@microsoft/terraform-cdk-constructs 1.3.1 → 1.5.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (86) hide show
  1. package/.jsii +32238 -27310
  2. package/API.md +43714 -35942
  3. package/lib/azure-actiongroup/lib/action-group.js +1 -1
  4. package/lib/azure-activitylogalert/lib/activity-log-alert.js +1 -1
  5. package/lib/azure-aks/lib/aks-cluster.js +1 -1
  6. package/lib/azure-diagnosticsettings/lib/diagnostic-settings.js +1 -1
  7. package/lib/azure-dnsforwardingruleset/lib/dns-forwarding-ruleset.js +1 -1
  8. package/lib/azure-dnsforwardingruleset/lib/forwarding-rule.js +1 -1
  9. package/lib/azure-dnsforwardingruleset/lib/virtual-network-link.js +1 -1
  10. package/lib/azure-dnsresolver/lib/dns-resolver.js +1 -1
  11. package/lib/azure-dnsresolver/lib/inbound-endpoint.js +1 -1
  12. package/lib/azure-dnsresolver/lib/outbound-endpoint.js +1 -1
  13. package/lib/azure-dnszone/lib/dns-zone.js +1 -1
  14. package/lib/azure-metricalert/lib/metric-alert.js +1 -1
  15. package/lib/azure-networkinterface/lib/network-interface.js +1 -1
  16. package/lib/azure-networksecuritygroup/lib/network-security-group.js +1 -1
  17. package/lib/azure-policyassignment/lib/policy-assignment.js +1 -1
  18. package/lib/azure-policydefinition/lib/policy-definition.js +1 -1
  19. package/lib/azure-privatednszone/lib/private-dns-zone.js +1 -1
  20. package/lib/azure-privatednszonelink/lib/private-dns-zone-link.js +1 -1
  21. package/lib/azure-publicipaddress/lib/public-ip-address.js +1 -1
  22. package/lib/azure-resourcegroup/lib/resource-group.js +1 -1
  23. package/lib/azure-roleassignment/lib/role-assignment.js +1 -1
  24. package/lib/azure-roledefinition/lib/role-definition.js +1 -1
  25. package/lib/azure-storageaccount/lib/storage-account.js +1 -1
  26. package/lib/azure-subnet/lib/subnet.js +1 -1
  27. package/lib/azure-virtualmachine/lib/virtual-machine.js +1 -1
  28. package/lib/azure-virtualnetwork/lib/virtual-network.js +1 -1
  29. package/lib/azure-virtualnetworkgateway/index.d.ts +4 -0
  30. package/lib/azure-virtualnetworkgateway/index.js +21 -0
  31. package/lib/azure-virtualnetworkgateway/lib/index.d.ts +5 -0
  32. package/lib/azure-virtualnetworkgateway/lib/index.js +22 -0
  33. package/lib/azure-virtualnetworkgateway/lib/virtual-network-gateway-schemas.d.ts +32 -0
  34. package/lib/azure-virtualnetworkgateway/lib/virtual-network-gateway-schemas.js +298 -0
  35. package/lib/azure-virtualnetworkgateway/lib/virtual-network-gateway.d.ts +368 -0
  36. package/lib/azure-virtualnetworkgateway/lib/virtual-network-gateway.js +285 -0
  37. package/lib/azure-virtualnetworkgateway/test/virtual-network-gateway.integ.d.ts +12 -0
  38. package/lib/azure-virtualnetworkgateway/test/virtual-network-gateway.integ.js +129 -0
  39. package/lib/azure-virtualnetworkgateway/test/virtual-network-gateway.spec.d.ts +8 -0
  40. package/lib/azure-virtualnetworkgateway/test/virtual-network-gateway.spec.js +691 -0
  41. package/lib/azure-virtualnetworkmanager/lib/connectivity-configuration.js +1 -1
  42. package/lib/azure-virtualnetworkmanager/lib/index.d.ts +5 -0
  43. package/lib/azure-virtualnetworkmanager/lib/index.js +6 -1
  44. package/lib/azure-virtualnetworkmanager/lib/ipam-pool-schemas.d.ts +24 -0
  45. package/lib/azure-virtualnetworkmanager/lib/ipam-pool-schemas.js +169 -0
  46. package/lib/azure-virtualnetworkmanager/lib/ipam-pool-static-cidr-schemas.d.ts +32 -0
  47. package/lib/azure-virtualnetworkmanager/lib/ipam-pool-static-cidr-schemas.js +206 -0
  48. package/lib/azure-virtualnetworkmanager/lib/ipam-pool-static-cidr.d.ts +170 -0
  49. package/lib/azure-virtualnetworkmanager/lib/ipam-pool-static-cidr.js +214 -0
  50. package/lib/azure-virtualnetworkmanager/lib/ipam-pool.d.ts +175 -0
  51. package/lib/azure-virtualnetworkmanager/lib/ipam-pool.js +206 -0
  52. package/lib/azure-virtualnetworkmanager/lib/network-group-static-member.js +1 -1
  53. package/lib/azure-virtualnetworkmanager/lib/network-group.js +1 -1
  54. package/lib/azure-virtualnetworkmanager/lib/security-admin-configuration.js +1 -1
  55. package/lib/azure-virtualnetworkmanager/lib/security-admin-rule-collection.js +1 -1
  56. package/lib/azure-virtualnetworkmanager/lib/security-admin-rule.js +1 -1
  57. package/lib/azure-virtualnetworkmanager/lib/utils/cidr-validator.d.ts +225 -0
  58. package/lib/azure-virtualnetworkmanager/lib/utils/cidr-validator.js +389 -0
  59. package/lib/azure-virtualnetworkmanager/lib/virtual-network-manager.d.ts +56 -0
  60. package/lib/azure-virtualnetworkmanager/lib/virtual-network-manager.js +29 -2
  61. package/lib/azure-virtualnetworkmanager/test/cidr-validator.spec.d.ts +6 -0
  62. package/lib/azure-virtualnetworkmanager/test/cidr-validator.spec.js +292 -0
  63. package/lib/azure-virtualnetworkmanager/test/ipam-pool-static-cidr.spec.d.ts +6 -0
  64. package/lib/azure-virtualnetworkmanager/test/ipam-pool-static-cidr.spec.js +430 -0
