@microsoft/terraform-cdk-constructs 1.2.0 → 1.3.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +54846 -26661
- package/API.md +72091 -23784
- package/lib/azure-actiongroup/index.d.ts +0 -10
- package/lib/azure-actiongroup/index.js +1 -11
- package/lib/azure-actiongroup/lib/action-group.d.ts +0 -10
- package/lib/azure-actiongroup/lib/action-group.js +6 -32
- package/lib/azure-actiongroup/lib/index.d.ts +1 -4
- package/lib/azure-actiongroup/lib/index.js +2 -5
- package/lib/azure-activitylogalert/index.d.ts +0 -10
- package/lib/azure-activitylogalert/index.js +1 -11
- package/lib/azure-activitylogalert/lib/activity-log-alert.d.ts +0 -10
- package/lib/azure-activitylogalert/lib/activity-log-alert.js +6 -32
- package/lib/azure-activitylogalert/lib/index.d.ts +1 -4
- package/lib/azure-activitylogalert/lib/index.js +2 -5
- package/lib/azure-aks/index.d.ts +0 -8
- package/lib/azure-aks/index.js +1 -11
- package/lib/azure-aks/lib/aks-cluster.d.ts +4 -13
- package/lib/azure-aks/lib/aks-cluster.js +13 -36
- package/lib/azure-aks/lib/index.d.ts +1 -10
- package/lib/azure-aks/lib/index.js +2 -21
- package/lib/azure-diagnosticsettings/index.d.ts +0 -6
- package/lib/azure-diagnosticsettings/index.js +1 -7
- package/lib/azure-diagnosticsettings/lib/diagnostic-settings.d.ts +0 -10
- package/lib/azure-diagnosticsettings/lib/diagnostic-settings.js +6 -32
- package/lib/azure-diagnosticsettings/lib/index.d.ts +1 -7
- package/lib/azure-diagnosticsettings/lib/index.js +2 -8
- package/lib/azure-dnsforwardingruleset/index.d.ts +1 -0
- package/lib/azure-dnsforwardingruleset/index.js +18 -0
- package/lib/azure-dnsforwardingruleset/lib/dns-forwarding-ruleset-schemas.d.ts +24 -0
- package/lib/azure-dnsforwardingruleset/lib/dns-forwarding-ruleset-schemas.js +206 -0
- package/lib/azure-dnsforwardingruleset/lib/dns-forwarding-ruleset.d.ts +174 -0
- package/lib/azure-dnsforwardingruleset/lib/dns-forwarding-ruleset.js +214 -0
- package/lib/azure-dnsforwardingruleset/lib/forwarding-rule-schemas.d.ts +24 -0
- package/lib/azure-dnsforwardingruleset/lib/forwarding-rule-schemas.js +242 -0
- package/lib/azure-dnsforwardingruleset/lib/forwarding-rule.d.ts +193 -0
- package/lib/azure-dnsforwardingruleset/lib/forwarding-rule.js +193 -0
- package/lib/azure-dnsforwardingruleset/lib/index.d.ts +6 -0
- package/lib/azure-dnsforwardingruleset/lib/index.js +23 -0
- package/lib/azure-dnsforwardingruleset/lib/virtual-network-link-schemas.d.ts +24 -0
- package/lib/azure-dnsforwardingruleset/lib/virtual-network-link-schemas.js +199 -0
- package/lib/azure-dnsforwardingruleset/lib/virtual-network-link.d.ts +160 -0
- package/lib/azure-dnsforwardingruleset/lib/virtual-network-link.js +178 -0
- package/lib/azure-dnsforwardingruleset/test/dns-forwarding-ruleset.integ.d.ts +9 -0
- package/lib/azure-dnsforwardingruleset/test/dns-forwarding-ruleset.integ.js +133 -0
- package/lib/azure-dnsforwardingruleset/test/dns-forwarding-ruleset.spec.d.ts +9 -0
- package/lib/azure-dnsforwardingruleset/test/dns-forwarding-ruleset.spec.js +350 -0
- package/lib/azure-dnsforwardingruleset/test/forwarding-rule.spec.d.ts +9 -0
- package/lib/azure-dnsforwardingruleset/test/forwarding-rule.spec.js +397 -0
- package/lib/azure-dnsforwardingruleset/test/virtual-network-link.spec.d.ts +9 -0
- package/lib/azure-dnsforwardingruleset/test/virtual-network-link.spec.js +285 -0
- package/lib/azure-dnsresolver/index.d.ts +1 -0
- package/lib/azure-dnsresolver/index.js +18 -0
- package/lib/azure-dnsresolver/lib/dns-resolver-schemas.d.ts +24 -0
- package/lib/azure-dnsresolver/lib/dns-resolver-schemas.js +218 -0
- package/lib/azure-dnsresolver/lib/dns-resolver.d.ts +170 -0
- package/lib/azure-dnsresolver/lib/dns-resolver.js +236 -0
- package/lib/azure-dnsresolver/lib/inbound-endpoint-schemas.d.ts +24 -0
- package/lib/azure-dnsresolver/lib/inbound-endpoint-schemas.js +261 -0
- package/lib/azure-dnsresolver/lib/inbound-endpoint.d.ts +189 -0
- package/lib/azure-dnsresolver/lib/inbound-endpoint.js +243 -0
- package/lib/azure-dnsresolver/lib/index.d.ts +6 -0
- package/lib/azure-dnsresolver/lib/index.js +23 -0
- package/lib/azure-dnsresolver/lib/outbound-endpoint-schemas.d.ts +24 -0
- package/lib/azure-dnsresolver/lib/outbound-endpoint-schemas.js +231 -0
- package/lib/azure-dnsresolver/lib/outbound-endpoint.d.ts +175 -0
- package/lib/azure-dnsresolver/lib/outbound-endpoint.js +234 -0
- package/lib/azure-dnsresolver/test/dns-resolver.integ.d.ts +14 -0
- package/lib/azure-dnsresolver/test/dns-resolver.integ.js +117 -0
- package/lib/azure-dnsresolver/test/dns-resolver.spec.d.ts +9 -0
- package/lib/azure-dnsresolver/test/dns-resolver.spec.js +353 -0
- package/lib/azure-dnsresolver/test/inbound-endpoint.integ.d.ts +9 -0
- package/lib/azure-dnsresolver/test/inbound-endpoint.integ.js +151 -0
- package/lib/azure-dnsresolver/test/inbound-endpoint.spec.d.ts +9 -0
- package/lib/azure-dnsresolver/test/inbound-endpoint.spec.js +441 -0
- package/lib/azure-dnsresolver/test/outbound-endpoint.integ.d.ts +9 -0
- package/lib/azure-dnsresolver/test/outbound-endpoint.integ.js +149 -0
- package/lib/azure-dnsresolver/test/outbound-endpoint.spec.d.ts +9 -0
- package/lib/azure-dnsresolver/test/outbound-endpoint.spec.js +301 -0
- package/lib/azure-dnszone/index.d.ts +1 -0
- package/lib/azure-dnszone/index.js +18 -0
- package/lib/azure-dnszone/lib/dns-zone-schemas.d.ts +24 -0
- package/lib/azure-dnszone/lib/dns-zone-schemas.js +191 -0
- package/lib/azure-dnszone/lib/dns-zone.d.ts +182 -0
- package/lib/azure-dnszone/lib/dns-zone.js +228 -0
- package/lib/azure-dnszone/lib/index.d.ts +2 -0
- package/lib/azure-dnszone/lib/index.js +19 -0
- package/lib/azure-dnszone/test/dns-zone.integ.d.ts +9 -0
- package/lib/azure-dnszone/test/dns-zone.integ.js +85 -0
- package/lib/azure-dnszone/test/dns-zone.spec.d.ts +9 -0
- package/lib/azure-dnszone/test/dns-zone.spec.js +285 -0
- package/lib/azure-metricalert/index.d.ts +0 -10
- package/lib/azure-metricalert/index.js +1 -11
- package/lib/azure-metricalert/lib/index.d.ts +1 -4
- package/lib/azure-metricalert/lib/index.js +2 -5
- package/lib/azure-metricalert/lib/metric-alert.d.ts +0 -10
- package/lib/azure-metricalert/lib/metric-alert.js +6 -32
- package/lib/azure-networkinterface/index.d.ts +0 -3
- package/lib/azure-networkinterface/index.js +1 -4
- package/lib/azure-networkinterface/lib/index.d.ts +1 -5
- package/lib/azure-networkinterface/lib/index.js +2 -5
- package/lib/azure-networkinterface/lib/network-interface.d.ts +4 -9
- package/lib/azure-networkinterface/lib/network-interface.js +14 -29
- package/lib/azure-networkinterface/test/network-interface.integ.js +20 -6
- package/lib/azure-networksecuritygroup/index.d.ts +0 -5
- package/lib/azure-networksecuritygroup/index.js +1 -6
- package/lib/azure-networksecuritygroup/lib/index.d.ts +2 -5
- package/lib/azure-networksecuritygroup/lib/index.js +17 -14
- package/lib/azure-networksecuritygroup/lib/network-security-group.d.ts +4 -13
- package/lib/azure-networksecuritygroup/lib/network-security-group.js +14 -36
