@drunk-pulumi/azure 1.0.3 → 1.0.5
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/Aks/Helper.js +4 -3
- package/Aks/Identity.js +3 -3
- package/Aks/index.d.ts +8 -7
- package/Aks/index.js +73 -57
- package/Automation/index.d.ts +1 -1
- package/Automation/index.js +5 -5
- package/AzAd/EnvRoles.Consts.d.ts +13 -8
- package/AzAd/EnvRoles.Consts.js +51 -51
- package/AzAd/EnvRoles.d.ts +3 -3
- package/AzAd/EnvRoles.js +10 -10
- package/AzAd/Group.d.ts +2 -2
- package/AzAd/Group.js +12 -12
- package/AzAd/Identities/AzDevOpsIdentity.d.ts +1 -1
- package/AzAd/Identities/AzDevOpsIdentity.js +9 -6
- package/AzAd/Identities/AzDevOpsManagedIdentity.d.ts +2 -2
- package/AzAd/Identities/AzDevOpsManagedIdentity.js +6 -3
- package/AzAd/RoleAssignment.d.ts +3 -3
- package/AzAd/RoleAssignment.js +3 -3
- package/AzAd/RoleDefinitions/JustInTimeRequestRole.js +10 -10
- package/Builder/AksBuilder.js +15 -1
- package/Builder/PrivateDnsZoneBuilder.d.ts +2 -1
- package/Builder/PrivateDnsZoneBuilder.js +41 -23
- package/Builder/ResourceBuilder.js +12 -6
- package/Builder/SqlBuilder.js +7 -1
- package/Builder/StorageBuilder.js +14 -14
- package/Builder/VaultBuilder.d.ts +2 -1
- package/Builder/VaultBuilder.js +8 -1
- package/Builder/types/resourceBuilder.d.ts +2 -0
- package/Builder/types/sqlBuilder.d.ts +2 -1
- package/Builder/types/storageBuilder.d.ts +10 -8
- package/Builder/types/vaultBuilder.d.ts +6 -1
- package/Cdn/CdnEndpoint.d.ts +2 -3
- package/Cdn/CdnEndpoint.js +15 -17
- package/Cdn/CdnRules.d.ts +6 -2
- package/Cdn/CdnRules.js +51 -56
- package/Certificate/index.d.ts +2 -2
- package/Certificate/index.js +29 -29
- package/Common/AzureEnv.d.ts +2 -3
- package/Common/AzureEnv.js +21 -8
- package/Common/Naming/index.d.ts +1 -1
- package/Common/Naming/index.js +65 -61
- package/Common/index.d.ts +11 -6
- package/Common/index.js +6 -1
- package/ContainerRegistry/index.d.ts +5 -5
- package/ContainerRegistry/index.js +75 -50
- package/Core/KeyGenerators.d.ts +5 -5
- package/Core/KeyGenerators.js +5 -5
- package/CustomRoles/index.js +3 -3
- package/KeyVault/CustomHelper.d.ts +4 -4
- package/KeyVault/CustomHelper.js +7 -7
- package/KeyVault/Helper.js +12 -9
- package/Logs/Helpers.d.ts +1 -1
- package/RedisCache/index.d.ts +2 -2
- package/RedisCache/index.js +10 -5
