@drunk-pulumi/azure 0.0.39 → 0.0.40
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/Aks/Helper.d.ts +2 -2
- package/Aks/Helper.js +2 -2
- package/Aks/index.d.ts +2 -1
- package/Aks/index.js +39 -46
- package/Apim/index.d.ts +4 -4
- package/Apim/index.js +2 -3
- package/AzAd/B2C.d.ts +3 -4
- package/AzAd/B2C.js +11 -15
- package/AzAd/EnvRoles.js +2 -2
- package/AzAd/Helper.js +9 -5
- package/AzAd/Identities/AzDevOpsManagedIdentity.d.ts +0 -1
- package/AzAd/Identities/AzDevOpsManagedIdentity.js +1 -2
- package/AzAd/UserAssignedIdentity.d.ts +1 -2
- package/AzAd/UserAssignedIdentity.js +2 -8
- package/Builder/AksBuilder.js +3 -4
- package/Builder/ResourceBuilder.js +117 -35
- package/Builder/SqlBuilder.d.ts +3 -0
- package/Builder/SqlBuilder.js +81 -0
- package/Builder/VaultBuilder.d.ts +18 -0
- package/Builder/VaultBuilder.js +74 -0
- package/Builder/VmBuilder.d.ts +3 -0
- package/Builder/VmBuilder.js +83 -0
- package/Builder/VnetBuilder.d.ts +2 -2
- package/Builder/VnetBuilder.js +16 -8
- package/Builder/index.d.ts +6 -3
- package/Builder/index.js +14 -4
- package/Builder/types/askBuilder.d.ts +2 -4
- package/Builder/types/genericBuilder.d.ts +10 -0
- package/Builder/types/genericBuilder.js +1 -1
- package/Builder/types/index.d.ts +4 -2
- package/Builder/types/index.js +5 -3
- package/Builder/types/resourceBuilder.d.ts +28 -6
- package/Builder/types/sqlBuilder.d.ts +20 -0
- package/Builder/types/sqlBuilder.js +3 -0
- package/Builder/types/vaultBuilder.d.ts +16 -0
- package/Builder/types/vaultBuilder.js +3 -0
- package/Builder/types/vmBuilder.d.ts +29 -0
- package/Builder/types/vmBuilder.js +3 -0
- package/Builder/types/vnetBuilder.d.ts +5 -6
- package/Certificate/p12.js +2 -3
- package/Common/GlobalEnv.d.ts +1 -1
- package/Common/Helpers.js +3 -3
- package/ContainerRegistry/index.d.ts +4 -5
- package/ContainerRegistry/index.js +14 -16
- package/Core/Random.d.ts +1 -1
- package/Core/Random.js +6 -2
- package/Core/ResourceCreator.d.ts +7 -4
- package/Core/ResourceCreator.js +5 -5
- package/Core/ResourceGroup.d.ts +2 -1
- package/Core/ResourceGroup.js +2 -2
- package/IOT/Hub/index.d.ts +1 -2
- package/IOT/Hub/index.js +2 -6
- package/KeyVault/CustomHelper.d.ts +5 -5
- package/KeyVault/CustomHelper.js +8 -9
- package/KeyVault/index.d.ts +15 -6
- package/KeyVault/index.js +45 -36
- package/MySql/index.d.ts +1 -2
- package/MySql/index.js +3 -8
- package/Postgresql/index.js +2 -2
- package/ServiceBus/index.d.ts +12 -15
- package/ServiceBus/index.js +20 -32
- package/SignalR/index.d.ts +6 -9
- package/SignalR/index.js +16 -17
- package/Sql/SqlDb.d.ts +5 -6
- package/Sql/SqlDb.js +4 -18
- package/Sql/index.d.ts +37 -38
- package/Sql/index.js +43 -55
- package/VM/index.js +2 -2
- package/VNet/Bastion.js +1 -2
- package/VNet/FirewallPolicies/AksFirewallPolicy.js +6 -21
- package/VNet/FirewallPolicies/CFTunnelFirewallPolicy.d.ts +9 -0
- package/VNet/FirewallPolicies/CFTunnelFirewallPolicy.js +59 -0
- package/VNet/FirewallPolicies/CloudPCFirewallPolicy.js +2 -2
- package/VNet/FirewallPolicies/index.d.ts +4 -4
- package/VNet/FirewallPolicies/index.js +10 -8
- package/VNet/IpAddressPrefix.js +1 -1
- package/VNet/PrivateDns.d.ts +7 -7
- package/VNet/PrivateDns.js +11 -6
- package/VNet/PrivateEndpoint.d.ts +1 -1
- package/VNet/PrivateEndpoint.js +29 -49
- package/VNet/index.d.ts +3 -3
- package/Web/FuncApp.d.ts +5 -6
- package/Web/FuncApp.js +2 -6
- package/Web/WebAppPlan.d.ts +3 -4
- package/Web/WebAppPlan.js +5 -9
- package/package.json +5 -5
- package/types.d.ts +2 -4
package/Sql/index.js
CHANGED
|
@@ -6,7 +6,6 @@ const Helper_1 = require("../KeyVault/Helper");
|
|
|
6
6
|
const RoleAssignment_1 = require("../AzAd/RoleAssignment");
|
|
7
7
|
const AzureEnv_1 = require("../Common/AzureEnv");
|
|
8
8
|
const Naming_1 = require("../Common/Naming");
|
|
9
|
-
const Locker_1 = require("../Core/Locker");
|
|
10
9
|
const Helper_2 = require("../VNet/Helper");
|
|
11
10
|
const PrivateEndpoint_1 = require("../VNet/PrivateEndpoint");
|
|
12
11
|
const SqlDb_1 = require("./SqlDb");
|
|
@@ -14,7 +13,7 @@ const CustomHelper_1 = require("../KeyVault/CustomHelper");
|
|
|
14
13
|
const Helper_3 = require("../AzAd/Helper");
|
|
15
14
|
const createElasticPool = ({ group, name, sqlName,
|
|
16
15
|
//Minimum is 50 GD
|
|
17
|
-
maxSizeBytesGb = 50, sku = { name: AzureEnv_1.isPrd ? "Standard" : "Basic", capacity: 50 },
|
|
16
|
+
maxSizeBytesGb = 50, sku = { name: AzureEnv_1.isPrd ? "Standard" : "Basic", capacity: 50 }, }) => {
|
|
18
17
|
//Create Sql Elastic
|
|
19
18
|
const elasticName = (0, Naming_1.getElasticPoolName)(name);
|
|
20
19
|
const ep = new sql.ElasticPool(elasticName, {
|
|
@@ -35,24 +34,13 @@ maxSizeBytesGb = 50, sku = { name: AzureEnv_1.isPrd ? "Standard" : "Basic", capa
|
|
|
35
34
|
//licenseType: sql.ElasticPoolLicenseType.BasePrice,
|
|
36
35
|
//zoneRedundant: isPrd,
|
|
37
36
|
});
|
|
38
|
-
if (lock) {
|
|
39
|
-
(0, Locker_1.default)({ name, resource: ep });
|
|
40
|
-
}
|
|
41
37
|
return { name: elasticName, resource: ep };
|
|
42
38
|
};
|
|
43
|
-
exports.default = ({ name, auth, group, enableEncryption, elasticPool, databases, vaultInfo, network, vulnerabilityAssessment, ignoreChanges = ["administratorLogin", "administrators"],
|
|
39
|
+
exports.default = ({ name, auth, group, enableEncryption, elasticPool, databases, vaultInfo, network, vulnerabilityAssessment, ignoreChanges = ["administratorLogin", "administrators"], }) => {
|
|
44
40
|
const sqlName = (0, Naming_1.getSqlServerName)(name);
|
|
45
41
|
const encryptKey = enableEncryption
|
|
46
42
|
? (0, Helper_1.getEncryptionKeyOutput)(name, vaultInfo)
|
|
47
43
|
: undefined;
|
|
48
|
-
// if (vaultInfo && !auth) {
|
|
49
|
-
// const login = await randomLogin({ name, loginPrefix: 'sql', vaultInfo });
|
|
50
|
-
// auth = {
|
|
51
|
-
// enableAdAdministrator: true,
|
|
52
|
-
// adminLogin: login.userName,
|
|
53
|
-
// password: login.password,
|
|
54
|
-
// };
|
|
55
|
-
// }
|
|
56
44
|
const adminGroup = auth.envRoles.contributor;
|
|
57
45
|
if (auth.azureAdOnlyAuthentication)
|
|
58
46
|
ignoreChanges.push("administratorLoginPassword");
|
|
@@ -75,12 +63,11 @@ exports.default = ({ name, auth, group, enableEncryption, elasticPool, databases
|
|
|
75
63
|
login: adminGroup.displayName,
|
|
76
64
|
}
|
|
77
65
|
: undefined,
|
|
78
|
-
publicNetworkAccess: network?.
