@drunk-pulumi/azure 1.0.3 → 1.0.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (72) hide show
  1. package/Aks/Helper.js +4 -3
  2. package/Aks/Identity.js +3 -3
  3. package/Aks/index.d.ts +8 -7
  4. package/Aks/index.js +73 -57
  5. package/Automation/index.d.ts +1 -1
  6. package/Automation/index.js +5 -5
  7. package/AzAd/EnvRoles.Consts.d.ts +13 -8
  8. package/AzAd/EnvRoles.Consts.js +51 -51
  9. package/AzAd/EnvRoles.d.ts +3 -3
  10. package/AzAd/EnvRoles.js +10 -10
  11. package/AzAd/Group.d.ts +2 -2
  12. package/AzAd/Group.js +12 -12
  13. package/AzAd/Identities/AzDevOpsIdentity.d.ts +1 -1
  14. package/AzAd/Identities/AzDevOpsIdentity.js +9 -6
  15. package/AzAd/Identities/AzDevOpsManagedIdentity.d.ts +2 -2
  16. package/AzAd/Identities/AzDevOpsManagedIdentity.js +6 -3
  17. package/AzAd/RoleAssignment.d.ts +3 -3
  18. package/AzAd/RoleAssignment.js +3 -3
  19. package/AzAd/RoleDefinitions/JustInTimeRequestRole.js +10 -10
  20. package/Builder/AksBuilder.js +15 -1
  21. package/Builder/PrivateDnsZoneBuilder.d.ts +2 -1
  22. package/Builder/PrivateDnsZoneBuilder.js +41 -23
  23. package/Builder/ResourceBuilder.js +12 -6
  24. package/Builder/SqlBuilder.js +7 -1
  25. package/Builder/StorageBuilder.js +14 -14
  26. package/Builder/VaultBuilder.d.ts +2 -1
  27. package/Builder/VaultBuilder.js +8 -1
  28. package/Builder/types/resourceBuilder.d.ts +2 -0
  29. package/Builder/types/sqlBuilder.d.ts +2 -1
  30. package/Builder/types/storageBuilder.d.ts +10 -8
  31. package/Builder/types/vaultBuilder.d.ts +6 -1
  32. package/Cdn/CdnEndpoint.d.ts +2 -3
  33. package/Cdn/CdnEndpoint.js +15 -17
  34. package/Cdn/CdnRules.d.ts +6 -2
  35. package/Cdn/CdnRules.js +51 -56
  36. package/Certificate/index.d.ts +2 -2
  37. package/Certificate/index.js +29 -29
  38. package/Common/AzureEnv.d.ts +2 -3
  39. package/Common/AzureEnv.js +21 -8
  40. package/Common/Naming/index.d.ts +1 -1
  41. package/Common/Naming/index.js +65 -61
  42. package/Common/index.d.ts +11 -6
  43. package/Common/index.js +6 -1
  44. package/ContainerRegistry/index.d.ts +5 -5
  45. package/ContainerRegistry/index.js +75 -50
  46. package/Core/KeyGenerators.d.ts +5 -5
  47. package/Core/KeyGenerators.js +5 -5
  48. package/CustomRoles/index.js +3 -3
  49. package/KeyVault/CustomHelper.d.ts +4 -4
  50. package/KeyVault/CustomHelper.js +7 -7
  51. package/KeyVault/Helper.js +12 -9
  52. package/Logs/Helpers.d.ts +1 -1
  53. package/RedisCache/index.d.ts +2 -2
  54. package/RedisCache/index.js +10 -5
  55. package/SignalR/index.d.ts +4 -4
  56. package/SignalR/index.js +26 -21
  57. package/Sql/SqlDb.js +2 -3
  58. package/Sql/index.d.ts +3 -4
  59. package/Sql/index.js +11 -11
  60. package/Storage/Helper.d.ts +1 -1
  61. package/Storage/index.d.ts +2 -3
  62. package/Storage/index.js +2 -2
  63. package/VNet/FirewallPolicies/AksFirewallPolicy.d.ts +4 -3
  64. package/VNet/FirewallPolicies/AksFirewallPolicy.js +116 -123
  65. package/VNet/FirewallPolicies/CloudPCFirewallPolicy.d.ts +4 -3
  66. package/VNet/FirewallPolicies/CloudPCFirewallPolicy.js +150 -132
  67. package/VNet/Helper.d.ts +1 -0
  68. package/VNet/Helper.js +25 -19
  69. package/VNet/index.d.ts +9 -9
  70. package/VNet/index.js +58 -49
