@drunk-pulumi/azure 0.0.37 → 0.0.38

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (176) hide show
  1. package/Aks/Helper.d.ts +6 -11
  2. package/Aks/Helper.js +40 -65
  3. package/Aks/Identity.d.ts +3 -10
  4. package/Aks/Identity.js +9 -8
  5. package/Aks/index.d.ts +67 -71
  6. package/Aks/index.js +198 -314
  7. package/Apim/ApiProduct/PolicyBuilder.js +25 -27
  8. package/Apim/ApiProduct/SwaggerHelper.js +1 -3
  9. package/Apim/ApiProduct/index.d.ts +3 -3
  10. package/Apim/ApiProduct/index.js +1 -2
  11. package/Automation/index.d.ts +7 -0
  12. package/Automation/index.js +55 -0
  13. package/AzAd/EnvRoles.Consts.d.ts +12 -0
  14. package/AzAd/EnvRoles.Consts.js +125 -0
  15. package/AzAd/EnvRoles.d.ts +16 -15
  16. package/AzAd/EnvRoles.js +69 -47
  17. package/AzAd/GraphDefinition.d.ts +2 -2
  18. package/AzAd/GraphDefinition.js +3055 -3056
  19. package/AzAd/Helper.d.ts +24 -13
  20. package/AzAd/Helper.js +98 -25
  21. package/AzAd/Identities/AzDevOpsIdentity.d.ts +12 -0
  22. package/AzAd/Identities/AzDevOpsIdentity.js +32 -0
  23. package/AzAd/Identities/AzDevOpsManagedIdentity.d.ts +7 -0
  24. package/AzAd/Identities/AzDevOpsManagedIdentity.js +15 -0
  25. package/AzAd/Identities/AzUserAdRevertSync.d.ts +2 -9
  26. package/AzAd/Identities/AzUserAdRevertSync.js +4 -5
  27. package/AzAd/Identities/index.d.ts +3 -0
  28. package/AzAd/Identities/index.js +10 -0
  29. package/AzAd/Identity.d.ts +10 -22
  30. package/AzAd/Identity.js +50 -61
  31. package/AzAd/Role.d.ts +2 -3
  32. package/AzAd/Role.js +4 -5
  33. package/AzAd/RoleAssignment.d.ts +34 -5
  34. package/AzAd/RoleAssignment.js +2 -2
  35. package/AzAd/RoleDefinitions/JustInTimeRequestRole.d.ts +2 -0
  36. package/AzAd/RoleDefinitions/JustInTimeRequestRole.js +25 -0
  37. package/AzAd/RolesBuiltIn.d.ts +29 -0
  38. package/AzAd/RolesBuiltIn.js +13034 -8058
  39. package/AzAd/UserAssignedIdentity.d.ts +6 -0
  40. package/AzAd/UserAssignedIdentity.js +27 -0
  41. package/Builder/AksBuilder.d.ts +3 -0
  42. package/Builder/AksBuilder.js +95 -0
  43. package/Builder/VnetBuilder.d.ts +3 -0
  44. package/Builder/VnetBuilder.js +279 -0
  45. package/Builder/index.d.ts +2 -0
  46. package/Builder/index.js +8 -0
  47. package/Builder/types.d.ts +120 -0
  48. package/Builder/types.js +18 -0
  49. package/Certificate/index.d.ts +1 -1
  50. package/Certificate/index.js +26 -28
  51. package/Common/AutoTags.js +2 -2
  52. package/Common/AzureEnv.d.ts +4 -3
  53. package/Common/AzureEnv.js +31 -24
  54. package/Common/GlobalEnv.d.ts +1 -2
  55. package/Common/GlobalEnv.js +7 -7
  56. package/Common/Location.d.ts +3 -3
  57. package/Common/Location.js +22 -9
  58. package/Common/LocationBuiltIn.d.ts +6 -81
  59. package/Common/LocationBuiltIn.js +491 -1923
  60. package/Common/Naming/index.d.ts +6 -4
  61. package/Common/Naming/index.js +64 -60
  62. package/Common/ResourceEnv.d.ts +2 -2
  63. package/Common/ResourceEnv.js +11 -10
  64. package/Common/StackEnv.js +2 -9
  65. package/Core/KeyGenetators.d.ts +16 -20
  66. package/Core/KeyGenetators.js +17 -16
  67. package/Core/Random.d.ts +4 -4
  68. package/Core/Random.js +10 -10
  69. package/Core/ResourceGroup.d.ts +12 -6
  70. package/Core/ResourceGroup.js +12 -24
  71. package/IOT/Hub/index.d.ts +4 -8
  72. package/IOT/Hub/index.js +19 -54
  73. package/KeyVault/Helper.d.ts +8 -6
  74. package/KeyVault/Helper.js +13 -19
  75. package/KeyVault/index.d.ts +1 -3
  76. package/KeyVault/index.js +2 -26
  77. package/Logs/Helpers.d.ts +35 -25
  78. package/Logs/Helpers.js +33 -20
  79. package/Logs/LogAnalytics.d.ts +2 -2
  80. package/Logs/LogAnalytics.js +15 -6
  81. package/Logs/index.d.ts +3 -3
  82. package/Logs/index.js +4 -4
  83. package/MySql/index.d.ts +2 -3
  84. package/MySql/index.js +16 -19
  85. package/{ReadMe.md → README.md} +6 -1
  86. package/Sql/index.d.ts +15 -9
  87. package/Sql/index.js +39 -41
  88. package/Storage/CdnEndpoint.d.ts +2 -2
  89. package/Storage/CdnEndpoint.js +14 -15
  90. package/Storage/Helper.d.ts +2 -2
  91. package/Storage/Helper.js +6 -6
  92. package/Storage/ManagementRules.d.ts +5 -23
  93. package/Storage/ManagementRules.js +3 -3
  94. package/Storage/index.d.ts +3 -3
  95. package/Storage/index.js +28 -28
  96. package/VM/AzureDevOpsExtension.d.ts +16 -0
  97. package/VM/AzureDevOpsExtension.js +14 -0
  98. package/VM/Extension.d.ts +15 -0
  99. package/VM/Extension.js +13 -0
  100. package/VM/GlobalSchedule.d.ts +10 -0
  101. package/VM/GlobalSchedule.js +20 -0
  102. package/VM/index.d.ts +18 -18
  103. package/VM/index.js +94 -57
  104. package/VNet/Bastion.d.ts +4 -4
  105. package/VNet/Bastion.js +12 -8
  106. package/VNet/Firewall.d.ts +19 -12
  107. package/VNet/Firewall.js +59 -40
  108. package/VNet/FirewallPolicies/AksFirewallPolicy.d.ts +16 -16
  109. package/VNet/FirewallPolicies/AksFirewallPolicy.js +193 -220
  110. package/VNet/FirewallPolicies/CloudPCFirewallPolicy.d.ts +12 -10
  111. package/VNet/FirewallPolicies/CloudPCFirewallPolicy.js +170 -282
  112. package/VNet/FirewallPolicies/DefaultFirewallPolicy.d.ts +3 -0
  113. package/VNet/FirewallPolicies/DefaultFirewallPolicy.js +25 -0
  114. package/VNet/FirewallPolicies/index.d.ts +4 -0
  115. package/VNet/FirewallPolicies/index.js +10 -0
  116. package/VNet/FirewallPolicy.d.ts +14 -11
  117. package/VNet/FirewallPolicy.js +67 -74
  118. package/VNet/FirewallRules/AksFirewallRules.d.ts +4 -3
  119. package/VNet/FirewallRules/AksFirewallRules.js +101 -100
  120. package/VNet/Helper.d.ts +8 -4
  121. package/VNet/Helper.js +42 -35
  122. package/VNet/IpAddress.d.ts +6 -8
