@drunk-pulumi/azure 0.0.36 → 0.0.38
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/Aks/Helper.d.ts +6 -11
- package/Aks/Helper.js +40 -65
- package/Aks/Identity.d.ts +3 -10
- package/Aks/Identity.js +9 -8
- package/Aks/index.d.ts +67 -71
- package/Aks/index.js +198 -314
- package/Apim/ApiProduct/PolicyBuilder.js +25 -27
- package/Apim/ApiProduct/SwaggerHelper.js +1 -3
- package/Apim/ApiProduct/index.d.ts +3 -3
- package/Apim/ApiProduct/index.js +1 -2
- package/Automation/index.d.ts +7 -0
- package/Automation/index.js +55 -0
- package/AzAd/EnvRoles.Consts.d.ts +12 -0
- package/AzAd/EnvRoles.Consts.js +125 -0
- package/AzAd/EnvRoles.d.ts +16 -15
- package/AzAd/EnvRoles.js +69 -47
- package/AzAd/GraphDefinition.d.ts +2 -2
- package/AzAd/GraphDefinition.js +3055 -3056
- package/AzAd/Helper.d.ts +24 -13
- package/AzAd/Helper.js +98 -25
- package/AzAd/Identities/AzDevOpsIdentity.d.ts +12 -0
- package/AzAd/Identities/AzDevOpsIdentity.js +32 -0
- package/AzAd/Identities/AzDevOpsManagedIdentity.d.ts +7 -0
- package/AzAd/Identities/AzDevOpsManagedIdentity.js +15 -0
- package/AzAd/Identities/AzUserAdRevertSync.d.ts +2 -9
- package/AzAd/Identities/AzUserAdRevertSync.js +4 -5
- package/AzAd/Identities/index.d.ts +3 -0
- package/AzAd/Identities/index.js +10 -0
- package/AzAd/Identity.d.ts +10 -22
- package/AzAd/Identity.js +50 -61
- package/AzAd/Role.d.ts +2 -3
- package/AzAd/Role.js +4 -5
- package/AzAd/RoleAssignment.d.ts +34 -5
- package/AzAd/RoleAssignment.js +2 -2
- package/AzAd/RoleDefinitions/JustInTimeRequestRole.d.ts +2 -0
- package/AzAd/RoleDefinitions/JustInTimeRequestRole.js +25 -0
- package/AzAd/RolesBuiltIn.d.ts +29 -0
- package/AzAd/RolesBuiltIn.js +13034 -8058
- package/AzAd/UserAssignedIdentity.d.ts +6 -0
- package/AzAd/UserAssignedIdentity.js +27 -0
- package/Builder/AksBuilder.d.ts +3 -0
- package/Builder/AksBuilder.js +95 -0
- package/Builder/VnetBuilder.d.ts +3 -0
- package/Builder/VnetBuilder.js +279 -0
- package/Builder/index.d.ts +2 -0
- package/Builder/index.js +8 -0
- package/Builder/types.d.ts +120 -0
- package/Builder/types.js +18 -0
- package/Certificate/index.d.ts +1 -1
- package/Certificate/index.js +26 -28
- package/Common/AutoTags.js +2 -2
- package/Common/AzureEnv.d.ts +4 -3
- package/Common/AzureEnv.js +31 -24
- package/Common/GlobalEnv.d.ts +1 -2
- package/Common/GlobalEnv.js +7 -7
- package/Common/Location.d.ts +3 -3
- package/Common/Location.js +22 -9
- package/Common/LocationBuiltIn.d.ts +6 -81
- package/Common/LocationBuiltIn.js +491 -1923
- package/Common/Naming/index.d.ts +6 -4
- package/Common/Naming/index.js +64 -60
- package/Common/ResourceEnv.d.ts +2 -2
- package/Common/ResourceEnv.js +11 -10
- package/Common/StackEnv.js +2 -9
- package/Core/KeyGenetators.d.ts +16 -20
- package/Core/KeyGenetators.js +17 -16
- package/Core/Random.d.ts +4 -4
- package/Core/Random.js +10 -10
- package/Core/ResourceGroup.d.ts +12 -6
- package/Core/ResourceGroup.js +12 -24
- package/IOT/Hub/index.d.ts +4 -8
- package/IOT/Hub/index.js +19 -54
- package/KeyVault/Helper.d.ts +8 -6
- package/KeyVault/Helper.js +13 -19
- package/KeyVault/index.d.ts +1 -3
- package/KeyVault/index.js +2 -26
- package/Logs/Helpers.d.ts +35 -25
- package/Logs/Helpers.js +33 -20
- package/Logs/LogAnalytics.d.ts +2 -2
- package/Logs/LogAnalytics.js +15 -6
- package/Logs/index.d.ts +3 -3
- package/Logs/index.js +4 -4
- package/MySql/index.d.ts +2 -3
- package/MySql/index.js +16 -19
- package/{ReadMe.md → README.md} +6 -1
- package/Sql/index.d.ts +17 -10
- package/Sql/index.js +39 -42
- package/Storage/CdnEndpoint.d.ts +2 -2
- package/Storage/CdnEndpoint.js +14 -15
- package/Storage/Helper.d.ts +2 -2
- package/Storage/Helper.js +6 -6
- package/Storage/ManagementRules.d.ts +5 -23
- package/Storage/ManagementRules.js +3 -3
- package/Storage/index.d.ts +3 -3
- package/Storage/index.js +28 -28
- package/VM/AzureDevOpsExtension.d.ts +16 -0
- package/VM/AzureDevOpsExtension.js +14 -0
- package/VM/Extension.d.ts +15 -0
- package/VM/Extension.js +13 -0
- package/VM/GlobalSchedule.d.ts +10 -0
- package/VM/GlobalSchedule.js +20 -0
- package/VM/index.d.ts +18 -18
- package/VM/index.js +94 -57
- package/VNet/Bastion.d.ts +4 -4
- package/VNet/Bastion.js +12 -8
- package/VNet/Firewall.d.ts +19 -12
- package/VNet/Firewall.js +59 -40
- package/VNet/FirewallPolicies/AksFirewallPolicy.d.ts +16 -16
- package/VNet/FirewallPolicies/AksFirewallPolicy.js +193 -220
- package/VNet/FirewallPolicies/CloudPCFirewallPolicy.d.ts +12 -10
- package/VNet/FirewallPolicies/CloudPCFirewallPolicy.js +170 -282
- package/VNet/FirewallPolicies/DefaultFirewallPolicy.d.ts +3 -0
- package/VNet/FirewallPolicies/DefaultFirewallPolicy.js +25 -0
- package/VNet/FirewallPolicies/index.d.ts +4 -0
- package/VNet/FirewallPolicies/index.js +10 -0
- package/VNet/FirewallPolicy.d.ts +14 -11
- package/VNet/FirewallPolicy.js +67 -74
- package/VNet/FirewallRules/AksFirewallRules.d.ts +4 -3
- package/VNet/FirewallRules/AksFirewallRules.js +101 -100
- package/VNet/Helper.d.ts +8 -4
- package/VNet/Helper.js +42 -35
- package/VNet/IpAddress.d.ts +6 -8
- package/VNet/IpAddress.js +6 -11
- package/VNet/IpAddressPrefix.d.ts +12 -9
- package/VNet/IpAddressPrefix.js +14 -13
- package/VNet/NSGRules/AppGatewaySecurityRule.d.ts +9 -0
- package/VNet/NSGRules/AppGatewaySecurityRule.js +46 -0
- package/VNet/NSGRules/AzADSecurityRule.d.ts +6 -0
- package/VNet/NSGRules/AzADSecurityRule.js +39 -0
- package/VNet/NSGRules/BastionSecurityRule.d.ts +9 -0
- package/VNet/NSGRules/BastionSecurityRule.js +93 -0
- package/VNet/NatGateway.d.ts +10 -0
- package/VNet/NatGateway.js +21 -0
- package/VNet/NetworkPeering.d.ts +7 -7
- package/VNet/NetworkPeering.js +29 -20
- package/VNet/PrivateDns.d.ts +8 -10
- package/VNet/PrivateDns.js +12 -14
- package/VNet/PrivateEndpoint.js +5 -2
- package/VNet/RouteTable.d.ts +7 -8
- package/VNet/RouteTable.js +6 -6
- package/VNet/SecurityGroup.d.ts +4 -4
- package/VNet/SecurityGroup.js +7 -3
- package/VNet/Subnet.d.ts +10 -7
- package/VNet/Subnet.js +4 -3
- package/VNet/VPNGateway.d.ts +13 -0
- package/VNet/VPNGateway.js +73 -0
- package/VNet/VirtualWAN.d.ts +7 -10
- package/VNet/VirtualWAN.js +1 -1
- package/VNet/Vnet.d.ts +29 -23
- package/VNet/Vnet.js +58 -121
- package/VNet/index.d.ts +17 -18
- package/VNet/index.js +41 -54
- package/VNet/types.d.ts +94 -0
- package/VNet/types.js +3 -0
- package/Web/types.d.ts +2 -134
- package/package.json +8 -8
- package/types.d.ts +22 -8
- package/z_tests/_tools/Mocks.js +12 -13
