@drunk-pulumi/azure 0.0.19 → 0.0.20
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/Aks/Helper.d.ts +0 -18
- package/Aks/Helper.js +50 -32
- package/package.json +3 -6
- package/KubeX/AcrSecret.d.ts +0 -15
- package/KubeX/AcrSecret.js +0 -31
- package/KubeX/Apps/AstroPage.d.ts +0 -12
- package/KubeX/Apps/AstroPage.js +0 -33
- package/KubeX/Apps/KafKa.d.ts +0 -6
- package/KubeX/Apps/KafKa.js +0 -13
- package/KubeX/Apps/Nobelium.d.ts +0 -13
- package/KubeX/Apps/Nobelium.js +0 -37
- package/KubeX/Apps/Wikijs.d.ts +0 -30
- package/KubeX/Apps/Wikijs.js +0 -54
- package/KubeX/Apps/WordPress.d.ts +0 -24
- package/KubeX/Apps/WordPress.js +0 -55
- package/KubeX/Apps/YarpProxy/index.d.ts +0 -17
- package/KubeX/Apps/YarpProxy/index.js +0 -107
- package/KubeX/Apps/YarpProxy/type.d.ts +0 -55
- package/KubeX/Apps/YarpProxy/type.js +0 -3
- package/KubeX/CertHelper.d.ts +0 -1
- package/KubeX/CertHelper.js +0 -9
- package/KubeX/CertImports.d.ts +0 -19
- package/KubeX/CertImports.js +0 -70
- package/KubeX/CloudFlare/CertCreator.d.ts +0 -19
- package/KubeX/CloudFlare/CertCreator.js +0 -90
- package/KubeX/CloudFlare/CertImports.d.ts +0 -17
- package/KubeX/CloudFlare/CertImports.js +0 -34
- package/KubeX/CloudFlare/DynamicDns.d.ts +0 -21
- package/KubeX/CloudFlare/DynamicDns.js +0 -39
- package/KubeX/CloudFlare/Tunnel-Helm.d.ts +0 -17
- package/KubeX/CloudFlare/Tunnel-Helm.js +0 -12
- package/KubeX/CloudFlare/Tunnel.d.ts +0 -23
- package/KubeX/CloudFlare/Tunnel.js +0 -54
- package/KubeX/CloudFlare/index.d.ts +0 -13
- package/KubeX/CloudFlare/index.js +0 -36
- package/KubeX/Clusters/K3s/AutoUpgradeController/index.d.ts +0 -6
- package/KubeX/Clusters/K3s/AutoUpgradeController/index.js +0 -60
- package/KubeX/ConfigSecret.d.ts +0 -24
- package/KubeX/ConfigSecret.js +0 -38
- package/KubeX/Core/CertManager/index.d.ts +0 -24
- package/KubeX/Core/CertManager/index.js +0 -96
- package/KubeX/Core/KsCertSecret.d.ts +0 -12
- package/KubeX/Core/KsCertSecret.js +0 -22
- package/KubeX/Core/KsSecret.d.ts +0 -9
- package/KubeX/Core/KsSecret.js +0 -12
- package/KubeX/Core/LoadBalancer/MetalLB.d.ts +0 -7
- package/KubeX/Core/LoadBalancer/MetalLB.js +0 -21
- package/KubeX/Core/Monitoring/index.d.ts +0 -22
- package/KubeX/Core/Monitoring/index.js +0 -322
- package/KubeX/Core/Namespace.d.ts +0 -12
- package/KubeX/Core/Namespace.js +0 -41
- package/KubeX/Core/Nginx/index.d.ts +0 -60
- package/KubeX/Core/Nginx/index.js +0 -109
- package/KubeX/Core/OAuthProxy/index.d.ts +0 -0
- package/KubeX/Core/OAuthProxy/index.js +0 -3
- package/KubeX/Core/ResourceQuota.d.ts +0 -12
- package/KubeX/Core/ResourceQuota.js +0 -13
- package/KubeX/Core/SecurityRules.d.ts +0 -34
- package/KubeX/Core/SecurityRules.js +0 -93
- package/KubeX/Core/StorageClass/azureBlob.d.ts +0 -20
- package/KubeX/Core/StorageClass/azureBlob.js +0 -77
- package/KubeX/Core/StorageClass/azureFile.d.ts +0 -17
- package/KubeX/Core/StorageClass/azureFile.js +0 -45
- package/KubeX/Core/StorageClass/index.d.ts +0 -13
- package/KubeX/Core/StorageClass/index.js +0 -25
- package/KubeX/Core/index.d.ts +0 -57
- package/KubeX/Core/index.js +0 -94
- package/KubeX/Databases/MariaDb.d.ts +0 -11
- package/KubeX/Databases/MariaDb.js +0 -39
- package/KubeX/Databases/MySql.V2.d.ts +0 -11
- package/KubeX/Databases/MySql.V2.js +0 -40
- package/KubeX/Databases/MySql.d.ts +0 -13
- package/KubeX/Databases/MySql.js +0 -55
- package/KubeX/Databases/PostgreSql/PostgreSQL-HA.d.ts +0 -10
- package/KubeX/Databases/PostgreSql/PostgreSQL-HA.js +0 -47
- package/KubeX/Databases/PostgreSql/PostgreSQL.d.ts +0 -10
- package/KubeX/Databases/PostgreSql/PostgreSQL.js +0 -51
- package/KubeX/Databases/PostgreSql/PostgreSql.v1.d.ts +0 -13
- package/KubeX/Databases/PostgreSql/PostgreSql.v1.js +0 -56
- package/KubeX/Databases/PostgreSql/index.d.ts +0 -17
- package/KubeX/Databases/PostgreSql/index.js +0 -6
- package/KubeX/Databases/RedisCache.d.ts +0 -14
- package/KubeX/Databases/RedisCache.js +0 -65
- package/KubeX/Databases/SqlServer.d.ts +0 -15
- package/KubeX/Databases/SqlServer.js +0 -77
- package/KubeX/Deployment/PodAutoscaler.d.ts +0 -14
