@drunk-pulumi/azure 0.0.37 → 0.0.38

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (176) hide show
  1. package/Aks/Helper.d.ts +6 -11
  2. package/Aks/Helper.js +40 -65
  3. package/Aks/Identity.d.ts +3 -10
  4. package/Aks/Identity.js +9 -8
  5. package/Aks/index.d.ts +67 -71
  6. package/Aks/index.js +198 -314
  7. package/Apim/ApiProduct/PolicyBuilder.js +25 -27
  8. package/Apim/ApiProduct/SwaggerHelper.js +1 -3
  9. package/Apim/ApiProduct/index.d.ts +3 -3
  10. package/Apim/ApiProduct/index.js +1 -2
  11. package/Automation/index.d.ts +7 -0
  12. package/Automation/index.js +55 -0
  13. package/AzAd/EnvRoles.Consts.d.ts +12 -0
  14. package/AzAd/EnvRoles.Consts.js +125 -0
  15. package/AzAd/EnvRoles.d.ts +16 -15
  16. package/AzAd/EnvRoles.js +69 -47
  17. package/AzAd/GraphDefinition.d.ts +2 -2
  18. package/AzAd/GraphDefinition.js +3055 -3056
  19. package/AzAd/Helper.d.ts +24 -13
  20. package/AzAd/Helper.js +98 -25
  21. package/AzAd/Identities/AzDevOpsIdentity.d.ts +12 -0
  22. package/AzAd/Identities/AzDevOpsIdentity.js +32 -0
  23. package/AzAd/Identities/AzDevOpsManagedIdentity.d.ts +7 -0
  24. package/AzAd/Identities/AzDevOpsManagedIdentity.js +15 -0
  25. package/AzAd/Identities/AzUserAdRevertSync.d.ts +2 -9
  26. package/AzAd/Identities/AzUserAdRevertSync.js +4 -5
  27. package/AzAd/Identities/index.d.ts +3 -0
  28. package/AzAd/Identities/index.js +10 -0
  29. package/AzAd/Identity.d.ts +10 -22
  30. package/AzAd/Identity.js +50 -61
  31. package/AzAd/Role.d.ts +2 -3
  32. package/AzAd/Role.js +4 -5
  33. package/AzAd/RoleAssignment.d.ts +34 -5
  34. package/AzAd/RoleAssignment.js +2 -2
  35. package/AzAd/RoleDefinitions/JustInTimeRequestRole.d.ts +2 -0
  36. package/AzAd/RoleDefinitions/JustInTimeRequestRole.js +25 -0
  37. package/AzAd/RolesBuiltIn.d.ts +29 -0
  38. package/AzAd/RolesBuiltIn.js +13034 -8058
  39. package/AzAd/UserAssignedIdentity.d.ts +6 -0
  40. package/AzAd/UserAssignedIdentity.js +27 -0
  41. package/Builder/AksBuilder.d.ts +3 -0
  42. package/Builder/AksBuilder.js +95 -0
  43. package/Builder/VnetBuilder.d.ts +3 -0
  44. package/Builder/VnetBuilder.js +279 -0
  45. package/Builder/index.d.ts +2 -0
  46. package/Builder/index.js +8 -0
  47. package/Builder/types.d.ts +120 -0
  48. package/Builder/types.js +18 -0
  49. package/Certificate/index.d.ts +1 -1
  50. package/Certificate/index.js +26 -28
  51. package/Common/AutoTags.js +2 -2
  52. package/Common/AzureEnv.d.ts +4 -3
  53. package/Common/AzureEnv.js +31 -24
  54. package/Common/GlobalEnv.d.ts +1 -2
  55. package/Common/GlobalEnv.js +7 -7
  56. package/Common/Location.d.ts +3 -3
  57. package/Common/Location.js +22 -9
  58. package/Common/LocationBuiltIn.d.ts +6 -81
  59. package/Common/LocationBuiltIn.js +491 -1923
  60. package/Common/Naming/index.d.ts +6 -4
  61. package/Common/Naming/index.js +64 -60
  62. package/Common/ResourceEnv.d.ts +2 -2
  63. package/Common/ResourceEnv.js +11 -10
  64. package/Common/StackEnv.js +2 -9
  65. package/Core/KeyGenetators.d.ts +16 -20
  66. package/Core/KeyGenetators.js +17 -16
  67. package/Core/Random.d.ts +4 -4
  68. package/Core/Random.js +10 -10
  69. package/Core/ResourceGroup.d.ts +12 -6
  70. package/Core/ResourceGroup.js +12 -24
  71. package/IOT/Hub/index.d.ts +4 -8
  72. package/IOT/Hub/index.js +19 -54
  73. package/KeyVault/Helper.d.ts +8 -6
  74. package/KeyVault/Helper.js +13 -19
  75. package/KeyVault/index.d.ts +1 -3
  76. package/KeyVault/index.js +2 -26
