@drunk-pulumi/azure 0.0.19 → 0.0.21

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (162) hide show
  1. package/Aks/Helper.d.ts +0 -18
  2. package/Aks/Helper.js +50 -32
  3. package/Common/AutoTags.js +2 -1
  4. package/package.json +3 -6
  5. package/KubeX/AcrSecret.d.ts +0 -15
  6. package/KubeX/AcrSecret.js +0 -31
  7. package/KubeX/Apps/AstroPage.d.ts +0 -12
  8. package/KubeX/Apps/AstroPage.js +0 -33
  9. package/KubeX/Apps/KafKa.d.ts +0 -6
  10. package/KubeX/Apps/KafKa.js +0 -13
  11. package/KubeX/Apps/Nobelium.d.ts +0 -13
  12. package/KubeX/Apps/Nobelium.js +0 -37
  13. package/KubeX/Apps/Wikijs.d.ts +0 -30
  14. package/KubeX/Apps/Wikijs.js +0 -54
  15. package/KubeX/Apps/WordPress.d.ts +0 -24
  16. package/KubeX/Apps/WordPress.js +0 -55
  17. package/KubeX/Apps/YarpProxy/index.d.ts +0 -17
  18. package/KubeX/Apps/YarpProxy/index.js +0 -107
  19. package/KubeX/Apps/YarpProxy/type.d.ts +0 -55
  20. package/KubeX/Apps/YarpProxy/type.js +0 -3
  21. package/KubeX/CertHelper.d.ts +0 -1
  22. package/KubeX/CertHelper.js +0 -9
  23. package/KubeX/CertImports.d.ts +0 -19
  24. package/KubeX/CertImports.js +0 -70
  25. package/KubeX/CloudFlare/CertCreator.d.ts +0 -19
  26. package/KubeX/CloudFlare/CertCreator.js +0 -90
  27. package/KubeX/CloudFlare/CertImports.d.ts +0 -17
  28. package/KubeX/CloudFlare/CertImports.js +0 -34
  29. package/KubeX/CloudFlare/DynamicDns.d.ts +0 -21
  30. package/KubeX/CloudFlare/DynamicDns.js +0 -39
  31. package/KubeX/CloudFlare/Tunnel-Helm.d.ts +0 -17
  32. package/KubeX/CloudFlare/Tunnel-Helm.js +0 -12
  33. package/KubeX/CloudFlare/Tunnel.d.ts +0 -23
  34. package/KubeX/CloudFlare/Tunnel.js +0 -54
  35. package/KubeX/CloudFlare/index.d.ts +0 -13
  36. package/KubeX/CloudFlare/index.js +0 -36
  37. package/KubeX/Clusters/K3s/AutoUpgradeController/index.d.ts +0 -6
  38. package/KubeX/Clusters/K3s/AutoUpgradeController/index.js +0 -60
  39. package/KubeX/ConfigSecret.d.ts +0 -24
  40. package/KubeX/ConfigSecret.js +0 -38
  41. package/KubeX/Core/CertManager/index.d.ts +0 -24
  42. package/KubeX/Core/CertManager/index.js +0 -96
  43. package/KubeX/Core/KsCertSecret.d.ts +0 -12
  44. package/KubeX/Core/KsCertSecret.js +0 -22
  45. package/KubeX/Core/KsSecret.d.ts +0 -9
  46. package/KubeX/Core/KsSecret.js +0 -12
  47. package/KubeX/Core/LoadBalancer/MetalLB.d.ts +0 -7
  48. package/KubeX/Core/LoadBalancer/MetalLB.js +0 -21
  49. package/KubeX/Core/Monitoring/index.d.ts +0 -22
  50. package/KubeX/Core/Monitoring/index.js +0 -322
  51. package/KubeX/Core/Namespace.d.ts +0 -12
  52. package/KubeX/Core/Namespace.js +0 -41
  53. package/KubeX/Core/Nginx/index.d.ts +0 -60
  54. package/KubeX/Core/Nginx/index.js +0 -109
  55. package/KubeX/Core/OAuthProxy/index.d.ts +0 -0
  56. package/KubeX/Core/OAuthProxy/index.js +0 -3
  57. package/KubeX/Core/ResourceQuota.d.ts +0 -12
  58. package/KubeX/Core/ResourceQuota.js +0 -13
  59. package/KubeX/Core/SecurityRules.d.ts +0 -34
  60. package/KubeX/Core/SecurityRules.js +0 -93
  61. package/KubeX/Core/StorageClass/azureBlob.d.ts +0 -20
  62. package/KubeX/Core/StorageClass/azureBlob.js +0 -77
  63. package/KubeX/Core/StorageClass/azureFile.d.ts +0 -17
