@microsoft/terraform-cdk-constructs 1.7.1 → 1.9.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (121) hide show
  1. package/.jsii +46476 -27231
  2. package/API.md +68443 -28286
  3. package/lib/azure-actiongroup/lib/action-group.js +1 -1
  4. package/lib/azure-activitylogalert/lib/activity-log-alert.js +1 -1
  5. package/lib/azure-aks/lib/aks-cluster.js +1 -1
  6. package/lib/azure-diagnosticsettings/lib/diagnostic-settings.js +1 -1
  7. package/lib/azure-dnsforwardingruleset/lib/dns-forwarding-ruleset.js +1 -1
  8. package/lib/azure-dnsforwardingruleset/lib/forwarding-rule.js +1 -1
  9. package/lib/azure-dnsforwardingruleset/lib/virtual-network-link.js +1 -1
  10. package/lib/azure-dnsresolver/lib/dns-resolver.js +1 -1
  11. package/lib/azure-dnsresolver/lib/inbound-endpoint.js +1 -1
  12. package/lib/azure-dnsresolver/lib/outbound-endpoint.js +1 -1
  13. package/lib/azure-dnszone/lib/dns-zone.js +1 -1
  14. package/lib/azure-dnszone/lib/index.d.ts +1 -0
  15. package/lib/azure-dnszone/lib/index.js +2 -1
  16. package/lib/azure-dnszone/lib/records/dns-record-schemas.d.ts +68 -0
  17. package/lib/azure-dnszone/lib/records/dns-record-schemas.js +813 -0
  18. package/lib/azure-dnszone/lib/records/dns-records.d.ts +688 -0
  19. package/lib/azure-dnszone/lib/records/dns-records.js +924 -0
  20. package/lib/azure-dnszone/lib/records/index.d.ts +19 -0
  21. package/lib/azure-dnszone/lib/records/index.js +38 -0
  22. package/lib/azure-dnszone/test/dns-records.integ.d.ts +21 -0
  23. package/lib/azure-dnszone/test/dns-records.integ.js +321 -0
  24. package/lib/azure-dnszone/test/dns-records.spec.d.ts +20 -0
  25. package/lib/azure-dnszone/test/dns-records.spec.js +950 -0
  26. package/lib/azure-loganalyticsworkspace/index.d.ts +6 -0
  27. package/lib/azure-loganalyticsworkspace/index.js +23 -0
  28. package/lib/azure-loganalyticsworkspace/lib/index.d.ts +5 -0
  29. package/lib/azure-loganalyticsworkspace/lib/index.js +22 -0
  30. package/lib/azure-loganalyticsworkspace/lib/log-analytics-workspace-schemas.d.ts +51 -0
  31. package/lib/azure-loganalyticsworkspace/lib/log-analytics-workspace-schemas.js +255 -0
  32. package/lib/azure-loganalyticsworkspace/lib/log-analytics-workspace.d.ts +301 -0
  33. package/lib/azure-loganalyticsworkspace/lib/log-analytics-workspace.js +213 -0
  34. package/lib/azure-loganalyticsworkspace/test/log-analytics-workspace.integ.d.ts +9 -0
  35. package/lib/azure-loganalyticsworkspace/test/log-analytics-workspace.integ.js +71 -0
  36. package/lib/azure-loganalyticsworkspace/test/log-analytics-workspace.spec.d.ts +8 -0
  37. package/lib/azure-loganalyticsworkspace/test/log-analytics-workspace.spec.js +504 -0
  38. package/lib/azure-metricalert/lib/metric-alert.js +1 -1
  39. package/lib/azure-networkinterface/lib/network-interface.js +1 -1
  40. package/lib/azure-networksecuritygroup/lib/network-security-group.js +1 -1
  41. package/lib/azure-networkwatcher/index.d.ts +14 -0
  42. package/lib/azure-networkwatcher/index.js +31 -0
  43. package/lib/azure-networkwatcher/lib/index.d.ts +5 -0
  44. package/lib/azure-networkwatcher/lib/index.js +22 -0
  45. package/lib/azure-networkwatcher/lib/network-watcher-schemas.d.ts +47 -0
  46. package/lib/azure-networkwatcher/lib/network-watcher-schemas.js +167 -0
  47. package/lib/azure-networkwatcher/lib/network-watcher.d.ts +181 -0
  48. package/lib/azure-networkwatcher/lib/network-watcher.js +187 -0
  49. package/lib/azure-networkwatcher/test/network-watcher.integ.d.ts +12 -0
  50. package/lib/azure-networkwatcher/test/network-watcher.integ.js +84 -0
  51. package/lib/azure-networkwatcher/test/network-watcher.spec.d.ts +8 -0
  52. package/lib/azure-networkwatcher/test/network-watcher.spec.js +312 -0
  53. package/lib/azure-policyassignment/lib/policy-assignment.js +1 -1
  54. package/lib/azure-policydefinition/lib/policy-definition.js +1 -1
  55. package/lib/azure-policysetdefinition/index.d.ts +10 -0
  56. package/lib/azure-policysetdefinition/index.js +27 -0
  57. package/lib/azure-policysetdefinition/lib/index.d.ts +5 -0
  58. package/lib/azure-policysetdefinition/lib/index.js +22 -0
  59. package/lib/azure-policysetdefinition/lib/policy-set-definition-schemas.d.ts +50 -0
  60. package/lib/azure-policysetdefinition/lib/policy-set-definition-schemas.js +255 -0
  61. package/lib/azure-policysetdefinition/lib/policy-set-definition.d.ts +426 -0
  62. package/lib/azure-policysetdefinition/lib/policy-set-definition.js +255 -0
  63. package/lib/azure-policysetdefinition/test/policy-set-definition.integ.d.ts +9 -0
