@microsoft/terraform-cdk-constructs 1.2.0 → 1.3.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (291) hide show
  1. package/.jsii +54630 -26185
  2. package/API.md +72091 -23784
  3. package/lib/azure-actiongroup/index.d.ts +0 -10
  4. package/lib/azure-actiongroup/index.js +1 -11
  5. package/lib/azure-actiongroup/lib/action-group.d.ts +0 -10
  6. package/lib/azure-actiongroup/lib/action-group.js +6 -32
  7. package/lib/azure-actiongroup/lib/index.d.ts +1 -4
  8. package/lib/azure-actiongroup/lib/index.js +2 -5
  9. package/lib/azure-activitylogalert/index.d.ts +0 -10
  10. package/lib/azure-activitylogalert/index.js +1 -11
  11. package/lib/azure-activitylogalert/lib/activity-log-alert.d.ts +0 -10
  12. package/lib/azure-activitylogalert/lib/activity-log-alert.js +6 -32
  13. package/lib/azure-activitylogalert/lib/index.d.ts +1 -4
  14. package/lib/azure-activitylogalert/lib/index.js +2 -5
  15. package/lib/azure-aks/index.d.ts +0 -8
  16. package/lib/azure-aks/index.js +1 -11
  17. package/lib/azure-aks/lib/aks-cluster.d.ts +4 -13
  18. package/lib/azure-aks/lib/aks-cluster.js +13 -36
  19. package/lib/azure-aks/lib/index.d.ts +1 -10
  20. package/lib/azure-aks/lib/index.js +2 -21
  21. package/lib/azure-diagnosticsettings/index.d.ts +0 -6
  22. package/lib/azure-diagnosticsettings/index.js +1 -7
  23. package/lib/azure-diagnosticsettings/lib/diagnostic-settings.d.ts +0 -10
  24. package/lib/azure-diagnosticsettings/lib/diagnostic-settings.js +6 -32
  25. package/lib/azure-diagnosticsettings/lib/index.d.ts +1 -7
  26. package/lib/azure-diagnosticsettings/lib/index.js +2 -8
  27. package/lib/azure-dnsforwardingruleset/index.d.ts +1 -0
  28. package/lib/azure-dnsforwardingruleset/index.js +18 -0
  29. package/lib/azure-dnsforwardingruleset/lib/dns-forwarding-ruleset-schemas.d.ts +24 -0
  30. package/lib/azure-dnsforwardingruleset/lib/dns-forwarding-ruleset-schemas.js +206 -0
  31. package/lib/azure-dnsforwardingruleset/lib/dns-forwarding-ruleset.d.ts +174 -0
  32. package/lib/azure-dnsforwardingruleset/lib/dns-forwarding-ruleset.js +214 -0
  33. package/lib/azure-dnsforwardingruleset/lib/forwarding-rule-schemas.d.ts +24 -0
  34. package/lib/azure-dnsforwardingruleset/lib/forwarding-rule-schemas.js +242 -0
  35. package/lib/azure-dnsforwardingruleset/lib/forwarding-rule.d.ts +193 -0
  36. package/lib/azure-dnsforwardingruleset/lib/forwarding-rule.js +193 -0
  37. package/lib/azure-dnsforwardingruleset/lib/index.d.ts +6 -0
  38. package/lib/azure-dnsforwardingruleset/lib/index.js +23 -0
  39. package/lib/azure-dnsforwardingruleset/lib/virtual-network-link-schemas.d.ts +24 -0
  40. package/lib/azure-dnsforwardingruleset/lib/virtual-network-link-schemas.js +199 -0
  41. package/lib/azure-dnsforwardingruleset/lib/virtual-network-link.d.ts +160 -0
  42. package/lib/azure-dnsforwardingruleset/lib/virtual-network-link.js +178 -0
  43. package/lib/azure-dnsforwardingruleset/test/dns-forwarding-ruleset.integ.d.ts +9 -0
  44. package/lib/azure-dnsforwardingruleset/test/dns-forwarding-ruleset.integ.js +133 -0
  45. package/lib/azure-dnsforwardingruleset/test/dns-forwarding-ruleset.spec.d.ts +9 -0
  46. package/lib/azure-dnsforwardingruleset/test/dns-forwarding-ruleset.spec.js +350 -0
  47. package/lib/azure-dnsforwardingruleset/test/forwarding-rule.spec.d.ts +9 -0
  48. package/lib/azure-dnsforwardingruleset/test/forwarding-rule.spec.js +397 -0
  49. package/lib/azure-dnsforwardingruleset/test/virtual-network-link.spec.d.ts +9 -0
  50. package/lib/azure-dnsforwardingruleset/test/virtual-network-link.spec.js +285 -0
  51. package/lib/azure-dnsresolver/index.d.ts +1 -0
  52. package/lib/azure-dnsresolver/index.js +18 -0
  53. package/lib/azure-dnsresolver/lib/dns-resolver-schemas.d.ts +24 -0
  54. package/lib/azure-dnsresolver/lib/dns-resolver-schemas.js +218 -0
  55. package/lib/azure-dnsresolver/lib/dns-resolver.d.ts +170 -0
  56. package/lib/azure-dnsresolver/lib/dns-resolver.js +236 -0
  57. package/lib/azure-dnsresolver/lib/inbound-endpoint-schemas.d.ts +24 -0
  58. package/lib/azure-dnsresolver/lib/inbound-endpoint-schemas.js +261 -0
  59. package/lib/azure-dnsresolver/lib/inbound-endpoint.d.ts +189 -0
  60. package/lib/azure-dnsresolver/lib/inbound-endpoint.js +243 -0
  61. package/lib/azure-dnsresolver/lib/index.d.ts +6 -0
  62. package/lib/azure-dnsresolver/lib/index.js +23 -0
  63. package/lib/azure-dnsresolver/lib/outbound-endpoint-schemas.d.ts +24 -0
  64. package/lib/azure-dnsresolver/lib/outbound-endpoint-schemas.js +231 -0
  65. package/lib/azure-dnsresolver/lib/outbound-endpoint.d.ts +175 -0
  66. package/lib/azure-dnsresolver/lib/outbound-endpoint.js +234 -0
  67. package/lib/azure-dnsresolver/test/dns-resolver.integ.d.ts +14 -0
  68. package/lib/azure-dnsresolver/test/dns-resolver.integ.js +117 -0
  69. package/lib/azure-dnsresolver/test/dns-resolver.spec.d.ts +9 -0
  70. package/lib/azure-dnsresolver/test/dns-resolver.spec.js +353 -0
  71. package/lib/azure-dnsresolver/test/inbound-endpoint.integ.d.ts +9 -0
  72. package/lib/azure-dnsresolver/test/inbound-endpoint.integ.js +151 -0
  73. package/lib/azure-dnsresolver/test/inbound-endpoint.spec.d.ts +9 -0
  74. package/lib/azure-dnsresolver/test/inbound-endpoint.spec.js +441 -0
  75. package/lib/azure-dnsresolver/test/outbound-endpoint.integ.d.ts +9 -0
  76. package/lib/azure-dnsresolver/test/outbound-endpoint.integ.js +149 -0
  77. package/lib/azure-dnsresolver/test/outbound-endpoint.spec.d.ts +9 -0
  78. package/lib/azure-dnsresolver/test/outbound-endpoint.spec.js +301 -0
  79. package/lib/azure-dnszone/index.d.ts +1 -0
  80. package/lib/azure-dnszone/index.js +18 -0
  81. package/lib/azure-dnszone/lib/dns-zone-schemas.d.ts +24 -0
  82. package/lib/azure-dnszone/lib/dns-zone-schemas.js +191 -0
  83. package/lib/azure-dnszone/lib/dns-zone.d.ts +182 -0
  84. package/lib/azure-dnszone/lib/dns-zone.js +228 -0
  85. package/lib/azure-dnszone/lib/index.d.ts +2 -0
  86. package/lib/azure-dnszone/lib/index.js +19 -0
  87. package/lib/azure-dnszone/test/dns-zone.integ.d.ts +9 -0
  88. package/lib/azure-dnszone/test/dns-zone.integ.js +85 -0
  89. package/lib/azure-dnszone/test/dns-zone.spec.d.ts +9 -0
  90. package/lib/azure-dnszone/test/dns-zone.spec.js +285 -0
  91. package/lib/azure-metricalert/index.d.ts +0 -10
  92. package/lib/azure-metricalert/index.js +1 -11
  93. package/lib/azure-metricalert/lib/index.d.ts +1 -4
  94. package/lib/azure-metricalert/lib/index.js +2 -5
  95. package/lib/azure-metricalert/lib/metric-alert.d.ts +0 -10
  96. package/lib/azure-metricalert/lib/metric-alert.js +6 -32
  97. package/lib/azure-networkinterface/index.d.ts +0 -3
  98. package/lib/azure-networkinterface/index.js +1 -4
  99. package/lib/azure-networkinterface/lib/index.d.ts +1 -5
  100. package/lib/azure-networkinterface/lib/index.js +2 -5
  101. package/lib/azure-networkinterface/lib/network-interface.d.ts +4 -9
  102. package/lib/azure-networkinterface/lib/network-interface.js +14 -29
  103. package/lib/azure-networkinterface/test/network-interface.integ.js +20 -6
