@drunk-pulumi/azure 0.0.19

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (386) hide show
  1. package/Aks/Helper.d.ts +43 -0
  2. package/Aks/Helper.js +72 -0
  3. package/Aks/Identity.d.ts +14 -0
  4. package/Aks/Identity.js +32 -0
  5. package/Aks/VmSetAutoScale/index.d.ts +16 -0
  6. package/Aks/VmSetAutoScale/index.js +132 -0
  7. package/Aks/VmSetMonitor/index.d.ts +12 -0
  8. package/Aks/VmSetMonitor/index.js +67 -0
  9. package/Aks/index.d.ts +100 -0
  10. package/Aks/index.js +558 -0
  11. package/Apim/ApiProduct/Api.d.ts +35 -0
  12. package/Apim/ApiProduct/Api.js +131 -0
  13. package/Apim/ApiProduct/OpenApi.d.ts +85 -0
  14. package/Apim/ApiProduct/OpenApi.js +3 -0
  15. package/Apim/ApiProduct/PolicyBuilder.d.ts +79 -0
  16. package/Apim/ApiProduct/PolicyBuilder.js +361 -0
  17. package/Apim/ApiProduct/Product.d.ts +8 -0
  18. package/Apim/ApiProduct/Product.js +63 -0
  19. package/Apim/ApiProduct/SwaggerHelper.d.ts +6 -0
  20. package/Apim/ApiProduct/SwaggerHelper.js +44 -0
  21. package/Apim/ApiProduct/index.d.ts +9 -0
  22. package/Apim/ApiProduct/index.js +22 -0
  23. package/Apim/Helpers.d.ts +0 -0
  24. package/Apim/Helpers.js +2 -0
  25. package/Apim/HookProxy/index.d.ts +20 -0
  26. package/Apim/HookProxy/index.js +27 -0
  27. package/Apim/index.d.ts +22 -0
  28. package/Apim/index.js +118 -0
  29. package/Apps/LogicApp.d.ts +12 -0
  30. package/Apps/LogicApp.js +19 -0
  31. package/Automation/AutoAccount.d.ts +5 -0
  32. package/Automation/AutoAccount.js +20 -0
  33. package/AzAd/B2C.d.ts +9 -0
  34. package/AzAd/B2C.js +38 -0
  35. package/AzAd/ConditionalPolicies/index.d.ts +0 -0
  36. package/AzAd/ConditionalPolicies/index.js +2 -0
  37. package/AzAd/EnvRoles.d.ts +12 -0
  38. package/AzAd/EnvRoles.js +62 -0
  39. package/AzAd/GraphDefinition.d.ts +14 -0
  40. package/AzAd/GraphDefinition.js +5136 -0
  41. package/AzAd/Group.d.ts +29 -0
  42. package/AzAd/Group.js +70 -0
  43. package/AzAd/Helper.d.ts +18 -0
  44. package/AzAd/Helper.js +37 -0
  45. package/AzAd/Identities/AzDevOps.d.ts +23 -0
  46. package/AzAd/Identities/AzDevOps.js +61 -0
  47. package/AzAd/Identities/AzUserAdRevertSync.d.ts +14 -0
  48. package/AzAd/Identities/AzUserAdRevertSync.js +18 -0
  49. package/AzAd/Identity.d.ts +51 -0
  50. package/AzAd/Identity.js +133 -0
  51. package/AzAd/ManagedIdentity.d.ts +6 -0
  52. package/AzAd/ManagedIdentity.js +23 -0
  53. package/AzAd/Role.d.ts +19 -0
  54. package/AzAd/Role.js +25 -0
  55. package/AzAd/RoleAssignment.d.ts +79 -0
  56. package/AzAd/RoleAssignment.js +48 -0
  57. package/AzAd/RolesBuiltIn.d.ts +62 -0
  58. package/AzAd/RolesBuiltIn.js +13841 -0
  59. package/Cdn/index.d.ts +11 -0
  60. package/Cdn/index.js +47 -0
  61. package/Certificate/index.d.ts +41 -0
  62. package/Certificate/index.js +156 -0
  63. package/Certificate/p12.d.ts +5 -0
  64. package/Certificate/p12.js +37 -0
  65. package/Common/AppConfigs/dotnetConfig.d.ts +15 -0
  66. package/Common/AppConfigs/dotnetConfig.js +20 -0
  67. package/Common/AutoTags.d.ts +1 -0
  68. package/Common/AutoTags.js +24 -0
  69. package/Common/AzureEnv.d.ts +37 -0
  70. package/Common/AzureEnv.js +94 -0
  71. package/Common/ConfigHelper.d.ts +5 -0
  72. package/Common/ConfigHelper.js +14 -0
  73. package/Common/GlobalEnv.d.ts +14 -0
  74. package/Common/GlobalEnv.js +38 -0
  75. package/Common/Helpers.d.ts +10 -0
  76. package/Common/Helpers.js +30 -0
  77. package/Common/Location.d.ts +4 -0
  78. package/Common/Location.js +23 -0
  79. package/Common/LocationBuiltIn.d.ts +81 -0
  80. package/Common/LocationBuiltIn.js +1925 -0
  81. package/Common/Naming/index.d.ts +62 -0
  82. package/Common/Naming/index.js +146 -0
  83. package/Common/ResourceEnv.d.ts +16 -0
  84. package/Common/ResourceEnv.js +29 -0
  85. package/Common/StackEnv.d.ts +4 -0
  86. package/Common/StackEnv.js +22 -0
  87. package/Common/index.d.ts +5 -0
  88. package/Common/index.js +9 -0
  89. package/ContainerRegistry/Helper.d.ts +23 -0
  90. package/ContainerRegistry/Helper.js +47 -0
  91. package/ContainerRegistry/index.d.ts +28 -0
  92. package/ContainerRegistry/index.js +103 -0
  93. package/Core/Helper.d.ts +16 -0
  94. package/Core/Helper.js +37 -0
  95. package/Core/KeyGenetators.d.ts +33 -0
  96. package/Core/KeyGenetators.js +66 -0
  97. package/Core/Locker.d.ts +13 -0
  98. package/Core/Locker.js +14 -0
  99. package/Core/Random.d.ts +40 -0
  100. package/Core/Random.js +83 -0
  101. package/Core/ResourceCreator.d.ts +17 -0
  102. package/Core/ResourceCreator.js +48 -0
  103. package/Core/ResourceGroup.d.ts +13 -0
  104. package/Core/ResourceGroup.js +45 -0
  105. package/CosmosDb/index.d.ts +33 -0
  106. package/CosmosDb/index.js +129 -0
  107. package/CustomRoles/index.d.ts +5 -0
  108. package/CustomRoles/index.js +27 -0
  109. package/IOT/Hub/index.d.ts +32 -0
  110. package/IOT/Hub/index.js +208 -0
  111. package/KeyVault/CustomHelper.d.ts +35 -0
  112. package/KeyVault/CustomHelper.js +40 -0
  113. package/KeyVault/Helper.d.ts +33 -0
  114. package/KeyVault/Helper.js +58 -0
  115. package/KeyVault/VaultAccess.d.ts +15 -0
  116. package/KeyVault/VaultAccess.js +47 -0
  117. package/KeyVault/VaultPermissions.d.ts +26 -0
  118. package/KeyVault/VaultPermissions.js +169 -0
  119. package/KeyVault/index.d.ts +28 -0
  120. package/KeyVault/index.js +136 -0
  121. package/KubeX/AcrSecret.d.ts +15 -0
  122. package/KubeX/AcrSecret.js +31 -0
  123. package/KubeX/Apps/AstroPage.d.ts +12 -0
  124. package/KubeX/Apps/AstroPage.js +33 -0
  125. package/KubeX/Apps/KafKa.d.ts +6 -0
  126. package/KubeX/Apps/KafKa.js +13 -0
  127. package/KubeX/Apps/Nobelium.d.ts +13 -0
  128. package/KubeX/Apps/Nobelium.js +37 -0
  129. package/KubeX/Apps/Wikijs.d.ts +30 -0
  130. package/KubeX/Apps/Wikijs.js +54 -0
  131. package/KubeX/Apps/WordPress.d.ts +24 -0
  132. package/KubeX/Apps/WordPress.js +55 -0
  133. package/KubeX/Apps/YarpProxy/index.d.ts +17 -0
  134. package/KubeX/Apps/YarpProxy/index.js +107 -0
  135. package/KubeX/Apps/YarpProxy/type.d.ts +55 -0
  136. package/KubeX/Apps/YarpProxy/type.js +3 -0
  137. package/KubeX/CertHelper.d.ts +1 -0
  138. package/KubeX/CertHelper.js +9 -0
  139. package/KubeX/CertImports.d.ts +19 -0
  140. package/KubeX/CertImports.js +70 -0
  141. package/KubeX/CloudFlare/CertCreator.d.ts +19 -0
  142. package/KubeX/CloudFlare/CertCreator.js +90 -0
  143. package/KubeX/CloudFlare/CertImports.d.ts +17 -0
  144. package/KubeX/CloudFlare/CertImports.js +34 -0