  64. package/lib/azure-policysetdefinition/test/policy-set-definition.integ.js +56 -0
  65. package/lib/azure-policysetdefinition/test/policy-set-definition.spec.d.ts +8 -0
  66. package/lib/azure-policysetdefinition/test/policy-set-definition.spec.js +745 -0
  67. package/lib/azure-privatednszone/lib/index.d.ts +1 -0
  68. package/lib/azure-privatednszone/lib/index.js +2 -1
  69. package/lib/azure-privatednszone/lib/private-dns-zone.d.ts +0 -2
  70. package/lib/azure-privatednszone/lib/private-dns-zone.js +6 -13
  71. package/lib/azure-privatednszone/lib/records/index.d.ts +7 -0
  72. package/lib/azure-privatednszone/lib/records/index.js +26 -0
  73. package/lib/azure-privatednszone/lib/records/private-dns-record-schemas.d.ts +52 -0
  74. package/lib/azure-privatednszone/lib/records/private-dns-record-schemas.js +683 -0
  75. package/lib/azure-privatednszone/lib/records/private-dns-records.d.ts +523 -0
  76. package/lib/azure-privatednszone/lib/records/private-dns-records.js +739 -0
  77. package/lib/azure-privatednszone/test/private-dns-records.integ.d.ts +19 -0
  78. package/lib/azure-privatednszone/test/private-dns-records.integ.js +245 -0
  79. package/lib/azure-privatednszone/test/private-dns-records.spec.d.ts +18 -0
  80. package/lib/azure-privatednszone/test/private-dns-records.spec.js +756 -0
  81. package/lib/azure-privatednszone/test/private-dns-zone.spec.js +5 -5
  82. package/lib/azure-privatednszonelink/lib/private-dns-zone-link.js +1 -1
  83. package/lib/azure-publicipaddress/lib/public-ip-address.js +1 -1
  84. package/lib/azure-resourcegroup/lib/resource-group.js +1 -1
  85. package/lib/azure-roleassignment/lib/role-assignment.js +1 -1
  86. package/lib/azure-roledefinition/lib/role-definition.js +1 -1
  87. package/lib/azure-storageaccount/lib/storage-account.js +1 -1
  88. package/lib/azure-subnet/lib/subnet.js +1 -1
  89. package/lib/azure-virtualmachine/lib/virtual-machine.js +1 -1
  90. package/lib/azure-virtualnetwork/lib/virtual-network.js +1 -1
  91. package/lib/azure-virtualnetworkgateway/lib/virtual-network-gateway-schemas.js +2 -2
  92. package/lib/azure-virtualnetworkgateway/lib/virtual-network-gateway.d.ts +4 -2
  93. package/lib/azure-virtualnetworkgateway/lib/virtual-network-gateway.js +8 -5
  94. package/lib/azure-virtualnetworkgateway/test/virtual-network-gateway.spec.js +109 -1
  95. package/lib/azure-virtualnetworkgatewayconnection/lib/virtual-network-gateway-connection.js +1 -1
  96. package/lib/azure-virtualnetworkmanager/lib/connectivity-configuration.js +1 -1
  97. package/lib/azure-virtualnetworkmanager/lib/ipam-pool-static-cidr.js +1 -1
  98. package/lib/azure-virtualnetworkmanager/lib/ipam-pool.js +1 -1
  99. package/lib/azure-virtualnetworkmanager/lib/network-group-static-member.js +1 -1
  100. package/lib/azure-virtualnetworkmanager/lib/network-group.js +1 -1
  101. package/lib/azure-virtualnetworkmanager/lib/security-admin-configuration.js +1 -1
  102. package/lib/azure-virtualnetworkmanager/lib/security-admin-rule-collection.js +1 -1
  103. package/lib/azure-virtualnetworkmanager/lib/security-admin-rule.js +1 -1
  104. package/lib/azure-virtualnetworkmanager/lib/virtual-network-manager.js +1 -1
  105. package/lib/azure-vmss/lib/virtual-machine-scale-set.js +1 -1
  106. package/lib/core-azure/lib/azapi/azapi-resource.js +4 -4
  107. package/lib/core-azure/lib/azapi/providers-azapi/data-azapi-client-config/index.js +2 -2
  108. package/lib/core-azure/lib/azapi/providers-azapi/data-azapi-resource/index.js +5 -5
  109. package/lib/core-azure/lib/azapi/providers-azapi/provider/index.js +1 -1
  110. package/lib/core-azure/lib/azapi/providers-azapi/resource/index.js +5 -5
  111. package/lib/core-azure/lib/azapi/providers-azapi/resource-action/index.js +3 -3
  112. package/lib/core-azure/lib/azapi/providers-azapi/update-resource/index.js +3 -3
  113. package/lib/core-azure/lib/azapi/schema-mapper/schema-mapper.js +1 -1
  114. package/lib/core-azure/lib/version-manager/api-version-manager.js +1 -1
  115. package/lib/core-azure/lib/version-manager/interfaces/version-interfaces.js +7 -7
  116. package/lib/index.d.ts +23 -0
  117. package/lib/index.js +25 -2
  118. package/lib/testing/index.js +2 -2
  119. package/lib/testing/lib/cleanup.js +1 -1
  120. package/lib/testing/lib/metadata.js +1 -1
  121. package/package.json +1 -1
@@ -0,0 +1,19 @@
1
+ /**
2
+ * Integration test for Azure Private DNS Zone Records
3
+ *
4
+ * This test demonstrates usage of all Private DNS record types
5
+ * and validates deployment, idempotency, and cleanup for child resources.
