@drunk-pulumi/azure 0.0.37 → 0.0.38
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/Aks/Helper.d.ts +6 -11
- package/Aks/Helper.js +40 -65
- package/Aks/Identity.d.ts +3 -10
- package/Aks/Identity.js +9 -8
- package/Aks/index.d.ts +67 -71
- package/Aks/index.js +198 -314
- package/Apim/ApiProduct/PolicyBuilder.js +25 -27
- package/Apim/ApiProduct/SwaggerHelper.js +1 -3
- package/Apim/ApiProduct/index.d.ts +3 -3
- package/Apim/ApiProduct/index.js +1 -2
- package/Automation/index.d.ts +7 -0
- package/Automation/index.js +55 -0
- package/AzAd/EnvRoles.Consts.d.ts +12 -0
- package/AzAd/EnvRoles.Consts.js +125 -0
- package/AzAd/EnvRoles.d.ts +16 -15
- package/AzAd/EnvRoles.js +69 -47
- package/AzAd/GraphDefinition.d.ts +2 -2
- package/AzAd/GraphDefinition.js +3055 -3056
- package/AzAd/Helper.d.ts +24 -13
- package/AzAd/Helper.js +98 -25
- package/AzAd/Identities/AzDevOpsIdentity.d.ts +12 -0
- package/AzAd/Identities/AzDevOpsIdentity.js +32 -0
- package/AzAd/Identities/AzDevOpsManagedIdentity.d.ts +7 -0
- package/AzAd/Identities/AzDevOpsManagedIdentity.js +15 -0
- package/AzAd/Identities/AzUserAdRevertSync.d.ts +2 -9
- package/AzAd/Identities/AzUserAdRevertSync.js +4 -5
- package/AzAd/Identities/index.d.ts +3 -0
- package/AzAd/Identities/index.js +10 -0
- package/AzAd/Identity.d.ts +10 -22
- package/AzAd/Identity.js +50 -61
- package/AzAd/Role.d.ts +2 -3
- package/AzAd/Role.js +4 -5
- package/AzAd/RoleAssignment.d.ts +34 -5
- package/AzAd/RoleAssignment.js +2 -2
- package/AzAd/RoleDefinitions/JustInTimeRequestRole.d.ts +2 -0
- package/AzAd/RoleDefinitions/JustInTimeRequestRole.js +25 -0
- package/AzAd/RolesBuiltIn.d.ts +29 -0
- package/AzAd/RolesBuiltIn.js +13034 -8058
- package/AzAd/UserAssignedIdentity.d.ts +6 -0
- package/AzAd/UserAssignedIdentity.js +27 -0
- package/Builder/AksBuilder.d.ts +3 -0
- package/Builder/AksBuilder.js +95 -0
- package/Builder/VnetBuilder.d.ts +3 -0
- package/Builder/VnetBuilder.js +279 -0
- package/Builder/index.d.ts +2 -0
- package/Builder/index.js +8 -0
- package/Builder/types.d.ts +120 -0
- package/Builder/types.js +18 -0
- package/Certificate/index.d.ts +1 -1
- package/Certificate/index.js +26 -28
- package/Common/AutoTags.js +2 -2
- package/Common/AzureEnv.d.ts +4 -3
- package/Common/AzureEnv.js +31 -24
- package/Common/GlobalEnv.d.ts +1 -2
- package/Common/GlobalEnv.js +7 -7
- package/Common/Location.d.ts +3 -3
- package/Common/Location.js +22 -9
- package/Common/LocationBuiltIn.d.ts +6 -81
- package/Common/LocationBuiltIn.js +491 -1923
- package/Common/Naming/index.d.ts +6 -4
- package/Common/Naming/index.js +64 -60
- package/Common/ResourceEnv.d.ts +2 -2
- package/Common/ResourceEnv.js +11 -10
- package/Common/StackEnv.js +2 -9
- package/Core/KeyGenetators.d.ts +16 -20
- package/Core/KeyGenetators.js +17 -16
- package/Core/Random.d.ts +4 -4
- package/Core/Random.js +10 -10
- package/Core/ResourceGroup.d.ts +12 -6
- package/Core/ResourceGroup.js +12 -24
- package/IOT/Hub/index.d.ts +4 -8
- package/IOT/Hub/index.js +19 -54
- package/KeyVault/Helper.d.ts +8 -6
- package/KeyVault/Helper.js +13 -19
- package/KeyVault/index.d.ts +1 -3
- package/KeyVault/index.js +2 -26
- package/Logs/Helpers.d.ts +35 -25
- package/Logs/Helpers.js +33 -20
- package/Logs/LogAnalytics.d.ts +2 -2
- package/Logs/LogAnalytics.js +15 -6
- package/Logs/index.d.ts +3 -3
- package/Logs/index.js +4 -4
- package/MySql/index.d.ts +2 -3
- package/MySql/index.js +16 -19
- package/{ReadMe.md → README.md} +6 -1
- package/Sql/index.d.ts +15 -9
- package/Sql/index.js +39 -41
- package/Storage/CdnEndpoint.d.ts +2 -2
- package/Storage/CdnEndpoint.js +14 -15
- package/Storage/Helper.d.ts +2 -2
- package/Storage/Helper.js +6 -6
- package/Storage/ManagementRules.d.ts +5 -23
- package/Storage/ManagementRules.js +3 -3
- package/Storage/index.d.ts +3 -3
- package/Storage/index.js +28 -28
- package/VM/AzureDevOpsExtension.d.ts +16 -0
- package/VM/AzureDevOpsExtension.js +14 -0
- package/VM/Extension.d.ts +15 -0
- package/VM/Extension.js +13 -0
- package/VM/GlobalSchedule.d.ts +10 -0
- package/VM/GlobalSchedule.js +20 -0
- package/VM/index.d.ts +18 -18
- package/VM/index.js +94 -57
- package/VNet/Bastion.d.ts +4 -4
- package/VNet/Bastion.js +12 -8
- package/VNet/Firewall.d.ts +19 -12
