@microsoft/terraform-cdk-constructs 1.3.1 → 1.5.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +32238 -27310
- package/API.md +43714 -35942
- package/lib/azure-actiongroup/lib/action-group.js +1 -1
- package/lib/azure-activitylogalert/lib/activity-log-alert.js +1 -1
- package/lib/azure-aks/lib/aks-cluster.js +1 -1
- package/lib/azure-diagnosticsettings/lib/diagnostic-settings.js +1 -1
- package/lib/azure-dnsforwardingruleset/lib/dns-forwarding-ruleset.js +1 -1
- package/lib/azure-dnsforwardingruleset/lib/forwarding-rule.js +1 -1
- package/lib/azure-dnsforwardingruleset/lib/virtual-network-link.js +1 -1
- package/lib/azure-dnsresolver/lib/dns-resolver.js +1 -1
- package/lib/azure-dnsresolver/lib/inbound-endpoint.js +1 -1
- package/lib/azure-dnsresolver/lib/outbound-endpoint.js +1 -1
- package/lib/azure-dnszone/lib/dns-zone.js +1 -1
- package/lib/azure-metricalert/lib/metric-alert.js +1 -1
- package/lib/azure-networkinterface/lib/network-interface.js +1 -1
- package/lib/azure-networksecuritygroup/lib/network-security-group.js +1 -1
- package/lib/azure-policyassignment/lib/policy-assignment.js +1 -1
- package/lib/azure-policydefinition/lib/policy-definition.js +1 -1
- package/lib/azure-privatednszone/lib/private-dns-zone.js +1 -1
- package/lib/azure-privatednszonelink/lib/private-dns-zone-link.js +1 -1
- package/lib/azure-publicipaddress/lib/public-ip-address.js +1 -1
- package/lib/azure-resourcegroup/lib/resource-group.js +1 -1
- package/lib/azure-roleassignment/lib/role-assignment.js +1 -1
- package/lib/azure-roledefinition/lib/role-definition.js +1 -1
- package/lib/azure-storageaccount/lib/storage-account.js +1 -1
- package/lib/azure-subnet/lib/subnet.js +1 -1
- package/lib/azure-virtualmachine/lib/virtual-machine.js +1 -1
- package/lib/azure-virtualnetwork/lib/virtual-network.js +1 -1
- package/lib/azure-virtualnetworkgateway/index.d.ts +4 -0
- package/lib/azure-virtualnetworkgateway/index.js +21 -0
- package/lib/azure-virtualnetworkgateway/lib/index.d.ts +5 -0
- package/lib/azure-virtualnetworkgateway/lib/index.js +22 -0
- package/lib/azure-virtualnetworkgateway/lib/virtual-network-gateway-schemas.d.ts +32 -0
- package/lib/azure-virtualnetworkgateway/lib/virtual-network-gateway-schemas.js +298 -0
- package/lib/azure-virtualnetworkgateway/lib/virtual-network-gateway.d.ts +368 -0
- package/lib/azure-virtualnetworkgateway/lib/virtual-network-gateway.js +285 -0
- package/lib/azure-virtualnetworkgateway/test/virtual-network-gateway.integ.d.ts +12 -0
- package/lib/azure-virtualnetworkgateway/test/virtual-network-gateway.integ.js +129 -0
- package/lib/azure-virtualnetworkgateway/test/virtual-network-gateway.spec.d.ts +8 -0
- package/lib/azure-virtualnetworkgateway/test/virtual-network-gateway.spec.js +691 -0
- package/lib/azure-virtualnetworkmanager/lib/connectivity-configuration.js +1 -1
- package/lib/azure-virtualnetworkmanager/lib/index.d.ts +5 -0
- package/lib/azure-virtualnetworkmanager/lib/index.js +6 -1
- package/lib/azure-virtualnetworkmanager/lib/ipam-pool-schemas.d.ts +24 -0
- package/lib/azure-virtualnetworkmanager/lib/ipam-pool-schemas.js +169 -0
- package/lib/azure-virtualnetworkmanager/lib/ipam-pool-static-cidr-schemas.d.ts +32 -0
- package/lib/azure-virtualnetworkmanager/lib/ipam-pool-static-cidr-schemas.js +206 -0
- package/lib/azure-virtualnetworkmanager/lib/ipam-pool-static-cidr.d.ts +170 -0
- package/lib/azure-virtualnetworkmanager/lib/ipam-pool-static-cidr.js +214 -0
- package/lib/azure-virtualnetworkmanager/lib/ipam-pool.d.ts +175 -0
- package/lib/azure-virtualnetworkmanager/lib/ipam-pool.js +206 -0
- package/lib/azure-virtualnetworkmanager/lib/network-group-static-member.js +1 -1
- package/lib/azure-virtualnetworkmanager/lib/network-group.js +1 -1
- package/lib/azure-virtualnetworkmanager/lib/security-admin-configuration.js +1 -1
- package/lib/azure-virtualnetworkmanager/lib/security-admin-rule-collection.js +1 -1
- package/lib/azure-virtualnetworkmanager/lib/security-admin-rule.js +1 -1
- package/lib/azure-virtualnetworkmanager/lib/utils/cidr-validator.d.ts +225 -0
- package/lib/azure-virtualnetworkmanager/lib/utils/cidr-validator.js +389 -0
- package/lib/azure-virtualnetworkmanager/lib/virtual-network-manager.d.ts +56 -0
- package/lib/azure-virtualnetworkmanager/lib/virtual-network-manager.js +29 -2
- package/lib/azure-virtualnetworkmanager/test/cidr-validator.spec.d.ts +6 -0
- package/lib/azure-virtualnetworkmanager/test/cidr-validator.spec.js +292 -0
- package/lib/azure-virtualnetworkmanager/test/ipam-pool-static-cidr.spec.d.ts +6 -0
- package/lib/azure-virtualnetworkmanager/test/ipam-pool-static-cidr.spec.js +430 -0
- package/lib/azure-virtualnetworkmanager/test/ipam-pool.spec.d.ts +6 -0
- package/lib/azure-virtualnetworkmanager/test/ipam-pool.spec.js +372 -0
- package/lib/azure-virtualnetworkmanager/test/virtual-network-manager.integ.d.ts +2 -1
- package/lib/azure-virtualnetworkmanager/test/virtual-network-manager.integ.js +30 -3
- package/lib/azure-virtualnetworkmanager/test/virtual-network-manager.spec.js +105 -1
- package/lib/azure-vmss/lib/virtual-machine-scale-set.js +1 -1
- package/lib/core-azure/lib/azapi/azapi-resource.js +2 -2
- package/lib/core-azure/lib/azapi/providers-azapi/data-azapi-client-config/index.js +2 -2
- package/lib/core-azure/lib/azapi/providers-azapi/data-azapi-resource/index.js +5 -5
- package/lib/core-azure/lib/azapi/providers-azapi/provider/index.js +1 -1
- package/lib/core-azure/lib/azapi/providers-azapi/resource/index.js +5 -5
- package/lib/core-azure/lib/azapi/providers-azapi/resource-action/index.js +3 -3
- package/lib/core-azure/lib/azapi/providers-azapi/update-resource/index.js +3 -3
- package/lib/core-azure/lib/azapi/schema-mapper/schema-mapper.js +1 -1
- package/lib/core-azure/lib/version-manager/api-version-manager.js +1 -1
- package/lib/core-azure/lib/version-manager/interfaces/version-interfaces.js +7 -7
- package/lib/index.d.ts +2 -0
- package/lib/index.js +4 -2
- package/lib/testing/index.js +2 -2
- package/lib/testing/lib/cleanup.js +1 -1
- package/lib/testing/lib/metadata.js +1 -1
- package/package.json +1 -1
|
@@ -0,0 +1,206 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var _a;
|
|
3
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
4
|
+
exports.IpamPool = void 0;
|
|
5
|
+
const JSII_RTTI_SYMBOL_1 = Symbol.for("jsii.rtti");
|
|
6
|
+
/**
|
|
7
|
+
* Azure Virtual Network Manager IPAM Pool implementation using AzapiResource framework
|
|
8
|
+
*
|
|
9
|
+
* This class provides a unified implementation for Azure Virtual Network Manager IPAM Pools
|
|
10
|
+
* that automatically handles version management, schema validation, and property transformation
|
|
11
|
+
* across all supported API versions.