  71. package/VNet/types.d.ts +9 -6
  72. package/package.json +6 -6
@@ -1,199 +1,192 @@
1
1
  "use strict";
2
2
  Object.defineProperty(exports, "__esModule", { value: true });
3
- const AzureEnv_1 = require("../../Common/AzureEnv");
3
+ const Common_1 = require("../../Common");
4
4
  const FirewallPolicy_1 = require("../FirewallPolicy");
5
- exports.default = ({ priority, allowAccessPublicRegistries, subnetSpaces, dNATs, }) => {
5
+ exports.default = ({ priority, allowAccessPublicRegistries, subnetSpaces, trustedAcrs = [], dNATs, }) => {
6
6
  const dnatRules = new Array();
7
7
  const netRules = new Array();
8
8
  const appRules = new Array();
9
9
  if (dNATs) {
10
10
  dNATs.forEach((nat) => {
11
11
  dnatRules.push({
12
- ruleType: "NatRule",
12
+ ruleType: 'NatRule',
13
13
  name: `${nat.name}-inbound-443`,
14
14
  description: `Forward port 443 external IpAddress of ${nat.name} to internal IpAddress`,
15
- sourceAddresses: [nat.sourceIpAddress ?? "*"],
15
+ sourceAddresses: [nat.sourceIpAddress ?? '*'],
16
16
  destinationAddresses: nat.publicIpAddresses,
17
- destinationPorts: ["443"],
18
- ipProtocols: ["TCP"],
17
+ destinationPorts: ['443'],
18
+ ipProtocols: ['TCP'],
19
19
  translatedAddress: nat.internalIpAddress,
20
- translatedPort: "443",
20
+ translatedPort: '443',
21
21
  });
22
22
  if (nat.allowHttp)
23
23
  dnatRules.push({
24
- ruleType: "NatRule",
24
+ ruleType: 'NatRule',
25
25
  name: `${nat.name}-inbound-80`,
26
26
  description: `Forward port 80 external IpAddress of ${nat.name} to internal IpAddress`,
27
- sourceAddresses: [nat.sourceIpAddress ?? "*"],
27
+ sourceAddresses: [nat.sourceIpAddress ?? '*'],
28
28
  destinationAddresses: nat.publicIpAddresses,
29
- destinationPorts: ["80"],
30
- ipProtocols: ["TCP"],
29
+ destinationPorts: ['80'],
30
+ ipProtocols: ['TCP'],
31
31
  translatedAddress: nat.internalIpAddress,
32
- translatedPort: "80",
32
+ translatedPort: '80',
33
33
  });
34
34
  });
35
35
  }
36
36
  //AKS Network Rules
37
37
  netRules.push({
38
- ruleType: "NetworkRule",
39
- name: "aks-vpn",
40
- description: "For OPEN VPN tunneled secure communication between the nodes and the control plane for AzureCloud.SoutheastAsia",
41
- ipProtocols: ["UDP"],
38
+ ruleType: 'NetworkRule',
39
+ name: 'aks-vpn',
40
+ description: 'For OPEN VPN tunneled secure communication between the nodes and the control plane for AzureCloud',
41
+ ipProtocols: ['UDP'],
42
42
  sourceAddresses: subnetSpaces,
43
- destinationAddresses: [`AzureCloud.${AzureEnv_1.currentRegionCode}`],
44
- destinationPorts: ["1194"],
43
+ destinationAddresses: [`AzureCloud.${Common_1.currentRegionCode}`],
44
+ destinationPorts: ['1194'],
45
45
  }, {
46
- ruleType: "NetworkRule",
47
- name: "aks-tcp",
48
- description: "For tunneled secure communication between the nodes and the control plane for AzureCloud.SoutheastAsia",
49
- ipProtocols: ["TCP"],
46
+ ruleType: 'NetworkRule',
47
+ name: 'aks-tcp',
48
+ description: 'For tunneled secure communication between the nodes and the control plane for AzureCloud',
49
+ ipProtocols: ['TCP'],
50
50
  sourceAddresses: subnetSpaces,
51
- destinationAddresses: [`AzureCloud.${AzureEnv_1.currentRegionCode}`],
52
- destinationPorts: ["443", "9000"],
51