  104. package/lib/azure-networksecuritygroup/index.d.ts +0 -5
  105. package/lib/azure-networksecuritygroup/index.js +1 -6
  106. package/lib/azure-networksecuritygroup/lib/index.d.ts +2 -5
  107. package/lib/azure-networksecuritygroup/lib/index.js +17 -14
  108. package/lib/azure-networksecuritygroup/lib/network-security-group.d.ts +4 -13
  109. package/lib/azure-networksecuritygroup/lib/network-security-group.js +14 -36
  110. package/lib/azure-policyassignment/index.d.ts +1 -0
  111. package/lib/azure-policyassignment/index.js +18 -0
  112. package/lib/azure-policyassignment/lib/index.d.ts +2 -0
  113. package/lib/azure-policyassignment/lib/index.js +19 -0
  114. package/lib/azure-policyassignment/lib/policy-assignment-schemas.d.ts +25 -0
  115. package/lib/azure-policyassignment/lib/policy-assignment-schemas.js +260 -0
  116. package/lib/azure-policyassignment/lib/policy-assignment.d.ts +349 -0
  117. package/lib/azure-policyassignment/lib/policy-assignment.js +237 -0
  118. package/lib/azure-policyassignment/test/policy-assignment.integ.d.ts +13 -0
  119. package/lib/azure-policyassignment/test/policy-assignment.integ.js +153 -0
  120. package/lib/azure-policyassignment/test/policy-assignment.spec.d.ts +9 -0
  121. package/lib/azure-policyassignment/test/policy-assignment.spec.js +651 -0
  122. package/lib/azure-policydefinition/index.d.ts +1 -0
  123. package/lib/azure-policydefinition/index.js +18 -0
  124. package/lib/azure-policydefinition/lib/index.d.ts +2 -0
  125. package/lib/azure-policydefinition/lib/index.js +19 -0
  126. package/lib/azure-policydefinition/lib/policy-definition-schemas.d.ts +25 -0
  127. package/lib/azure-policydefinition/lib/policy-definition-schemas.js +210 -0
  128. package/lib/azure-policydefinition/lib/policy-definition.d.ts +281 -0
  129. package/lib/azure-policydefinition/lib/policy-definition.js +236 -0
  130. package/lib/azure-policydefinition/test/policy-definition.integ.d.ts +9 -0
  131. package/lib/azure-policydefinition/test/policy-definition.integ.js +137 -0
  132. package/lib/azure-policydefinition/test/policy-definition.spec.d.ts +9 -0
  133. package/lib/azure-policydefinition/test/policy-definition.spec.js +806 -0
  134. package/lib/azure-privatednszone/index.d.ts +1 -0
  135. package/lib/azure-privatednszone/index.js +18 -0
  136. package/lib/azure-privatednszone/lib/index.d.ts +2 -0
  137. package/lib/azure-privatednszone/lib/index.js +19 -0
  138. package/lib/azure-privatednszone/lib/private-dns-zone-schemas.d.ts +24 -0
  139. package/lib/azure-privatednszone/lib/private-dns-zone-schemas.js +254 -0
  140. package/lib/azure-privatednszone/lib/private-dns-zone.d.ts +178 -0
  141. package/lib/azure-privatednszone/lib/private-dns-zone.js +272 -0
  142. package/lib/azure-privatednszone/test/private-dns-zone.integ.d.ts +9 -0
  143. package/lib/azure-privatednszone/test/private-dns-zone.integ.js +84 -0
  144. package/lib/azure-privatednszone/test/private-dns-zone.spec.d.ts +9 -0
  145. package/lib/azure-privatednszone/test/private-dns-zone.spec.js +341 -0
  146. package/lib/azure-privatednszonelink/index.d.ts +1 -0
  147. package/lib/azure-privatednszonelink/index.js +18 -0
  148. package/lib/azure-privatednszonelink/lib/index.d.ts +2 -0
  149. package/lib/azure-privatednszonelink/lib/index.js +19 -0
  150. package/lib/azure-privatednszonelink/lib/private-dns-zone-link-schemas.d.ts +24 -0
  151. package/lib/azure-privatednszonelink/lib/private-dns-zone-link-schemas.js +262 -0
  152. package/lib/azure-privatednszonelink/lib/private-dns-zone-link.d.ts +202 -0
  153. package/lib/azure-privatednszonelink/lib/private-dns-zone-link.js +250 -0
  154. package/lib/azure-privatednszonelink/test/private-dns-zone-link.integ.d.ts +9 -0
  155. package/lib/azure-privatednszonelink/test/private-dns-zone-link.integ.js +110 -0
  156. package/lib/azure-privatednszonelink/test/private-dns-zone-link.spec.d.ts +9 -0
  157. package/lib/azure-privatednszonelink/test/private-dns-zone-link.spec.js +465 -0
  158. package/lib/azure-publicipaddress/index.d.ts +0 -5
  159. package/lib/azure-publicipaddress/index.js +1 -6
  160. package/lib/azure-publicipaddress/lib/index.d.ts +2 -9
  161. package/lib/azure-publicipaddress/lib/index.js +17 -17
  162. package/lib/azure-publicipaddress/lib/public-ip-address.d.ts +4 -13
  163. package/lib/azure-publicipaddress/lib/public-ip-address.js +14 -36
  164. package/lib/azure-resourcegroup/index.d.ts +0 -37
  165. package/lib/azure-resourcegroup/index.js +1 -39
  166. package/lib/azure-resourcegroup/lib/index.d.ts +1 -44
  167. package/lib/azure-resourcegroup/lib/index.js +2 -43
  168. package/lib/azure-resourcegroup/lib/resource-group.d.ts +9 -23
  169. package/lib/azure-resourcegroup/lib/resource-group.js +23 -56
  170. package/lib/azure-resourcegroup/test/resource-group.spec.js +13 -19
  171. package/lib/azure-roleassignment/index.d.ts +1 -0
  172. package/lib/azure-roleassignment/index.js +18 -0
  173. package/lib/azure-roleassignment/lib/index.d.ts +2 -0
  174. package/lib/azure-roleassignment/lib/index.js +19 -0
  175. package/lib/azure-roleassignment/lib/role-assignment-schemas.d.ts +25 -0
  176. package/lib/azure-roleassignment/lib/role-assignment-schemas.js +238 -0
  177. package/lib/azure-roleassignment/lib/role-assignment.d.ts +294 -0
  178. package/lib/azure-roleassignment/lib/role-assignment.js +257 -0
  179. package/lib/azure-roleassignment/test/role-assignment.integ.d.ts +12 -0
  180. package/lib/azure-roleassignment/test/role-assignment.integ.js +101 -0
  181. package/lib/azure-roleassignment/test/role-assignment.spec.d.ts +9 -0
  182. package/lib/azure-roleassignment/test/role-assignment.spec.js +633 -0
  183. package/lib/azure-roledefinition/index.d.ts +1 -0
  184. package/lib/azure-roledefinition/index.js +18 -0
  185. package/lib/azure-roledefinition/lib/index.d.ts +2 -0
  186. package/lib/azure-roledefinition/lib/index.js +19 -0
  187. package/lib/azure-roledefinition/lib/role-definition-schemas.d.ts +25 -0
  188. package/lib/azure-roledefinition/lib/role-definition-schemas.js +195 -0
  189. package/lib/azure-roledefinition/lib/role-definition.d.ts +236 -0
  190. package/lib/azure-roledefinition/lib/role-definition.js +192 -0
  191. package/lib/azure-roledefinition/test/role-definition.integ.d.ts +12 -0
  192. package/lib/azure-roledefinition/test/role-definition.integ.js +142 -0
  193. package/lib/azure-roledefinition/test/role-definition.spec.d.ts +9 -0
  194. package/lib/azure-roledefinition/test/role-definition.spec.js +946 -0
  195. package/lib/azure-storageaccount/index.d.ts +0 -19
  196. package/lib/azure-storageaccount/index.js +1 -20
  197. package/lib/azure-storageaccount/lib/index.d.ts +1 -7
  198. package/lib/azure-storageaccount/lib/index.js +2 -8
  199. package/lib/azure-storageaccount/lib/storage-account.d.ts +4 -9
  200. package/lib/azure-storageaccount/lib/storage-account.js +15 -29
  201. package/lib/azure-subnet/index.d.ts +0 -3
  202. package/lib/azure-subnet/index.js +1 -4