  145. package/KubeX/CloudFlare/DynamicDns.d.ts +21 -0
  146. package/KubeX/CloudFlare/DynamicDns.js +39 -0
  147. package/KubeX/CloudFlare/Tunnel-Helm.d.ts +17 -0
  148. package/KubeX/CloudFlare/Tunnel-Helm.js +12 -0
  149. package/KubeX/CloudFlare/Tunnel.d.ts +23 -0
  150. package/KubeX/CloudFlare/Tunnel.js +54 -0
  151. package/KubeX/CloudFlare/index.d.ts +13 -0
  152. package/KubeX/CloudFlare/index.js +36 -0
  153. package/KubeX/Clusters/K3s/AutoUpgradeController/index.d.ts +6 -0
  154. package/KubeX/Clusters/K3s/AutoUpgradeController/index.js +60 -0
  155. package/KubeX/ConfigSecret.d.ts +24 -0
  156. package/KubeX/ConfigSecret.js +38 -0
  157. package/KubeX/Core/CertManager/index.d.ts +24 -0
  158. package/KubeX/Core/CertManager/index.js +96 -0
  159. package/KubeX/Core/KsCertSecret.d.ts +12 -0
  160. package/KubeX/Core/KsCertSecret.js +22 -0
  161. package/KubeX/Core/KsSecret.d.ts +9 -0
  162. package/KubeX/Core/KsSecret.js +12 -0
  163. package/KubeX/Core/LoadBalancer/MetalLB.d.ts +7 -0
  164. package/KubeX/Core/LoadBalancer/MetalLB.js +21 -0
  165. package/KubeX/Core/Monitoring/index.d.ts +22 -0
  166. package/KubeX/Core/Monitoring/index.js +322 -0
  167. package/KubeX/Core/Namespace.d.ts +12 -0
  168. package/KubeX/Core/Namespace.js +41 -0
  169. package/KubeX/Core/Nginx/index.d.ts +60 -0
  170. package/KubeX/Core/Nginx/index.js +109 -0
  171. package/KubeX/Core/OAuthProxy/index.d.ts +0 -0
  172. package/KubeX/Core/OAuthProxy/index.js +3 -0
  173. package/KubeX/Core/ResourceQuota.d.ts +12 -0
  174. package/KubeX/Core/ResourceQuota.js +13 -0
  175. package/KubeX/Core/SecurityRules.d.ts +34 -0
  176. package/KubeX/Core/SecurityRules.js +93 -0
  177. package/KubeX/Core/StorageClass/azureBlob.d.ts +20 -0
  178. package/KubeX/Core/StorageClass/azureBlob.js +77 -0
  179. package/KubeX/Core/StorageClass/azureFile.d.ts +17 -0
  180. package/KubeX/Core/StorageClass/azureFile.js +45 -0
  181. package/KubeX/Core/StorageClass/index.d.ts +13 -0
  182. package/KubeX/Core/StorageClass/index.js +25 -0
  183. package/KubeX/Core/index.d.ts +57 -0
  184. package/KubeX/Core/index.js +94 -0
  185. package/KubeX/Databases/MariaDb.d.ts +11 -0
  186. package/KubeX/Databases/MariaDb.js +39 -0
  187. package/KubeX/Databases/MySql.V2.d.ts +11 -0
  188. package/KubeX/Databases/MySql.V2.js +40 -0
  189. package/KubeX/Databases/MySql.d.ts +13 -0
  190. package/KubeX/Databases/MySql.js +55 -0
  191. package/KubeX/Databases/PostgreSql/PostgreSQL-HA.d.ts +10 -0
  192. package/KubeX/Databases/PostgreSql/PostgreSQL-HA.js +47 -0
  193. package/KubeX/Databases/PostgreSql/PostgreSQL.d.ts +10 -0
  194. package/KubeX/Databases/PostgreSql/PostgreSQL.js +51 -0
  195. package/KubeX/Databases/PostgreSql/PostgreSql.v1.d.ts +13 -0
  196. package/KubeX/Databases/PostgreSql/PostgreSql.v1.js +56 -0
  197. package/KubeX/Databases/PostgreSql/index.d.ts +17 -0
  198. package/KubeX/Databases/PostgreSql/index.js +6 -0
  199. package/KubeX/Databases/RedisCache.d.ts +14 -0
  200. package/KubeX/Databases/RedisCache.js +65 -0
  201. package/KubeX/Databases/SqlServer.d.ts +15 -0
  202. package/KubeX/Databases/SqlServer.js +77 -0
  203. package/KubeX/Deployment/PodAutoscaler.d.ts +14 -0
  204. package/KubeX/Deployment/PodAutoscaler.js +51 -0
  205. package/KubeX/Deployment/index.d.ts +136 -0
  206. package/KubeX/Deployment/index.js +306 -0
  207. package/KubeX/Helpers.d.ts +4 -0
  208. package/KubeX/Helpers.js +17 -0
  209. package/KubeX/Ingress/AppGatewayIngress.d.ts +2 -0
  210. package/KubeX/Ingress/AppGatewayIngress.js +4 -0
  211. package/KubeX/Ingress/Conts.d.ts +13 -0
  212. package/KubeX/Ingress/Conts.js +18 -0
  213. package/KubeX/Ingress/NginxIngress.d.ts +3 -0
  214. package/KubeX/Ingress/NginxIngress.js +186 -0
  215. package/KubeX/Ingress/NginxProxy.d.ts +21 -0
  216. package/KubeX/Ingress/NginxProxy.js +43 -0
  217. package/KubeX/Ingress/TraefikIngress/CustomHeader.d.ts +15 -0
  218. package/KubeX/Ingress/TraefikIngress/CustomHeader.js +15 -0
  219. package/KubeX/Ingress/TraefikIngress/index.d.ts +11 -0
  220. package/KubeX/Ingress/TraefikIngress/index.js +95 -0
  221. package/KubeX/Ingress/index.d.ts +5 -0
  222. package/KubeX/Ingress/index.js +12 -0
  223. package/KubeX/Ingress/type.d.ts +82 -0
  224. package/KubeX/Ingress/type.js +3 -0
  225. package/KubeX/Providers/index.d.ts +8 -0
  226. package/KubeX/Providers/index.js +15 -0
  227. package/KubeX/Storage/Longhorn/index.d.ts +15 -0
  228. package/KubeX/Storage/Longhorn/index.js +54 -0
  229. package/KubeX/Storage/index.d.ts +25 -0
  230. package/KubeX/Storage/index.js +79 -0
  231. package/KubeX/Tools/AWS/LocalStack.d.ts +7 -0
  232. package/KubeX/Tools/AWS/LocalStack.js +29 -0
  233. package/KubeX/Tools/AWS/S3.d.ts +6 -0
  234. package/KubeX/Tools/AWS/S3.js +44 -0
  235. package/KubeX/Tools/AWS/index.d.ts +7 -0
  236. package/KubeX/Tools/AWS/index.js +14 -0
  237. package/KubeX/Tools/AppHealthzMonitor.d.ts +18 -0
  238. package/KubeX/Tools/AppHealthzMonitor.js +52 -0
  239. package/KubeX/Tools/ArgoCD/index.d.ts +17 -0
  240. package/KubeX/Tools/ArgoCD/index.js +131 -0
  241. package/KubeX/Tools/Dapr/Storage.d.ts +66 -0
  242. package/KubeX/Tools/Dapr/Storage.js +70 -0
  243. package/KubeX/Tools/Dapr/index.d.ts +10 -0
  244. package/KubeX/Tools/Dapr/index.js +31 -0
  245. package/KubeX/Tools/Echo-App.d.ts +3 -0
  246. package/KubeX/Tools/Echo-App.js +21 -0
  247. package/KubeX/Tools/Gitea/GiteaRepo.d.ts +72 -0
  248. package/KubeX/Tools/Gitea/GiteaRepo.js +184 -0
  249. package/KubeX/Tools/Gitea/GiteaRunner.d.ts +11 -0
  250. package/KubeX/Tools/Gitea/GiteaRunner.js +37 -0
  251. package/KubeX/Tools/Gitea/GiteaRunner.v1.d.ts +11 -0
  252. package/KubeX/Tools/Gitea/GiteaRunner.v1.js +123 -0
  253. package/KubeX/Tools/HarborRepo.d.ts +29 -0
  254. package/KubeX/Tools/HarborRepo.js +78 -0
  255. package/KubeX/Tools/HelloWorld.d.ts +3 -0
  256. package/KubeX/Tools/HelloWorld.js +21 -0
  257. package/KubeX/Tools/KubeCleanup.d.ts +9 -0
  258. package/KubeX/Tools/KubeCleanup.js +34 -0
  259. package/KubeX/Tools/NoIp.d.ts +13 -0
  260. package/KubeX/Tools/NoIp.js +24 -0
  261. package/KubeX/Tools/OpenLDAP/index.d.ts +12 -0
  262. package/KubeX/Tools/OpenLDAP/index.js +56 -0
  263. package/KubeX/Tools/OutlineVpn/index.d.ts +25 -0
  264. package/KubeX/Tools/OutlineVpn/index.js +256 -0
  265. package/KubeX/Tools/SqlPad.d.ts +29 -0
  266. package/KubeX/Tools/SqlPad.js +133 -0
  267. package/KubeX/Tools/ToolPod.d.ts +10 -0