  77. package/Logs/Helpers.d.ts +35 -25
  78. package/Logs/Helpers.js +33 -20
  79. package/Logs/LogAnalytics.d.ts +2 -2
  80. package/Logs/LogAnalytics.js +15 -6
  81. package/Logs/index.d.ts +3 -3
  82. package/Logs/index.js +4 -4
  83. package/MySql/index.d.ts +2 -3
  84. package/MySql/index.js +16 -19
  85. package/{ReadMe.md → README.md} +6 -1
  86. package/Sql/index.d.ts +15 -9
  87. package/Sql/index.js +39 -41
  88. package/Storage/CdnEndpoint.d.ts +2 -2
  89. package/Storage/CdnEndpoint.js +14 -15
  90. package/Storage/Helper.d.ts +2 -2
  91. package/Storage/Helper.js +6 -6
  92. package/Storage/ManagementRules.d.ts +5 -23
  93. package/Storage/ManagementRules.js +3 -3
  94. package/Storage/index.d.ts +3 -3
  95. package/Storage/index.js +28 -28
  96. package/VM/AzureDevOpsExtension.d.ts +16 -0
  97. package/VM/AzureDevOpsExtension.js +14 -0
  98. package/VM/Extension.d.ts +15 -0
  99. package/VM/Extension.js +13 -0
  100. package/VM/GlobalSchedule.d.ts +10 -0
  101. package/VM/GlobalSchedule.js +20 -0
  102. package/VM/index.d.ts +18 -18
  103. package/VM/index.js +94 -57
  104. package/VNet/Bastion.d.ts +4 -4
  105. package/VNet/Bastion.js +12 -8
  106. package/VNet/Firewall.d.ts +19 -12
  107. package/VNet/Firewall.js +59 -40
  108. package/VNet/FirewallPolicies/AksFirewallPolicy.d.ts +16 -16
  109. package/VNet/FirewallPolicies/AksFirewallPolicy.js +193 -220
  110. package/VNet/FirewallPolicies/CloudPCFirewallPolicy.d.ts +12 -10
  111. package/VNet/FirewallPolicies/CloudPCFirewallPolicy.js +170 -282
  112. package/VNet/FirewallPolicies/DefaultFirewallPolicy.d.ts +3 -0
  113. package/VNet/FirewallPolicies/DefaultFirewallPolicy.js +25 -0
  114. package/VNet/FirewallPolicies/index.d.ts +4 -0
  115. package/VNet/FirewallPolicies/index.js +10 -0
  116. package/VNet/FirewallPolicy.d.ts +14 -11
  117. package/VNet/FirewallPolicy.js +67 -74
  118. package/VNet/FirewallRules/AksFirewallRules.d.ts +4 -3
  119. package/VNet/FirewallRules/AksFirewallRules.js +101 -100
  120. package/VNet/Helper.d.ts +8 -4
  121. package/VNet/Helper.js +42 -35
  122. package/VNet/IpAddress.d.ts +6 -8
  123. package/VNet/IpAddress.js +6 -11
  124. package/VNet/IpAddressPrefix.d.ts +12 -9
  125. package/VNet/IpAddressPrefix.js +14 -13
  126. package/VNet/NSGRules/AppGatewaySecurityRule.d.ts +9 -0
  127. package/VNet/NSGRules/AppGatewaySecurityRule.js +46 -0
  128. package/VNet/NSGRules/AzADSecurityRule.d.ts +6 -0
  129. package/VNet/NSGRules/AzADSecurityRule.js +39 -0
  130. package/VNet/NSGRules/BastionSecurityRule.d.ts +9 -0
  131. package/VNet/NSGRules/BastionSecurityRule.js +93 -0
  132. package/VNet/NatGateway.d.ts +10 -0
  133. package/VNet/NatGateway.js +21 -0
  134. package/VNet/NetworkPeering.d.ts +7 -7
  135. package/VNet/NetworkPeering.js +29 -20
  136. package/VNet/PrivateDns.d.ts +8 -10
  137. package/VNet/PrivateDns.js +12 -14
  138. package/VNet/PrivateEndpoint.js +5 -2
  139. package/VNet/RouteTable.d.ts +7 -8
  140. package/VNet/RouteTable.js +6 -6
  141. package/VNet/SecurityGroup.d.ts +4 -4
  142. package/VNet/SecurityGroup.js +7 -3
  143. package/VNet/Subnet.d.ts +10 -7
  144. package/VNet/Subnet.js +4 -3
  145. package/VNet/VPNGateway.d.ts +13 -0
  146. package/VNet/VPNGateway.js +73 -0
  147. package/VNet/VirtualWAN.d.ts +7 -10
  148. package/VNet/VirtualWAN.js +1 -1
  149. package/VNet/Vnet.d.ts +29 -23
  150. package/VNet/Vnet.js +58 -121
  151. package/VNet/index.d.ts +17 -18
  152. package/VNet/index.js +41 -54