  203. package/lib/azure-subnet/lib/index.d.ts +1 -4
  204. package/lib/azure-subnet/lib/index.js +2 -5
  205. package/lib/azure-subnet/lib/subnet.d.ts +3 -14
  206. package/lib/azure-subnet/lib/subnet.js +28 -47
  207. package/lib/azure-subnet/test/subnet.integ.js +19 -7
  208. package/lib/azure-subnet/test/subnet.spec.js +1 -2
  209. package/lib/azure-virtualmachine/index.d.ts +0 -6
  210. package/lib/azure-virtualmachine/index.js +1 -7
  211. package/lib/azure-virtualmachine/lib/index.d.ts +1 -10
  212. package/lib/azure-virtualmachine/lib/index.js +2 -21
  213. package/lib/azure-virtualmachine/lib/virtual-machine.d.ts +4 -13
  214. package/lib/azure-virtualmachine/lib/virtual-machine.js +15 -36
  215. package/lib/azure-virtualnetwork/index.d.ts +0 -9
  216. package/lib/azure-virtualnetwork/index.js +1 -11
  217. package/lib/azure-virtualnetwork/lib/index.d.ts +2 -9
  218. package/lib/azure-virtualnetwork/lib/index.js +17 -20
  219. package/lib/azure-virtualnetwork/lib/virtual-network.d.ts +4 -13
  220. package/lib/azure-virtualnetwork/lib/virtual-network.js +15 -36
  221. package/lib/azure-virtualnetworkmanager/index.d.ts +1 -0
  222. package/lib/azure-virtualnetworkmanager/index.js +18 -0
  223. package/lib/azure-virtualnetworkmanager/lib/connectivity-configuration-schemas.d.ts +48 -0
  224. package/lib/azure-virtualnetworkmanager/lib/connectivity-configuration-schemas.js +265 -0
  225. package/lib/azure-virtualnetworkmanager/lib/connectivity-configuration.d.ts +185 -0
  226. package/lib/azure-virtualnetworkmanager/lib/connectivity-configuration.js +206 -0
  227. package/lib/azure-virtualnetworkmanager/lib/index.d.ts +14 -0
  228. package/lib/azure-virtualnetworkmanager/lib/index.js +31 -0
  229. package/lib/azure-virtualnetworkmanager/lib/network-group-schemas.d.ts +32 -0
  230. package/lib/azure-virtualnetworkmanager/lib/network-group-schemas.js +189 -0
  231. package/lib/azure-virtualnetworkmanager/lib/network-group-static-member-schemas.d.ts +32 -0
  232. package/lib/azure-virtualnetworkmanager/lib/network-group-static-member-schemas.js +201 -0
  233. package/lib/azure-virtualnetworkmanager/lib/network-group-static-member.d.ts +135 -0
  234. package/lib/azure-virtualnetworkmanager/lib/network-group-static-member.js +163 -0
  235. package/lib/azure-virtualnetworkmanager/lib/network-group.d.ts +139 -0
  236. package/lib/azure-virtualnetworkmanager/lib/network-group.js +158 -0
  237. package/lib/azure-virtualnetworkmanager/lib/security-admin-configuration-schemas.d.ts +32 -0
  238. package/lib/azure-virtualnetworkmanager/lib/security-admin-configuration-schemas.js +182 -0
  239. package/lib/azure-virtualnetworkmanager/lib/security-admin-configuration.d.ts +144 -0
  240. package/lib/azure-virtualnetworkmanager/lib/security-admin-configuration.js +164 -0
  241. package/lib/azure-virtualnetworkmanager/lib/security-admin-rule-collection-schemas.d.ts +38 -0
  242. package/lib/azure-virtualnetworkmanager/lib/security-admin-rule-collection-schemas.js +206 -0
  243. package/lib/azure-virtualnetworkmanager/lib/security-admin-rule-collection.d.ts +142 -0
  244. package/lib/azure-virtualnetworkmanager/lib/security-admin-rule-collection.js +162 -0
  245. package/lib/azure-virtualnetworkmanager/lib/security-admin-rule-schemas.d.ts +39 -0
  246. package/lib/azure-virtualnetworkmanager/lib/security-admin-rule-schemas.js +359 -0
  247. package/lib/azure-virtualnetworkmanager/lib/security-admin-rule.d.ts +221 -0
  248. package/lib/azure-virtualnetworkmanager/lib/security-admin-rule.js +204 -0
  249. package/lib/azure-virtualnetworkmanager/lib/virtual-network-manager-schemas.d.ts +32 -0
  250. package/lib/azure-virtualnetworkmanager/lib/virtual-network-manager-schemas.js +236 -0
  251. package/lib/azure-virtualnetworkmanager/lib/virtual-network-manager.d.ts +337 -0
  252. package/lib/azure-virtualnetworkmanager/lib/virtual-network-manager.js +283 -0
  253. package/lib/azure-virtualnetworkmanager/test/virtual-network-manager.integ.d.ts +25 -0
  254. package/lib/azure-virtualnetworkmanager/test/virtual-network-manager.integ.js +402 -0
  255. package/lib/azure-virtualnetworkmanager/test/virtual-network-manager.spec.d.ts +9 -0
  256. package/lib/azure-virtualnetworkmanager/test/virtual-network-manager.spec.js +1652 -0
  257. package/lib/azure-vmss/index.d.ts +0 -5
  258. package/lib/azure-vmss/index.js +1 -6
  259. package/lib/azure-vmss/lib/index.d.ts +0 -7
  260. package/lib/azure-vmss/lib/index.js +1 -21
  261. package/lib/azure-vmss/lib/virtual-machine-scale-set.d.ts +5 -13
  262. package/lib/azure-vmss/lib/virtual-machine-scale-set.js +29 -53
  263. package/lib/core-azure/lib/azapi/azapi-resource-tags.spec.d.ts +10 -0
  264. package/lib/core-azure/lib/azapi/azapi-resource-tags.spec.js +218 -0
  265. package/lib/core-azure/lib/azapi/azapi-resource.d.ts +206 -26
  266. package/lib/core-azure/lib/azapi/azapi-resource.js +379 -91
  267. package/lib/core-azure/lib/azapi/azapi-resource.spec.js +2 -2
  268. package/lib/core-azure/lib/azapi/providers-azapi/data-azapi-client-config/index.js +2 -2
  269. package/lib/core-azure/lib/azapi/providers-azapi/data-azapi-resource/index.js +5 -5
  270. package/lib/core-azure/lib/azapi/providers-azapi/provider/index.js +5 -3
  271. package/lib/core-azure/lib/azapi/providers-azapi/resource/index.js +5 -5
  272. package/lib/core-azure/lib/azapi/providers-azapi/resource-action/index.js +3 -3
  273. package/lib/core-azure/lib/azapi/providers-azapi/update-resource/index.js +3 -3
  274. package/lib/core-azure/lib/azapi/resource-schema-validator.d.ts +118 -0
  275. package/lib/core-azure/lib/azapi/resource-schema-validator.js +236 -0
  276. package/lib/core-azure/lib/azapi/resource-version-manager.d.ts +103 -0
  277. package/lib/core-azure/lib/azapi/resource-version-manager.js +168 -0
  278. package/lib/core-azure/lib/azapi/schema-mapper/schema-mapper.js +11 -6
  279. package/lib/core-azure/lib/index.d.ts +2 -2
  280. package/lib/core-azure/lib/index.js +5 -5
  281. package/lib/core-azure/lib/version-manager/api-version-manager.js +1 -1
  282. package/lib/core-azure/lib/version-manager/interfaces/version-interfaces.js +7 -7
  283. package/lib/index.d.ts +19 -0
  284. package/lib/index.js +21 -2
  285. package/lib/testing/index.js +2 -2
  286. package/lib/testing/lib/cleanup.d.ts +1 -0
  287. package/lib/testing/lib/cleanup.js +19 -12
  288. package/lib/testing/lib/metadata.js +19 -16
  289. package/package.json +1 -1
  290. package/scripts/cleanup-test-resources.ts +22 -4
  291. package/scripts/generate-index.js +25 -8
@@ -0,0 +1,359 @@
1
+ "use strict";
2
+ /**
3
+ * API schemas for Azure Virtual Network Manager Security Admin Rules across all supported versions
4
+ *
5
+ * This file defines the complete API schemas for Microsoft.Network/networkManagers/securityAdminConfigurations/ruleCollections/rules
6
+ * across all supported API versions. The schemas are used by the AzapiResource
7
+ * framework for validation, transformation, and version management.