  268. package/KubeX/Tools/ToolPod.js +40 -0
  269. package/KubeX/Tools/UptimeKuma.d.ts +6 -0
  270. package/KubeX/Tools/UptimeKuma.js +38 -0
  271. package/KubeX/Tools/index.d.ts +27 -0
  272. package/KubeX/Tools/index.js +35 -0
  273. package/KubeX/VairableResolvers/index.d.ts +15 -0
  274. package/KubeX/VairableResolvers/index.js +49 -0
  275. package/KubeX/kx/index.d.ts +114 -0
  276. package/KubeX/kx/index.js +423 -0
  277. package/KubeX/types.d.ts +49 -0
  278. package/KubeX/types.js +3 -0
  279. package/Logs/AppInsight.d.ts +16 -0
  280. package/Logs/AppInsight.js +48 -0
  281. package/Logs/Helpers.d.ts +50 -0
  282. package/Logs/Helpers.js +95 -0
  283. package/Logs/LogAnalytics.d.ts +17 -0
  284. package/Logs/LogAnalytics.js +54 -0
  285. package/Logs/WebTest.d.ts +13 -0
  286. package/Logs/WebTest.js +68 -0
  287. package/Logs/index.d.ts +42 -0
  288. package/Logs/index.js +69 -0
  289. package/MySql/index.d.ts +20 -0
  290. package/MySql/index.js +93 -0
  291. package/Postgresql/index.d.ts +20 -0
  292. package/Postgresql/index.js +93 -0
  293. package/ReadMe.md +36 -0
  294. package/RedisCache/index.d.ts +9 -0
  295. package/RedisCache/index.js +79 -0
  296. package/ServiceBus/ServiceBusHelper.d.ts +21 -0
  297. package/ServiceBus/ServiceBusHelper.js +35 -0
  298. package/ServiceBus/index.d.ts +98 -0
  299. package/ServiceBus/index.js +396 -0
  300. package/SignalR/index.d.ts +20 -0
  301. package/SignalR/index.js +114 -0
  302. package/Sql/Auditing.d.ts +0 -0
  303. package/Sql/Auditing.js +2 -0
  304. package/Sql/Helper.d.ts +9 -0
  305. package/Sql/Helper.js +11 -0
  306. package/Sql/SqlDb.d.ts +14 -0
  307. package/Sql/SqlDb.js +42 -0
  308. package/Sql/index.d.ts +44 -0
  309. package/Sql/index.js +236 -0
  310. package/Storage/CdnEndpoint.d.ts +12 -0
  311. package/Storage/CdnEndpoint.js +62 -0
  312. package/Storage/CdnRules.d.ts +6 -0
  313. package/Storage/CdnRules.js +134 -0
  314. package/Storage/Helper.d.ts +28 -0
  315. package/Storage/Helper.js +66 -0
  316. package/Storage/ManagementRules.d.ts +70 -0
  317. package/Storage/ManagementRules.js +32 -0
  318. package/Storage/index.d.ts +55 -0
  319. package/Storage/index.js +264 -0
  320. package/VM/index.d.ts +37 -0
  321. package/VM/index.js +138 -0
  322. package/VNet/Bastion.d.ts +8 -0
  323. package/VNet/Bastion.js +30 -0
  324. package/VNet/Firewall.d.ts +27 -0
  325. package/VNet/Firewall.js +87 -0
  326. package/VNet/FirewallPolicies/AksFirewallPolicy.d.ts +20 -0
  327. package/VNet/FirewallPolicies/AksFirewallPolicy.js +241 -0
  328. package/VNet/FirewallPolicies/CloudPCFirewallPolicy.d.ts +14 -0
  329. package/VNet/FirewallPolicies/CloudPCFirewallPolicy.js +303 -0
  330. package/VNet/FirewallPolicy.d.ts +28 -0
  331. package/VNet/FirewallPolicy.js +110 -0
  332. package/VNet/FirewallRules/AksFirewallRules.d.ts +24 -0
  333. package/VNet/FirewallRules/AksFirewallRules.js +250 -0
  334. package/VNet/FirewallRules/DefaultRules.d.ts +2 -0
  335. package/VNet/FirewallRules/DefaultRules.js +23 -0
  336. package/VNet/FirewallRules/types.d.ts +20 -0
  337. package/VNet/FirewallRules/types.js +5 -0
  338. package/VNet/GlobalNetworkPeering.d.ts +9 -0
  339. package/VNet/GlobalNetworkPeering.js +17 -0
  340. package/VNet/Helper.d.ts +33 -0
  341. package/VNet/Helper.js +86 -0
  342. package/VNet/IpAddress.d.ts +17 -0
  343. package/VNet/IpAddress.js +38 -0
  344. package/VNet/IpAddressPrefix.d.ts +22 -0
  345. package/VNet/IpAddressPrefix.js +42 -0
  346. package/VNet/NSGRules/AzADService.d.ts +10 -0
  347. package/VNet/NSGRules/AzADService.js +45 -0
  348. package/VNet/NetworkPeering.d.ts +10 -0
  349. package/VNet/NetworkPeering.js +29 -0
  350. package/VNet/PrivateDns.d.ts +33 -0
  351. package/VNet/PrivateDns.js +64 -0
  352. package/VNet/PrivateEndpoint.d.ts +9 -0
  353. package/VNet/PrivateEndpoint.js +71 -0
  354. package/VNet/PublicDns.d.ts +21 -0
  355. package/VNet/PublicDns.js +59 -0
  356. package/VNet/RouteTable.d.ts +13 -0
  357. package/VNet/RouteTable.js +23 -0
  358. package/VNet/SecurityGroup.d.ts +8 -0
  359. package/VNet/SecurityGroup.js +13 -0
  360. package/VNet/Subnet.d.ts +26 -0
  361. package/VNet/Subnet.js +48 -0
  362. package/VNet/VirtualWAN.d.ts +25 -0
  363. package/VNet/VirtualWAN.js +40 -0
  364. package/VNet/Vnet.d.ts +51 -0
  365. package/VNet/Vnet.js +196 -0
  366. package/VNet/index.d.ts +65 -0
  367. package/VNet/index.js +198 -0
  368. package/Web/AppCertOrder.d.ts +16 -0
  369. package/Web/AppCertOrder.js +34 -0
  370. package/Web/AppConfig.d.ts +16 -0
  371. package/Web/AppConfig.js +79 -0
  372. package/Web/AppGateway.d.ts +15 -0
  373. package/Web/AppGateway.js +32 -0
  374. package/Web/FuncApp.d.ts +12 -0
  375. package/Web/FuncApp.js +24 -0
  376. package/Web/Helpers.d.ts +6 -0
  377. package/Web/Helpers.js +36 -0
  378. package/Web/WebAppPlan.d.ts +7 -0
  379. package/Web/WebAppPlan.js +26 -0
  380. package/Web/types.d.ts +169 -0
  381. package/Web/types.js +3 -0
  382. package/package.json +34 -0
  383. package/types.d.ts +69 -0
  384. package/types.js +3 -0
  385. package/z_tests/_tools/Mocks.d.ts +2 -0
  386. package/z_tests/_tools/Mocks.js +47 -0
package/Aks/index.js ADDED
@@ -0,0 +1,558 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.VmSizes = void 0;
4
+ const native = require("@pulumi/azure-native");
5
+ const pulumi = require("@pulumi/pulumi");
6
+ const pulumi_1 = require("@pulumi/pulumi");
7
+ const VmSetMonitor_1 = require("./VmSetMonitor");
8
+ const AzureEnv_1 = require("../Common/AzureEnv");
9
+ const Locker_1 = require("../Core/Locker");
10
+ const Identity_1 = require("./Identity");
11
+ const StackEnv_1 = require("../Common/StackEnv");
12
+ const Helpers_1 = require("../Logs/Helpers");
13
+ const Naming_1 = require("../Common/Naming");
14
+ const PrivateDns_1 = require("../VNet/PrivateDns");
15
+ const Helper_1 = require("../VNet/Helper");
16
+ const RoleAssignment_1 = require("../AzAd/RoleAssignment");
17
+ const Group_1 = require("../AzAd/Group");
18
+ const Helper_2 = require("./Helper");
19
+ const CustomHelper_1 = require("../KeyVault/CustomHelper");
20
+ const KeyVaultBase_1 = require("@drunk-pulumi/azure-providers/AzBase/KeyVaultBase");
21
+ const autoScaleFor = ({ enableAutoScaling, nodeType, env, }) => {
22
+ const nodeCount = 1;
23
+ const minCount = 1;
24
+ let maxCount = 3;
25
+ if (env === AzureEnv_1.Environments.Prd) {
26
+ switch (nodeType) {
27
+ case 'User':
28
+ maxCount = 5;
29