  65. package/lib/azure-virtualnetworkmanager/test/ipam-pool.spec.d.ts +6 -0
  66. package/lib/azure-virtualnetworkmanager/test/ipam-pool.spec.js +372 -0
  67. package/lib/azure-virtualnetworkmanager/test/virtual-network-manager.integ.d.ts +2 -1
  68. package/lib/azure-virtualnetworkmanager/test/virtual-network-manager.integ.js +30 -3
  69. package/lib/azure-virtualnetworkmanager/test/virtual-network-manager.spec.js +105 -1
  70. package/lib/azure-vmss/lib/virtual-machine-scale-set.js +1 -1
  71. package/lib/core-azure/lib/azapi/azapi-resource.js +2 -2
  72. package/lib/core-azure/lib/azapi/providers-azapi/data-azapi-client-config/index.js +2 -2
  73. package/lib/core-azure/lib/azapi/providers-azapi/data-azapi-resource/index.js +5 -5
  74. package/lib/core-azure/lib/azapi/providers-azapi/provider/index.js +1 -1
  75. package/lib/core-azure/lib/azapi/providers-azapi/resource/index.js +5 -5
  76. package/lib/core-azure/lib/azapi/providers-azapi/resource-action/index.js +3 -3
  77. package/lib/core-azure/lib/azapi/providers-azapi/update-resource/index.js +3 -3
  78. package/lib/core-azure/lib/azapi/schema-mapper/schema-mapper.js +1 -1
  79. package/lib/core-azure/lib/version-manager/api-version-manager.js +1 -1
  80. package/lib/core-azure/lib/version-manager/interfaces/version-interfaces.js +7 -7
  81. package/lib/index.d.ts +2 -0
  82. package/lib/index.js +4 -2
  83. package/lib/testing/index.js +2 -2
  84. package/lib/testing/lib/cleanup.js +1 -1
  85. package/lib/testing/lib/metadata.js +1 -1
  86. package/package.json +1 -1
@@ -0,0 +1,206 @@
1
+ "use strict";
2
+ var _a;
3
+ Object.defineProperty(exports, "__esModule", { value: true });
4
+ exports.IpamPool = void 0;
5
+ const JSII_RTTI_SYMBOL_1 = Symbol.for("jsii.rtti");
6
+ /**
7
+ * Azure Virtual Network Manager IPAM Pool implementation using AzapiResource framework
8
+ *
9
+ * This class provides a unified implementation for Azure Virtual Network Manager IPAM Pools
10
+ * that automatically handles version management, schema validation, and property transformation
11
+ * across all supported API versions.
12
+ *
13
+ * Supported API Versions:
14
+ * - 2024-05-01 (Active, Latest)
15
+ *
16
+ * Features:
17
+ * - Automatic latest version resolution when no version is specified
18
+ * - Explicit version pinning for stability requirements
19
+ * - Schema-driven validation and transformation
20
+ * - CIDR validation and overlap detection
21
+ * - Hierarchical pool support
22
+ * - JSII compliance for multi-language support
23
+ */
24
+ const cdktf = require("cdktf");
25
+ const ipam_pool_schemas_1 = require("./ipam-pool-schemas");
26
+ const cidr_validator_1 = require("./utils/cidr-validator");
27
+ const azapi_resource_1 = require("../../core-azure/lib/azapi/azapi-resource");
28
+ /**
29
+ * Azure Virtual Network Manager IPAM Pool implementation
30
+ *
31
+ * IPAM Pools provide centralized IP address management for virtual networks,
32
+ * enabling automatic CIDR allocation, overlap prevention, and hierarchical
33
+ * address space organization. They are essential for managing IP addresses
34
+ * at scale across multiple virtual networks and subscriptions.
35
+ *
36
+ * @example
37
+ * // Basic IPAM pool for production workloads:
38
+ * const ipamPool = new IpamPool(this, "prod-pool", {
39
+ * name: "production-pool",
40
+ * location: "eastus",
41
+ * networkManagerId: networkManager.id,
42
+ * addressPrefixes: ["10.0.0.0/8"],
43
+ * description: "Root IP address pool for production",
44
+ * displayName: "Production Pool"
45
+ * });
46
+ *
47
+ * @example
48
+ * // Hierarchical pool with parent reference:
49
+ * const childPool = new IpamPool(this, "eastus-pool", {
50
+ * name: "eastus-pool",
51
+ * location: "eastus",
52
+ * networkManagerId: networkManager.id,
53
+ * addressPrefixes: ["10.1.0.0/16"],
54
+ * parentPoolName: "production-pool",
55
+ * description: "East US regional pool"
56
+ * });
57
+ *
58
+ * @stability stable
59
+ */
60
+ class IpamPool extends azapi_resource_1.AzapiResource {
61
+ /**
62
+ * Validates address prefixes for format and overlap
63
+ * Throws descriptive errors if validation fails
64
+ *
65
+ * @param prefixes - Array of CIDR blocks to validate
66
+ * @throws Error if validation fails
67
+ */
68
+ static validateAddressPrefixes(prefixes) {
69
+ if (!prefixes || prefixes.length === 0) {
70
+ throw new Error("At least one address prefix is required");
71
+ }
72
+ // Validate each CIDR individually
73
+ prefixes.forEach((prefix, index) => {
74
+ if (!(0, cidr_validator_1.isValidCidr)(prefix)) {
75
+ throw new Error(`Invalid CIDR notation at index ${index}: ${prefix}. ` +
76
+ `Expected format: x.x.x.x/y where y is 0-32`);
77
+ }
78
+ });
79
+ // Check for overlaps within the same pool
80
+ for (let i = 0; i < prefixes.length; i++) {
81
+ for (let j = i + 1; j < prefixes.length; j++) {
82
+ if ((0, cidr_validator_1.cidrsOverlap)(prefixes[i], prefixes[j])) {
83
