@drunk-pulumi/azure 1.0.3 → 1.0.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (72) hide show
  1. package/Aks/Helper.js +4 -3
  2. package/Aks/Identity.js +3 -3
  3. package/Aks/index.d.ts +8 -7
  4. package/Aks/index.js +73 -57
  5. package/Automation/index.d.ts +1 -1
  6. package/Automation/index.js +5 -5
  7. package/AzAd/EnvRoles.Consts.d.ts +11 -7
  8. package/AzAd/EnvRoles.Consts.js +43 -50
  9. package/AzAd/EnvRoles.d.ts +3 -3
  10. package/AzAd/EnvRoles.js +10 -10
  11. package/AzAd/Group.d.ts +2 -2
  12. package/AzAd/Group.js +12 -12
  13. package/AzAd/Identities/AzDevOpsIdentity.d.ts +1 -1
  14. package/AzAd/Identities/AzDevOpsIdentity.js +9 -6
  15. package/AzAd/Identities/AzDevOpsManagedIdentity.d.ts +2 -2
  16. package/AzAd/Identities/AzDevOpsManagedIdentity.js +6 -3
  17. package/AzAd/RoleAssignment.d.ts +3 -3
  18. package/AzAd/RoleAssignment.js +3 -3
  19. package/AzAd/RoleDefinitions/JustInTimeRequestRole.js +10 -10
  20. package/Builder/AksBuilder.js +15 -1
  21. package/Builder/PrivateDnsZoneBuilder.d.ts +2 -1
  22. package/Builder/PrivateDnsZoneBuilder.js +41 -23
  23. package/Builder/ResourceBuilder.js +12 -6
  24. package/Builder/SqlBuilder.js +7 -1
  25. package/Builder/StorageBuilder.js +14 -14
  26. package/Builder/VaultBuilder.d.ts +2 -1
  27. package/Builder/VaultBuilder.js +8 -1
  28. package/Builder/types/resourceBuilder.d.ts +2 -0
  29. package/Builder/types/sqlBuilder.d.ts +2 -1
  30. package/Builder/types/storageBuilder.d.ts +10 -8
  31. package/Builder/types/vaultBuilder.d.ts +6 -1
  32. package/Cdn/CdnEndpoint.d.ts +2 -3
  33. package/Cdn/CdnEndpoint.js +15 -17
  34. package/Cdn/CdnRules.d.ts +6 -2
  35. package/Cdn/CdnRules.js +51 -56
  36. package/Certificate/index.d.ts +2 -2
  37. package/Certificate/index.js +29 -29
  38. package/Common/AzureEnv.d.ts +2 -3
  39. package/Common/AzureEnv.js +21 -8
  40. package/Common/Naming/index.d.ts +1 -1
  41. package/Common/Naming/index.js +65 -61
  42. package/Common/index.d.ts +11 -6
  43. package/Common/index.js +6 -1
  44. package/ContainerRegistry/index.d.ts +5 -5
  45. package/ContainerRegistry/index.js +75 -50
  46. package/Core/KeyGenerators.d.ts +5 -5
  47. package/Core/KeyGenerators.js +5 -5
  48. package/CustomRoles/index.js +3 -3
  49. package/KeyVault/CustomHelper.d.ts +4 -4
  50. package/KeyVault/CustomHelper.js +7 -7
  51. package/KeyVault/Helper.js +12 -9
  52. package/Logs/Helpers.d.ts +1 -1
  53. package/RedisCache/index.d.ts +2 -2
  54. package/RedisCache/index.js +10 -5
  55. package/SignalR/index.d.ts +4 -4
  56. package/SignalR/index.js +26 -21
  57. package/Sql/SqlDb.js +2 -3
  58. package/Sql/index.d.ts +3 -4
  59. package/Sql/index.js +11 -11
  60. package/Storage/Helper.d.ts +1 -1
  61. package/Storage/index.d.ts +2 -3
  62. package/Storage/index.js +2 -2
  63. package/VNet/FirewallPolicies/AksFirewallPolicy.d.ts +2 -2
  64. package/VNet/FirewallPolicies/AksFirewallPolicy.js +107 -117
  65. package/VNet/FirewallPolicies/CloudPCFirewallPolicy.d.ts +4 -3
  66. package/VNet/FirewallPolicies/CloudPCFirewallPolicy.js +150 -132