  64. package/KubeX/Core/StorageClass/azureFile.js +0 -45
  65. package/KubeX/Core/StorageClass/index.d.ts +0 -13
  66. package/KubeX/Core/StorageClass/index.js +0 -25
  67. package/KubeX/Core/index.d.ts +0 -57
  68. package/KubeX/Core/index.js +0 -94
  69. package/KubeX/Databases/MariaDb.d.ts +0 -11
  70. package/KubeX/Databases/MariaDb.js +0 -39
  71. package/KubeX/Databases/MySql.V2.d.ts +0 -11
  72. package/KubeX/Databases/MySql.V2.js +0 -40
  73. package/KubeX/Databases/MySql.d.ts +0 -13
  74. package/KubeX/Databases/MySql.js +0 -55
  75. package/KubeX/Databases/PostgreSql/PostgreSQL-HA.d.ts +0 -10
  76. package/KubeX/Databases/PostgreSql/PostgreSQL-HA.js +0 -47
  77. package/KubeX/Databases/PostgreSql/PostgreSQL.d.ts +0 -10
  78. package/KubeX/Databases/PostgreSql/PostgreSQL.js +0 -51
  79. package/KubeX/Databases/PostgreSql/PostgreSql.v1.d.ts +0 -13
  80. package/KubeX/Databases/PostgreSql/PostgreSql.v1.js +0 -56
  81. package/KubeX/Databases/PostgreSql/index.d.ts +0 -17
  82. package/KubeX/Databases/PostgreSql/index.js +0 -6
  83. package/KubeX/Databases/RedisCache.d.ts +0 -14
  84. package/KubeX/Databases/RedisCache.js +0 -65
  85. package/KubeX/Databases/SqlServer.d.ts +0 -15
  86. package/KubeX/Databases/SqlServer.js +0 -77
  87. package/KubeX/Deployment/PodAutoscaler.d.ts +0 -14
  88. package/KubeX/Deployment/PodAutoscaler.js +0 -51
  89. package/KubeX/Deployment/index.d.ts +0 -136
  90. package/KubeX/Deployment/index.js +0 -306
  91. package/KubeX/Helpers.d.ts +0 -4
  92. package/KubeX/Helpers.js +0 -17
  93. package/KubeX/Ingress/AppGatewayIngress.d.ts +0 -2
  94. package/KubeX/Ingress/AppGatewayIngress.js +0 -4
  95. package/KubeX/Ingress/Conts.d.ts +0 -13
  96. package/KubeX/Ingress/Conts.js +0 -18
  97. package/KubeX/Ingress/NginxIngress.d.ts +0 -3
  98. package/KubeX/Ingress/NginxIngress.js +0 -186
  99. package/KubeX/Ingress/NginxProxy.d.ts +0 -21
  100. package/KubeX/Ingress/NginxProxy.js +0 -43
  101. package/KubeX/Ingress/TraefikIngress/CustomHeader.d.ts +0 -15
  102. package/KubeX/Ingress/TraefikIngress/CustomHeader.js +0 -15
  103. package/KubeX/Ingress/TraefikIngress/index.d.ts +0 -11
  104. package/KubeX/Ingress/TraefikIngress/index.js +0 -95
  105. package/KubeX/Ingress/index.d.ts +0 -5
  106. package/KubeX/Ingress/index.js +0 -12
  107. package/KubeX/Ingress/type.d.ts +0 -82
  108. package/KubeX/Ingress/type.js +0 -3
  109. package/KubeX/Providers/index.d.ts +0 -8
  110. package/KubeX/Providers/index.js +0 -15
  111. package/KubeX/Storage/Longhorn/index.d.ts +0 -15
  112. package/KubeX/Storage/Longhorn/index.js +0 -54
  113. package/KubeX/Storage/index.d.ts +0 -25
  114. package/KubeX/Storage/index.js +0 -79
  115. package/KubeX/Tools/AWS/LocalStack.d.ts +0 -7
  116. package/KubeX/Tools/AWS/LocalStack.js +0 -29
  117. package/KubeX/Tools/AWS/S3.d.ts +0 -6
  118. package/KubeX/Tools/AWS/S3.js +0 -44
  119. package/KubeX/Tools/AWS/index.d.ts +0 -7
  120. package/KubeX/Tools/AWS/index.js +0 -14
  121. package/KubeX/Tools/AppHealthzMonitor.d.ts +0 -18
  122. package/KubeX/Tools/AppHealthzMonitor.js +0 -52
  123. package/KubeX/Tools/ArgoCD/index.d.ts +0 -17
