@drunk-pulumi/azure 1.0.3 → 1.0.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (72) hide show
  1. package/Aks/Helper.js +4 -3
  2. package/Aks/Identity.js +3 -3
  3. package/Aks/index.d.ts +8 -7
  4. package/Aks/index.js +73 -57
  5. package/Automation/index.d.ts +1 -1
  6. package/Automation/index.js +5 -5
  7. package/AzAd/EnvRoles.Consts.d.ts +13 -8
  8. package/AzAd/EnvRoles.Consts.js +51 -51
  9. package/AzAd/EnvRoles.d.ts +3 -3
  10. package/AzAd/EnvRoles.js +10 -10
  11. package/AzAd/Group.d.ts +2 -2
  12. package/AzAd/Group.js +12 -12
  13. package/AzAd/Identities/AzDevOpsIdentity.d.ts +1 -1
  14. package/AzAd/Identities/AzDevOpsIdentity.js +9 -6
  15. package/AzAd/Identities/AzDevOpsManagedIdentity.d.ts +2 -2
  16. package/AzAd/Identities/AzDevOpsManagedIdentity.js +6 -3
  17. package/AzAd/RoleAssignment.d.ts +3 -3
  18. package/AzAd/RoleAssignment.js +3 -3
  19. package/AzAd/RoleDefinitions/JustInTimeRequestRole.js +10 -10
  20. package/Builder/AksBuilder.js +15 -1
  21. package/Builder/PrivateDnsZoneBuilder.d.ts +2 -1
  22. package/Builder/PrivateDnsZoneBuilder.js +41 -23
  23. package/Builder/ResourceBuilder.js +12 -6
  24. package/Builder/SqlBuilder.js +7 -1
  25. package/Builder/StorageBuilder.js +14 -14
  26. package/Builder/VaultBuilder.d.ts +2 -1
  27. package/Builder/VaultBuilder.js +8 -1
  28. package/Builder/types/resourceBuilder.d.ts +2 -0
  29. package/Builder/types/sqlBuilder.d.ts +2 -1
  30. package/Builder/types/storageBuilder.d.ts +10 -8
  31. package/Builder/types/vaultBuilder.d.ts +6 -1
  32. package/Cdn/CdnEndpoint.d.ts +2 -3
  33. package/Cdn/CdnEndpoint.js +15 -17
  34. package/Cdn/CdnRules.d.ts +6 -2
  35. package/Cdn/CdnRules.js +51 -56
  36. package/Certificate/index.d.ts +2 -2
  37. package/Certificate/index.js +29 -29
  38. package/Common/AzureEnv.d.ts +2 -3
  39. package/Common/AzureEnv.js +21 -8
  40. package/Common/Naming/index.d.ts +1 -1
  41. package/Common/Naming/index.js +65 -61
  42. package/Common/index.d.ts +11 -6
  43. package/Common/index.js +6 -1
  44. package/ContainerRegistry/index.d.ts +5 -5
  45. package/ContainerRegistry/index.js +75 -50
  46. package/Core/KeyGenerators.d.ts +5 -5
  47. package/Core/KeyGenerators.js +5 -5
  48. package/CustomRoles/index.js +3 -3
  49. package/KeyVault/CustomHelper.d.ts +4 -4
  50. package/KeyVault/CustomHelper.js +7 -7
  51. package/KeyVault/Helper.js +12 -9
  52. package/Logs/Helpers.d.ts +1 -1
  53. package/RedisCache/index.d.ts +2 -2
  54. package/RedisCache/index.js +10 -5
  55. package/SignalR/index.d.ts +4 -4
  56. package/SignalR/index.js +26 -21
  57. package/Sql/SqlDb.js +2 -3
  58. package/Sql/index.d.ts +3 -4
  59. package/Sql/index.js +11 -11
  60. package/Storage/Helper.d.ts +1 -1
  61. package/Storage/index.d.ts +2 -3
  62. package/Storage/index.js +2 -2
  63. package/VNet/FirewallPolicies/AksFirewallPolicy.d.ts +4 -3
  64. package/VNet/FirewallPolicies/AksFirewallPolicy.js +116 -123
  65. package/VNet/FirewallPolicies/CloudPCFirewallPolicy.d.ts +4 -3
  66. package/VNet/FirewallPolicies/CloudPCFirewallPolicy.js +150 -132
  67. package/VNet/Helper.d.ts +1 -0
  68. package/VNet/Helper.js +25 -19
  69. package/VNet/index.d.ts +9 -9
  70. package/VNet/index.js +58 -49
  71. package/VNet/types.d.ts +9 -6
  72. package/package.json +6 -6
@@ -3,192 +3,210 @@ Object.defineProperty(exports, "__esModule", { value: true });
3
3
  const AzureEnv_1 = require("../../Common/AzureEnv");
4
4
  const FirewallPolicy_1 = require("../FirewallPolicy");
5
5
  //https://www.robtex.com/dns-lookup/global.azure-devices-provisioning.net
6
- exports.default = ({ name = "cloud-pc", priority, subnetSpaces, allowsOffice365, allowsWindows365, allowsAzure, allowsAzDevOps, allowsK8sTools, allowIpCheckApi, allowsSearch, allowAllOutbound, }) => {
6
+ exports.default = ({ name = 'cloud-pc', priority, subnetSpaces, allowsOffice365, allowsWindows365, allowsAzure, allowsAzDevOps, allowsK8sTools, allowsDevTools, allowIpCheckApi, allowsSearch, allowAllOutbound, }) => {
7
7
  const netRules = new Array();
8
8
  const appRules = new Array();
9
9
  if (allowAllOutbound) {
10
10
  netRules.push({
11
- ruleType: "NetworkRule",
11
+ ruleType: 'NetworkRule',
12
12
  name: `${name}-net-allow-all-outbound`,
13
- description: "CloudPc allows all outbound",
14
- ipProtocols: ["TCP"],
13
+ description: 'CloudPc allows all outbound',
14
+ ipProtocols: ['TCP'],
15
15
  sourceAddresses: subnetSpaces,
16
- destinationAddresses: ["*"],
17
- destinationPorts: ["443"],
16
+ destinationAddresses: ['*'],
17