- package/KubeX/Deployment/PodAutoscaler.js +0 -51
- package/KubeX/Deployment/index.d.ts +0 -136
- package/KubeX/Deployment/index.js +0 -306
- package/KubeX/Helpers.d.ts +0 -4
- package/KubeX/Helpers.js +0 -17
- package/KubeX/Ingress/AppGatewayIngress.d.ts +0 -2
- package/KubeX/Ingress/AppGatewayIngress.js +0 -4
- package/KubeX/Ingress/Conts.d.ts +0 -13
- package/KubeX/Ingress/Conts.js +0 -18
- package/KubeX/Ingress/NginxIngress.d.ts +0 -3
- package/KubeX/Ingress/NginxIngress.js +0 -186
- package/KubeX/Ingress/NginxProxy.d.ts +0 -21
- package/KubeX/Ingress/NginxProxy.js +0 -43
- package/KubeX/Ingress/TraefikIngress/CustomHeader.d.ts +0 -15
- package/KubeX/Ingress/TraefikIngress/CustomHeader.js +0 -15
- package/KubeX/Ingress/TraefikIngress/index.d.ts +0 -11
- package/KubeX/Ingress/TraefikIngress/index.js +0 -95
- package/KubeX/Ingress/index.d.ts +0 -5
- package/KubeX/Ingress/index.js +0 -12
- package/KubeX/Ingress/type.d.ts +0 -82
- package/KubeX/Ingress/type.js +0 -3
- package/KubeX/Providers/index.d.ts +0 -8
- package/KubeX/Providers/index.js +0 -15
- package/KubeX/Storage/Longhorn/index.d.ts +0 -15
- package/KubeX/Storage/Longhorn/index.js +0 -54
- package/KubeX/Storage/index.d.ts +0 -25
- package/KubeX/Storage/index.js +0 -79
- package/KubeX/Tools/AWS/LocalStack.d.ts +0 -7
- package/KubeX/Tools/AWS/LocalStack.js +0 -29
- package/KubeX/Tools/AWS/S3.d.ts +0 -6
- package/KubeX/Tools/AWS/S3.js +0 -44
- package/KubeX/Tools/AWS/index.d.ts +0 -7
- package/KubeX/Tools/AWS/index.js +0 -14
- package/KubeX/Tools/AppHealthzMonitor.d.ts +0 -18
- package/KubeX/Tools/AppHealthzMonitor.js +0 -52
- package/KubeX/Tools/ArgoCD/index.d.ts +0 -17
- package/KubeX/Tools/ArgoCD/index.js +0 -131
- package/KubeX/Tools/Dapr/Storage.d.ts +0 -66
- package/KubeX/Tools/Dapr/Storage.js +0 -70
- package/KubeX/Tools/Dapr/index.d.ts +0 -10
- package/KubeX/Tools/Dapr/index.js +0 -31
- package/KubeX/Tools/Echo-App.d.ts +0 -3
- package/KubeX/Tools/Echo-App.js +0 -21
- package/KubeX/Tools/Gitea/GiteaRepo.d.ts +0 -72
- package/KubeX/Tools/Gitea/GiteaRepo.js +0 -184
- package/KubeX/Tools/Gitea/GiteaRunner.d.ts +0 -11
- package/KubeX/Tools/Gitea/GiteaRunner.js +0 -37
- package/KubeX/Tools/Gitea/GiteaRunner.v1.d.ts +0 -11
- package/KubeX/Tools/Gitea/GiteaRunner.v1.js +0 -123
- package/KubeX/Tools/HarborRepo.d.ts +0 -29
- package/KubeX/Tools/HarborRepo.js +0 -78
- package/KubeX/Tools/HelloWorld.d.ts +0 -3
- package/KubeX/Tools/HelloWorld.js +0 -21
- package/KubeX/Tools/KubeCleanup.d.ts +0 -9
- package/KubeX/Tools/KubeCleanup.js +0 -34
- package/KubeX/Tools/NoIp.d.ts +0 -13
- package/KubeX/Tools/NoIp.js +0 -24
- package/KubeX/Tools/OpenLDAP/index.d.ts +0 -12
- package/KubeX/Tools/OpenLDAP/index.js +0 -56
- package/KubeX/Tools/OutlineVpn/index.d.ts +0 -25
- package/KubeX/Tools/OutlineVpn/index.js +0 -256
- package/KubeX/Tools/SqlPad.d.ts +0 -29
- package/KubeX/Tools/SqlPad.js +0 -133
- package/KubeX/Tools/ToolPod.d.ts +0 -10
- package/KubeX/Tools/ToolPod.js +0 -40
- package/KubeX/Tools/UptimeKuma.d.ts +0 -6
- package/KubeX/Tools/UptimeKuma.js +0 -38
- package/KubeX/Tools/index.d.ts +0 -27
- package/KubeX/Tools/index.js +0 -35
- package/KubeX/VairableResolvers/index.d.ts +0 -15
- package/KubeX/VairableResolvers/index.js +0 -49
- package/KubeX/kx/index.d.ts +0 -114
- package/KubeX/kx/index.js +0 -423
- package/KubeX/types.d.ts +0 -49
- package/KubeX/types.js +0 -3
package/KubeX/Storage/index.d.ts
DELETED
|
@@ -1,25 +0,0 @@
|
|
|
1
|
-
import * as pulumi from '@pulumi/pulumi';
|
|
2
|
-
import * as k8s from '@pulumi/kubernetes';
|
|
3
|
-
import { K8sArgs } from '../types';
|
|
4
|
-
interface AzureFileStorageProps {
|
|
5
|
-
name: string;
|
|
6
|
-
resourceGroup?: pulumi.Input<string>;
|
|
7
|
-
secretName: pulumi.Input<string>;
|
|
8
|
-
namespace?: pulumi.Input<string>;
|
|
9
|
-
/** requests storage: 5Gi or 10Gi*/
|
|
10
|
-
storage?: string;
|
|
11
|
-
mountOptions?: string[];
|
|
12
|
-
provider: k8s.Provider;
|
|
13
|
-
}
|
|
14
|
-
export declare const createPVCForAzureFileShare: ({ name, resourceGroup, namespace, secretName, storage, mountOptions, provider, }: AzureFileStorageProps) => import("@pulumi/kubernetes/core/v1/persistentVolumeClaim").PersistentVolumeClaim;
