@drunk-pulumi/azure 1.0.3 → 1.0.5
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/Aks/Helper.js +4 -3
- package/Aks/Identity.js +3 -3
- package/Aks/index.d.ts +8 -7
- package/Aks/index.js +73 -57
- package/Automation/index.d.ts +1 -1
- package/Automation/index.js +5 -5
- package/AzAd/EnvRoles.Consts.d.ts +13 -8
- package/AzAd/EnvRoles.Consts.js +51 -51
- package/AzAd/EnvRoles.d.ts +3 -3
- package/AzAd/EnvRoles.js +10 -10
- package/AzAd/Group.d.ts +2 -2
- package/AzAd/Group.js +12 -12
- package/AzAd/Identities/AzDevOpsIdentity.d.ts +1 -1
- package/AzAd/Identities/AzDevOpsIdentity.js +9 -6
- package/AzAd/Identities/AzDevOpsManagedIdentity.d.ts +2 -2
- package/AzAd/Identities/AzDevOpsManagedIdentity.js +6 -3
- package/AzAd/RoleAssignment.d.ts +3 -3
- package/AzAd/RoleAssignment.js +3 -3
- package/AzAd/RoleDefinitions/JustInTimeRequestRole.js +10 -10
- package/Builder/AksBuilder.js +15 -1
- package/Builder/PrivateDnsZoneBuilder.d.ts +2 -1
- package/Builder/PrivateDnsZoneBuilder.js +41 -23
- package/Builder/ResourceBuilder.js +12 -6
- package/Builder/SqlBuilder.js +7 -1
- package/Builder/StorageBuilder.js +14 -14
- package/Builder/VaultBuilder.d.ts +2 -1
- package/Builder/VaultBuilder.js +8 -1
- package/Builder/types/resourceBuilder.d.ts +2 -0
- package/Builder/types/sqlBuilder.d.ts +2 -1
- package/Builder/types/storageBuilder.d.ts +10 -8
- package/Builder/types/vaultBuilder.d.ts +6 -1
- package/Cdn/CdnEndpoint.d.ts +2 -3
- package/Cdn/CdnEndpoint.js +15 -17
- package/Cdn/CdnRules.d.ts +6 -2
- package/Cdn/CdnRules.js +51 -56
- package/Certificate/index.d.ts +2 -2
- package/Certificate/index.js +29 -29
- package/Common/AzureEnv.d.ts +2 -3
- package/Common/AzureEnv.js +21 -8
- package/Common/Naming/index.d.ts +1 -1
- package/Common/Naming/index.js +65 -61
- package/Common/index.d.ts +11 -6
- package/Common/index.js +6 -1
- package/ContainerRegistry/index.d.ts +5 -5
- package/ContainerRegistry/index.js +75 -50
- package/Core/KeyGenerators.d.ts +5 -5
- package/Core/KeyGenerators.js +5 -5
- package/CustomRoles/index.js +3 -3
- package/KeyVault/CustomHelper.d.ts +4 -4
- package/KeyVault/CustomHelper.js +7 -7
- package/KeyVault/Helper.js +12 -9
- package/Logs/Helpers.d.ts +1 -1
- package/RedisCache/index.d.ts +2 -2
- package/RedisCache/index.js +10 -5
- package/SignalR/index.d.ts +4 -4
- package/SignalR/index.js +26 -21
- package/Sql/SqlDb.js +2 -3
- package/Sql/index.d.ts +3 -4
- package/Sql/index.js +11 -11
- package/Storage/Helper.d.ts +1 -1
- package/Storage/index.d.ts +2 -3
- package/Storage/index.js +2 -2
- package/VNet/FirewallPolicies/AksFirewallPolicy.d.ts +4 -3
- package/VNet/FirewallPolicies/AksFirewallPolicy.js +116 -123
- package/VNet/FirewallPolicies/CloudPCFirewallPolicy.d.ts +4 -3
- package/VNet/FirewallPolicies/CloudPCFirewallPolicy.js +150 -132
- package/VNet/Helper.d.ts +1 -0
- package/VNet/Helper.js +25 -19
- package/VNet/index.d.ts +9 -9
- package/VNet/index.js +58 -49
- package/VNet/types.d.ts +9 -6
- package/package.json +6 -6
|
@@ -3,192 +3,210 @@ Object.defineProperty(exports, "__esModule", { value: true });
|
|
|
3
3
|
const AzureEnv_1 = require("../../Common/AzureEnv");
|
|
4
4
|
const FirewallPolicy_1 = require("../FirewallPolicy");
|
|
5
5
|
//https://www.robtex.com/dns-lookup/global.azure-devices-provisioning.net
|
|
6
|
-
exports.default = ({ name =
|
|
6
|
+
exports.default = ({ name = 'cloud-pc', priority, subnetSpaces, allowsOffice365, allowsWindows365, allowsAzure, allowsAzDevOps, allowsK8sTools, allowsDevTools, allowIpCheckApi, allowsSearch, allowAllOutbound, }) => {
|
|
7
7
|
const netRules = new Array();
|
|
8
8
|
const appRules = new Array();
|
|
9
9
|
if (allowAllOutbound) {
|
|
10
10
|
netRules.push({
|
|
11
|
-
ruleType:
|
|
11
|
+
ruleType: 'NetworkRule',
|
|
12
12
|