+ throw new Error(`Address prefixes overlap: ${prefixes[i]} and ${prefixes[j]}. ` +
84
+ `Each CIDR block within a pool must be non-overlapping.`);
85
+ }
86
+ }
87
+ }
88
+ }
89
+ /**
90
+ * Creates a new Azure Virtual Network Manager IPAM Pool using the AzapiResource framework
91
+ *
92
+ * @param scope - The scope in which to define this construct
93
+ * @param id - The unique identifier for this instance
94
+ * @param props - Configuration properties for the IPAM Pool
95
+ */
96
+ constructor(scope, id, props) {
97
+ // Validate CIDR prefixes before construction
98
+ IpamPool.validateAddressPrefixes(props.addressPrefixes);
99
+ super(scope, id, props);
100
+ this.props = props;
101
+ // Extract properties from the AZAPI resource outputs using Terraform interpolation
102
+ this.resourceName = `\${${this.terraformResource.fqn}.name}`;
103
+ // Create Terraform outputs for easy access and referencing from other resources
104
+ this.idOutput = new cdktf.TerraformOutput(this, "id", {
105
+ value: this.id,
106
+ description: "The ID of the IPAM Pool",
107
+ });
108
+ this.nameOutput = new cdktf.TerraformOutput(this, "name", {
109
+ value: this.resourceName,
110
+ description: "The name of the IPAM Pool",
111
+ });
112
+ this.locationOutput = new cdktf.TerraformOutput(this, "location", {
113
+ value: `\${${this.terraformResource.fqn}.location}`,
114
+ description: "The location of the IPAM Pool",
115
+ });
116
+ // Override logical IDs to match naming convention
117
+ this.idOutput.overrideLogicalId("id");
118
+ this.nameOutput.overrideLogicalId("name");
119
+ this.locationOutput.overrideLogicalId("location");
120
+ // Apply ignore changes if specified
121
+ this._applyIgnoreChanges();
122
+ }
123
+ // =============================================================================
124
+ // REQUIRED ABSTRACT METHODS FROM AzapiResource
125
+ // =============================================================================
126
+ /**
127
+ * Resolves the parent resource ID for the IPAM Pool
128
+ * IPAM Pools are scoped to Network Managers
129
+ */
130
+ resolveParentId(props) {
131
+ const typedProps = props;
132
+ return typedProps.networkManagerId;
133
+ }
134
+ /**
135
+ * Gets the default API version to use when no explicit version is specified
136
+ */
137
+ defaultVersion() {
138
+ return "2024-05-01";
139
+ }
140
+ /**
141
+ * Gets the Azure resource type for IPAM Pools
142
+ */
143
+ resourceType() {
144
+ return ipam_pool_schemas_1.IPAM_POOL_TYPE;
145
+ }
146
+ /**
147
+ * Gets the API schema for the resolved version
148
+ */
149
+ apiSchema() {
150
+ return this.resolveSchema();
151
+ }
152
+ /**
153
+ * Creates the resource body for the Azure API call
154
+ */
155
+ createResourceBody(props) {
156
+ const typedProps = props;
157
+ return {
158
+ location: typedProps.location,
159
+ tags: this.allTags(),
160
+ properties: {
161
+ addressPrefixes: typedProps.addressPrefixes,
162
+ description: typedProps.description,
163
+ displayName: typedProps.displayName,
164
+ parentPoolName: typedProps.parentPoolName,
165
+ },
166
+ };
167
+ }
168
+ // =============================================================================
169
+ // PUBLIC METHODS FOR IPAM POOL OPERATIONS
170
+ // =============================================================================
171
+ /**
172
+ * Calculate total number of IP addresses in this pool
173
+ * Sums up all addresses from all CIDR blocks
174
+ *
175
+ * @returns Total count of IP addresses across all prefixes
176
+ *
177
+ * @example
178
+ * const pool = new IpamPool(this, "pool", {
179
+ * addressPrefixes: ["10.0.0.0/24", "10.1.0.0/24"]
180
+ * });
181
+ * console.log(pool.totalAddressCount); // 512 (256 + 256)
182
+ */
183
+ get totalAddressCount() {
184
+ return this.props.addressPrefixes.reduce((sum, cidr) => sum + (0, cidr_validator_1.calculateAddressCount)(cidr), 0);
185
+ }
186
+ // =============================================================================
187
+ // PRIVATE HELPER METHODS
188
+ // =============================================================================
189
+ /**
190
+ * Applies ignore changes lifecycle rules if specified in props
191
+ */
192
+ _applyIgnoreChanges() {
193
+ if (this.props.ignoreChanges && this.props.ignoreChanges.length > 0) {
194
+ this.terraformResource.addOverride("lifecycle", {
195
+ ignore_changes: this.props.ignoreChanges,
196
+ });
197
+ }
198
+ }
199
+ }
200
+ exports.IpamPool = IpamPool;
201
+ _a = JSII_RTTI_SYMBOL_1;
202
+ IpamPool[_a] = { fqn: "@microsoft/terraform-cdk-constructs.IpamPool", version: "1.5.0" };
203
+ (() => {
204
+ azapi_resource_1.AzapiResource.registerSchemas(ipam_pool_schemas_1.IPAM_POOL_TYPE, ipam_pool_schemas_1.ALL_IPAM_POOL_VERSIONS);
205
+ })();
206
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"ipam-pool.js","sourceRoot":"","sources":["../../../src/azure-virtualnetworkmanager/lib/ipam-pool.ts"],"names":[],"mappings":";;;;;AAAA;;;;;;;;;;;;;;;;;GAiBG;AAEH,+BAA+B;AAE/B,2DAA6E;AAC7E,2DAIgC;AAChC,8EAGmD;AAoEnD;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA+BG;AACH,MAAa,QAAS,SAAQ,8BAAa;IAKzC;;;;;;OAMG;IACK,MAAM,CAAC,uBAAuB,CAAC,QAAkB;QACvD,IAAI,CAAC,QAAQ,IAAI,QAAQ,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACvC,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;QAC7D,CAAC;QAED,kCAAkC;QAClC,QAAQ,CAAC,OAAO,CAAC,CAAC,MAAM,EAAE,KAAK,EAAE,EAAE;YACjC,IAAI,CAAC,IAAA,4BAAW,EAAC,MAAM,CAAC,EAAE,CAAC;gBACzB,MAAM,IAAI,KAAK,CACb,kCAAkC,KAAK,KAAK,MAAM,IAAI;oBACpD,4CAA4C,CAC/C,CAAC;YACJ,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,0CAA0C;QAC1C,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,QAAQ,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YACzC,KAAK,IAAI,CAAC,GAAG,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,QAAQ,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;gBAC7C,IAAI,IAAA,6BAAY,EAAC,QAAQ,CAAC,CAAC,CAAC,EAAE,QAAQ,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC;oBAC3C,MAAM,IAAI,KAAK,CACb,6BAA6B,QAAQ,CAAC,CAAC,CAAC,QAAQ,QAAQ,CAAC,CAAC,CAAC,IAAI;wBAC7D,wDAAwD,CAC3D,CAAC;gBACJ,CAAC;YACH,CAAC;QACH,CAAC;IACH,CAAC;IAeD;;;;;;OAMG;IACH,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAoB;QAC5D,6CAA6C;QAC7C,QAAQ,CAAC,uBAAuB,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC;QAExD,KAAK,CAAC,KAAK,EAAE,EAAE,EAAE,KAAK,CAAC,CAAC;QAExB,IAAI,CAAC,KAAK,GAAG,KAAK,CAAC;QAEnB,mFAAmF;QACnF,IAAI,CAAC,YAAY,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,GAAG,QAAQ,CAAC;QAE7D,gFAAgF;QAChF,IAAI,CAAC,QAAQ,GAAG,IAAI,KAAK,CAAC,eAAe,CAAC,IAAI,EAAE,IAAI,EAAE;YACpD,KAAK,EAAE,IAAI,CAAC,EAAE;YACd,WAAW,EAAE,yBAAyB;SACvC,CAAC,CAAC;QAEH,IAAI,CAAC,UAAU,GAAG,IAAI,KAAK,CAAC,eAAe,CAAC,IAAI,EAAE,MAAM,EAAE;YACxD,KAAK,EAAE,IAAI,CAAC,YAAY;YACxB,WAAW,EAAE,2BAA2B;SACzC,CAAC,CAAC;QAEH,IAAI,CAAC,cAAc,GAAG,IAAI,KAAK,CAAC,eAAe,CAAC,IAAI,EAAE,UAAU,EAAE;YAChE,KAAK,EAAE,MAAM,IAAI,CAAC,iBAAiB,CAAC,GAAG,YAAY;YACnD,WAAW,EAAE,+BAA+B;SAC7C,CAAC,CAAC;QAEH,kDAAkD;QAClD,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC,IAAI,CAAC,CAAC;QACtC,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,MAAM,CAAC,CAAC;QAC1C,IAAI,CAAC,cAAc,CAAC,iBAAiB,CAAC,UAAU,CAAC,CAAC;QAElD,oCAAoC;QACpC,IAAI,CAAC,mBAAmB,EAAE,CAAC;IAC7B,CAAC;IAED,gFAAgF;IAChF,+CAA+C;IAC/C,gFAAgF;IAEhF;;;OAGG;IACO,eAAe,CAAC,KAAU;QAClC,MAAM,UAAU,GAAG,KAAsB,CAAC;QAC1C,OAAO,UAAU,CAAC,gBAAgB,CAAC;IACrC,CAAC;IAED;;OAEG;IACO,cAAc;QACtB,OAAO,YAAY,CAAC;IACtB,CAAC;IAED;;OAEG;IACO,YAAY;QACpB,OAAO,kCAAc,CAAC;IACxB,CAAC;IAED;;OAEG;IACO,SAAS;QACjB,OAAO,IAAI,CAAC,aAAa,EAAE,CAAC;IAC9B,CAAC;IAED;;OAEG;IACO,kBAAkB,CAAC,KAAU;QACrC,MAAM,UAAU,GAAG,KAAsB,CAAC;QAC1C,OAAO;YACL,QAAQ,EAAE,UAAU,CAAC,QAAQ;YAC7B,IAAI,EAAE,IAAI,CAAC,OAAO,EAAE;YACpB,UAAU,EAAE;gBACV,eAAe,EAAE,UAAU,CAAC,eAAe;gBAC3C,WAAW,EAAE,UAAU,CAAC,WAAW;gBACnC,WAAW,EAAE,UAAU,CAAC,WAAW;gBACnC,cAAc,EAAE,UAAU,CAAC,cAAc;aAC1C;SACF,CAAC;IACJ,CAAC;IAED,gFAAgF;IAChF,0CAA0C;IAC1C,gFAAgF;IAEhF;;;;;;;;;;;OAWG;IACH,IAAW,iBAAiB;QAC1B,OAAO,IAAI,CAAC,KAAK,CAAC,eAAe,CAAC,MAAM,CACtC,CAAC,GAAG,EAAE,IAAI,EAAE,EAAE,CAAC,GAAG,GAAG,IAAA,sCAAqB,EAAC,IAAI,CAAC,EAChD,CAAC,CACF,CAAC;IACJ,CAAC;IAED,gFAAgF;IAChF,yBAAyB;IACzB,gFAAgF;IAEhF;;OAEG;IACK,mBAAmB;QACzB,IAAI,IAAI,CAAC,KAAK,CAAC,aAAa,IAAI,IAAI,CAAC,KAAK,CAAC,aAAa,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACpE,IAAI,CAAC,iBAAiB,CAAC,WAAW,CAAC,WAAW,EAAE;gBAC9C,cAAc,EAAE,IAAI,CAAC,KAAK,CAAC,aAAa;aACzC,CAAC,CAAC;QACL,CAAC;IACH,CAAC;;AAvLH,4BAwLC;;;AAvLC;IACE,8BAAa,CAAC,eAAe,CAAC,kCAAc,EAAE,0CAAsB,CAAC,CAAC;AACxE,CAAC,GAAA,CAAA","sourcesContent":["/**\n * Azure Virtual Network Manager IPAM Pool implementation using AzapiResource framework\n *\n * This class provides a unified implementation for Azure Virtual Network Manager IPAM Pools\n * that automatically handles version management, schema validation, and property transformation\n * across all supported API versions.\n *\n * Supported API Versions:\n * - 2024-05-01 (Active, Latest)\n *\n * Features:\n * - Automatic latest version resolution when no version is specified\n * - Explicit version pinning for stability requirements\n * - Schema-driven validation and transformation\n * - CIDR validation and overlap detection\n * - Hierarchical pool support\n * - JSII compliance for multi-language support\n */\n\nimport * as cdktf from \"cdktf\";\nimport { Construct } from \"constructs\";\nimport { ALL_IPAM_POOL_VERSIONS, IPAM_POOL_TYPE } from \"./ipam-pool-schemas\";\nimport {\n  isValidCidr,\n  cidrsOverlap,\n  calculateAddressCount,\n} from \"./utils/cidr-validator\";\nimport {\n  AzapiResource,\n  AzapiResourceProps,\n} from \"../../core-azure/lib/azapi/azapi-resource\";\nimport { ApiSchema } from \"../../core-azure/lib/version-manager/interfaces/version-interfaces\";\n\n/**\n * Properties for the Azure Virtual Network Manager IPAM Pool\n *\n * Extends AzapiResourceProps with IPAM Pool specific properties\n */\nexport interface IpamPoolProps extends AzapiResourceProps {\n  /**\n   * Resource ID of the parent