  124. package/KubeX/Tools/ArgoCD/index.js +0 -131
  125. package/KubeX/Tools/Dapr/Storage.d.ts +0 -66
  126. package/KubeX/Tools/Dapr/Storage.js +0 -70
  127. package/KubeX/Tools/Dapr/index.d.ts +0 -10
  128. package/KubeX/Tools/Dapr/index.js +0 -31
  129. package/KubeX/Tools/Echo-App.d.ts +0 -3
  130. package/KubeX/Tools/Echo-App.js +0 -21
  131. package/KubeX/Tools/Gitea/GiteaRepo.d.ts +0 -72
  132. package/KubeX/Tools/Gitea/GiteaRepo.js +0 -184
  133. package/KubeX/Tools/Gitea/GiteaRunner.d.ts +0 -11
  134. package/KubeX/Tools/Gitea/GiteaRunner.js +0 -37
  135. package/KubeX/Tools/Gitea/GiteaRunner.v1.d.ts +0 -11
  136. package/KubeX/Tools/Gitea/GiteaRunner.v1.js +0 -123
  137. package/KubeX/Tools/HarborRepo.d.ts +0 -29
  138. package/KubeX/Tools/HarborRepo.js +0 -78
  139. package/KubeX/Tools/HelloWorld.d.ts +0 -3
  140. package/KubeX/Tools/HelloWorld.js +0 -21
  141. package/KubeX/Tools/KubeCleanup.d.ts +0 -9
  142. package/KubeX/Tools/KubeCleanup.js +0 -34
  143. package/KubeX/Tools/NoIp.d.ts +0 -13
  144. package/KubeX/Tools/NoIp.js +0 -24
  145. package/KubeX/Tools/OpenLDAP/index.d.ts +0 -12
  146. package/KubeX/Tools/OpenLDAP/index.js +0 -56
  147. package/KubeX/Tools/OutlineVpn/index.d.ts +0 -25
  148. package/KubeX/Tools/OutlineVpn/index.js +0 -256
  149. package/KubeX/Tools/SqlPad.d.ts +0 -29
  150. package/KubeX/Tools/SqlPad.js +0 -133
  151. package/KubeX/Tools/ToolPod.d.ts +0 -10
  152. package/KubeX/Tools/ToolPod.js +0 -40
  153. package/KubeX/Tools/UptimeKuma.d.ts +0 -6
  154. package/KubeX/Tools/UptimeKuma.js +0 -38
  155. package/KubeX/Tools/index.d.ts +0 -27
  156. package/KubeX/Tools/index.js +0 -35
  157. package/KubeX/VairableResolvers/index.d.ts +0 -15
  158. package/KubeX/VairableResolvers/index.js +0 -49
  159. package/KubeX/kx/index.d.ts +0 -114
  160. package/KubeX/kx/index.js +0 -423
  161. package/KubeX/types.d.ts +0 -49
  162. package/KubeX/types.js +0 -3
@@ -1,36 +0,0 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- const pulumi_1 = require("@pulumi/pulumi");
4
- const Namespace_1 = require("../Core/Namespace");
5
- const DynamicDns_1 = require("./DynamicDns");
6
- const Tunnel_1 = require("./Tunnel");
7
- const Tunnel_Helm_1 = require("./Tunnel-Helm");
8
- const CertImports_1 = require("./CertImports");
9
- exports.default = ({ namespace = 'cloudflare', dynamicDns, tunnel, certImports, ...others }) => {
10
- const ns = (0, Namespace_1.default)({
11
- name: namespace,
12
- ...others,
13
- });
14
- if (certImports) {
15
- (0, pulumi_1.output)((0, CertImports_1.default)({ ...others, ...certImports }));
16
- }
17
- if (dynamicDns) {
18
- (0, DynamicDns_1.default)({ ...others, ...dynamicDns, namespace: ns.metadata.name });
19
- }
20
- if (tunnel) {
21
- if (tunnel.parameters.hasOwnProperty('tunnelId') &&
22
- tunnel.parameters.hasOwnProperty('secret'))
23
- (0, Tunnel_Helm_1.default)({
24
- ...others,
25
- ...tunnel,
26
- namespace: ns.metadata.name,
27
- });
28
- else
29
- (0, Tunnel_1.default)({
30
- ...others,
31
- ...tunnel,
32
- namespace: ns.metadata.name,
33
- });
34
- }
35
- };
36
- //# sourceMappingURL=data:application/json;base64,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
