@drunk-pulumi/azure 0.0.37 → 0.0.38

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (176) hide show
  1. package/Aks/Helper.d.ts +6 -11
  2. package/Aks/Helper.js +40 -65
  3. package/Aks/Identity.d.ts +3 -10
  4. package/Aks/Identity.js +9 -8
  5. package/Aks/index.d.ts +67 -71
  6. package/Aks/index.js +198 -314
  7. package/Apim/ApiProduct/PolicyBuilder.js +25 -27
  8. package/Apim/ApiProduct/SwaggerHelper.js +1 -3
  9. package/Apim/ApiProduct/index.d.ts +3 -3
  10. package/Apim/ApiProduct/index.js +1 -2
  11. package/Automation/index.d.ts +7 -0
  12. package/Automation/index.js +55 -0
  13. package/AzAd/EnvRoles.Consts.d.ts +12 -0
  14. package/AzAd/EnvRoles.Consts.js +125 -0
  15. package/AzAd/EnvRoles.d.ts +16 -15
  16. package/AzAd/EnvRoles.js +69 -47
  17. package/AzAd/GraphDefinition.d.ts +2 -2
  18. package/AzAd/GraphDefinition.js +3055 -3056
  19. package/AzAd/Helper.d.ts +24 -13
  20. package/AzAd/Helper.js +98 -25
  21. package/AzAd/Identities/AzDevOpsIdentity.d.ts +12 -0
  22. package/AzAd/Identities/AzDevOpsIdentity.js +32 -0
  23. package/AzAd/Identities/AzDevOpsManagedIdentity.d.ts +7 -0
  24. package/AzAd/Identities/AzDevOpsManagedIdentity.js +15 -0
  25. package/AzAd/Identities/AzUserAdRevertSync.d.ts +2 -9
  26. package/AzAd/Identities/AzUserAdRevertSync.js +4 -5
  27. package/AzAd/Identities/index.d.ts +3 -0
  28. package/AzAd/Identities/index.js +10 -0
  29. package/AzAd/Identity.d.ts +10 -22
  30. package/AzAd/Identity.js +50 -61
  31. package/AzAd/Role.d.ts +2 -3
  32. package/AzAd/Role.js +4 -5
  33. package/AzAd/RoleAssignment.d.ts +34 -5
  34. package/AzAd/RoleAssignment.js +2 -2
  35. package/AzAd/RoleDefinitions/JustInTimeRequestRole.d.ts +2 -0
  36. package/AzAd/RoleDefinitions/JustInTimeRequestRole.js +25 -0
  37. package/AzAd/RolesBuiltIn.d.ts +29 -0
  38. package/AzAd/RolesBuiltIn.js +13034 -8058
  39. package/AzAd/UserAssignedIdentity.d.ts +6 -0
  40. package/AzAd/UserAssignedIdentity.js +27 -0
  41. package/Builder/AksBuilder.d.ts +3 -0
  42. package/Builder/AksBuilder.js +95 -0
  43. package/Builder/VnetBuilder.d.ts +3 -0
  44. package/Builder/VnetBuilder.js +279 -0
  45. package/Builder/index.d.ts +2 -0
  46. package/Builder/index.js +8 -0
  47. package/Builder/types.d.ts +120 -0
  48. package/Builder/types.js +18 -0
  49. package/Certificate/index.d.ts +1 -1
  50. package/Certificate/index.js +26 -28
  51. package/Common/AutoTags.js +2 -2
  52. package/Common/AzureEnv.d.ts +4 -3
  53. package/Common/AzureEnv.js +31 -24
  54. package/Common/GlobalEnv.d.ts +1 -2
  55. package/Common/GlobalEnv.js +7 -7
  56. package/Common/Location.d.ts +3 -3
  57. package/Common/Location.js +22 -9
  58. package/Common/LocationBuiltIn.d.ts +6 -81
  59. package/Common/LocationBuiltIn.js +491 -1923
  60. package/Common/Naming/index.d.ts +6 -4
  61. package/Common/Naming/index.js +64 -60
  62. package/Common/ResourceEnv.d.ts +2 -2
  63. package/Common/ResourceEnv.js +11 -10
  64. package/Common/StackEnv.js +2 -9
  65. package/Core/KeyGenetators.d.ts +16 -20
  66. package/Core/KeyGenetators.js +17 -16
  67. package/Core/Random.d.ts +4 -4
  68. package/Core/Random.js +10 -10
  69. package/Core/ResourceGroup.d.ts +12 -6
  70. package/Core/ResourceGroup.js +12 -24
  71. package/IOT/Hub/index.d.ts +4 -8
  72. package/IOT/Hub/index.js +19 -54