6
+ *
7
+ * Supported Record Types:
8
+ * - A record (IPv4 addresses)
9
+ * - AAAA record (IPv6 addresses)
10
+ * - CNAME record
11
+ * - MX record
12
+ * - PTR record
13
+ * - SRV record
14
+ * - TXT record
15
+ * - (SOA is managed by Azure automatically)
16
+ *
17
+ * Run with: npm run integration:nostream
18
+ */
19
+ import "cdktf/lib/testing/adapters/jest";
@@ -0,0 +1,245 @@
1
+ "use strict";
2
+ /**
3
+ * Integration test for Azure Private DNS Zone Records
4
+ *
5
+ * This test demonstrates usage of all Private DNS record types
6
+ * and validates deployment, idempotency, and cleanup for child resources.
7
+ *
8
+ * Supported Record Types:
9
+ * - A record (IPv4 addresses)
10
+ * - AAAA record (IPv6 addresses)
11
+ * - CNAME record
12
+ * - MX record
13
+ * - PTR record
14
+ * - SRV record
15
+ * - TXT record
16
+ * - (SOA is managed by Azure automatically)
17
+ *
18
+ * Run with: npm run integration:nostream
19
+ */
20
+ Object.defineProperty(exports, "__esModule", { value: true });
21
+ const cdktf_1 = require("cdktf");
22
+ require("cdktf/lib/testing/adapters/jest");
23
+ const resource_group_1 = require("../../azure-resourcegroup/lib/resource-group");
24
+ const provider_1 = require("../../core-azure/lib/azapi/providers-azapi/provider");
25
+ const testing_1 = require("../../testing");
26
+ const metadata_1 = require("../../testing/lib/metadata");
27
+ const private_dns_zone_1 = require("../lib/private-dns-zone");
28
+ const records_1 = require("../lib/records");
29
+ // Generate unique test run metadata for this test suite
30
+ const testMetadata = new metadata_1.TestRunMetadata("privatednsrec-integration", {
31
+ maxAgeHours: 4,
32
+ });
33
+ /**
34
+ * Example stack demonstrating Private DNS Records usage
35
+ *
36
+ * Creates a Private DNS Zone and various record types within it.
37
+ */
38
+ class PrivateDnsRecordsExampleStack extends testing_1.BaseTestStack {
39
+ constructor(scope, id) {
40
+ super(scope, id, {
41
+ testRunOptions: {
42
+ maxAgeHours: testMetadata.maxAgeHours,
43
+ autoCleanup: testMetadata.autoCleanup,
44
+ cleanupPolicy: testMetadata.cleanupPolicy,
45
+ },
46
+ });
47
+ // Configure AZAPI provider
48
+ new provider_1.AzapiProvider(this, "azapi", {});
49
+ // Generate unique names
50
+ const resourceGroupName = this.generateResourceName("Microsoft.Resources/resourceGroups", "privatednsrec");
51
+ // Create resource group for the Private DNS zone and records
52
+ const resourceGroup = new resource_group_1.ResourceGroup(this, "test-rg", {
53
+ name: resourceGroupName,
54
+ location: "eastus2",
55
+ tags: {
56
+ ...this.systemTags(),
57
+ purpose: "private-dns-records-testing",
58
+ },
59
+ });
60
+ // Create Private DNS Zone - using a unique zone name
61
+ const zoneName = this.generateResourceName("Microsoft.Network/privateDnsZones", "rec");
62
+ const zone = new private_dns_zone_1.PrivateDnsZone(this, "private-dns-zone", {
63
+ name: `${zoneName}.internal`,
64
+ location: "global",
65
+ resourceGroupId: resourceGroup.id,
66
+ tags: {
67
+ ...this.systemTags(),
68
+ purpose: "dns-records-testing",
69
+ },
70
+ });
71
+ // =========================================================================
72
+ // A Record - Single IP
73
+ // =========================================================================
74
+ new records_1.PrivateDnsARecord(this, "a-record-single", {
75
+ name: "web",
76
+ privateDnsZoneId: zone.id,
77
+ ttl: 300,
78
+ records: [{ ipv4Address: "10.0.1.4" }],
79
+ metadata: {
80
+ purpose: "web-server",
81
+ },
82
+ });
83
+ // =========================================================================
84
+ // A Record - Multiple IPs (load balancing)
85
+ // =========================================================================
86
+ new records_1.PrivateDnsARecord(this, "a-record-multi", {
87
+ name: "api",
88
+ privateDnsZoneId: zone.id,
89
+ ttl: 300,
90
+ records: [
91
+ { ipv4Address: "10.0.1.10" },
92
+ { ipv4Address: "10.0.1.11" },
93
+ { ipv4Address: "10.0.1.12" },
94
+ ],
95
+ metadata: {
96
+ purpose: "api-servers-loadbalanced",
97
+ },
98
+ });
99