@@ -1,6 +0,0 @@
1
- import { K8sArgs } from '../../../types';
2
- interface Props extends K8sArgs {
3
- enableWorkerPlan?: boolean;
4
- }
5
- declare const _default: ({ enableWorkerPlan, ...others }: Props) => void;
6
- export default _default;
@@ -1,60 +0,0 @@
1
- "use strict";
2
- //https://docs.k3s.io/upgrades/automated
3
- Object.defineProperty(exports, "__esModule", { value: true });
4
- const k8s = require("@pulumi/kubernetes");
5
- const createPlan = ({ name, namespace, isServerPlan, ...others }) => {
6
- return new k8s.apiextensions.CustomResource(name, {
7
- kind: 'Plan',
8
- apiVersion: 'upgrade.cattle.io/v1',
9
- metadata: { name, namespace },
10
- spec: {
11
- concurrency: 1,
12
- cordon: true,
13
- serviceAccountName: 'system-upgrade',
14
- upgrade: { image: 'rancher/k3s-upgrade' },
15
- channel: 'https://update.k3s.io/v1-release/channels/stable',
16
- prepare: isServerPlan
17
- ? undefined
18
- : { args: ['prepare', 'server-plan'], image: 'rancher/k3s-upgrade' },
19
- nodeSelector: {
20
- matchExpressions: [
21
- isServerPlan
22
- ? {
23
- key: 'node-role.kubernetes.io/master',
24
- operator: 'In',
25
- values: ['true'],
26
- }
27
- : {
28
- key: 'node-role.kubernetes.io/master',
29
- operator: 'DoesNotExist',
30
- },
31
- ],
32
- },
33
- },
34
- }, others);
35
- };
36
- exports.default = ({ enableWorkerPlan, ...others }) => {
37
- const name = 'k3s-auto-upgrade-controller';
38
- const controller = new k8s.yaml.ConfigFile(name, {
39
- skipAwait: true,
40
- file: 'https://github.com/rancher/system-upgrade-controller/blob/master/manifests/system-upgrade-controller.yaml',
41
- transformations: [(o) => { }],
42
- }, others);
43
- createPlan({
44
- name: 'server-plan',
45
- namespace: 'system-upgrade',
46
- isServerPlan: true,
47
- ...others,
48
- dependsOn: controller,
49
- });
50
- if (enableWorkerPlan) {
51
- createPlan({
52
- name: 'agent-plan',
53
- namespace: 'system-upgrade',
54
- isServerPlan: false,
55
- ...others,
56
- dependsOn: controller,
57
- });
58
- }
59
- };
60
- //# sourceMappingURL=data:application/json;base64,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
@@ -1,24 +0,0 @@
1
- import { DefaultK8sArgs } from './types';
2
- import * as pulumi from '@pulumi/pulumi';
3
- import * as kx from './kx';
4
- import { Input } from '@pulumi/pulumi';
5
- interface Props extends DefaultK8sArgs {
6
- fixedName?: boolean;
7
- configMap?: pulumi.Input<{
8
- [key: string]: pulumi.Input<string>;
9
- }>;
10
- secrets?: pulumi.Input<{
11
- [key: string]: pulumi.Input<string>;
12
- }>;
13
- }
14
- export declare const ConfigSecret: ({ name, namespace, fixedName, configMap, secrets, provider, dependsOn, }: Props) => {
15
- config?: kx.ConfigMap | undefined;
16
- secret?: kx.Secret | undefined;
17
- };
18
- interface AzureStorageSecret extends DefaultK8sArgs {
19
- fixedName?: boolean;
20
- accountKey: Input<string>;
21
- accountName: Input<string>;
22
- }
23
- export declare const AksAzureStorageSecret: ({ accountKey, accountName, ...props }: AzureStorageSecret) => kx.Secret;
24
- export default ConfigSecret;