+ destinationAddresses: [`AzureCloud.${Common_1.currentRegionCode}`],
52
+ destinationPorts: Common_1.allAzurePorts,
53
53
  }, {
54
- ruleType: "NetworkRule",
55
- name: "aks-time",
56
- description: "Required for Network Time Protocol (NTP) time synchronization on Linux nodes.",
57
- ipProtocols: ["UDP"],
54
+ ruleType: 'NetworkRule',
55
+ name: 'aks-time',
56
+ description: 'Required for Network Time Protocol (NTP) time synchronization on Linux nodes.',
57
+ ipProtocols: ['UDP'],
58
58
  sourceAddresses: subnetSpaces,
59
- destinationAddresses: ["ntp.ubuntu.com"],
60
- destinationPorts: ["123"],
59
+ destinationAddresses: ['ntp.ubuntu.com'],
60
+ destinationPorts: ['123'],
61
61
  },
62
62
  //TODO: Remove this
63
+ // {
64
+ // ruleType: 'NetworkRule',
65
+ // name: 'aks-time-others',
66
+ // description:
67
+ // 'Required for Network Time Protocol (NTP) time synchronization on Linux nodes.',
68
+ // ipProtocols: ['UDP'],
69
+ // sourceAddresses: subnetSpaces,
70
+ // destinationAddresses: ['*'],
71
+ // destinationPorts: ['123'],
72
+ // },
63
73
  {
64
- ruleType: "NetworkRule",
65
- name: "aks-time-others",
66
- description: "Required for Network Time Protocol (NTP) time synchronization on Linux nodes.",
67
- ipProtocols: ["UDP"],
68
- sourceAddresses: subnetSpaces,
69
- destinationAddresses: ["*"],
70
- destinationPorts: ["123"],
71
- }, {
72
- ruleType: "NetworkRule",
73
- name: "azure-services-tags",
74
- description: "Allows internal services to connect to Azure Resources.",
75
- ipProtocols: ["TCP"],
74
+ ruleType: 'NetworkRule',
75
+ name: 'azure-services-tags',
76
+ description: 'Allows internal services to connect to Azure Resources.',
77
+ ipProtocols: ['TCP'],
76
78
  sourceAddresses: subnetSpaces,
77
79
  destinationAddresses: [
78
- "AzureContainerRegistry.SoutheastAsia",
79
- "MicrosoftContainerRegistry.SoutheastAsia",
80
- "AzureActiveDirectory",
81
- "AzureMonitor.SoutheastAsia",
82
- "AppConfiguration",
83
- "AzureKeyVault.SoutheastAsia",
84
- //'AzureConnectors.SoutheastAsia',
85
- //'AzureSignalR', This already using private endpoint
86
- //'DataFactory.SoutheastAsia',
87
- //'EventHub.SoutheastAsia',
88
- "ServiceBus.SoutheastAsia",
89
- //'Sql.SoutheastAsia', This already using private endpoint
90
- "Storage.SoutheastAsia",
80
+ 'AzureContainerRegistry',
81
+ 'MicrosoftContainerRegistry',
82
+ 'AzureActiveDirectory',
83
+ 'AzureMonitor',
84
+ 'AppConfiguration',
85
+ 'AzureKeyVault',
91
86
  ],
92
- destinationPorts: ["443"],
87
+ destinationPorts: ['443'],
93
88
  }, {
94
- ruleType: "NetworkRule",
95
- name: "others-dns",
96
- description: "Others DNS.",
97
- ipProtocols: ["TCP", "UDP"],
89
+ ruleType: 'NetworkRule',
90
+ name: 'others-dns',
91
+ description: 'Others DNS.',
92
+ ipProtocols: ['TCP', 'UDP'],
98
93
  sourceAddresses: subnetSpaces,
99
- destinationAddresses: ["*"],
100
- destinationPorts: ["53"],
94
+ destinationAddresses: ['*'],
95
+ destinationPorts: ['53'],
101
96
  });
102
97
  //AKS Apps Rules
103
98
  appRules.push({
104
- ruleType: "ApplicationRule",
105
- name: "aks-services-fqdnTags",
106
- description: "Allows pods to access AzureKubernetesService",
99
+ ruleType: 'ApplicationRule',
100
+ name: 'aks-services-fqdnTags',
101
+ description: 'Allows pods to access AzureKubernetesService',
