@drunk-pulumi/azure 0.0.19 → 0.0.21
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/Aks/Helper.d.ts +0 -18
- package/Aks/Helper.js +50 -32
- package/Common/AutoTags.js +2 -1
- package/package.json +3 -6
- package/KubeX/AcrSecret.d.ts +0 -15
- package/KubeX/AcrSecret.js +0 -31
- package/KubeX/Apps/AstroPage.d.ts +0 -12
- package/KubeX/Apps/AstroPage.js +0 -33
- package/KubeX/Apps/KafKa.d.ts +0 -6
- package/KubeX/Apps/KafKa.js +0 -13
- package/KubeX/Apps/Nobelium.d.ts +0 -13
- package/KubeX/Apps/Nobelium.js +0 -37
- package/KubeX/Apps/Wikijs.d.ts +0 -30
- package/KubeX/Apps/Wikijs.js +0 -54
- package/KubeX/Apps/WordPress.d.ts +0 -24
- package/KubeX/Apps/WordPress.js +0 -55
- package/KubeX/Apps/YarpProxy/index.d.ts +0 -17
- package/KubeX/Apps/YarpProxy/index.js +0 -107
- package/KubeX/Apps/YarpProxy/type.d.ts +0 -55
- package/KubeX/Apps/YarpProxy/type.js +0 -3
- package/KubeX/CertHelper.d.ts +0 -1
- package/KubeX/CertHelper.js +0 -9
- package/KubeX/CertImports.d.ts +0 -19
- package/KubeX/CertImports.js +0 -70
- package/KubeX/CloudFlare/CertCreator.d.ts +0 -19
- package/KubeX/CloudFlare/CertCreator.js +0 -90
- package/KubeX/CloudFlare/CertImports.d.ts +0 -17
- package/KubeX/CloudFlare/CertImports.js +0 -34
- package/KubeX/CloudFlare/DynamicDns.d.ts +0 -21
- package/KubeX/CloudFlare/DynamicDns.js +0 -39
- package/KubeX/CloudFlare/Tunnel-Helm.d.ts +0 -17
- package/KubeX/CloudFlare/Tunnel-Helm.js +0 -12
- package/KubeX/CloudFlare/Tunnel.d.ts +0 -23
- package/KubeX/CloudFlare/Tunnel.js +0 -54
- package/KubeX/CloudFlare/index.d.ts +0 -13
- package/KubeX/CloudFlare/index.js +0 -36
- package/KubeX/Clusters/K3s/AutoUpgradeController/index.d.ts +0 -6
- package/KubeX/Clusters/K3s/AutoUpgradeController/index.js +0 -60
- package/KubeX/ConfigSecret.d.ts +0 -24
- package/KubeX/ConfigSecret.js +0 -38
- package/KubeX/Core/CertManager/index.d.ts +0 -24
- package/KubeX/Core/CertManager/index.js +0 -96
- package/KubeX/Core/KsCertSecret.d.ts +0 -12
- package/KubeX/Core/KsCertSecret.js +0 -22
- package/KubeX/Core/KsSecret.d.ts +0 -9
- package/KubeX/Core/KsSecret.js +0 -12
- package/KubeX/Core/LoadBalancer/MetalLB.d.ts +0 -7
- package/KubeX/Core/LoadBalancer/MetalLB.js +0 -21
- package/KubeX/Core/Monitoring/index.d.ts +0 -22
- package/KubeX/Core/Monitoring/index.js +0 -322
- package/KubeX/Core/Namespace.d.ts +0 -12
- package/KubeX/Core/Namespace.js +0 -41
- package/KubeX/Core/Nginx/index.d.ts +0 -60
- package/KubeX/Core/Nginx/index.js +0 -109
- package/KubeX/Core/OAuthProxy/index.d.ts +0 -0
- package/KubeX/Core/OAuthProxy/index.js +0 -3
- package/KubeX/Core/ResourceQuota.d.ts +0 -12
- package/KubeX/Core/ResourceQuota.js +0 -13
- package/KubeX/Core/SecurityRules.d.ts +0 -34
- package/KubeX/Core/SecurityRules.js +0 -93
- package/KubeX/Core/StorageClass/azureBlob.d.ts +0 -20
- package/KubeX/Core/StorageClass/azureBlob.js +0 -77
- package/KubeX/Core/StorageClass/azureFile.d.ts +0 -17
- package/KubeX/Core/StorageClass/azureFile.js +0 -45
- package/KubeX/Core/StorageClass/index.d.ts +0 -13
- package/KubeX/Core/StorageClass/index.js +0 -25
- package/KubeX/Core/index.d.ts +0 -57
- package/KubeX/Core/index.js +0 -94
- package/KubeX/Databases/MariaDb.d.ts +0 -11
- package/KubeX/Databases/MariaDb.js +0 -39
- package/KubeX/Databases/MySql.V2.d.ts +0 -11
