msdn.microsoft.com',
249
+ 'platform.linkedin.com',
250
+ 'prod.msocdn.com',
251
+ 'shellprod.msocdn.com',
252
+ 'support.microsoft.com',
253
+ 'technet.microsoft.com',
254
+ '*.office365.com',
255
+ //Information Protection
256
+ '*.aadrm.com',
257
+ '*.azurerms.com',
258
+ '*.informationprotection.azure.com',
259
+ 'ecn.dev.virtualearth.net',
260
+ 'informationprotection.hosting.portal.azure.net',
261
+ //Other Services
262
+ 'dc.services.visualstudio.com',
263
+ 'mem.gfx.ms',
264
+ '*.microsoft.com',
265
+ '*.msocdn.com',
266
+ '*.onmicrosoft.com',
267
+ 'o15.officeredir.microsoft.com',
268
+ 'officepreviewredir.microsoft.com',
269
+ 'officeredir.microsoft.com',
270
+ 'r.office.microsoft.com',
271
+ 'activation.sls.microsoft.com',
272
+ 'crl.microsoft.com',
273
+ 'office15client.microsoft.com',
274
+ 'cdn.odc.officeapps.live.com',
275
+ 'officecdn.microsoft.com',
276
+ 'officecdn.microsoft.com.edgesuite.net',
277
+ 'otelrules.azureedge.net',
278
+ //Optional Services
279
+ '*.virtualearth.net',
280
+ 'c.bing.net',
281
+ 'ocos-office365-s2s.msedge.net',
282
+ 'tse1.mm.bing.net',
283
+ 'www.bing.com',
284
+ '*.acompli.net',
285
+ '*.outlookmobile.com',
286
+ 'login.windows-ppe.net',
287
+ 'account.live.com',
288
+ 'www.acompli.com',
289
+ '*.appex-rf.msn.com',
290
+ '*.appex.bing.com',
291
+ 'c.live.com',
292
+ 'partnerservices.getmicrosoftkey.com',
293
+ 'signup.live.com',
294
+ '*.assets-yammer.com',
295
+ 'www.outlook.com',
296
+ 'eus-www.sway-cdn.com',
297
+ 'eus-www.sway-extensions.com',
298
+ 'wus-www.sway-cdn.com',
299
+ 'wus-www.sway-extensions.com',
300
+ 'sway.com',
301
+ 'www.sway.com',
302
+ //Certificate Authorities
303
+ '*.entrust.net',
304
+ '*.geotrust.com',
305
+ '*.omniroot.com',
306
+ '*.public-trust.com',
307
+ '*.symcb.com',
308
+ '*.symcd.com',
309
+ '*.verisign.com',
310
+ '*.verisign.net',
311
+ 'cacerts.digicert.com',
312
+ 'cert.int-x3.letsencrypt.org',
313
+ 'crl.globalsign.com',
314
+ 'crl.globalsign.net',
315
+ 'crl.identrust.com',
316
+ 'crl3.digicert.com',
317
+ 'crl4.digicert.com',
318
+ 'isrg.trustid.ocsp.identrust.com',
319
+ 'mscrl.microsoft.com',
320
+ 'ocsp.digicert.com',
321
+ 'ocsp.globalsign.com',
322
+ 'ocsp.msocsp.com',
323
+ 'ocsp2.globalsign.com',
324
+ 'ocspx.digicert.com',
325
+ 'oneocsp.microsoft.com',
326
+ 'secure.globalsign.com',
327
+ 'www.digicert.com',
328
+ 'www.microsoft.com',
329
+ //Office Features
330
+ 'officespeech.platform.bing.com',
331
+ '*.office.com',
332
+ 'www.microsoft365.com',
333
+ '*.microsoftusercontent.com',
334
+ '*.azure-apim.net',
335
+ '*.flow.microsoft.com',
336
+ '*.powerapps.com',
337
+ '*.powerautomate.com',
338
+ '*.activity.windows.com',
339
+ 'activity.windows.com',
340
+ '*.cortana.ai',
341
+ 'admin.microsoft.com',
342
+ 'cdn.uci.officeapps.live.com',
343
+ ],
344
+ protocols: [
345
+ { protocolType: 'Http', port: 80 },
346
+ { protocolType: 'Https', port: 443 },
347