|
|
12
|
+
*
|
|
13
|
+
* Supported API Versions:
|
|
14
|
+
* - 2024-05-01 (Active, Latest)
|
|
15
|
+
*
|
|
16
|
+
* Features:
|
|
17
|
+
* - Automatic latest version resolution when no version is specified
|
|
18
|
+
* - Explicit version pinning for stability requirements
|
|
19
|
+
* - Schema-driven validation and transformation
|
|
20
|
+
* - CIDR validation and overlap detection
|
|
21
|
+
* - Hierarchical pool support
|
|
22
|
+
* - JSII compliance for multi-language support
|
|
23
|
+
*/
|
|
24
|
+
const cdktf = require("cdktf");
|
|
25
|
+
const ipam_pool_schemas_1 = require("./ipam-pool-schemas");
|
|
26
|
+
const cidr_validator_1 = require("./utils/cidr-validator");
|
|
27
|
+
const azapi_resource_1 = require("../../core-azure/lib/azapi/azapi-resource");
|
|
28
|
+
/**
|
|
29
|
+
* Azure Virtual Network Manager IPAM Pool implementation
|
|
30
|
+
*
|
|
31
|
+
* IPAM Pools provide centralized IP address management for virtual networks,
|
|
32
|
+
* enabling automatic CIDR allocation, overlap prevention, and hierarchical
|
|
33
|
+
* address space organization. They are essential for managing IP addresses
|
|
34
|
+
* at scale across multiple virtual networks and subscriptions.
|
|
35
|
+
*
|
|
36
|
+
* @example
|
|
37
|
+
* // Basic IPAM pool for production workloads:
|
|
38
|
+
* const ipamPool = new IpamPool(this, "prod-pool", {
|
|
39
|
+
* name: "production-pool",
|
|
40
|
+
* location: "eastus",
|
|
41
|
+
* networkManagerId: networkManager.id,
|
|
42
|
+
* addressPrefixes: ["10.0.0.0/8"],
|
|
43
|
+
* description: "Root IP address pool for production",
|
|
44
|
+
* displayName: "Production Pool"
|
|
45
|
+
* });
|
|
46
|
+
*
|
|
47
|
+
* @example
|
|
48
|
+
* // Hierarchical pool with parent reference:
|
|
49
|
+
* const childPool = new IpamPool(this, "eastus-pool", {
|
|
50
|
+
* name: "eastus-pool",
|
|
51
|
+
* location: "eastus",
|
|
52
|
+
* networkManagerId: networkManager.id,
|
|
53
|
+
* addressPrefixes: ["10.1.0.0/16"],
|
|
54
|
+
* parentPoolName: "production-pool",
|
|
55
|
+
* description: "East US regional pool"
|
|
56
|
+
* });
|
|
57
|
+
*
|
|
58
|
+
* @stability stable
|
|
59
|
+
*/
|
|
60
|
+
class IpamPool extends azapi_resource_1.AzapiResource {
|
|
61
|
+
/**
|
|
62
|
+
* Validates address prefixes for format and overlap
|
|
63
|
+
* Throws descriptive errors if validation fails
|
|
64
|
+
*
|
|
65
|
+
* @param prefixes - Array of CIDR blocks to validate
|
|
66
|
+
* @throws Error if validation fails
|
|
67
|
+
*/
|
|
68
|
+
static validateAddressPrefixes(prefixes) {
|
|
69
|
+
if (!prefixes || prefixes.length === 0) {
|
|
70
|
+
throw new Error("At least one address prefix is required");
|
|
71
|
+
}
|
|
72
|
+
// Validate each CIDR individually
|
|
73
|
+
prefixes.forEach((prefix, index) => {
|
|
74
|
+
if (!(0, cidr_validator_1.isValidCidr)(prefix)) {
|
|
75
|
+
throw new Error(`Invalid CIDR notation at index ${index}: ${prefix}. ` +
|
|
76
|
+
`Expected format: x.x.x.x/y where y is 0-32`);
|
|
77
|
+
}
|
|
78
|
+
});
|
|
79
|
+
// Check for overlaps within the same pool
|
|
80
|
+
for (let i = 0; i < prefixes.length; i++) {
|
|
81
|
+
for (let j = i + 1; j < prefixes.length; j++) {
|
|
82
|
+
if ((0, cidr_validator_1.cidrsOverlap)(prefixes[i], prefixes[j])) {
|
|
83
|
+
throw new Error(`Address prefixes overlap: ${prefixes[i]} and ${prefixes[j]}. ` +
|
|
84
|
+
`Each CIDR block within a pool must be non-overlapping.`);
|
|
85
|
+
}
|
|
86
|
+
}
|
|
87
|
+
}
|
|
88
|
+
}
|
|
89
|
+
/**
|
|
90
|
+
* Creates a new Azure Virtual Network Manager IPAM Pool using the AzapiResource framework
|
|
91
|
+
*
|
|
92
|
+
* @param scope - The scope in which to define this construct
|
|
93
|
+
* @param id - The unique identifier for this instance
|
|
94
|
+
* @param props - Configuration properties for the IPAM Pool
|
|
95
|
+
*/
|
|
96
|
+
constructor(scope, id, props) {
|
|
97
|
+
// Validate CIDR prefixes before construction
|
|
98
|
+
IpamPool.validateAddressPrefixes(props.addressPrefixes);
|
|
99
|
+
super(scope, id, props);
|
|
100
|
+
this.props = props;
|
|
101
|
+
// Extract properties from the AZAPI resource outputs using Terraform interpolation
|
|
102
|
+
this.resourceName = `\${${this.terraformResource.fqn}.name}`;
|
|
103
|
+
// Create Terraform outputs for easy access and referencing from other resources
|
|
104
|
+
this.idOutput = new cdktf.TerraformOutput(this, "id", {
|
|
105
|
+
value: this.id,
|
|
106
|
+
description: "The ID of the IPAM Pool",
|
|
107
|
+
});
|
|
108
|
+
this.nameOutput = new cdktf.TerraformOutput(this, "name", {
|
|
109
|
+
value: this.resourceName,
|
|
110
|
+
description: "The name of the IPAM Pool",
|
|
111
|
+
});
|
|
112
|
+
this.locationOutput = new cdktf.TerraformOutput(this, "location", {
|
|
113
|
+
value: `\${${this.terraformResource.fqn}.location}`,
|
|
114
|
+
description: "The location of the IPAM Pool",
|
|
115
|
+
});
|
|
116
|
+
// Override logical IDs to match naming convention
|
|
117
|
+
this.idOutput.overrideLogicalId("id");
|
|