  123. package/VNet/IpAddress.js +6 -11
  124. package/VNet/IpAddressPrefix.d.ts +12 -9
  125. package/VNet/IpAddressPrefix.js +14 -13
  126. package/VNet/NSGRules/AppGatewaySecurityRule.d.ts +9 -0
  127. package/VNet/NSGRules/AppGatewaySecurityRule.js +46 -0
  128. package/VNet/NSGRules/AzADSecurityRule.d.ts +6 -0
  129. package/VNet/NSGRules/AzADSecurityRule.js +39 -0
  130. package/VNet/NSGRules/BastionSecurityRule.d.ts +9 -0
  131. package/VNet/NSGRules/BastionSecurityRule.js +93 -0
  132. package/VNet/NatGateway.d.ts +10 -0
  133. package/VNet/NatGateway.js +21 -0
  134. package/VNet/NetworkPeering.d.ts +7 -7
  135. package/VNet/NetworkPeering.js +29 -20
  136. package/VNet/PrivateDns.d.ts +8 -10
  137. package/VNet/PrivateDns.js +12 -14
  138. package/VNet/PrivateEndpoint.js +5 -2
  139. package/VNet/RouteTable.d.ts +7 -8
  140. package/VNet/RouteTable.js +6 -6
  141. package/VNet/SecurityGroup.d.ts +4 -4
  142. package/VNet/SecurityGroup.js +7 -3
  143. package/VNet/Subnet.d.ts +10 -7
  144. package/VNet/Subnet.js +4 -3
  145. package/VNet/VPNGateway.d.ts +13 -0
  146. package/VNet/VPNGateway.js +73 -0
  147. package/VNet/VirtualWAN.d.ts +7 -10
  148. package/VNet/VirtualWAN.js +1 -1
  149. package/VNet/Vnet.d.ts +29 -23
  150. package/VNet/Vnet.js +58 -121
  151. package/VNet/index.d.ts +17 -18
  152. package/VNet/index.js +41 -54
  153. package/VNet/types.d.ts +94 -0
  154. package/VNet/types.js +3 -0
  155. package/Web/types.d.ts +2 -134
  156. package/package.json +8 -8
  157. package/types.d.ts +22 -8
  158. package/z_tests/_tools/Mocks.js +12 -13
  159. package/Automation/AutoAccount.d.ts +0 -5
  160. package/Automation/AutoAccount.js +0 -18
  161. package/AzAd/Identities/AzDevOps.d.ts +0 -23
  162. package/AzAd/Identities/AzDevOps.js +0 -61
  163. package/AzAd/KeyVaultRoles.d.ts +0 -8
  164. package/AzAd/KeyVaultRoles.js +0 -53
  165. package/AzAd/ManagedIdentity.d.ts +0 -6
  166. package/AzAd/ManagedIdentity.js +0 -20
  167. package/AzAd/UserIdentity.d.ts +0 -5
  168. package/AzAd/UserIdentity.js +0 -12
  169. package/Common/Naming/AzureRegions.d.ts +0 -4
  170. package/Common/Naming/AzureRegions.js +0 -49
  171. package/KeyVault/VaultPermissions.d.ts +0 -27
  172. package/KeyVault/VaultPermissions.js +0 -226
  173. package/VNet/FirewallRules/types.d.ts +0 -20
  174. package/VNet/FirewallRules/types.js +0 -5
  175. package/VNet/NSGRules/AzADService.d.ts +0 -10
  176. package/VNet/NSGRules/AzADService.js +0 -45
@@ -0,0 +1,6 @@
1
+ import { BasicResourceArgs, IdentityRoleAssignment } from "../types";
2
+ interface Props extends BasicResourceArgs, IdentityRoleAssignment {
3
+ lock?: boolean;
4
+ }
5
+ declare const _default: ({ name, group, lock, roles, envRole, vaultInfo, dependsOn, importUri, ignoreChanges, }: Props) => import("@pulumi/azure-native/managedidentity/userAssignedIdentity").UserAssignedIdentity;
6
+ export default _default;
@@ -0,0 +1,27 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ const azure = require("@pulumi/azure-native");
4
+ const Naming_1 = require("../Common/Naming");
5
+ const Locker_1 = require("../Core/Locker");
6
+ const Helper_1 = require("./Helper");
7
+ exports.default = ({ name, group, lock, roles, envRole, vaultInfo, dependsOn, importUri, ignoreChanges, }) => {
8
+ name = (0, Naming_1.getManagedIdentityName)(name);
9
+ const managedIdentity = new azure.managedidentity.UserAssignedIdentity(name, {
10
+ resourceName: name,
11
+ ...group,
12
+ }, { dependsOn, import: importUri, ignoreChanges });
13
+ (0, Helper_1.grantIdentityPermissions)({
14
+ name,
15
+ envRole,
16
+ roles,
17
+ vaultInfo,
18
+ principalId: managedIdentity.principalId,
19
+ });
20
+ if (lock)
21
+ (0, Locker_1.default)({
22
+ name,
23
+ resource: managedIdentity,
24
+ });
25
+ return managedIdentity;
26
+ };
27
+ //# sourceMappingURL=data:application/json;base64,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
@@ -0,0 +1,3 @@
1
+ import { AksBuilderProps, ISshBuilder } from "./types";
2
+ declare const _default: (props: AksBuilderProps) => ISshBuilder;
3
+ export default _default;
@@ -0,0 +1,95 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ const types_1 = require("./types");
4
+ const KeyGenetators_1 = require("../Core/KeyGenetators");
5
+ const containerservice_1 = require("@pulumi/azure-native/containerservice");
6
+ const Aks_1 = require("../Aks");
7
+ class AksBuilder extends types_1.ResourcesBuilderAsync {
8
+ //Instances
9
+ _sshInstance = undefined;
10
+ _askInstance = undefined;
11
+ //Props
12
+ _sshProps = undefined;
13
+ _nodePoolsProps = [];
14
+ _addonProps = undefined;
15
+ _featureProps = undefined;
16
+ _authProps = undefined;
17
+ _tier = containerservice_1.ManagedClusterSKUTier.Free;
18
+ _networkProps = undefined;
19
+ _defaultNode = undefined;
20
+ _importProps = undefined;
21
+ constructor({ ...others }) {
22
+ super(others);
23
+ }
24
+ //Info collection methods
25
+ withNewSsh(props) {
26
+ this._sshProps = props;
27
+ return this;
28
+ }
29
+ withNodePool(props) {
30
+ this._nodePoolsProps.push(props);
31
+ return this;
32
+ }
33
+ withAddon(props) {
34
+ this._addonProps = props;
35
+ return this;
36
+ }
37
+ withFeature(props) {
38
+ this._featureProps = props;
39
+ return this;
40
+ }
41
+ withAuth(props) {
42
+ this._authProps = props;
43
+ return this;
44
+ }
45
+ withTier(tier) {
46
+ this._tier = tier;
47
+ return this;
48
+ }
49
+ withNetwork(props) {
50
+ this._networkProps = props;
51
+ return this;
52
+ }
53
+ withDefaultNodePool(props) {
54
+ this._defaultNode = props;
55
+ return this;
56
+ }
57
+ import(props) {
58