- package/lib/azure-policyassignment/index.d.ts +1 -0
- package/lib/azure-policyassignment/index.js +18 -0
- package/lib/azure-policyassignment/lib/index.d.ts +2 -0
- package/lib/azure-policyassignment/lib/index.js +19 -0
- package/lib/azure-policyassignment/lib/policy-assignment-schemas.d.ts +25 -0
- package/lib/azure-policyassignment/lib/policy-assignment-schemas.js +260 -0
- package/lib/azure-policyassignment/lib/policy-assignment.d.ts +342 -0
- package/lib/azure-policyassignment/lib/policy-assignment.js +228 -0
- package/lib/azure-policyassignment/test/policy-assignment.integ.d.ts +13 -0
- package/lib/azure-policyassignment/test/policy-assignment.integ.js +153 -0
- package/lib/azure-policyassignment/test/policy-assignment.spec.d.ts +9 -0
- package/lib/azure-policyassignment/test/policy-assignment.spec.js +651 -0
- package/lib/azure-policydefinition/index.d.ts +1 -0
- package/lib/azure-policydefinition/index.js +18 -0
- package/lib/azure-policydefinition/lib/index.d.ts +2 -0
- package/lib/azure-policydefinition/lib/index.js +19 -0
- package/lib/azure-policydefinition/lib/policy-definition-schemas.d.ts +25 -0
- package/lib/azure-policydefinition/lib/policy-definition-schemas.js +210 -0
- package/lib/azure-policydefinition/lib/policy-definition.d.ts +260 -0
- package/lib/azure-policydefinition/lib/policy-definition.js +199 -0
- package/lib/azure-policydefinition/test/policy-definition.integ.d.ts +9 -0
- package/lib/azure-policydefinition/test/policy-definition.integ.js +137 -0
- package/lib/azure-policydefinition/test/policy-definition.spec.d.ts +9 -0
- package/lib/azure-policydefinition/test/policy-definition.spec.js +596 -0
- package/lib/azure-privatednszone/index.d.ts +1 -0
- package/lib/azure-privatednszone/index.js +18 -0
- package/lib/azure-privatednszone/lib/index.d.ts +2 -0
- package/lib/azure-privatednszone/lib/index.js +19 -0
- package/lib/azure-privatednszone/lib/private-dns-zone-schemas.d.ts +24 -0
- package/lib/azure-privatednszone/lib/private-dns-zone-schemas.js +254 -0
- package/lib/azure-privatednszone/lib/private-dns-zone.d.ts +178 -0
- package/lib/azure-privatednszone/lib/private-dns-zone.js +272 -0
- package/lib/azure-privatednszone/test/private-dns-zone.integ.d.ts +9 -0
- package/lib/azure-privatednszone/test/private-dns-zone.integ.js +84 -0
- package/lib/azure-privatednszone/test/private-dns-zone.spec.d.ts +9 -0
- package/lib/azure-privatednszone/test/private-dns-zone.spec.js +341 -0
- package/lib/azure-privatednszonelink/index.d.ts +1 -0
- package/lib/azure-privatednszonelink/index.js +18 -0
- package/lib/azure-privatednszonelink/lib/index.d.ts +2 -0
- package/lib/azure-privatednszonelink/lib/index.js +19 -0
- package/lib/azure-privatednszonelink/lib/private-dns-zone-link-schemas.d.ts +24 -0
- package/lib/azure-privatednszonelink/lib/private-dns-zone-link-schemas.js +262 -0
- package/lib/azure-privatednszonelink/lib/private-dns-zone-link.d.ts +202 -0
- package/lib/azure-privatednszonelink/lib/private-dns-zone-link.js +250 -0
- package/lib/azure-privatednszonelink/test/private-dns-zone-link.integ.d.ts +9 -0
- package/lib/azure-privatednszonelink/test/private-dns-zone-link.integ.js +110 -0
- package/lib/azure-privatednszonelink/test/private-dns-zone-link.spec.d.ts +9 -0
- package/lib/azure-privatednszonelink/test/private-dns-zone-link.spec.js +465 -0
- package/lib/azure-publicipaddress/index.d.ts +0 -5
- package/lib/azure-publicipaddress/index.js +1 -6
- package/lib/azure-publicipaddress/lib/index.d.ts +2 -9
- package/lib/azure-publicipaddress/lib/index.js +17 -17
- package/lib/azure-publicipaddress/lib/public-ip-address.d.ts +4 -13
- package/lib/azure-publicipaddress/lib/public-ip-address.js +14 -36
- package/lib/azure-resourcegroup/index.d.ts +0 -37
- package/lib/azure-resourcegroup/index.js +1 -39
- package/lib/azure-resourcegroup/lib/index.d.ts +1 -44
- package/lib/azure-resourcegroup/lib/index.js +2 -43
- package/lib/azure-resourcegroup/lib/resource-group.d.ts +9 -23
- package/lib/azure-resourcegroup/lib/resource-group.js +23 -56
- package/lib/azure-resourcegroup/test/resource-group.spec.js +13 -19
- package/lib/azure-roleassignment/index.d.ts +1 -0
- package/lib/azure-roleassignment/index.js +18 -0
- package/lib/azure-roleassignment/lib/index.d.ts +2 -0
- package/lib/azure-roleassignment/lib/index.js +19 -0
- package/lib/azure-roleassignment/lib/role-assignment-schemas.d.ts +25 -0
- package/lib/azure-roleassignment/lib/role-assignment-schemas.js +238 -0
- package/lib/azure-roleassignment/lib/role-assignment.d.ts +294 -0
- package/lib/azure-roleassignment/lib/role-assignment.js +257 -0
- package/lib/azure-roleassignment/test/role-assignment.integ.d.ts +12 -0
- package/lib/azure-roleassignment/test/role-assignment.integ.js +101 -0
- package/lib/azure-roleassignment/test/role-assignment.spec.d.ts +9 -0
- package/lib/azure-roleassignment/test/role-assignment.spec.js +633 -0
- package/lib/azure-roledefinition/index.d.ts +1 -0
- package/lib/azure-roledefinition/index.js +18 -0
- package/lib/azure-roledefinition/lib/index.d.ts +2 -0
- package/lib/azure-roledefinition/lib/index.js +19 -0
- package/lib/azure-roledefinition/lib/role-definition-schemas.d.ts +25 -0
- package/lib/azure-roledefinition/lib/role-definition-schemas.js +195 -0
- package/lib/azure-roledefinition/lib/role-definition.d.ts +236 -0
- package/lib/azure-roledefinition/lib/role-definition.js +192 -0
- package/lib/azure-roledefinition/test/role-definition.integ.d.ts +12 -0
- package/lib/azure-roledefinition/test/role-definition.integ.js +142 -0
- package/lib/azure-roledefinition/test/role-definition.spec.d.ts +9 -0
- package/lib/azure-roledefinition/test/role-definition.spec.js +946 -0
- package/lib/azure-storageaccount/index.d.ts +0 -19
- package/lib/azure-storageaccount/index.js +1 -20
- package/lib/azure-storageaccount/lib/index.d.ts +1 -7
- package/lib/azure-storageaccount/lib/index.js +2 -8
- package/lib/azure-storageaccount/lib/storage-account.d.ts +4 -9
- package/lib/azure-storageaccount/lib/storage-account.js +15 -29
- package/lib/azure-subnet/index.d.ts +0 -3
- package/lib/azure-subnet/index.js +1 -4
- package/lib/azure-subnet/lib/index.d.ts +1 -4
- package/lib/azure-subnet/lib/index.js +2 -5
- package/lib/azure-subnet/lib/subnet.d.ts +3 -14
- package/lib/azure-subnet/lib/subnet.js +28 -47
- package/lib/azure-subnet/test/subnet.integ.js +19 -7
- package/lib/azure-subnet/test/subnet.spec.js +1 -2
- package/lib/azure-virtualmachine/index.d.ts +0 -6
- package/lib/azure-virtualmachine/index.js +1 -7
- package/lib/azure-virtualmachine/lib/index.d.ts +1 -10
- package/lib/azure-virtualmachine/lib/index.js +2 -21
- package/lib/azure-virtualmachine/lib/virtual-machine.d.ts +4 -13
- package/lib/azure-virtualmachine/lib/virtual-machine.js +15 -36
- package/lib/azure-virtualnetwork/index.d.ts +0 -9
- package/lib/azure-virtualnetwork/index.js +1 -11
- package/lib/azure-virtualnetwork/lib/index.d.ts +2 -9
- package/lib/azure-virtualnetwork/lib/index.js +17 -20
