@drunk-pulumi/azure-components 1.0.4 → 1.0.5
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/ResourceBuilder.d.ts +5 -5
- package/ResourceBuilder.js +9 -8
- package/aks/AzKubernetes.d.ts +35 -12
- package/aks/AzKubernetes.js +216 -124
- package/aks/ContainerRegistry.js +2 -1
- package/aks/helpers.d.ts +6 -0
- package/aks/helpers.js +26 -5
- package/aks/types.d.ts +245 -0
- package/aks/types.js +3 -0
- package/apim/Apim.d.ts +6 -3
- package/apim/Apim.js +18 -16
- package/app/AppContainer.d.ts +91 -0
- package/app/AppContainer.js +141 -0
- package/app/AppContainerEnv.d.ts +68 -0
- package/app/AppContainerEnv.js +142 -0
- package/app/index.d.ts +2 -0
- package/app/index.js +3 -1
- package/azAd/AppRegistration.d.ts +9 -12
- package/azAd/AppRegistration.js +15 -12
- package/azAd/CloudflareAzIdentity.d.ts +10 -0
- package/azAd/CloudflareAzIdentity.js +61 -0
- package/azAd/GroupRole.d.ts +1 -1
- package/azAd/GroupRole.js +4 -5
- package/azAd/UserAssignedIdentity.js +6 -6
- package/azAd/helpers/rsRoleDefinition.js +2 -7
- package/azAd/index.d.ts +1 -0
- package/azAd/index.js +2 -1
- package/base/BaseResourceComponent.d.ts +1 -1
- package/base/BaseResourceComponent.js +5 -5
- package/base/helpers.js +2 -2
- package/database/Redis.d.ts +1 -4
- package/database/Redis.js +12 -4
- package/database/helpers.js +3 -3
- package/helpers/autoTags.js +4 -1
- package/helpers/index.d.ts +1 -0
- package/helpers/index.js +3 -2
- package/helpers/stackEnv.d.ts +2 -1
- package/helpers/stackEnv.js +4 -3
- package/helpers/zoneHelper.d.ts +24 -0
- package/helpers/zoneHelper.js +40 -0
- package/logs/Logs.d.ts +6 -16
- package/logs/Logs.js +4 -5
- package/package.json +7 -6
- package/services/ServiceBus.js +2 -1
- package/storage/StorageAccount.d.ts +4 -7
- package/storage/StorageAccount.js +16 -13
- package/types.d.ts +14 -3
- package/vault/helpers.d.ts +7 -4
- package/vault/helpers.js +11 -4
- package/vm/DiskEncryptionSet.js +3 -1
- package/vm/VirtualMachine.d.ts +5 -0
- package/vm/VirtualMachine.js +156 -41
- package/vnet/Basion.js +3 -1
- package/vnet/Firewall.d.ts +8 -13
- package/vnet/Firewall.js +8 -6
- package/vnet/FirewallPolicies/FirewallPolicyBuilder.js +24 -6
- package/vnet/FirewallPolicies/commonPolicies.d.ts +29 -2
- package/vnet/FirewallPolicies/commonPolicies.js +466 -20
- package/vnet/FirewallPolicies/index.d.ts +2 -0
- package/vnet/FirewallPolicies/index.js +18 -1
- package/vnet/IpAddresses.d.ts +1 -1
- package/vnet/IpAddresses.js +3 -2
- package/vnet/PrivateDnsZone.d.ts +4 -4
- package/vnet/PrivateDnsZone.js +17 -17
- package/vnet/PrivateEndpoint.d.ts +2 -5
- package/vnet/PrivateEndpoint.js +6 -1
- package/vnet/VirtualNetwork.d.ts +11 -5
- package/vnet/VirtualNetwork.js +31 -9
- package/vnet/helpers.d.ts +2 -0
- package/vnet/helpers.js +40 -2
|
@@ -1,11 +1,365 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.
|
|
4
|
-
exports.
|
|
3
|
+
exports.allAzurePorts = void 0;
|
|
4
|
+
exports.newFirewallPolicy = newFirewallPolicy;
|
|
5
|
+
exports.defaultAllowedPolicies = defaultAllowedPolicies;
|
|
6
|
+
exports.defaultDeniedPolicies = defaultDeniedPolicies;
|
|
7
|
+
exports.allowsCloudflareTunnels = allowsCloudflareTunnels;
|
|
8
|
+
exports.allowsAksPolicies = allowsAksPolicies;
|
|
5
9
|
const helpers_1 = require("../../helpers");
|
|
6
10
|
const FirewallPolicyBuilder_1 = require("./FirewallPolicyBuilder");
|
|
7
|
-
|
|
8
|
-
|
|
11
|
+
exports.allAzurePorts = [
|
|
12
|
+
'22',
|
|
13
|
+
'443',
|
|
14
|
+
'445',
|
|
15
|
+
'1433',
|
|
16
|
+
'1194',
|
|
17
|
+
'3306',
|
|
18
|
+
'3389',
|
|
19
|
+
'5432',
|
|
20
|
+
'5671',
|
|
21
|
+
'5672',
|
|
22
|
+
'6379',
|
|
23
|
+
'6380',
|
|
24
|
+
'8883',
|
|
25
|
+
'9000',
|
|
26
|
+
'10255',
|
|
27
|
+
];
|
|
28
|
+
function newFirewallPolicy(name, { priority, action }) {
|
|
29
|
+
return new FirewallPolicyBuilder_1.FirewallPolicyBuilder(name, { priority, action });
|
|
30
|
+
}
|
|
31
|
+
function defaultAllowedPolicies({ name = 'default-allows', priority = 100, sourceAddresses, allowsAllApps, allowsAzurePortal, allowsAzureDevOps, allowsOffice365, allowsWindowsUpdate, }) {
|
|
32
|
+
const builder = new FirewallPolicyBuilder_1.FirewallPolicyBuilder(name, { priority, action: 'Allow' });
|
|
33
|
+
if (allowsAllApps) {
|
|
34
|
+
builder.addAppRule('allow-everything', {
|
|
35
|
+
description: 'Allows Everything (Dangerous)',
|
|
36
|
+
sourceAddresses,
|
|
37
|
+
targetFqdns: ['*'],
|
|
38
|
+
protocols: [
|
|
39
|
+
{ protocolType: 'Http', port: 80 },
|
|
40
|
+
{ protocolType: 'Https', port: 443 },
|
|
41
|
+
],
|
|
42
|
+
});
|
|
43
|
+