  73. package/KeyVault/Helper.d.ts +8 -6
  74. package/KeyVault/Helper.js +13 -19
  75. package/KeyVault/index.d.ts +1 -3
  76. package/KeyVault/index.js +2 -26
  77. package/Logs/Helpers.d.ts +35 -25
  78. package/Logs/Helpers.js +33 -20
  79. package/Logs/LogAnalytics.d.ts +2 -2
  80. package/Logs/LogAnalytics.js +15 -6
  81. package/Logs/index.d.ts +3 -3
  82. package/Logs/index.js +4 -4
  83. package/MySql/index.d.ts +2 -3
  84. package/MySql/index.js +16 -19
  85. package/{ReadMe.md → README.md} +6 -1
  86. package/Sql/index.d.ts +15 -9
  87. package/Sql/index.js +39 -41
  88. package/Storage/CdnEndpoint.d.ts +2 -2
  89. package/Storage/CdnEndpoint.js +14 -15
  90. package/Storage/Helper.d.ts +2 -2
  91. package/Storage/Helper.js +6 -6
  92. package/Storage/ManagementRules.d.ts +5 -23
  93. package/Storage/ManagementRules.js +3 -3
  94. package/Storage/index.d.ts +3 -3
  95. package/Storage/index.js +28 -28
  96. package/VM/AzureDevOpsExtension.d.ts +16 -0
  97. package/VM/AzureDevOpsExtension.js +14 -0
  98. package/VM/Extension.d.ts +15 -0
  99. package/VM/Extension.js +13 -0
  100. package/VM/GlobalSchedule.d.ts +10 -0
  101. package/VM/GlobalSchedule.js +20 -0
  102. package/VM/index.d.ts +18 -18
  103. package/VM/index.js +94 -57
  104. package/VNet/Bastion.d.ts +4 -4
  105. package/VNet/Bastion.js +12 -8
  106. package/VNet/Firewall.d.ts +19 -12
  107. package/VNet/Firewall.js +59 -40
  108. package/VNet/FirewallPolicies/AksFirewallPolicy.d.ts +16 -16
  109. package/VNet/FirewallPolicies/AksFirewallPolicy.js +193 -220
  110. package/VNet/FirewallPolicies/CloudPCFirewallPolicy.d.ts +12 -10
  111. package/VNet/FirewallPolicies/CloudPCFirewallPolicy.js +170 -282
  112. package/VNet/FirewallPolicies/DefaultFirewallPolicy.d.ts +3 -0
  113. package/VNet/FirewallPolicies/DefaultFirewallPolicy.js +25 -0
  114. package/VNet/FirewallPolicies/index.d.ts +4 -0
  115. package/VNet/FirewallPolicies/index.js +10 -0
  116. package/VNet/FirewallPolicy.d.ts +14 -11
  117. package/VNet/FirewallPolicy.js +67 -74
  118. package/VNet/FirewallRules/AksFirewallRules.d.ts +4 -3
  119. package/VNet/FirewallRules/AksFirewallRules.js +101 -100
  120. package/VNet/Helper.d.ts +8 -4
  121. package/VNet/Helper.js +42 -35
  122. package/VNet/IpAddress.d.ts +6 -8
  123. package/VNet/IpAddress.js +6 -11
  124. package/VNet/IpAddressPrefix.d.ts +12 -9
  125. package/VNet/IpAddressPrefix.js +14 -13
  126. package/VNet/NSGRules/AppGatewaySecurityRule.d.ts +9 -0
  127. package/VNet/NSGRules/AppGatewaySecurityRule.js +46 -0
  128. package/VNet/NSGRules/AzADSecurityRule.d.ts +6 -0
  129. package/VNet/NSGRules/AzADSecurityRule.js +39 -0
  130. package/VNet/NSGRules/BastionSecurityRule.d.ts +9 -0
  131. package/VNet/NSGRules/BastionSecurityRule.js +93 -0
  132. package/VNet/NatGateway.d.ts +10 -0
  133. package/VNet/NatGateway.js +21 -0
  134. package/VNet/NetworkPeering.d.ts +7 -7
  135. package/VNet/NetworkPeering.js +29 -20
  136. package/VNet/PrivateDns.d.ts +8 -10
  137. package/VNet/PrivateDns.js +12 -14
  138. package/VNet/PrivateEndpoint.js +5 -2
  139. package/VNet/RouteTable.d.ts +7 -8
  140. package/VNet/RouteTable.js +6 -6
  141. package/VNet/SecurityGroup.d.ts +4 -4
  142. package/VNet/SecurityGroup.js +7 -3
  143. package/VNet/Subnet.d.ts +10 -7