- package/lib/azure-virtualnetwork/lib/virtual-network.d.ts +4 -13
- package/lib/azure-virtualnetwork/lib/virtual-network.js +15 -36
- package/lib/azure-virtualnetworkmanager/index.d.ts +1 -0
- package/lib/azure-virtualnetworkmanager/index.js +18 -0
- package/lib/azure-virtualnetworkmanager/lib/connectivity-configuration-schemas.d.ts +48 -0
- package/lib/azure-virtualnetworkmanager/lib/connectivity-configuration-schemas.js +265 -0
- package/lib/azure-virtualnetworkmanager/lib/connectivity-configuration.d.ts +185 -0
- package/lib/azure-virtualnetworkmanager/lib/connectivity-configuration.js +206 -0
- package/lib/azure-virtualnetworkmanager/lib/index.d.ts +14 -0
- package/lib/azure-virtualnetworkmanager/lib/index.js +31 -0
- package/lib/azure-virtualnetworkmanager/lib/network-group-schemas.d.ts +32 -0
- package/lib/azure-virtualnetworkmanager/lib/network-group-schemas.js +189 -0
- package/lib/azure-virtualnetworkmanager/lib/network-group-static-member-schemas.d.ts +32 -0
- package/lib/azure-virtualnetworkmanager/lib/network-group-static-member-schemas.js +201 -0
- package/lib/azure-virtualnetworkmanager/lib/network-group-static-member.d.ts +135 -0
- package/lib/azure-virtualnetworkmanager/lib/network-group-static-member.js +163 -0
- package/lib/azure-virtualnetworkmanager/lib/network-group.d.ts +139 -0
- package/lib/azure-virtualnetworkmanager/lib/network-group.js +158 -0
- package/lib/azure-virtualnetworkmanager/lib/security-admin-configuration-schemas.d.ts +32 -0
- package/lib/azure-virtualnetworkmanager/lib/security-admin-configuration-schemas.js +182 -0
- package/lib/azure-virtualnetworkmanager/lib/security-admin-configuration.d.ts +144 -0
- package/lib/azure-virtualnetworkmanager/lib/security-admin-configuration.js +164 -0
- package/lib/azure-virtualnetworkmanager/lib/security-admin-rule-collection-schemas.d.ts +38 -0
- package/lib/azure-virtualnetworkmanager/lib/security-admin-rule-collection-schemas.js +206 -0
- package/lib/azure-virtualnetworkmanager/lib/security-admin-rule-collection.d.ts +142 -0
- package/lib/azure-virtualnetworkmanager/lib/security-admin-rule-collection.js +162 -0
- package/lib/azure-virtualnetworkmanager/lib/security-admin-rule-schemas.d.ts +39 -0
- package/lib/azure-virtualnetworkmanager/lib/security-admin-rule-schemas.js +359 -0
- package/lib/azure-virtualnetworkmanager/lib/security-admin-rule.d.ts +221 -0
- package/lib/azure-virtualnetworkmanager/lib/security-admin-rule.js +204 -0
- package/lib/azure-virtualnetworkmanager/lib/virtual-network-manager-schemas.d.ts +32 -0
- package/lib/azure-virtualnetworkmanager/lib/virtual-network-manager-schemas.js +236 -0
- package/lib/azure-virtualnetworkmanager/lib/virtual-network-manager.d.ts +337 -0
- package/lib/azure-virtualnetworkmanager/lib/virtual-network-manager.js +283 -0
- package/lib/azure-virtualnetworkmanager/test/virtual-network-manager.integ.d.ts +25 -0
- package/lib/azure-virtualnetworkmanager/test/virtual-network-manager.integ.js +402 -0
- package/lib/azure-virtualnetworkmanager/test/virtual-network-manager.spec.d.ts +9 -0
- package/lib/azure-virtualnetworkmanager/test/virtual-network-manager.spec.js +1652 -0
- package/lib/azure-vmss/index.d.ts +0 -5
- package/lib/azure-vmss/index.js +1 -6
- package/lib/azure-vmss/lib/index.d.ts +0 -7
- package/lib/azure-vmss/lib/index.js +1 -21
- package/lib/azure-vmss/lib/virtual-machine-scale-set.d.ts +5 -13
- package/lib/azure-vmss/lib/virtual-machine-scale-set.js +29 -53
- package/lib/core-azure/lib/azapi/azapi-resource-tags.spec.d.ts +10 -0
- package/lib/core-azure/lib/azapi/azapi-resource-tags.spec.js +218 -0
- package/lib/core-azure/lib/azapi/azapi-resource.d.ts +178 -26
- package/lib/core-azure/lib/azapi/azapi-resource.js +328 -90
- package/lib/core-azure/lib/azapi/azapi-resource.spec.js +2 -2
- package/lib/core-azure/lib/azapi/providers-azapi/data-azapi-client-config/index.js +2 -2
- package/lib/core-azure/lib/azapi/providers-azapi/data-azapi-resource/index.js +5 -5
- package/lib/core-azure/lib/azapi/providers-azapi/provider/index.js +5 -3
- package/lib/core-azure/lib/azapi/providers-azapi/resource/index.js +5 -5
- package/lib/core-azure/lib/azapi/providers-azapi/resource-action/index.js +3 -3
- package/lib/core-azure/lib/azapi/providers-azapi/update-resource/index.js +3 -3
- package/lib/core-azure/lib/azapi/resource-schema-validator.d.ts +118 -0
- package/lib/core-azure/lib/azapi/resource-schema-validator.js +236 -0
- package/lib/core-azure/lib/azapi/resource-version-manager.d.ts +103 -0
- package/lib/core-azure/lib/azapi/resource-version-manager.js +168 -0
- package/lib/core-azure/lib/azapi/schema-mapper/schema-mapper.js +11 -6
- package/lib/core-azure/lib/index.d.ts +2 -2
- package/lib/core-azure/lib/index.js +5 -5
- package/lib/core-azure/lib/version-manager/api-version-manager.js +1 -1
- package/lib/core-azure/lib/version-manager/interfaces/version-interfaces.js +7 -7
- package/lib/index.d.ts +19 -0
- package/lib/index.js +21 -2
- package/lib/testing/index.js +2 -2
- package/lib/testing/lib/cleanup.d.ts +1 -0
- package/lib/testing/lib/cleanup.js +19 -12
- package/lib/testing/lib/metadata.js +19 -16
- package/package.json +1 -1
- package/scripts/cleanup-test-resources.ts +22 -4
- package/scripts/generate-index.js +25 -8
|
@@ -0,0 +1,359 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
/**
|
|
3
|
+
* API schemas for Azure Virtual Network Manager Security Admin Rules across all supported versions
|
|
4
|
+
*
|
|
5
|
+
* This file defines the complete API schemas for Microsoft.Network/networkManagers/securityAdminConfigurations/ruleCollections/rules
|
|
6
|
+
* across all supported API versions. The schemas are used by the AzapiResource
|
|
7
|
+
* framework for validation, transformation, and version management.
|
|
8
|
+
*/
|
|
9
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
10
|
+
exports.SECURITY_ADMIN_RULE_TYPE = exports.ALL_SECURITY_ADMIN_RULE_VERSIONS = exports.SECURITY_ADMIN_RULE_VERSION_2023_11_01 = exports.SECURITY_ADMIN_RULE_VERSION_2024_05_01 = exports.SECURITY_ADMIN_RULE_SCHEMA_2023_11_01 = exports.SECURITY_ADMIN_RULE_SCHEMA_2024_05_01 = void 0;
|
|
11
|
+
const version_interfaces_1 = require("../../core-azure/lib/version-manager/interfaces/version-interfaces");
|
|
12
|
+
// =============================================================================
|
|
13
|
+
// COMMON PROPERTY DEFINITIONS
|
|
14
|
+
// =============================================================================
|
|
15
|
+
/**
|
|
16
|
+
* Common property definitions shared across all Security Admin Rule versions
|
|
17
|
+
*/
|
|
18
|
+
const COMMON_PROPERTIES = {
|
|
19
|
+
name: {
|
|
20
|
+
dataType: version_interfaces_1.PropertyType.STRING,
|
|
21
|
+
required: true,
|
|
22
|
+
description: "Name of the security admin rule",
|
|
23
|
+
validation: [
|
|
24
|
+
{
|
|
25
|
+
ruleType: version_interfaces_1.ValidationRuleType.REQUIRED,
|
|
26
|
+
message: "Security admin rule name is required",
|
|
27
|
+
},
|
|
28
|
+
{
|
|
29
|
+
