pulumi-django-azure 1.0.9__tar.gz

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of pulumi-django-azure might be problematic. Click here for more details.

@@ -0,0 +1,21 @@
1
+ MIT License
2
+
3
+ Copyright (c) 2023 YouReal BV
4
+
5
+ Permission is hereby granted, free of charge, to any person obtaining a copy
6
+ of this software and associated documentation files (the "Software"), to deal
7
+ in the Software without restriction, including without limitation the rights
8
+ to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9
+ copies of the Software, and to permit persons to whom the Software is
10
+ furnished to do so, subject to the following conditions:
11
+
12
+ The above copyright notice and this permission notice shall be included in all
13
+ copies or substantial portions of the Software.
14
+
15
+ THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16
+ IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17
+ FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18
+ AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19
+ LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20
+ OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
21
+ SOFTWARE.
@@ -0,0 +1,249 @@
1
+ Metadata-Version: 2.1
2
+ Name: pulumi-django-azure
3
+ Version: 1.0.9
4
+ Summary: Simply deployment of Django on Azure with Pulumi
5
+ Author-email: Maarten Ureel <maarten@youreal.eu>
6
+ License: MIT License
7
+
8
+ Copyright (c) 2023 YouReal BV
9
+
10
+ Permission is hereby granted, free of charge, to any person obtaining a copy
11
+ of this software and associated documentation files (the "Software"), to deal
12
+ in the Software without restriction, including without limitation the rights
13
+ to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
14
+ copies of the Software, and to permit persons to whom the Software is
15
+ furnished to do so, subject to the following conditions:
16
+
17
+ The above copyright notice and this permission notice shall be included in all
18
+ copies or substantial portions of the Software.
19
+
20
+ THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
21
+ IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
22
+ FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
23
+ AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
24
+ LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
25
+ OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
26
+ SOFTWARE.
27
+
28
+ Project-URL: Homepage, https://gitlab.com/MaartenUreel/pulumi-django-azure
29
+ Keywords: django,pulumi,azure
30
+ Classifier: License :: OSI Approved :: MIT License
31
+ Classifier: Programming Language :: Python
32
+ Classifier: Programming Language :: Python :: 3
33
+ Requires-Python: >=3.9
34
+ Description-Content-Type: text/markdown
35
+ License-File: LICENSE
36
+ Requires-Dist: pulumi>=3.99.0
37
+ Requires-Dist: pulumi-azure-native>=2.24.0
38
+ Requires-Dist: pulumi-random>=4.14.0
39
+
40
+ # Pulumi Django Deployment
41
+
42
+ This project aims to make a simple Django deployment on Azure easier.
43
+
44
+ To have a proper and secure environment, we need these components:
45
+ * Storage account for media and static files
46
+ * CDN endpoint in front with a domain name of our choosing
47
+ * PostgreSQL server
48
+ * Azure Communication Services to send e-mails
49
+ * Webapp with multiple custom host names and managed SSL for the website itself
50
+ * Azure Key Vault per application
51
+ * Webapp running pgAdmin
52
+
53
+ ## Installation
54
+ This package is published on PyPi, so you can just add pulumi-django-azure to your requirements file.