- package/KubeX/Databases/MySql.V2.js +0 -40
- package/KubeX/Databases/MySql.d.ts +0 -13
- package/KubeX/Databases/MySql.js +0 -55
- package/KubeX/Databases/PostgreSql/PostgreSQL-HA.d.ts +0 -10
- package/KubeX/Databases/PostgreSql/PostgreSQL-HA.js +0 -47
- package/KubeX/Databases/PostgreSql/PostgreSQL.d.ts +0 -10
- package/KubeX/Databases/PostgreSql/PostgreSQL.js +0 -51
- package/KubeX/Databases/PostgreSql/PostgreSql.v1.d.ts +0 -13
- package/KubeX/Databases/PostgreSql/PostgreSql.v1.js +0 -56
- package/KubeX/Databases/PostgreSql/index.d.ts +0 -17
- package/KubeX/Databases/PostgreSql/index.js +0 -6
- package/KubeX/Databases/RedisCache.d.ts +0 -14
- package/KubeX/Databases/RedisCache.js +0 -65
- package/KubeX/Databases/SqlServer.d.ts +0 -15
- package/KubeX/Databases/SqlServer.js +0 -77
- package/KubeX/Deployment/PodAutoscaler.d.ts +0 -14
- package/KubeX/Deployment/PodAutoscaler.js +0 -51
- package/KubeX/Deployment/index.d.ts +0 -136
- package/KubeX/Deployment/index.js +0 -306
- package/KubeX/Helpers.d.ts +0 -4
- package/KubeX/Helpers.js +0 -17
- package/KubeX/Ingress/AppGatewayIngress.d.ts +0 -2
- package/KubeX/Ingress/AppGatewayIngress.js +0 -4
- package/KubeX/Ingress/Conts.d.ts +0 -13
- package/KubeX/Ingress/Conts.js +0 -18
- package/KubeX/Ingress/NginxIngress.d.ts +0 -3
- package/KubeX/Ingress/NginxIngress.js +0 -186
- package/KubeX/Ingress/NginxProxy.d.ts +0 -21
- package/KubeX/Ingress/NginxProxy.js +0 -43
- package/KubeX/Ingress/TraefikIngress/CustomHeader.d.ts +0 -15
- package/KubeX/Ingress/TraefikIngress/CustomHeader.js +0 -15
- package/KubeX/Ingress/TraefikIngress/index.d.ts +0 -11
- package/KubeX/Ingress/TraefikIngress/index.js +0 -95
- package/KubeX/Ingress/index.d.ts +0 -5
- package/KubeX/Ingress/index.js +0 -12
- package/KubeX/Ingress/type.d.ts +0 -82
- package/KubeX/Ingress/type.js +0 -3
- package/KubeX/Providers/index.d.ts +0 -8
- package/KubeX/Providers/index.js +0 -15
- package/KubeX/Storage/Longhorn/index.d.ts +0 -15
- package/KubeX/Storage/Longhorn/index.js +0 -54
- package/KubeX/Storage/index.d.ts +0 -25
- package/KubeX/Storage/index.js +0 -79
- package/KubeX/Tools/AWS/LocalStack.d.ts +0 -7
- package/KubeX/Tools/AWS/LocalStack.js +0 -29
- package/KubeX/Tools/AWS/S3.d.ts +0 -6
- package/KubeX/Tools/AWS/S3.js +0 -44
- package/KubeX/Tools/AWS/index.d.ts +0 -7
- package/KubeX/Tools/AWS/index.js +0 -14
- package/KubeX/Tools/AppHealthzMonitor.d.ts +0 -18
- package/KubeX/Tools/AppHealthzMonitor.js +0 -52
- package/KubeX/Tools/ArgoCD/index.d.ts +0 -17
- package/KubeX/Tools/ArgoCD/index.js +0 -131
- package/KubeX/Tools/Dapr/Storage.d.ts +0 -66
- package/KubeX/Tools/Dapr/Storage.js +0 -70
- package/KubeX/Tools/Dapr/index.d.ts +0 -10
- package/KubeX/Tools/Dapr/index.js +0 -31
- package/KubeX/Tools/Echo-App.d.ts +0 -3
- package/KubeX/Tools/Echo-App.js +0 -21
- package/KubeX/Tools/Gitea/GiteaRepo.d.ts +0 -72
- package/KubeX/Tools/Gitea/GiteaRepo.js +0 -184
- package/KubeX/Tools/Gitea/GiteaRunner.d.ts +0 -11
- package/KubeX/Tools/Gitea/GiteaRunner.js +0 -37
- package/KubeX/Tools/Gitea/GiteaRunner.v1.d.ts +0 -11
- package/KubeX/Tools/Gitea/GiteaRunner.v1.js +0 -123
- package/KubeX/Tools/HarborRepo.d.ts +0 -29
- package/KubeX/Tools/HarborRepo.js +0 -78
- package/KubeX/Tools/HelloWorld.d.ts +0 -3
- package/KubeX/Tools/HelloWorld.js +0 -21