return builder;
|
|
44
|
+
}
|
|
45
|
+
if (allowsAzurePortal) {
|
|
46
|
+
builder
|
|
47
|
+
.addNetRule('azure-portal-net', {
|
|
48
|
+
description: ' Allows Azure Portal Access',
|
|
49
|
+
ipProtocols: ['TCP', 'UDP'],
|
|
50
|
+
sourceAddresses,
|
|
51
|
+
destinationAddresses: [`AzureCloud.${helpers_1.azureEnv.currentRegionCode}`, `Sql.${helpers_1.azureEnv.currentRegionCode}`],
|
|
52
|
+
destinationPorts: exports.allAzurePorts,
|
|
53
|
+
})
|
|
54
|
+
.addAppRule('azure-apps', {
|
|
55
|
+
description: 'Allows Windows Updates',
|
|
56
|
+
sourceAddresses,
|
|
57
|
+
targetFqdns: ['AzureBackup', 'AzureKubernetesService', 'AzureActiveDirectoryDomainServices'],
|
|
58
|
+
protocols: [{ protocolType: 'Https', port: 443 }],
|
|
59
|
+
})
|
|
60
|
+
.addAppRule('azure-portal-app', {
|
|
61
|
+
description: ' Allows Azure Portal Access',
|
|
62
|
+
sourceAddresses,
|
|
63
|
+
targetFqdns: [
|
|
64
|
+
'*.azure.com',
|
|
65
|
+
'*.azure.net',
|
|
66
|
+
'*.microsoftonline.com',
|
|
67
|
+
'*.msauth.net',
|
|
68
|
+
'*.msauthimages.net',
|
|
69
|
+
'*.msecnd.net',
|
|
70
|
+
'*.msftauth.net',
|
|
71
|
+
'*.msftauthimages.net',
|
|
72
|
+
'www.microsoft.com',
|
|
73
|
+
'learn.microsoft.com',
|
|
74
|
+
],
|
|
75
|
+
protocols: [
|
|
76
|
+
{ protocolType: 'Http', port: 80 },
|
|
77
|
+
{ protocolType: 'Https', port: 443 },
|
|
78
|
+
],
|
|
79
|
+
});
|
|
80
|
+
}
|
|
81
|
+
if (allowsAzureDevOps) {
|
|
82
|
+
builder.addAppRule('azure-devops-app', {
|
|
83
|
+
description: 'Allows Azure DevOps Access',
|
|
84
|
+
sourceAddresses,
|
|
85
|
+
targetFqdns: [
|
|
86
|
+
//Core Azure DevOps
|
|
87
|
+
'*.dev.azure.com',
|
|
88
|
+
'aex.dev.azure.com',
|
|
89
|
+
'app.vssps.dev.azure.com',
|
|
90
|
+
'vsrm.dev.azure.com',
|
|
91
|
+
'download.agent.dev.azure.com',
|
|
92
|
+
'dataimport.dev.azure.com',
|
|
93
|
+
//Visual Studio & Legacy
|
|
94
|
+
'*.visualstudio.com',
|
|
95
|
+
'*.vsrm.visualstudio.com',
|
|
96
|
+
'*.vstmr.visualstudio.com',
|
|
97
|
+
'*.pkgs.visualstudio.com',
|
|
98
|
+
'*.vssps.visualstudio.com',
|
|
99
|
+
'*.vsblob.visualstudio.com',
|
|
100
|
+
'aexprodea1.vsaex.visualstudio.com',
|
|
101
|
+
//Azure DevOps Assets & CDN
|
|
102
|
+
'*.vsassets.io',
|
|
103
|
+
'*.vstmrblob.vsassets.io',
|
|
104
|
+
'*.gallerycdn.vsassets.io',
|
|
105
|
+
'cdn.vsassets.io',
|
|
106
|
+
'*.vsassetscdn.azure.cn',
|
|
107
|
+
'*.gallerycdn.azure.cn',
|
|
108
|
+
//Azure Artifacts
|
|
109
|
+
'*.blob.core.windows.net',
|
|
110
|
+
'*.dedup.microsoft.com',
|
|
111
|
+
//NuGet
|
|
112
|
+
'*.azurewebsites.net',
|
|
113
|
+
'*.nuget.org',
|
|
114
|
+
//SSH
|
|
115
|
+
'ssh.dev.azure.com',
|
|
116
|
+
'vs-ssh.visualstudio.com',
|
|
117
|
+
//Common Microsoft Services
|
|
118
|
+
'azure.microsoft.com',
|
|
119
|
+
'management.azure.com',
|
|
120
|
+
'management.core.windows.net',
|
|
121
|
+
'graph.microsoft.com',
|
|
122
|
+
'static2.sharepointonline.com',
|
|
123
|
+
'amp.azure.net',
|
|
124
|
+
//MSA Authentication (for MSA-backed orgs)
|
|
125
|
+
'live.com',
|
|
126
|
+
'login.live.com',
|
|
127
|
+
//Billing
|
|
128
|
+
'*.vscommerce.visualstudio.com',
|
|
129
|
+
//CDN Auth
|
|
130
|
+
'aadcdn.msauth.net',
|
|
131
|
+
'aadcdn.msftauth.net',
|
|
132
|
+
'amcdn.msftauth.net',
|
|
133
|
+
'azurecomcdn.azureedge.net',
|
|
134
|
+
],
|
|
135
|
+
protocols: [{ protocolType: 'Https', port: 443 }],
|
|
136
|
+
});
|
|
137
|
+
}
|
|
138
|
+
if (allowsOffice365) {
|
|
139
|
+
builder.addAppRule('office365-app', {
|
|
140
|
+
description: 'Allows Microsoft 365/Office 365 Access',
|
|
141
|
+
sourceAddresses,
|
|
142
|
+
targetFqdns: [
|
|
143
|
+
//Microsoft 365 Unified Domains
|
|
144
|
+
'*.cloud.microsoft',
|
|
145
|
+
'*.static.microsoft',
|
|
146
|
+
'*.usercontent.microsoft',
|
|
147
|
+
//Exchange Online
|
|
148
|
+
'outlook.cloud.microsoft',
|
|
149
|
+
'outlook.office.com',
|
|
150
|
+
'outlook.office365.com',
|
|
151
|
+
'*.outlook.com',
|
|
152
|
+
'*.protection.outlook.com',
|
|
153
|
+
'*.mail.protection.outlook.com',
|
|
154
|
+
'*.mx.microsoft',
|
|
155
|
+
'smtp.office365.com',
|
|
156
|
+
//SharePoint Online and OneDrive
|
|
157
|
+
'*.sharepoint.com',
|
|
158
|
+
'*.sharepointonline.com',
|
|
159
|
+
'storage.live.com',
|
|
160
|
+
'*.search.production.apac.trafficmanager.net',
|
|
161
|
+
'*.search.production.emea.trafficmanager.net',
|
|
162
|
+
'*.search.production.us.trafficmanager.net',
|
|
163
|
+
'*.wns.windows.com',
|
|
164
|
+
'admin.onedrive.com',
|
|
165
|
+
'officeclient.microsoft.com',
|
|
166
|
+
'g.live.com',
|
|
167
|
+
'oneclient.sfx.ms',
|
|
168
|
+
'spoprod-a.akamaihd.net',