|
|
66
|
+
publicNetworkAccess: network?.asPrivateLink
|
|
79
67
|
? sql.ServerNetworkAccessFlag.Disabled
|
|
80
68
|
: sql.ServerNetworkAccessFlag.Enabled,
|
|
81
69
|
}, {
|
|
82
70
|
ignoreChanges,
|
|
83
|
-
protect: lock,
|
|
84
71
|
});
|
|
85
72
|
//Allows to Read Key Vault
|
|
86
73
|
(0, Helper_3.grantIdentityPermissions)({
|
|
@@ -89,9 +76,6 @@ exports.default = ({ name, auth, group, enableEncryption, elasticPool, databases
|
|
|
89
76
|
envRole: "readOnly",
|
|
90
77
|
principalId: sqlServer.identity.apply((s) => s.principalId),
|
|
91
78
|
});
|
|
92
|
-
if (lock) {
|
|
93
|
-
(0, Locker_1.default)({ name: sqlName, resource: sqlServer });
|
|
94
|
-
}
|
|
95
79
|
const ep = elasticPool
|
|
96
80
|
? createElasticPool({
|
|
97
81
|
name,
|
|
@@ -101,14 +85,13 @@ exports.default = ({ name, auth, group, enableEncryption, elasticPool, databases
|
|
|
101
85
|
})
|
|
102
86
|
: undefined;
|
|
103
87
|
if (network?.subnetId) {
|
|
104
|
-
if (network.
|
|
88
|
+
if (network.asPrivateLink) {
|
|
105
89
|
(0, PrivateEndpoint_1.default)({
|
|
106
90
|
group,
|
|
107
91
|
name,
|
|
108
92
|
resourceId: sqlServer.id,
|
|
109
93
|
privateDnsZoneName: "privatelink.database.windows.net",
|
|
110
|
-
|
|
111
|
-
subnetId: network.subnetId,
|
|
94
|
+
subnetIds: [network.subnetId],
|
|
112
95
|
linkServiceGroupIds: ["sqlServer"],
|
|
113
96
|
});
|
|
114
97
|
}
|
|
@@ -124,7 +107,7 @@ exports.default = ({ name, auth, group, enableEncryption, elasticPool, databases
|
|
|
124
107
|
}
|
|
125
108
|
}
|
|
126
109
|
//Allow Public Ip Accessing
|
|
127
|
-
if (network?.
|
|
110
|
+
if (network?.acceptAllPublicConnect) {
|
|
128
111
|
new sql.FirewallRule("accept-all-connection", {
|
|
129
112
|
firewallRuleName: "accept-all-connection",
|
|
130
113
|
serverName: sqlServer.name,
|
|
@@ -221,43 +204,48 @@ exports.default = ({ name, auth, group, enableEncryption, elasticPool, databases
|
|
|
221
204
|
autoRotationEnabled: true,
|
|
222
205
|
}, { dependsOn: serverKey });
|
|
223
206
|
}
|
|
224
|
-
const dbs =
|
|
225
|
-
|
|
226
|
-
|
|
227
|
-
|
|
228
|
-
|
|
229
|
-
|
|
230
|
-
|
|
231
|
-
|
|
232
|
-
|
|
233
|
-
|
|
234
|
-
|
|
235
|
-
|
|
236
|
-
// databaseName: d.name,
|
|
237
|
-
// resourceGroupName: group.resourceGroupName,
|
|
238
|
-
// state: "Enabled",
|
|
239
|
-
// });
|
|
240
|
-
// }
|
|
241
|
-
if (vaultInfo) {
|
|
242
|
-
const connectionString = auth?.adminLogin
|
|
243
|
-
? (0, pulumi_1.interpolate) `Data Source=${sqlName}.database.windows.net;Initial Catalog=${d.name};User Id=${auth.adminLogin};Password=${auth.password};MultipleActiveResultSets=False;Encrypt=True;TrustServerCertificate=False;Connection Timeout=120;`
|
|
244
|
-
: (0, pulumi_1.interpolate) `Data Source=${sqlName}.database.windows.net;Initial Catalog=${d.name};Authentication=Active Directory Integrated;;MultipleActiveResultSets=False;Encrypt=True;TrustServerCertificate=False;Connection Timeout=120;`;
|
|
245
|
-
(0, CustomHelper_1.addCustomSecret)({
|
|
246
|
-
name: d.name,
|
|
247
|
-
value: connectionString,
|
|
248
|
-
vaultInfo,
|
|
249
|
-
contentType: `Sql ${d.name} Connection String`,
|
|
250
|
-
dependsOn: d.resource,
|
|
207
|
+
const dbs = {};
|
|
208
|
+
if (databases) {
|
|
209
|
+
Object.keys(databases).forEach((key) => {
|
|
210
|
+
const db = databases[key];
|
|
211
|
+
const n = db.name ?? key;
|
|
212
|
+
const d = (0, SqlDb_1.default)({
|
|
213
|
+
...db,
|
|
214
|
+
name: n,
|
|
215
|
+
group,
|
|
216
|
+
sqlServerName: sqlName,
|
|
217
|
+
dependsOn: sqlServer,
|
|
218
|
+
elasticPoolId: ep ? ep.resource.id : undefined,
|
|
251
219
|
});
|
|
252
|
-
|
|
253
|
-
|
|
254
|
-
|
|
220
|
+
if (vaultInfo) {
|
|
221
|
+
const connectionString = auth?.adminLogin
|
|
222
|
+
? (0, pulumi_1.interpolate) `Data Source=${sqlName}.database.windows.net;Initial Catalog=${d.name};User Id=${auth.adminLogin};Password=${auth.password};MultipleActiveResultSets=False;Encrypt=True;TrustServerCertificate=False;Connection Timeout=120;`
|
|
223
|
+
: (0, pulumi_1.interpolate) `Data Source=${sqlName}.database.windows.net;Initial Catalog=${d.name};Authentication=Active Directory Integrated;;MultipleActiveResultSets=False;Encrypt=True;TrustServerCertificate=False;Connection Timeout=120;`;
|
|
224
|
+
(0, CustomHelper_1.addCustomSecret)({
|
|
225
|
+
name: d.name,
|
|
226
|
+
value: connectionString,
|
|
227
|
+
vaultInfo,
|
|
228
|
+
contentType: `Sql ${d.name} Connection String`,
|
|
229
|
+
dependsOn: d.resource,
|
|
230
|
+
});
|
|
231
|
+
}
|
|
232
|
+
dbs[key] = d;
|
|
233
|
+
});
|
|
234
|
+
}
|
|
235
|
+
// if (encryptKey) {
|
|
236
|
+
// //Enable TransparentDataEncryption for each database
|
|
237
|
+
// new sql.TransparentDataEncryption(`${sqlName}-${db.name}`, {
|
|
238
|
+
// serverName: sqlName,
|
|
239
|
+
// databaseName: d.name,
|
|
240
|
+
// resourceGroupName: group.resourceGroupName,
|
|
241
|
+
// state: "Enabled",
|
|
242
|
+
// });
|
|
243
|
+
// }
|
|
255
244
|
return {
|
|
256
245
|