name: `${name}-net-allow-all-outbound`,
|
|
13
|
-
description:
|
|
14
|
-
ipProtocols: [
|
|
13
|
+
description: 'CloudPc allows all outbound',
|
|
14
|
+
ipProtocols: ['TCP'],
|
|
15
15
|
sourceAddresses: subnetSpaces,
|
|
16
|
-
destinationAddresses: [
|
|
17
|
-
destinationPorts: [
|
|
16
|
+
destinationAddresses: ['*'],
|
|
17
|
+
destinationPorts: ['443'],
|
|
18
18
|
});
|
|
19
19
|
}
|
|
20
20
|
//Default PC Rules
|
|
21
21
|
appRules.push({
|
|
22
|
-
ruleType:
|
|
22
|
+
ruleType: 'ApplicationRule',
|
|
23
23
|
name: `${name}-app-allow-fqdnTags`,
|
|
24
|
-
description:
|
|
24
|
+
description: 'Allows Windows Updates',
|
|
25
25
|
sourceAddresses: subnetSpaces,
|
|
26
|
-
fqdnTags: [
|
|
27
|
-
protocols: [{ protocolType:
|
|
26
|
+
fqdnTags: ['WindowsUpdate', 'WindowsDiagnostics'],
|
|
27
|
+
protocols: [{ protocolType: 'Https', port: 443 }],
|
|
28
28
|
});
|
|
29
29
|
if (allowsAzure) {
|
|
30
30
|
netRules.push({
|
|
31
|
-
ruleType:
|
|
31
|
+
ruleType: 'NetworkRule',
|
|
32
32
|
name: `${name}-net-allows-azure`,
|
|
33
|
-
description:
|
|
34
|
-
ipProtocols: [
|
|
33
|
+
description: 'Allows Cloud PC to access to Azure.',
|
|
34
|
+
ipProtocols: ['TCP', 'UDP'],
|
|
35
35
|
sourceAddresses: subnetSpaces,
|
|
36
36
|
destinationAddresses: [`AzureCloud.${AzureEnv_1.currentRegionCode}`],
|
|
37
|
-
destinationPorts:
|
|
37
|
+
destinationPorts: AzureEnv_1.allAzurePorts,
|
|
38
38
|
});
|
|
39
39
|
netRules.push({
|
|
40
|
-
ruleType:
|
|
40
|
+
ruleType: 'NetworkRule',
|
|
41
41
|
name: `${name}-net-allows-azure-all`,
|
|
42
|
-
description:
|
|
43
|
-
ipProtocols: [
|
|
42
|
+
description: 'Allows Cloud PC to access to Azure.',
|
|
43
|
+
ipProtocols: ['TCP', 'UDP'],
|
|
44
44
|
sourceAddresses: subnetSpaces,
|
|
45
45
|
destinationAddresses: [`AzureCloud`],
|
|
46
|
-
destinationPorts:
|
|
46
|
+
destinationPorts: AzureEnv_1.allAzurePorts,
|
|
47
47
|
});
|
|
48
48
|
appRules.push({
|
|
49
|
-
ruleType:
|
|
49
|
+
ruleType: 'ApplicationRule',
|
|
50
50
|
name: `${name}-app-allow-azure-fqdnTags`,
|
|
51
|
-
description:
|
|
51
|
+
description: 'Allows Windows Updates',
|
|
52
52
|
sourceAddresses: subnetSpaces,
|
|
53
53
|
fqdnTags: [
|
|
54
|
-
|
|
55
|
-
|
|
56
|
-
|
|
54
|
+
'AzureBackup',
|
|
55
|
+
'AzureKubernetesService',
|
|
56
|
+
'AzureActiveDirectoryDomainServices',
|
|
57
57
|
],
|
|
58
|
-
protocols: [{ protocolType:
|
|
58
|
+
protocols: [{ protocolType: 'Https', port: 443 }],
|
|
59
59
|
});
|
|
60
60
|
appRules.push({
|
|
61
|
-
ruleType:
|
|
61
|
+
ruleType: 'ApplicationRule',
|
|
62
62
|
name: `${name}-app-allow-access-azure-portal`,
|
|
63
|
-
description:
|
|
63
|
+
description: 'Allows Ip Azure Portal',
|
|
64
64
|
sourceAddresses: subnetSpaces,
|
|
65
65
|
targetFqdns: [
|
|
66
|
-
|
|
67
|
-
|
|
68
|
-
|
|
69
|
-
|
|
70
|
-
|
|
71
|
-
|
|
72
|
-
|
|
73
|
-
|
|
66
|
+
'*.azure.com',
|
|
67
|
+
'*.azure.net',
|
|
68
|
+
'*.microsoftonline.com',
|
|
69
|
+
'*.msauth.net',
|
|
70
|
+
'*.msauthimages.net',
|
|
71
|
+
'*.msecnd.net',
|
|
72
|
+
'*.msftauth.net',
|
|
73
|
+
'*.msftauthimages.net',
|
|
74
74
|
],
|
|
75
|
-
protocols: [{ protocolType:
|
|
75
|
+
protocols: [{ protocolType: 'Https', port: 443 }],
|
|
76
76
|
});
|
|
77
77
|
}
|
|
78
78
|
if (allowsAzDevOps) {
|
|
79
79
|
netRules.push({
|
|
80
|
-
ruleType:
|
|
80
|
+
ruleType: 'NetworkRule',
|
|
81
81
|
name: `${name}-net-allow-AzureDevOps`,
|
|
82
|
-
description:
|
|
83
|
-
ipProtocols: [
|
|
82
|
+
description: 'AzureDevOps',
|
|
83
|
+
ipProtocols: ['TCP'],
|
|
84
84
|
sourceAddresses: subnetSpaces,
|
|
85
85
|
destinationAddresses: [
|
|
86
|
-
|
|
87
|
-
|
|
88
|
-
|
|
89
|
-
|
|
86
|
+
'13.107.6.0/24',
|
|
87
|
+
'13.107.9.0/24',
|
|
88
|
+
'13.107.42.0/24',
|
|
89
|
+
'13.107.43.0/24',
|
|
90
90
|
],
|
|
91
|
-
destinationPorts: [