@@ -1,38 +0,0 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.AksAzureStorageSecret = exports.ConfigSecret = void 0;
4
- const kx = require("./kx");
5
- const ConfigSecret = ({ name, namespace, fixedName, configMap, secrets, provider, dependsOn, }) => {
6
- const configMapName = `${name}-configmap`;
7
- const secretName = `${name}-secret`;
8
- const result = {
9
- config: undefined,
10
- secret: undefined,
11
- };
12
- if (configMap) {
13
- //Create ConfigMaps
14
- result.config = new kx.ConfigMap(configMapName, {
15
- metadata: { name: fixedName ? configMapName : undefined, namespace },
16
- data: configMap,
17
- }, { provider, dependsOn });
18
- }
19
- if (secrets) {
20
- //Create Secrets
21
- result.secret = new kx.Secret(secretName, {
22
- metadata: { name: fixedName ? secretName : undefined, namespace },
23
- stringData: secrets,
24
- }, { provider, dependsOn });
25
- }
26
- return result;
27
- };
28
- exports.ConfigSecret = ConfigSecret;
29
- const AksAzureStorageSecret = ({ accountKey, accountName, ...props }) => (0, exports.ConfigSecret)({
30
- ...props,
31
- secrets: {
32
- azurestorageaccountkey: accountKey,
33
- azurestorageaccountname: accountName,
34
- },
35
- }).secret;
36
- exports.AksAzureStorageSecret = AksAzureStorageSecret;
37
- exports.default = exports.ConfigSecret;
38
- //# sourceMappingURL=data:application/json;base64,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
@@ -1,24 +0,0 @@
1
- import * as pulumi from '@pulumi/pulumi';
2
- import * as k8s from '@pulumi/kubernetes';
3
- import { Input, Resource } from '@pulumi/pulumi';
4
- export interface CertManagerProps {
5
- name: string;
6
- email: string;
7
- version?: string;
8
- http01Issuer?: {
9
- publicIngressClass: string;
10
- domains?: string[];
11
- };
12
- azureDnsIssuer?: {
13
- dnsZoneName: string;
14
- clientId: string;
15
- clientSecret: string;
16
- resourceGroupName: Input<string>;
17
- subscriptionId: Input<string>;
18
- tenantId: Input<string>;
19
- };
20
- provider: k8s.Provider;
21
- dependsOn?: pulumi.Input<pulumi.Input<Resource>[]> | pulumi.Input<Resource>;
22
- }
23
- declare const _default: ({ name, version, provider, email, http01Issuer, azureDnsIssuer, dependsOn, }: CertManagerProps) => k8s.helm.v3.Chart;
24
- export default _default;
@@ -1,96 +0,0 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- const k8s = require("@pulumi/kubernetes");
4
- const path = require("path");
5
- const Namespace_1 = require("../Namespace");
6
- const KsSecret_1 = require("../KsSecret");
7
- //run this `kubectl patch crd challenges.acme.cert-manager.io -p '{"metadata":{"finalizers": []}}' --type=merge` if stuck at removing challenges.acme.cert-manager.io
8
- exports.default = ({ name, version, provider, email, http01Issuer, azureDnsIssuer, dependsOn, }) => {
9
- const namespace = 'cert-manager';
10
- const ns = (0, Namespace_1.default)({
11
- name: namespace,
12
- labels: { 'cert-manager.io/disable-validation': 'true' },
13
- provider,
14
- });
15
- const certManager = new k8s.helm.v3.Chart(name, {
16
- namespace,
17
- chart: 'cert-manager',
18
- version,
19
- fetchOpts: { repo: 'https://charts.jetstack.io' },
20
- values: {
21