8
+ */
9
+ Object.defineProperty(exports, "__esModule", { value: true });
10
+ exports.SECURITY_ADMIN_RULE_TYPE = exports.ALL_SECURITY_ADMIN_RULE_VERSIONS = exports.SECURITY_ADMIN_RULE_VERSION_2023_11_01 = exports.SECURITY_ADMIN_RULE_VERSION_2024_05_01 = exports.SECURITY_ADMIN_RULE_SCHEMA_2023_11_01 = exports.SECURITY_ADMIN_RULE_SCHEMA_2024_05_01 = void 0;
11
+ const version_interfaces_1 = require("../../core-azure/lib/version-manager/interfaces/version-interfaces");
12
+ // =============================================================================
13
+ // COMMON PROPERTY DEFINITIONS
14
+ // =============================================================================
15
+ /**
16
+ * Common property definitions shared across all Security Admin Rule versions
17
+ */
18
+ const COMMON_PROPERTIES = {
19
+ name: {
20
+ dataType: version_interfaces_1.PropertyType.STRING,
21
+ required: true,
22
+ description: "Name of the security admin rule",
23
+ validation: [
24
+ {
25
+ ruleType: version_interfaces_1.ValidationRuleType.REQUIRED,
26
+ message: "Security admin rule name is required",
27
+ },
28
+ {
29
+ ruleType: version_interfaces_1.ValidationRuleType.PATTERN_MATCH,
30
+ value: "^[a-zA-Z0-9][a-zA-Z0-9._-]{0,62}[a-zA-Z0-9_]$",
31
+ message: "Security admin rule name must be 2-64 chars, alphanumeric, periods, underscores, hyphens",
32
+ },
33
+ ],
34
+ },
35
+ ruleCollectionId: {
36
+ dataType: version_interfaces_1.PropertyType.STRING,
37
+ required: true,
38
+ description: "Resource ID of the parent Rule Collection",
39
+ validation: [
40
+ {
41
+ ruleType: version_interfaces_1.ValidationRuleType.REQUIRED,
42
+ message: "Rule Collection ID is required",
43
+ },
44
+ ],
45
+ },
46
+ description: {
47
+ dataType: version_interfaces_1.PropertyType.STRING,
48
+ required: false,
49
+ description: "Description of the security admin rule",
50
+ },
51
+ priority: {
52
+ dataType: version_interfaces_1.PropertyType.NUMBER,
53
+ required: true,
54
+ description: "Priority of the rule (1-4096, lower number = higher priority)",
55
+ validation: [
56
+ {
57
+ ruleType: version_interfaces_1.ValidationRuleType.REQUIRED,
58
+ message: "Priority is required",
59
+ },
60
+ {
61
+ ruleType: version_interfaces_1.ValidationRuleType.VALUE_RANGE,
62
+ value: { min: 1, max: 4096 },
63
+ message: "Priority must be between 1 and 4096",
64
+ },
65
+ ],
66
+ },
67
+ action: {
68
+ dataType: version_interfaces_1.PropertyType.STRING,
69
+ required: true,
70
+ description: "Action to take (Allow, Deny, or AlwaysAllow)",
71
+ validation: [
72
+ {
73
+ ruleType: version_interfaces_1.ValidationRuleType.REQUIRED,
74
+ message: "Action is required",
75
+ },
76
+ {
77
+ ruleType: version_interfaces_1.ValidationRuleType.PATTERN_MATCH,
78
+ value: "^(Allow|Deny|AlwaysAllow)$",
79
+ message: "Action must be 'Allow', 'Deny', or 'AlwaysAllow'",
80
+ },
81
+ ],
82
+ },
83
+ direction: {
84
+ dataType: version_interfaces_1.PropertyType.STRING,
85
+ required: true,
86
+ description: "Direction of traffic (Inbound or Outbound)",
87
+ validation: [
88
+ {
89
+ ruleType: version_interfaces_1.ValidationRuleType.REQUIRED,
90
+ message: "Direction is required",
91
+ },
92
+ {
93
+ ruleType: version_interfaces_1.ValidationRuleType.PATTERN_MATCH,
94
+ value: "^(Inbound|Outbound)$",
95
+ message: "Direction must be 'Inbound' or 'Outbound'",
96
+ },
97
+ ],
98
+ },
99
+ protocol: {
100
+ dataType: version_interfaces_1.PropertyType.STRING,
101
+ required: true,
102
+ description: "Protocol (Tcp, Udp, Icmp, Esp, Ah, or Any)",
103
+ validation: [
104
+ {
105
+ ruleType: version_interfaces_1.ValidationRuleType.REQUIRED,
106
+ message: "Protocol is required",
107
+ },
108
+ {
109
+ ruleType: version_interfaces_1.ValidationRuleType.PATTERN_MATCH,
110
+ value: "^(Tcp|Udp|Icmp|Esp|Ah|Any)$",
111
+ message: "Protocol must be Tcp, Udp, Icmp, Esp, Ah, or Any",
112
+ },
113
+ ],
114
+ },
115
+ sourcePortRanges: {
116
+ dataType: version_interfaces_1.PropertyType.ARRAY,
117
+ required: false,
118
+ description: "Source port ranges (e.g., ['*'], ['80', '443'])",
119
+ },
120
+ destinationPortRanges: {
121
+ dataType: version_interfaces_1.PropertyType.ARRAY,
122
+ required: false,
123
+ description: "Destination port ranges (e.g., ['*'], ['22', '3389'])",
124
+ },
125
+ sources: {
126
+ dataType: version_interfaces_1.PropertyType.ARRAY,
127
+ required: false,
128
+ description: "Source addresses or network groups",
129
+ },
130
+ destinations: {
131
+ dataType: version_interfaces_1.PropertyType.ARRAY,
132
+ required: false,
133
+ description: "Destination addresses or network groups",
134
+ },
135
+ };
136
+ // =============================================================================
137
+ // VERSION-SPECIFIC SCHEMAS
138
+ // =============================================================================
139
+ /**
140
+ * API Schema for Security Admin Rule version 2024-05-01
141
+ */
142
+ exports.SECURITY_ADMIN_RULE_SCHEMA_2024_05_01 = {
143
+ resourceType: "Microsoft.Network/networkManagers/securityAdminConfigurations/ruleCollections/rules",
144
+ version: "2024-05-01",
145
+ properties: {
146
+ ...COMMON_PROPERTIES,
147
+ },
148
+ required: [
149
+ "name",
150
+ "ruleCollectionId",
151
+ "priority",
152
+ "action",
153
+ "direction",
154
+ "protocol",
155
+ ],
156
+ optional: [
157
+ "description",
158
+ "sourcePortRanges",
159
+ "destinationPortRanges",
160
+ "sources",
161
+ "destinations",
162
+ ],
163
+ deprecated: [],
164
+ transformationRules: {},
165
+ validationRules: [
166
+ {
167
+ property: "name",
168
+ rules: [
169
+ {
170
+ ruleType: version_interfaces_1.ValidationRuleType.REQUIRED,
171
+ message: "Security admin rule name is required",
172
+ },
173
+ ],
174
+ },
175
+ {
176
+ property: "ruleCollectionId",
177
+ rules: [
178
+ {
179
+ ruleType: version_interfaces_1.ValidationRuleType.REQUIRED,
180
+ message: "Rule Collection ID is required",
181
+ },
182
+ ],
183
+ },
184
+ {
185
+ property: "priority",
186
+ rules: [
187
+ {
188
+ ruleType: version_interfaces_1.ValidationRuleType.REQUIRED,
189
+ message: "Priority is required",
190
+ },
191
+ ],
192
+ },
193
+ {
194
+ property: "action",
195
+ rules: [
196
+ {
197
+ ruleType: version_interfaces_1.ValidationRuleType.REQUIRED,
198
+ message: "Action is required",
199
+ },
200
+ ],
201
+ },
202
+ {
203
+ property: "direction",
204
+ rules: [
205
+ {
206
+ ruleType: version_interfaces_1.ValidationRuleType.REQUIRED,
207
+ message: "Direction is required",
208
+ },
209
+ ],
210
+ },
211
+ {
212
+ property: "protocol",
213
+ rules: [
214
+ {
215
+ ruleType: version_interfaces_1.ValidationRuleType.REQUIRED,
216
+ message: "Protocol is required",
217
+ },
218
+ ],
219
+ },
220
+ ],
221
+ };
222
+ /**
223
+ * API Schema for Security Admin Rule version 2023-11-01
