@drunk-pulumi/azure 1.0.3 → 1.0.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (72) hide show
  1. package/Aks/Helper.js +4 -3
  2. package/Aks/Identity.js +3 -3
  3. package/Aks/index.d.ts +8 -7
  4. package/Aks/index.js +73 -57
  5. package/Automation/index.d.ts +1 -1
  6. package/Automation/index.js +5 -5
  7. package/AzAd/EnvRoles.Consts.d.ts +13 -8
  8. package/AzAd/EnvRoles.Consts.js +51 -51
  9. package/AzAd/EnvRoles.d.ts +3 -3
  10. package/AzAd/EnvRoles.js +10 -10
  11. package/AzAd/Group.d.ts +2 -2
  12. package/AzAd/Group.js +12 -12
  13. package/AzAd/Identities/AzDevOpsIdentity.d.ts +1 -1
  14. package/AzAd/Identities/AzDevOpsIdentity.js +9 -6
  15. package/AzAd/Identities/AzDevOpsManagedIdentity.d.ts +2 -2
  16. package/AzAd/Identities/AzDevOpsManagedIdentity.js +6 -3
  17. package/AzAd/RoleAssignment.d.ts +3 -3
  18. package/AzAd/RoleAssignment.js +3 -3
  19. package/AzAd/RoleDefinitions/JustInTimeRequestRole.js +10 -10
  20. package/Builder/AksBuilder.js +15 -1
  21. package/Builder/PrivateDnsZoneBuilder.d.ts +2 -1
  22. package/Builder/PrivateDnsZoneBuilder.js +41 -23
  23. package/Builder/ResourceBuilder.js +12 -6
  24. package/Builder/SqlBuilder.js +7 -1
  25. package/Builder/StorageBuilder.js +14 -14
  26. package/Builder/VaultBuilder.d.ts +2 -1
  27. package/Builder/VaultBuilder.js +8 -1
  28. package/Builder/types/resourceBuilder.d.ts +2 -0
  29. package/Builder/types/sqlBuilder.d.ts +2 -1
  30. package/Builder/types/storageBuilder.d.ts +10 -8
  31. package/Builder/types/vaultBuilder.d.ts +6 -1
  32. package/Cdn/CdnEndpoint.d.ts +2 -3
  33. package/Cdn/CdnEndpoint.js +15 -17
  34. package/Cdn/CdnRules.d.ts +6 -2
  35. package/Cdn/CdnRules.js +51 -56
  36. package/Certificate/index.d.ts +2 -2
  37. package/Certificate/index.js +29 -29
  38. package/Common/AzureEnv.d.ts +2 -3
  39. package/Common/AzureEnv.js +21 -8
  40. package/Common/Naming/index.d.ts +1 -1
  41. package/Common/Naming/index.js +65 -61
  42. package/Common/index.d.ts +11 -6
  43. package/Common/index.js +6 -1
  44. package/ContainerRegistry/index.d.ts +5 -5
  45. package/ContainerRegistry/index.js +75 -50
  46. package/Core/KeyGenerators.d.ts +5 -5
  47. package/Core/KeyGenerators.js +5 -5
  48. package/CustomRoles/index.js +3 -3
  49. package/KeyVault/CustomHelper.d.ts +4 -4
  50. package/KeyVault/CustomHelper.js +7 -7
  51. package/KeyVault/Helper.js +12 -9
  52. package/Logs/Helpers.d.ts +1 -1
  53. package/RedisCache/index.d.ts +2 -2
  54. package/RedisCache/index.js +10 -5
  55. package/SignalR/index.d.ts +4 -4
  56. package/SignalR/index.js +26 -21
  57. package/Sql/SqlDb.js +2 -3
  58. package/Sql/index.d.ts +3 -4
  59. package/Sql/index.js +11 -11
  60. package/Storage/Helper.d.ts +1 -1
  61. package/Storage/index.d.ts +2 -3
  62. package/Storage/index.js +2 -2
  63. package/VNet/FirewallPolicies/AksFirewallPolicy.d.ts +4 -3
  64. package/VNet/FirewallPolicies/AksFirewallPolicy.js +116 -123
  65. package/VNet/FirewallPolicies/CloudPCFirewallPolicy.d.ts +4 -3
  66. package/VNet/FirewallPolicies/CloudPCFirewallPolicy.js +150 -132