  144. package/VNet/Subnet.js +4 -3
  145. package/VNet/VPNGateway.d.ts +13 -0
  146. package/VNet/VPNGateway.js +73 -0
  147. package/VNet/VirtualWAN.d.ts +7 -10
  148. package/VNet/VirtualWAN.js +1 -1
  149. package/VNet/Vnet.d.ts +29 -23
  150. package/VNet/Vnet.js +58 -121
  151. package/VNet/index.d.ts +17 -18
  152. package/VNet/index.js +41 -54
  153. package/VNet/types.d.ts +94 -0
  154. package/VNet/types.js +3 -0
  155. package/Web/types.d.ts +2 -134
  156. package/package.json +8 -8
  157. package/types.d.ts +22 -8
  158. package/z_tests/_tools/Mocks.js +12 -13
  159. package/Automation/AutoAccount.d.ts +0 -5
  160. package/Automation/AutoAccount.js +0 -18
  161. package/AzAd/Identities/AzDevOps.d.ts +0 -23
  162. package/AzAd/Identities/AzDevOps.js +0 -61
  163. package/AzAd/KeyVaultRoles.d.ts +0 -8
  164. package/AzAd/KeyVaultRoles.js +0 -53
  165. package/AzAd/ManagedIdentity.d.ts +0 -6
  166. package/AzAd/ManagedIdentity.js +0 -20
  167. package/AzAd/UserIdentity.d.ts +0 -5
  168. package/AzAd/UserIdentity.js +0 -12
  169. package/Common/Naming/AzureRegions.d.ts +0 -4
  170. package/Common/Naming/AzureRegions.js +0 -49
  171. package/KeyVault/VaultPermissions.d.ts +0 -27
  172. package/KeyVault/VaultPermissions.js +0 -226
  173. package/VNet/FirewallRules/types.d.ts +0 -20
  174. package/VNet/FirewallRules/types.js +0 -5
  175. package/VNet/NSGRules/AzADService.d.ts +0 -10
  176. package/VNet/NSGRules/AzADService.js +0 -45
package/VNet/Bastion.js CHANGED
@@ -3,26 +3,30 @@ Object.defineProperty(exports, "__esModule", { value: true });
3
3
  const IpAddress_1 = require("./IpAddress");
4
4
  const network = require("@pulumi/azure-native/network");
5
5
  const Naming_1 = require("../Common/Naming");
6
- exports.default = ({ name, group, subnetId, dependsOn }) => {
6
+ exports.default = ({ name, group, subnetId, dependsOn, importUri, ignoreChanges, sku = "Basic", }) => {
7
7
  name = (0, Naming_1.getBastionName)(name);
8
- const ipAddress = (0, IpAddress_1.default)({
8
+ const ipAddressId = (0, IpAddress_1.default)({
9
9
  name,
10
10
  group,
11
- sku: { name: "Standard", tier: "Regional" },
12
11
  lock: false,
13
- });
12
+ }).id;
14
13
  return new network.BastionHost(name, {
15
14
  bastionHostName: name,
16
15
  ...group,
17
- //dnsName: name,
16
+ sku: { name: sku },
18
17
  ipConfigurations: [
19
18
  {
20
19
  name: "IpConfig",
21
- publicIPAddress: { id: ipAddress.id },
20
+ publicIPAddress: { id: ipAddressId },
22
21
  subnet: { id: subnetId },
23
22
  privateIPAllocationMethod: network.IPAllocationMethod.Dynamic,
24
23
  },
25
24
  ],
26
- }, { dependsOn: dependsOn || ipAddress, deleteBeforeReplace: true });
25
+ }, {
26
+ dependsOn: dependsOn,
27
+ deleteBeforeReplace: true,
28
+ import: importUri,
29
+ ignoreChanges,
30
+ });
27
31
  };
28
- //# sourceMappingURL=data:application/json;base64,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
32
+ //# sourceMappingURL=data:application/json;base64,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
@@ -1,27 +1,34 @@
1
- import * as network from '@pulumi/azure-native/network';
2
- import * as pulumi from '@pulumi/pulumi';
3
- import { BasicMonitorArgs, BasicResourceArgs, DefaultResourceArgs } from '../types';
4
- import { FirewallPolicyProps } from './FirewallRules/types';
1