  153. package/VNet/types.d.ts +94 -0
  154. package/VNet/types.js +3 -0
  155. package/Web/types.d.ts +2 -134
  156. package/package.json +8 -8
  157. package/types.d.ts +22 -8
  158. package/z_tests/_tools/Mocks.js +12 -13
  159. package/Automation/AutoAccount.d.ts +0 -5
  160. package/Automation/AutoAccount.js +0 -18
  161. package/AzAd/Identities/AzDevOps.d.ts +0 -23
  162. package/AzAd/Identities/AzDevOps.js +0 -61
  163. package/AzAd/KeyVaultRoles.d.ts +0 -8
  164. package/AzAd/KeyVaultRoles.js +0 -53
  165. package/AzAd/ManagedIdentity.d.ts +0 -6
  166. package/AzAd/ManagedIdentity.js +0 -20
  167. package/AzAd/UserIdentity.d.ts +0 -5
  168. package/AzAd/UserIdentity.js +0 -12
  169. package/Common/Naming/AzureRegions.d.ts +0 -4
  170. package/Common/Naming/AzureRegions.js +0 -49
  171. package/KeyVault/VaultPermissions.d.ts +0 -27
  172. package/KeyVault/VaultPermissions.js +0 -226
  173. package/VNet/FirewallRules/types.d.ts +0 -20
  174. package/VNet/FirewallRules/types.js +0 -5
  175. package/VNet/NSGRules/AzADService.d.ts +0 -10
  176. package/VNet/NSGRules/AzADService.js +0 -45
package/Aks/Helper.d.ts CHANGED
@@ -1,4 +1,5 @@
1
- import { KeyVaultInfo } from '../types';
1
+ import { KeyVaultInfo, ResourceInfo, ResourceType } from "../types";
2
+ import { Output } from "@pulumi/pulumi";
2
3
  /** Get AKS Config from Managed Cluster*/
3
4
  export declare const getAksConfig: ({ name, groupName, formattedName, localAccountDisabled, }: {
4
5
  name: string;
@@ -13,13 +14,7 @@ export declare const getAksVaultConfig: ({ name, version, vaultInfo, formattedNa
13
14
  vaultInfo: KeyVaultInfo;
14
15
  formattedName?: boolean;
15
16
  }) => Promise<string>;
16
- export declare const getAksIdentitySecrets: ({ name, vaultInfo, }: {
17
- name: string;
18
- vaultInfo: KeyVaultInfo;
19
- }) => Promise<{
20
- clientId: import("@azure/keyvault-secrets").KeyVaultSecret | undefined;
21
- clientSecret: import("@azure/keyvault-secrets").KeyVaultSecret | undefined;
22
- principalId: import("@azure/keyvault-secrets").KeyVaultSecret | undefined;
23
- principalSecret: import("@azure/keyvault-secrets").KeyVaultSecret | undefined;
24
- }>;
25
- /** Get AKS Provider from Key Vault*/
17
+ export declare const getAksPrivateDnz: ({ name, groupName, formattedName, }: ResourceType) => Output<ResourceInfo | undefined>;
18
+ export declare const linkAksPrivateDnzVnet: ({ vnetId, name, groupName, formattedName, }: ResourceType & {
19
+ vnetId: Output<string>;
20
+ }) => Output<import("@pulumi/azure-native/network/virtualNetworkLink").VirtualNetworkLink | undefined>;
package/Aks/Helper.js CHANGED
@@ -1,10 +1,12 @@
1
1
  "use strict";
2
2
  Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.getAksIdentitySecrets = exports.getAksVaultConfig = exports.getAksConfig = void 0;
3
+ exports.linkAksPrivateDnzVnet = exports.getAksPrivateDnz = exports.getAksVaultConfig = exports.getAksConfig = void 0;
4
4
  const containerservice = require("@pulumi/azure-native/containerservice");
5
5
  const Naming_1 = require("../Common/Naming");
6
6
  const Helper_1 = require("../KeyVault/Helper");
7
- const Helper_2 = require("../AzAd/Helper");
7
+ const pulumi_1 = require("@pulumi/pulumi");
8
+ const AzureEnv_1 = require("../Common/AzureEnv");
9
+ const PrivateDns_1 = require("../VNet/PrivateDns");
8
10
  /** Get AKS Config from Managed Cluster*/
9
11
  const getAksConfig = async ({ name, groupName, formattedName, localAccountDisabled, }) => {
10
12