55
+
56
+ To use a specific branch in your project, add to pyproject.toml dependencies:
57
+ ```
58
+ pulumi-django-azure = { git = "git@gitlab.com:MaartenUreel/pulumi-django-azure.git", branch = "dev" }
59
+ ```
60
+
61
+ A simple project could look like this:
62
+ ```python
63
+ import pulumi
64
+ import pulumi_azure_native as azure
65
+ from pulumi_django_azure import DjangoDeployment
66
+
67
+ stack = pulumi.get_stack()
68
+ config = pulumi.Config()
69
+
70
+
71
+ # Create resource group
72
+ rg = azure.resources.ResourceGroup(f"rg-{stack}")
73
+
74
+ # Create VNet
75
+ vnet = azure.network.VirtualNetwork(
76
+ f"vnet-{stack}",
77
+ resource_group_name=rg.name,
78
+ address_space=azure.network.AddressSpaceArgs(
79
+ address_prefixes=["10.0.0.0/16"],
80
+ ),
81
+ )
82
+
83
+ # Deploy the website and all its components
84
+ django = DjangoDeployment(
85
+ stack,
86
+ tenant_id="abc123...",
87
+ resource_group_name=rg.name,
88
+ vnet=vnet,
89
+ pgsql_ip_prefix="10.0.10.0/24",
90
+ appservice_ip_prefix="10.0.20.0/24",
91
+ app_service_sku=azure.web.SkuDescriptionArgs(
92
+ name="B2",
93
+ tier="Basic",
94
+ ),
95
+ storage_account_name="mystorageaccount",
96
+ cdn_host="cdn.example.com",
97
+ )
98
+
99
+ django.add_django_website(
100
+ name="web",
101
+ db_name="mywebsite",
102
+ repository_url="git@gitlab.com:project/website.git",
103
+ repository_branch="main",
104
+ website_hosts=["example.com", "www.example.com"],
105
+ django_settings_module="mywebsite.settings.production",
106
+ comms_data_location="europe",
107
+ comms_domains=["mydomain.com"],
108
+ )
109
+
110
+ django.add_database_administrator(
111
+ object_id="a1b2c3....",
112
+ user_name="user@example.com",
113
+ tenant_id="a1b2c3....",
114
+ )
115
+ ```
116
+
117
+ ## Deployment steps
118
+
119
+ 1. Deploy without custom hosts (for CDN and websites)
120
+ 2. Configure the PostgreSQL server (create and grant permissions to role for your websites)
121
+ 3. Retrieve the deployment SSH key and configure your remote GIT repository with it
122
+ 4. Configure your CDN host (add the CNAME record)
123
+ 5. Configure your custom website domains (add CNAME/A record and TXT validation records)
124
+ 6. Re-deploy with custom hosts
125
+ 7. Re-deploy once more to enable HTTPS on website domains
126
+ 8. Manually activate HTTPS on the CDN host
127
+ 9. Go to the e-mail communications service on Azure and configure DKIM, SPF,... for your custom domains.
128
+
129
+ ## Custom domain name for CDN
130
+ When deploying the first time, you will get a `cdn_cname` output. You need to create a CNAME to this domain before the deployment of the custom domain will succeed.
131
+
132
+ You can safely deploy with the failing CustomDomain to get the CNAME, create the record and then deploy again.
133
+
134
+ To enable HTTPS, you need to do this manually in the console. This is because of a limitation in the Azure API:
135
+ https://github.com/Azure/azure-rest-api-specs/issues/17498
136
+
137
+ ## Custom domain names for web application
138
+ Because of a circular dependency in custom domain name bindings and certificates that is out of our control, you need to deploy the stack twice.
139
+
140
+ The first time will create the bindings without a certificate.
141
+ The second deployment will then create the certificate for the domain (which is only possible if the binding exists), but also set the fingerprint of that certificate on the binding.
142
+
143
+ To make the certificate work, you need to create a TXT record named `asuid` point to the output of `{your_app}_site_domain_verification_id`. For example:
144
+
145
+ ```
146
+ asuid.mywebsite.com. TXT "A1B2C3D4E5..."
147
+ asuid.www.mywebsite.com. TXT "A1B2C3D4E5..."
148
+ ```
149
+
150
+ ## Database authentication
151
+ The PostgreSQL uses Entra ID authentication only, no passwords.
152
+
153
+ ### Administrator login
154
+ If you want to log in to the database yourself, you can add yourself as an administrator with the `add_database_administrator` function.
155
+ Your username is your e-mailaddress, a temporary password can be obtained using `az account get-access-token`.
156
+
157
+ You can use this method to log in to pgAdmin.
158
+
159
+ ### Application
160
+ Refer to this documentation:
161
+ https://learn.microsoft.com/en-us/azure/postgresql/flexible-server/how-to-manage-azure-ad-users#create-a-role-using-microsoft-entra-object-identifier
162
+
163
+ In short, run something like this in the `postgres` database:
164
+ ```
165
+ SELECT * FROM pgaadauth_create_principal_with_oid('web_managed_identity', 'c8b25b85-d060-4cfc-bad4-b8581cfdf946', 'service', false, false);
166
+ ```
167
+ Replace the GUID of course with the managed identity our web app gets.