+ destinationPorts: ['443'],
18
18
  });
19
19
  }
20
20
  //Default PC Rules
21
21
  appRules.push({
22
- ruleType: "ApplicationRule",
22
+ ruleType: 'ApplicationRule',
23
23
  name: `${name}-app-allow-fqdnTags`,
24
- description: "Allows Windows Updates",
24
+ description: 'Allows Windows Updates',
25
25
  sourceAddresses: subnetSpaces,
26
- fqdnTags: ["WindowsUpdate", "WindowsDiagnostics"],
27
- protocols: [{ protocolType: "Https", port: 443 }],
26
+ fqdnTags: ['WindowsUpdate', 'WindowsDiagnostics'],
27
+ protocols: [{ protocolType: 'Https', port: 443 }],
28
28
  });
29
29
  if (allowsAzure) {
30
30
  netRules.push({
31
- ruleType: "NetworkRule",
31
+ ruleType: 'NetworkRule',
32
32
  name: `${name}-net-allows-azure`,
33
- description: "Allows Cloud PC to access to Azure.",
34
- ipProtocols: ["TCP", "UDP"],
33
+ description: 'Allows Cloud PC to access to Azure.',
34
+ ipProtocols: ['TCP', 'UDP'],
35
35
  sourceAddresses: subnetSpaces,
36
36
  destinationAddresses: [`AzureCloud.${AzureEnv_1.currentRegionCode}`],
37
- destinationPorts: ["443", "445", "22"],
37
+ destinationPorts: AzureEnv_1.allAzurePorts,
38
38
  });
39
39
  netRules.push({
40
- ruleType: "NetworkRule",
40
+ ruleType: 'NetworkRule',
41
41
  name: `${name}-net-allows-azure-all`,
42
- description: "Allows Cloud PC to access to Azure.",
43
- ipProtocols: ["TCP", "UDP"],
42
+ description: 'Allows Cloud PC to access to Azure.',
43
+ ipProtocols: ['TCP', 'UDP'],
44
44
  sourceAddresses: subnetSpaces,
45
45
  destinationAddresses: [`AzureCloud`],
46
- destinationPorts: ["443", "445", "22"],
46
+ destinationPorts: AzureEnv_1.allAzurePorts,
47
47
  });
48
48
  appRules.push({
49
- ruleType: "ApplicationRule",
49
+ ruleType: 'ApplicationRule',
50
50
  name: `${name}-app-allow-azure-fqdnTags`,
51
- description: "Allows Windows Updates",
51
+ description: 'Allows Windows Updates',
52
52
  sourceAddresses: subnetSpaces,
53
53
  fqdnTags: [
54
- "AzureBackup",
55
- "AzureKubernetesService",
56
- "AzureActiveDirectoryDomainServices",
54
+ 'AzureBackup',
55
+ 'AzureKubernetesService',
56
+ 'AzureActiveDirectoryDomainServices',
57
57
  ],
58
- protocols: [{ protocolType: "Https", port: 443 }],
58
+ protocols: [{ protocolType: 'Https', port: 443 }],
59
59
  });
60
60
  appRules.push({
61
- ruleType: "ApplicationRule",
61
+ ruleType: 'ApplicationRule',
62
62
  name: `${name}-app-allow-access-azure-portal`,
63
- description: "Allows Ip Azure Portal",
63
+ description: 'Allows Ip Azure Portal',
64
64
  sourceAddresses: subnetSpaces,
65
65
  targetFqdns: [
66
- "*.azure.com",
67
- "*.azure.net",
68
- "*.microsoftonline.com",
69
- "*.msauth.net",
70
- "*.msauthimages.net",
71
- "*.msecnd.net",
72
- "*.msftauth.net",
73
- "*.msftauthimages.net",
66
+ '*.azure.com',
67
+ '*.azure.net',
68
+ '*.microsoftonline.com',
69
+ '*.msauth.net',
70
+ '*.msauthimages.net',
71
+ '*.msecnd.net',
72
+ '*.msftauth.net',
73
+ '*.msftauthimages.net',
74
74
  ],
75
- protocols: [{ protocolType: "Https", port: 443 }],
75
+ protocols: [{ protocolType: 'Https', port: 443 }],
76
76
  });
77
77
  }
78
78
  if (allowsAzDevOps) {
79
79
  netRules.push({
80
- ruleType: "NetworkRule",
80
+ ruleType: 'NetworkRule',
81
81
  name: `${name}-net-allow-AzureDevOps`,
82
- description: "AzureDevOps",
83
- ipProtocols: ["TCP"],
82
+ description: 'AzureDevOps',
83
+ ipProtocols: ['TCP'],
84
84
  sourceAddresses: subnetSpaces,
85
85
  destinationAddresses: [
86
- "13.107.6.0/24",
87
- "13.107.9.0/24",
88
- "13.107.42.0/24",
89
- "13.107.43.0/24",
86
+ '13.107.6.0/24',
87
+ '13.107.9.0/24',
88
+ '13.107.42.0/24',
89
+ '13.107.43.0/24',
90
90
  ],
91
- destinationPorts: ["443"],
91
+ destinationPorts: ['443'],
92
92
  });
93
93
  appRules.push({
94
- ruleType: "ApplicationRule",
94
+ ruleType: 'ApplicationRule',
95
95
  name: `${name}-app-allow-azure-resources`,
96
- description: "Allows Azure Resources",
97
- protocols: [{ protocolType: "Https", port: 443 }],
96
+ description: 'Allows Azure Resources',
97
+ protocols: [{ protocolType: 'Https', port: 443 }],
98
98
  sourceAddresses: subnetSpaces,
99
99
  targetFqdns: [
100
100
  //Azure DevOps
101
- "*.dev.azure.com",
102
- "*.vsassets.io",
103
- "*gallerycdn.vsassets.io",
104
- "*vstmrblob.vsassets.io",
105
- "aadcdn.msauth.net",
106
- "aadcdn.msftauth.net",
107
- "aex.dev.azure.com",
108
- "aexprodea1.vsaex.visualstudio.com",
109
- "amcdn.msftauth.net",
110
- "amp.azure.net",
111
- "app.vssps.dev.azure.com",
112
- "app.vssps.visualstudio.com",
113
- "*.vssps.visualstudio.com",
114
- "azure.microsoft.com",
115