- package/KubeX/Tools/KubeCleanup.d.ts +0 -9
- package/KubeX/Tools/KubeCleanup.js +0 -34
- package/KubeX/Tools/NoIp.d.ts +0 -13
- package/KubeX/Tools/NoIp.js +0 -24
- package/KubeX/Tools/OpenLDAP/index.d.ts +0 -12
- package/KubeX/Tools/OpenLDAP/index.js +0 -56
- package/KubeX/Tools/OutlineVpn/index.d.ts +0 -25
- package/KubeX/Tools/OutlineVpn/index.js +0 -256
- package/KubeX/Tools/SqlPad.d.ts +0 -29
- package/KubeX/Tools/SqlPad.js +0 -133
- package/KubeX/Tools/ToolPod.d.ts +0 -10
- package/KubeX/Tools/ToolPod.js +0 -40
- package/KubeX/Tools/UptimeKuma.d.ts +0 -6
- package/KubeX/Tools/UptimeKuma.js +0 -38
- package/KubeX/Tools/index.d.ts +0 -27
- package/KubeX/Tools/index.js +0 -35
- package/KubeX/VairableResolvers/index.d.ts +0 -15
- package/KubeX/VairableResolvers/index.js +0 -49
- package/KubeX/kx/index.d.ts +0 -114
- package/KubeX/kx/index.js +0 -423
- package/KubeX/types.d.ts +0 -49
- package/KubeX/types.js +0 -3
|
@@ -1,18 +0,0 @@
|
|
|
1
|
-
import * as k8s from '@pulumi/kubernetes';
|
|
2
|
-
import { Input, Resource } from '@pulumi/pulumi';
|
|
3
|
-
export interface AppHealthMonitorProps {
|
|
4
|
-
name?: string;
|
|
5
|
-
namespace: Input<string>;
|
|
6
|
-
hostName: string;
|
|
7
|
-
auth: {
|
|
8
|
-
azureAD?: boolean;
|
|
9
|
-
};
|
|
10
|
-
endpoints?: Array<{
|
|
11
|
-
name: Input<string>;
|
|
12
|
-
uri: Input<string>;
|
|
13
|
-
}>;
|
|
14
|
-
provider: k8s.Provider;
|
|
15
|
-
dependsOn?: Input<Input<Resource>[]> | Input<Resource>;
|
|
16
|
-
}
|
|
17
|
-
declare const _default: ({ name, namespace, hostName, auth, endpoints, ...others }: AppHealthMonitorProps) => void;
|
|
18
|
-
export default _default;
|
|
@@ -1,52 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
const Deployment_1 = require("../Deployment");
|
|
4
|
-
const CertHelper_1 = require("../CertHelper");
|
|
5
|
-
const Helpers_1 = require("../../Common/Helpers");
|
|
6
|
-
const dotnetConfig_1 = require("../../Common/AppConfigs/dotnetConfig");
|
|
7
|
-
const Identity_1 = require("../../AzAd/Identity");
|
|
8
|
-
const AzureEnv_1 = require("../../Common/AzureEnv");
|
|
9
|
-
exports.default = ({ name = 'healthz-monitor', namespace, hostName, auth, endpoints = [], ...others }) => {
|
|
10
|
-
const image = 'baoduy2412/healthz-ui:latest';
|
|
11
|
-
const callbackUrl = `https://${hostName}/signin-oidc`;
|
|
12
|
-
const identity = auth?.azureAD
|
|
13
|
-
? (0, Identity_1.default)({
|
|
14
|
-
name,
|
|
15
|
-
createClientSecret: false,
|
|
16
|
-
createPrincipal: false,
|
|
17
|
-
appType: 'spa',
|
|
18
|
-
replyUrls: [callbackUrl],
|
|
19
|
-
})
|
|
20
|
-
: undefined;
|
|
21
|
-
const configMap = { ...dotnetConfig_1.defaultDotNetConfig };
|
|
22
|
-
if (identity) {
|
|
23
|
-
configMap['AzureAd__TenantId'] = AzureEnv_1.tenantId;
|
|
24
|
-
configMap['AzureAd__ClientId'] = identity?.clientId;
|
|
25
|
-
configMap['AzureAd__RedirectUri'] = callbackUrl;
|
|
26
|
-
configMap['AzureAd__PostLogoutRedirectUri'] = `https://${hostName}/signout-callback-oidc`;
|
|
27
|
-
}
|
|
28
|
-
endpoints.forEach((e, i) => {
|
|
29
|
-
configMap[`HealthChecksUI__HealthChecks__${i}__Name`] = e.name;
|
|
30
|
-
configMap[`HealthChecksUI__HealthChecks__${i}__Uri`] = e.uri;
|
|
31
|
-
});
|
|
32
|
-
(0, Deployment_1.default)({
|
|
33
|
-
name,
|
|
34
|
-
namespace,