- package/VNet/Firewall.js +59 -40
- package/VNet/FirewallPolicies/AksFirewallPolicy.d.ts +16 -16
- package/VNet/FirewallPolicies/AksFirewallPolicy.js +193 -220
- package/VNet/FirewallPolicies/CloudPCFirewallPolicy.d.ts +12 -10
- package/VNet/FirewallPolicies/CloudPCFirewallPolicy.js +170 -282
- package/VNet/FirewallPolicies/DefaultFirewallPolicy.d.ts +3 -0
- package/VNet/FirewallPolicies/DefaultFirewallPolicy.js +25 -0
- package/VNet/FirewallPolicies/index.d.ts +4 -0
- package/VNet/FirewallPolicies/index.js +10 -0
- package/VNet/FirewallPolicy.d.ts +14 -11
- package/VNet/FirewallPolicy.js +67 -74
- package/VNet/FirewallRules/AksFirewallRules.d.ts +4 -3
- package/VNet/FirewallRules/AksFirewallRules.js +101 -100
- package/VNet/Helper.d.ts +8 -4
- package/VNet/Helper.js +42 -35
- package/VNet/IpAddress.d.ts +6 -8
- package/VNet/IpAddress.js +6 -11
- package/VNet/IpAddressPrefix.d.ts +12 -9
- package/VNet/IpAddressPrefix.js +14 -13
- package/VNet/NSGRules/AppGatewaySecurityRule.d.ts +9 -0
- package/VNet/NSGRules/AppGatewaySecurityRule.js +46 -0
- package/VNet/NSGRules/AzADSecurityRule.d.ts +6 -0
- package/VNet/NSGRules/AzADSecurityRule.js +39 -0
- package/VNet/NSGRules/BastionSecurityRule.d.ts +9 -0
- package/VNet/NSGRules/BastionSecurityRule.js +93 -0
- package/VNet/NatGateway.d.ts +10 -0
- package/VNet/NatGateway.js +21 -0
- package/VNet/NetworkPeering.d.ts +7 -7
- package/VNet/NetworkPeering.js +29 -20
- package/VNet/PrivateDns.d.ts +8 -10
- package/VNet/PrivateDns.js +12 -14
- package/VNet/PrivateEndpoint.js +5 -2
- package/VNet/RouteTable.d.ts +7 -8
- package/VNet/RouteTable.js +6 -6
- package/VNet/SecurityGroup.d.ts +4 -4
- package/VNet/SecurityGroup.js +7 -3
- package/VNet/Subnet.d.ts +10 -7
- package/VNet/Subnet.js +4 -3
- package/VNet/VPNGateway.d.ts +13 -0
- package/VNet/VPNGateway.js +73 -0
- package/VNet/VirtualWAN.d.ts +7 -10
- package/VNet/VirtualWAN.js +1 -1
- package/VNet/Vnet.d.ts +29 -23
- package/VNet/Vnet.js +58 -121
- package/VNet/index.d.ts +17 -18
- package/VNet/index.js +41 -54
- package/VNet/types.d.ts +94 -0
- package/VNet/types.js +3 -0
- package/Web/types.d.ts +2 -134
- package/package.json +8 -8
- package/types.d.ts +22 -8
- package/z_tests/_tools/Mocks.js +12 -13
- package/Automation/AutoAccount.d.ts +0 -5
- package/Automation/AutoAccount.js +0 -18
- package/AzAd/Identities/AzDevOps.d.ts +0 -23
- package/AzAd/Identities/AzDevOps.js +0 -61
- package/AzAd/KeyVaultRoles.d.ts +0 -8
- package/AzAd/KeyVaultRoles.js +0 -53
- package/AzAd/ManagedIdentity.d.ts +0 -6
- package/AzAd/ManagedIdentity.js +0 -20
- package/AzAd/UserIdentity.d.ts +0 -5
- package/AzAd/UserIdentity.js +0 -12
- package/Common/Naming/AzureRegions.d.ts +0 -4
- package/Common/Naming/AzureRegions.js +0 -49
- package/KeyVault/VaultPermissions.d.ts +0 -27
- package/KeyVault/VaultPermissions.js +0 -226
- package/VNet/FirewallRules/types.d.ts +0 -20
- package/VNet/FirewallRules/types.js +0 -5
- package/VNet/NSGRules/AzADService.d.ts +0 -10
- package/VNet/NSGRules/AzADService.js +0 -45
|
@@ -6,8 +6,8 @@ const Helper_1 = require("../../VNet/Helper");
|
|
|
6
6
|
const StackEnv_1 = require("../../Common/StackEnv");
|
|
7
7
|
const defaultRateLimit = AzureEnv_1.isPrd ? 60 : 120;
|
|
8
8
|
const enableApimEventHub = false;
|
|
9
|
-
const getInMockResponse = ({ code = 200, contentType =
|
|
10
|
-
const getInRewriteUri = ({ template =
|
|
9
|
+
const getInMockResponse = ({ code = 200, contentType = "text/html", }) => ` <mock-response status-code="${code}" content-type="${contentType}" />`;
|
|
10
|
+
const getInRewriteUri = ({ template = "/" }) => ` <rewrite-uri template="${template}" />`;
|
|
11
11
|
const setBaseUrl = ({ url }) => ` <set-backend-service base-url="${url}" />`;
|
|
12
12
|
const getInRateLimit = ({ call = defaultRateLimit, //The number of call in
|
|
13
13
|
period = 60, //1 minute
|
|
@@ -28,12 +28,12 @@ const getOutCache = ({ duration = 60 }) => ` <cache-store duration="${durat
|
|
|
28
28
|
const getInBackendCert = ({ thumbprint }) => ` <authentication-certificate thumbprint="${thumbprint}" />`;
|
|
29
29
|
const getInClientCertValidate = ({ issuer, subject, thumbprint, verifyCert, }) => ` <choose>
|
|
30
30
|
<when condition="@(context.Request.Certificate == null${verifyCert
|
|
31
|
-
?