  67. package/VNet/Helper.d.ts +1 -0
  68. package/VNet/Helper.js +25 -19
  69. package/VNet/index.d.ts +9 -9
  70. package/VNet/index.js +58 -49
  71. package/VNet/types.d.ts +9 -6
  72. package/package.json +6 -6
@@ -9,191 +9,181 @@ exports.default = ({ priority, allowAccessPublicRegistries, subnetSpaces, dNATs,
9
9
  if (dNATs) {
10
10
  dNATs.forEach((nat) => {
11
11
  dnatRules.push({
12
- ruleType: "NatRule",
12
+ ruleType: 'NatRule',
13
13
  name: `${nat.name}-inbound-443`,
14
14
  description: `Forward port 443 external IpAddress of ${nat.name} to internal IpAddress`,
15
- sourceAddresses: [nat.sourceIpAddress ?? "*"],
15
+ sourceAddresses: [nat.sourceIpAddress ?? '*'],
16
16
  destinationAddresses: nat.publicIpAddresses,
17
- destinationPorts: ["443"],
18
- ipProtocols: ["TCP"],
17
+ destinationPorts: ['443'],
18
+ ipProtocols: ['TCP'],
19
19
  translatedAddress: nat.internalIpAddress,
20
- translatedPort: "443",
20
+ translatedPort: '443',
21
21
  });
22
22
  if (nat.allowHttp)
23
23
  dnatRules.push({
24
- ruleType: "NatRule",
24
+ ruleType: 'NatRule',
25
25
  name: `${nat.name}-inbound-80`,
26
26
  description: `Forward port 80 external IpAddress of ${nat.name} to internal IpAddress`,
27
- sourceAddresses: [nat.sourceIpAddress ?? "*"],
27
+ sourceAddresses: [nat.sourceIpAddress ?? '*'],
28
28
  destinationAddresses: nat.publicIpAddresses,
29
- destinationPorts: ["80"],
30
- ipProtocols: ["TCP"],
29
+ destinationPorts: ['80'],
30
+ ipProtocols: ['TCP'],
31
31
  translatedAddress: nat.internalIpAddress,
32
- translatedPort: "80",
32
+ translatedPort: '80',
33
33
  });
34
34
  });
35
35
  }
36
36
  //AKS Network Rules
37
37
  netRules.push({
38
- ruleType: "NetworkRule",
39
- name: "aks-vpn",
40
- description: "For OPEN VPN tunneled secure communication between the nodes and the control plane for AzureCloud.SoutheastAsia",
41
- ipProtocols: ["UDP"],
38
+ ruleType: 'NetworkRule',
39
+ name: 'aks-vpn',
40
+ description: 'For OPEN VPN tunneled secure communication between the nodes and the control plane for AzureCloud',
41
+ ipProtocols: ['UDP'],
42
42
  sourceAddresses: subnetSpaces,
43
43
  destinationAddresses: [`AzureCloud.${AzureEnv_1.currentRegionCode}`],
44
- destinationPorts: ["1194"],
44
+ destinationPorts: ['1194'],
45
45
  }, {
46
- ruleType: "NetworkRule",
47
- name: "aks-tcp",
48
- description: "For tunneled secure communication between the nodes and the control plane for AzureCloud.SoutheastAsia",
49
- ipProtocols: ["TCP"],
46
+ ruleType: 'NetworkRule',
47
+ name: 'aks-tcp',
48
+ description: 'For tunneled secure communication between the nodes and the control plane for AzureCloud',
49
+ ipProtocols: ['TCP'],
50
50
  sourceAddresses: subnetSpaces,
51
51
  destinationAddresses: [`AzureCloud.${AzureEnv_1.currentRegionCode}`],
52
- destinationPorts: ["443", "9000"],
52
+ destinationPorts: AzureEnv_1.allAzurePorts,
53
53
  }, {
54
- ruleType: "NetworkRule",
55
- name: "aks-time",
56
- description: "Required for Network Time Protocol (NTP) time synchronization on Linux nodes.",
57
- ipProtocols: ["UDP"],
54
+ ruleType: 'NetworkRule',