  67. package/VNet/Helper.d.ts +1 -0
  68. package/VNet/Helper.js +25 -19
  69. package/VNet/index.d.ts +9 -9
  70. package/VNet/index.js +58 -49
  71. package/VNet/types.d.ts +9 -6
  72. package/package.json +6 -6
package/VNet/index.js CHANGED
@@ -27,7 +27,6 @@ var __importDefault = (this && this.__importDefault) || function (mod) {
27
27
  };
28
28
  Object.defineProperty(exports, "__esModule", { value: true });
29
29
  const network = __importStar(require("@pulumi/azure-native/network"));
30
- const azure_providers_1 = require("@drunk-pulumi/azure-providers");
31
30
  const Firewall_1 = __importDefault(require("./Firewall"));
32
31
  const NetworkPeering_1 = __importDefault(require("./NetworkPeering"));
33
32
  const Vnet_1 = __importDefault(require("./Vnet"));
@@ -46,14 +45,14 @@ exports.default = ({ group, name, ddosId, addressSpace, publicIpAddress, subnets
46
45
  } //Allow Internet to public IpAddress security group
47
46
  else if (features.securityGroup?.allowInboundInternetAccess)
48
47
  securities.push({
49
- name: "allow-inbound-internet-publicIpAddress",
50
- sourceAddressPrefix: "*",
51
- sourcePortRange: "*",
48
+ name: 'allow-inbound-internet-publicIpAddress',
49
+ sourceAddressPrefix: '*',
50
+ sourcePortRange: '*',
52
51
  destinationAddressPrefix: publicIpAddress.ipAddress.apply((i) => `${i}/32`),
53
- destinationPortRanges: ["443", "80"],
54
- protocol: "TCP",
55
- access: "Allow",
56
- direction: "Inbound",
52
+ destinationPortRanges: ['443', '80'],
53
+ protocol: 'TCP',
54
+ access: 'Allow',
55
+ direction: 'Inbound',
57
56
  priority: 200 + securities.length + 1,
58
57
  });
59
58
  }
@@ -65,32 +64,32 @@ exports.default = ({ group, name, ddosId, addressSpace, publicIpAddress, subnets
65
64
  //Update route to firewall IpAddress
66
65
  routes.push({
67
66
  name: `vnet-to-firewall`,
68
- addressPrefix: "0.0.0.0/0",
67
+ addressPrefix: '0.0.0.0/0',
69
68
  nextHopType: network.RouteNextHopType.VirtualAppliance,
70
69
  nextHopIpAddress: pp.firewallPrivateIpAddress,
71
70
  });
72
71
  //Allow Vnet to Firewall
73
72
  securities.push({
74
73
  name: `allow-vnet-to-firewall`,
75
- sourceAddressPrefix: "*",
76
- sourcePortRange: "*",
74
+ sourceAddressPrefix: '*',
75
+ sourcePortRange: '*',
77
76
  destinationAddressPrefix: pp.firewallPrivateIpAddress,
78
- destinationPortRange: "*",
79
- protocol: "*",
80
- access: "Allow",
81
- direction: "Outbound",
77
+ destinationPortRange: '*',
78
+ protocol: '*',
79
+ access: 'Allow',
80
+ direction: 'Outbound',
82
81
  priority: 100,
83
82
  });
84
83
  }
85
84
  securities.push({
86
85
  name: `allow-vnet-to-vnet-${index}`,
87
- sourceAddressPrefix: "VirtualNetwork",
88
- sourcePortRange: "*",
89
- destinationAddressPrefix: "VirtualNetwork",
90
- destinationPortRange: "*",
91
- protocol: "*",
92
- access: "Allow",
93
- direction: "Outbound",
86
+ sourceAddressPrefix: 'VirtualNetwork',
87
+ sourcePortRange: '*',
88
+ destinationAddressPrefix: 'VirtualNetwork',
89
+ destinationPortRange: '*',
90
+ protocol: '*',
91
+ access: 'Allow',
92
+ direction: 'Outbound',
94
93
  priority: 101,
