@drunk-pulumi/azure 0.0.36 → 0.0.38
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/Aks/Helper.d.ts +6 -11
- package/Aks/Helper.js +40 -65
- package/Aks/Identity.d.ts +3 -10
- package/Aks/Identity.js +9 -8
- package/Aks/index.d.ts +67 -71
- package/Aks/index.js +198 -314
- package/Apim/ApiProduct/PolicyBuilder.js +25 -27
- package/Apim/ApiProduct/SwaggerHelper.js +1 -3
- package/Apim/ApiProduct/index.d.ts +3 -3
- package/Apim/ApiProduct/index.js +1 -2
- package/Automation/index.d.ts +7 -0
- package/Automation/index.js +55 -0
- package/AzAd/EnvRoles.Consts.d.ts +12 -0
- package/AzAd/EnvRoles.Consts.js +125 -0
- package/AzAd/EnvRoles.d.ts +16 -15
- package/AzAd/EnvRoles.js +69 -47
- package/AzAd/GraphDefinition.d.ts +2 -2
- package/AzAd/GraphDefinition.js +3055 -3056
- package/AzAd/Helper.d.ts +24 -13
- package/AzAd/Helper.js +98 -25
- package/AzAd/Identities/AzDevOpsIdentity.d.ts +12 -0
- package/AzAd/Identities/AzDevOpsIdentity.js +32 -0
- package/AzAd/Identities/AzDevOpsManagedIdentity.d.ts +7 -0
- package/AzAd/Identities/AzDevOpsManagedIdentity.js +15 -0
- package/AzAd/Identities/AzUserAdRevertSync.d.ts +2 -9
- package/AzAd/Identities/AzUserAdRevertSync.js +4 -5
- package/AzAd/Identities/index.d.ts +3 -0
- package/AzAd/Identities/index.js +10 -0
- package/AzAd/Identity.d.ts +10 -22
- package/AzAd/Identity.js +50 -61
- package/AzAd/Role.d.ts +2 -3
- package/AzAd/Role.js +4 -5
- package/AzAd/RoleAssignment.d.ts +34 -5
- package/AzAd/RoleAssignment.js +2 -2
- package/AzAd/RoleDefinitions/JustInTimeRequestRole.d.ts +2 -0
- package/AzAd/RoleDefinitions/JustInTimeRequestRole.js +25 -0
- package/AzAd/RolesBuiltIn.d.ts +29 -0
- package/AzAd/RolesBuiltIn.js +13034 -8058
- package/AzAd/UserAssignedIdentity.d.ts +6 -0
- package/AzAd/UserAssignedIdentity.js +27 -0
- package/Builder/AksBuilder.d.ts +3 -0
- package/Builder/AksBuilder.js +95 -0
- package/Builder/VnetBuilder.d.ts +3 -0
- package/Builder/VnetBuilder.js +279 -0
- package/Builder/index.d.ts +2 -0
- package/Builder/index.js +8 -0
- package/Builder/types.d.ts +120 -0
- package/Builder/types.js +18 -0
- package/Certificate/index.d.ts +1 -1
- package/Certificate/index.js +26 -28
- package/Common/AutoTags.js +2 -2
- package/Common/AzureEnv.d.ts +4 -3
- package/Common/AzureEnv.js +31 -24
- package/Common/GlobalEnv.d.ts +1 -2
- package/Common/GlobalEnv.js +7 -7
- package/Common/Location.d.ts +3 -3
- package/Common/Location.js +22 -9
- package/Common/LocationBuiltIn.d.ts +6 -81
- package/Common/LocationBuiltIn.js +491 -1923
- package/Common/Naming/index.d.ts +6 -4
- package/Common/Naming/index.js +64 -60
- package/Common/ResourceEnv.d.ts +2 -2
- package/Common/ResourceEnv.js +11 -10
- package/Common/StackEnv.js +2 -9
- package/Core/KeyGenetators.d.ts +16 -20
- package/Core/KeyGenetators.js +17 -16
- package/Core/Random.d.ts +4 -4
- package/Core/Random.js +10 -10
- package/Core/ResourceGroup.d.ts +12 -6
- package/Core/ResourceGroup.js +12 -24
- package/IOT/Hub/index.d.ts +4 -8
- package/IOT/Hub/index.js +19 -54
- package/KeyVault/Helper.d.ts +8 -6
- package/KeyVault/Helper.js +13 -19
- package/KeyVault/index.d.ts +1 -3