55
+ name: 'aks-time',
56
+ description: 'Required for Network Time Protocol (NTP) time synchronization on Linux nodes.',
57
+ ipProtocols: ['UDP'],
58
58
  sourceAddresses: subnetSpaces,
59
- destinationAddresses: ["ntp.ubuntu.com"],
60
- destinationPorts: ["123"],
59
+ destinationAddresses: ['ntp.ubuntu.com'],
60
+ destinationPorts: ['123'],
61
61
  },
62
62
  //TODO: Remove this
63
63
  {
64
- ruleType: "NetworkRule",
65
- name: "aks-time-others",
66
- description: "Required for Network Time Protocol (NTP) time synchronization on Linux nodes.",
67
- ipProtocols: ["UDP"],
64
+ ruleType: 'NetworkRule',
65
+ name: 'aks-time-others',
66
+ description: 'Required for Network Time Protocol (NTP) time synchronization on Linux nodes.',
67
+ ipProtocols: ['UDP'],
68
68
  sourceAddresses: subnetSpaces,
69
- destinationAddresses: ["*"],
70
- destinationPorts: ["123"],
69
+ destinationAddresses: ['*'],
70
+ destinationPorts: ['123'],
71
71
  }, {
72
- ruleType: "NetworkRule",
73
- name: "azure-services-tags",
74
- description: "Allows internal services to connect to Azure Resources.",
75
- ipProtocols: ["TCP"],
72
+ ruleType: 'NetworkRule',
73
+ name: 'azure-services-tags',
74
+ description: 'Allows internal services to connect to Azure Resources.',
75
+ ipProtocols: ['TCP'],
76
76
  sourceAddresses: subnetSpaces,
77
77
  destinationAddresses: [
78
- "AzureContainerRegistry.SoutheastAsia",
79
- "MicrosoftContainerRegistry.SoutheastAsia",
80
- "AzureActiveDirectory",
81
- "AzureMonitor.SoutheastAsia",
82
- "AppConfiguration",
83
- "AzureKeyVault.SoutheastAsia",
84
- //'AzureConnectors.SoutheastAsia',
85
- //'AzureSignalR', This already using private endpoint
86
- //'DataFactory.SoutheastAsia',
87
- //'EventHub.SoutheastAsia',
88
- "ServiceBus.SoutheastAsia",
89
- //'Sql.SoutheastAsia', This already using private endpoint
90
- "Storage.SoutheastAsia",
78
+ 'AzureContainerRegistry',
79
+ 'MicrosoftContainerRegistry',
80
+ 'AzureActiveDirectory',
81
+ 'AzureMonitor',
82
+ 'AppConfiguration',
83
+ 'AzureKeyVault',
91
84
  ],
92
- destinationPorts: ["443"],
85
+ destinationPorts: ['443'],
93
86
  }, {
94
- ruleType: "NetworkRule",
95
- name: "others-dns",
96
- description: "Others DNS.",
97
- ipProtocols: ["TCP", "UDP"],
87
+ ruleType: 'NetworkRule',
88
+ name: 'others-dns',
89
+ description: 'Others DNS.',
90
+ ipProtocols: ['TCP', 'UDP'],
98
91
  sourceAddresses: subnetSpaces,
99
- destinationAddresses: ["*"],
100
- destinationPorts: ["53"],
92
+ destinationAddresses: ['*'],
93
+ destinationPorts: ['53'],
101
94
  });
102
95
  //AKS Apps Rules
103
96
  appRules.push({
104
- ruleType: "ApplicationRule",
105
- name: "aks-services-fqdnTags",
106
- description: "Allows pods to access AzureKubernetesService",
97
+ ruleType: 'ApplicationRule',
98
+ name: 'aks-services-fqdnTags',
99
+ description: 'Allows pods to access AzureKubernetesService',
107
100
  sourceAddresses: subnetSpaces,
108
- fqdnTags: ["AzureKubernetesService"],
109
- protocols: [{ protocolType: "Https", port: 443 }],
101
+ fqdnTags: ['AzureKubernetesService'],
102