- "azurecomcdn.azureedge.net",
116
- "cdn.vsassets.io",
117
- "dev.azure.com",
118
- "go.microsoft.com",
119
- "graph.microsoft.com",
120
- "live.com",
121
- "login.live.com",
122
- "login.microsoftonline.com",
123
- "management.azure.com",
124
- "management.core.windows.net",
125
- "microsoft.com",
126
- "microsoftonline.com",
127
- "static2.sharepointonline.com",
128
- "visualstudio.com",
129
- "vsrm.dev.azure.com",
130
- "vstsagentpackage.azureedge.net",
131
- "windows.net",
132
- "login.microsoftonline.com",
133
- "app.vssps.visualstudio.com",
134
- "*.blob.core.windows.net",
101
+ 'vscode.dev',
102
+ '*.vscode.dev',
103
+ '*.dev.azure.com',
104
+ '*.vsassets.io',
105
+ '*gallerycdn.vsassets.io',
106
+ '*vstmrblob.vsassets.io',
107
+ 'aadcdn.msauth.net',
108
+ 'aadcdn.msftauth.net',
109
+ 'aex.dev.azure.com',
110
+ 'aexprodea1.vsaex.visualstudio.com',
111
+ 'amcdn.msftauth.net',
112
+ 'amp.azure.net',
113
+ 'app.vssps.dev.azure.com',
114
+ 'app.vssps.visualstudio.com',
115
+ '*.vssps.visualstudio.com',
116
+ 'azure.microsoft.com',
117
+ 'azurecomcdn.azureedge.net',
118
+ 'cdn.vsassets.io',
119
+ 'dev.azure.com',
120
+ 'go.microsoft.com',
121
+ 'graph.microsoft.com',
122
+ 'live.com',
123
+ 'login.live.com',
124
+ 'login.microsoftonline.com',
125
+ 'management.azure.com',
126
+ 'management.core.windows.net',
127
+ 'microsoft.com',
128
+ 'microsoftonline.com',
129
+ 'static2.sharepointonline.com',
130
+ 'visualstudio.com',
131
+ 'vsrm.dev.azure.com',
132
+ 'vstsagentpackage.azureedge.net',
133
+ 'windows.net',
134
+ 'login.microsoftonline.com',
135
+ 'app.vssps.visualstudio.com',
136
+ '*.blob.core.windows.net',
135
137
  ],
136
138
  });
137
139
  }
138
140
  if (allowsK8sTools) {
139
141
  appRules.push({
140
- ruleType: "ApplicationRule",
142
+ ruleType: 'ApplicationRule',
141
143
  name: `${name}-app-allow-k8s-lens`,
142
- description: "Allows K8s Lens",
144
+ description: 'Allows K8s Lens',
143
145
  sourceAddresses: subnetSpaces,
144
146
  targetFqdns: [
145
- "*.k8slens.dev",
146
- "github.com",
147
- "*.githubassets.com",
148
- "*.githubusercontent.com",
149
- "*.googleapis.com",
150
- "aka.ms",
151
- "*.chocolatey.org",
147
+ '*.k8slens.dev',
148
+ 'github.com',
149
+ '*.githubassets.com',
150
+ '*.githubusercontent.com',
151
+ '*.googleapis.com',
152
+ 'aka.ms',
153
+ '*.chocolatey.org',
152
154
  ],
153
- protocols: [{ protocolType: "Https", port: 443 }],
155
+ protocols: [{ protocolType: 'Https', port: 443 }],
156
+ });
157
+ }
158
+ if (allowsDevTools) {
159
+ appRules.push({
160
+ ruleType: 'ApplicationRule',
161
+ name: `${name}-app-allow-dev-tools`,
162
+ description: 'Allows Dev Tools',
163
+ sourceAddresses: subnetSpaces,
164
+ targetFqdns: [
165
+ 'github.com',
166
+ '*.github.com',
167
+ '*.pulumi.com',
168
+ '*.npmjs.com',
169
+ '*.nuget.org',
170
+ ],
171
+ protocols: [{ protocolType: 'Https', port: 443 }],
154
172
  });
155
173
  }
156
174
  if (allowsOffice365) {
157
175
  appRules.push({
158
- ruleType: "ApplicationRule",
176
+ ruleType: 'ApplicationRule',
159
177
  name: `${name}-app-allow-office365`,
160
- description: "Allows Office365",
178
+ description: 'Allows Office365',
161
179
  sourceAddresses: subnetSpaces,
162
- fqdnTags: ["Office365", "Office365.SharePoint"],
163
- protocols: [{ protocolType: "Https", port: 443 }],
180
+ fqdnTags: ['Office365', 'Office365.SharePoint'],
181
+ protocols: [{ protocolType: 'Https', port: 443 }],
164
182
  });
165
183
  }
166
184
  if (allowsWindows365) {
167
185
  appRules.push({
168
- ruleType: "ApplicationRule",
186
+ ruleType: 'ApplicationRule',
169
187
  name: `${name}-app-allow-win365`,
170
- description: "Allows Windows365",
188
+ description: 'Allows Windows365',
171
189
  sourceAddresses: subnetSpaces,
172
- fqdnTags: ["Windows365", "MicrosoftIntune"],
173
- protocols: [{ protocolType: "Https", port: 443 }],
190
+ fqdnTags: ['Windows365', 'MicrosoftIntune'],
191
+ protocols: [{ protocolType: 'Https', port: 443 }],
174
192
  });
175
193
  netRules.push({
176
- ruleType: "NetworkRule",
194
+ ruleType: 'NetworkRule',
177
195
  name: `${name}-net-allow-win365-windows-net`,
178
- description: "CloudPc allows Windows 365 windows.net",
179
- ipProtocols: ["TCP"],
196
+ description: 'CloudPc allows Windows 365 windows.net',
197
+ ipProtocols: ['TCP'],
180
198
  sourceAddresses: subnetSpaces,
181
199
  //destinationFqdns: ["azkms.core.windows.net"],
182
200
  destinationAddresses: [
183
- "40.83.235.53",
201
+ '40.83.235.53',
184
202
  //"2a01:111:f100:3000::a83e:1b30"
185
203
  ],
186
- destinationPorts: ["1688"],
204
+ destinationPorts: ['1688'],
187
205
  }, {
188
- ruleType: "NetworkRule",
206
+ ruleType: 'NetworkRule',
189
207
  name: `${name}-net-allow-win365-azure-devices`,
190
- description: "CloudPc allows Windows 365 azure-devices",
191
- ipProtocols: ["TCP"],
208
+ description: 'CloudPc allows Windows 365 azure-devices',
209
+ ipProtocols: ['TCP'],
192
210
  sourceAddresses: subnetSpaces,
193
211
  // destinationFqdns: [
194
212
  // "global.azure-devices-provisioning.net",
@@ -204,52 +222,52 @@ exports.default = ({ name = "cloud-pc", priority, subnetSpaces, allowsOffice365,
204
222
  // "hm-iot-in-4-prod-prna01.azure-devices.net",
205
223
  // ],
206
224
  destinationAddresses: [
207
- "23.98.104.204",
208
- "40.78.238.4",
209
- "20.150.179.224",
210
- "52.236.189.131",
211
- "13.69.71.14",
212
- "13.69.71.2",
213
- "13.70.74.193",
214
- "13.86.221.39",
215
- "13.86.221.36",
216
- "13.86.221.43",
225
+ '23.98.104.204',
226
+ '40.78.238.4',
227
+ '20.150.179.224',
228
+ '52.236.189.131',
229
+ '13.69.71.14',
230
+ '13.69.71.2',
231
+ '13.70.74.193',
232
+ '13.86.221.39',
233
+ '13.86.221.36',
234
+ '13.86.221.43',
217
235
  ],
218
- destinationPorts: ["443", "5671"],
236
+ destinationPorts: ['443', '5671'],
219
237
  }, {
220
- ruleType: "NetworkRule",
238
+ ruleType: 'NetworkRule',
221
239
  name: `${name}-net-allow-win365-udp-tcp`,
222
- description: "CloudPc allows Windows 365 udp tcp",
223
- ipProtocols: ["UDP", "TCP"],
240
+ description: 'CloudPc allows Windows 365 udp tcp',
241
+ ipProtocols: ['UDP', 'TCP'],
224
242
  sourceAddresses: subnetSpaces,
225
- destinationAddresses: ["20.202.0.0/16"],
226
- destinationPorts: ["443", "3478"],
243
+ destinationAddresses: ['20.202.0.0/16'],
244
+ destinationPorts: ['443', '3478'],
227
245
  });
228
246
  }
229
247
  if (allowsSearch) {
230
248
  appRules.push({
231
- ruleType: "ApplicationRule",
249
+ ruleType: 'ApplicationRule',
232
250
  name: `${name}-app-allow-search-engines`,
233
- description: "Allows Search Engines",
251
+ description: 'Allows Search Engines',
234
252
  sourceAddresses: subnetSpaces,
235
- targetFqdns: ["google.com", "www.google.com", "bing.com", "www.bing.com"],
236
- protocols: [{ protocolType: "Https", port: 443 }],
253
+ targetFqdns: ['google.com', 'www.google.com', 'bing.com', 'www.bing.com'],
254
+ protocols: [{ protocolType: 'Https', port: 443 }],
237
255
  });
238
256
  }
239
257
  if (allowIpCheckApi) {
240
258
  appRules.push({
241
- ruleType: "ApplicationRule",
259
+ ruleType: 'ApplicationRule',
242
260
  name: `${name}-app-allow-ip-checks`,
243
- description: "Allows Ip Checks",
261
+ description: 'Allows Ip Checks',
244
262
  sourceAddresses: subnetSpaces,
245
- targetFqdns: ["ip.me", "ifconfig.me", "*.ifconfig.me"],
246
- protocols: [{ protocolType: "Https", port: 443 }],
263
+ targetFqdns: ['ip.me', 'ifconfig.me', '*.ifconfig.me'],
264
+ protocols: [{ protocolType: 'Https', port: 443 }],
247
265
  });
248
266
  }
249
267
  return (0, FirewallPolicy_1.FirewallPolicyGroup)({
250
268
  policy: { name: `${name}-firewall-policy`, netRules, appRules },
251
269
  priority,
252
- action: "Allow",
270
+ action: 'Allow',
253
271
  });
254
272
  };
255
- //# sourceMappingURL=data:application/json;base64,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
273
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"CloudPCFirewallPolicy.js","sourceRoot":"","sources":["../../../src/VNet/FirewallPolicies/CloudPCFirewallPolicy.ts"],"names":[],"mappings":";;AACA,oDAAyE;AAMzE,sDAAwD;AAiBxD,yEAAyE;AAEzE,kBAAe,CAAC,EACd,IAAI,GAAG,UAAU,EACjB,QAAQ,EACR,YAAY,EACZ,eAAe,EACf,gBAAgB,EAChB,WAAW,EACX,cAAc,EACd,cAAc,EACd,cAAc,EACd,eAAe,EACf,YAAY,EACZ,gBAAgB,GACV,EAAuC,EAAE;IAC/C,MAAM,QAAQ,GAAG,IAAI,KAAK,EAA0B,CAAC;IACrD,MAAM,QAAQ,GAAG,IAAI,KAAK,EAA8B,CAAC;IAEzD,IAAI,gBAAgB,EAAE,CAAC;QACrB,QAAQ,CAAC,IAAI,CAAC;YACZ,QAAQ,EAAE,aAAa;YACvB,IAAI,EAAE,GAAG,IAAI,yBAAyB;YACtC,WAAW,EAAE,6BAA6B;YAC1C,WAAW,EAAE,CAAC,KAAK,CAAC;YACpB,eAAe,EAAE,YAAY;YAC7B,oBAAoB,EAAE,CAAC,GAAG,CAAC;YAC3B,gBAAgB,EAAE,CAAC,KAAK,CAAC;SAC1B,CAAC,CAAC;IACL,CAAC;IAED,kBAAkB;IAClB,QAAQ,CAAC,IAAI,CAAC;QACZ,QAAQ,EAAE,iBAAiB;QAC3B,IAAI,EAAE,GAAG,IAAI,qBAAqB;QAClC,WAAW,EAAE,wBAAwB;QACrC,eAAe,EAAE,YAAY;QAC7B,QAAQ,EAAE,CAAC,eAAe,EAAE,oBAAoB,CAAC;QACjD,SAAS,EAAE,CAAC,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE,CAAC;KAClD,CAAC,CAAC;IAEH,IAAI,WAAW,EAAE,CAAC;QAChB,QAAQ,CAAC,IAAI,CAAC;YACZ,QAAQ,EAAE,aAAa;YACvB,IAAI,EAAE,GAAG,IAAI,mBAAmB;YAChC,WAAW,EAAE,qCAAqC;YAClD,WAAW,EAAE,CAAC,KAAK,EAAE,KAAK,CAAC;YAC3B,eAAe,EAAE,YAAY;YAC7B,oBAAoB,EAAE,CAAC,cAAc,4BAAiB,EAAE,CAAC;YACzD,gBAAgB,EAAE,wBAAa;SAChC,CAAC,CAAC;QAEH,QAAQ,CAAC,IAAI,CAAC;YACZ,QAAQ,EAAE,aAAa;YACvB,IAAI,EAAE,GAAG,IAAI,uBAAuB;YACpC,WAAW,EAAE,qCAAqC;YAClD,WAAW,EAAE,CAAC,KAAK,EAAE,KAAK,CAAC;YAC3B,eAAe,EAAE,YAAY;YAC7B,oBAAoB,EAAE,CAAC,YAAY,CAAC;YACpC,gBAAgB,EAAE,wBAAa;SAChC,CAAC,CAAC;QAEH,QAAQ,CAAC,IAAI,CAAC;YACZ,QAAQ,EAAE,iBAAiB;YAC3B,IAAI,EAAE,GAAG,IAAI,2BAA2B;YACxC,WAAW,EAAE,wBAAwB;YACrC,eAAe,EAAE,YAAY;YAC7B,QAAQ,EAAE;gBACR,aAAa;gBACb,wBAAwB;gBACxB,oCAAoC;aACrC;YACD,SAAS,EAAE,CAAC,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE,CAAC;SAClD,CAAC,CAAC;QAEH,QAAQ,CAAC,IAAI,CAAC;YACZ,QAAQ,EAAE,iBAAiB;YAC3B,IAAI,EAAE,GAAG,IAAI,gCAAgC;YAC7C,WAAW,EAAE,wBAAwB;YACrC,eAAe,EAAE,YAAY;YAC7B,WAAW,EAAE;gBACX,aAAa;gBACb,aAAa;gBACb,uBAAuB;gBACvB,cAAc;gBACd,oBAAoB;gBACpB,cAAc;gBACd,gBAAgB;gBAChB,sBAAsB;aACvB;YACD,SAAS,EAAE,CAAC,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE,CAAC;SAClD,CAAC,CAAC;IACL,CAAC;IAED,IAAI,cAAc,EAAE,CAAC;QACnB,QAAQ,CAAC,IAAI,CAAC;YACZ,QAAQ,EAAE,aAAa;YACvB,IAAI,EAAE,GAAG,IAAI,wBAAwB;YACrC,WAAW,EAAE,aAAa;YAC1B,WAAW,EAAE,CAAC,KAAK,CAAC;YACpB,eAAe,EAAE,YAAY;YAC7B,oBAAoB,EAAE;gBACpB,eAAe;gBACf,eAAe;gBACf,gBAAgB;gBAChB,gBAAgB;aACjB;YACD,gBAAgB,EAAE,CAAC,KAAK,CAAC;SAC1B,CAAC,CAAC;QACH,QAAQ,CAAC,IAAI,CAAC;YACZ,QAAQ,EAAE,iBAAiB;YAC3B,IAAI,EAAE,GAAG,IAAI,4BAA4B;YACzC,WAAW,EAAE,wBAAwB;YACrC,SAAS,EAAE,CAAC,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE,CAAC;YACjD,eAAe,EAAE,YAAY;YAC7B,WAAW,EAAE;gBACX,cAAc;gBACd,YAAY;gBACZ,cAAc;gBACd,iBAAiB;gBACjB,eAAe;gBACf,yBAAyB;gBACzB,wBAAwB;gBACxB,mBAAmB;gBACnB,qBAAqB;gBACrB,mBAAmB;gBACnB,mCAAmC;gBACnC,oBAAoB;gBACpB,eAAe;gBACf,yBAAyB;gBACzB,4BAA4B;gBAC5B,0BAA0B;gBAC1B,qBAAqB;gBACrB,2BAA2B;gBAC3B,iBAAiB;gBACjB,eAAe;gBACf,kBAAkB;gBAClB,qBAAqB;gBACrB,UAAU;gBACV,gBAAgB;gBAChB,2BAA2B;gBAC3B,sBAAsB;gBACtB,6BAA6B;gBAC7B,eAAe;gBACf,qBAAqB;gBACrB,8BAA8B;gBAC9B,kBAAkB;gBAClB,oBAAoB;gBACpB,gCAAgC;gBAChC,aAAa;gBACb,2BAA2B;gBAC3B,4BAA4B;gBAC5B,yBAAyB;aAC1B;SACF,CAAC,CAAC;IACL,CAAC;IAED,IAAI,cAAc,EAAE,CAAC;QACnB,QAAQ,CAAC,IAAI,CAAC;YACZ,QAAQ,EAAE,iBAAiB;YAC3B,IAAI,EAAE,GAAG,IAAI,qBAAqB;YAClC,WAAW,EAAE,iBAAiB;YAC9B,eAAe,EAAE,YAAY;YAC7B,WAAW,EAAE;gBACX,eAAe;gBACf,YAAY;gBACZ,oBAAoB;gBACpB,yBAAyB;gBACzB,kBAAkB;gBAClB,QAAQ;gBACR,kBAAkB;aACnB;YACD,SAAS,EAAE,CAAC,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE,CAAC;SAClD,CAAC,CAAC;IACL,CAAC;IAED,IAAI,cAAc,EAAE,CAAC;QACnB,QAAQ,CAAC,IAAI,CAAC;YACZ,QAAQ,EAAE,iBAAiB;YAC3B,IAAI,EAAE,GAAG,IAAI,sBAAsB;YACnC,WAAW,EAAE,kBAAkB;YAC/B,eAAe,EAAE,YAAY;YAC7B,WAAW,EAAE;gBACX,YAAY;gBACZ,cAAc;gBACd,cAAc;gBACd,aAAa;gBACb,aAAa;aACd;YACD,SAAS,EAAE,CAAC,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE,CAAC;SAClD,CAAC,CAAC;IACL,CAAC;IAED,IAAI,eAAe,EAAE,CAAC;QACpB,QAAQ,CAAC,IAAI,CAAC;YACZ,QAAQ,EAAE,iBAAiB;YAC3B,IAAI,EAAE,GAAG,IAAI,sBAAsB;YACnC,WAAW,EAAE,kBAAkB;YAC/B,eAAe,EAAE,YAAY;YAC7B,QAAQ,EAAE,CAAC,WAAW,EAAE,sBAAsB,CAAC;YAC/C,SAAS,EAAE,CAAC,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE,CAAC;SAClD,CAAC,CAAC;IACL,CAAC;IACD,IAAI,gBAAgB,EAAE,CAAC;QACrB,QAAQ,CAAC,IAAI,CAAC;YACZ,QAAQ,EAAE,iBAAiB;YAC3B,IAAI,EAAE,GAAG,IAAI,mBAAmB;YAChC,WAAW,EAAE,mBAAmB;YAChC,eAAe,EAAE,YAAY;YAC7B,QAAQ,EAAE,CAAC,YAAY,EAAE,iBAAiB,CAAC;YAC3C,SAAS,EAAE,CAAC,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE,CAAC;SAClD,CAAC,CAAC;QAEH,QAAQ,CAAC,IAAI,CACX;YACE,QAAQ,EAAE,aAAa;YACvB,IAAI,EAAE,GAAG,IAAI,+BAA+B;YAC5C,WAAW,EAAE,wCAAwC;YACrD,WAAW,EAAE,CAAC,KAAK,CAAC;YACpB,eAAe,EAAE,YAAY;YAC7B,+CAA+C;YAC/C,oBAAoB,EAAE;gBACpB,cAAc;gBACd,iCAAiC;aAClC;YACD,gBAAgB,EAAE,CAAC,MAAM,CAAC;SAC3B,EACD;YACE,QAAQ,EAAE,aAAa;YACvB,IAAI,EAAE,GAAG,IAAI,iCAAiC;YAC9C,WAAW,EAAE,0CAA0C;YACvD,WAAW,EAAE,CAAC,KAAK,CAAC;YACpB,eAAe,EAAE,YAAY;YAC7B,sBAAsB;YACtB,6CAA6C;YAC7C,+CAA+C;YAC/C,+CAA+C;YAC/C,+CAA+C;YAC/C,+CAA+C;YAC/C,+CAA+C;YAC/C,iDAAiD;YACjD,iDAAiD;YACjD,iDAAiD;YACjD,iDAAiD;YACjD,iDAAiD;YACjD,KAAK;YACL,oBAAoB,EAAE;gBACpB,eAAe;gBACf,aAAa;gBACb,gBAAgB;gBAChB,gBAAgB;gBAChB,aAAa;gBACb,YAAY;gBACZ,cAAc;gBACd,cAAc;gBACd,cAAc;gBACd,cAAc;aACf;YACD,gBAAgB,EAAE,CAAC,KAAK,EAAE,MAAM,CAAC;SAClC,EACD;YACE,QAAQ,EAAE,aAAa;YACvB,IAAI,EAAE,GAAG,IAAI,2BAA2B;YACxC,WAAW,EAAE,oCAAoC;YACjD,WAAW,EAAE,CAAC,KAAK,EAAE,KAAK,CAAC;YAC3B,eAAe,EAAE,YAAY;YAC7B,oBAAoB,EAAE,CAAC,eAAe,CAAC;YACvC,gBAAgB,EAAE,CAAC,KAAK,EAAE,MAAM,CAAC;SAClC,CACF,CAAC;IACJ,CAAC;IAED,IAAI,YAAY,EAAE,CAAC;QACjB,QAAQ,CAAC,IAAI,CAAC;YACZ,QAAQ,EAAE,iBAAiB;YAC3B,IAAI,EAAE,GAAG,IAAI,2BAA2B;YACxC,WAAW,EAAE,uBAAuB;YACpC,eAAe,EAAE,YAAY;YAC7B,WAAW,EAAE,CAAC,YAAY,EAAE,gBAAgB,EAAE,UAAU,EAAE,cAAc,CAAC;YACzE,SAAS,EAAE,CAAC,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE,CAAC;SAClD,CAAC,CAAC;IACL,CAAC;IAED,IAAI,eAAe,EAAE,CAAC;QACpB,QAAQ,CAAC,IAAI,CAAC;YACZ,QAAQ,EAAE,iBAAiB;YAC3B,IAAI,EAAE,GAAG,IAAI,sBAAsB;YACnC,WAAW,EAAE,kBAAkB;YAC/B,eAAe,EAAE,YAAY;YAC7B,WAAW,EAAE,CAAC,OAAO,EAAE,aAAa,EAAE,eAAe,CAAC;YACtD,SAAS,EAAE,CAAC,EAAE,YAAY,EAAE,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE,CAAC;SAClD,CAAC,CAAC;IACL,CAAC;IAED,OAAO,IAAA,oCAAmB,EAAC;QACzB,MAAM,EAAE,EAAE,IAAI,EAAE,GAAG,IAAI,kBAAkB,EAAE,QAAQ,EAAE,QAAQ,EAAE;QAC/D,QAAQ;QACR,MAAM,EAAE,OAAO;KAChB,CAAC,CAAC;AACL,CAAC,CAAC"}