+ import * as network from "@pulumi/azure-native/network";
2
+ import * as pulumi from "@pulumi/pulumi";
3
+ import { BasicMonitorArgs, BasicResourceArgs, DefaultResourceArgs } from "../types";
4
+ import { FirewallPolicyProps } from "./types";
5
+ import { Input } from "@pulumi/pulumi";
5
6
  export interface FwOutboundConfig {
6
- name?: string;
7
7
  subnetId: pulumi.Input<string>;
8
- publicIpAddress: network.PublicIPAddress;
8
+ publicIpAddress?: network.PublicIPAddress;
9
9
  }
10
10
  export type FirewallSkus = {
11
11
  name: network.AzureFirewallSkuName;
12
12
  tier: network.AzureFirewallSkuTier;
13
13
  };
14
- interface Props extends BasicResourceArgs, Omit<DefaultResourceArgs, 'monitoring'> {
14
+ export interface FirewallProps extends BasicResourceArgs, Omit<DefaultResourceArgs, "monitoring"> {
15
+ /** The public outbound IP address ignores this property if want to enable the Force Tunneling mode */
15
16
  outbound: Array<FwOutboundConfig>;
16
- /** This must be provided if sku is Basic */
17
+ /** This must be provided if sku is Basic or want to enable the Force Tunneling mode */
17
18
  management?: FwOutboundConfig;
19
+ snat?: {
20
+ privateRanges?: Input<string>;
21
+ autoLearnPrivateRanges?: boolean;
22
+ routeServerId?: Input<string>;
23
+ };
18
24
  policy: FirewallPolicyProps;
19
25
  enableDnsProxy?: boolean;
20
26
  sku?: FirewallSkus;
21
- monitorConfig?: BasicMonitorArgs;
27
+ monitorConfig?: Omit<BasicMonitorArgs, "dependsOn">;
22
28
  }
23
- declare const _default: ({ name, group, policy, outbound, management, monitorConfig, enableDnsProxy, sku, ...others }: Props) => {
24
- firewall: import("@pulumi/azure-native/network/azureFirewall").AzureFirewall;
25
- policy: import("@pulumi/azure-native/network/firewallPolicy").FirewallPolicy | undefined;
29
+ export type FirewallResult = {
30
+ firewall: network.AzureFirewall;
31
+ policy: network.FirewallPolicy | undefined;
26
32
  };
33
+ declare const _default: ({ name, group, snat, policy, outbound, management, monitorConfig, enableDnsProxy, sku, ...others }: FirewallProps) => FirewallResult;
27
34
  export default _default;
package/VNet/Firewall.js CHANGED
@@ -5,77 +5,96 @@ const AzureEnv_1 = require("../Common/AzureEnv");
5
5
  const Naming_1 = require("../Common/Naming");
6
6
  const ResourceCreator_1 = require("../Core/ResourceCreator");
7
7
  const FirewallPolicy_1 = require("./FirewallPolicy");
8
- exports.default = ({ name, group,
9
- //rules,
10
- policy, outbound, management, monitorConfig, enableDnsProxy, sku = {
8
+ const IpAddress_1 = require("./IpAddress");
9
+ const StackEnv_1 = require("../Common/StackEnv");
10
+ exports.default = ({ name, group, snat, policy, outbound, management, monitorConfig, enableDnsProxy, sku = {
11
11
  name: network.AzureFirewallSkuName.AZFW_VNet,
12
12
  tier: network.AzureFirewallSkuTier.Basic,
13
13
  }, ...others }) => {
14
- if (sku.tier === network.AzureFirewallSkuTier.Basic && !management) {
15
- throw new Error('Management Public Ip Address is required for Firewall Basic tier.');
14
+ // Validation
15
+ if (!StackEnv_1.isDryRun) {
16
+ if (!outbound && !management)
17
+ throw new Error("Management Public Ip Address is required for the Force Tunneling mode.");
18
+ if (sku.tier === network.AzureFirewallSkuTier.Basic && !management)
19