+ protocols: [{ protocolType: 'Https', port: 443 }],
110
103
  }, {
111
- ruleType: "ApplicationRule",
112
- name: "aks-fqdn",
113
- description: "Azure Global required FQDN",
104
+ ruleType: 'ApplicationRule',
105
+ name: 'aks-fqdn',
106
+ description: 'Azure Global required FQDN',
114
107
  sourceAddresses: subnetSpaces,
115
108
  targetFqdns: [
116
109
  //AKS mater
117
- "*.hcp.southeastasia.azmk8s.io",
110
+ '*.hcp.southeastasia.azmk8s.io',
118
111
  //Microsoft Container Registry
119
- "mcr.microsoft.com",
120
- "data.mcr.microsoft.com",
121
- "*.data.mcr.microsoft.com",
112
+ '*.azurecr.io',
113
+ 'mcr.microsoft.com',
114
+ 'data.mcr.microsoft.com',
115
+ '*.data.mcr.microsoft.com',
122
116
  //Azure management
123
- "management.azure.com",
124
- "login.microsoftonline.com",
117
+ 'management.azure.com',
118
+ 'login.microsoftonline.com',
125
119
  //Microsoft trusted package repository
126
- "packages.microsoft.com",
127
- //Azure CDN
128
- //"acs-mirror.azureedge.net",
129
- //CosmosDb
130
- //"*.documents.azure.com",
120
+ 'packages.microsoft.com',
131
121
  ],
132
- protocols: [{ protocolType: "Https", port: 443 }],
122
+ protocols: [{ protocolType: 'Https', port: 443 }],
133
123
  }, {
134
- ruleType: "ApplicationRule",
135
- name: "azure-monitors",
136
- description: "Azure AKS Monitoring",
124
+ ruleType: 'ApplicationRule',
125
+ name: 'azure-monitors',
126
+ description: 'Azure AKS Monitoring',
137
127
  sourceAddresses: subnetSpaces,
138
128
  targetFqdns: [
139
- "dc.services.visualstudio.com",
140
- "*.ods.opinsights.azure.com",
141
- "*.oms.opinsights.azure.com",
142
- "*.monitoring.azure.com",
143
- "*.services.visualstudio.com",
129
+ 'dc.services.visualstudio.com',
130
+ '*.ods.opinsights.azure.com',
131
+ '*.oms.opinsights.azure.com',
132
+ '*.monitoring.azure.com',
133
+ '*.services.visualstudio.com',
144
134
  ],
145
- protocols: [{ protocolType: "Https", port: 443 }],
135
+ protocols: [{ protocolType: 'Https', port: 443 }],
146
136
  }, {
147
- ruleType: "ApplicationRule",
148
- name: "azure-policy",
149
- description: "Azure AKS Policy Management",
137
+ ruleType: 'ApplicationRule',
138
+ name: 'azure-policy',
139
+ description: 'Azure AKS Policy Management',
150
140
  sourceAddresses: subnetSpaces,
151
141
  targetFqdns: [
152
- "*.policy.core.windows.net",
153
- "gov-prod-policy-data.trafficmanager.net",
154
- "raw.githubusercontent.com",
155
- "dc.services.visualstudio.com",
142
+ '*.policy.core.windows.net',
143
+ 'gov-prod-policy-data.trafficmanager.net',
144
+ 'raw.githubusercontent.com',
145
+ 'dc.services.visualstudio.com',
156
146
  ],
157
- protocols: [{ protocolType: "Https", port: 443 }],
147
+ protocols: [{ protocolType: 'Https', port: 443 }],
158
148
  });
159
149
  if (allowAccessPublicRegistries) {
160
150
  appRules.push({
161
- ruleType: "ApplicationRule",
162
- name: "docker-services",
151
+ ruleType: 'ApplicationRule',
152
+ name: 'docker-services',
163
153
  sourceAddresses: subnetSpaces,
164
- targetFqdns: ["*.docker.io", "docker.io", "*.docker.com", "*.pkg.dev"],
165
- protocols: [{ protocolType: "Https", port: 443 }],