ruleType: version_interfaces_1.ValidationRuleType.PATTERN_MATCH,
|
|
30
|
+
value: "^[a-zA-Z0-9][a-zA-Z0-9._-]{0,62}[a-zA-Z0-9_]$",
|
|
31
|
+
message: "Security admin rule name must be 2-64 chars, alphanumeric, periods, underscores, hyphens",
|
|
32
|
+
},
|
|
33
|
+
],
|
|
34
|
+
},
|
|
35
|
+
ruleCollectionId: {
|
|
36
|
+
dataType: version_interfaces_1.PropertyType.STRING,
|
|
37
|
+
required: true,
|
|
38
|
+
description: "Resource ID of the parent Rule Collection",
|
|
39
|
+
validation: [
|
|
40
|
+
{
|
|
41
|
+
ruleType: version_interfaces_1.ValidationRuleType.REQUIRED,
|
|
42
|
+
message: "Rule Collection ID is required",
|
|
43
|
+
},
|
|
44
|
+
],
|
|
45
|
+
},
|
|
46
|
+
description: {
|
|
47
|
+
dataType: version_interfaces_1.PropertyType.STRING,
|
|
48
|
+
required: false,
|
|
49
|
+
description: "Description of the security admin rule",
|
|
50
|
+
},
|
|
51
|
+
priority: {
|
|
52
|
+
dataType: version_interfaces_1.PropertyType.NUMBER,
|
|
53
|
+
required: true,
|
|
54
|
+
description: "Priority of the rule (1-4096, lower number = higher priority)",
|
|
55
|
+
validation: [
|
|
56
|
+
{
|
|
57
|
+
ruleType: version_interfaces_1.ValidationRuleType.REQUIRED,
|
|
58
|
+
message: "Priority is required",
|
|
59
|
+
},
|
|
60
|
+
{
|
|
61
|
+
ruleType: version_interfaces_1.ValidationRuleType.VALUE_RANGE,
|
|
62
|
+
value: { min: 1, max: 4096 },
|
|
63
|
+
message: "Priority must be between 1 and 4096",
|
|
64
|
+
},
|
|
65
|
+
],
|
|
66
|
+
},
|
|
67
|
+
action: {
|
|
68
|
+
dataType: version_interfaces_1.PropertyType.STRING,
|
|
69
|
+
required: true,
|
|
70
|
+
description: "Action to take (Allow, Deny, or AlwaysAllow)",
|
|
71
|
+
validation: [
|
|
72
|
+
{
|
|
73
|
+
ruleType: version_interfaces_1.ValidationRuleType.REQUIRED,
|
|
74
|
+
message: "Action is required",
|
|
75
|
+
},
|
|
76
|
+
{
|
|
77
|
+
ruleType: version_interfaces_1.ValidationRuleType.PATTERN_MATCH,
|
|
78
|
+
value: "^(Allow|Deny|AlwaysAllow)$",
|
|
79
|
+
message: "Action must be 'Allow', 'Deny', or 'AlwaysAllow'",
|
|
80
|
+
},
|
|
81
|
+
],
|
|
82
|
+
},
|
|
83
|
+
direction: {
|
|
84
|
+
dataType: version_interfaces_1.PropertyType.STRING,
|
|
85
|
+
required: true,
|
|
86
|
+
description: "Direction of traffic (Inbound or Outbound)",
|
|
87
|
+
validation: [
|
|
88
|
+
{
|
|
89
|
+
ruleType: version_interfaces_1.ValidationRuleType.REQUIRED,
|
|
90
|
+
message: "Direction is required",
|
|
91
|
+
},
|
|
92
|
+
{
|
|
93
|
+
ruleType: version_interfaces_1.ValidationRuleType.PATTERN_MATCH,
|
|
94
|
+
value: "^(Inbound|Outbound)$",
|
|
95
|
+
message: "Direction must be 'Inbound' or 'Outbound'",
|
|
96
|
+
},
|
|
97
|
+
],
|
|
98
|
+
},
|
|
99
|
+
protocol: {
|
|
100
|
+
dataType: version_interfaces_1.PropertyType.STRING,
|
|
101
|
+
required: true,
|
|
102
|
+
description: "Protocol (Tcp, Udp, Icmp, Esp, Ah, or Any)",
|
|
103
|
+
validation: [
|
|
104
|
+
{
|
|
105
|
+
ruleType: version_interfaces_1.ValidationRuleType.REQUIRED,
|
|
106
|
+
message: "Protocol is required",
|
|
107
|
+
},
|
|
108
|
+
{
|
|
109
|
+
ruleType: version_interfaces_1.ValidationRuleType.PATTERN_MATCH,
|
|
110
|
+
value: "^(Tcp|Udp|Icmp|Esp|Ah|Any)$",
|
|
111
|
+
message: "Protocol must be Tcp, Udp, Icmp, Esp, Ah, or Any",
|
|
112
|
+
},
|
|
113
|
+
],
|
|
114
|
+
},
|
|
115
|
+
sourcePortRanges: {
|
|
116
|
+
dataType: version_interfaces_1.PropertyType.ARRAY,
|
|
117
|
+
required: false,
|
|
118
|
+
description: "Source port ranges (e.g., ['*'], ['80', '443'])",
|
|
119
|
+
},
|
|
120
|
+
destinationPortRanges: {
|
|
121
|
+
dataType: version_interfaces_1.PropertyType.ARRAY,
|
|
122
|
+
required: false,
|
|
123
|
+
description: "Destination port ranges (e.g., ['*'], ['22', '3389'])",
|
|
124
|
+
},
|
|
125
|
+
sources: {
|
|
126
|
+
dataType: version_interfaces_1.PropertyType.ARRAY,
|
|
127
|
+
required: false,
|
|
128
|
+
description: "Source addresses or network groups",
|
|
129
|
+
},
|
|
130
|
+
destinations: {
|
|
131
|
+
dataType: version_interfaces_1.PropertyType.ARRAY,
|
|
132
|
+
required: false,
|
|
133
|
+
description: "Destination addresses or network groups",
|
|
134
|
+
},
|
|
135
|
+
};
|
|
136
|
+
// =============================================================================
|
|
137
|
+
// VERSION-SPECIFIC SCHEMAS
|
|
138
|
+
// =============================================================================
|
|
139
|
+
/**
|
|
140
|
+
* API Schema for Security Admin Rule version 2024-05-01
|
|
141
|
+
*/
|
|
142
|
+
exports.SECURITY_ADMIN_RULE_SCHEMA_2024_05_01 = {
|
|
143
|
+
resourceType: "Microsoft.Network/networkManagers/securityAdminConfigurations/ruleCollections/rules",
|
|
144
|
+
version: "2024-05-01",
|
|
145
|
+
properties: {
|
|
146
|
+
...COMMON_PROPERTIES,
|
|
147
|
+
},
|
|
148
|
+
required: [
|
|
149
|
+
"name",
|
|
150
|
+
"ruleCollectionId",
|
|
151
|
+
"priority",
|
|
152
|
+
"action",
|
|
153
|
+
"direction",
|
|
154
|
+
"protocol",
|
|
155
|
+
],
|
|
156
|
+
optional: [
|
|
157
|
+
"description",
|
|
158
|
+
"sourcePortRanges",
|
|
159
|
+
"destinationPortRanges",
|
|
160
|
+
"sources",
|
|
161
|
+
"destinations",
|
|
162
|
+
],
|
|
163
|
+
deprecated: [],
|
|
164
|
+
transformationRules: {},
|
|
165
|
+
validationRules: [
|
|
166
|
+
{
|
|
167
|
+
property: "name",
|
|
168
|
+
rules: [
|
|
169
|
+
{
|
|
170
|
+
ruleType: version_interfaces_1.ValidationRuleType.REQUIRED,
|
|
171
|
+
message: "Security admin rule name is required",
|
|
172
|
+
},
|
|
173
|
+
],
|
|
174
|
+
},
|
|
175
|
+
{
|
|
176
|
+
property: "ruleCollectionId",
|
|
177
|
+
rules: [
|
|
178
|
+
{
|
|
179
|
+
ruleType: version_interfaces_1.ValidationRuleType.REQUIRED,
|
|
180
|
+
message: "Rule Collection ID is required",
|
|
181
|
+
},
|
|
182
|
+
],
|
|
183
|
+
},
|
|
184
|
+
{
|
|
185
|
+
property: "priority",
|
|
186
|
+
rules: [
|
|
187
|
+
{
|
|
188
|
+
ruleType: version_interfaces_1.ValidationRuleType.REQUIRED,
|
|
189
|
+
message: "Priority is required",
|
|
190
|
+
},
|
|
191
|
+
],
|
|
192
|
+
},
|
|
193
|
+
{
|
|
194
|
+
property: "action",
|
|
195
|
+
rules: [
|
|
196
|
+
{
|
|
197
|
+
ruleType: version_interfaces_1.ValidationRuleType.REQUIRED,
|
|
198
|
+
message: "Action is required",
|
|
199
|
+
},
|
|
200
|
+
],
|
|
201
|
+
},
|
|
202
|
+
{
|
|
203
|
+
property: "direction",
|
|
204
|
+
rules: [
|
|
205
|
+
{
|
|
206
|
+
ruleType: version_interfaces_1.ValidationRuleType.REQUIRED,
|
|
207
|
+
message: "Direction is required",
|
|
208
|
+
},
|
|
209
|
+
],
|
|
210
|
+
},
|
|
211
|
+
{
|
|
212
|
+
property: "protocol",
|
|
213
|
+
rules: [
|
|
214
|
+
{
|
|
215
|
+
ruleType: version_interfaces_1.ValidationRuleType.REQUIRED,
|
|
216
|
+
message: "Protocol is required",
|
|
217
|
+
},
|
|
218
|
+
],
|
|
219
|
+
},
|
|
220
|
+
],
|
|
221
|
+
};
|
|
222
|
+
/**
|
|
223
|
+
* API Schema for Security Admin Rule version 2023-11-01
|
|
224
|
+
*/
|
|
225
|
+
exports.SECURITY_ADMIN_RULE_SCHEMA_2023_11_01 = {
|
|
226
|
+
resourceType: "Microsoft.Network/networkManagers/securityAdminConfigurations/ruleCollections/rules",