224
+ */
225
+ exports.SECURITY_ADMIN_RULE_SCHEMA_2023_11_01 = {
226
+ resourceType: "Microsoft.Network/networkManagers/securityAdminConfigurations/ruleCollections/rules",
227
+ version: "2023-11-01",
228
+ properties: {
229
+ ...COMMON_PROPERTIES,
230
+ },
231
+ required: [
232
+ "name",
233
+ "ruleCollectionId",
234
+ "priority",
235
+ "action",
236
+ "direction",
237
+ "protocol",
238
+ ],
239
+ optional: [
240
+ "description",
241
+ "sourcePortRanges",
242
+ "destinationPortRanges",
243
+ "sources",
244
+ "destinations",
245
+ ],
246
+ deprecated: [],
247
+ transformationRules: {},
248
+ validationRules: [
249
+ {
250
+ property: "name",
251
+ rules: [
252
+ {
253
+ ruleType: version_interfaces_1.ValidationRuleType.REQUIRED,
254
+ message: "Security admin rule name is required",
255
+ },
256
+ ],
257
+ },
258
+ {
259
+ property: "ruleCollectionId",
260
+ rules: [
261
+ {
262
+ ruleType: version_interfaces_1.ValidationRuleType.REQUIRED,
263
+ message: "Rule Collection ID is required",
264
+ },
265
+ ],
266
+ },
267
+ {
268
+ property: "priority",
269
+ rules: [
270
+ {
271
+ ruleType: version_interfaces_1.ValidationRuleType.REQUIRED,
272
+ message: "Priority is required",
273
+ },
274
+ ],
275
+ },
276
+ {
277
+ property: "action",
278
+ rules: [
279
+ {
280
+ ruleType: version_interfaces_1.ValidationRuleType.REQUIRED,
281
+ message: "Action is required",
282
+ },
283
+ ],
284
+ },
285
+ {
286
+ property: "direction",
287
+ rules: [
288
+ {
289
+ ruleType: version_interfaces_1.ValidationRuleType.REQUIRED,
290
+ message: "Direction is required",
291
+ },
292
+ ],
293
+ },
294
+ {
295
+ property: "protocol",
296
+ rules: [
297
+ {
298
+ ruleType: version_interfaces_1.ValidationRuleType.REQUIRED,
299
+ message: "Protocol is required",
300
+ },
301
+ ],
302
+ },
303
+ ],
304
+ };
305
+ // =============================================================================
306
+ // VERSION CONFIGURATIONS
307
+ // =============================================================================
308
+ /**
309
+ * Version configuration for Security Admin Rule 2024-05-01
310
+ */
311
+ exports.SECURITY_ADMIN_RULE_VERSION_2024_05_01 = {
312
+ version: "2024-05-01",
313
+ schema: exports.SECURITY_ADMIN_RULE_SCHEMA_2024_05_01,
314
+ supportLevel: version_interfaces_1.VersionSupportLevel.ACTIVE,
315
+ releaseDate: "2024-05-01",
316
+ deprecationDate: undefined,
317
+ sunsetDate: undefined,
318
+ breakingChanges: [],
319
+ migrationGuide: "/docs/virtual-network-manager/migration-2024-05-01",
320
+ changeLog: [
321
+ {
322
+ changeType: "added",
323
+ description: "Latest stable release with full security admin rule support",
324
+ breaking: false,
325
+ },
326
+ ],
327
+ };
328
+ /**
329
+ * Version configuration for Security Admin Rule 2023-11-01
330
+ */
331
+ exports.SECURITY_ADMIN_RULE_VERSION_2023_11_01 = {
332
+ version: "2023-11-01",
333
+ schema: exports.SECURITY_ADMIN_RULE_SCHEMA_2023_11_01,
334
+ supportLevel: version_interfaces_1.VersionSupportLevel.MAINTENANCE,
335
+ releaseDate: "2023-11-01",
336
+ deprecationDate: undefined,
337
+ sunsetDate: undefined,
338
+ breakingChanges: [],
339
+ migrationGuide: "/docs/virtual-network-manager/migration-2023-11-01",
340
+ changeLog: [
341
+ {
342
+ changeType: "added",
343
+ description: "Stable release with core security admin rule features",
344
+ breaking: false,
345
+ },
346
+ ],
347
+ };
348
+ /**
349
+ * All supported Security Admin Rule versions for registration
350
+ */
351
+ exports.ALL_SECURITY_ADMIN_RULE_VERSIONS = [
352
+ exports.SECURITY_ADMIN_RULE_VERSION_2024_05_01,
353
+ exports.SECURITY_ADMIN_RULE_VERSION_2023_11_01,
354
+ ];
355
+ /**
356
+ * Resource type constant
357
+ */
358
+ exports.SECURITY_ADMIN_RULE_TYPE = "Microsoft.Network/networkManagers/securityAdminConfigurations/ruleCollections/rules";
359
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"security-admin-rule-schemas.js","sourceRoot":"","sources":["../../../src/azure-virtualnetworkmanager/lib/security-admin-rule-schemas.ts"],"names":[],"mappings":";AAAA;;;;;;GAMG;;;AAEH,2GAO4E;AAc5E,gFAAgF;AAChF,8BAA8B;AAC9B,gFAAgF;AAEhF;;GAEG;AACH,MAAM,iBAAiB,GAA0C;IAC/D,IAAI,EAAE;QACJ,QAAQ,EAAE,iCAAY,CAAC,MAAM;QAC7B,QAAQ,EAAE,IAAI;QACd,WAAW,EAAE,iCAAiC;QAC9C,UAAU,EAAE;YACV;gBACE,QAAQ,EAAE,uCAAkB,CAAC,QAAQ;gBACrC,OAAO,EAAE,sCAAsC;aAChD;YACD;gBACE,QAAQ,EAAE,uCAAkB,CAAC,aAAa;gBAC1C,KAAK,EAAE,+CAA+C;gBACtD,OAAO,EACL,0FAA0F;aAC7F;SACF;KACF;IACD,gBAAgB,EAAE;QAChB,QAAQ,EAAE,iCAAY,CAAC,MAAM;QAC7B,QAAQ,EAAE,IAAI;QACd,WAAW,EAAE,2CAA2C;QACxD,UAAU,EAAE;YACV;gBACE,QAAQ,EAAE,uCAAkB,CAAC,QAAQ;gBACrC,OAAO,EAAE,gCAAgC;aAC1C;SACF;KACF;IACD,WAAW,EAAE;QACX,QAAQ,EAAE,iCAAY,CAAC,MAAM;QAC7B,QAAQ,EAAE,KAAK;QACf,WAAW,EAAE,wCAAwC;KACtD;IACD,QAAQ,EAAE;QACR,QAAQ,EAAE,iCAAY,CAAC,MAAM;QAC7B,QAAQ,EAAE,IAAI;QACd,WAAW,EACT,+DAA+D;QACjE,UAAU,EAAE;YACV;gBACE,QAAQ,EAAE,uCAAkB,CAAC,QAAQ;gBACrC,OAAO,EAAE,sBAAsB;aAChC;YACD;gBACE,QAAQ,EAAE,uCAAkB,CAAC,WAAW;gBACxC,KAAK,EAAE,EAAE,GAAG,EAAE,CAAC,EAAE,GAAG,EAAE,IAAI,EAAE;gBAC5B,OAAO,EAAE,qCAAqC;aAC/C;SACF;KACF;IACD,MAAM,EAAE;QACN,QAAQ,EAAE,iCAAY,CAAC,MAAM;QAC7B,QAAQ,EAAE,IAAI;QACd,WAAW,EAAE,8CAA8C;QAC3D,UAAU,EAAE;YACV;gBACE,QAAQ,EAAE,uCAAkB,CAAC,QAAQ;gBACrC,OAAO,EAAE,oBAAoB;aAC9B;YACD;gBACE,QAAQ,EAAE,uCAAkB,CAAC,aAAa;gBAC1C,KAAK,EAAE,4BAA4B;gBACnC,OAAO,EAAE,kDAAkD;aAC5D;SACF;KACF;IACD,SAAS,EAAE;QACT,QAAQ,EAAE,iCAAY,CAAC,MAAM;QAC7B,QAAQ,EAAE,IAAI;QACd,WAAW,EAAE,4CAA4C;QACzD,UAAU,EAAE;YACV;gBACE,QAAQ,EAAE,uCAAkB,CAAC,QAAQ;gBACrC,OAAO,EAAE,uBAAuB;aACjC;YACD;gBACE,QAAQ,EAAE,uCAAkB,CAAC,aAAa;gBAC1C,KAAK,EAAE,sBAAsB;gBAC7B,OAAO,EAAE,2CAA2C;aACrD;SACF;KACF;IACD,QAAQ,EAAE;QACR,QAAQ,EAAE,iCAAY,CAAC,MAAM;QAC7B,QAAQ,EAAE,IAAI;QACd,WAAW,EAAE,4CAA4C;QACzD,UAAU,EAAE;YACV;gBACE,QAAQ,EAAE,uCAAkB,CAAC,QAAQ;gBACrC,OAAO,EAAE,sBAAsB;aAChC;YACD;gBACE,QAAQ,EAAE,uCAAkB,CAAC,aAAa;gBAC1C,KAAK,EAAE,6BAA6B;gBACpC,OAAO,EAAE,kDAAkD;aAC5D;SACF;KACF;IACD,gBAAgB,EAAE;QAChB,QAAQ,EAAE,iCAAY,CAAC,KAAK;QAC5B,QAAQ,EAAE,KAAK;QACf,WAAW,EAAE,iDAAiD;KAC/D;IACD,qBAAqB,EAAE;QACrB,QAAQ,EAAE,iCAAY,CAAC,KAAK;QAC5B,QAAQ,EAAE,KAAK;QACf,WAAW,EAAE,uDAAuD;KACrE;IACD,OAAO,EAAE;QACP,QAAQ,EAAE,iCAAY,CAAC,KAAK;QAC5B,QAAQ,EAAE,KAAK;QACf,WAAW,EAAE,oCAAoC;KAClD;IACD,YAAY,EAAE;QACZ,QAAQ,EAAE,iCAAY,CAAC,KAAK;QAC5B,QAAQ,EAAE,KAAK;QACf,WAAW,EAAE,yCAAyC;KACvD;CACF,CAAC;AAEF,gFAAgF;AAChF,2BAA2B;AAC3B,gFAAgF;AAEhF;;GAEG;AACU,QAAA,qCAAqC,GAAc;IAC9D,YAAY,EACV,qFAAqF;IACvF,OAAO,EAAE,YAAY;IACrB,UAAU,EAAE;QACV,GAAG,iBAAiB;KACrB;IACD,QAAQ,EAAE;QACR,MAAM;QACN,kBAAkB;QAClB,UAAU;QACV,QAAQ;QACR,WAAW;QACX,UAAU;KACX;IACD,QAAQ,EAAE;QACR,aAAa;QACb,kBAAkB;QAClB,uBAAuB;QACvB,SAAS;QACT,cAAc;KACf;IACD,UAAU,EAAE,EAAE;IACd,mBAAmB,EAAE,EAAE;IACvB,eAAe,EAAE;QACf;YACE,QAAQ,EAAE,MAAM;YAChB,KAAK,EAAE;gBACL;oBACE,QAAQ,EAAE,uCAAkB,CAAC,QAAQ;oBACrC,OAAO,EAAE,sCAAsC;iBAChD;aACF;SACF;QACD;YACE,QAAQ,EAAE,kBAAkB;YAC5B