|
|
169
|
+
'*.svc.ms',
|
|
170
|
+
//Microsoft Teams
|
|
171
|
+
'*.lync.com',
|
|
172
|
+
'*.teams.cloud.microsoft',
|
|
173
|
+
'*.teams.microsoft.com',
|
|
174
|
+
'teams.cloud.microsoft',
|
|
175
|
+
'teams.microsoft.com',
|
|
176
|
+
'*.keydelivery.mediaservices.windows.net',
|
|
177
|
+
'*.streaming.mediaservices.windows.net',
|
|
178
|
+
'aka.ms',
|
|
179
|
+
'adl.windows.com',
|
|
180
|
+
'join.secure.skypeassets.com',
|
|
181
|
+
'mlccdnprod.azureedge.net',
|
|
182
|
+
'*.skype.com',
|
|
183
|
+
//Microsoft 365 Common and Office Online
|
|
184
|
+
'*.officeapps.live.com',
|
|
185
|
+
'*.online.office.com',
|
|
186
|
+
'office.live.com',
|
|
187
|
+
'*.office.net',
|
|
188
|
+
'*.onenote.com',
|
|
189
|
+
'*cdn.onenote.net',
|
|
190
|
+
'ajax.aspnetcdn.com',
|
|
191
|
+
'apis.live.net',
|
|
192
|
+
'officeapps.live.com',
|
|
193
|
+
'www.onedrive.com',
|
|
194
|
+
//Authentication & Identity
|
|
195
|
+
'*.auth.microsoft.com',
|
|
196
|
+
'*.msftidentity.com',
|
|
197
|
+
'*.msidentity.com',
|
|
198
|
+
'account.activedirectory.windowsazure.com',
|
|
199
|
+
'accounts.accesscontrol.windows.net',
|
|
200
|
+
'adminwebservice.microsoftonline.com',
|
|
201
|
+
'api.passwordreset.microsoftonline.com',
|
|
202
|
+
'autologon.microsoftazuread-sso.com',
|
|
203
|
+
'becws.microsoftonline.com',
|
|
204
|
+
'ccs.login.microsoftonline.com',
|
|
205
|
+
'clientconfig.microsoftonline-p.net',
|
|
206
|
+
'companymanager.microsoftonline.com',
|
|
207
|
+
'device.login.microsoftonline.com',
|
|
208
|
+
'login-us.microsoftonline.com',
|
|
209
|
+
'login.microsoft.com',
|
|
210
|
+
'login.microsoftonline-p.com',
|
|
211
|
+
'login.microsoftonline.com',
|
|
212
|
+
'login.windows.net',
|
|
213
|
+
'logincert.microsoftonline.com',
|
|
214
|
+
'loginex.microsoftonline.com',
|
|
215
|
+
'nexus.microsoftonline-p.com',
|
|
216
|
+
'passwordreset.microsoftonline.com',
|
|
217
|
+
'provisioningapi.microsoftonline.com',
|
|
218
|
+
'*.hip.live.com',
|
|
219
|
+
'*.microsoftonline-p.com',
|
|
220
|
+
'*.microsoftonline.com',
|
|
221
|
+
'*.msauth.net',
|
|
222
|
+
'*.msauthimages.net',
|
|
223
|
+
'*.msecnd.net',
|
|
224
|
+
'*.msftauth.net',
|
|
225
|
+
'*.msftauthimages.net',
|
|
226
|
+
'*.phonefactor.net',
|
|
227
|
+
'enterpriseregistration.windows.net',
|
|
228
|
+
//Security & Compliance
|
|
229
|
+
'*.protection.office.com',
|
|
230
|
+
'*.security.microsoft.com',
|
|
231
|
+
'compliance.microsoft.com',
|
|
232
|
+
'defender.microsoft.com',
|
|
233
|
+
'protection.office.com',
|
|
234
|
+
'purview.microsoft.com',
|
|
235
|
+
'security.microsoft.com',
|
|
236
|
+
'*.portal.cloudappsecurity.com',
|
|
237
|
+
//Telemetry & Diagnostics
|
|
238
|
+
'*.aria.microsoft.com',
|
|
239
|
+
'*.events.data.microsoft.com',
|
|
240
|
+
//Common Services
|
|
241
|
+
'*.o365weve.com',
|
|
242
|
+
'appsforoffice.microsoft.com',
|
|
243
|
+
'assets.onestore.ms',
|
|
244
|
+
'auth.gfx.ms',
|
|
245
|
+
'c1.microsoft.com',
|
|
246
|
+
'dgps.support.microsoft.com',
|
|
247
|
+
'docs.microsoft.com',
|
|
248
|
+
'msdn.microsoft.com',
|
|
249
|
+
'platform.linkedin.com',
|
|
250
|
+
'prod.msocdn.com',
|
|
251
|
+
'shellprod.msocdn.com',
|
|
252
|
+
'support.microsoft.com',
|
|
253
|
+
'technet.microsoft.com',
|
|
254
|
+
'*.office365.com',
|
|
255
|
+
//Information Protection
|
|
256
|
+
'*.aadrm.com',
|
|
257
|
+
'*.azurerms.com',
|
|
258
|
+
'*.informationprotection.azure.com',
|
|
259
|
+
'ecn.dev.virtualearth.net',
|
|
260
|
+
'informationprotection.hosting.portal.azure.net',
|
|
261
|
+
//Other Services
|
|
262
|
+
'dc.services.visualstudio.com',
|
|
263
|
+
'mem.gfx.ms',
|
|
264
|
+
'*.microsoft.com',
|
|
265
|
+
'*.msocdn.com',
|
|
266
|
+
'*.onmicrosoft.com',
|
|
267
|
+
'o15.officeredir.microsoft.com',
|
|
268
|
+
'officepreviewredir.microsoft.com',
|
|
269
|
+
'officeredir.microsoft.com',
|
|
270
|
+
'r.office.microsoft.com',
|
|
271
|
+
'activation.sls.microsoft.com',
|
|
272
|
+
'crl.microsoft.com',
|
|
273
|
+
'office15client.microsoft.com',
|
|
274
|
+
'cdn.odc.officeapps.live.com',
|
|
275
|
+
'officecdn.microsoft.com',
|
|
276
|
+
'officecdn.microsoft.com.edgesuite.net',
|
|
277
|
+
'otelrules.azureedge.net',
|
|
278
|
+
//Optional Services
|
|
279
|
+
'*.virtualearth.net',
|
|
280
|
+
'c.bing.net',
|
|
281
|
+
'ocos-office365-s2s.msedge.net',
|
|
282
|
+
'tse1.mm.bing.net',
|
|
283
|
+
'www.bing.com',
|
|
284
|
+
'*.acompli.net',
|
|
285
|
+
'*.outlookmobile.com',
|
|
286
|
+
'login.windows-ppe.net',
|
|
287
|
+
'account.live.com',
|
|
288
|
+
'www.acompli.com',
|
|
289
|
+
'*.appex-rf.msn.com',