|
|
227
|
+
version: "2023-11-01",
|
|
228
|
+
properties: {
|
|
229
|
+
...COMMON_PROPERTIES,
|
|
230
|
+
},
|
|
231
|
+
required: [
|
|
232
|
+
"name",
|
|
233
|
+
"ruleCollectionId",
|
|
234
|
+
"priority",
|
|
235
|
+
"action",
|
|
236
|
+
"direction",
|
|
237
|
+
"protocol",
|
|
238
|
+
],
|
|
239
|
+
optional: [
|
|
240
|
+
"description",
|
|
241
|
+
"sourcePortRanges",
|
|
242
|
+
"destinationPortRanges",
|
|
243
|
+
"sources",
|
|
244
|
+
"destinations",
|
|
245
|
+
],
|
|
246
|
+
deprecated: [],
|
|
247
|
+
transformationRules: {},
|
|
248
|
+
validationRules: [
|
|
249
|
+
{
|
|
250
|
+
property: "name",
|
|
251
|
+
rules: [
|
|
252
|
+
{
|
|
253
|
+
ruleType: version_interfaces_1.ValidationRuleType.REQUIRED,
|
|
254
|
+
message: "Security admin rule name is required",
|
|
255
|
+
},
|
|
256
|
+
],
|
|
257
|
+
},
|
|
258
|
+
{
|
|
259
|
+
property: "ruleCollectionId",
|
|
260
|
+
rules: [
|
|
261
|
+
{
|
|
262
|
+
ruleType: version_interfaces_1.ValidationRuleType.REQUIRED,
|
|
263
|
+
message: "Rule Collection ID is required",
|
|
264
|
+
},
|
|
265
|
+
],
|
|
266
|
+
},
|
|
267
|
+
{
|
|
268
|
+
property: "priority",
|
|
269
|
+
rules: [
|
|
270
|
+
{
|
|
271
|
+
ruleType: version_interfaces_1.ValidationRuleType.REQUIRED,
|
|
272
|
+
message: "Priority is required",
|
|
273
|
+
},
|
|
274
|
+
],
|
|
275
|
+
},
|
|
276
|
+
{
|
|
277
|
+
property: "action",
|
|
278
|
+
rules: [
|
|
279
|
+
{
|
|
280
|
+
ruleType: version_interfaces_1.ValidationRuleType.REQUIRED,
|
|
281
|
+
message: "Action is required",
|
|
282
|
+
},
|
|
283
|
+
],
|
|
284
|
+
},
|
|
285
|
+
{
|
|
286
|
+
property: "direction",
|
|
287
|
+
rules: [
|
|
288
|
+
{
|
|
289
|
+
ruleType: version_interfaces_1.ValidationRuleType.REQUIRED,
|
|
290
|
+
message: "Direction is required",
|
|
291
|
+
},
|
|
292
|
+
],
|
|
293
|
+
},
|
|
294
|
+
{
|
|
295
|
+
property: "protocol",
|
|
296
|
+
rules: [
|
|
297
|
+
{
|
|
298
|
+
ruleType: version_interfaces_1.ValidationRuleType.REQUIRED,
|
|
299
|
+
message: "Protocol is required",
|
|
300
|
+
},
|
|
301
|
+
],
|
|
302
|
+
},
|
|
303
|
+
],
|
|
304
|
+
};
|
|
305
|
+
// =============================================================================
|
|
306
|
+
// VERSION CONFIGURATIONS
|
|
307
|
+
// =============================================================================
|
|
308
|
+
/**
|
|
309
|
+
* Version configuration for Security Admin Rule 2024-05-01
|
|
310
|
+
*/
|
|
311
|
+
exports.SECURITY_ADMIN_RULE_VERSION_2024_05_01 = {
|
|
312
|
+
version: "2024-05-01",
|
|
313
|
+
schema: exports.SECURITY_ADMIN_RULE_SCHEMA_2024_05_01,
|
|
314
|
+
supportLevel: version_interfaces_1.VersionSupportLevel.ACTIVE,
|
|
315
|
+
releaseDate: "2024-05-01",
|
|
316
|
+
deprecationDate: undefined,
|
|
317
|
+
sunsetDate: undefined,
|
|
318
|
+
breakingChanges: [],
|
|
319
|
+
migrationGuide: "/docs/virtual-network-manager/migration-2024-05-01",
|
|
320
|
+
changeLog: [
|
|
321
|
+
{
|
|
322
|
+
changeType: "added",
|
|
323
|
+
description: "Latest stable release with full security admin rule support",
|
|
324
|
+
breaking: false,
|
|
325
|
+
},
|
|
326
|
+
],
|
|
327
|
+
};
|
|
328
|
+
/**
|
|
329
|
+
* Version configuration for Security Admin Rule 2023-11-01
|
|
330
|
+
*/
|
|
331
|
+
exports.SECURITY_ADMIN_RULE_VERSION_2023_11_01 = {
|
|
332
|
+
version: "2023-11-01",
|
|
333
|
+
schema: exports.SECURITY_ADMIN_RULE_SCHEMA_2023_11_01,
|
|
334
|
+
supportLevel: version_interfaces_1.VersionSupportLevel.MAINTENANCE,
|
|
335
|
+
releaseDate: "2023-11-01",
|
|
336
|
+
deprecationDate: undefined,
|
|
337
|
+
sunsetDate: undefined,
|
|
338
|
+
breakingChanges: [],
|
|
339
|
+
migrationGuide: "/docs/virtual-network-manager/migration-2023-11-01",
|
|
340
|
+
changeLog: [
|
|
341
|
+
{
|
|
342
|
+
changeType: "added",
|
|
343
|
+
description: "Stable release with core security admin rule features",
|
|
344
|
+
breaking: false,
|
|
345
|
+
},
|
|
346
|
+
],
|
|
347
|
+
};
|
|
348
|
+
/**
|
|
349
|
+
* All supported Security Admin Rule versions for registration
|
|
350
|
+
*/
|
|
351
|
+
exports.ALL_SECURITY_ADMIN_RULE_VERSIONS = [
|
|
352
|
+
exports.SECURITY_ADMIN_RULE_VERSION_2024_05_01,
|
|
353
|
+
exports.SECURITY_ADMIN_RULE_VERSION_2023_11_01,
|
|
354
|
+
];
|
|
355
|
+
/**
|
|
356
|
+
* Resource type constant
|
|
357
|
+
*/
|
|
358
|
+
exports.SECURITY_ADMIN_RULE_TYPE = "Microsoft.Network/networkManagers/securityAdminConfigurations/ruleCollections/rules";
|
|
359
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"security-admin-rule-schemas.js","sourceRoot":"","sources":["../../../src/azure-virtualnetworkmanager/lib/security-admin-rule-schemas.ts"],"names":[],"mappings":";AAAA;;;;;;GAMG;;;AAEH,2GAO4E;AAc5E,gFAAgF;AAChF,8BAA8B;AAC9B,gFAAgF;AAEhF;;GAEG;AACH,MAAM,iBAAiB,GAA0C;IAC/D,IAAI,EAAE;QACJ,QAAQ,EAAE,iCAAY,CAAC,MAAM;QAC7B,QAAQ,EAAE,IAAI;QACd,WAAW,EAAE,iCAAiC;QAC9C,UAAU,EAAE;YACV;gBACE,QAAQ,EAAE,uCAAkB,CAAC,QAAQ;gBACrC,OAAO,EAAE,sCAAsC;aAChD;YACD;gBACE,QAAQ,EAAE,uCAAkB,CAAC,aAAa;gBAC1C,KAAK,EAAE,+CAA+C;gBACtD,OAAO,EACL,0FAA0F;aAC7F;SACF;KACF;IACD,gBAAgB,EAAE;QAChB,QAAQ,EAAE,iCAAY,CAAC,MAAM;QAC7B,QAAQ,EAAE,IAAI;QACd,WAAW,EAAE,2CAA2C;QACxD,UAAU,EAAE;YACV;gBACE,QAAQ,EAAE,uCAAkB,CAAC,QAAQ;gBACrC,OAAO,EAAE,gCAAgC;aAC1C;SACF;KACF;IACD,WAAW,EAAE;QACX,QAAQ,EAAE,iCAAY,CAAC,MAAM;QAC7B,QAAQ,EAAE,KAAK;QACf,WAAW,EAAE,wCAAwC;KACtD;IACD,QAAQ,EAAE;QACR,QAAQ,EAAE,iCAAY,CAAC,MAAM;QAC7B,QAAQ,EAAE,IAAI;QACd,WAAW,EACT,+DAA+D;QACjE,UAAU,EAAE;YACV;gBACE,QAAQ,EAAE,uCAAkB,CAAC,QAAQ;gBACrC,OAAO,EAAE,sBAAsB;aAChC;YACD;gBACE,QAAQ,EAAE,uCAAkB,CAAC,WAAW;gBACxC,KAAK,EAAE,EAAE,GAAG,EAAE,CAAC,EAAE,GAAG,EAAE,IAAI,EAAE;gBAC5B,OAAO,EAAE,qCAAqC;aAC/C;SACF;KACF;IACD,MAAM,EAAE;QACN,QAAQ,EAAE,iCAAY,CAAC,MAAM;QAC7B,QAAQ,EAAE,IAAI;QACd,WAAW,EAAE,8CAA8C;QAC3D,UAAU,EAAE;YACV;gBACE,QAAQ,EAAE,uCAAkB,CAAC,QAAQ;gBACrC,OAAO,EAAE,oBAAoB;aAC9B;YACD;gBACE,QAAQ,EAAE,uCAAkB,CAAC,aAAa;gBAC1C,KAAK,EAAE,4BAA4B;gBACnC,OAAO,EAAE,kDAAkD;aAC5D;SACF;KACF;IACD,SAAS,EAAE;QACT,QAAQ,EAAE,iCAAY,CAAC,MAAM;QAC7B,QAAQ,EAAE,IAAI;QACd,WAAW,EAAE,4CAA4C;QACzD,UAAU,EAAE;YACV;gBACE,QAAQ,EAAE,uCAAkB,CAAC,QAAQ;gBACrC,OAAO,EAAE,uBAAuB;aACjC;YACD;gBACE,QAAQ,EAAE,uCAAkB,CAAC,aAAa;gBAC1C,KAAK,EAAE,sBAAsB;gBAC7B,OAAO,EAAE,2CAA2C;aACrD;SACF;KACF;IACD,QAAQ,EAAE;QACR,QAAQ,EAAE,iCAAY,CAAC,MAAM;QAC7B,QAAQ,EAAE,IAAI;QACd,WAAW,EAAE,4CAA4C;QACzD,UAAU,EAAE;YACV;gBACE,QAAQ,EAAE,uCAAkB,CAAC,QAAQ;gBACrC,OAAO,EAAE,sBAAsB;aAChC;YACD;gBACE,QAAQ,EAAE,uCAAkB,CAAC,aAAa;gBAC1C,KAAK,EAAE,6BAA6B;gBACpC,OAAO,EAAE,kDAAkD;aAC5D;SACF;KACF;IACD,gBAAgB,EAAE;QAChB,QAAQ,EAAE,iCAAY,CAAC,KAAK;QAC5B,QAAQ,EAAE,KAAK;QACf,WAAW,EAAE,iDAAiD;KAC/D;IACD,qBAAqB,EAAE;QACrB,QAAQ,EAAE,iCAAY,CAAC,KAAK;QAC5B,QAAQ,EAAE,KAAK;QACf,WAAW,EAAE,uDAAuD;KACrE;IACD,OAAO,EAAE;QACP,QAAQ,EAAE,iCAAY,CAAC,KAAK;QAC5B,QAAQ,EAAE,KAAK;QACf,WAAW,EAAE,oCAAoC;KAClD;IACD,YAAY,EAAE;QACZ,QAAQ,EAAE,iCAAY,CAAC,KAAK;QAC5B,QAAQ,EAAE,KAAK;QACf,WAAW,EAAE,yCAAyC;KACvD;CACF,CAAC;AAEF,gFAAgF;AAChF,2BAA2B;AAC3B,gFAAgF;AAEhF;;GAEG;AACU,QAAA,qCAAqC,GAAc;IAC9D,YAAY,EACV,qFAAqF;IACvF,OAAO,EAAE,YAAY;IACrB,UAAU,EAAE;QACV,GAAG,iBAAiB;KACrB;IACD,QAAQ,EAAE;QACR,MAAM;QACN,kBAAkB;QAClB,UAAU;QACV,QAAQ;QACR,WAAW;QACX,UAAU;KACX;IACD,QAAQ,EAAE;QACR,aAAa;QACb,kBAAkB;QAClB,uBAAuB;QACvB,SAAS;QACT,cAAc;KACf;IACD,UAAU,EAAE,EAAE;IACd,mBAAmB,EAAE,EAAE;IACvB,eAAe,EAAE;QACf;YACE,QAAQ,EAAE,MAAM;YAChB,KAAK,EAAE;gBACL;oBACE,QAAQ,EAAE,uCAAkB,CAAC,QAAQ;oBACrC,OAAO,EAAE,sCAAsC;iBAChD;aACF;SACF;QACD;YACE,QAAQ,EAAE,kBAAkB;YAC5B,KAAK,EAAE;gBACL;oBACE,QAAQ,EAAE,uCAAkB,CAAC,QAAQ;oBACrC,OAAO,EAAE,gCAAgC;iBAC1C;aACF;SACF;QACD;YACE,QAAQ,EAAE,UAAU;YACpB,KAAK,EAAE;gBACL;oBACE,QAAQ,EAAE,uCAAkB,CAAC,QAAQ;oBACrC,OAAO,EAAE,sBAAsB;iBAChC;aACF;SACF;QACD;YACE,QAAQ,EAAE,QAAQ;YAClB,KAAK,EAAE;gBACL;oBACE,QAAQ,EAAE,uCAAkB,CAAC,QAAQ;oBACrC,OAAO,EAAE,oBAAoB;iBAC9B;aACF;SACF;QACD;YACE,QAAQ,EAAE,WAAW;YACrB,KAAK,EAAE;gBACL;oBACE,QAAQ,EAAE,uCAAkB,CAAC,QAAQ;oBACrC,OAAO,EAAE,uBAAuB;iBACjC;aACF;SACF;QACD;YACE,QAAQ,EAAE,UAAU;YACpB,KAAK,EAAE;gBACL;oBACE,QAAQ,EAAE,uCAAkB,CAAC,QAAQ;oBACrC,OAAO,EAAE,sBAAsB;iBAChC;aACF;SACF;KACF;CACF,CAAC;AAEF;;GAEG;AACU,QAAA,qCAAqC,GAAc;IAC9D,YAAY,EACV,qFAAqF;IACvF,OAAO,EAAE,YAAY;IACrB,UAAU,EAAE;QACV,GAAG,iBAAiB;KACrB;IACD,QAAQ,EAAE;QACR,MAAM;QACN,kBAAkB;QAClB,UAAU;QACV,QAAQ;QACR,WAAW;QACX,UAAU;KACX;IACD,QAAQ,EAAE;QACR,aAAa;QACb,kBAAkB;QAClB,uBAAuB;QACvB,SAAS;QACT,cAAc;KACf;IACD,UAAU,EAAE,EAAE;IACd,mBAAmB,EAAE,EAAE;IACvB,eAAe,EAAE;QACf;YACE,QAAQ,EAAE,MAAM;YAChB,KAAK,EAAE;gBACL;oBACE,QAAQ,EAAE,uCAAkB,CAAC,QAAQ;oBACrC,OAAO,EAAE,sCAAsC;iBAChD;aACF;SACF;QACD;YACE,QAAQ,EAAE,kBAAkB;YAC5B,KAAK,EAAE;gBACL;oBACE,QAAQ,EAAE,uCAAkB,CAAC,QAAQ;oBACrC,OAAO,EAAE,gCAAgC;iBAC1C;aACF;SACF;QACD;YACE,QAAQ,EAAE,UAAU;YACpB,KAAK,EAAE;gBACL;oBACE,QAAQ,EAAE,uCAAkB,CAAC,QAAQ;oBACrC,OAAO,EAAE,sBAAsB;iBAChC;aACF;SACF;QACD;YACE,QAAQ,EAAE,QAAQ;YAClB,KAAK,EAAE;gBACL;oBACE,QAAQ,EAAE,uCAAkB,CAAC,QAAQ;oBACrC,OAAO,EAAE,oBAAoB;iBAC9B;aACF;SACF;QACD;YACE,QAAQ,EAAE,WAAW;YACrB,KAAK,EAAE;gBACL;oBACE,QAAQ,EAAE,uCAAkB,CAAC,QAAQ;oBACrC,OAAO,EAAE,uBAAuB;iBACjC;aACF;SACF;QACD;YACE,QAAQ,EAAE,UAAU;YACpB,KAAK,EAAE;gBACL;oBACE,QAAQ,EAAE,uCAAkB,CAAC,QAAQ;oBACrC,OAAO,EAAE,sBAAsB;iBAChC;aACF;SACF;KACF;CACF,CAAC;AAEF,gFAAgF;AAChF,yBAAyB;AACzB,gFAAgF;AAEhF;;GAEG;AACU,QAAA,sCAAsC,GAAkB;IACnE,OAAO,EAAE,YAAY;IACrB,MAAM,EAAE,6CAAqC;IAC7C,YAAY,EAAE,wCAAmB,CAAC,MAAM;IACxC,WAAW,EAAE,YAAY;IACzB,eAAe,EAAE,SAAS;IAC1B,UAAU,EAAE,SAAS;IACrB,eAAe,EAAE,EAAE;IACnB,cAAc,EAAE,oDAAoD;IACpE,SAAS,EAAE;QACT;YACE,UAAU,EAAE,OAAO;YACnB,WAAW,EACT,6DAA6D;YAC/D,QAAQ,EAAE,KAAK;SAChB;KACF;CACF,CAAC;AAEF;;GAEG;AACU,QAAA,sCAAsC,GAAkB;IACnE,OAAO,EAAE,YAAY;IACrB,MAAM,EAAE,6CAAqC;IAC7C,YAAY,EAAE,wCAAmB,CAAC,WAAW;IAC7C,WAAW,EAAE,YAAY;IACzB,eAAe,EAAE,SAAS;IAC1B,UAAU,EAAE,SAAS;IACrB,eAAe,EAAE,EAAE;IACnB,cAAc,EAAE,oDAAoD;IACpE,SAAS,EAAE;QACT;YACE,UAAU,EAAE,OAAO;YACnB,WAAW,EAAE,uDAAuD;YACpE,QAAQ,EAAE,KAAK;SAChB;KACF;CACF,CAAC;AAEF;;GAEG;AACU,QAAA,gCAAgC,GAAoB;IAC/D,8CAAsC;IACtC,8CAAsC;CACvC,CAAC;AAEF;;GAEG;AACU,QAAA,wBAAwB,GACnC,qFAAqF,CAAC","sourcesContent":["/**\n * API schemas for Azure Virtual Network Manager Security Admin Rules across all supported versions\n *\n * This file defines the complete API schemas for Microsoft.Network/networkManagers/securityAdminConfigurations/ruleCollections/rules\n * across all supported API versions. The schemas are used by the AzapiResource\n * framework for validation, transformation, and version management.\n */\n\nimport {\n  ApiSchema,\n  PropertyDefinition,\n  PropertyType,\n  ValidationRuleType,\n  VersionConfig,\n  VersionSupportLevel,\n} from \"../../core-azure/lib/version-manager/interfaces/version-interfaces\";\n\n// =============================================================================\n// TYPESCRIPT INTERFACES FOR NESTED OBJECTS\n// =============================================================================\n\n/**\n * Address prefix item for sources or destinations\n */\nexport interface AddressPrefixItem {\n  readonly addressPrefix?: string;\n  readonly addressPrefixType?: \"IPPrefix\" | \"ServiceTag\";\n}\n\n// =============================================================================\n// COMMON PROPERTY DEFINITIONS\n// =============================================================================\n\n/**\n * Common property definitions shared across all Security Admin Rule versions\n */\nconst COMMON_PROPERTIES: { [key: string]: PropertyDefinition } = {\n  name: {\n    dataType: PropertyType.STRING,\n    required: true,\n    description: \"Name of the security admin rule\",\n    validation: [\n      {\n        ruleType: ValidationRuleType.REQUIRED,\n        message: \"Security admin rule name is required\",\n      },\n      {\n        ruleType: ValidationRuleType.PATTERN_MATCH,\n        value: \"^[a-zA-Z0-9][a-zA-Z0-9._-]{0,62}[a-zA-Z0-9_]$\",\n        message:\n          \"Security admin rule name must be 2-64 chars, alphanumeric, periods, underscores, hyphens\",\n      },\n    ],\n  },\n  ruleCollectionId: {\n    dataType: PropertyType.STRING,\n    required: true,\n    description: \"Resource ID of the parent Rule Collection\",\n    validation: [\n      {\n        ruleType: ValidationRuleType.REQUIRED,\n        message: \"Rule Collection ID is required\",\n      },\n    ],\n  },\n  description: {\n    dataType: PropertyType.STRING,\n    required: false,\n    description: \"Description of the security admin rule\",\n  },\n  priority: {\n    dataType: PropertyType.NUMBER,\n    required: true,\n    description:\n      \"Priority of the rule (1-4096, lower number = higher priority)\",\n    validation: [\n      {\n        ruleType: ValidationRuleType.REQUIRED,\n        message: \"Priority is required\",\n      },\n      {\n        ruleType: ValidationRuleType.VALUE_RANGE,\n        value: { min: 1, max: 4096 },\n        message: \"Priority must be between 1 and 4096\",\n      },\n    ],\n  },\n  action: {\n    dataType: PropertyType.STRING,\n    required: true,\n    description: \"Action to take (Allow, Deny, or AlwaysAllow)\",\n    validation: [\n      {\n        ruleType: ValidationRuleType.REQUIRED,\n        message: \"Action is required\",\n      },\n      {\n        ruleType: ValidationRuleType.PATTERN_MATCH,\n        value: \"^(Allow|Deny|AlwaysAllow)$\",\n        message: \"Action must be 'Allow', 'Deny', or 'AlwaysAllow'\",\n      },\n    ],\n  },\n  direction: {\n    dataType: PropertyType.STRING,\n    required: true,\n    description: \"Direction of traffic (Inbound or Outbound)\",\n    validation: [\n      {\n        ruleType: ValidationRuleType.REQUIRED,\n        message: \"Direction is required\",\n      },\n      {\n        ruleType: ValidationRuleType.PATTERN_MATCH,\n        value: \"^(Inbound|Outbound)$\",\n        message: \"Direction must be 'Inbound' or 'Outbound'\",\n      },\n    ],\n  },\n  protocol: {\n    dataType: PropertyType.STRING,\n    required: true,\n    description: \"Protocol (Tcp, Udp, Icmp, Esp, Ah, or Any)\",\n    validation: [\n      {\n        ruleType: ValidationRuleType.REQUIRED,\n        message: \"Protocol is required\",\n      },\n      {\n        ruleType: ValidationRuleType.PATTERN_MATCH,\n        