+ ],
348
+ });
349
+ }
350
+ if (allowsWindowsUpdate) {
351
+ builder.addAppRule('windows-update-app', {
352
+ description: 'Allows Windows Updates',
353
+ sourceAddresses,
354
+ targetFqdns: ['WindowsUpdate', 'WindowsDiagnostics'],
355
+ protocols: [{ protocolType: 'Https', port: 443 }],
356
+ });
357
+ }
358
+ return builder;
359
+ }
360
+ function defaultDeniedPolicies(priority = 6001) {
361
+ return new FirewallPolicyBuilder_1.FirewallPolicyBuilder('default-denied', { priority, action: 'Deny' })
362
+ .addAppRule('deny-everything-else', {
9
363
  description: 'Default Deny Everything Else',
10
364
  protocols: [
11
365
  { protocolType: 'Http', port: 80 },
@@ -14,31 +368,109 @@ function getDefaultPolicies(priority = 6001) {
14
368
  ],
15
369
  sourceAddresses: ['*'],
16
370
  targetFqdns: ['*'],
371
+ })
372
+ .build();
373
+ }
374
+ function allowsCloudflareTunnels({ name = 'cf-tunnels', priority, sourceAddresses, internalDestinationAddresses, internalDestinationPorts, }) {
375
+ const builder = new FirewallPolicyBuilder_1.FirewallPolicyBuilder(name, { priority, action: 'Allow' })
376
+ .addNetRule('net', {
377
+ description: 'Allows CF Tunnel to access to Cloudflare.',
378
+ ipProtocols: ['TCP', 'UDP'],
379
+ sourceAddresses,
380
+ destinationAddresses: [
381
+ '198.41.192.167',
382
+ '198.41.192.67',
383
+ '198.41.192.57',
384
+ '198.41.192.107',
385
+ '198.41.192.27',
386
+ '198.41.192.7',
387
+ '198.41.192.227',
388
+ '198.41.192.47',
389
+ '198.41.192.37',
390
+ '198.41.192.77',
391
+ '198.41.200.13',
392
+ '198.41.200.193',
393
+ '198.41.200.33',
394
+ '198.41.200.233',
395
+ '198.41.200.53',
396
+ '198.41.200.63',
397
+ '198.41.200.113',
398
+ '198.41.200.73',
399
+ '198.41.200.43',
400
+ '198.41.200.23',
401
+ ],
402
+ destinationPorts: ['7844'],
403
+ })
404
+ .addAppRule('app', {
405
+ description: 'Allows CF Tunnel to access to Cloudflare.',
406
+ sourceAddresses,
407
+ targetFqdns: ['*.argotunnel.com', '*.cftunnel.com', '*.cloudflareaccess.com', '*.cloudflareresearch.com'],
408
+ protocols: [
409
+ { protocolType: 'Https', port: 443 },
410
+ { protocolType: 'Https', port: 7844 },
411
+ ],
17
412
  });
413
+ if (internalDestinationAddresses && internalDestinationPorts) {
414
+ builder.addNetRule('internal', {
415
+ description: 'Allows CF Tunnel to access to Internals.',
416
+ ipProtocols: ['TCP'],
417
+ sourceAddresses,
418
+ destinationAddresses: internalDestinationAddresses,
419
+ destinationPorts: internalDestinationPorts,
420
+ });
421
+ }
422
+ return builder.build();
18
423
  }
19
424
  /** These rules are not required for Private AKS */
20
- function getAksPolicies(name, { priority, subnetAddressSpaces, }) {
21
- return (new FirewallPolicyBuilder_1.FirewallPolicyBuilder(name, { priority, action: 'Allow' })
22
- //Net
23
- .addNetRule('aks-udp', {
24
- description: 'For tunneled secure communication between the nodes and the control plane.',