- package/SignalR/index.d.ts +4 -4
- package/SignalR/index.js +26 -21
- package/Sql/SqlDb.js +2 -3
- package/Sql/index.d.ts +3 -4
- package/Sql/index.js +11 -11
- package/Storage/Helper.d.ts +1 -1
- package/Storage/index.d.ts +2 -3
- package/Storage/index.js +2 -2
- package/VNet/FirewallPolicies/AksFirewallPolicy.d.ts +4 -3
- package/VNet/FirewallPolicies/AksFirewallPolicy.js +116 -123
- package/VNet/FirewallPolicies/CloudPCFirewallPolicy.d.ts +4 -3
- package/VNet/FirewallPolicies/CloudPCFirewallPolicy.js +150 -132
- package/VNet/Helper.d.ts +1 -0
- package/VNet/Helper.js +25 -19
- package/VNet/index.d.ts +9 -9
- package/VNet/index.js +58 -49
- package/VNet/types.d.ts +9 -6
- package/package.json +6 -6
package/VNet/index.js
CHANGED
|
@@ -27,7 +27,6 @@ var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
|
27
27
|
};
|
|
28
28
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
29
29
|
const network = __importStar(require("@pulumi/azure-native/network"));
|
|
30
|
-
const azure_providers_1 = require("@drunk-pulumi/azure-providers");
|
|
31
30
|
const Firewall_1 = __importDefault(require("./Firewall"));
|
|
32
31
|
const NetworkPeering_1 = __importDefault(require("./NetworkPeering"));
|
|
33
32
|
const Vnet_1 = __importDefault(require("./Vnet"));
|
|
@@ -46,14 +45,14 @@ exports.default = ({ group, name, ddosId, addressSpace, publicIpAddress, subnets
|
|
|
46
45
|
} //Allow Internet to public IpAddress security group
|
|
47
46
|
else if (features.securityGroup?.allowInboundInternetAccess)
|
|
48
47
|
securities.push({
|
|
49
|
-
name:
|
|
50
|
-
sourceAddressPrefix:
|
|
51
|
-
sourcePortRange:
|
|
48
|
+
name: 'allow-inbound-internet-publicIpAddress',
|
|
49
|
+
sourceAddressPrefix: '*',
|
|
50
|
+
sourcePortRange: '*',
|
|
52
51
|
destinationAddressPrefix: publicIpAddress.ipAddress.apply((i) => `${i}/32`),
|
|
53
|
-
destinationPortRanges: [
|
|
54
|
-
protocol:
|
|
55
|
-
access:
|
|
56
|
-
direction:
|
|
52
|
+
destinationPortRanges: ['443', '80'],
|
|
53
|
+
protocol: 'TCP',
|
|
54
|
+
access: 'Allow',
|
|
55
|
+
direction: 'Inbound',
|
|
57
56
|
priority: 200 + securities.length + 1,
|
|
58
57
|
});
|
|
59
58
|
}
|
|
@@ -65,32 +64,32 @@ exports.default = ({ group, name, ddosId, addressSpace, publicIpAddress, subnets
|
|
|
65
64
|
//Update route to firewall IpAddress