value: \"^(Tcp|Udp|Icmp|Esp|Ah|Any)$\",\n        message: \"Protocol must be Tcp, Udp, Icmp, Esp, Ah, or Any\",\n      },\n    ],\n  },\n  sourcePortRanges: {\n    dataType: PropertyType.ARRAY,\n    required: false,\n    description: \"Source port ranges (e.g., ['*'], ['80', '443'])\",\n  },\n  destinationPortRanges: {\n    dataType: PropertyType.ARRAY,\n    required: false,\n    description: \"Destination port ranges (e.g., ['*'], ['22', '3389'])\",\n  },\n  sources: {\n    dataType: PropertyType.ARRAY,\n    required: false,\n    description: \"Source addresses or network groups\",\n  },\n  destinations: {\n    dataType: PropertyType.ARRAY,\n    required: false,\n    description: \"Destination addresses or network groups\",\n  },\n};\n\n// =============================================================================\n// VERSION-SPECIFIC SCHEMAS\n// =============================================================================\n\n/**\n * API Schema for Security Admin Rule version 2024-05-01\n */\nexport const SECURITY_ADMIN_RULE_SCHEMA_2024_05_01: ApiSchema = {\n  resourceType:\n    \"Microsoft.Network/networkManagers/securityAdminConfigurations/ruleCollections/rules\",\n  version: \"2024-05-01\",\n  properties: {\n    ...COMMON_PROPERTIES,\n  },\n  required: [\n    \"name\",\n    \"ruleCollectionId\",\n    \"priority\",\n    \"action\",\n    \"direction\",\n    \"protocol\",\n  ],\n  optional: [\n    \"description\",\n    \"sourcePortRanges\",\n    \"destinationPortRanges\",\n    \"sources\",\n    \"destinations\",\n  ],\n  deprecated: [],\n  transformationRules: {},\n  validationRules: [\n    {\n      property: \"name\",\n      rules: [\n        {\n          ruleType: ValidationRuleType.REQUIRED,\n          message: \"Security admin rule name is required\",\n        },\n      ],\n    },\n    {\n      property: \"ruleCollectionId\",\n      rules: [\n        {\n          ruleType: ValidationRuleType.REQUIRED,\n          message: \"Rule Collection ID is required\",\n        },\n      ],\n    },\n    {\n      property: \"priority\",\n      rules: [\n        {\n          ruleType: ValidationRuleType.REQUIRED,\n          message: \"Priority is required\",\n        },\n      ],\n    },\n    {\n      property: \"action\",\n      rules: [\n        {\n          ruleType: ValidationRuleType.REQUIRED,\n          message: \"Action is required\",\n        },\n      ],\n    },\n    {\n      property: \"direction\",\n      rules: [\n        {\n          ruleType: ValidationRuleType.REQUIRED,\n          message: \"Direction is required\",\n        },\n      ],\n    },\n    {\n      property: \"protocol\",\n      rules: [\n        {\n          ruleType: ValidationRuleType.REQUIRED,\n          message: \"Protocol is required\",\n        },\n      ],\n    },\n  ],\n};\n\n/**\n * API Schema for Security Admin Rule version 2023-11-01\n */\nexport const SECURITY_ADMIN_RULE_SCHEMA_2023_11_01: ApiSchema = {\n  resourceType:\n    \"Microsoft.Network/networkManagers/securityAdminConfigurations/ruleCollections/rules\",\n  version: \"2023-11-01\",\n  properties: {\n    ...COMMON_PROPERTIES,\n  },\n  required: [\n    \"name\",\n    \"ruleCollectionId\",\n    \"priority\",\n    \"action\",\n    \"direction\",\n    \"protocol\",\n  ],\n  optional: [\n    \"description\",\n    \"sourcePortRanges\",\n    \"destinationPortRanges\",\n    \"sources\",\n    \"destinations\",\n  ],\n  deprecated: [],\n  transformationRules: {},\n  validationRules: [\n    {\n      property: \"name\",\n      rules: [\n        {\n          ruleType: ValidationRuleType.REQUIRED,\n          message: \"Security admin rule name is required\",\n        },\n      ],\n    },\n    {\n      property: \"ruleCollectionId\",\n      rules: [\n        {\n          ruleType: ValidationRuleType.REQUIRED,\n          message: \"Rule Collection ID is required\",\n        },\n      ],\n    },\n    {\n      property: \"priority\",\n      rules: [\n        {\n          ruleType: ValidationRuleType.REQUIRED,\n          message: \"Priority is required\",\n        },\n      ],\n    },\n    {\n      property: \"action\",\n      rules: [\n        {\n          ruleType: ValidationRuleType.REQUIRED,\n          message: \"Action is required\",\n        },\n      ],\n    },\n    {\n      property: \"direction\",\n      rules: [\n        {\n          ruleType: ValidationRuleType.REQUIRED,\n          message: \"Direction is required\",\n        },\n      ],\n    },\n    {\n      property: \"protocol\",\n      rules: [\n        {\n          ruleType: ValidationRuleType.REQUIRED,\n          message: \"Protocol is required\",\n        },\n      ],\n    },\n  ],\n};\n\n// =============================================================================\n// VERSION CONFIGURATIONS\n// =============================================================================\n\n/**\n * Version configuration for Security Admin Rule 2024-05-01\n */\nexport const SECURITY_ADMIN_RULE_VERSION_2024_05_01: VersionConfig = {\n  version: \"2024-05-01\",\n  schema: SECURITY_ADMIN_RULE_SCHEMA_2024_05_01,\n  supportLevel: VersionSupportLevel.ACTIVE,\n  releaseDate: \"2024-05-01\",\n  deprecationDate: undefined,\n  sunsetDate: undefined,\n  breakingChanges: [],\n  migrationGuide: \"/docs/virtual-network-manager/migration-2024-05-01\",\n  changeLog: [\n    {\n      changeType: \"added\",\n      description:\n        \"Latest stable release with full security admin rule support\",\n      breaking: false,\n    },\n  ],\n};\n\n/**\n * Version configuration for Security Admin Rule 2023-11-01\n */\nexport const SECURITY_ADMIN_RULE_VERSION_2023_11_01: VersionConfig = {\n  version: \"2023-11-01\",\n  schema: SECURITY_ADMIN_RULE_SCHEMA_2023_11_01,\n  supportLevel: VersionSupportLevel.MAINTENANCE,\n  releaseDate: \"2023-11-01\",\n  deprecationDate: undefined,\n  sunsetDate: undefined,\n  breakingChanges: [],\n  migrationGuide: \"/docs/virtual-network-manager/migration-2023-11-01\",\n  changeLog: [\n    {\n      changeType: \"added\",\n      description: \"Stable release with core security admin rule features\",\n      breaking: false,\n    },\n  ],\n};\n\n/**\n * All supported Security Admin Rule versions for registration\n */\nexport const ALL_SECURITY_ADMIN_RULE_VERSIONS: VersionConfig[] = [\n  SECURITY_ADMIN_RULE_VERSION_2024_05_01,\n  SECURITY_ADMIN_RULE_VERSION_2023_11_01,\n];\n\n/**\n * Resource type constant\n */\nexport const SECURITY_ADMIN_RULE_TYPE =\n  \"Microsoft.Network/networkManagers/securityAdminConfigurations/ruleCollections/rules\";\n"]}
|
|
@@ -0,0 +1,221 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Azure Virtual Network Manager Security Admin Rule implementation using AzapiResource framework
|
|
3
|
+
*
|
|
4
|
+
* This class provides a unified implementation for individual security admin rules that define
|
|
5
|
+
* high-priority security policies. These rules are evaluated BEFORE traditional NSGs and can
|
|
6
|
+
* enforce organization-wide security requirements.