- package/Automation/AutoAccount.d.ts +0 -5
- package/Automation/AutoAccount.js +0 -18
- package/AzAd/Identities/AzDevOps.d.ts +0 -23
- package/AzAd/Identities/AzDevOps.js +0 -61
- package/AzAd/KeyVaultRoles.d.ts +0 -8
- package/AzAd/KeyVaultRoles.js +0 -53
- package/AzAd/ManagedIdentity.d.ts +0 -6
- package/AzAd/ManagedIdentity.js +0 -20
- package/AzAd/UserIdentity.d.ts +0 -5
- package/AzAd/UserIdentity.js +0 -12
- package/Common/Naming/AzureRegions.d.ts +0 -4
- package/Common/Naming/AzureRegions.js +0 -49
- package/KeyVault/VaultPermissions.d.ts +0 -27
- package/KeyVault/VaultPermissions.js +0 -226
- package/VNet/FirewallRules/types.d.ts +0 -20
- package/VNet/FirewallRules/types.js +0 -5
- package/VNet/NSGRules/AzADService.d.ts +0 -10
- package/VNet/NSGRules/AzADService.js +0 -45
package/Storage/index.js
CHANGED
|
@@ -1,7 +1,6 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
3
|
const storage = require("@pulumi/azure-native/storage");
|
|
4
|
-
const Helpers_1 = require("../Logs/Helpers");
|
|
5
4
|
const Helper_1 = require("../KeyVault/Helper");
|
|
6
5
|
const AzureEnv_1 = require("../Common/AzureEnv");
|
|
7
6
|
const CdnEndpoint_1 = require("./CdnEndpoint");
|
|
@@ -9,18 +8,18 @@ const Naming_1 = require("../Common/Naming");
|
|
|
9
8
|
const CustomHelper_1 = require("../KeyVault/CustomHelper");
|
|
10
9
|
const Locker_1 = require("../Core/Locker");
|
|
11
10
|
const ManagementRules_1 = require("./ManagementRules");
|
|
12
|
-
const
|
|
11
|
+
const Helper_2 = require("../AzAd/Helper");
|
|
13
12
|
/** Storage Creator */
|
|
14
13
|
exports.default = ({ name, group, customDomain, allowsCors, vaultInfo, defaultManagementRules, containers = [], queues = [], fileShares = [],
|
|
15
14
|
//appInsight,
|
|
16
15
|
network, featureFlags = {}, policies = { keyExpirationPeriodInDays: 365 }, lock = true, }) => {
|
|
17
16
|
name = (0, Naming_1.getStorageName)(name);
|
|
18
|
-
const primaryKeyName = (0, Naming_1.getKeyName)(name,
|
|
19
|
-
const secondaryKeyName = (0, Naming_1.getKeyName)(name,
|
|
20
|
-
const primaryConnectionKeyName = (0, Naming_1.getConnectionName)(name,
|
|
21
|
-
const secondConnectionKeyName = (0, Naming_1.getConnectionName)(name,
|
|
17
|
+
const primaryKeyName = (0, Naming_1.getKeyName)(name, "primary");
|
|
18
|
+
const secondaryKeyName = (0, Naming_1.getKeyName)(name, "secondary");
|
|
19
|
+
const primaryConnectionKeyName = (0, Naming_1.getConnectionName)(name, "primary");
|
|
20
|
+
const secondConnectionKeyName = (0, Naming_1.getConnectionName)(name, "secondary");
|
|
22
21
|
const encryptionKey = featureFlags.enableKeyVaultEncryption
|
|
23
|
-
? (0, Helper_1.
|
|
22
|
+
? (0, Helper_1.getEncryptionKeyOutput)(name, vaultInfo)
|
|
24
23
|
: undefined;
|
|
25
24
|
//To fix identity issue then using this approach https://github.com/pulumi/pulumi-azure-native/blob/master/examples/keyvault/index.ts
|
|
26
25
|
const stg = new storage.StorageAccount(name, {
|
|
@@ -32,13 +31,13 @@ network, featureFlags = {}, policies = { keyExpirationPeriodInDays: 365 }, lock
|
|
|
32
31
|
? storage.SkuName.Standard_ZRS //Zone redundant in PRD
|
|
33
32
|
: storage.SkuName.Standard_LRS,
|
|
34
33
|
},
|
|
35
|
-
accessTier:
|
|
34
|
+
accessTier: "Hot",
|
|
36
35
|
isHnsEnabled: true,
|
|
37
36
|
enableHttpsTrafficOnly: true,
|
|
38
37
|
allowBlobPublicAccess: policies?.allowBlobPublicAccess,
|
|
39
38
|
allowSharedKeyAccess: featureFlags.allowSharedKeyAccess,
|
|
40
|
-
identity: { type:
|
|
41
|
-
minimumTlsVersion:
|
|
39
|
+
identity: { type: "SystemAssigned" },
|
|
40
|
+
minimumTlsVersion: "TLS1_2",
|
|
42
41
|
//1 Year Months
|
|
43
42
|
keyPolicy: {
|
|
44
43
|
keyExpirationPeriodInDays: policies.keyExpirationPeriodInDays || 365,
|
|
@@ -55,16 +54,13 @@ network, featureFlags = {}, policies = { keyExpirationPeriodInDays: 365 }, lock
|
|
|
55
54
|
keyType: storage.KeyType.Account,
|
|
56
55
|
},
|
|
57
56
|
},
|
|
58
|
-
keySource:
|
|
59
|
-
keyVaultProperties: encryptionKey
|
|
60
|
-
keyName: k.name,
|
|
61
|
-
keyVaultUri: k.properties.vaultUrl,
|
|
62
|
-
})),
|
|
57
|
+
keySource: "Microsoft.KeyVault",
|
|
58
|
+
keyVaultProperties: encryptionKey,
|
|
63
59
|
}
|
|
64
60
|
: undefined,
|
|
65
61
|
sasPolicy: {
|
|
66
62
|
expirationAction: storage.ExpirationAction.Log,
|
|
67
|
-
sasExpirationPeriod:
|
|
63
|
+
sasExpirationPeriod: "00.00:30:00",
|
|
68
64
|
},
|
|
69
65
|
customDomain: customDomain && !featureFlags.enableStaticWebsite
|
|
70
66
|
? { name: customDomain, useSubDomainName: true }
|
|
@@ -78,19 +74,19 @@ network, featureFlags = {}, policies = { keyExpirationPeriodInDays: 365 }, lock
|
|
|
78
74
|
// },
|
|
79
75
|
networkRuleSet: network
|
|
80
76
|
? {
|
|
81
|
-
bypass:
|
|
82
|
-
defaultAction:
|
|
77
|
+
bypass: "Logging, Metrics",
|
|
78
|
+
defaultAction: "Allow",
|
|
83
79
|
virtualNetworkRules: network.subnetId
|
|
84
80
|
? [{ virtualNetworkResourceId: network.subnetId }]
|
|
85
81
|
: undefined,
|
|
86
82
|
ipRules: network.ipAddresses
|
|
87
83
|
? network.ipAddresses.map((i) => ({
|
|
88
84
|
iPAddressOrRange: i,
|
|
89
|
-
action:
|
|
85
|
+
action: "Allow",
|
|
90
86
|
}))
|
|
91
87
|
: undefined,
|
|
92
88
|
}
|
|
93
|
-
: { defaultAction:
|
|
89
|
+
: { defaultAction: "Allow" },
|
|
94
90
|
});
|
|
95
91
|
//Soft Delete
|
|
96
92
|
if (policies) {
|
|
@@ -144,15 +140,14 @@ network, featureFlags = {}, policies = { keyExpirationPeriodInDays: 365 }, lock
|
|
|
144
140
|
new storage.StorageAccountStaticWebsite(name, {
|
|
145
141
|
accountName: stg.name,
|
|
146
142
|
...group,
|
|
147
|
-
indexDocument:
|
|
148
|
-
error404Document:
|
|
143
|
+
indexDocument: "index.html",
|
|
144
|
+
error404Document: "index.html",
|
|
149
145
|
}, { dependsOn: stg });
|
|
150
146
|
// if (appInsight && customDomain) {
|
|
151
147
|
// addInsightMonitor({ name, appInsight, url: customDomain });
|
|
152
148
|
// }
|
|
153
149
|
}
|
|
154
|
-
|
|
155
|
-
(0, Helpers_1.createThreatProtection)({ name, targetResourceId: stg.id });
|
|
150
|
+
//createThreatProtection({ name, targetResourceId: stg.id });
|
|
156
151
|
//Create Azure CDN if customDomain provided
|
|
157
152
|
if ((featureFlags.enableStaticWebsite && customDomain) ||
|
|
158
153
|
featureFlags.forceUseCdn) {
|
|
@@ -173,7 +168,7 @@ network, featureFlags = {}, policies = { keyExpirationPeriodInDays: 365 }, lock
|
|
|
173
168
|
...group,
|
|
174
169
|
accountName: stg.name,
|
|
175
170
|
//denyEncryptionScopeOverride: true,
|
|
176
|
-
publicAccess: c.public ?