168
+
169
+ The name of the role is outputted by `{your_app}_site_db_user`
170
+
171
+ Be sure to grant this role the correct permissions too.
172
+
173
+ ## pgAdmin specifics
174
+ pgAdmin will be created with a default login:
175
+ * Login: dbadmin@dbadmin.net
176
+ * Password: dbadmin
177
+
178
+ Best practice is to log in right away, create a user for yourself and delete this default user.
179
+
180
+ ## Azure OAuth2 / Django Social Auth
181
+ If you want to set up login with Azure, which would make sense since you are in the ecosystem, you need to create an App Registration in Entra ID, create a secret and then register these settings in your stack:
182
+ ```
183
+ pulumi config set --secret --path 'mywebsite_social_auth_azure.key' secret_ID
184
+ pulumi config set --secret --path 'mywebsite_social_auth_azure.secret' secret_value
185
+ pulumi config set --secret --path 'mywebsite_social_auth_azure.tenant_id' directory_tenant_id
186
+ pulumi config set --secret --path 'mywebsite_social_auth_azure.client_id' application_id
187
+ ```
188
+
189
+ Then in your Django deployment, pass to the `add_django_website` command:
190
+ ```
191
+ secrets={
192
+ "mywebsite_social_auth_azure": "AZURE_OAUTH",
193
+ },
194
+ ```
195
+
196
+ The value will be automatically stored in the vault where the application has access to.
197
+ The environment variable will be suffixed with `_SECRET_NAME`.
198
+
199
+ Then, in your application, retrieve this data from the vault, e.g.:
200
+ ```python
201
+ from azure.keyvault.secrets import SecretClient
202
+ from azure.identity import DefaultAzureCredential
203
+
204
+ # Azure credentials
205
+ azure_credential = DefaultAzureCredential()
206
+
207
+ # Azure Key Vault
208
+ AZURE_KEY_VAULT = env("AZURE_KEY_VAULT")
209
+ AZURE_KEY_VAULT_URI = f"https://{AZURE_KEY_VAULT}.vault.azure.net"
210
+ azure_key_vault_client = SecretClient(vault_url=AZURE_KEY_VAULT_URI, credential=azure_credential)
211
+
212
+ # Social Auth settings
213
+ oauth_secret = azure_key_vault_client.get_secret(env("AZURE_OAUTH_SECRET_NAME"))
214
+ oauth_secret = json.loads(oauth_secret.value)
215
+ SOCIAL_AUTH_AZUREAD_TENANT_OAUTH2_KEY = oauth_secret["client_id"]
216
+ SOCIAL_AUTH_AZUREAD_TENANT_OAUTH2_SECRET = oauth_secret["secret"]
217
+ SOCIAL_AUTH_AZUREAD_TENANT_OAUTH2_TENANT_ID = oauth_secret["tenant_id"]
218
+ SOCIAL_AUTH_ADMIN_USER_SEARCH_FIELDS = ["username", "first_name", "last_name", "email"]
219
+ SOCIAL_AUTH_POSTGRES_JSONFIELD = True
220
+
221
+ AUTHENTICATION_BACKENDS = (
222
+ "social_core.backends.azuread_tenant.AzureADTenantOAuth2",
223
+ "django.contrib.auth.backends.ModelBackend",
224
+ )
225
+ ```
226
+
227
+ And of course add the login button somewhere, following Django Social Auth instructions.
228
+
229
+ ## Automate deployments
230
+ When using a service like GitLab, you can configure a Webhook to fire upon a push to your branch.
231
+
232
+ You need to download the deployment profile to obtain the deployment username and password, and then you can construct a URL like this:
233
+
234
+ ```
235
+ https://{user}:{pass}@{appname}.scm.azurewebsites.net/deploy
236
+
237
+ ```
238
+
239
+ ```
240
+ https://{appname}.scm.azurewebsites.net/api/sshkey?ensurePublicKey=1
241
+ ```
242
+
243
+ Be sure to configure the SSH key that Azure will use on GitLab side. You can obtain it using:
244
+
245
+ This would then trigger a redeploy everytime you make a commit to your live branch.
246
+
247
+ ## Change requests
248
+ I created this for internal use but since it took me a while to puzzle all the things together I decided to share it.