|
|
35
|
-
configMap,
|
|
36
|
-
ingressConfig: {
|
|
37
|
-
type: 'nginx',
|
|
38
|
-
className: 'nginx',
|
|
39
|
-
hostNames: [hostName],
|
|
40
|
-
certManagerIssuer: true,
|
|
41
|
-
tlsSecretName: (0, CertHelper_1.getTlsName)((0, Helpers_1.getRootDomainFromUrl)(hostName), true),
|
|
42
|
-
},
|
|
43
|
-
podConfig: {
|
|
44
|
-
ports: { http: 8080 },
|
|
45
|
-
image,
|
|
46
|
-
resources: { requests: { memory: '1Mi', cpu: '1m' } },
|
|
47
|
-
},
|
|
48
|
-
deploymentConfig: { replicas: 1 },
|
|
49
|
-
...others,
|
|
50
|
-
});
|
|
51
|
-
};
|
|
52
|
-
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1,17 +0,0 @@
|
|
|
1
|
-
import { K8sArgs } from '../../types';
|
|
2
|
-
import { DeploymentIngress } from '../../Deployment';
|
|
3
|
-
import { KeyVaultInfo } from '../../../types';
|
|
4
|
-
interface Props extends K8sArgs {
|
|
5
|
-
name?: string;
|
|
6
|
-
namespace?: string;
|
|
7
|
-
storageClassName: string;
|
|
8
|
-
auth?: {
|
|
9
|
-
enableAzureAD?: boolean;
|
|
10
|
-
};
|
|
11
|
-
ingressConfig?: {
|
|
12
|
-
hostName: string;
|
|
13
|
-
} & Omit<DeploymentIngress, 'hostNames'>;
|
|
14
|
-
vaultInfo?: KeyVaultInfo;
|
|
15
|
-
}
|
|
16
|
-
declare const _default: ({ name, namespace, ingressConfig, auth, storageClassName, vaultInfo, ...others }: Props) => void;
|
|
17
|
-
export default _default;
|
|
@@ -1,131 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
const Namespace_1 = require("../../Core/Namespace");
|
|
4
|
-
const k8s = require("@pulumi/kubernetes");
|
|
5
|
-
const Ingress_1 = require("../../Ingress");
|
|
6
|
-
const pulumi_1 = require("@pulumi/pulumi");
|
|
7
|
-
const CertHelper_1 = require("../../CertHelper");
|
|
8
|
-
const Helpers_1 = require("../../../Common/Helpers");
|
|
9
|
-
const Identity_1 = require("../../../AzAd/Identity");
|
|
10
|
-
const AzureEnv_1 = require("../../../Common/AzureEnv");
|
|
11
|
-
const Random_1 = require("../../../Core/Random");
|
|
12
|
-
//**
|
|
13
|
-
// https://artifacthub.io/packages/helm/bitnami/argo-cd
|
|
14
|
-
// */
|
|
15
|
-
exports.default = ({ name = 'argo-cd', namespace = 'argo-cd', ingressConfig, auth, storageClassName, vaultInfo, ...others }) => {
|
|
16
|
-
const ns = (0, Namespace_1.default)({ name, ...others });
|
|
17
|
-
const url = `https://${ingressConfig?.hostName}`;
|
|
18
|
-
const identity = auth?.enableAzureAD
|
|
19
|
-
? (0, Identity_1.default)({
|
|
20
|
-
name,
|
|
21
|
-
createClientSecret: true,
|
|
22
|
-
createPrincipal: true,
|
|
23
|
-
publicClient: false,
|
|
24
|
-
appType: 'web',
|
|
25
|
-
replyUrls: [`${url}/argo-cd/auth/callback`],
|
|
26
|
-
vaultInfo,
|
|
27
|
-
})
|
|
28
|
-
: undefined;
|
|
29
|
-
const argoCD = new k8s.helm.v3.Chart(name, {
|
|
30
|
-
namespace,
|
|
31
|
-
chart: 'argo-cd',
|
|
32
|
-
fetchOpts: { repo: 'https://charts.bitnami.com/bitnami' },
|
|
33
|
-
skipAwait: true,
|
|
34
|
-
values: {
|
|
35
|
-
global: {
|
|
36
|
-
storageClass: storageClassName,
|
|
37
|
-
},
|
|
38
|
-
config: {
|
|
39
|
-
secret: {
|
|
40
|
-
argocdServerAdminPassword: (0, Random_1.randomPassword)({
|
|
41
|
-
name: `${name}-admin-password`,
|
|
42
|
-
policy: false,
|
|
43
|
-
length: 25,
|
|
44
|
-
vaultInfo,
|
|
45
|
-
}).result,
|
|
46
|
-
},
|
|
47
|
-
},
|
|
48
|
-
// redis: {
|
|
49
|
-
// auth: {
|
|
50
|