name: sqlName,
|
|
257
246
|
resource: sqlServer,
|
|
258
247
|
elasticPool: ep,
|
|
259
248
|
databases: dbs,
|
|
260
|
-
adminGroup,
|
|
261
249
|
};
|
|
262
250
|
};
|
|
263
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
251
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/Sql/index.ts"],"names":[],"mappings":";;AAAA,gDAAgD;AAChD,2CAAiE;AACjE,+CAA4D;AAE5D,2DAAwD;AACxD,iDAAqE;AACrE,6CAAwE;AAMxE,2CAAkD;AAClD,6DAA6D;AAC7D,mCAA6D;AAC7D,2DAA2D;AAC3D,2CAA0D;AAW1D,MAAM,iBAAiB,GAAG,CAAC,EACzB,KAAK,EACL,IAAI,EACJ,OAAO;AACP,kBAAkB;AAClB,cAAc,GAAG,EAAE,EACnB,GAAG,GAAG,EAAE,IAAI,EAAE,gBAAK,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC,CAAC,OAAO,EAAE,QAAQ,EAAE,EAAE,EAAE,GACzC,EAA6C,EAAE;IAChE,oBAAoB;IACpB,MAAM,WAAW,GAAG,IAAA,2BAAkB,EAAC,IAAI,CAAC,CAAC;IAE7C,MAAM,EAAE,GAAG,IAAI,GAAG,CAAC,WAAW,CAAC,WAAW,EAAE;QAC1C,eAAe,EAAE,WAAW;QAC5B,UAAU,EAAE,OAAO;QACnB,GAAG,KAAK;QAER,YAAY,EAAE,gBAAK,CAAC,CAAC,CAAC,cAAc,GAAG,IAAI,GAAG,IAAI,GAAG,IAAI,CAAC,CAAC,CAAC,SAAS;QACrE,GAAG,EAAE;YACH,IAAI,EAAE,GAAG,GAAG,CAAC,IAAI,MAAM;YACvB,IAAI,EAAE,GAAG,CAAC,IAAI;YACd,QAAQ,EAAE,GAAG,CAAC,QAAQ;SACvB;QACD,mBAAmB,EAAE;YACnB,WAAW,EAAE,CAAC;YACd,WAAW,EAAE,GAAG,CAAC,IAAI,KAAK,OAAO,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,GAAG,CAAC,QAAQ;SACrD;QACD,aAAa,EAAE,gBAAK;QACpB,oDAAoD;QACpD,uBAAuB;KACxB,CAAC,CAAC;IAEH,OAAO,EAAE,IAAI,EAAE,WAAW,EAAE,QAAQ,EAAE,EAAE,EAAE,CAAC;AAC7C,CAAC,CAAC;AAkDF,kBAAe,CAAC,EACd,IAAI,EACJ,IAAI,EACJ,KAAK,EACL,gBAAgB,EAChB,WAAW,EACX,SAAS,EACT,SAAS,EACT,OAAO,EACP,uBAAuB,EACvB,aAAa,GAAG,CAAC,oBAAoB,EAAE,gBAAgB,CAAC,GAClD,EAAc,EAAE;IACtB,MAAM,OAAO,GAAG,IAAA,yBAAgB,EAAC,IAAI,CAAC,CAAC;IACvC,MAAM,UAAU,GAAG,gBAAgB;QACjC,CAAC,CAAC,IAAA,+BAAsB,EAAC,IAAI,EAAE,SAAS,CAAC;QACzC,CAAC,CAAC,SAAS,CAAC;IAEd,MAAM,UAAU,GAAG,IAAI,CAAC,QAAQ,CAAC,WAAW,CAAC;IAE7C,IAAI,IAAI,CAAC,yBAAyB;QAChC,aAAa,CAAC,IAAI,CAAC,4BAA4B,CAAC,CAAC;IAEnD,MAAM,SAAS,GAAG,IAAI,GAAG,CAAC,MAAM,CAC9B,OAAO,EACP;QACE,UAAU,EAAE,OAAO;QACnB,GAAG,KAAK;QACR,OAAO,EAAE,MAAM;QACf,iBAAiB,EAAE,KAAK;QAExB,QAAQ,EAAE,EAAE,IAAI,EAAE,gBAAgB,EAAE;QACpC,kBAAkB,EAAE,IAAI,EAAE,UAAU;QACpC,0BAA0B,EAAE,IAAI,EAAE,QAAQ;QAE1C,cAAc,EACZ,CAAC,IAAI,EAAE,qBAAqB,IAAI,IAAI,CAAC,yBAAyB,CAAC;YAC/D,UAAU;YACR,CAAC,CAAC;gBACE,iBAAiB,EAAE,GAAG,CAAC,iBAAiB,CAAC,eAAe;gBACxD,yBAAyB,EAAE,IAAI,CAAC,yBAAyB;gBAEzD,aAAa,EAAE,GAAG,CAAC,aAAa,CAAC,KAAK;gBACtC,QAAQ,EAAR,mBAAQ;gBACR,GAAG,EAAE,UAAU,CAAC,QAAQ;gBACxB,KAAK,EAAE,UAAU,CAAC,WAAW;aAC9B;YACH,CAAC,CAAC,SAAS;QAEf,mBAAmB,EAAE,OAAO,EAAE,aAAa;YACzC,CAAC,CAAC,GAAG,CAAC,uBAAuB,CAAC,QAAQ;YACtC,CAAC,CAAC,GAAG,CAAC,uBAAuB,CAAC,OAAO;KACxC,EACD;QACE,aAAa;KACd,CACF,CAAC;IAEF,0BAA0B;IAC1B,IAAA,iCAAwB,EAAC;QACvB,IAAI;QACJ,SAAS;QACT,OAAO,EAAE,UAAU;QACnB,WAAW,EAAE,SAAS,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAE,CAAC,WAAW,CAAC;KAC7D,CAAC,CAAC;IAEH,MAAM,EAAE,GAAG,WAAW;QACpB,CAAC,CAAC,iBAAiB,CAAC;YAChB,IAAI;YACJ,KAAK;YACL,OAAO,EAAE,SAAS,CAAC,IAAI;YACvB,GAAG,EAAE,WAAW;SACjB,CAAC;QACJ,CAAC,CAAC,SAAS,CAAC;IAEd,IAAI,OAAO,EAAE,QAAQ,EAAE,CAAC;QACtB,IAAI,OAAO,CAAC,aAAa,EAAE,CAAC;YAC1B,IAAA,yBAAsB,EAAC;gBACrB,KAAK;gBACL,IAAI;gBACJ,UAAU,EAAE,SAAS,CAAC,EAAE;gBACxB,kBAAkB,EAAE,kCAAkC;gBACtD,SAAS,EAAE,CAAC,OAAO,CAAC,QAAQ,CAAC;gBAC7B,mBAAmB,EAAE,CAAC,WAAW,CAAC;aACnC,CAAC,CAAC;QACL,CAAC;aAAM,CAAC;YACN,cAAc;YACd,IAAI,GAAG,CAAC,kBAAkB,CAAC,OAAO,EAAE;gBAClC,sBAAsB,EAAE,GAAG,OAAO,WAAW;gBAC7C,UAAU,EAAE,SAAS,CAAC,IAAI;gBAC1B,GAAG,KAAK;gBAER,sBAAsB,EAAE,OAAO,CAAC,QAAQ;gBACxC,gCAAgC,EAAE,KAAK;aACxC,CAAC,CAAC;QACL,CAAC;IACH,CAAC;IAED,2BAA2B;IAC3B,IAAI,OAAO,EAAE,sBAAsB,EAAE,CAAC;QACpC,IAAI,GAAG,CAAC,YAAY,CAAC,uBAAuB,EAAE;YAC5C,gBAAgB,EAAE,uBAAuB;YACzC,UAAU,EAAE,SAAS,CAAC,IAAI;YAC1B,GAAG,KAAK;YACR,cAAc,EAAE,SAAS;YACzB,YAAY,EAAE,iBAAiB;SAChC,CAAC,CAAC;IACL,CAAC;SAAM,IAAI,OAAO,EAAE,WAAW,EAAE,CAAC;QAChC,IAAA,YAAG,EAAC,OAAO,CAAC,WAAW,CAAC,CAAC,KAAK,CAAC,CAAC,GAAG,EAAE,EAAE,CACrC,IAAA,yBAAgB,EAAC,GAAG,CAAC,CAAC,GAAG,CAAC,CAAC,EAAE,EAAE,CAAC,EAAE,EAAE;YAClC,MAAM,CAAC,GAAG,GAAG,OAAO,WAAW,CAAC,EAAE,CAAC;YAEnC,OAAO,IAAI,GAAG,CAAC,YAAY,CAAC,CAAC,EAAE;gBAC7B,gBAAgB,EAAE,CAAC;gBACnB,UAAU,EAAE,SAAS,CAAC,IAAI;gBAC1B,GAAG,KAAK;gBACR,cAAc,EAAE,EAAE,CAAC,KAAK;gBACxB,YAAY,EAAE,EAAE,CAAC,GAAG;aACrB,CAAC,CAAC;QACL,CAAC,CAAC,CACH,CAAC;IACJ,CAAC;IAED,IAAI,uBAAuB,EAAE,CAAC;QAC5B,0BAA0B;QAC1B,IAAI,uBAAuB,CAAC,YAAY,EAAE,CAAC;YACzC,IAAA,+BAAc,EAAC;gBACb,IAAI;gBACJ,WAAW,EAAE,SAAS,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,EAAE,WAAW,IAAI,EAAE,CAAC;gBAClE,aAAa,EAAE,kBAAkB;gBACjC,QAAQ,EAAE,+BAA+B;gBACzC,KAAK,EAAE,uBAAuB,CAAC,YAAY;aAC5C,CAAC,CAAC;QACL,CAAC;QAED,cAAc;QACd,IAAI,GAAG,CAAC,gCAAgC,CAAC,IAAI,EAAE;YAC7C,qBAAqB,EAAE;gBACrB,0CAA0C;gBAC1C,sCAAsC;gBACtC,uBAAuB;aACxB;YACD,UAAU,EAAE,SAAS,CAAC,IAAI;YAC1B,GAAG,KAAK;YAER,sBAAsB,EAAE,SAAS;YACjC,2BAA2B,EAAE,IAAI;YACjC,0BAA0B,EAAE,KAAK;YACjC,mBAAmB,EAAE,+BAA+B;YACpD,YAAY,EAAE,IAAI;YAClB,aAAa,EAAE,gBAAK,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC;YAC7B,KAAK,EAAE,SAAS;YAChB,oBAAoB,EAAE,IAAI;YAE1B,uBAAuB,EAAE,uBAAuB,CAAC,gBAAgB;YACjE,4BAA4B,EAAE,yBAAc;YAC5C,eAAe,EAAE,uBAAuB,CAAC,eAAe;SACzD,CAAC,CAAC;QAEH,2BAA2B;QAC