- package/KeyVault/index.js +2 -26
- package/Logs/Helpers.d.ts +35 -25
- package/Logs/Helpers.js +33 -20
- package/Logs/LogAnalytics.d.ts +2 -2
- package/Logs/LogAnalytics.js +15 -6
- package/Logs/index.d.ts +3 -3
- package/Logs/index.js +4 -4
- package/MySql/index.d.ts +2 -3
- package/MySql/index.js +16 -19
- package/{ReadMe.md → README.md} +6 -1
- package/Sql/index.d.ts +17 -10
- package/Sql/index.js +39 -42
- package/Storage/CdnEndpoint.d.ts +2 -2
- package/Storage/CdnEndpoint.js +14 -15
- package/Storage/Helper.d.ts +2 -2
- package/Storage/Helper.js +6 -6
- package/Storage/ManagementRules.d.ts +5 -23
- package/Storage/ManagementRules.js +3 -3
- package/Storage/index.d.ts +3 -3
- package/Storage/index.js +28 -28
- package/VM/AzureDevOpsExtension.d.ts +16 -0
- package/VM/AzureDevOpsExtension.js +14 -0
- package/VM/Extension.d.ts +15 -0
- package/VM/Extension.js +13 -0
- package/VM/GlobalSchedule.d.ts +10 -0
- package/VM/GlobalSchedule.js +20 -0
- package/VM/index.d.ts +18 -18
- package/VM/index.js +94 -57
- package/VNet/Bastion.d.ts +4 -4
- package/VNet/Bastion.js +12 -8
- package/VNet/Firewall.d.ts +19 -12
- package/VNet/Firewall.js +59 -40
- package/VNet/FirewallPolicies/AksFirewallPolicy.d.ts +16 -16
- package/VNet/FirewallPolicies/AksFirewallPolicy.js +193 -220
- package/VNet/FirewallPolicies/CloudPCFirewallPolicy.d.ts +12 -10
- package/VNet/FirewallPolicies/CloudPCFirewallPolicy.js +170 -282
- package/VNet/FirewallPolicies/DefaultFirewallPolicy.d.ts +3 -0
- package/VNet/FirewallPolicies/DefaultFirewallPolicy.js +25 -0
- package/VNet/FirewallPolicies/index.d.ts +4 -0
- package/VNet/FirewallPolicies/index.js +10 -0
- package/VNet/FirewallPolicy.d.ts +14 -11
- package/VNet/FirewallPolicy.js +67 -74
- package/VNet/FirewallRules/AksFirewallRules.d.ts +4 -3
- package/VNet/FirewallRules/AksFirewallRules.js +101 -100
- package/VNet/Helper.d.ts +8 -4
- package/VNet/Helper.js +42 -35
- package/VNet/IpAddress.d.ts +6 -8
- package/VNet/IpAddress.js +6 -11
- package/VNet/IpAddressPrefix.d.ts +12 -9
- package/VNet/IpAddressPrefix.js +14 -13
- package/VNet/NSGRules/AppGatewaySecurityRule.d.ts +9 -0
- package/VNet/NSGRules/AppGatewaySecurityRule.js +46 -0
- package/VNet/NSGRules/AzADSecurityRule.d.ts +6 -0
- package/VNet/NSGRules/AzADSecurityRule.js +39 -0
- package/VNet/NSGRules/BastionSecurityRule.d.ts +9 -0
- package/VNet/NSGRules/BastionSecurityRule.js +93 -0
- package/VNet/NatGateway.d.ts +10 -0
- package/VNet/NatGateway.js +21 -0
- package/VNet/NetworkPeering.d.ts +7 -7
- package/VNet/NetworkPeering.js +29 -20
- package/VNet/PrivateDns.d.ts +8 -10
- package/VNet/PrivateDns.js +12 -14
- package/VNet/PrivateEndpoint.js +5 -2
- package/VNet/RouteTable.d.ts +7 -8
- package/VNet/RouteTable.js +6 -6
- package/VNet/SecurityGroup.d.ts +4 -4
- package/VNet/SecurityGroup.js +7 -3
- package/VNet/Subnet.d.ts +10 -7
- package/VNet/Subnet.js +4 -3
- package/VNet/VPNGateway.d.ts +13 -0
- package/VNet/VPNGateway.js +73 -0
- package/VNet/VirtualWAN.d.ts +7 -10
- package/VNet/VirtualWAN.js +1 -1
- package/VNet/Vnet.d.ts +29 -23
- package/VNet/Vnet.js +58 -121
- package/VNet/index.d.ts +17 -18
- package/VNet/index.js +41 -54