  const aksName = formattedName ? name : (0, Naming_1.getAksName)(name);
@@ -18,7 +20,7 @@ const getAksConfig = async ({ name, groupName, formattedName, localAccountDisabl
18
20
  resourceName: aksName,
19
21
  resourceGroupName: group,
20
22
  });
21
- return Buffer.from(aks.kubeconfigs[0].value, 'base64').toString('utf8');
23
+ return Buffer.from(aks.kubeconfigs[0].value, "base64").toString("utf8");
22
24
  };
23
25
  exports.getAksConfig = getAksConfig;
24
26
  /** Get AKS Config from Key Vault*/
@@ -30,68 +32,41 @@ const getAksVaultConfig = async ({ name, version, vaultInfo, formattedName, }) =
30
32
  vaultInfo,
31
33
  nameFormatted: false,
32
34
  });
33
- return rs?.value || '';
35
+ return rs?.value || "";
34
36
  };
35
37
  exports.getAksVaultConfig = getAksVaultConfig;
36
- const getAksIdentitySecrets = ({ name, vaultInfo, }) => {
37
- name = (0, Naming_1.getAksName)(name);
38
- return (0, Helper_2.getIdentitySecrets)({ name, vaultInfo });
38
+ const getAksPrivateDnz = ({ name, groupName, formattedName, }) => {
39
+ name = formattedName ? name : (0, Naming_1.getAksName)(name);
40
+ groupName = formattedName ? groupName : (0, Naming_1.getResourceGroupName)(groupName);
41
+ const aks = containerservice.getManagedClusterOutput({
42
+ resourceName: name,
43
+ resourceGroupName: groupName,
44
+ });
45
+ return aks.apply((a) => {
46
+ if (!a.privateFQDN)
47
+ return undefined;
48
+ const dnsName = a.privateFQDN.split(":").slice(1).join(".");
49
+ const rsGroup = a.nodeResourceGroup;
50
+ return {
51
+ resourceName: dnsName,
52
+ group: { resourceGroupName: rsGroup, location: AzureEnv_1.currentRegionName },
53
+ id: (0, pulumi_1.interpolate) `/subscriptions/${AzureEnv_1.subscriptionId}/resourceGroups/${rsGroup}/providers/Microsoft.Network/privateDnsZones/${dnsName}`,
54
+ };
55
+ });
56
+ };
57
+ exports.getAksPrivateDnz = getAksPrivateDnz;
58
+ const linkAksPrivateDnzVnet = ({ vnetId, name, groupName, formattedName, }) => {
59
+ const dns = (0, exports.getAksPrivateDnz)({ name, groupName, formattedName });
60
+ return dns.apply((d) => {
61
+ if (!d)
62
+ return;
63
+ return (0, PrivateDns_1.linkVnetToPrivateDns)({
64
+ name,
65
+ group: d.group,
66
+ zoneName: d.resourceName,
67
+ vnetId,
68
+ });
69
+ });
39
70
  };
40
- exports.getAksIdentitySecrets = getAksIdentitySecrets;
41
- // interface AksProps {
42
- // aksName: string;
43
- // formatedName?: boolean;
44
- // namespace?: string;
45
- // groupName: string;
46
- // localAccountDisabled?: boolean;
47
- // }
48
- // /** Get AKS Provider from Managed Cluster*/
49
- // export const createAksProvider = async ({
50
- // aksName,
51
- // namespace,
52
- // groupName,
53
- // formatedName,
54
- // localAccountDisabled,
55
- // }: AksProps) => {
56
- // return createProvider({
57
- // name: aksName,
58
- // namespace,
59
- // kubeconfig: await getAksConfig({
60
- // name: aksName,
61
- // groupName,
62
- // formattedName: formatedName,
63
- // localAccountDisabled,
64
- // }),
65
- // });
66
- // };
67
- /** Get AKS Provider from Key Vault*/
68
- // export const createAksVaultProvider = async ({
69
- // aksName,
70
- // version,
71
- // secretName,
72
- // namespace,
73
- // base64Encoded,
74
- // vaultInfo,
75
- // }: {
76
- // aksName: string;
77
- // secretName?: string;
78
- // version?: string;
79
- // vaultInfo: KeyVaultInfo;
80
- // base64Encoded?: boolean;
81
- // namespace?: string;
82
- // }) => {
83
- // const value = await getAksVaultConfig({
84
- // name: secretName ?? aksName,
85
- // version,