|
|
32
|
-
:
|
|
31
|
+
? " || !context.Request.Certificate.VerifyNoRevocation()"
|
|
32
|
+
: ""}${issuer ? ` || context.Request.Certificate.Issuer != "${issuer}"` : ""}${subject
|
|
33
33
|
? ` || context.Request.Certificate.SubjectName.Name != "${subject}"`
|
|
34
|
-
:
|
|
34
|
+
: ""}${thumbprint
|
|
35
35
|
? ` || context.Request.Certificate.Thumbprint != "${thumbprint}"`
|
|
36
|
-
:
|
|
36
|
+
: ""})" >
|
|
37
37
|
<return-response>
|
|
38
38
|
<set-status code="403" reason="Invalid client certificate" />
|
|
39
39
|
</return-response>
|
|
@@ -42,10 +42,10 @@ const getInClientCertValidate = ({ issuer, subject, thumbprint, verifyCert, }) =
|
|
|
42
42
|
const getCorsPolicy = ({ origins }) => {
|
|
43
43
|
const orgs = origins
|
|
44
44
|
? origins.map((o) => `<origin>${o}</origin>`)
|
|
45
|
-
: [
|
|
45
|
+
: ["<origin>*</origin>"];
|
|
46
46
|
return `<cors allow-credentials="${Array.isArray(origins)}">
|
|
47
47
|
<allowed-origins>
|
|
48
|
-
${orgs.join(
|
|
48
|
+
${orgs.join("\n")}
|
|
49
49
|
</allowed-origins>
|
|
50
50
|
<allowed-methods preflight-result-max-age="300">
|
|
51
51
|
<method>*</method>
|
|
@@ -70,7 +70,7 @@ const getEventHubPolicy = ({ eventHubName, captureClientCertThumbprint, azFuncUr
|
|
|
70
70
|
<value>${azFuncKey}</value>
|
|
71
71
|
</set-header>
|
|
72
72
|
</send-request>`
|
|
73
|
-
:
|
|
73
|
+
: ""}
|
|
74
74
|
|
|
75
75
|
<log-to-eventhub logger-id="${eventHubName}" partition-id="0">@{
|
|
76
76
|
string accountId = "";
|
|
@@ -106,7 +106,7 @@ ${enableIpStack
|
|
|
106
106
|
ipLocation = (((IResponse)context.Variables["ipstackResponse"]).Body?.As<JObject>()["country_name"]).ToString();
|
|
107
107
|
}
|
|
108
108
|
}catch {}`
|
|
109
|
-
:
|
|
109
|
+
: ""}
|
|
110
110
|
|
|
111
111
|
string clientThumbprint = "";
|
|
112
112
|
${captureClientCertThumbprint
|
|
@@ -120,7 +120,7 @@ ${captureClientCertThumbprint
|
|
|
120
120
|
}
|
|
121
121
|
else{ clientThumbprint = "Not found";}
|
|
122
122
|
`
|
|
123
|
-
:
|
|
123
|
+
: ""}
|
|
124
124
|
|
|
125
125
|
return new JObject(
|
|
126
126
|
new JProperty("MessageId", context.Variables["message-id"]),
|
|
@@ -137,7 +137,6 @@ ${captureClientCertThumbprint
|
|
|
137
137
|
new JProperty("clientThumbprint", clientThumbprint)
|
|
138
138
|
).ToString();
|
|
139
139
|
}</log-to-eventhub>`;
|
|
140
|
-
//console.log(rs);
|
|
141
140
|
return rs;
|
|
142
141
|
};
|
|
143
142
|
/** Validate Client IP Address with configured IP in Token. */
|
|
@@ -195,14 +194,13 @@ const getIPAddressFilterPolicy = () => {
|
|
|
195
194
|
const getIpWhitelistPolicy = ({ ipAddresses }) => {
|
|
196
195
|
const policy = `<ip-filter action="allow">\r\n${ipAddresses
|
|
197
196
|
.map((ip) => {
|
|
198
|
-
if (ip.includes(
|
|
197
|
+
if (ip.includes("/")) {
|
|
199
198
|
const range = (0, Helper_1.getIpsRange)(ip);
|
|
200
199
|
return `<address-range from="${range.first}" to="${range.last}" />`;
|
|
201
200
|
}
|
|
202
201
|
return `<address>${ip}</address>`;
|
|
203
202
|
})
|
|
204
|
-
.join(
|
|
205
|
-
//console.log(policy);
|
|
203
|
+
.join("\r\n")}\r\n</ip-filter>`;
|
|
206
204
|
return policy;
|
|
207
205
|
};
|
|
208
206
|
var SetHeaderTypes;
|
|
@@ -217,31 +215,31 @@ const setHeader = ({ name, type = SetHeaderTypes.delete, value, }) => {
|
|
|
217
215
|
if (value) {
|
|
218
216
|
rs += ` <value>${value}</value>`;
|
|
219
217
|
}
|
|
220
|
-
rs +=
|
|
218
|
+
rs += "</set-header>";
|
|
221
219
|
return rs;
|
|
222
220
|
};
|
|
223
221
|
const checkHeaderPolicy = ({ checkHeaders }) => {
|
|
224
222
|
return checkHeaders
|
|
225
223
|
.map((c) => {
|
|
226
224
|
return `<check-header name="${c.name}" failed-check-httpcode="401" failed-check-error-message="The header ${c.name} is not found" ignore-case="true">
|
|
227
|
-
${c.value ? c.value.map((v) => `<value>${v}</value>`).join(
|
|
225
|
+
${c.value ? c.value.map((v) => `<value>${v}</value>`).join("\n") : ""}
|
|
228
226
|
</check-header>`;
|
|
229
227
|
})
|
|
230
|
-
.join(
|
|
228
|
+
.join("\n");
|
|
231
229
|
};
|
|
232
230
|
/** Set Client IP address to 'x-ts-client-ip' header key */
|
|
233
231
|
const setClientIpHeader = (key = `x-${StackEnv_1.organization}-clientIp`) => setHeader({
|
|
234
232
|
name: key,
|
|
235
|
-
value:
|
|
233
|
+
value: "@(context.Request.IpAddress)",
|
|
236
234
|
type: SetHeaderTypes.override,
|
|
237
235
|
});
|
|
238
236
|
const setFindAndReplaces = (findAndReplaces) => findAndReplaces
|
|
239
237
|
.map((f) => ` <find-and-replace from="${f.from}" to="${f.to}" />`)
|
|
240
|
-
.join(
|
|
238
|
+
.join("\n");
|
|