3B,IAAI,GAAG,CAAC,yBAAyB,CAAC,IAAI,EAAE;YACtC,uBAAuB,EAAE,IAAI;YAC7B,GAAG,KAAK;YACR,UAAU,EAAE,SAAS,CAAC,IAAI;YAC1B,kBAAkB,EAAE,CAAC,uBAAuB,CAAC,WAAW;YACxD,cAAc,EAAE,uBAAuB,CAAC,WAAW;YAEnD,aAAa,EAAE,CAAC;YAEhB,uBAAuB,EAAE,uBAAuB,CAAC,gBAAgB;YACjE,eAAe,EAAE,uBAAuB,CAAC,eAAe;YACxD,KAAK,EAAE,SAAS;SACjB,CAAC,CAAC;QAEH,+BAA+B;QAC/B,IAAI,GAAG,CAAC,6BAA6B,CAAC,IAAI,EAAE;YAC1C,2BAA2B,EAAE,IAAI;YACjC,GAAG,KAAK;YACR,UAAU,EAAE,SAAS,CAAC,IAAI;YAE1B,cAAc,EAAE;gBACd,SAAS,EAAE,IAAI;gBACf,uBAAuB,EAAE,CAAC,uBAAuB,CAAC,WAAW;gBAC7D,MAAM,EAAE,uBAAuB,CAAC,WAAW;aAC5C;YAED,oBAAoB,EAAE,IAAA,oBAAW,EAAA,GAAG,uBAAuB,CAAC,eAAe,IAAI,OAAO,EAAE;YACxF,uBAAuB,EAAE,uBAAuB,CAAC,gBAAgB;SAClE,CAAC,CAAC;IACL,CAAC;IAED,IAAI,UAAU,EAAE,CAAC;QACf,4EAA4E;QAE5E,MAAM,SAAS,GAAG,IAAI,GAAG,CAAC,SAAS,CACjC,GAAG,OAAO,YAAY,EACtB;YACE,iBAAiB,EAAE,KAAK,CAAC,iBAAiB;YAC1C,UAAU,EAAE,OAAO;YACnB,aAAa,EAAE,eAAe;YAC9B,OAAO,EAAE,UAAU,CAAC,OAAO;YAC3B,GAAG,EAAE,UAAU,CAAC,GAAG;SACpB,EACD,EAAE,aAAa,EAAE,CAAC,SAAS,EAAE,KAAK,CAAC,EAAE,CACtC,CAAC;QAEF,IAAI,GAAG,CAAC,mBAAmB,CACzB,GAAG,OAAO,sBAAsB,EAChC;YACE,uBAAuB,EAAE,SAAS;YAClC,iBAAiB,EAAE,KAAK,CAAC,iBAAiB;YAC1C,UAAU,EAAE,OAAO;YACnB,aAAa,EAAE,eAAe;YAC9B,aAAa,EAAE,UAAU,CAAC,OAAO;YACjC,mBAAmB,EAAE,IAAI;SAC1B,EACD,EAAE,SAAS,EAAE,SAAS,EAAE,CACzB,CAAC;IACJ,CAAC;IAED,MAAM,GAAG,GAA2D,EAAE,CAAC;IACvE,IAAI,SAAS,EAAE,CAAC;QACd,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,CAAC,GAAG,EAAE,EAAE;YACrC,MAAM,EAAE,GAAG,SAAS,CAAC,GAAG,CAAC,CAAC;YAC1B,MAAM,CAAC,GAAG,EAAE,CAAC,IAAI,IAAI,GAAG,CAAC;YACzB,MAAM,CAAC,GAAG,IAAA,eAAY,EAAC;gBACrB,GAAG,EAAE;gBACL,IAAI,EAAE,CAAC;gBACP,KAAK;gBACL,aAAa,EAAE,OAAO;gBACtB,SAAS,EAAE,SAAS;gBACpB,aAAa,EAAE,EAAE,CAAC,CAAC,CAAC,EAAE,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,CAAC,SAAS;aAC/C,CAAC,CAAC;YAEH,IAAI,SAAS,EAAE,CAAC;gBACd,MAAM,gBAAgB,GAAG,IAAI,EAAE,UAAU;oBACvC,CAAC,CAAC,IAAA,oBAAW,EAAA,eAAe,OAAO,yCAAyC,CAAC,CAAC,IAAI,YAAY,IAAI,CAAC,UAAU,aAAa,IAAI,CAAC,QAAQ,mGAAmG;oBAC1O,CAAC,CAAC,IAAA,oBAAW,EAAA,eAAe,OAAO,yCAAyC,CAAC,CAAC,IAAI,+IAA+I,CAAC;gBAEpO,IAAA,8BAAe,EAAC;oBACd,IAAI,EAAE,CAAC,CAAC,IAAI;oBACZ,KAAK,EAAE,gBAAgB;oBACvB,SAAS;oBACT,WAAW,EAAE,OAAO,CAAC,CAAC,IAAI,oBAAoB;oBAC9C,SAAS,EAAE,CAAC,CAAC,QAAQ;iBACtB,CAAC,CAAC;YACL,CAAC;YAED,GAAG,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC;QACf,CAAC,CAAC,CAAC;IACL,CAAC;IAED,oBAAoB;IACpB,yDAAyD;IACzD,iEAAiE;IACjE,2BAA2B;IAC3B,4BAA4B;IAC5B,kDAAkD;IAClD,wBAAwB;IACxB,QAAQ;IACR,IAAI;IAEJ,OAAO;QACL,IAAI,EAAE,OAAO;QACb,QAAQ,EAAE,SAAS;QACnB,WAAW,EAAE,EAAE;QACf,SAAS,EAAE,GAAG;KACf,CAAC;AACJ,CAAC,CAAC"}
|
package/VM/index.js
CHANGED
|
@@ -7,7 +7,7 @@ const Locker_1 = require("../Core/Locker");
|
|
|
7
7
|
const Helper_1 = require("../KeyVault/Helper");
|
|
8
8
|
const GlobalSchedule_1 = require("./GlobalSchedule");
|
|
9
9
|
const Extension_1 = require("./Extension");
|
|
10
|
-
exports.default = ({ name, group, subnetId, osType = "Windows", vmSize = "Standard_B2s", extensions, storageAccountType = compute.StorageAccountTypes.Premium_LRS, osDiskSizeGB = 128, dataDiskSizeGB, enableEncryption, vaultInfo, schedule = { timeZone: "Singapore Standard Time" }, login, image, lock =
|
|
10
|
+
exports.default = ({ name, group, subnetId, osType = "Windows", vmSize = "Standard_B2s", extensions, storageAccountType = compute.StorageAccountTypes.Premium_LRS, osDiskSizeGB = 128, dataDiskSizeGB, enableEncryption, vaultInfo, schedule = { timeZone: "Singapore Standard Time" }, login, image, lock = true, tags = {}, dependsOn, ...others }) => {
|
|
11
11
|
const vmName = (0, Naming_1.getVMName)(name);
|
|
12
12
|
const nicName = (0, Naming_1.getNICName)(name);
|
|
13
13
|
const nic = new network.NetworkInterface(nicName, {
|
|
@@ -171,4 +171,4 @@ exports.default = ({ name, group, subnetId, osType = "Windows", vmSize = "Standa
|
|
|
171
171
|
// }
|
|
172
172
|
return vm;
|
|
173
173
|
};
|
|
174
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
174
|
+
//# sourceMappingURL=data:application/json;base64,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
|
package/VNet/Bastion.js
CHANGED
|
@@ -8,7 +8,6 @@ exports.default = ({ name, group, subnetId, dependsOn, importUri, ignoreChanges,
|
|
|
8
8
|
const ipAddressId = (0, IpAddress_1.default)({
|
|
9
9
|
name,
|
|
10
10
|
group,
|
|
11
|
-
lock: false,
|
|
12
11
|
}).id;
|
|
13
12
|
return new network.BastionHost(name, {
|
|
14
13
|
bastionHostName: name,
|
|
@@ -29,4 +28,4 @@ exports.default = ({ name, group, subnetId, dependsOn, importUri, ignoreChanges,
|
|
|
29
28
|
ignoreChanges,
|
|
30
29
|
});
|
|
31
30
|
};
|
|
32
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
31
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -159,42 +159,27 @@ exports.default = ({ priority, allowAccessPublicRegistries, subnetSpaces, dNATs,
|
|
|
159
159
|
if (allowAccessPublicRegistries) {
|
|
160
160
|
appRules.push({
|
|
161
161
|
ruleType: "ApplicationRule",
|
|
162
|
-
//TODO Allow Docker Access is potential risk once we have budget and able to upload external images to ACR then remove docker.