95
94
  });
96
95
  });
@@ -113,7 +112,7 @@ exports.default = ({ group, name, ddosId, addressSpace, publicIpAddress, subnets
113
112
  appGatewaySubnet: features.enableAppGateway
114
113
  ? {
115
114
  addressPrefix: features.enableAppGateway.subnetPrefix,
116
- version: "v1",
115
+ version: 'v1',
117
116
  }
118
117
  : undefined,
119
118
  firewall: features.enableFirewall
@@ -169,18 +168,22 @@ exports.default = ({ group, name, ddosId, addressSpace, publicIpAddress, subnets
169
168
  secondVnet: info,
170
169
  });
171
170
  //Update route to firewall IpAddress
172
- if (pp.firewallPrivateIpAddress && vnet.routeTable) {
173
- new azure_providers_1.NetworkRouteResource(`${name}-vnet-to-firewall`, {
174
- routeName: "vnet-to-firewall",
175
- ...group,
176
- routeTableName: vnet.routeTable.name,
177
- addressPrefix: "0.0.0.0/0",
178
- nextHopType: network.RouteNextHopType.VirtualAppliance,
179
- nextHopIpAddress: pp.firewallPrivateIpAddress,
180
- }, {
181
- dependsOn: vnet.routeTable,
182
- });
183
- }
171
+ // if (pp.firewallPrivateIpAddress && vnet.routeTable) {
172
+ // new NetworkRouteResource(
173
+ // `${name}-vnet-to-firewall`,
174
+ // {
175
+ // routeName: "vnet-to-firewall",
176
+ // ...group,
177
+ // routeTableName: vnet.routeTable.name,
178
+ // addressPrefix: "0.0.0.0/0",
179
+ // nextHopType: network.RouteNextHopType.VirtualAppliance,
180
+ // nextHopIpAddress: pp.firewallPrivateIpAddress,
181
+ // },
182
+ // {
183
+ // dependsOn: vnet.routeTable,
184
+ // },
185
+ // );
186
+ // }
184
187
  });
185
188
  }
186
189
  //Return the results
@@ -193,19 +196,25 @@ const createFirewall = ({ name, group, routeTableName, dependsOn = [], ...others
193
196
  ...others,
194
197
  dependsOn,
195
198
  });
196
- if (routeTableName) {
197
- //Route Vnet to Firewall
198
- new azure_providers_1.NetworkRouteResource(`${name}-vnet-to-firewall`, {
199
- routeName: `vnet-to-firewall`,
200
- ...group,
201
- routeTableName: routeTableName,
202
- addressPrefix: "0.0.0.0/0",
203
- nextHopType: network.RouteNextHopType.VirtualAppliance,
204
- nextHopIpAddress: rs.firewall.ipConfigurations.apply((c) => c ? c[0].privateIPAddress : ""),
205
- }, {
206
- dependsOn: [rs.firewall],
207
- });
208
- }
199
+ // if (routeTableName) {
200
+ // //Route Vnet to Firewall
201
+ // new NetworkRouteResource(
202
+ // `${name}-vnet-to-firewall`,
203
+ // {
204
+ // routeName: `vnet-to-firewall`,
205
+ // ...group,
206
+ // routeTableName: routeTableName,
207
+ // addressPrefix: '0.0.0.0/0',
208
+ // nextHopType: network.RouteNextHopType.VirtualAppliance,
209
+ // nextHopIpAddress: rs.firewall.ipConfigurations.apply((c) =>
210
+ // c ? c[0].privateIPAddress : '',
211
+ // ),
212
+ // },
213
+ // {
214
+ // dependsOn: [rs.firewall],
215
+ // },
216
+ // );
217
+ // }
209
218
  return rs;
210
219
  };
211
- //# sourceMappingURL=data:application/json;base64,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
220
+ //# sourceMappingURL=data:application/json;base64,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
package/VNet/types.d.ts CHANGED
@@ -1,6 +1,6 @@
1