|
|
290
|
+
'*.appex.bing.com',
|
|
291
|
+
'c.live.com',
|
|
292
|
+
'partnerservices.getmicrosoftkey.com',
|
|
293
|
+
'signup.live.com',
|
|
294
|
+
'*.assets-yammer.com',
|
|
295
|
+
'www.outlook.com',
|
|
296
|
+
'eus-www.sway-cdn.com',
|
|
297
|
+
'eus-www.sway-extensions.com',
|
|
298
|
+
'wus-www.sway-cdn.com',
|
|
299
|
+
'wus-www.sway-extensions.com',
|
|
300
|
+
'sway.com',
|
|
301
|
+
'www.sway.com',
|
|
302
|
+
//Certificate Authorities
|
|
303
|
+
'*.entrust.net',
|
|
304
|
+
'*.geotrust.com',
|
|
305
|
+
'*.omniroot.com',
|
|
306
|
+
'*.public-trust.com',
|
|
307
|
+
'*.symcb.com',
|
|
308
|
+
'*.symcd.com',
|
|
309
|
+
'*.verisign.com',
|
|
310
|
+
'*.verisign.net',
|
|
311
|
+
'cacerts.digicert.com',
|
|
312
|
+
'cert.int-x3.letsencrypt.org',
|
|
313
|
+
'crl.globalsign.com',
|
|
314
|
+
'crl.globalsign.net',
|
|
315
|
+
'crl.identrust.com',
|
|
316
|
+
'crl3.digicert.com',
|
|
317
|
+
'crl4.digicert.com',
|
|
318
|
+
'isrg.trustid.ocsp.identrust.com',
|
|
319
|
+
'mscrl.microsoft.com',
|
|
320
|
+
'ocsp.digicert.com',
|
|
321
|
+
'ocsp.globalsign.com',
|
|
322
|
+
'ocsp.msocsp.com',
|
|
323
|
+
'ocsp2.globalsign.com',
|
|
324
|
+
'ocspx.digicert.com',
|
|
325
|
+
'oneocsp.microsoft.com',
|
|
326
|
+
'secure.globalsign.com',
|
|
327
|
+
'www.digicert.com',
|
|
328
|
+
'www.microsoft.com',
|
|
329
|
+
//Office Features
|
|
330
|
+
'officespeech.platform.bing.com',
|
|
331
|
+
'*.office.com',
|
|
332
|
+
'www.microsoft365.com',
|
|
333
|
+
'*.microsoftusercontent.com',
|
|
334
|
+
'*.azure-apim.net',
|
|
335
|
+
'*.flow.microsoft.com',
|
|
336
|
+
'*.powerapps.com',
|
|
337
|
+
'*.powerautomate.com',
|
|
338
|
+
'*.activity.windows.com',
|
|
339
|
+
'activity.windows.com',
|
|
340
|
+
'*.cortana.ai',
|
|
341
|
+
'admin.microsoft.com',
|
|
342
|
+
'cdn.uci.officeapps.live.com',
|
|
343
|
+
],
|
|
344
|
+
protocols: [
|
|
345
|
+
{ protocolType: 'Http', port: 80 },
|
|
346
|
+
{ protocolType: 'Https', port: 443 },
|
|
347
|
+
],
|
|
348
|
+
});
|
|
349
|
+
}
|
|
350
|
+
if (allowsWindowsUpdate) {
|
|
351
|
+
builder.addAppRule('windows-update-app', {
|
|
352
|
+
description: 'Allows Windows Updates',
|
|
353
|
+
sourceAddresses,
|
|
354
|
+
targetFqdns: ['WindowsUpdate', 'WindowsDiagnostics'],
|
|
355
|
+
protocols: [{ protocolType: 'Https', port: 443 }],
|
|
356
|
+
});
|
|
357
|
+
}
|
|
358
|
+
return builder;
|
|
359
|
+
}
|
|
360
|
+
function defaultDeniedPolicies(priority = 6001) {
|
|
361
|
+
return new FirewallPolicyBuilder_1.FirewallPolicyBuilder('default-denied', { priority, action: 'Deny' })
|
|
362
|
+
.addAppRule('deny-everything-else', {
|
|
9
363
|
description: 'Default Deny Everything Else',
|
|
10
364
|
protocols: [
|
|
11
365
|
{ protocolType: 'Http', port: 80 },
|
|
@@ -14,31 +368,109 @@ function getDefaultPolicies(priority = 6001) {
|
|
|
14
368
|
],
|
|
15
369
|
sourceAddresses: ['*'],
|
|
16
370
|
targetFqdns: ['*'],
|
|
371
|
+
})
|
|
372
|
+
.build();
|
|
373
|
+
}
|
|
374
|
+
function allowsCloudflareTunnels({ name = 'cf-tunnels', priority, sourceAddresses, internalDestinationAddresses, internalDestinationPorts, }) {
|
|
375
|
+
const builder = new FirewallPolicyBuilder_1.FirewallPolicyBuilder(name, { priority, action: 'Allow' })
|
|
376
|
+
.addNetRule('net', {
|
|
377
|
+
description: 'Allows CF Tunnel to access to Cloudflare.',
|
|
378
|
+
ipProtocols: ['TCP', 'UDP'],
|
|
379
|
+
sourceAddresses,
|
|
380
|
+
destinationAddresses: [
|
|
381
|
+
'198.41.192.167',
|
|
382
|
+
'198.41.192.67',
|
|
383
|
+
'198.41.192.57',
|
|
384
|
+
'198.41.192.107',
|
|
385
|
+
'198.41.192.27',
|
|
386
|
+
'198.41.192.7',
|
|
387
|
+
'198.41.192.227',
|
|
388
|
+
'198.41.192.47',
|
|
389
|
+
'198.41.192.37',
|
|
390
|
+
'198.41.192.77',
|
|
391
|
+
'198.41.200.13',
|
|
392
|
+
'198.41.200.193',
|
|
393
|
+
'198.41.200.33',
|
|
394
|
+
'198.41.200.233',
|
|
395
|
+
'198.41.200.53',
|
|
396
|
+
'198.41.200.63',
|
|
397
|
+
'198.41.200.113',
|
|
398
|
+
'198.41.200.73',
|
|
399
|
+
'198.41.200.43',
|
|
400
|
+
'198.41.200.23',
|
|
401
|
+
],
|
|
402
|
+
destinationPorts: ['7844'],
|
|
403
|
+
})
|
|
404
|
+
.addAppRule('app', {
|
|
405
|
+
description: 'Allows CF Tunnel to access to Cloudflare.',
|
|
406
|
+
sourceAddresses,
|
|
407
|
+
targetFqdns: ['*.argotunnel.com', '*.cftunnel.com', '*.cloudflareaccess.com', '*.cloudflareresearch.com'],
|
|
408
|
+
protocols: [
|
|
409
|
+
{ protocolType: 'Https', port: 443 },
|
|
410
|
+
{ protocolType: 'Https', port: 7844 },
|
|
411
|
+
],
|
|
17
412
|
});
|
|
413
|
+
if (internalDestinationAddresses && internalDestinationPorts) {