|
|
171
|
+
publicAccess: c.public ? "Blob" : "None",
|
|
177
172
|
});
|
|
178
173
|
if (c.managementRules) {
|
|
179
174
|
(0, ManagementRules_1.createManagementRules)({
|
|
@@ -207,7 +202,12 @@ network, featureFlags = {}, policies = { keyExpirationPeriodInDays: 365 }, lock
|
|
|
207
202
|
if (!id)
|
|
208
203
|
return;
|
|
209
204
|
//Allows to Read Key Vault
|
|
210
|
-
(0,
|
|
205
|
+
(0, Helper_2.grantIdentityPermissions)({
|
|
206
|
+
name,
|
|
207
|
+
vaultInfo,
|
|
208
|
+
envRole: "readOnly",
|
|
209
|
+
principalId: stg.identity.apply((s) => s.principalId),
|
|
210
|
+
});
|
|
211
211
|
const keys = (await storage.listStorageAccountKeys({
|
|
212
212
|
accountName: name,
|
|
213
213
|
resourceGroupName: group.resourceGroupName,
|
|
@@ -220,7 +220,7 @@ network, featureFlags = {}, policies = { keyExpirationPeriodInDays: 365 }, lock
|
|
|
220
220
|
//Keys
|
|
221
221
|
(0, CustomHelper_1.addCustomSecrets)({
|
|
222
222
|
vaultInfo,
|
|
223
|
-
contentType:
|
|
223
|
+
contentType: "Storage",
|
|
224
224
|
formattedName: true,
|
|
225
225
|
items: [
|
|
226
226
|
{
|
|
@@ -256,4 +256,4 @@ network, featureFlags = {}, policies = { keyExpirationPeriodInDays: 365 }, lock
|
|
|
256
256
|
: undefined,
|
|
257
257
|
};
|
|
258
258
|
};
|
|
259
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
259
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/Storage/index.ts"],"names":[],"mappings":";;AAAA,wDAAwD;AAGxD,+CAAuE;AACvE,iDAA2C;AAC3C,+CAAuC;AACvC,6CAI0B;AAC1B,2DAA4D;AAC5D,2CAAoC;AACpC,uDAI2B;AAC3B,2CAA0D;AAsD1D,sBAAsB;AACtB,kBAAe,CAAC,EACd,IAAI,EACJ,KAAK,EACL,YAAY,EACZ,UAAU,EACV,SAAS,EACT,sBAAsB,EACtB,UAAU,GAAG,EAAE,EACf,MAAM,GAAG,EAAE,EACX,UAAU,GAAG,EAAE;AACf,aAAa;AACb,OAAO,EACP,YAAY,GAAG,EAAE,EACjB,QAAQ,GAAG,EAAE,yBAAyB,EAAE,GAAG,EAAE,EAC7C,IAAI,GAAG,IAAI,GACE,EAAE,EAAE;IACjB,IAAI,GAAG,IAAA,uBAAc,EAAC,IAAI,CAAC,CAAC;IAE5B,MAAM,cAAc,GAAG,IAAA,mBAAU,EAAC,IAAI,EAAE,SAAS,CAAC,CAAC;IACnD,MAAM,gBAAgB,GAAG,IAAA,mBAAU,EAAC,IAAI,EAAE,WAAW,CAAC,CAAC;IACvD,MAAM,wBAAwB,GAAG,IAAA,0BAAiB,EAAC,IAAI,EAAE,SAAS,CAAC,CAAC;IACpE,MAAM,uBAAuB,GAAG,IAAA,0BAAiB,EAAC,IAAI,EAAE,WAAW,CAAC,CAAC;IACrE,MAAM,aAAa,GAAG,YAAY,CAAC,wBAAwB;QACzD,CAAC,CAAC,IAAA,+BAAsB,EAAC,IAAI,EAAE,SAAS,CAAC;QACzC,CAAC,CAAC,SAAS,CAAC;IAEd,qIAAqI;IACrI,MAAM,GAAG,GAAG,IAAI,OAAO,CAAC,cAAc,CAAC,IAAI,EAAE;QAC3C,WAAW,EAAE,IAAI;QACjB,GAAG,KAAK;QAER,IAAI,EAAE,OAAO,CAAC,IAAI,CAAC,SAAS;QAC5B,GAAG,EAAE;YACH,IAAI,EAAE,gBAAK;gBACT,CAAC,CAAC,OAAO,CAAC,OAAO,CAAC,YAAY,CAAC,uBAAuB;gBACtD,CAAC,CAAC,OAAO,CAAC,OAAO,CAAC,YAAY;SACjC;QACD,UAAU,EAAE,KAAK;QAEjB,YAAY,EAAE,IAAI;QAClB,sBAAsB,EAAE,IAAI;QAC5B,qBAAqB,EAAE,QAAQ,EAAE,qBAAqB;QACtD,oBAAoB,EAAE,YAAY,CAAC,oBAAoB;QACvD,QAAQ,EAAE,EAAE,IAAI,EAAE,gBAAgB,EAAE;QACpC,iBAAiB,EAAE,QAAQ;QAE3B,eAAe;QACf,SAAS,EAAE;YACT,yBAAyB,EAAE,QAAQ,CAAC,yBAAyB,IAAI,GAAG;SACrE;QAED,UAAU,EAAE,aAAa;YACvB,CAAC,CAAC;gBACE,QAAQ,EAAE;oBACR,IAAI,EAAE;wBACJ,OAAO,EAAE,IAAI;wBACb,OAAO,EAAE,OAAO,CAAC,OAAO,CAAC,OAAO;qBACjC;oBACD,IAAI,EAAE;wBACJ,OAAO,EAAE,IAAI;wBACb,OAAO,EAAE,OAAO,CAAC,OAAO,CAAC,OAAO;qBACjC;iBACF;gBACD,SAAS,EAAE,oBAAoB;gBAC/B,kBAAkB,EAAE,aAAa;aAClC;YACH,CAAC,CAAC,SAAS;QAEb,SAAS,EAAE;YACT,gBAAgB,EAAE,OAAO,CAAC,gBAAgB,CAAC,GAAG;YAC9C,mBAAmB,EAAE,aAAa;SACnC;QAED,YAAY,EACV,YAAY,IAAI,CAAC,YAAY,CAAC,mBAAmB;YAC/C,CAAC,CAAC,EAAE,IAAI,EAAE,YAAY,EAAE,gBAAgB,EAAE,IAAI,EAAE;YAChD,CAAC,CAAC,SAAS;QAEf,uBAAuB;QACvB,uCAAuC;QACvC,qDAAqD;QACrD,uDAAuD;QACvD,qCAAqC;QACrC,sCAAsC;QACtC,KAAK;QAEL,cAAc,EAAE,OAAO;YACrB,CAAC,CAAC;gBACE,MAAM,EAAE,kBAAkB;gBAC1B,aAAa,EAAE,OAAO;gBAEtB,mBAAmB,EAAE,OAAO,CAAC,QAAQ;oBACnC,CAAC,CAAC,CAAC,EAAE,wBAAwB,EAAE,OAAO,CAAC,QAAQ,EAAE,CAAC;oBAClD,CAAC,CAAC,SAAS;gBAEb,OAAO,EAAE,OAAO,CAAC,WAAW;oBAC1B,CAAC,CAAC,OAAO,CAAC,WAAW,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;wBAC9B,gBAAgB,EAAE,CAAC;wBACnB,MAAM,EAAE,OAAO;qBAChB,CAAC,CAAC;oBACL,CAAC,CAAC,SAAS;aACd;YACH,CAAC,CAAC,EAAE,aAAa,EAAE,OAAO,EAAE;KAC/B,CAAC,CAAC;IAEH,aAAa;IACb,IAAI,QAAQ,EAAE,CAAC;QACb,qCAAqC;QACrC,0BAA0B;QAC1B,MAAM;QACN,6BAA6B;QAC7B,gBAAgB;QAChB,EAAE;QACF,yDAAyD;QACzD,YAAY;QACZ,sDAAsD;QACtD,+CAA+C;QAC/C,YAAY;QACZ,qBAAqB;QACrB,6DAA6D;QAC7D,OAAO;QACP,uBAAuB;QACvB,KAAK;QACL,EAAE;QACF,qCAAqC;QACrC,0BAA0B;QAC1B,MAAM;QACN,6BAA6B;QAC7B,gBAAgB;QAChB,EAAE;QACF,mEAAmE;QACnE,YAAY;QACZ,2DAA2D;QAC3D,oDAAoD;QACpD,YAAY;QACZ,qBAAqB;QACrB,OAAO;QACP,uBAAuB;QACvB,KAAK;IACP,CAAC;IAED,uBAAuB;IACvB,IAAI,sBAAsB,EAAE,CAAC;QAC3B,IAAA,uCAAqB,EAAC;YACpB,IAAI;YACJ,cAAc,EAAE,GAAG;YACnB,KAAK;YACL,KAAK,EAAE,sBAAsB;SAC9B,CAAC,CAAC;IACL,CAAC;IAED,IAAI,IAAI,EAAE,CAAC;QACT,IAAA,gBAAM,EAAC,EAAE,IAAI,EAAE,QAAQ,EAAE,GAAG,EAAE,CAAC,CAAC;IAClC,CAAC;IAED,+BAA+B;IAC/B,IAAI,YAAY,CAAC,mBAAmB,EAAE,CAAC;QACrC,IAAI,OAAO,CAAC,2BAA2B,CACrC,IAAI,EACJ;YACE,WAAW,EAAE,GAAG,CAAC,IAAI;YACrB,GAAG,KAAK;YACR,aAAa,EAAE,YAAY;YAC3B,gBAAgB,EAAE,YAAY;SAC/B,EACD,EAAE,SAAS,EAAE,GAAG,EAAE,CACnB,CAAC;QAEF,oCAAoC;QACpC,gEAAgE;QAChE,IAAI;IACN,CAAC;IAED,6DAA6D;IAE7D,2CAA2C;IAC3C,IACE,CAAC,YAAY,CAAC,mBAAmB,IAAI,YAAY,CAAC;QAClD,YAAY,CAAC,WAAW,EACxB,CAAC;QACD,MAAM,MAAM,GAAG,GAAG,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,GAAG,CAAC,2BAA2B,CAAC,CAAC;QACtE,IAAA,qBAAU,EAAC;YACT,IAAI;YACJ,UAAU,EAAE,YAAa;YACzB,MAAM;YACN,IAAI,EAAE,UAAU;YAChB,YAAY,EAAE,IAAI;YAClB,8BAA8B,EAC5B,YAAY,CAAC,8BAA8B;SAC9C,CAAC,CAAC;IACL,CAAC;IAED,mBAAmB;IACnB,UAAU,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE;QACnB,MAAM,SAAS,GAAG,IAAI,OAAO,CAAC,aAAa,CAAC,CAAC,CAAC,IAAI,EAAE;YAClD,aAAa,EAAE,CAAC,CAAC,IAAI,CAAC,WAAW,EAAE;YACnC,GAAG,KAAK;YACR,WAAW,EAAE,GAAG,CAAC,IAAI;YACrB,oCAAoC;YACpC,YAAY,EAAE,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,MAAM;SACzC,CAAC,CAAC;QAEH,IAAI,CAAC,CAAC,eAAe,EAAE,CAAC;YACtB,IAAA,uCAAqB,EAAC;gBACpB,IAAI;gBACJ,cAAc,EAAE,GAAG;gBACnB,KAAK;gBACL,cAAc,EAAE,CAAC,SAAS,CAAC,IAAI,CAAC;gBAChC,KAAK,EAAE,CAAC,CAAC,eAAe;aACzB,CAAC,CAAC;QACL,CAAC;QACD,OAAO,SAAS,CAAC;IACnB,CAAC,CAAC,CAAC;IAEH,eAAe;IACf,MAAM,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE;QACf,IAAI,OAAO,CAAC,KAAK,CAAC,CAAC,EAAE;YACnB,SAAS,EAAE,CAAC,CAAC,WAAW,EAAE;YAC1B,WAAW,EAAE,GAAG,CAAC,IAAI;YACrB,GAAG,KAAK;SACT,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;IAEH,YAAY;IACZ,UAAU,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE;QACnB,IAAI,OAAO,CAAC,SAAS,CAAC,CAAC,EAAE;YACvB,SAAS,EAAE,CAAC,CAAC,WAAW,EAAE;YAC1B,WAAW,EAAE,GAAG,CAAC,IAAI;YACrB,GAAG,KAAK;SACT,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;IAEH,YAAY;IACZ,GAAG,CAAC,EAAE,CAAC,KAAK,CAAC,KAAK,EAAE,EAAE,EAAE,EAAE;QACxB,IAAI,CAAC,EAAE;YAAE,OAAO;QAEhB,0BAA0B;QAC1B,IAAA,iCAAwB,EAAC;YACvB,IAAI;YACJ,SAAS;YACT,OAAO,EAAE,UAAU;YACnB,WAAW,EAAE,GAAG,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAE,CAAC,WAAW,CAAC;SACvD,CAAC,CAAC;QAEH,MAAM,IAAI,GAAG,CACX,MAAM,OAAO,CAAC,sBAAsB,CAAC;YACnC,WAAW,EAAE,IAAI;YACjB,iBAAiB,EAAE,KAAK,CAAC,iBAAiB;SAC3C,CAAC,CACH,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;YACjB,IAAI,EAAE,CAAC,CAAC,OAAO;YACf,GAAG,EAAE,CAAC,CAAC,KAAK;YACZ,gBAAgB,EAAE,8CAA8C,IAAI,eAAe,CAAC,CAAC,KAAK,kCAAkC;SAC7H,CAAC,CAAC,CAAC;QAEJ,IAAI,SAAS,EAAE,CAAC;YACd,MAAM;YACN,IAAA,+BAAgB,EAAC;gBACf,SAAS;gBACT,WAAW,EAAE,SAAS;gBACtB,aAAa,EAAE,IAAI;gBACnB,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE,cAAc;wBACpB,KAAK,EAAE,IAAI,CAAC,CAAC,CAAC,CAAC,GAAG;qBACnB;oBACD;wBACE,IAAI,EAAE,gBAAgB;wBACtB,KAAK,EAAE,IAAI,CAAC,CAAC,CAAC,CAAC,GAAG;qBACnB;oBACD;wBACE,IAAI,EAAE,wBAAwB;wBAC9B,KAAK,EAAE,IAAI,CAAC,CAAC,CAAC,CAAC,gBAAgB;qBAChC;oBACD;wBACE,IAAI,EAAE,uBAAuB;wBAC7B,KAAK,EAAE,IAAI,CAAC,CAAC,CAAC,CAAC,gBAAgB;qBAChC;iBACF;aACF,CAAC,CAAC;QACL,CAAC;IACH,CAAC,CAAC,CAAC;IAEH,OAAO;QACL,OAAO,EAAE,GAAG;QACZ,UAAU,EAAE;YACV,cAAc;YACd,gBAAgB;YAChB,wBAAwB;YACxB,uBAAuB;SACxB;QACD,mBAAmB,EAAE,CAAC,OAAe,wBAAwB,EAAE,EAAE,CAC/D,SAAS;YACP,CAAC,CAAC,IAAA,kBAAS,EAAC,EAAE,IAAI,EAAE,aAAa,EAAE,IAAI,EAAE,SAAS,EAAE,CAAC;YACrD,CAAC,CAAC,SAAS;KAChB,CAAC;AACJ,CAAC,CAAC"}
|
|
@@ -0,0 +1,16 @@
|
|
|
1
|
+
import { Input } from "@pulumi/pulumi";
|
|
2
|
+
import { VmExtensionProps } from "./Extension";
|
|
3
|
+
export interface AdoVMExtensionProps extends Omit<VmExtensionProps, "extension"> {
|
|
4
|
+
settings: {
|
|
5
|
+
VSTSAccountUrl: Input<string>;
|
|
6
|
+
TeamProject: Input<string>;
|
|
7
|
+
DeploymentGroup: Input<string>;
|
|
8
|
+
AgentName: Input<string>;
|
|
9
|
+
Tags?: Input<string>;
|
|
10
|
+
};
|
|
11
|
+
protectedSettings: {
|
|
12
|
+
PATToken: Input<string>;
|
|
13
|
+
};
|
|
14
|
+
}
|
|
15
|
+
declare const _default: ({ settings, protectedSettings, ...others }: AdoVMExtensionProps) => import("@pulumi/azure-native/compute/virtualMachineExtension").VirtualMachineExtension;
|
|
16
|
+
export default _default;
|
|
@@ -0,0 +1,14 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
const Extension_1 = require("./Extension");
|
|
4
|
+
exports.default = ({ settings, protectedSettings, ...others }) => (0, Extension_1.default)({
|
|
5
|
+
...others,
|
|
6
|
+
extension: {
|
|
7
|
+
publisher: "Microsoft.VisualStudio.Services",
|
|
8
|
+
type: "TeamServicesAgentLinux",
|
|
9
|
+
typeHandlerVersion: "1.0",
|
|
10
|
+
protectedSettings,
|
|
11
|
+
settings,
|
|
12
|
+
},
|
|
13
|
+
});
|
|
14
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -0,0 +1,15 @@
|
|
|
1
|
+
import { BasicResourceArgs } from "../types";
|
|
2
|
+
import { Input } from "@pulumi/pulumi";
|
|
3
|
+
export interface VmExtensionProps extends BasicResourceArgs {
|
|
4
|
+
vmName: Input<string>;
|
|
5
|
+
enableAutomaticUpgrade?: boolean;
|
|
6
|
+
extension: {
|
|
7
|
+
publisher: Input<string>;
|
|
8
|
+
type: Input<string>;
|
|
9
|
+
typeHandlerVersion: Input<string>;
|
|
10
|
+
settings?: Record<string, Input<string>>;
|
|
11
|
+
protectedSettings?: Record<string, Input<string>>;
|
|
12
|
+
};
|
|
13
|
+
}
|
|
14
|
+
declare const _default: ({ name, group, vmName, extension, enableAutomaticUpgrade, dependsOn, }: VmExtensionProps) => import("@pulumi/azure-native/compute/virtualMachineExtension").VirtualMachineExtension;
|
|
15
|
+
export default _default;
|
package/VM/Extension.js
ADDED
|
@@ -0,0 +1,13 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
const compute = require("@pulumi/azure-native/compute");
|
|
4
|
+
exports.default = ({ name, group, vmName, extension, enableAutomaticUpgrade, dependsOn, }) => new compute.VirtualMachineExtension(name, {