|
|
163
162
|
name: "docker-services",
|
|
164
163
|
sourceAddresses: subnetSpaces,
|
|
165
|
-
targetFqdns: [
|
|
166
|
-
"quay.io", //For Cert Manager
|
|
167
|
-
"registry.k8s.io",
|
|
168
|
-
"*.cloudfront.net",
|
|
169
|
-
"*.quay.io",
|
|
170
|
-
"auth.docker.io",
|
|
171
|
-
"*.auth.docker.io",
|
|
172
|
-
"*.cloudflare.docker.io",
|
|
173
|
-
"docker.io",
|
|
174
|
-
"cloudflare.docker.io",
|
|
175
|
-
"cloudflare.docker.com",
|
|
176
|
-
"*.cloudflare.docker.com",
|
|
177
|
-
"*.registry-1.docker.io",
|
|
178
|
-
"registry-1.docker.io",
|
|
179
|
-
],
|
|
164
|
+
targetFqdns: ["*.docker.io", "docker.io", "*.docker.com", "*.pkg.dev"],
|
|
180
165
|
protocols: [{ protocolType: "Https", port: 443 }],
|
|
181
166
|
}, {
|
|
182
167
|
ruleType: "ApplicationRule",
|
|
183
|
-
//TODO Allow external registry is potential risk once we have budget and able to upload external images to ACR then remove docker.
|
|
184
168
|
name: "k8s-services",
|
|
185
169
|
sourceAddresses: subnetSpaces,
|
|
186
170
|
targetFqdns: [
|
|
171
|
+
"quay.io", //For Cert Manager
|
|
172
|
+
"*.quay.io",
|
|
187
173
|
"k8s.gcr.io", //nginx images
|
|
188
174
|
"*.k8s.io",
|
|
189
|
-
"
|
|
190
|
-
"
|
|
175
|
+
"*.cloudfront.net",
|
|
176
|
+
"*.amazonaws.com",
|
|
191
177
|
"*.gcr.io",
|
|
192
178
|
"*.googleapis.com",
|
|
193
179
|
],
|
|
194
180
|
protocols: [{ protocolType: "Https", port: 443 }],
|
|
195
181
|
}, {
|
|
196
182
|
ruleType: "ApplicationRule",
|
|
197
|
-
//TODO Allow external registry is potential risk once we have budget and able to upload external images to ACR then remove docker.
|
|
198
183
|
name: "ubuntu-services",
|
|
199
184
|
sourceAddresses: subnetSpaces,
|
|
200
185
|
targetFqdns: [
|
|
@@ -211,4 +196,4 @@ exports.default = ({ priority, allowAccessPublicRegistries, subnetSpaces, dNATs,
|
|
|
211
196
|
action: "Allow",
|
|
212
197
|
});
|
|
213
198
|
};
|
|
214
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
199
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiQWtzRmlyZXdhbGxQb2xpY3kuanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi9zcmMvVk5ldC9GaXJld2FsbFBvbGljaWVzL0Frc0ZpcmV3YWxsUG9saWN5LnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7O0FBRUEsb0RBQTBEO0FBTTFELHNEQUF3RDtBQXFCeEQsa0JBQWUsQ0FBQyxFQUNkLFFBQVEsRUFDUiwyQkFBMkIsRUFDM0IsWUFBWSxFQUNaLEtBQUssR0FDb0IsRUFBdUMsRUFBRTtJQUNsRSxNQUFNLFNBQVMsR0FBRyxJQUFJLEtBQUssRUFBcUMsQ0FBQztJQUNqRSxNQUFNLFFBQVEsR0FBRyxJQUFJLEtBQUssRUFBMEIsQ0FBQztJQUNyRCxNQUFNLFFBQVEsR0FBRyxJQUFJLEtBQUssRUFBOEIsQ0FBQztJQUV6RCxJQUFJLEtBQUssRUFBRSxDQUFDO1FBQ1YsS0FBSyxDQUFDLE9BQU8sQ0FBQyxDQUFDLEdBQUcsRUFBRSxFQUFFO1lBQ3BCLFNBQVMsQ0FBQyxJQUFJLENBQUM7Z0JBQ2IsUUFBUSxFQUFFLFNBQVM7Z0JBQ25CLElBQUksRUFBRSxHQUFHLEdBQUcsQ0FBQyxJQUFJLGNBQWM7Z0JBQy9CLFdBQVcsRUFBRSwwQ0FBMEMsR0FBRyxDQUFDLElBQUksd0JBQXdCO2dCQUN2RixlQUFlLEVBQUUsQ0FBQyxHQUFHLENBQUMsZUFBZSxJQUFJLEdBQUcsQ0FBQztnQkFDN0Msb0JBQW9CLEVBQUUsR0FBRyxDQUFDLGlCQUFpQjtnQkFDM0MsZ0JBQWdCLEVBQUUsQ0FBQyxLQUFLLENBQUM7Z0JBQ3pCLFdBQVcsRUFBRSxDQUFDLEtBQUssQ0FBQztnQkFDcEIsaUJBQWlCLEVBQUUsR0FBRyxDQUFDLGlCQUFpQjtnQkFDeEMsY0FBYyxFQUFFLEtBQUs7YUFDdEIsQ0FBQyxDQUFDO1lBRUgsSUFBSSxHQUFHLENBQUMsU0FBUztnQkFDZixTQUFTLENBQUMsSUFBSSxDQUFDO29CQUNiLFFBQVEsRUFBRSxTQUFTO29CQUNuQixJQUFJLEVBQUUsR0FBRyxHQUFHLENBQUMsSUFBSSxhQUFhO29CQUM5QixXQUFXLEVBQUUseUNBQXlDLEdBQUcsQ0FBQyxJQUFJLHdCQUF3QjtvQkFDdEYsZUFBZSxFQUFFLENBQUMsR0FBRyxDQUFDLGVBQWUsSUFBSSxHQUFHLENBQUM7b0JBQzdDLG9CQUFvQixFQUFFLEdBQUcsQ0FBQyxpQkFBaUI7b0JBQzNDLGdCQUFnQixFQUFFLENBQUMsSUFBSSxDQUFDO29CQUN4QixXQUFXLEVBQUUsQ0FBQyxLQUFLLENBQUM7b0JBQ3BCLGlCQUFpQixFQUFFLEdBQUcsQ0FBQyxpQkFBaUI7b0JBQ3hDLGNBQWMsRUFBRSxJQUFJO2lCQUNyQixDQUFDLENBQUM7UUFDUCxDQUFDLENBQUMsQ0FBQztJQUNMLENBQUM7SUFFRCxtQkFBbUI7SUFDbkIsUUFBUSxDQUFDLElBQUksQ0FDWDtRQUNFLFFBQVEsRUFBRSxhQUFhO1FBQ3ZCLElBQUksRUFBRSxTQUFTO1FBQ2YsV0FBVyxFQUNULGlIQUFpSDtRQUNuSCxXQUFXLEVBQUUsQ0FBQyxLQUFLLENBQUM7UUFDcEIsZUFBZSxFQUFFLFlBQVk7UUFDN0Isb0JBQW9CLEVBQUUsQ0FBQyxjQUFjLDRCQUFpQixFQUFFLENBQUM7UUFDekQsZ0JBQWdCLEVBQUUsQ0FBQyxNQUFNLENBQUM7S0FDM0IsRUFDRDtRQUNFLFFBQVEsRUFBRSxhQUFhO1FBQ3ZCLElBQUksRUFBRSxTQUFTO1FBQ2YsV0FBVyxFQUNULHdHQUF3RztRQUMxRyxXQUFXLEVBQUUsQ0FBQyxLQUFLLENBQUM7UUFDcEIsZUFBZSxFQUFFLFlBQVk7UUFDN0Isb0JBQW9CLEVBQUUsQ0FBQyxjQUFjLDRCQUFpQixFQUFFLENBQUM7UUFDekQsZ0JBQWdCLEVBQUUsQ0FBQyxLQUFLLEVBQUUsTUFBTSxDQUFDO0tBQ2xDLEVBQ0Q7UUFDRSxRQUFRLEVBQUUsYUFBYTtRQUN2QixJQUFJLEVBQUUsVUFBVTtRQUNoQixXQUFXLEVBQ1QsK0VBQStFO1FBQ2pGLFdBQVcsRUFBRSxDQUFDLEtBQUssQ0FBQztRQUNwQixlQUFlLEVBQUUsWUFBWTtRQUM3QixvQkFBb0IsRUFBRSxDQUFDLGdCQUFnQixDQUFDO1FBQ3hDLGdCQUFnQixFQUFFLENBQUMsS0FBSyxDQUFDO0tBQzFCO0lBQ0QsbUJBQW1CO0lBQ25CO1FBQ0UsUUFBUSxFQUFFLGFBQWE7UUFDdkIsSUFBSSxFQUFFLGlCQUFpQjtRQUN2QixXQUFXLEVBQ1QsK0VBQStFO1FBQ2pGLFdBQVcsRUFBRSxDQUFDLEtBQUssQ0FBQztRQUNwQixlQUFlLEVBQUUsWUFBWTtRQUM3QixvQkFBb0IsRUFBRSxDQUFDLEdBQUcsQ0FBQztRQUMzQixnQkFBZ0IsRUFBRSxDQUFDLEtBQUssQ0FBQztLQUMxQixFQUNEO1FBQ0UsUUFBUSxFQUFFLGFBQWE7UUFDdkIsSUFBSSxFQUFFLHFCQUFxQjtRQUMzQixXQUFXLEVBQUUseURBQXlEO1FBQ3RFLFdBQVcsRUFBRSxDQUFDLEtBQUssQ0FBQztRQUNwQixlQUFlLEVBQUUsWUFBWTtRQUM3QixvQkFBb0IsRUFBRTtZQUNwQixzQ0FBc0M7WUFDdEMsMENBQTBDO1lBQzFDLHNCQUFzQjtZQUN0Qiw0QkFBNEI7