249
+ Therefore this project is not super generic, but tailored to my needs. I am however open to pull or change requests to improve this project or to make it more usable for others.
@@ -0,0 +1,210 @@
1
+ # Pulumi Django Deployment
2
+
3
+ This project aims to make a simple Django deployment on Azure easier.
4
+
5
+ To have a proper and secure environment, we need these components:
6
+ * Storage account for media and static files
7
+ * CDN endpoint in front with a domain name of our choosing
8
+ * PostgreSQL server
9
+ * Azure Communication Services to send e-mails
10
+ * Webapp with multiple custom host names and managed SSL for the website itself
11
+ * Azure Key Vault per application
12
+ * Webapp running pgAdmin
13
+
14
+ ## Installation
15
+ This package is published on PyPi, so you can just add pulumi-django-azure to your requirements file.
16
+
17
+ To use a specific branch in your project, add to pyproject.toml dependencies:
18
+ ```
19
+ pulumi-django-azure = { git = "git@gitlab.com:MaartenUreel/pulumi-django-azure.git", branch = "dev" }
20
+ ```
21
+
22
+ A simple project could look like this:
23
+ ```python
24
+ import pulumi
25
+ import pulumi_azure_native as azure
26
+ from pulumi_django_azure import DjangoDeployment
27
+
28
+ stack = pulumi.get_stack()
29
+ config = pulumi.Config()
30
+
31
+
32
+ # Create resource group
33
+ rg = azure.resources.ResourceGroup(f"rg-{stack}")
34
+
35
+ # Create VNet
36
+ vnet = azure.network.VirtualNetwork(
37
+ f"vnet-{stack}",
38
+ resource_group_name=rg.name,
39
+ address_space=azure.network.AddressSpaceArgs(
40
+ address_prefixes=["10.0.0.0/16"],
41
+ ),
42
+ )
43
+
44
+ # Deploy the website and all its components
45
+ django = DjangoDeployment(
46
+ stack,
47
+ tenant_id="abc123...",
48
+ resource_group_name=rg.name,
49
+ vnet=vnet,
50
+ pgsql_ip_prefix="10.0.10.0/24",
51
+ appservice_ip_prefix="10.0.20.0/24",
52
+ app_service_sku=azure.web.SkuDescriptionArgs(
53
+ name="B2",
54
+ tier="Basic",
55
+ ),
56
+ storage_account_name="mystorageaccount",
57
+ cdn_host="cdn.example.com",
58
+ )
59
+
60
+ django.add_django_website(
61
+ name="web",
62
+ db_name="mywebsite",
63
+ repository_url="git@gitlab.com:project/website.git",
64
+ repository_branch="main",
65
+ website_hosts=["example.com", "www.example.com"],
66
+ django_settings_module="mywebsite.settings.production",
67
+ comms_data_location="europe",
68
+ comms_domains=["mydomain.com"],
69
+ )
70
+
71
+ django.add_database_administrator(
72
+ object_id="a1b2c3....",
73
+ user_name="user@example.com",
74
+ tenant_id="a1b2c3....",
75
+ )
76
+ ```
77
+
78
+ ## Deployment steps
79
+
80
+ 1. Deploy without custom hosts (for CDN and websites)
81
+ 2. Configure the PostgreSQL server (create and grant permissions to role for your websites)
82
+ 3. Retrieve the deployment SSH key and configure your remote GIT repository with it
83
+ 4. Configure your CDN host (add the CNAME record)
84
+ 5. Configure your custom website domains (add CNAME/A record and TXT validation records)
85
+ 6. Re-deploy with custom hosts
86
+ 7. Re-deploy once more to enable HTTPS on website domains
87
+ 8. Manually activate HTTPS on the CDN host
88
+ 9. Go to the e-mail communications service on Azure and configure DKIM, SPF,... for your custom domains.
89
+
90
+ ## Custom domain name for CDN
91
+ When deploying the first time, you will get a `cdn_cname` output. You need to create a CNAME to this domain before the deployment of the custom domain will succeed.
92
+
93
+ You can safely deploy with the failing CustomDomain to get the CNAME, create the record and then deploy again.