- package/VNet/types.d.ts +94 -0
- package/VNet/types.js +3 -0
- package/Web/types.d.ts +2 -134
- package/package.json +8 -8
- package/types.d.ts +22 -8
- package/z_tests/_tools/Mocks.js +12 -13
- package/Automation/AutoAccount.d.ts +0 -5
- package/Automation/AutoAccount.js +0 -18
- package/AzAd/Identities/AzDevOps.d.ts +0 -23
- package/AzAd/Identities/AzDevOps.js +0 -61
- package/AzAd/KeyVaultRoles.d.ts +0 -8
- package/AzAd/KeyVaultRoles.js +0 -53
- package/AzAd/ManagedIdentity.d.ts +0 -6
- package/AzAd/ManagedIdentity.js +0 -20
- package/AzAd/UserIdentity.d.ts +0 -5
- package/AzAd/UserIdentity.js +0 -12
- package/Common/Naming/AzureRegions.d.ts +0 -4
- package/Common/Naming/AzureRegions.js +0 -49
- package/KeyVault/VaultPermissions.d.ts +0 -27
- package/KeyVault/VaultPermissions.js +0 -226
- package/VNet/FirewallRules/types.d.ts +0 -20
- package/VNet/FirewallRules/types.js +0 -5
- package/VNet/NSGRules/AzADService.d.ts +0 -10
- package/VNet/NSGRules/AzADService.js +0 -45
package/VNet/Bastion.js
CHANGED
|
@@ -3,26 +3,30 @@ Object.defineProperty(exports, "__esModule", { value: true });
|
|
|
3
3
|
const IpAddress_1 = require("./IpAddress");
|
|
4
4
|
const network = require("@pulumi/azure-native/network");
|
|
5
5
|
const Naming_1 = require("../Common/Naming");
|
|
6
|
-
exports.default = ({ name, group, subnetId, dependsOn }) => {
|
|
6
|
+
exports.default = ({ name, group, subnetId, dependsOn, importUri, ignoreChanges, sku = "Basic", }) => {
|
|
7
7
|
name = (0, Naming_1.getBastionName)(name);
|
|
8
|
-
const
|
|
8
|
+
const ipAddressId = (0, IpAddress_1.default)({
|
|
9
9
|
name,
|
|
10
10
|
group,
|
|
11
|
-
sku: { name: "Standard", tier: "Regional" },
|
|
12
11
|
lock: false,
|
|
13
|
-
});
|
|
12
|
+
}).id;
|
|
14
13
|
return new network.BastionHost(name, {
|
|
15
14
|
bastionHostName: name,
|
|
16
15
|
...group,
|
|
17
|
-
|
|
16
|
+
sku: { name: sku },
|
|
18
17
|
ipConfigurations: [
|
|
19
18
|
{
|
|
20
19
|
name: "IpConfig",
|
|
21
|
-
publicIPAddress: { id:
|
|
20
|
+
publicIPAddress: { id: ipAddressId },
|
|
22
21
|
subnet: { id: subnetId },
|
|
23
22
|
privateIPAllocationMethod: network.IPAllocationMethod.Dynamic,
|
|
24
23
|
},
|
|
25
24
|
],
|
|
26
|
-
}, {
|
|
25
|
+
}, {
|
|
26
|
+
dependsOn: dependsOn,
|
|
27
|
+
deleteBeforeReplace: true,
|
|
28
|
+
import: importUri,
|
|
29
|
+
ignoreChanges,
|
|
30
|
+
});
|
|
27
31
|
};
|
|
28
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
32
|
+
//# sourceMappingURL=data:application/json;base64,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
|
package/VNet/Firewall.d.ts
CHANGED
|
@@ -1,27 +1,34 @@
|
|
|
1
|
-
import * as network from
|
|
2
|
-
import * as pulumi from
|
|
3
|
-
import { BasicMonitorArgs, BasicResourceArgs, DefaultResourceArgs } from
|
|
4
|
-
import { FirewallPolicyProps } from
|
|
1
|
+
import * as network from "@pulumi/azure-native/network";
|
|
2
|
+
import * as pulumi from "@pulumi/pulumi";
|
|
3
|
+
import { BasicMonitorArgs, BasicResourceArgs, DefaultResourceArgs } from "../types";
|
|
4
|
+
import { FirewallPolicyProps } from "./types";
|
|
5
|
+
import { Input } from "@pulumi/pulumi";