+ this._importProps = props;
59
+ return this;
60
+ }
61
+ //Build Methods
62
+ buildSsh() {
63
+ this._sshInstance = (0, KeyGenetators_1.generateSsh)({
64
+ ...this.commonProps,
65
+ ...this._sshProps,
66
+ });
67
+ }
68
+ async buildAsk() {
69
+ const sshKey = this._sshInstance.lists.getPublicKey();
70
+ this._askInstance = await (0, Aks_1.default)({
71
+ ...this.commonProps,
72
+ addon: this._addonProps,
73
+ aksAccess: this._authProps,
74
+ tier: this._tier,
75
+ linux: {
76
+ adminUsername: this._sshInstance.userName,
77
+ sshKeys: [sshKey],
78
+ },
79
+ defaultNodePool: this._defaultNode,
80
+ nodePools: this._nodePoolsProps,
81
+ features: this._featureProps,
82
+ network: this._networkProps,
83
+ importUri: this._importProps?.id,
84
+ ignoreChanges: this._importProps?.ignoreChanges,
85
+ //nodeResourceGroup: getResourceGroupName(""),
86
+ });
87
+ }
88
+ async build() {
89
+ this.buildSsh();
90
+ await this.buildAsk();
91
+ return { ssh: this._sshInstance, aks: this._askInstance };
92
+ }
93
+ }
94
+ exports.default = (props) => new AksBuilder(props);
95
+ //# sourceMappingURL=data:application/json;base64,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
@@ -0,0 +1,3 @@
1
+ import { IVnetBuilderStart, VnetBuilderProps } from "./types";
2
+ declare const _default: (props: VnetBuilderProps) => IVnetBuilderStart;
3
+ export default _default;
@@ -0,0 +1,279 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ const IpAddressPrefix_1 = require("../VNet/IpAddressPrefix");
4
+ const Firewall_1 = require("../VNet/Firewall");
5
+ const Vnet_1 = require("../VNet/Vnet");
6
+ const NatGateway_1 = require("../VNet/NatGateway");
7
+ const NetworkPeering_1 = require("../VNet/NetworkPeering");
8
+ const VPNGateway_1 = require("../VNet/VPNGateway");
9
+ const types_1 = require("./types");
10
+ const Helper_1 = require("../VNet/Helper");
11
+ const Bastion_1 = require("../VNet/Bastion");
12
+ const outboundIpName = "outbound";
13
+ class VnetBuilder extends types_1.ResourcesBuilder {
14
+ /** The Props */
15
+ _subnetProps = undefined;
16
+ _vnetProps;
17
+ _firewallProps = undefined;
18
+ _bastionProps = undefined;
19
+ _natGatewayEnabled = false;
20
+ _vpnGatewayProps = undefined;
21
+ _securityRules = undefined;
22
+ _routeRules = undefined;
23
+ _peeringProps = [];
24
+ _logInfo = undefined;
25
+ _ipType = "prefix";
26
+ /** The Instances */
27
+ _ipAddressInstance = undefined;
28
+ _firewallInstance = undefined;
29
+ _vnetInstance = undefined;
30
+ _natGatewayInstance = undefined;
31
+ _vnpGatewayInstance = undefined;
32
+ constructor({ subnets, dnsServers, addressSpaces, ...commonProps }) {
33
+ super(commonProps);
34
+ this._subnetProps = subnets;
35
+ this._vnetProps = { dnsServers, addressSpaces };
36
+ }
37
+ asHub() {
38
+ return this;
39
+ }
40
+ asSpoke() {
41
+ return this;
42
+ }
43
+ withPublicIpAddress(type) {
44
+ this._ipType = type;
45
+ return this;
46
+ }
47
+ withNatGateway() {
48
+ this._natGatewayEnabled = true;
49
+ return this;
50
+ }
51
+ withVpnGateway(props) {
52
+ this._vpnGatewayProps = props;
53
+ return this;
54
+ }
55
+ withFirewall(props) {
56
+ this._firewallProps = props;
57
+ return this;
58
+ }
59
+ withBastion(props) {
60
+ this._bastionProps = props;
61
+ return this;
62
+ }
63
+ withSecurityRules(rules) {
64
+ if (!this._securityRules)
65
+ this._securityRules = rules;
66
+ else
67
+ this._securityRules.push(...rules);
68
+ return this;
69
+ }
70
+ withRouteRules(rules) {
71
+ if (!this._routeRules)
72
+ this._routeRules = rules;
73
+ else
74
+ this._routeRules.push(...rules);
75
+ return this;
76
+ }
77
+ peeringTo(props) {
78
+ this._peeringProps.push(props);
79
+ return this;
80
+ }
81
+ withLogInfo(info) {
82
+ this._logInfo = info;
83
+ return this;
84
+ }
85
+ /** Builders methods */
86
+ // private validate() {
87
+ // if (this._firewallProps) {
88
+ // if (!this._firewallProps.sku)
89
+ // this._firewallProps.sku = this._natGatewayEnabled
90
+ // ? { tier: "Basic", name: "AZFW_VNet" }
91
+ // : { tier: "Basic", name: "AZFW_VNet" };
92
+ //
93
+ // // if (this._natGatewayEnabled && this._firewallProps.sku.tier === "Basic")
94
+ // // throw new Error(
95
+ // // 'The Firewall tier "Basic" is not support Nat Gateway.',
96
+ // // );
97
+ // }
98
+ // }
99
+ buildIpAddress() {
100
+ const ipNames = [];
101
+ //No gateway and no firewall then Do nothing
102
+ if (!this._natGatewayEnabled && !this._firewallProps)
103
+ return;
104
+ //Add outbound Ipaddress for Firewall alone
105
+ if (!this._natGatewayEnabled && this._firewallProps) {
106
+ ipNames.push(outboundIpName);
107
+ }
108
+ //Create IpPrefix
109
+ this._ipAddressInstance = (0, IpAddressPrefix_1.default)({
110
+ ...this.commonProps,
111
+ ipAddresses: ipNames.map((n) => ({ name: n })),
112
+ createPrefix: this._ipType === "prefix",
113
+ config: { version: "IPv4", allocationMethod: "Static" },
114
+ });
115
+ }
116
+ buildNatGateway() {
117
+ if (!this._natGatewayEnabled || !this._ipAddressInstance)
118
+ return;
119
+ this._natGatewayInstance = (0, NatGateway_1.default)({
120
+ ...this.commonProps,
121
+ publicIpAddresses: this._ipType === "individual"
122
+ ? Object.keys(this._ipAddressInstance.addresses).map((k) => this._ipAddressInstance.addresses[k].id)
123
+ : undefined,
124
+ publicIpPrefixes: this._ipType === "prefix"
125
+ ? [this._ipAddressInstance.addressPrefix.id]
126
+ : undefined,
127
+ });
128
+ }
129
+ buildVnet() {
130
+ const subnets = this._subnetProps
131
+ ? Object.keys(this._subnetProps).map((k) => ({
132
+ name: k,
133
+ //Link all subnets to nate gateway if available without a firewall.