241
239
|
const getPolicies = ({ enableClientIpHeader = false, findAndReplaces, ...props }) => {
|
|
242
240
|
const inbound = new Array();
|
|
243
241
|
const outbound = new Array();
|
|
244
|
-
const getProps = (p) => (typeof p ===
|
|
242
|
+
const getProps = (p) => (typeof p === "boolean" ? {} : p);
|
|
245
243
|
if (enableClientIpHeader) {
|
|
246
244
|
inbound.push(setClientIpHeader());
|
|
247
245
|
}
|
|
@@ -295,7 +293,7 @@ const getPolicies = ({ enableClientIpHeader = false, findAndReplaces, ...props }
|
|
|
295
293
|
if (props.clientCert) {
|
|
296
294
|
inbound.push(getInClientCertValidate(props.clientCert));
|
|
297
295
|
}
|
|
298
|
-
let backend =
|
|
296
|
+
let backend = "<base />";
|
|
299
297
|
if (!props.mockResponse) {
|
|
300
298
|
backend =
|
|
301
299
|
'<forward-request timeout="120" follow-redirects="true" buffer-request-body="true" fail-on-error-status-code="true"/>';
|
|
@@ -303,7 +301,7 @@ const getPolicies = ({ enableClientIpHeader = false, findAndReplaces, ...props }
|
|
|
303
301
|
return `<policies>
|
|
304
302
|
<inbound>
|
|
305
303
|
<base />
|
|
306
|
-
${inbound.join(
|
|
304
|
+
${inbound.join("\n")}
|
|
307
305
|
</inbound>
|
|
308
306
|
<backend>
|
|
309
307
|
${backend}
|
|
@@ -334,7 +332,7 @@ const getPolicies = ({ enableClientIpHeader = false, findAndReplaces, ...props }
|
|
|
334
332
|
<set-header name="X-Powered-By" exists-action="delete" />
|
|
335
333
|
<set-header name="X-AspNet-Version" exists-action="delete" />
|
|
336
334
|
|
|
337
|
-
${outbound.join(
|
|
335
|
+
${outbound.join("\n")}
|
|
338
336
|
${enableApimEventHub && props.logEventHubName
|
|
339
337
|
? getEventHubPolicy({
|
|
340
338
|
eventHubName: props.logEventHubName,
|
|
@@ -342,7 +340,7 @@ const getPolicies = ({ enableClientIpHeader = false, findAndReplaces, ...props }
|
|
|
342
340
|
azFuncKey: props.azFuncKey,
|
|
343
341
|
captureClientCertThumbprint: props.captureClientCertThumbprint,
|
|
344
342
|
})
|
|
345
|
-
:
|
|
343
|
+
: ""}
|
|
346
344
|
</outbound>
|
|
347
345
|
<on-error>
|
|
348
346
|
<base />
|
|
@@ -353,9 +351,9 @@ const getPolicies = ({ enableClientIpHeader = false, findAndReplaces, ...props }
|
|
|
353
351
|
azFuncKey: props.azFuncKey,
|
|
354
352
|
captureClientCertThumbprint: props.captureClientCertThumbprint,
|
|
355
353
|
})
|
|
356
|
-
:
|
|
354
|
+
: ""}
|
|
357
355
|
</on-error>
|
|
358
356
|
</policies>`;
|
|
359
357
|
};
|
|
360
358
|
exports.getPolicies = getPolicies;
|
|
361
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
359
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"PolicyBuilder.js","sourceRoot":"","sources":["../../../src/Apim/ApiProduct/PolicyBuilder.ts"],"names":[],"mappings":";;;AAAA,oDAA8C;AAC9C,8CAAgD;AAChD,oDAAqD;AAErD,MAAM,gBAAgB,GAAG,gBAAK,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,GAAG,CAAC;AAC1C,MAAM,kBAAkB,GAAG,KAAK,CAAC;AAOjC,MAAM,iBAAiB,GAAG,CAAC,EACzB,IAAI,GAAG,GAAG,EACV,WAAW,GAAG,WAAW,GACf,EAAE,EAAE,CACd,qCAAqC,IAAI,mBAAmB,WAAW,MAAM,CAAC;AAMhF,MAAM,eAAe,GAAG,CAAC,EAAE,QAAQ,GAAG,GAAG,EAAmB,EAAE,EAAE,CAC9D,gCAAgC,QAAQ,MAAM,CAAC;AAMjD,MAAM,UAAU,GAAG,CAAC,EAAE,GAAG,EAAgB,EAAE,EAAE,CAC3C,qCAAqC,GAAG,MAAM,CAAC;AAWjD,MAAM,cAAc,GAAG,CAAC,EACtB,IAAI,GAAG,gBAAgB,EAAE,uBAAuB;AAChD,MAAM,GAAG,EAAE,EAAE,UAAU;AACvB,oBAAoB,GACL,EAAE,EAAE,CACnB,oBAAoB;IAClB,CAAC,CAAC,mCAAmC,IAAI;8BACf,MAAM;;gHAE4E;IAC5G,CAAC,CAAC,mCAAmC,IAAI;8BACf,MAAM;0DACsB,CAAC;AAE3D,MAAM,UAAU,GAAG,GAAG,EAAE,CACtB;;;;gDAI8C,CAAC;AAKjD,MAAM,WAAW,GAAG,CAAC,EAAE,QAAQ,GAAG,EAAE,EAAiB,EAAE,EAAE,CACvD,gCAAgC,QAAQ,MAAM,CAAC;AAMjD,MAAM,gBAAgB,GAAG,CAAC,EAAE,UAAU,EAAiB,EAAE,EAAE,CACzD,iDAAiD,UAAU,MAAM,CAAC;AAQpE,MAAM,uBAAuB,GAAG,CAAC,EAC/B,MAAM,EACN,OAAO,EACP,UAAU,EACV,UAAU,GACM,EAAE,EAAE,CACpB;gEAEQ,UAAU;IACR,CAAC,CAAC,uDAAuD;IACzD,CAAC,CAAC,EACN,GACE,MAAM,CAAC,CAAC,CAAC,8CAA8C,MAAM,GAAG,CAAC,CAAC,CAAC,EACrE,GACE,OAAO;IACL,CAAC,CAAC,wDAAwD,OAAO,GAAG;IACpE,CAAC,CAAC,EACN,GACE,UAAU;IACR,CAAC,CAAC,kDAAkD,UAAU,GAAG;IACjE,CAAC,CAAC,EACN;;;;;cAKM,CAAC;AAMf,MAAM,aAAa,GAAG,CAAC,EAAE,OAAO,EAAa,EAAE,EAAE;IAC/C,MAAM,IAAI,GAAG,OAAO;QAClB,CAAC,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,WAAW,CAAC,WAAW,CAAC;QAC7C,CAAC,CAAC,CAAC,oBAAoB,CAAC,CAAC;IAE3B,OAAO,4BAA4B,KAAK,CAAC,OAAO,CAAC,OAAO,CAAC;;UAEjD,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC;;;;;;;;QAQjB,CAAC;AACT,CAAC,CAAC;AAQF,kBAAkB;AAClB,MAAM,iBAAiB,GAAG,CAAC,EACzB,YAAY,EACZ,2BAA2B,EAC3B,SAAS,EACT,SAAS,GACK,EAAE,EAAE;IAClB,MAAM,aAAa,GAAG,SAAS,IAAI,SAAS,CAAC;IAE7C,MAAM,EAAE,GAAG;;IAGT,aAAa;QACX,CAAC,CAAC;kDAC0C,SAAS;;;;;eAK5C,SAAS;;kBAEN;QACZ,CAAC,CAAC,EACN;;gCAE8B,YAAY;;;;;;