,KAAK,EAAE;gBACL;oBACE,QAAQ,EAAE,uCAAkB,CAAC,QAAQ;oBACrC,OAAO,EAAE,gCAAgC;iBAC1C;aACF;SACF;QACD;YACE,QAAQ,EAAE,UAAU;YACpB,KAAK,EAAE;gBACL;oBACE,QAAQ,EAAE,uCAAkB,CAAC,QAAQ;oBACrC,OAAO,EAAE,sBAAsB;iBAChC;aACF;SACF;QACD;YACE,QAAQ,EAAE,QAAQ;YAClB,KAAK,EAAE;gBACL;oBACE,QAAQ,EAAE,uCAAkB,CAAC,QAAQ;oBACrC,OAAO,EAAE,oBAAoB;iBAC9B;aACF;SACF;QACD;YACE,QAAQ,EAAE,WAAW;YACrB,KAAK,EAAE;gBACL;oBACE,QAAQ,EAAE,uCAAkB,CAAC,QAAQ;oBACrC,OAAO,EAAE,uBAAuB;iBACjC;aACF;SACF;QACD;YACE,QAAQ,EAAE,UAAU;YACpB,KAAK,EAAE;gBACL;oBACE,QAAQ,EAAE,uCAAkB,CAAC,QAAQ;oBACrC,OAAO,EAAE,sBAAsB;iBAChC;aACF;SACF;KACF;CACF,CAAC;AAEF;;GAEG;AACU,QAAA,qCAAqC,GAAc;IAC9D,YAAY,EACV,qFAAqF;IACvF,OAAO,EAAE,YAAY;IACrB,UAAU,EAAE;QACV,GAAG,iBAAiB;KACrB;IACD,QAAQ,EAAE;QACR,MAAM;QACN,kBAAkB;QAClB,UAAU;QACV,QAAQ;QACR,WAAW;QACX,UAAU;KACX;IACD,QAAQ,EAAE;QACR,aAAa;QACb,kBAAkB;QAClB,uBAAuB;QACvB,SAAS;QACT,cAAc;KACf;IACD,UAAU,EAAE,EAAE;IACd,mBAAmB,EAAE,EAAE;IACvB,eAAe,EAAE;QACf;YACE,QAAQ,EAAE,MAAM;YAChB,KAAK,EAAE;gBACL;oBACE,QAAQ,EAAE,uCAAkB,CAAC,QAAQ;oBACrC,OAAO,EAAE,sCAAsC;iBAChD;aACF;SACF;QACD;YACE,QAAQ,EAAE,kBAAkB;YAC5B,KAAK,EAAE;gBACL;oBACE,QAAQ,EAAE,uCAAkB,CAAC,QAAQ;oBACrC,OAAO,EAAE,gCAAgC;iBAC1C;aACF;SACF;QACD;YACE,QAAQ,EAAE,UAAU;YACpB,KAAK,EAAE;gBACL;oBACE,QAAQ,EAAE,uCAAkB,CAAC,QAAQ;oBACrC,OAAO,EAAE,sBAAsB;iBAChC;aACF;SACF;QACD;YACE,QAAQ,EAAE,QAAQ;YAClB,KAAK,EAAE;gBACL;oBACE,QAAQ,EAAE,uCAAkB,CAAC,QAAQ;oBACrC,OAAO,EAAE,oBAAoB;iBAC9B;aACF;SACF;QACD;YACE,QAAQ,EAAE,WAAW;YACrB,KAAK,EAAE;gBACL;oBACE,QAAQ,EAAE,uCAAkB,CAAC,QAAQ;oBACrC,OAAO,EAAE,uBAAuB;iBACjC;aACF;SACF;QACD;YACE,QAAQ,EAAE,UAAU;YACpB,KAAK,EAAE;gBACL;oBACE,QAAQ,EAAE,uCAAkB,CAAC,QAAQ;oBACrC,OAAO,EAAE,sBAAsB;iBAChC;aACF;SACF;KACF;CACF,CAAC;AAEF,gFAAgF;AAChF,yBAAyB;AACzB,gFAAgF;AAEhF;;GAEG;AACU,QAAA,sCAAsC,GAAkB;IACnE,OAAO,EAAE,YAAY;IACrB,MAAM,EAAE,6CAAqC;IAC7C,YAAY,EAAE,wCAAmB,CAAC,MAAM;IACxC,WAAW,EAAE,YAAY;IACzB,eAAe,EAAE,SAAS;IAC1B,UAAU,EAAE,SAAS;IACrB,eAAe,EAAE,EAAE;IACnB,cAAc,EAAE,oDAAoD;IACpE,SAAS,EAAE;QACT;YACE,UAAU,EAAE,OAAO;YACnB,WAAW,EACT,6DAA6D;YAC/D,QAAQ,EAAE,KAAK;SAChB;KACF;CACF,CAAC;AAEF;;GAEG;AACU,QAAA,sCAAsC,GAAkB;IACnE,OAAO,EAAE,YAAY;IACrB,MAAM,EAAE,6CAAqC;IAC7C,YAAY,EAAE,wCAAmB,CAAC,WAAW;IAC7C,WAAW,EAAE,YAAY;IACzB,eAAe,EAAE,SAAS;IAC1B,UAAU,EAAE,SAAS;IACrB,eAAe,EAAE,EAAE;IACnB,cAAc,EAAE,oDAAoD;IACpE,SAAS,EAAE;QACT;YACE,UAAU,EAAE,OAAO;YACnB,WAAW,EAAE,uDAAuD;YACpE,QAAQ,EAAE,KAAK;SAChB;KACF;CACF,CAAC;AAEF;;GAEG;AACU,QAAA,gCAAgC,GAAoB;IAC/D,8CAAsC;IACtC,8CAAsC;CACvC,CAAC;AAEF;;GAEG;AACU,QAAA,wBAAwB,GACnC,qFAAqF,CAAC","sourcesContent":["/**\n * API schemas for Azure Virtual Network Manager Security Admin Rules across all supported versions\n *\n * This file defines the complete API schemas for Microsoft.Network/networkManagers/securityAdminConfigurations/ruleCollections/rules\n * across all supported API versions. The schemas are used by the AzapiResource\n * framework for validation, transformation, and version management.\n */\n\nimport {\n  ApiSchema,\n  PropertyDefinition,\n  PropertyType,\n  ValidationRuleType,\n  VersionConfig,\n  VersionSupportLevel,\n} from \"../../core-azure/lib/version-manager/interfaces/version-interfaces\";\n\n// =============================================================================\n// TYPESCRIPT INTERFACES FOR NESTED OBJECTS\n// =============================================================================\n\n/**\n * Address prefix item for sources or destinations\n */\nexport interface AddressPrefixItem {\n  readonly addressPrefix?: string;\n  readonly addressPrefixType?: \"IPPrefix\" | \"ServiceTag\";\n}\n\n// =============================================================================\n// COMMON PROPERTY DEFINITIONS\n// =============================================================================\n\n/**\n * Common property definitions shared across all Security Admin Rule versions\n */\nconst COMMON_PROPERTIES: { [key: string]: PropertyDefinition } = {\n  name: {\n    dataType: PropertyType.STRING,\n    required: true,\n    description: \"Name of the security admin rule\",\n    validation: [\n      {\n        ruleType: ValidationRuleType.REQUIRED,\n        message: \"Security admin rule name is required\",\n      },\n      {\n        ruleType: ValidationRuleType.PATTERN_MATCH,\n        value: \"^[a-zA-Z0-9][a-zA-Z0-9._-]{0,62}[a-zA-Z0-9_]$\",\n        message:\n          \"Security admin rule name must be 2-64 chars, alphanumeric, periods, underscores, hyphens\",\n      },\n    ],\n  },\n  ruleCollectionId: {\n    dataType: PropertyType.STRING,\n    required: true,\n    description: \"Resource ID of the parent Rule Collection\",\n    validation: [\n      {\n        ruleType: ValidationRuleType.REQUIRED,\n        message: \"Rule Collection ID is required\",\n      },\n    ],\n  },\n  description: {\n    dataType: PropertyType.STRING,\n    required: false,\n    description: \"Description of the security admin rule\",\n  },\n  priority: {\n    dataType: PropertyType.NUMBER,\n    required: true,\n    description:\n      \"Priority of the rule (1-4096, lower number = higher priority)\",\n    validation: [\n      {\n        ruleType: ValidationRuleType.REQUIRED,\n        message: \"Priority is required\",\n      },\n      {\n        ruleType: ValidationRuleType.VALUE_RANGE,\n        value: { min: 1, max: 4096 },\n        message: \"Priority must be between 1 and 4096\",\n      },\n    ],\n  },\n  action: {\n    dataType: PropertyType.STRING,\n    required: true,\n    description: \"Action to take (Allow, Deny, or AlwaysAllow)\",\n    validation: [\n      {\n        ruleType: ValidationRuleType.REQUIRED,\n        message: \"Action is required\",\n      },\n      {\n        ruleType: ValidationRuleType.PATTERN_MATCH,\n        value: \"^(Allow|Deny|AlwaysAllow)$\",\n        message: \"Action must be 'Allow', 'Deny', or 'AlwaysAllow'\",\n      },\n    ],\n  },\n  direction: {\n    dataType: PropertyType.STRING,\n    required: true,\n    description: \"Direction of traffic (Inbound or Outbound)\",\n    validation: [\n      {\n        ruleType: ValidationRuleType.REQUIRED,\n        message: \"Direction is required\",\n      },\n      {\n        ruleType: ValidationRuleType.PATTERN_MATCH,\n        value: \"^(Inbound|Outbound)$\",\n        message: \"Direction must be 'Inbound' or 'Outbound'\",\n      },\n    ],\n  },\n  protocol: {\n    dataType: PropertyType.STRING,\n    required: true,\n    description: \"Protocol (Tcp, Udp, Icmp, Esp, Ah, or Any)\",\n    validation: [\n      {\n        ruleType: ValidationRuleType.REQUIRED,\n        message: \"Protocol is required\",\n      },\n      {\n        ruleType: ValidationRuleType.PATTERN_MATCH,\n        value: \"^(Tcp|Udp|Icmp|Esp|Ah|Any)$\",\n        message: \"Protocol must be Tcp, Udp, Icmp, Esp, Ah, or Any\",\n      },\n    ],\n  },\n  sourcePortRanges: {\n    dataType: PropertyType.ARRAY,\n    required: false,\n    description: \"Source port ranges (e.g., ['*'], ['80', '443'])\",\n  },\n  destinationPortRanges: {\n    dataType: PropertyType.ARRAY,\n    required: false,\n    description: \"Destination port ranges (e.g., ['*'], ['22', '3389'])\",\n  },\n  sources: {\n    dataType: PropertyType.ARRAY,\n    required: false,\n    description: \"Source addresses or network groups\",\n  },\n  destinations: {\n    dataType: PropertyType.ARRAY,\n    required: false,\n    description: \"Destination addresses or network groups\",\n  },\n};\n\n// =============================================================================\n// VERSION-SPECIFIC SCHEMAS\n// =============================================================================\n\n/**\n * API Schema for Security Admin Rule version 2024-05-01\n */\nexport const SECURITY_ADMIN_RULE_SCHEMA_2024_05_01: ApiSchema = {\n  resourceType:\n    \"Microsoft.Network/networkManagers/securityAdminConfigurations/ruleCollections/rules\",\n  version: \"2024-05-01\",\n  properties: {\n    ...COMMON_PROPERTIES,\n  },\n  required: [\n    \"name\",\n    \"ruleCollectionId\",\n    \"priority\",\n    \"action\",\n    \"direction\",\n    \"protocol\",\n  ],\n  optional: [\n    \"description\",\n    \"sourcePortRanges\",\n    \"destinationPortRanges\",\n    \"sources\",\n    \"destinations\",\n  ],\n  deprecated: [],\n  transformationRules: {},\n  validationRules: [\n    {\n      property: \"name\",\n      rules: [\n        {\n          ruleType: ValidationRuleType.REQUIRED,\n          message: \"Security admin rule name is required\",\n        },\n      ],\n    },\n    {\n      property: \"ruleCollectionId\",\n      rules: [\n        {\n          ruleType: ValidationRuleType.REQUIRED,\n          message: \"Rule Collection ID is required\",\n        },\n      ],\n    },\n    {\n      property: \"priority\",\n      rules: [\n        {\n          ruleType: ValidationRuleType.REQUIRED,\n          message: \"Priority is required\",\n        },\n      ],\n    },\n    {\n      property: \"action\",\n      rules: [\n        {\n          ruleType: ValidationRuleType.REQUIRED,\n          message: \"Action is required\",\n        },\n      ],\n    },\n    {\n      property: \"direction\",\n      rules: [\n        {\n          ruleType: ValidationRuleType.REQUIRED,\n          message: \"Direction is required\",\n        },\n      ],\n    },\n    {\n      property: \"protocol\",\n      rules: [\n        {\n          ruleType: ValidationRuleType.REQUIRED,\n          message: \"Protocol is required\",\n        },\n      ],\n    },\n  ],\n};\n\n/**\n * API Schema for Security Admin Rule version 2023-11-01\n */\nexport const SECURITY_ADMIN_RULE_SCHEMA_2023_11_01: ApiSchema = {\n  resourceType:\n    \"Microsoft.Network/networkManagers/securityAdminConfigurations/ruleCollections/rules\",\n  version: \"2023-11-01\",\n  properties: {\n    ...COMMON_PROPERTIES,\n  },\n  required: [\n    \"name\",\n    \"ruleCollectionId\",\n    \"priority\",\n    \"action\",\n    \"direction\",\n    \"protocol\",\n  ],\n  optional: [\n    \"description\",\n    \"sourcePortRanges\",\n    \"destinationPortRanges\",\n    \"sources\",\n    \"destinations\",\n  ],\n  deprecated: [],\n  transformationRules: {},\n  validationRules: [\n    {\n      property: \"name\",\n      rules: [\n        {\n          ruleType: ValidationRuleType.REQUIRED,\n          message: \"Security admin rule name is required\",\n        },\n      ],\n    },\n    {\n      property: \"ruleCollectionId\",\n      rules: [\n        {\n          ruleType: ValidationRuleType.REQUIRED,\n          message: \"Rule Collection ID is required\",\n        },\n      ],\n    },\n    {\n      property: \"priority\",\n      rules: [\n        {\n          ruleType: ValidationRuleType.REQUIRED,\n          message: \"Priority is required\",\n        },\n      ],\n    },\n    {\n      property: \"action\",\n      rules: [\n        {\n          ruleType: ValidationRuleType.REQUIRED,\n          message: \"Action is required\",\n        },\n      ],\n    },\n    {\n      property: \"direction\",\n      rules: [\n        {\n          ruleType: ValidationRuleType.REQUIRED,\n          message: \"Direction is required\",\n        },\n      ],\n    },\n    {\n      property: \"protocol\",\n      rules: [\n        {\n          ruleType: ValidationRuleType.REQUIRED,\n          message: \"Protocol is required\",\n        },\n      ],\n    },\n  ],\n};\n\n// =============================================================================\n// VERSION CONFIGURATIONS\n// =============================================================================\n\n/**\n * Version configuration for Security Admin Rule 2024-05-01\n */\nexport const SECURITY_ADMIN_RULE_VERSION_2024_05_01: VersionConfig = {\n  version: \"2024-05-01\",\n  schema: SECURITY_ADMIN_RULE_SCHEMA_2024_05_01,\n  supportLevel: VersionSupportLevel.ACTIVE,\n  releaseDate: \"2024-05-01\",\n  deprecationDate: undefined,\n  sunsetDate: undefined,\n  breakingChanges: [],\n  migrationGuide: \"/docs/virtual-network-manager/migration-2024-05-01\",\n  changeLog: [\n    {\n      changeType: \"added\",\n      description:\n        \"Latest stable release with full security admin rule support\",\n      breaking: false,\n    },\n  ],\n};\n\n/**\n * Version configuration for Security Admin Rule 2023-11-01\n */\nexport const SECURITY_ADMIN_RULE_VERSION_2023_11_01: VersionConfig = {\n  version: \"2023-11-01\",\n  schema: SECURITY_ADMIN_RULE_SCHEMA_2023_11_01,\n  supportLevel: VersionSupportLevel.MAINTENANCE,\n  releaseDate: \"2023-11-01\",\n  deprecationDate: undefined,\n  sunsetDate: undefined,\n  breakingChanges: [],\n  migrationGuide: \"/docs/virtual-network-manager/migration-2023-11-01\",\n  changeLog: [\n    {\n      changeType: \"added\",\n      description: \"Stable release with core security admin rule features\",\n      breaking: false,\n    },\n  ],\n};\n\n/**\n * All supported Security Admin Rule versions for registration\n */\nexport const ALL_SECURITY_ADMIN_RULE_VERSIONS: VersionConfig[] = [\n  SECURITY_ADMIN_RULE_VERSION_2024_05_01,\n  SECURITY_ADMIN_RULE_VERSION_2023_11_01,\n];\n\n/**\n * Resource type constant\n */\nexport const SECURITY_ADMIN_RULE_TYPE =\n  \"Microsoft.Network/networkManagers/securityAdminConfigurations/ruleCollections/rules\";\n"]}
@@ -0,0 +1,221 @@
1
+ /**
2
+ * Azure Virtual Network Manager Security Admin Rule implementation using AzapiResource framework
3
+ *
4
+ * This class provides a unified implementation for individual security admin rules that define
5
+ * high-priority security policies. These rules are evaluated BEFORE traditional NSGs and can
6
+ * enforce organization-wide security requirements.