|
|
91
|
+
destinationPorts: ['443'],
|
|
92
92
|
});
|
|
93
93
|
appRules.push({
|
|
94
|
-
ruleType:
|
|
94
|
+
ruleType: 'ApplicationRule',
|
|
95
95
|
name: `${name}-app-allow-azure-resources`,
|
|
96
|
-
description:
|
|
97
|
-
protocols: [{ protocolType:
|
|
96
|
+
description: 'Allows Azure Resources',
|
|
97
|
+
protocols: [{ protocolType: 'Https', port: 443 }],
|
|
98
98
|
sourceAddresses: subnetSpaces,
|
|
99
99
|
targetFqdns: [
|
|
100
100
|
//Azure DevOps
|
|
101
|
-
|
|
102
|
-
|
|
103
|
-
|
|
104
|
-
|
|
105
|
-
|
|
106
|
-
|
|
107
|
-
|
|
108
|
-
|
|
109
|
-
|
|
110
|
-
|
|
111
|
-
|
|
112
|
-
|
|
113
|
-
|
|
114
|
-
|
|
115
|
-
|
|
116
|
-
|
|
117
|
-
|
|
118
|
-
|
|
119
|
-
|
|
120
|
-
|
|
121
|
-
|
|
122
|
-
|
|
123
|
-
|
|
124
|
-
|
|
125
|
-
|
|
126
|
-
|
|
127
|
-
|
|
128
|
-
|
|
129
|
-
|
|
130
|
-
|
|
131
|
-
|
|
132
|
-
|
|
133
|
-
|
|
134
|
-
|
|
101
|
+
'vscode.dev',
|
|
102
|
+
'*.vscode.dev',
|
|
103
|
+
'*.dev.azure.com',
|
|
104
|
+
'*.vsassets.io',
|
|
105
|
+
'*gallerycdn.vsassets.io',
|
|
106
|
+
'*vstmrblob.vsassets.io',
|
|
107
|
+
'aadcdn.msauth.net',
|
|
108
|
+
'aadcdn.msftauth.net',
|
|
109
|
+
'aex.dev.azure.com',
|
|
110
|
+
'aexprodea1.vsaex.visualstudio.com',
|
|
111
|
+
'amcdn.msftauth.net',
|
|
112
|
+
'amp.azure.net',
|
|
113
|
+
'app.vssps.dev.azure.com',
|
|
114
|
+
'app.vssps.visualstudio.com',
|
|
115
|
+
'*.vssps.visualstudio.com',
|
|
116
|
+
'azure.microsoft.com',
|
|
117
|
+
'azurecomcdn.azureedge.net',
|
|
118
|
+
'cdn.vsassets.io',
|
|
119
|
+
'dev.azure.com',
|
|
120
|
+
'go.microsoft.com',
|
|
121
|
+
'graph.microsoft.com',
|
|
122
|
+
'live.com',
|
|
123
|
+
'login.live.com',
|
|
124
|
+
'login.microsoftonline.com',
|
|
125
|
+
'management.azure.com',
|
|
126
|
+
'management.core.windows.net',
|
|
127
|
+
'microsoft.com',
|
|
128
|
+
'microsoftonline.com',
|
|
129
|
+
'static2.sharepointonline.com',
|
|
130
|
+
'visualstudio.com',
|
|
131
|
+
'vsrm.dev.azure.com',
|
|
132
|
+
'vstsagentpackage.azureedge.net',
|
|
133
|
+
'windows.net',
|
|
134
|
+
'login.microsoftonline.com',
|
|
135
|
+
'app.vssps.visualstudio.com',
|
|
136
|
+
'*.blob.core.windows.net',
|
|
135
137
|
],
|
|
136
138
|
});
|
|
137
139
|
}
|
|
138
140
|
if (allowsK8sTools) {
|
|
139
141
|
appRules.push({
|
|
140
|
-
ruleType:
|
|
142
|
+
ruleType: 'ApplicationRule',
|
|
141
143
|
name: `${name}-app-allow-k8s-lens`,
|
|
142
|
-
description:
|
|
144
|
+
description: 'Allows K8s Lens',
|
|
143
145
|
sourceAddresses: subnetSpaces,
|
|
144
146
|
targetFqdns: [
|
|
145
|
-
|
|
146
|
-
|
|
147
|
-
|
|
148
|
-
|
|
149
|
-
|
|
150
|
-
|
|
151
|
-
|
|
147
|
+
'*.k8slens.dev',
|
|
148
|
+
'github.com',
|
|
149
|
+
'*.githubassets.com',
|
|
150
|
+
'*.githubusercontent.com',
|
|
151
|
+
'*.googleapis.com',
|
|
152
|
+
'aka.ms',
|
|
153
|
+
'*.chocolatey.org',
|
|
152
154
|
],
|
|
153
|
-
protocols: [{ protocolType:
|
|
155
|
+
protocols: [{ protocolType: 'Https', port: 443 }],
|
|
156
|
+
});
|
|
157
|
+
}
|
|
158
|
+
if (allowsDevTools) {
|
|
159
|
+
appRules.push({
|
|
160
|
+
ruleType: 'ApplicationRule',
|
|
161
|
+
name: `${name}-app-allow-dev-tools`,
|
|
162
|
+
description: 'Allows Dev Tools',
|
|
163
|
+
sourceAddresses: subnetSpaces,
|
|
164
|
+
targetFqdns: [
|
|
165
|
+
'github.com',
|
|
166
|
+
'*.github.com',
|
|
167
|
+
'*.pulumi.com',
|
|
168
|
+
'*.npmjs.com',
|
|
169
|
+
'*.nuget.org',
|
|
170
|
+
],
|
|
171
|
+
protocols: [{ protocolType: 'Https', port: 443 }],
|
|
154
172
|
});
|
|
155
173
|
}
|
|
156
174
|
if (allowsOffice365) {
|
|
157
175
|
appRules.push({
|
|
158
|
-
ruleType:
|
|
176
|
+
ruleType: 'ApplicationRule',
|
|
159
177
|
name: `${name}-app-allow-office365`,
|
|
160
|
-
description:
|
|
178
|
+
description: 'Allows Office365',
|
|
161
179
|
sourceAddresses: subnetSpaces,
|
|
162
|
-
fqdnTags: [
|
|
163
|
-
protocols: [{ protocolType:
|
|
180
|
+
fqdnTags: ['Office365', 'Office365.SharePoint'],
|
|
181
|
+
protocols: [{ protocolType: 'Https', port: 443 }],
|
|
164
182
|
});
|
|
165
183
|
}
|
|
166
184
|
if (allowsWindows365) {
|
|
167
185
|
appRules.push({
|
|
168
|
-
ruleType:
|
|
186
|
+
ruleType: 'ApplicationRule',
|
|
169
187
|
name: `${name}-app-allow-win365`,
|
|
170
|
-
description:
|
|
188
|
+
description: 'Allows Windows365',
|
|
171
189
|
sourceAddresses: subnetSpaces,
|
|
172
|
-
fqdnTags: [
|
|
173
|
-
protocols: [{ protocolType:
|
|
190
|
+
fqdnTags: ['Windows365', 'MicrosoftIntune'],
|
|
191
|
+
protocols: [{ protocolType: 'Https', port: 443 }],
|
|
174
192
|
});
|
|
175
193
|
netRules.push({
|
|
176
|
-
ruleType:
|
|
194
|
+
ruleType: 'NetworkRule',
|
|
177
195
|
name: `${name}-net-allow-win365-windows-net`,
|
|
178
|
-
description:
|
|
179
|
-
ipProtocols: [
|
|
196
|
+
description: 'CloudPc allows Windows 365 windows.net',
|
|
197
|
+
ipProtocols: ['TCP'],
|
|
180
198
|
sourceAddresses: subnetSpaces,
|
|
181
199
|
//destinationFqdns: ["azkms.core.windows.net"],
|
|
182
200
|
destinationAddresses: [
|
|
183
|
-
|
|
201
|
+
'40.83.235.53',
|
|
184
202
|
//"2a01:111:f100:3000::a83e:1b30"
|
|
185
203
|
],
|
|
186
|
-
destinationPorts: [
|
|
204
|
+
destinationPorts: ['1688'],
|
|
187
205
|
}, {
|
|
188
|
-
ruleType:
|
|
206
|
+
ruleType: 'NetworkRule',
|
|
189
207
|
name: `${name}-net-allow-win365-azure-devices`,
|
|
190
|
-
description:
|
|
191
|
-
ipProtocols: [
|
|
208
|
+
description: 'CloudPc allows Windows 365 azure-devices',
|
|
209
|
+
ipProtocols: ['TCP'],
|
|
192
210
|
sourceAddresses: subnetSpaces,
|
|
193
211
|
// destinationFqdns: [
|
|
194
212
|
// "global.azure-devices-provisioning.net",
|
|
@@ -204,52 +222,52 @@ exports.default = ({ name = "cloud-pc", priority, subnetSpaces, allowsOffice365,
|
|
|
204
222
|
// "hm-iot-in-4-prod-prna01.azure-devices.net",
|
|
205
223
|
// ],
|
|
206
224
|
destinationAddresses: [
|
|
207
|
-
|
|
208
|
-
|
|
209
|
-
|
|
210
|
-
|
|
211
|
-
|
|
212
|
-
|
|
213
|
-
|
|
214
|
-
|
|
215
|
-
|
|
216
|
-
|
|
225
|
+
'23.98.104.204',
|
|
226
|
+
'40.78.238.4',
|
|
227
|
+
'20.150.179.224',
|
|
228
|
+
'52.236.189.131',
|
|
229
|
+
'13.69.71.14',
|
|
230
|
+
'13.69.71.2',
|
|
231
|
+
'13.70.74.193',
|
|
232
|
+
'13.86.221.39',
|
|
233
|
+
'13.86.221.36',
|
|
234
|
+
'13.86.221.43',
|
|
217
235
|
],
|
|
218
|
-
destinationPorts: [
|
|
236
|
+
destinationPorts: ['443', '5671'],
|
|
219
237
|
}, {
|
|
220
|
-
ruleType:
|
|
238
|
+
ruleType: 'NetworkRule',
|
|
221
239
|
name: `${name}-net-allow-win365-udp-tcp`,
|
|
222
|
-
description:
|
|
223
|
-
ipProtocols: [
|
|
240
|
+
description: 'CloudPc allows Windows 365 udp tcp',
|
|
241
|
+
ipProtocols: ['UDP', 'TCP'],
|
|
224
242
|
sourceAddresses: subnetSpaces,
|
|
225
|
-
destinationAddresses: [
|
|
226
|
-
destinationPorts: [
|
|
243
|
+
destinationAddresses: ['20.202.0.0/16'],
|
|
244
|
+
destinationPorts: ['443', '3478'],
|
|
227
245
|
});
|
|
228
246
|
}
|
|
229
247
|
if (allowsSearch) {
|
|
230
248
|
appRules.push({
|
|
231
|
-
ruleType:
|
|
249
|
+
ruleType: 'ApplicationRule',
|
|
232
250
|
name: `${name}-app-allow-search-engines`,
|
|
233
|
-
description:
|
|
251
|
+
description: 'Allows Search Engines',
|
|
234
252
|
sourceAddresses: subnetSpaces,
|
|
235
|
-
targetFqdns: [
|
|
236
|
-
protocols: [{ protocolType:
|
|
253
|
+
targetFqdns: ['google.com', 'www.google.com', 'bing.com', 'www.bing.com'],
|
|
254
|
+
protocols: [{ protocolType: 'Https', port: 443 }],
|
|
237
255
|
});
|
|
238
256
|
}
|
|
239
257
|
if (allowIpCheckApi) {
|
|
240
258
|
appRules.push({
|
|
241
|
-
ruleType:
|
|
259
|
+
ruleType: 'ApplicationRule',
|
|
242
260
|
name: `${name}-app-allow-ip-checks`,
|