425
+ function allowsAksPolicies({ name = 'aks', priority, subnetAddressSpaces, privateCluster, }) {
426
+ const builder = new FirewallPolicyBuilder_1.FirewallPolicyBuilder(name, { priority, action: 'Allow' });
427
+ if (!privateCluster) {
428
+ builder
429
+ .addNetRule('udp', {
430
+ description: 'For tunneled secure communication between the nodes and the control plane.',
431
+ ipProtocols: ['UDP'],
432
+ sourceAddresses: subnetAddressSpaces,
433
+ destinationAddresses: [`AzureCloud.${helpers_1.azureEnv.currentRegionCode}`],
434
+ destinationPorts: ['1194'],
435
+ })
436
+ .addNetRule('tcp', {
437
+ description: 'For tunneled secure communication between the nodes and the control plane.',
438
+ ipProtocols: ['TCP'],
439
+ sourceAddresses: subnetAddressSpaces,
440
+ destinationAddresses: [`AzureCloud.${helpers_1.azureEnv.currentRegionCode}`],
441
+ destinationPorts: ['9000'],
442
+ });
443
+ }
444
+ builder
445
+ .addNetRule('dns', {
446
+ description: 'Allows DNS resolution for the cluster nodes',
25
447
  ipProtocols: ['UDP'],
26
448
  sourceAddresses: subnetAddressSpaces,
27
- destinationAddresses: [`AzureCloud.${helpers_1.azureEnv.currentRegionCode}`],
28
- destinationPorts: ['1194'],
449
+ //The basic firewall is not allows destinationFqdns tags, so we use wildcard
450
+ destinationAddresses: ['*'],
451
+ destinationPorts: ['53'],
29
452
  })
30
- .addNetRule('aks-tcp', {
31
- description: 'For tunneled secure communication between the nodes and the control plane.',
32
- ipProtocols: ['TCP'],
453
+ .addNetRule('ubuntu', {
454
+ description: 'Required for Network Time Protocol (NTP) time synchronization on Linux nodes',
455
+ ipProtocols: ['UDP'],
33
456
  sourceAddresses: subnetAddressSpaces,
34
- destinationAddresses: [`AzureCloud.${helpers_1.azureEnv.currentRegionCode}`],
35
- destinationPorts: ['9000'],
457
+ //The basic firewall is not allows destinationFqdns tags, so we use wildcard
458
+ destinationAddresses: ['*'],
459
+ destinationPorts: ['123'],
36
460
  })
461
+ .addNetRule('aks-monitor', {
462
+ description: 'This endpoint is used to send metrics data and logs to Azure Monitor and Log Analytics.',
463
+ ipProtocols: ['TCP'],
464
+ sourceAddresses: subnetAddressSpaces,
465
+ destinationAddresses: ['AzureMonitor'],
466
+ destinationPorts: ['443'],
467
+ });
468
+ builder
37
469
  //App
38
- .addAppRule('aks-allow-acrs', {
470
+ .addAppRule('acrs', {
39
471
  description: 'Allows pods to access AzureKubernetesService',
40
472
  sourceAddresses: subnetAddressSpaces,
41
- fqdnTags: [
473
+ targetFqdns: [
42
474
  `*.hcp.${helpers_1.azureEnv.currentRegionCode}.azmk8s.io`,
43
475
  'mcr.microsoft.com',
44
476
  '*.data.mcr.microsoft.com',
@@ -48,8 +480,22 @@ function getAksPolicies(name, { priority, subnetAddressSpaces, }) {
48
480
  'packages.microsoft.com',
49
481
  'acs-mirror.azureedge.net',
50
482
  'packages.aks.azure.com',