|
|
5
|
+
vmExtensionName: name,
|
|
6
|
+
vmName,
|
|
7
|
+
...group,
|
|
8
|
+
...extension,
|
|
9
|
+
autoUpgradeMinorVersion: true,
|
|
10
|
+
enableAutomaticUpgrade,
|
|
11
|
+
suppressFailures: false,
|
|
12
|
+
}, { dependsOn });
|
|
13
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -0,0 +1,10 @@
|
|
|
1
|
+
import { BasicResourceArgs } from "../types";
|
|
2
|
+
import { Input } from "@pulumi/pulumi";
|
|
3
|
+
interface Props extends BasicResourceArgs {
|
|
4
|
+
time: Input<string>;
|
|
5
|
+
timeZone?: Input<string>;
|
|
6
|
+
targetResourceId: Input<string>;
|
|
7
|
+
task: "LabVmAutoStart" | "LabVmsShutdownTask" | "LabVmsStartupTask" | "LabVmReclamationTask" | "ComputeVmShutdownTask" | Input<string>;
|
|
8
|
+
}
|
|
9
|
+
declare const _default: ({ name, group, time, task, timeZone, targetResourceId, dependsOn, }: Props) => import("@pulumi/azure-native/devtestlab/globalSchedule").GlobalSchedule;
|
|
10
|
+
export default _default;
|
|
@@ -0,0 +1,20 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
const devtestlab = require("@pulumi/azure-native/devtestlab");
|
|
4
|
+
exports.default = ({ name, group, time, task, timeZone, targetResourceId, dependsOn, }) => new devtestlab.GlobalSchedule(name, {
|
|
5
|
+
name,
|
|
6
|
+
...group,
|
|
7
|
+
dailyRecurrence: { time },
|
|
8
|
+
timeZoneId: timeZone,
|
|
9
|
+
status: "Enabled",
|
|
10
|
+
targetResourceId,
|
|
11
|
+
taskType: task,
|
|
12
|
+
notificationSettings: {
|
|
13
|
+
status: "Disabled",
|
|
14
|
+
emailRecipient: "",
|
|
15
|
+
notificationLocale: "en",
|
|
16
|
+
timeInMinutes: 30,
|
|
17
|
+
webhookUrl: "",
|
|
18
|
+
},
|
|
19
|
+
}, { dependsOn });
|
|
20
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiR2xvYmFsU2NoZWR1bGUuanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi9zcmMvVk0vR2xvYmFsU2NoZWR1bGUudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6Ijs7QUFBQSw4REFBOEQ7QUFpQjlELGtCQUFlLENBQUMsRUFDZCxJQUFJLEVBQ0osS0FBSyxFQUNMLElBQUksRUFDSixJQUFJLEVBQ0osUUFBUSxFQUNSLGdCQUFnQixFQUNoQixTQUFTLEdBQ0gsRUFBRSxFQUFFLENBQ1YsSUFBSSxVQUFVLENBQUMsY0FBYyxDQUMzQixJQUFJLEVBQ0o7SUFDRSxJQUFJO0lBQ0osR0FBRyxLQUFLO0lBQ1IsZUFBZSxFQUFFLEVBQUUsSUFBSSxFQUFFO0lBQ3pCLFVBQVUsRUFBRSxRQUFRO0lBQ3BCLE1BQU0sRUFBRSxTQUFTO0lBQ2pCLGdCQUFnQjtJQUNoQixRQUFRLEVBQUUsSUFBSTtJQUNkLG9CQUFvQixFQUFFO1FBQ3BCLE1BQU0sRUFBRSxVQUFVO1FBQ2xCLGNBQWMsRUFBRSxFQUFFO1FBQ2xCLGtCQUFrQixFQUFFLElBQUk7UUFDeEIsYUFBYSxFQUFFLEVBQUU7UUFDakIsVUFBVSxFQUFFLEVBQUU7S0FDZjtDQUNGLEVBQ0QsRUFBRSxTQUFTLEVBQUUsQ0FDZCxDQUFDIn0=
|
package/VM/index.d.ts
CHANGED
|
@@ -1,37 +1,37 @@
|
|
|
1
|
-
import { Input, Resource } from
|
|
2
|
-
import * as
|
|
3
|
-
import { BasicResourceArgs, KeyVaultInfo } from
|
|
1
|
+
import { Input, Resource } from "@pulumi/pulumi";
|
|
2
|
+
import * as compute from "@pulumi/azure-native/compute";
|
|
3
|
+
import { BasicResourceArgs, KeyVaultInfo } from "../types";
|
|
4
|
+
import { VmExtensionProps } from "./Extension";
|
|
4
5
|
interface Props extends BasicResourceArgs {
|
|
5
6
|
subnetId: Input<string>;
|
|
6
|
-
storageAccountType?:
|
|
7
|
+
storageAccountType?: compute.StorageAccountTypes;
|
|
7
8
|
vmSize?: Input<string>;
|
|
8
9
|
login: {
|
|
9
10
|
userName: Input<string>;
|
|
10
11
|
password?: Input<string>;
|
|
11
12
|
};
|
|
12
|
-
|
|
13
|
-
|
|
14
|
-
|
|
15
|
-
|
|
13
|
+
osType?: "Windows" | "Linux";
|
|
14
|
+
image: {
|
|
15
|
+
offer: "WindowsServer" | "CentOS" | "Windows-10" | "windows-11" | string;
|
|
16
|
+
publisher: "MicrosoftWindowsServer" | "MicrosoftWindowsDesktop" | "Canonical" | string;
|
|
17
|
+
sku: "2019-Datacenter" | "21h1-pro" | "win11-23h2-pro" | string;
|
|
16
18
|
};
|
|
17
|
-
|
|
18
|
-
|
|
19
|
-
publisher: 'Canonical';
|
|
20
|
-
sku: '18.04-LTS';
|
|
21
|
-
};
|
|
22
|
-
vaultInfo?: KeyVaultInfo;
|
|
23
|
-
/**The time zone ID: https://stackoverflow.com/questions/7908343/list-of-timezone-ids-for-use-with-findtimezonebyid-in-c*/
|
|
24
|
-
timeZone?: Input<string>;
|
|
19
|
+
enableEncryption?: boolean;
|
|
20
|
+
vaultInfo: KeyVaultInfo;
|
|
25
21
|
osDiskSizeGB?: number;
|
|
26
22
|
dataDiskSizeGB?: number;
|
|
27
23
|
schedule?: {
|
|
28
|
-
|
|
24
|
+
/** The time zone ID: https://stackoverflow.com/questions/7908343/list-of-timezone-ids-for-use-with-findtimezonebyid-in-c */
|
|
25
|
+
timeZone?: "Singapore Standard Time" | Input<string>;
|
|
26
|
+
/** The format is ISO 8601 Standard ex: 2200 */
|
|
27
|
+
autoShutdownTime?: Input<string>;
|
|
29
28
|
};
|
|
29
|
+
extensions?: Array<Omit<VmExtensionProps, "dependsOn" | "vmName" | "group">>;
|
|
30
30
|
lock?: boolean;
|
|
31
31
|
tags?: {
|
|
32
32
|
[key: string]: Input<string>;
|
|
33
33
|
};
|
|
34
34
|
dependsOn?: Input<Input<Resource>[]> | Input<Resource>;
|
|
35
35
|
}
|
|
36
|
-
declare const _default: ({ name, group, subnetId, vmSize,
|
|
36
|
+
declare const _default: ({ name, group, subnetId, osType, vmSize, extensions, storageAccountType, osDiskSizeGB, dataDiskSizeGB, enableEncryption, vaultInfo, schedule, login, image, lock, tags, dependsOn, ...others }: Props) => import("@pulumi/azure-native/compute/virtualMachine").VirtualMachine;