- installCRDs: true,
22
- ingressShim: {
23
- defaultIssuerName: 'letsencrypt-prod',
24
- defaultIssuerKind: 'ClusterIssuer',
25
- defaultIssuerGroup: 'cert-manager.io',
26
- },
27
- //startupapicheck: { timeout: '1m' },
28
- // extraArgs: {
29
- // '--dns01-recursive-nameservers-only': 'true',
30
- // '--dns01-recursive-nameservers': '8.8.8.8:53,1.1.1.1:53',
31
- // },
32
- //nodeSelector: { 'kubernetes.io/os': 'linux' },
33
- },
34
- }, {
35
- provider,
36
- dependsOn: ns,
37
- });
38
- if (http01Issuer) {
39
- new k8s.yaml.ConfigFile(`cluster-issuer`, {
40
- file: path.resolve(__dirname, 'cluster-issuer.yaml'),
41
- transformations: [
42
- (obj) => {
43
- obj.metadata.namespace = namespace;
44
- obj.spec.acme.email = email;
45
- obj.spec.acme.solvers = [
46
- {
47
- http01: {
48
- ingress: {
49
- class: http01Issuer.publicIngressClass,
50
- // podTemplate: {
51
- // spec: { nodeSelector: { 'kubernetes.io/os': 'linux' } },
52
- // },
53
- },
54
- selector: http01Issuer.domains
55
- ? { dnsZones: http01Issuer.domains }
56
- : undefined,
57
- },
58
- },
59
- ];
60
- },
61
- ],
62
- }, { provider, dependsOn: [certManager] });
63
- }
64
- if (azureDnsIssuer) {
65
- (0, KsSecret_1.default)({
66
- name: `${name}-identity`,
67
- namespace,
68
- stringData: {
69
- clientId: azureDnsIssuer.clientId,
70
- clientSecret: azureDnsIssuer.clientSecret,
71
- },
72
- provider,
73
- dependsOn: [certManager],
74
- });
75
- new k8s.yaml.ConfigFile('cluster-issuer-azdns', {
76
- file: path.resolve(__dirname, 'cluster-issuer-azdns.yaml'),
77
- transformations: [
78
- (o) => {
79
- o.metadata.namespace = namespace;
80
- o.spec.acme.email = email;
81
- const providers = o.spec.acme.solvers;
82
- providers.forEach((p) => {
83
- p.dns01.azuredns.clientID = azureDnsIssuer.clientId;
84
- p.dns01.azuredns.hostedZoneName = azureDnsIssuer.dnsZoneName;
85
- p.dns01.azuredns.resourceGroupName =
86
- azureDnsIssuer.resourceGroupName;
87
- p.dns01.azuredns.subscriptionID = azureDnsIssuer.subscriptionId;
88
- p.dns01.azuredns.tenantID = azureDnsIssuer.tenantId;
89
- });
90
- },
91
- ],
92
- }, { provider, dependsOn: [certManager] });
93
- }
94
- return certManager;
95
- };
96
- //# sourceMappingURL=data:application/json;base64,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
@@ -1,12 +0,0 @@
1
- import { DefaultK8sArgs } from '../types';
2
- import { Input } from '@pulumi/pulumi';
3
- interface CertSecretProps extends DefaultK8sArgs {
4
- certInfo: Input<{
5
- cert: Input<string>;
6
- ca?: Input<string>;
7
- privateKey: Input<string>;
8
- dhparam?: Input<string>;
9
- }>;
10
- }
11
- declare const _default: ({ name, namespace, certInfo, ...others }: CertSecretProps) => import("@pulumi/pulumi").Output<import("@pulumi/kubernetes/core/v1/secret").Secret>;
12
- export default _default;
@@ -1,22 +0,0 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- const pulumi_1 = require("@pulumi/pulumi");
4
- const KsSecret_1 = require("./KsSecret");
5
- exports.default = ({ name, namespace, certInfo, ...others }) => (0, pulumi_1.all)([namespace, certInfo]).apply(([ns, info]) => {
6
- const stringData = {
7
- 'tls.crt': info.cert,
8