134
+ enableNatGateway: this._natGatewayEnabled && !Boolean(this._firewallInstance),
135
+ //However, till able to overwrite from outside.
136
+ ...this._subnetProps[k],
137
+ }))
138
+ : [];
139
+ this._vnetInstance = (0, Vnet_1.default)({
140
+ ...this.commonProps,
141
+ ...this._vnetProps,
142
+ subnets,
143
+ natGateway: this._natGatewayInstance,
144
+ features: {
145
+ //Only create Security group when firewall is not there
146
+ securityGroup: {
147
+ enabled: !this._firewallProps,
148
+ allowOutboundInternetAccess: !Boolean(this._ipAddressInstance) && !this._natGatewayEnabled,
149
+ rules: this._securityRules,
150
+ },
151
+ //Route tables
152
+ routeTable: {
153
+ enabled: this._routeRules && this._routeRules.length > 0,
154
+ rules: this._routeRules,
155
+ },
156
+ //Firewall
157
+ firewall: this._firewallProps
158
+ ? {
159
+ ...this._firewallProps.subnet,
160
+ enableNatGateway: this._natGatewayEnabled,
161
+ }
162
+ : undefined,
163
+ //Bastion
164
+ bastion: this._bastionProps
165
+ ? {
166
+ ...this._bastionProps.subnet,
167
+ }
168
+ : undefined,
169
+ //Gateway
170
+ gatewaySubnet: this._vpnGatewayProps
171
+ ? { addressPrefix: this._vpnGatewayProps.subnetSpace }
172
+ : undefined,
173
+ },
174
+ //networkPeerings: peerings,
175
+ dependsOn: this._firewallInstance?.firewall
176
+ ? this._firewallInstance?.firewall
177
+ : this._natGatewayInstance
178
+ ? this._natGatewayInstance
179
+ : undefined,
180
+ });
181
+ }
182
+ buildFirewall() {
183
+ if (!this._firewallProps)
184
+ return;
185
+ const publicIpAddress = this._ipAddressInstance?.addresses[outboundIpName];
186
+ const firewallSubnetId = this._vnetInstance?.firewallSubnet?.apply((s) => s?.id);
187
+ const manageSubnetId = this._vnetInstance?.firewallManageSubnet?.apply((s) => s?.id);
188
+ this._firewallInstance = (0, Firewall_1.default)({
189
+ ...this.commonProps,
190
+ ...this._firewallProps,
191
+ outbound: [
192
+ {
193
+ subnetId: firewallSubnetId,
194
+ //Using Force Tunneling mode if Nat gateway is enabled.
195
+ publicIpAddress: this._natGatewayEnabled
196
+ ? undefined
197
+ : publicIpAddress,
198
+ },
199
+ ],
200
+ //This is required for Force Tunneling mode
201
+ management: manageSubnetId
202
+ ? {
203
+ subnetId: manageSubnetId,
204
+ }
205
+ : undefined,
206
+ monitorConfig: this._logInfo
207
+ ? {
208
+ logWpId: this._logInfo.logWp.id,
209
+ }
210
+ : undefined,
211
+ dependsOn: this._ipAddressInstance?.addressPrefix,
212
+ });
213
+ }
214
+ buildVpnGateway() {
215
+ if (!this._vpnGatewayProps)
216
+ return;
217
+ const subnetId = this._vnetInstance.gatewaySubnet?.apply((s) => s?.id);
218
+ if (!subnetId)
219
+ return;
220
+ this._vnpGatewayInstance = (0, VPNGateway_1.default)({
221
+ ...this.commonProps,
222
+ ...this._vpnGatewayProps,
223
+ subnetId,
224
+ dependsOn: this._vnetInstance.vnet,
225
+ });
226
+ }
227
+ buildBastion() {
228
+ if (!this._bastionProps || !this._vnetInstance?.bastionSubnet)
229
+ return;
230
+ (0, Bastion_1.default)({
231
+ ...this.commonProps,
232
+ ...this._bastionProps,
233
+ subnetId: this._vnetInstance.bastionSubnet.apply((s) => s.id),
234
+ dependsOn: [this._vnetInstance.vnet],
235
+ });
236
+ }
237
+ buildPeering() {
238
+ if (!this._peeringProps || !this._vnetInstance)
239
+ return;
240
+ this._peeringProps.forEach((p) => {
241
+ let info = undefined;
242
+ if ("groupName" in p) {
243
+ info = (0, Helper_1.getVnetInfo)(p.groupName);
244
+ }
245
+ else if ("vnetId" in p) {
246
+ info = (0, Helper_1.parseVnetInfoFromId)(p.vnetId);
247
+ }
248
+ if (info)
249
+ (0, NetworkPeering_1.default)({
250
+ direction: p.direction ?? "Bidirectional",
251
+ firstVnet: {
252
+ vnetName: this._vnetInstance.vnet.name,
253
+ resourceGroupName: this.commonProps.group.resourceGroupName,
254
+ },
255
+ secondVnet: info,
256
+ });
257
+ });
258
+ }
259
+ build() {
260
+ //this.validate();
261
+ this.buildIpAddress();
262
+ this.buildNatGateway();
263
+ this.buildVnet();
264
+ this.buildFirewall();