483
+ //Defender for Containers and Monitoring
484
+ '*.ods.opinsights.azure.com',
485
+ '*.oms.opinsights.azure.com',
486
+ '*.cloud.defender.microsoft.com',
487
+ '*.in.applicationinsights.azure.com',
488
+ '*.monitoring.azure.com',
489
+ 'global.handler.control.monitor.azure.com',
490
+ '*.ingest.monitor.azure.com',
491
+ '*.metrics.ingest.monitor.azure.com',
492
+ `${helpers_1.azureEnv.currentRegionCode}.handler.control.monitor.azure.com`,
493
+ //Key Vault
494
+ 'vault.azure.net',
495
+ '*.vault.usgovcloudapi.net',
51
496
  ],
52
497
  protocols: [{ protocolType: 'Https', port: 443 }],
53
- }));
498
+ });
499
+ return builder;
54
500
  }
55
- //# sourceMappingURL=data:application/json;base64,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
501
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"commonPolicies.js","sourceRoot":"","sources":["../../../src/vnet/FirewallPolicies/commonPolicies.ts"],"names":[],"mappings":";;;AAsBA,8CAEC;AAED,wDAiWC;AAED,sDAaC;AAED,0DAiEC;AAGD,8CA0FC;AAziBD,2CAAyC;AACzC,mEAAgE;AAEnD,QAAA,aAAa,GAAG;IAC3B,IAAI;IACJ,KAAK;IACL,KAAK;IACL,MAAM;IACN,MAAM;IACN,MAAM;IACN,MAAM;IACN,MAAM;IACN,MAAM;IACN,MAAM;IACN,MAAM;IACN,MAAM;IACN,MAAM;IACN,MAAM;IACN,OAAO;CACR,CAAC;AAEF,SAAgB,iBAAiB,CAAC,IAAY,EAAE,EAAE,QAAQ,EAAE,MAAM,EAAkD;IAClH,OAAO,IAAI,6CAAqB,CAAC,IAAI,EAAE,EAAE,QAAQ,EAAE,MAAM,EAAE,CAAC,CAAC;AAC/D,CAAC;AAED,SAAgB,sBAAsB,CAAC,EACrC,IAAI,GAAG,gBAAgB,EACvB,QAAQ,GAAG,GAAG,EACd,eAAe,EACf,aAAa,EACb,iBAAiB,EACjB,iBAAiB,EACjB,eAAe,EACf,mBAAmB,GAWpB;IACC,MAAM,OAAO,GAAG,IAAI,6CAAqB,CAAC,IAAI,EAAE,EAAE,QAAQ,EAAE,MAAM,EAAE,OAAO,EAAE,CAAC,CAAC;IAE/E,IAAI,aAAa,EAAE,CAAC;QAClB,OAAO,CAAC,UAAU,CAAC,kBAAkB,EAAE;YACrC,WAAW,EAAE,+BAA+B;YAC5C,eAAe;YACf,WAAW,EAAE,CAAC,GAAG,CAAC;YAClB,SAAS,EAAE;gBACT,EAAE,YAAY,EAAE,MAAM,EAAE,IAAI,EAAE,EAAE,EAAE;gBAClC,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE;aACrC;SACF,CAAC,CAAC;QACH,OAAO,OAAO,CAAC;IACjB,CAAC;IAED,IAAI,iBAAiB,EAAE,CAAC;QACtB,OAAO;aACJ,UAAU,CAAC,kBAAkB,EAAE;YAC9B,WAAW,EAAE,6BAA6B;YAC1C,WAAW,EAAE,CAAC,KAAK,EAAE,KAAK,CAAC;YAC3B,eAAe;YACf,oBAAoB,EAAE,CAAC,cAAc,kBAAQ,CAAC,iBAAiB,EAAE,EAAE,OAAO,kBAAQ,CAAC,iBAAiB,EAAE,CAAC;YACvG,gBAAgB,EAAE,qBAAa;SAChC,CAAC;aACD,UAAU,CAAC,YAAY,EAAE;YACxB,WAAW,EAAE,wBAAwB;YACrC,eAAe;YACf,WAAW,EAAE,CAAC,aAAa,EAAE,wBAAwB,EAAE,oCAAoC,CAAC;YAC5F,SAAS,EAAE,CAAC,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE,CAAC;SAClD,CAAC;aACD,UAAU,CAAC,kBAAkB,EAAE;YAC9B,WAAW,EAAE,6BAA6B;YAC1C,eAAe;YACf,WAAW,EAAE;gBACX,aAAa;gBACb,aAAa;gBACb,uBAAuB;gBACvB,cAAc;gBACd,oBAAoB;gBACpB,cAAc;gBACd,gBAAgB;gBAChB,sBAAsB;gBACtB,mBAAmB;gBACnB,qBAAqB;aACtB;YACD,SAAS,EAAE;gBACT,EAAE,YAAY,EAAE,MAAM,EAAE,IAAI,EAAE,EAAE,EAAE;gBAClC,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE;aACrC;SACF,CAAC,CAAC;IACP,CAAC;IAED,IAAI,iBAAiB,EAAE,CAAC;QACtB,OAAO,CAAC,UAAU,CAAC,kBAAkB,EAAE;YACrC,WAAW,EAAE,4BAA4B;YACzC,eAAe;YACf,WAAW,EAAE;gBACX,mBAAmB;gBACnB,iBAAiB;gBACjB,mBAAmB;gBACnB,yBAAyB;gBACzB,oBAAoB;gBACpB,8BAA8B;gBAC9B,0BAA0B;gBAC1B,wBAAwB;gBACxB,oBAAoB;gBACpB,yBAAyB;gBACzB,0BAA0B;gBAC1B,yBAAyB;gBACzB,0BAA0B;gBAC1B,2BAA2B;gBAC3B,mCAAmC;gBACnC,2BAA2B;gBAC3B,eAAe;gBACf,yBAAyB;gBACzB,0BAA0B;gBAC1B,iBAAiB;gBACjB,wBAAwB;gBACxB,uBAAuB;gBACvB,iBAAiB;gBACjB,yBAAyB;gBACzB,uBAAuB;gBACvB,OAAO;gBACP,qBAAqB;gBACrB,aAAa;gBACb,KAAK;gBACL,mBAAmB;gBACnB,yBAAyB;gBACzB,2BAA2B;gBAC3B,qBAAqB;gBACrB,sBAAsB;gBACtB,6BAA6B;gBAC7B,qBAAqB;gBACrB,8BAA8B;gBAC9B,eAAe;gBACf,0CAA0C;gBAC1C,UAAU;gBACV,gBAAgB;gBAChB,SAAS;gBACT,+BAA+B;gBAC/B,UAAU;gBACV,mBAAmB;gBACnB,qBAAqB;gBACrB,oBAAoB;gBACpB,2BAA2B;aAC5B;YACD,SAAS,EAAE,CAAC,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE,CAAC;SAClD,CAAC,CAAC;IACL,CAAC;IAED,IAAI,eAAe,EAAE,CAAC;QACpB,OAAO,CAAC,UAAU,CAAC,eAAe,EAAE;YAClC,WAAW,EAAE,wCAAwC;YACrD,eAAe;YACf,WAAW,EAAE;gBACX,+BAA+B;gBAC/B,mBAAmB;gBACnB,oBAAoB;gBACpB,yBAAyB;gBACzB,iBAAiB;gBACjB,yBAAyB;gBACzB,oBAAoB;gBACpB,uBAAuB;gBACvB,eAAe;gBACf,0BAA0B;gBAC1B,+BAA+B;gBAC/B,gBAAgB;gBAChB,oBAAoB;gBACpB,gCAAgC;gBAChC,kBAAkB;gBAClB,wBAAwB;gBACxB,kBAAkB;gBAClB,6CAA6C;gBAC7C,6CAA6C;gBAC7C,2CAA2C;gBAC3C,mBAAmB;gBACnB,oBAAoB;gBACpB,4BAA4B;gBAC5B,YAAY;gBACZ,kBAAkB;gBAClB,wBAAwB;gBACxB,UAAU;gBACV,iBAAiB;gBACjB,YAAY;gBACZ,yBAAyB;gBACzB,uBAAuB;gBACvB,uBAAuB;gBACvB,qBAAqB;gBACrB,yCAAyC;gBACzC,uCAAuC;gBACvC,QAAQ;gBACR,iBAAiB;gBACjB,6BAA6B;gBAC7B,0BAA0B;gBAC1B,aAAa;gBACb,wCAAwC;gBACxC,uBAAuB;gBACvB,qBAAqB;gBACrB,iBAAiB;gBACjB,cAAc;gBACd,eAAe;gBACf,kBAAkB;gBAClB,oBAAoB;gBACpB,eAAe;gBACf,qBAAqB;gBACrB,kBAAkB;gBAClB,2BAA2B;gBAC3B,sBAAsB;gBACtB,oBAAoB;gBACpB,kBAAkB;gBAClB,0CAA0C;gBAC1C,oCAAoC;gBACpC,qCAAqC;gBACrC,uCAAuC;gBACvC,oCAAoC;gBACpC,2BAA2B;gBAC3B,+BAA+B;gBAC/B,oCAAoC;gBACpC,oCAAoC;gBACpC,kCAAkC;gBAClC,8BAA8B;gBAC9B,qBAAqB;gBACrB,6BAA6B;gBAC7B,2BAA2B;gBAC3B,mBAAmB;gBACnB,+BAA+B;gBAC/B,6BAA6B;gBAC7B,6BAA6B;gBAC7B,mCAAmC;gBACnC,qCAAqC;gBACrC,gBAAgB;gBAChB,yBAAyB;gBACzB,uBAAuB;gBACvB,cAAc;gBACd,oBAAoB;gBACpB,cAAc;gBACd,gBAAgB;gBAChB,sBAAsB;gBACtB,mBAAmB;gBACnB,oCAAoC;gBACpC,uBAAuB;gBACvB,yBAAyB;gBACzB,0BAA0B;gBAC1B,0BAA0B;gBAC1B,wBAAwB;gBACxB,uBAAuB;gBACvB,uBAAuB;gBACvB,wBAAwB;gBACxB,+BAA+B;gBAC/B,yBAAyB;gBACzB,sBAAsB;gBACtB,6BAA6B;gBAC7B,iBAAiB;gBACjB,gBAAgB;gBAChB,6BAA6B;gBAC7B,oBAAoB;gBACpB,aAAa;gBACb,kBAAkB;gBAClB,4BAA4B;gBAC5B,oBAAoB;gBACpB,oBAAoB;gBACpB,uBAAuB;gBACvB,iBAAiB;gBACjB,sBAAsB;gBACtB,uBAAuB;gBACvB,uBAAuB;gBACvB,iBAAiB;gBACjB,wBAAwB;gBACxB,aAAa;gBACb,gBAAgB;gBAChB,mCAAmC;gBACnC,0BAA0B;gBAC1B,gDAAgD;gBAChD,gBAAgB;gBAChB,8BAA8B;gBAC9B,YAAY;gBACZ,iBAAiB;gBACjB,cAAc;gBACd,mBAAmB;gBACnB,+BAA+B;gBAC/B,kCAAkC;gBAClC,2BAA2B;gBAC3B,wBAAwB;gBACxB,8BAA8B;gBAC9B,mBAAmB;gBACnB,8BAA8B;gBAC9B,6BAA6B;gBAC7B,yBAAyB;gBACzB,uCAAuC;gBACvC,yBAAyB;gBACzB,mBAAmB;gBACnB,oBAAoB;gBACpB,YAAY;gBACZ,+BAA+B;gBAC/B,kBAAkB;gBAClB,cAAc;gBACd,eAAe;gBACf,qBAAqB;gBACrB,uBAAuB;gBACvB,kBAAkB;gBAClB,iBAAiB;gBACjB,oBAAoB;gBACpB,kBAAkB;gBAClB,YAAY;gBACZ,qCAAqC;gBACrC,iBAAiB;gBACjB,qBAAqB;gBACrB,iBAAiB;gBACjB,sBAAsB;gBACtB,6BAA6B;gBAC7B,sBAAsB;gBACtB,6BAA6B;gBAC7B,UAAU;gBACV,cAAc;gBACd,yBAAyB;gBACzB,eAAe;gBACf,gBAAgB;gBAChB,gBAAgB;gBAChB,oBAAoB;gBACpB,aAAa;gBACb,aAAa;gBACb,gBAAgB;gBAChB,gBAAgB;gBAChB,sBAAsB;gBACtB,6BAA6B;gBAC7B,oBAAoB;gBACpB,oBAAoB;gBACpB,mBAAmB;gBACnB,mBAAmB;gBACnB,mBAAmB;gBACnB,iCAAiC;gBACjC,qBAAqB;gBACrB,mBAAmB;gBACnB,qBAAqB;gBACrB,iBAAiB;gBACjB,sBAAsB;gBACtB,oBAAoB;gBACpB,uBAAuB;gBACvB,uBAAuB;gBACvB,kBAAkB;gBAClB,mBAAmB;gBACnB,iBAAiB;gBACjB,gCAAgC;gBAChC,cAAc;gBACd,sBAAsB;gBACtB,4BAA4B;gBAC5B,kBAAkB;gBAClB,sBAAsB;gBACtB,iBAAiB;gBACjB,qBAAqB;gBACrB,wBAAwB;gBACxB,sBAAsB;gBACtB,cAAc;gBACd,qBAAqB;gBACrB,6BAA6B;aAC9B;YACD,SAAS,EAAE;gBACT,EAAE,YAAY,EAAE,MAAM,EAAE,IAAI,EAAE,EAAE,EAAE;gBAClC,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE;aACrC;SACF,CAAC,CAAC;IACL,CAAC;IAED,IAAI,mBAAmB,EAAE,CAAC;QACxB,OAAO,CAAC,UAAU,CAAC,oBAAoB,EAAE;YACvC,WAAW,EAAE,wBAAwB;YACrC,eAAe;YACf,WAAW,EAAE,CAAC,eAAe,EAAE,oBAAoB,CAAC;YACpD,SAAS,EAAE,CAAC,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE,CAAC;SAClD,CAAC,CAAC;IACL,CAAC;IAED,OAAO,OAAO,CAAC;AACjB,CAAC;AAED,SAAgB,qBAAqB,CAAC,WAAmB,IAAI;IAC3D,OAAO,IAAI,6CAAqB,CAAC,gBAAgB,EAAE,EAAE,QAAQ,EAAE,MAAM,EAAE,MAAM,EAAE,CAAC;SAC7E,UAAU,CAAC,sBAAsB,EAAE;QAClC,WAAW,EAAE,8BAA8B;QAC3C,SAAS,EAAE;YACT,EAAE,YAAY,EAAE,MAAM,EAAE,IAAI,EAAE,EAAE,EAAE;YAClC,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE;YACpC,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,IAAI,EAAE;SACtC;QACD,eAAe,EAAE,CAAC,GAAG,CAAC;QACtB,WAAW,EAAE,CAAC,GAAG,CAAC;KACnB,CAAC;SACD,KAAK,EAAE,CAAC;AACb,CAAC;AAED,SAAgB,uBAAuB,CAAC,EACtC,IAAI,GAAG,YAAY,EACnB,QAAQ,EACR,eAAe,EACf,4BAA4B,EAC5B,wBAAwB,GASzB;IACC,MAAM,OAAO,GAAG,IAAI,6CAAqB,CAAC,IAAI,EAAE,EAAE,QAAQ,EAAE,MAAM,EAAE,OAAO,EAAE,CAAC;SAC3E,UAAU,CAAC,KAAK,EAAE;QACjB,WAAW,EAAE,2CAA2C;QACxD,WAAW,EAAE,CAAC,KAAK,EAAE,KAAK,CAAC;QAC3B,eAAe;QACf,oBAAoB,EAAE;YACpB,gBAAgB;YAChB,eAAe;YACf,eAAe;YACf,gBAAgB;YAChB,eAAe;YACf,cAAc;YACd,gBAAgB;YAChB,eAAe;YACf,eAAe;YACf,eAAe;YACf,eAAe;YACf,gBAAgB;YAChB,eAAe;YACf,gBAAgB;YAChB,eAAe;YACf,eAAe;YACf,gBAAgB;YAChB,eAAe;YACf,eAAe;YACf,eAAe;SAChB;QACD,gBAAgB,EAAE,CAAC,MAAM,CAAC;KAC3B,CAAC;SACD,UAAU,CAAC,KAAK,EAAE;QACjB,WAAW,EAAE,2CAA2C;QACxD,eAAe;QACf,WAAW,EAAE,CAAC,kBAAkB,EAAE,gBAAgB,EAAE,wBAAwB,EAAE,0BAA0B,CAAC;QACzG,SAAS,EAAE;YACT,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE;YACpC,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,IAAI,EAAE;SACtC;KACF,CAAC,CAAC;IAEL,IAAI,4BAA4B,IAAI,wBAAwB,EAAE,CAAC;QAC7D,OAAO,CAAC,UAAU,CAAC,UAAU,EAAE;YAC7B,WAAW,EAAE,0CAA0C;YACvD,WAAW,EAAE,CAAC,KAAK,CAAC;YACpB,eAAe;YACf,oBAAoB,EAAE,4BAA4B;YAClD,gBAAgB,EAAE,wBAAwB;SAC3C,CAAC,CAAC;IACL,CAAC;IAED,OAAO,OAAO,CAAC,KAAK,EAAE,CAAC;AACzB,CAAC;AAED,mDAAmD;AACnD,SAAgB,iBAAiB,CAAC,EAChC,IAAI,GAAG,KAAK,EACZ,QAAQ,EACR,mBAAmB,EACnB,cAAc,GAQf;IACC,MAAM,OAAO,GAAG,IAAI,6CAAqB,CAAC,IAAI,EAAE,EAAE,QAAQ,EAAE,MAAM,EAAE,OAAO,EAAE,CAAC,CAAC;IAC/E,IAAI,CAAC,cAAc,EAAE,CAAC;QACpB,OAAO;aACJ,UAAU,CAAC,KAAK,EAAE;YACjB,WAAW,EAAE,4EAA4E;YACzF,WAAW,EAAE,CAAC,KAAK,CAAC;YACpB,eAAe,EAAE,mBAAmB;YACpC,oBAAoB,EAAE,CAAC,cAAc,kBAAQ,CAAC,iBAAiB,EAAE,CAAC;YAClE,gBAAgB,EAAE,CAAC,MAAM,CAAC;SAC3B,CAAC;aACD,UAAU,CAAC,KAAK,EAAE;YACjB,WAAW,EAAE,4EAA4E;YACzF,WAAW,EAAE,CAAC,KAAK,CAAC;YACpB,eAAe,EAAE,mBAAmB;YACpC,oBAAoB,EAAE,CAAC,cAAc,kBAAQ,CAAC,iBAAiB,EAAE,CAAC;YAClE,gBAAgB,EAAE,CAAC,MAAM,CAAC;SAC3B,CAAC,CAAC;IACP,CAAC;IAED,OAAO;SACJ,UAAU,CAAC,KAAK,EAAE;QACjB,WAAW,EAAE,6CAA6C;QAC1D,WAAW,EAAE,CAAC,KAAK,CAAC;QACpB,eAAe,EAAE,mBAAmB;QACpC,4EAA4E;QAC5E,oBAAoB,EAAE,CAAC,GAAG,CAAC;QAC3B,gBAAgB,EAAE,CAAC,IAAI,CAAC;KACzB,CAAC;SACD,UAAU,CAAC,QAAQ,EAAE;QACpB,WAAW,EAAE,8EAA8E;QAC3F,WAAW,EAAE,CAAC,KAAK,CAAC;QACpB,eAAe,EAAE,mBAAmB;QACpC,4EAA4E;QAC5E,oBAAoB,EAAE,CAAC,GAAG,CAAC;QAC3B,gBAAgB,EAAE,CAAC,KAAK,CAAC;KAC1B,CAAC;SACD,UAAU,CAAC,aAAa,EAAE;QACzB,WAAW,EAAE,yFAAyF;QACtG,WAAW,EAAE,CAAC,KAAK,CAAC;QACpB,eAAe,EAAE,mBAAmB;QACpC,oBAAoB,EAAE,CAAC,cAAc,CAAC;QACtC,gBAAgB,EAAE,CAAC,KAAK,CAAC;KAC1B,CAAC,CAAC;IAEL,OAAO;QACL,KAAK;SACJ,UAAU,CAAC,MAAM,EAAE;QAClB,WAAW,EAAE,8CAA8C;QAC3D,eAAe,EAAE,mBAAmB;QACpC,WAAW,EAAE;YACX,SAAS,kBAAQ,CAAC,iBAAiB,YAAY;YAC/C,mBAAmB;YACnB,0BAA0B;YAC1B,yBAAyB;YACzB,sBAAsB;YACtB,2BAA2B;YAC3B,wBAAwB;YACxB,0BAA0B;YAC1B,wBAAwB;YACxB,wCAAwC;YACxC,4BAA4B;YAC5B,4BAA4B;YAC5B,gCAAgC;YAChC,oCAAoC;YACpC,wBAAwB;YACxB,0CAA0C;YAC1C,4BAA4B;YAC5B,oCAAoC;YACpC,GAAG,kBAAQ,CAAC,iBAAiB,oCAAoC;YACjE,WAAW;YACX,iBAAiB;YACjB,2BAA2B;SAC5B;QACD,SAAS,EAAE,CAAC,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE,CAAC;KAClD,CAAC,CAAC;IAEL,OAAO,OAAO,CAAC;AACjB,CAAC"}
@@ -0,0 +1,2 @@
1
+ export * from './commonPolicies';
2
+ export * from './FirewallPolicyBuilder';
@@ -1,2 +1,19 @@
1
1
  "use strict";
2
- //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi9zcmMvdm5ldC9GaXJld2FsbFBvbGljaWVzL2luZGV4LnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiIifQ==
2
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
+ if (k2 === undefined) k2 = k;
4
+ var desc = Object.getOwnPropertyDescriptor(m, k);
5
+ if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
+ desc = { enumerable: true, get: function() { return m[k]; } };
7
+ }
8
+ Object.defineProperty(o, k2, desc);
9
+ }) : (function(o, m, k, k2) {
10
+ if (k2 === undefined) k2 = k;
11
+ o[k2] = m[k];
12
+ }));
13
+ var __exportStar = (this && this.__exportStar) || function(m, exports) {
14
+ for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
15
+ };
16
+ Object.defineProperty(exports, "__esModule", { value: true });
17
+ __exportStar(require("./commonPolicies"), exports);
18
+ __exportStar(require("./FirewallPolicyBuilder"), exports);
19
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi9zcmMvdm5ldC9GaXJld2FsbFBvbGljaWVzL2luZGV4LnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7Ozs7Ozs7Ozs7Ozs7Ozs7QUFBQSxtREFBaUM7QUFDakMsMERBQXdDIn0=
@@ -5,7 +5,7 @@ type IpSku = {
5
5
  /**
6
6
  * Name of a public IP address SKU.