|
|
7
|
+
*
|
|
8
|
+
* Supported API Versions:
|
|
9
|
+
* - 2023-11-01 (Maintenance)
|
|
10
|
+
* - 2024-05-01 (Active, Latest)
|
|
11
|
+
*
|
|
12
|
+
* Features:
|
|
13
|
+
* - Automatic latest version resolution when no version is specified
|
|
14
|
+
* - Explicit version pinning for stability requirements
|
|
15
|
+
* - Schema-driven validation and transformation
|
|
16
|
+
* - Three action types: Allow, Deny, AlwaysAllow
|
|
17
|
+
* - Full backward compatibility
|
|
18
|
+
* - JSII compliance for multi-language support
|
|
19
|
+
*/
|
|
20
|
+
import * as cdktf from "cdktf";
|
|
21
|
+
import { Construct } from "constructs";
|
|
22
|
+
import { AddressPrefixItem } from "./security-admin-rule-schemas";
|
|
23
|
+
import { AzapiResource, AzapiResourceProps } from "../../core-azure/lib/azapi/azapi-resource";
|
|
24
|
+
import { ApiSchema } from "../../core-azure/lib/version-manager/interfaces/version-interfaces";
|
|
25
|
+
/**
|
|
26
|
+
* Properties for the Azure Virtual Network Manager Security Admin Rule
|
|
27
|
+
*
|
|
28
|
+
* Extends AzapiResourceProps with Security Admin Rule specific properties
|
|
29
|
+
*/
|
|
30
|
+
export interface SecurityAdminRuleProps extends AzapiResourceProps {
|
|
31
|
+
/**
|
|
32
|
+
* Resource ID of the parent Rule Collection
|
|
33
|
+
* @example "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg/providers/Microsoft.Network/networkManagers/vnm/securityAdminConfigurations/config/ruleCollections/collection"
|
|
34
|
+
*/
|
|
35
|
+
readonly ruleCollectionId: string;
|
|
36
|
+
/**
|
|
37
|
+
* Optional description of the security admin rule
|
|
38
|
+
* @example "Block SSH access from internet"
|
|
39
|
+
*/
|
|
40
|
+
readonly description?: string;
|
|
41
|
+
/**
|
|
42
|
+
* Priority of the rule (1-4096, lower number = higher priority)
|
|
43
|
+
* Rules with lower priority numbers are evaluated first
|
|
44
|
+
* @example 100
|
|
45
|
+
*/
|
|
46
|
+
readonly priority: number;
|
|
47
|
+
/**
|
|
48
|
+
* Action to take when the rule matches
|
|
49
|
+
* - Allow: Allow traffic (NSG can still deny)
|
|
50
|
+
* - Deny: Deny traffic (stops evaluation)
|
|
51
|
+
* - AlwaysAllow: Force allow (overrides NSG denies)
|
|
52
|
+
* @example "Deny"
|
|
53
|
+
* @example "AlwaysAllow"
|
|
54
|
+
*/
|
|
55
|
+
readonly action: "Allow" | "Deny" | "AlwaysAllow";
|
|
56
|
+
/**
|
|
57
|
+
* Direction of traffic this rule applies to
|
|
58
|
+
* @example "Inbound"
|
|
59
|
+
* @example "Outbound"
|
|
60
|
+
*/
|
|
61
|
+
readonly direction: "Inbound" | "Outbound";
|
|
62
|
+
/**
|
|
63
|
+
* Protocol this rule applies to
|
|
64
|
+
* @example "Tcp"
|
|
65
|
+
* @example "Any"
|
|
66
|
+
*/
|
|
67
|
+
readonly protocol: "Tcp" | "Udp" | "Icmp" | "Esp" | "Ah" | "Any";
|
|
68
|
+
/**
|
|
69
|
+
* Source port ranges
|
|
70
|
+
* Use ["*"] for all ports or specify ranges like ["80", "443", "8000-8999"]
|
|
71
|
+
* @default ["*"]
|
|
72
|
+
* @example ["*"]
|
|
73
|
+
* @example ["80", "443"]
|
|
74
|
+
*/
|
|
75
|
+
readonly sourcePortRanges?: string[];
|
|
76
|
+
/**
|
|
77
|
+
* Destination port ranges
|
|
78
|
+
* Use ["*"] for all ports or specify ranges
|
|
79
|
+
* @default ["*"]
|
|
80
|
+
* @example ["22"]
|
|
81
|
+
* @example ["3389", "5985-5986"]
|
|
82
|
+
*/
|
|
83
|
+
readonly destinationPortRanges?: string[];
|
|
84
|
+
/**
|
|
85
|
+
* Source addresses or network groups
|
|
86
|
+
* @example [{ addressPrefix: "*", addressPrefixType: "IPPrefix" }]
|
|
87
|
+
* @example [{ addressPrefix: "10.0.0.0/8", addressPrefixType: "IPPrefix" }]
|
|
88
|
+
*/
|
|
89
|
+
readonly sources?: AddressPrefixItem[];
|
|
90
|
+
/**
|
|
91
|
+
* Destination addresses or network groups
|
|
92
|
+
* @example [{ addressPrefix: "*", addressPrefixType: "IPPrefix" }]
|
|
93
|
+
* @example [{ addressPrefix: "Internet", addressPrefixType: "ServiceTag" }]
|
|
94
|
+
*/
|
|
95
|
+
readonly destinations?: AddressPrefixItem[];
|
|
96
|
+
/**
|
|
97
|
+
* The lifecycle rules to ignore changes
|
|
98
|
+
* @example ["tags"]
|
|
99
|
+
*/
|
|
100
|
+
readonly ignoreChanges?: string[];
|
|
101
|
+
}
|
|
102
|
+
/**
|
|
103
|
+
* Properties for Security Admin Rule body
|
|
104
|
+
*/
|
|
105
|
+
export interface SecurityAdminRuleProperties {
|
|
106
|
+
readonly description?: string;
|
|
107
|
+
readonly priority: number;
|
|
108
|
+
readonly action: string;
|
|
109
|
+
readonly direction: string;
|
|
110
|
+
readonly protocol: string;
|
|
111
|
+
readonly sourcePortRanges?: string[];
|
|
112
|
+
readonly destinationPortRanges?: string[];
|
|
113
|
+
readonly sources?: AddressPrefixItem[];
|
|
114
|
+
readonly destinations?: AddressPrefixItem[];
|
|
115
|
+
}
|
|
116
|
+
/**
|
|
117
|
+
* The resource body interface for Azure Security Admin Rule API calls
|
|
118
|
+
*/
|
|
119
|
+
export interface SecurityAdminRuleBody {
|
|
120
|
+
readonly kind: "Custom";
|
|
121
|
+
readonly properties: SecurityAdminRuleProperties;
|
|
122
|
+
}
|
|
123
|
+
/**
|
|
124
|
+
* Azure Virtual Network Manager Security Admin Rule implementation
|
|
125
|
+
*
|
|
126
|
+
* Security admin rules define high-priority security policies that are evaluated BEFORE
|
|
127
|
+
* traditional Network Security Groups (NSGs). This enables centralized security enforcement
|
|
128
|
+
* that cannot be overridden by individual teams.
|
|
129
|
+
*
|
|
130
|
+
* Key concepts:
|
|
131
|
+
* - Priority: Lower numbers = higher priority (evaluated first)
|
|
132
|
+
* - Allow: Permits traffic, but NSG can still deny it
|
|
133
|
+
* - Deny: Blocks traffic immediately, no further evaluation
|
|
134
|
+
* - AlwaysAllow: Forces traffic to be allowed, overriding NSG denies
|
|
135
|
+
*
|
|
136
|
+
* @example
|
|
137
|
+
* // Block SSH from internet:
|
|
138
|
+
* const blockSSH = new SecurityAdminRule(this, "block-ssh", {
|
|
139
|
+
* name: "block-ssh-from-internet",
|
|
140
|
+
* ruleCollectionId: ruleCollection.id,
|
|
141
|
+
* description: "Block SSH access from internet",
|
|
142
|
+
* priority: 100,
|
|
143
|
+
* action: "Deny",
|
|
144
|
+
* direction: "Inbound",
|
|
145
|
+
* protocol: "Tcp",
|
|
146
|
+
* destinationPortRanges: ["22"],
|
|
147
|
+
* sources: [{ addressPrefix: "Internet", addressPrefixType: "ServiceTag" }],
|
|
148
|
+
* destinations: [{ addressPrefix: "*", addressPrefixType: "IPPrefix" }]
|
|
149
|
+
* });
|
|
150
|
+
*
|
|
151
|
+
* @example
|
|
152
|
+
* // Always allow monitoring traffic:
|
|
153
|
+
* const allowMonitoring = new SecurityAdminRule(this, "allow-monitoring", {
|
|
154
|
+
* name: "always-allow-monitoring",
|
|
155
|
+
* ruleCollectionId: ruleCollection.id,
|
|
156
|
+
* description: "Always allow traffic from monitoring systems",
|
|
157
|
+
* priority: 50,
|
|
158
|
+
* action: "AlwaysAllow",
|
|
159
|
+
* direction: "Inbound",
|
|
160
|
+
* protocol: "Any",
|
|
161
|
+
* sources: [{ addressPrefix: "10.0.0.0/24", addressPrefixType: "IPPrefix" }],
|
|
162
|
+
* destinations: [{ addressPrefix: "*", addressPrefixType: "IPPrefix" }]
|
|
163
|
+
* });
|
|
164
|
+
*
|
|
165
|
+
* @stability stable
|
|
166
|
+
*/
|
|
167
|
+
export declare class SecurityAdminRule extends AzapiResource {
|
|
168
|
+
/**
|
|
169
|
+
* The input properties for this Security Admin Rule instance
|
|
170
|
+
*/
|
|
171
|
+
readonly props: SecurityAdminRuleProps;
|
|
172
|
+
readonly idOutput: cdktf.TerraformOutput;
|
|
173
|
+
readonly nameOutput: cdktf.TerraformOutput;
|
|
174
|
+
readonly provisioningStateOutput: cdktf.TerraformOutput;
|
|
175
|
+
readonly resourceName: string;
|
|
176
|
+
/**
|
|
177
|
+
* Creates a new Azure Virtual Network Manager Security Admin Rule using the AzapiResource framework
|
|
178
|
+
*
|
|
179
|
+
* @param scope - The scope in which to define this construct
|
|
180
|
+
* @param id - The unique identifier for this instance
|
|
181
|
+
* @param props - Configuration properties for the Security Admin Rule
|
|
182
|
+
*/
|
|
183
|
+
constructor(scope: Construct, id: string, props: SecurityAdminRuleProps);
|
|
184
|
+
/**
|
|
185
|
+
* Resolves the parent resource ID for the Security Admin Rule
|
|
186
|
+
* Security Admin Rules are scoped to Rule Collections
|
|
187
|
+
*/
|
|
188
|
+
protected resolveParentId(props: any): string;
|
|
189
|
+
/**
|
|
190
|
+
* Gets the default API version to use when no explicit version is specified
|
|
191
|
+
*/
|
|
192
|
+
protected defaultVersion(): string;
|
|
193
|
+
/**
|
|
194
|
+
* Gets the Azure resource type for Security Admin Rules
|
|
195
|
+
*/
|
|
196
|
+
protected resourceType(): string;
|
|
197
|
+
/**
|
|
198
|
+
* Gets the API schema for the resolved version
|
|
199
|
+
*/
|
|
200
|
+
protected apiSchema(): ApiSchema;
|
|
201
|
+
/**
|
|
202
|
+
* Creates the resource body for the Azure API call
|
|
203
|
+
*/
|
|
204
|
+
protected createResourceBody(props: any): any;
|
|
205
|
+
/**
|
|
206
|
+
* Get the provisioning state of the Security Admin Rule
|
|
207
|
+
*/
|
|
208
|
+
get provisioningState(): string;
|
|
209
|
+
/**
|
|
210
|
+
* Get the priority of the rule
|
|
211
|
+
*/
|
|
212
|
+
get rulePriority(): number;
|
|
213
|
+
/**
|
|
214
|
+
* Get the action of the rule
|
|
215
|
+
*/
|
|
216
|
+
get ruleAction(): "Allow" | "Deny" | "AlwaysAllow";
|
|
217
|
+
/**
|
|
218
|
+
* Applies ignore changes lifecycle rules if specified in props
|
|
219
|
+
*/
|
|
220
|
+
private _applyIgnoreChanges;
|
|
221
|
+
}
|