94
+
95
+ To enable HTTPS, you need to do this manually in the console. This is because of a limitation in the Azure API:
96
+ https://github.com/Azure/azure-rest-api-specs/issues/17498
97
+
98
+ ## Custom domain names for web application
99
+ Because of a circular dependency in custom domain name bindings and certificates that is out of our control, you need to deploy the stack twice.
100
+
101
+ The first time will create the bindings without a certificate.
102
+ The second deployment will then create the certificate for the domain (which is only possible if the binding exists), but also set the fingerprint of that certificate on the binding.
103
+
104
+ To make the certificate work, you need to create a TXT record named `asuid` point to the output of `{your_app}_site_domain_verification_id`. For example:
105
+
106
+ ```
107
+ asuid.mywebsite.com. TXT "A1B2C3D4E5..."
108
+ asuid.www.mywebsite.com. TXT "A1B2C3D4E5..."
109
+ ```
110
+
111
+ ## Database authentication
112
+ The PostgreSQL uses Entra ID authentication only, no passwords.
113
+
114
+ ### Administrator login
115
+ If you want to log in to the database yourself, you can add yourself as an administrator with the `add_database_administrator` function.
116
+ Your username is your e-mailaddress, a temporary password can be obtained using `az account get-access-token`.
117
+
118
+ You can use this method to log in to pgAdmin.
119
+
120
+ ### Application
121
+ Refer to this documentation:
122
+ https://learn.microsoft.com/en-us/azure/postgresql/flexible-server/how-to-manage-azure-ad-users#create-a-role-using-microsoft-entra-object-identifier
123
+
124
+ In short, run something like this in the `postgres` database:
125
+ ```
126
+ SELECT * FROM pgaadauth_create_principal_with_oid('web_managed_identity', 'c8b25b85-d060-4cfc-bad4-b8581cfdf946', 'service', false, false);
127
+ ```
128
+ Replace the GUID of course with the managed identity our web app gets.
129
+
130
+ The name of the role is outputted by `{your_app}_site_db_user`
131
+
132
+ Be sure to grant this role the correct permissions too.
133
+
134
+ ## pgAdmin specifics
135
+ pgAdmin will be created with a default login:
136
+ * Login: dbadmin@dbadmin.net
137
+ * Password: dbadmin
138
+
139
+ Best practice is to log in right away, create a user for yourself and delete this default user.
140
+
141
+ ## Azure OAuth2 / Django Social Auth
142
+ If you want to set up login with Azure, which would make sense since you are in the ecosystem, you need to create an App Registration in Entra ID, create a secret and then register these settings in your stack:
143
+ ```
144
+ pulumi config set --secret --path 'mywebsite_social_auth_azure.key' secret_ID
145
+ pulumi config set --secret --path 'mywebsite_social_auth_azure.secret' secret_value
146
+ pulumi config set --secret --path 'mywebsite_social_auth_azure.tenant_id' directory_tenant_id
147
+ pulumi config set --secret --path 'mywebsite_social_auth_azure.client_id' application_id
148
+ ```
149
+
150
+ Then in your Django deployment, pass to the `add_django_website` command:
151
+ ```
152
+ secrets={
153
+ "mywebsite_social_auth_azure": "AZURE_OAUTH",
154
+ },
155
+ ```
156
+
157
+ The value will be automatically stored in the vault where the application has access to.
158
+ The environment variable will be suffixed with `_SECRET_NAME`.