|
|
414
|
+
builder.addNetRule('internal', {
|
|
415
|
+
description: 'Allows CF Tunnel to access to Internals.',
|
|
416
|
+
ipProtocols: ['TCP'],
|
|
417
|
+
sourceAddresses,
|
|
418
|
+
destinationAddresses: internalDestinationAddresses,
|
|
419
|
+
destinationPorts: internalDestinationPorts,
|
|
420
|
+
});
|
|
421
|
+
}
|
|
422
|
+
return builder.build();
|
|
18
423
|
}
|
|
19
424
|
/** These rules are not required for Private AKS */
|
|
20
|
-
function
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
425
|
+
function allowsAksPolicies({ name = 'aks', priority, subnetAddressSpaces, privateCluster, }) {
|
|
426
|
+
const builder = new FirewallPolicyBuilder_1.FirewallPolicyBuilder(name, { priority, action: 'Allow' });
|
|
427
|
+
if (!privateCluster) {
|
|
428
|
+
builder
|
|
429
|
+
.addNetRule('udp', {
|
|
430
|
+
description: 'For tunneled secure communication between the nodes and the control plane.',
|
|
431
|
+
ipProtocols: ['UDP'],
|
|
432
|
+
sourceAddresses: subnetAddressSpaces,
|
|
433
|
+
destinationAddresses: [`AzureCloud.${helpers_1.azureEnv.currentRegionCode}`],
|
|
434
|
+
destinationPorts: ['1194'],
|
|
435
|
+
})
|
|
436
|
+
.addNetRule('tcp', {
|
|
437
|
+
description: 'For tunneled secure communication between the nodes and the control plane.',
|
|
438
|
+
ipProtocols: ['TCP'],
|
|
439
|
+
sourceAddresses: subnetAddressSpaces,
|
|
440
|
+
destinationAddresses: [`AzureCloud.${helpers_1.azureEnv.currentRegionCode}`],
|
|
441
|
+
destinationPorts: ['9000'],
|
|
442
|
+
});
|
|
443
|
+
}
|
|
444
|
+
builder
|
|
445
|
+
.addNetRule('dns', {
|
|
446
|
+
description: 'Allows DNS resolution for the cluster nodes',
|
|
25
447
|
ipProtocols: ['UDP'],
|
|
26
448
|
sourceAddresses: subnetAddressSpaces,
|
|
27
|
-
|
|
28
|
-
|
|
449
|
+
//The basic firewall is not allows destinationFqdns tags, so we use wildcard
|
|
450
|
+
destinationAddresses: ['*'],
|
|
451
|
+
destinationPorts: ['53'],
|
|
29
452
|
})
|
|
30
|
-
.addNetRule('
|
|
31
|
-
description: '
|
|
32
|
-
ipProtocols: ['
|
|
453
|
+
.addNetRule('ubuntu', {
|
|
454
|
+
description: 'Required for Network Time Protocol (NTP) time synchronization on Linux nodes',
|
|
455
|
+
ipProtocols: ['UDP'],
|
|
33
456
|
sourceAddresses: subnetAddressSpaces,
|
|
34
|
-
|
|
35
|
-
|
|
457
|
+
//The basic firewall is not allows destinationFqdns tags, so we use wildcard
|
|
458
|
+
destinationAddresses: ['*'],
|
|
459
|
+
destinationPorts: ['123'],
|
|
36
460
|
})
|
|
461
|
+
.addNetRule('aks-monitor', {
|
|
462
|
+
description: 'This endpoint is used to send metrics data and logs to Azure Monitor and Log Analytics.',
|
|
463
|
+
ipProtocols: ['TCP'],
|
|
464
|
+
sourceAddresses: subnetAddressSpaces,
|
|
465
|
+
destinationAddresses: ['AzureMonitor'],
|
|
466
|
+
destinationPorts: ['443'],
|
|
467
|
+
});
|
|
468
|
+
builder
|
|
37
469
|
//App
|
|
38
|
-
.addAppRule('
|
|
470
|
+
.addAppRule('acrs', {
|
|
39
471
|
description: 'Allows pods to access AzureKubernetesService',
|
|
40
472
|
sourceAddresses: subnetAddressSpaces,
|
|
41
|
-
|
|
473
|
+
targetFqdns: [
|
|
42
474
|
`*.hcp.${helpers_1.azureEnv.currentRegionCode}.azmk8s.io`,
|
|
43
475
|
'mcr.microsoft.com',
|
|
44
476
|
'*.data.mcr.microsoft.com',
|
|
@@ -48,8 +480,22 @@ function getAksPolicies(name, { priority, subnetAddressSpaces, }) {
|
|
|
48
480
|
'packages.microsoft.com',
|
|
49
481
|
'acs-mirror.azureedge.net',
|
|
50
482
|
'packages.aks.azure.com',
|
|
483
|
+
//Defender for Containers and Monitoring
|
|
484
|
+
'*.ods.opinsights.azure.com',
|
|
485
|
+
'*.oms.opinsights.azure.com',
|
|
486
|
+
'*.cloud.defender.microsoft.com',
|
|
487
|
+
'*.in.applicationinsights.azure.com',
|
|
488
|
+
'*.monitoring.azure.com',
|
|
489
|
+
'global.handler.control.monitor.azure.com',
|
|
490
|
+
'*.ingest.monitor.azure.com',
|
|
491
|
+
'*.metrics.ingest.monitor.azure.com',
|
|
492
|
+
`${helpers_1.azureEnv.currentRegionCode}.handler.control.monitor.azure.com`,
|
|
493
|
+
//Key Vault
|
|
494
|
+
'vault.azure.net',
|
|
495
|
+
'*.vault.usgovcloudapi.net',
|
|
51
496
|
],
|
|
52
497
|
protocols: [{ protocolType: 'Https', port: 443 }],
|
|
53
|
-
})
|
|
498
|
+
});
|
|
499
|
+
return builder;
|
|
54
500
|
}
|
|
55
|
-
//# sourceMappingURL=data:application/json;base64,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
|
|
501