-
// existingSecret: randomPassword({
|
|
51
|
-
// name: `${name}-redis-pass`,
|
|
52
|
-
// policy: false,
|
|
53
|
-
// }).result,
|
|
54
|
-
// },
|
|
55
|
-
// },
|
|
56
|
-
rbac: { create: true },
|
|
57
|
-
//SSO
|
|
58
|
-
dex: {
|
|
59
|
-
image: { tag: 'v2.30.2' },
|
|
60
|
-
enabled: auth?.enableAzureAD,
|
|
61
|
-
// extraEnvVars: [
|
|
62
|
-
// { name: 'ARGOCD_DEX_SERVER_DISABLE_TLS', value: 'true' },
|
|
63
|
-
// ],
|
|
64
|
-
},
|
|
65
|
-
server: {
|
|
66
|
-
url,
|
|
67
|
-
//DEX config
|
|
68
|
-
config: identity
|
|
69
|
-
? {
|
|
70
|
-
'dex.config': (0, pulumi_1.interpolate) `connectors:\n- type: microsoft\n id: microsoft\n name: Azure AD\n config:\n clientID: ${identity.clientId}\n clientSecret: ${identity.clientSecret}\n redirectURI: ${url}/api/dex/callback\n tenant: ${AzureEnv_1.tenantId}\n groups:\n - AKS-Cluster-Admin\n`,
|
|
71
|
-
}
|
|
72
|
-
: undefined,
|
|
73
|
-
//Ingress
|
|
74
|
-
// ingress: ingressConfig
|
|
75
|
-
// ? {
|
|
76
|
-
// enabled: true,
|
|
77
|
-
// hostname: ingressConfig.hostName,
|
|
78
|
-
// ingressClassName: ingressConfig.className || 'nginx',
|
|
79
|
-
// }
|
|
80
|
-
// : undefined,
|
|
81
|
-
},
|
|
82
|
-
},
|
|
83
|
-
transformations: [
|
|
84
|
-
(o, op) => {
|
|
85
|
-
if (o.kind === 'Secret') {
|
|
86
|
-
if (o.metadata.name === 'argocd-secret') {
|
|
87
|
-
o.data['server.secretkey'] = (0, Random_1.randomPassword)({
|
|
88
|
-
name: `${name}-secretkey`,
|
|
89
|
-
policy: false,
|
|
90
|
-
vaultInfo,
|
|
91
|
-
}).result.apply(Helpers_1.toBase64);
|
|
92
|
-
if (identity)
|
|
93
|
-
o.data['oidc.azure.clientSecret'] =
|
|
94
|
-
identity.clientSecret?.apply(Helpers_1.toBase64);
|
|
95
|
-
//Ignore fields
|
|
96
|
-
op.ignoreChanges = ['admin.password', 'admin.passwordMtime'];
|
|
97
|
-
}
|
|
98
|
-
if (o.metadata.name === 'argo-cd-redis') {
|
|
99
|
-
o.data['redis-password'] = (0, Random_1.randomPassword)({
|
|
100
|
-
name: `${name}-redis-password`,
|
|
101
|
-
policy: false,
|
|
102
|
-
options: { special: false },
|
|
103
|
-
}).result.apply(Helpers_1.toBase64);
|
|
104
|
-
}
|
|
105
|
-
}
|
|
106
|
-
},
|
|
107
|
-
],
|
|
108
|
-
}, { dependsOn: ns, provider: others.provider });
|
|
109
|
-
if (ingressConfig) {
|
|
110
|
-
const ingressProps = {
|
|
111
|
-
...ingressConfig,
|
|
112
|
-
className: ingressConfig.className || 'nginx',
|
|
113
|
-
name: `${name}-ingress`.toLowerCase(),
|
|
114
|
-
hostNames: [ingressConfig.hostName],
|
|
115
|
-
tlsSecretName: ingressConfig.tlsSecretName ||
|
|
116
|
-
(0, CertHelper_1.getTlsName)(ingressConfig.certManagerIssuer
|
|
117
|
-
? (0, Helpers_1.getDomainFromUrl)(ingressConfig.hostName)
|
|
118
|
-
: (0, Helpers_1.getRootDomainFromUrl)(ingressConfig.hostName), Boolean(ingressConfig.certManagerIssuer)),
|
|
119
|
-
proxy: { backendProtocol: 'HTTPS' },
|
|
120
|
-
pathType: 'ImplementationSpecific',
|
|
121
|
-
service: {
|
|
122
|
-
metadata: { name: 'argo-cd-server', namespace },
|
|
123
|
-
spec: { ports: [{ name: 'https' }] },
|
|
124
|
-
},
|
|
125
|
-
...others,
|
|
126
|
-
dependsOn: ns,
|
|
127
|
-
};
|
|
128
|
-
(0, Ingress_1.NginxIngress)(ingressProps);
|
|
129
|
-
}
|
|
130
|
-
};
|
|
131
|
-
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1,66 +0,0 @@
|
|
|
1
|
-
import { K8sArgs } from '../../types';