265
+ this.buildVpnGateway();
266
+ this.buildBastion();
267
+ this.buildPeering();
268
+ return {
269
+ publicIpAddress: this._ipAddressInstance,
270
+ firewall: this._firewallInstance,
271
+ vnet: this._vnetInstance,
272
+ natGateway: this._natGatewayInstance,
273
+ //peerings: this._peeringInstances,
274
+ vnpGateway: this._vnpGatewayInstance,
275
+ };
276
+ }
277
+ }
278
+ exports.default = (props) => new VnetBuilder(props);
279
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"VnetBuilder.js","sourceRoot":"","sources":["../../src/Builder/VnetBuilder.ts"],"names":[],"mappings":";;AAAA,6DAEiC;AAGjC,+CAA4D;AAC5D,uCAAgD;AAEhD,mDAA4C;AAG5C,2DAAoD;AAEpD,mDAA4C;AAC5C,mCAciB;AACjB,2CAIwB;AACxB,6CAAsC;AAEtC,MAAM,cAAc,GAAG,UAAU,CAAC;AAElC,MAAM,WACJ,SAAQ,wBAAoC;IAG5C,gBAAgB;IACC,YAAY,GAAoC,SAAS,CAAC;IAC1D,UAAU,CAA4B;IAC/C,cAAc,GAAsC,SAAS,CAAC;IAC9D,aAAa,GAAqC,SAAS,CAAC;IAC5D,kBAAkB,GAAa,KAAK,CAAC;IACrC,gBAAgB,GAAwC,SAAS,CAAC;IAClE,cAAc,GAAyC,SAAS,CAAC;IACjE,WAAW,GACjB,SAAS,CAAC;IACJ,aAAa,GAAmB,EAAE,CAAC;IACnC,QAAQ,GAA+B,SAAS,CAAC;IACjD,OAAO,GAA4B,QAAQ,CAAC;IAEpD,oBAAoB;IACZ,kBAAkB,GACxB,SAAS,CAAC;IACJ,iBAAiB,GAA+B,SAAS,CAAC;IAC1D,aAAa,GAA2B,SAAS,CAAC;IAClD,mBAAmB,GAAmC,SAAS,CAAC;IAChE,mBAAmB,GACzB,SAAS,CAAC;IAEZ,YAAY,EACV,OAAO,EACP,UAAU,EACV,aAAa,EACb,GAAG,WAAW,EACG;QACjB,KAAK,CAAC,WAAW,CAAC,CAAC;QACnB,IAAI,CAAC,YAAY,GAAG,OAAO,CAAC;QAC5B,IAAI,CAAC,UAAU,GAAG,EAAE,UAAU,EAAE,aAAa,EAAE,CAAC;IAClD,CAAC;IAEM,KAAK;QACV,OAAO,IAAI,CAAC;IACd,CAAC;IACM,OAAO;QACZ,OAAO,IAAI,CAAC;IACd,CAAC;IAEM,mBAAmB,CACxB,IAA6B;QAE7B,IAAI,CAAC,OAAO,GAAG,IAAI,CAAC;QACpB,OAAO,IAAI,CAAC;IACd,CAAC;IAEM,cAAc;QACnB,IAAI,CAAC,kBAAkB,GAAG,IAAI,CAAC;QAC/B,OAAO,IAAI,CAAC;IACd,CAAC;IAEM,cAAc,CAAC,KAA8B;QAClD,IAAI,CAAC,gBAAgB,GAAG,KAAK,CAAC;QAC9B,OAAO,IAAI,CAAC;IACd,CAAC;IAEM,YAAY,CAAC,KAA4B;QAC9C,IAAI,CAAC,cAAc,GAAG,KAAK,CAAC;QAC5B,OAAO,IAAI,CAAC;IACd,CAAC;IAEM,WAAW,CAAC,KAA2B;QAC5C,IAAI,CAAC,aAAa,GAAG,KAAK,CAAC;QAC3B,OAAO,IAAI,CAAC;IACd,CAAC;IAEM,iBAAiB,CAAC,KAA+B;QACtD,IAAI,CAAC,IAAI,CAAC,cAAc;YAAE,IAAI,CAAC,cAAc,GAAG,KAAK,CAAC;;YACjD,IAAI,CAAC,cAAc,CAAC,IAAI,CAAC,GAAG,KAAK,CAAC,CAAC;QACxC,OAAO,IAAI,CAAC;IACd,CAAC;IAEM,cAAc,CAAC,KAAkB;QACtC,IAAI,CAAC,IAAI,CAAC,WAAW;YAAE,IAAI,CAAC,WAAW,GAAG,KAAK,CAAC;;YAC3C,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,GAAG,KAAK,CAAC,CAAC;QACrC,OAAO,IAAI,CAAC;IACd,CAAC;IAEM,SAAS,CAAC,KAAmB;QAClC,IAAI,CAAC,aAAa,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;QAC/B,OAAO,IAAI,CAAC;IACd,CAAC;IAEM,WAAW,CAAC,IAAoB;QACrC,IAAI,CAAC,QAAQ,GAAG,IAAI,CAAC;QACrB,OAAO,IAAI,CAAC;IACd,CAAC;IAED,uBAAuB;IACvB,uBAAuB;IACvB,+BAA+B;IAC/B,oCAAoC;IACpC,0DAA0D;IAC1D,iDAAiD;IACjD,kDAAkD;IAClD,EAAE;IACF,kFAAkF;IAClF,4BAA4B;IAC5B,sEAAsE;IACtE,cAAc;IACd,MAAM;IACN,IAAI;IAEI,cAAc;QACpB,MAAM,OAAO,GAAG,EAAE,CAAC;QAEnB,4CAA4C;QAC5C,IAAI,CAAC,IAAI,CAAC,kBAAkB,IAAI,CAAC,IAAI,CAAC,cAAc;YAAE,OAAO;QAE7D,2CAA2C;QAC3C,IAAI,CAAC,IAAI,CAAC,kBAAkB,IAAI,IAAI,CAAC,cAAc,EAAE,CAAC;YACpD,OAAO,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC;QAC/B,CAAC;QAED,iBAAiB;QACjB,IAAI,CAAC,kBAAkB,GAAG,IAAA,yBAAe,EAAC;YACxC,GAAG,IAAI,CAAC,WAAW;YACnB,WAAW,EAAE,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,EAAE,IAAI,EAAE,CAAC,EAAE,CAAC,CAAC;YAC9C,YAAY,EAAE,IAAI,CAAC,OAAO,KAAK,QAAQ;YACvC,MAAM,EAAE,EAAE,OAAO,EAAE,MAAM,EAAE,gBAAgB,EAAE,QAAQ,EAAE;SACxD,CAAC,CAAC;IACL,CAAC;IAEO,eAAe;QACrB,IAAI,CAAC,IAAI,CAAC,kBAAkB,IAAI,CAAC,IAAI,CAAC,kBAAkB;YAAE,OAAO;QAEjE,IAAI,CAAC,mBAAmB,GAAG,IAAA,oBAAU,EAAC;YACpC,GAAG,IAAI,CAAC,WAAW;YAEnB,iBAAiB,EACf,IAAI,CAAC,OAAO,KAAK,YAAY;gBAC3B,CAAC,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,kBAAkB,CAAC,SAAS,CAAC,CAAC,GAAG,CAChD,CAAC,CAAC,EAAE,EAAE,CAAC,IAAI,CAAC,kBAAmB,CAAC,SAAU,CAAC,CAAC,CAAC,CAAC,EAAE,CACjD;gBACH,CAAC,CAAC,SAAS;YAEf,gBAAgB,EACd,IAAI,CAAC,OAAO,KAAK,QAAQ;gBACvB,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,aAAc,CAAC,EAAE,CAAC;gBAC7C,CAAC,CAAC,SAAS;SAChB,CAAC,CAAC;IACL,CAAC;IAEO,SAAS;QACf,MAAM,OAAO,GAAG,IAAI,CAAC,YAAY;YAC/B,CAAC,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,YAAa,CAAC,CAAC,GAAG,CACjC,CAAC,CAAC,EAAE,EAAE,CACJ,CAAC;gBACC,IAAI,EAAE,CAAC;gBACP,mEAAmE;gBACnE,gBAAgB,EACd,IAAI,CAAC,kBAAkB,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,iBAAiB,CAAC;gBAC7D,+CAA+C;gBAC/C,GAAG,IAAI,CAAC,YAAa,CAAC,CAAC,CAAC;aACzB,CAAgB,CACpB;YACH,CAAC,CAAC,EAAE,CAAC;QAEP,IAAI,CAAC,aAAa,GAAG,IAAA,cAAI,EAAC;YACxB,GAAG,IAAI,CAAC,WAAW;YACnB,GAAG,IAAI,CAAC,UAAU;YAClB,OAAO;YACP,UAAU,EAAE,IAAI,CAAC,mBAAmB;YAEpC,QAAQ,EAAE;gBACR,uDAAuD;gBACvD,aAAa,EAAE;oBACb,OAAO,EAAE,CAAC,IAAI,CAAC,cAAc;oBAC7B,2BAA2B,EACzB,CAAC,OAAO,CAAC,IAAI,CAAC,kBAAkB,CAAC,IAAI,CAAC,IAAI,CAAC,kBAAkB;oBAC/D,KAAK,EAAE,IAAI,CAAC,cAAc;iBAC3B;gBACD,cAAc;gBACd,UAAU,EAAE;oBACV,OAAO,EAAE,IAAI,CAAC,WAAW,IAAI,IAAI,CAAC,WAAW,CAAC,MAAM,GAAG,CAAC;oBACxD,KAAK,EAAE,IAAI,CAAC,WAAW;iBACxB;gBACD,UAAU;gBACV,QAAQ,EAAE,IAAI,CAAC,cAAc;oBAC3B,CAAC,CAAC;wBACE,GAAG,IAAI,CAAC,cAAc,CAAC,MAAM;wBAC7B,gBAAgB,EAAE,IAAI,CAAC,kBAAkB;qBAC1C;oBACH,CAAC,CAAC,SAAS;gBACb,SAAS;gBACT,OAAO,EAAE,IAAI,CAAC,aAAa;oBACzB,CAAC,CAAC;wBACE,GAAG,IAAI,CAAC,aAAc,CAAC,MAAM;qBAC9B;oBACH,CAAC,CAAC,SAAS;gBACb,SAAS;gBACT,aAAa,EAAE,IAAI,CAAC,gBAAgB;oBAClC,CAAC,CAAC,EAAE,aAAa,EAAE,IAAI,CAAC,gBAAgB,CAAC,WAAW,EAAE;oBACtD,CAAC,CAAC,SAAS;aACd;YAED,4BAA4B;YAC5B,SAAS,EAAE,IAAI,CAAC,iBAAiB,EAAE,QAAQ;gBACzC,CAAC,CAAC,IAAI,CAAC,iBAAiB,EAAE,QAAQ;gBAClC,CAAC,CAAC,IAAI,CAAC,mBAAmB;oBACxB,CAAC,CAAC,IAAI,CAAC,mBAAmB;oBAC1B,CAAC,CAAC,SAAS;SAChB,CAAC,CAAC;IACL,CAAC;IAEO,aAAa;QACnB,IAAI,CAAC,IAAI,CAAC,cAAc;YAAE,OAAO;QAEjC,MAAM,eAAe,GAAG,IAAI,CAAC,kBAAkB,EAAE,SAAS,CAAC,cAAc,CAAC,CAAC;QAC3E,MAAM,gBAAgB,GAAG,IAAI,CAAC,aAAa,EAAE,cAAc,EAAE,KAAK,CAChE,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,EAAE,EAAG,CACd,CAAC;QACF,MAAM,cAAc,GAAG,IAAI,CAAC,aAAa,EAAE,oBAAoB,EAAE,KAAK,CACpE,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,EAAE,EAAG,CACd,CAAC;QAEF,IAAI,CAAC,iBAAiB,GAAG,IAAA,kBAAQ,EAAC;YAChC,GAAG,IAAI,CAAC,WAAW;YACnB,GAAG,IAAI,CAAC,cAAc;YAEtB,QAAQ,EAAE;gBACR;oBACE,QAAQ,EAAE,gBAAiB;oBAC3B,uDAAuD;oBACvD,eAAe,EAAE,IAAI,CAAC,kBAAkB;wBACtC,CAAC,CAAC,SAAS;wBACX,CAAC,CAAC,eAAgB;iBACrB;aACF;YACD,2CAA2C;YAC3C,UAAU,EAAE,cAAc;gBACxB,CAAC,CAAC;oBACE,QAAQ,EAAE,cAAc;iBACzB;gBACH,CAAC,CAAC,SAAS;YAEb,aAAa,EAAE,IAAI,CAAC,QAAQ;gBAC1B,CAAC,CAAC;oBACE,OAAO,EAAE,IAAI,CAAC,QAAQ,CAAC,KAAK,CAAC,EAAE;iBAChC;gBACH,CAAC,CAAC,SAAS;YAEb,SAAS,EAAE,IAAI,CAAC,kBAAkB,EAAE,aAAa;SAClD,CAAC,CAAC;IACL,CAAC;IAEO,eAAe;QACrB,IAAI,CAAC,IAAI,CAAC,gBAAgB;YAAE,OAAO;QAEnC,MAAM,QAAQ,GAAG,IAAI,CAAC,aAAc,CAAC,aAAa,EAAE,KAAK,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,EAAE,EAAG,CAAC,CAAC;QACzE,IAAI,CAAC,QAAQ;YAAE,OAAO;QAEtB,IAAI,CAAC,mBAAmB,GAAG,IAAA,oBAAU,EAAC;YACpC,GAAG,IAAI,CAAC,WAAW;YACnB,GAAG,IAAI,CAAC,gBAAgB;YACxB,QAAQ;YACR,SAAS,EAAE,IAAI,CAAC,aAAc,CAAC,IAAI;SACpC,CAAC,CAAC;IACL,CAAC;IAEO,YAAY;QAClB,IAAI,CAAC,IAAI,CAAC,aAAa,IAAI,CAAC,IAAI,CAAC,aAAa,EAAE,aAAa;YAAE,OAAO;QAEtE,IAAA,iBAAO,EAAC;YACN,GAAG,IAAI,CAAC,WAAW;YACnB,GAAG,IAAI,CAAC,aAAa;YACrB,QAAQ,EAAE,IAAI,CAAC,aAAc,CAAC,aAAa,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAE,CAAC,EAAG,CAAC;YAChE,SAAS,EAAE,CAAC,IAAI,CAAC,aAAc,CAAC,IAAK,CAAC;SACvC,CAAC,CAAC;IACL,CAAC;IAEO,YAAY;QAClB,IAAI,CAAC,IAAI,CAAC,aAAa,IAAI,CAAC,IAAI,CAAC,aAAa;YAAE,OAAO;QAEvD,IAAI,CAAC,aAAa,CAAC,OAAO,CAAC,CAAC,CAAC,EAAE,EAAE;YAC/B,IAAI,IAAI,GAA2C,SAAS,CAAC;YAE7D,IAAI,WAAW,IAAI,CAAC,EAAE,CAAC;gBACrB,IAAI,GAAG,IAAA,oBAAW,EAAC,CAAC,CAAC,SAAS,CAAC,CAAC;YAClC,CAAC;iBAAM,IAAI,QAAQ,IAAI,CAAC,EAAE,CAAC;gBACzB,IAAI,GAAG,IAAA,4BAAmB,EAAC,CAAC,CAAC,MAAM,CAAC,CAAC;YACvC,CAAC;YAED,IAAI,IAAI;gBACN,IAAA,wBAAc,EAAC;oBACb,SAAS,EAAE,CAAC,CAAC,SAAS,IAAI,eAAe;oBACzC,SAAS,EAAE;wBACT,QAAQ,EAAE,IAAI,CAAC,aAAc,CAAC,IAAI,CAAC,IAAI;wBACvC,iBAAiB,EAAE,IAAI,CAAC,WAAW,CAAC,KAAK,CAAC,iBAAiB;qBAC5D;oBACD,UAAU,EAAE,IAAI;iBACjB,CAAC,CAAC;QACP,CAAC,CAAC,CAAC;IACL,CAAC;IAEM,KAAK;QACV,kBAAkB;QAClB,IAAI,CAAC,cAAc,EAAE,CAAC;QACtB,IAAI,CAAC,eAAe,EAAE,CAAC;QACvB,IAAI,CAAC,SAAS,EAAE,CAAC;QACjB,IAAI,CAAC,aAAa,EAAE,CAAC;QACrB,IAAI,CAAC,eAAe,EAAE,CAAC;QACvB,IAAI,CAAC,YAAY,EAAE,CAAC;QACpB,IAAI,CAAC,YAAY,EAAE,CAAC;QAEpB,OAAO;YACL,eAAe,EAAE,IAAI,CAAC,kBAAkB;YACxC,QAAQ,EAAE,IAAI,CAAC,iBAAiB;YAChC,IAAI,EAAE,IAAI,CAAC,aAAc;YACzB,UAAU,EAAE,IAAI,CAAC,mBAAmB;YACpC,mCAAmC;YACnC,UAAU,EAAE,IAAI,CAAC,mBAAmB;SACrC,CAAC;IACJ,CAAC;CACF;AAED,kBAAe,CAAC,KAAuB,EAAE,EAAE,CACzC,IAAI,WAAW,CAAC,KAAK,CAAsB,CAAC"}