107
102
  sourceAddresses: subnetSpaces,
108
- fqdnTags: ["AzureKubernetesService"],
109
- protocols: [{ protocolType: "Https", port: 443 }],
103
+ fqdnTags: ['AzureKubernetesService'],
104
+ protocols: [{ protocolType: 'Https', port: 443 }],
110
105
  }, {
111
- ruleType: "ApplicationRule",
112
- name: "aks-fqdn",
113
- description: "Azure Global required FQDN",
106
+ ruleType: 'ApplicationRule',
107
+ name: 'aks-fqdn',
108
+ description: 'Azure Global required FQDN',
114
109
  sourceAddresses: subnetSpaces,
115
110
  targetFqdns: [
116
111
  //AKS mater
117
- "*.hcp.southeastasia.azmk8s.io",
112
+ `*.hcp.${Common_1.currentRegionCode}.azmk8s.io`,
118
113
  //Microsoft Container Registry
119
- "mcr.microsoft.com",
120
- "data.mcr.microsoft.com",
121
- "*.data.mcr.microsoft.com",
114
+ ...trustedAcrs?.map((s) => `${s}.azurecr.io`),
115
+ 'mcr.microsoft.com',
116
+ '*.mcr.microsoft.com',
117
+ //'data.mcr.microsoft.com',
118
+ //'*.data.mcr.microsoft.com',
122
119
  //Azure management
123
- "management.azure.com",
124
- "login.microsoftonline.com",
120
+ 'management.azure.com',
121
+ 'login.microsoftonline.com',
125
122
  //Microsoft trusted package repository
126
- "packages.microsoft.com",
127
- //Azure CDN
128
- //"acs-mirror.azureedge.net",
129
- //CosmosDb
130
- //"*.documents.azure.com",
123
+ 'packages.microsoft.com',
131
124
  ],
132
- protocols: [{ protocolType: "Https", port: 443 }],
125
+ protocols: [{ protocolType: 'Https', port: 443 }],
133
126
  }, {
134
- ruleType: "ApplicationRule",
135
- name: "azure-monitors",
136
- description: "Azure AKS Monitoring",
127
+ ruleType: 'ApplicationRule',
128
+ name: 'azure-monitors',
129
+ description: 'Azure AKS Monitoring',
137
130
  sourceAddresses: subnetSpaces,
138
131
  targetFqdns: [
139
- "dc.services.visualstudio.com",
140
- "*.ods.opinsights.azure.com",
141
- "*.oms.opinsights.azure.com",
142
- "*.monitoring.azure.com",
143
- "*.services.visualstudio.com",
132
+ 'dc.services.visualstudio.com',
133
+ '*.ods.opinsights.azure.com',
134
+ '*.oms.opinsights.azure.com',
135
+ '*.monitoring.azure.com',
136
+ '*.services.visualstudio.com',
144
137
  ],
145
- protocols: [{ protocolType: "Https", port: 443 }],
138
+ protocols: [{ protocolType: 'Https', port: 443 }],
146
139
  }, {
147
- ruleType: "ApplicationRule",
148
- name: "azure-policy",
149
- description: "Azure AKS Policy Management",
140
+ ruleType: 'ApplicationRule',
141
+ name: 'azure-policy',
142
+ description: 'Azure AKS Policy Management',
150
143
  sourceAddresses: subnetSpaces,
151
144
  targetFqdns: [
152
- "*.policy.core.windows.net",
153
- "gov-prod-policy-data.trafficmanager.net",
154
- "raw.githubusercontent.com",
155
- "dc.services.visualstudio.com",
145
+ '*.policy.core.windows.net',
146
+ 'gov-prod-policy-data.trafficmanager.net',
147
+ 'raw.githubusercontent.com',
148
+ 'dc.services.visualstudio.com',
156
149
  ],
157
- protocols: [{ protocolType: "Https", port: 443 }],
150
+ protocols: [{ protocolType: 'Https', port: 443 }],
158
151
  });
159
152
  if (allowAccessPublicRegistries) {
160
153
  appRules.push({
161
- ruleType: "ApplicationRule",
162
- name: "docker-services",
154
+ ruleType: 'ApplicationRule',
155
+ name: 'docker-services',
163