- import { enums, input as inputs } from "@pulumi/azure-native/types";
2
- import { Input, Output } from "@pulumi/pulumi";
3
- import * as pulumi from "@pulumi/pulumi";
1
+ import { enums, input as inputs } from '@pulumi/azure-native/types';
2
+ import { Input, Output } from '@pulumi/pulumi';
3
+ import * as pulumi from '@pulumi/pulumi';
4
4
  export type VnetInfoType = {
5
5
  vnetName: Input<string>;
6
6
  resourceGroupName: Input<string>;
@@ -38,7 +38,7 @@ export interface NatRuleArgs {
38
38
  destinationPorts?: Input<Input<string>[]>;
39
39
  ipProtocols?: Input<Input<string | enums.network.FirewallPolicyRuleNetworkProtocol>[]>;
40
40
  name?: Input<string>;
41
- ruleType: Input<"NatRule">;
41
+ ruleType: Input<'NatRule'>;
42
42
  sourceAddresses?: Input<Input<string>[]>;
43
43
  sourceIpGroups?: Input<Input<string>[]>;
44
44
  translatedAddress?: Input<string>;
@@ -51,13 +51,16 @@ interface FirewallPolicyRuleApplicationProtocolArgs {
51
51
  }
52
52
  export interface NetworkRuleArgs {
53
53
  description?: Input<string>;
54
+ /**
55
+ * List of destination IP addresses or Service Tags.
56
+ */
54
57
  destinationAddresses?: Input<Input<string>[]>;
55
58
  destinationFqdns?: Input<Input<string>[]>;
56
59
  destinationIpGroups?: Input<Input<string>[]>;
57
60
  destinationPorts?: Input<Input<string>[]>;
58
61
  ipProtocols?: Input<Input<string | enums.network.FirewallPolicyRuleNetworkProtocol>[]>;
59
62
  name?: Input<string>;
60
- ruleType: Input<"NetworkRule">;
63
+ ruleType: Input<'NetworkRule'>;
61
64
  sourceAddresses?: Input<Input<string>[]>;
62
65
  sourceIpGroups?: Input<Input<string>[]>;
63
66
  }
@@ -67,7 +70,7 @@ export interface ApplicationRuleArgs {
67
70
  httpHeadersToInsert?: Input<Input<inputs.network.FirewallPolicyHttpHeaderToInsertArgs>[]>;
68
71
  name?: Input<string>;
69
72
  protocols?: Input<Input<FirewallPolicyRuleApplicationProtocolArgs>[]>;
70
- ruleType: Input<"ApplicationRule">;
73
+ ruleType: Input<'ApplicationRule'>;
71
74
  sourceAddresses?: Input<Input<string>[]>;
72
75
  sourceIpGroups?: Input<Input<string>[]>;
73
76
  targetFqdns?: Input<Input<string>[]>;
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@drunk-pulumi/azure",
3
- "version": "1.0.3",
3
+ "version": "1.0.5",
4
4
  "author": "drunkcoding@outlook.com",
5
5
  "description": "The custom helpers pulumi-azure",
6
6
  "license": "MIT",
@@ -17,16 +17,16 @@
17
17
  "url": "https://github.com/baoduy/drunk-pulumi-azure.git"
18
18
  },
19
19
  "dependencies": {
20
- "@drunk-pulumi/azure-providers": "^0.0.24",
21
- "@pulumi/azure-native": "^2.49.1",
22
- "@pulumi/azuread": "5.53.1",
23
- "@pulumi/pulumi": "^3.123.0",
20
+ "@drunk-pulumi/azure-providers": "^0.0.30",
21
+ "@pulumi/azure-native": "^2.50.1",
22
+ "@pulumi/azuread": "5.53.2",
23
+ "@pulumi/pulumi": "^3.125.0",
24
24
  "@pulumi/random": "^4.16.3",
25
25
  "@pulumi/tls": "^5.0.4",
26
26
  "axios": "^1.7.2",
27
27
  "netmask": "^2.0.2",
28
28
  "node-forge": "^1.3.1",
29
- "to-words": "^4.0.1",
29
+ "to-words": "^4.1.0",
30
30
  "xml-formatter": "^3.6.3"
31
31
  },
32
32
  "prettier": {