159
+
160
+ Then, in your application, retrieve this data from the vault, e.g.:
161
+ ```python
162
+ from azure.keyvault.secrets import SecretClient
163
+ from azure.identity import DefaultAzureCredential
164
+
165
+ # Azure credentials
166
+ azure_credential = DefaultAzureCredential()
167
+
168
+ # Azure Key Vault
169
+ AZURE_KEY_VAULT = env("AZURE_KEY_VAULT")
170
+ AZURE_KEY_VAULT_URI = f"https://{AZURE_KEY_VAULT}.vault.azure.net"
171
+ azure_key_vault_client = SecretClient(vault_url=AZURE_KEY_VAULT_URI, credential=azure_credential)
172
+
173
+ # Social Auth settings
174
+ oauth_secret = azure_key_vault_client.get_secret(env("AZURE_OAUTH_SECRET_NAME"))
175
+ oauth_secret = json.loads(oauth_secret.value)
176
+ SOCIAL_AUTH_AZUREAD_TENANT_OAUTH2_KEY = oauth_secret["client_id"]
177
+ SOCIAL_AUTH_AZUREAD_TENANT_OAUTH2_SECRET = oauth_secret["secret"]
178
+ SOCIAL_AUTH_AZUREAD_TENANT_OAUTH2_TENANT_ID = oauth_secret["tenant_id"]
179
+ SOCIAL_AUTH_ADMIN_USER_SEARCH_FIELDS = ["username", "first_name", "last_name", "email"]
180
+ SOCIAL_AUTH_POSTGRES_JSONFIELD = True
181
+
182
+ AUTHENTICATION_BACKENDS = (
183
+ "social_core.backends.azuread_tenant.AzureADTenantOAuth2",
184
+ "django.contrib.auth.backends.ModelBackend",
185
+ )
186
+ ```
187
+
188
+ And of course add the login button somewhere, following Django Social Auth instructions.
189
+
190
+ ## Automate deployments
191
+ When using a service like GitLab, you can configure a Webhook to fire upon a push to your branch.
192
+
193
+ You need to download the deployment profile to obtain the deployment username and password, and then you can construct a URL like this:
194
+
195
+ ```
196
+ https://{user}:{pass}@{appname}.scm.azurewebsites.net/deploy
197
+
198
+ ```
199
+
200
+ ```
201
+ https://{appname}.scm.azurewebsites.net/api/sshkey?ensurePublicKey=1
202
+ ```
203
+
204
+ Be sure to configure the SSH key that Azure will use on GitLab side. You can obtain it using:
205
+
206
+ This would then trigger a redeploy everytime you make a commit to your live branch.
207
+
208
+ ## Change requests
209
+ I created this for internal use but since it took me a while to puzzle all the things together I decided to share it.
210
+ Therefore this project is not super generic, but tailored to my needs. I am however open to pull or change requests to improve this project or to make it more usable for others.
@@ -0,0 +1,45 @@
1
+ [build-system]
2
+ requires = ["setuptools>=61.0.0", "wheel"]
3
+ build-backend = "setuptools.build_meta"
4
+
5
+ [project]
6
+ name = "pulumi-django-azure"
7
+ version = "1.0.9"
8
+ description = "Simply deployment of Django on Azure with Pulumi"
9
+ readme = "README.md"
10
+ authors = [{ name = "Maarten Ureel", email = "maarten@youreal.eu" }]
11
+ license = { file = "LICENSE" }
12
+ classifiers = [
13
+ "License :: OSI Approved :: MIT License",
14
+ "Programming Language :: Python",
15
+ "Programming Language :: Python :: 3",
16
+ ]
17
+ keywords = ["django", "pulumi", "azure"]
18
+ dependencies = [
19
+ "pulumi >= 3.99.0",
20
+ "pulumi-azure-native >= 2.24.0",
21
+ "pulumi-random >= 4.14.0",
22
+ ]
23
+ requires-python = ">=3.9"
24
+
25
+ [project.urls]
26
+ Homepage = "https://gitlab.com/MaartenUreel/pulumi-django-azure"
27
+
28
+ [tool.poetry]
29
+ name = "pulumi-django-azure"
30
+ version = "1.0.9"
31
+ description = "Simply deployment of Django on Azure with Pulumi"
32
+ authors = ["Maarten Ureel <maarten@youreal.eu>"]
33
+
34
+ [tool.poetry.dependencies]
35
+ python = "^3.11"
36
+ pulumi-azure-native = "^2.24.0"
37
+ pulumi = "^3.99.0"
38
+ pulumi-random = "^4.15.0"
39
+
40
+ [tool.poetry.group.dev.dependencies]
41
+ twine = "^4.0.2"
42
+ build = "^1.0.3"
43
+
44
+ [tool.isort]
45
+ profile = "black"
@@ -0,0 +1,8 @@
1
+ [flake8]
2
+ max-line-length = 140
3
+ exclude = .git
4
+
5
+ [egg_info]
6
+ tag_build =
7
+ tag_date = 0
8
+
@@ -0,0 +1 @@
1
+ from .django_deployment import DjangoDeployment # noqa: F401