|
|
5
6
|
export interface FwOutboundConfig {
|
|
6
|
-
name?: string;
|
|
7
7
|
subnetId: pulumi.Input<string>;
|
|
8
|
-
publicIpAddress
|
|
8
|
+
publicIpAddress?: network.PublicIPAddress;
|
|
9
9
|
}
|
|
10
10
|
export type FirewallSkus = {
|
|
11
11
|
name: network.AzureFirewallSkuName;
|
|
12
12
|
tier: network.AzureFirewallSkuTier;
|
|
13
13
|
};
|
|
14
|
-
interface
|
|
14
|
+
export interface FirewallProps extends BasicResourceArgs, Omit<DefaultResourceArgs, "monitoring"> {
|
|
15
|
+
/** The public outbound IP address ignores this property if want to enable the Force Tunneling mode */
|
|
15
16
|
outbound: Array<FwOutboundConfig>;
|
|
16
|
-
/** This must be provided if sku is Basic */
|
|
17
|
+
/** This must be provided if sku is Basic or want to enable the Force Tunneling mode */
|
|
17
18
|
management?: FwOutboundConfig;
|
|
19
|
+
snat?: {
|
|
20
|
+
privateRanges?: Input<string>;
|
|
21
|
+
autoLearnPrivateRanges?: boolean;
|
|
22
|
+
routeServerId?: Input<string>;
|
|
23
|
+
};
|
|
18
24
|
policy: FirewallPolicyProps;
|
|
19
25
|
enableDnsProxy?: boolean;
|
|
20
26
|
sku?: FirewallSkus;
|
|
21
|
-
monitorConfig?: BasicMonitorArgs
|
|
27
|
+
monitorConfig?: Omit<BasicMonitorArgs, "dependsOn">;
|
|
22
28
|
}
|
|
23
|
-
|
|
24
|
-
firewall:
|
|
25
|
-
policy:
|
|
29
|
+
export type FirewallResult = {
|
|
30
|
+
firewall: network.AzureFirewall;
|
|
31
|
+
policy: network.FirewallPolicy | undefined;
|
|
26
32
|
};
|
|
33
|
+
declare const _default: ({ name, group, snat, policy, outbound, management, monitorConfig, enableDnsProxy, sku, ...others }: FirewallProps) => FirewallResult;
|
|
27
34
|
export default _default;
|
package/VNet/Firewall.js
CHANGED
|
@@ -5,77 +5,96 @@ const AzureEnv_1 = require("../Common/AzureEnv");
|
|
|
5
5
|
const Naming_1 = require("../Common/Naming");
|
|
6
6
|
const ResourceCreator_1 = require("../Core/ResourceCreator");
|
|
7
7
|
const FirewallPolicy_1 = require("./FirewallPolicy");
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
policy, outbound, management, monitorConfig, enableDnsProxy, sku = {
|
|
8
|
+
const IpAddress_1 = require("./IpAddress");
|
|
9
|
+
const StackEnv_1 = require("../Common/StackEnv");
|
|
10
|
+
exports.default = ({ name, group, snat, policy, outbound, management, monitorConfig, enableDnsProxy, sku = {
|
|
11
11
|
name: network.AzureFirewallSkuName.AZFW_VNet,
|
|
12
12
|
tier: network.AzureFirewallSkuTier.Basic,
|
|
13
13
|
}, ...others }) => {
|
|
14
|
-
|
|
15
|
-
|
|
14
|
+
// Validation
|
|
15
|
+
if (!StackEnv_1.isDryRun) {
|
|
16
|
+
if (!outbound && !management)
|
|
17
|
+
throw new Error("Management Public Ip Address is required for the Force Tunneling mode.");
|
|
18
|
+
if (sku.tier === network.AzureFirewallSkuTier.Basic && !management)
|
|
19
|
+
throw new Error("Management Subnet is required for Firewall Basic tier.");
|
|
16
20
|
}
|
|
17
21
|
const fwName = (0, Naming_1.getFirewallName)(name);
|
|
18
|
-
//
|
|
19
|
-
|
|
20
|
-
|
|
21
|
-
|
|
22
|
-
|
|
22
|
+
//Create Public IpAddress for Management
|
|
23
|
+
const manageIpAddress = management
|
|
24
|
+
? management.publicIpAddress ??