|
|
66
65
|
routes.push({
|
|
67
66
|
name: `vnet-to-firewall`,
|
|
68
|
-
addressPrefix:
|
|
67
|
+
addressPrefix: '0.0.0.0/0',
|
|
69
68
|
nextHopType: network.RouteNextHopType.VirtualAppliance,
|
|
70
69
|
nextHopIpAddress: pp.firewallPrivateIpAddress,
|
|
71
70
|
});
|
|
72
71
|
//Allow Vnet to Firewall
|
|
73
72
|
securities.push({
|
|
74
73
|
name: `allow-vnet-to-firewall`,
|
|
75
|
-
sourceAddressPrefix:
|
|
76
|
-
sourcePortRange:
|
|
74
|
+
sourceAddressPrefix: '*',
|
|
75
|
+
sourcePortRange: '*',
|
|
77
76
|
destinationAddressPrefix: pp.firewallPrivateIpAddress,
|
|
78
|
-
destinationPortRange:
|
|
79
|
-
protocol:
|
|
80
|
-
access:
|
|
81
|
-
direction:
|
|
77
|
+
destinationPortRange: '*',
|
|
78
|
+
protocol: '*',
|
|
79
|
+
access: 'Allow',
|
|
80
|
+
direction: 'Outbound',
|
|
82
81
|
priority: 100,
|
|
83
82
|
});
|
|
84
83
|
}
|
|
85
84
|
securities.push({
|
|
86
85
|
name: `allow-vnet-to-vnet-${index}`,
|
|
87
|
-
sourceAddressPrefix:
|
|
88
|
-
sourcePortRange:
|
|
89
|
-
destinationAddressPrefix:
|
|
90
|
-
destinationPortRange:
|
|
91
|
-
protocol:
|
|
92
|
-
access:
|
|
93
|
-
direction:
|
|
86
|
+
sourceAddressPrefix: 'VirtualNetwork',
|
|
87
|
+
sourcePortRange: '*',
|
|
88
|
+
destinationAddressPrefix: 'VirtualNetwork',
|
|
89
|
+
destinationPortRange: '*',
|
|
90
|
+
protocol: '*',
|
|
91
|
+
access: 'Allow',
|
|
92
|
+
direction: 'Outbound',
|
|
94
93
|
priority: 101,
|
|
95
94
|
});
|
|
96
95
|
});
|
|
@@ -113,7 +112,7 @@ exports.default = ({ group, name, ddosId, addressSpace, publicIpAddress, subnets
|
|
|
113
112
|
appGatewaySubnet: features.enableAppGateway
|
|
114
113
|
? {
|
|
115
114
|
addressPrefix: features.enableAppGateway.subnetPrefix,
|
|
116
|
-
version:
|
|
115
|
+
version: 'v1',
|
|
117
116
|
}
|
|
118
117
|
: undefined,
|
|
119
118
|
firewall: features.enableFirewall
|
|
@@ -169,18 +168,22 @@ exports.default = ({ group, name, ddosId, addressSpace, publicIpAddress, subnets
|
|
|
169
168
|
secondVnet: info,
|
|
170
169
|
});
|
|
171
170
|
//Update route to firewall IpAddress
|
|
172
|
-
if (pp.firewallPrivateIpAddress && vnet.routeTable) {
|
|
173
|
-
|
|
174
|
-
|
|
175
|
-
|
|
176
|
-
|
|
177
|
-
|
|
178
|
-
|
|
179
|
-
|
|
180
|
-
|
|
181
|
-
|
|
182
|
-
|
|
183
|
-
|
|
171
|
+