+ // =========================================================================
100
+ // AAAA Record - IPv6 addresses
101
+ // =========================================================================
102
+ new records_1.PrivateDnsAaaaRecord(this, "aaaa-record", {
103
+ name: "ipv6host",
104
+ privateDnsZoneId: zone.id,
105
+ ttl: 300,
106
+ records: [{ ipv6Address: "2001:db8::1" }, { ipv6Address: "2001:db8::2" }],
107
+ metadata: {
108
+ purpose: "ipv6-servers",
109
+ },
110
+ });
111
+ // =========================================================================
112
+ // CNAME Record - Alias
113
+ // =========================================================================
114
+ new records_1.PrivateDnsCnameRecord(this, "cname-record", {
115
+ name: "www",
116
+ privateDnsZoneId: zone.id,
117
+ ttl: 3600,
118
+ cname: `web.${zoneName}.internal`,
119
+ metadata: {
120
+ purpose: "alias-to-web",
121
+ },
122
+ });
123
+ // =========================================================================
124
+ // MX Record - Mail exchange servers
125
+ // =========================================================================
126
+ new records_1.PrivateDnsMxRecord(this, "mx-record", {
127
+ name: "@",
128
+ privateDnsZoneId: zone.id,
129
+ ttl: 3600,
130
+ records: [
131
+ { preference: 10, exchange: `mail1.${zoneName}.internal` },
132
+ { preference: 20, exchange: `mail2.${zoneName}.internal` },
133
+ ],
134
+ metadata: {
135
+ purpose: "mail-servers",
136
+ },
137
+ });
138
+ // =========================================================================
139
+ // PTR Record - Reverse DNS
140
+ // Note: In practice, PTR records are created in reverse DNS zones
141
+ // (e.g., 1.0.10.in-addr.arpa), but for this test we demonstrate
142
+ // the record creation in a forward zone
143
+ // =========================================================================
144
+ new records_1.PrivateDnsPtrRecord(this, "ptr-record", {
145
+ name: "ptr",
146
+ privateDnsZoneId: zone.id,
147
+ ttl: 3600,
148
+ records: [{ ptrdname: `server1.${zoneName}.internal` }],
149
+ metadata: {
150
+ purpose: "reverse-dns-lookup",
151
+ },
152
+ });
153
+ // =========================================================================
154
+ // SRV Record - Service location
155
+ // Format: _service._protocol (e.g., _sip._tcp)
156
+ // =========================================================================
157
+ new records_1.PrivateDnsSrvRecord(this, "srv-record", {
158
+ name: "_sip._tcp",
159
+ privateDnsZoneId: zone.id,
160
+ ttl: 3600,
161
+ records: [
162
+ {
163
+ priority: 10,
164
+ weight: 60,
165
+ port: 5060,
166
+ target: `sipserver1.${zoneName}.internal`,
167
+ },
168
+ {
169
+ priority: 10,
170
+ weight: 40,
171
+ port: 5060,
172
+ target: `sipserver2.${zoneName}.internal`,
173
+ },
174
+ {
175
+ priority: 20,
176
+ weight: 100,
177
+ port: 5060,
178
+ target: `sipserver-backup.${zoneName}.internal`,
179
+ },
180
+ ],
181
+ metadata: {
182
+ purpose: "sip-service-discovery",
183
+ },
184
+ });
185
+ // =========================================================================
186
+ // TXT Record - SPF record
187
+ // =========================================================================
188
+ new records_1.PrivateDnsTxtRecord(this, "txt-record-spf", {
189
+ name: "@",
190
+ privateDnsZoneId: zone.id,
191
+ ttl: 3600,
192
+ records: [{ value: ["v=spf1 include:_spf.internal.example.com ~all"] }],
193
+ metadata: {
194
+ purpose: "spf-record",
195
+ },
196
+ });
197
+ // =========================================================================
198
+ // TXT Record - Domain verification
199
+ // =========================================================================
200
+ new records_1.PrivateDnsTxtRecord(this, "txt-record-verification", {
201
+ name: "_verify",
202
+ privateDnsZoneId: zone.id,
203
+ ttl: 3600,
204
+ records: [
205
+ { value: ["verification-token=abc123def456"] },
206
+ { value: ["another-verification=xyz789"] },
207
+ ],
208
+ metadata: {
209
+ purpose: "domain-verification",
210
+ },
211
+ });
212
+ // =========================================================================
213