|
|
2
|
-
import * as k8s from '@pulumi/kubernetes';
|
|
3
|
-
import { Input } from '@pulumi/pulumi';
|
|
4
|
-
export interface DaprStorage {
|
|
5
|
-
inMemory?: boolean;
|
|
6
|
-
azureBlobStorage?: {
|
|
7
|
-
accountName: Input<string>;
|
|
8
|
-
accountKey: Input<string>;
|
|
9
|
-
containerName: Input<string>;
|
|
10
|
-
};
|
|
11
|
-
azureTableStorage?: {
|
|
12
|
-
accountName: Input<string>;
|
|
13
|
-
accountKey: Input<string>;
|
|
14
|
-
tableName: Input<string>;
|
|
15
|
-
};
|
|
16
|
-
azureCosmosDb?: {
|
|
17
|
-
url: Input<string>;
|
|
18
|
-
masterKey: Input<string>;
|
|
19
|
-
database: Input<string>;
|
|
20
|
-
collection: Input<string>;
|
|
21
|
-
};
|
|
22
|
-
mongoDb?: {
|
|
23
|
-
host: Input<string>;
|
|
24
|
-
username: Input<string>;
|
|
25
|
-
password: Input<string>;
|
|
26
|
-
databaseName: Input<string>;
|
|
27
|
-
collectionName: Input<string>;
|
|
28
|
-
params?: Input<string>;
|
|
29
|
-
actorStateStore?: boolean;
|
|
30
|
-
};
|
|
31
|
-
mySql?: {
|
|
32
|
-
connectionString: Input<string>;
|
|
33
|
-
schemaName: Input<string>;
|
|
34
|
-
tableName: Input<string>;
|
|
35
|
-
pemContents?: Input<string>;
|
|
36
|
-
actorStateStore?: boolean;
|
|
37
|
-
};
|
|
38
|
-
postgreSql?: {
|
|
39
|
-
connectionString: Input<string>;
|
|
40
|
-
};
|
|
41
|
-
redis?: {
|
|
42
|
-
redisHost: Input<string>;
|
|
43
|
-
redisPassword: Input<string>;
|
|
44
|
-
enableTLS?: boolean;
|
|
45
|
-
};
|
|
46
|
-
rethinkDb?: {
|
|
47
|
-
address: Input<string>;
|
|
48
|
-
database: Input<string>;
|
|
49
|
-
table?: Input<string>;
|
|
50
|
-
username: Input<string>;
|
|
51
|
-
password: Input<string>;
|
|
52
|
-
archive?: boolean;
|
|
53
|
-
};
|
|
54
|
-
sqlServer?: {
|
|
55
|
-
connectionString: Input<string>;
|
|
56
|
-
tableName: Input<string>;
|
|
57
|
-
schema?: Input<string>;
|
|
58
|
-
};
|
|
59
|
-
}
|
|
60
|
-
interface Props extends K8sArgs {
|
|
61
|
-
name: string;
|
|
62
|
-
namespace: Input<string>;
|
|
63
|
-
storage: DaprStorage;
|
|
64
|
-
}
|
|
65
|
-
declare const _default: ({ name, namespace, storage, ...others }: Props) => k8s.apiextensions.CustomResource;
|
|
66
|
-
export default _default;
|
|
@@ -1,70 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
const k8s = require("@pulumi/kubernetes");
|
|
4
|
-
const KsSecret_1 = require("../../Core/KsSecret");
|
|
5
|
-
const secretKeys = [
|
|
6
|
-
'accountKey',
|
|
7
|
-
'masterKey',
|
|
8
|
-
'username',
|
|
9
|
-
'password',
|
|
10
|
-
'connectionString',
|
|
11
|
-
'redisPassword',
|
|
12
|
-
];
|
|
13
|
-
const getStateName = (storage) => {
|
|
14
|
-
if (storage.azureBlobStorage)
|
|
15
|
-
return 'state.azure.blobstorage';
|
|
16
|
-
if (storage.azureTableStorage)
|
|
17
|
-
return 'state.azure.tablestorage';
|
|
18
|
-
if (storage.azureCosmosDb)
|
|
19
|
-
return 'state.azure.cosmosdb';
|
|
20
|
-
if (storage.mongoDb)
|
|
21
|
-
return 'state.mongodb';
|
|
22
|
-
if (storage.mySql)
|
|
23
|
-
return 'state.mysql';
|
|
24
|
-
if (storage.postgreSql)
|
|
25
|
-
return 'state.postgresql';
|
|
26
|
-
if (storage.redis)
|
|
27
|
-
return 'state.redis';
|
|
28
|
-
if (storage.rethinkDb)
|
|
29
|
-
return 'state.rethinkdb';
|
|
30
|
-
if (storage.sqlServer)
|
|
31
|
-
return 'state.sqlserver';
|
|
32
|
-
//Default
|
|
33
|
-
return 'state.in-memory';