// if (pp.firewallPrivateIpAddress && vnet.routeTable) {
|
|
172
|
+
// new NetworkRouteResource(
|
|
173
|
+
// `${name}-vnet-to-firewall`,
|
|
174
|
+
// {
|
|
175
|
+
// routeName: "vnet-to-firewall",
|
|
176
|
+
// ...group,
|
|
177
|
+
// routeTableName: vnet.routeTable.name,
|
|
178
|
+
// addressPrefix: "0.0.0.0/0",
|
|
179
|
+
// nextHopType: network.RouteNextHopType.VirtualAppliance,
|
|
180
|
+
// nextHopIpAddress: pp.firewallPrivateIpAddress,
|
|
181
|
+
// },
|
|
182
|
+
// {
|
|
183
|
+
// dependsOn: vnet.routeTable,
|
|
184
|
+
// },
|
|
185
|
+
// );
|
|
186
|
+
// }
|
|
184
187
|
});
|
|
185
188
|
}
|
|
186
189
|
//Return the results
|
|
@@ -193,19 +196,25 @@ const createFirewall = ({ name, group, routeTableName, dependsOn = [], ...others
|
|
|
193
196
|
...others,
|
|
194
197
|
dependsOn,
|
|
195
198
|
});
|
|
196
|
-
if (routeTableName) {
|
|
197
|
-
|
|
198
|
-
|
|
199
|
-
|
|
200
|
-
|
|
201
|
-
|
|
202
|
-
|
|
203
|
-
|
|
204
|
-
|
|
205
|
-
|
|
206
|
-
|
|
207
|
-
|
|
208
|
-
|
|
199
|
+
// if (routeTableName) {
|
|
200
|
+
// //Route Vnet to Firewall
|
|
201
|
+
// new NetworkRouteResource(
|
|
202
|
+
// `${name}-vnet-to-firewall`,
|
|
203
|
+
// {
|
|
204
|
+
// routeName: `vnet-to-firewall`,
|
|
205
|
+
// ...group,
|
|
206
|
+
// routeTableName: routeTableName,
|
|
207
|
+
// addressPrefix: '0.0.0.0/0',
|
|
208
|
+
// nextHopType: network.RouteNextHopType.VirtualAppliance,
|
|
209
|
+
// nextHopIpAddress: rs.firewall.ipConfigurations.apply((c) =>
|
|
210
|
+
// c ? c[0].privateIPAddress : '',
|
|
211
|
+
// ),
|
|
212
|
+
// },
|
|
213
|
+
// {
|
|
214
|
+
// dependsOn: [rs.firewall],
|
|
215
|
+
// },
|
|
216
|
+
// );
|
|
217
|
+
// }
|
|
209
218
|
return rs;
|
|
210
219
|
};
|
|
211
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
220
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi9zcmMvVk5ldC9pbmRleC50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiOzs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7O0FBQUEsc0VBQXdEO0FBT3hELDBEQUFtRTtBQUVuRSxzRUFBMkM7QUFFM0Msa0RBQTBCO0FBQzFCLHFDQUErQztBQStDL0Msa0JBQWUsQ0FBQyxFQUNkLEtBQUssRUFDTCxJQUFJLEVBQ0osTUFBTSxFQUNOLFlBQVksRUFDWixlQUFlLEVBQ2YsT0FBTyxFQUNQLFFBQVEsR0FBRyxFQUFFLEVBQ2IsYUFBYSxFQUNiLEdBQUcsTUFBTSxFQUNILEVBQUUsRUFBRTtJQUNWLE1BQU0sVUFBVSxHQUFHLFFBQVEsQ0FBQyxhQUFhLEVBQUUsS0FBSyxJQUFJLEVBQUUsQ0FBQztJQUN2RCxNQUFNLE1BQU0sR0FBRyxJQUFJLEtBQUssRUFBbUMsQ0FBQztJQUU1RCxJQUFJLGVBQWUsRUFBRSxDQUFDO1FBQ3BCLHNDQUFzQztRQUN0QyxJQUFJLFFBQVEsQ0FBQyxjQUFjLEVBQUUsQ0FBQztZQUM1QixNQUFNLENBQUMsSUFBSSxDQUFDO2dCQUNWLElBQUksRUFBRSxzQkFBc0I7Z0JBQzVCLGFBQWEsRUFBRSxlQUFlLENBQUMsU0FBUyxDQUFDLEtBQUssQ0FBQyxDQUFDLENBQUMsRUFBRSxFQUFFLENBQUMsR0FBRyxDQUFDLEtBQUssQ0FBQztnQkFDaEUsV0FBVyxFQUFFLE9BQU8sQ0FBQyxnQkFBZ0IsQ0FBQyxRQUFRO2FBQy9DLENBQUMsQ0FBQztRQUNMLENBQUMsQ0FBQyxtREFBbUQ7YUFDaEQsSUFBSSxRQUFRLENBQUMsYUFBYSxFQUFFLDBCQUEwQjtZQUN6RCxVQUFVLENBQUMsSUFBSSxDQUFDO2dCQUNkLElBQUksRUFBRSx3Q0FBd0M7Z0JBQzlDLG1CQUFtQixFQUFFLEdBQUc7Z0JBQ3hCLGVBQWUsRUFBRSxHQUFHO2dCQUNwQix3QkFBd0IsRUFBRSxlQUFlLENBQUMsU0FBUyxDQUFDLEtBQUssQ0FDdkQsQ0FBQyxDQUFDLEVBQUUsRUFBRSxDQUFDLEdBQUcsQ0FBQyxLQUFLLENBQ2pCO2dCQUNELHFCQUFxQixFQUFFLENBQUMsS0FBSyxFQUFFLElBQUksQ0FBQztnQkFDcEMsUUFBUSxFQUFFLEtBQUs7Z0JBQ2YsTUFBTSxFQUFFLE9BQU87Z0JBQ2YsU0FBUyxFQUFFLFNBQVM7Z0JBQ3BCLFFBQVEsRUFBRSxHQUFHLEdBQUcsVUFBVSxDQUFDLE1BQU0sR0FBRyxDQUFDO2FBQ3RDLENBQUMsQ0FBQztJQUNQLENBQUM7SUFFRCx1QkFBdUI7SUFDdkIsSUFBSSxRQUFRLENBQUMsV0FBVyxFQUFFLENBQUM7UUFDekIsUUFBUSxDQUFDLFdBQVcsQ0FBQyxPQUFPLENBQUMsQ0FBQyxFQUFFLEVBQUUsS0FBSyxFQUFFLEVBQUU7WUFDekMsNENBQTRDO1lBQzVDLElBQUksRUFBRSxDQUFDLHdCQUF3QixFQUFFLENBQUM7Z0JBQ2hDLG9DQUFvQztnQkFDcEMsTUFBTSxDQUFDLElBQUksQ0FBQztvQkFDVixJQUFJLEVBQUUsa0JBQWtCO29CQUN4QixhQUFhLEVBQUUsV0FBVztvQkFDMUIsV0FBVyxFQUFFLE9BQU8sQ0FBQyxnQkFBZ0IsQ0FBQyxnQkFBZ0I7b0JBQ3RELGdCQUFnQixFQUFFLEVBQUUsQ0FBQyx3QkFBd0I7aUJBQzlDLENBQUMsQ0FBQztnQkFFSCx3QkFBd0I7Z0JBQ3hCLFVBQVUsQ0FBQyxJQUFJLENBQUM7b0JBQ2QsSUFBSSxFQUFFLHdCQUF3QjtvQkFDOUIsbUJBQW1CLEVBQUUsR0FBRztvQkFDeEIsZUFBZSxFQUFFLEdBQUc7b0JBQ3BCLHdCQUF3QixFQUFFLEVBQUUsQ0FBQyx3QkFBd0I7b0JBQ3JELG9CQUFvQixFQUFFLEdBQUc7b0JBQ3pCLFFBQVEsRUFBRSxHQUFHO29CQUNiLE1BQU0sRUFBRSxPQUFPO29CQUNmLFNBQVMsRUFBRSxVQUFVO29CQUNyQixRQUFRLEVBQUUsR0FBRztpQkFDZCxDQUFDLENBQUM7WUFDTCxDQUFDO1lBRUQsVUFBVSxDQUFDLElBQUksQ0FBQztnQkFDZCxJQUFJLEVBQUUsc0JBQXNCLEtBQUssRUFBRTtnQkFDbkMsbUJBQW1CLEVBQUUsZ0JBQWdCO2dCQUNyQyxlQUFlLEVBQUUsR0FBRztnQkFDcEIsd0JBQXdCLEVBQUUsZ0JBQWdCO2dCQUMxQyxvQkFBb0IsRUFBRSxHQUFHO2dCQUN6QixRQUFRLEVBQUUsR0FBRztnQkFDYixNQUFNLEVBQUUsT0FBTztnQkFDZixTQUFTLEVBQUUsVUFBVTtnQkFDckIsUUFBUSxFQUFFLEdBQUc7YUFDZCxDQUFDLENBQUM7UUFDTCxDQUFDLENBQUMsQ0FBQztJQUNMLENBQUM7SUFFRCxNQUFNO0lBQ04sTUFBTSxJQUFJLEdBQUcsSUFBQSxjQUFJLEVBQUM7UUFDaEIsS0FBSztRQUNMLElBQUk7UUFDSixNQUFNO1FBQ04sYUFBYSxFQUFFLFlBQVk7UUFFM0IsT0FBTztRQUNQLFFBQVEsRUFBRTtZQUNSLGFBQWEsRUFBRSxRQUFRLENBQUMsYUFBYTtnQkFDbkMsQ0FBQyxDQUFDO29CQUNFLEdBQUcsUUFBUSxDQUFDLGFBQWE7b0JBQ3pCLEtBQUssRUFBRSxVQUFVO2lCQUNsQjtnQkFDSCxDQUFDLENBQUMsU0FBUztZQUNiLFVBQVUsRUFBRSxFQUFFLEtBQUssRUFBRSxNQUFNLEVBQUU7WUFFN0IsZ0JBQWdCLEVBQUUsUUFBUSxDQUFDLGdCQUFnQjtnQkFDekMsQ0FBQyxDQUFDO29CQUNFLGFBQWEsRUFBRSxRQUFRLENBQUMsZ0JBQWdCLENBQUMsWUFBWTtvQkFDckQsT0FBTyxFQUFFLElBQUk7aUJBQ2Q7Z0JBQ0gsQ0FBQyxDQUFDLFNBQVM7WUFFYixRQUFRLEVBQUUsUUFBUSxDQUFDLGNBQWM7Z0JBQy9CLENBQUMsQ0FBQztvQkFDRSxhQUFhLEVBQUUsUUFBUSxDQUFDLGNBQWMsQ0FBQyxZQUFZO29CQUNuRCx1QkFBdUIsRUFDckIsUUFBUSxDQUFDLGNBQWMsQ0FBQyxzQkFBc0I7aUJBQ2pEO2dCQUNILENBQUMsQ0FBQyxTQUFTO1lBRWIsT0FBTyxFQUFFLFFBQVEsQ0FBQyxhQUFhO2dCQUM3QixDQUFDLENBQUM7b0JBQ0UsYUFBYSxFQUFFLFFBQVEsQ0FBQyxhQUFhLENBQUMsWUFBWTtpQkFDbkQ7Z0JBQ0gsQ0FBQyxDQUFDLFNBQVM7U0FDZDtRQUNELEdBQUcsTUFBTTtLQUNWLENBQUMsQ0FBQztJQUVILFVBQVU7SUFDVixJQUFJLFFBS1MsQ0FBQztJQUVkLElBQ0UsUUFBUSxDQUFDLGNBQWM7UUFDdkIsQ0FBQyxRQUFRLENBQUMsY0FBYyxDQUFDLHdCQUF3QixFQUNqRCxDQUFDO1FBQ0QsUUFBUSxHQUFHLGNBQWMsQ0FBQztZQUN4QixJQUFJO1lBQ0osS0FBSztZQUVMLE1BQU0sRUFBRTtnQkFDTixHQUFHLFFBQVEsQ0FBQyxjQUFjLENBQUMsTUFBTTthQUNsQztZQUVELFFBQVEsRUFBRTtnQkFDUjtvQkFDRSxlQUFlLEVBQUUsZUFBZ0I7b0JBQ2pDLFFBQVEsRUFBRSxJQUFJLENBQUMsY0FBYyxDQUFDLEtBQUssQ0FBQyxDQUFDLENBQUMsRUFBRSxFQUFFLENBQUMsQ0FBRSxDQUFDLEVBQUcsQ0FBQztpQkFDbkQ7YUFDRjtZQUNELFVBQVUsRUFBRSxRQUFRLEVBQUUsY0FBYyxDQUFDLHNCQUFzQjtnQkFDekQsQ0FBQyxDQUFDO29CQUNFLFFBQVEsRUFBRSxJQUFJLENBQUMsb0JBQW9CLENBQUMsS0FBSyxDQUFDLENBQUMsQ0FBQyxFQUFFLEVBQUUsQ0FBQyxDQUFFLENBQUMsRUFBRyxDQUFDO2lCQUN6RDtnQkFDSCxDQUFDLENBQUMsU0FBUztZQUViLEdBQUcsRUFBRSxRQUFRLENBQUMsY0FBYyxDQUFDLEdBQUc7WUFDaEMsY0FBYyxFQUFFLElBQUksQ0FBQyxVQUFVLEVBQUUsSUFBSTtZQUNyQyxhQUFhO1lBQ2IsU0FBUyxFQUFFLENBQUMsSUFBSSxDQUFDLElBQUksQ0FBQztTQUN2QixDQUFDLENBQUM7SUFDTCxDQUFDO0lBRUQsY0FBYztJQUNkLElBQUksUUFBUSxDQUFDLFdBQVcsRUFBRSxDQUFDO1FBQ3pCLFFBQVEsQ0FBQyxXQUFXLENBQUMsR0FBRyxDQUFDLENBQUMsRUFBRSxFQUFFLEVBQUU7WUFDOUIsTUFBTSxJQUFJLEdBQUcsSUFBQSw0QkFBbUIsRUFBQyxFQUFFLENBQUMsTUFBTSxDQUFDLENBQUM7WUFDNUMsSUFBQSx3QkFBVyxFQUFDO2dCQUNWLFNBQVMsRUFBRTtvQkFDVCxRQUFRLEVBQUUsSUFBSSxDQUFDLElBQUksQ0FBQyxJQUFJO29CQUN4QixpQkFBaUIsRUFBRSxLQUFLLENBQUMsaUJBQWlCO2lCQUMzQztnQkFDRCxVQUFVLEVBQUUsSUFBSTthQUNqQixDQUFDLENBQUM7WUFFSCxvQ0FBb0M7WUFDcEMsd0RBQXdEO1lBQ3hELDhCQUE4QjtZQUM5QixrQ0FBa0M7WUFDbEMsUUFBUTtZQUNSLHVDQUF1QztZQUN2QyxrQkFBa0I7WUFDbEIsOENBQThDO1lBQzlDLG9DQUFvQztZQUNwQyxnRUFBZ0U7WUFDaEUsdURBQXVEO1lBQ3ZELFNBQVM7WUFDVCxRQUFRO1lBQ1Isb0NBQW9DO1lBQ3BDLFNBQVM7WUFDVCxPQUFPO1lBQ1AsSUFBSTtRQUNOLENBQUMsQ0FBQyxDQUFDO0lBQ0wsQ0FBQztJQUVELG9CQUFvQjtJQUNwQixPQUFPLEVBQUUsZUFBZSxFQUFFLEdBQUcsSUFBSSxFQUFFLFFBQVEsRUFBRSxDQUFDO0FBQ2hELENBQUMsQ0FBQztBQUVGLE1BQU0sY0FBYyxHQUFHLENBQUMsRUFDdEIsSUFBSSxFQUNKLEtBQUssRUFDTCxjQUFjLEVBQ2QsU0FBUyxHQUFHLEVBQUUsRUFDZCxHQUFHLE1BQU0sRUFDMEMsRUFBRSxFQUFFO0lBQ3ZELE1BQU0sRUFBRSxHQUFHLElBQUEsa0JBQVEsRUFBQztRQUNsQixJQUFJO1FBQ0osS0FBSztRQUNMLEdBQUcsTUFBTTtRQUNULFNBQVM7S0FDVixDQUFDLENBQUM7SUFFSCx3QkFBd0I7SUFDeEIsNkJBQTZCO0lBQzdCLDhCQUE4QjtJQUM5QixrQ0FBa0M7SUFDbEMsUUFBUTtJQUNSLHVDQUF1QztJQUN2QyxrQkFBa0I7SUFDbEIsd0NBQXdDO0lBQ3hDLG9DQUFvQztJQUNwQyxnRUFBZ0U7SUFDaEUsb0VBQW9FO0lBQ3BFLDBDQUEwQztJQUMxQyxXQUFXO0lBQ1gsU0FBUztJQUNULFFBQVE7SUFDUixrQ0FBa0M7SUFDbEMsU0FBUztJQUNULE9BQU87SUFDUCxJQUFJO0lBRUosT0FBTyxFQUFFLENBQUM7QUFDWixDQUFDLENBQUMifQ==
|
package/VNet/types.d.ts
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
|
-
import { enums, input as inputs } from
|
|
2
|
-
import { Input, Output } from
|
|
3
|
-
import * as pulumi from
|
|
1
|
+
import { enums, input as inputs } from '@pulumi/azure-native/types';
|
|
2
|
+
import { Input, Output } from '@pulumi/pulumi';
|
|
3
|
+
import * as pulumi from '@pulumi/pulumi';
|
|
4
4
|
export type VnetInfoType = {
|
|
5
5
|
vnetName: Input<string>;
|
|
6
6
|
resourceGroupName: Input<string>;
|
|
@@ -38,7 +38,7 @@ export interface NatRuleArgs {
|
|
|
38
38
|
destinationPorts?: Input<Input<string>[]>;
|
|
39
39
|
ipProtocols?: Input<Input<string | enums.network.FirewallPolicyRuleNetworkProtocol>[]>;
|
|
40
40
|
name?: Input<string>;
|
|
41
|
-
ruleType: Input<
|
|
41
|
+
ruleType: Input<'NatRule'>;
|
|
42
42
|
sourceAddresses?: Input<Input<string>[]>;
|
|
43
43
|
sourceIpGroups?: Input<Input<string>[]>;
|
|
44
44
|
translatedAddress?: Input<string>;
|
|
@@ -51,13 +51,16 @@ interface FirewallPolicyRuleApplicationProtocolArgs {
|
|
|
51
51
|
}
|
|
52
52
|
export interface NetworkRuleArgs {
|
|
53
53
|
description?: Input<string>;
|
|
54
|
+
/**
|
|
55
|
+
* List of destination IP addresses or Service Tags.