118
|
+
this.nameOutput.overrideLogicalId("name");
|
|
119
|
+
this.locationOutput.overrideLogicalId("location");
|
|
120
|
+
// Apply ignore changes if specified
|
|
121
|
+
this._applyIgnoreChanges();
|
|
122
|
+
}
|
|
123
|
+
// =============================================================================
|
|
124
|
+
// REQUIRED ABSTRACT METHODS FROM AzapiResource
|
|
125
|
+
// =============================================================================
|
|
126
|
+
/**
|
|
127
|
+
* Resolves the parent resource ID for the IPAM Pool
|
|
128
|
+
* IPAM Pools are scoped to Network Managers
|
|
129
|
+
*/
|
|
130
|
+
resolveParentId(props) {
|
|
131
|
+
const typedProps = props;
|
|
132
|
+
return typedProps.networkManagerId;
|
|
133
|
+
}
|
|
134
|
+
/**
|
|
135
|
+
* Gets the default API version to use when no explicit version is specified
|
|
136
|
+
*/
|
|
137
|
+
defaultVersion() {
|
|
138
|
+
return "2024-05-01";
|
|
139
|
+
}
|
|
140
|
+
/**
|
|
141
|
+
* Gets the Azure resource type for IPAM Pools
|
|
142
|
+
*/
|
|
143
|
+
resourceType() {
|
|
144
|
+
return ipam_pool_schemas_1.IPAM_POOL_TYPE;
|
|
145
|
+
}
|
|
146
|
+
/**
|
|
147
|
+
* Gets the API schema for the resolved version
|
|
148
|
+
*/
|
|
149
|
+
apiSchema() {
|
|
150
|
+
return this.resolveSchema();
|
|
151
|
+
}
|
|
152
|
+
/**
|
|
153
|
+
* Creates the resource body for the Azure API call
|
|
154
|
+
*/
|
|
155
|
+
createResourceBody(props) {
|
|
156
|
+
const typedProps = props;
|
|
157
|
+
return {
|
|
158
|
+
location: typedProps.location,
|
|
159
|
+
tags: this.allTags(),
|
|
160
|
+
properties: {
|
|
161
|
+
addressPrefixes: typedProps.addressPrefixes,
|
|
162
|
+
description: typedProps.description,
|
|
163
|
+
displayName: typedProps.displayName,
|
|
164
|
+
parentPoolName: typedProps.parentPoolName,
|
|
165
|
+
},
|
|
166
|
+
};
|
|
167
|
+
}
|
|
168
|
+
// =============================================================================
|
|
169
|
+
// PUBLIC METHODS FOR IPAM POOL OPERATIONS
|
|
170
|
+
// =============================================================================
|
|
171
|
+
/**
|
|
172
|
+
* Calculate total number of IP addresses in this pool
|
|
173
|
+
* Sums up all addresses from all CIDR blocks
|
|
174
|
+
*
|
|
175
|
+
* @returns Total count of IP addresses across all prefixes
|
|
176
|
+
*
|
|
177
|
+
* @example
|
|
178
|
+
* const pool = new IpamPool(this, "pool", {
|
|
179
|
+
* addressPrefixes: ["10.0.0.0/24", "10.1.0.0/24"]
|
|
180
|
+
* });
|
|
181
|
+
* console.log(pool.totalAddressCount); // 512 (256 + 256)
|
|
182
|
+
*/
|
|
183
|
+
get totalAddressCount() {
|
|
184
|
+
return this.props.addressPrefixes.reduce((sum, cidr) => sum + (0, cidr_validator_1.calculateAddressCount)(cidr), 0);
|
|
185
|
+
}
|
|
186
|
+
// =============================================================================
|
|
187
|
+
// PRIVATE HELPER METHODS
|
|
188
|
+
// =============================================================================
|
|
189
|
+
/**
|
|
190
|
+
* Applies ignore changes lifecycle rules if specified in props
|
|
191
|
+
*/
|
|
192
|
+
_applyIgnoreChanges() {
|
|
193
|
+
if (this.props.ignoreChanges && this.props.ignoreChanges.length > 0) {
|
|
194
|
+
this.terraformResource.addOverride("lifecycle", {
|
|
195
|
+
ignore_changes: this.props.ignoreChanges,
|
|
196
|
+
});
|
|
197
|
+
}
|
|
198
|
+
}
|
|
199
|
+
}
|
|
200
|
+
exports.IpamPool = IpamPool;
|
|
201
|
+
_a = JSII_RTTI_SYMBOL_1;
|
|
202
|
+
IpamPool[_a] = { fqn: "@microsoft/terraform-cdk-constructs.IpamPool", version: "1.5.0" };
|
|
203
|
+
(() => {
|
|
204
|
+
azapi_resource_1.AzapiResource.registerSchemas(ipam_pool_schemas_1.IPAM_POOL_TYPE, ipam_pool_schemas_1.ALL_IPAM_POOL_VERSIONS);
|
|
205
|
+
})();
|
|
206
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"ipam-pool.js","sourceRoot":"","sources":["../../../src/azure-virtualnetworkmanager/lib/ipam-pool.ts"],"names":[],"mappings":";;;;;AAAA;;;;;;;;;;;;;;;;;GAiBG;AAEH,+BAA+B;AAE/B,2DAA6E;AAC7E,2DAIgC;AAChC,8EAGmD;AAoEnD;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA+BG;AACH,MAAa,QAAS,SAAQ,8BAAa;IAKzC;;;;;;OAMG;IACK,MAAM,CAAC,uBAAuB,CAAC,QAAkB;QACvD,IAAI,CAAC,QAAQ,IAAI,QAAQ,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACvC,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;QAC7D,CAAC;QAED,kCAAkC;QAClC,QAAQ,CAAC,OAAO,CAAC,CAAC,MAAM,EAAE,KAAK,EAAE,EAAE;YACjC,IAAI,CAAC,IAAA,4BAAW,EAAC,MAAM,CAAC,EAAE,CAAC;gBACzB,MAAM,IAAI,KAAK,CACb,kCAAkC,KAAK,KAAK,MAAM,IAAI;oBACpD,4CAA4C,CAC/C,CAAC;YACJ,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,0CAA0C;QAC1C,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,QAAQ,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YACzC,KAAK,IAAI,CAAC,GAAG,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,QAAQ,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;gBAC7C,IAAI,IAAA,6BAAY,EAAC,QAAQ,CAAC,CAAC,CAAC,EAAE,QAAQ,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC;oBAC3C,MAAM,IAAI,KAAK,CACb,6BAA6B,QAAQ,CAAC,CAAC,CAAC,QAAQ,QAAQ,CAAC,CAAC,CAAC,IAAI;wBAC7D,wDAAwD,CAC3D,CAAC;gBACJ,CAAC;YACH,CAAC;QACH,CAAC;IACH,CAAC;IAeD;;;;;;OAMG;IACH,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAoB;QAC5D,6CAA6C;QAC7C,QAAQ,CAAC,uBAAuB,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC;QAExD,KAAK,CAAC,KAAK,EAAE,EAAE,EAAE,KAAK,CAAC,CAAC;QAExB,IAAI,CAAC,KAAK,GAAG,KAAK,CAAC;QAEnB,mFAAmF;QACnF,IAAI,CAAC,YAAY,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,GAAG,QAAQ,CAAC;QAE7D,gFAAgF;QAChF,IAAI,CAAC,QAAQ,GAAG,IAAI,KAAK,CAAC,eAAe,CAAC,IAAI,EAAE,IAAI,EAAE;YACpD,KAAK,EAAE,IAAI,CAAC,EAAE;YACd,WAAW,EAAE,yBAAyB;SACvC,CAAC,CAAC;QAEH,IAAI,CAAC,UAAU,GAAG,IAAI,KAAK,CAAC,eAAe,CAAC,IAAI,EAAE,MAAM,EAAE;YACxD,KAAK,EAAE,IAAI,CAAC,YAAY;YACxB,WAAW,EAAE,2BAA2B;SACzC,CAAC,CAAC;QAEH,IAAI,CAAC,cAAc,GAAG,IAAI,KAAK,CAAC,eAAe,CAAC,IAAI,EAAE,UAAU,EAAE;YAChE,KAAK,EAAE,MAAM,IAAI,CAAC,iBAAiB,CAAC,GAAG,YAAY;YACnD,WAAW,EAAE,+BAA+B;SAC7C,CAAC,CAAC;QAEH,kDAAkD;QAClD,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC,IAAI,CAAC,CAAC;QACtC,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,MAAM,CAAC,CAAC;QAC1C,IAAI,CAAC,cAAc,CAAC,iBAAiB,CAAC,UAAU,CAAC,CAAC;QAElD,oCAAoC;QACpC,IAAI,CAAC,mBAAmB,EAAE,CAAC;IAC7B,CAAC;IAED,gFAAgF;IAChF,+CAA+C;IAC/C,gFAAgF;IAEhF;;;OAGG;IACO,eAAe,CAAC,KAAU;QAClC,MAAM,UAAU,GAAG,KAAsB,CAAC;QAC1C,OAAO,UAAU,CAAC,gBAAgB,CAAC;IACrC,CAAC;IAED;;OAEG;IACO,cAAc;QACtB,OAAO,YAAY,CAAC;IACtB,CAAC;IAED;;OAEG;IACO,YAAY;QACpB,OAAO,kCAAc,CAAC;IACxB,CAAC;IAED;;OAEG;IACO,SAAS;QACjB,OAAO,IAAI,CAAC,aAAa,EAAE,CAAC;IAC9B,CAAC;IAED;;OAEG;IACO,kBAAkB,CAAC,KAAU;QACrC,MAAM,UAAU,GAAG,KAAsB,CAAC;QAC1C,OAAO;YACL,QAAQ,EAAE,UAAU,CAAC,QAAQ;YAC7B,IAAI,EAAE,IAAI,CAAC,OAAO,EAAE;YACpB,UAAU,EAAE;gBACV,eAAe,EAAE,UAAU,CAAC,eAAe;gBAC3C,WAAW,EAAE,UAAU,CAAC,WAAW;gBACnC,WAAW,EAAE,UAAU,CAAC,WAAW;gBACnC,cAAc,EAAE,UAAU,CAAC,cAAc;aAC1C;SACF,CAAC;IACJ,CAAC;IAED,gFAAgF;IAChF,0CAA0C;IAC1C,gFAAgF;IAEhF;;;;;;;;;;;OAWG;IACH,IAAW,iBAAiB;QAC1B,OAAO,IAAI,CAAC,KAAK,CAAC,eAAe,CAAC,MAAM,CACtC,CAAC,GAAG,EAAE,IAAI,EAAE,EAAE,CAAC,GAAG,GAAG,IAAA,sCAAqB,EAAC,IAAI,CAAC,EAChD,CAAC,CACF,CAAC;IACJ,CAAC;IAED,gFAAgF;IAChF,yBAAyB;IACzB,gFAAgF;IAEhF;;OAEG;IACK,mBAAmB;QACzB,IAAI,IAAI,CAAC,KAAK,CAAC,aAAa,IAAI,IAAI,CAAC,KAAK,CAAC,aAAa,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACpE,IAAI,CAAC,iBAAiB,CAAC,WAAW,CAAC,WAAW,EAAE;gBAC9C,cAAc,EAAE,IAAI,CAAC,KAAK,CAAC,aAAa;aACzC,CAAC,CAAC;QACL,CAAC;IACH,CAAC;;AAvLH,4BAwLC;;;AAvLC;IACE,8BAAa,CAAC,eAAe,CAAC,kCAAc,EAAE,0CAAsB,CAAC,CAAC;AACxE,CAAC,GAAA,CAAA","sourcesContent":["/**\n * Azure Virtual Network Manager IPAM Pool implementation using AzapiResource framework\n *\n * This class provides a unified implementation for Azure Virtual Network Manager IPAM Pools\n * that automatically handles version management, schema validation, and property transformation\n * across all supported API versions.\n *\n * Supported API Versions:\n * - 2024-05-01 (Active, Latest)\n *\n * Features:\n * - Automatic latest version resolution when no version is specified\n * - Explicit version pinning for stability requirements\n * - Schema-driven validation and transformation\n * - CIDR validation and overlap detection\n * - Hierarchical pool support\n * - JSII compliance for multi-language support\n */\n\nimport * as cdktf from \"cdktf\";\nimport { Construct } from \"constructs\";\nimport { ALL_IPAM_POOL_VERSIONS, IPAM_POOL_TYPE } from \"./ipam-pool-schemas\";\nimport {\n  isValidCidr,\n  cidrsOverlap,\n  calculateAddressCount,\n} from \"./utils/cidr-validator\";\nimport {\n  AzapiResource,\n  AzapiResourceProps,\n} from \"../../core-azure/lib/azapi/azapi-resource\";\nimport { ApiSchema } from \"../../core-azure/lib/version-manager/interfaces/version-interfaces\";\n\n/**\n * Properties for the Azure Virtual Network Manager IPAM Pool\n *\n * Extends AzapiResourceProps with IPAM Pool specific properties\n */\nexport interface IpamPoolProps extends AzapiResourceProps {\n  /**\n   * Resource ID of the parent Network Manager\n   * @example \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg/providers/Microsoft.Network/networkManagers/vnm\"\n   */\n  readonly networkManagerId: string;\n\n  /**\n   * IP address prefixes for the pool\n   * Must be valid CIDR notation (e.g., \"10.0.0.0/8\")\n   * Multiple prefixes must not overlap\n   * @example [\"10.0.0.0/8\", \"172.16.0.0/12\"]\n   */\n  readonly addressPrefixes: string[];\n\n  /**\n   * Optional description of the IPAM pool\n   * @example \"Production IP address pool for East US region\"\n   */\n  readonly description?: string;\n\n  /**\n   * Optional friendly display name\n   * @example \"East US Production Pool\"\n   */\n  readonly displayName?: string;\n\n  /**\n   * Name of parent pool for hierarchical pools\n   * Leave empty/undefined for root pools\n   * @example \"root-pool\"\n   */\n  readonly parentPoolName?: string;\n\n  /**\n   * The lifecycle rules to ignore changes\n   * @example [\"tags\"]\n   */\n  readonly ignoreChanges?: string[];\n}\n\n/**\n * Properties for IPAM Pool body\n */\nexport interface IpamPoolProperties {\n  readonly addressPrefixes: string[];\n  readonly description?: string;\n  readonly displayName?: string;\n  readonly parentPoolName?: string;\n}\n\n/**\n * The resource body interface for Azure IPAM Pool API calls\n */\nexport interface IpamPoolBody {\n  readonly location: string;\n  readonly tags?: Record<string, string>;\n  readonly properties: IpamPoolProperties;\n}\n\n/**\n * Azure Virtual Network Manager IPAM Pool implementation\n *\n * IPAM Pools provide centralized IP address management for virtual networks,\n * enabling automatic CIDR allocation, overlap prevention, and hierarchical\n * address space organization. They are essential for managing IP addresses\n * at scale across multiple virtual networks and subscriptions.