;;;;;;;;;;;;;;;;;;;;EA2B1C,aAAa;QACX,CAAC,CAAC;;;;;;gBAMU;QACZ,CAAC,CAAC,EACN;;;EAIE,2BAA2B;QACzB,CAAC,CAAC;;;;;;;;;CASL;QACG,CAAC,CAAC,EACN;;;;;;;;;;;;;;;;sBAgBsB,CAAC;IAErB,OAAO,EAAE,CAAC;AACZ,CAAC,CAAC;AAEF,8DAA8D;AAC9D,MAAM,wBAAwB,GAAG,GAAG,EAAE;IACpC,MAAM,eAAe,GAAG;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;kBA+BR,CAAC;IAEjB,MAAM,gBAAgB,GAAG;;;;;;;;;;;;YAYf,CAAC;IAEX,OAAO;MACH,eAAe;MACf,gBAAgB;GACnB,CAAC;AACJ,CAAC,CAAC;AAMF,MAAM,oBAAoB,GAAG,CAAC,EAAE,WAAW,EAAoB,EAAE,EAAE;IACjE,MAAM,MAAM,GAAG,iCAAiC,WAAW;SACxD,GAAG,CAAC,CAAC,EAAE,EAAE,EAAE;QACV,IAAI,EAAE,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;YACrB,MAAM,KAAK,GAAG,IAAA,oBAAW,EAAC,EAAE,CAAC,CAAC;YAC9B,OAAO,wBAAwB,KAAK,CAAC,KAAK,SAAS,KAAK,CAAC,IAAI,MAAM,CAAC;QACtE,CAAC;QACD,OAAO,YAAY,EAAE,YAAY,CAAC;IACpC,CAAC,CAAC;SACD,IAAI,CAAC,MAAM,CAAC,kBAAkB,CAAC;IAElC,OAAO,MAAM,CAAC;AAChB,CAAC,CAAC;AAEF,IAAY,cAKX;AALD,WAAY,cAAc;IACxB,mCAAiB,CAAA;IACjB,uCAAqB,CAAA;IACrB,+BAAa,CAAA;IACb,mCAAiB,CAAA;AACnB,CAAC,EALW,cAAc,8BAAd,cAAc,QAKzB;AAQD,MAAM,SAAS,GAAG,CAAC,EACjB,IAAI,EACJ,IAAI,GAAG,cAAc,CAAC,MAAM,EAC5B,KAAK,GACU,EAAE,EAAE;IACnB,IAAI,EAAE,GAAG,qBAAqB,IAAI,oBAAoB,IAAI,IAAI,CAAC;IAE/D,IAAI,KAAK,EAAE,CAAC;QACV,EAAE,IAAI,WAAW,KAAK,UAAU,CAAC;IACnC,CAAC;IACD,EAAE,IAAI,eAAe,CAAC;IAEtB,OAAO,EAAE,CAAC;AACZ,CAAC,CAAC;AAMF,MAAM,iBAAiB,GAAG,CAAC,EAAE,YAAY,EAAgB,EAAE,EAAE;IAC3D,OAAO,YAAY;SAChB,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE;QACT,OAAO,uBACL,CAAC,CAAC,IACJ,wEACE,CAAC,CAAC,IACJ;MACA,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,UAAU,CAAC,UAAU,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,EAAE;gBACzD,CAAC;IACb,CAAC,CAAC;SACD,IAAI,CAAC,IAAI,CAAC,CAAC;AAChB,CAAC,CAAC;AAEF,2DAA2D;AAC3D,MAAM,iBAAiB,GAAG,CAAC,MAAc,KAAK,uBAAY,WAAW,EAAE,EAAE,CACvE,SAAS,CAAC;IACR,IAAI,EAAE,GAAG;IACT,KAAK,EAAE,8BAA8B;IACrC,IAAI,EAAE,cAAc,CAAC,QAAQ;CAC9B,CAAC,CAAC;AAEL,MAAM,kBAAkB,GAAG,CACzB,eAAoD,EACpD,EAAE,CACF,eAAe;KACZ,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,4BAA4B,CAAC,CAAC,IAAI,SAAS,CAAC,CAAC,EAAE,MAAM,CAAC;KACjE,IAAI,CAAC,IAAI,CAAC,CAAC;AAiCT,MAAM,WAAW,GAAG,CAAC,EAC1B,oBAAoB,GAAG,KAAK,EAC5B,eAAe,EACf,GAAG,KAAK,EACM,EAAE,EAAE;IAClB,MAAM,OAAO,GAAG,IAAI,KAAK,EAAU,CAAC;IACpC,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAU,CAAC;IAErC,MAAM,QAAQ,GAAG,CAAI,CAAc,EAAE,EAAE,CACrC,CAAC,OAAO,CAAC,KAAK,SAAS,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,CAAM,CAAC;IAEzC,IAAI,oBAAoB,EAAE,CAAC;QACzB,OAAO,CAAC,IAAI,CAAC,iBAAiB,EAAE,CAAC,CAAC;IACpC,CAAC;IACD,IAAI,KAAK,CAAC,UAAU,EAAE,CAAC;QACrB,OAAO,CAAC,IAAI,CAAC,UAAU,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC;IAC7C,CAAC;IACD,IAAI,KAAK,CAAC,UAAU,EAAE,CAAC;QACrB,OAAO,CAAC,IAAI,CAAC,eAAe,CAAC,QAAQ,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC;IAC5D,CAAC;IACD,IAAI,KAAK,CAAC,KAAK,EAAE,CAAC;QAChB,OAAO,CAAC,IAAI,CAAC,UAAU,EAAE,CAAC,CAAC;QAC3B,QAAQ,CAAC,IAAI,CAAC,WAAW,CAAC,QAAQ,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;IACpD,CAAC;IACD,IAAI,KAAK,CAAC,YAAY,EAAE,CAAC;QACvB,OAAO,CAAC,IAAI,CAAC,iBAAiB,CAAC,QAAQ,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC;IAChE,CAAC;IACD,IAAI,KAAK,CAAC,SAAS,EAAE,CAAC;QACpB,OAAO,CAAC,IAAI,CAAC,cAAc,CAAC,QAAQ,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC;IAC1D,CAAC;IAED,IAAI,KAAK,CAAC,WAAW,EAAE,CAAC;QACtB,OAAO,CAAC,IAAI,CAAC,gBAAgB,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC;IACpD,CAAC;IAED,IAAI,KAAK,CAAC,IAAI,EAAE,CAAC;QACf,OAAO,CAAC,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;IACpD,CAAC;IAED,IAAI,KAAK,CAAC,QAAQ,EAAE,CAAC;QACnB,OAAO,CAAC,IAAI,CAAC,wBAAwB,EAAE,CAAC,CAAC;IAC3C,CAAC;IAED,IAAI,KAAK,CAAC,YAAY,EAAE,CAAC;QACvB,OAAO,CAAC,IAAI,CAAC,oBAAoB,CAAC,EAAE,WAAW,EAAE,KAAK,CAAC,YAAY,EAAE,CAAC,CAAC,CAAC;IAC1E,CAAC;IAED,IAAI,KAAK,CAAC,UAAU,EAAE,CAAC;QACrB,MAAM,KAAK,GAAG,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,UAAU,CAAC;YAC3C,CAAC,CAAC,KAAK,CAAC,UAAU;YAClB,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC;QAEvB,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,OAAO,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;IACnD,CAAC;IAED,IAAI,KAAK,CAAC,YAAY,EAAE,CAAC;QACvB,OAAO,CAAC,IAAI,CAAC,iBAAiB,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC;IACtD,CAAC;IAED,IAAI,eAAe,EAAE,CAAC;QACpB,QAAQ,CAAC,IAAI,CAAC,kBAAkB,CAAC,eAAe,CAAC,CAAC,CAAC;IACrD,CAAC;IAED,IAAI,KAAK,CAAC,mBAAmB,EAAE,CAAC;QAC9B,OAAO,CAAC,IAAI,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC;IAC1C,CAAC;IACD,IAAI,KAAK,CAAC,eAAe,EAAE,CAAC;QAC1B,QAAQ,CAAC,IAAI,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC;IACvC,CAAC;IACD,oDAAoD;IACpD,IAAI,KAAK,CAAC,UAAU,