Network Manager\n   * @example \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg/providers/Microsoft.Network/networkManagers/vnm\"\n   */\n  readonly networkManagerId: string;\n\n  /**\n   * IP address prefixes for the pool\n   * Must be valid CIDR notation (e.g., \"10.0.0.0/8\")\n   * Multiple prefixes must not overlap\n   * @example [\"10.0.0.0/8\", \"172.16.0.0/12\"]\n   */\n  readonly addressPrefixes: string[];\n\n  /**\n   * Optional description of the IPAM pool\n   * @example \"Production IP address pool for East US region\"\n   */\n  readonly description?: string;\n\n  /**\n   * Optional friendly display name\n   * @example \"East US Production Pool\"\n   */\n  readonly displayName?: string;\n\n  /**\n   * Name of parent pool for hierarchical pools\n   * Leave empty/undefined for root pools\n   * @example \"root-pool\"\n   */\n  readonly parentPoolName?: string;\n\n  /**\n   * The lifecycle rules to ignore changes\n   * @example [\"tags\"]\n   */\n  readonly ignoreChanges?: string[];\n}\n\n/**\n * Properties for IPAM Pool body\n */\nexport interface IpamPoolProperties {\n  readonly addressPrefixes: string[];\n  readonly description?: string;\n  readonly displayName?: string;\n  readonly parentPoolName?: string;\n}\n\n/**\n * The resource body interface for Azure IPAM Pool API calls\n */\nexport interface IpamPoolBody {\n  readonly location: string;\n  readonly tags?: Record<string, string>;\n  readonly properties: IpamPoolProperties;\n}\n\n/**\n * Azure Virtual Network Manager IPAM Pool implementation\n *\n * IPAM Pools provide centralized IP address management for virtual networks,\n * enabling automatic CIDR allocation, overlap prevention, and hierarchical\n * address space organization. They are essential for managing IP addresses\n * at scale across multiple virtual networks and subscriptions.\n *\n * @example\n * // Basic IPAM pool for production workloads:\n * const ipamPool = new IpamPool(this, \"prod-pool\", {\n *   name: \"production-pool\",\n *   location: \"eastus\",\n *   networkManagerId: networkManager.id,\n *   addressPrefixes: [\"10.0.0.0/8\"],\n *   description: \"Root IP address pool for production\",\n *   displayName: \"Production Pool\"\n * });\n *\n * @example\n * // Hierarchical pool with parent reference:\n * const childPool = new IpamPool(this, \"eastus-pool\", {\n *   name: \"eastus-pool\",\n *   location: \"eastus\",\n *   networkManagerId: networkManager.id,\n *   addressPrefixes: [\"10.1.0.0/16\"],\n *   parentPoolName: \"production-pool\",\n *   description: \"East US regional pool\"\n * });\n *\n * @stability stable\n */\nexport class IpamPool extends AzapiResource {\n  static {\n    AzapiResource.registerSchemas(IPAM_POOL_TYPE, ALL_IPAM_POOL_VERSIONS);\n  }\n\n  /**\n   * Validates address prefixes for format and overlap\n   * Throws descriptive errors if validation fails\n   *\n   * @param prefixes - Array of CIDR blocks to validate\n   * @throws Error if validation fails\n   */\n  private static validateAddressPrefixes(prefixes: string[]): void {\n    if (!prefixes || prefixes.length === 0) {\n      throw new Error(\"At least one address prefix is required\");\n    }\n\n    // Validate each CIDR individually\n    prefixes.forEach((prefix, index) => {\n      if (!isValidCidr(prefix)) {\n        throw new Error(\n          `Invalid CIDR notation at index ${index}: ${prefix}. ` +\n            `Expected format: x.x.x.x/y where y is 0-32`,\n        );\n      }\n    });\n\n    // Check for overlaps within the same pool\n    for (let i = 0; i < prefixes.length; i++) {\n      for (let j = i + 1; j < prefixes.length; j++) {\n        if (cidrsOverlap(prefixes[i], prefixes[j])) {\n          throw new Error(\n            `Address prefixes overlap: ${prefixes[i]} and ${prefixes[j]}. ` +\n              `Each CIDR block within a pool must be non-overlapping.`,\n          );\n        }\n      }\n    }\n  }\n\n  /**\n   * The input properties for this IPAM Pool instance\n   */\n  public readonly props: IpamPoolProps;\n\n  // Output properties for easy access and referencing\n  public readonly idOutput: cdktf.TerraformOutput;\n  public readonly nameOutput: cdktf.TerraformOutput;\n  public readonly locationOutput: cdktf.TerraformOutput;\n\n  // Public properties\n  public readonly resourceName: string;\n\n  /**\n   * Creates a new Azure Virtual Network Manager IPAM Pool using the AzapiResource framework\n   *\n   * @param scope - The scope in which to define this construct\n   * @param id - The unique identifier for this instance\n   * @param props - Configuration properties for the IPAM Pool\n   */\n  constructor(scope: Construct, id: string, props: IpamPoolProps) {\n    // Validate CIDR prefixes before construction\n    IpamPool.validateAddressPrefixes(props.addressPrefixes);\n\n    super(scope, id, props);\n\n    this.props = props;\n\n    // Extract properties from the AZAPI resource outputs using Terraform