|
|
15
|
-
interface StorageClassProps extends K8sArgs {
|
|
16
|
-
name: string;
|
|
17
|
-
namespace?: pulumi.Input<string>;
|
|
18
|
-
storageClassName?: pulumi.Input<string>;
|
|
19
|
-
volumeMode?: 'Filesystem';
|
|
20
|
-
/** requests storage: 5Gi or 10Gi*/
|
|
21
|
-
storageGb?: string;
|
|
22
|
-
accessMode?: 'ReadWriteOnce' | 'ReadWriteMany';
|
|
23
|
-
}
|
|
24
|
-
export declare const createPVCForStorageClass: ({ name, namespace, storageClassName, storageGb, accessMode, provider, dependsOn, }: StorageClassProps) => import("@pulumi/kubernetes/core/v1/persistentVolumeClaim").PersistentVolumeClaim;
|
|
25
|
-
export {};
|
package/KubeX/Storage/index.js
DELETED
|
@@ -1,79 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.createPVCForStorageClass = exports.createPVCForAzureFileShare = void 0;
|
|
4
|
-
const k8s = require("@pulumi/kubernetes");
|
|
5
|
-
const Random_1 = require("../../Core/Random");
|
|
6
|
-
const defaultMountOptions = [
|
|
7
|
-
'dir_mode=0777',
|
|
8
|
-
'file_mode=0777',
|
|
9
|
-
'uid=0',
|
|
10
|
-
'gid=0',
|
|
11
|
-
'mfsymlinks',
|
|
12
|
-
'cache=strict',
|
|
13
|
-
'nosharesock',
|
|
14
|
-
'nobrl',
|
|
15
|
-
];
|
|
16
|
-
const createPVCForAzureFileShare = ({ name, resourceGroup, namespace, secretName, storage = '5Gi', mountOptions = defaultMountOptions, provider, }) => {
|
|
17
|
-
const v = new k8s.core.v1.PersistentVolume(name, {
|
|
18
|
-
metadata: {
|
|
19
|
-
name,
|
|
20
|
-
namespace,
|
|
21
|
-
annotations: { 'pulumi.com/skipAwait': 'true' },
|
|
22
|
-
},
|
|
23
|
-
spec: {
|
|
24
|
-
capacity: {
|
|
25
|
-
storage,
|
|
26
|
-
},
|
|
27
|
-
accessModes: ['ReadWriteMany'],
|
|
28
|
-
persistentVolumeReclaimPolicy: 'Retain',
|
|
29
|
-
csi: {
|
|
30
|
-
driver: 'file.csi.azure.com',
|
|
31
|
-
readOnly: false,
|
|
32
|
-
volumeHandle: (0, Random_1.randomUuId)(name).result,
|
|
33
|
-
volumeAttributes: resourceGroup
|
|
34
|
-
? { shareName: name, resourceGroup }
|
|
35
|
-
: { shareName: name },
|
|
36
|
-
nodeStageSecretRef: { name: secretName, namespace },
|
|
37
|
-
},
|
|
38
|
-
mountOptions,
|
|
39
|
-
},
|
|
40
|
-
}, { provider });
|
|
41
|
-
return new k8s.core.v1.PersistentVolumeClaim(name, {
|
|
42
|
-
metadata: {
|
|
43
|
-
name,
|
|
44
|
-
namespace,
|
|
45
|
-
annotations: { 'pulumi.com/skipAwait': 'true' },
|
|
46
|
-
},
|
|
47
|
-
spec: {
|
|
48
|
-
accessModes: ['ReadWriteMany'],
|
|
49
|
-
resources: {
|
|
50
|
-
requests: {
|
|
51
|
-
storage,
|
|
52
|
-
},
|
|
53
|
-
},
|
|
54
|
-
storageClassName: '',
|
|
55
|
-
volumeName: v.metadata.name,
|
|
56
|
-
},
|
|
57
|
-
}, { provider, dependsOn: v });
|
|
58
|
-
};
|
|
59
|
-
exports.createPVCForAzureFileShare = createPVCForAzureFileShare;
|
|
60
|
-
const createPVCForStorageClass = ({ name, namespace, storageClassName = '', storageGb = '5Gi', accessMode = 'ReadWriteOnce', provider, dependsOn, }) => {
|
|
61
|
-
return new k8s.core.v1.PersistentVolumeClaim(`${name}-claim`, {
|
|
62
|
-
metadata: {
|
|
63
|
-
name: `${name}-claim`,
|
|
64
|
-
annotations: { 'pulumi.com/skipAwait': 'true' },
|
|
65
|
-
namespace,
|
|
66
|
-
},
|
|
67
|
-
spec: {
|
|
68
|
-
accessModes: [accessMode],
|
|
69
|
-
resources: {
|
|
70
|
-
requests: {
|
|
71
|
-
storage: storageGb,
|
|
72
|
-
},
|
|
73
|
-
},
|
|
74
|
-
storageClassName,
|
|
75
|
-
},
|
|
76
|
-
}, { provider, dependsOn, deleteBeforeReplace: true });
|
|
77
|
-
};
|
|
78
|
-
exports.createPVCForStorageClass = createPVCForStorageClass;
|
|
79
|
-
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1,7 +0,0 @@
|
|
|
1
|
-
import { DefaultK8sArgs } from '../../types';
|
|
2
|
-
import * as k8s from '@pulumi/kubernetes';
|
|
3
|
-
export interface LocalStackProps extends DefaultK8sArgs {
|
|
4
|
-
domain: string;
|
|
5
|
-
}
|
|
6
|
-
declare const _default: ({ name, namespace, domain, provider, }: LocalStackProps) => k8s.helm.v3.Chart;
|
|
7
|
-
export default _default;
|
|
@@ -1,29 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
const k8s = require("@pulumi/kubernetes");
|
|
4
|
-