86
- // formattedName: Boolean(secretName),
87
- // vaultInfo,
88
- // });
89
- //
90
- // return createProvider({
91
- // name: aksName,
92
- // namespace,
93
- // ignoreChanges: true,
94
- // kubeconfig: base64Encoded ? Buffer.from(value, 'base64').toString() : value,
95
- // });
96
- // };
97
- //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiSGVscGVyLmpzIiwic291cmNlUm9vdCI6IiIsInNvdXJjZXMiOlsiLi4vLi4vc3JjL0Frcy9IZWxwZXIudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6Ijs7O0FBQUEsMEVBQTBFO0FBQzFFLDZDQUFvRTtBQUVwRSwrQ0FBK0M7QUFDL0MsMkNBQW9EO0FBRXBELHlDQUF5QztBQUNsQyxNQUFNLFlBQVksR0FBRyxLQUFLLEVBQUUsRUFDakMsSUFBSSxFQUNKLFNBQVMsRUFDVCxhQUFhLEVBQ2Isb0JBQW9CLEdBTXJCLEVBQW1CLEVBQUU7SUFDcEIsTUFBTSxPQUFPLEdBQUcsYUFBYSxDQUFDLENBQUMsQ0FBQyxJQUFJLENBQUMsQ0FBQyxDQUFDLElBQUEsbUJBQVUsRUFBQyxJQUFJLENBQUMsQ0FBQztJQUN4RCxNQUFNLEtBQUssR0FBRyxhQUFhLENBQUMsQ0FBQyxDQUFDLFNBQVMsQ0FBQyxDQUFDLENBQUMsSUFBQSw2QkFBb0IsRUFBQyxTQUFTLENBQUMsQ0FBQztJQUUxRSxNQUFNLEdBQUcsR0FBRyxvQkFBb0I7UUFDOUIsQ0FBQyxDQUFDLE1BQU0sZ0JBQWdCLENBQUMsaUNBQWlDLENBQUM7WUFDdkQsWUFBWSxFQUFFLE9BQU87WUFDckIsaUJBQWlCLEVBQUUsS0FBSztTQUN6QixDQUFDO1FBQ0osQ0FBQyxDQUFDLE1BQU0sZ0JBQWdCLENBQUMsa0NBQWtDLENBQUM7WUFDeEQsWUFBWSxFQUFFLE9BQU87WUFDckIsaUJBQWlCLEVBQUUsS0FBSztTQUN6QixDQUFDLENBQUM7SUFFUCxPQUFPLE1BQU0sQ0FBQyxJQUFJLENBQUMsR0FBRyxDQUFDLFdBQVcsQ0FBQyxDQUFDLENBQUMsQ0FBQyxLQUFLLEVBQUUsUUFBUSxDQUFDLENBQUMsUUFBUSxDQUFDLE1BQU0sQ0FBQyxDQUFDO0FBQzFFLENBQUMsQ0FBQztBQXpCVyxRQUFBLFlBQVksZ0JBeUJ2QjtBQUVGLG1DQUFtQztBQUM1QixNQUFNLGlCQUFpQixHQUFHLEtBQUssRUFBRSxFQUN0QyxJQUFJLEVBQ0osT0FBTyxFQUNQLFNBQVMsRUFDVCxhQUFhLEdBTWQsRUFBbUIsRUFBRTtJQUNwQixNQUFNLE9BQU8sR0FBRyxhQUFhLENBQUMsQ0FBQyxDQUFDLElBQUksQ0FBQyxDQUFDLENBQUMsSUFBQSxtQkFBVSxFQUFDLElBQUksQ0FBQyxDQUFDO0lBQ3hELE1BQU0sRUFBRSxHQUFHLE1BQU0sSUFBQSxrQkFBUyxFQUFDO1FBQ3pCLElBQUksRUFBRSxHQUFHLE9BQU8sU0FBUztRQUN6QixPQUFPO1FBQ1AsU0FBUztRQUNULGFBQWEsRUFBRSxLQUFLO0tBQ3JCLENBQUMsQ0FBQztJQUNILE9BQU8sRUFBRSxFQUFFLEtBQUssSUFBSSxFQUFFLENBQUM7QUFDekIsQ0FBQyxDQUFDO0FBbkJXLFFBQUEsaUJBQWlCLHFCQW1CNUI7QUFFSyxNQUFNLHFCQUFxQixHQUFHLENBQUMsRUFDcEMsSUFBSSxFQUNKLFNBQVMsR0FJVixFQUFFLEVBQUU7SUFDSCxJQUFJLEdBQUcsSUFBQSxtQkFBVSxFQUFDLElBQUksQ0FBQyxDQUFDO0lBQ3hCLE9BQU8sSUFBQSwyQkFBa0IsRUFBQyxFQUFFLElBQUksRUFBRSxTQUFTLEVBQUUsQ0FBQyxDQUFDO0FBQ2pELENBQUMsQ0FBQztBQVRXLFFBQUEscUJBQXFCLHlCQVNoQztBQUVGLHVCQUF1QjtBQUN2QixxQkFBcUI7QUFDckIsNEJBQTRCO0FBQzVCLHdCQUF3QjtBQUN4Qix1QkFBdUI7QUFDdkIsb0NBQW9DO0FBQ3BDLElBQUk7QUFFSiw4Q0FBOEM7QUFDOUMsNENBQTRDO0FBQzVDLGFBQWE7QUFDYixlQUFlO0FBQ2YsZUFBZTtBQUNmLGtCQUFrQjtBQUNsQiwwQkFBMEI7QUFDMUIsb0JBQW9CO0FBQ3BCLDRCQUE0QjtBQUM1QixxQkFBcUI7QUFDckIsaUJBQWlCO0FBQ2pCLHVDQUF1QztBQUN2Qyx1QkFBdUI7QUFDdkIsbUJBQW1CO0FBQ25CLHFDQUFxQztBQUNyQyw4QkFBOEI7QUFDOUIsVUFBVTtBQUNWLFFBQVE7QUFDUixLQUFLO0FBRUwscUNBQXFDO0FBQ3JDLGlEQUFpRDtBQUNqRCxhQUFhO0FBQ2IsYUFBYTtBQUNiLGdCQUFnQjtBQUNoQixlQUFlO0FBQ2YsbUJBQW1CO0FBQ25CLGVBQWU7QUFDZixPQUFPO0FBQ1AscUJBQXFCO0FBQ3JCLHlCQUF5QjtBQUN6QixzQkFBc0I7QUFDdEIsNkJBQTZCO0FBQzdCLDZCQUE2QjtBQUM3Qix3QkFBd0I7QUFDeEIsVUFBVTtBQUNWLDRDQUE0QztBQUM1QyxtQ0FBbUM7QUFDbkMsZUFBZTtBQUNmLDBDQUEwQztBQUMxQyxpQkFBaUI7QUFDakIsUUFBUTtBQUNSLEVBQUU7QUFDRiw0QkFBNEI7QUFDNUIscUJBQXFCO0FBQ3JCLGlCQUFpQjtBQUNqQiwyQkFBMkI7QUFDM0IsbUZBQW1GO0FBQ25GLFFBQVE7QUFDUixLQUFLIn0=
71
+ exports.linkAksPrivateDnzVnet = linkAksPrivateDnzVnet;
72
+ //# sourceMappingURL=data:application/json;base64,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
package/Aks/Identity.d.ts CHANGED
@@ -1,14 +1,7 @@
1
- import { KeyVaultInfo } from '../types';
2
- interface Props {
1