|
|
37
37
|
export default _default;
|
package/VM/index.js
CHANGED
|
@@ -1,30 +1,37 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
const
|
|
3
|
+
const compute = require("@pulumi/azure-native/compute");
|
|
4
|
+
const network = require("@pulumi/azure-native/network");
|
|
4
5
|
const Naming_1 = require("../Common/Naming");
|
|
5
6
|
const Locker_1 = require("../Core/Locker");
|
|
6
|
-
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
lock = true, tags = {}, dependsOn, ...others }) => {
|
|
7
|
+
const Helper_1 = require("../KeyVault/Helper");
|
|
8
|
+
const GlobalSchedule_1 = require("./GlobalSchedule");
|
|
9
|
+
const Extension_1 = require("./Extension");
|
|
10
|
+
exports.default = ({ name, group, subnetId, osType = "Windows", vmSize = "Standard_B2s", extensions, storageAccountType = compute.StorageAccountTypes.Premium_LRS, osDiskSizeGB = 128, dataDiskSizeGB, enableEncryption, vaultInfo, schedule = { timeZone: "Singapore Standard Time" }, login, image, lock = false, tags = {}, dependsOn, ...others }) => {
|
|
11
11
|
const vmName = (0, Naming_1.getVMName)(name);
|
|
12
12
|
const nicName = (0, Naming_1.getNICName)(name);
|
|
13
|
-
const nic = new
|
|
13
|
+
const nic = new network.NetworkInterface(nicName, {
|
|
14
14
|
networkInterfaceName: nicName,
|
|
15
15
|
...group,
|
|
16
16
|
ipConfigurations: [
|
|
17
|
-
{ name:
|
|
17
|
+
{ name: "ipconfig", subnet: { id: subnetId }, primary: true },
|
|
18
18
|
],
|
|
19
|
-
nicType:
|
|
19
|
+
nicType: network.NetworkInterfaceNicType.Standard,
|
|
20
20
|
});
|
|
21
|
-
|
|
21
|
+
//All VM will using the same Key
|
|
22
|
+
const keyEncryption = enableEncryption
|
|
23
|
+
? (0, Helper_1.getEncryptionKeyOutput)(`az-vm-key-encryption`, vaultInfo)
|
|
24
|
+
: undefined;
|
|
25
|
+
const diskEncryption = enableEncryption
|
|
26
|
+
? (0, Helper_1.getEncryptionKeyOutput)(`az-vm-disk-encryption`, vaultInfo)
|
|
27
|
+
: undefined;
|
|
28
|
+
const vm = new compute.VirtualMachine(vmName, {
|
|
22
29
|
vmName,
|
|
23
30
|
...group,
|
|
24
31
|
...others,
|
|
25
32
|
hardwareProfile: { vmSize },
|
|
26
|
-
identity: { type:
|
|
27
|
-
licenseType:
|
|
33
|
+
identity: { type: "SystemAssigned" },
|
|
34
|
+
licenseType: "None",
|
|
28
35
|
networkProfile: {
|
|
29
36
|
networkInterfaces: [{ id: nic.id, primary: true }],
|
|
30
37
|
},
|
|
@@ -35,42 +42,67 @@ lock = true, tags = {}, dependsOn, ...others }) => {
|
|
|
35
42
|
allowExtensionOperations: true,
|
|
36
43
|
//Need to be enabled at subscription level
|
|
37
44
|
//requireGuestProvisionSignal: true,
|
|
38
|
-
linuxConfiguration:
|
|
45
|
+
linuxConfiguration: osType === "Linux"
|
|
39
46
|
? {
|
|
40
47
|
//ssh: { publicKeys: [{ keyData: linux.sshPublicKey! }] },
|
|
41
48
|
disablePasswordAuthentication: false,
|
|
42
49
|
provisionVMAgent: true,
|
|
43
50
|
patchSettings: {
|
|
44
|
-
|
|
45
|
-
|
|
51
|
+
assessmentMode: compute.LinuxPatchAssessmentMode.AutomaticByPlatform,
|
|
52
|
+
automaticByPlatformSettings: {
|
|
53
|
+
bypassPlatformSafetyChecksOnUserSchedule: true,
|
|
54
|
+
rebootSetting: compute.LinuxVMGuestPatchAutomaticByPlatformRebootSetting
|
|
55
|
+
.Never,
|
|
56
|
+
},
|
|
57
|
+
patchMode: compute.LinuxVMGuestPatchMode.AutomaticByPlatform,
|
|
46
58
|
},
|
|
47
59
|
}
|
|
48
60
|
: undefined,
|
|
49
|
-
windowsConfiguration:
|
|
61
|
+
windowsConfiguration: osType === "Windows"
|
|
50
62
|
? {
|
|
51
63
|
enableAutomaticUpdates: true,
|
|
52
64
|
provisionVMAgent: true,
|
|
53
|
-
timeZone,
|
|
65
|
+
timeZone: schedule?.timeZone,
|
|
54
66
|
patchSettings: {
|
|
55
67
|
enableHotpatching: false,
|
|
56
|
-
|
|
57
|
-
|
|
58
|
-
patchMode: 'AutomaticByPlatform',
|
|
68
|
+
assessmentMode: compute.WindowsPatchAssessmentMode.ImageDefault,
|
|
69
|
+
patchMode: compute.WindowsVMGuestPatchMode.AutomaticByOS,
|
|
59
70
|
},
|
|
60
71
|
}
|
|
61
72
|
: undefined,
|
|
62
73
|
},
|
|
63
74
|
storageProfile: {
|
|
64
75
|
imageReference: {
|
|
65
|
-
...
|
|
66
|
-
version:
|
|
76
|
+
...image,
|
|
77
|
+
version: "latest",
|
|
67
78
|
},
|
|
68
79
|
osDisk: {
|
|
69
80
|
name: `${name}osdisk`,
|
|
70
81
|
diskSizeGB: osDiskSizeGB,
|
|
71
|
-
caching:
|
|
72
|
-
createOption:
|
|
73
|
-
osType
|
|
82
|
+
caching: "ReadWrite",
|
|
83
|
+
createOption: "FromImage",
|
|
84
|
+
osType,
|
|
85
|
+
encryptionSettings: enableEncryption
|
|
86
|
+
? {
|
|
87
|
+
diskEncryptionKey: diskEncryption
|
|
88
|
+
? {
|
|
89
|
+
secretUrl: diskEncryption.url,
|
|
90
|
+
sourceVault: {
|
|
91
|
+
id: vaultInfo.id,
|
|
92
|
+
},
|
|
93
|
+
}
|
|
94
|
+
: undefined,
|
|
95
|
+
keyEncryptionKey: keyEncryption
|
|
96
|
+
? {
|
|
97
|
+
keyUrl: keyEncryption.url,
|
|
98
|
+
sourceVault: {
|
|
99
|
+
id: vaultInfo.id,
|
|
100
|
+
},
|
|
101
|
+
}
|
|
102
|
+
: undefined,
|
|
103
|
+
enabled: enableEncryption,
|
|
104
|
+
}
|
|
105
|
+
: undefined,
|
|
74
106
|
managedDisk: {
|
|
75
107
|
//Changes storage account type need to be done manually through portal.