|
|
34
|
-
};
|
|
35
|
-
const getSpecMetadata = (storage, secretName) => {
|
|
36
|
-
const secrets = {};
|
|
37
|
-
const metadata = new Array();
|
|
38
|
-
const firstStore = Object.values(storage).filter((v) => Boolean(v))[0];
|
|
39
|
-
if (firstStore && typeof firstStore !== 'boolean') {
|
|
40
|
-
Object.keys(firstStore).forEach((k) => {
|
|
41
|
-
const v = firstStore[k];
|
|
42
|
-
if (secretKeys.includes(k)) {
|
|
43
|
-
secrets[k] = v;
|
|
44
|
-
metadata.push({
|
|
45
|
-
name: k,
|
|
46
|
-
secretKeyRef: { name: secretName, key: k },
|
|
47
|
-
});
|
|
48
|
-
}
|
|
49
|
-
else
|
|
50
|
-
metadata.push({ name: k, value: v });
|
|
51
|
-
});
|
|
52
|
-
}
|
|
53
|
-
return { secrets, metadata };
|
|
54
|
-
};
|
|
55
|
-
exports.default = ({ name, namespace, storage, ...others }) => {
|
|
56
|
-
const { secrets, metadata } = getSpecMetadata(storage, name);
|
|
57
|
-
const spec = {
|
|
58
|
-
version: 'v1',
|
|
59
|
-
type: getStateName(storage),
|
|
60
|
-
metadata,
|
|
61
|
-
};
|
|
62
|
-
(0, KsSecret_1.default)({ name, namespace, stringData: secrets, ...others });
|
|
63
|
-
return new k8s.apiextensions.CustomResource(name, {
|
|
64
|
-
apiVersion: 'dapr.io/v1alpha1',
|
|
65
|
-
kind: 'Component',
|
|
66
|
-
metadata: { name, namespace },
|
|
67
|
-
spec,
|
|
68
|
-
}, others);
|
|
69
|
-
};
|
|
70
|
-
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1,10 +0,0 @@
|
|
|
1
|
-
import { K8sArgs } from '../../types';
|
|
2
|
-
import * as k8s from '@pulumi/kubernetes';
|
|
3
|
-
import { DaprStorage } from './Storage';
|
|
4
|
-
interface Props extends K8sArgs {
|
|
5
|
-
name?: string;
|
|
6
|
-
version?: string;
|
|
7
|
-
storage: DaprStorage;
|
|
8
|
-
}
|
|
9
|
-
declare const _default: ({ name, version, storage, provider, dependsOn, }: Props) => Promise<k8s.helm.v3.Chart>;
|
|
10
|
-
export default _default;
|
|
@@ -1,31 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
const k8s = require("@pulumi/kubernetes");
|
|
4
|
-
const Namespace_1 = require("../../Core/Namespace");
|
|
5
|
-
const Storage_1 = require("./Storage");
|
|
6
|
-
const AzureEnv_1 = require("../../../Common/AzureEnv");
|
|
7
|
-
exports.default = async ({ name = 'dapr', version = '1.10', storage, provider, dependsOn, }) => {
|
|
8
|
-
const ns = (0, Namespace_1.default)({ name: 'dapr-system', provider, dependsOn });
|
|
9
|
-
const dapr = new k8s.helm.v3.Chart(name, {
|
|
10
|
-
namespace: ns.metadata.name,
|
|
11
|
-
chart: 'dapr',
|
|
12
|
-
//version,
|
|
13
|
-
fetchOpts: { repo: 'https://dapr.github.io/helm-charts' },
|
|
14
|
-
skipAwait: true,
|
|
15
|
-
values: {
|
|
16
|
-
global: {
|
|
17
|
-
//tag: `${version}-mariner`,
|
|
18
|
-
ha: { enabled: !AzureEnv_1.isLocal && !AzureEnv_1.isDev },
|
|
19
|
-
},
|
|
20
|
-
},
|
|
21
|
-
}, { dependsOn: ns, provider });
|
|
22
|
-
(0, Storage_1.default)({
|
|
23
|
-
name: `${name}-storage`,
|
|
24
|
-
namespace: ns.metadata.name,
|
|
25
|
-
storage,
|
|
26
|
-
provider,
|
|
27
|
-
dependsOn: dapr,
|
|
28
|
-
});
|
|
29
|
-
return dapr;
|
|
30
|
-
};
|
|
31
|
-
//# sourceMappingURL=data:application/json;base64,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
|
package/KubeX/Tools/Echo-App.js
DELETED
|
@@ -1,21 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