|
|
25
|
+
(0, IpAddress_1.default)({
|
|
26
|
+
name: `${name}-mag`,
|
|
27
|
+
group,
|
|
28
|
+
lock: false,
|
|
29
|
+
})
|
|
30
|
+
: undefined;
|
|
31
|
+
const additionalProperties = {};
|
|
32
|
+
if (enableDnsProxy && sku.tier !== network.AzureFirewallSkuTier.Basic) {
|
|
33
|
+
additionalProperties["Network.DNS.EnableProxy"] = "Enabled";
|
|
34
|
+
}
|
|
35
|
+
if (snat) {
|
|
36
|
+
if (snat.privateRanges)
|
|
37
|
+
additionalProperties.privateRanges = snat.privateRanges;
|
|
38
|
+
if (snat.autoLearnPrivateRanges)
|
|
39
|
+
additionalProperties.autoLearnPrivateRanges = "Enabled";
|
|
40
|
+
if (snat.routeServerId)
|
|
41
|
+
additionalProperties["Network.RouteServerInfo.RouteServerID"] =
|
|
42
|
+
snat.routeServerId;
|
|
43
|
+
}
|
|
44
|
+
const fwPolicy = policy
|
|
23
45
|
? (0, FirewallPolicy_1.default)({
|
|
24
46
|
name,
|
|
25
47
|
group,
|
|
26
48
|
basePolicyId: policy.parentPolicyId,
|
|
27
49
|
sku: sku.tier,
|
|
28
|
-
dnsSettings:
|
|
50
|
+
dnsSettings: sku?.tier !== "Basic"
|
|
51
|
+
? {
|
|
52
|
+
enableProxy: true,
|
|
53
|
+
}
|
|
54
|
+
: undefined,
|
|
29
55
|
})
|
|
30
56
|
: undefined;
|
|
31
|
-
const dependsOn = new Array();
|
|
32
|
-
outbound.forEach((o) => dependsOn.push(o.publicIpAddress));
|
|
33
|
-
if (management)
|
|
34
|
-
dependsOn.push(management.publicIpAddress);
|
|
35
57
|
const { resource } = (0, ResourceCreator_1.default)(network.AzureFirewall, {
|
|
36
58
|
azureFirewallName: fwName,
|
|
37
59
|
...group,
|
|
38
|
-
//...rules,
|
|
39
|
-
firewallPolicy: fwPolicy ? { id: fwPolicy.id } : undefined,
|
|
40
|
-
zones: AzureEnv_1.isPrd ? ['1', '2', '3'] : undefined,
|
|
41
|
-
threatIntelMode: network.AzureFirewallThreatIntelMode.Deny,
|
|
42
60
|
sku,
|
|
43
|
-
|
|
61
|
+
firewallPolicy: fwPolicy ? { id: fwPolicy.id } : undefined,
|
|
62
|
+
zones: AzureEnv_1.isPrd ? ["1", "2", "3"] : undefined,
|
|
63
|
+
threatIntelMode: sku.tier !== network.AzureFirewallSkuTier.Basic && sku.name !== "AZFW_Hub"
|
|
64
|
+
? network.AzureFirewallThreatIntelMode.Deny
|
|
65
|
+
: undefined,
|
|
66
|
+
managementIpConfiguration: management && manageIpAddress
|
|
44
67
|
? {
|
|
45
|
-
name: management
|
|
46
|
-
publicIPAddress: { id:
|
|
68
|
+
name: "management",
|
|
69
|
+
publicIPAddress: { id: manageIpAddress.id },
|
|
47
70
|
subnet: { id: management.subnetId },
|
|
48
71
|
}
|
|
49
72
|
: undefined,
|
|
50
|
-
ipConfigurations: outbound
|
|
51
|
-
|
|
52
|
-
|
|
53
|
-
|
|
54
|
-
|
|
55
|
-
|
|
56
|
-
|
|
57
|
-
|
|
58
|
-
? {
|
|
59
|
-
'Network.DNS.EnableProxy': 'true',
|
|
60
|
-
}
|
|
73
|
+