const CertHelper_1 = require("../../CertHelper");
|
|
5
|
-
exports.default = ({ name = 'localstack', namespace, domain, provider, }) => {
|
|
6
|
-
const localStack = new k8s.helm.v3.Chart(name, {
|
|
7
|
-
namespace,
|
|
8
|
-
chart: 'localstack',
|
|
9
|
-
fetchOpts: { repo: 'https://helm.localstack.cloud' },
|
|
10
|
-
values: {
|
|
11
|
-
ingress: {
|
|
12
|
-
enabled: true,
|
|
13
|
-
annotations: {
|
|
14
|
-
'kubernetes.io/ingress.class': 'nginx',
|
|
15
|
-
'kubernetes.io/tls-acme': 'true',
|
|
16
|
-
},
|
|
17
|
-
hosts: [
|
|
18
|
-
{
|
|
19
|
-
host: `aws.${domain}`,
|
|
20
|
-
paths: [{ path: '/', pathType: 'ImplementationSpecific' }],
|
|
21
|
-
},
|
|
22
|
-
],
|
|
23
|
-
tls: [{ secretName: (0, CertHelper_1.getTlsName)(name, true) }],
|
|
24
|
-
},
|
|
25
|
-
},
|
|
26
|
-
}, { provider });
|
|
27
|
-
return localStack;
|
|
28
|
-
};
|
|
29
|
-
//# sourceMappingURL=data:application/json;base64,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
|
package/KubeX/Tools/AWS/S3.d.ts
DELETED
|
@@ -1,6 +0,0 @@
|
|
|
1
|
-
import { DefaultKsAppArgs } from '../../types';
|
|
2
|
-
export interface AwsS3Props extends Omit<DefaultKsAppArgs, 'name'> {
|
|
3
|
-
storageClassName: string;
|
|
4
|
-
}
|
|
5
|
-
declare const _default: ({ namespace, ingress, runAs, storageClassName, ...others }: AwsS3Props) => void;
|
|
6
|
-
export default _default;
|
package/KubeX/Tools/AWS/S3.js
DELETED
|
@@ -1,44 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
const Deployment_1 = require("../../Deployment");
|
|
4
|
-
const Storage_1 = require("../../Storage");
|
|
5
|
-
exports.default = ({ namespace, ingress, runAs, storageClassName, ...others }) => {
|
|
6
|
-
const name = 'aws-s3';
|
|
7
|
-
const image = 'scireum/s3-ninja:latest';
|
|
8
|
-
//Storage
|
|
9
|
-
const persisVolume = (0, Storage_1.createPVCForStorageClass)({
|
|
10
|
-
name,
|
|
11
|
-
namespace,
|
|
12
|
-
accessMode: 'ReadWriteMany',
|
|
13
|
-
...others,
|
|
14
|
-
storageClassName,
|
|
15
|
-
});
|
|
16
|
-
(0, Deployment_1.default)({
|
|
17
|
-
name,
|
|
18
|
-
namespace,
|
|
19
|
-
podConfig: {
|
|
20
|
-
ports: { http: 9000 },
|
|
21
|
-
image,
|
|
22
|
-
resources: {
|
|
23
|
-
requests: { memory: '1Mi', cpu: '1m' },
|
|
24
|
-
limits: {
|
|
25
|
-
memory: '1Gi',
|
|
26
|
-
cpu: '1',
|
|
27
|
-
},
|
|
28
|
-
},
|
|
29
|
-
// securityContext: runAs,
|
|
30
|
-
volumes: [
|
|
31
|
-
{
|
|
32
|
-
name: 'data',
|
|
33
|
-
mountPath: '/home/sirius/data',
|
|
34
|
-
subPath: 'sample',
|
|
35
|
-
persistentVolumeClaim: persisVolume.metadata.name,
|
|
36
|
-
},
|
|
37
|
-
],
|
|
38
|
-
},
|
|
39
|
-
ingressConfig: ingress,
|
|
40
|
-
deploymentConfig: { replicas: 1 },
|
|
41
|
-
...others,
|
|
42
|
-
});
|
|
43
|
-
};
|
|
44
|
-
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiUzMuanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi8uLi9zcmMvS3ViZVgvVG9vbHMvQVdTL1MzLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7O0FBQUEsaURBQTBDO0FBRTFDLDJDQUF5RDtBQU16RCxrQkFBZSxDQUFDLEVBQ2QsU0FBUyxFQUNULE9BQU8sRUFDUCxLQUFLLEVBQ0wsZ0JBQWdCLEVBQ2hCLEdBQUcsTUFBTSxFQUNFLEVBQUUsRUFBRTtJQUNmLE1BQU0sSUFBSSxHQUFHLFFBQVEsQ0FBQztJQUN0QixNQUFNLEtBQUssR0FBRyx5QkFBeUIsQ0FBQztJQUV4QyxTQUFTO0lBQ1QsTUFBTSxZQUFZLEdBQUcsSUFBQSxrQ0FBd0IsRUFBQztRQUM1QyxJQUFJO1FBQ0osU0FBUztRQUNULFVBQVUsRUFBRSxlQUFlO1FBQzNCLEdBQUcsTUFBTTtRQUNULGdCQUFnQjtLQUNqQixDQUFDLENBQUM7SUFFSCxJQUFBLG9CQUFVLEVBQUM7UUFDVCxJQUFJO1FBQ0osU0FBUztRQUVULFNBQVMsRUFBRTtZQUNULEtBQUssRUFBRSxFQUFFLElBQUksRUFBRSxJQUFJLEVBQUU7WUFDckIsS0FBSztZQUNMLFNBQVMsRUFBRTtnQkFDVCxRQUFRLEVBQUUsRUFBRSxNQUFNLEVBQUUsS0FBSyxFQUFFLEdBQUcsRUFBRSxJQUFJLEVBQUU7Z0JBQ3RDLE1BQU0sRUFBRTtvQkFDTixNQUFNLEVBQUUsS0FBSztvQkFDYixHQUFHLEVBQUUsR0FBRztpQkFDVDthQUNGO1lBQ0QsMEJBQTBCO1lBQzFCLE9BQU8sRUFBRTtnQkFDUDtvQkFDRSxJQUFJLEVBQUUsTUFBTTtvQkFDWixTQUFTLEVBQUUsbUJBQW1CO29CQUM5QixPQUFPLEVBQUUsUUFBUTtvQkFDakIscUJBQXFCLEVBQUUsWUFBWSxDQUFDLFFBQVEsQ0FBQyxJQUFJO2lCQUNsRDthQUNGO1NBQ0Y7UUFDRCxhQUFhLEVBQUUsT0FBTztRQUN0QixnQkFBZ0IsRUFBRSxFQUFFLFFBQVEsRUFBRSxDQUFDLEVBQUU7UUFFakMsR0FBRyxNQUFNO0tBQ1YsQ0FBQyxDQUFDO0FBQ0wsQ0FBQyxDQUFDIn0=
|
|
@@ -1,7 +0,0 @@
|
|
|
1
|
-
import { AwsS3Props } from './S3';