|
243
|
-
description:
|
|
261
|
+
description: 'Allows Ip Checks',
|
|
244
262
|
sourceAddresses: subnetSpaces,
|
|
245
|
-
targetFqdns: [
|
|
246
|
-
protocols: [{ protocolType:
|
|
263
|
+
targetFqdns: ['ip.me', 'ifconfig.me', '*.ifconfig.me'],
|
|
264
|
+
protocols: [{ protocolType: 'Https', port: 443 }],
|
|
247
265
|
});
|
|
248
266
|
}
|
|
249
267
|
return (0, FirewallPolicy_1.FirewallPolicyGroup)({
|
|
250
268
|
policy: { name: `${name}-firewall-policy`, netRules, appRules },
|
|
251
269
|
priority,
|
|
252
|
-
action:
|
|
270
|
+
action: 'Allow',
|
|
253
271
|
});
|
|
254
272
|
};
|
|
255
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
273
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"CloudPCFirewallPolicy.js","sourceRoot":"","sources":["../../../src/VNet/FirewallPolicies/CloudPCFirewallPolicy.ts"],"names":[],"mappings":";;AACA,oDAAyE;AAMzE,sDAAwD;AAiBxD,yEAAyE;AAEzE,kBAAe,CAAC,EACd,IAAI,GAAG,UAAU,EACjB,QAAQ,EACR,YAAY,EACZ,eAAe,EACf,gBAAgB,EAChB,WAAW,EACX,cAAc,EACd,cAAc,EACd,cAAc,EACd,eAAe,EACf,YAAY,EACZ,gBAAgB,GACV,EAAuC,EAAE;IAC/C,MAAM,QAAQ,GAAG,IAAI,KAAK,EAA0B,CAAC;IACrD,MAAM,QAAQ,GAAG,IAAI,KAAK,EAA8B,CAAC;IAEzD,IAAI,gBAAgB,EAAE,CAAC;QACrB,QAAQ,CAAC,IAAI,CAAC;YACZ,QAAQ,EAAE,aAAa;YACvB,IAAI,EAAE,GAAG,IAAI,yBAAyB;YACtC,WAAW,EAAE,6BAA6B;YAC1C,WAAW,EAAE,CAAC,KAAK,CAAC;YACpB,eAAe,EAAE,YAAY;YAC7B,oBAAoB,EAAE,CAAC,GAAG,CAAC;YAC3B,gBAAgB,EAAE,CAAC,KAAK,CAAC;SAC1B,CAAC,CAAC;IACL,CAAC;IAED,kBAAkB;IAClB,QAAQ,CAAC,IAAI,CAAC;QACZ,QAAQ,EAAE,iBAAiB;QAC3B,IAAI,EAAE,GAAG,IAAI,qBAAqB;QAClC,WAAW,EAAE,wBAAwB;QACrC,eAAe,EAAE,YAAY;QAC7B,QAAQ,EAAE,CAAC,eAAe,EAAE,oBAAoB,CAAC;QACjD,SAAS,EAAE,CAAC,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE,CAAC;KAClD,CAAC,CAAC;IAEH,IAAI,WAAW,EAAE,CAAC;QAChB,QAAQ,CAAC,IAAI,CAAC;YACZ,QAAQ,EAAE,aAAa;YACvB,IAAI,EAAE,GAAG,IAAI,mBAAmB;YAChC,WAAW,EAAE,qCAAqC;YAClD,WAAW,EAAE,CAAC,KAAK,EAAE,KAAK,CAAC;YAC3B,eAAe,EAAE,YAAY;YAC7B,oBAAoB,EAAE,CAAC,cAAc,4BAAiB,EAAE,CAAC;YACzD,gBAAgB,EAAE,wBAAa;SAChC,CAAC,CAAC;QAEH,QAAQ,CAAC,IAAI,CAAC;YACZ,QAAQ,EAAE,aAAa;YACvB,IAAI,EAAE,GAAG,IAAI,uBAAuB;YACpC,WAAW,EAAE,qCAAqC;YAClD,WAAW,EAAE,CAAC,KAAK,EAAE,KAAK,CAAC;YAC3B,eAAe,EAAE,YAAY;YAC7B,oBAAoB,EAAE,CAAC,YAAY,CAAC;YACpC,gBAAgB,EAAE,wBAAa;SAChC,CAAC,CAAC;QAEH,QAAQ,CAAC,IAAI,CAAC;YACZ,QAAQ,EAAE,iBAAiB;YAC3B,IAAI,EAAE,GAAG,IAAI,2BAA2B;YACxC,WAAW,EAAE,wBAAwB;YACrC,eAAe,EAAE,YAAY;YAC7B,QAAQ,EAAE;gBACR,aAAa;gBACb,wBAAwB;gBACxB,oCAAoC;aACrC;YACD,SAAS,EAAE,CAAC,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE,CAAC;SAClD,CAAC,CAAC;QAEH,QAAQ,CAAC,IAAI,CAAC;YACZ,QAAQ,EAAE,iBAAiB;YAC3B,IAAI,EAAE,GAAG,IAAI,gCAAgC;YAC7C,WAAW,EAAE,wBAAwB;YACrC,eAAe,EAAE,YAAY;YAC7B,WAAW,EAAE;gBACX,aAAa;gBACb,aAAa;gBACb,uBAAuB;gBACvB,cAAc;gBACd,oBAAoB;gBACpB,cAAc;gBACd,gBAAgB;gBAChB,sBAAsB;aACvB;YACD,SAAS,EAAE,CAAC,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE,CAAC;SAClD,CAAC,CAAC;IACL,CAAC;IAED,IAAI,cAAc,EAAE,CAAC;QACnB,QAAQ,CAAC,IAAI,CAAC;YACZ,QAAQ,EAAE,aAAa;YACvB,IAAI,EAAE,GAAG,IAAI,wBAAwB;YACrC,WAAW,EAAE,aAAa;YAC1B,WAAW,EAAE,CAAC,KAAK,CAAC;YACpB,eAAe,EAAE,YAAY;YAC7B,oBAAoB,EAAE;gBACpB,eAAe;gBACf,eAAe;gBACf,gBAAgB;gBAChB,gBAAgB;aACjB;YACD,gBAAgB,EAAE,CAAC,KAAK,CAAC;SAC1B,CAAC,CAAC;QACH,QAAQ,CAAC,IAAI,CAAC;YACZ,QAAQ,EAAE,iBAAiB;YAC3B,IAAI,EAAE,GAAG,IAAI,4BAA4B;YACzC,WAAW,EAAE,wBAAwB;YACrC,SAAS,EAAE,CAAC,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE,CAAC;YACjD,eAAe,EAAE,YAAY;YAC7B,WAAW,EAAE;gBACX,cAAc;gBACd,YAAY;gBACZ,cAAc;gBACd,iBAAiB;gBACjB,eAAe;gBACf,yBAAyB;gBACzB,wBAAwB;gBACxB,mBAAmB;gBACnB,qBAAqB;gBACrB,mBAAmB;gBACnB,mCAAmC;gBACnC,oBAAoB;gBACpB,eAAe;gBACf,yBAAyB;gBACzB,4BAA4B;gBAC5B,0BAA0B;gBAC1B,qBAAqB;gBACrB,2BAA2B;gBAC3B,iBAAiB;gBACjB,eAAe;gBACf,kBAAkB;gBAClB,qBAAqB;gBACrB,UAAU;gBACV,gBAAgB;gBAChB,2BAA2B;gBAC3B,sBAAsB;gBACtB,6BAA6B;gBAC7B,eAAe;gBACf,qBAAqB;gBACrB,8BAA8B;gBAC9B,kBAAkB;gBAClB,oBAAoB;