|
|
56
|
+
*/
|
|
54
57
|
destinationAddresses?: Input<Input<string>[]>;
|
|
55
58
|
destinationFqdns?: Input<Input<string>[]>;
|
|
56
59
|
destinationIpGroups?: Input<Input<string>[]>;
|
|
57
60
|
destinationPorts?: Input<Input<string>[]>;
|
|
58
61
|
ipProtocols?: Input<Input<string | enums.network.FirewallPolicyRuleNetworkProtocol>[]>;
|
|
59
62
|
name?: Input<string>;
|
|
60
|
-
ruleType: Input<
|
|
63
|
+
ruleType: Input<'NetworkRule'>;
|
|
61
64
|
sourceAddresses?: Input<Input<string>[]>;
|
|
62
65
|
sourceIpGroups?: Input<Input<string>[]>;
|
|
63
66
|
}
|
|
@@ -67,7 +70,7 @@ export interface ApplicationRuleArgs {
|
|
|
67
70
|
httpHeadersToInsert?: Input<Input<inputs.network.FirewallPolicyHttpHeaderToInsertArgs>[]>;
|
|
68
71
|
name?: Input<string>;
|
|
69
72
|
protocols?: Input<Input<FirewallPolicyRuleApplicationProtocolArgs>[]>;
|
|
70
|
-
ruleType: Input<
|
|
73
|
+
ruleType: Input<'ApplicationRule'>;
|
|
71
74
|
sourceAddresses?: Input<Input<string>[]>;
|
|
72
75
|
sourceIpGroups?: Input<Input<string>[]>;
|
|
73
76
|
targetFqdns?: Input<Input<string>[]>;
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@drunk-pulumi/azure",
|
|
3
|
-
"version": "1.0.
|
|
3
|
+
"version": "1.0.5",
|
|
4
4
|
"author": "drunkcoding@outlook.com",
|
|
5
5
|
"description": "The custom helpers pulumi-azure",
|
|
6
6
|
"license": "MIT",
|
|
@@ -17,16 +17,16 @@
|
|
|
17
17
|
"url": "https://github.com/baoduy/drunk-pulumi-azure.git"
|
|
18
18
|
},
|
|
19
19
|
"dependencies": {
|
|
20
|
-
"@drunk-pulumi/azure-providers": "^0.0.
|
|
21
|
-
"@pulumi/azure-native": "^2.
|
|
22
|
-
"@pulumi/azuread": "5.53.
|
|
23
|
-
"@pulumi/pulumi": "^3.
|
|
20
|
+
"@drunk-pulumi/azure-providers": "^0.0.30",
|
|
21
|
+
"@pulumi/azure-native": "^2.50.1",
|
|
22
|
+
"@pulumi/azuread": "5.53.2",
|
|
23
|
+
"@pulumi/pulumi": "^3.125.0",
|
|
24
24
|
"@pulumi/random": "^4.16.3",
|
|
25
25
|
"@pulumi/tls": "^5.0.4",
|
|
26
26
|
"axios": "^1.7.2",
|
|
27
27
|
"netmask": "^2.0.2",
|
|
28
28
|
"node-forge": "^1.3.1",
|
|
29
|
-
"to-words": "^4.0
|
|
29
|
+
"to-words": "^4.1.0",
|
|
30
30
|
"xml-formatter": "^3.6.3"
|
|
31
31
|
},
|
|
32
32
|
"prettier": {
|