|
|
2
|
-
import { DefaultK8sArgs } from '../../types';
|
|
3
|
-
interface Props extends Omit<DefaultK8sArgs, 'name'> {
|
|
4
|
-
s3?: Omit<AwsS3Props, 'domain' | 'namespace' | 'provider' | 'dependsOn'>;
|
|
5
|
-
}
|
|
6
|
-
declare const _default: ({ namespace, s3, ...others }: Props) => void;
|
|
7
|
-
export default _default;
|
package/KubeX/Tools/AWS/index.js
DELETED
|
@@ -1,14 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
const Namespace_1 = require("../../Core/Namespace");
|
|
4
|
-
const S3_1 = require("./S3");
|
|
5
|
-
exports.default = ({ namespace, s3, ...others }) => {
|
|
6
|
-
const ns = namespace
|
|
7
|
-
? { metadata: { name: namespace } }
|
|
8
|
-
: (0, Namespace_1.default)({ name: 'aws-local', ...others });
|
|
9
|
-
if (s3)
|
|
10
|
-
(0, S3_1.default)({ namespace: ns.metadata.name, ...others, ...s3 });
|
|
11
|
-
// if (localStack)
|
|
12
|
-
// LocalStack({ namespace: ns.metadata.name, ...others, ...localStack });
|
|
13
|
-
};
|
|
14
|
-
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1,18 +0,0 @@
|
|
|
1
|
-
import * as k8s from '@pulumi/kubernetes';
|
|
2
|
-
import { Input, Resource } from '@pulumi/pulumi';
|
|
3
|
-
export interface AppHealthMonitorProps {
|
|
4
|
-
name?: string;
|
|
5
|
-
namespace: Input<string>;
|
|
6
|
-
hostName: string;
|
|
7
|
-
auth: {
|
|
8
|
-
azureAD?: boolean;
|
|
9
|
-
};
|
|
10
|
-
endpoints?: Array<{
|
|
11
|
-
name: Input<string>;
|
|
12
|
-
uri: Input<string>;
|
|
13
|
-
}>;
|
|
14
|
-
provider: k8s.Provider;
|
|
15
|
-
dependsOn?: Input<Input<Resource>[]> | Input<Resource>;
|
|
16
|
-
}
|
|
17
|
-
declare const _default: ({ name, namespace, hostName, auth, endpoints, ...others }: AppHealthMonitorProps) => void;
|
|
18
|
-
export default _default;
|
|
@@ -1,52 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
const Deployment_1 = require("../Deployment");
|
|
4
|
-
const CertHelper_1 = require("../CertHelper");
|
|
5
|
-
const Helpers_1 = require("../../Common/Helpers");
|
|
6
|
-
const dotnetConfig_1 = require("../../Common/AppConfigs/dotnetConfig");
|
|
7
|
-
const Identity_1 = require("../../AzAd/Identity");
|
|
8
|
-
const AzureEnv_1 = require("../../Common/AzureEnv");
|
|
9
|
-
exports.default = ({ name = 'healthz-monitor', namespace, hostName, auth, endpoints = [], ...others }) => {
|
|
10
|
-
const image = 'baoduy2412/healthz-ui:latest';
|
|
11
|
-
const callbackUrl = `https://${hostName}/signin-oidc`;
|
|
12
|
-
const identity = auth?.azureAD
|
|
13
|
-
? (0, Identity_1.default)({
|
|
14
|
-
name,
|
|
15
|
-
createClientSecret: false,
|
|
16
|
-
createPrincipal: false,
|
|
17
|
-
appType: 'spa',
|
|
18
|
-
replyUrls: [callbackUrl],
|
|
19
|
-
})
|
|
20
|
-
: undefined;
|
|
21
|
-
const configMap = { ...dotnetConfig_1.defaultDotNetConfig };
|
|
22
|
-
if (identity) {
|
|
23
|
-
configMap['AzureAd__TenantId'] = AzureEnv_1.tenantId;
|
|
24
|
-
configMap['AzureAd__ClientId'] = identity?.clientId;
|
|
25
|
-
configMap['AzureAd__RedirectUri'] = callbackUrl;
|
|
26
|
-
configMap['AzureAd__PostLogoutRedirectUri'] = `https://${hostName}/signout-callback-oidc`;
|
|
27
|
-
}
|
|
28
|
-
endpoints.forEach((e, i) => {
|
|
29
|
-
configMap[`HealthChecksUI__HealthChecks__${i}__Name`] = e.name;
|
|
30
|
-
configMap[`HealthChecksUI__HealthChecks__${i}__Uri`] = e.uri;
|
|
31
|
-
});
|
|
32
|
-
(0, Deployment_1.default)({
|
|
33
|
-
name,
|
|
34
|
-
namespace,
|
|
35
|
-
configMap,
|
|
36
|
-
ingressConfig: {
|
|
37
|
-
type: 'nginx',
|
|
38
|
-
className: 'nginx',
|
|
39
|
-
hostNames: [hostName],
|
|
40
|
-
certManagerIssuer: true,
|
|
41
|
-
tlsSecretName: (0, CertHelper_1.getTlsName)((0, Helpers_1.getRootDomainFromUrl)(hostName), true),
|
|
42
|
-
},
|
|
43
|
-
podConfig: {
|
|
44
|
-
ports: { http: 8080 },
|
|
45
|
-
image,
|
|
46
|
-
resources: { requests: { memory: '1Mi', cpu: '1m' } },
|
|
47
|
-
},
|
|
48
|
-
deploymentConfig: { replicas: 1 },
|
|
49
|
-
...others,
|
|
50
|
-
});
|
|
51
|
-
};
|
|
52
|
-
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1,17 +0,0 @@
|
|
|
1
|
-
import { K8sArgs } from '../../types';
|
|
2
|
-