interpolation\n    this.resourceName = `\\${${this.terraformResource.fqn}.name}`;\n\n    // Create Terraform outputs for easy access and referencing from other resources\n    this.idOutput = new cdktf.TerraformOutput(this, \"id\", {\n      value: this.id,\n      description: \"The ID of the IPAM Pool\",\n    });\n\n    this.nameOutput = new cdktf.TerraformOutput(this, \"name\", {\n      value: this.resourceName,\n      description: \"The name of the IPAM Pool\",\n    });\n\n    this.locationOutput = new cdktf.TerraformOutput(this, \"location\", {\n      value: `\\${${this.terraformResource.fqn}.location}`,\n      description: \"The location of the IPAM Pool\",\n    });\n\n    // Override logical IDs to match naming convention\n    this.idOutput.overrideLogicalId(\"id\");\n    this.nameOutput.overrideLogicalId(\"name\");\n    this.locationOutput.overrideLogicalId(\"location\");\n\n    // Apply ignore changes if specified\n    this._applyIgnoreChanges();\n  }\n\n  // =============================================================================\n  // REQUIRED ABSTRACT METHODS FROM AzapiResource\n  // =============================================================================\n\n  /**\n   * Resolves the parent resource ID for the IPAM Pool\n   * IPAM Pools are scoped to Network Managers\n   */\n  protected resolveParentId(props: any): string {\n    const typedProps = props as IpamPoolProps;\n    return typedProps.networkManagerId;\n  }\n\n  /**\n   * Gets the default API version to use when no explicit version is specified\n   */\n  protected defaultVersion(): string {\n    return \"2024-05-01\";\n  }\n\n  /**\n   * Gets the Azure resource type for IPAM Pools\n   */\n  protected resourceType(): string {\n    return IPAM_POOL_TYPE;\n  }\n\n  /**\n   * Gets the API schema for the resolved version\n   */\n  protected apiSchema(): ApiSchema {\n    return this.resolveSchema();\n  }\n\n  /**\n   * Creates the resource body for the Azure API call\n   */\n  protected createResourceBody(props: any): any {\n    const typedProps = props as IpamPoolProps;\n    return {\n      location: typedProps.location,\n      tags: this.allTags(),\n      properties: {\n        addressPrefixes: typedProps.addressPrefixes,\n        description: typedProps.description,\n        displayName: typedProps.displayName,\n        parentPoolName: typedProps.parentPoolName,\n      },\n    };\n  }\n\n  // =============================================================================\n  // PUBLIC METHODS FOR IPAM POOL OPERATIONS\n  // =============================================================================\n\n  /**\n   * Calculate total number of IP addresses in this pool\n   * Sums up all addresses from all CIDR blocks\n   *\n   * @returns Total count of IP addresses across all prefixes\n   *\n   * @example\n   * const pool = new IpamPool(this, \"pool\", {\n   *   addressPrefixes: [\"10.0.0.0/24\", \"10.1.0.0/24\"]\n   * });\n   * console.log(pool.totalAddressCount); // 512 (256 + 256)\n   */\n  public get totalAddressCount(): number {\n    return this.props.addressPrefixes.reduce(\n      (sum, cidr) => sum + calculateAddressCount(cidr),\n      0,\n    );\n  }\n\n  // =============================================================================\n  // PRIVATE HELPER METHODS\n  // =============================================================================\n\n  /**\n   * Applies ignore changes lifecycle rules if specified in props\n   */\n  private _applyIgnoreChanges(): void {\n    if (this.props.ignoreChanges && this.props.ignoreChanges.length > 0) {\n      this.terraformResource.addOverride(\"lifecycle\", {\n        ignore_changes: this.props.ignoreChanges,\n      });\n    }\n  }\n}\n"]}
@@ -156,7 +156,7 @@ class NetworkGroupStaticMember extends azapi_resource_1.AzapiResource {
156
156
  }
157
157
  exports.NetworkGroupStaticMember = NetworkGroupStaticMember;
158
158
  _a = JSII_RTTI_SYMBOL_1;
159
- NetworkGroupStaticMember[_a] = { fqn: "@microsoft/terraform-cdk-constructs.NetworkGroupStaticMember", version: "1.3.1" };
159
+ NetworkGroupStaticMember[_a] = { fqn: "@microsoft/terraform-cdk-constructs.NetworkGroupStaticMember", version: "1.5.0" };
160
160
  (() => {
161
161
  azapi_resource_1.AzapiResource.registerSchemas(network_group_static_member_schemas_1.STATIC_MEMBER_TYPE, network_group_static_member_schemas_1.ALL_STATIC_MEMBER_VERSIONS);
162
162
  })();
@@ -151,7 +151,7 @@ class NetworkGroup extends azapi_resource_1.AzapiResource {
151
151
  }
152
152
  exports.NetworkGroup = NetworkGroup;
153
153
  _a = JSII_RTTI_SYMBOL_1;
154
- NetworkGroup[_a] = { fqn: "@microsoft/terraform-cdk-constructs.NetworkGroup", version: "1.3.1" };
154
+ NetworkGroup[_a] = { fqn: "@microsoft/terraform-cdk-constructs.NetworkGroup", version: "1.5.0" };
155
155
  (() => {
156
156
  azapi_resource_1.AzapiResource.registerSchemas(network_group_schemas_1.NETWORK_GROUP_TYPE, network_group_schemas_1.ALL_NETWORK_GROUP_VERSIONS);