+ // Additional SRV Record - LDAP service
214
+ // =========================================================================
215
+ new records_1.PrivateDnsSrvRecord(this, "srv-record-ldap", {
216
+ name: "_ldap._tcp",
217
+ privateDnsZoneId: zone.id,
218
+ ttl: 3600,
219
+ records: [
220
+ {
221
+ priority: 0,
222
+ weight: 100,
223
+ port: 389,
224
+ target: `ldap.${zoneName}.internal`,
225
+ },
226
+ ],
227
+ metadata: {
228
+ purpose: "ldap-service-discovery",
229
+ },
230
+ });
231
+ }
232
+ }
233
+ describe("PrivateDnsRecords Integration Test", () => {
234
+ it("should deploy, validate idempotency, and cleanup resources", () => {
235
+ const app = cdktf_1.Testing.app();
236
+ const stack = new PrivateDnsRecordsExampleStack(app, "test-privatednsrecords");
237
+ const synthesized = cdktf_1.Testing.fullSynth(stack);
238
+ // This will:
239
+ // 1. Run terraform apply to deploy resources (including parent-child relationships)
240
+ // 2. Run terraform plan to check idempotency (no changes expected)
241
+ // 3. Run terraform destroy to cleanup resources (child resources cleanup before parent)
242
+ (0, testing_1.TerraformApplyCheckAndDestroy)(synthesized, { verifyCleanup: true });
243
+ }, 600000); // 10 minute timeout for deployment and cleanup
244
+ });
245
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"private-dns-records.integ.js","sourceRoot":"","sources":["../../../src/azure-privatednszone/test/private-dns-records.integ.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;;;;;;;GAiBG;;AAEH,iCAAgC;AAEhC,2CAAyC;AACzC,iFAA6E;AAC7E,kFAAoF;AACpF,2CAA6E;AAC7E,yDAA6D;AAC7D,8DAAyD;AACzD,4CAQwB;AAExB,wDAAwD;AACxD,MAAM,YAAY,GAAG,IAAI,0BAAe,CAAC,2BAA2B,EAAE;IACpE,WAAW,EAAE,CAAC;CACf,CAAC,CAAC;AAEH;;;;GAIG;AACH,MAAM,6BAA8B,SAAQ,uBAAa;IACvD,YAAY,KAAgB,EAAE,EAAU;QACtC,KAAK,CAAC,KAAK,EAAE,EAAE,EAAE;YACf,cAAc,EAAE;gBACd,WAAW,EAAE,YAAY,CAAC,WAAW;gBACrC,WAAW,EAAE,YAAY,CAAC,WAAW;gBACrC,aAAa,EAAE,YAAY,CAAC,aAAa;aAC1C;SACF,CAAC,CAAC;QAEH,2BAA2B;QAC3B,IAAI,wBAAa,CAAC,IAAI,EAAE,OAAO,EAAE,EAAE,CAAC,CAAC;QAErC,wBAAwB;QACxB,MAAM,iBAAiB,GAAG,IAAI,CAAC,oBAAoB,CACjD,oCAAoC,EACpC,eAAe,CAChB,CAAC;QAEF,6DAA6D;QAC7D,MAAM,aAAa,GAAG,IAAI,8BAAa,CAAC,IAAI,EAAE,SAAS,EAAE;YACvD,IAAI,EAAE,iBAAiB;YACvB,QAAQ,EAAE,SAAS;YACnB,IAAI,EAAE;gBACJ,GAAG,IAAI,CAAC,UAAU,EAAE;gBACpB,OAAO,EAAE,6BAA6B;aACvC;SACF,CAAC,CAAC;QAEH,qDAAqD;QACrD,MAAM,QAAQ,GAAG,IAAI,CAAC,oBAAoB,CACxC,mCAAmC,EACnC,KAAK,CACN,CAAC;QACF,MAAM,IAAI,GAAG,IAAI,iCAAc,CAAC,IAAI,EAAE,kBAAkB,EAAE;YACxD,IAAI,EAAE,GAAG,QAAQ,WAAW;YAC5B,QAAQ,EAAE,QAAQ;YAClB,eAAe,EAAE,aAAa,CAAC,EAAE;YACjC,IAAI,EAAE;gBACJ,GAAG,IAAI,CAAC,UAAU,EAAE;gBACpB,OAAO,EAAE,qBAAqB;aAC/B;SACF,CAAC,CAAC;QAEH,4EAA4E;QAC5E,uBAAuB;QACvB,4EAA4E;QAC5E,IAAI,2BAAiB,CAAC,IAAI,EAAE,iBAAiB,EAAE;YAC7C,IAAI,EAAE,KAAK;YACX,gBAAgB,EAAE,IAAI,CAAC,EAAE;YACzB,GAAG,EAAE,GAAG;YACR,OAAO,EAAE,CAAC,EAAE,WAAW,EAAE,UAAU,EAAE,CAAC;YACtC,QAAQ,EAAE;gBACR,OAAO,EAAE,YAAY;aACtB;SACF,CAAC,CAAC;QAEH,4EAA4E;QAC5E,2CAA2C;QAC3C,4EAA4E;QAC5E,IAAI,2BAAiB,CAAC,IAAI,EAAE,gBAAgB,EAAE;YAC5C,IAAI,EAAE,KAAK;YACX,gBAAgB,EAAE,IAAI,CAAC,EAAE;YACzB,GAAG,EAAE,GAAG;YACR,OAAO,EAAE;gBACP,EAAE,WAAW,EAAE,WAAW,EAAE;gBAC5B,EAAE,WAAW,EAAE,WAAW,EAAE;gBAC5B,EAAE,WAAW,EAAE,WAAW,EAAE;aAC7B;YACD,QAAQ,EAAE;gBACR,OAAO,EAAE,0BAA0B;aACpC;SACF,CAAC,CAAC;QAEH,4EAA4E;QAC5E,+BAA+B;QAC/B,4EAA4E;QAC5E,IAAI,8BAAoB,CAAC,IAAI,EAAE,aAAa,EAAE;YAC5C,IAAI,EAAE,UAAU;YAChB,gBAAgB,EAAE,IAAI,CAAC,EAAE;YACzB,GAAG,EAAE,GAAG;YACR,OAAO,EAAE,CAAC,EAAE,WAAW,EAAE,aAAa,EAAE,EAAE,EAAE,WAAW,EAAE,aAAa,EAAE,CAAC;YACzE,QAAQ,EAAE;gBACR,OAAO,EAAE,cAAc;aACxB;SACF,CAAC,CAAC;QAEH,4EAA4E;QAC5E,uBAAuB;QACvB,4EAA4E;QAC5E,IAAI,+BAAqB,CAAC,IAAI,EAAE,cAAc,EAAE;YAC9C,IAAI,EAAE,KAAK;YACX,gBAAgB,EAAE,IAAI,CAAC,EAAE;YACzB,GAAG,EAAE,IAAI;YACT,KAAK,EAAE,OAAO,QAAQ,WAAW;YACjC,QAAQ,EAAE;gBACR,OAAO,EAAE,cAAc;aACxB;SACF,CAAC,CAAC;QAEH,4EAA4E;QAC5E,oCAAoC;QACpC,4EAA4E;QAC5E,IAAI,4BAAkB,CAAC,IAAI,EAAE,WAAW,EAAE;YACxC,IAAI,EAAE,GAAG;YACT,gBAAgB,EAAE,IAAI,CAAC,EAAE;YACzB,GAAG,EAAE,IAAI;YACT,OAAO,EAAE;gBACP,EAAE,UAAU,EAAE,EAAE,EAAE,QAAQ,EAAE,SAAS,QAAQ,WAAW,EAAE;gBAC1D,EAAE,UAAU,EAAE,EAAE,EAAE,QAAQ,EAAE,SAAS,QAAQ,WAAW,EAAE;aAC3D;YACD,QAAQ,EAAE;gBACR,OAAO,EAAE,cAAc;aACxB;SACF,CAAC,CAAC;QAEH,4EAA4E;QAC5E,2BAA2B;QAC3B,kEAAkE;QAClE,gEAAgE;QAChE,wCAAwC;QACxC,4EAA4E;QAC5E,IAAI,6BAAmB,CAAC,IAAI,EAAE,YAAY,EAAE;YAC1C,IAAI,EAAE,KAAK;YACX,gBAAgB,EAAE,IAAI,CAAC,EAAE;YACzB,GAAG,EAAE,IAAI;YACT,OAAO,EAAE,CAAC,EAAE,QAAQ,EAAE,WAAW,QAAQ,WAAW,EAAE,CAAC;YACvD,QAAQ,EAAE;gBACR,OAAO,EAAE,oBAAoB;aAC9B;SACF,CAAC,CAAC;QAEH,4EAA4E;QAC5E,gCAAgC;QAChC,+CAA+C;QAC/C,4EAA4E;QAC5E,IAAI,6BAAmB,CAAC,IAAI,EAAE,YAAY,EAAE;YAC1C,IAAI,EAAE,WAAW;YACjB,gBAAgB,EAAE,IAAI,CAAC,EAAE;YACzB,GAAG,EAAE,IAAI;YACT,OAAO,EAAE;gBACP;oBACE,QAAQ,EAAE,EAAE;oBACZ,MAAM,EAAE,EAAE;oBACV,IAAI,EAAE,IAAI;oBACV,MAAM,EAAE,cAAc,QAAQ,WAAW;iBAC1C;gBACD;oBACE,QAAQ,EAAE,EAAE;oBACZ,MAAM,EAAE,EAAE;oBACV,IAAI,EAAE,IAAI;oBACV,MAAM,EAAE,cAAc,QAAQ,WAAW;iBAC1C;gBACD;oBACE,QAAQ,EAAE,EAAE;oBACZ,MAAM,EAAE,GAAG;oBACX,IAAI,EAAE,IAAI;oBACV,MAAM,EAAE,oBAAoB,QAAQ,WAAW;iBAChD;aACF;YACD,QAAQ,EAAE;gBACR,OAAO,EAAE,uBAAuB;aACjC;SACF,CAAC,CAAC;QAEH,4EAA4E;QAC5E,0BAA0B;QAC1B,4EAA4E;QAC5E,IAAI,6BAAmB,CAAC,IAAI,EAAE,gBAAgB,EAAE;YAC9C,IAAI,EAAE,GAAG;YACT,gBAAgB,EAAE,IAAI,CAAC,EAAE;YACzB,GAAG,EAAE,IAAI;YACT,OAAO,EAAE,CAAC,EAAE,KAAK,EAAE,CAAC,+CAA+C,CAAC,EAAE,CAAC;YACvE,QAAQ,EAAE;gBACR,OAAO,EAAE,YAAY;aACtB;SACF,CAAC,CAAC;QAEH,4EAA4E;QAC5E,mCAAmC;QACnC,4EAA4E;QAC5E,IAAI,6BAAmB,CAAC,IAAI,EAAE,yBAAyB,EAAE;YACvD,IAAI,EAAE,SAAS;YACf,gBAAgB,EAAE,IAAI,CAAC,EAAE;YACzB,GAAG,EAAE,IAAI;YACT,OAAO,EAAE;gBACP,EAAE,KAAK,EAAE,CAAC,iCAAiC,CAAC,EAAE;gBAC9C,EAAE,KAAK,EAAE,CAAC,6BAA6B,CAAC,EAAE;aAC3C;YACD,QAAQ,EAAE;gBACR,OAAO,EAAE,qBAAqB;aAC/B;SACF,CAAC,CAAC;QAEH,4EAA4E;QAC5E,uCAAuC;QACvC,4EAA4E;QAC5E,IAAI,6BAAmB,CAAC,IAAI,EAAE,iBAAiB,EAAE;YAC/C,IAAI,EAAE,YAAY;YAClB,gBAAgB,EAAE,IAAI,CAAC,EAAE;YACzB,GAAG,EAAE,IAAI;YACT,OAAO,EAAE;gBACP;oBACE,QAAQ,EAAE,CAAC;oBACX,MAAM,EAAE,GAAG;oBACX,IAAI,EAAE,GAAG;oBACT,MAAM,EAAE,QAAQ,QAAQ,WAAW;iBACpC;aACF;YACD,QAAQ,EAAE;gBACR,OAAO,EAAE,wBAAwB;aAClC;SACF,CAAC,CAAC;IACL,CAAC;CACF;AAED,QAAQ,CAAC,oCAAoC,EAAE,GAAG,EAAE;IAClD,EAAE,CAAC,4DAA4D,EAAE,GAAG,EAAE;QACpE,MAAM,GAAG,GAAG,eAAO,CAAC,GAAG,EAAE,CAAC;QAC1B,MAAM,KAAK,GAAG,IAAI,6BAA6B,CAC7C,GAAG,EACH,wBAAwB,CACzB,CAAC;QACF,MAAM,WAAW,GAAG,eAAO,CAAC,SAAS,CAAC,KAAK,CAAC,CAAC;QAE7C,aAAa;QACb,oFAAoF;QACpF,mEAAmE;QACnE,wFAAwF;QACxF,IAAA,uCAA6B,EAAC,WAAW,EAAE,EAAE,aAAa,EAAE,IAAI,EAAE,CAAC,CAAC;IACtE,CAAC,EAAE,MAAM,CAAC,CAAC,CAAC,+CAA+C;AAC7D,CAAC,CAAC,CAAC","sourcesContent":["/**\n * Integration test for Azure Private DNS Zone Records\n *\n * This test demonstrates usage of all Private DNS record types\n * and validates deployment, idempotency, and cleanup for child resources.\n *\n * Supported Record Types:\n * - A record (IPv4 addresses)\n * - AAAA record (IPv6 addresses)\n * - CNAME record\n * - MX record\n * - PTR record\n * - SRV record\n * - TXT record\n * - (SOA is managed by Azure automatically)\n *\n * Run with: npm run integration:nostream\n */\n\nimport { Testing } from \"cdktf\";\nimport { Construct } from \"constructs\";\nimport \"cdktf/lib/testing/adapters/jest\";\nimport { ResourceGroup } from \"../../azure-resourcegroup/lib/resource-group\";\nimport { AzapiProvider } from \"../../core-azure/lib/azapi/providers-azapi/provider\";\nimport { BaseTestStack, TerraformApplyCheckAndDestroy } from \"../../testing\";\nimport { TestRunMetadata } from \"../../testing/lib/metadata\";\nimport { PrivateDnsZone } from \"../lib/private-dns-zone\";\nimport {\n  PrivateDnsARecord,\n  PrivateDnsAaaaRecord,\n  PrivateDnsCnameRecord,\n  PrivateDnsMxRecord,\n  PrivateDnsPtrRecord,\n  PrivateDnsSrvRecord,\n  PrivateDnsTxtRecord,\n} from \"../lib/records\";\n\n// Generate unique test run metadata for this test suite\nconst testMetadata = new TestRunMetadata(\"privatednsrec-integration\", {\n  maxAgeHours: 4,\n});\n\n/**\n * Example stack demonstrating Private DNS Records usage\n *\n * Creates a Private DNS Zone and various record types within it.