WUFDNUIsa0JBQWtCO1lBQ2xCLDZCQUE2QjtZQUM3QixrQ0FBa0M7WUFDbEMscURBQXFEO1lBQ3JELDhCQUE4QjtZQUM5QiwyQkFBMkI7WUFDM0IsMEJBQTBCO1lBQzFCLDBEQUEwRDtZQUMxRCx1QkFBdUI7U0FDeEI7UUFDRCxnQkFBZ0IsRUFBRSxDQUFDLEtBQUssQ0FBQztLQUMxQixFQUNEO1FBQ0UsUUFBUSxFQUFFLGFBQWE7UUFDdkIsSUFBSSxFQUFFLFlBQVk7UUFDbEIsV0FBVyxFQUFFLGFBQWE7UUFDMUIsV0FBVyxFQUFFLENBQUMsS0FBSyxFQUFFLEtBQUssQ0FBQztRQUMzQixlQUFlLEVBQUUsWUFBWTtRQUM3QixvQkFBb0IsRUFBRSxDQUFDLEdBQUcsQ0FBQztRQUMzQixnQkFBZ0IsRUFBRSxDQUFDLElBQUksQ0FBQztLQUN6QixDQUNGLENBQUM7SUFFRixnQkFBZ0I7SUFDaEIsUUFBUSxDQUFDLElBQUksQ0FDWDtRQUNFLFFBQVEsRUFBRSxpQkFBaUI7UUFDM0IsSUFBSSxFQUFFLHVCQUF1QjtRQUM3QixXQUFXLEVBQUUsOENBQThDO1FBQzNELGVBQWUsRUFBRSxZQUFZO1FBQzdCLFFBQVEsRUFBRSxDQUFDLHdCQUF3QixDQUFDO1FBQ3BDLFNBQVMsRUFBRSxDQUFDLEVBQUUsWUFBWSxFQUFFLE9BQU8sRUFBRSxJQUFJLEVBQUUsR0FBRyxFQUFFLENBQUM7S0FDbEQsRUFDRDtRQUNFLFFBQVEsRUFBRSxpQkFBaUI7UUFDM0IsSUFBSSxFQUFFLFVBQVU7UUFDaEIsV0FBVyxFQUFFLDRCQUE0QjtRQUN6QyxlQUFlLEVBQUUsWUFBWTtRQUM3QixXQUFXLEVBQUU7WUFDWCxXQUFXO1lBQ1gsK0JBQStCO1lBQy9CLDhCQUE4QjtZQUM5QixtQkFBbUI7WUFDbkIsd0JBQXdCO1lBQ3hCLDBCQUEwQjtZQUMxQixrQkFBa0I7WUFDbEIsc0JBQXNCO1lBQ3RCLDJCQUEyQjtZQUMzQixzQ0FBc0M7WUFDdEMsd0JBQXdCO1lBQ3hCLFdBQVc7WUFDWCw2QkFBNkI7WUFDN0IsVUFBVTtZQUNWLDBCQUEwQjtTQUMzQjtRQUNELFNBQVMsRUFBRSxDQUFDLEVBQUUsWUFBWSxFQUFFLE9BQU8sRUFBRSxJQUFJLEVBQUUsR0FBRyxFQUFFLENBQUM7S0FDbEQsRUFDRDtRQUNFLFFBQVEsRUFBRSxpQkFBaUI7UUFDM0IsSUFBSSxFQUFFLGdCQUFnQjtRQUN0QixXQUFXLEVBQUUsc0JBQXNCO1FBQ25DLGVBQWUsRUFBRSxZQUFZO1FBQzdCLFdBQVcsRUFBRTtZQUNYLDhCQUE4QjtZQUM5Qiw0QkFBNEI7WUFDNUIsNEJBQTRCO1lBQzVCLHdCQUF3QjtZQUN4Qiw2QkFBNkI7U0FDOUI7UUFDRCxTQUFTLEVBQUUsQ0FBQyxFQUFFLFlBQVksRUFBRSxPQUFPLEVBQUUsSUFBSSxFQUFFLEdBQUcsRUFBRSxDQUFDO0tBQ2xELEVBQ0Q7UUFDRSxRQUFRLEVBQUUsaUJBQWlCO1FBQzNCLElBQUksRUFBRSxjQUFjO1FBQ3BCLFdBQVcsRUFBRSw2QkFBNkI7UUFDMUMsZUFBZSxFQUFFLFlBQVk7UUFDN0IsV0FBVyxFQUFFO1lBQ1gsMkJBQTJCO1lBQzNCLHlDQUF5QztZQUN6QywyQkFBMkI7WUFDM0IsOEJBQThCO1NBQy9CO1FBQ0QsU0FBUyxFQUFFLENBQUMsRUFBRSxZQUFZLEVBQUUsT0FBTyxFQUFFLElBQUksRUFBRSxHQUFHLEVBQUUsQ0FBQztLQUNsRCxDQUNGLENBQUM7SUFFRixJQUFJLDJCQUEyQixFQUFFLENBQUM7UUFDaEMsUUFBUSxDQUFDLElBQUksQ0FDWDtZQUNFLFFBQVEsRUFBRSxpQkFBaUI7WUFDM0IsSUFBSSxFQUFFLGlCQUFpQjtZQUN2QixlQUFlLEVBQUUsWUFBWTtZQUM3QixXQUFXLEVBQUUsQ0FBQyxhQUFhLEVBQUUsV0FBVyxFQUFFLGNBQWMsRUFBRSxXQUFXLENBQUM7WUFDdEUsU0FBUyxFQUFFLENBQUMsRUFBRSxZQUFZLEVBQUUsT0FBTyxFQUFFLElBQUksRUFBRSxHQUFHLEVBQUUsQ0FBQztTQUNsRCxFQUNEO1lBQ0UsUUFBUSxFQUFFLGlCQUFpQjtZQUMzQixJQUFJLEVBQUUsY0FBYztZQUNwQixlQUFlLEVBQUUsWUFBWTtZQUM3QixXQUFXLEVBQUU7Z0JBQ1gsU0FBUyxFQUFFLGtCQUFrQjtnQkFDN0IsV0FBVztnQkFDWCxZQUFZLEVBQUUsY0FBYztnQkFDNUIsVUFBVTtnQkFDVixrQkFBa0I7Z0JBQ2xCLGlCQUFpQjtnQkFDakIsVUFBVTtnQkFDVixrQkFBa0I7YUFDbkI7WUFDRCxTQUFTLEVBQUUsQ0FBQyxFQUFFLFlBQVksRUFBRSxPQUFPLEVBQUUsSUFBSSxFQUFFLEdBQUcsRUFBRSxDQUFDO1NBQ2xELEVBQ0Q7WUFDRSxRQUFRLEVBQUUsaUJBQWlCO1lBQzNCLElBQUksRUFBRSxpQkFBaUI7WUFDdkIsZUFBZSxFQUFFLFlBQVk7WUFDN0IsV0FBVyxFQUFFO2dCQUNYLHFCQUFxQjtnQkFDckIsMEJBQTBCO2dCQUMxQix1QkFBdUI7YUFDeEI7WUFDRCxTQUFTLEVBQUUsQ0FBQyxFQUFFLFlBQVksRUFBRSxPQUFPLEVBQUUsSUFBSSxFQUFFLEdBQUcsRUFBRSxDQUFDO1NBQ2xELENBQ0YsQ0FBQztJQUNKLENBQUM7SUFFRCxPQUFPLElBQUEsb0NBQW1CLEVBQUM7UUFDekIsTUFBTSxFQUFFLEVBQUUsSUFBSSxFQUFFLHFCQUFxQixFQUFFLFNBQVMsRUFBRSxRQUFRLEVBQUUsUUFBUSxFQUFFO1FBQ3RFLFFBQVE7UUFDUixNQUFNLEVBQUUsT0FBTztLQUNoQixDQUFDLENBQUM7QUFDTCxDQUFDLENBQUMifQ==
|
|
@@ -0,0 +1,9 @@
|
|
|
1
|
+
import { Input } from "@pulumi/pulumi";
|
|
2
|
+
import { FirewallPolicyRuleCollectionResults } from "../types";
|
|
3
|
+
interface Props {
|
|
4
|
+
name?: string;
|
|
5
|
+
priority: number;
|
|
6
|
+
subnetSpaces: Array<Input<string>>;
|
|
7
|
+
}
|
|
8
|
+
declare const _default: ({ name, priority, subnetSpaces, }: Props) => FirewallPolicyRuleCollectionResults;
|
|
9
|
+
export default _default;
|
|
@@ -0,0 +1,59 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
const FirewallPolicy_1 = require("../FirewallPolicy");
|
|
4
|
+
exports.default = ({ name = "cf-tunnel", priority, subnetSpaces, }) => {
|
|
5
|
+
const netRules = new Array();
|
|
6
|
+
const appRules = new Array();
|
|
7
|
+
netRules.push({
|
|
8
|
+
ruleType: "NetworkRule",
|
|
9
|
+
name: `${name}-net-allows-cloudflare`,
|
|
10
|
+
description: "Allows CF Tunnel to access to Cloudflare.",
|
|
11
|
+
ipProtocols: ["TCP", "UDP"],
|
|
12
|
+
sourceAddresses: subnetSpaces,
|
|
13
|
+
destinationAddresses: [
|
|
14
|
+
"198.41.192.167",
|
|
15
|
+
"198.41.192.67",
|
|
16
|
+
"198.41.192.57",
|
|
17
|
+
"198.41.192.107",
|
|
18
|
+
"198.41.192.27",
|
|
19
|
+
"198.41.192.7",
|
|
20
|
+
"198.41.192.227",
|
|
21
|
+
"198.41.192.47",
|
|
22
|
+
"198.41.192.37",
|
|
23
|
+
"198.41.192.77",
|
|
24
|
+
"198.41.200.13",
|
|
25
|
+
"198.41.200.193",
|
|
26
|
+
"198.41.200.33",
|
|
27
|
+
"198.41.200.233",
|
|
28
|
+
"198.41.200.53",
|
|
29
|
+
"198.41.200.63",
|
|
30
|
+
"198.41.200.113",
|
|
31
|
+
"198.41.200.73",
|
|
32
|
+
"198.41.200.43",
|
|
33
|
+
"198.41.200.23",
|
|
34
|
+
],
|
|
35
|
+
destinationPorts: ["7844"],
|
|
36
|
+
});
|
|
37
|
+
appRules.push({
|
|
38
|
+
ruleType: "ApplicationRule",
|
|
39
|
+
name: `${name}-app-allow-cloudflare`,
|
|
40
|
+