+ break;
30
+ case 'Default':
31
+ case 'System':
32
+ default:
33
+ maxCount = 3;
34
+ break;
35
+ }
36
+ }
37
+ return {
38
+ enableAutoScaling,
39
+ nodeCount: enableAutoScaling ? undefined : nodeCount,
40
+ minCount: enableAutoScaling ? minCount : undefined,
41
+ maxCount: enableAutoScaling ? maxCount : undefined,
42
+ };
43
+ };
44
+ const defaultNodePoolProps = {
45
+ availabilityZones: AzureEnv_1.isPrd ? ['1', '2', '3'] : undefined,
46
+ type: native.containerservice.AgentPoolType.VirtualMachineScaleSets,
47
+ vmSize: 'Standard_B2s',
48
+ maxPods: 50,
49
+ enableFIPS: false,
50
+ enableNodePublicIP: false,
51
+ enableUltraSSD: AzureEnv_1.isPrd,
52
+ osDiskSizeGB: 128,
53
+ osDiskType: native.containerservice.OSDiskType.Managed,
54
+ nodeLabels: {
55
+ environment: AzureEnv_1.currentEnv,
56
+ stack: StackEnv_1.stack,
57
+ },
58
+ tags: {
59
+ environment: AzureEnv_1.currentEnv,
60
+ },
61
+ };
62
+ var VmSizes;
63
+ (function (VmSizes) {
64
+ /** 32G RAM - 4CPU - $221.92 */
65
+ VmSizes["Standard_E4as_v4_221"] = "Standard_E4as_v4";
66
+ /** 8G RAM - 2CPU - $77.38 */
67
+ VmSizes["Standard_B2ms_77"] = "Standard_B2ms";
68
+ /** 16G RAM - 4CPU - $154.03 */
69
+ VmSizes["Standard_B4ms_154"] = "Standard_B4ms";
70
+ /** 8G RAM - 2CPU - 87.60 */
71
+ VmSizes["Standard_D2as_v4_87"] = "Standard_D2as_v4";
72
+ /** 8G RAM - 2CPU - 87.60 */
73
+ VmSizes["Standard_D2s_v3_87"] = "Standard_D2s_v3";
74
+ /** 16G RAM - 4CPU - $175.20 */
75
+ VmSizes["Standard_D4as_v4_175"] = "Standard_D4as_v4";
76
+ /** 4G RAM - 2CPU - $69.35 */
77
+ VmSizes["Standard_A2_v2_69"] = "Standard_A2_v2";
78
+ /** 8G RAM - 4CPU - $144.54 */
79
+ VmSizes["Standard_A4_v2_144"] = "Standard_A4_v2";
80
+ /** 32G RAM - 4CPU - $205.13 */
81
+ VmSizes["Standard_A4m_v2_205"] = "Standard_A4m_v2";
82
+ })(VmSizes || (exports.VmSizes = VmSizes = {}));
83
+ //Using this to enable the preview feature https://azurecloudai.blog/2019/10/16/aks-enabling-and-using-preview-features-such-as-nodepools-using-cli/
84
+ exports.default = async ({ group, nodeResourceGroup, name, linux,
85
+ //kubernetesVersion,
86
+ defaultNodePool, nodePools, enableAutoScale, network, log, acr, aksAccess, vaultInfo, featureFlags = { enableDiagnosticSetting: true }, addon = {
87
+ enableAzurePolicy: true,
88
+ enableAzureKeyVault: true,
89
+ enableKubeDashboard: false,
90
+ }, tier = native.containerservice.ManagedClusterSKUTier.Free, lock = true, dependsOn = [], importFrom, }) => {
91
+ const aksName = (0, Naming_1.getAksName)(name);
92
+ const secretName = `${aksName}-config`;
93
+ const acrScope = acr?.enable ? acr.id ?? AzureEnv_1.defaultScope : undefined;
94
+ const disableLocalAccounts = vaultInfo
95
+ ? await (0, KeyVaultBase_1.getKeyVaultBase)(vaultInfo.name).checkSecretExist(secretName)
96
+ : false;
97
+ console.log(name, { disableLocalAccounts });
98
+ nodeResourceGroup = nodeResourceGroup || `${aksName}-nodes`;
99
+ // const appGateway =
100
+ // addon.applicationGateway && network.outboundIpAddress
101
+ // ? await AppGateway({
102
+ // name,
103
+ // group,
104
+ // publicIpAddressId: network.outboundIpAddress.ipAddressId,
105
+ // subnetId: addon.applicationGateway.gatewaySubnetId,
106
+ // })
107
+ // : undefined;
108
+ // const podIdentity = featureFlags?.enablePodIdentity
109
+ // ? ManagedIdentity({
110
+ // name,
111
+ // group,
112
+ // lock,
113
+ // })
114
+ // : undefined;
115
+ const serviceIdentity = featureFlags.createServicePrincipal
116
+ ? (0, Identity_1.default)({
117
+ name: aksName,
118
+ vaultInfo,
119
+ })
120
+ : undefined;
121
+ const adminGroup = aksAccess?.envRoleNames
122
+ ? (0, Group_1.getAdGroup)(aksAccess.envRoleNames.admin)
123
+ : undefined;
124
+ const contributeGroup = aksAccess?.envRoleNames
125
+ ? (0, Group_1.getAdGroup)(aksAccess.envRoleNames.contributor)
126
+ : undefined;
127
+ //const enableAzureRBAC = Boolean(aksAccess?.adminMembers && adminGroup);
128
+ //=================Validate ===================================/
129
+ if (!network?.subnetId) {
130
+ console.error('Aks subnetId is required:', name);
131
+ return undefined;
132
+ }
133
+ if (!linux?.sshKeys || !linux.sshKeys[0]) {
134
+ console.error('Aks sshKeys is required:', name);
135
+ return undefined;
136
+ }
137
+ //Private DNS Zone for Private CLuster
138
+ const privateZone = aksAccess?.enablePrivateCluster
139
+ ? (0, PrivateDns_1.default)({
140
+ name: 'privatelink.southeastasia.azmk8s.io',
141
+ group,
142
+ vnetIds: [(0, pulumi_1.output)(network.subnetId).apply(Helper_1.getVnetIdFromSubnetId)],
143
+ })
144
+ : undefined;
145
+ //Create AKS Cluster
146
+ const aks = new native.containerservice.ManagedCluster(aksName, {
147
+ resourceName: aksName,
148
+ ...group,
149
+ nodeResourceGroup,
150
+ dnsPrefix: aksName,
151
+ //kubernetesVersion,
152
+ apiServerAccessProfile: {
153
+ authorizedIPRanges: aksAccess?.enablePrivateCluster
154
+ ? []
155
+ : aksAccess?.authorizedIPRanges || [],
156
+ disableRunCommand: true,
157
+ enablePrivateCluster: aksAccess?.enablePrivateCluster,
158
+ privateDNSZone: privateZone?.id,
159
+ },
160
+ //fqdnSubdomain: '',
161
+ addonProfiles: {
162
+ azureKeyvaultSecretsProvider: {
163
+ config: addon.enableAzureKeyVault
164
+ ? {
165
+ enableSecretRotation: 'true',
166
+ }
167
+ : undefined,
168
+ enabled: Boolean(addon.enableAzureKeyVault),
169
+ },
170
+ azurePolicy: { enabled: Boolean(addon.enableAzurePolicy) },
171
+ kubeDashboard: { enabled: Boolean(addon.enableKubeDashboard) },
172
+ //If there is no public P address provided, the public app can access via HTTP app routing only and feature only support HTTP.
173
+ //TO enable HTTPS support need to create a cluster with a public IP address.
174
+ httpApplicationRouting: {
175
+ enabled: !network.outboundIpAddress?.ipAddressId &&
176
+ !network.enableFirewall &&
177
+ !aksAccess?.enablePrivateCluster,
178
+ },
179
+ aciConnectorLinux: {
180
+ enabled: Boolean(network.virtualHostSubnetName),
181
+ config: network.virtualHostSubnetName
182
+ ? { SubnetName: network.virtualHostSubnetName }
183
+ : undefined,
184
+ },
185
+ ingressApplicationGateway: {
186
+ enabled: Boolean(addon.applicationGateway),
187
+ config: addon.applicationGateway
188
+ ? {
189
+ gatewayName: `${name}-gateway`,
190
+ subnetId: addon.applicationGateway.gatewaySubnetId,
191
+ }
192
+ : undefined,
193
+ },
194
+ omsAgent: {
195
+ enabled: Boolean(log?.logWpId),
196
+ config: log
197
+ ? {
198
+ logAnalyticsWorkspaceResourceID: log.logWpId,
199
+ }
200
+ : undefined,
201
+ },
202
+ },
203
+ sku: {
204
+ name: native.containerservice.ManagedClusterSKUName.Base,
205
+ tier,
206
+ },
207
+ agentPoolProfiles: [
208
+ {
209
+ ...defaultNodePoolProps,
210
+ ...defaultNodePool,
211
+ ...autoScaleFor({
212
+ env: AzureEnv_1.currentEnv,
213
+ nodeType: defaultNodePool.mode,
214
+ enableAutoScaling: enableAutoScale,
215
+ }),
216
+ count: defaultNodePool.mode === 'System' ? 1 : 0,
217
+ //orchestratorVersion: kubernetesVersion,
218
+ vnetSubnetID: network.subnetId,
219
+ kubeletDiskType: 'OS',
220
+ osSKU: 'Ubuntu',
221
+ osType: 'Linux',
222
+ //upgradeSettings: {},
223
+ tags: {
224
+ ...defaultNodePoolProps.tags,
225
+ mode: defaultNodePool.mode,
226
+ },
227
+ },
228
+ ],
229
+ linuxProfile: linux
230
+ ? {
231
+ adminUsername: linux.adminUsername,
232
+ ssh: { publicKeys: linux.sshKeys.map((k) => ({ keyData: k })) },
233
+ }
234
+ : undefined,
235
+ autoScalerProfile: {
236
+ balanceSimilarNodeGroups: 'true',
237
+ expander: 'random',
238
+ maxEmptyBulkDelete: '10',
239
+ maxGracefulTerminationSec: '600',
240
+ maxNodeProvisionTime: '15m',
241
+ maxTotalUnreadyPercentage: '45',
242
+ newPodScaleUpDelay: '0s',
243
+ okTotalUnreadyCount: '3',
244
+ scaleDownDelayAfterAdd: '30m',
245
+ scaleDownDelayAfterDelete: '60s',
246
+ scaleDownDelayAfterFailure: '10m',
247
+ scaleDownUnneededTime: '10m',
248
+ scaleDownUnreadyTime: '20m',
249
+ scaleDownUtilizationThreshold: '0.5',
250
+ scanInterval: '60s',
251
+ skipNodesWithLocalStorage: 'false',
252
+ skipNodesWithSystemPods: 'true',
253
+ },
254
+ //Still under preview
255
+ // workloadAutoScalerProfile: enableAutoScale
256
+ // ? { keda: { enabled: true } }
257
+ // : undefined,
258
+ servicePrincipalProfile: serviceIdentity
259
+ ? {
260
+ clientId: serviceIdentity.clientId,
261
+ secret: serviceIdentity.clientSecret,
262
+ }
263
+ : undefined,
264
+ securityProfile: {
265
+ defender: AzureEnv_1.isPrd
266
+ ? {
267
+ logAnalyticsWorkspaceResourceId: log?.logWpId,
268
+ securityMonitoring: { enabled: true },
269
+ }
270
+ : undefined,
271
+ imageCleaner: { enabled: true, intervalHours: 24 },
272
+ workloadIdentity: { enabled: false },
273
+ },
274
+ //azureMonitorProfile: { metrics: { enabled } },
275
+ //Refer here for details https://learn.microsoft.com/en-us/azure/aks/use-managed-identity
276
+ enablePodSecurityPolicy: false,
277
+ podIdentityProfile: featureFlags.enablePodIdentity
278
+ ? {
279
+ enabled: featureFlags.enablePodIdentity,
280
+ //Not allow pod to use kublet command
281
+ allowNetworkPluginKubenet: false,
282
+ }
283
+ : undefined,
284
+ identity: {
285
+ type: native.containerservice.ResourceIdentityType.SystemAssigned,
286
+ },
287
+ // identityProfile: podIdentity
288
+ // ? {
289
+ // kubeletidentity: {
290
+ // clientId: podIdentity.clientId,
291
+ // objectId: podIdentity.principalId,
292
+ // resourceId: podIdentity.id,
293
+ // },
294
+ // }
295
+ // : undefined,
296
+ //Preview Features
297
+ autoUpgradeProfile: {
298
+ upgradeChannel: native.containerservice.UpgradeChannel.Patch,
299
+ },
300
+ //securityProfile:{},
301
+ disableLocalAccounts,
302
+ enableRBAC: true,
303
+ aadProfile: {
304
+ enableAzureRBAC: true,
305
+ managed: true,
306
+ adminGroupObjectIDs: adminGroup ? [adminGroup.objectId] : undefined,
307
+ tenantID: AzureEnv_1.tenantId,
308
+ },
309
+ storageProfile: {
310
+ blobCSIDriver: {
311
+ enabled: true,
312
+ },
313
+ diskCSIDriver: {
314
+ enabled: true,
315
+ },
316
+ fileCSIDriver: { enabled: true },
317
+ },
318
+ networkProfile: {
319
+ networkMode: native.containerservice.NetworkMode.Transparent,
320
+ networkPolicy: native.containerservice.NetworkPolicy.Azure,
321
+ networkPlugin: native.containerservice.NetworkPlugin.Azure,
322
+ //dnsServiceIP: '10.0.0.10',
323
+ //dockerBridgeCidr: '172.17.0.1/16',
324
+ //serviceCidr: '10.0.0.0/16',
325
+ outboundType: network.enableFirewall || aksAccess?.enablePrivateCluster
326
+ ? native.containerservice.OutboundType.UserDefinedRouting
327
+ : native.containerservice.OutboundType.LoadBalancer,
328
+ loadBalancerSku: network.outboundIpAddress?.ipAddressId ||
329
+ network.enableFirewall ||
330
+ aksAccess?.enablePrivateCluster
331
+ ? 'Standard'
332
+ : 'Basic',
333
+ loadBalancerProfile: network.outboundIpAddress &&
334
+ !(network.enableFirewall || aksAccess?.enablePrivateCluster)
335
+ ? {
336
+ outboundIPs: {
337
+ publicIPs: [{ id: network.outboundIpAddress.ipAddressId }],
338
+ },
339
+ outboundIPPrefixes: network.outboundIpAddress.ipAddressPrefixId
340
+ ? {
341
+ publicIPPrefixes: [
342
+ { id: network.outboundIpAddress.ipAddressPrefixId },
343
+ ],
344
+ }
345
+ : undefined,
346
+ }
347
+ : undefined,
348
+ },
349
+ tags: AzureEnv_1.defaultTags,
350
+ }, {
351
+ protect: lock,
352
+ dependsOn: serviceIdentity
353
+ ? [...dependsOn, serviceIdentity.resource]
354
+ : dependsOn,
355
+ import: importFrom,
356
+ deleteBeforeReplace: true,
357
+ ignoreChanges: ['privateLinkResources', 'networkProfile', 'linuxProfile'],
358
+ });
359
+ if (lock) {
360
+ (0, Locker_1.default)({ name: aksName, resourceId: aks.id, dependsOn: aks });
361
+ }
362
+ if (nodePools) {
363
+ nodePools.map((p) => new native.containerservice.AgentPool(`${name}-${p.name}`, {
364
+ //agentPoolName:p.name,
365
+ resourceName: aks.name,
366
+ ...group,
367
+ ...defaultNodePoolProps,
368
+ ...p,
369
+ ...autoScaleFor({
370
+ env: AzureEnv_1.currentEnv,
371
+ nodeType: p.mode,
372
+ enableAutoScaling: enableAutoScale,
373
+ }),
374
+ count: p.mode === 'System' ? 1 : 0,
375
+ //orchestratorVersion: kubernetesVersion,
376
+ vnetSubnetID: network.subnetId,
377
+ kubeletDiskType: 'OS',
378
+ osSKU: 'Ubuntu',
379
+ osType: 'Linux',
380
+ //upgradeSettings: {},
381
+ tags: {
382
+ ...defaultNodePoolProps.tags,
383
+ mode: p.mode,
384
+ },
385
+ }));
386
+ }
387
+ if (vaultInfo) {
388
+ aks.id.apply(async (id) => {
389
+ if (!id)
390
+ return;
391
+ const config = await (0, Helper_2.getAksConfig)({
392
+ name: aksName,
393
+ groupName: group.resourceGroupName,
394
+ formattedName: true,
395
+ localAccountDisabled: disableLocalAccounts,
396
+ });
397
+ (0, CustomHelper_1.addCustomSecret)({
398
+ name: secretName,
399
+ value: config,
400
+ dependsOn: aks,
401
+ ignoreChange: true,
402
+ contentType: name,
403
+ vaultInfo,
404
+ });
405
+ });
406
+ }
407
+ //Grant permission for Group
408
+ aks.id.apply(async (id) => {
409
+ if (!id)
410
+ return;
411
+ //Admin
412
+ if (adminGroup) {
413