+ import { BasicArgs, KeyVaultInfo } from "../types";
2
+ interface Props extends BasicArgs {
3
3
  name: string;
4
4
  vaultInfo: KeyVaultInfo;
5
5
  }
6
- declare const _default: ({ name, vaultInfo }: Props) => import("../AzAd/Identity").IdentityResult & {
7
- vaultNames: {
8
- clientIdKeyName: string;
9
- clientSecretKeyName: string;
10
- principalIdKeyName: string;
11
- principalSecretKeyName: string;
12
- };
13
- };
6
+ declare const _default: ({ name, vaultInfo, dependsOn }: Props) => import("../AzAd/Identity").IdentityResult;
14
7
  export default _default;
package/Aks/Identity.js CHANGED
@@ -5,28 +5,29 @@ const Identity_1 = require("../AzAd/Identity");
5
5
  const RoleAssignment_1 = require("../AzAd/RoleAssignment");
6
6
  const AzureEnv_1 = require("../Common/AzureEnv");
7
7
  //** The AzAD app Identity for Azure Kubernetes for RBAC */
8
- exports.default = ({ name, vaultInfo }) => {
8
+ exports.default = ({ name, vaultInfo, dependsOn }) => {
9
9
  //AKS need this permission for AAD integration
10
- const graphAccess = (0, GraphDefinition_1.getGraphPermissions)({ name: 'User.Read', type: 'Scope' }, { name: 'Group.Read.All', type: 'Scope' },
10
+ const graphAccess = (0, GraphDefinition_1.getGraphPermissions)({ name: "User.Read", type: "Scope" }, { name: "Group.Read.All", type: "Scope" },
11
11
  //{ name: 'Directory.Read.All', type: 'Scope' },
12
- { name: 'Directory.Read.All', type: 'Role' });
12
+ { name: "Directory.Read.All", type: "Role" });
13
13
  const serverIdentity = (0, Identity_1.default)({
14
14
  name,
15
15
  createClientSecret: true,
16
16
  createPrincipal: true,
17
17
  requiredResourceAccesses: [graphAccess],
18
18
  publicClient: false,
19
- appType: 'api',
19
+ appType: "api",
20
20
  vaultInfo,
21
+ dependsOn,
21
22
  });
22
23
  (0, RoleAssignment_1.roleAssignment)({
23
24
  name: `${name}-aks-identity-acr-pull`,
24
25
  principalId: serverIdentity.principalId,
25
- principalType: 'ServicePrincipal',
26
- roleName: 'AcrPull',
26
+ principalType: "ServicePrincipal",
27
+ roleName: "AcrPull",
27
28
  scope: AzureEnv_1.defaultScope,
29
+ dependsOn: serverIdentity.resource,
28
30
  });
29
- serverIdentity.clientId.apply((i) => console.log(i));
30
31
  return serverIdentity;
31
32
  };
32
- //# sourceMappingURL=data:application/json;base64,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
33
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiSWRlbnRpdHkuanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi9zcmMvQWtzL0lkZW50aXR5LnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7O0FBQUEsNkRBQThEO0FBQzlELCtDQUErQztBQUUvQywyREFBd0Q7QUFDeEQsaURBQWtEO0FBT2xELDJEQUEyRDtBQUMzRCxrQkFBZSxDQUFDLEVBQUUsSUFBSSxFQUFFLFNBQVMsRUFBRSxTQUFTLEVBQVMsRUFBRSxFQUFFO0lBQ3ZELDhDQUE4QztJQUM5QyxNQUFNLFdBQVcsR0FBRyxJQUFBLHFDQUFtQixFQUNyQyxFQUFFLElBQUksRUFBRSxXQUFXLEVBQUUsSUFBSSxFQUFFLE9BQU8sRUFBRSxFQUNwQyxFQUFFLElBQUksRUFBRSxnQkFBZ0IsRUFBRSxJQUFJLEVBQUUsT0FBTyxFQUFFO0lBQ3pDLGdEQUFnRDtJQUNoRCxFQUFFLElBQUksRUFBRSxvQkFBb0IsRUFBRSxJQUFJLEVBQUUsTUFBTSxFQUFFLENBQzdDLENBQUM7SUFFRixNQUFNLGNBQWMsR0FBRyxJQUFBLGtCQUFlLEVBQUM7UUFDckMsSUFBSTtRQUNKLGtCQUFrQixFQUFFLElBQUk7UUFDeEIsZUFBZSxFQUFFLElBQUk7UUFDckIsd0JBQXdCLEVBQUUsQ0FBQyxXQUFXLENBQUM7UUFDdkMsWUFBWSxFQUFFLEtBQUs7UUFDbkIsT0FBTyxFQUFFLEtBQUs7UUFDZCxTQUFTO1FBQ1QsU0FBUztLQUNWLENBQUMsQ0FBQztJQUVILElBQUEsK0JBQWMsRUFBQztRQUNiLElBQUksRUFBRSxHQUFHLElBQUksd0JBQXdCO1FBQ3JDLFdBQVcsRUFBRSxjQUFjLENBQUMsV0FBWTtRQUN4QyxhQUFhLEVBQUUsa0JBQWtCO1FBQ2pDLFFBQVEsRUFBRSxTQUFTO1FBQ25CLEtBQUssRUFBRSx1QkFBWTtRQUNuQixTQUFTLEVBQUUsY0FBYyxDQUFDLFFBQVE7S0FDbkMsQ0FBQyxDQUFDO0lBRUgsT0FBTyxjQUFjLENBQUM7QUFDeEIsQ0FBQyxDQUFDIn0=