EAAE,CAAC;QACrB,OAAO,CAAC,IAAI,CAAC,uBAAuB,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC;IAC1D,CAAC;IAED,IAAI,OAAO,GAAG,UAAU,CAAC;IAEzB,IAAI,CAAC,KAAK,CAAC,YAAY,EAAE,CAAC;QACxB,OAAO;YACL,sHAAsH,CAAC;IAC3H,CAAC;IAED,OAAO;;;QAGD,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC;;;QAGlB,OAAO;;;;;;;;;;;;;;;;;;;;;;;;;;;;QA4BP,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC;QAEnB,kBAAkB,IAAI,KAAK,CAAC,eAAe;QACzC,CAAC,CAAC,iBAAiB,CAAC;YAChB,YAAY,EAAE,KAAK,CAAC,eAAe;YACnC,SAAS,EAAE,KAAK,CAAC,SAAS;YAC1B,SAAS,EAAE,KAAK,CAAC,SAAS;YAC1B,2BAA2B,EAAE,KAAK,CAAC,2BAA2B;SAC/D,CAAC;QACJ,CAAC,CAAC,EACN;;;;QAKE,kBAAkB,IAAI,KAAK,CAAC,eAAe;QACzC,CAAC,CAAC,iBAAiB,CAAC;YAChB,YAAY,EAAE,KAAK,CAAC,eAAe;YACnC,SAAS,EAAE,KAAK,CAAC,SAAS;YAC1B,SAAS,EAAE,KAAK,CAAC,SAAS;YAC1B,2BAA2B,EAAE,KAAK,CAAC,2BAA2B;SAC/D,CAAC;QACJ,CAAC,CAAC,EACN;;YAEM,CAAC;AACb,CAAC,CAAC;AA7IW,QAAA,WAAW,eA6ItB"}
|
|
@@ -12,14 +12,12 @@ const removeVersion = (data, version) => {
|
|
|
12
12
|
//Replace version from path
|
|
13
13
|
Object.keys(data.paths).forEach((k) => {
|
|
14
14
|
const newKey = (0, Helpers_1.replaceAll)(k, `/${version}`, "");
|
|
15
|
-
//console.log('Replaced: ', { current: k, new: newKey });
|
|
16
15
|
newPaths[newKey] = data.paths[k];
|
|
17
16
|
});
|
|
18
17
|
data.paths = newPaths;
|
|
19
18
|
return data;
|
|
20
19
|
};
|
|
21
20
|
const downloadSpecFile = async (fileUrl) => {
|
|
22
|
-
//console.log('Downloading Specs Url', fileUrl);
|
|
23
21
|
try {
|
|
24
22
|
//Get specs json from URL
|
|
25
23
|
const specs = await axios_1.default.get(fileUrl);
|
|
@@ -41,4 +39,4 @@ const getImportConfig = async (specUrl, version) => {
|
|
|
41
39
|
return JSON.stringify(data);
|
|
42
40
|
};
|
|
43
41
|
exports.getImportConfig = getImportConfig;
|
|
44
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
42
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1,6 +1,6 @@
|
|
|
1
|
-
import { ProductProps } from
|
|
2
|
-
import { ApiProps } from
|
|
3
|
-
interface Props extends ProductProps, Omit<ApiProps,
|
|
1
|
+
import { ProductProps } from "./Product";
|
|
2
|
+
import { ApiProps } from "./Api";
|
|
3
|
+
interface Props extends ProductProps, Omit<ApiProps, "product"> {
|
|
4
4
|
}
|
|
5
5
|
declare const _default: ({ name, apimInfo, subscriptionRequired, vaultInfo, ...others }: Props) => Promise<{
|
|
6
6
|
set: import("@pulumi/azure-native/apimanagement/apiVersionSet").ApiVersionSet | undefined;
|
package/Apim/ApiProduct/index.js
CHANGED
|
@@ -9,7 +9,6 @@ exports.default = async ({ name, apimInfo, subscriptionRequired, vaultInfo, ...o
|
|
|
9
9
|
vaultInfo,
|
|
10
10
|
subscriptionRequired,
|
|
11
11
|
});
|
|
12
|
-
product.name.apply(console.log);
|
|
13
12
|
const api = (0, Api_1.createApi)({
|
|
14
13
|
name,
|
|
15
14
|
apimInfo,
|
|
@@ -19,4 +18,4 @@ exports.default = async ({ name, apimInfo, subscriptionRequired, vaultInfo, ...o
|
|
|
19
18
|
});
|
|
20
19
|
return { product, ...api };
|
|
21
20
|
};
|
|
22
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
21
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
import { BasicResourceArgs, KeyVaultInfo } from "../types";
|
|
2
|
+
interface Props extends BasicResourceArgs {
|
|
3
|
+
enableEncryption?: boolean;
|
|
4
|
+
vaultInfo: KeyVaultInfo;
|
|
5
|
+
}
|
|
6
|
+
declare const _default: ({ name, group, enableEncryption, vaultInfo, dependsOn, ignoreChanges, }: Props) => import("@pulumi/azure-native/automation/automationAccount").AutomationAccount;
|
|
7
|
+
export default _default;
|
|
@@ -0,0 +1,55 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
const automation = require("@pulumi/azure-native/automation");
|
|
4
|
+
const Naming_1 = require("../Common/Naming");
|
|
5
|
+
const Helper_1 = require("../KeyVault/Helper");
|
|
6
|
+
const UserAssignedIdentity_1 = require("../AzAd/UserAssignedIdentity");
|
|
7
|
+
const AzureEnv_1 = require("../Common/AzureEnv");
|
|
8
|
+
const Helper_2 = require("../AzAd/Helper");
|
|
9
|
+
exports.default = ({ name, group, enableEncryption, vaultInfo, dependsOn, ignoreChanges, }) => {
|
|
10
|
+
name = (0, Naming_1.getAutomationAccountName)(name);
|
|
11
|
+
const encryption = enableEncryption
|
|
12
|
+
? (0, Helper_1.getEncryptionKeyOutput)(name, vaultInfo)
|
|
13
|
+
: undefined;
|
|
14
|
+
const roles = [{ name: "Contributor", scope: AzureEnv_1.defaultScope }];
|
|
15
|
+
const identity = (0, UserAssignedIdentity_1.default)({
|
|
16
|
+
name,
|
|
17
|
+
group,
|
|
18
|
+
roles,
|
|
19
|
+
dependsOn,
|
|
20
|
+
});
|
|
21
|
+
//TODO: Add this identity into a vault reader role.