156
  sourceAddresses: subnetSpaces,
164
- targetFqdns: ["*.docker.io", "docker.io", "*.docker.com", "*.pkg.dev"],
165
- protocols: [{ protocolType: "Https", port: 443 }],
157
+ targetFqdns: ['*.docker.io', 'docker.io', '*.docker.com', '*.pkg.dev'],
158
+ protocols: [{ protocolType: 'Https', port: 443 }],
166
159
  }, {
167
- ruleType: "ApplicationRule",
168
- name: "k8s-services",
160
+ ruleType: 'ApplicationRule',
161
+ name: 'k8s-services',
169
162
  sourceAddresses: subnetSpaces,
170
163
  targetFqdns: [
171
- "quay.io", //For Cert Manager
172
- "*.quay.io",
173
- "k8s.gcr.io", //nginx images
174
- "*.k8s.io",
175
- "*.cloudfront.net",
176
- "*.amazonaws.com",
177
- "*.gcr.io",
178
- "*.googleapis.com",
164
+ 'quay.io', //For Cert Manager
165
+ '*.quay.io',
166
+ 'k8s.gcr.io', //nginx images
167
+ '*.k8s.io',
168
+ '*.cloudfront.net',
169
+ '*.amazonaws.com',
170
+ '*.gcr.io',
171
+ '*.googleapis.com',
179
172
  ],
180
- protocols: [{ protocolType: "Https", port: 443 }],
173
+ protocols: [{ protocolType: 'Https', port: 443 }],
181
174
  }, {
182
- ruleType: "ApplicationRule",
183
- name: "ubuntu-services",
175
+ ruleType: 'ApplicationRule',
176
+ name: 'ubuntu-services',
184
177
  sourceAddresses: subnetSpaces,
185
178
  targetFqdns: [
186
- "security.ubuntu.com",
187
- "azure.archive.ubuntu.com",
188
- "changelogs.ubuntu.com",
179
+ 'security.ubuntu.com',
180
+ 'azure.archive.ubuntu.com',
181
+ 'changelogs.ubuntu.com',
189
182
  ],
190
- protocols: [{ protocolType: "Https", port: 443 }],
183
+ protocols: [{ protocolType: 'Https', port: 443 }],
191
184
  });
192
185
  }
193
186
  return (0, FirewallPolicy_1.FirewallPolicyGroup)({
194
- policy: { name: "aks-firewall-policy", dnatRules, netRules, appRules },
187
+ policy: { name: 'aks-firewall-policy', dnatRules, netRules, appRules },
195
188
  priority,
196
- action: "Allow",
189
+ action: 'Allow',
197
190
  });
198
191
  };
199
- //# sourceMappingURL=data:application/json;base64,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
192
+ //# sourceMappingURL=data:application/json;base64,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
@@ -1,5 +1,5 @@
1
- import { Input } from "@pulumi/pulumi";
2
- import { FirewallPolicyRuleCollectionResults } from "../types";
1
+ import { Input } from '@pulumi/pulumi';
2
+ import { FirewallPolicyRuleCollectionResults } from '../types';
3
3
  interface Props {
4
4
  name?: string;
5
5
  priority: number;
@@ -9,9 +9,10 @@ interface Props {
9
9
  allowsAzure?: boolean;
10
10
  allowsAzDevOps?: boolean;
11
11
  allowsK8sTools?: boolean;
12
+ allowsDevTools?: boolean;
12
13
  allowsSearch?: boolean;
13
14
  allowsOffice365?: boolean;
14
15
  allowsWindows365?: boolean;
15
16
  }
16
- declare const _default: ({ name, priority, subnetSpaces, allowsOffice365, allowsWindows365, allowsAzure, allowsAzDevOps, allowsK8sTools, allowIpCheckApi, allowsSearch, allowAllOutbound, }: Props) => FirewallPolicyRuleCollectionResults;
17
+ declare const _default: ({ name, priority, subnetSpaces, allowsOffice365, allowsWindows365, allowsAzure, allowsAzDevOps, allowsK8sTools, allowsDevTools, allowIpCheckApi, allowsSearch, allowAllOutbound, }: Props) => FirewallPolicyRuleCollectionResults;
17
18
  export default _default;