description: "Allows CF Tunnel to access to Cloudflare.",
|
|
41
|
+
sourceAddresses: subnetSpaces,
|
|
42
|
+
targetFqdns: [
|
|
43
|
+
"*.argotunnel.com",
|
|
44
|
+
"*.cftunnel.com",
|
|
45
|
+
"*.cloudflareaccess.com",
|
|
46
|
+
"*.cloudflareresearch.com",
|
|
47
|
+
],
|
|
48
|
+
protocols: [
|
|
49
|
+
{ protocolType: "Https", port: 443 },
|
|
50
|
+
{ protocolType: "Https", port: 7844 },
|
|
51
|
+
],
|
|
52
|
+
});
|
|
53
|
+
return (0, FirewallPolicy_1.FirewallPolicyGroup)({
|
|
54
|
+
policy: { name: `${name}-firewall-policy`, netRules, appRules },
|
|
55
|
+
priority,
|
|
56
|
+
action: "Allow",
|
|
57
|
+
});
|
|
58
|
+
};
|
|
59
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiQ0ZUdW5uZWxGaXJld2FsbFBvbGljeS5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uL3NyYy9WTmV0L0ZpcmV3YWxsUG9saWNpZXMvQ0ZUdW5uZWxGaXJld2FsbFBvbGljeS50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiOztBQU1BLHNEQUF3RDtBQVF4RCxrQkFBZSxDQUFDLEVBQ2QsSUFBSSxHQUFHLFdBQVcsRUFDbEIsUUFBUSxFQUNSLFlBQVksR0FDTixFQUF1QyxFQUFFO0lBQy9DLE1BQU0sUUFBUSxHQUFHLElBQUksS0FBSyxFQUEwQixDQUFDO0lBQ3JELE1BQU0sUUFBUSxHQUFHLElBQUksS0FBSyxFQUE4QixDQUFDO0lBRXpELFFBQVEsQ0FBQyxJQUFJLENBQUM7UUFDWixRQUFRLEVBQUUsYUFBYTtRQUN2QixJQUFJLEVBQUUsR0FBRyxJQUFJLHdCQUF3QjtRQUNyQyxXQUFXLEVBQUUsMkNBQTJDO1FBQ3hELFdBQVcsRUFBRSxDQUFDLEtBQUssRUFBRSxLQUFLLENBQUM7UUFDM0IsZUFBZSxFQUFFLFlBQVk7UUFDN0Isb0JBQW9CLEVBQUU7WUFDcEIsZ0JBQWdCO1lBQ2hCLGVBQWU7WUFDZixlQUFlO1lBQ2YsZ0JBQWdCO1lBQ2hCLGVBQWU7WUFDZixjQUFjO1lBQ2QsZ0JBQWdCO1lBQ2hCLGVBQWU7WUFDZixlQUFlO1lBQ2YsZUFBZTtZQUNmLGVBQWU7WUFDZixnQkFBZ0I7WUFDaEIsZUFBZTtZQUNmLGdCQUFnQjtZQUNoQixlQUFlO1lBQ2YsZUFBZTtZQUNmLGdCQUFnQjtZQUNoQixlQUFlO1lBQ2YsZUFBZTtZQUNmLGVBQWU7U0FDaEI7UUFDRCxnQkFBZ0IsRUFBRSxDQUFDLE1BQU0sQ0FBQztLQUMzQixDQUFDLENBQUM7SUFFSCxRQUFRLENBQUMsSUFBSSxDQUFDO1FBQ1osUUFBUSxFQUFFLGlCQUFpQjtRQUMzQixJQUFJLEVBQUUsR0FBRyxJQUFJLHVCQUF1QjtRQUNwQyxXQUFXLEVBQUUsMkNBQTJDO1FBQ3hELGVBQWUsRUFBRSxZQUFZO1FBQzdCLFdBQVcsRUFBRTtZQUNYLGtCQUFrQjtZQUNsQixnQkFBZ0I7WUFDaEIsd0JBQXdCO1lBQ3hCLDBCQUEwQjtTQUMzQjtRQUNELFNBQVMsRUFBRTtZQUNULEVBQUUsWUFBWSxFQUFFLE9BQU8sRUFBRSxJQUFJLEVBQUUsR0FBRyxFQUFFO1lBQ3BDLEVBQUUsWUFBWSxFQUFFLE9BQU8sRUFBRSxJQUFJLEVBQUUsSUFBSSxFQUFFO1NBQ3RDO0tBQ0YsQ0FBQyxDQUFDO0lBRUgsT0FBTyxJQUFBLG9DQUFtQixFQUFDO1FBQ3pCLE1BQU0sRUFBRSxFQUFFLElBQUksRUFBRSxHQUFHLElBQUksa0JBQWtCLEVBQUUsUUFBUSxFQUFFLFFBQVEsRUFBRTtRQUMvRCxRQUFRO1FBQ1IsTUFBTSxFQUFFLE9BQU87S0FDaEIsQ0FBQyxDQUFDO0FBQ0wsQ0FBQyxDQUFDIn0=
|
|
@@ -183,9 +183,9 @@ exports.default = ({ name = "cloud-pc", priority, subnetSpaces, allowsOffice365,
|
|
|
183
183
|
});
|
|
184
184
|
}
|
|
185
185
|
return (0, FirewallPolicy_1.FirewallPolicyGroup)({
|
|
186
|
-
policy: { name:
|
|
186
|
+
policy: { name: `${name}-firewall-policy`, netRules, appRules },
|
|
187
187
|
priority,
|
|
188
188
|
action: "Allow",
|
|
189
189
|
});
|
|
190
190
|
};
|
|
191
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
191
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
|
|
2
|
-
|
|
3
|
-
|
|
4
|
-
export {
|
|
1
|
+
export { default as AksFirewallPolicy } from "./AksFirewallPolicy";
|
|
2
|
+
export { default as CloudPCFirewallPolicy } from "./CloudPCFirewallPolicy";
|
|
3
|
+
export { default as CFTunnelFirewallPolicy } from "./CFTunnelFirewallPolicy";
|
|
4
|
+
export { default as DefaultFirewallPolicy } from "./DefaultFirewallPolicy";
|
|
@@ -1,10 +1,12 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.DefaultFirewallPolicy = exports.CloudPCFirewallPolicy = exports.AksFirewallPolicy = void 0;
|
|
4
|
-
|
|
5
|
-
exports
|
|
6
|
-
|
|
7
|
-
exports
|
|
8
|
-
|
|
9
|
-
exports
|
|
10
|
-
|
|
3
|
+
exports.DefaultFirewallPolicy = exports.CFTunnelFirewallPolicy = exports.CloudPCFirewallPolicy = exports.AksFirewallPolicy = void 0;
|
|
4
|
+
var AksFirewallPolicy_1 = require("./AksFirewallPolicy");
|
|
5
|
+
Object.defineProperty(exports, "AksFirewallPolicy", { enumerable: true, get: function () { return AksFirewallPolicy_1.default; } });
|
|
6
|
+
var CloudPCFirewallPolicy_1 = require("./CloudPCFirewallPolicy");
|
|
7
|
+
Object.defineProperty(exports, "CloudPCFirewallPolicy", { enumerable: true, get: function () { return CloudPCFirewallPolicy_1.default; } });
|
|
8
|
+
var CFTunnelFirewallPolicy_1 = require("./CFTunnelFirewallPolicy");
|
|
9
|
+
Object.defineProperty(exports, "CFTunnelFirewallPolicy", { enumerable: true, get: function () { return CFTunnelFirewallPolicy_1.default; } });
|
|
10
|
+
var DefaultFirewallPolicy_1 = require("./DefaultFirewallPolicy");
|
|
11
|
+
Object.defineProperty(exports, "DefaultFirewallPolicy", { enumerable: true, get: function () { return DefaultFirewallPolicy_1.default; } });
|
|
12
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi9zcmMvVk5ldC9GaXJld2FsbFBvbGljaWVzL2luZGV4LnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7OztBQUFBLHlEQUFtRTtBQUExRCxzSEFBQSxPQUFPLE9BQXFCO0FBQ3JDLGlFQUEyRTtBQUFsRSw4SEFBQSxPQUFPLE9BQXlCO0FBQ3pDLG1FQUE2RTtBQUFwRSxnSUFBQSxPQUFPLE9BQTBCO0FBQzFDLGlFQUEyRTtBQUFsRSw4SEFBQSxPQUFPLE9BQXlCIn0=
|
package/VNet/IpAddressPrefix.js
CHANGED
|
@@ -39,4 +39,4 @@ exports.default = ({ name, group, prefixLength = 30, createPrefix = true, ipAddr