|
|
22
|
+
const auto = new automation.AutomationAccount(name, {
|
|
23
|
+
automationAccountName: name,
|
|
24
|
+
...group,
|
|
25
|
+
publicNetworkAccess: false,
|
|
26
|
+
identity: {
|
|
27
|
+
type: automation.ResourceIdentityType.SystemAssigned_UserAssigned,
|
|
28
|
+
userAssignedIdentities: [identity.id],
|
|
29
|
+
},
|
|
30
|
+
disableLocalAuth: true,
|
|
31
|
+
encryption: {
|
|
32
|
+
keySource: encryption ? "Microsoft.Keyvault" : "Microsoft.Automation",
|
|
33
|
+
identity: encryption
|
|
34
|
+
? { userAssignedIdentity: [identity.id] }
|
|
35
|
+
: undefined,
|
|
36
|
+
keyVaultProperties: encryption
|
|
37
|
+
? {
|
|
38
|
+
keyName: encryption.apply((s) => s.keyName),
|
|
39
|
+
keyvaultUri: encryption.apply((s) => s.keyVaultUri),
|
|
40
|
+
keyVersion: encryption.apply((s) => s.keyVersion),
|
|
41
|
+
}
|
|
42
|
+
: undefined,
|
|
43
|
+
},
|
|
44
|
+
sku: {
|
|
45
|
+
name: "Basic",
|
|
46
|
+
},
|
|
47
|
+
}, { dependsOn: identity, ignoreChanges });
|
|
48
|
+
auto.identity.apply((i) => (0, Helper_2.grantIdentityPermissions)({
|
|
49
|
+
name,
|
|
50
|
+
roles,
|
|
51
|
+
principalId: i.principalId,
|
|
52
|
+
}));
|
|
53
|
+
return auto;
|
|
54
|
+
};
|
|
55
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -0,0 +1,12 @@
|
|
|
1
|
+
import { EnvRoleKeyTypes, EnvRolesResults } from "./EnvRoles";
|
|
2
|
+
import { RoleAssignmentProps } from "./RoleAssignment";
|
|
3
|
+
export type RoleEnableTypes = {
|
|
4
|
+
enableRGRoles?: boolean;
|
|
5
|
+
enableAksRoles?: boolean;
|
|
6
|
+
enableIotRoles?: boolean;
|
|
7
|
+
enableVaultRoles?: boolean;
|
|
8
|
+
};
|
|
9
|
+
export declare const getRoleNames: ({ enableRGRoles, enableIotRoles, enableVaultRoles, enableAksRoles, }: RoleEnableTypes) => Record<EnvRoleKeyTypes, string[]>;
|
|
10
|
+
export declare const grantEnvRolesAccess: ({ name, dependsOn, scope, envRoles, ...others }: RoleEnableTypes & Omit<RoleAssignmentProps, "roleName" | "principalType" | "principalId"> & {
|
|
11
|
+
envRoles: EnvRolesResults;
|
|
12
|
+
}) => void;
|
|
@@ -0,0 +1,125 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.grantEnvRolesAccess = exports.getRoleNames = void 0;
|
|
4
|
+
const RoleAssignment_1 = require("./RoleAssignment");
|
|
5
|
+
const Helpers_1 = require("../Common/Helpers");
|
|
6
|
+
const RGRoleNames = {
|
|
7
|
+
readOnly: ["Reader"],
|
|
8
|
+
contributor: ["Contributor"],
|
|
9
|
+
admin: ["Owner"],
|
|
10
|
+
};
|
|
11
|
+
const AksRoleNames = {
|
|
12
|
+
readOnly: [
|
|
13
|
+
"Azure Kubernetes Service Cluster User Role",
|
|
14
|
+
"Azure Kubernetes Service Cluster Monitoring User",
|
|
15
|
+
],
|
|
16
|
+
contributor: [
|
|
17
|
+
"Azure Kubernetes Service Contributor Role",
|
|
18
|
+
"Azure Kubernetes Service Cluster User Role",
|
|
19
|
+
"Azure Kubernetes Service Cluster Monitoring User",
|
|
20
|
+
"Azure Kubernetes Service RBAC Reader",
|
|
21
|
+
],
|
|
22
|
+
admin: [
|
|
23
|
+
"Azure Kubernetes Service Contributor Role",
|
|
24
|
+
"Azure Kubernetes Service RBAC Cluster Admin",
|
|
25
|
+
"Azure Kubernetes Service Cluster Admin Role",
|
|
26
|
+
"Azure Kubernetes Service Cluster Monitoring User",
|
|
27
|
+
"Azure Kubernetes Service Cluster User Role",
|
|
28
|
+
],
|
|
29
|
+
};
|
|
30
|
+
const IOTHubRoleNames = {
|
|
31
|
+
readOnly: ["IoT Hub Data Reader"],
|
|
32
|
+
contributor: ["IoT Hub Data Contributor"],
|
|
33
|
+
admin: ["IoT Hub Registry Contributor", "IoT Hub Twin Contributor"],
|
|
34
|
+
};
|
|
35
|
+
const KeyVaultRoleNames = {
|
|
36
|
+
readOnly: [
|
|
37
|
+
"Key Vault Crypto Service Encryption User",
|
|
38
|
+
"Key Vault Crypto Service Release User",
|
|
39
|
+
"Key Vault Secrets User",
|
|
40
|
+
"Key Vault Crypto User",
|
|
41
|
+
"Key Vault Certificate User",
|
|
42
|
+
"Key Vault Reader",
|
|
43
|
+
],
|
|
44
|
+
contributor: [
|
|
45
|
+
"Key Vault Certificates Officer",
|
|
46
|
+
"Key Vault Crypto Officer",
|
|
47
|
+
"Key Vault Secrets Officer",
|
|
48
|
+
"Key Vault Contributor",
|
|
49
|
+
],
|
|
50
|
+
admin: ["Key Vault Administrator", "Key Vault Data Access Administrator"],
|
|
51
|
+
};
|
|
52
|
+
const getRoleNames = ({ enableRGRoles, enableIotRoles, enableVaultRoles, enableAksRoles, }) => {
|
|
53
|
+
const rs = {
|
|
54
|
+
readOnly: new Set(),
|
|
55
|
+
admin: new Set(),
|
|
56
|
+
contributor: new Set(),
|
|
57
|
+
};
|
|
58
|
+
if (enableIotRoles) {
|
|
59
|
+
IOTHubRoleNames.readOnly.forEach((r) => rs.readOnly.add(r));