|
|
76
108
|
storageAccountType,
|
|
@@ -81,7 +113,7 @@ lock = true, tags = {}, dependsOn, ...others }) => {
|
|
|
81
113
|
{
|
|
82
114
|
name: `${name}datadisk`,
|
|
83
115
|
diskSizeGB: dataDiskSizeGB,
|
|
84
|
-
createOption:
|
|
116
|
+
createOption: compute.DiskCreateOptionTypes.Empty,
|
|
85
117
|
lun: 1,
|
|
86
118
|
},
|
|
87
119
|
]
|
|
@@ -89,49 +121,54 @@ lock = true, tags = {}, dependsOn, ...others }) => {
|
|
|
89
121
|
},
|
|
90
122
|
diagnosticsProfile: { bootDiagnostics: { enabled: true } },
|
|
91
123
|
// securityProfile: {
|
|
92
|
-
//
|
|
93
|
-
//
|
|
94
|
-
//
|
|
124
|
+
//
|
|
125
|
+
// uefiSettings: {
|
|
126
|
+
// secureBootEnabled: true,
|
|
127
|
+
// },
|
|
95
128
|
// },
|
|
96
129
|
tags,
|
|
97
130
|
}, {
|
|
98
131
|
dependsOn,
|
|
99
132
|
ignoreChanges: [
|
|
100
|
-
|
|
101
|
-
|
|
133
|
+
"storageProfile.osDisk.managedDisk.storageAccountType",
|
|
134
|
+
"storageProfile.osDisk.managedDisk.id",
|
|
102
135
|
],
|
|
103
136
|
});
|
|
137
|
+
if (extensions) {
|
|
138
|
+
extensions.forEach((ex) => (0, Extension_1.default)({
|
|
139
|
+
...ex,
|
|
140
|
+
group,
|
|
141
|
+
vmName,
|
|
142
|
+
dependsOn: vm,
|
|
143
|
+
}));
|
|
144
|
+
}
|
|
104
145
|
if (lock) {
|
|
105
146
|
(0, Locker_1.default)({ name: vmName, resource: vm });
|
|
106
147
|
}
|
|
107
|
-
|
|
108
|
-
|
|
148
|
+
//Auto shutdown
|
|
149
|
+
if (schedule?.autoShutdownTime) {
|
|
150
|
+
(0, GlobalSchedule_1.default)({
|
|
109
151
|
name: `shutdown-computevm-${vmName}`,
|
|
110
|
-
|
|
111
|
-
|
|
112
|
-
|
|
113
|
-
status: 'Enabled',
|
|
152
|
+
group,
|
|
153
|
+
time: schedule.autoShutdownTime,
|
|
154
|
+
timeZone: schedule.timeZone,
|
|
114
155
|
targetResourceId: vm.id,
|
|
115
|
-
|
|
116
|
-
|
|
117
|
-
|
|
118
|
-
emailRecipient: '',
|
|
119
|
-
notificationLocale: 'en',
|
|
120
|
-
timeInMinutes: 30,
|
|
121
|
-
webhookUrl: '',
|
|
122
|
-
},
|
|
123
|
-
}, { dependsOn: vm });
|
|
124
|
-
// if (schedule.autoStartupTime) {
|
|
125
|
-
// new native.devtestlab.GlobalSchedule(`${vmName}-auto-startup`, {
|
|
126
|
-
// name: `${vmName}-auto-startup`,
|
|
127
|
-
// ...group,
|
|
128
|
-
// dailyRecurrence: { time: schedule.autoStartupTime },
|
|
129
|
-
// timeZoneId: timeZone,
|
|
130
|
-
// targetResourceId: vm.id,
|
|
131
|
-
// taskType: 'LabVmAutoStart',
|
|
132
|
-
// });
|
|
133
|
-
// }
|
|
156
|
+
task: "ComputeVmShutdownTask", //LabVmsShutdownTask,LabVmsStartupTask,LabVmReclamationTask,ComputeVmShutdownTask
|
|
157
|
+
dependsOn: vm,
|
|
158
|
+
});
|
|
134
159
|
}
|
|
160
|
+
//Auto start
|
|
161
|
+
// if (schedule?.autoStartTime) {
|
|
162
|
+
// GlobalSchedule({
|
|
163
|
+
// name: `${vmName}-auto-start`,
|
|
164
|
+
// group,
|
|
165
|
+
// time: schedule.autoStartTime,
|
|
166
|
+
// timeZone: schedule.timeZone,
|
|
167
|
+
// targetResourceId: vm.id,
|
|
168
|
+
// task: "LabVmAutoStart", //LabVmsShutdownTask,LabVmsStartupTask,LabVmReclamationTask,ComputeVmShutdownTask
|
|
169
|
+
// dependsOn: vm,
|
|
170
|
+
// });
|
|
171
|
+
// }
|
|
135
172
|
return vm;
|
|
136
173
|
};
|
|
137
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
174
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi9zcmMvVk0vaW5kZXgudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6Ijs7QUFDQSx3REFBd0Q7QUFDeEQsd0RBQXdEO0FBRXhELDZDQUF5RDtBQUN6RCwyQ0FBb0M7QUFDcEMsK0NBQTREO0FBQzVELHFEQUE4QztBQUM5QywyQ0FBMEQ7QUEwQzFELGtCQUFlLENBQUMsRUFDZCxJQUFJLEVBQ0osS0FBSyxFQUNMLFFBQVEsRUFDUixNQUFNLEdBQUcsU0FBUyxFQUNsQixNQUFNLEdBQUcsY0FBYyxFQUN2QixVQUFVLEVBQ1Ysa0JBQWtCLEdBQUcsT0FBTyxDQUFDLG1CQUFtQixDQUFDLFdBQVcsRUFDNUQsWUFBWSxHQUFHLEdBQUcsRUFDbEIsY0FBYyxFQUNkLGdCQUFnQixFQUNoQixTQUFTLEVBQ1QsUUFBUSxHQUFHLEVBQUUsUUFBUSxFQUFFLHlCQUF5QixFQUFFLEVBQ2xELEtBQUssRUFDTCxLQUFLLEVBQ0wsSUFBSSxHQUFHLEtBQUssRUFDWixJQUFJLEdBQUcsRUFBRSxFQUNULFNBQVMsRUFDVCxHQUFHLE1BQU0sRUFDSCxFQUFFLEVBQUU7SUFDVixNQUFNLE1BQU0sR0FBRyxJQUFBLGtCQUFTLEVBQUMsSUFBSSxDQUFDLENBQUM7SUFDL0IsTUFBTSxPQUFPLEdBQUcsSUFBQSxtQkFBVSxFQUFDLElBQUksQ0FBQyxDQUFDO0lBRWpDLE1BQU0sR0FBRyxHQUFHLElBQUksT0FBTyxDQUFDLGdCQUFnQixDQUFDLE9BQU8sRUFBRTtRQUNoRCxvQkFBb0IsRUFBRSxPQUFPO1FBQzdCLEdBQUcsS0FBSztRQUNSLGdCQUFnQixFQUFFO1lBQ2hCLEVBQUUsSUFBSSxFQUFFLFVBQVUsRUFBRSxNQUFNLEVBQUUsRUFBRSxFQUFFLEVBQUUsUUFBUSxFQUFFLEVBQUUsT0FBTyxFQUFFLElBQUksRUFBRTtTQUM5RDtRQUNELE9BQU8sRUFBRSxPQUFPLENBQUMsdUJBQXVCLENBQUMsUUFBUTtLQUNsRCxDQUFDLENBQUM7SUFFSCxnQ0FBZ0M7SUFDaEMsTUFBTSxhQUFhLEdBQUcsZ0JBQWdCO1FBQ3BDLENBQUMsQ0FBQyxJQUFBLCtCQUFzQixFQUFDLHNCQUFzQixFQUFFLFNBQVMsQ0FBQztRQUMzRCxDQUFDLENBQUMsU0FBUyxDQUFDO0lBQ2QsTUFBTSxjQUFjLEdBQUcsZ0JBQWdCO1FBQ3JDLENBQUMsQ0FBQyxJQUFBLCtCQUFzQixFQUFDLHVCQUF1QixFQUFFLFNBQVMsQ0FBQztRQUM1RCxDQUFDLENBQUMsU0FBUyxDQUFDO0lBRWQsTUFBTSxFQUFFLEdBQUcsSUFBSSxPQUFPLENBQUMsY0FBYyxDQUNuQyxNQUFNLEVBQ047UUFDRSxNQUFNO1FBQ04sR0FBRyxLQUFLO1FBQ1IsR0FBRyxNQUFNO1FBRVQsZUFBZSxFQUFFLEVBQUUsTUFBTSxFQUFFO1FBQzNCLFFBQVEsRUFBRSxFQUFFLElBQUksRUFBRSxnQkFBZ0IsRUFBRTtRQUNwQyxXQUFXLEVBQUUsTUFBTTtRQUNuQixjQUFjLEVBQUU7WUFDZCxpQkFBaUIsRUFBRSxDQUFDLEVBQUUsRUFBRSxFQUFFLEdBQUcsQ0FBQyxFQUFFLEVBQUUsT0FBTyxFQUFFLElBQUksRUFBRSxDQUFDO1NBQ25EO1FBQ0QsU0FBUyxFQUFFO1lBQ1QsWUFBWSxFQUFFLElBQUk7WUFDbEIsYUFBYSxFQUFFLEtBQUssQ0FBQyxRQUFRO1lBQzdCLGFBQWEsRUFBRSxLQUFLLENBQUMsUUFBUTtZQUU3Qix3QkFBd0IsRUFBRSxJQUFJO1lBQzlCLDBDQUEwQztZQUMxQyxvQ0FBb0M7WUFDcEMsa0JBQWtCLEVBQ2hCLE1BQU0sS0FBSyxPQUFPO2dCQUNoQixDQUFDLENBQUM7b0JBQ0UsMERBQTBEO29CQUMxRCw2QkFBNkIsRUFBRSxLQUFLO29CQUNwQyxnQkFBZ0IsRUFBRSxJQUFJO29CQUN0QixhQUFhLEVBQUU7d0JBQ2IsY0FBYyxFQUNaLE9BQU8sQ0FBQyx3QkFBd0IsQ0FBQyxtQkFBbUI7d0JBQ3RELDJCQUEyQixFQUFFOzRCQUMzQix3Q0FBd0MsRUFBRSxJQUFJOzRCQUM5QyxhQUFhLEVBQ1gsT0FBTyxDQUFDLGlEQUFpRDtpQ0FDdEQsS0FBSzt5QkFDWDt3QkFDRCxTQUFTLEVBQUUsT0FBTyxDQUFDLHFCQUFxQixDQUFDLG1CQUFtQjtxQkFDN0Q7aUJBQ0Y7Z0JBQ0gsQ0FBQyxDQUFDLFNBQVM7WUFFZixvQkFBb0IsRUFDbEIsTUFBTSxLQUFLLFNBQVM7Z0JBQ2xCLENBQUMsQ0FBQztvQkFDRSxzQkFBc0IsRUFBRSxJQUFJO29CQUM1QixnQkFBZ0IsRUFBRSxJQUFJO29CQUN0QixRQUFRLEVBQUUsUUFBUSxFQUFFLFFBQVE7b0JBQzVCLGFBQWEsRUFBRTt3QkFDYixpQkFBaUIsRUFBRSxLQUFLO3dCQUN4QixjQUFjLEVBQ1osT0FBTyxDQUFDLDBCQUEwQixDQUFDLFlBQVk7d0JBQ2pELFNBQVMsRUFBRSxPQUFPLENBQUMsdUJBQXVCLENBQUMsYUFBYTtxQkFDekQ7aUJBQ0Y7Z0JBQ0gsQ0FBQyxDQUFDLFNBQVM7U0FDaEI7UUFDRCxjQUFjLEVBQUU7WUFDZCxjQUFjLEVBQUU7Z0JBQ2QsR0FBRyxLQUFLO2dCQUNSLE9BQU8sRUFBRSxRQUFRO2FBQ2xCO1lBQ0QsTUFBTSxFQUFFO2dCQUNOLElBQUksRUFBRSxHQUFHLElBQUksUUFBUTtnQkFDckIsVUFBVSxFQUFFLFlBQVk7Z0JBQ3hCLE9BQU8sRUFBRSxXQUFXO2dCQUNwQixZQUFZLEVBQUUsV0FBVztnQkFDekIsTUFBTTtnQkFDTixrQkFBa0IsRUFBRSxnQkFBZ0I7b0JBQ2xDLENBQUMsQ0FBQzt3QkFDRSxpQkFBaUIsRUFBRSxjQUFjOzRCQUMvQixDQUFDLENBQUM7Z0NBQ0UsU0FBUyxFQUFFLGNBQWMsQ0FBQyxHQUFHO2dDQUM3QixXQUFXLEVBQUU7b0NBQ1gsRUFBRSxFQUFFLFNBQVMsQ0FBQyxFQUFFO2lDQUNqQjs2QkFDRjs0QkFDSCxDQUFDLENBQUMsU0FBUzt3QkFDYixnQkFBZ0IsRUFBRSxhQUFhOzRCQUM3QixDQUFDLENBQUM7Z0NBQ0UsTUFBTSxFQUFFLGFBQWEsQ0FBQyxHQUFHO2dDQUN6QixXQUFXLEVBQUU7b0NBQ1gsRUFBRSxFQUFFLFNBQVMsQ0FBQyxFQUFFO2lDQUNqQjs2QkFDRjs0QkFDSCxDQUFDLENBQUMsU0FBUzt3QkFDYixPQUFPLEVBQUUsZ0JBQWdCO3FCQUMxQjtvQkFDSCxDQUFDLENBQUMsU0FBUztnQkFDYixXQUFXLEVBQUU7b0JBQ1gsdUVBQXVFO29CQUN2RSxrQkFBa0I7aUJBQ25CO2FBQ0Y7WUFFRCxTQUFTLEVBQUUsY0FBYztnQkFDdkIsQ0FBQyxDQUFDO29CQUNFO3dCQUNFLElBQUksRUFBRSxHQUFHLElBQUksVUFBVTt3QkFDdkIsVUFBVSxFQUFFLGNBQWM7d0JBQzFCLFlBQVksRUFBRSxPQUFPLENBQUMscUJBQXFCLENBQUMsS0FBSzt3QkFDakQsR0FBRyxFQUFFLENBQUM7cUJBQ1A7aUJBQ0Y7Z0JBQ0gsQ0FBQyxDQUFDLEVBQUU7U0FDUDtRQUNELGtCQUFrQixFQUFFLEVBQUUsZUFBZSxFQUFFLEVBQUUsT0FBTyxFQUFFLElBQUksRUFBRSxFQUFFO1FBQzFELHFCQUFxQjtRQUNyQixFQUFFO1FBQ0Ysc0JBQXNCO1FBQ3RCLG1DQUFtQztRQUNuQyxTQUFTO1FBQ1QsS0FBSztRQUNMLElBQUk7S0FDTCxFQUNEO1FBQ0UsU0FBUztRQUNULGFBQWEsRUFBRTtZQUNiLHNEQUFzRDtZQUN0RCxzQ0FBc0M7U0FDdkM7S0FDRixDQUNGLENBQUM7SUFFRixJQUFJLFVBQVUsRUFBRSxDQUFDO1FBQ2YsVUFBVSxDQUFDLE9BQU8sQ0FBQyxDQUFDLEVBQUUsRUFBRSxFQUFFLENBQ3hCLElBQUEsbUJBQVMsRUFBQztZQUNSLEdBQUcsRUFBRTtZQUNMLEtBQUs7WUFDTCxNQUFNO1lBQ04sU0FBUyxFQUFFLEVBQUU7U0FDZCxDQUFDLENBQ0gsQ0FBQztJQUNKLENBQUM7SUFDRCxJQUFJLElBQUksRUFBRSxDQUFDO1FBQ1QsSUFBQSxnQkFBTSxFQUFDLEVBQUUsSUFBSSxFQUFFLE1BQU0sRUFBRSxRQUFRLEVBQUUsRUFBRSxFQUFFLENBQUMsQ0FBQztJQUN6QyxDQUFDO0lBRUQsZUFBZTtJQUNmLElBQUksUUFBUSxFQUFFLGdCQUFnQixFQUFFLENBQUM7UUFDL0IsSUFBQSx3QkFBYyxFQUFDO1lBQ2IsSUFBSSxFQUFFLHNCQUFzQixNQUFNLEVBQUU7WUFDcEMsS0FBSztZQUNMLElBQUksRUFBRSxRQUFRLENBQUMsZ0JBQWdCO1lBQy9CLFFBQVEsRUFBRSxRQUFRLENBQUMsUUFBUTtZQUMzQixnQkFBZ0IsRUFBRSxFQUFFLENBQUMsRUFBRTtZQUN2QixJQUFJLEVBQUUsdUJBQXVCLEVBQUUsaUZBQWlGO1lBQ2hILFNBQVMsRUFBRSxFQUFFO1NBQ2QsQ0FBQyxDQUFDO0lBQ0wsQ0FBQztJQUVELFlBQVk7SUFDWixpQ0FBaUM7SUFDakMscUJBQXFCO0lBQ3JCLG9DQUFvQztJQUNwQyxhQUFhO0lBQ2Isb0NBQW9DO0lBQ3BDLG1DQUFtQztJQUNuQywrQkFBK0I7SUFDL0IsZ0hBQWdIO0lBQ2hILHFCQUFxQjtJQUNyQixRQUFRO0lBQ1IsSUFBSTtJQUVKLE9BQU8sRUFBRSxDQUFDO0FBQ1osQ0FBQyxDQUFDIn0=
|
package/VNet/Bastion.d.ts
CHANGED
|
@@ -1,8 +1,8 @@
|
|
|
1
1
|
import { BasicResourceArgs } from "../types";
|
|
2
|
-
import { Input
|
|
3
|
-
interface
|
|
2
|
+
import { Input } from "@pulumi/pulumi";
|
|
3
|
+
export interface BastionProps extends BasicResourceArgs {
|
|
4
4
|
subnetId: Input<string>;
|
|
5
|
-
|
|
5
|
+
sku?: "Basic" | "Standard" | "Developer" | string;
|
|
6
6
|
}
|
|
7
|
-
declare const _default: ({ name, group, subnetId, dependsOn }:
|
|
7
|
+
declare const _default: ({ name, group, subnetId, dependsOn, importUri, ignoreChanges, sku, }: BastionProps) => import("@pulumi/azure-native/network/bastionHost").BastionHost;
|
|
8
8
|
export default _default;
|