package/Aks/index.d.ts CHANGED
@@ -1,100 +1,96 @@
1
- import * as native from '@pulumi/azure-native';
2
- import * as pulumi from '@pulumi/pulumi';
3
- import { Input } from '@pulumi/pulumi';
4
- import { BasicMonitorArgs, BasicResourceArgs, KeyVaultInfo } from '../types';
5
- import { EnvRoleNamesType } from '../AzAd/EnvRoles';
6
- import * as inputs from '@pulumi/azure-native/types/input';
1
+ import * as native from "@pulumi/azure-native";
2
+ import * as pulumi from "@pulumi/pulumi";
3
+ import { Input, Output } from "@pulumi/pulumi";
4
+ import { BasicResourceArgs, KeyVaultInfo } from "../types";
5
+ import { EnvRolesResults } from "../AzAd/EnvRoles";
6
+ import * as inputs from "@pulumi/azure-native/types/input";
7
+ import { IdentityResult } from "../AzAd/Identity";
8
+ import { ManagedCluster } from "@pulumi/azure-native/containerservice";
7
9
  export declare enum VmSizes {
8
10
  /** 32G RAM - 4CPU - $221.92 */
9
- Standard_E4as_v4_221 = "Standard_E4as_v4",
11
+ Standard_E4as_v4 = "Standard_E4as_v4",
10
12
  /** 8G RAM - 2CPU - $77.38 */
11
- Standard_B2ms_77 = "Standard_B2ms",
13
+ Standard_B2ms = "Standard_B2ms",
12
14
  /** 16G RAM - 4CPU - $154.03 */
13
- Standard_B4ms_154 = "Standard_B4ms",
15
+ Standard_B4ms = "Standard_B4ms",
14
16
  /** 8G RAM - 2CPU - 87.60 */
15
- Standard_D2as_v4_87 = "Standard_D2as_v4",
17
+ Standard_D2as_v4 = "Standard_D2as_v4",
16
18
  /** 8G RAM - 2CPU - 87.60 */
17
- Standard_D2s_v3_87 = "Standard_D2s_v3",
19
+ Standard_D2s_v3 = "Standard_D2s_v3",
20
+ /** 8G RAM - 4CPU - 182.5 */
21
+ Standard_D4s_v3 = "Standard_D4s_v3",
18
22
  /** 16G RAM - 4CPU - $175.20 */
19
- Standard_D4as_v4_175 = "Standard_D4as_v4",
23
+ Standard_D4as_v4 = "Standard_D4as_v4",
20
24
  /** 4G RAM - 2CPU - $69.35 */
21
- Standard_A2_v2_69 = "Standard_A2_v2",
25
+ Standard_A2_v2 = "Standard_A2_v2",
22
26
  /** 8G RAM - 4CPU - $144.54 */
23
- Standard_A4_v2_144 = "Standard_A4_v2",
27
+ Standard_A4_v2 = "Standard_A4_v2",
24
28
  /** 32G RAM - 4CPU - $205.13 */
25
- Standard_A4m_v2_205 = "Standard_A4m_v2"
29
+ Standard_A4m_v2 = "Standard_A4m_v2"
26
30
  }
27
- interface NodePoolProps extends Partial<inputs.containerservice.ManagedClusterAgentPoolProfileArgs> {
31
+ export interface NodePoolProps extends Partial<inputs.containerservice.ManagedClusterAgentPoolProfileArgs> {
28
32
  name: string;
29
33
  mode: native.containerservice.AgentPoolMode;
30
- vmSize: VmSizes;
34
+ vmSize: VmSizes | string;
31
35
  osDiskSizeGB: number;
32
36
  maxPods: number;
33
37
  enableEncryptionAtHost?: boolean;
34
38
  }
35
- interface AksProps extends BasicResourceArgs {
36
- nodeResourceGroup?: string;
37
- tier?: native.containerservice.ManagedClusterSKUTier;
38
- addon?: {
39
- enableAzureKeyVault?: boolean;
40
- enableAzurePolicy?: boolean;
41
- enableKubeDashboard?: boolean;
42
- enableVirtualHost?: boolean;
43
- applicationGateway?: {
44
- gatewaySubnetId: pulumi.Input<string>;
45
- };
46
- };
47
- linux?: {
48
- adminUsername: Input<string>;
49
- sshKeys: Array<pulumi.Input<string>>;
39
+ export type AskAddonProps = {
40
+ enableAzureKeyVault?: boolean;
41
+ enableAzurePolicy?: boolean;
42
+ enableKubeDashboard?: boolean;
43
+ enableVirtualHost?: boolean;
44
+ applicationGateway?: {
45
+ gatewaySubnetId: pulumi.Input<string>;
50
46
  };
51
- defaultNodePool: Omit<NodePoolProps, 'subnetId' | 'aksId'>;