|
|
60
|
+
IOTHubRoleNames.contributor.forEach((r) => rs.contributor.add(r));
|
|
61
|
+
IOTHubRoleNames.admin.forEach((r) => rs.admin.add(r));
|
|
62
|
+
}
|
|
63
|
+
if (enableRGRoles) {
|
|
64
|
+
RGRoleNames.readOnly.forEach((r) => rs.readOnly.add(r));
|
|
65
|
+
RGRoleNames.contributor.forEach((r) => rs.contributor.add(r));
|
|
66
|
+
RGRoleNames.admin.forEach((r) => rs.admin.add(r));
|
|
67
|
+
}
|
|
68
|
+
if (enableVaultRoles) {
|
|
69
|
+
KeyVaultRoleNames.readOnly.forEach((r) => rs.readOnly.add(r));
|
|
70
|
+
KeyVaultRoleNames.contributor.forEach((r) => rs.contributor.add(r));
|
|
71
|
+
KeyVaultRoleNames.admin.forEach((r) => rs.admin.add(r));
|
|
72
|
+
}
|
|
73
|
+
if (enableAksRoles) {
|
|
74
|
+
AksRoleNames.readOnly.forEach((r) => rs.readOnly.add(r));
|
|
75
|
+
AksRoleNames.contributor.forEach((r) => rs.contributor.add(r));
|
|
76
|
+
AksRoleNames.admin.forEach((r) => rs.admin.add(r));
|
|
77
|
+
}
|
|
78
|
+
return {
|
|
79
|
+
readOnly: Array.from(rs.readOnly).sort(),
|
|
80
|
+
admin: Array.from(rs.admin).sort(),
|
|
81
|
+
contributor: Array.from(rs.contributor).sort(),
|
|
82
|
+
};
|
|
83
|
+
};
|
|
84
|
+
exports.getRoleNames = getRoleNames;
|
|
85
|
+
const grantEnvRolesAccess = ({ name, dependsOn, scope, envRoles, ...others }) => {
|
|
86
|
+
const roles = (0, exports.getRoleNames)(others);
|
|
87
|
+
//ReadOnly
|
|
88
|
+
roles.readOnly.forEach((r) => {
|
|
89
|
+
const n = `${name}-readonly-${(0, Helpers_1.replaceAll)(r, " ", "")}`;
|
|
90
|
+
(0, RoleAssignment_1.roleAssignment)({
|
|
91
|
+
name: n,
|
|
92
|
+
principalId: envRoles.readOnly.objectId,
|
|
93
|
+
principalType: "Group",
|
|
94
|
+
roleName: r,
|
|
95
|
+
scope,
|
|
96
|
+
dependsOn,
|
|
97
|
+
});
|
|
98
|
+
});
|
|
99
|
+
//Contributors
|
|
100
|
+
roles.contributor.forEach((r) => {
|
|
101
|
+
const n = `${name}-contributor-${(0, Helpers_1.replaceAll)(r, " ", "")}`;
|
|
102
|
+
(0, RoleAssignment_1.roleAssignment)({
|
|
103
|
+
name: n,
|
|
104
|
+
principalId: envRoles.contributor.objectId,
|
|
105
|
+
principalType: "Group",
|
|
106
|
+
roleName: r,
|
|
107
|
+
scope,
|
|
108
|
+
dependsOn,
|
|
109
|
+
});
|
|
110
|
+
});
|
|
111
|
+
//Admin
|
|
112
|
+
roles.admin.forEach((r) => {
|
|
113
|
+
const n = `${name}-admin-${(0, Helpers_1.replaceAll)(r, " ", "")}`;
|
|
114
|
+
(0, RoleAssignment_1.roleAssignment)({
|
|
115
|
+
name: n,
|
|
116
|
+
principalId: envRoles.admin.objectId,
|
|
117
|
+
principalType: "Group",
|
|
118
|
+
roleName: r,
|
|
119
|
+
scope,
|
|
120
|
+
dependsOn,
|
|
121
|
+
});
|
|
122
|
+
});
|
|
123
|
+
};
|
|
124
|
+
exports.grantEnvRolesAccess = grantEnvRolesAccess;
|
|
125
|
+
//# sourceMappingURL=data:application/json;base64,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
|
package/AzAd/EnvRoles.d.ts
CHANGED
|
@@ -1,18 +1,19 @@
|
|
|
1
|
-
import {
|
|
2
|
-
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
1
|
+
import { KeyVaultInfo } from "../types";
|
|
2
|
+
import { Output } from "@pulumi/pulumi";
|
|
3
|
+
export type EnvRoleKeyTypes = "readOnly" | "contributor" | "admin";
|
|
4
|
+
type EnvRoleInfoType = {
|
|
5
|
+
objectId: string;
|
|
6
|
+
displayName: string;
|
|
6
7
|
};
|
|
7
|
-
export type
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
export declare const getEnvRoleNames: () => EnvRoleNamesType;
|
|
11
|
-
export declare const createEnvRoles: ({ addAdoIdentityMember, }: {
|
|
12
|
-
addAdoIdentityMember?: boolean;
|
|
13
|
-
}) => {
|
|
14
|
-
adminGroup: import("@pulumi/pulumi").Output<import("@pulumi/azuread/group").Group>;
|
|
15
|
-
contributorGroup: import("@pulumi/pulumi").Output<import("@pulumi/azuread/group").Group>;
|
|
16
|
-
readOnlyGroup: import("@pulumi/pulumi").Output<import("@pulumi/azuread/group").Group>;
|
|
8
|
+
export type EnvRolesResults = Record<EnvRoleKeyTypes, Output<EnvRoleInfoType> | EnvRoleInfoType>;
|
|
9
|
+
export declare const createEnvRoles: () => Record<EnvRoleKeyTypes, Output<EnvRoleInfoType>> & {
|
|
10
|
+
addRolesToVault: (vaultInfo: KeyVaultInfo) => void;
|
|
17
11
|
};
|
|
12
|
+
/** Get Single Env Role Object */
|
|
13
|
+
export declare const getEnvRole: (name: string, vaultInfo: KeyVaultInfo) => Promise<{
|
|
14
|
+
displayName: string;
|
|
15
|
+
objectId: string;
|
|
16
|
+
}>;
|
|
17
|
+
/** Get All Env Role Objects */
|
|
18
|
+
export declare const getEnvRolesOutput: (vaultInfo: KeyVaultInfo) => EnvRolesResults;
|
|
18
19
|
export {};
|