\n *\n * @example\n * // Basic IPAM pool for production workloads:\n * const ipamPool = new IpamPool(this, \"prod-pool\", {\n *   name: \"production-pool\",\n *   location: \"eastus\",\n *   networkManagerId: networkManager.id,\n *   addressPrefixes: [\"10.0.0.0/8\"],\n *   description: \"Root IP address pool for production\",\n *   displayName: \"Production Pool\"\n * });\n *\n * @example\n * // Hierarchical pool with parent reference:\n * const childPool = new IpamPool(this, \"eastus-pool\", {\n *   name: \"eastus-pool\",\n *   location: \"eastus\",\n *   networkManagerId: networkManager.id,\n *   addressPrefixes: [\"10.1.0.0/16\"],\n *   parentPoolName: \"production-pool\",\n *   description: \"East US regional pool\"\n * });\n *\n * @stability stable\n */\nexport class IpamPool extends AzapiResource {\n  static {\n    AzapiResource.registerSchemas(IPAM_POOL_TYPE, ALL_IPAM_POOL_VERSIONS);\n  }\n\n  /**\n   * Validates address prefixes for format and overlap\n   * Throws descriptive errors if validation fails\n   *\n   * @param prefixes - Array of CIDR blocks to validate\n   * @throws Error if validation fails\n   */\n  private static validateAddressPrefixes(prefixes: string[]): void {\n    if (!prefixes || prefixes.length === 0) {\n      throw new Error(\"At least one address prefix is required\");\n    }\n\n    // Validate each CIDR individually\n    prefixes.forEach((prefix, index) => {\n      if (!isValidCidr(prefix)) {\n        throw new Error(\n          `Invalid CIDR notation at index ${index}: ${prefix}. ` +\n            `Expected format: x.x.x.x/y where y is 0-32`,\n        );\n      }\n    });\n\n    // Check for overlaps within the same pool\n    for (let i = 0; i < prefixes.length; i++) {\n      for (let j = i + 1; j < prefixes.length; j++) {\n        if (cidrsOverlap(prefixes[i], prefixes[j])) {\n          throw new Error(\n            `Address prefixes overlap: ${prefixes[i]} and ${prefixes[j]}. ` +\n              `Each CIDR block within a pool must be non-overlapping.`,\n          );\n        }\n      }\n    }\n  }\n\n  /**\n   * The input properties for this IPAM Pool instance\n   */\n  public readonly props: IpamPoolProps;\n\n  // Output properties for easy access and referencing\n  public readonly idOutput: cdktf.TerraformOutput;\n  public readonly nameOutput: cdktf.TerraformOutput;\n  public readonly locationOutput: cdktf.TerraformOutput;\n\n  // Public properties\n  public readonly resourceName: string;\n\n  /**\n   * Creates a new Azure Virtual Network Manager IPAM Pool using the AzapiResource framework\n   *\n   * @param scope - The scope in which to define this construct\n   * @param id - The unique identifier for this instance\n   * @param props - Configuration properties for the IPAM Pool\n   */\n  constructor(scope: Construct, id: string, props: IpamPoolProps) {\n    // Validate CIDR prefixes before construction\n    IpamPool.validateAddressPrefixes(props.addressPrefixes);\n\n    super(scope, id, props);\n\n    this.props = props;\n\n    // Extract properties from the AZAPI resource outputs using Terraform interpolation\n    this.resourceName = `\\${${this.terraformResource.fqn}.name}`;\n\n    // Create Terraform outputs for easy access and referencing from other resources\n    this.idOutput = new cdktf.TerraformOutput(this, \"id\", {\n      value: this.id,\n      description: \"The ID of the IPAM Pool\",\n    });\n\n    this.nameOutput = new cdktf.TerraformOutput(this, \"name\", {\n      value: this.resourceName,\n      description: \"The name of the IPAM Pool\",\n    });\n\n    this.locationOutput = new cdktf.TerraformOutput(this, \"location\", {\n      value: `\\${${this.terraformResource.fqn}.location}`,\n      description: \"The location of the IPAM Pool\",\n    });\n\n    // Override logical IDs to match naming convention\n    this.idOutput.overrideLogicalId(\"id\");\n    this.nameOutput.overrideLogicalId(\"name\");\n    this.locationOutput.overrideLogicalId(\"location\");\n\n    // Apply ignore changes if specified\n    this._applyIgnoreChanges();\n  }\n\n  // =============================================================================\n  // REQUIRED ABSTRACT METHODS FROM AzapiResource\n  // =============================================================================\n\n  /**\n   * Resolves the parent resource ID for the IPAM Pool\n   * IPAM Pools are scoped to Network Managers\n   */\n  protected resolveParentId(props: any): string {\n    const typedProps = props as IpamPoolProps;\n    return typedProps.networkManagerId;\n  }\n\n  /**\n   * Gets the default API version to use when no explicit version is specified\n   */\n  protected defaultVersion(): string {\n    return \"2024-05-01\";\n  }\n\n  /**\n   * Gets the Azure resource type for IPAM Pools\n   */\n  protected resourceType(): string {\n    return IPAM_POOL_TYPE;\n  }\n\n  /**\n   * Gets the API schema for the resolved version\n   */\n  protected apiSchema(): ApiSchema {\n    return this.resolveSchema();\n  }\n\n  /**\n   * Creates the resource body for the Azure API call\n   */\n  protected createResourceBody(props: any): any {\n    const typedProps = props as IpamPoolProps;\n    return {\n      location: typedProps.location,\n      tags: this.allTags(),\n      properties: {\n        addressPrefixes: typedProps.addressPrefixes,\n        description: typedProps.description,\n        displayName: typedProps.displayName,\n        parentPoolName: typedProps.parentPoolName,\n      },\n    };\n  }\n\n  // =============================================================================\n  // PUBLIC METHODS FOR IPAM POOL OPERATIONS\n  // =============================================================================\n\n  /**\n   * Calculate total number of IP addresses in this pool\n   * Sums up all addresses from all CIDR blocks\n   *\n   * @returns Total count of IP addresses across all prefixes\n   *\n   * @example\n   * const pool = new IpamPool(this, \"pool\", {\n   *   addressPrefixes: [\"10.0.0.0/24\", \"10.1.0.0/24\"]\n   * });\n   * console.log(pool.totalAddressCount); // 512 (256 + 256)\n   */\n  public get totalAddressCount(): number {\n    return this.props.addressPrefixes.reduce(\n      (sum, cidr) => sum + calculateAddressCount(cidr),\n      0,\n    );\n  }\n\n  // =============================================================================\n  // PRIVATE HELPER METHODS\n  // =============================================================================\n\n  /**\n   * Applies ignore changes lifecycle rules if specified in props\n   */\n  private _applyIgnoreChanges(): void {\n    if (this.props.ignoreChanges && this.props.ignoreChanges.length > 0) {\n      this.terraformResource.addOverride(\"lifecycle\", {\n        ignore_changes: this.props.ignoreChanges,\n      });\n    }\n  }\n}\n"]}
|
|
@@ -156,7 +156,7 @@ class NetworkGroupStaticMember extends azapi_resource_1.AzapiResource {
|
|
|
156
156
|
}
|
|
157
157
|
exports.NetworkGroupStaticMember = NetworkGroupStaticMember;
|
|
158
158
|
_a = JSII_RTTI_SYMBOL_1;
|
|
159
|
-
NetworkGroupStaticMember[_a] = { fqn: "@microsoft/terraform-cdk-constructs.NetworkGroupStaticMember", version: "1.
|
|
159
|
+
NetworkGroupStaticMember[_a] = { fqn: "@microsoft/terraform-cdk-constructs.NetworkGroupStaticMember", version: "1.5.0" };
|
|
160
160
|
(() => {
|
|
161
161
|
azapi_resource_1.AzapiResource.registerSchemas(network_group_static_member_schemas_1.STATIC_MEMBER_TYPE, network_group_static_member_schemas_1.ALL_STATIC_MEMBER_VERSIONS);
|
|
162
162
|
})();
|
|
@@ -151,7 +151,7 @@ class NetworkGroup extends azapi_resource_1.AzapiResource {
|
|
|
151
151
|
}
|
|
152
152
|
exports.NetworkGroup = NetworkGroup;
|
|
153
153
|
_a = JSII_RTTI_SYMBOL_1;
|
|
154
|
-
NetworkGroup[_a] = { fqn: "@microsoft/terraform-cdk-constructs.NetworkGroup", version: "1.
|
|
154
|
+
NetworkGroup[_a] = { fqn: "@microsoft/terraform-cdk-constructs.NetworkGroup", version: "1.5.0" };
|
|
155
155
|
(() => {
|
|
156
156
|
azapi_resource_1.AzapiResource.registerSchemas(network_group_schemas_1.NETWORK_GROUP_TYPE, network_group_schemas_1.ALL_NETWORK_GROUP_VERSIONS);
|
|
157
157
|
})();
|
|
@@ -157,7 +157,7 @@ class SecurityAdminConfiguration extends azapi_resource_1.AzapiResource {
|
|
|
157
157
|
}
|
|
158
158
|
exports.SecurityAdminConfiguration = SecurityAdminConfiguration;
|
|
159
159
|
_a = JSII_RTTI_SYMBOL_1;
|
|
160
|
-
SecurityAdminConfiguration[_a] = { fqn: "@microsoft/terraform-cdk-constructs.SecurityAdminConfiguration", version: "1.
|
|
160
|
+
SecurityAdminConfiguration[_a] = { fqn: "@microsoft/terraform-cdk-constructs.SecurityAdminConfiguration", version: "1.5.0" };
|
|
161
161
|
(() => {
|
|
162
162
|
azapi_resource_1.AzapiResource.registerSchemas(security_admin_configuration_schemas_1.SECURITY_ADMIN_CONFIGURATION_TYPE, security_admin_configuration_schemas_1.ALL_SECURITY_ADMIN_CONFIGURATION_VERSIONS);
|
|
163
163
|
})();
|
|
@@ -155,7 +155,7 @@ class SecurityAdminRuleCollection extends azapi_resource_1.AzapiResource {
|
|
|
155
155
|
}
|
|
156
156
|
exports.SecurityAdminRuleCollection = SecurityAdminRuleCollection;
|
|
157
157
|
_a = JSII_RTTI_SYMBOL_1;
|
|
158
|
-
SecurityAdminRuleCollection[_a] = { fqn: "@microsoft/terraform-cdk-constructs.SecurityAdminRuleCollection", version: "1.