52
- nodePools?: Array<Omit<NodePoolProps, 'subnetId' | 'aksId'>>;
47
+ };
48
+ export type AskFeatureProps = {
49
+ enablePrivateCluster?: boolean;
53
50
  enableAutoScale?: boolean;
54
- featureFlags?: {
55
- createServicePrincipal?: boolean;
56
- enablePodIdentity?: boolean;
57
- enableDiagnosticSetting?: boolean;
51
+ enablePodIdentity?: boolean;
52
+ enableDiagnosticSetting?: boolean;
53
+ };
54
+ export type AksAccessProps = {
55
+ envRoles: EnvRolesResults;
56
+ authorizedIPRanges?: Input<string>[];
57
+ };
58
+ export type AksNetworkProps = {
59
+ subnetId: pulumi.Input<string>;
60
+ virtualHostSubnetName?: pulumi.Input<string>;
61
+ outboundIpAddress?: {
62
+ ipAddressId?: pulumi.Input<string>;
63
+ ipAddressPrefixId?: pulumi.Input<string>;
58
64
  };
65
+ };
66
+ export type AksNodePoolProps = Omit<NodePoolProps, "subnetId" | "aksId">;
67
+ export type DefaultAksNodePoolProps = Omit<AksNodePoolProps, "name" | "mode">;
68
+ export interface AksProps extends BasicResourceArgs {
69
+ tier?: native.containerservice.ManagedClusterSKUTier;
70
+ addon?: AskAddonProps;
71
+ features?: AskFeatureProps;
72
+ aksAccess?: AksAccessProps;
59
73
  acr?: {
60
74
  enable: boolean;
61
- id?: Input<string>;
62
- };
63
- aksAccess?: {
64
- envRoleNames: EnvRoleNamesType;
65
- adminMembers?: Array<{
66
- objectId: Input<string>;
67
- }>;
68
- enablePrivateCluster?: boolean;
69
- authorizedIPRanges?: Input<string>[];
75
+ id: Input<string>;
70
76
  };
71
- network: {
72
- subnetId?: pulumi.Input<string>;
73
- virtualHostSubnetName?: pulumi.Input<string>;
74
- enableFirewall?: boolean;
75
- outboundIpAddress?: {
76
- ipAddressId: pulumi.Input<string>;
77
- ipAddressPrefixId?: pulumi.Input<string>;
78
- };
77
+ defaultNodePool: DefaultAksNodePoolProps;
78
+ network: AksNetworkProps;
79
+ linux: {
80
+ adminUsername: Input<string>;
81
+ sshKeys: Array<pulumi.Input<string>>;
79
82
  };
83
+ nodePools?: Array<AksNodePoolProps>;
80
84
  vaultInfo: KeyVaultInfo;
81
- log?: Pick<BasicMonitorArgs, 'logWpId'>;
85
+ logWpId?: Input<string>;
82
86
  /**Lock resource from delete*/
83
87
  lock?: boolean;
84
- dependsOn?: pulumi.Input<pulumi.Resource>[];
85
- importFrom?: string;
86
88
  }
87
- declare const _default: ({ group, nodeResourceGroup, name, linux, defaultNodePool, nodePools, enableAutoScale, network, log, acr, aksAccess, vaultInfo, featureFlags, addon, tier, lock, dependsOn, importFrom, }: AksProps) => Promise<{
88
- aks: import("@pulumi/azure-native/containerservice/managedCluster").ManagedCluster;
89
- serviceIdentity: (import("../AzAd/Identity").IdentityResult & {
90
- vaultNames: {
91
- clientIdKeyName: string;
92
- clientSecretKeyName: string;
93
- principalIdKeyName: string; /** 16G RAM - 4CPU - $154.03 */
94
- principalSecretKeyName: string;
95
- };
96
- }) | undefined;
97
- adminGroup: pulumi.Output<pulumi.UnwrappedObject<import("@pulumi/azuread").GetGroupResult>> | undefined;
98
- privateZone: import("@pulumi/azure-native/network/privateZone").PrivateZone | undefined;
99
- } | undefined>;
89
+ export type AksResults = {
90
+ serviceIdentity: IdentityResult;
91
+ aks: ManagedCluster;
92
+ disableLocalAccounts?: boolean;
93
+ getKubeConfig: () => Output<string>;
94
+ };
95
+ declare const _default: ({ group, name, linux, defaultNodePool, nodePools, network, logWpId, acr, aksAccess, vaultInfo, features, addon, tier, lock, dependsOn, importUri, ignoreChanges, }: AksProps) => Promise<AksResults>;
100
96
  export default _default;