7
+ *
8
+ * Supported API Versions:
9
+ * - 2023-11-01 (Maintenance)
10
+ * - 2024-05-01 (Active, Latest)
11
+ *
12
+ * Features:
13
+ * - Automatic latest version resolution when no version is specified
14
+ * - Explicit version pinning for stability requirements
15
+ * - Schema-driven validation and transformation
16
+ * - Three action types: Allow, Deny, AlwaysAllow
17
+ * - Full backward compatibility
18
+ * - JSII compliance for multi-language support
19
+ */
20
+ import * as cdktf from "cdktf";
21
+ import { Construct } from "constructs";
22
+ import { AddressPrefixItem } from "./security-admin-rule-schemas";
23
+ import { AzapiResource, AzapiResourceProps } from "../../core-azure/lib/azapi/azapi-resource";
24
+ import { ApiSchema } from "../../core-azure/lib/version-manager/interfaces/version-interfaces";
25
+ /**
26
+ * Properties for the Azure Virtual Network Manager Security Admin Rule
27
+ *
28
+ * Extends AzapiResourceProps with Security Admin Rule specific properties
29
+ */
30
+ export interface SecurityAdminRuleProps extends AzapiResourceProps {
31
+ /**
32
+ * Resource ID of the parent Rule Collection
33
+ * @example "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg/providers/Microsoft.Network/networkManagers/vnm/securityAdminConfigurations/config/ruleCollections/collection"
34
+ */
35
+ readonly ruleCollectionId: string;
36
+ /**
37
+ * Optional description of the security admin rule
38
+ * @example "Block SSH access from internet"
39
+ */
40
+ readonly description?: string;
41
+ /**
42
+ * Priority of the rule (1-4096, lower number = higher priority)
43
+ * Rules with lower priority numbers are evaluated first
44
+ * @example 100
45
+ */
46
+ readonly priority: number;
47
+ /**
48
+ * Action to take when the rule matches
49
+ * - Allow: Allow traffic (NSG can still deny)
50
+ * - Deny: Deny traffic (stops evaluation)
51
+ * - AlwaysAllow: Force allow (overrides NSG denies)
52
+ * @example "Deny"
53
+ * @example "AlwaysAllow"
54
+ */
55
+ readonly action: "Allow" | "Deny" | "AlwaysAllow";
56
+ /**
57
+ * Direction of traffic this rule applies to
58
+ * @example "Inbound"
59
+ * @example "Outbound"
60
+ */
61
+ readonly direction: "Inbound" | "Outbound";
62
+ /**
63
+ * Protocol this rule applies to
64
+ * @example "Tcp"
65
+ * @example "Any"
66
+ */
67
+ readonly protocol: "Tcp" | "Udp" | "Icmp" | "Esp" | "Ah" | "Any";
68
+ /**
69
+ * Source port ranges
70
+ * Use ["*"] for all ports or specify ranges like ["80", "443", "8000-8999"]
71
+ * @default ["*"]
72
+ * @example ["*"]
73
+ * @example ["80", "443"]
74
+ */
75
+ readonly sourcePortRanges?: string[];
76
+ /**
77
+ * Destination port ranges
78
+ * Use ["*"] for all ports or specify ranges
79
+ * @default ["*"]
80
+ * @example ["22"]
81
+ * @example ["3389", "5985-5986"]
82
+ */
83
+ readonly destinationPortRanges?: string[];
84
+ /**
85
+ * Source addresses or network groups
86
+ * @example [{ addressPrefix: "*", addressPrefixType: "IPPrefix" }]
87
+ * @example [{ addressPrefix: "10.0.0.0/8", addressPrefixType: "IPPrefix" }]
88
+ */
89
+ readonly sources?: AddressPrefixItem[];
90
+ /**
91
+ * Destination addresses or network groups
92
+ * @example [{ addressPrefix: "*", addressPrefixType: "IPPrefix" }]
93
+ * @example [{ addressPrefix: "Internet", addressPrefixType: "ServiceTag" }]
94
+ */
95
+ readonly destinations?: AddressPrefixItem[];
96
+ /**
97
+ * The lifecycle rules to ignore changes
98
+ * @example ["tags"]
99
+ */
100
+ readonly ignoreChanges?: string[];
101
+ }
102
+ /**
103
+ * Properties for Security Admin Rule body
104
+ */
105
+ export interface SecurityAdminRuleProperties {
106
+ readonly description?: string;
107
+ readonly priority: number;
108
+ readonly action: string;
109
+ readonly direction: string;
110
+ readonly protocol: string;
111
+ readonly sourcePortRanges?: string[];
112
+ readonly destinationPortRanges?: string[];
113
+ readonly sources?: AddressPrefixItem[];
114
+ readonly destinations?: AddressPrefixItem[];
115
+ }
116
+ /**
117
+ * The resource body interface for Azure Security Admin Rule API calls
118
+ */
119
+ export interface SecurityAdminRuleBody {
120
+ readonly kind: "Custom";
121
+ readonly properties: SecurityAdminRuleProperties;
122
+ }
123
+ /**
124
+ * Azure Virtual Network Manager Security Admin Rule implementation
125
+ *
126
+ * Security admin rules define high-priority security policies that are evaluated BEFORE
127
+ * traditional Network Security Groups (NSGs). This enables centralized security enforcement
128
+ * that cannot be overridden by individual teams.
129
+ *
130
+ * Key concepts:
131
+ * - Priority: Lower numbers = higher priority (evaluated first)
132
+ * - Allow: Permits traffic, but NSG can still deny it
133
+ * - Deny: Blocks traffic immediately, no further evaluation
134
+ * - AlwaysAllow: Forces traffic to be allowed, overriding NSG denies
135
+ *
136
+ * @example
137
+ * // Block SSH from internet:
138
+ * const blockSSH = new SecurityAdminRule(this, "block-ssh", {
139
+ * name: "block-ssh-from-internet",
140
+ * ruleCollectionId: ruleCollection.id,
141
+ * description: "Block SSH access from internet",
142
+ * priority: 100,
143
+ * action: "Deny",
144
+ * direction: "Inbound",
145
+ * protocol: "Tcp",
146
+ * destinationPortRanges: ["22"],
147
+ * sources: [{ addressPrefix: "Internet", addressPrefixType: "ServiceTag" }],
148
+ * destinations: [{ addressPrefix: "*", addressPrefixType: "IPPrefix" }]
149
+ * });
150
+ *
151
+ * @example
152
+ * // Always allow monitoring traffic:
153
+ * const allowMonitoring = new SecurityAdminRule(this, "allow-monitoring", {
154
+ * name: "always-allow-monitoring",
155
+ * ruleCollectionId: ruleCollection.id,
156
+ * description: "Always allow traffic from monitoring systems",
157
+ * priority: 50,
158
+ * action: "AlwaysAllow",
159
+ * direction: "Inbound",
160
+ * protocol: "Any",
161
+ * sources: [{ addressPrefix: "10.0.0.0/24", addressPrefixType: "IPPrefix" }],
162
+ * destinations: [{ addressPrefix: "*", addressPrefixType: "IPPrefix" }]
163
+ * });
164
+ *
165
+ * @stability stable
166
+ */
167
+ export declare class SecurityAdminRule extends AzapiResource {
168
+ /**
169
+ * The input properties for this Security Admin Rule instance
170
+ */
171
+ readonly props: SecurityAdminRuleProps;
172
+ readonly idOutput: cdktf.TerraformOutput;
173
+ readonly nameOutput: cdktf.TerraformOutput;
174
+ readonly provisioningStateOutput: cdktf.TerraformOutput;
175
+ readonly resourceName: string;
176
+ /**
177
+ * Creates a new Azure Virtual Network Manager Security Admin Rule using the AzapiResource framework
178
+ *
179
+ * @param scope - The scope in which to define this construct
180
+ * @param id - The unique identifier for this instance
181
+ * @param props - Configuration properties for the Security Admin Rule
182
+ */
183
+ constructor(scope: Construct, id: string, props: SecurityAdminRuleProps);
184
+ /**
185
+ * Resolves the parent resource ID for the Security Admin Rule
186
+ * Security Admin Rules are scoped to Rule Collections
187
+ */
188
+ protected resolveParentId(props: any): string;
189
+ /**
190
+ * Gets the default API version to use when no explicit version is specified
191
+ */
192
+ protected defaultVersion(): string;
193
+ /**
194
+ * Gets the Azure resource type for Security Admin Rules
195
+ */
196
+ protected resourceType(): string;
197
+ /**
198
+ * Gets the API schema for the resolved version
199
+ */
200
+ protected apiSchema(): ApiSchema;
201
+ /**
202
+ * Creates the resource body for the Azure API call
203
+ */
204
+ protected createResourceBody(props: any): any;
205
+ /**
206
+ * Get the provisioning state of the Security Admin Rule
207
+ */
208
+ get provisioningState(): string;
209
+ /**
210
+ * Get the priority of the rule
211
+ */
212
+ get rulePriority(): number;
213
+ /**
214
+ * Get the action of the rule
215
+ */
216
+ get ruleAction(): "Allow" | "Deny" | "AlwaysAllow";
217
+ /**
218
+ * Applies ignore changes lifecycle rules if specified in props
219
+ */
220
+ private _applyIgnoreChanges;
221
+ }