@@ -0,0 +1,2 @@
1
+ export { default as AksBuilder } from "./AksBuilder";
2
+ export { default as VnetBuilder } from "./VnetBuilder";
@@ -0,0 +1,8 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.VnetBuilder = exports.AksBuilder = void 0;
4
+ var AksBuilder_1 = require("./AksBuilder");
5
+ Object.defineProperty(exports, "AksBuilder", { enumerable: true, get: function () { return AksBuilder_1.default; } });
6
+ var VnetBuilder_1 = require("./VnetBuilder");
7
+ Object.defineProperty(exports, "VnetBuilder", { enumerable: true, get: function () { return VnetBuilder_1.default; } });
8
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi9zcmMvQnVpbGRlci9pbmRleC50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiOzs7QUFBQSwyQ0FBcUQ7QUFBNUMsd0dBQUEsT0FBTyxPQUFjO0FBQzlCLDZDQUF1RDtBQUE5QywwR0FBQSxPQUFPLE9BQWUifQ==
@@ -0,0 +1,120 @@
1
+ import { BasicResourceArgs, KeyVaultInfo, ResourceGroupInfo } from "../types";
2
+ import { RouteArgs, CustomSecurityRuleArgs } from "../VNet/types";
3
+ import { VnetProps, VnetResult } from "../VNet/Vnet";
4
+ import { SubnetProps } from "../VNet/Subnet";
5
+ import { Input, Resource } from "@pulumi/pulumi";
6
+ import { FirewallProps, FirewallResult } from "../VNet/Firewall";
7
+ import { VpnGatewayProps } from "../VNet/VPNGateway";
8
+ import { LogInfoResults } from "../Logs/Helpers";
9
+ import { PublicIpAddressPrefixResult } from "../VNet/IpAddressPrefix";
10
+ import * as network from "@pulumi/azure-native/network";
11
+ import { SshGenerationProps, SshResults } from "../Core/KeyGenetators";
12
+ import { AksAccessProps, AksNetworkProps, AksNodePoolProps, AksResults, AskAddonProps, AskFeatureProps, DefaultAksNodePoolProps } from "../Aks";
13
+ import * as native from "@pulumi/azure-native";
14
+ import { PeeringDirectionType } from "../VNet/NetworkPeering";
15
+ export type CommonBuilderProps = {
16
+ name: string;
17
+ group: ResourceGroupInfo;
18
+ vaultInfo: KeyVaultInfo;
19
+ dependsOn?: Input<Input<Resource>[]> | Input<Resource>;
20
+ };
21
+ export type CommonOmit<T> = Omit<T, keyof CommonBuilderProps>;
22
+ export interface IResourcesBuilder<TResults> {
23
+ commonProps: CommonBuilderProps;
24
+ build: () => TResults;
25
+ }
26
+ export declare abstract class ResourcesBuilder<TResults> implements IResourcesBuilder<TResults> {
27
+ commonProps: CommonBuilderProps;
28
+ protected constructor(commonProps: CommonBuilderProps);
29
+ abstract build(): TResults;
30
+ }
31
+ export interface IResourcesBuilderAsync<TResults> extends Omit<IResourcesBuilder<TResults>, "build"> {
32
+ build: () => Promise<TResults>;
33
+ }
34
+ export declare abstract class ResourcesBuilderAsync<TResults> implements IResourcesBuilderAsync<TResults> {
35
+ commonProps: CommonBuilderProps;
36
+ constructor(commonProps: CommonBuilderProps);
37
+ abstract build(): Promise<TResults>;
38
+ }
39
+ export type VnetBuilderProps = CommonBuilderProps & {
40
+ subnets?: SubnetCreationProps;
41
+ } & Pick<VnetProps, "addressSpaces" | "dnsServers">;
42
+ export type SubnetCreationProps = Record<string, Omit<SubnetProps, "name">>;
43
+ export type SubnetPrefixCreationProps = {
44
+ addressPrefix: string;
45
+ };
46
+ export type BastionCreationProps = {
47
+ subnet: SubnetPrefixCreationProps;
48
+ } & Pick<BasicResourceArgs, "importUri" | "ignoreChanges">;
49
+ export type PeeringProps = {
50
+ groupName: string;
51
+ direction?: PeeringDirectionType;
52
+ } | {
53
+ vnetId: Input<string>;
54
+ direction?: PeeringDirectionType;
55
+ };
56
+ export type FirewallCreationProps = {
57
+ subnet: SubnetPrefixCreationProps & {
58
+ managementAddressPrefix: string;
59
+ };
60
+ } & CommonOmit<Omit<FirewallProps, "outbound" | "management">>;
61