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"commonPolicies.js","sourceRoot":"","sources":["../../../src/vnet/FirewallPolicies/commonPolicies.ts"],"names":[],"mappings":";;;AAsBA,8CAEC;AAED,wDAiWC;AAED,sDAaC;AAED,0DAiEC;AAGD,8CA0FC;AAziBD,2CAAyC;AACzC,mEAAgE;AAEnD,QAAA,aAAa,GAAG;IAC3B,IAAI;IACJ,KAAK;IACL,KAAK;IACL,MAAM;IACN,MAAM;IACN,MAAM;IACN,MAAM;IACN,MAAM;IACN,MAAM;IACN,MAAM;IACN,MAAM;IACN,MAAM;IACN,MAAM;IACN,MAAM;IACN,OAAO;CACR,CAAC;AAEF,SAAgB,iBAAiB,CAAC,IAAY,EAAE,EAAE,QAAQ,EAAE,MAAM,EAAkD;IAClH,OAAO,IAAI,6CAAqB,CAAC,IAAI,EAAE,EAAE,QAAQ,EAAE,MAAM,EAAE,CAAC,CAAC;AAC/D,CAAC;AAED,SAAgB,sBAAsB,CAAC,EACrC,IAAI,GAAG,gBAAgB,EACvB,QAAQ,GAAG,GAAG,EACd,eAAe,EACf,aAAa,EACb,iBAAiB,EACjB,iBAAiB,EACjB,eAAe,EACf,mBAAmB,GAWpB;IACC,MAAM,OAAO,GAAG,IAAI,6CAAqB,CAAC,IAAI,EAAE,EAAE,QAAQ,EAAE,MAAM,EAAE,OAAO,EAAE,CAAC,CAAC;IAE/E,IAAI,aAAa,EAAE,CAAC;QAClB,OAAO,CAAC,UAAU,CAAC,kBAAkB,EAAE;YACrC,WAAW,EAAE,+BAA+B;YAC5C,eAAe;YACf,WAAW,EAAE,CAAC,GAAG,CAAC;YAClB,SAAS,EAAE;gBACT,EAAE,YAAY,EAAE,MAAM,EAAE,IAAI,EAAE,EAAE,EAAE;gBAClC,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE;aACrC;SACF,CAAC,CAAC;QACH,OAAO,OAAO,CAAC;IACjB,CAAC;IAED,IAAI,iBAAiB,EAAE,CAAC;QACtB,OAAO;aACJ,UAAU,CAAC,kBAAkB,EAAE;YAC9B,WAAW,EAAE,6BAA6B;YAC1C,WAAW,EAAE,CAAC,KAAK,EAAE,KAAK,CAAC;YAC3B,eAAe;YACf,oBAAoB,EAAE,CAAC,cAAc,kBAAQ,CAAC,iBAAiB,EAAE,EAAE,OAAO,kBAAQ,CAAC,iBAAiB,EAAE,CAAC;YACvG,gBAAgB,EAAE,qBAAa;SAChC,CAAC;aACD,UAAU,CAAC,YAAY,EAAE;YACxB,WAAW,EAAE,wBAAwB;YACrC,eAAe;YACf,WAAW,EAAE,CAAC,aAAa,EAAE,wBAAwB,EAAE,oCAAoC,CAAC;YAC5F,SAAS,EAAE,CAAC,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE,CAAC;SAClD,CAAC;aACD,UAAU,CAAC,kBAAkB,EAAE;YAC9B,WAAW,EAAE,6BAA6B;YAC1C,eAAe;YACf,WAAW,EAAE;gBACX,aAAa;gBACb,aAAa;gBACb,uBAAuB;gBACvB,cAAc;gBACd,oBAAoB;gBACpB,cAAc;gBACd,gBAAgB;gBAChB,sBAAsB;gBACtB,mBAAmB;gBACnB,qBAAqB;aACtB;YACD,SAAS,EAAE;gBACT,EAAE,YAAY,EAAE,MAAM,EAAE,IAAI,EAAE,EAAE,EAAE;gBAClC,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE;aACrC;SACF,CAAC,CAAC;IACP,CAAC;IAED,IAAI,iBAAiB,EAAE,CAAC;QACtB,OAAO,CAAC,UAAU,CAAC,kBAAkB,EAAE;YACrC,WAAW,EAAE,4BAA4B;YACzC,eAAe;YACf,WAAW,EAAE;gBACX,mBAAmB;gBACnB,iBAAiB;gBACjB,mBAAmB;gBACnB,yBAAyB;gBACzB,oBAAoB;gBACpB,8BAA8B;gBAC9B,0BAA0B;gBAC1B,wBAAwB;gBACxB,oBAAoB;gBACpB,yBAAyB;gBACzB,0BAA0B;gBAC1B,yBAAyB;gBACzB,0BAA0B;gBAC1B,2BAA2B;gBAC3B,mCAAmC;gBACnC,2BAA2B;gBAC3B,eAAe;gBACf,yBAAyB;gBACzB,0BAA0B;gBAC1B,iBAAiB;gBACjB,wBAAwB;gBACxB,uBAAuB;gBACvB,iBAAiB;gBACjB,yBAAyB;gBACzB,uBAAuB;gBACvB,OAAO;gBACP,qBAAqB;gBACrB,aAAa;gBACb,KAAK;gBACL,mBAAmB;gBACnB,yBAAyB;gBACzB,2BAA2B;gBAC3B,qBAAqB;gBACrB,sBAAsB;gBACtB,6BAA6B;gBAC7B,qBAAqB;gBACrB,8BAA8B;gBAC9B,eAAe;gBACf,0CAA0C;gBAC1C,UAAU;gBACV,gBAAgB;gBAChB,SAAS;gBACT,+BAA+B;gBAC/B,UAAU;gBACV,mBAAmB;gBACnB,qBAAqB;gBACrB,oBAAoB;gBACpB,2BAA2B;aAC5B;YACD,SAAS,EAAE,CAAC,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE,CAAC;SAClD,CAAC,CAAC;IACL,CAAC;IAED,IAAI,eAAe,EAAE,CAAC;QACpB,OAAO,CAAC,UAAU,CAAC,eAAe,EAAE;YAClC,WAAW,EAAE,wCAAwC;YACrD,eAAe;YACf,WAAW,EAAE;gBACX,+BAA+B;gBAC/B,mBAAmB;gBACnB,oBAAoB;gBACpB,yBAAyB;gBACzB,iBAAiB;gBACjB,yBAAyB;gBACzB,oBAAoB;gBACpB,uBAAuB;gBACvB,eAAe;gBACf,0BAA0B;gBAC1B,+BAA+B;gBAC/B,gBAAgB;gBAChB,oBAAoB;gBACpB,gCAAgC;gBAChC,kBAAkB;gBAClB,wBAAwB;gBACxB,kBAAkB;gBAClB,6CAA6C;gBAC7C,6CAA6C;gBAC7C,2CAA2C;gBAC3C,mBAAmB;gBACnB,oBAAoB;gBACpB,4BAA4B;gBAC5B,YAAY;gBACZ,kBAAkB;gBAClB,wBAAwB;gBACxB,UAAU;gBACV,iBAAiB;gBACjB,YAAY;gBACZ,yBAAyB;gBACzB,uBAAuB;gBACvB,uBAAuB;gBACvB,qBAAqB;gBACrB,yCAAyC;gBACzC,uCAAuC;gBACvC,QAAQ;gBACR,iBAAiB;gBACjB,6BAA6B;gBAC7B,0BAA0B;gBAC1B,aAAa;gBACb,wCAAwC;gBACxC,uBAAuB;gBACvB,qBAAqB;gBACrB,iBAAiB;gBACjB,cAAc;gBACd,eAAe;gBACf,kBAAkB;gBAClB,oBAAoB;gBACpB,eAAe;gBACf,qBAAqB;gBACrB,kBAAkB;gBAClB,2BAA2B;gBAC3B,sBAAsB;gBACtB,oBAAoB;gBACpB,kBAAkB;gBAClB,0CAA0C;gBAC1C,oCAAoC;gBACpC,qCAAqC;gBACrC,uCAAuC;gBACvC,oCAAoC;gBACpC,2BAA2B;gBAC3B,+BAA+B;gBAC/B,oCAAoC;gBACpC,oCAAoC;gBACpC,kCAAkC;gBAClC,8BAA8B;gBAC9B,qBAAqB;gBACrB,6BAA6B;gBAC7B,2BAA2B;gBAC3B,mBAAmB;gBACnB,+BAA+B;gBAC/B,6BAA6B;gBAC7B,6BAA6B;gBAC7B,mCAAmC;gBACnC,qCAAqC;gBACrC,gBAAgB;gBAChB,yBAAyB;gBACzB,uBAAuB;gBACvB,cAAc;gBACd,oBAAoB;gBACpB,cAAc;gBACd,gBAAgB;gBAChB,sBAAsB;gBACtB,mBAAmB;gBACnB,oCAAoC;gBACpC,uBAAuB;gBACvB,yBAAyB;gBACzB,0BAA0B;gBAC1B,0BAA0B;gBAC1B,wBAAwB;gBACxB,uBAAuB;gBACvB,uBAAuB;gBACvB,wBAAwB;gBACxB,+BAA+B;gBAC/B,yBAAyB;gBACzB,sBAAsB;gBACtB,6BAA6B;gBAC7B,iBAAiB;gBACjB,gBAAgB;gBAChB,6BAA6B;gBAC7B,oBAAoB;gBACpB,aAAa;gBACb,kBAAkB;gBAClB,4BAA4B;gBAC5B,oBAAoB;gBACpB,oBAAoB;gBACpB,uBAAuB;gBACvB,iBAAiB;gBACjB,sBAAsB;gBACtB,uBAAuB;gBACvB,uBAAuB;gBACvB,iBAAiB;gBACjB,wBAAwB;gBACxB,aAAa;gBACb,gBAAgB;gBAChB,mCAAmC;gBACnC,0BAA0B;gBAC1B,gDAAgD;gBAChD,gBAAgB;gBAChB,8BAA8B;gBAC9B,YAAY;gBACZ,iBAAiB;gBACjB,cAAc;gBACd,mBAAmB;gBACnB,+BAA+B;gBAC/B,kCAAkC;gBAClC,2BAA2B;gBAC3B,wBAAwB;gBACxB,8BAA8B;gBAC9B,mBAAmB;gBACnB,8BAA8B;gBAC9B,6BAA6B;gBAC7B,yBAAyB;gBACzB,uCAAuC;gBACvC,yBAAyB;gBACzB,mBAAmB;gBACnB,oBAAoB;gBACpB,YAAY;gBACZ,+BAA+B;gBAC/B,kBAAkB;gBAClB,cAAc;gBACd,eAAe;gBACf,qBAAqB;gBACrB,uBAAuB;gBACvB,kBAAkB;gBAClB,iBAAiB;gBACjB,oBAAoB;gBACpB,kBAAkB;gBAClB,YAAY;gBACZ,qCAAqC;gBACrC,iBAAiB;gBACjB,qBAAqB;gBACrB,iBAAiB;gBACjB,sBAAsB;gBACtB,6BAA6B;gBAC7B,sBAAsB;gBACtB,6BAA6B;gBAC7B,UAAU;gBACV,cAAc;gBACd,yBAAyB;gBACzB,eAAe;gBACf,gBAAgB;gBAChB,gBAAgB;gBAChB,oBAAoB;gBACpB,aAAa;gBACb,aAAa;gBACb,gBAAgB;gBAChB,gBAAgB;gBAChB,sBAAsB;gBACtB,6BAA6B;gBAC7B,oBAAoB;gBACpB,oBAAoB;gBACpB,mBAAmB;gBACnB,mBAAmB;gBACnB,mBAAmB;gBACnB,iCAAiC;gBACjC,qBAAqB;gBACrB,mBAAmB;gBACnB,qBAAqB;gBACrB,iBAAiB;gBACjB,sBAAsB;gBACtB,oBAAoB;gBACpB,uBAAuB;gBACvB,uBAAuB;gBACvB,kBAAkB;gBAClB,mBAAmB;gBACnB,iBAAiB;gBACjB,gCAAgC;gBAChC,cAAc;gBACd,sBAAsB;gBACtB,4BAA4B;gBAC5B,kBAAkB;gBAClB,sBAAsB;gBACtB,iBAAiB;gBACjB,qBAAqB;gBACrB,wBAAwB;gBACxB,sBAAsB;gBACtB,cAAc;gBACd,qBAAqB;gBACrB,6BAA6B;aAC9B;YACD,SAAS,EAAE;gBACT,EAAE,YAAY,EAAE,MAAM,EAAE,IAAI,EAAE,EAAE,EAAE;gBAClC,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE;aACrC;SACF,CAAC,CAAC;IACL,CAAC;IAED,IAAI,mBAAmB,EAAE,CAAC;QACxB,OAAO,CAAC,UAAU,CAAC,oBAAoB,EAAE;YACvC,WAAW,EAAE,wBAAwB;YACrC,eAAe;YACf,WAAW,EAAE,CAAC,eAAe,EAAE,oBAAoB,CAAC;YACpD,SAAS,EAAE,CAAC,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE,CAAC;SAClD,CAAC,CAAC;IACL,CAAC;IAED,OAAO,OAAO,CAAC;AACjB,CAAC;AAED,SAAgB,qBAAqB,CAAC,WAAmB,IAAI;IAC3D,OAAO,IAAI,6CAAqB,CAAC,gBAAgB,EAAE,EAAE,QAAQ,EAAE,MAAM,EAAE,MAAM,EAAE,CAAC;SAC7E,UAAU,CAAC,sBAAsB,EAAE;QAClC,WAAW,EAAE,8BAA8B;QAC3C,SAAS,EAAE;YACT,EAAE,YAAY,EAAE,MAAM,EAAE,IAAI,EAAE,EAAE,EAAE;YAClC,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE;YACpC,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,IAAI,EAAE;SACtC;QACD,eAAe,EAAE,CAAC,GAAG,CAAC;QACtB,WAAW,EAAE,CAAC,GAAG,CAAC;KACnB,CAAC;SACD,KAAK,EAAE,CAAC;AACb,CAAC;AAED,SAAgB,uBAAuB,CAAC,EACtC,IAAI,GAAG,YAAY,EACnB,QAAQ,EACR,eAAe,EACf,4BAA4B,EAC5B,wBAAwB,GASzB;IACC,MAAM,OAAO,GAAG,IAAI,6CAAqB,CAAC,IAAI,EAAE,EAAE,QAAQ,EAAE,MAAM,EAAE,OAAO,EAAE,CAAC;SAC3E,UAAU,CAAC,KAAK,EAAE;QACjB,WAAW,EAAE,2CAA2C;QACxD,WAAW,EAAE,CAAC,KAAK,EAAE,KAAK,CAAC;QAC3B,eAAe;QACf,oBAAoB,EAAE;YACpB,gBAAgB;YAChB,eAAe;YACf,eAAe;YACf,gBAAgB;YAChB,eAAe;YACf,cAAc;YACd,gBAAgB;YAChB,eAAe;YACf,eAAe;YACf,eAAe;YACf,eAAe;YACf,gBAAgB;YAChB,eAAe;YACf,gBAAgB;YAChB,eAAe;YACf,eAAe;YACf,gBAAgB;YAChB,eAAe;YACf,eAAe;YACf,eAAe;SAChB;QACD,gBAAgB,EAAE,CAAC,MAAM,CAAC;KAC3B,CAAC;SACD,UAAU,CAAC,KAAK,EAAE;QACjB,WAAW,EAAE,2CAA2C;QACxD,eAAe;QACf,WAAW,EAAE,CAAC,kBAAkB,EAAE,gBAAgB,EAAE,wBAAwB,EAAE,0BAA0B,CAAC;QACzG,SAAS,EAAE;YACT,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE;YACpC,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,IAAI,EAAE;SACtC;KACF,CAAC,CAAC;IAEL,IAAI,4BAA4B,IAAI,wBAAwB,EAAE,CAAC;QAC7D,OAAO,CAAC,UAAU,CAAC,UAAU,EAAE;YAC7B,WAAW,EAAE,0CAA0C;YACvD,WAAW,EAAE,CAAC,KAAK,CAAC;YACpB,eAAe;YACf,oBAAoB,EAAE,4BAA4B;YAClD,gBAAgB,EAAE,wBAAwB;SAC3C,CAAC,CAAC;IACL,CAAC;IAED,OAAO,OAAO,CAAC,KAAK,EAAE,CAAC;AACzB,CAAC;AAED,mDAAmD;AACnD,SAAgB,iBAAiB,CAAC,EAChC,IAAI,GAAG,KAAK,EACZ,QAAQ,EACR,mBAAmB,EACnB,cAAc,GAQf;IACC,MAAM,OAAO,GAAG,IAAI,6CAAqB,CAAC,IAAI,EAAE,EAAE,QAAQ,EAAE,MAAM,EAAE,OAAO,EAAE,CAAC,CAAC;IAC/E,IAAI,CAAC,cAAc,EAAE,CAAC;QACpB,OAAO;aACJ,UAAU,CAAC,KAAK,EAAE;YACjB,WAAW,EAAE,4EAA4E;YACzF,WAAW,EAAE,CAAC,KAAK,CAAC;YACpB,eAAe,EAAE,mBAAmB;YACpC,oBAAoB,EAAE,CAAC,cAAc,kBAAQ,CAAC,iBAAiB,EAAE,CAAC;YAClE,gBAAgB,EAAE,CAAC,MAAM,CAAC;SAC3B,CAAC;aACD,UAAU,CAAC,KAAK,EAAE;YACjB,WAAW,EAAE,4EAA4E;YACzF,WAAW,EAAE,CAAC,KAAK,CAAC;YACpB,eAAe,EAAE,mBAAmB;YACpC,oBAAoB,EAAE,CAAC,cAAc,kBAAQ,CAAC,iBAAiB,EAAE,CAAC;YAClE,gBAAgB,EAAE,CAAC,MAAM,CAAC;SAC3B,CAAC,CAAC;IACP,CAAC;IAED,OAAO;SACJ,UAAU,CAAC,KAAK,EAAE;QACjB,WAAW,EAAE,6CAA6C;QAC1D,WAAW,EAAE,CAAC,KAAK,CAAC;QACpB,eAAe,EAAE,mBAAmB;QACpC,4EAA4E;QAC5E,oBAAoB,EAAE,CAAC,GAAG,CAAC;QAC3B,gBAAgB,EAAE,CAAC,IAAI,CAAC;KACzB,CAAC;SACD,UAAU,CAAC,QAAQ,EAAE;QACpB,WAAW,EAAE,8EAA8E;QAC3F,WAAW,EAAE,CAAC,KAAK,CAAC;QACpB,eAAe,EAAE,mBAAmB;QACpC,4EAA4E;QAC5E,oBAAoB,EAAE,CAAC,GAAG,CAAC;QAC3B,gBAAgB,EAAE,CAAC,KAAK,CAAC;KAC1B,CAAC;SACD,UAAU,CAAC,aAAa,EAAE;QACzB,WAAW,EAAE,yFAAyF;QACtG,WAAW,EAAE,CAAC,KAAK,CAAC;QACpB,eAAe,EAAE,mBAAmB;QACpC,oBAAoB,EAAE,CAAC,cAAc,CAAC;QACtC,gBAAgB,EAAE,CAAC,KAAK,CAAC;KAC1B,CAAC,CAAC;IAEL,OAAO;QACL,KAAK;SACJ,UAAU,CAAC,MAAM,EAAE;QAClB,WAAW,EAAE,8CAA8C;QAC3D,eAAe,EAAE,mBAAmB;QACpC,WAAW,EAAE;YACX,SAAS,kBAAQ,CAAC,iBAAiB,YAAY;YAC/C,mBAAmB;YACnB,0BAA0B;YAC1B,yBAAyB;YACzB,sBAAsB;YACtB,2BAA2B;YAC3B,wBAAwB;YACxB,0BAA0B;YAC1B,wBAAwB;YACxB,wCAAwC;YACxC,4BAA4B;YAC5B,4BAA4B;YAC5B,gCAAgC;YAChC,oCAAoC;YACpC,wBAAwB;YACxB,0CAA0C;YAC1C,4BAA4B;YAC5B,oCAAoC;YACpC,GAAG,kBAAQ,CAAC,iBAAiB,oCAAoC;YACjE,WAAW;YACX,iBAAiB;YACjB,2BAA2B;SAC5B;QACD,SAAS,EAAE,CAAC,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE,CAAC;KAClD,CAAC,CAAC;IAEL,OAAO,OAAO,CAAC;AACjB,CAAC"}