ipConfigurations: outbound
|
|
74
|
+
? outbound.map((o, i) => ({
|
|
75
|
+
name: `outbound-${i}`,
|
|
76
|
+
publicIPAddress: o.publicIpAddress
|
|
77
|
+
? { id: o.publicIpAddress.id }
|
|
78
|
+
: undefined,
|
|
79
|
+
subnet: { id: o.subnetId },
|
|
80
|
+
}))
|
|
61
81
|
: undefined,
|
|
82
|
+
additionalProperties,
|
|
62
83
|
monitoring: {
|
|
63
84
|
...monitorConfig,
|
|
64
85
|
logsCategories: [
|
|
65
|
-
|
|
66
|
-
|
|
67
|
-
|
|
86
|
+
"AzureFirewallApplicationRule",
|
|
87
|
+
"AzureFirewallNetworkRule",
|
|
88
|
+
"AzureFirewallDnsProxy",
|
|
68
89
|
],
|
|
69
90
|
},
|
|
70
91
|
...others,
|
|
71
|
-
dependsOn,
|
|
72
92
|
});
|
|
73
93
|
//Link Rule to Policy
|
|
74
94
|
if (fwPolicy && policy?.rules) {
|
|
75
95
|
(0, FirewallPolicy_1.linkRulesToPolicy)({
|
|
76
|
-
name: `${name}-policies`,
|
|
77
96
|
group,
|
|
78
|
-
priority:
|
|
97
|
+
//priority: 201,
|
|
79
98
|
firewallPolicyName: fwPolicy.name,
|
|
80
99
|
rules: policy.rules,
|
|
81
100
|
dependsOn: [fwPolicy, resource],
|
|
@@ -83,4 +102,4 @@ policy, outbound, management, monitorConfig, enableDnsProxy, sku = {
|
|
|
83
102
|
}
|
|
84
103
|
return { firewall: resource, policy: fwPolicy };
|
|
85
104
|
};
|
|
86
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
105
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1,20 +1,20 @@
|
|
|
1
|
-
import { Input } from
|
|
2
|
-
import {
|
|
3
|
-
interface
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
|
|
7
|
-
privateCluster?: boolean;
|
|
8
|
-
/** Allows access to Docker and Kubenetes registries */
|
|
1
|
+
import { Input } from "@pulumi/pulumi";
|
|
2
|
+
import { FirewallPolicyRuleCollectionResults } from "../types";
|
|
3
|
+
interface AzureFirewallPolicyProps {
|
|
4
|
+
priority: number;
|
|
5
|
+
subnetSpaces: Array<Input<string>>;
|
|
6
|
+
/** Allows access to Docker and Kubernetes registries */
|
|
9
7
|
allowAccessPublicRegistries?: boolean;
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
|
|
14
|
-
|
|
8
|
+
dNATs?: [
|
|
9
|
+
{
|
|
10
|
+
name: string;
|
|
11
|
+
allowHttp?: boolean;
|
|
12
|
+
publicIpAddresses: Input<string>[];
|
|
13
|
+
/** Default value is '*' and it will allows all incoming requests */
|
|
14
|
+
sourceIpAddress?: Input<string>;
|
|
15
15
|
internalIpAddress: Input<string>;
|
|
16
|
-
}
|
|
17
|
-
|
|
16
|
+
}
|
|
17
|
+
];
|
|
18
18
|
}
|
|
19
|
-
declare const _default: ({
|
|
19
|
+
declare const _default: ({ priority, allowAccessPublicRegistries, subnetSpaces, dNATs, }: AzureFirewallPolicyProps) => FirewallPolicyRuleCollectionResults;
|
|
20
20
|
export default _default;
|