import { DeploymentIngress } from '../../Deployment';
|
|
3
|
-
import { KeyVaultInfo } from '../../../types';
|
|
4
|
-
interface Props extends K8sArgs {
|
|
5
|
-
name?: string;
|
|
6
|
-
namespace?: string;
|
|
7
|
-
storageClassName: string;
|
|
8
|
-
auth?: {
|
|
9
|
-
enableAzureAD?: boolean;
|
|
10
|
-
};
|
|
11
|
-
ingressConfig?: {
|
|
12
|
-
hostName: string;
|
|
13
|
-
} & Omit<DeploymentIngress, 'hostNames'>;
|
|
14
|
-
vaultInfo?: KeyVaultInfo;
|
|
15
|
-
}
|
|
16
|
-
declare const _default: ({ name, namespace, ingressConfig, auth, storageClassName, vaultInfo, ...others }: Props) => void;
|
|
17
|
-
export default _default;
|
|
@@ -1,131 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
const Namespace_1 = require("../../Core/Namespace");
|
|
4
|
-
const k8s = require("@pulumi/kubernetes");
|
|
5
|
-
const Ingress_1 = require("../../Ingress");
|
|
6
|
-
const pulumi_1 = require("@pulumi/pulumi");
|
|
7
|
-
const CertHelper_1 = require("../../CertHelper");
|
|
8
|
-
const Helpers_1 = require("../../../Common/Helpers");
|
|
9
|
-
const Identity_1 = require("../../../AzAd/Identity");
|
|
10
|
-
const AzureEnv_1 = require("../../../Common/AzureEnv");
|
|
11
|
-
const Random_1 = require("../../../Core/Random");
|
|
12
|
-
//**
|
|
13
|
-
// https://artifacthub.io/packages/helm/bitnami/argo-cd
|
|
14
|
-
// */
|
|
15
|
-
exports.default = ({ name = 'argo-cd', namespace = 'argo-cd', ingressConfig, auth, storageClassName, vaultInfo, ...others }) => {
|
|
16
|
-
const ns = (0, Namespace_1.default)({ name, ...others });
|
|
17
|
-
const url = `https://${ingressConfig?.hostName}`;
|
|
18
|
-
const identity = auth?.enableAzureAD
|
|
19
|
-
? (0, Identity_1.default)({
|
|
20
|
-
name,
|
|
21
|
-
createClientSecret: true,
|
|
22
|
-
createPrincipal: true,
|
|
23
|
-
publicClient: false,
|
|
24
|
-
appType: 'web',
|
|
25
|
-
replyUrls: [`${url}/argo-cd/auth/callback`],
|
|
26
|
-
vaultInfo,
|
|
27
|
-
})
|
|
28
|
-
: undefined;
|
|
29
|
-
const argoCD = new k8s.helm.v3.Chart(name, {
|
|
30
|
-
namespace,
|
|
31
|
-
chart: 'argo-cd',
|
|
32
|
-
fetchOpts: { repo: 'https://charts.bitnami.com/bitnami' },
|
|
33
|
-
skipAwait: true,
|
|
34
|
-
values: {
|
|
35
|
-
global: {
|
|
36
|
-
storageClass: storageClassName,
|
|
37
|
-
},
|
|
38
|
-
config: {
|
|
39
|
-
secret: {
|
|
40
|
-
argocdServerAdminPassword: (0, Random_1.randomPassword)({
|
|
41
|
-
name: `${name}-admin-password`,
|
|
42
|
-
policy: false,
|
|
43
|
-
length: 25,
|
|
44
|
-
vaultInfo,
|
|
45
|
-
}).result,
|
|
46
|
-
},
|
|
47
|
-
},
|
|
48
|
-
// redis: {
|
|
49
|
-
// auth: {
|
|
50
|
-
// existingSecret: randomPassword({
|
|
51
|
-
// name: `${name}-redis-pass`,
|
|
52
|
-
// policy: false,
|
|
53
|
-
// }).result,
|
|
54
|
-
// },
|
|
55
|
-
// },
|
|
56
|
-
rbac: { create: true },
|
|
57
|
-
//SSO
|
|
58
|
-
dex: {
|
|
59
|
-
image: { tag: 'v2.30.2' },
|
|
60
|
-
enabled: auth?.enableAzureAD,
|
|
61
|
-
// extraEnvVars: [
|
|
62
|
-
// { name: 'ARGOCD_DEX_SERVER_DISABLE_TLS', value: 'true' },
|
|
63
|
-
// ],
|
|
64
|
-
},
|
|
65
|
-
server: {
|
|
66
|
-
url,
|
|
67
|
-
//DEX config
|
|
68
|
-
config: identity
|
|
69
|
-
? {
|
|
70
|
-
'dex.config': (0, pulumi_1.interpolate) `connectors:\n- type: microsoft\n id: microsoft\n name: Azure AD\n config:\n clientID: ${identity.clientId}\n clientSecret: ${identity.clientSecret}\n redirectURI: ${url}/api/dex/callback\n tenant: ${AzureEnv_1.tenantId}\n groups:\n - AKS-Cluster-Admin\n`,
|
|
71
|
-
}
|
|
72
|
-
: undefined,
|
|
73
|
-
//Ingress
|
|
74
|
-
// ingress: ingressConfig
|
|
75
|
-
// ? {
|
|
76
|
-
// enabled: true,
|
|
77
|
-
// hostname: ingressConfig.hostName,
|
|
78
|
-
// ingressClassName: ingressConfig.className || 'nginx',
|
|
79
|
-
// }
|
|
80
|
-
// : undefined,
|
|
81
|
-
},
|
|
82
|
-
},
|
|
83
|
-
transformations: [
|
|
84
|
-
(o, op) => {
|
|
85
|
-
if (o.kind === 'Secret') {
|
|
86
|
-
if (o.metadata.name === 'argocd-secret') {
|
|
87
|
-
o.data['server.secretkey'] = (0, Random_1.randomPassword)({
|
|
88
|
-
name: `${name}-secretkey`,
|
|
89
|
-
policy: false,
|
|
90
|
-
vaultInfo,
|
|
91
|
-
}).result.apply(Helpers_1.toBase64);