154
+ targetFqdns: ['*.docker.io', 'docker.io', '*.docker.com', '*.pkg.dev'],
155
+ protocols: [{ protocolType: 'Https', port: 443 }],
166
156
  }, {
167
- ruleType: "ApplicationRule",
168
- name: "k8s-services",
157
+ ruleType: 'ApplicationRule',
158
+ name: 'k8s-services',
169
159
  sourceAddresses: subnetSpaces,
170
160
  targetFqdns: [
171
- "quay.io", //For Cert Manager
172
- "*.quay.io",
173
- "k8s.gcr.io", //nginx images
174
- "*.k8s.io",
175
- "*.cloudfront.net",
176
- "*.amazonaws.com",
177
- "*.gcr.io",
178
- "*.googleapis.com",
161
+ 'quay.io', //For Cert Manager
162
+ '*.quay.io',
163
+ 'k8s.gcr.io', //nginx images
164
+ '*.k8s.io',
165
+ '*.cloudfront.net',
166
+ '*.amazonaws.com',
167
+ '*.gcr.io',
168
+ '*.googleapis.com',
179
169
  ],
180
- protocols: [{ protocolType: "Https", port: 443 }],
170
+ protocols: [{ protocolType: 'Https', port: 443 }],
181
171
  }, {
182
- ruleType: "ApplicationRule",
183
- name: "ubuntu-services",
172
+ ruleType: 'ApplicationRule',
173
+ name: 'ubuntu-services',
184
174
  sourceAddresses: subnetSpaces,
185
175
  targetFqdns: [
186
- "security.ubuntu.com",
187
- "azure.archive.ubuntu.com",
188
- "changelogs.ubuntu.com",
176
+ 'security.ubuntu.com',
177
+ 'azure.archive.ubuntu.com',
178
+ 'changelogs.ubuntu.com',
189
179
  ],
190
- protocols: [{ protocolType: "Https", port: 443 }],
180
+ protocols: [{ protocolType: 'Https', port: 443 }],
191
181
  });
192
182
  }
193
183
  return (0, FirewallPolicy_1.FirewallPolicyGroup)({
194
- policy: { name: "aks-firewall-policy", dnatRules, netRules, appRules },
184
+ policy: { name: 'aks-firewall-policy', dnatRules, netRules, appRules },
195
185
  priority,
196
- action: "Allow",
186
+ action: 'Allow',
197
187
  });
198
188
  };
199
- //# sourceMappingURL=data:application/json;base64,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
189
+ //# sourceMappingURL=data:application/json;base64,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
@@ -1,5 +1,5 @@
1
- import { Input } from "@pulumi/pulumi";
2
- import { FirewallPolicyRuleCollectionResults } from "../types";
1
+ import { Input } from '@pulumi/pulumi';
2
+ import { FirewallPolicyRuleCollectionResults } from '../types';
3
3
  interface Props {
4
4
  name?: string;
5
5
  priority: number;
@@ -9,9 +9,10 @@ interface Props {
9
9
  allowsAzure?: boolean;
10
10
  allowsAzDevOps?: boolean;
11
11
  allowsK8sTools?: boolean;
12
+ allowsDevTools?: boolean;
12
13
  allowsSearch?: boolean;
13
14
  allowsOffice365?: boolean;
14
15
  allowsWindows365?: boolean;
15
16
  }
16
- declare const _default: ({ name, priority, subnetSpaces, allowsOffice365, allowsWindows365, allowsAzure, allowsAzDevOps, allowsK8sTools, allowIpCheckApi, allowsSearch, allowAllOutbound, }: Props) => FirewallPolicyRuleCollectionResults;
17
+ declare const _default: ({ name, priority, subnetSpaces, allowsOffice365, allowsWindows365, allowsAzure, allowsAzDevOps, allowsK8sTools, allowsDevTools, allowIpCheckApi, allowsSearch, allowAllOutbound, }: Props) => FirewallPolicyRuleCollectionResults;
17
18
  export default _default;