+ await Promise.all([
414
+ {
415
+ shortName: 'Admin-Contributor-Role',
416
+ name: 'Azure Kubernetes Service Contributor Role',
417
+ },
418
+ {
419
+ shortName: 'Admin-RBAC-Cluster-Admin',
420
+ name: 'Azure Kubernetes Service RBAC Cluster Admin',
421
+ },
422
+ {
423
+ shortName: 'Admin-Cluster-Admin-Role',
424
+ name: 'Azure Kubernetes Service Cluster Admin Role',
425
+ },
426
+ {
427
+ shortName: 'Admin-Cluster-Monitoring-User',
428
+ name: 'Azure Kubernetes Service Cluster Monitoring User',
429
+ },
430
+ {
431
+ shortName: 'Admin-Cluster-User-Role',
432
+ name: 'Azure Kubernetes Service Cluster User Role',
433
+ },
434
+ ].map((r) => (0, RoleAssignment_1.roleAssignment)({
435
+ name: `${name}-${r.shortName}`,
436
+ principalId: adminGroup.objectId,
437
+ principalType: 'Group',
438
+ roleName: r.name,
439
+ scope: id,
440
+ })));
441
+ }
442
+ //Contributor
443
+ if (contributeGroup) {
444
+ await Promise.all([
445
+ {
446
+ shortName: 'Contributor-Contributor-Role',
447
+ name: 'Azure Kubernetes Service Contributor Role',
448
+ },
449
+ {
450
+ shortName: 'Contributor-RBAC-Admin',
451
+ name: 'Azure Kubernetes Service RBAC Admin',
452
+ },
453
+ {
454
+ shortName: 'Contributor-RBAC-Reader',
455
+ name: 'Azure Kubernetes Service RBAC Reader',
456
+ },
457
+ {
458
+ shortName: 'Contributor-RBAC-Writer',
459
+ name: 'Azure Kubernetes Service RBAC Writer',
460
+ },
461
+ ].map((r) => (0, RoleAssignment_1.roleAssignment)({
462
+ name: `${name}-${r.shortName}`,
463
+ principalId: contributeGroup.objectId,
464
+ principalType: 'Group',
465
+ roleName: r.name,
466
+ scope: id,
467
+ })));
468
+ }
469
+ //Diagnostic
470
+ if (featureFlags.enableDiagnosticSetting) {
471
+ (0, Helpers_1.createDiagnostic)({
472
+ name,
473
+ targetResourceId: id,
474
+ ...log,
475
+ logsCategories: [
476
+ 'guard',
477
+ 'kube-controller-manager',
478
+ 'kube-audit-admin',
479
+ 'kube-audit',
480
+ 'kube-scheduler',
481
+ 'cluster-autoscaler',
482
+ ],
483
+ });
484
+ }
485
+ });
486
+ //Grant Permission for Identity
487
+ pulumi
488
+ .all([aks.identity, aks.identityProfile, network.subnetId])
489
+ .apply(([identity, identityProfile, sId]) => {
490
+ console.log('Grant RBAC for cluster:', name);
491
+ //Already assigned when creating the service
492
+ // if (serviceIdentity?.principalId) {
493
+ // await roleAssignment({
494
+ // name: `${name}-aks-identity-acr-pull`,
495
+ // principalId: serviceIdentity?.principalId,
496
+ // principalType: 'ServicePrincipal',
497
+ // roleName: 'AcrPull',
498
+ // scope: defaultScope,
499
+ // });
500
+ // }
501
+ if (acrScope && identityProfile && identityProfile['kubeletidentity']) {
502
+ (0, RoleAssignment_1.roleAssignment)({
503
+ name: `${name}-aks-identity-profile-pull`,
504
+ principalId: identityProfile['kubeletidentity'].objectId,
505
+ principalType: 'ServicePrincipal',
506
+ roleName: 'AcrPull',
507
+ scope: acrScope,
508
+ });
509
+ if (vaultInfo) {
510
+ (0, CustomHelper_1.addCustomSecret)({
511
+ name: `${name}-identity-clientId`,
512
+ value: identityProfile['kubeletidentity'].clientId,
513
+ dependsOn: aks,
514
+ contentType: name,
515
+ vaultInfo,
516
+ });
517
+ }
518
+ }
519
+ // if (identity?.principalId) {
520
+ // await roleAssignment({
521
+ // name: `${name}-system-acr-pull`,
522
+ // principalId: identity.principalId,
523
+ // principalType: 'ServicePrincipal',
524
+ // roleName: 'AcrPull',
525
+ // scope: defaultScope,
526
+ // });
527
+ // }
528
+ if (network.subnetId && identity) {
529
+ (0, RoleAssignment_1.roleAssignment)({
530
+ name: `${name}-system-net`,
531
+ principalId: identity.principalId,
532
+ roleName: 'Contributor',
533
+ principalType: 'ServicePrincipal',
534
+ scope: (0, AzureEnv_1.getResourceIdFromInfo)({
535
+ group: (0, AzureEnv_1.getResourceInfoFromId)(sId).group,
536
+ }),
537
+ });
538
+ }
539
+ if (privateZone && identity) {
540
+ (0, RoleAssignment_1.roleAssignment)({
541
+ name: `${name}-private-dns`,
542
+ principalId: identity.principalId,
543
+ roleName: 'Private DNS Zone Contributor',
544
+ principalType: 'ServicePrincipal',
545
+ scope: privateZone.id,
546
+ });
547
+ }
548
+ });
549
+ //Apply monitoring for VMScale Sets
550
+ (0, VmSetMonitor_1.default)({
551
+ group: { resourceGroupName: nodeResourceGroup },
552
+ ...log,
553
+ vaultInfo,
554
+ dependsOn: aks,
555
+ });
556
+ return { aks, serviceIdentity, adminGroup, privateZone };
557
+ };
558
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/Aks/index.ts"],"names":[],"mappings":";;;AAAA,+CAA+C;AAC/C,yCAAyC;AACzC,2CAA+C;AAC/C,iDAA2C;AAE3C,iDAS4B;AAC5B,2CAAoC;AACpC,yCAA4C;AAC5C,iDAA2C;AAC3C,6CAAmD;AACnD,6CAA8C;AAC9C,mDAA4C;AAC5C,2CAAuD;AACvD,2DAAwD;AACxD,yCAA2C;AAE3C,qCAAwC;AACxC,2DAA2D;AAE3D,oFAAoF;AAEpF,MAAM,YAAY,GAAG,CAAC,EACpB,iBAAiB,EACjB,QAAQ,EACR,GAAG,GAKJ,EAAE,EAAE;IACH,MAAM,SAAS,GAAG,CAAC,CAAC;IACpB,MAAM,QAAQ,GAAG,CAAC,CAAC;IACnB,IAAI,QAAQ,GAAG,CAAC,CAAC;IAEjB,IAAI,GAAG,KAAK,uBAAY,CAAC,GAAG,EAAE,CAAC;QAC7B,QAAQ,QAAQ,EAAE,CAAC;YACjB,KAAK,MAAM;gBACT,QAAQ,GAAG,CAAC,CAAC;gBACb,MAAM;YAER,KAAK,SAAS,CAAC;YACf,KAAK,QAAQ,CAAC;YACd;gBACE,QAAQ,GAAG,CAAC,CAAC;gBACb,MAAM;QACV,CAAC;IACH,CAAC;IAED,OAAO;QACL,iBAAiB;QACjB,SAAS,EAAE,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS;QACpD,QAAQ,EAAE,iBAAiB,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS;QAClD,QAAQ,EAAE,iBAAiB,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS;KACnD,CAAC;AACJ,CAAC,CAAC;AAEF,MAAM,oBAAoB,GAAG;IAC3B,iBAAiB,EAAE,gBAAK,CAAC,CAAC,CAAC,CAAC,GAAG,EAAE,GAAG,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,SAAS;IACtD,IAAI,EAAE,MAAM,CAAC,gBAAgB,CAAC,aAAa,CAAC,uBAAuB;IACnE,MAAM,EAAE,cAAc;IAEtB,OAAO,EAAE,EAAE;IACX,UAAU,EAAE,KAAK;IACjB,kBAAkB,EAAE,KAAK;IAEzB,cAAc,EAAE,gBAAK;IACrB,YAAY,EAAE,GAAG;IACjB,UAAU,EAAE,MAAM,CAAC,gBAAgB,CAAC,UAAU,CAAC,OAAO;IAEtD,UAAU,EAAE;QACV,WAAW,EAAE,qBAAU;QACvB,KAAK,EAAL,gBAAK;KACN;IAED,IAAI,EAAE;QACJ,WAAW,EAAE,qBAAU;KACxB;CACF,CAAC;AAEF,IAAY,OAmBX;AAnBD,WAAY,OAAO;IACjB,+BAA+B;IAC/B,oDAAyC,CAAA;IACzC,6BAA6B;IAC7B,6CAAkC,CAAA;IAClC,+BAA+B;IAC/B,8CAAmC,CAAA;IACnC,4BAA4B;IAC5B,mDAAwC,CAAA;IACxC,4BAA4B;IAC5B,iDAAsC,CAAA;IACtC,+BAA+B;IAC/B,oDAAyC,CAAA;IACzC,6BAA6B;IAC7B,+CAAoC,CAAA;IACpC,8BAA8B;IAC9B,gDAAqC,CAAA;IACrC,+BAA+B;IAC/B,kDAAuC,CAAA;AACzC,CAAC,EAnBW,OAAO,uBAAP,OAAO,QAmBlB;AAuED,oJAAoJ;AACpJ,kBAAe,KAAK,EAAE,EACpB,KAAK,EACL,iBAAiB,EACjB,IAAI,EACJ,KAAK;AACL,oBAAoB;AACpB,eAAe,EACf,SAAS,EACT,eAAe,EACf,OAAO,EACP,GAAG,EACH,GAAG,EACH,SAAS,EACT,SAAS,EACT,YAAY,GAAG,EAAE,uBAAuB,EAAE,IAAI,EAAE,EAChD,KAAK,GAAG;