|
|
92
|
-
if (identity)
|
|
93
|
-
o.data['oidc.azure.clientSecret'] =
|
|
94
|
-
identity.clientSecret?.apply(Helpers_1.toBase64);
|
|
95
|
-
//Ignore fields
|
|
96
|
-
op.ignoreChanges = ['admin.password', 'admin.passwordMtime'];
|
|
97
|
-
}
|
|
98
|
-
if (o.metadata.name === 'argo-cd-redis') {
|
|
99
|
-
o.data['redis-password'] = (0, Random_1.randomPassword)({
|
|
100
|
-
name: `${name}-redis-password`,
|
|
101
|
-
policy: false,
|
|
102
|
-
options: { special: false },
|
|
103
|
-
}).result.apply(Helpers_1.toBase64);
|
|
104
|
-
}
|
|
105
|
-
}
|
|
106
|
-
},
|
|
107
|
-
],
|
|
108
|
-
}, { dependsOn: ns, provider: others.provider });
|
|
109
|
-
if (ingressConfig) {
|
|
110
|
-
const ingressProps = {
|
|
111
|
-
...ingressConfig,
|
|
112
|
-
className: ingressConfig.className || 'nginx',
|
|
113
|
-
name: `${name}-ingress`.toLowerCase(),
|
|
114
|
-
hostNames: [ingressConfig.hostName],
|
|
115
|
-
tlsSecretName: ingressConfig.tlsSecretName ||
|
|
116
|
-
(0, CertHelper_1.getTlsName)(ingressConfig.certManagerIssuer
|
|
117
|
-
? (0, Helpers_1.getDomainFromUrl)(ingressConfig.hostName)
|
|
118
|
-
: (0, Helpers_1.getRootDomainFromUrl)(ingressConfig.hostName), Boolean(ingressConfig.certManagerIssuer)),
|
|
119
|
-
proxy: { backendProtocol: 'HTTPS' },
|
|
120
|
-
pathType: 'ImplementationSpecific',
|
|
121
|
-
service: {
|
|
122
|
-
metadata: { name: 'argo-cd-server', namespace },
|
|
123
|
-
spec: { ports: [{ name: 'https' }] },
|
|
124
|
-
},
|
|
125
|
-
...others,
|
|
126
|
-
dependsOn: ns,
|
|
127
|
-
};
|
|
128
|
-
(0, Ingress_1.NginxIngress)(ingressProps);
|
|
129
|
-
}
|
|
130
|
-
};
|
|
131
|
-
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1,66 +0,0 @@
|
|
|
1
|
-
import { K8sArgs } from '../../types';
|
|
2
|
-
import * as k8s from '@pulumi/kubernetes';
|
|
3
|
-
import { Input } from '@pulumi/pulumi';
|
|
4
|
-
export interface DaprStorage {
|
|
5
|
-
inMemory?: boolean;
|
|
6
|
-
azureBlobStorage?: {
|
|
7
|
-
accountName: Input<string>;
|
|
8
|
-
accountKey: Input<string>;
|
|
9
|
-
containerName: Input<string>;
|
|
10
|
-
};
|
|
11
|
-
azureTableStorage?: {
|
|
12
|
-
accountName: Input<string>;
|
|
13
|
-
accountKey: Input<string>;
|
|
14
|
-
tableName: Input<string>;
|
|
15
|
-
};
|
|
16
|
-
azureCosmosDb?: {
|
|
17
|
-
url: Input<string>;
|
|
18
|
-
masterKey: Input<string>;
|
|
19
|
-
database: Input<string>;
|
|
20
|
-
collection: Input<string>;
|
|
21
|
-
};
|
|
22
|
-
mongoDb?: {
|
|
23
|
-
host: Input<string>;
|
|
24
|
-
username: Input<string>;
|
|
25
|
-
password: Input<string>;
|
|
26
|
-
databaseName: Input<string>;
|
|
27
|
-
collectionName: Input<string>;
|
|
28
|
-
params?: Input<string>;
|
|
29
|
-
actorStateStore?: boolean;
|
|
30
|
-
};
|
|
31
|
-
mySql?: {
|
|
32
|
-
connectionString: Input<string>;
|
|
33
|
-
schemaName: Input<string>;
|
|
34
|
-
tableName: Input<string>;
|
|
35
|
-
pemContents?: Input<string>;
|
|
36
|
-
actorStateStore?: boolean;
|
|
37
|
-
};
|
|
38
|
-
postgreSql?: {
|
|
39
|
-
connectionString: Input<string>;
|
|
40
|
-
};
|
|
41
|
-
redis?: {
|
|
42
|
-
redisHost: Input<string>;
|
|
43
|
-
redisPassword: Input<string>;
|
|
44
|
-
enableTLS?: boolean;
|
|
45
|
-
};
|
|
46
|
-
rethinkDb?: {
|
|
47
|
-
address: Input<string>;
|
|
48
|
-
database: Input<string>;
|
|
49
|
-
table?: Input<string>;
|
|
50
|
-
username: Input<string>;
|
|
51
|
-
password: Input<string>;
|
|
52
|
-
archive?: boolean;
|
|
53
|
-
};
|
|
54
|
-
sqlServer?: {
|
|
55
|
-
connectionString: Input<string>;
|
|
56
|
-
tableName: Input<string>;
|
|
57
|
-
schema?: Input<string>;
|
|
58
|
-
};
|
|
59
|
-
}
|
|
60
|
-
interface Props extends K8sArgs {
|
|
61
|
-
name: string;
|
|
62
|
-
namespace: Input<string>;
|
|
63
|
-
storage: DaprStorage;
|
|
64
|
-
}
|
|
65
|
-
declare const _default: ({ name, namespace, storage, ...others }: Props) => k8s.apiextensions.CustomResource;
|
|
66
|
-
export default _default;
|
|
@@ -1,70 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
const k8s = require("@pulumi/kubernetes");
|
|
4
|
-
const KsSecret_1 = require("../../Core/KsSecret");
|
|
5
|
-