|
|
158
|
+
SecurityAdminRuleCollection[_a] = { fqn: "@microsoft/terraform-cdk-constructs.SecurityAdminRuleCollection", version: "1.5.0" };
|
|
159
159
|
(() => {
|
|
160
160
|
azapi_resource_1.AzapiResource.registerSchemas(security_admin_rule_collection_schemas_1.RULE_COLLECTION_TYPE, security_admin_rule_collection_schemas_1.ALL_RULE_COLLECTION_VERSIONS);
|
|
161
161
|
})();
|
|
@@ -197,7 +197,7 @@ class SecurityAdminRule extends azapi_resource_1.AzapiResource {
|
|
|
197
197
|
}
|
|
198
198
|
exports.SecurityAdminRule = SecurityAdminRule;
|
|
199
199
|
_a = JSII_RTTI_SYMBOL_1;
|
|
200
|
-
SecurityAdminRule[_a] = { fqn: "@microsoft/terraform-cdk-constructs.SecurityAdminRule", version: "1.
|
|
200
|
+
SecurityAdminRule[_a] = { fqn: "@microsoft/terraform-cdk-constructs.SecurityAdminRule", version: "1.5.0" };
|
|
201
201
|
(() => {
|
|
202
202
|
azapi_resource_1.AzapiResource.registerSchemas(security_admin_rule_schemas_1.SECURITY_ADMIN_RULE_TYPE, security_admin_rule_schemas_1.ALL_SECURITY_ADMIN_RULE_VERSIONS);
|
|
203
203
|
})();
|
|
@@ -0,0 +1,225 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* CIDR Validator Utility
|
|
3
|
+
*
|
|
4
|
+
* Provides comprehensive validation and parsing utilities for IPv4 CIDR notation.
|
|
5
|
+
* Used by IPAM constructs to ensure proper network address space management.
|
|
6
|
+
*/
|
|
7
|
+
/**
|
|
8
|
+
* Result of CIDR validation operations
|
|
9
|
+
*/
|
|
10
|
+
export interface CidrValidationResult {
|
|
11
|
+
/** Whether the validation passed */
|
|
12
|
+
readonly valid: boolean;
|
|
13
|
+
/** List of validation errors */
|
|
14
|
+
readonly errors: string[];
|
|
15
|
+
/** List of validation warnings */
|
|
16
|
+
readonly warnings: string[];
|
|
17
|
+
}
|
|
18
|
+
/**
|
|
19
|
+
* Parsed CIDR information
|
|
20
|
+
*/
|
|
21
|
+
export interface ParsedCidr {
|
|
22
|
+
/** Original CIDR notation (e.g., "10.0.0.0/8") */
|
|
23
|
+
readonly cidr: string;
|
|
24
|
+
/** Network address (e.g., "10.0.0.0") */
|
|
25
|
+
readonly network: string;
|
|
26
|
+
/** Prefix length (e.g., 8) */
|
|
27
|
+
readonly prefix: number;
|
|
28
|
+
/** First usable IP address */
|
|
29
|
+
readonly firstIp: string;
|
|
30
|
+
/** Last usable IP address */
|
|
31
|
+
readonly lastIp: string;
|
|
32
|
+
/** Total number of addresses in the range */
|
|
33
|
+
readonly totalAddresses: number;
|
|
34
|
+
/** Network mask (e.g., "255.0.0.0") */
|
|
35
|
+
readonly netmask: string;
|
|
36
|
+
}
|
|
37
|
+
/**
|
|
38
|
+
* Validates if a string is a valid CIDR notation
|
|
39
|
+
*
|
|
40
|
+
* @param cidr - CIDR string (e.g., "10.0.0.0/16")
|
|
41
|
+
* @returns boolean - true if valid CIDR format
|
|
42
|
+
*
|
|
43
|
+
* @example
|
|
44
|
+
* const valid = isValidCidr("10.0.0.0/16");
|
|
45
|
+
* console.log(valid); // true
|
|
46
|
+
*/
|
|
47
|
+
export declare function isValidCidr(cidr: string): boolean;
|
|
48
|
+
/**
|
|
49
|
+
* Validates if CIDR is within allowed private ranges (RFC 1918)
|
|
50
|
+
*
|
|
51
|
+
* @param cidr - CIDR string
|
|
52
|
+
* @returns boolean - true if within private IP range
|
|
53
|
+
*
|
|
54
|
+
* @example
|
|
55
|
+
* const isPrivate = isPrivateRange("10.0.0.0/16");
|
|
56
|
+
* console.log(isPrivate); // true
|
|
57
|
+
*/
|
|
58
|
+
export declare function isPrivateRange(cidr: string): boolean;
|
|
59
|
+
/**
|
|
60
|
+
* Checks if two CIDR blocks overlap
|
|
61
|
+
*
|
|
62
|
+
* @param cidr1 - First CIDR
|
|
63
|
+
* @param cidr2 - Second CIDR
|
|
64
|
+
* @returns boolean - true if CIDRs overlap
|
|
65
|
+
*
|
|
66
|
+
* @example
|
|
67
|
+
* const overlap = cidrsOverlap("10.0.0.0/8", "10.1.0.0/16");
|
|
68
|
+
* console.log(overlap); // true
|
|
69
|
+
*/
|
|
70
|
+
export declare function cidrsOverlap(cidr1: string, cidr2: string): boolean;
|
|
71
|
+
/**
|
|
72
|
+
* Validates if child CIDR is contained within parent CIDR
|
|
73
|
+
*
|
|
74
|
+
* @param childCidr - Child CIDR block
|
|
75
|
+
* @param parentCidr - Parent CIDR block
|
|
76
|
+
* @returns boolean - true if child is subnet of parent
|
|
77
|
+
*
|
|
78
|
+
* @example
|
|
79
|
+
* const isSubnet = isSubnet("10.1.0.0/16", "10.0.0.0/8");
|
|
80
|
+
* console.log(isSubnet); // true
|
|
81
|
+
*/
|
|
82
|
+
export declare function isSubnet(childCidr: string, parentCidr: string): boolean;
|
|
83
|
+
/**
|
|
84
|
+
* Calculates number of IP addresses in a CIDR block
|
|
85
|
+
*
|
|
86
|
+
* @param cidr - CIDR string
|
|
87
|
+
* @returns number - Total IP addresses in the block
|
|
88
|
+
*
|
|
89
|
+
* @example
|
|
90
|
+
* const count = calculateAddressCount("10.0.0.0/24");
|
|
91
|
+
* console.log(count); // 256
|
|
92
|
+
*/
|
|
93
|
+
export declare function calculateAddressCount(cidr: string): number;
|
|
94
|
+
/**
|
|
95
|
+
* Validates prefix length is within allowed range
|
|
96
|
+
*
|
|
97
|
+
* @param cidr - CIDR string
|
|
98
|
+
* @param minPrefix - Minimum allowed prefix (e.g., 8)
|
|
99
|
+
* @param maxPrefix - Maximum allowed prefix (e.g., 29)
|
|
100
|
+
* @returns boolean - true if prefix length is within range
|
|
101
|
+
*
|
|
102
|
+
* @example