IACN,iBAAiB,EAAE,IAAI;IACvB,mBAAmB,EAAE,IAAI;IACzB,mBAAmB,EAAE,KAAK;CAC3B,EACD,IAAI,GAAG,MAAM,CAAC,gBAAgB,CAAC,qBAAqB,CAAC,IAAI,EACzD,IAAI,GAAG,IAAI,EACX,SAAS,GAAG,EAAE,EACd,UAAU,GACD,EAAE,EAAE;IACb,MAAM,OAAO,GAAG,IAAA,mBAAU,EAAC,IAAI,CAAC,CAAC;IACjC,MAAM,UAAU,GAAG,GAAG,OAAO,SAAS,CAAC;IACvC,MAAM,QAAQ,GAAG,GAAG,EAAE,MAAM,CAAC,CAAC,CAAC,GAAG,CAAC,EAAE,IAAI,uBAAY,CAAC,CAAC,CAAC,SAAS,CAAC;IAClE,MAAM,oBAAoB,GAAG,SAAS;QACpC,CAAC,CAAC,MAAM,IAAA,8BAAe,EAAC,SAAS,CAAC,IAAI,CAAC,CAAC,gBAAgB,CAAC,UAAU,CAAC;QACpE,CAAC,CAAC,KAAK,CAAC;IACV,OAAO,CAAC,GAAG,CAAC,IAAI,EAAE,EAAE,oBAAoB,EAAE,CAAC,CAAC;IAC5C,iBAAiB,GAAG,iBAAiB,IAAI,GAAG,OAAO,QAAQ,CAAC;IAE5D,qBAAqB;IACrB,0DAA0D;IAC1D,2BAA2B;IAC3B,gBAAgB;IAChB,iBAAiB;IACjB,oEAAoE;IACpE,8DAA8D;IAC9D,WAAW;IACX,mBAAmB;IAEnB,sDAAsD;IACtD,wBAAwB;IACxB,cAAc;IACd,eAAe;IACf,cAAc;IACd,SAAS;IACT,iBAAiB;IAEjB,MAAM,eAAe,GAAG,YAAY,CAAC,sBAAsB;QACzD,CAAC,CAAC,IAAA,kBAAkB,EAAC;YACjB,IAAI,EAAE,OAAO;YACb,SAAS;SACV,CAAC;QACJ,CAAC,CAAC,SAAS,CAAC;IAEd,MAAM,UAAU,GAAG,SAAS,EAAE,YAAY;QACxC,CAAC,CAAC,IAAA,kBAAU,EAAC,SAAS,CAAC,YAAY,CAAC,KAAK,CAAC;QAC1C,CAAC,CAAC,SAAS,CAAC;IAEd,MAAM,eAAe,GAAG,SAAS,EAAE,YAAY;QAC7C,CAAC,CAAC,IAAA,kBAAU,EAAC,SAAS,CAAC,YAAY,CAAC,WAAW,CAAC;QAChD,CAAC,CAAC,SAAS,CAAC;IAEd,yEAAyE;IAEzE,gEAAgE;IAChE,IAAI,CAAC,OAAO,EAAE,QAAQ,EAAE,CAAC;QACvB,OAAO,CAAC,KAAK,CAAC,2BAA2B,EAAE,IAAI,CAAC,CAAC;QACjD,OAAO,SAAS,CAAC;IACnB,CAAC;IACD,IAAI,CAAC,KAAK,EAAE,OAAO,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,EAAE,CAAC;QACzC,OAAO,CAAC,KAAK,CAAC,0BAA0B,EAAE,IAAI,CAAC,CAAC;QAChD,OAAO,SAAS,CAAC;IACnB,CAAC;IAED,sCAAsC;IACtC,MAAM,WAAW,GAAG,SAAS,EAAE,oBAAoB;QACjD,CAAC,CAAC,IAAA,oBAAU,EAAC;YACT,IAAI,EAAE,qCAAqC;YAC3C,KAAK;YACL,OAAO,EAAE,CAAC,IAAA,eAAM,EAAC,OAAO,CAAC,QAAQ,CAAC,CAAC,KAAK,CAAC,8BAAqB,CAAC,CAAC;SACjE,CAAC;QACJ,CAAC,CAAC,SAAS,CAAC;IAEd,oBAAoB;IACpB,MAAM,GAAG,GAAG,IAAI,MAAM,CAAC,gBAAgB,CAAC,cAAc,CACpD,OAAO,EACP;QACE,YAAY,EAAE,OAAO;QACrB,GAAG,KAAK;QACR,iBAAiB;QACjB,SAAS,EAAE,OAAO;QAClB,oBAAoB;QAEpB,sBAAsB,EAAE;YACtB,kBAAkB,EAAE,SAAS,EAAE,oBAAoB;gBACjD,CAAC,CAAC,EAAE;gBACJ,CAAC,CAAC,SAAS,EAAE,kBAAkB,IAAI,EAAE;YACvC,iBAAiB,EAAE,IAAI;YACvB,oBAAoB,EAAE,SAAS,EAAE,oBAAoB;YACrD,cAAc,EAAE,WAAW,EAAE,EAAE;SAChC;QACD,oBAAoB;QAEpB,aAAa,EAAE;YACb,4BAA4B,EAAE;gBAC5B,MAAM,EAAE,KAAK,CAAC,mBAAmB;oBAC/B,CAAC,CAAC;wBACE,oBAAoB,EAAE,MAAM;qBAC7B;oBACH,CAAC,CAAC,SAAS;gBACb,OAAO,EAAE,OAAO,CAAC,KAAK,CAAC,mBAAmB,CAAC;aAC5C;YAED,WAAW,EAAE,EAAE,OAAO,EAAE,OAAO,CAAC,KAAK,CAAC,iBAAiB,CAAC,EAAE;YAC1D,aAAa,EAAE,EAAE,OAAO,EAAE,OAAO,CAAC,KAAK,CAAC,mBAAmB,CAAC,EAAE;YAC9D,8HAA8H;YAC9H,4EAA4E;YAC5E,sBAAsB,EAAE;gBACtB,OAAO,EACL,CAAC,OAAO,CAAC,iBAAiB,EAAE,WAAW;oBACvC,CAAC,OAAO,CAAC,cAAc;oBACvB,CAAC,SAAS,EAAE,oBAAoB;aACnC;YAED,iBAAiB,EAAE;gBACjB,OAAO,EAAE,OAAO,CAAC,OAAO,CAAC,qBAAqB,CAAC;gBAC/C,MAAM,EAAE,OAAO,CAAC,qBAAqB;oBACnC,CAAC,CAAC,EAAE,UAAU,EAAE,OAAO,CAAC,qBAAqB,EAAE;oBAC/C,CAAC,CAAC,SAAS;aACd;YAED,yBAAyB,EAAE;gBACzB,OAAO,EAAE,OAAO,CAAC,KAAK,CAAC,kBAAkB,CAAC;gBAC1C,MAAM,EAAE,KAAK,CAAC,kBAAkB;oBAC9B,CAAC,CAAC;wBACE,WAAW,EAAE,GAAG,IAAI,UAAU;wBAC9B,QAAQ,EAAE,KAAK,CAAC,kBAAkB,CAAC,eAAe;qBACnD;oBACH,CAAC,CAAC,SAAS;aACd;YAED,QAAQ,EAAE;gBACR,OAAO,EAAE,OAAO,CAAC,GAAG,EAAE,OAAO,CAAC;gBAC9B,MAAM,EAAE,GAAG;oBACT,CAAC,CAAC;wBACE,+BAA+B,EAAE,GAAG,CAAC,OAAQ;qBAC9C;oBACH,CAAC,CAAC,SAAS;aACd;SACF;QAED,GAAG,EAAE;YACH,IAAI,EAAE,MAAM,CAAC,gBAAgB,CAAC,qBAAqB,CAAC,IAAI;YACxD,IAAI;SACL;QAED,iBAAiB,EAAE;YACjB;gBACE,GAAG,oBAAoB;gBACvB,GAAG,eAAe;gBAElB,GAAG,YAAY,CAAC;oBACd,GAAG,EAAE,qBAAU;oBACf,QAAQ,EAAE,eAAe,CAAC,IAAI;oBAC9B,iBAAiB,EAAE,eAAe;iBACnC,CAAC;gBAEF,KAAK,EAAE,eAAe,CAAC,IAAI,KAAK,QAAQ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;gBAChD,yCAAyC;gBACzC,YAAY,EAAE,OAAO,CAAC,QAAQ;gBAC9B,eAAe,EAAE,IAAI;gBACrB,KAAK,EAAE,QAAQ;gBACf,MAAM,EAAE,OAAO;gBAEf,sBAAsB;gBACtB,IAAI,EAAE;oBACJ,GAAG,oBAAoB,CAAC,IAAI;oBAC5B,IAAI,EAAE,eAAe,CAAC,IAAI;iBAC3B;aACF;SACF;QAED,YAAY,EAAE,KAAK;YACjB,CAAC,CAAC;gBACE,aAAa,EAAE,KAAK,CAAC,aAAa;gBAClC,GAAG,EAAE,EAAE,UAAU,EAAE,KAAK,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,EAAE,OAAO,EAAE,CAAC,EAAE,CAAC,CAAC,EAAE;aAChE;YACH,CAAC,CAAC,SAAS;QAEb,iBAAiB,EAAE;YACjB,wBAAwB,EAAE,MAAM;YAChC,QAAQ,EAAE,QAAQ;YAClB,kBAAkB,EAAE,IAAI;YACxB,yBAAyB,EAAE,KAAK;YAChC,oBAAoB,EAAE,KAAK;YAC3B,yBAAyB,EAAE,IAAI;YAC/B,kBAAkB,EAAE,IAAI;YACxB,mBAAmB,EAAE,GAAG;YACxB,sBAAsB,EAAE,KAAK;YAC7B,yBAAyB,EAAE,KAAK;YAChC,0BAA0B,EAAE,KAAK;YACjC,qBAAqB,EAAE,KAAK;YAC5B,oBAAoB,EAAE,KAAK;YAC3B,6BAA6B,EAAE,KAAK;YACpC,YAAY,EAAE,KAAK;YACnB,yBAAyB,EAAE,OAAO;YAClC,uBAAuB,EAAE,MAAM;SAChC;QAED,qBAAqB;QACrB,6CAA6C;QAC7C,kCAAkC;QAClC,iBAAiB;QAEjB,uBAAuB,EAAE,eAAe;YACtC,CAAC,CAAC;gBACE,QAAQ,EAAE,eAAe,CAAC,QAAQ;gBAClC,MAAM,EAAE,eAAe,CAAC,YAAY;aACrC;YACH,CAAC,CAAC,SAAS;QAEb,eAAe,EAAE;YACf,QAAQ,EAAE,gBAAK;gBACb,CAAC,CAAC;oBACE,+BAA+B,EAAE,GAAG,EAAE,OAAO;oBAC7C,kBAAkB,EAAE,EAAE,OAAO,EAAE,IAAI,EAAE;iBACtC;gBACH,CAAC,CAAC,SAAS;YACb,YAAY,EAAE,EAAE,OAAO,EAAE,IAAI,EAAE,aAAa,EAAE,EAAE,EAAE;YAClD,gBAAgB,EAAE,EAAE,OAAO,EAAE,KAAK,EAAE;SACrC;QAED,gDAAgD;QAChD,yFAAyF;QACzF,uBAAuB,EAAE,KAAK;QAC9B,kBAAkB,EAAE,YAAY,CAAC,iBAAiB;YAChD,CAAC,CAAC;gBACE,OAAO,EAAE,YAAY,CAAC,iBAAiB;gBACvC,qCAAqC;gBACrC,yBAAyB,EAAE,KAAK;aACjC;YACH,CAAC,CAAC,SAAS;QAEb,QAAQ,EAAE;YACR,IAAI,EAAE,MAAM,CAAC,gBAAgB,CAAC,oBAAoB,CAAC,cAAc;SAClE;QACD,+BAA+B;QAC/B,QAAQ;QACR,2BAA2B;QAC3B,0CAA0C;QAC1C,6CAA6C;QAC7C,sCAAsC;QACtC,WAAW;QACX,QAAQ;QACR,iBAAiB;QAEjB,kBAAkB;QAClB,kBAAkB,EAAE;YAClB,cAAc,EAAE,MAAM,CAAC,gBAAgB,CAAC,cAAc,CAAC,KAAK;SAC7D;QACD,qBAAqB;QACrB,oBAAoB;QACpB,UAAU,EAAE,IAAI;QAChB,UAAU,EAAE;YACV,eAAe,EAAE,IAAI;YACrB,OAAO,EAAE,IAAI;YACb,mBAAmB,EAAE,UAAU,CAAC,CAAC,CAAC,CAAC,UAAU,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC,SAAS;YACnE,QAAQ,EAAE,mBAAQ;SACnB;QAED,cAAc,EAAE;YACd,aAAa,EAAE;gBACb,OAAO,EAAE,IAAI;aACd;YACD,aAAa,EAAE;gBACb,OAAO,EAAE,IAAI;aACd;YACD,aAAa,EAAE,EAAE,OAAO,EAAE,IAAI,EAAE;SACjC;QAED,cAAc,EAAE;YACd,WAAW,EAAE,MAAM,CAAC,gBAAgB,CAAC,WAAW,CAAC,WAAW;YAC5D,aAAa,EAAE,MAAM,CAAC,gBAAgB,CAAC,aAAa,CAAC,KAAK;YAC1D,aAAa,EAAE,MAAM,CAAC,gBAAgB,CAAC,aAAa,CAAC,KAAK;YAE1D,4BAA4B;YAC5B,oCAAoC;YACpC,6BAA6B;YAE7B,YAAY,EACV,OAAO,CAAC,cAAc,IAAI,SAAS,EAAE,oBAAoB;gBACvD,CAAC,CAAC,MAAM,CAAC,gBAAgB,CAAC,YAAY,CAAC,kBAAkB;gBACzD,CAAC,CAAC,MAAM,CAAC,gBAAgB,CAAC,YAAY,CAAC,YAAY;YAEvD,eAAe,EACb,OAAO,CAAC,iBAAiB,EAAE,WAAW;gBACtC,OAAO,CAAC,cAAc;gBACtB,SAAS,EAAE,oBAAoB;gBAC7B,CAAC,CAAC,UAAU;gBACZ,CAAC,CAAC,OAAO;YAEb,mBAAmB,EACjB,OAAO,CAAC,iBAAiB;gBACzB,CAAC,CAAC,OAAO,CAAC,cAAc,IAAI,SAAS,EAAE,oBAAoB,CAAC;gBAC1D,CAAC,CAAC;oBACE,WAAW,EAAE;wBACX,SAAS,EAAE,CAAC,EAAE,EAAE,EAAE,OAAO,CAAC,iBAAiB,CAAC,WAAW,EAAE,CAAC;qBAC3D;oBACD,kBAAkB,EAAE,OAAO,CAAC,