+ throw new Error("Management Subnet is required for Firewall Basic tier.");
16
20
  }
17
21
  const fwName = (0, Naming_1.getFirewallName)(name);
18
- // if (rules?.applicationRuleCollections) {
19
- // //Add Denied other rules
20
- // rules.applicationRuleCollections.push(deniedOthersRule);
21
- // }
22
- const fwPolicy = policy.enabled
22
+ //Create Public IpAddress for Management
23
+ const manageIpAddress = management
24
+ ? management.publicIpAddress ??
25
+ (0, IpAddress_1.default)({
26
+ name: `${name}-mag`,
27
+ group,
28
+ lock: false,
29
+ })
30
+ : undefined;
31
+ const additionalProperties = {};
32
+ if (enableDnsProxy && sku.tier !== network.AzureFirewallSkuTier.Basic) {
33
+ additionalProperties["Network.DNS.EnableProxy"] = "Enabled";
34
+ }
35
+ if (snat) {
36
+ if (snat.privateRanges)
37
+ additionalProperties.privateRanges = snat.privateRanges;
38
+ if (snat.autoLearnPrivateRanges)
39
+ additionalProperties.autoLearnPrivateRanges = "Enabled";
40
+ if (snat.routeServerId)
41
+ additionalProperties["Network.RouteServerInfo.RouteServerID"] =
42
+ snat.routeServerId;
43
+ }
44
+ const fwPolicy = policy
23
45
  ? (0, FirewallPolicy_1.default)({
24
46
  name,
25
47
  group,
26
48
  basePolicyId: policy.parentPolicyId,
27
49
  sku: sku.tier,
28
- dnsSettings: { enableProxy: true },
50
+ dnsSettings: sku?.tier !== "Basic"
51
+ ? {
52
+ enableProxy: true,
53
+ }
54
+ : undefined,
29
55
  })
30
56
  : undefined;
31
- const dependsOn = new Array();
32
- outbound.forEach((o) => dependsOn.push(o.publicIpAddress));
33
- if (management)
34
- dependsOn.push(management.publicIpAddress);
35
57
  const { resource } = (0, ResourceCreator_1.default)(network.AzureFirewall, {
36
58
  azureFirewallName: fwName,
37
59
  ...group,
38
- //...rules,
39
- firewallPolicy: fwPolicy ? { id: fwPolicy.id } : undefined,
40
- zones: AzureEnv_1.isPrd ? ['1', '2', '3'] : undefined,
41
- threatIntelMode: network.AzureFirewallThreatIntelMode.Deny,
42
60
  sku,
43
- managementIpConfiguration: management
61
+ firewallPolicy: fwPolicy ? { id: fwPolicy.id } : undefined,
62
+ zones: AzureEnv_1.isPrd ? ["1", "2", "3"] : undefined,
63
+ threatIntelMode: sku.tier !== network.AzureFirewallSkuTier.Basic && sku.name !== "AZFW_Hub"
64
+ ? network.AzureFirewallThreatIntelMode.Deny
65
+ : undefined,
66
+ managementIpConfiguration: management && manageIpAddress
44
67
  ? {
45
- name: management.name,
46
- publicIPAddress: { id: management.publicIpAddress.id },
68
+ name: "management",
69
+ publicIPAddress: { id: manageIpAddress.id },
47
70
  subnet: { id: management.subnetId },
48
71
  }
49
72
  : undefined,
50
- ipConfigurations: outbound.map((o, i) => ({
51
- name: o.name || `outbound-${i}`,
52
- publicIPAddress: o.publicIpAddress.id
53
- ? { id: o.publicIpAddress.id }
54
- : undefined,
55
- subnet: { id: o.subnetId },
56
- })),
57
- additionalProperties: enableDnsProxy && sku.tier !== network.AzureFirewallSkuTier.Basic
58
- ? {
59
- 'Network.DNS.EnableProxy': 'true',
60
- }
73
+ ipConfigurations: outbound
74
+ ? outbound.map((o, i) => ({
75
+ name: `outbound-${i}`,
76
+ publicIPAddress: o.publicIpAddress
77
+ ? { id: o.publicIpAddress.id }
78
+ : undefined,
79
+ subnet: { id: o.subnetId },
80
+ }))
61
81
  : undefined,
82
+ additionalProperties,
62
83
  monitoring: {
63
84
  ...monitorConfig,
64