package/VNet/Helper.d.ts CHANGED
@@ -34,4 +34,5 @@ export declare const getVnetIdByName: (groupName: string, region?: string) => Ou
34
34
  export declare const parseVnetInfoFromId: (vnetId: Input<string>) => Output<VnetInfoType>;
35
35
  export declare const getFirewallIpAddress: (name: string, group: ResourceGroupInfo) => Output<string>;
36
36
  export declare const getFirewallIpAddressByGroupName: (groupName: string) => Output<string>;
37
+ export declare const getIpAddressFromHost: (host: string) => Output<import("@pulumi/pulumi").UnwrappedObject<import("dns").LookupAddress>>;
37
38
  export {};
package/VNet/Helper.js CHANGED
@@ -22,13 +22,17 @@ var __importStar = (this && this.__importStar) || function (mod) {
22
22
  __setModuleDefault(result, mod);
23
23
  return result;
24
24
  };
25
+ var __importDefault = (this && this.__importDefault) || function (mod) {
26
+ return (mod && mod.__esModule) ? mod : { "default": mod };
27
+ };
25
28
  Object.defineProperty(exports, "__esModule", { value: true });
26
- exports.getFirewallIpAddressByGroupName = exports.getFirewallIpAddress = exports.parseVnetInfoFromId = exports.getVnetIdByName = exports.getVnetInfo = exports.getIpAddressResource = exports.getIpAddressId = exports.getSubnetIdByName = exports.getVnetIdFromSubnetId = exports.convertToIpRange = exports.getIpsRange = exports.azBastionSubnetName = exports.azFirewallManagementSubnet = exports.azFirewallSubnet = exports.gatewaySubnetName = exports.appGatewaySubnetName = void 0;
29
+ exports.getIpAddressFromHost = exports.getFirewallIpAddressByGroupName = exports.getFirewallIpAddress = exports.parseVnetInfoFromId = exports.getVnetIdByName = exports.getVnetInfo = exports.getIpAddressResource = exports.getIpAddressId = exports.getSubnetIdByName = exports.getVnetIdFromSubnetId = exports.convertToIpRange = exports.getIpsRange = exports.azBastionSubnetName = exports.azFirewallManagementSubnet = exports.azFirewallSubnet = exports.gatewaySubnetName = exports.appGatewaySubnetName = void 0;
27
30
  const network = __importStar(require("@pulumi/azure-native/network"));
28
31
  const pulumi_1 = require("@pulumi/pulumi");
29
32
  const netmask = __importStar(require("netmask"));
30
- const AzureEnv_1 = require("../Common/AzureEnv");
33
+ const promises_1 = __importDefault(require("node:dns/promises"));
31
34
  const Common_1 = require("../Common");
35
+ const Common_2 = require("../Common");
32
36
  exports.appGatewaySubnetName = 'app-gateway';
33
37
  exports.gatewaySubnetName = 'GatewaySubnet';
34
38
  exports.azFirewallSubnet = 'AzureFirewallSubnet';
@@ -52,43 +56,43 @@ const getVnetIdFromSubnetId = (subnetId) => {
52
56
  exports.getVnetIdFromSubnetId = getVnetIdFromSubnetId;
53
57
  /**Get Subnet Id from Naming rules*/
54
58
  const getSubnetIdByName = ({ subnetName, vnetAndGroupName, }) => {
55
- const vnetName = (0, Common_1.getVnetName)(vnetAndGroupName);
56
- const group = (0, Common_1.getResourceGroupName)(vnetAndGroupName);
57
- return (0, pulumi_1.interpolate) `/subscriptions/${AzureEnv_1.subscriptionId}/resourceGroups/${group}/providers/Microsoft.Network/virtualNetworks/${vnetName}/subnets/${subnetName}`;
59
+ const vnetName = (0, Common_2.getVnetName)(vnetAndGroupName);
60
+ const group = (0, Common_2.getResourceGroupName)(vnetAndGroupName);
61
+ return (0, pulumi_1.interpolate) `/subscriptions/${Common_1.subscriptionId}/resourceGroups/${group}/providers/Microsoft.Network/virtualNetworks/${vnetName}/subnets/${subnetName}`;
58
62
  };
59
63
  exports.getSubnetIdByName = getSubnetIdByName;
60
64
  const getIpAddressId = ({ name, groupName, }) => {
61
- const n = (0, Common_1.getIpAddressName)(name);
62
- const group = (0, Common_1.getResourceGroupName)(groupName);
63
- return (0, pulumi_1.interpolate) `/subscriptions/${AzureEnv_1.subscriptionId}/resourceGroups/${group}/providers/Microsoft.Network/publicIPAddresses/${n}`;
65
+ const n = (0, Common_2.getIpAddressName)(name);
66
+ const group = (0, Common_2.getResourceGroupName)(groupName);
67