7
7
  */
8
- name: network.PublicIPAddressSkuName;
8
+ name: network.PublicIPAddressSkuName | string;
9
9
  /**
10
10
  * Tier of a public IP address SKU.
11
11
  */
@@ -36,6 +36,7 @@ Object.defineProperty(exports, "__esModule", { value: true });
36
36
  exports.IpAddresses = void 0;
37
37
  const network = __importStar(require("@pulumi/azure-native/network"));
38
38
  const base_1 = require("../base");
39
+ const helpers_1 = require("../helpers");
39
40
  class IpAddresses extends base_1.BaseResourceComponent {
40
41
  ipAddresses = {};
41
42
  constructor(name, args, opts) {
@@ -49,7 +50,7 @@ class IpAddresses extends base_1.BaseResourceComponent {
49
50
  sku: ip.sku ?? sku,
50
51
  publicIPPrefix: prefix ? { id: prefix.id } : undefined,
51
52
  publicIPAllocationMethod: network.IPAllocationMethod.Static,
52
- zones: ip.zones ?? defaultConfig?.zones,
53
+ zones: helpers_1.zoneHelper.getDefaultZones(ip.zones ?? defaultConfig?.zones),
53
54
  }, { ...opts, dependsOn: prefix ? prefix : opts?.dependsOn, parent: this, ignoreChanges: ['natGateway'] });
54
55
  this.ipAddresses[ip.name] = { id: ipAddress.id, resourceName: ipAddress.name, ipAddress: ipAddress.ipAddress };
55
56
  return ipAddress;
@@ -71,4 +72,4 @@ class IpAddresses extends base_1.BaseResourceComponent {
71
72
  }
72
73
  }
73
74
  exports.IpAddresses = IpAddresses;
74
- //# sourceMappingURL=data:application/json;base64,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
75
+ //# sourceMappingURL=data:application/json;base64,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
@@ -1,6 +1,6 @@
1
1
  import * as privateDns from '@pulumi/azure-native/privatedns';
2
2
  import * as pulumi from '@pulumi/pulumi';
3
- import { BaseComponent } from '../base/BaseComponent';
3
+ import { BaseComponent } from '../base';
4
4
  import { DnsRecordTypes, WithResourceGroupInputs } from '../types';
5
5
  export type DnsRecordArgs = Omit<privateDns.PrivateRecordSetArgs, 'privateZoneName' | 'relativeRecordSetName' | 'resourceGroupName' | 'ttl' | 'recordType'> & {
6
6
  recordType: DnsRecordTypes;
@@ -16,23 +16,23 @@ export interface PrivateDnsZoneArgs extends WithResourceGroupInputs {
16
16
  }>>;
17
17
  }
18
18
  export declare class PrivateDnsZone extends BaseComponent<PrivateDnsZoneArgs> {
19
- private _rsName;
20
19
  readonly id: pulumi.Output<string>;
21
20
  readonly resourceName: pulumi.Output<string>;
21
+ private readonly _rsName;
22
22
  constructor(name: string, args: PrivateDnsZoneArgs, opts?: pulumi.ComponentResourceOptions);
23
23
  getOutputs(): {
24
24
  id: pulumi.Output<string>;
25
25
  resourceName: pulumi.Output<string>;
26
26
  };
27
- private createARecord;
28
27
  addARecords(aRecords: Array<{
29
28
  name: string;
30
29
  ipv4Address: pulumi.Input<pulumi.Input<string>[]>;
31
30
  }>): import("@pulumi/azure-native/privatedns/privateRecordSet").PrivateRecordSet[];
32
31
  addRecordSet(name: string, props: DnsRecordArgs): import("@pulumi/azure-native/privatedns/privateRecordSet").PrivateRecordSet;
33
- private createVnetLinks;
34
32
  protected getRsGroupInfo(): {
35
33
  resourceGroupName: pulumi.Input<string>;
36
34
  location: string;
37
35
  };
36
+ private createARecord;
37
+ private createVnetLinks;
38
38
  }