|
|
@@ -1,2 +1,19 @@
|
|
|
1
1
|
"use strict";
|
|
2
|
-
|
|
2
|
+
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
+
if (k2 === undefined) k2 = k;
|
|
4
|
+
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
+
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
+
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
+
}
|
|
8
|
+
Object.defineProperty(o, k2, desc);
|
|
9
|
+
}) : (function(o, m, k, k2) {
|
|
10
|
+
if (k2 === undefined) k2 = k;
|
|
11
|
+
o[k2] = m[k];
|
|
12
|
+
}));
|
|
13
|
+
var __exportStar = (this && this.__exportStar) || function(m, exports) {
|
|
14
|
+
for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
|
|
15
|
+
};
|
|
16
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
17
|
+
__exportStar(require("./commonPolicies"), exports);
|
|
18
|
+
__exportStar(require("./FirewallPolicyBuilder"), exports);
|
|
19
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi9zcmMvdm5ldC9GaXJld2FsbFBvbGljaWVzL2luZGV4LnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7Ozs7Ozs7Ozs7Ozs7Ozs7QUFBQSxtREFBaUM7QUFDakMsMERBQXdDIn0=
|
package/vnet/IpAddresses.d.ts
CHANGED
package/vnet/IpAddresses.js
CHANGED
|
@@ -36,6 +36,7 @@ Object.defineProperty(exports, "__esModule", { value: true });
|
|
|
36
36
|
exports.IpAddresses = void 0;
|
|
37
37
|
const network = __importStar(require("@pulumi/azure-native/network"));
|
|
38
38
|
const base_1 = require("../base");
|
|
39
|
+
const helpers_1 = require("../helpers");
|
|
39
40
|
class IpAddresses extends base_1.BaseResourceComponent {
|
|
40
41
|
ipAddresses = {};
|
|
41
42
|
constructor(name, args, opts) {
|
|
@@ -49,7 +50,7 @@ class IpAddresses extends base_1.BaseResourceComponent {
|
|
|
49
50
|
sku: ip.sku ?? sku,
|
|
50
51
|
publicIPPrefix: prefix ? { id: prefix.id } : undefined,
|
|
51
52
|
publicIPAllocationMethod: network.IPAllocationMethod.Static,
|
|
52
|
-
zones: ip.zones ?? defaultConfig?.zones,
|
|
53
|
+
zones: helpers_1.zoneHelper.getDefaultZones(ip.zones ?? defaultConfig?.zones),
|
|
53
54
|
}, { ...opts, dependsOn: prefix ? prefix : opts?.dependsOn, parent: this, ignoreChanges: ['natGateway'] });
|
|
54
55
|
this.ipAddresses[ip.name] = { id: ipAddress.id, resourceName: ipAddress.name, ipAddress: ipAddress.ipAddress };
|
|
55
56
|
return ipAddress;
|
|
@@ -71,4 +72,4 @@ class IpAddresses extends base_1.BaseResourceComponent {
|
|
|
71
72
|
}
|
|
72
73
|
}
|
|
73
74
|
exports.IpAddresses = IpAddresses;
|
|
74
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
75
|
+
//# sourceMappingURL=data:application/json;base64,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
|
package/vnet/PrivateDnsZone.d.ts
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
import * as privateDns from '@pulumi/azure-native/privatedns';
|
|
2
2
|
import * as pulumi from '@pulumi/pulumi';
|
|
3
|
-
import { BaseComponent } from '../base
|
|
3
|
+
import { BaseComponent } from '../base';
|
|
4
4
|
import { DnsRecordTypes, WithResourceGroupInputs } from '../types';
|
|
5
5
|
export type DnsRecordArgs = Omit<privateDns.PrivateRecordSetArgs, 'privateZoneName' | 'relativeRecordSetName' | 'resourceGroupName' | 'ttl' | 'recordType'> & {
|
|
6
6
|
recordType: DnsRecordTypes;
|
|
@@ -16,23 +16,23 @@ export interface PrivateDnsZoneArgs extends WithResourceGroupInputs {
|
|
|
16
16
|
}>>;
|
|
17
17
|
}
|
|
18
18
|
export declare class PrivateDnsZone extends BaseComponent<PrivateDnsZoneArgs> {
|
|
19
|
-
private _rsName;
|
|
20
19
|
readonly id: pulumi.Output<string>;
|
|
21
20
|
readonly resourceName: pulumi.Output<string>;
|
|
21
|
+
private readonly _rsName;
|
|
22
22
|
constructor(name: string, args: PrivateDnsZoneArgs, opts?: pulumi.ComponentResourceOptions);
|
|
23
23
|
getOutputs(): {
|
|
24
24
|
id: pulumi.Output<string>;
|
|
25
25
|
resourceName: pulumi.Output<string>;
|
|
26
26
|
};
|
|
27
|
-
private createARecord;
|
|
28
27
|
addARecords(aRecords: Array<{
|
|
29
28
|
name: string;
|
|
30
29
|
ipv4Address: pulumi.Input<pulumi.Input<string>[]>;
|
|
31
30
|
}>): import("@pulumi/azure-native/privatedns/privateRecordSet").PrivateRecordSet[];
|
|
32
31
|
addRecordSet(name: string, props: DnsRecordArgs): import("@pulumi/azure-native/privatedns/privateRecordSet").PrivateRecordSet;
|
|
33
|
-
private createVnetLinks;
|
|
34
32
|
protected getRsGroupInfo(): {
|
|
35
33
|
resourceGroupName: pulumi.Input<string>;
|
|
36
34
|
location: string;
|
|
37
35
|
};
|
|
36
|
+
private createARecord;
|
|
37
|
+
private createVnetLinks;
|
|
38
38
|
}
|