157
157
  })();
@@ -157,7 +157,7 @@ class SecurityAdminConfiguration extends azapi_resource_1.AzapiResource {
157
157
  }
158
158
  exports.SecurityAdminConfiguration = SecurityAdminConfiguration;
159
159
  _a = JSII_RTTI_SYMBOL_1;
160
- SecurityAdminConfiguration[_a] = { fqn: "@microsoft/terraform-cdk-constructs.SecurityAdminConfiguration", version: "1.3.1" };
160
+ SecurityAdminConfiguration[_a] = { fqn: "@microsoft/terraform-cdk-constructs.SecurityAdminConfiguration", version: "1.5.0" };
161
161
  (() => {
162
162
  azapi_resource_1.AzapiResource.registerSchemas(security_admin_configuration_schemas_1.SECURITY_ADMIN_CONFIGURATION_TYPE, security_admin_configuration_schemas_1.ALL_SECURITY_ADMIN_CONFIGURATION_VERSIONS);
163
163
  })();
@@ -155,7 +155,7 @@ class SecurityAdminRuleCollection extends azapi_resource_1.AzapiResource {
155
155
  }
156
156
  exports.SecurityAdminRuleCollection = SecurityAdminRuleCollection;
157
157
  _a = JSII_RTTI_SYMBOL_1;
158
- SecurityAdminRuleCollection[_a] = { fqn: "@microsoft/terraform-cdk-constructs.SecurityAdminRuleCollection", version: "1.3.1" };
158
+ SecurityAdminRuleCollection[_a] = { fqn: "@microsoft/terraform-cdk-constructs.SecurityAdminRuleCollection", version: "1.5.0" };
159
159
  (() => {
160
160
  azapi_resource_1.AzapiResource.registerSchemas(security_admin_rule_collection_schemas_1.RULE_COLLECTION_TYPE, security_admin_rule_collection_schemas_1.ALL_RULE_COLLECTION_VERSIONS);
161
161
  })();
@@ -197,7 +197,7 @@ class SecurityAdminRule extends azapi_resource_1.AzapiResource {
197
197
  }
198
198
  exports.SecurityAdminRule = SecurityAdminRule;
199
199
  _a = JSII_RTTI_SYMBOL_1;
200
- SecurityAdminRule[_a] = { fqn: "@microsoft/terraform-cdk-constructs.SecurityAdminRule", version: "1.3.1" };
200
+ SecurityAdminRule[_a] = { fqn: "@microsoft/terraform-cdk-constructs.SecurityAdminRule", version: "1.5.0" };
201
201
  (() => {
202
202
  azapi_resource_1.AzapiResource.registerSchemas(security_admin_rule_schemas_1.SECURITY_ADMIN_RULE_TYPE, security_admin_rule_schemas_1.ALL_SECURITY_ADMIN_RULE_VERSIONS);
203
203
  })();
@@ -0,0 +1,225 @@
1
+ /**
2
+ * CIDR Validator Utility
3
+ *
4
+ * Provides comprehensive validation and parsing utilities for IPv4 CIDR notation.
5
+ * Used by IPAM constructs to ensure proper network address space management.
6
+ */
7
+ /**
8
+ * Result of CIDR validation operations
9
+ */
10
+ export interface CidrValidationResult {
11
+ /** Whether the validation passed */
12
+ readonly valid: boolean;
13
+ /** List of validation errors */
14
+ readonly errors: string[];
15
+ /** List of validation warnings */
16
+ readonly warnings: string[];
17
+ }
18
+ /**
19
+ * Parsed CIDR information
20
+ */
21
+ export interface ParsedCidr {
22
+ /** Original CIDR notation (e.g., "10.0.0.0/8") */
23
+ readonly cidr: string;
24
+ /** Network address (e.g., "10.0.0.0") */
25
+ readonly network: string;
26
+ /** Prefix length (e.g., 8) */
27
+ readonly prefix: number;
28
+ /** First usable IP address */
29
+ readonly firstIp: string;
30
+ /** Last usable IP address */
31
+ readonly lastIp: string;
32
+ /** Total number of addresses in the range */
33
+ readonly totalAddresses: number;
34
+ /** Network mask (e.g., "255.0.0.0") */
35
+ readonly netmask: string;
36
+ }
37
+ /**
38
+ * Validates if a string is a valid CIDR notation
39
+ *
40
+ * @param cidr - CIDR string (e.g., "10.0.0.0/16")
41
+ * @returns boolean - true if valid CIDR format
42
+ *
43
+ * @example
44
+ * const valid = isValidCidr("10.0.0.0/16");
45
+ * console.log(valid); // true
46
+ */
47
+ export declare function isValidCidr(cidr: string): boolean;
48
+ /**
49
+ * Validates if CIDR is within allowed private ranges (RFC 1918)
50
+ *
51
+ * @param cidr - CIDR string
52
+ * @returns boolean - true if within private IP range
53
+ *
54
+ * @example
55
+ * const isPrivate = isPrivateRange("10.0.0.0/16");
56
+ * console.log(isPrivate); // true
57
+ */
58
+ export declare function isPrivateRange(cidr: string): boolean;
59
+ /**
60
+ * Checks if two CIDR blocks overlap
61
+ *
62
+ * @param cidr1 - First CIDR
63
+ * @param cidr2 - Second CIDR
64
+ * @returns boolean - true if CIDRs overlap
65
+ *
66
+ * @example
67
+ * const overlap = cidrsOverlap("10.0.0.0/8", "10.1.0.0/16");
68
+ * console.log(overlap); // true
69
+ */
70
+ export declare function cidrsOverlap(cidr1: string, cidr2: string): boolean;
71
+ /**
72
+ * Validates if child CIDR is contained within parent CIDR
73
+ *
74
+ * @param childCidr - Child CIDR block
75
+ * @param parentCidr - Parent CIDR block
76
+ * @returns boolean - true if child is subnet of parent
77
+ *
78
+ * @example
79
+ * const isSubnet = isSubnet("10.1.0.0/16", "10.0.0.0/8");
80
+ * console.log(isSubnet); // true
81
+ */
82
+ export declare function isSubnet(childCidr: string, parentCidr: string): boolean;
83
+ /**
84
+ * Calculates number of IP addresses in a CIDR block
85
+ *
86
+ * @param cidr - CIDR string