iBAAiB,CAAC,iBAAiB;wBAC7D,CAAC,CAAC;4BACE,gBAAgB,EAAE;gCAChB,EAAE,EAAE,EAAE,OAAO,CAAC,iBAAiB,CAAC,iBAAiB,EAAE;6BACpD;yBACF;wBACH,CAAC,CAAC,SAAS;iBACd;gBACH,CAAC,CAAC,SAAS;SAChB;QAED,IAAI,EAAE,sBAAW;KAClB,EACD;QACE,OAAO,EAAE,IAAI;QACb,SAAS,EAAE,eAAe;YACxB,CAAC,CAAC,CAAC,GAAG,SAAS,EAAE,eAAe,CAAC,QAAQ,CAAC;YAC1C,CAAC,CAAC,SAAS;QACb,MAAM,EAAE,UAAU;QAClB,mBAAmB,EAAE,IAAI;QACzB,aAAa,EAAE,CAAC,sBAAsB,EAAE,gBAAgB,EAAE,cAAc,CAAC;KAC1E,CACF,CAAC;IAEF,IAAI,IAAI,EAAE,CAAC;QACT,IAAA,gBAAM,EAAC,EAAE,IAAI,EAAE,OAAO,EAAE,UAAU,EAAE,GAAG,CAAC,EAAE,EAAE,SAAS,EAAE,GAAG,EAAE,CAAC,CAAC;IAChE,CAAC;IAED,IAAI,SAAS,EAAE,CAAC;QACd,SAAS,CAAC,GAAG,CACX,CAAC,CAAC,EAAE,EAAE,CACJ,IAAI,MAAM,CAAC,gBAAgB,CAAC,SAAS,CAAC,GAAG,IAAI,IAAI,CAAC,CAAC,IAAI,EAAE,EAAE;YACzD,uBAAuB;YACvB,YAAY,EAAE,GAAG,CAAC,IAAI;YACtB,GAAG,KAAK;YAER,GAAG,oBAAoB;YACvB,GAAG,CAAC;YAEJ,GAAG,YAAY,CAAC;gBACd,GAAG,EAAE,qBAAU;gBACf,QAAQ,EAAE,CAAC,CAAC,IAAI;gBAChB,iBAAiB,EAAE,eAAe;aACnC,CAAC;YAEF,KAAK,EAAE,CAAC,CAAC,IAAI,KAAK,QAAQ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;YAClC,yCAAyC;YACzC,YAAY,EAAE,OAAO,CAAC,QAAQ;YAC9B,eAAe,EAAE,IAAI;YACrB,KAAK,EAAE,QAAQ;YACf,MAAM,EAAE,OAAO;YAEf,sBAAsB;YACtB,IAAI,EAAE;gBACJ,GAAG,oBAAoB,CAAC,IAAI;gBAC5B,IAAI,EAAE,CAAC,CAAC,IAAI;aACb;SACF,CAAC,CACL,CAAC;IACJ,CAAC;IACD,IAAI,SAAS,EAAE,CAAC;QACd,GAAG,CAAC,EAAE,CAAC,KAAK,CAAC,KAAK,EAAE,EAAE,EAAE,EAAE;YACxB,IAAI,CAAC,EAAE;gBAAE,OAAO;YAEhB,MAAM,MAAM,GAAG,MAAM,IAAA,qBAAY,EAAC;gBAChC,IAAI,EAAE,OAAO;gBACb,SAAS,EAAE,KAAK,CAAC,iBAAiB;gBAClC,aAAa,EAAE,IAAI;gBACnB,oBAAoB,EAAE,oBAAoB;aAC3C,CAAC,CAAC;YAEH,IAAA,8BAAe,EAAC;gBACd,IAAI,EAAE,UAAU;gBAChB,KAAK,EAAE,MAAM;gBACb,SAAS,EAAE,GAAG;gBACd,YAAY,EAAE,IAAI;gBAClB,WAAW,EAAE,IAAI;gBACjB,SAAS;aACV,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;IACL,CAAC;IAED,4BAA4B;IAE5B,GAAG,CAAC,EAAE,CAAC,KAAK,CAAC,KAAK,EAAE,EAAE,EAAE,EAAE;QACxB,IAAI,CAAC,EAAE;YAAE,OAAO;QAEhB,OAAO;QACP,IAAI,UAAU,EAAE,CAAC;YACf,MAAM,OAAO,CAAC,GAAG,CACf;gBACE;oBACE,SAAS,EAAE,wBAAwB;oBACnC,IAAI,EAAE,2CAA2C;iBAClD;gBACD;oBACE,SAAS,EAAE,0BAA0B;oBACrC,IAAI,EAAE,6CAA6C;iBACpD;gBACD;oBACE,SAAS,EAAE,0BAA0B;oBACrC,IAAI,EAAE,6CAA6C;iBACpD;gBACD;oBACE,SAAS,EAAE,+BAA+B;oBAC1C,IAAI,EAAE,kDAAkD;iBACzD;gBACD;oBACE,SAAS,EAAE,yBAAyB;oBACpC,IAAI,EAAE,4CAA4C;iBACnD;aACF,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CACV,IAAA,+BAAc,EAAC;gBACb,IAAI,EAAE,GAAG,IAAI,IAAI,CAAC,CAAC,SAAS,EAAE;gBAC9B,WAAW,EAAE,UAAU,CAAC,QAAQ;gBAChC,aAAa,EAAE,OAAO;gBACtB,QAAQ,EAAE,CAAC,CAAC,IAAI;gBAChB,KAAK,EAAE,EAAE;aACV,CAAC,CACH,CACF,CAAC;QACJ,CAAC;QAED,aAAa;QACb,IAAI,eAAe,EAAE,CAAC;YACpB,MAAM,OAAO,CAAC,GAAG,CACf;gBACE;oBACE,SAAS,EAAE,8BAA8B;oBACzC,IAAI,EAAE,2CAA2C;iBAClD;gBACD;oBACE,SAAS,EAAE,wBAAwB;oBACnC,IAAI,EAAE,qCAAqC;iBAC5C;gBACD;oBACE,SAAS,EAAE,yBAAyB;oBACpC,IAAI,EAAE,sCAAsC;iBAC7C;gBACD;oBACE,SAAS,EAAE,yBAAyB;oBACpC,IAAI,EAAE,sCAAsC;iBAC7C;aACF,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CACV,IAAA,+BAAc,EAAC;gBACb,IAAI,EAAE,GAAG,IAAI,IAAI,CAAC,CAAC,SAAS,EAAE;gBAC9B,WAAW,EAAE,eAAe,CAAC,QAAQ;gBACrC,aAAa,EAAE,OAAO;gBACtB,QAAQ,EAAE,CAAC,CAAC,IAAI;gBAChB,KAAK,EAAE,EAAE;aACV,CAAC,CACH,CACF,CAAC;QACJ,CAAC;QAED,YAAY;QACZ,IAAI,YAAY,CAAC,uBAAuB,EAAE,CAAC;YACzC,IAAA,0BAAgB,EAAC;gBACf,IAAI;gBACJ,gBAAgB,EAAE,EAAE;gBACpB,GAAG,GAAG;gBACN,cAAc,EAAE;oBACd,OAAO;oBACP,yBAAyB;oBACzB,kBAAkB;oBAClB,YAAY;oBACZ,gBAAgB;oBAChB,oBAAoB;iBACrB;aACF,CAAC,CAAC;QACL,CAAC;IACH,CAAC,CAAC,CAAC;IAEH,+BAA+B;IAC/B,MAAM;SACH,GAAG,CAAC,CAAC,GAAG,CAAC,QAAQ,EAAE,GAAG,CAAC,eAAe,EAAE,OAAO,CAAC,QAAQ,CAAC,CAAC;SAC1D,KAAK,CAAC,CAAC,CAAC,QAAQ,EAAE,eAAe,EAAE,GAAG,CAAC,EAAE,EAAE;QAC1C,OAAO,CAAC,GAAG,CAAC,yBAAyB,EAAE,IAAI,CAAC,CAAC;QAE7C,4CAA4C;QAC5C,sCAAsC;QACtC,2BAA2B;QAC3B,6CAA6C;QAC7C,iDAAiD;QACjD,yCAAyC;QACzC,2BAA2B;QAC3B,2BAA2B;QAC3B,QAAQ;QACR,IAAI;QAEJ,IAAI,QAAQ,IAAI,eAAe,IAAI,eAAe,CAAC,iBAAiB,CAAC,EAAE,CAAC;YACtE,IAAA,+BAAc,EAAC;gBACb,IAAI,EAAE,GAAG,IAAI,4BAA4B;gBACzC,WAAW,EAAE,eAAe,CAAC,iBAAiB,CAAC,CAAC,QAAS;gBACzD,aAAa,EAAE,kBAAkB;gBACjC,QAAQ,EAAE,SAAS;gBACnB,KAAK,EAAE,QAAQ;aAChB,CAAC,CAAC;YAEH,IAAI,SAAS,EAAE,CAAC;gBACd,IAAA,8BAAe,EAAC;oBACd,IAAI,EAAE,GAAG,IAAI,oBAAoB;oBACjC,KAAK,EAAE,eAAe,CAAC,iBAAiB,CAAC,CAAC,QAAS;oBACnD,SAAS,EAAE,GAAG;oBACd,WAAW,EAAE,IAAI;oBACjB,SAAS;iBACV,CAAC,CAAC;YACL,CAAC;QACH,CAAC;QAED,+BAA+B;QAC/B,2BAA2B;QAC3B,uCAAuC;QACvC,yCAAyC;QACzC,yCAAyC;QACzC,2BAA2B;QAC3B,2BAA2B;QAC3B,QAAQ;QACR,IAAI;QAEJ,IAAI,OAAO,CAAC,QAAQ,IAAI,QAAQ,EAAE,CAAC;YACjC,IAAA,+BAAc,EAAC;gBACb,IAAI,EAAE,GAAG,IAAI,aAAa;gBAC1B,WAAW,EAAE,QAAQ,CAAC,WAAW;gBACjC,QAAQ,EAAE,aAAa;gBACvB,aAAa,EAAE,kBAAkB;gBACjC,KAAK,EAAE,IAAA,gCAAqB,EAAC;oBAC3B,KAAK,EAAE,IAAA,gCAAqB,EAAC,GAAG,CAAE,CAAC,KAAK;iBACzC,CAAC;aACH,CAAC,CAAC;QACL,CAAC;QAED,IAAI,WAAW,IAAI,QAAQ,EAAE,CAAC;YAC5B,IAAA,+BAAc,EAAC;gBACb,IAAI,EAAE,GAAG,IAAI,cAAc;gBAC3B,WAAW,EAAE,QAAQ,CAAC,WAAW;gBACjC,QAAQ,EAAE,8BAA8B;gBACxC,aAAa,EAAE,kBAAkB;gBACjC,KAAK,EAAE,WAAW,CAAC,EAAE;aACtB,CAAC,CAAC;QACL,CAAC;IACH,CAAC,CAAC,CAAC;IAEL,mCAAmC;IACnC,IAAA,sBAAa,EAAC;QACZ,KAAK,EAAE,EAAE,iBAAiB,EAAE,iBAAiB,EAAE;QAC/C,GAAG,GAAG;QACN,SAAS;QACT,SAAS,EAAE,GAAG;KACf,CAAC,CAAC;IAEH,OAAO,EAAE,GAAG,EAAE,eAAe,EAAE,UAAU,EAAE,WAAW,EAAE,CAAC;AAC3D,CAAC,CAAC"}
@@ -0,0 +1,35 @@
1
+ import { ApimInfo } from '../../types';
2
+ import * as apim from '@pulumi/azure-native/apimanagement';
3
+ import { Input } from '@pulumi/pulumi';
4
+ import { input as inputs } from '@pulumi/azure-native/types';
5
+ import { PoliciesProps } from './PolicyBuilder';
6
+ interface OperationProps {
7
+ apimInfo: ApimInfo;
8
+ apiId: Input<string>;
9
+ name: string;
10
+ method: 'GET' | 'POST' | 'PUT' | 'DELETE' | 'PATCH' | 'HEAD' | 'OPTIONS';
11
+ urlTemplate: Input<string>;
12
+ policies?: PoliciesProps;
13
+ /** Create a dummy response */
14
+ responses?: Input<Input<inputs.apimanagement.ResponseContractArgs>[]>;
15
+ }
16
+ export interface ApiProps {
17
+ name: string;
18
+ product: apim.Product;
19
+ apimInfo: ApimInfo;
20
+ serviceUrl: string;
21
+ versions?: Array<{
22
+ name: string;
23
+ swaggerUrl?: string;
24
+ }>;
25
+ subscriptionRequired?: boolean;
26
+ policies?: PoliciesProps;
27
+ authHeaderKey?: string;
28
+ operations?: Array<Omit<OperationProps, 'apiId' | 'apimInfo'>>;
29
+ enableApiSet?: boolean;
30
+ }
31
+ export declare const createApi: ({ name, apimInfo, versions, product, serviceUrl, authHeaderKey, policies, subscriptionRequired, operations, enableApiSet, }: ApiProps) => Promise<{
32
+ set: import("@pulumi/azure-native/apimanagement/apiVersionSet").ApiVersionSet | undefined;
33
+ apis: import("@pulumi/azure-native/apimanagement/api").Api[];
34
+ }>;
35
+ export {};