gBACpB,gCAAgC;gBAChC,aAAa;gBACb,2BAA2B;gBAC3B,4BAA4B;gBAC5B,yBAAyB;aAC1B;SACF,CAAC,CAAC;IACL,CAAC;IAED,IAAI,cAAc,EAAE,CAAC;QACnB,QAAQ,CAAC,IAAI,CAAC;YACZ,QAAQ,EAAE,iBAAiB;YAC3B,IAAI,EAAE,GAAG,IAAI,qBAAqB;YAClC,WAAW,EAAE,iBAAiB;YAC9B,eAAe,EAAE,YAAY;YAC7B,WAAW,EAAE;gBACX,eAAe;gBACf,YAAY;gBACZ,oBAAoB;gBACpB,yBAAyB;gBACzB,kBAAkB;gBAClB,QAAQ;gBACR,kBAAkB;aACnB;YACD,SAAS,EAAE,CAAC,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE,CAAC;SAClD,CAAC,CAAC;IACL,CAAC;IAED,IAAI,cAAc,EAAE,CAAC;QACnB,QAAQ,CAAC,IAAI,CAAC;YACZ,QAAQ,EAAE,iBAAiB;YAC3B,IAAI,EAAE,GAAG,IAAI,sBAAsB;YACnC,WAAW,EAAE,kBAAkB;YAC/B,eAAe,EAAE,YAAY;YAC7B,WAAW,EAAE;gBACX,YAAY;gBACZ,cAAc;gBACd,cAAc;gBACd,aAAa;gBACb,aAAa;aACd;YACD,SAAS,EAAE,CAAC,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE,CAAC;SAClD,CAAC,CAAC;IACL,CAAC;IAED,IAAI,eAAe,EAAE,CAAC;QACpB,QAAQ,CAAC,IAAI,CAAC;YACZ,QAAQ,EAAE,iBAAiB;YAC3B,IAAI,EAAE,GAAG,IAAI,sBAAsB;YACnC,WAAW,EAAE,kBAAkB;YAC/B,eAAe,EAAE,YAAY;YAC7B,QAAQ,EAAE,CAAC,WAAW,EAAE,sBAAsB,CAAC;YAC/C,SAAS,EAAE,CAAC,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE,CAAC;SAClD,CAAC,CAAC;IACL,CAAC;IACD,IAAI,gBAAgB,EAAE,CAAC;QACrB,QAAQ,CAAC,IAAI,CAAC;YACZ,QAAQ,EAAE,iBAAiB;YAC3B,IAAI,EAAE,GAAG,IAAI,mBAAmB;YAChC,WAAW,EAAE,mBAAmB;YAChC,eAAe,EAAE,YAAY;YAC7B,QAAQ,EAAE,CAAC,YAAY,EAAE,iBAAiB,CAAC;YAC3C,SAAS,EAAE,CAAC,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE,CAAC;SAClD,CAAC,CAAC;QAEH,QAAQ,CAAC,IAAI,CACX;YACE,QAAQ,EAAE,aAAa;YACvB,IAAI,EAAE,GAAG,IAAI,+BAA+B;YAC5C,WAAW,EAAE,wCAAwC;YACrD,WAAW,EAAE,CAAC,KAAK,CAAC;YACpB,eAAe,EAAE,YAAY;YAC7B,+CAA+C;YAC/C,oBAAoB,EAAE;gBACpB,cAAc;gBACd,iCAAiC;aAClC;YACD,gBAAgB,EAAE,CAAC,MAAM,CAAC;SAC3B,EACD;YACE,QAAQ,EAAE,aAAa;YACvB,IAAI,EAAE,GAAG,IAAI,iCAAiC;YAC9C,WAAW,EAAE,0CAA0C;YACvD,WAAW,EAAE,CAAC,KAAK,CAAC;YACpB,eAAe,EAAE,YAAY;YAC7B,sBAAsB;YACtB,6CAA6C;YAC7C,+CAA+C;YAC/C,+CAA+C;YAC/C,+CAA+C;YAC/C,+CAA+C;YAC/C,+CAA+C;YAC/C,iDAAiD;YACjD,iDAAiD;YACjD,iDAAiD;YACjD,iDAAiD;YACjD,iDAAiD;YACjD,KAAK;YACL,oBAAoB,EAAE;gBACpB,eAAe;gBACf,aAAa;gBACb,gBAAgB;gBAChB,gBAAgB;gBAChB,aAAa;gBACb,YAAY;gBACZ,cAAc;gBACd,cAAc;gBACd,cAAc;gBACd,cAAc;aACf;YACD,gBAAgB,EAAE,CAAC,KAAK,EAAE,MAAM,CAAC;SAClC,EACD;YACE,QAAQ,EAAE,aAAa;YACvB,IAAI,EAAE,GAAG,IAAI,2BAA2B;YACxC,WAAW,EAAE,oCAAoC;YACjD,WAAW,EAAE,CAAC,KAAK,EAAE,KAAK,CAAC;YAC3B,eAAe,EAAE,YAAY;YAC7B,oBAAoB,EAAE,CAAC,eAAe,CAAC;YACvC,gBAAgB,EAAE,CAAC,KAAK,EAAE,MAAM,CAAC;SAClC,CACF,CAAC;IACJ,CAAC;IAED,IAAI,YAAY,EAAE,CAAC;QACjB,QAAQ,CAAC,IAAI,CAAC;YACZ,QAAQ,EAAE,iBAAiB;YAC3B,IAAI,EAAE,GAAG,IAAI,2BAA2B;YACxC,WAAW,EAAE,uBAAuB;YACpC,eAAe,EAAE,YAAY;YAC7B,WAAW,EAAE,CAAC,YAAY,EAAE,gBAAgB,EAAE,UAAU,EAAE,cAAc,CAAC;YACzE,SAAS,EAAE,CAAC,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE,CAAC;SAClD,CAAC,CAAC;IACL,CAAC;IAED,IAAI,eAAe,EAAE,CAAC;QACpB,QAAQ,CAAC,IAAI,CAAC;YACZ,QAAQ,EAAE,iBAAiB;YAC3B,IAAI,EAAE,GAAG,IAAI,sBAAsB;YACnC,WAAW,EAAE,kBAAkB;YAC/B,eAAe,EAAE,YAAY;YAC7B,WAAW,EAAE,CAAC,OAAO,EAAE,aAAa,EAAE,eAAe,CAAC;YACtD,SAAS,EAAE,CAAC,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE,CAAC;SAClD,CAAC,CAAC;IACL,CAAC;IAED,OAAO,IAAA,oCAAmB,EAAC;QACzB,MAAM,EAAE,EAAE,IAAI,EAAE,GAAG,IAAI,kBAAkB,EAAE,QAAQ,EAAE,QAAQ,EAAE;QAC/D,QAAQ;QACR,MAAM,EAAE,OAAO;KAChB,CAAC,CAAC;AACL,CAAC,CAAC"}
|
package/VNet/Helper.d.ts
CHANGED
|
@@ -34,4 +34,5 @@ export declare const getVnetIdByName: (groupName: string, region?: string) => Ou
|
|
|
34
34
|
export declare const parseVnetInfoFromId: (vnetId: Input<string>) => Output<VnetInfoType>;
|
|
35
35
|
export declare const getFirewallIpAddress: (name: string, group: ResourceGroupInfo) => Output<string>;
|
|
36
36
|
export declare const getFirewallIpAddressByGroupName: (groupName: string) => Output<string>;
|
|
37
|
+
export declare const getIpAddressFromHost: (host: string) => Output<import("@pulumi/pulumi").UnwrappedObject<import("dns").LookupAddress>>;
|
|
37