const secretKeys = [
|
|
6
|
-
'accountKey',
|
|
7
|
-
'masterKey',
|
|
8
|
-
'username',
|
|
9
|
-
'password',
|
|
10
|
-
'connectionString',
|
|
11
|
-
'redisPassword',
|
|
12
|
-
];
|
|
13
|
-
const getStateName = (storage) => {
|
|
14
|
-
if (storage.azureBlobStorage)
|
|
15
|
-
return 'state.azure.blobstorage';
|
|
16
|
-
if (storage.azureTableStorage)
|
|
17
|
-
return 'state.azure.tablestorage';
|
|
18
|
-
if (storage.azureCosmosDb)
|
|
19
|
-
return 'state.azure.cosmosdb';
|
|
20
|
-
if (storage.mongoDb)
|
|
21
|
-
return 'state.mongodb';
|
|
22
|
-
if (storage.mySql)
|
|
23
|
-
return 'state.mysql';
|
|
24
|
-
if (storage.postgreSql)
|
|
25
|
-
return 'state.postgresql';
|
|
26
|
-
if (storage.redis)
|
|
27
|
-
return 'state.redis';
|
|
28
|
-
if (storage.rethinkDb)
|
|
29
|
-
return 'state.rethinkdb';
|
|
30
|
-
if (storage.sqlServer)
|
|
31
|
-
return 'state.sqlserver';
|
|
32
|
-
//Default
|
|
33
|
-
return 'state.in-memory';
|
|
34
|
-
};
|
|
35
|
-
const getSpecMetadata = (storage, secretName) => {
|
|
36
|
-
const secrets = {};
|
|
37
|
-
const metadata = new Array();
|
|
38
|
-
const firstStore = Object.values(storage).filter((v) => Boolean(v))[0];
|
|
39
|
-
if (firstStore && typeof firstStore !== 'boolean') {
|
|
40
|
-
Object.keys(firstStore).forEach((k) => {
|
|
41
|
-
const v = firstStore[k];
|
|
42
|
-
if (secretKeys.includes(k)) {
|
|
43
|
-
secrets[k] = v;
|
|
44
|
-
metadata.push({
|
|
45
|
-
name: k,
|
|
46
|
-
secretKeyRef: { name: secretName, key: k },
|
|
47
|
-
});
|
|
48
|
-
}
|
|
49
|
-
else
|
|
50
|
-
metadata.push({ name: k, value: v });
|
|
51
|
-
});
|
|
52
|
-
}
|
|
53
|
-
return { secrets, metadata };
|
|
54
|
-
};
|
|
55
|
-
exports.default = ({ name, namespace, storage, ...others }) => {
|
|
56
|
-
const { secrets, metadata } = getSpecMetadata(storage, name);
|
|
57
|
-
const spec = {
|
|
58
|
-
version: 'v1',
|
|
59
|
-
type: getStateName(storage),
|
|
60
|
-
metadata,
|
|
61
|
-
};
|
|
62
|
-
(0, KsSecret_1.default)({ name, namespace, stringData: secrets, ...others });
|
|
63
|
-
return new k8s.apiextensions.CustomResource(name, {
|
|
64
|
-
apiVersion: 'dapr.io/v1alpha1',
|
|
65
|
-
kind: 'Component',
|
|
66
|
-
metadata: { name, namespace },
|
|
67
|
-
spec,
|
|
68
|
-
}, others);
|
|
69
|
-
};
|
|
70
|
-
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1,10 +0,0 @@
|
|
|
1
|
-
import { K8sArgs } from '../../types';
|
|
2
|
-
import * as k8s from '@pulumi/kubernetes';
|
|
3
|
-
import { DaprStorage } from './Storage';
|
|
4
|
-
interface Props extends K8sArgs {
|
|
5
|
-
name?: string;
|
|
6
|
-
version?: string;
|
|
7
|
-
storage: DaprStorage;
|
|
8
|
-
}
|
|
9
|
-
declare const _default: ({ name, version, storage, provider, dependsOn, }: Props) => Promise<k8s.helm.v3.Chart>;
|
|
10
|
-
export default _default;
|
|
@@ -1,31 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
const k8s = require("@pulumi/kubernetes");
|
|
4
|
-
const Namespace_1 = require("../../Core/Namespace");
|
|
5
|
-
const Storage_1 = require("./Storage");
|
|
6
|
-
const AzureEnv_1 = require("../../../Common/AzureEnv");
|
|
7
|
-
exports.default = async ({ name = 'dapr', version = '1.10', storage, provider, dependsOn, }) => {
|
|
8
|
-
const ns = (0, Namespace_1.default)({ name: 'dapr-system', provider, dependsOn });
|
|
9
|
-
const dapr = new k8s.helm.v3.Chart(name, {
|
|
10
|
-
namespace: ns.metadata.name,
|
|
11
|
-
chart: 'dapr',
|
|
12
|
-
//version,
|
|
13
|
-
fetchOpts: { repo: 'https://dapr.github.io/helm-charts' },
|
|
14
|
-
skipAwait: true,
|
|
15
|
-
values: {
|
|
16
|
-
global: {
|
|
17
|
-
//tag: `${version}-mariner`,
|
|
18
|
-
ha: { enabled: !AzureEnv_1.isLocal && !AzureEnv_1.isDev },
|
|
19
|
-
},
|
|
20
|
-
},
|
|
21
|
-
}, { dependsOn: ns, provider });
|
|
22
|
-
(0, Storage_1.default)({
|
|
23
|
-
name: `${name}-storage`,
|
|
24
|
-
namespace: ns.metadata.name,
|
|
25
|
-
storage,
|
|
26
|
-
provider,
|
|
27
|
-
dependsOn: dapr,
|
|
28
|
-
});
|
|
29
|
-
return dapr;
|
|
30
|
-
};
|
|
31
|
-
//# sourceMappingURL=data:application/json;base64,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
|