|
|
103
|
+
* const valid = isValidPrefixLength("10.0.0.0/24", 8, 29);
|
|
104
|
+
* console.log(valid); // true
|
|
105
|
+
*/
|
|
106
|
+
export declare function isValidPrefixLength(cidr: string, minPrefix: number, maxPrefix: number): boolean;
|
|
107
|
+
/**
|
|
108
|
+
* Validate CIDR format and structure
|
|
109
|
+
*
|
|
110
|
+
* @param cidr - CIDR notation string (e.g., "10.0.0.0/8")
|
|
111
|
+
* @returns Validation result with errors and warnings
|
|
112
|
+
*
|
|
113
|
+
* @example
|
|
114
|
+
* const result = validateCidr("10.0.0.0/8");
|
|
115
|
+
* if (!result.valid) {
|
|
116
|
+
* console.error("Invalid CIDR:", result.errors);
|
|
117
|
+
* }
|
|
118
|
+
*/
|
|
119
|
+
export declare function validateCidr(cidr: string): CidrValidationResult;
|
|
120
|
+
/**
|
|
121
|
+
* Parse CIDR into structured information
|
|
122
|
+
*
|
|
123
|
+
* @param cidr - CIDR notation string
|
|
124
|
+
* @returns Parsed CIDR information
|
|
125
|
+
* @throws Error if CIDR format is invalid
|
|
126
|
+
*
|
|
127
|
+
* @example
|
|
128
|
+
* const parsed = parseCidr("10.0.0.0/8");
|
|
129
|
+
* console.log(`Network: ${parsed.network}, Prefix: ${parsed.prefix}`);
|
|
130
|
+
* console.log(`Range: ${parsed.firstIp} - ${parsed.lastIp}`);
|
|
131
|
+
* console.log(`Total addresses: ${parsed.totalAddresses}`);
|
|
132
|
+
*/
|
|
133
|
+
export declare function parseCidr(cidr: string): ParsedCidr;
|
|
134
|
+
/**
|
|
135
|
+
* Check if two CIDRs overlap
|
|
136
|
+
*
|
|
137
|
+
* @param cidr1 - First CIDR block
|
|
138
|
+
* @param cidr2 - Second CIDR block
|
|
139
|
+
* @returns True if the CIDRs overlap
|
|
140
|
+
*
|
|
141
|
+
* @example
|
|
142
|
+
* const overlaps = checkOverlap("10.0.0.0/16", "10.0.1.0/24");
|
|
143
|
+
* console.log(overlaps); // true
|
|
144
|
+
*/
|
|
145
|
+
export declare function checkOverlap(cidr1: string, cidr2: string): boolean;
|
|
146
|
+
/**
|
|
147
|
+
* Validate that multiple CIDRs don't overlap
|
|
148
|
+
*
|
|
149
|
+
* @param cidrs - Array of CIDR blocks to check
|
|
150
|
+
* @returns Validation result with details of any overlaps
|
|
151
|
+
*
|
|
152
|
+
* @example
|
|
153
|
+
* const result = validateNoOverlaps([
|
|
154
|
+
* "10.0.0.0/16",
|
|
155
|
+
* "10.1.0.0/16",
|
|
156
|
+
* "10.0.1.0/24"
|
|
157
|
+
* ]);
|
|
158
|
+
* if (!result.valid) {
|
|
159
|
+
* console.error("Overlapping CIDRs:", result.errors);
|
|
160
|
+
* }
|
|
161
|
+
*/
|
|
162
|
+
export declare function validateNoOverlaps(cidrs: string[]): CidrValidationResult;
|
|
163
|
+
/**
|
|
164
|
+
* Check if a child CIDR is contained within a parent CIDR
|
|
165
|
+
*
|
|
166
|
+
* @param parentCidr - Parent CIDR block
|
|
167
|
+
* @param childCidr - Child CIDR block to check
|
|
168
|
+
* @returns True if child is fully contained in parent
|
|
169
|
+
*
|
|
170
|
+
* @example
|
|
171
|
+
* const contained = isContained("10.0.0.0/16", "10.0.1.0/24");
|
|
172
|
+
* console.log(contained); // true
|
|
173
|
+
*/
|
|
174
|
+
export declare function isContained(parentCidr: string, childCidr: string): boolean;
|
|
175
|
+
/**
|
|
176
|
+
* Validate that multiple child CIDRs are all contained within a parent CIDR
|
|
177
|
+
*
|
|
178
|
+
* @param parentCidr - Parent CIDR block
|
|
179
|
+
* @param childCidrs - Array of child CIDR blocks
|
|
180
|
+
* @returns Validation result with details of any containment violations
|
|
181
|
+
*
|
|
182
|
+
* @example
|
|
183
|
+
* const result = validateContainment("10.0.0.0/16", [
|
|
184
|
+
* "10.0.1.0/24",
|
|
185
|
+
* "10.0.2.0/24"
|
|
186
|
+
* ]);
|
|
187
|
+
* if (!result.valid) {
|
|
188
|
+
* console.error("Containment violations:", result.errors);
|
|
189
|
+
* }
|
|
190
|
+
*/
|
|
191
|
+
export declare function validateContainment(parentCidr: string, childCidrs: string[]): CidrValidationResult;
|
|
192
|
+
/**
|
|
193
|
+
* Convert an IP address string to a 32-bit number
|
|
194
|
+
*
|
|
195
|
+
* @param ip - IP address string (e.g., "10.0.0.1")
|
|
196
|
+
* @returns 32-bit number representation
|
|
197
|
+
*
|
|
198
|
+
* @example
|
|
199
|
+
* const num = ipToNumber("10.0.0.1");
|
|
200
|
+
* console.log(num); // 167772161
|
|
201
|
+
*/
|
|
202
|
+
export declare function ipToNumber(ip: string): number;
|
|
203
|
+
/**
|
|
204
|
+
* Convert a 32-bit number to an IP address string
|
|
205
|
+
*
|
|
206
|
+
* @param num - 32-bit number representation
|
|
207
|
+
* @returns IP address string
|
|
208
|
+
*
|
|
209
|
+
* @example
|
|
210
|
+
* const ip = numberToIp(167772161);
|
|
211
|
+
* console.log(ip); // "10.0.0.1"
|
|
212
|
+
*/
|
|
213
|
+
export declare function numberToIp(num: number): string;
|
|
214
|
+
/**
|
|
215
|
+
* Convert a prefix length to a netmask number
|
|
216
|
+
*
|
|
217
|
+
* @param prefix - Prefix length (0-32)
|
|
218
|
+
* @returns 32-bit netmask number
|
|
219
|
+
*
|
|
220
|
+
* @example
|
|
221
|
+
* const mask = prefixToMask(24);
|
|
222
|
+
* const maskIp = numberToIp(mask);
|
|
223
|
+
* console.log(maskIp); // "255.255.255.0"
|
|
224
|
+
*/
|
|
225
|
+
export declare function prefixToMask(prefix: number): number;
|