38
|
export {};
|
package/VNet/Helper.js
CHANGED
|
@@ -22,13 +22,17 @@ var __importStar = (this && this.__importStar) || function (mod) {
|
|
|
22
22
|
__setModuleDefault(result, mod);
|
|
23
23
|
return result;
|
|
24
24
|
};
|
|
25
|
+
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
26
|
+
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
27
|
+
};
|
|
25
28
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
26
|
-
exports.getFirewallIpAddressByGroupName = exports.getFirewallIpAddress = exports.parseVnetInfoFromId = exports.getVnetIdByName = exports.getVnetInfo = exports.getIpAddressResource = exports.getIpAddressId = exports.getSubnetIdByName = exports.getVnetIdFromSubnetId = exports.convertToIpRange = exports.getIpsRange = exports.azBastionSubnetName = exports.azFirewallManagementSubnet = exports.azFirewallSubnet = exports.gatewaySubnetName = exports.appGatewaySubnetName = void 0;
|
|
29
|
+
exports.getIpAddressFromHost = exports.getFirewallIpAddressByGroupName = exports.getFirewallIpAddress = exports.parseVnetInfoFromId = exports.getVnetIdByName = exports.getVnetInfo = exports.getIpAddressResource = exports.getIpAddressId = exports.getSubnetIdByName = exports.getVnetIdFromSubnetId = exports.convertToIpRange = exports.getIpsRange = exports.azBastionSubnetName = exports.azFirewallManagementSubnet = exports.azFirewallSubnet = exports.gatewaySubnetName = exports.appGatewaySubnetName = void 0;
|
|
27
30
|
const network = __importStar(require("@pulumi/azure-native/network"));
|
|
28
31
|
const pulumi_1 = require("@pulumi/pulumi");
|
|
29
32
|
const netmask = __importStar(require("netmask"));
|
|
30
|
-
const
|
|
33
|
+
const promises_1 = __importDefault(require("node:dns/promises"));
|
|
31
34
|
const Common_1 = require("../Common");
|
|
35
|
+
const Common_2 = require("../Common");
|
|
32
36
|
exports.appGatewaySubnetName = 'app-gateway';
|
|
33
37
|
exports.gatewaySubnetName = 'GatewaySubnet';
|
|
34
38
|
exports.azFirewallSubnet = 'AzureFirewallSubnet';
|
|
@@ -52,43 +56,43 @@ const getVnetIdFromSubnetId = (subnetId) => {
|
|
|
52
56
|
exports.getVnetIdFromSubnetId = getVnetIdFromSubnetId;
|
|
53
57
|
/**Get Subnet Id from Naming rules*/
|
|
54
58
|
const getSubnetIdByName = ({ subnetName, vnetAndGroupName, }) => {
|
|
55
|
-
const vnetName = (0,
|
|
56
|
-
const group = (0,
|
|
57
|
-
return (0, pulumi_1.interpolate) `/subscriptions/${
|
|
59
|
+
const vnetName = (0, Common_2.getVnetName)(vnetAndGroupName);
|
|
60
|
+
const group = (0, Common_2.getResourceGroupName)(vnetAndGroupName);
|
|
61
|
+
return (0, pulumi_1.interpolate) `/subscriptions/${Common_1.subscriptionId}/resourceGroups/${group}/providers/Microsoft.Network/virtualNetworks/${vnetName}/subnets/${subnetName}`;
|
|
58
62
|
};
|
|
59
63
|
exports.getSubnetIdByName = getSubnetIdByName;
|
|
60
64
|
const getIpAddressId = ({ name, groupName, }) => {
|
|
61
|
-
const n = (0,
|
|
62
|
-
const group = (0,
|
|
63
|
-
return (0, pulumi_1.interpolate) `/subscriptions/${
|
|
65
|
+
const n = (0, Common_2.getIpAddressName)(name);
|
|
66
|
+
const group = (0, Common_2.getResourceGroupName)(groupName);
|
|
67
|
+
return (0, pulumi_1.interpolate) `/subscriptions/${Common_1.subscriptionId}/resourceGroups/${group}/providers/Microsoft.Network/publicIPAddresses/${n}`;
|
|
64
68
|
};
|
|
65
69
|
exports.getIpAddressId = getIpAddressId;
|
|
66
70
|
const getIpAddressResource = ({ name, groupName, }) => {
|
|
67
|
-
const n = (0,
|
|
68
|
-
const group = (0,
|
|
71
|
+
const n = (0, Common_2.getIpAddressName)(name);
|
|
72
|
+
const group = (0, Common_2.getResourceGroupName)(groupName);
|
|
69
73
|
return network.getPublicIPAddress({
|
|
70
74
|
publicIpAddressName: n,
|
|
71
75
|
resourceGroupName: group,
|
|
72
76
|
});
|
|
73
77
|
};
|
|
74
78
|