\n */\nclass PrivateDnsRecordsExampleStack extends BaseTestStack {\n  constructor(scope: Construct, id: string) {\n    super(scope, id, {\n      testRunOptions: {\n        maxAgeHours: testMetadata.maxAgeHours,\n        autoCleanup: testMetadata.autoCleanup,\n        cleanupPolicy: testMetadata.cleanupPolicy,\n      },\n    });\n\n    // Configure AZAPI provider\n    new AzapiProvider(this, \"azapi\", {});\n\n    // Generate unique names\n    const resourceGroupName = this.generateResourceName(\n      \"Microsoft.Resources/resourceGroups\",\n      \"privatednsrec\",\n    );\n\n    // Create resource group for the Private DNS zone and records\n    const resourceGroup = new ResourceGroup(this, \"test-rg\", {\n      name: resourceGroupName,\n      location: \"eastus2\",\n      tags: {\n        ...this.systemTags(),\n        purpose: \"private-dns-records-testing\",\n      },\n    });\n\n    // Create Private DNS Zone - using a unique zone name\n    const zoneName = this.generateResourceName(\n      \"Microsoft.Network/privateDnsZones\",\n      \"rec\",\n    );\n    const zone = new PrivateDnsZone(this, \"private-dns-zone\", {\n      name: `${zoneName}.internal`,\n      location: \"global\",\n      resourceGroupId: resourceGroup.id,\n      tags: {\n        ...this.systemTags(),\n        purpose: \"dns-records-testing\",\n      },\n    });\n\n    // =========================================================================\n    // A Record - Single IP\n    // =========================================================================\n    new PrivateDnsARecord(this, \"a-record-single\", {\n      name: \"web\",\n      privateDnsZoneId: zone.id,\n      ttl: 300,\n      records: [{ ipv4Address: \"10.0.1.4\" }],\n      metadata: {\n        purpose: \"web-server\",\n      },\n    });\n\n    // =========================================================================\n    // A Record - Multiple IPs (load balancing)\n    // =========================================================================\n    new PrivateDnsARecord(this, \"a-record-multi\", {\n      name: \"api\",\n      privateDnsZoneId: zone.id,\n      ttl: 300,\n      records: [\n        { ipv4Address: \"10.0.1.10\" },\n        { ipv4Address: \"10.0.1.11\" },\n        { ipv4Address: \"10.0.1.12\" },\n      ],\n      metadata: {\n        purpose: \"api-servers-loadbalanced\",\n      },\n    });\n\n    // =========================================================================\n    // AAAA Record - IPv6 addresses\n    // =========================================================================\n    new PrivateDnsAaaaRecord(this, \"aaaa-record\", {\n      name: \"ipv6host\",\n      privateDnsZoneId: zone.id,\n      ttl: 300,\n      records: [{ ipv6Address: \"2001:db8::1\" }, { ipv6Address: \"2001:db8::2\" }],\n      metadata: {\n        purpose: \"ipv6-servers\",\n      },\n    });\n\n    // =========================================================================\n    // CNAME Record - Alias\n    // =========================================================================\n    new PrivateDnsCnameRecord(this, \"cname-record\", {\n      name: \"www\",\n      privateDnsZoneId: zone.id,\n      ttl: 3600,\n      cname: `web.${zoneName}.internal`,\n      metadata: {\n        purpose: \"alias-to-web\",\n      },\n    });\n\n    // =========================================================================\n    // MX Record - Mail exchange servers\n    // =========================================================================\n    new PrivateDnsMxRecord(this, \"mx-record\", {\n      name: \"@\",\n      privateDnsZoneId: zone.id,\n      ttl: 3600,\n      records: [\n        { preference: 10, exchange: `mail1.${zoneName}.internal` },\n        { preference: 20, exchange: `mail2.${zoneName}.internal` },\n      ],\n      metadata: {\n        purpose: \"mail-servers\",\n      },\n    });\n\n    // =========================================================================\n    // PTR Record - Reverse DNS\n    // Note: In practice, PTR records are created in reverse DNS zones\n    // (e.g., 1.0.10.in-addr.arpa), but for this test we demonstrate\n    // the record creation in a forward zone\n    // =========================================================================\n    new PrivateDnsPtrRecord(this, \"ptr-record\", {\n      name: \"ptr\",\n      privateDnsZoneId: zone.id,\n      ttl: 3600,\n      records: [{ ptrdname: `server1.