const Deployment_1 = require("../Deployment");
|
|
4
|
-
exports.default = ({ namespace, ingress, ...others }) => {
|
|
5
|
-
const name = 'echo-app';
|
|
6
|
-
const image = 'ealen/echo-server';
|
|
7
|
-
const port = 80;
|
|
8
|
-
(0, Deployment_1.default)({
|
|
9
|
-
name,
|
|
10
|
-
namespace,
|
|
11
|
-
podConfig: {
|
|
12
|
-
image,
|
|
13
|
-
ports: { http: port },
|
|
14
|
-
resources: { requests: { memory: '1Mi', cpu: '1m' } },
|
|
15
|
-
},
|
|
16
|
-
deploymentConfig: { replicas: 1 },
|
|
17
|
-
ingressConfig: ingress,
|
|
18
|
-
...others,
|
|
19
|
-
});
|
|
20
|
-
};
|
|
21
|
-
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1,72 +0,0 @@
|
|
|
1
|
-
import { DefaultK8sArgs } from '../../types';
|
|
2
|
-
import * as k8s from '@pulumi/kubernetes';
|
|
3
|
-
import { Input } from '@pulumi/pulumi';
|
|
4
|
-
import { KeyVaultInfo } from '../../../types';
|
|
5
|
-
type CaptchaType = {
|
|
6
|
-
type: 'image' | 'recaptcha' | 'hcaptcha' | 'mcaptcha' | 'cfturnstile';
|
|
7
|
-
siteKey: Input<string>;
|
|
8
|
-
secret: Input<string>;
|
|
9
|
-
url?: Input<string>;
|
|
10
|
-
};
|
|
11
|
-
type GroupMapType = {
|
|
12
|
-
azureGroupId: Input<string>;
|
|
13
|
-
giteaOrganization: Input<string>;
|
|
14
|
-
giteaTeam: Input<string>;
|
|
15
|
-
};
|
|
16
|
-
type GroupMapsType = Array<GroupMapType>;
|
|
17
|
-
interface HarborRepoProps extends DefaultK8sArgs {
|
|
18
|
-
vaultInfo?: KeyVaultInfo;
|
|
19
|
-
storageClass: Input<string>;
|
|
20
|
-
host: string;
|
|
21
|
-
auth?: {
|
|
22
|
-
localAdmin?: {
|
|
23
|
-
username: string;
|
|
24
|
-
email: string;
|
|
25
|
-
};
|
|
26
|
-
disableRegistration?: boolean;
|
|
27
|
-
enableAzureAD?: {
|
|
28
|
-
enabled: true;
|
|
29
|
-
groupMap?: GroupMapsType;
|
|
30
|
-
};
|
|
31
|
-
oauth?: {
|
|
32
|
-
name: string;
|
|
33
|
-
iconUrl?: Input<string>;
|
|
34
|
-
key: Input<string>;
|
|
35
|
-
secret: Input<string>;
|
|
36
|
-
scopes?: Input<string>;
|
|
37
|
-
autoDiscoverUrl?: Input<string>;
|
|
38
|
-
useCustomUrls?: Input<string>;
|
|
39
|
-
customAuthUrl?: Input<string>;
|
|
40
|
-
customTokenUrl?: Input<string>;
|
|
41
|
-
customProfileUrl?: Input<string>;
|
|
42
|
-
customEmailUrl?: Input<string>;
|
|
43
|
-
};
|
|
44
|
-
ldap?: {
|
|
45
|
-
name: string;
|
|
46
|
-
iconUrl?: Input<string>;
|
|
47
|
-
securityProtocol: Input<string>;
|
|
48
|
-
host: Input<string>;
|
|
49
|
-
port: Input<string>;
|
|
50
|
-
userSearchBase: Input<string>;
|
|
51
|
-
userFilter: Input<string>;
|
|
52
|
-
adminFilter: Input<string>;
|
|
53
|
-
emailAttribute: Input<string>;
|
|
54
|
-
bindDn: Input<string>;
|
|
55
|
-
bindPassword: Input<string>;
|
|
56
|
-
usernameAttribute: Input<string>;
|
|
57
|
-
publicSSHKeyAttribute: Input<string>;
|
|
58
|
-
};
|
|
59
|
-
};
|
|
60
|
-
captcha?: CaptchaType;
|
|
61
|
-
enabledActions?: boolean;
|
|
62
|
-
postgres: {
|
|
63
|
-
host: Input<string>;
|
|
64
|
-
port: Input<number>;
|
|
65
|
-
database: Input<string>;
|
|
66
|
-
username: Input<string>;
|
|
67
|
-
password: Input<string>;
|
|
68
|
-
sslmode?: boolean;
|
|
69
|
-
};
|
|
70
|
-
}
|
|
71
|
-
declare const _default: ({ name, namespace, host, auth, captcha, storageClass, postgres, enabledActions, vaultInfo, provider, dependsOn, }: HarborRepoProps) => k8s.helm.v3.Chart;
|
|
72
|
-
export default _default;
|