|
|
|
39
39
|
}
|
|
40
40
|
return { addressPrefix, addresses };
|
|
41
41
|
};
|
|
42
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
42
|
+
//# sourceMappingURL=data:application/json;base64,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
|
package/VNet/PrivateDns.d.ts
CHANGED
|
@@ -1,15 +1,13 @@
|
|
|
1
1
|
import * as native from "@pulumi/azure-native";
|
|
2
2
|
import { Input, Resource } from "@pulumi/pulumi";
|
|
3
|
-
import { BasicResourceArgs, ResourceGroupInfo } from "../types";
|
|
3
|
+
import { BasicResourceArgs, BasicResourceResultProps, ResourceGroupInfo, ResourceInfo } from "../types";
|
|
4
4
|
interface RecordProps {
|
|
5
|
-
zoneName: Input<string>;
|
|
6
|
-
/**Default is Global Resource Group*/
|
|
7
|
-
group?: ResourceGroupInfo;
|
|
8
5
|
recordName: string;
|
|
9
|
-
|
|
6
|
+
dnsInfo: ResourceInfo;
|
|
7
|
+
ipAddresses: Input<string>[] | Input<string[]>;
|
|
10
8
|
dependsOn?: Input<Input<Resource>[]> | Input<Resource>;
|
|
11
9
|
}
|
|
12
|
-
export declare const addARecord: ({
|
|
10
|
+
export declare const addARecord: ({ recordName, dnsInfo, ipAddresses, dependsOn, }: RecordProps) => import("@pulumi/azure-native/network/privateRecordSet").PrivateRecordSet;
|
|
13
11
|
interface VnetToPrivateDnsProps extends BasicResourceArgs {
|
|
14
12
|
zoneName: string;
|
|
15
13
|
vnetId: Input<string>;
|
|
@@ -26,6 +24,8 @@ interface Props {
|
|
|
26
24
|
dependsOn?: Input<Input<Resource>[]> | Input<Resource>;
|
|
27
25
|
}
|
|
28
26
|
/** Create Private DNS zone. This should be created in the Global resource group. */
|
|
29
|
-
declare const _default: ({ name, group, vnetIds, records, dependsOn, }: Props) =>
|
|
27
|
+
declare const _default: ({ name, group, vnetIds, records, dependsOn, }: Props) => BasicResourceResultProps<native.network.PrivateZone> & {
|
|
28
|
+
toDnsInfo: () => ResourceInfo;
|
|
29
|
+
};
|
|
30
30
|
export default _default;
|
|
31
31
|
export declare const getPrivateZone: ({ name, group, }: Omit<Props, "vnetIds">) => Promise<native.network.GetPrivateZoneResult>;
|
package/VNet/PrivateDns.js
CHANGED
|
@@ -4,7 +4,7 @@ exports.getPrivateZone = exports.linkVnetToPrivateDns = exports.addARecord = voi
|
|
|
4
4
|
const native = require("@pulumi/azure-native");
|
|
5
5
|
const pulumi_1 = require("@pulumi/pulumi");
|
|
6
6
|
const global = require("../Common/GlobalEnv");
|
|
7
|
-
const addARecord = ({
|
|
7
|
+
const addARecord = ({ recordName, dnsInfo, ipAddresses, dependsOn, }) => {
|
|
8
8
|
recordName = recordName.replace("https://", "").replace("http://", "");
|
|
9
9
|
//.replace(`.${zoneName}`, "");
|
|
10
10
|
return new native.network.PrivateRecordSet(recordName === "*"
|
|
@@ -12,8 +12,8 @@ const addARecord = ({ zoneName, group = global.groupInfo, recordName, ipAddresse
|
|
|
12
12
|
: recordName === "@"
|
|
13
13
|
? "Root-ARecord"
|
|
14
14
|
: `${recordName}-ARecord`, {
|
|
15
|
-
privateZoneName:
|
|
16
|
-
...group,
|
|
15
|
+
privateZoneName: dnsInfo.resourceName,
|
|
16
|
+
...dnsInfo.group,
|
|
17
17
|
relativeRecordSetName: recordName,
|
|
18
18
|
recordType: "A",
|
|
19
19
|
aRecords: (0, pulumi_1.output)(ipAddresses).apply((ips) => ips.map((i) => ({ ipv4Address: i }))),
|
|
@@ -37,6 +37,7 @@ exports.default = ({ name, group = global.groupInfo, vnetIds, records, dependsOn
|
|
|
37
37
|
...group,
|
|
38
38
|
location: "global",
|
|
39
39
|
}, { dependsOn });
|
|
40
|
+
const toDnsInfo = () => ({ resourceName: name, group, id: zone.id });
|
|
40
41
|
if (vnetIds) {
|
|
41
42
|
(0, pulumi_1.all)(vnetIds).apply((vn) => vn.map((id) => (0, exports.linkVnetToPrivateDns)({
|
|
42
43
|
name,
|
|
@@ -49,14 +50,18 @@ exports.default = ({ name, group = global.groupInfo, vnetIds, records, dependsOn
|
|
|
49
50
|
}
|
|
50
51
|
if (records) {
|
|
51
52
|
if (records.aRecords) {
|
|
52
|
-
records.aRecords.map((a) => (0, exports.addARecord)({ ...a,
|
|
53
|
+
records.aRecords.map((a) => (0, exports.addARecord)({ ...a, dnsInfo: toDnsInfo(), dependsOn: zone }));
|
|
53
54
|
}
|
|
54
55
|
}
|
|
55
|
-
return
|
|
56
|
+
return {
|
|
57
|
+
name,
|
|
58
|
+
resource: zone,
|
|
59
|
+
toDnsInfo,
|
|
60
|
+
};
|
|
56
61
|
};
|
|
57
62
|
const getPrivateZone = ({ name, group = global.groupInfo, }) => native.network.getPrivateZone({
|
|
58
63
|
privateZoneName: name,
|
|
59
64
|
resourceGroupName: group.resourceGroupName,
|
|
60
65
|
});
|
|
61
66
|
exports.getPrivateZone = getPrivateZone;
|
|
62
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
67
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -5,5 +5,5 @@ interface Props extends BasicResourceArgs, PrivateLinkProps {
|
|
|
5
5
|
privateDnsZoneName: string;
|
|
6
6
|
linkServiceGroupIds: string[];
|
|
7
7
|
}
|
|
8
|
-
declare const _default: ({ name, group, resourceId,
|
|
8
|
+
declare const _default: ({ name, group, resourceId, subnetIds, privateDnsZoneName, linkServiceGroupIds, }: Props) => import("@pulumi/azure-native/network/privateEndpoint").PrivateEndpoint[];
|
|
9
9
|
export default _default;
|