+ return (0, pulumi_1.interpolate) `/subscriptions/${Common_1.subscriptionId}/resourceGroups/${group}/providers/Microsoft.Network/publicIPAddresses/${n}`;
64
68
  };
65
69
  exports.getIpAddressId = getIpAddressId;
66
70
  const getIpAddressResource = ({ name, groupName, }) => {
67
- const n = (0, Common_1.getIpAddressName)(name);
68
- const group = (0, Common_1.getResourceGroupName)(groupName);
71
+ const n = (0, Common_2.getIpAddressName)(name);
72
+ const group = (0, Common_2.getResourceGroupName)(groupName);
69
73
  return network.getPublicIPAddress({
70
74
  publicIpAddressName: n,
71
75
  resourceGroupName: group,
72
76
  });
73
77
  };
74
78
  exports.getIpAddressResource = getIpAddressResource;
75
- const getVnetInfo = (groupName, region = AzureEnv_1.currentCountryCode) => {
76
- const vnetName = (0, Common_1.getVnetName)(groupName, { region });
77
- const rsName = (0, Common_1.getResourceGroupName)(groupName, { region });
79
+ const getVnetInfo = (groupName, region = Common_1.currentCountryCode) => {
80
+ const vnetName = (0, Common_2.getVnetName)(groupName, { region });
81
+ const rsName = (0, Common_2.getResourceGroupName)(groupName, { region });
78
82
  return {
79
83
  vnetName,
80
84
  resourceGroupName: rsName,
81
- subscriptionId: AzureEnv_1.subscriptionId,
85
+ subscriptionId: Common_1.subscriptionId,
82
86
  };
83
87
  };
84
88
  exports.getVnetInfo = getVnetInfo;
85
- const getVnetIdByName = (groupName, region = AzureEnv_1.currentCountryCode) => {
89
+ const getVnetIdByName = (groupName, region = Common_1.currentCountryCode) => {
86
90
  const info = (0, exports.getVnetInfo)(groupName, region);
87
91
  return (0, pulumi_1.interpolate) `/subscriptions/${info.subscriptionId}/resourceGroups/${info.resourceGroupName}/providers/Microsoft.Network/virtualNetworks/${info.vnetName}`;
88
92
  };
89
93
  exports.getVnetIdByName = getVnetIdByName;
90
94
  const parseVnetInfoFromId = (vnetId) => (0, pulumi_1.output)(vnetId).apply((id) => {
91
- const info = (0, AzureEnv_1.parseResourceInfoFromId)(id);
95
+ const info = (0, Common_1.parseResourceInfoFromId)(id);
92
96
  return {
93
97
  vnetName: info.name,
94
98
  resourceGroupName: info.group.resourceGroupName,
@@ -105,9 +109,11 @@ const getFirewallIpAddress = (name, group) => {
105
109
  };
106
110
  exports.getFirewallIpAddress = getFirewallIpAddress;
107
111
  const getFirewallIpAddressByGroupName = (groupName) => {
108
- const fireWallName = (0, Common_1.getFirewallName)(groupName);
109
- const rsName = (0, Common_1.getResourceGroupName)(groupName);
112
+ const fireWallName = (0, Common_2.getFirewallName)(groupName);
113
+ const rsName = (0, Common_2.getResourceGroupName)(groupName);
110
114
  return (0, exports.getFirewallIpAddress)(fireWallName, { resourceGroupName: rsName });
111
115
  };
112
116
  exports.getFirewallIpAddressByGroupName = getFirewallIpAddressByGroupName;
113
- //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiSGVscGVyLmpzIiwic291cmNlUm9vdCI6IiIsInNvdXJjZXMiOlsiLi4vLi4vc3JjL1ZOZXQvSGVscGVyLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7O0FBQUEsc0VBQXdEO0FBQ3hELDJDQUFvRTtBQUNwRSxpREFBbUM7QUFDbkMsaURBSTRCO0FBQzVCLHNDQUttQjtBQUlOLFFBQUEsb0JBQW9CLEdBQUcsYUFBYSxDQUFDO0FBQ3JDLFFBQUEsaUJBQWlCLEdBQUcsZUFBZSxDQUFDO0FBQ3BDLFFBQUEsZ0JBQWdCLEdBQUcscUJBQXFCLENBQUM7QUFDekMsUUFBQSwwQkFBMEIsR0FBRywrQkFBK0IsQ0FBQztBQUM3RCxRQUFBLG1CQUFtQixHQUFHLG9CQUFvQixDQUFDO0FBRWpELE1BQU0sV0FBVyxHQUFHLENBQUMsTUFBYyxFQUFFLEVBQUUsQ0FBQyxJQUFJLE9BQU8sQ0FBQyxPQUFPLENBQUMsTUFBTSxDQUFDLENBQUM7QUFBOUQsUUFBQSxXQUFXLGVBQW1EO0FBRTNFLHlEQUF5RDtBQUNsRCxNQUFNLGdCQUFnQixHQUFHLENBQzlCLFNBQW1CLEVBQ29CLEVBQUUsQ0FDekMsU0FBUyxDQUFDLEdBQUcsQ0FBQyxDQUFDLEVBQUUsRUFBRSxFQUFFO0lBQ25CLElBQUksRUFBRSxDQUFDLFFBQVEsQ0FBQyxHQUFHLENBQUMsRUFBRSxDQUFDO1FBQ3JCLE1BQU0sS0FBSyxHQUFHLElBQUEsbUJBQVcsRUFBQyxFQUFFLENBQUMsQ0FBQztRQUM5QixPQUFPLEVBQUUsS0FBSyxFQUFFLEtBQUssQ0FBQyxJQUFJLEVBQUUsR0FBRyxFQUFFLEtBQUssQ0FBQyxTQUFTLEVBQUUsQ0FBQztJQUNyRCxDQUFDO0lBQ0QsT0FBTyxFQUFFLEtBQUssRUFBRSxFQUFFLEVBQUUsR0FBRyxFQUFFLEVBQUUsRUFBRSxDQUFDO0FBQ2hDLENBQUMsQ0FBQyxDQUFDO0FBVFEsUUFBQSxnQkFBZ0Isb0JBU3hCO0FBRUUsTUFBTSxxQkFBcUIsR0FBRyxDQUFDLFFBQWdCLEVBQUUsRUFBRTtJQUN4RCw0TEFBNEw7SUFDNUwsT0FBTyxRQUFRLENBQUMsS0FBSyxDQUFDLFVBQVUsQ0FBQyxDQUFDLENBQUMsQ0FBQyxDQUFDO0FBQ3ZDLENBQUMsQ0FBQztBQUhXLFFBQUEscUJBQXFCLHlCQUdoQztBQVFGLG9DQUFvQztBQUM3QixNQUFNLGlCQUFpQixHQUFHLENBQUMsRUFDaEMsVUFBVSxFQUNWLGdCQUFnQixHQUNKLEVBQWtCLEVBQUU7SUFDaEMsTUFBTSxRQUFRLEdBQUcsSUFBQSxvQkFBVyxFQUFDLGdCQUFnQixDQUFDLENBQUM7SUFDL0MsTUFBTSxLQUFLLEdBQUcsSUFBQSw2QkFBb0IsRUFBQyxnQkFBZ0IsQ0FBQyxDQUFDO0lBQ3JELE9BQU8sSUFBQSxvQkFBVyxFQUFBLGtCQUFrQix5QkFBYyxtQkFBbUIsS0FBSyxnREFBZ0QsUUFBUSxZQUFZLFVBQVUsRUFBRSxDQUFDO0FBQzdKLENBQUMsQ0FBQztBQVBXLFFBQUEsaUJBQWlCLHFCQU81QjtBQUVLLE1BQU0sY0FBYyxHQUFHLENBQUMsRUFDN0IsSUFBSSxFQUNKLFNBQVMsR0FJVixFQUFFLEVBQUU7SUFDSCxNQUFNLENBQUMsR0FBRyxJQUFBLHlCQUFnQixFQUFDLElBQUksQ0FBQyxDQUFDO0lBQ2pDLE1BQU0sS0FBSyxHQUFHLElBQUEsNkJBQW9CLEVBQUMsU0FBUyxDQUFDLENBQUM7SUFDOUMsT0FBTyxJQUFBLG9CQUFXLEVBQUEsa0JBQWtCLHlCQUFjLG1CQUFtQixLQUFLLGtEQUFrRCxDQUFDLEVBQUUsQ0FBQztBQUNsSSxDQUFDLENBQUM7QUFWVyxRQUFBLGNBQWMsa0JBVXpCO0FBRUssTUFBTSxvQkFBb0IsR0FBRyxDQUFDLEVBQ25DLElBQUksRUFDSixTQUFTLEdBSVYsRUFBRSxFQUFFO0lBQ0gsTUFBTSxDQUFDLEdBQUcsSUFBQSx5QkFBZ0IsRUFBQyxJQUFJLENBQUMsQ0FBQztJQUNqQyxNQUFNLEtBQUssR0FBRyxJQUFBLDZCQUFvQixFQUFDLFNBQVMsQ0FBQyxDQUFDO0lBRTlDLE9BQU8sT0FBTyxDQUFDLGtCQUFrQixDQUFDO1FBQ2hDLG1CQUFtQixFQUFFLENBQUM7UUFDdEIsaUJBQWlCLEVBQUUsS0FBSztLQUN6QixDQUFDLENBQUM7QUFDTCxDQUFDLENBQUM7QUFkVyxRQUFBLG9CQUFvQix3QkFjL0I7QUFFSyxNQUFNLFdBQVcsR0FBRyxDQUN6QixTQUFpQixFQUNqQixTQUFpQiw2QkFBa0IsRUFDckIsRUFBRTtJQUNoQixNQUFNLFFBQVEsR0FBRyxJQUFBLG9CQUFXLEVBQUMsU0FBUyxFQUFFLEVBQUUsTUFBTSxFQUFFLENBQUMsQ0FBQztJQUNwRCxNQUFNLE1BQU0sR0FBRyxJQUFBLDZCQUFvQixFQUFDLFNBQVMsRUFBRSxFQUFFLE1BQU0sRUFBRSxDQUFDLENBQUM7SUFFM0QsT0FBTztRQUNMLFFBQVE7UUFDUixpQkFBaUIsRUFBRSxNQUFNO1FBQ3pCLGNBQWMsRUFBZCx5QkFBYztLQUNmLENBQUM7QUFDSixDQUFDLENBQUM7QUFaVyxRQUFBLFdBQVcsZUFZdEI7QUFFSyxNQUFNLGVBQWUsR0FBRyxDQUM3QixTQUFpQixFQUNqQixTQUFpQiw2QkFBa0IsRUFDbkMsRUFBRTtJQUNGLE1BQU0sSUFBSSxHQUFHLElBQUEsbUJBQVcsRUFBQyxTQUFTLEVBQUUsTUFBTSxDQUFDLENBQUM7SUFDNUMsT0FBTyxJQUFBLG9CQUFXLEVBQUEsa0JBQWtCLElBQUksQ0FBQyxjQUFjLG1CQUFtQixJQUFJLENBQUMsaUJBQWlCLGdEQUFnRCxJQUFJLENBQUMsUUFBUSxFQUFFLENBQUM7QUFDbEssQ0FBQyxDQUFDO0FBTlcsUUFBQSxlQUFlLG1CQU0xQjtBQUVLLE1BQU0sbUJBQW1CLEdBQUcsQ0FDakMsTUFBcUIsRUFDQyxFQUFFLENBQ3hCLElBQUEsZUFBTSxFQUFDLE1BQU0sQ0FBQyxDQUFDLEtBQUssQ0FBQyxDQUFDLEVBQUUsRUFBRSxFQUFFO0lBQzFCLE1BQU0sSUFBSSxHQUFHLElBQUEsa0NBQXVCLEVBQUMsRUFBRSxDQUFFLENBQUM7SUFDMUMsT0FBTztRQUNMLFFBQVEsRUFBRSxJQUFJLENBQUMsSUFBSTtRQUNuQixpQkFBaUIsRUFBRSxJQUFJLENBQUMsS0FBSyxDQUFDLGlCQUFpQjtRQUMvQyxjQUFjLEVBQUUsSUFBSSxDQUFDLGNBQWM7S0FDcEIsQ0FBQztBQUNwQixDQUFDLENBQUMsQ0FBQztBQVZRLFFBQUEsbUJBQW1CLHVCQVUzQjtBQUVFLE1BQU0sb0JBQW9CLEdBQUcsQ0FDbEMsSUFBWSxFQUNaLEtBQXdCLEVBQ3hCLEVBQUU7SUFDRixNQUFNLFFBQVEsR0FBRyxPQUFPLENBQUMsc0JBQXNCLENBQUM7UUFDOUMsaUJBQWlCLEVBQUUsSUFBSTtRQUN2QixHQUFHLEtBQUs7S0FDVCxDQUFDLENBQUM7SUFFSCxPQUFPLFFBQVEsQ0FBQyxnQkFBaUIsQ0FBQyxLQUFLLENBQUMsQ0FBQyxFQUFFLEVBQUUsRUFBRSxDQUFDLEVBQUcsQ0FBQyxDQUFDLENBQUUsQ0FBQyxnQkFBaUIsQ0FBQyxDQUFDO0FBQzdFLENBQUMsQ0FBQztBQVZXLFFBQUEsb0JBQW9CLHdCQVUvQjtBQUVLLE1BQU0sK0JBQStCLEdBQUcsQ0FBQyxTQUFpQixFQUFFLEVBQUU7SUFDbkUsTUFBTSxZQUFZLEdBQUcsSUFBQSx3QkFBZSxFQUFDLFNBQVMsQ0FBQyxDQUFDO0lBQ2hELE1BQU0sTUFBTSxHQUFHLElBQUEsNkJBQW9CLEVBQUMsU0FBUyxDQUFDLENBQUM7SUFDL0MsT0FBTyxJQUFBLDRCQUFvQixFQUFDLFlBQVksRUFBRSxFQUFFLGlCQUFpQixFQUFFLE1BQU0sRUFBRSxDQUFDLENBQUM7QUFDM0UsQ0FBQyxDQUFDO0FBSlcsUUFBQSwrQkFBK0IsbUNBSTFDIn0=
117
+ const getIpAddressFromHost = (host) => (0, pulumi_1.output)(promises_1.default.lookup(host, { family: 4 }));
118
+ exports.getIpAddressFromHost = getIpAddressFromHost;
119
+ //# sourceMappingURL=data:application/json;base64,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
package/VNet/index.d.ts CHANGED
@@ -1,11 +1,11 @@
1
- import * as network from "@pulumi/azure-native/network";
2
- import { Input } from "@pulumi/pulumi";
3
- import * as pulumi from "@pulumi/pulumi";
4
- import { BasicMonitorArgs, ResourceGroupInfo } from "../types";
5
- import { CustomSecurityRuleArgs } from "./types";
6
- import { FirewallSkus } from "./Firewall";
7
- import { FirewallPolicyProps } from "./types";
8
- import { SubnetProps } from "./Subnet";
1
+ import * as network from '@pulumi/azure-native/network';
2
+ import { Input } from '@pulumi/pulumi';
3
+ import * as pulumi from '@pulumi/pulumi';
4
+ import { BasicMonitorArgs, ResourceGroupInfo } from '../types';
5
+ import { CustomSecurityRuleArgs } from './types';
6
+ import { FirewallSkus } from './Firewall';
7
+ import { FirewallPolicyProps } from './types';
8
+ import { SubnetProps } from './Subnet';
9
9
  interface Props {
10
10
  name: string;
11
11
  group: ResourceGroupInfo;
@@ -26,7 +26,7 @@ interface Props {
26
26
  /** Only required if Firewall is Basic tier */
27
27
  managementSubnetPrefix?: string;
28
28
  sku?: FirewallSkus;
29
- policy: Omit<FirewallPolicyProps, "enabled">;
29
+ policy: Omit<FirewallPolicyProps, 'enabled'>;
30
30
  /** set this is TRUE if want to create firewall subnet but not create firewall component */
31
31
  disabledFirewallCreation?: boolean;
32
32
  };