+ export type VpnGatewayCreationProps = Pick<VpnGatewayProps, "sku" | "vpnClientAddressPools"> & {
62
+ subnetSpace: string;
63
+ };
64
+ export interface IVnetBuilderStart {
65
+ asHub: () => IPublicIpBuilder;
66
+ asSpoke: () => IVnetBuilder;
67
+ }
68
+ export interface IPublicIpBuilder {
69
+ withPublicIpAddress: (type: "prefix" | "individual") => IGatewayFireWallBuilder;
70
+ }
71
+ export interface IFireWallOrVnetBuilder extends IResourcesBuilder<VnetBuilderResults> {
72
+ withFirewall: (props: FirewallCreationProps) => IVnetBuilder;
73
+ }
74
+ export interface IGatewayFireWallBuilder extends IFireWallOrVnetBuilder {
75
+ withNatGateway: () => IFireWallOrVnetBuilder;
76
+ }
77
+ export interface IVnetBuilder extends IResourcesBuilder<VnetBuilderResults> {
78
+ withBastion: (props: BastionCreationProps) => IVnetBuilder;
79
+ peeringTo: (props: PeeringProps) => IVnetBuilder;
80
+ withSecurityRules: (rules: CustomSecurityRuleArgs[]) => IVnetBuilder;
81
+ withRouteRules: (rules: RouteArgs[]) => IVnetBuilder;
82
+ withLogInfo: (info: LogInfoResults) => IVnetBuilder;
83
+ withVpnGateway: (props: VpnGatewayCreationProps) => IVnetBuilder;
84
+ }
85
+ export type VnetBuilderResults = {
86
+ publicIpAddress: PublicIpAddressPrefixResult | undefined;
87
+ firewall: FirewallResult | undefined;
88
+ vnet: VnetResult;
89
+ natGateway: network.NatGateway | undefined;
90
+ vnpGateway: network.VirtualNetworkGateway | undefined;
91
+ };
92
+ export type AksBuilderProps = CommonBuilderProps & {};
93
+ export type AskBuilderResults = {
94
+ ssh: SshResults;
95
+ aks: AksResults;
96
+ };
97
+ export type SshBuilderProps = Omit<SshGenerationProps, "vaultInfo" | "name">;
98
+ export type AksImportProps = {
99
+ id: string;
100
+ ignoreChanges?: string[];
101
+ };
102
+ export interface ISshBuilder {
103
+ withNewSsh: (props: SshBuilderProps) => IAskAuthBuilder;
104
+ }
105
+ export interface IAskAuthBuilder {
106
+ withAuth: (props: AksAccessProps) => IAksNetworkBuilder;
107
+ }
108
+ export interface IAksNetworkBuilder {
109
+ withNetwork: (props: AksNetworkProps) => IAksDefaultNodePoolBuilder;
110
+ }
111
+ export interface IAksDefaultNodePoolBuilder {
112
+ withDefaultNodePool: (props: DefaultAksNodePoolProps) => IAksBuilder;
113
+ }
114
+ export interface IAksBuilder extends IResourcesBuilderAsync<AskBuilderResults> {
115
+ withNodePool: (props: AksNodePoolProps) => IAksBuilder;
116
+ withAddon: (props: AskAddonProps) => IAksBuilder;
117
+ withFeature: (props: AskFeatureProps) => IAksBuilder;
118
+ withTier: (tier: native.containerservice.ManagedClusterSKUTier) => IAksBuilder;
119
+ import: (props: AksImportProps) => IAksBuilder;
120
+ }
@@ -0,0 +1,18 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.ResourcesBuilderAsync = exports.ResourcesBuilder = void 0;
4
+ class ResourcesBuilder {
5
+ commonProps;
6
+ constructor(commonProps) {
7
+ this.commonProps = commonProps;
8
+ }
9
+ }
10
+ exports.ResourcesBuilder = ResourcesBuilder;
11
+ class ResourcesBuilderAsync {
12
+ commonProps;
13
+ constructor(commonProps) {
14
+ this.commonProps = commonProps;
15
+ }
16
+ }
17
+ exports.ResourcesBuilderAsync = ResourcesBuilderAsync;
18
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoidHlwZXMuanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi9zcmMvQnVpbGRlci90eXBlcy50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiOzs7QUFzQ0EsTUFBc0IsZ0JBQWdCO0lBR1A7SUFBN0IsWUFBNkIsV0FBK0I7UUFBL0IsZ0JBQVcsR0FBWCxXQUFXLENBQW9CO0lBQUcsQ0FBQztDQUVqRTtBQUxELDRDQUtDO0FBUUQsTUFBc0IscUJBQXFCO0lBR3RCO0lBQW5CLFlBQW1CLFdBQStCO1FBQS9CLGdCQUFXLEdBQVgsV0FBVyxDQUFvQjtJQUFHLENBQUM7Q0FFdkQ7QUFMRCxzREFLQyJ9
@@ -1,4 +1,4 @@
1
- import { KeyVaultInfo } from '../types';
1
+ import { KeyVaultInfo } from "../types";
2
2
  export declare const defaultAllowedUses: string[];
3
3
  export declare const defaultCodeSignUses: string[];
4
4
  export declare const createSelfSignCertV2: ({ dnsName, commonName, organization, allowedUses, validYears, vaultInfo, }: {