exports.getIpAddressResource = getIpAddressResource;
|
|
75
|
-
const getVnetInfo = (groupName, region =
|
|
76
|
-
const vnetName = (0,
|
|
77
|
-
const rsName = (0,
|
|
79
|
+
const getVnetInfo = (groupName, region = Common_1.currentCountryCode) => {
|
|
80
|
+
const vnetName = (0, Common_2.getVnetName)(groupName, { region });
|
|
81
|
+
const rsName = (0, Common_2.getResourceGroupName)(groupName, { region });
|
|
78
82
|
return {
|
|
79
83
|
vnetName,
|
|
80
84
|
resourceGroupName: rsName,
|
|
81
|
-
subscriptionId:
|
|
85
|
+
subscriptionId: Common_1.subscriptionId,
|
|
82
86
|
};
|
|
83
87
|
};
|
|
84
88
|
exports.getVnetInfo = getVnetInfo;
|
|
85
|
-
const getVnetIdByName = (groupName, region =
|
|
89
|
+
const getVnetIdByName = (groupName, region = Common_1.currentCountryCode) => {
|
|
86
90
|
const info = (0, exports.getVnetInfo)(groupName, region);
|
|
87
91
|
return (0, pulumi_1.interpolate) `/subscriptions/${info.subscriptionId}/resourceGroups/${info.resourceGroupName}/providers/Microsoft.Network/virtualNetworks/${info.vnetName}`;
|
|
88
92
|
};
|
|
89
93
|
exports.getVnetIdByName = getVnetIdByName;
|
|
90
94
|
const parseVnetInfoFromId = (vnetId) => (0, pulumi_1.output)(vnetId).apply((id) => {
|
|
91
|
-
const info = (0,
|
|
95
|
+
const info = (0, Common_1.parseResourceInfoFromId)(id);
|
|
92
96
|
return {
|
|
93
97
|
vnetName: info.name,
|
|
94
98
|
resourceGroupName: info.group.resourceGroupName,
|
|
@@ -105,9 +109,11 @@ const getFirewallIpAddress = (name, group) => {
|
|
|
105
109
|
};
|
|
106
110
|
exports.getFirewallIpAddress = getFirewallIpAddress;
|
|
107
111
|
const getFirewallIpAddressByGroupName = (groupName) => {
|
|
108
|
-
const fireWallName = (0,
|
|
109
|
-
const rsName = (0,
|
|
112
|
+
const fireWallName = (0, Common_2.getFirewallName)(groupName);
|
|
113
|
+
const rsName = (0, Common_2.getResourceGroupName)(groupName);
|
|
110
114
|
return (0, exports.getFirewallIpAddress)(fireWallName, { resourceGroupName: rsName });
|
|
111
115
|
};
|
|
112
116
|
exports.getFirewallIpAddressByGroupName = getFirewallIpAddressByGroupName;
|
|
113
|
-
|
|
117
|
+
const getIpAddressFromHost = (host) => (0, pulumi_1.output)(promises_1.default.lookup(host, { family: 4 }));
|
|
118
|
+
exports.getIpAddressFromHost = getIpAddressFromHost;
|
|
119
|
+
//# sourceMappingURL=data:application/json;base64,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
|
package/VNet/index.d.ts
CHANGED
|
@@ -1,11 +1,11 @@
|
|
|
1
|
-
import * as network from
|
|
2
|
-
import { Input } from
|
|
3
|
-
import * as pulumi from
|
|
4
|
-
import { BasicMonitorArgs, ResourceGroupInfo } from
|
|
5
|
-
import { CustomSecurityRuleArgs } from
|
|
6
|
-
import { FirewallSkus } from
|
|
7
|
-
import { FirewallPolicyProps } from
|
|
8
|
-
import { SubnetProps } from
|
|
1
|
+
import * as network from '@pulumi/azure-native/network';
|
|
2
|
+
import { Input } from '@pulumi/pulumi';
|
|
3
|
+
import * as pulumi from '@pulumi/pulumi';
|
|
4
|
+
import { BasicMonitorArgs, ResourceGroupInfo } from '../types';
|
|
5
|
+
import { CustomSecurityRuleArgs } from './types';
|
|
6
|
+
import { FirewallSkus } from './Firewall';
|
|
7
|
+
import { FirewallPolicyProps } from './types';
|
|
8
|
+
import { SubnetProps } from './Subnet';
|
|
9
9
|
interface Props {
|
|
10
10
|
name: string;
|
|
11
11
|
group: ResourceGroupInfo;
|
|
@@ -26,7 +26,7 @@ interface Props {
|
|
|
26
26
|
/** Only required if Firewall is Basic tier */
|
|
27
27
|
managementSubnetPrefix?: string;
|
|
28
28
|
sku?: FirewallSkus;
|
|
29
|
-
policy: Omit<FirewallPolicyProps,
|
|
29
|
+
policy: Omit<FirewallPolicyProps, 'enabled'>;
|
|
30
30
|
/** set this is TRUE if want to create firewall subnet but not create firewall component */
|
|
31
31
|
disabledFirewallCreation?: boolean;
|
|
32
32
|
};
|