87
+ * @returns number - Total IP addresses in the block
88
+ *
89
+ * @example
90
+ * const count = calculateAddressCount("10.0.0.0/24");
91
+ * console.log(count); // 256
92
+ */
93
+ export declare function calculateAddressCount(cidr: string): number;
94
+ /**
95
+ * Validates prefix length is within allowed range
96
+ *
97
+ * @param cidr - CIDR string
98
+ * @param minPrefix - Minimum allowed prefix (e.g., 8)
99
+ * @param maxPrefix - Maximum allowed prefix (e.g., 29)
100
+ * @returns boolean - true if prefix length is within range
101
+ *
102
+ * @example
103
+ * const valid = isValidPrefixLength("10.0.0.0/24", 8, 29);
104
+ * console.log(valid); // true
105
+ */
106
+ export declare function isValidPrefixLength(cidr: string, minPrefix: number, maxPrefix: number): boolean;
107
+ /**
108
+ * Validate CIDR format and structure
109
+ *
110
+ * @param cidr - CIDR notation string (e.g., "10.0.0.0/8")
111
+ * @returns Validation result with errors and warnings
112
+ *
113
+ * @example
114
+ * const result = validateCidr("10.0.0.0/8");
115
+ * if (!result.valid) {
116
+ * console.error("Invalid CIDR:", result.errors);
117
+ * }
118
+ */
119
+ export declare function validateCidr(cidr: string): CidrValidationResult;
120
+ /**
121
+ * Parse CIDR into structured information
122
+ *
123
+ * @param cidr - CIDR notation string
124
+ * @returns Parsed CIDR information
125
+ * @throws Error if CIDR format is invalid
126
+ *
127
+ * @example
128
+ * const parsed = parseCidr("10.0.0.0/8");
129
+ * console.log(`Network: ${parsed.network}, Prefix: ${parsed.prefix}`);
130
+ * console.log(`Range: ${parsed.firstIp} - ${parsed.lastIp}`);
131
+ * console.log(`Total addresses: ${parsed.totalAddresses}`);
132
+ */
133
+ export declare function parseCidr(cidr: string): ParsedCidr;
134
+ /**
135
+ * Check if two CIDRs overlap
136
+ *
137
+ * @param cidr1 - First CIDR block
138
+ * @param cidr2 - Second CIDR block
139
+ * @returns True if the CIDRs overlap
140
+ *
141
+ * @example
142
+ * const overlaps = checkOverlap("10.0.0.0/16", "10.0.1.0/24");
143
+ * console.log(overlaps); // true
144
+ */
145
+ export declare function checkOverlap(cidr1: string, cidr2: string): boolean;
146
+ /**
147
+ * Validate that multiple CIDRs don't overlap
148
+ *
149
+ * @param cidrs - Array of CIDR blocks to check
150
+ * @returns Validation result with details of any overlaps
151
+ *
152
+ * @example
153
+ * const result = validateNoOverlaps([
154
+ * "10.0.0.0/16",
155
+ * "10.1.0.0/16",
156
+ * "10.0.1.0/24"
157
+ * ]);
158
+ * if (!result.valid) {
159
+ * console.error("Overlapping CIDRs:", result.errors);
160
+ * }
161
+ */
162
+ export declare function validateNoOverlaps(cidrs: string[]): CidrValidationResult;
163
+ /**
164
+ * Check if a child CIDR is contained within a parent CIDR
165
+ *
166
+ * @param parentCidr - Parent CIDR block
167
+ * @param childCidr - Child CIDR block to check
168
+ * @returns True if child is fully contained in parent
169
+ *
170
+ * @example
171
+ * const contained = isContained("10.0.0.0/16", "10.0.1.0/24");
172
+ * console.log(contained); // true
173
+ */
174
+ export declare function isContained(parentCidr: string, childCidr: string): boolean;
175
+ /**
176
+ * Validate that multiple child CIDRs are all contained within a parent CIDR
177
+ *
178
+ * @param parentCidr - Parent CIDR block
179
+ * @param childCidrs - Array of child CIDR blocks
180
+ * @returns Validation result with details of any containment violations
181
+ *
182
+ * @example
183
+ * const result = validateContainment("10.0.0.0/16", [
184
+ * "10.0.1.0/24",
185
+ * "10.0.2.0/24"
186
+ * ]);
187
+ * if (!result.valid) {
188
+ * console.error("Containment violations:", result.errors);
189
+ * }
190
+ */
191
+ export declare function validateContainment(parentCidr: string, childCidrs: string[]): CidrValidationResult;
192
+ /**
193
+ * Convert an IP address string to a 32-bit number
194
+ *
195
+ * @param ip - IP address string (e.g., "10.0.0.1")
196
+ * @returns 32-bit number representation
197
+ *
198
+ * @example
199
+ * const num = ipToNumber("10.0.0.1");
200
+ * console.log(num); // 167772161
201
+ */
202
+ export declare function ipToNumber(ip: string): number;
203
+ /**
204
+ * Convert a 32-bit number to an IP address string
205
+ *
206
+ * @param num - 32-bit number representation
207
+ * @returns IP address string
208
+ *
209
+ * @example
210
+ * const ip = numberToIp(167772161);
211
+ * console.log(ip); // "10.0.0.1"
212
+ */
213
+ export declare function numberToIp(num: number): string;
214
+ /**
215
+ * Convert a prefix length to a netmask number
216
+ *
217
+ * @param prefix - Prefix length (0-32)
218
+ * @returns 32-bit netmask number
219
+ *
220
+ * @example
221
+ * const mask = prefixToMask(24);
222
+ * const maskIp = numberToIp(mask);
223
+ * console.log(maskIp); // "255.255.255.0"
224
+ */
225
+ export declare function prefixToMask(prefix: number): number;