${zoneName}.internal` }],\n      metadata: {\n        purpose: \"reverse-dns-lookup\",\n      },\n    });\n\n    // =========================================================================\n    // SRV Record - Service location\n    // Format: _service._protocol (e.g., _sip._tcp)\n    // =========================================================================\n    new PrivateDnsSrvRecord(this, \"srv-record\", {\n      name: \"_sip._tcp\",\n      privateDnsZoneId: zone.id,\n      ttl: 3600,\n      records: [\n        {\n          priority: 10,\n          weight: 60,\n          port: 5060,\n          target: `sipserver1.${zoneName}.internal`,\n        },\n        {\n          priority: 10,\n          weight: 40,\n          port: 5060,\n          target: `sipserver2.${zoneName}.internal`,\n        },\n        {\n          priority: 20,\n          weight: 100,\n          port: 5060,\n          target: `sipserver-backup.${zoneName}.internal`,\n        },\n      ],\n      metadata: {\n        purpose: \"sip-service-discovery\",\n      },\n    });\n\n    // =========================================================================\n    // TXT Record - SPF record\n    // =========================================================================\n    new PrivateDnsTxtRecord(this, \"txt-record-spf\", {\n      name: \"@\",\n      privateDnsZoneId: zone.id,\n      ttl: 3600,\n      records: [{ value: [\"v=spf1 include:_spf.internal.example.com ~all\"] }],\n      metadata: {\n        purpose: \"spf-record\",\n      },\n    });\n\n    // =========================================================================\n    // TXT Record - Domain verification\n    // =========================================================================\n    new PrivateDnsTxtRecord(this, \"txt-record-verification\", {\n      name: \"_verify\",\n      privateDnsZoneId: zone.id,\n      ttl: 3600,\n      records: [\n        { value: [\"verification-token=abc123def456\"] },\n        { value: [\"another-verification=xyz789\"] },\n      ],\n      metadata: {\n        purpose: \"domain-verification\",\n      },\n    });\n\n    // =========================================================================\n    // Additional SRV Record - LDAP service\n    // =========================================================================\n    new PrivateDnsSrvRecord(this, \"srv-record-ldap\", {\n      name: \"_ldap._tcp\",\n      privateDnsZoneId: zone.id,\n      ttl: 3600,\n      records: [\n        {\n          priority: 0,\n          weight: 100,\n          port: 389,\n          target: `ldap.${zoneName}.internal`,\n        },\n      ],\n      metadata: {\n        purpose: \"ldap-service-discovery\",\n      },\n    });\n  }\n}\n\ndescribe(\"PrivateDnsRecords Integration Test\", () => {\n  it(\"should deploy, validate idempotency, and cleanup resources\", () => {\n    const app = Testing.app();\n    const stack = new PrivateDnsRecordsExampleStack(\n      app,\n      \"test-privatednsrecords\",\n    );\n    const synthesized = Testing.fullSynth(stack);\n\n    // This will:\n    // 1. Run terraform apply to deploy resources (including parent-child relationships)\n    // 2. Run terraform plan to check idempotency (no changes expected)\n    // 3. Run terraform destroy to cleanup resources (child resources cleanup before parent)\n    TerraformApplyCheckAndDestroy(synthesized, { verifyCleanup: true });\n  }, 600000); // 10 minute timeout for deployment and cleanup\n});\n"]}
@@ -0,0 +1,18 @@
1
+ /**
2
+ * Unit tests for Azure Private DNS Zone Record implementations
3
+ *
4
+ * This test suite validates all 8 Private DNS record types:
5
+ * - PrivateDnsARecord
6
+ * - PrivateDnsAaaaRecord
7
+ * - PrivateDnsCnameRecord
8
+ * - PrivateDnsMxRecord
9
+ * - PrivateDnsPtrRecord
10
+ * - PrivateDnsSoaRecord
11
+ * - PrivateDnsSrvRecord
12
+ * - PrivateDnsTxtRecord
13
+ *
14
+ * Tests verify basic creation, correct resource types, API versions,
15
+ * parent ID resolution, resource body structure, TTL handling,
16
+ * record-specific properties, and metadata handling.
17
+ */
18
+ export {};