85
  logsCategories: [
65
- 'AzureFirewallApplicationRule',
66
- 'AzureFirewallNetworkRule',
67
- 'AzureFirewallDnsProxy',
86
+ "AzureFirewallApplicationRule",
87
+ "AzureFirewallNetworkRule",
88
+ "AzureFirewallDnsProxy",
68
89
  ],
69
90
  },
70
91
  ...others,
71
- dependsOn,
72
92
  });
73
93
  //Link Rule to Policy
74
94
  if (fwPolicy && policy?.rules) {
75
95
  (0, FirewallPolicy_1.linkRulesToPolicy)({
76
- name: `${name}-policies`,
77
96
  group,
78
- priority: policy.priority,
97
+ //priority: 201,
79
98
  firewallPolicyName: fwPolicy.name,
80
99
  rules: policy.rules,
81
100
  dependsOn: [fwPolicy, resource],
@@ -83,4 +102,4 @@ policy, outbound, management, monitorConfig, enableDnsProxy, sku = {
83
102
  }
84
103
  return { firewall: resource, policy: fwPolicy };
85
104
  };
86
- //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiRmlyZXdhbGwuanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi9zcmMvVk5ldC9GaXJld2FsbC50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiOztBQUFBLHdEQUF3RDtBQUd4RCxpREFBMkM7QUFDM0MsNkNBQW1EO0FBQ25ELDZEQUFzRDtBQU10RCxxREFBcUU7QUE0QnJFLGtCQUFlLENBQUMsRUFDZCxJQUFJLEVBQ0osS0FBSztBQUNMLFFBQVE7QUFDUixNQUFNLEVBQ04sUUFBUSxFQUNSLFVBQVUsRUFDVixhQUFhLEVBQ2IsY0FBYyxFQUNkLEdBQUcsR0FBRztJQUNKLElBQUksRUFBRSxPQUFPLENBQUMsb0JBQW9CLENBQUMsU0FBUztJQUM1QyxJQUFJLEVBQUUsT0FBTyxDQUFDLG9CQUFvQixDQUFDLEtBQUs7Q0FDekMsRUFDRCxHQUFHLE1BQU0sRUFDSCxFQUFFLEVBQUU7SUFDVixJQUFJLEdBQUcsQ0FBQyxJQUFJLEtBQUssT0FBTyxDQUFDLG9CQUFvQixDQUFDLEtBQUssSUFBSSxDQUFDLFVBQVUsRUFBRSxDQUFDO1FBQ25FLE1BQU0sSUFBSSxLQUFLLENBQ2IsbUVBQW1FLENBQ3BFLENBQUM7SUFDSixDQUFDO0lBRUQsTUFBTSxNQUFNLEdBQUcsSUFBQSx3QkFBZSxFQUFDLElBQUksQ0FBQyxDQUFDO0lBRXJDLDJDQUEyQztJQUMzQyw2QkFBNkI7SUFDN0IsNkRBQTZEO0lBQzdELElBQUk7SUFFSixNQUFNLFFBQVEsR0FBRyxNQUFNLENBQUMsT0FBTztRQUM3QixDQUFDLENBQUMsSUFBQSx3QkFBYyxFQUFDO1lBQ2IsSUFBSTtZQUNKLEtBQUs7WUFDTCxZQUFZLEVBQUUsTUFBTSxDQUFDLGNBQWM7WUFDbkMsR0FBRyxFQUFFLEdBQUcsQ0FBQyxJQUFJO1lBQ2IsV0FBVyxFQUFFLEVBQUUsV0FBVyxFQUFFLElBQUksRUFBRTtTQUNuQyxDQUFDO1FBQ0osQ0FBQyxDQUFDLFNBQVMsQ0FBQztJQUVkLE1BQU0sU0FBUyxHQUFHLElBQUksS0FBSyxFQUFtQixDQUFDO0lBQy9DLFFBQVEsQ0FBQyxPQUFPLENBQUMsQ0FBQyxDQUFDLEVBQUUsRUFBRSxDQUFDLFNBQVMsQ0FBQyxJQUFJLENBQUMsQ0FBQyxDQUFDLGVBQWUsQ0FBQyxDQUFDLENBQUM7SUFDM0QsSUFBSSxVQUFVO1FBQUUsU0FBUyxDQUFDLElBQUksQ0FBQyxVQUFVLENBQUMsZUFBZSxDQUFDLENBQUM7SUFFM0QsTUFBTSxFQUFFLFFBQVEsRUFBRSxHQUFHLElBQUEseUJBQWUsRUFBQyxPQUFPLENBQUMsYUFBYSxFQUFFO1FBQzFELGlCQUFpQixFQUFFLE1BQU07UUFDekIsR0FBRyxLQUFLO1FBQ1IsV0FBVztRQUNYLGNBQWMsRUFBRSxRQUFRLENBQUMsQ0FBQyxDQUFDLEVBQUUsRUFBRSxFQUFFLFFBQVEsQ0FBQyxFQUFFLEVBQUUsQ0FBQyxDQUFDLENBQUMsU0FBUztRQUUxRCxLQUFLLEVBQUUsZ0JBQUssQ0FBQyxDQUFDLENBQUMsQ0FBQyxHQUFHLEVBQUUsR0FBRyxFQUFFLEdBQUcsQ0FBQyxDQUFDLENBQUMsQ0FBQyxTQUFTO1FBQzFDLGVBQWUsRUFBRSxPQUFPLENBQUMsNEJBQTRCLENBQUMsSUFBSTtRQUMxRCxHQUFHO1FBRUgseUJBQXlCLEVBQUUsVUFBVTtZQUNuQyxDQUFDLENBQUM7Z0JBQ0UsSUFBSSxFQUFFLFVBQVUsQ0FBQyxJQUFJO2dCQUNyQixlQUFlLEVBQUUsRUFBRSxFQUFFLEVBQUUsVUFBVSxDQUFDLGVBQWUsQ0FBQyxFQUFFLEVBQUU7Z0JBQ3RELE1BQU0sRUFBRSxFQUFFLEVBQUUsRUFBRSxVQUFVLENBQUMsUUFBUSxFQUFFO2FBQ3BDO1lBQ0gsQ0FBQyxDQUFDLFNBQVM7UUFFYixnQkFBZ0IsRUFBRSxRQUFRLENBQUMsR0FBRyxDQUFDLENBQUMsQ0FBQyxFQUFFLENBQUMsRUFBRSxFQUFFLENBQUMsQ0FBQztZQUN4QyxJQUFJLEVBQUUsQ0FBQyxDQUFDLElBQUksSUFBSSxZQUFZLENBQUMsRUFBRTtZQUMvQixlQUFlLEVBQUUsQ0FBQyxDQUFDLGVBQWUsQ0FBQyxFQUFFO2dCQUNuQyxDQUFDLENBQUMsRUFBRSxFQUFFLEVBQUUsQ0FBQyxDQUFDLGVBQWUsQ0FBQyxFQUFFLEVBQUU7Z0JBQzlCLENBQUMsQ0FBQyxTQUFTO1lBQ2IsTUFBTSxFQUFFLEVBQUUsRUFBRSxFQUFFLENBQUMsQ0FBQyxRQUFRLEVBQUU7U0FDM0IsQ0FBQyxDQUFDO1FBRUgsb0JBQW9CLEVBQ2xCLGNBQWMsSUFBSSxHQUFHLENBQUMsSUFBSSxLQUFLLE9BQU8sQ0FBQyxvQkFBb0IsQ0FBQyxLQUFLO1lBQy9ELENBQUMsQ0FBQztnQkFDRSx5QkFBeUIsRUFBRSxNQUFNO2FBQ2xDO1lBQ0gsQ0FBQyxDQUFDLFNBQVM7UUFFZixVQUFVLEVBQUU7WUFDVixHQUFHLGFBQWE7WUFDaEIsY0FBYyxFQUFFO2dCQUNkLDhCQUE4QjtnQkFDOUIsMEJBQTBCO2dCQUMxQix1QkFBdUI7YUFDeEI7U0FDRjtRQUVELEdBQUcsTUFBTTtRQUNULFNBQVM7S0FDeUMsQ0FBQyxDQUFDO0lBRXRELHFCQUFxQjtJQUNyQixJQUFJLFFBQVEsSUFBSSxNQUFNLEVBQUUsS0FBSyxFQUFFLENBQUM7UUFDOUIsSUFBQSxrQ0FBaUIsRUFBQztZQUNoQixJQUFJLEVBQUUsR0FBRyxJQUFJLFdBQVc7WUFDeEIsS0FBSztZQUNMLFFBQVEsRUFBRSxNQUFNLENBQUMsUUFBUTtZQUN6QixrQkFBa0IsRUFBRSxRQUFRLENBQUMsSUFBSTtZQUNqQyxLQUFLLEVBQUUsTUFBTSxDQUFDLEtBQUs7WUFDbkIsU0FBUyxFQUFFLENBQUMsUUFBUSxFQUFFLFFBQVEsQ0FBQztTQUNoQyxDQUFDLENBQUM7SUFDTCxDQUFDO0lBRUQsT0FBTyxFQUFFLFFBQVEsRUFBRSxRQUFpQyxFQUFFLE1BQU0sRUFBRSxRQUFRLEVBQUUsQ0FBQztBQUMzRSxDQUFDLENBQUMifQ==
105
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiRmlyZXdhbGwuanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi9zcmMvVk5ldC9GaXJld2FsbC50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiOztBQUFBLHdEQUF3RDtBQUd4RCxpREFBMkM7QUFDM0MsNkNBQW1EO0FBQ25ELDZEQUFzRDtBQU10RCxxREFBcUU7QUFHckUsMkNBQW9DO0FBQ3BDLGlEQUE4QztBQXFDOUMsa0JBQWUsQ0FBQyxFQUNkLElBQUksRUFDSixLQUFLLEVBQ0wsSUFBSSxFQUNKLE1BQU0sRUFDTixRQUFRLEVBQ1IsVUFBVSxFQUNWLGFBQWEsRUFDYixjQUFjLEVBQ2QsR0FBRyxHQUFHO0lBQ0osSUFBSSxFQUFFLE9BQU8sQ0FBQyxvQkFBb0IsQ0FBQyxTQUFTO0lBQzVDLElBQUksRUFBRSxPQUFPLENBQUMsb0JBQW9CLENBQUMsS0FBSztDQUN6QyxFQUNELEdBQUcsTUFBTSxFQUNLLEVBQWtCLEVBQUU7SUFDbEMsYUFBYTtJQUNiLElBQUksQ0FBQyxtQkFBUSxFQUFFLENBQUM7UUFDZCxJQUFJLENBQUMsUUFBUSxJQUFJLENBQUMsVUFBVTtZQUMxQixNQUFNLElBQUksS0FBSyxDQUNiLHdFQUF3RSxDQUN6RSxDQUFDO1FBRUosSUFBSSxHQUFHLENBQUMsSUFBSSxLQUFLLE9BQU8sQ0FBQyxvQkFBb0IsQ0FBQyxLQUFLLElBQUksQ0FBQyxVQUFVO1lBQ2hFLE1BQU0sSUFBSSxLQUFLLENBQUMsd0RBQXdELENBQUMsQ0FBQztJQUM5RSxDQUFDO0lBRUQsTUFBTSxNQUFNLEdBQUcsSUFBQSx3QkFBZSxFQUFDLElBQUksQ0FBQyxDQUFDO0lBRXJDLHdDQUF3QztJQUN4QyxNQUFNLGVBQWUsR0FBRyxVQUFVO1FBQ2hDLENBQUMsQ0FBQyxVQUFVLENBQUMsZUFBZTtZQUMxQixJQUFBLG1CQUFTLEVBQUM7Z0JBQ1IsSUFBSSxFQUFFLEdBQUcsSUFBSSxNQUFNO2dCQUNuQixLQUFLO2dCQUNMLElBQUksRUFBRSxLQUFLO2FBQ1osQ0FBQztRQUNKLENBQUMsQ0FBQyxTQUFTLENBQUM7SUFFZCxNQUFNLG9CQUFvQixHQUFrQyxFQUFFLENBQUM7SUFDL0QsSUFBSSxjQUFjLElBQUksR0FBRyxDQUFDLElBQUksS0FBSyxPQUFPLENBQUMsb0JBQW9CLENBQUMsS0FBSyxFQUFFLENBQUM7UUFDdEUsb0JBQW9CLENBQUMseUJBQXlCLENBQUMsR0FBRyxTQUFTLENBQUM7SUFDOUQsQ0FBQztJQUNELElBQUksSUFBSSxFQUFFLENBQUM7UUFDVCxJQUFJLElBQUksQ0FBQyxhQUFhO1lBQ3BCLG9CQUFvQixDQUFDLGFBQWEsR0FBRyxJQUFJLENBQUMsYUFBYSxDQUFDO1FBQzFELElBQUksSUFBSSxDQUFDLHNCQUFzQjtZQUM3QixvQkFBb0IsQ0FBQyxzQkFBc0IsR0FBRyxTQUFTLENBQUM7UUFDMUQsSUFBSSxJQUFJLENBQUMsYUFBYTtZQUNwQixvQkFBb0IsQ0FBQyx1Q0FBdUMsQ0FBQztnQkFDM0QsSUFBSSxDQUFDLGFBQWEsQ0FBQztJQUN6QixDQUFDO0lBRUQsTUFBTSxRQUFRLEdBQUcsTUFBTTtRQUNyQixDQUFDLENBQUMsSUFBQSx3QkFBYyxFQUFDO1lBQ2IsSUFBSTtZQUNKLEtBQUs7WUFDTCxZQUFZLEVBQUUsTUFBTSxDQUFDLGNBQWM7WUFDbkMsR0FBRyxFQUFFLEdBQUcsQ0FBQyxJQUFJO1lBQ2IsV0FBVyxFQUNULEdBQUcsRUFBRSxJQUFJLEtBQUssT0FBTztnQkFDbkIsQ0FBQyxDQUFDO29CQUNFLFdBQVcsRUFBRSxJQUFJO2lCQUNsQjtnQkFDSCxDQUFDLENBQUMsU0FBUztTQUNoQixDQUFDO1FBQ0osQ0FBQyxDQUFDLFNBQVMsQ0FBQztJQUVkLE1BQU0sRUFBRSxRQUFRLEVBQUUsR0FBRyxJQUFBLHlCQUFlLEVBQUMsT0FBTyxDQUFDLGFBQWEsRUFBRTtRQUMxRCxpQkFBaUIsRUFBRSxNQUFNO1FBQ3pCLEdBQUcsS0FBSztRQUNSLEdBQUc7UUFDSCxjQUFjLEVBQUUsUUFBUSxDQUFDLENBQUMsQ0FBQyxFQUFFLEVBQUUsRUFBRSxRQUFRLENBQUMsRUFBRSxFQUFFLENBQUMsQ0FBQyxDQUFDLFNBQVM7UUFDMUQsS0FBSyxFQUFFLGdCQUFLLENBQUMsQ0FBQyxDQUFDLENBQUMsR0FBRyxFQUFFLEdBQUcsRUFBRSxHQUFHLENBQUMsQ0FBQyxDQUFDLENBQUMsU0FBUztRQUUxQyxlQUFlLEVBQ2IsR0FBRyxDQUFDLElBQUksS0FBSyxPQUFPLENBQUMsb0JBQW9CLENBQUMsS0FBSyxJQUFJLEdBQUcsQ0FBQyxJQUFJLEtBQUssVUFBVTtZQUN4RSxDQUFDLENBQUMsT0FBTyxDQUFDLDRCQUE0QixDQUFDLElBQUk7WUFDM0MsQ0FBQyxDQUFDLFNBQVM7UUFFZix5QkFBeUIsRUFDdkIsVUFBVSxJQUFJLGVBQWU7WUFDM0IsQ0FBQyxDQUFDO2dCQUNFLElBQUksRUFBRSxZQUFZO2dCQUNsQixlQUFlLEVBQUUsRUFBRSxFQUFFLEVBQUUsZUFBZSxDQUFDLEVBQUUsRUFBRTtnQkFDM0MsTUFBTSxFQUFFLEVBQUUsRUFBRSxFQUFFLFVBQVUsQ0FBQyxRQUFRLEVBQUU7YUFDcEM7WUFDSCxDQUFDLENBQUMsU0FBUztRQUVmLGdCQUFnQixFQUFFLFFBQVE7WUFDeEIsQ0FBQyxDQUFDLFFBQVEsQ0FBQyxHQUFHLENBQUMsQ0FBQyxDQUFDLEVBQUUsQ0FBQyxFQUFFLEVBQUUsQ0FBQyxDQUFDO2dCQUN0QixJQUFJLEVBQUUsWUFBWSxDQUFDLEVBQUU7Z0JBQ3JCLGVBQWUsRUFBRSxDQUFDLENBQUMsZUFBZTtvQkFDaEMsQ0FBQyxDQUFDLEVBQUUsRUFBRSxFQUFFLENBQUMsQ0FBQyxlQUFlLENBQUMsRUFBRSxFQUFFO29CQUM5QixDQUFDLENBQUMsU0FBUztnQkFDYixNQUFNLEVBQUUsRUFBRSxFQUFFLEVBQUUsQ0FBQyxDQUFDLFFBQVEsRUFBRTthQUMzQixDQUFDLENBQUM7WUFDTCxDQUFDLENBQUMsU0FBUztRQUViLG9CQUFvQjtRQUVwQixVQUFVLEVBQUU7WUFDVixHQUFHLGFBQWE7WUFDaEIsY0FBYyxFQUFFO2dCQUNkLDhCQUE4QjtnQkFDOUIsMEJBQTBCO2dCQUMxQix1QkFBdUI7YUFDeEI7U0FDRjtRQUVELEdBQUcsTUFBTTtLQUN5QyxDQUFDLENBQUM7SUFFdEQscUJBQXFCO0lBQ3JCLElBQUksUUFBUSxJQUFJLE1BQU0sRUFBRSxLQUFLLEVBQUUsQ0FBQztRQUM5QixJQUFBLGtDQUFpQixFQUFDO1lBQ2hCLEtBQUs7WUFDTCxnQkFBZ0I7WUFDaEIsa0JBQWtCLEVBQUUsUUFBUSxDQUFDLElBQUk7WUFDakMsS0FBSyxFQUFFLE1BQU0sQ0FBQyxLQUFLO1lBQ25CLFNBQVMsRUFBRSxDQUFDLFFBQVEsRUFBRSxRQUFRLENBQUM7U0FDaEMsQ0FBQyxDQUFDO0lBQ0wsQ0FBQztJQUVELE9BQU8sRUFBRSxRQUFRLEVBQUUsUUFBaUMsRUFBRSxNQUFNLEVBQUUsUUFBUSxFQUFFLENBQUM7QUFDM0UsQ0FBQyxDQUFDIn0=
@@ -1,20 +1,20 @@
1
- import { Input } from '@pulumi/pulumi';
2
- import { FirewallRuleProps } from '../FirewallRules/types';
3
- interface Props {
4
- name: string;
5
- vnetAddressSpace: Array<Input<string>>;
6
- location: Input<string>;
7
- privateCluster?: boolean;
8
- /** Allows access to Docker and Kubenetes registries */
1
+ import { Input } from "@pulumi/pulumi";
2
+ import { FirewallPolicyRuleCollectionResults } from "../types";
3
+ interface AzureFirewallPolicyProps {
4
+ priority: number;
5
+ subnetSpaces: Array<Input<string>>;
6
+ /** Allows access to Docker and Kubernetes registries */
9
7
  allowAccessPublicRegistries?: boolean;
10
- natRule: {
11
- publicIpAddress: Input<string>;
12
- internalIpAddress: Input<string>;
13
- apim?: {
14
- apimPublicIpAddress: Input<string>;
8
+ dNATs?: [
9
+ {
10
+ name: string;
11
+ allowHttp?: boolean;
12
+ publicIpAddresses: Input<string>[];
13
+ /** Default value is '*' and it will allows all incoming requests */
14
+ sourceIpAddress?: Input<string>;
15
15
  internalIpAddress: Input<string>;
16
- };
17
- };
16
+ }
17
+ ];
18
18
  }
19
- declare const _default: ({ name, location, privateCluster, allowAccessPublicRegistries, vnetAddressSpace, natRule, }: Props) => FirewallRuleProps;
19
+ declare const _default: ({ priority, allowAccessPublicRegistries, subnetSpaces, dNATs, }: AzureFirewallPolicyProps) => FirewallPolicyRuleCollectionResults;
20
20
  export default _default;