- 'tls.key': info.privateKey,
9
- };
10
- if (info.ca)
11
- stringData['tls.ca'] = info.ca;
12
- if (info.dhparam)
13
- stringData['tls.dhparam'] = info.dhparam;
14
- return (0, KsSecret_1.default)({
15
- name: `${name}-${ns}`,
16
- namespace: ns,
17
- type: 'kubernetes.io/tls',
18
- stringData,
19
- ...others,
20
- });
21
- });
22
- //# sourceMappingURL=data:application/json;base64,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
@@ -1,9 +0,0 @@
1
- import { DefaultK8sArgs } from '../types';
2
- import { Input } from '@pulumi/pulumi';
3
- declare const _default: ({ name, namespace, type, stringData, ...others }: DefaultK8sArgs & {
4
- type?: Input<string> | undefined;
5
- stringData: Input<{
6
- [key: string]: Input<string>;
7
- }>;
8
- }) => import("@pulumi/kubernetes/core/v1/secret").Secret;
9
- export default _default;
@@ -1,12 +0,0 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- const k8s = require("@pulumi/kubernetes");
4
- exports.default = ({ name = 'Secret', namespace, type, stringData, ...others }) => new k8s.core.v1.Secret(name, {
5
- metadata: {
6
- name,
7
- namespace,
8
- },
9
- type,
10
- stringData,
11
- }, others);
12
- //# sourceMappingURL=data:application/json;base64,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
@@ -1,7 +0,0 @@
1
- import * as k8s from '@pulumi/kubernetes';
2
- import { K8sArgs } from '../../types';
3
- export interface MetalLBProps extends K8sArgs {
4
- version?: string;
5
- }
6
- declare const _default: ({ version, ...others }: MetalLBProps) => k8s.helm.v3.Chart;
7
- export default _default;
@@ -1,21 +0,0 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- const k8s = require("@pulumi/kubernetes");
4
- const Namespace_1 = require("../Namespace");
5
- exports.default = ({ version, ...others }) => {
6
- const name = 'metallb';
7
- const namespace = 'metallb';
8
- const ns = (0, Namespace_1.default)({ name: namespace, ...others });
9
- //Deployment
10
- return new k8s.helm.v3.Chart(name, {
11
- namespace,
12
- chart: 'metallb',
13
- version,
14
- fetchOpts: {
15
- repo: 'https://charts.bitnami.com/bitnami',
16
- },
17
- skipAwait: true,
18
- values: {},
19
- }, { provider: others.provider, dependsOn: ns });
20
- };
21
- //# sourceMappingURL=data:application/json;base64,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
@@ -1,22 +0,0 @@
1
- import * as pulumi from '@pulumi/pulumi';
2
- import * as k8s from '@pulumi/kubernetes';
3
- import { KeyVaultInfo } from '../../../types';
4
- export interface MonitoringProps {
5
- namespace?: string;
6
- provider: k8s.Provider;
7
- nodeSelector?: pulumi.Input<{
8
- [key: string]: pulumi.Input<string>;
9
- }>;
10
- enablePrometheus?: boolean;
11
- enableGrafana?: {
12
- hostName: string;
13
- auth?: {
14
- azureAD?: boolean;
15
- };
16
- };
17
- enableAlertManager?: boolean;
18
- vaultInfo?: KeyVaultInfo;
19
- dependsOn?: pulumi.Input<pulumi.Input<pulumi.Resource>[]> | pulumi.Input<pulumi.Resource>;
20
- }
21
- declare const _default: ({ namespace, nodeSelector, enableAlertManager, enablePrometheus, enableGrafana, vaultInfo, provider, }: MonitoringProps) => Promise<k8s.helm.v3.Chart>;
22
- export default _default;